| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288 |
- package cert
- import (
- "encoding/hex"
- "encoding/pem"
- "fmt"
- "time"
- "golang.org/x/crypto/ed25519"
- )
- const ( //cert banners
- CertificateBanner = "NEBULA CERTIFICATE"
- CertificateV2Banner = "NEBULA CERTIFICATE V2"
- )
- const ( //key-agreement-key banners
- X25519PrivateKeyBanner = "NEBULA X25519 PRIVATE KEY"
- X25519PublicKeyBanner = "NEBULA X25519 PUBLIC KEY"
- P256PrivateKeyBanner = "NEBULA P256 PRIVATE KEY"
- P256PublicKeyBanner = "NEBULA P256 PUBLIC KEY"
- )
- /* including "ECDSA" in the P256 banners is a clue that these keys should be used only for signing */
- const ( //signing key banners
- EncryptedECDSAP256PrivateKeyBanner = "NEBULA ECDSA P256 ENCRYPTED PRIVATE KEY"
- ECDSAP256PrivateKeyBanner = "NEBULA ECDSA P256 PRIVATE KEY"
- ECDSAP256PublicKeyBanner = "NEBULA ECDSA P256 PUBLIC KEY"
- EncryptedEd25519PrivateKeyBanner = "NEBULA ED25519 ENCRYPTED PRIVATE KEY"
- Ed25519PrivateKeyBanner = "NEBULA ED25519 PRIVATE KEY"
- Ed25519PublicKeyBanner = "NEBULA ED25519 PUBLIC KEY"
- )
- // UnmarshalCertificateFromPEM will try to unmarshal the first pem block in a byte array, returning any non consumed
- // data or an error on failure
- func UnmarshalCertificateFromPEM(b []byte) (Certificate, []byte, error) {
- p, r := pem.Decode(b)
- if p == nil {
- return nil, r, ErrInvalidPEMBlock
- }
- var c Certificate
- var err error
- switch p.Type {
- // Implementations must validate the resulting certificate contains valid information
- case CertificateBanner:
- c, err = unmarshalCertificateV1(p.Bytes, nil)
- case CertificateV2Banner:
- c, err = unmarshalCertificateV2(p.Bytes, nil, Curve_CURVE25519)
- default:
- return nil, r, ErrInvalidPEMCertificateBanner
- }
- if err != nil {
- return nil, r, err
- }
- return c, r, nil
- }
- func marshalCertPublicKeyToPEM(c Certificate) []byte {
- if c.IsCA() {
- return MarshalSigningPublicKeyToPEM(c.Curve(), c.PublicKey())
- } else {
- return MarshalPublicKeyToPEM(c.Curve(), c.PublicKey())
- }
- }
- // MarshalPublicKeyToPEM returns a PEM representation of a public key used for ECDH.
- // if your public key came from a certificate, prefer Certificate.PublicKeyPEM() if possible, to avoid mistakes!
- func MarshalPublicKeyToPEM(curve Curve, b []byte) []byte {
- switch curve {
- case Curve_CURVE25519:
- return pem.EncodeToMemory(&pem.Block{Type: X25519PublicKeyBanner, Bytes: b})
- case Curve_P256:
- return pem.EncodeToMemory(&pem.Block{Type: P256PublicKeyBanner, Bytes: b})
- default:
- return nil
- }
- }
- // MarshalSigningPublicKeyToPEM returns a PEM representation of a public key used for signing.
- // if your public key came from a certificate, prefer Certificate.PublicKeyPEM() if possible, to avoid mistakes!
- func MarshalSigningPublicKeyToPEM(curve Curve, b []byte) []byte {
- switch curve {
- case Curve_CURVE25519:
- return pem.EncodeToMemory(&pem.Block{Type: Ed25519PublicKeyBanner, Bytes: b})
- case Curve_P256:
- return pem.EncodeToMemory(&pem.Block{Type: P256PublicKeyBanner, Bytes: b})
- default:
- return nil
- }
- }
- func UnmarshalPublicKeyFromPEM(b []byte) ([]byte, []byte, Curve, error) {
- k, r := pem.Decode(b)
- if k == nil {
- return nil, r, 0, fmt.Errorf("input did not contain a valid PEM encoded block")
- }
- var expectedLen int
- var curve Curve
- switch k.Type {
- case X25519PublicKeyBanner, Ed25519PublicKeyBanner:
- expectedLen = 32
- curve = Curve_CURVE25519
- case P256PublicKeyBanner, ECDSAP256PublicKeyBanner:
- // Uncompressed
- expectedLen = 65
- curve = Curve_P256
- default:
- return nil, r, 0, fmt.Errorf("bytes did not contain a proper public key banner")
- }
- if len(k.Bytes) != expectedLen {
- return nil, r, 0, fmt.Errorf("key was not %d bytes, is invalid %s public key", expectedLen, curve)
- }
- return k.Bytes, r, curve, nil
- }
- func MarshalPrivateKeyToPEM(curve Curve, b []byte) []byte {
- switch curve {
- case Curve_CURVE25519:
- return pem.EncodeToMemory(&pem.Block{Type: X25519PrivateKeyBanner, Bytes: b})
- case Curve_P256:
- return pem.EncodeToMemory(&pem.Block{Type: P256PrivateKeyBanner, Bytes: b})
- default:
- return nil
- }
- }
- func MarshalSigningPrivateKeyToPEM(curve Curve, b []byte) []byte {
- switch curve {
- case Curve_CURVE25519:
- return pem.EncodeToMemory(&pem.Block{Type: Ed25519PrivateKeyBanner, Bytes: b})
- case Curve_P256:
- return pem.EncodeToMemory(&pem.Block{Type: ECDSAP256PrivateKeyBanner, Bytes: b})
- default:
- return nil
- }
- }
- // Backward compatibility functions for older API
- func MarshalX25519PublicKey(b []byte) []byte {
- return MarshalPublicKeyToPEM(Curve_CURVE25519, b)
- }
- func MarshalX25519PrivateKey(b []byte) []byte {
- return MarshalPrivateKeyToPEM(Curve_CURVE25519, b)
- }
- func MarshalPublicKey(curve Curve, b []byte) []byte {
- return MarshalPublicKeyToPEM(curve, b)
- }
- func MarshalPrivateKey(curve Curve, b []byte) []byte {
- return MarshalPrivateKeyToPEM(curve, b)
- }
- // NebulaCertificate is a compatibility wrapper for the old API
- type NebulaCertificate struct {
- Details NebulaCertificateDetails
- Signature []byte
- cert Certificate
- }
- // NebulaCertificateDetails is a compatibility wrapper for certificate details
- type NebulaCertificateDetails struct {
- Name string
- NotBefore time.Time
- NotAfter time.Time
- PublicKey []byte
- IsCA bool
- Issuer []byte
- Curve Curve
- }
- // UnmarshalNebulaCertificateFromPEM provides backward compatibility with the old API
- func UnmarshalNebulaCertificateFromPEM(b []byte) (*NebulaCertificate, []byte, error) {
- c, rest, err := UnmarshalCertificateFromPEM(b)
- if err != nil {
- return nil, rest, err
- }
- issuerBytes, err := func() ([]byte, error) {
- issuer := c.Issuer()
- if issuer == "" {
- return nil, nil
- }
- decoded, err := hex.DecodeString(issuer)
- if err != nil {
- return nil, fmt.Errorf("failed to decode issuer fingerprint: %w", err)
- }
- return decoded, nil
- }()
- if err != nil {
- return nil, rest, err
- }
- pubKey := c.PublicKey()
- if pubKey != nil {
- pubKey = append([]byte(nil), pubKey...)
- }
- sig := c.Signature()
- if sig != nil {
- sig = append([]byte(nil), sig...)
- }
- return &NebulaCertificate{
- Details: NebulaCertificateDetails{
- Name: c.Name(),
- NotBefore: c.NotBefore(),
- NotAfter: c.NotAfter(),
- PublicKey: pubKey,
- IsCA: c.IsCA(),
- Issuer: issuerBytes,
- Curve: c.Curve(),
- },
- Signature: sig,
- cert: c,
- }, rest, nil
- }
- // IssuerString returns the issuer in hex format for compatibility
- func (n *NebulaCertificate) IssuerString() string {
- if n.Details.Issuer == nil {
- return ""
- }
- return hex.EncodeToString(n.Details.Issuer)
- }
- // Certificate returns the underlying certificate (read-only)
- func (n *NebulaCertificate) Certificate() Certificate {
- return n.cert
- }
- // UnmarshalPrivateKeyFromPEM will try to unmarshal the first pem block in a byte array, returning any non
- // consumed data or an error on failure
- func UnmarshalPrivateKeyFromPEM(b []byte) ([]byte, []byte, Curve, error) {
- k, r := pem.Decode(b)
- if k == nil {
- return nil, r, 0, fmt.Errorf("input did not contain a valid PEM encoded block")
- }
- var expectedLen int
- var curve Curve
- switch k.Type {
- case X25519PrivateKeyBanner:
- expectedLen = 32
- curve = Curve_CURVE25519
- case P256PrivateKeyBanner:
- expectedLen = 32
- curve = Curve_P256
- default:
- return nil, r, 0, fmt.Errorf("bytes did not contain a proper private key banner")
- }
- if len(k.Bytes) != expectedLen {
- return nil, r, 0, fmt.Errorf("key was not %d bytes, is invalid %s private key", expectedLen, curve)
- }
- return k.Bytes, r, curve, nil
- }
- func UnmarshalSigningPrivateKeyFromPEM(b []byte) ([]byte, []byte, Curve, error) {
- k, r := pem.Decode(b)
- if k == nil {
- return nil, r, 0, fmt.Errorf("input did not contain a valid PEM encoded block")
- }
- var curve Curve
- switch k.Type {
- case EncryptedEd25519PrivateKeyBanner:
- return nil, nil, Curve_CURVE25519, ErrPrivateKeyEncrypted
- case EncryptedECDSAP256PrivateKeyBanner:
- return nil, nil, Curve_P256, ErrPrivateKeyEncrypted
- case Ed25519PrivateKeyBanner:
- curve = Curve_CURVE25519
- if len(k.Bytes) != ed25519.PrivateKeySize {
- return nil, r, 0, fmt.Errorf("key was not %d bytes, is invalid Ed25519 private key", ed25519.PrivateKeySize)
- }
- case ECDSAP256PrivateKeyBanner:
- curve = Curve_P256
- if len(k.Bytes) != 32 {
- return nil, r, 0, fmt.Errorf("key was not 32 bytes, is invalid ECDSA P256 private key")
- }
- default:
- return nil, r, 0, fmt.Errorf("bytes did not contain a proper Ed25519/ECDSA private key banner")
- }
- return k.Bytes, r, curve, nil
- }
|