80 lines
1.9 KiB
C++
80 lines
1.9 KiB
C++
|
#include "crypto.hh"
|
||
|
#include "util.hh"
|
||
|
|
||
|
#if HAVE_SODIUM
|
||
|
#include <sodium.h>
|
||
|
#endif
|
||
|
|
||
|
namespace nix {
|
||
|
|
||
|
static std::pair<std::string, std::string> split(const string & s)
|
||
|
{
|
||
|
size_t colon = s.find(':');
|
||
|
if (colon == std::string::npos || colon == 0)
|
||
|
return {"", ""};
|
||
|
return {std::string(s, 0, colon), std::string(s, colon + 1)};
|
||
|
}
|
||
|
|
||
|
Key::Key(const string & s)
|
||
|
{
|
||
|
auto ss = split(s);
|
||
|
|
||
|
name = ss.first;
|
||
|
key = ss.second;
|
||
|
|
||
|
if (name == "" || key == "")
|
||
|
throw Error("secret key is corrupt");
|
||
|
|
||
|
key = base64Decode(key);
|
||
|
}
|
||
|
|
||
|
SecretKey::SecretKey(const string & s)
|
||
|
: Key(s)
|
||
|
{
|
||
|
#if HAVE_SODIUM
|
||
|
if (key.size() != crypto_sign_SECRETKEYBYTES)
|
||
|
throw Error("secret key is not valid");
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
std::string SecretKey::signDetached(const std::string & data) const
|
||
|
{
|
||
|
#if HAVE_SODIUM
|
||
|
unsigned char sig[crypto_sign_BYTES];
|
||
|
unsigned long long sigLen;
|
||
|
crypto_sign_detached(sig, &sigLen, (unsigned char *) data.data(), data.size(),
|
||
|
(unsigned char *) key.data());
|
||
|
return name + ":" + base64Encode(std::string((char *) sig, sigLen));
|
||
|
#else
|
||
|
throw Error("Nix was not compiled with libsodium, required for signed binary cache support");
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
PublicKey::PublicKey(const string & s)
|
||
|
: Key(s)
|
||
|
{
|
||
|
#if HAVE_SODIUM
|
||
|
if (key.size() != crypto_sign_PUBLICKEYBYTES)
|
||
|
throw Error("public key is not valid");
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
bool verifyDetached(const std::string & data, const std::string & sig,
|
||
|
const PublicKeys & publicKeys)
|
||
|
{
|
||
|
auto ss = split(sig);
|
||
|
|
||
|
auto key = publicKeys.find(ss.first);
|
||
|
if (key == publicKeys.end()) return false;
|
||
|
|
||
|
auto sig2 = base64Decode(ss.second);
|
||
|
if (sig2.size() != crypto_sign_BYTES)
|
||
|
throw Error("signature is not valid");
|
||
|
|
||
|
return crypto_sign_verify_detached((unsigned char *) sig2.data(),
|
||
|
(unsigned char *) data.data(), data.size(),
|
||
|
(unsigned char *) key->second.key.data()) == 0;
|
||
|
}
|
||
|
|
||
|
}
|