Source

ed25519ll / ed25519ll / ed25519ct.py

# -*- coding: utf-8 -*-
"""
Ed25519 (ctypes backend)
"""

import warnings
import os
import os.path
from distutils import sysconfig
from distutils.util import get_platform
import ctypes
import ed25519ll
from ctypes import c_char_p, c_ulonglong, POINTER, byref

__all__ = ['crypto_sign', 'crypto_sign_open', 'crypto_sign_keypair', 'Keypair',
           'PUBLICKEYBYTES', 'SECRETKEYBYTES', 'SIGNATUREBYTES']

plat_name = get_platform().replace('-', '_')
so_suffix = sysconfig.get_config_var('SO')
lib_filename = '_ed25519_%s%s' % (plat_name, so_suffix)

try:
    _ed25519 = ctypes.cdll.LoadLibrary(
            os.path.abspath(os.path.join(os.path.dirname(__file__), lib_filename)))
except OSError as e: # pragma nocover
    warnings.warn("Ed25519 LoadLibrary fail:\n{}".format(e))
    raise ImportError(str(e))

PUBLICKEYBYTES=32
SECRETKEYBYTES=64
SIGNATUREBYTES=64

_ed25519.crypto_sign_keypair.argtypes = [c_char_p,
                                         c_char_p,
                                         c_char_p]

def crypto_sign_keypair(seed=None):
    """Return (verifying, secret) key from a given seed, or os.urandom(32)"""
    vk = ctypes.create_string_buffer(PUBLICKEYBYTES)
    sk = ctypes.create_string_buffer(SECRETKEYBYTES)
    if seed is None:
        seed = os.urandom(PUBLICKEYBYTES)
    else:
        warnings.warn("ed25519ll should choose random seed.",
                      RuntimeWarning)
    if len(seed) != 32:
        raise ValueError("seed must be 32 random bytes or None.")
    s = ctypes.c_char_p(seed)
    rc = _ed25519.crypto_sign_keypair(vk, sk, s)
    if rc != 0: # pragma no cover (no other return statement in C)
        raise ValueError("rc != 0", rc)
    return ed25519ll.Keypair(vk.raw, sk.raw)


_ed25519.crypto_sign.argtypes = [c_char_p,
                                 POINTER(c_ulonglong),
                                 c_char_p,
                                 c_ulonglong,
                                 c_char_p]

def crypto_sign(msg, sk):
    """Return signature+message given message and secret key.
    The signature is the first SIGNATUREBYTES bytes of the return value.
    A copy of msg is in the remainder."""
    if len(sk) != SECRETKEYBYTES:
        raise ValueError("Bad signing key length %d" % len(sk))
    sk = ctypes.create_string_buffer(sk, SECRETKEYBYTES) # const
    m = ctypes.create_string_buffer(msg, len(msg)) # const
    sig_and_msg = ctypes.create_string_buffer(len(msg) + SIGNATUREBYTES) # out
    sig_and_msg_len = ctypes.c_ulonglong() # out
    rc = _ed25519.crypto_sign(sig_and_msg,
                              byref(sig_and_msg_len),
                              m, len(m),
                              sk)
    if rc != 0: # pragma no cover (no other return statement in C)
        raise ValueError("rc != 0", rc)
    return sig_and_msg.raw[:sig_and_msg_len.value]


_ed25519.crypto_sign_open.argtypes = [c_char_p,
                                      POINTER(c_ulonglong),
                                      c_char_p,
                                      c_ulonglong,
                                      c_char_p]

def crypto_sign_open(signed, vk):
    """Return message given signature+message and the verifying key."""
    if len(vk) != PUBLICKEYBYTES:
        raise ValueError("Bad verifying key length %d" % len(vk))
    sm = ctypes.create_string_buffer(signed, len(signed)) # const
    vk = ctypes.create_string_buffer(vk, len(vk)) # const
    newmsg = ctypes.create_string_buffer(len(signed)) # out
    newmsg_len = ctypes.c_ulonglong() # out
    rc = _ed25519.crypto_sign_open(newmsg, 
                                   byref(newmsg_len), 
                                   sm, len(sm), 
                                   vk)
    if rc != 0:
        raise ValueError("rc != 0", rc)    
    return newmsg.raw[:newmsg_len.value]
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.