2013-12-20 00:36:26 +01:00
|
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
utils: Move base16 procedures to (guix base16).
* guix/utils.scm (bytevector->base16-string, base16-string->bytevector):
Move to...
* guix/base16.scm: ... here. New file.
* tests/utils.scm ("bytevector->base16-string->bytevector"): Move to...
* tests/base16.scm: ... here. New file.
* Makefile.am (MODULES): Add guix/base16.scm.
(SCM_TESTS): Add tests/base16.scm.
* build-aux/download.scm, guix/derivations.scm,
guix/docker.scm, guix/import/snix.scm, guix/pk-crypto.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/store.scm, tests/hash.scm,
tests/pk-crypto.scm: Adjust imports accordingly.
2017-03-15 21:54:34 +01:00
|
|
|
|
;;; Copyright © 2013, 2014, 2015, 2017 Ludovic Courtès <ludo@gnu.org>
|
2013-12-20 00:36:26 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
;;; your option) any later version.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
|
;;;
|
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
(define-module (guix pk-crypto)
|
utils: Move base16 procedures to (guix base16).
* guix/utils.scm (bytevector->base16-string, base16-string->bytevector):
Move to...
* guix/base16.scm: ... here. New file.
* tests/utils.scm ("bytevector->base16-string->bytevector"): Move to...
* tests/base16.scm: ... here. New file.
* Makefile.am (MODULES): Add guix/base16.scm.
(SCM_TESTS): Add tests/base16.scm.
* build-aux/download.scm, guix/derivations.scm,
guix/docker.scm, guix/import/snix.scm, guix/pk-crypto.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/store.scm, tests/hash.scm,
tests/pk-crypto.scm: Adjust imports accordingly.
2017-03-15 21:54:34 +01:00
|
|
|
|
#:use-module (guix base16)
|
2015-01-26 21:38:49 +01:00
|
|
|
|
#:use-module (guix gcrypt)
|
|
|
|
|
|
2013-12-20 00:36:26 +01:00
|
|
|
|
#:use-module (system foreign)
|
|
|
|
|
#:use-module (rnrs bytevectors)
|
|
|
|
|
#:use-module (ice-9 match)
|
2015-01-26 21:38:49 +01:00
|
|
|
|
#:export (canonical-sexp?
|
2013-12-30 22:46:21 +01:00
|
|
|
|
error-source
|
|
|
|
|
error-string
|
2013-12-27 23:32:26 +01:00
|
|
|
|
string->canonical-sexp
|
|
|
|
|
canonical-sexp->string
|
|
|
|
|
number->canonical-sexp
|
|
|
|
|
canonical-sexp-car
|
|
|
|
|
canonical-sexp-cdr
|
|
|
|
|
canonical-sexp-nth
|
|
|
|
|
canonical-sexp-nth-data
|
2013-12-28 15:47:35 +01:00
|
|
|
|
canonical-sexp-length
|
|
|
|
|
canonical-sexp-null?
|
|
|
|
|
canonical-sexp-list?
|
2013-12-20 00:36:26 +01:00
|
|
|
|
bytevector->hash-data
|
2013-12-20 15:22:15 +01:00
|
|
|
|
hash-data->bytevector
|
2014-03-19 21:40:10 +01:00
|
|
|
|
key-type
|
2013-12-20 00:36:26 +01:00
|
|
|
|
sign
|
|
|
|
|
verify
|
|
|
|
|
generate-key
|
2013-12-28 16:16:00 +01:00
|
|
|
|
find-sexp-token
|
|
|
|
|
canonical-sexp->sexp
|
2015-01-26 21:38:49 +01:00
|
|
|
|
sexp->canonical-sexp)
|
|
|
|
|
#:re-export (gcrypt-version))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
;;; Commentary:
|
|
|
|
|
;;;
|
|
|
|
|
;;; Public key cryptographic routines from GNU Libgcrypt.
|
|
|
|
|
;;;;
|
2013-12-27 23:32:26 +01:00
|
|
|
|
;;; Libgcrypt uses "canonical s-expressions" to represent key material,
|
2013-12-28 16:16:00 +01:00
|
|
|
|
;;; parameters, and data. We keep it as an opaque object to map them to
|
|
|
|
|
;;; Scheme s-expressions because (1) Libgcrypt sexps may be stored in secure
|
|
|
|
|
;;; memory, and (2) the read syntax is different.
|
|
|
|
|
;;;
|
|
|
|
|
;;; A 'canonical-sexp->sexp' procedure is provided nevertheless, for use in
|
|
|
|
|
;;; cases where it is safe to move data out of Libgcrypt---e.g., when
|
|
|
|
|
;;; processing ACL entries, public keys, etc.
|
2013-12-27 23:32:26 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; Canonical sexps were defined by Rivest et al. in the IETF draft at
|
|
|
|
|
;;; <http://people.csail.mit.edu/rivest/Sexp.txt> for the purposes of SPKI
|
|
|
|
|
;;; (see <http://www.ietf.org/rfc/rfc2693.txt>.)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; Code:
|
|
|
|
|
|
|
|
|
|
;; Libgcrypt "s-expressions".
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define-wrapped-pointer-type <canonical-sexp>
|
|
|
|
|
canonical-sexp?
|
|
|
|
|
naked-pointer->canonical-sexp
|
|
|
|
|
canonical-sexp->pointer
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(lambda (obj port)
|
|
|
|
|
;; Don't print OBJ's external representation: we don't want key material
|
|
|
|
|
;; to leak in backtraces and such.
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(format port "#<canonical-sexp ~a | ~a>"
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(number->string (object-address obj) 16)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(number->string (pointer-address (canonical-sexp->pointer obj))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
16))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define finalize-canonical-sexp!
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(libgcrypt-func "gcry_sexp_release"))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define-inlinable (pointer->canonical-sexp ptr)
|
|
|
|
|
"Return a <canonical-sexp> that wraps PTR."
|
|
|
|
|
(let* ((sexp (naked-pointer->canonical-sexp ptr))
|
|
|
|
|
(ptr* (canonical-sexp->pointer sexp)))
|
|
|
|
|
;; Did we already have a <canonical-sexp> object for PTR?
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(when (equal? ptr ptr*)
|
|
|
|
|
;; No, so we can safely add a finalizer (in Guile 2.0.9
|
|
|
|
|
;; 'set-pointer-finalizer!' *adds* a finalizer rather than replacing the
|
|
|
|
|
;; existing one.)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(set-pointer-finalizer! ptr finalize-canonical-sexp!))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
sexp))
|
|
|
|
|
|
2013-12-30 22:46:21 +01:00
|
|
|
|
(define error-source
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_strsource"))
|
|
|
|
|
(proc (pointer->procedure '* ptr (list int))))
|
|
|
|
|
(lambda (err)
|
|
|
|
|
"Return the error source (a string) for ERR, an error code as thrown
|
|
|
|
|
along with 'gcry-error'."
|
|
|
|
|
(pointer->string (proc err)))))
|
|
|
|
|
|
|
|
|
|
(define error-string
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_strerror"))
|
|
|
|
|
(proc (pointer->procedure '* ptr (list int))))
|
|
|
|
|
(lambda (err)
|
|
|
|
|
"Return the error description (a string) for ERR, an error code as
|
|
|
|
|
thrown along with 'gcry-error'."
|
|
|
|
|
(pointer->string (proc err)))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define string->canonical-sexp
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_new"))
|
|
|
|
|
(proc (pointer->procedure int ptr `(* * ,size_t ,int))))
|
|
|
|
|
(lambda (str)
|
|
|
|
|
"Parse STR and return the corresponding gcrypt s-expression."
|
2014-04-22 01:36:31 +02:00
|
|
|
|
|
|
|
|
|
;; When STR comes from 'canonical-sexp->string', it may contain
|
|
|
|
|
;; characters that are really meant to be interpreted as bytes as in a C
|
|
|
|
|
;; 'char *'. Thus, convert STR to ISO-8859-1 so the byte values of the
|
|
|
|
|
;; characters are preserved.
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((sexp (bytevector->pointer (make-bytevector (sizeof '*))))
|
2014-04-22 01:36:31 +02:00
|
|
|
|
(err (proc sexp (string->pointer str "ISO-8859-1") 0 1)))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (= 0 err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer sexp))
|
2014-04-22 11:41:52 +02:00
|
|
|
|
(throw 'gcry-error 'string->canonical-sexp err))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define-syntax GCRYSEXP_FMT_ADVANCED
|
|
|
|
|
(identifier-syntax 3))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp->string
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_sprint"))
|
|
|
|
|
(proc (pointer->procedure size_t ptr `(* ,int * ,size_t))))
|
|
|
|
|
(lambda (sexp)
|
|
|
|
|
"Return a textual representation of SEXP."
|
|
|
|
|
(let loop ((len 1024))
|
|
|
|
|
(let* ((buf (bytevector->pointer (make-bytevector len)))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(size (proc (canonical-sexp->pointer sexp)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
GCRYSEXP_FMT_ADVANCED buf len)))
|
|
|
|
|
(if (zero? size)
|
|
|
|
|
(loop (* len 2))
|
|
|
|
|
(pointer->string buf size "ISO-8859-1")))))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-car
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_car"))
|
|
|
|
|
(proc (pointer->procedure '* ptr '(*))))
|
|
|
|
|
(lambda (lst)
|
|
|
|
|
"Return the first element of LST, an sexp, if that element is a list;
|
|
|
|
|
return #f if LST or its first element is not a list (this is different from
|
|
|
|
|
the usual Lisp 'car'.)"
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-cdr
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_cdr"))
|
|
|
|
|
(proc (pointer->procedure '* ptr '(*))))
|
|
|
|
|
(lambda (lst)
|
|
|
|
|
"Return the tail of LST, an sexp, or #f if LST is not a list."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-nth
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_nth"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* ,int))))
|
|
|
|
|
(lambda (lst index)
|
|
|
|
|
"Return the INDEXth nested element of LST, an s-expression. Return #f
|
|
|
|
|
if that element does not exist, or if it's an atom. (Note: this is obviously
|
|
|
|
|
different from Scheme's 'list-ref'.)"
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst) index)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
|
|
|
|
(define (dereference-size_t p)
|
|
|
|
|
"Return the size_t value pointed to by P."
|
|
|
|
|
(bytevector-uint-ref (pointer->bytevector p (sizeof size_t))
|
|
|
|
|
0 (native-endianness)
|
|
|
|
|
(sizeof size_t)))
|
|
|
|
|
|
2013-12-28 15:47:35 +01:00
|
|
|
|
(define canonical-sexp-length
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_length"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(*))))
|
|
|
|
|
(lambda (sexp)
|
|
|
|
|
"Return the length of SEXP if it's a list (including the empty list);
|
|
|
|
|
return zero if SEXP is an atom."
|
|
|
|
|
(proc (canonical-sexp->pointer sexp)))))
|
|
|
|
|
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(define token-string?
|
|
|
|
|
(let ((token-cs (char-set-union char-set:digit
|
|
|
|
|
char-set:letter
|
|
|
|
|
(char-set #\- #\. #\/ #\_
|
|
|
|
|
#\: #\* #\+ #\=))))
|
|
|
|
|
(lambda (str)
|
|
|
|
|
"Return #t if STR is a token as per Section 4.3 of
|
|
|
|
|
<http://people.csail.mit.edu/rivest/Sexp.txt>."
|
|
|
|
|
(and (not (string-null? str))
|
|
|
|
|
(string-every token-cs str)
|
|
|
|
|
(not (char-set-contains? char-set:digit (string-ref str 0)))))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-nth-data
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_nth_data"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* ,int *))))
|
|
|
|
|
(lambda (lst index)
|
2013-12-28 15:41:48 +01:00
|
|
|
|
"Return as a symbol (for \"sexp tokens\") or a bytevector (for any other
|
|
|
|
|
\"octet string\") the INDEXth data element (atom) of LST, an s-expression.
|
|
|
|
|
Return #f if that element does not exist, or if it's a list."
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((size* (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(result (proc (canonical-sexp->pointer lst) index size*)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(let* ((len (dereference-size_t size*))
|
|
|
|
|
(str (pointer->string result len "ISO-8859-1")))
|
|
|
|
|
;; The sexp spec speaks of "tokens" and "octet strings".
|
|
|
|
|
;; Sometimes these octet strings are actual strings (text),
|
|
|
|
|
;; sometimes they're bytevectors, and sometimes they're
|
|
|
|
|
;; multi-precision integers (MPIs). Only the application knows.
|
|
|
|
|
;; However, for convenience, we return a symbol when a token is
|
|
|
|
|
;; encountered since tokens are frequent (at least in the 'car'
|
|
|
|
|
;; of each sexp.)
|
|
|
|
|
(if (token-string? str)
|
|
|
|
|
(string->symbol str) ; an sexp "token"
|
|
|
|
|
(bytevector-copy ; application data, textual or binary
|
|
|
|
|
(pointer->bytevector result len)))))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define (number->canonical-sexp number)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
"Return an s-expression representing NUMBER."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(string->canonical-sexp (string-append "#" (number->string number 16) "#")))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
2014-03-19 21:40:10 +01:00
|
|
|
|
(define* (bytevector->hash-data bv
|
|
|
|
|
#:optional
|
|
|
|
|
(hash-algo "sha256")
|
|
|
|
|
#:key (key-type 'ecc))
|
2015-01-04 18:00:23 +01:00
|
|
|
|
"Given BV, a bytevector containing a hash of type HASH-ALGO, return an
|
|
|
|
|
s-expression suitable for use as the 'data' argument for 'sign'. KEY-TYPE
|
|
|
|
|
must be a symbol: 'dsa, 'ecc, or 'rsa."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(string->canonical-sexp
|
2014-03-19 21:40:10 +01:00
|
|
|
|
(format #f "(data (flags ~a) (hash \"~a\" #~a#))"
|
|
|
|
|
(case key-type
|
|
|
|
|
((ecc dsa) "rfc6979")
|
|
|
|
|
((rsa) "pkcs1")
|
|
|
|
|
(else (error "unknown key type" key-type)))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
hash-algo
|
|
|
|
|
(bytevector->base16-string bv))))
|
|
|
|
|
|
2014-03-19 21:40:10 +01:00
|
|
|
|
(define (key-type sexp)
|
2015-03-18 14:36:32 +01:00
|
|
|
|
"Return a symbol denoting the type of public or private key represented by
|
|
|
|
|
SEXP--e.g., 'rsa', 'ecc'--or #f if SEXP does not denote a valid key."
|
2014-03-19 21:40:10 +01:00
|
|
|
|
(case (canonical-sexp-nth-data sexp 0)
|
|
|
|
|
((public-key private-key)
|
|
|
|
|
(canonical-sexp-nth-data (canonical-sexp-nth sexp 1) 0))
|
|
|
|
|
(else #f)))
|
|
|
|
|
|
|
|
|
|
(define* (hash-data->bytevector data)
|
2013-12-28 15:41:48 +01:00
|
|
|
|
"Return two values: the hash value (a bytevector), and the hash algorithm (a
|
|
|
|
|
string) extracted from DATA, an sexp as returned by 'bytevector->hash-data'.
|
2013-12-20 15:22:15 +01:00
|
|
|
|
Return #f if DATA does not conform."
|
|
|
|
|
(let ((hash (find-sexp-token data 'hash)))
|
|
|
|
|
(if hash
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((algo (canonical-sexp-nth-data hash 1))
|
|
|
|
|
(value (canonical-sexp-nth-data hash 2)))
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(values value (symbol->string algo)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(values #f #f))))
|
|
|
|
|
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(define sign
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_sign"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* * *))))
|
|
|
|
|
(lambda (data secret-key)
|
2015-01-04 18:00:23 +01:00
|
|
|
|
"Sign DATA, a canonical s-expression representing a suitable hash, with
|
|
|
|
|
SECRET-KEY (a canonical s-expression whose car is 'private-key'.) Note that
|
|
|
|
|
DATA must be a 'data' s-expression, as returned by
|
|
|
|
|
'bytevector->hash-data' (info \"(gcrypt) Cryptographic Functions\")."
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((sig (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(err (proc sig (canonical-sexp->pointer data)
|
|
|
|
|
(canonical-sexp->pointer secret-key))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (= 0 err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer sig))
|
2014-04-22 11:41:52 +02:00
|
|
|
|
(throw 'gcry-error 'sign err))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define verify
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_verify"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* * *))))
|
|
|
|
|
(lambda (signature data public-key)
|
|
|
|
|
"Verify that SIGNATURE is a signature of DATA with PUBLIC-KEY, all of
|
|
|
|
|
which are gcrypt s-expressions."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(zero? (proc (canonical-sexp->pointer signature)
|
|
|
|
|
(canonical-sexp->pointer data)
|
|
|
|
|
(canonical-sexp->pointer public-key))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define generate-key
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_genkey"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* *))))
|
|
|
|
|
(lambda (params)
|
|
|
|
|
"Return as an s-expression a new key pair for PARAMS. PARAMS must be an
|
|
|
|
|
s-expression like: (genkey (rsa (nbits 4:2048)))."
|
|
|
|
|
(let* ((key (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(err (proc key (canonical-sexp->pointer params))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (zero? err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer key))
|
2014-04-22 11:41:52 +02:00
|
|
|
|
(throw 'gcry-error 'generate-key err))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define find-sexp-token
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_find_token"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* * ,size_t))))
|
|
|
|
|
(lambda (sexp token)
|
|
|
|
|
"Find in SEXP the first element whose 'car' is TOKEN and return it;
|
|
|
|
|
return #f if not found."
|
|
|
|
|
(let* ((token (string->pointer (symbol->string token)))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(res (proc (canonical-sexp->pointer sexp) token 0)))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (null-pointer? res)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp res))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
2013-12-28 15:47:35 +01:00
|
|
|
|
(define-inlinable (canonical-sexp-null? sexp)
|
|
|
|
|
"Return #t if SEXP is the empty-list sexp."
|
|
|
|
|
(null-pointer? (canonical-sexp->pointer sexp)))
|
|
|
|
|
|
|
|
|
|
(define (canonical-sexp-list? sexp)
|
|
|
|
|
"Return #t if SEXP is a list."
|
|
|
|
|
(or (canonical-sexp-null? sexp)
|
|
|
|
|
(> (canonical-sexp-length sexp) 0)))
|
|
|
|
|
|
2013-12-28 16:16:00 +01:00
|
|
|
|
(define (canonical-sexp-fold proc seed sexp)
|
|
|
|
|
"Fold PROC (as per SRFI-1) over SEXP, a canonical sexp."
|
|
|
|
|
(if (canonical-sexp-list? sexp)
|
|
|
|
|
(let ((len (canonical-sexp-length sexp)))
|
|
|
|
|
(let loop ((index 0)
|
|
|
|
|
(result seed))
|
|
|
|
|
(if (= index len)
|
|
|
|
|
result
|
|
|
|
|
(loop (+ 1 index)
|
2013-12-30 22:19:19 +01:00
|
|
|
|
;; XXX: Call 'nth-data' *before* 'nth' to work around
|
|
|
|
|
;; <https://bugs.g10code.com/gnupg/issue1594>, which
|
|
|
|
|
;; affects 1.6.0 and earlier versions.
|
|
|
|
|
(proc (or (canonical-sexp-nth-data sexp index)
|
|
|
|
|
(canonical-sexp-nth sexp index))
|
2013-12-28 16:16:00 +01:00
|
|
|
|
result)))))
|
|
|
|
|
(error "sexp is not a list" sexp)))
|
|
|
|
|
|
|
|
|
|
(define (canonical-sexp->sexp sexp)
|
|
|
|
|
"Return a Scheme sexp corresponding to SEXP. This is particularly useful to
|
|
|
|
|
compare sexps (since Libgcrypt does not provide an 'equal?' procedure), or to
|
|
|
|
|
use pattern matching."
|
|
|
|
|
(if (canonical-sexp-list? sexp)
|
|
|
|
|
(reverse
|
|
|
|
|
(canonical-sexp-fold (lambda (item result)
|
|
|
|
|
(cons (if (canonical-sexp? item)
|
|
|
|
|
(canonical-sexp->sexp item)
|
|
|
|
|
item)
|
|
|
|
|
result))
|
|
|
|
|
'()
|
|
|
|
|
sexp))
|
2013-12-30 22:29:12 +01:00
|
|
|
|
|
|
|
|
|
;; As of Libgcrypt 1.6.0, there's no function to extract the buffer of a
|
|
|
|
|
;; non-list sexp (!), so we first enlist SEXP, then get at its buffer.
|
|
|
|
|
(let ((sexp (string->canonical-sexp
|
|
|
|
|
(string-append "(" (canonical-sexp->string sexp)
|
|
|
|
|
")"))))
|
|
|
|
|
(or (canonical-sexp-nth-data sexp 0)
|
|
|
|
|
(canonical-sexp-nth sexp 0)))))
|
2013-12-28 16:16:00 +01:00
|
|
|
|
|
|
|
|
|
(define (sexp->canonical-sexp sexp)
|
|
|
|
|
"Return a canonical sexp equivalent to SEXP, a Scheme sexp as returned by
|
|
|
|
|
'canonical-sexp->sexp'."
|
|
|
|
|
;; XXX: This is inefficient, but the Libgcrypt API doesn't allow us to do
|
|
|
|
|
;; much better.
|
|
|
|
|
(string->canonical-sexp
|
|
|
|
|
(call-with-output-string
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(define (write item)
|
|
|
|
|
(cond ((list? item)
|
|
|
|
|
(display "(" port)
|
|
|
|
|
(for-each write item)
|
|
|
|
|
(display ")" port))
|
|
|
|
|
((symbol? item)
|
|
|
|
|
(format port " ~a" item))
|
|
|
|
|
((bytevector? item)
|
|
|
|
|
(format port " #~a#"
|
|
|
|
|
(bytevector->base16-string item)))
|
|
|
|
|
(else
|
|
|
|
|
(error "unsupported sexp item type" item))))
|
|
|
|
|
|
|
|
|
|
(write sexp)))))
|
|
|
|
|
|
2014-04-22 11:41:52 +02:00
|
|
|
|
(define (gcrypt-error-printer port key args default-printer)
|
|
|
|
|
"Print the gcrypt error specified by ARGS."
|
|
|
|
|
(match args
|
|
|
|
|
((proc err)
|
|
|
|
|
(format port "In procedure ~a: ~a: ~a"
|
|
|
|
|
proc (error-source err) (error-string err)))))
|
|
|
|
|
|
|
|
|
|
(set-exception-printer! 'gcry-error gcrypt-error-printer)
|
|
|
|
|
|
2013-12-20 00:36:26 +01:00
|
|
|
|
;;; pk-crypto.scm ends here
|