# Copyright (c) 2019-2023 by Ron Frederick and others. # # This program and the accompanying materials are made available under # the terms of the Eclipse Public License v2.0 which accompanies this # distribution and is available at: # # http://www.eclipse.org/legal/epl-2.0/ # # This program may also be made available under the following secondary # licenses when the conditions for such availability set forth in the # Eclipse Public License v2.0 are satisfied: # # GNU General Public License, Version 2.0, or any later versions of # that license # # SPDX-License-Identifier: EPL-2.0 OR GPL-2.0-or-later # # Contributors: # Ron Frederick - initial implementation, API, and documentation """U2F ECDSA public key encryption handler""" from hashlib import sha256 from typing import Optional, Tuple, cast from .asn1 import der_encode, der_decode from .crypto import ECDSAPublicKey from .packet import Byte, MPInt, String, UInt32, SSHPacket from .public_key import KeyExportError, SSHKey, SSHOpenSSHCertificateV01 from .public_key import register_public_key_alg, register_certificate_alg from .public_key import register_sk_alg from .sk import SSH_SK_ECDSA, SSH_SK_USER_PRESENCE_REQD, sk_enroll, sk_sign _PrivateKeyArgs = Tuple[bytes, bytes, bytes, int, bytes, bytes] _PublicKeyArgs = Tuple[bytes, bytes, bytes] class _SKECDSAKey(SSHKey): """Handler for elliptic curve public key encryption""" _key: ECDSAPublicKey use_executor = True def __init__(self, curve_id: bytes, public_value: bytes, application: bytes, flags: int = 0, key_handle: Optional[bytes] = None, reserved: bytes = b''): super().__init__(ECDSAPublicKey.construct(curve_id, public_value)) self.algorithm = b'sk-ecdsa-sha2-' + curve_id + b'@openssh.com' self.sig_algorithms = (self.algorithm,) self.all_sig_algorithms = set(self.sig_algorithms) self._application = application self._flags = flags self._key_handle = key_handle self._reserved = reserved def __eq__(self, other: object) -> bool: # This isn't protected access - both objects are _SKECDSAKey instances # pylint: disable=protected-access return (isinstance(other, type(self)) and self._key.curve_id == other._key.curve_id and self._key.public_value == other._key.public_value and self._application == other._application and self._flags == other._flags and self._key_handle == other._key_handle and self._reserved == other._reserved) def __hash__(self) -> int: return hash((self._key.curve_id, self._key.public_value, self._application, self._flags, self._key_handle, self._reserved)) @classmethod def generate(cls, algorithm: bytes, *, # type: ignore application: str = 'ssh:', user: str = 'AsyncSSH', pin: Optional[str] = None, resident: bool = False, touch_required: bool = True) -> '_SKECDSAKey': """Generate a new SK ECDSA private key""" # pylint: disable=arguments-differ application = application.encode('utf-8') flags = SSH_SK_USER_PRESENCE_REQD if touch_required else 0 public_value, key_handle = sk_enroll(SSH_SK_ECDSA, application, user, pin, resident) # Strip prefix and suffix of algorithm to get curve_id return cls(algorithm[14:-12], public_value, application, flags, key_handle, b'') @classmethod def make_private(cls, key_params: object) -> SSHKey: """Construct a U2F ECDSA private key""" curve_id, public_value, application, flags, key_handle, reserved = \ cast(_PrivateKeyArgs, key_params) return cls(curve_id, public_value, application, flags, key_handle, reserved) @classmethod def make_public(cls, key_params: object) -> SSHKey: """Construct a U2F ECDSA public key""" curve_id, public_value, application = cast(_PublicKeyArgs, key_params) return cls(curve_id, public_value, application) @classmethod def decode_ssh_private(cls, packet: SSHPacket) -> _PrivateKeyArgs: """Decode an SSH format SK ECDSA private key""" curve_id = packet.get_string() public_value = packet.get_string() application = packet.get_string() flags = packet.get_byte() key_handle = packet.get_string() reserved = packet.get_string() return curve_id, public_value, application, flags, key_handle, reserved @classmethod def decode_ssh_public(cls, packet: SSHPacket) -> _PublicKeyArgs: """Decode an SSH format SK ECDSA public key""" curve_id = packet.get_string() public_value = packet.get_string() application = packet.get_string() return curve_id, public_value, application def encode_ssh_private(self) -> bytes: """Encode an SSH format SK ECDSA private key""" if self._key_handle is None: raise KeyExportError('Key is not private') return b''.join((String(self._key.curve_id), String(self._key.public_value), String(self._application), Byte(self._flags), String(self._key_handle), String(self._reserved))) def encode_ssh_public(self) -> bytes: """Encode an SSH format SK ECDSA public key""" return b''.join((String(self._key.curve_id), String(self._key.public_value), String(self._application))) def encode_agent_cert_private(self) -> bytes: """Encode U2F ECDSA certificate private key data for agent""" if self._key_handle is None: raise KeyExportError('Key is not private') return b''.join((String(self._application), Byte(self._flags), String(self._key_handle), String(self._reserved))) def sign_ssh(self, data: bytes, sig_algorithm: bytes) -> bytes: """Compute an SSH-encoded signature of the specified data""" # pylint: disable=unused-argument if self._key_handle is None: raise ValueError('Key handle needed for signing') flags, counter, sig = sk_sign(sha256(data).digest(), self._application, self._key_handle, self._flags) r, s = cast(Tuple[int, int], der_decode(sig)) return String(MPInt(r) + MPInt(s)) + Byte(flags) + UInt32(counter) def verify_ssh(self, data: bytes, sig_algorithm: bytes, packet: SSHPacket) -> bool: """Verify an SSH-encoded signature of the specified data""" # pylint: disable=unused-argument sig = packet.get_string() flags = packet.get_byte() counter = packet.get_uint32() packet.check_end() if self._touch_required and not flags & SSH_SK_USER_PRESENCE_REQD: return False packet = SSHPacket(sig) r = packet.get_mpint() s = packet.get_mpint() packet.check_end() sig = der_encode((r, s)) return self._key.verify(sha256(self._application).digest() + Byte(flags) + UInt32(counter) + sha256(data).digest(), sig, 'sha256') _algorithm = b'sk-ecdsa-sha2-nistp256@openssh.com' _cert_algorithm = b'sk-ecdsa-sha2-nistp256-cert-v01@openssh.com' register_sk_alg(SSH_SK_ECDSA, _SKECDSAKey, b'nistp256') register_public_key_alg(_algorithm, _SKECDSAKey, True, (_algorithm,)) register_certificate_alg(1, _algorithm, _cert_algorithm, _SKECDSAKey, SSHOpenSSHCertificateV01, True)