mirror of
https://github.com/denoland/deno.git
synced 2024-11-28 16:20:57 -05:00
dda0f1c343
`ZeroCopyBuf` was convenient to use, but sometimes it did hide details that some copies were necessary in certain cases. Also it made it way to easy for the caller to pass around and convert into different values. This commit splits `ZeroCopyBuf` into `JsBuffer` (an array buffer coming from V8) and `ToJsBuffer` (a Rust buffer that will be converted into a V8 array buffer). As a result some magical conversions were removed (they were never used) limiting the API surface and preparing for changes in #19534.
147 lines
3.4 KiB
Rust
147 lines
3.4 KiB
Rust
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use deno_core::error::AnyError;
|
|
use deno_core::op;
|
|
use deno_core::ToJsBuffer;
|
|
use elliptic_curve::pkcs8::PrivateKeyInfo;
|
|
use rand::rngs::OsRng;
|
|
use rand::RngCore;
|
|
use ring::signature::Ed25519KeyPair;
|
|
use ring::signature::KeyPair;
|
|
use spki::der::Decode;
|
|
use spki::der::Encode;
|
|
|
|
#[op(fast)]
|
|
pub fn op_crypto_generate_ed25519_keypair(
|
|
pkey: &mut [u8],
|
|
pubkey: &mut [u8],
|
|
) -> bool {
|
|
let mut rng = OsRng;
|
|
rng.fill_bytes(pkey);
|
|
|
|
let pair = match Ed25519KeyPair::from_seed_unchecked(pkey) {
|
|
Ok(p) => p,
|
|
Err(_) => return false,
|
|
};
|
|
pubkey.copy_from_slice(pair.public_key().as_ref());
|
|
true
|
|
}
|
|
|
|
#[op(fast)]
|
|
pub fn op_crypto_sign_ed25519(
|
|
key: &[u8],
|
|
data: &[u8],
|
|
signature: &mut [u8],
|
|
) -> bool {
|
|
let pair = match Ed25519KeyPair::from_seed_unchecked(key) {
|
|
Ok(p) => p,
|
|
Err(_) => return false,
|
|
};
|
|
signature.copy_from_slice(pair.sign(data).as_ref());
|
|
true
|
|
}
|
|
|
|
#[op(fast)]
|
|
pub fn op_crypto_verify_ed25519(
|
|
pubkey: &[u8],
|
|
data: &[u8],
|
|
signature: &[u8],
|
|
) -> bool {
|
|
ring::signature::UnparsedPublicKey::new(&ring::signature::ED25519, pubkey)
|
|
.verify(data, signature)
|
|
.is_ok()
|
|
}
|
|
|
|
// id-Ed25519 OBJECT IDENTIFIER ::= { 1 3 101 112 }
|
|
pub const ED25519_OID: const_oid::ObjectIdentifier =
|
|
const_oid::ObjectIdentifier::new_unwrap("1.3.101.112");
|
|
|
|
#[op(fast)]
|
|
pub fn op_crypto_import_spki_ed25519(key_data: &[u8], out: &mut [u8]) -> bool {
|
|
// 2-3.
|
|
let pk_info = match spki::SubjectPublicKeyInfo::from_der(key_data) {
|
|
Ok(pk_info) => pk_info,
|
|
Err(_) => return false,
|
|
};
|
|
// 4.
|
|
let alg = pk_info.algorithm.oid;
|
|
if alg != ED25519_OID {
|
|
return false;
|
|
}
|
|
// 5.
|
|
if pk_info.algorithm.parameters.is_some() {
|
|
return false;
|
|
}
|
|
out.copy_from_slice(pk_info.subject_public_key);
|
|
true
|
|
}
|
|
|
|
#[op(fast)]
|
|
pub fn op_crypto_import_pkcs8_ed25519(key_data: &[u8], out: &mut [u8]) -> bool {
|
|
// 2-3.
|
|
// This should probably use OneAsymmetricKey instead
|
|
let pk_info = match PrivateKeyInfo::from_der(key_data) {
|
|
Ok(pk_info) => pk_info,
|
|
Err(_) => return false,
|
|
};
|
|
// 4.
|
|
let alg = pk_info.algorithm.oid;
|
|
if alg != ED25519_OID {
|
|
return false;
|
|
}
|
|
// 5.
|
|
if pk_info.algorithm.parameters.is_some() {
|
|
return false;
|
|
}
|
|
// 6.
|
|
// CurvePrivateKey ::= OCTET STRING
|
|
if pk_info.private_key.len() != 34 {
|
|
return false;
|
|
}
|
|
out.copy_from_slice(&pk_info.private_key[2..]);
|
|
true
|
|
}
|
|
|
|
#[op]
|
|
pub fn op_crypto_export_spki_ed25519(
|
|
pubkey: &[u8],
|
|
) -> Result<ToJsBuffer, AnyError> {
|
|
let key_info = spki::SubjectPublicKeyInfo {
|
|
algorithm: spki::AlgorithmIdentifier {
|
|
// id-Ed25519
|
|
oid: ED25519_OID,
|
|
parameters: None,
|
|
},
|
|
subject_public_key: pubkey,
|
|
};
|
|
Ok(key_info.to_vec()?.into())
|
|
}
|
|
|
|
#[op]
|
|
pub fn op_crypto_export_pkcs8_ed25519(
|
|
pkey: &[u8],
|
|
) -> Result<ToJsBuffer, AnyError> {
|
|
// This should probably use OneAsymmetricKey instead
|
|
let pk_info = rsa::pkcs8::PrivateKeyInfo {
|
|
public_key: None,
|
|
algorithm: rsa::pkcs8::AlgorithmIdentifier {
|
|
// id-Ed25519
|
|
oid: ED25519_OID,
|
|
parameters: None,
|
|
},
|
|
private_key: pkey, // OCTET STRING
|
|
};
|
|
|
|
Ok(pk_info.to_vec()?.into())
|
|
}
|
|
|
|
// 'x' from Section 2 of RFC 8037
|
|
// https://www.rfc-editor.org/rfc/rfc8037#section-2
|
|
#[op]
|
|
pub fn op_crypto_jwk_x_ed25519(pkey: &[u8]) -> Result<String, AnyError> {
|
|
let pair = Ed25519KeyPair::from_seed_unchecked(pkey)?;
|
|
Ok(base64::encode_config(
|
|
pair.public_key().as_ref(),
|
|
base64::URL_SAFE_NO_PAD,
|
|
))
|
|
}
|