|
@@ -1,9 +1,9 @@
|
|
|
use std::{cell::RefCell, sync::Arc};
|
|
|
|
|
|
use crate::{schema, UIDCError};
|
|
|
+use microrm::prelude::*;
|
|
|
use ring::signature::{Ed25519KeyPair, KeyPair};
|
|
|
use sha2::Digest;
|
|
|
-use microrm::prelude::*;
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
pub enum KeyError {
|
|
@@ -24,7 +24,7 @@ impl std::fmt::Display for KeyType {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-pub const KEY_TYPE_NAMES : &'static [(&'static str, KeyType)] = &[
|
|
|
+pub const KEY_TYPE_NAMES: &'static [(&'static str, KeyType)] = &[
|
|
|
("rsa2048", KeyType::RSA2048),
|
|
|
("rsa4096", KeyType::RSA4096),
|
|
|
("ed25519", KeyType::Ed25519),
|
|
@@ -35,7 +35,7 @@ impl std::str::FromStr for KeyType {
|
|
|
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
|
|
for (spec, kty) in KEY_TYPE_NAMES {
|
|
|
if s == *spec {
|
|
|
- return Ok(*kty)
|
|
|
+ return Ok(*kty);
|
|
|
}
|
|
|
}
|
|
|
Err(UIDCError::Abort("invalid keytype"))
|
|
@@ -43,8 +43,14 @@ impl std::str::FromStr for KeyType {
|
|
|
}
|
|
|
|
|
|
pub enum ParsedKey {
|
|
|
- Ed25519 { key_id: String, keypair: ring::signature::Ed25519KeyPair },
|
|
|
- RSA { key_id: String, keypair: ring::signature::RsaKeyPair }
|
|
|
+ Ed25519 {
|
|
|
+ key_id: String,
|
|
|
+ keypair: ring::signature::Ed25519KeyPair,
|
|
|
+ },
|
|
|
+ RSA {
|
|
|
+ key_id: String,
|
|
|
+ keypair: ring::signature::RsaKeyPair,
|
|
|
+ },
|
|
|
}
|
|
|
|
|
|
impl ParsedKey {
|
|
@@ -57,14 +63,19 @@ impl ParsedKey {
|
|
|
|
|
|
pub fn generate_signature(&self, data: &[u8]) -> Result<Vec<u8>, UIDCError> {
|
|
|
match self {
|
|
|
- Self::Ed25519 { key_id, keypair } => {
|
|
|
- Ok(keypair.sign(data).as_ref().into())
|
|
|
- },
|
|
|
+ Self::Ed25519 { key_id, keypair } => Ok(keypair.sign(data).as_ref().into()),
|
|
|
Self::RSA { key_id, keypair } => {
|
|
|
let rng = ring::rand::SystemRandom::new();
|
|
|
let mut signature = vec![];
|
|
|
signature.resize(keypair.public_modulus_len(), 0);
|
|
|
- keypair.sign(&ring::signature::RSA_PKCS1_SHA256, &rng, data, signature.as_mut_slice()).map_err(|_| KeyError::Plain("failed to generate RSA signature!"))?;
|
|
|
+ keypair
|
|
|
+ .sign(
|
|
|
+ &ring::signature::RSA_PKCS1_SHA256,
|
|
|
+ &rng,
|
|
|
+ data,
|
|
|
+ signature.as_mut_slice(),
|
|
|
+ )
|
|
|
+ .map_err(|_| KeyError::Plain("failed to generate RSA signature!"))?;
|
|
|
Ok(signature)
|
|
|
}
|
|
|
}
|
|
@@ -73,12 +84,20 @@ impl ParsedKey {
|
|
|
pub fn verify_signature(&self, data: &[u8], signature: &[u8]) -> Result<bool, UIDCError> {
|
|
|
use ring::signature::VerificationAlgorithm;
|
|
|
match self {
|
|
|
- Self::Ed25519 { keypair, .. } => {
|
|
|
- Ok(ring::signature::ED25519.verify(keypair.public_key().as_ref().into(), data.into(), signature.into()).is_ok())
|
|
|
- },
|
|
|
- Self::RSA { keypair, .. } => {
|
|
|
- Ok(ring::signature::RSA_PKCS1_2048_8192_SHA256.verify(keypair.public_key().as_ref().into(), data.into(), signature.into()).is_ok())
|
|
|
- },
|
|
|
+ Self::Ed25519 { keypair, .. } => Ok(ring::signature::ED25519
|
|
|
+ .verify(
|
|
|
+ keypair.public_key().as_ref().into(),
|
|
|
+ data.into(),
|
|
|
+ signature.into(),
|
|
|
+ )
|
|
|
+ .is_ok()),
|
|
|
+ Self::RSA { keypair, .. } => Ok(ring::signature::RSA_PKCS1_2048_8192_SHA256
|
|
|
+ .verify(
|
|
|
+ keypair.public_key().as_ref().into(),
|
|
|
+ data.into(),
|
|
|
+ signature.into(),
|
|
|
+ )
|
|
|
+ .is_ok()),
|
|
|
}
|
|
|
}
|
|
|
}
|
|
@@ -91,14 +110,17 @@ pub struct RealmKeys {
|
|
|
|
|
|
impl RealmKeys {
|
|
|
pub fn new(realm: schema::Realm) -> Self {
|
|
|
- Self { realm, keys: vec![].into() }
|
|
|
+ Self {
|
|
|
+ realm,
|
|
|
+ keys: vec![].into(),
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
pub fn by_key_id(&mut self, id: &String) -> Result<Option<Arc<ParsedKey>>, UIDCError> {
|
|
|
// check the cache
|
|
|
for key in self.keys.borrow().iter() {
|
|
|
if key.1.key_id() == id {
|
|
|
- return Ok(Some(key.1.clone()))
|
|
|
+ return Ok(Some(key.1.clone()));
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -107,20 +129,23 @@ impl RealmKeys {
|
|
|
|
|
|
if let Some(key) = key {
|
|
|
let parsed = Arc::new(match key.key_type.as_ref() {
|
|
|
- KeyType::RSA2048
|
|
|
- | KeyType::RSA4096 => {
|
|
|
+ KeyType::RSA2048 | KeyType::RSA4096 => {
|
|
|
todo!()
|
|
|
- },
|
|
|
- KeyType::Ed25519 => {
|
|
|
- ParsedKey::Ed25519 { key_id: key.key_id.clone(), keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load ed25519 key from database"))? }
|
|
|
+ }
|
|
|
+ KeyType::Ed25519 => ParsedKey::Ed25519 {
|
|
|
+ key_id: key.key_id.clone(),
|
|
|
+ keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| {
|
|
|
+ UIDCError::Abort("could not load ed25519 key from database")
|
|
|
+ })?,
|
|
|
},
|
|
|
});
|
|
|
|
|
|
- self.keys.borrow_mut().push((*key.key_type.as_ref(), parsed.clone()));
|
|
|
+ self.keys
|
|
|
+ .borrow_mut()
|
|
|
+ .push((*key.key_type.as_ref(), parsed.clone()));
|
|
|
|
|
|
Ok(Some(parsed))
|
|
|
- }
|
|
|
- else {
|
|
|
+ } else {
|
|
|
Ok(None)
|
|
|
}
|
|
|
}
|
|
@@ -129,29 +154,37 @@ impl RealmKeys {
|
|
|
// check the cache
|
|
|
for key in self.keys.borrow().iter() {
|
|
|
if key.0 == kty {
|
|
|
- return Ok(Some(key.1.clone()))
|
|
|
+ return Ok(Some(key.1.clone()));
|
|
|
}
|
|
|
}
|
|
|
|
|
|
// then check the database
|
|
|
- let key = self.realm.keys.with(schema::Key::KeyType, &kty.into()).first().get()?;
|
|
|
+ let key = self
|
|
|
+ .realm
|
|
|
+ .keys
|
|
|
+ .with(schema::Key::KeyType, &kty.into())
|
|
|
+ .first()
|
|
|
+ .get()?;
|
|
|
|
|
|
if let Some(key) = key {
|
|
|
let parsed = Arc::new(match kty {
|
|
|
- KeyType::RSA2048
|
|
|
- | KeyType::RSA4096 => {
|
|
|
- ParsedKey::RSA { key_id: key.key_id.clone(), keypair: ring::signature::RsaKeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load RSA key from database"))? }
|
|
|
+ KeyType::RSA2048 | KeyType::RSA4096 => ParsedKey::RSA {
|
|
|
+ key_id: key.key_id.clone(),
|
|
|
+ keypair: ring::signature::RsaKeyPair::from_pkcs8(&key.secret_data)
|
|
|
+ .map_err(|_| UIDCError::Abort("could not load RSA key from database"))?,
|
|
|
},
|
|
|
- KeyType::Ed25519 => {
|
|
|
- ParsedKey::Ed25519 { key_id: key.key_id.clone(), keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load ed25519 key from database"))? }
|
|
|
+ KeyType::Ed25519 => ParsedKey::Ed25519 {
|
|
|
+ key_id: key.key_id.clone(),
|
|
|
+ keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| {
|
|
|
+ UIDCError::Abort("could not load ed25519 key from database")
|
|
|
+ })?,
|
|
|
},
|
|
|
});
|
|
|
|
|
|
self.keys.borrow_mut().push((kty, parsed.clone()));
|
|
|
|
|
|
Ok(Some(parsed))
|
|
|
- }
|
|
|
- else {
|
|
|
+ } else {
|
|
|
Ok(None)
|
|
|
}
|
|
|
}
|
|
@@ -177,13 +210,15 @@ fn generate_rsa(realm: &schema::Realm, kty: KeyType, bits: usize) -> Result<Pars
|
|
|
| openssl pkcs8 \
|
|
|
-topk8 \
|
|
|
-nocrypt \
|
|
|
- -outform der"))
|
|
|
+ -outform der"
|
|
|
+ ))
|
|
|
.output()
|
|
|
.map_err(|_| UIDCError::Abort("couldn't invoke openssl"))?;
|
|
|
|
|
|
let secret = openssl_output.stdout;
|
|
|
|
|
|
- let keypair = ring::signature::RsaKeyPair::from_pkcs8(&secret).map_err(|_| UIDCError::Abort("couldn't parse PKCS#8 output from openssl"))?;
|
|
|
+ let keypair = ring::signature::RsaKeyPair::from_pkcs8(&secret)
|
|
|
+ .map_err(|_| UIDCError::Abort("couldn't parse PKCS#8 output from openssl"))?;
|
|
|
let public = keypair.public_key().as_ref();
|
|
|
let key_id = pubkey_id(public.as_ref());
|
|
|
let expiry = time::OffsetDateTime::now_utc() + time::Duration::days(730);
|
|
@@ -193,7 +228,7 @@ fn generate_rsa(realm: &schema::Realm, kty: KeyType, bits: usize) -> Result<Pars
|
|
|
key_type: kty.into(),
|
|
|
public_data: public.into(),
|
|
|
secret_data: secret.into(),
|
|
|
- expiry
|
|
|
+ expiry,
|
|
|
})?;
|
|
|
|
|
|
Ok(ParsedKey::RSA { key_id, keypair })
|
|
@@ -202,12 +237,8 @@ fn generate_rsa(realm: &schema::Realm, kty: KeyType, bits: usize) -> Result<Pars
|
|
|
pub fn generate_in(realm: &schema::Realm, kty: KeyType) -> Result<ParsedKey, UIDCError> {
|
|
|
let mut rng = ring::rand::SystemRandom::new();
|
|
|
match kty {
|
|
|
- KeyType::RSA2048 => {
|
|
|
- generate_rsa(realm, KeyType::RSA2048, 2048)
|
|
|
- },
|
|
|
- KeyType::RSA4096 => {
|
|
|
- generate_rsa(realm, KeyType::RSA4096, 4096)
|
|
|
- },
|
|
|
+ KeyType::RSA2048 => generate_rsa(realm, KeyType::RSA2048, 2048),
|
|
|
+ KeyType::RSA4096 => generate_rsa(realm, KeyType::RSA4096, 4096),
|
|
|
KeyType::Ed25519 => {
|
|
|
let generated_keypair = Ed25519KeyPair::generate_pkcs8(&mut rng)
|
|
|
.map_err(|_| KeyError::Plain("failed to generate key"))?;
|
|
@@ -226,11 +257,14 @@ pub fn generate_in(realm: &schema::Realm, kty: KeyType) -> Result<ParsedKey, UID
|
|
|
// no separate public data for EdDSA keys
|
|
|
public_data: vec![],
|
|
|
secret_data: keydata,
|
|
|
- expiry
|
|
|
+ expiry,
|
|
|
})?;
|
|
|
|
|
|
- Ok(ParsedKey::Ed25519 { key_id, keypair: loaded_key })
|
|
|
- },
|
|
|
+ Ok(ParsedKey::Ed25519 {
|
|
|
+ key_id,
|
|
|
+ keypair: loaded_key,
|
|
|
+ })
|
|
|
+ }
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -238,7 +272,14 @@ pub fn list(realm: &schema::Realm) -> Result<(), UIDCError> {
|
|
|
let keys = realm.keys.get()?;
|
|
|
|
|
|
for key in keys {
|
|
|
- println!("- [{}] {:?}, expires {}", key.key_id, key.key_type, key.expiry.format(&time::format_description::well_known::Rfc3339).unwrap());
|
|
|
+ println!(
|
|
|
+ "- [{}] {:?}, expires {}",
|
|
|
+ key.key_id,
|
|
|
+ key.key_type,
|
|
|
+ key.expiry
|
|
|
+ .format(&time::format_description::well_known::Rfc3339)
|
|
|
+ .unwrap()
|
|
|
+ );
|
|
|
}
|
|
|
Ok(())
|
|
|
}
|