2013-12-20 00:36:26 +01:00
|
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
|
|
|
|
;;; Copyright © 2013 Ludovic Courtès <ludo@gnu.org>
|
|
|
|
|
;;;
|
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
;;; your option) any later version.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
|
;;;
|
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
(define-module (guix pk-crypto)
|
|
|
|
|
#:use-module (guix config)
|
2013-12-20 15:22:15 +01:00
|
|
|
|
#:use-module ((guix utils)
|
|
|
|
|
#:select (bytevector->base16-string
|
|
|
|
|
base16-string->bytevector))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
#:use-module (system foreign)
|
|
|
|
|
#:use-module (rnrs bytevectors)
|
|
|
|
|
#:use-module (ice-9 match)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
#:export (canonical-sexp?
|
|
|
|
|
string->canonical-sexp
|
|
|
|
|
canonical-sexp->string
|
|
|
|
|
number->canonical-sexp
|
|
|
|
|
canonical-sexp-car
|
|
|
|
|
canonical-sexp-cdr
|
|
|
|
|
canonical-sexp-nth
|
|
|
|
|
canonical-sexp-nth-data
|
2013-12-28 15:47:35 +01:00
|
|
|
|
canonical-sexp-length
|
|
|
|
|
canonical-sexp-null?
|
|
|
|
|
canonical-sexp-list?
|
2013-12-20 00:36:26 +01:00
|
|
|
|
bytevector->hash-data
|
2013-12-20 15:22:15 +01:00
|
|
|
|
hash-data->bytevector
|
2013-12-20 00:36:26 +01:00
|
|
|
|
sign
|
|
|
|
|
verify
|
|
|
|
|
generate-key
|
2013-12-28 16:16:00 +01:00
|
|
|
|
find-sexp-token
|
|
|
|
|
canonical-sexp->sexp
|
|
|
|
|
sexp->canonical-sexp))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
;;; Commentary:
|
|
|
|
|
;;;
|
|
|
|
|
;;; Public key cryptographic routines from GNU Libgcrypt.
|
|
|
|
|
;;;;
|
2013-12-27 23:32:26 +01:00
|
|
|
|
;;; Libgcrypt uses "canonical s-expressions" to represent key material,
|
2013-12-28 16:16:00 +01:00
|
|
|
|
;;; parameters, and data. We keep it as an opaque object to map them to
|
|
|
|
|
;;; Scheme s-expressions because (1) Libgcrypt sexps may be stored in secure
|
|
|
|
|
;;; memory, and (2) the read syntax is different.
|
|
|
|
|
;;;
|
|
|
|
|
;;; A 'canonical-sexp->sexp' procedure is provided nevertheless, for use in
|
|
|
|
|
;;; cases where it is safe to move data out of Libgcrypt---e.g., when
|
|
|
|
|
;;; processing ACL entries, public keys, etc.
|
2013-12-27 23:32:26 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; Canonical sexps were defined by Rivest et al. in the IETF draft at
|
|
|
|
|
;;; <http://people.csail.mit.edu/rivest/Sexp.txt> for the purposes of SPKI
|
|
|
|
|
;;; (see <http://www.ietf.org/rfc/rfc2693.txt>.)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
;;;
|
|
|
|
|
;;; Code:
|
|
|
|
|
|
|
|
|
|
;; Libgcrypt "s-expressions".
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define-wrapped-pointer-type <canonical-sexp>
|
|
|
|
|
canonical-sexp?
|
|
|
|
|
naked-pointer->canonical-sexp
|
|
|
|
|
canonical-sexp->pointer
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(lambda (obj port)
|
|
|
|
|
;; Don't print OBJ's external representation: we don't want key material
|
|
|
|
|
;; to leak in backtraces and such.
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(format port "#<canonical-sexp ~a | ~a>"
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(number->string (object-address obj) 16)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(number->string (pointer-address (canonical-sexp->pointer obj))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
16))))
|
|
|
|
|
|
|
|
|
|
(define libgcrypt-func
|
|
|
|
|
(let ((lib (dynamic-link %libgcrypt)))
|
|
|
|
|
(lambda (func)
|
|
|
|
|
"Return a pointer to symbol FUNC in libgcrypt."
|
|
|
|
|
(dynamic-func func lib))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define finalize-canonical-sexp!
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(libgcrypt-func "gcry_sexp_release"))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define-inlinable (pointer->canonical-sexp ptr)
|
|
|
|
|
"Return a <canonical-sexp> that wraps PTR."
|
|
|
|
|
(let* ((sexp (naked-pointer->canonical-sexp ptr))
|
|
|
|
|
(ptr* (canonical-sexp->pointer sexp)))
|
|
|
|
|
;; Did we already have a <canonical-sexp> object for PTR?
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(when (equal? ptr ptr*)
|
|
|
|
|
;; No, so we can safely add a finalizer (in Guile 2.0.9
|
|
|
|
|
;; 'set-pointer-finalizer!' *adds* a finalizer rather than replacing the
|
|
|
|
|
;; existing one.)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(set-pointer-finalizer! ptr finalize-canonical-sexp!))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
sexp))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define string->canonical-sexp
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_new"))
|
|
|
|
|
(proc (pointer->procedure int ptr `(* * ,size_t ,int))))
|
|
|
|
|
(lambda (str)
|
|
|
|
|
"Parse STR and return the corresponding gcrypt s-expression."
|
|
|
|
|
(let* ((sexp (bytevector->pointer (make-bytevector (sizeof '*))))
|
|
|
|
|
(err (proc sexp (string->pointer str) 0 1)))
|
|
|
|
|
(if (= 0 err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer sexp))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(throw 'gcry-error err))))))
|
|
|
|
|
|
|
|
|
|
(define-syntax GCRYSEXP_FMT_ADVANCED
|
|
|
|
|
(identifier-syntax 3))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp->string
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_sprint"))
|
|
|
|
|
(proc (pointer->procedure size_t ptr `(* ,int * ,size_t))))
|
|
|
|
|
(lambda (sexp)
|
|
|
|
|
"Return a textual representation of SEXP."
|
|
|
|
|
(let loop ((len 1024))
|
|
|
|
|
(let* ((buf (bytevector->pointer (make-bytevector len)))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(size (proc (canonical-sexp->pointer sexp)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
GCRYSEXP_FMT_ADVANCED buf len)))
|
|
|
|
|
(if (zero? size)
|
|
|
|
|
(loop (* len 2))
|
|
|
|
|
(pointer->string buf size "ISO-8859-1")))))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-car
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_car"))
|
|
|
|
|
(proc (pointer->procedure '* ptr '(*))))
|
|
|
|
|
(lambda (lst)
|
|
|
|
|
"Return the first element of LST, an sexp, if that element is a list;
|
|
|
|
|
return #f if LST or its first element is not a list (this is different from
|
|
|
|
|
the usual Lisp 'car'.)"
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-cdr
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_cdr"))
|
|
|
|
|
(proc (pointer->procedure '* ptr '(*))))
|
|
|
|
|
(lambda (lst)
|
|
|
|
|
"Return the tail of LST, an sexp, or #f if LST is not a list."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-nth
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_nth"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* ,int))))
|
|
|
|
|
(lambda (lst index)
|
|
|
|
|
"Return the INDEXth nested element of LST, an s-expression. Return #f
|
|
|
|
|
if that element does not exist, or if it's an atom. (Note: this is obviously
|
|
|
|
|
different from Scheme's 'list-ref'.)"
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((result (proc (canonical-sexp->pointer lst) index)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp result))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
|
|
|
|
(define (dereference-size_t p)
|
|
|
|
|
"Return the size_t value pointed to by P."
|
|
|
|
|
(bytevector-uint-ref (pointer->bytevector p (sizeof size_t))
|
|
|
|
|
0 (native-endianness)
|
|
|
|
|
(sizeof size_t)))
|
|
|
|
|
|
2013-12-28 15:47:35 +01:00
|
|
|
|
(define canonical-sexp-length
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_length"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(*))))
|
|
|
|
|
(lambda (sexp)
|
|
|
|
|
"Return the length of SEXP if it's a list (including the empty list);
|
|
|
|
|
return zero if SEXP is an atom."
|
|
|
|
|
(proc (canonical-sexp->pointer sexp)))))
|
|
|
|
|
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(define token-string?
|
|
|
|
|
(let ((token-cs (char-set-union char-set:digit
|
|
|
|
|
char-set:letter
|
|
|
|
|
(char-set #\- #\. #\/ #\_
|
|
|
|
|
#\: #\* #\+ #\=))))
|
|
|
|
|
(lambda (str)
|
|
|
|
|
"Return #t if STR is a token as per Section 4.3 of
|
|
|
|
|
<http://people.csail.mit.edu/rivest/Sexp.txt>."
|
|
|
|
|
(and (not (string-null? str))
|
|
|
|
|
(string-every token-cs str)
|
|
|
|
|
(not (char-set-contains? char-set:digit (string-ref str 0)))))))
|
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define canonical-sexp-nth-data
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_nth_data"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* ,int *))))
|
|
|
|
|
(lambda (lst index)
|
2013-12-28 15:41:48 +01:00
|
|
|
|
"Return as a symbol (for \"sexp tokens\") or a bytevector (for any other
|
|
|
|
|
\"octet string\") the INDEXth data element (atom) of LST, an s-expression.
|
|
|
|
|
Return #f if that element does not exist, or if it's a list."
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(let* ((size* (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(result (proc (canonical-sexp->pointer lst) index size*)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(if (null-pointer? result)
|
|
|
|
|
#f
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(let* ((len (dereference-size_t size*))
|
|
|
|
|
(str (pointer->string result len "ISO-8859-1")))
|
|
|
|
|
;; The sexp spec speaks of "tokens" and "octet strings".
|
|
|
|
|
;; Sometimes these octet strings are actual strings (text),
|
|
|
|
|
;; sometimes they're bytevectors, and sometimes they're
|
|
|
|
|
;; multi-precision integers (MPIs). Only the application knows.
|
|
|
|
|
;; However, for convenience, we return a symbol when a token is
|
|
|
|
|
;; encountered since tokens are frequent (at least in the 'car'
|
|
|
|
|
;; of each sexp.)
|
|
|
|
|
(if (token-string? str)
|
|
|
|
|
(string->symbol str) ; an sexp "token"
|
|
|
|
|
(bytevector-copy ; application data, textual or binary
|
|
|
|
|
(pointer->bytevector result len)))))))))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(define (number->canonical-sexp number)
|
2013-12-20 00:36:26 +01:00
|
|
|
|
"Return an s-expression representing NUMBER."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(string->canonical-sexp (string-append "#" (number->string number 16) "#")))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define* (bytevector->hash-data bv #:optional (hash-algo "sha256"))
|
|
|
|
|
"Given BV, a bytevector containing a hash, return an s-expression suitable
|
|
|
|
|
for use as the data for 'sign'."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(string->canonical-sexp
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(format #f "(data (flags pkcs1) (hash \"~a\" #~a#))"
|
|
|
|
|
hash-algo
|
|
|
|
|
(bytevector->base16-string bv))))
|
|
|
|
|
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(define (hash-data->bytevector data)
|
2013-12-28 15:41:48 +01:00
|
|
|
|
"Return two values: the hash value (a bytevector), and the hash algorithm (a
|
|
|
|
|
string) extracted from DATA, an sexp as returned by 'bytevector->hash-data'.
|
2013-12-20 15:22:15 +01:00
|
|
|
|
Return #f if DATA does not conform."
|
|
|
|
|
(let ((hash (find-sexp-token data 'hash)))
|
|
|
|
|
(if hash
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(let ((algo (canonical-sexp-nth-data hash 1))
|
|
|
|
|
(value (canonical-sexp-nth-data hash 2)))
|
2013-12-28 15:41:48 +01:00
|
|
|
|
(values value (symbol->string algo)))
|
2013-12-20 15:22:15 +01:00
|
|
|
|
(values #f #f))))
|
|
|
|
|
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(define sign
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_sign"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* * *))))
|
|
|
|
|
(lambda (data secret-key)
|
|
|
|
|
"Sign DATA (an s-expression) with SECRET-KEY (an s-expression whose car
|
|
|
|
|
is 'private-key'.)"
|
|
|
|
|
(let* ((sig (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(err (proc sig (canonical-sexp->pointer data)
|
|
|
|
|
(canonical-sexp->pointer secret-key))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (= 0 err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer sig))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(throw 'gry-error err))))))
|
|
|
|
|
|
|
|
|
|
(define verify
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_verify"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* * *))))
|
|
|
|
|
(lambda (signature data public-key)
|
|
|
|
|
"Verify that SIGNATURE is a signature of DATA with PUBLIC-KEY, all of
|
|
|
|
|
which are gcrypt s-expressions."
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(zero? (proc (canonical-sexp->pointer signature)
|
|
|
|
|
(canonical-sexp->pointer data)
|
|
|
|
|
(canonical-sexp->pointer public-key))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
|
|
|
|
(define generate-key
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_pk_genkey"))
|
|
|
|
|
(proc (pointer->procedure int ptr '(* *))))
|
|
|
|
|
(lambda (params)
|
|
|
|
|
"Return as an s-expression a new key pair for PARAMS. PARAMS must be an
|
|
|
|
|
s-expression like: (genkey (rsa (nbits 4:2048)))."
|
|
|
|
|
(let* ((key (bytevector->pointer (make-bytevector (sizeof '*))))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(err (proc key (canonical-sexp->pointer params))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (zero? err)
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp (dereference-pointer key))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(throw 'gcry-error err))))))
|
|
|
|
|
|
|
|
|
|
(define find-sexp-token
|
|
|
|
|
(let* ((ptr (libgcrypt-func "gcry_sexp_find_token"))
|
|
|
|
|
(proc (pointer->procedure '* ptr `(* * ,size_t))))
|
|
|
|
|
(lambda (sexp token)
|
|
|
|
|
"Find in SEXP the first element whose 'car' is TOKEN and return it;
|
|
|
|
|
return #f if not found."
|
|
|
|
|
(let* ((token (string->pointer (symbol->string token)))
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(res (proc (canonical-sexp->pointer sexp) token 0)))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
(if (null-pointer? res)
|
|
|
|
|
#f
|
2013-12-27 23:32:26 +01:00
|
|
|
|
(pointer->canonical-sexp res))))))
|
2013-12-20 00:36:26 +01:00
|
|
|
|
|
2013-12-28 15:47:35 +01:00
|
|
|
|
(define-inlinable (canonical-sexp-null? sexp)
|
|
|
|
|
"Return #t if SEXP is the empty-list sexp."
|
|
|
|
|
(null-pointer? (canonical-sexp->pointer sexp)))
|
|
|
|
|
|
|
|
|
|
(define (canonical-sexp-list? sexp)
|
|
|
|
|
"Return #t if SEXP is a list."
|
|
|
|
|
(or (canonical-sexp-null? sexp)
|
|
|
|
|
(> (canonical-sexp-length sexp) 0)))
|
|
|
|
|
|
2013-12-28 16:16:00 +01:00
|
|
|
|
(define (canonical-sexp-fold proc seed sexp)
|
|
|
|
|
"Fold PROC (as per SRFI-1) over SEXP, a canonical sexp."
|
|
|
|
|
(if (canonical-sexp-list? sexp)
|
|
|
|
|
(let ((len (canonical-sexp-length sexp)))
|
|
|
|
|
(let loop ((index 0)
|
|
|
|
|
(result seed))
|
|
|
|
|
(if (= index len)
|
|
|
|
|
result
|
|
|
|
|
(loop (+ 1 index)
|
|
|
|
|
(proc (or (canonical-sexp-nth sexp index)
|
|
|
|
|
(canonical-sexp-nth-data sexp index))
|
|
|
|
|
result)))))
|
|
|
|
|
(error "sexp is not a list" sexp)))
|
|
|
|
|
|
|
|
|
|
(define (canonical-sexp->sexp sexp)
|
|
|
|
|
"Return a Scheme sexp corresponding to SEXP. This is particularly useful to
|
|
|
|
|
compare sexps (since Libgcrypt does not provide an 'equal?' procedure), or to
|
|
|
|
|
use pattern matching."
|
|
|
|
|
(if (canonical-sexp-list? sexp)
|
|
|
|
|
(reverse
|
|
|
|
|
(canonical-sexp-fold (lambda (item result)
|
|
|
|
|
(cons (if (canonical-sexp? item)
|
|
|
|
|
(canonical-sexp->sexp item)
|
|
|
|
|
item)
|
|
|
|
|
result))
|
|
|
|
|
'()
|
|
|
|
|
sexp))
|
|
|
|
|
(canonical-sexp->string sexp))) ; XXX: not very useful
|
|
|
|
|
|
|
|
|
|
(define (sexp->canonical-sexp sexp)
|
|
|
|
|
"Return a canonical sexp equivalent to SEXP, a Scheme sexp as returned by
|
|
|
|
|
'canonical-sexp->sexp'."
|
|
|
|
|
;; XXX: This is inefficient, but the Libgcrypt API doesn't allow us to do
|
|
|
|
|
;; much better.
|
|
|
|
|
(string->canonical-sexp
|
|
|
|
|
(call-with-output-string
|
|
|
|
|
(lambda (port)
|
|
|
|
|
(define (write item)
|
|
|
|
|
(cond ((list? item)
|
|
|
|
|
(display "(" port)
|
|
|
|
|
(for-each write item)
|
|
|
|
|
(display ")" port))
|
|
|
|
|
((symbol? item)
|
|
|
|
|
(format port " ~a" item))
|
|
|
|
|
((bytevector? item)
|
|
|
|
|
(format port " #~a#"
|
|
|
|
|
(bytevector->base16-string item)))
|
|
|
|
|
(else
|
|
|
|
|
(error "unsupported sexp item type" item))))
|
|
|
|
|
|
|
|
|
|
(write sexp)))))
|
|
|
|
|
|
2013-12-20 00:36:26 +01:00
|
|
|
|
;;; pk-crypto.scm ends here
|