File: EdDSA_boring.swift

package info (click to toggle)
swiftlang 6.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,519,992 kB
  • sloc: cpp: 9,107,863; ansic: 2,040,022; asm: 1,135,751; python: 296,500; objc: 82,456; f90: 60,502; lisp: 34,951; pascal: 19,946; sh: 18,133; perl: 7,482; ml: 4,937; javascript: 4,117; makefile: 3,840; awk: 3,535; xml: 914; fortran: 619; cs: 573; ruby: 573
file content (111 lines) | stat: -rw-r--r-- 4,785 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
//===----------------------------------------------------------------------===//
//
// This source file is part of the SwiftCrypto open source project
//
// Copyright (c) 2019 Apple Inc. and the SwiftCrypto project authors
// Licensed under Apache License v2.0
//
// See LICENSE.txt for license information
// See CONTRIBUTORS.md for the list of SwiftCrypto project authors
//
// SPDX-License-Identifier: Apache-2.0
//
//===----------------------------------------------------------------------===//
#if CRYPTO_IN_SWIFTPM && !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
@_exported import CryptoKit
#else
@_implementationOnly import CCryptoBoringSSL
@_implementationOnly import CCryptoBoringSSLShims
import Foundation

extension Curve25519.Signing.PublicKey {
    // We do this to enable inlinability on these methods.
    @usableFromInline
    static let signatureByteCount = Curve25519.Signing.signatureByteCount

    @inlinable
    func openSSLIsValidSignature<S: DataProtocol, D: DataProtocol>(_ signature: S, for data: D) -> Bool {
        if signature.count != Curve25519.Signing.PublicKey.signatureByteCount {
            return false
        }

        // Both fields are potentially discontiguous, so we need to check and flatten them.
        switch (signature.regions.count, data.regions.count) {
        case (1, 1):
            // Both data protocols are secretly contiguous.
            return self.openSSLIsValidSignature(contiguousSignature: signature.regions.first!, contiguousData: data.regions.first!)
        case (1, _):
            // The data isn't contiguous: we make it so.
            return self.openSSLIsValidSignature(contiguousSignature: signature.regions.first!, contiguousData: Array(data))
        case (_, 1):
            // The signature isn't contiguous, make it so.
            return self.openSSLIsValidSignature(contiguousSignature: Array(signature), contiguousData: data.regions.first!)
        case (_, _):
            // Neither are contiguous.
            return self.openSSLIsValidSignature(contiguousSignature: Array(signature), contiguousData: Array(data))
        }
    }

    @inlinable
    func openSSLIsValidSignature<S: ContiguousBytes, D: ContiguousBytes>(contiguousSignature signature: S, contiguousData data: D) -> Bool {
        signature.withUnsafeBytes { signaturePointer in
            data.withUnsafeBytes { dataPointer in
                self.openSSLIsValidSignature(signaturePointer: signaturePointer, dataPointer: dataPointer)
            }
        }
    }

    // We need this factored out because self.keyBytes is not @usableFromInline, and so we can't see it.
    @usableFromInline
    func openSSLIsValidSignature(signaturePointer: UnsafeRawBufferPointer, dataPointer: UnsafeRawBufferPointer) -> Bool {
        precondition(signaturePointer.count == Curve25519.Signing.PublicKey.signatureByteCount)
        precondition(self.keyBytes.count == 32)
        let rc: CInt = self.keyBytes.withUnsafeBytes { keyBytesPtr in
            CCryptoBoringSSLShims_ED25519_verify(dataPointer.baseAddress,
                                                 dataPointer.count,
                                                 signaturePointer.baseAddress,
                                                 keyBytesPtr.baseAddress)
        }

        return rc == 1
    }
}

extension Curve25519.Signing.PrivateKey {
    @inlinable
    func openSSLSignature<D: DataProtocol>(for data: D) throws -> Data {
        if data.regions.count == 1 {
            return try self.openSSLSignature(forContiguousData: data.regions.first!)
        } else {
            return try self.openSSLSignature(forContiguousData: Array(data))
        }
    }

    @inlinable
    func openSSLSignature<C: ContiguousBytes>(forContiguousData data: C) throws -> Data {
        try data.withUnsafeBytes {
            try self.openSSLSignature(forDataPointer: $0)
        }
    }

    @usableFromInline
    func openSSLSignature(forDataPointer dataPointer: UnsafeRawBufferPointer) throws -> Data {
        var signature = Data(repeating: 0, count: Curve25519.Signing.PublicKey.signatureByteCount)

        let rc: CInt = signature.withUnsafeMutableBytes { signaturePointer in
            self.key.withUnsafeBytes { keyPointer in
                precondition(signaturePointer.count == Curve25519.Signing.PublicKey.signatureByteCount)
                precondition(keyPointer.count == ED25519_PRIVATE_KEY_LEN)

                return CCryptoBoringSSLShims_ED25519_sign(signaturePointer.baseAddress, dataPointer.baseAddress, dataPointer.count, keyPointer.baseAddress)
            }
        }

        if rc != 1 {
            throw CryptoKitError.internalBoringSSLError()
        }

        return signature
    }
}
#endif // CRYPTO_IN_SWIFTPM && !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API