vendor: pull in missing go-echd library
This commit is contained in:
parent
78375608a4
commit
475e8719ba
|
@ -0,0 +1,24 @@
|
||||||
|
Copyright (c) 2014, tang0th
|
||||||
|
All rights reserved.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without
|
||||||
|
modification, are permitted provided that the following conditions are met:
|
||||||
|
* Redistributions of source code must retain the above copyright
|
||||||
|
notice, this list of conditions and the following disclaimer.
|
||||||
|
* Redistributions in binary form must reproduce the above copyright
|
||||||
|
notice, this list of conditions and the following disclaimer in the
|
||||||
|
documentation and/or other materials provided with the distribution.
|
||||||
|
* Neither the name of tang0th nor the names of its contributors may be
|
||||||
|
used to endorse or promote products derived from this software without
|
||||||
|
specific prior written permission.
|
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
||||||
|
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||||
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||||
|
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY
|
||||||
|
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
||||||
|
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
||||||
|
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||||||
|
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
@ -0,0 +1,19 @@
|
||||||
|
# ECDH
|
||||||
|
|
||||||
|
[![Build Status](https://travis-ci.org/wsddn/go-ecdh.svg?branch=master)](https://travis-ci.org/wsddn/go-ecdh)
|
||||||
|
|
||||||
|
This is a go implementation of elliptical curve diffie-hellman key exchange method.
|
||||||
|
It supports the NIST curves (and any curves using the `elliptic.Curve` go interface)
|
||||||
|
as well as djb's curve25519.
|
||||||
|
|
||||||
|
The library handles generating of keys, generating a shared secret, and the
|
||||||
|
(un)marshalling of the elliptical curve keys into slices of bytes.
|
||||||
|
|
||||||
|
## Warning and Disclaimer
|
||||||
|
I am not a cryptographer, this was written as part of a personal project to learn about cryptographic systems and protocols. No claims as to the security of this library are made, I would not advise using it for anything that requires any level of security. Pull requests or issues about security flaws are however still welcome.
|
||||||
|
|
||||||
|
## Compatibility
|
||||||
|
Works with go 1.2 onwards.
|
||||||
|
|
||||||
|
## TODO
|
||||||
|
* Improve documentation
|
|
@ -0,0 +1,62 @@
|
||||||
|
package ecdh
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/curve25519"
|
||||||
|
)
|
||||||
|
|
||||||
|
type curve25519ECDH struct {
|
||||||
|
ECDH
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCurve25519ECDH creates a new ECDH instance that uses djb's curve25519
|
||||||
|
// elliptical curve.
|
||||||
|
func NewCurve25519ECDH() ECDH {
|
||||||
|
return &curve25519ECDH{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *curve25519ECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) {
|
||||||
|
var pub, priv [32]byte
|
||||||
|
var err error
|
||||||
|
|
||||||
|
_, err = io.ReadFull(rand, priv[:])
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
priv[0] &= 248
|
||||||
|
priv[31] &= 127
|
||||||
|
priv[31] |= 64
|
||||||
|
|
||||||
|
curve25519.ScalarBaseMult(&pub, &priv)
|
||||||
|
|
||||||
|
return &priv, &pub, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *curve25519ECDH) Marshal(p crypto.PublicKey) []byte {
|
||||||
|
pub := p.(*[32]byte)
|
||||||
|
return pub[:]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *curve25519ECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) {
|
||||||
|
var pub [32]byte
|
||||||
|
if len(data) != 32 {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
copy(pub[:], data)
|
||||||
|
return &pub, true
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *curve25519ECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) {
|
||||||
|
var priv, pub, secret *[32]byte
|
||||||
|
|
||||||
|
priv = privKey.(*[32]byte)
|
||||||
|
pub = pubKey.(*[32]byte)
|
||||||
|
secret = new([32]byte)
|
||||||
|
|
||||||
|
curve25519.ScalarMult(secret, priv, pub)
|
||||||
|
return secret[:], nil
|
||||||
|
}
|
|
@ -0,0 +1,14 @@
|
||||||
|
package ecdh
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"io"
|
||||||
|
)
|
||||||
|
|
||||||
|
// The main interface for ECDH key exchange.
|
||||||
|
type ECDH interface {
|
||||||
|
GenerateKey(io.Reader) (crypto.PrivateKey, crypto.PublicKey, error)
|
||||||
|
Marshal(crypto.PublicKey) []byte
|
||||||
|
Unmarshal([]byte) (crypto.PublicKey, bool)
|
||||||
|
GenerateSharedSecret(crypto.PrivateKey, crypto.PublicKey) ([]byte, error)
|
||||||
|
}
|
|
@ -0,0 +1,87 @@
|
||||||
|
package ecdh
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"crypto/elliptic"
|
||||||
|
"io"
|
||||||
|
"math/big"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ellipticECDH struct {
|
||||||
|
ECDH
|
||||||
|
curve elliptic.Curve
|
||||||
|
}
|
||||||
|
|
||||||
|
type ellipticPublicKey struct {
|
||||||
|
elliptic.Curve
|
||||||
|
X, Y *big.Int
|
||||||
|
}
|
||||||
|
|
||||||
|
type ellipticPrivateKey struct {
|
||||||
|
D []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewEllipticECDH creates a new instance of ECDH with the given elliptic.Curve curve
|
||||||
|
// to use as the elliptical curve for elliptical curve diffie-hellman.
|
||||||
|
func NewEllipticECDH(curve elliptic.Curve) ECDH {
|
||||||
|
return &ellipticECDH{
|
||||||
|
curve: curve,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *ellipticECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) {
|
||||||
|
var d []byte
|
||||||
|
var x, y *big.Int
|
||||||
|
var priv *ellipticPrivateKey
|
||||||
|
var pub *ellipticPublicKey
|
||||||
|
var err error
|
||||||
|
|
||||||
|
d, x, y, err = elliptic.GenerateKey(e.curve, rand)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
priv = &ellipticPrivateKey{
|
||||||
|
D: d,
|
||||||
|
}
|
||||||
|
pub = &ellipticPublicKey{
|
||||||
|
Curve: e.curve,
|
||||||
|
X: x,
|
||||||
|
Y: y,
|
||||||
|
}
|
||||||
|
|
||||||
|
return priv, pub, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *ellipticECDH) Marshal(p crypto.PublicKey) []byte {
|
||||||
|
pub := p.(*ellipticPublicKey)
|
||||||
|
return elliptic.Marshal(e.curve, pub.X, pub.Y)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *ellipticECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) {
|
||||||
|
var key *ellipticPublicKey
|
||||||
|
var x, y *big.Int
|
||||||
|
|
||||||
|
x, y = elliptic.Unmarshal(e.curve, data)
|
||||||
|
if x == nil || y == nil {
|
||||||
|
return key, false
|
||||||
|
}
|
||||||
|
key = &ellipticPublicKey{
|
||||||
|
Curve: e.curve,
|
||||||
|
X: x,
|
||||||
|
Y: y,
|
||||||
|
}
|
||||||
|
return key, true
|
||||||
|
}
|
||||||
|
|
||||||
|
// GenerateSharedSecret takes in a public key and a private key
|
||||||
|
// and generates a shared secret.
|
||||||
|
//
|
||||||
|
// RFC5903 Section 9 states we should only return x.
|
||||||
|
func (e *ellipticECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) {
|
||||||
|
priv := privKey.(*ellipticPrivateKey)
|
||||||
|
pub := pubKey.(*ellipticPublicKey)
|
||||||
|
|
||||||
|
x, _ := e.curve.ScalarMult(pub.X, pub.Y, priv.D)
|
||||||
|
return x.Bytes(), nil
|
||||||
|
}
|
Loading…
Reference in New Issue