commit 01b9e92a8746114f6759449e5682d52463653fdd
parent fdc1410ba7ad62cb9a9508d6226d10d33c2f8845
Author: lash <dev@holbrook.no>
Date: Wed, 5 Mar 2025 15:57:43 +0000
Implement key encryption and decrypt before sign
Diffstat:
5 files changed, 80 insertions(+), 11 deletions(-)
diff --git a/src/crypto/dummy.c b/src/crypto/dummy.c
@@ -1,5 +1,7 @@
#include "lq/crypto.h"
#include "lq/mem.h"
+#include "lq/err.h"
+
// sha512sum "foo" 2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae
static const char pubkey_dummy_transform[64] = {
@@ -59,8 +61,11 @@ void keylock_xor(LQPrivKey *pk) {
int lq_privatekey_unlock(LQPrivKey *pk, const char *passphrase) {
char b;
+ if (pk == NULL) {
+ return ERR_INIT;
+ }
if ((pk->key_state & LQ_KEY_LOCK) == 0) {
- return 1;
+ return ERR_NOOP;
}
keylock_xor(pk);
b = LQ_KEY_LOCK;
@@ -68,11 +73,14 @@ int lq_privatekey_unlock(LQPrivKey *pk, const char *passphrase) {
return 0;
}
-int lq_privatekey_lock(LQPrivKey *pk) {
+int lq_privatekey_lock(LQPrivKey *pk, const char *passphrase) {
char b;
+ if (pk == NULL) {
+ return ERR_INIT;
+ }
if ((pk->key_state & LQ_KEY_LOCK) == 0) {
- return 1;
+ return ERR_NOOP;
}
keylock_xor(pk);
pk->key_state |= LQ_KEY_LOCK;
@@ -89,7 +97,8 @@ LQPrivKey* lq_privatekey_new(const char *seed, size_t seed_len) {
lq_cpy(o->data, seed, seed_len);
o->len = seed_len;
pk->impl = o;
- pk->key_state = LQ_KEY_LOCK;
+ pk->key_state = 0;
+ pk->key_state |= LQ_KEY_LOCK;
pk->key_typ = 0;
return pk;
}
diff --git a/src/lq/crypto.h b/src/lq/crypto.h
@@ -20,7 +20,7 @@
#endif
enum lq_keystate_e {
- LQ_KEY_LOCK,
+ LQ_KEY_LOCK = 1,
};
@@ -114,6 +114,24 @@ LQPubKey* lq_publickey_from_privatekey(LQPrivKey *pk);
size_t lq_publickey_bytes(LQPubKey *pubk, char **out);
/**
+ * @brief Encrypt private key in place.
+ *
+ * Must clear sensistive memory.
+ *
+ * @param[in] Private Key object
+ * @return ERR_OK if encrypted, ERR_NOOP if already encrypted, or ERR_INIT if encryption fails.
+ */
+int lq_privatekey_lock(LQPrivKey *pk, const char *passphrase);
+
+/**
+ * @brief Decrypt private key in place.
+ *
+ * @param[in] Private Key object
+ * @return ERR_OK if decrypted, ERR_NOOP if not encrypted, or ERR_INIT if decryption fails.
+ */
+int lq_privatekey_unlock(LQPrivKey *pk, const char *passphrase);
+
+/**
* @brief Sign digest data using a private key.
*
* @param[in] Unencrypted private key to use for the signature.
diff --git a/src/lq/err.h b/src/lq/err.h
@@ -4,6 +4,7 @@
/// Error values used across all error contexts.
enum err_e {
ERR_OK, ///< No error
+ ERR_NOOP, ///< No action taken.
ERR_BYTEORDER, ///< Errors related to endianness
ERR_OVERFLOW, ///< Not enough space to write
ERR_INIT, ///< Failure instantiating object or data
@@ -12,7 +13,7 @@ enum err_e {
ERR_ENCODING, ///< Failure in serialization and data transformation
ERR_REQUEST, ///< Error related to certificate request messages
ERR_RESPONSE, ///< Error related to certificate response messages
- ERR_NOENT, ///< Not found
+ ERR_NOENT, ///< Object not found
ERR_COMPAT, ///< Incompatible data or format
};
diff --git a/src/test/test_cert.c b/src/test/test_cert.c
@@ -10,6 +10,22 @@
const char *data = "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.";
const char *data_two = "Que trata de la condición y ejercicio del famoso hidalgo D. Quijote de la Mancha En un lugar de la Mancha, de cuyo nombre no quiero acordarme, no ha mucho tiempo que vivía un hidalgo de los de lanza en astillero, adarga antigua, rocín flaco y galgo corredor.";
+// sha256sum "foo" 2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae
+static const char privkeydata[32] = {
+ 0x2c, 0x26, 0xb4, 0x6b, 0x68, 0xff, 0xc6, 0x8f,
+ 0xf9, 0x9b, 0x45, 0x3c, 0x1d, 0x30, 0x41, 0x34,
+ 0x13, 0x42, 0x2d, 0x70, 0x64, 0x83, 0xbf, 0xa0,
+ 0xf9, 0x8a, 0x5e, 0x88, 0x62, 0x66, 0xe7, 0xae,
+};
+
+// sha256sum "bar" fcde2b2edba56bf408601fb721fe9b5c338d10ee429ea04fae5511b68fbf8fb9
+static const char passphrase[32] = {
+ 0xfc, 0xde, 0x2b, 0x2e, 0xdb, 0xa5, 0x6b, 0xf4,
+ 0x08, 0x60, 0x1f, 0xb7, 0x21, 0xfe, 0x9b, 0x5c,
+ 0x33, 0x8d, 0x10, 0xee, 0x42, 0x9e, 0xa0, 0x4f,
+ 0xae, 0x55, 0x11, 0xb6, 0x8f, 0xbf, 0x8f, 0xb9,
+};
+
START_TEST(check_cert_symmetric_nomsg) {
int r;
@@ -62,11 +78,11 @@ START_TEST(check_cert_symmetric_req_sig) {
LQCtx ctx;
char buf[4096];
- pk = lq_privatekey_new(data, 32);
+ pk = lq_privatekey_new(privkeydata, 32);
lq_set(&ctx, 0, sizeof(LQCtx));
req = lq_msg_new(data, strlen(data) + 1);
cert = lq_certificate_new(NULL, &ctx, req, NULL);
- // \todo change interface to certificate sign
+ lq_privatekey_unlock(pk, passphrase);
r = lq_certificate_sign(cert, pk);
ck_assert_int_eq(r, 0);
@@ -96,6 +112,7 @@ START_TEST(check_cert_symmetric_rsp_onesig) {
req = lq_msg_new(data, strlen(data) + 1);
rsp = lq_msg_new(data_two, strlen(data_two) + 1);
cert = lq_certificate_new(NULL, &ctx, req, NULL);
+ lq_privatekey_unlock(pk, passphrase);
r = lq_certificate_sign(cert, pk);
ck_assert_int_eq(r, 0);
cert->response = rsp;
@@ -124,6 +141,7 @@ START_TEST(check_cert_symmetric_rsp_bothsig) {
lq_set(&ctx, 0, sizeof(LQCtx));
req = lq_msg_new(data, strlen(data) + 1);
cert = lq_certificate_new(NULL, &ctx, req, NULL);
+ lq_privatekey_unlock(pk, passphrase);
r = lq_certificate_sign(cert, pk);
ck_assert_int_eq(r, 0);
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c
@@ -8,6 +8,22 @@
const char *data = "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.";
const char *salt = "spamspamspamspamspamspamspamspam";
+// sha256sum "foo" 2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7ae
+static const char privkeydata[32] = {
+ 0x2c, 0x26, 0xb4, 0x6b, 0x68, 0xff, 0xc6, 0x8f,
+ 0xf9, 0x9b, 0x45, 0x3c, 0x1d, 0x30, 0x41, 0x34,
+ 0x13, 0x42, 0x2d, 0x70, 0x64, 0x83, 0xbf, 0xa0,
+ 0xf9, 0x8a, 0x5e, 0x88, 0x62, 0x66, 0xe7, 0xae,
+};
+
+// sha256sum "bar" fcde2b2edba56bf408601fb721fe9b5c338d10ee429ea04fae5511b68fbf8fb9
+static const char passphrase[32] = {
+ 0xfc, 0xde, 0x2b, 0x2e, 0xdb, 0xa5, 0x6b, 0xf4,
+ 0x08, 0x60, 0x1f, 0xb7, 0x21, 0xfe, 0x9b, 0x5c,
+ 0x33, 0x8d, 0x10, 0xee, 0x42, 0x9e, 0xa0, 0x4f,
+ 0xae, 0x55, 0x11, 0xb6, 0x8f, 0xbf, 0x8f, 0xb9,
+};
+
struct dummycrypto {
void *data; ///< Literal private key data.
size_t len; ///< Length of private key data.
@@ -30,7 +46,7 @@ START_TEST(check_publickey) {
char *keydata;
char *keydata_manual;
- pk = lq_privatekey_new(data, 32);
+ pk = lq_privatekey_new(privkeydata, 32);
pubk = lq_publickey_from_privatekey(pk);
lq_publickey_bytes(pubk, &keydata);
pubk_manual = lq_publickey_new(keydata);
@@ -49,12 +65,19 @@ START_TEST(check_signature) {
LQSig *sig;
char *sigdata;
- pk = lq_privatekey_new(data, 32);
+ pk = lq_privatekey_new(privkeydata, 32);
lq_digest(data, strlen(data), (char*)digest);
sig = lq_privatekey_sign(pk, digest, 32, salt);
- lq_signature_bytes(sig, &sigdata);
+ ck_assert_ptr_null(sig);
+
+ r = lq_privatekey_unlock(pk, passphrase);
+ ck_assert_int_eq(r, 0);
+
+ sig = lq_privatekey_sign(pk, digest, 32, salt);
+ ck_assert_ptr_nonnull(sig);
r = 42;
+ lq_signature_bytes(sig, &sigdata);
ck_assert_mem_eq(sigdata+65, &r, 1);
lq_signature_free(sig);