forked from TrueCloudLab/frostfs-api-go
390 lines
9.4 KiB
Go
390 lines
9.4 KiB
Go
package service
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
"io"
|
|
"sync"
|
|
|
|
crypto "github.com/nspcc-dev/neofs-crypto"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type keySign struct {
|
|
key *ecdsa.PublicKey
|
|
sign []byte
|
|
}
|
|
|
|
type signSourceGroup struct {
|
|
SignKeyPairSource
|
|
SignKeyPairAccumulator
|
|
|
|
sources []SignedDataSource
|
|
}
|
|
|
|
type signReadersGroup struct {
|
|
SignKeyPairSource
|
|
SignKeyPairAccumulator
|
|
|
|
readers []SignedDataReader
|
|
}
|
|
|
|
var bytesPool = sync.Pool{
|
|
New: func() interface{} {
|
|
return make([]byte, 5<<20)
|
|
},
|
|
}
|
|
|
|
// GetSignature is a sign field getter.
|
|
func (s keySign) GetSignature() []byte {
|
|
return s.sign
|
|
}
|
|
|
|
// GetPublicKey is a key field getter,
|
|
func (s keySign) GetPublicKey() *ecdsa.PublicKey {
|
|
return s.key
|
|
}
|
|
|
|
// Unites passed key with signature and returns SignKeyPair interface.
|
|
func newSignatureKeyPair(key *ecdsa.PublicKey, sign []byte) SignKeyPair {
|
|
return &keySign{
|
|
key: key,
|
|
sign: sign,
|
|
}
|
|
}
|
|
|
|
// Returns data from DataSignatureAccumulator for signature creation/verification.
|
|
//
|
|
// If passed DataSignatureAccumulator provides a SignedDataReader interface, data for signature is obtained
|
|
// using this interface for optimization. In this case, it is understood that reading into the slice D
|
|
// that the method DataForSignature returns does not change D.
|
|
//
|
|
// If returned length of data is negative, ErrNegativeLength returns.
|
|
func dataForSignature(src SignedDataSource) ([]byte, error) {
|
|
if src == nil {
|
|
return nil, ErrNilSignedDataSource
|
|
}
|
|
|
|
r, ok := src.(SignedDataReader)
|
|
if !ok {
|
|
return src.SignedData()
|
|
}
|
|
|
|
buf := bytesPool.Get().([]byte)
|
|
|
|
if size := r.SignedDataSize(); size < 0 {
|
|
return nil, ErrNegativeLength
|
|
} else if size <= cap(buf) {
|
|
buf = buf[:size]
|
|
} else {
|
|
buf = make([]byte, size)
|
|
}
|
|
|
|
n, err := r.ReadSignedData(buf)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return buf[:n], nil
|
|
|
|
}
|
|
|
|
// DataSignature returns the signature of data obtained using the private key.
|
|
//
|
|
// If passed data container is nil, ErrNilSignedDataSource returns.
|
|
// If passed private key is nil, crypto.ErrEmptyPrivateKey returns.
|
|
// If the data container or the signature function returns an error, it is returned directly.
|
|
func DataSignature(key *ecdsa.PrivateKey, src SignedDataSource) ([]byte, error) {
|
|
if key == nil {
|
|
return nil, crypto.ErrEmptyPrivateKey
|
|
}
|
|
|
|
data, err := dataForSignature(src)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer bytesPool.Put(data)
|
|
|
|
return crypto.Sign(key, data)
|
|
}
|
|
|
|
// AddSignatureWithKey calculates the data signature and adds it to accumulator with public key.
|
|
//
|
|
// Any change of data provoke signature breakdown.
|
|
//
|
|
// Returns signing errors only.
|
|
func AddSignatureWithKey(key *ecdsa.PrivateKey, v DataWithSignKeyAccumulator) error {
|
|
sign, err := DataSignature(key, v)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
v.AddSignKey(sign, &key.PublicKey)
|
|
|
|
return nil
|
|
}
|
|
|
|
// Checks passed key-signature pairs for data from the passed container.
|
|
//
|
|
// If passed key-signatures pair set is empty, nil returns immediately.
|
|
func verifySignatures(src SignedDataSource, items ...SignKeyPair) error {
|
|
if len(items) <= 0 {
|
|
return nil
|
|
}
|
|
|
|
data, err := dataForSignature(src)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer bytesPool.Put(data)
|
|
|
|
for _, signKey := range items {
|
|
if err := crypto.Verify(
|
|
signKey.GetPublicKey(),
|
|
data,
|
|
signKey.GetSignature(),
|
|
); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// VerifySignatures checks passed key-signature pairs for data from the passed container.
|
|
//
|
|
// If passed data source is nil, ErrNilSignedDataSource returns.
|
|
// If check data is not ready, corresponding error returns.
|
|
// If at least one of the pairs is invalid, an error returns.
|
|
func VerifySignatures(src SignedDataSource, items ...SignKeyPair) error {
|
|
return verifySignatures(src, items...)
|
|
}
|
|
|
|
// VerifyAccumulatedSignatures checks if accumulated key-signature pairs are valid.
|
|
//
|
|
// Behaves like VerifySignatures.
|
|
// If passed key-signature source is empty, ErrNilSignatureKeySource returns.
|
|
func VerifyAccumulatedSignatures(src DataWithSignKeySource) error {
|
|
if src == nil {
|
|
return ErrNilSignatureKeySource
|
|
}
|
|
|
|
return verifySignatures(src, src.GetSignKeyPairs()...)
|
|
}
|
|
|
|
// VerifySignatureWithKey checks data signature from the passed container with passed key.
|
|
//
|
|
// If passed data with signature is nil, ErrEmptyDataWithSignature returns.
|
|
// If passed key is nil, crypto.ErrEmptyPublicKey returns.
|
|
// A non-nil error returns if and only if the signature does not pass verification.
|
|
func VerifySignatureWithKey(key *ecdsa.PublicKey, src DataWithSignature) error {
|
|
if src == nil {
|
|
return ErrEmptyDataWithSignature
|
|
} else if key == nil {
|
|
return crypto.ErrEmptyPublicKey
|
|
}
|
|
|
|
return verifySignatures(
|
|
src,
|
|
newSignatureKeyPair(
|
|
key,
|
|
src.GetSignature(),
|
|
),
|
|
)
|
|
}
|
|
|
|
// SignRequestData calculates request data signature and adds it to accumulator.
|
|
//
|
|
// Any change of request data provoke signature breakdown.
|
|
//
|
|
// If passed private key is nil, crypto.ErrEmptyPrivateKey returns.
|
|
// If passed RequestSignedData is nil, ErrNilRequestSignedData returns.
|
|
func SignRequestData(key *ecdsa.PrivateKey, src RequestSignedData) error {
|
|
if src == nil {
|
|
return ErrNilRequestSignedData
|
|
}
|
|
|
|
sigSrc, err := GroupSignedPayloads(
|
|
src,
|
|
src,
|
|
NewSignedSessionToken(
|
|
src.GetSessionToken(),
|
|
),
|
|
NewSignedBearerToken(
|
|
src.GetBearerToken(),
|
|
),
|
|
ExtendedHeadersSignedData(src),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return AddSignatureWithKey(key, sigSrc)
|
|
}
|
|
|
|
// VerifyRequestData checks if accumulated key-signature pairs of data with token are valid.
|
|
//
|
|
// If passed RequestVerifyData is nil, ErrNilRequestVerifyData returns.
|
|
func VerifyRequestData(src RequestVerifyData) error {
|
|
if src == nil {
|
|
return ErrNilRequestVerifyData
|
|
}
|
|
|
|
verSrc, err := GroupVerifyPayloads(
|
|
src,
|
|
src,
|
|
NewVerifiedSessionToken(
|
|
src.GetSessionToken(),
|
|
),
|
|
NewVerifiedBearerToken(
|
|
src.GetBearerToken(),
|
|
),
|
|
ExtendedHeadersSignedData(src),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return VerifyAccumulatedSignatures(verSrc)
|
|
}
|
|
|
|
// SignedData returns payload bytes concatenation from all sources keeping order.
|
|
func (s signSourceGroup) SignedData() ([]byte, error) {
|
|
chunks := make([][]byte, 0, len(s.sources))
|
|
sz := 0
|
|
|
|
for i := range s.sources {
|
|
data, err := s.sources[i].SignedData()
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "could not get signed payload of element #%d", i)
|
|
}
|
|
|
|
chunks = append(chunks, data)
|
|
|
|
sz += len(data)
|
|
}
|
|
|
|
res := make([]byte, sz)
|
|
off := 0
|
|
|
|
for i := range chunks {
|
|
off += copy(res[off:], chunks[i])
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
// SignedData returns payload bytes concatenation from all readers.
|
|
func (s signReadersGroup) SignedData() ([]byte, error) {
|
|
return SignedDataFromReader(s)
|
|
}
|
|
|
|
// SignedDataSize returns the sum of sizes of all readers.
|
|
func (s signReadersGroup) SignedDataSize() (sz int) {
|
|
for i := range s.readers {
|
|
sz += s.readers[i].SignedDataSize()
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// ReadSignedData reads data from all readers to passed buffer keeping order.
|
|
//
|
|
// If the buffer size is insufficient, io.ErrUnexpectedEOF returns.
|
|
func (s signReadersGroup) ReadSignedData(p []byte) (int, error) {
|
|
sz := s.SignedDataSize()
|
|
if len(p) < sz {
|
|
return 0, io.ErrUnexpectedEOF
|
|
}
|
|
|
|
off := 0
|
|
|
|
for i := range s.readers {
|
|
n, err := s.readers[i].ReadSignedData(p[off:])
|
|
off += n
|
|
if err != nil {
|
|
return off, errors.Wrapf(err, "could not read signed payload of element #%d", i)
|
|
}
|
|
}
|
|
|
|
return off, nil
|
|
}
|
|
|
|
// GroupSignedPayloads groups SignKeyPairAccumulator and SignedDataSource list to DataWithSignKeyAccumulator.
|
|
//
|
|
// If passed SignKeyPairAccumulator is nil, ErrNilSignKeyPairAccumulator returns.
|
|
//
|
|
// Signed payload of the result is a concatenation of payloads of list elements keeping order.
|
|
// Nil elements in list are ignored.
|
|
//
|
|
// If all elements implement SignedDataReader, result implements it too.
|
|
func GroupSignedPayloads(acc SignKeyPairAccumulator, sources ...SignedDataSource) (DataWithSignKeyAccumulator, error) {
|
|
if acc == nil {
|
|
return nil, ErrNilSignKeyPairAccumulator
|
|
}
|
|
|
|
return groupPayloads(acc, nil, sources...), nil
|
|
}
|
|
|
|
// GroupVerifyPayloads groups SignKeyPairSource and SignedDataSource list to DataWithSignKeySource.
|
|
//
|
|
// If passed SignKeyPairSource is nil, ErrNilSignatureKeySource returns.
|
|
//
|
|
// Signed payload of the result is a concatenation of payloads of list elements keeping order.
|
|
// Nil elements in list are ignored.
|
|
//
|
|
// If all elements implement SignedDataReader, result implements it too.
|
|
func GroupVerifyPayloads(src SignKeyPairSource, sources ...SignedDataSource) (DataWithSignKeySource, error) {
|
|
if src == nil {
|
|
return nil, ErrNilSignatureKeySource
|
|
}
|
|
|
|
return groupPayloads(nil, src, sources...), nil
|
|
}
|
|
|
|
func groupPayloads(acc SignKeyPairAccumulator, src SignKeyPairSource, sources ...SignedDataSource) interface {
|
|
SignedDataSource
|
|
SignKeyPairSource
|
|
SignKeyPairAccumulator
|
|
} {
|
|
var allReaders bool
|
|
|
|
for i := range sources {
|
|
if sources[i] == nil {
|
|
continue
|
|
} else if _, allReaders = sources[i].(SignedDataReader); !allReaders {
|
|
break
|
|
}
|
|
}
|
|
|
|
if !allReaders {
|
|
res := &signSourceGroup{
|
|
SignKeyPairSource: src,
|
|
SignKeyPairAccumulator: acc,
|
|
|
|
sources: make([]SignedDataSource, 0, len(sources)),
|
|
}
|
|
|
|
for i := range sources {
|
|
if sources[i] != nil {
|
|
res.sources = append(res.sources, sources[i])
|
|
}
|
|
}
|
|
|
|
return res
|
|
}
|
|
|
|
res := &signReadersGroup{
|
|
SignKeyPairSource: src,
|
|
SignKeyPairAccumulator: acc,
|
|
|
|
readers: make([]SignedDataReader, 0, len(sources)),
|
|
}
|
|
|
|
for i := range sources {
|
|
if sources[i] != nil {
|
|
res.readers = append(res.readers, sources[i].(SignedDataReader))
|
|
}
|
|
}
|
|
|
|
return res
|
|
}
|