|
@@ -1,3 +1,5 @@
|
|
|
+use std::{cell::RefCell, sync::Arc};
|
|
|
+
|
|
|
use crate::{schema, UIDCError};
|
|
|
use ring::signature::{Ed25519KeyPair, KeyPair};
|
|
|
use sha2::Digest;
|
|
@@ -9,19 +11,37 @@ pub enum KeyError {
|
|
|
}
|
|
|
|
|
|
#[non_exhaustive]
|
|
|
-#[derive(Clone, Copy, Debug, serde::Serialize, serde::Deserialize)]
|
|
|
+#[derive(Clone, Copy, Debug, PartialEq, serde::Serialize, serde::Deserialize)]
|
|
|
pub enum KeyType {
|
|
|
RSA2048,
|
|
|
RSA4096,
|
|
|
Ed25519,
|
|
|
}
|
|
|
|
|
|
+impl std::fmt::Display for KeyType {
|
|
|
+ fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
|
+ <Self as std::fmt::Debug>::fmt(self, f)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
pub const KEY_TYPE_NAMES : &'static [(&'static str, KeyType)] = &[
|
|
|
("rsa2048", KeyType::RSA2048),
|
|
|
("rsa4096", KeyType::RSA4096),
|
|
|
("ed25519", KeyType::Ed25519),
|
|
|
];
|
|
|
|
|
|
+impl std::str::FromStr for KeyType {
|
|
|
+ type Err = UIDCError;
|
|
|
+ fn from_str(s: &str) -> Result<Self, Self::Err> {
|
|
|
+ for (spec, kty) in KEY_TYPE_NAMES {
|
|
|
+ if s == *spec {
|
|
|
+ return Ok(*kty)
|
|
|
+ }
|
|
|
+ }
|
|
|
+ Err(UIDCError::Abort("invalid keytype"))
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
pub enum ParsedKey {
|
|
|
Ed25519 { key_id: String, keypair: ring::signature::Ed25519KeyPair },
|
|
|
RSA { key_id: String, keypair: ring::signature::RsaKeyPair }
|
|
@@ -53,16 +73,90 @@ impl ParsedKey {
|
|
|
pub fn verify_signature(&self, data: &[u8], signature: &[u8]) -> Result<bool, UIDCError> {
|
|
|
use ring::signature::VerificationAlgorithm;
|
|
|
match self {
|
|
|
- Self::Ed25519 { key_id, keypair } => {
|
|
|
+ Self::Ed25519 { keypair, .. } => {
|
|
|
Ok(ring::signature::ED25519.verify(keypair.public_key().as_ref().into(), data.into(), signature.into()).is_ok())
|
|
|
},
|
|
|
- Self::RSA { key_id, keypair } => {
|
|
|
+ Self::RSA { keypair, .. } => {
|
|
|
Ok(ring::signature::RSA_PKCS1_2048_8192_SHA256.verify(keypair.public_key().as_ref().into(), data.into(), signature.into()).is_ok())
|
|
|
},
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+pub struct RealmKeys {
|
|
|
+ realm: schema::Realm,
|
|
|
+ // key cache, to avoid reparsing the key data repeatedly
|
|
|
+ keys: RefCell<Vec<(KeyType, Arc<ParsedKey>)>>,
|
|
|
+}
|
|
|
+
|
|
|
+impl RealmKeys {
|
|
|
+ pub fn new(realm: schema::Realm) -> Self {
|
|
|
+ Self { realm, keys: vec![].into() }
|
|
|
+ }
|
|
|
+
|
|
|
+ pub fn by_key_id(&mut self, id: &String) -> Result<Option<Arc<ParsedKey>>, UIDCError> {
|
|
|
+ // check the cache
|
|
|
+ for key in self.keys.borrow().iter() {
|
|
|
+ if key.1.key_id() == id {
|
|
|
+ return Ok(Some(key.1.clone()))
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ // then check the database
|
|
|
+ let key = self.realm.keys.with(schema::Key::KeyId, id).first().get()?;
|
|
|
+
|
|
|
+ if let Some(key) = key {
|
|
|
+ let parsed = Arc::new(match key.key_type.as_ref() {
|
|
|
+ KeyType::RSA2048
|
|
|
+ | KeyType::RSA4096 => {
|
|
|
+ todo!()
|
|
|
+ },
|
|
|
+ KeyType::Ed25519 => {
|
|
|
+ ParsedKey::Ed25519 { key_id: key.key_id.clone(), keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load ed25519 key from database"))? }
|
|
|
+ },
|
|
|
+ });
|
|
|
+
|
|
|
+ self.keys.borrow_mut().push((*key.key_type.as_ref(), parsed.clone()));
|
|
|
+
|
|
|
+ Ok(Some(parsed))
|
|
|
+ }
|
|
|
+ else {
|
|
|
+ Ok(None)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ pub fn by_type(&mut self, kty: KeyType) -> Result<Option<Arc<ParsedKey>>, UIDCError> {
|
|
|
+ // check the cache
|
|
|
+ for key in self.keys.borrow().iter() {
|
|
|
+ if key.0 == kty {
|
|
|
+ return Ok(Some(key.1.clone()))
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ // then check the database
|
|
|
+ let key = self.realm.keys.with(schema::Key::KeyType, &kty.into()).first().get()?;
|
|
|
+
|
|
|
+ if let Some(key) = key {
|
|
|
+ let parsed = Arc::new(match kty {
|
|
|
+ KeyType::RSA2048
|
|
|
+ | KeyType::RSA4096 => {
|
|
|
+ ParsedKey::RSA { key_id: key.key_id.clone(), keypair: ring::signature::RsaKeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load RSA key from database"))? }
|
|
|
+ },
|
|
|
+ KeyType::Ed25519 => {
|
|
|
+ ParsedKey::Ed25519 { key_id: key.key_id.clone(), keypair: Ed25519KeyPair::from_pkcs8(&key.secret_data).map_err(|_| UIDCError::Abort("could not load ed25519 key from database"))? }
|
|
|
+ },
|
|
|
+ });
|
|
|
+
|
|
|
+ self.keys.borrow_mut().push((kty, parsed.clone()));
|
|
|
+
|
|
|
+ Ok(Some(parsed))
|
|
|
+ }
|
|
|
+ else {
|
|
|
+ Ok(None)
|
|
|
+ }
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
fn pubkey_id(data: &[u8]) -> String {
|
|
|
let mut key_hasher = sha2::Sha256::new();
|
|
|
key_hasher.update(data);
|
|
@@ -129,7 +223,7 @@ pub fn generate_in(realm: &schema::Realm, kty: KeyType) -> Result<ParsedKey, UID
|
|
|
realm.keys.insert(schema::Key {
|
|
|
key_id: key_id.clone(),
|
|
|
key_type: kty.into(),
|
|
|
- // no public data for EdDSA keys
|
|
|
+ // no separate public data for EdDSA keys
|
|
|
public_data: vec![],
|
|
|
secret_data: keydata,
|
|
|
expiry
|
|
@@ -151,12 +245,5 @@ pub fn list(realm: &schema::Realm) -> Result<(), UIDCError> {
|
|
|
|
|
|
pub fn remove(realm: &schema::Realm, key_id: &String) -> Result<(), UIDCError> {
|
|
|
realm.keys.with(schema::Key::KeyId, key_id).delete()?;
|
|
|
- /*for key in realm.keys.get()? {
|
|
|
- if key.key_id != key_id { continue }
|
|
|
- println!("Deleting key...");
|
|
|
- realm.keys.dissociate_with(key.id())?;
|
|
|
- break
|
|
|
- }*/
|
|
|
-
|
|
|
Ok(())
|
|
|
}
|