3 * Public-key cryptography
5 * (c) 2004 Straylight/Edgeware
8 /*----- Licensing notice --------------------------------------------------*
10 * This file is part of the Python interface to Catacomb.
12 * Catacomb/Python is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * Catacomb/Python is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with Catacomb/Python; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 /*----- Header files ------------------------------------------------------*/
29 #include "catacomb-python.h"
31 /*----- DSA and similar ---------------------------------------------------*/
33 typedef struct dsa_pyobj {
35 PyObject *G, *u, *p, *rng, *hash;
39 static PyTypeObject *dsapub_pytype, *dsapriv_pytype;
40 static PyTypeObject *kcdsapub_pytype, *kcdsapriv_pytype;
41 #define DSA_D(o) (&((dsa_pyobj *)(o))->d)
42 #define DSA_G(o) (((dsa_pyobj *)(o))->G)
43 #define DSA_U(o) (((dsa_pyobj *)(o))->u)
44 #define DSA_P(o) (((dsa_pyobj *)(o))->p)
45 #define DSA_RNG(o) (((dsa_pyobj *)(o))->rng)
46 #define DSA_HASH(o) (((dsa_pyobj *)(o))->hash)
48 static void dsa_pydealloc(PyObject *me)
50 dsa_pyobj *g = (dsa_pyobj *)me;
51 Py_DECREF(g->G); Py_DECREF(g->u); Py_DECREF(g->p);
52 Py_DECREF(g->rng); Py_DECREF(g->hash);
56 static PyObject *dsa_setup(PyTypeObject *ty, PyObject *G, PyObject *u,
57 PyObject *p, PyObject *rng, PyObject *hash,
58 void (*calcpub)(group *, ge *, mp *))
63 g = PyObject_New(dsa_pyobj, ty);
68 } else if ((g->d.u = getmp(u)) == 0)
71 assert(g->d.u); assert(calcpub);
72 pp = G_CREATE(GROUP_G(G));
73 calcpub(GROUP_G(G), pp, g->d.u);
75 } else if (GROUP_G(G) != GE_G(p) && !group_samep(GROUP_G(G), GE_G(p)))
76 TYERR("public key not from group");
79 g->d.r = GRAND_R(rng);
80 g->d.h = GCHASH_CH(hash);
81 g->G = G; Py_INCREF(G); g->u = u; Py_INCREF(u); g->p = p;
82 g->rng = rng; Py_INCREF(rng); g->hash = hash; Py_INCREF(hash);
83 return ((PyObject *)g);
90 static PyObject *dsapub_pynew(PyTypeObject *ty,
91 PyObject *arg, PyObject *kw)
93 PyObject *G, *p, *rng = rand_pyobj, *hash = sha_pyobj;
95 char *kwlist[] = { "G", "p", "hash", "rng", 0 };
97 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", kwlist,
100 gchash_pytype, &hash,
101 grand_pytype, &rng) ||
102 (rc = dsa_setup(dsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
108 static PyObject *dsameth_beginhash(PyObject *me, PyObject *arg)
110 if (!PyArg_ParseTuple(arg, ":beginhash")) return (0);
111 return (ghash_pywrap(DSA_HASH(me), gdsa_beginhash(DSA_D(me)), f_freeme));
114 static PyObject *dsameth_endhash(PyObject *me, PyObject *arg)
118 if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
119 gdsa_endhash(DSA_D(me), h);
121 rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
122 GH_DONE(h, PyString_AS_STRING(rc));
127 static PyObject *dsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
129 gdsa_sig s = GDSA_SIG_INIT;
134 char *kwlist[] = { "msg", "k", 0 };
136 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", kwlist,
139 if (n != DSA_D(me)->h->hashsz)
140 VALERR("bad message length (doesn't match hash size)");
141 gdsa_sign(DSA_D(me), &s, p, k);
142 rc = Py_BuildValue("(NN)", mp_pywrap(s.r), mp_pywrap(s.s));
148 static PyObject *dsameth_verify(PyObject *me, PyObject *arg)
152 gdsa_sig s = GDSA_SIG_INIT;
155 if (!PyArg_ParseTuple(arg, "s#(O&O&):verify",
156 &p, &n, convmp, &s.r, convmp, &s.s))
158 if (n != DSA_D(me)->h->hashsz)
159 VALERR("bad message length (doesn't match hash size)");
160 rc = getbool(!gdsa_verify(DSA_D(me), &s, p));
167 static void dsa_calcpub(group *g, ge *p, mp *u) { G_EXP(g, p, g->g, u); }
169 static PyObject *dsapriv_pynew(PyTypeObject *ty,
170 PyObject *arg, PyObject *kw)
172 PyObject *G, *p = 0, *u, *rng = rand_pyobj, *hash = sha_pyobj;
174 char *kwlist[] = { "G", "u", "p", "hash", "rng", 0 };
176 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", kwlist,
180 gchash_pytype, &hash,
181 grand_pytype, &rng) ||
182 (rc = dsa_setup(dsapriv_pytype, G, u, p, rng, hash, dsa_calcpub)) == 0)
188 static PyMethodDef dsapub_pymethods[] = {
189 #define METHNAME(name) dsameth_##name
190 METH (beginhash, "D.beginhash() -> hash object")
191 METH (endhash, "D.endhash(H) -> BYTES")
192 METH (verify, "D.verify(MSG, (R, S)) -> true/false")
197 static PyMethodDef dsapriv_pymethods[] = {
198 #define METHNAME(name) dsameth_##name
199 KWMETH(sign, "D.sign(MSG, k = K) -> R, S")
204 static PyMemberDef dsapub_pymembers[] = {
205 #define MEMBERSTRUCT dsa_pyobj
206 MEMBER(G, T_OBJECT, READONLY, "D.G -> group to work in")
207 MEMBER(p, T_OBJECT, READONLY, "D.p -> public key (group element")
208 MEMBER(rng, T_OBJECT, READONLY, "D.rng -> random number generator")
209 MEMBER(hash, T_OBJECT, READONLY, "D.hash -> hash class")
214 static PyMemberDef dsapriv_pymembers[] = {
215 #define MEMBERSTRUCT dsa_pyobj
216 MEMBER(u, T_OBJECT, READONLY, "D.u -> private key (exponent)")
221 static PyTypeObject dsapub_pytype_skel = {
222 PyObject_HEAD_INIT(0) 0, /* Header */
223 "DSAPub", /* @tp_name@ */
224 sizeof(dsa_pyobj), /* @tp_basicsize@ */
225 0, /* @tp_itemsize@ */
227 dsa_pydealloc, /* @tp_dealloc@ */
229 0, /* @tp_getattr@ */
230 0, /* @tp_setattr@ */
231 0, /* @tp_compare@ */
233 0, /* @tp_as_number@ */
234 0, /* @tp_as_sequence@ */
235 0, /* @tp_as_mapping@ */
239 0, /* @tp_getattro@ */
240 0, /* @tp_setattro@ */
241 0, /* @tp_as_buffer@ */
242 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
246 "DSA public key information.",
248 0, /* @tp_traverse@ */
250 0, /* @tp_richcompare@ */
251 0, /* @tp_weaklistoffset@ */
253 0, /* @tp_iternext@ */
254 dsapub_pymethods, /* @tp_methods@ */
255 dsapub_pymembers, /* @tp_members@ */
259 0, /* @tp_descr_get@ */
260 0, /* @tp_descr_set@ */
261 0, /* @tp_dictoffset@ */
263 PyType_GenericAlloc, /* @tp_alloc@ */
264 dsapub_pynew, /* @tp_new@ */
269 static PyTypeObject dsapriv_pytype_skel = {
270 PyObject_HEAD_INIT(0) 0, /* Header */
271 "DSAPriv", /* @tp_name@ */
272 sizeof(dsa_pyobj), /* @tp_basicsize@ */
273 0, /* @tp_itemsize@ */
275 0, /* @tp_dealloc@ */
277 0, /* @tp_getattr@ */
278 0, /* @tp_setattr@ */
279 0, /* @tp_compare@ */
281 0, /* @tp_as_number@ */
282 0, /* @tp_as_sequence@ */
283 0, /* @tp_as_mapping@ */
287 0, /* @tp_getattro@ */
288 0, /* @tp_setattro@ */
289 0, /* @tp_as_buffer@ */
290 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
294 "DSA private key information.",
296 0, /* @tp_traverse@ */
298 0, /* @tp_richcompare@ */
299 0, /* @tp_weaklistoffset@ */
301 0, /* @tp_iternext@ */
302 dsapriv_pymethods, /* @tp_methods@ */
303 dsapriv_pymembers, /* @tp_members@ */
307 0, /* @tp_descr_get@ */
308 0, /* @tp_descr_set@ */
309 0, /* @tp_dictoffset@ */
311 PyType_GenericAlloc, /* @tp_alloc@ */
312 dsapriv_pynew, /* @tp_new@ */
317 static PyObject *kcdsapub_pynew(PyTypeObject *ty,
318 PyObject *arg, PyObject *kw)
320 PyObject *G, *p, *rng = rand_pyobj, *hash = has160_pyobj;
322 char *kwlist[] = { "G", "p", "hash", "rng", 0 };
324 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", kwlist,
327 gchash_pytype, &hash,
328 grand_pytype, &rng) ||
329 (rc = dsa_setup(kcdsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
335 static void kcdsa_calcpub(group *g, ge *p, mp *u)
337 mp *uinv = mp_modinv(MP_NEW, u, g->r);
338 G_EXP(g, p, g->g, uinv);
342 static PyObject *kcdsapriv_pynew(PyTypeObject *ty,
343 PyObject *arg, PyObject *kw)
345 PyObject *G, *u, *p = 0, *rng = rand_pyobj, *hash = has160_pyobj;
347 char *kwlist[] = { "G", "p", "u", "hash", "rng", 0 };
349 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", kwlist,
353 gchash_pytype, &hash,
354 grand_pytype, &rng) ||
355 (rc = dsa_setup(kcdsapriv_pytype, G, u, p,
356 rng, hash, kcdsa_calcpub)) == 0)
362 static PyObject *kcdsameth_beginhash(PyObject *me, PyObject *arg)
364 if (!PyArg_ParseTuple(arg, ":beginhash")) return (0);
365 return (ghash_pywrap(DSA_HASH(me), gkcdsa_beginhash(DSA_D(me)), f_freeme));
368 static PyObject *kcdsameth_endhash(PyObject *me, PyObject *arg)
372 if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
373 gkcdsa_endhash(DSA_D(me), h);
375 rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
376 GH_DONE(h, PyString_AS_STRING(rc));
381 static PyObject *kcdsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
383 gkcdsa_sig s = GKCDSA_SIG_INIT;
387 PyObject *r = 0, *rc = 0;
388 char *kwlist[] = { "msg", "k", 0 };
390 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", kwlist,
393 if (n != DSA_D(me)->h->hashsz)
394 VALERR("bad message length (doesn't match hash size)");
395 r = bytestring_pywrap(0, DSA_D(me)->h->hashsz);
396 s.r = (octet *)PyString_AS_STRING(r);
397 gkcdsa_sign(DSA_D(me), &s, p, k);
398 rc = Py_BuildValue("(ON)", r, mp_pywrap(s.s));
405 static PyObject *kcdsameth_verify(PyObject *me, PyObject *arg)
409 gkcdsa_sig s = GKCDSA_SIG_INIT;
412 if (!PyArg_ParseTuple(arg, "s#(s#O&):verify",
413 &p, &n, &s.r, &rn, convmp, &s.s))
415 if (n != DSA_D(me)->h->hashsz)
416 VALERR("bad message length (doesn't match hash size)");
417 if (rn != DSA_D(me)->h->hashsz)
418 VALERR("bad signature `r' length (doesn't match hash size)");
419 rc = getbool(!gkcdsa_verify(DSA_D(me), &s, p));
425 static PyMethodDef kcdsapub_pymethods[] = {
426 #define METHNAME(name) kcdsameth_##name
427 METH (beginhash, "D.beginhash() -> hash object")
428 METH (endhash, "D.endhash(H) -> BYTES")
429 METH (verify, "D.verify(MSG, (R, S)) -> true/false")
434 static PyMethodDef kcdsapriv_pymethods[] = {
435 #define METHNAME(name) kcdsameth_##name
436 KWMETH(sign, "D.sign(MSG, k = K) -> R, S")
441 static PyTypeObject kcdsapub_pytype_skel = {
442 PyObject_HEAD_INIT(0) 0, /* Header */
443 "KCDSAPub", /* @tp_name@ */
444 sizeof(dsa_pyobj), /* @tp_basicsize@ */
445 0, /* @tp_itemsize@ */
447 dsa_pydealloc, /* @tp_dealloc@ */
449 0, /* @tp_getattr@ */
450 0, /* @tp_setattr@ */
451 0, /* @tp_compare@ */
453 0, /* @tp_as_number@ */
454 0, /* @tp_as_sequence@ */
455 0, /* @tp_as_mapping@ */
459 0, /* @tp_getattro@ */
460 0, /* @tp_setattro@ */
461 0, /* @tp_as_buffer@ */
462 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
466 "KCDSA public key information.",
468 0, /* @tp_traverse@ */
470 0, /* @tp_richcompare@ */
471 0, /* @tp_weaklistoffset@ */
473 0, /* @tp_iternext@ */
474 kcdsapub_pymethods, /* @tp_methods@ */
475 dsapub_pymembers, /* @tp_members@ */
479 0, /* @tp_descr_get@ */
480 0, /* @tp_descr_set@ */
481 0, /* @tp_dictoffset@ */
483 PyType_GenericAlloc, /* @tp_alloc@ */
484 kcdsapub_pynew, /* @tp_new@ */
489 static PyTypeObject kcdsapriv_pytype_skel = {
490 PyObject_HEAD_INIT(0) 0, /* Header */
491 "KCDSAPriv", /* @tp_name@ */
492 sizeof(dsa_pyobj), /* @tp_basicsize@ */
493 0, /* @tp_itemsize@ */
495 0, /* @tp_dealloc@ */
497 0, /* @tp_getattr@ */
498 0, /* @tp_setattr@ */
499 0, /* @tp_compare@ */
501 0, /* @tp_as_number@ */
502 0, /* @tp_as_sequence@ */
503 0, /* @tp_as_mapping@ */
507 0, /* @tp_getattro@ */
508 0, /* @tp_setattro@ */
509 0, /* @tp_as_buffer@ */
510 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
514 "KCDSA private key information.",
516 0, /* @tp_traverse@ */
518 0, /* @tp_richcompare@ */
519 0, /* @tp_weaklistoffset@ */
521 0, /* @tp_iternext@ */
522 kcdsapriv_pymethods, /* @tp_methods@ */
523 dsapriv_pymembers, /* @tp_members@ */
527 0, /* @tp_descr_get@ */
528 0, /* @tp_descr_set@ */
529 0, /* @tp_dictoffset@ */
531 PyType_GenericAlloc, /* @tp_alloc@ */
532 kcdsapriv_pynew, /* @tp_new@ */
537 /*----- RSA ---------------------------------------------------------------*/
539 typedef struct rsapub_pyobj {
545 #define RSA_PUB(o) (&((rsapub_pyobj *)(o))->pub)
546 #define RSA_PUBCTX(o) (&((rsapub_pyobj *)(o))->pubctx)
548 typedef struct rsapriv_pyobj {
557 #define RSA_PRIV(o) (&((rsapriv_pyobj *)(o))->priv)
558 #define RSA_PRIVCTX(o) (&((rsapriv_pyobj *)(o))->privctx)
559 #define RSA_RNG(o) (((rsapriv_pyobj *)(o))->rng)
561 static PyTypeObject *rsapub_pytype, *rsapriv_pytype;
563 static PyObject *rsapub_pynew(PyTypeObject *ty,
564 PyObject *arg, PyObject *kw)
568 char *kwlist[] = { "n", "e", 0 };
570 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&:new", kwlist,
571 convmp, &rp.n, convmp, &rp.e))
573 if (!MP_ODDP(rp.n)) VALERR("RSA modulus must be even");
574 o = (rsapub_pyobj *)ty->tp_alloc(ty, 0);
576 rsa_pubcreate(&o->pubctx, &o->pub);
577 return ((PyObject *)o);
583 static void rsapub_pydealloc(PyObject *me)
585 rsa_pubdestroy(RSA_PUBCTX(me));
586 rsa_pubfree(RSA_PUB(me));
590 static PyObject *rsaget_n(PyObject *me, void *hunoz)
591 { return mp_pywrap(MP_COPY(RSA_PUB(me)->n)); }
593 static PyObject *rsaget_e(PyObject *me, void *hunoz)
594 { return mp_pywrap(MP_COPY(RSA_PUB(me)->e)); }
596 static PyObject *rsameth_pubop(PyObject *me, PyObject *arg)
601 if (!PyArg_ParseTuple(arg, "O&:pubop", convmp, &x)) goto end;
602 rc = mp_pywrap(rsa_pubop(RSA_PUBCTX(me), MP_NEW, x));
608 static PyObject *rsapriv_dopywrap(PyTypeObject *ty,
609 rsa_priv *rp, PyObject *rng)
613 o = (rsapriv_pyobj *)ty->tp_alloc(ty, 0);
617 rsa_privcreate(&o->privctx, &o->priv, &rand_global);
618 rsa_pubcreate(&o->pubctx, &o->pub);
624 return ((PyObject *)o);
627 PyObject *rsapriv_pywrap(rsa_priv *rp)
628 { return rsapriv_dopywrap(rsapriv_pytype, rp, 0); }
630 static PyObject *rsapriv_pynew(PyTypeObject *ty,
631 PyObject *arg, PyObject *kw)
634 PyObject *rng = Py_None;
636 { "n", "e", "d", "p", "q", "dp", "dq", "q_inv", "rng", 0 };
638 if (!PyArg_ParseTupleAndKeywords(arg, kw, "|O&O&O&O&O&O&O&O&O:new", kwlist,
639 convmp, &rp.n, convmp, &rp.e,
641 convmp, &rp.p, convmp, &rp.q,
642 convmp, &rp.dp, convmp, &rp.dq,
646 if ((rp.n && !MP_ODDP(rp.n)) ||
647 (rp.p && !MP_ODDP(rp.p)) ||
648 (rp.p && !MP_ODDP(rp.q)))
649 VALERR("RSA modulus and factors must be odd");
650 if (rsa_recover(&rp)) VALERR("couldn't construct private key");
651 if (rng != Py_None && !GRAND_PYCHECK(rng))
652 TYERR("not a random number source");
654 return (rsapriv_dopywrap(ty, &rp, rng));
660 static void rsapriv_pydealloc(PyObject *me)
662 RSA_PRIVCTX(me)->r = &rand_global;
663 rsa_privdestroy(RSA_PRIVCTX(me));
664 rsa_privfree(RSA_PRIV(me));
665 Py_DECREF(RSA_RNG(me));
669 static PyObject *rsaget_d(PyObject *me, void *hunoz)
670 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->d)); }
672 static PyObject *rsaget_p(PyObject *me, void *hunoz)
673 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->p)); }
675 static PyObject *rsaget_q(PyObject *me, void *hunoz)
676 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q)); }
678 static PyObject *rsaget_dp(PyObject *me, void *hunoz)
679 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dp)); }
681 static PyObject *rsaget_dq(PyObject *me, void *hunoz)
682 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dq)); }
684 static PyObject *rsaget_q_inv(PyObject *me, void *hunoz)
685 { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q_inv)); }
687 static PyObject *rsaget_rng(PyObject *me, void *hunoz)
688 { RETURN_OBJ(RSA_RNG(me)); }
690 static int rsaset_rng(PyObject *me, PyObject *val, void *hunoz)
695 else if (val != Py_None && !GRAND_PYCHECK(val))
696 TYERR("expected grand or None");
697 Py_DECREF(RSA_RNG(me));
705 static PyObject *rsameth_privop(PyObject *me, PyObject *arg, PyObject *kw)
707 PyObject *rng = RSA_RNG(me);
710 char *kwlist[] = { "x", "rng", 0 };
712 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&|O:privop", kwlist,
715 if (rng != Py_None && !GRAND_PYCHECK(rng))
716 TYERR("not a random number source");
717 RSA_PRIVCTX(me)->r = (rng == Py_None) ? 0 : GRAND_R(rng);
718 rc = mp_pywrap(rsa_privop(RSA_PRIVCTX(me), MP_NEW, x));
724 static PyObject *meth__RSAPriv_generate(PyObject *me,
725 PyObject *arg, PyObject *kw)
727 grand *r = &rand_global;
732 char *kwlist[] = { "class", "nbits", "event", "rng", "nsteps", 0 };
735 if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&|O&O&O&:generate", kwlist,
736 &me, convuint, &nbits, convpgev, &evt,
737 convgrand, &r, convuint, &n))
739 if (rsa_gen(&rp, nbits, r, n, evt.proc, evt.ctx))
741 rc = rsapriv_pywrap(&rp);
747 static PyGetSetDef rsapub_pygetset[] = {
748 #define GETSETNAME(op, name) rsa##op##_##name
755 static PyMethodDef rsapub_pymethods[] = {
756 #define METHNAME(name) rsameth_##name
757 METH (pubop, "R.pubop(X) -> X^E (mod N)")
762 static PyGetSetDef rsapriv_pygetset[] = {
763 #define GETSETNAME(op, name) rsa##op##_##name
767 GET (dp, "R.dp -> D mod (P - 1)")
768 GET (dq, "R.dq -> D mod (Q - 1)")
769 GET (q_inv, "R.q_inv -> Q^{-1} mod P")
770 GETSET(rng, "R.rng -> random number source for blinding")
775 static PyMethodDef rsapriv_pymethods[] = {
776 #define METHNAME(name) rsameth_##name
777 KWMETH(privop, "R.privop(X, rng = None) -> X^D (mod N)")
782 static PyTypeObject rsapub_pytype_skel = {
783 PyObject_HEAD_INIT(0) 0, /* Header */
784 "RSAPub", /* @tp_name@ */
785 sizeof(rsapub_pyobj), /* @tp_basicsize@ */
786 0, /* @tp_itemsize@ */
788 rsapub_pydealloc, /* @tp_dealloc@ */
790 0, /* @tp_getattr@ */
791 0, /* @tp_setattr@ */
792 0, /* @tp_compare@ */
794 0, /* @tp_as_number@ */
795 0, /* @tp_as_sequence@ */
796 0, /* @tp_as_mapping@ */
800 0, /* @tp_getattro@ */
801 0, /* @tp_setattro@ */
802 0, /* @tp_as_buffer@ */
803 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
807 "RSA public key information.",
809 0, /* @tp_traverse@ */
811 0, /* @tp_richcompare@ */
812 0, /* @tp_weaklistoffset@ */
814 0, /* @tp_iternext@ */
815 rsapub_pymethods, /* @tp_methods@ */
816 0, /* @tp_members@ */
817 rsapub_pygetset, /* @tp_getset@ */
820 0, /* @tp_descr_get@ */
821 0, /* @tp_descr_set@ */
822 0, /* @tp_dictoffset@ */
824 PyType_GenericAlloc, /* @tp_alloc@ */
825 rsapub_pynew, /* @tp_new@ */
830 static PyTypeObject rsapriv_pytype_skel = {
831 PyObject_HEAD_INIT(0) 0, /* Header */
832 "RSAPriv", /* @tp_name@ */
833 sizeof(rsapriv_pyobj), /* @tp_basicsize@ */
834 0, /* @tp_itemsize@ */
836 rsapriv_pydealloc, /* @tp_dealloc@ */
838 0, /* @tp_getattr@ */
839 0, /* @tp_setattr@ */
840 0, /* @tp_compare@ */
842 0, /* @tp_as_number@ */
843 0, /* @tp_as_sequence@ */
844 0, /* @tp_as_mapping@ */
848 0, /* @tp_getattro@ */
849 0, /* @tp_setattro@ */
850 0, /* @tp_as_buffer@ */
851 Py_TPFLAGS_DEFAULT | /* @tp_flags@ */
855 "RSA private key information.",
857 0, /* @tp_traverse@ */
859 0, /* @tp_richcompare@ */
860 0, /* @tp_weaklistoffset@ */
862 0, /* @tp_iternext@ */
863 rsapriv_pymethods, /* @tp_methods@ */
864 0, /* @tp_members@ */
865 rsapriv_pygetset, /* @tp_getset@ */
868 0, /* @tp_descr_get@ */
869 0, /* @tp_descr_set@ */
870 0, /* @tp_dictoffset@ */
872 PyType_GenericAlloc, /* @tp_alloc@ */
873 rsapriv_pynew, /* @tp_new@ */
878 /*----- RSA padding schemes -----------------------------------------------*/
880 static PyObject *meth__p1crypt_encode(PyObject *me,
881 PyObject *arg, PyObject *kw)
885 Py_ssize_t msz, epsz;
891 char *kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
893 p1.r = &rand_global; ep = 0; epsz = 0;
894 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", kwlist,
895 &m, &msz, convulong, &nbits,
896 &ep, &epsz, convgrand, &p1.r))
899 p1.ep = ep; p1.epsz = epsz;
900 if (epsz + msz + 11 > sz) VALERR("buffer underflow");
902 x = pkcs1_cryptencode(MP_NEW, m, msz, b, sz, nbits, &p1);
909 static PyObject *meth__p1crypt_decode(PyObject *me,
910 PyObject *arg, PyObject *kw)
921 char *kwlist[] = { "ct", "nbits", "ep", "rng", 0 };
923 p1.r = &rand_global; ep = 0; epsz = 0;
924 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|s#O&:decode", kwlist,
925 convmp, &x, convulong, &nbits,
926 &ep, &epsz, convgrand, &p1.r))
929 p1.ep = ep; p1.epsz = epsz;
930 if (epsz + 11 > sz) VALERR("buffer underflow");
932 if ((n = pkcs1_cryptdecode(x, b, sz, nbits, &p1)) < 0)
933 VALERR("decryption failed");
934 rc = bytestring_pywrap(b, n);
941 static PyObject *meth__p1sig_encode(PyObject *me,
942 PyObject *arg, PyObject *kw)
946 Py_ssize_t msz, epsz;
952 char *kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
954 p1.r = &rand_global; ep = 0; epsz = 0;
955 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", kwlist,
956 &m, &msz, convulong, &nbits,
957 &ep, &epsz, convgrand, &p1.r))
960 p1.ep = ep; p1.epsz = epsz;
961 if (epsz + msz + 11 > sz) VALERR("buffer underflow");
963 x = pkcs1_sigencode(MP_NEW, m, msz, b, sz, nbits, &p1);
970 static PyObject *meth__p1sig_decode(PyObject *me,
971 PyObject *arg, PyObject *kw)
983 char *kwlist[] = { "msg", "sig", "nbits", "ep", "rng", 0 };
985 p1.r = &rand_global; ep = 0; epsz = 0;
986 if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&O&|s#O&:decode", kwlist,
987 &hukairz, convmp, &x, convulong, &nbits,
988 &ep, &epsz, convgrand, &p1.r))
991 p1.ep = ep; p1.epsz = epsz;
992 if (epsz + 10 > sz) VALERR("buffer underflow");
994 if ((n = pkcs1_sigdecode(x, 0, 0, b, sz, nbits, &p1)) < 0)
995 VALERR("verification failed");
996 rc = bytestring_pywrap(b, n);
1003 static PyObject *meth__oaep_encode(PyObject *me,
1004 PyObject *arg, PyObject *kw)
1008 Py_ssize_t msz, epsz;
1009 unsigned long nbits;
1014 char *kwlist[] = { "msg", "nbits", "mgf", "hash", "ep", "rng", 0 };
1016 o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1017 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&s#O&:encode", kwlist,
1018 &m, &msz, convulong, &nbits,
1019 convgccipher, &o.cc,
1025 o.ep = ep; o.epsz = epsz;
1026 if (2 * o.ch->hashsz + 2 + msz > sz) VALERR("buffer underflow");
1028 x = oaep_encode(MP_NEW, m, msz, b, sz, nbits, &o);
1035 static PyObject *meth__oaep_decode(PyObject *me,
1036 PyObject *arg, PyObject *kw)
1041 unsigned long nbits;
1047 char *kwlist[] = { "ct", "nbits", "mgf", "hash", "ep", "rng", 0 };
1049 o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1050 if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|O&O&s#O&:decode", kwlist,
1051 convmp, &x, convulong, &nbits,
1052 convgccipher, &o.cc,
1058 o.ep = ep; o.epsz = epsz;
1059 if (2 * o.ch->hashsz > sz) VALERR("buffer underflow");
1061 if ((n = oaep_decode(x, b, sz, nbits, &o)) < 0)
1062 VALERR("decryption failed");
1063 rc = bytestring_pywrap(b, n);
1070 static PyObject *meth__pss_encode(PyObject *me,
1071 PyObject *arg, PyObject *kw)
1076 unsigned long nbits;
1081 char *kwlist[] = { "msg", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1083 p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1084 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&O&O&:encode", kwlist,
1085 &m, &msz, convulong, &nbits,
1086 convgccipher, &p.cc,
1092 if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1093 if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1095 x = pss_encode(MP_NEW, m, msz, b, sz, nbits, &p);
1102 static PyObject *meth__pss_decode(PyObject *me,
1103 PyObject *arg, PyObject *kw)
1108 unsigned long nbits;
1115 { "msg", "sig", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1117 p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1118 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&O&|O&O&O&O&:decode", kwlist,
1119 &m, &msz, convmp, &x, convulong, &nbits,
1120 convgccipher, &p.cc,
1126 if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1127 if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1129 if ((n = pss_decode(x, m, msz, b, sz, nbits, &p)) < 0)
1130 VALERR("verification failed");
1131 rc = Py_None; Py_INCREF(rc);
1138 /*----- X25519 and related algorithms -------------------------------------*/
1144 #define DEFXDH(X, x) \
1145 static PyObject *meth_##x(PyObject *me, PyObject *arg) \
1147 const char *k, *p; \
1148 Py_ssize_t ksz, psz; \
1150 if (!PyArg_ParseTuple(arg, "s#s#:" #x, &k, &ksz, &p, &psz)) \
1152 if (ksz != X##_KEYSZ) VALERR("bad key length"); \
1153 if (psz != X##_PUBSZ) VALERR("bad public length"); \
1154 rc = bytestring_pywrap(0, X##_OUTSZ); \
1155 x((octet *)PyString_AS_STRING(rc), \
1156 (const octet *)k, (const octet *)p); \
1164 /*----- Ed25519 -----------------------------------------------------------*/
1166 static PyObject *meth_ed25519_pubkey(PyObject *me, PyObject *arg)
1171 if (!PyArg_ParseTuple(arg, "s#:ed25519_pubkey", &k, &ksz)) goto end;
1172 rc = bytestring_pywrap(0, ED25519_PUBSZ);
1173 ed25519_pubkey((octet *)PyString_AS_STRING(rc), k, ksz);
1179 static PyObject *meth_ed25519_sign(PyObject *me, PyObject *arg, PyObject *kw)
1181 const char *k, *p = 0, *m;
1182 Py_ssize_t ksz, psz, msz;
1184 octet pp[ED25519_PUBSZ];
1185 char *kwlist[] = { "key", "msg", "pub", 0 };
1186 if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#s#|s#:ed25519_sign", kwlist,
1187 &k, &ksz, &m, &msz, &p, &psz))
1189 if (p && psz != ED25519_PUBSZ) VALERR("bad public length");
1190 if (!p) { p = (const char *)pp; ed25519_pubkey(pp, k, ksz); }
1191 rc = bytestring_pywrap(0, ED25519_SIGSZ);
1192 ed25519_sign((octet *)PyString_AS_STRING(rc), k, ksz,
1193 (const octet *)p, m, msz);
1199 static PyObject *meth_ed25519_verify(PyObject *me, PyObject *arg)
1201 const char *p, *m, *s;
1202 Py_ssize_t psz, msz, ssz;
1204 if (!PyArg_ParseTuple(arg, "s#s#s#:ed25519_verify",
1205 &p, &psz, &m, &msz, &s, &ssz))
1207 if (psz != ED25519_PUBSZ) VALERR("bad public length");
1208 if (ssz != ED25519_SIGSZ) VALERR("bad signature length");
1209 rc = getbool(!ed25519_verify((const octet *)p, m, msz, (const octet *)s));
1215 /*----- Global stuff ------------------------------------------------------*/
1217 static PyMethodDef methods[] = {
1218 #define METHNAME(name) meth_##name
1219 KWMETH(_p1crypt_encode, 0)
1220 KWMETH(_p1crypt_decode, 0)
1221 KWMETH(_p1sig_encode, 0)
1222 KWMETH(_p1sig_decode, 0)
1223 KWMETH(_oaep_encode, 0)
1224 KWMETH(_oaep_decode, 0)
1225 KWMETH(_pss_encode, 0)
1226 KWMETH(_pss_decode, 0)
1227 KWMETH(_RSAPriv_generate, "\
1228 generate(NBITS, [event = pgen_nullev, rng = rand, nsteps = 0]) -> R")
1229 #define DEFMETH(X, x) \
1231 " #x "(KEY, PUBLIC) -> SHARED")
1234 METH (ed25519_pubkey, "\
1235 ed25519_pubkey(KEY) -> PUBLIC")
1236 KWMETH(ed25519_sign, "\
1237 ed25519_sign(KEY, MSG, [PUBLIC]) -> SIG")
1238 METH (ed25519_verify, "\
1239 ed25519_verify(PUBLIC, MSG, SIG) -> BOOL")
1244 void pubkey_pyinit(void)
1246 INITTYPE(dsapub, root);
1247 INITTYPE(dsapriv, dsapub);
1248 INITTYPE(kcdsapub, root);
1249 INITTYPE(kcdsapriv, kcdsapub);
1250 INITTYPE(rsapub, root);
1251 INITTYPE(rsapriv, rsapub);
1252 addmethods(methods);
1255 void pubkey_pyinsert(PyObject *mod)
1257 INSERT("DSAPub", dsapub_pytype);
1258 INSERT("DSAPriv", dsapriv_pytype);
1259 INSERT("KCDSAPub", kcdsapub_pytype);
1260 INSERT("KCDSAPriv", kcdsapriv_pytype);
1261 INSERT("RSAPub", rsapub_pytype);
1262 INSERT("RSAPriv", rsapriv_pytype);
1265 /*----- That's all, folks -------------------------------------------------*/