blob: fc87fce814bfc6f680008ee7876e94f69c8fda07 [file]
// Copyright 2024 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
// use this file except in compliance with the License. You may obtain a copy of
// the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations under
// the License.
// This is a configurable, multi-algorithm implementation of signature
// operations using boringssl.
#include <stdint.h>
#include <stdio.h>
#include "dice/boringssl_ecdsa_utils.h"
#include "dice/boringssl_mldsa_utils.h"
#include "dice/config/cose_key_config.h"
#include "dice/dice.h"
#include "dice/ops.h"
#include "openssl/curve25519.h"
#if DICE_PRIVATE_KEY_SEED_SIZE != 32
#error "Private key seed is expected to be 32 bytes."
#endif
#if DICE_PUBLIC_KEY_BUFFER_SIZE != 2592
#error "Multialg needs 2592 bytes to for the public key (ML-DSA-87)"
#endif
#if DICE_PRIVATE_KEY_BUFFER_SIZE != 64
#error "Multialg needs 64 bytes for the private key (Ed25519)"
#endif
#if DICE_SIGNATURE_BUFFER_SIZE != 4627
#error "Multialg needs 4627 bytes to store the signature (ML-DSA-87)"
#endif
DiceResult DiceGetKeyParam(void* context, DicePrincipal principal,
DiceKeyParam* key_param) {
DiceKeyAlgorithm alg;
DiceResult result = DiceGetKeyAlgorithm(context, principal, &alg);
if (result != kDiceResultOk) {
return result;
}
switch (alg) {
case kDiceKeyAlgorithmEd25519:
key_param->public_key_size = 32;
key_param->signature_size = 64;
key_param->cose_key_type = kCoseKeyKtyOkp;
key_param->cose_key_algorithm = kCoseAlgEdDsa;
key_param->cose_key_curve = kCoseCrvEd25519;
return kDiceResultOk;
case kDiceKeyAlgorithmP256:
key_param->public_key_size = 64;
key_param->signature_size = 64;
key_param->cose_key_type = kCoseKeyKtyEc2;
key_param->cose_key_algorithm = kCoseAlgEs256;
key_param->cose_key_curve = kCoseCrvP256;
return kDiceResultOk;
case kDiceKeyAlgorithmP384:
key_param->public_key_size = 96;
key_param->signature_size = 96;
key_param->cose_key_type = kCoseKeyKtyEc2;
key_param->cose_key_algorithm = kCoseAlgEs384;
key_param->cose_key_curve = kCoseCrvP384;
return kDiceResultOk;
case kDiceKeyAlgorithmMldsa65:
key_param->public_key_size = 1952;
key_param->signature_size = 3309;
key_param->cose_key_type = kCoseKeyKtyAkp;
key_param->cose_key_algorithm = kCoseAlgMldsa65;
return kDiceResultOk;
case kDiceKeyAlgorithmMldsa87:
key_param->public_key_size = 2592;
key_param->signature_size = 4627;
key_param->cose_key_type = kCoseKeyKtyAkp;
key_param->cose_key_algorithm = kCoseAlgMldsa87;
return kDiceResultOk;
}
return kDiceResultPlatformError;
}
DiceResult DiceKeypairFromSeed(
void* context, DicePrincipal principal,
const uint8_t seed[DICE_PRIVATE_KEY_SEED_SIZE],
uint8_t public_key[DICE_PUBLIC_KEY_BUFFER_SIZE],
uint8_t private_key[DICE_PRIVATE_KEY_BUFFER_SIZE]) {
DiceKeyAlgorithm alg;
DiceResult result = DiceGetKeyAlgorithm(context, principal, &alg);
if (result != kDiceResultOk) {
return result;
}
switch (alg) {
case kDiceKeyAlgorithmEd25519:
ED25519_keypair_from_seed(public_key, private_key, seed);
return kDiceResultOk;
case kDiceKeyAlgorithmP256:
if (1 == P256KeypairFromSeed(public_key, private_key, seed)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmP384:
if (1 == P384KeypairFromSeed(public_key, private_key, seed)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa65:
if (1 == Mldsa65KeypairFromSeed(public_key, private_key, seed)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa87:
if (1 == Mldsa87KeypairFromSeed(public_key, private_key, seed)) {
return kDiceResultOk;
}
break;
}
return kDiceResultPlatformError;
}
DiceResult DiceSign(void* context, const uint8_t* message, size_t message_size,
const uint8_t private_key[DICE_PRIVATE_KEY_BUFFER_SIZE],
uint8_t signature[DICE_SIGNATURE_BUFFER_SIZE]) {
DiceKeyAlgorithm alg;
DiceResult result =
DiceGetKeyAlgorithm(context, kDicePrincipalAuthority, &alg);
if (result != kDiceResultOk) {
return result;
}
switch (alg) {
case kDiceKeyAlgorithmEd25519:
if (1 == ED25519_sign(signature, message, message_size, private_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmP256:
if (1 == P256Sign(signature, message, message_size, private_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmP384:
if (1 == P384Sign(signature, message, message_size, private_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa65:
if (1 == Mldsa65Sign(signature, message, message_size, private_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa87:
if (1 == Mldsa87Sign(signature, message, message_size, private_key)) {
return kDiceResultOk;
}
break;
}
return kDiceResultPlatformError;
}
DiceResult DiceVerify(void* context, const uint8_t* message,
size_t message_size,
const uint8_t signature[DICE_SIGNATURE_BUFFER_SIZE],
const uint8_t public_key[DICE_PUBLIC_KEY_BUFFER_SIZE]) {
DiceKeyAlgorithm alg;
DiceResult result =
DiceGetKeyAlgorithm(context, kDicePrincipalAuthority, &alg);
if (result != kDiceResultOk) {
return result;
}
switch (alg) {
case kDiceKeyAlgorithmEd25519:
if (1 == ED25519_verify(message, message_size, signature, public_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmP256:
if (1 == P256Verify(message, message_size, signature, public_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmP384:
if (1 == P384Verify(message, message_size, signature, public_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa65:
if (1 == Mldsa65Verify(message, message_size, signature, public_key)) {
return kDiceResultOk;
}
break;
case kDiceKeyAlgorithmMldsa87:
if (1 == Mldsa87Verify(message, message_size, signature, public_key)) {
return kDiceResultOk;
}
break;
}
return kDiceResultPlatformError;
}