tor_key_forge/
macros.rs

1//! Macros that can be used to improve your life with regards to crypto.
2
3use derive_deftly::define_derive_deftly;
4
5/// Create an ed25519 keypair wrapper given a visibility and a struct name.
6///
7/// # Syntax:
8/// ```rust,ignore
9/// define_ed25519_keypair(<visibility> <prefix>)
10/// ```
11///
12/// This macro creates a struct tuple named `<prefix>Keypair` which contains the lower-level
13/// cryptographic keypair for an ed25519 keypair. It derives the deftly Ed25519Keypair template
14/// which in turn creates `<prefix>PublicKey` along a series of useful methods.
15///
16/// The keypair is NOT clonable by design in order to avoid duplicating secret key material.
17///
18/// # Example:
19///
20/// ```rust
21/// use tor_key_forge::define_ed25519_keypair;
22///
23/// define_ed25519_keypair!(NonPublicSigning);
24/// define_ed25519_keypair!(pub PublicSigning);
25/// define_ed25519_keypair!(pub(crate) CratePublicSigning);
26/// ```
27///
28/// The above results in `NonPublicSigningKeypair` and `NonPublicSigningPublicKey` struct being
29/// created and usable with a series of useful methods. Same for the other defines.
30///
31/// You can then use these objects like so:
32///
33/// ```rust
34/// # use tor_llcrypto::rng::FakeEntropicRng;
35/// # let mut rng = FakeEntropicRng(rand::rng());
36/// use rand::Rng;
37/// use tor_key_forge::Keygen;
38/// use tor_key_forge::define_ed25519_keypair;
39/// use tor_llcrypto::pk::ValidatableSignature;
40/// use tor_llcrypto::pk::ed25519::Ed25519SigningKey;
41///
42/// define_ed25519_keypair!(
43///     /// Our signing key.
44///     MySigning
45/// );
46///
47/// let signing_kp = MySigningKeypair::generate(&mut rng).expect("Invalid keygen");
48/// let signing_pubkey = signing_kp.public();
49/// // Lets sign this wonderful message.
50/// let message = "Workers want rights, not your opinion".as_bytes();
51/// let sig = signing_kp.sign(&message);
52///
53/// // You can then verify either directly with the keypair or the public key.
54/// assert!(signing_kp.verify(sig, &message));
55/// assert!(signing_pubkey.verify(sig, &message));
56/// ```
57#[macro_export]
58macro_rules! define_ed25519_keypair {
59    ($(#[ $docs_and_attrs:meta ])*
60     $vis:vis $base_name:ident) => {
61        $crate::macro_deps::paste! {
62            #[derive($crate::derive_deftly::Deftly)]
63            #[derive_deftly($crate::macro_deps::Ed25519Keypair)]
64            #[deftly(kp(pubkey = $base_name "PublicKey"))]
65            #[non_exhaustive]
66            $(#[ $docs_and_attrs ])*
67            $vis struct [<$base_name "Keypair">]($crate::macro_deps::ed25519::Keypair);
68        }
69    };
70}
71
72define_derive_deftly! {
73    /// Implement set of helper functions around a type wrapping an ed25519::Keypair.
74    export Ed25519Keypair for struct:
75
76    // Enforce that the object has a single field. We want to avoid the implementer to start
77    // storing metadata or other things in this object that is meant specifically to be
78    // a semantic wrapper around an Ed25519 keypair.
79    ${if not(approx_equal(${for fields { 1 }}, 1)) { ${error "Single field only"}}}
80
81    ${define KP_NAME $( $fname )}
82    ${define PK_NAME ${tmeta(kp(pubkey)) as ident}}
83
84    /// Public key component of this keypair. Useful if we move the public key around,
85    /// it then keeps it semantic with the name and less prone to errors.
86    #[derive(Clone, Debug, PartialEq, Eq)]
87    #[derive($crate::macro_deps::derive_more::From, $crate::macro_deps::derive_more::Into)]
88    #[non_exhaustive]
89    $tvis struct $PK_NAME ($tvis $crate::macro_deps::ed25519::PublicKey);
90
91    impl $PK_NAME {
92        /// Verify the signature of a given message.
93        #[allow(unused)]
94        $tvis fn verify(&self, sig: $crate::macro_deps::ed25519::Signature, text: &[u8]) -> bool {
95            use $crate::macro_deps::ValidatableSignature;
96            $crate::macro_deps::ed25519::ValidatableEd25519Signature::new(self.0, sig, text).is_valid()
97        }
98    }
99
100    impl $crate::macro_deps::ed25519::Ed25519PublicKey for $PK_NAME {
101        fn public_key(&self) -> $crate::macro_deps::ed25519::PublicKey {
102            self.0
103        }
104    }
105
106    // We don't expect all implementations to use all code.
107    #[allow(unused)]
108    impl $ttype {
109        /// Build the raw inner public key into the wrapper public key object.
110        $tvis fn public(&self) -> $PK_NAME {
111            $PK_NAME((&self.$KP_NAME).into())
112        }
113        /// Verify the signature of a given message.
114        $tvis fn verify(&self, sig: $crate::macro_deps::ed25519::Signature, text: &[u8]) -> bool {
115            use $crate::macro_deps::ValidatableSignature;
116            $crate::macro_deps::ed25519::ValidatableEd25519Signature::new(
117                self.0.verifying_key(), sig, text
118            ).is_valid()
119        }
120        /// Return a Ed25519Identity built from this keypair.
121        $tvis fn to_ed25519_id(&self) -> $crate::macro_deps::ed25519::Ed25519Identity {
122            $crate::macro_deps::ed25519::Ed25519Identity::from(&self.public().0)
123        }
124    }
125
126    impl From<$crate::macro_deps::ed25519::Keypair> for $ttype {
127        fn from(kp: $crate::macro_deps::ed25519::Keypair) -> Self {
128            Self(kp)
129        }
130    }
131    impl $crate::macro_deps::ed25519::Ed25519PublicKey for $ttype {
132        fn public_key(&self) -> $crate::macro_deps::ed25519::PublicKey {
133            self.0.public_key()
134        }
135    }
136
137    impl $crate::macro_deps::ed25519::Ed25519SigningKey for $ttype {
138        fn sign(
139            &self,
140            msg: &[u8])
141        -> $crate::macro_deps::ed25519::Signature {
142            self.0.sign(msg)
143        }
144    }
145
146    /// Implementing EncodableItem, ToEncodableKey and Keygen allows this wrapper key to be stored
147    /// in a keystore.
148
149    impl $crate::ItemType for $ttype {
150        fn item_type() -> $crate::KeystoreItemType {
151            $crate::KeyType::Ed25519Keypair.into()
152        }
153    }
154
155    impl $crate::EncodableItem for $ttype {
156        fn as_keystore_item(&self) -> $crate::Result<$crate::KeystoreItem> {
157            self.$KP_NAME.as_keystore_item()
158        }
159    }
160
161    impl $crate::ToEncodableKey for $ttype {
162        type Key = $crate::macro_deps::ed25519::Keypair;
163        type KeyPair = $ttype;
164
165        fn to_encodable_key(self) -> Self::Key {
166            self.$KP_NAME
167        }
168        fn from_encodable_key(key: Self::Key) -> Self {
169            Self(key)
170        }
171    }
172
173    impl $crate::Keygen for $ttype {
174        fn generate(mut rng: &mut dyn $crate::KeygenRng) -> $crate::Result<Self>
175        where
176            Self: Sized
177        {
178            Ok(Self { $KP_NAME: $crate::macro_deps::ed25519::Keypair::generate(&mut rng) })
179        }
180    }
181}
182
183/// Create a curve25519 keypair wrapper given a visibility and a struct name.
184///
185/// # Syntax:
186/// ```rust,ignore
187/// define_curve25519_keypair(<visibility> <prefix>)
188/// ```
189///
190/// This macro creates a struct tuple named `<prefix>Keypair` which contains the lower-level
191/// cryptographic keypair for a curve25519 keypair. It derives the deftly Curve25519Keypair template
192/// which in turn creates `<prefix>PublicKey` along a series of useful methods.
193///
194/// The keypair is NOT clonable by design in order to avoid duplicating secret key material.
195///
196/// # Example:
197///
198/// ```rust
199/// use tor_key_forge::define_curve25519_keypair;
200///
201/// define_curve25519_keypair!(NonPublicEnc);
202/// define_curve25519_keypair!(pub PublicEnc);
203/// define_curve25519_keypair!(pub(crate) CratePublicEnc);
204/// ```
205///
206/// The above results in `NonPublicEncKeypair` and `NonPublicEncPublicKey` struct being created and
207/// usable with a series of useful methods.
208///
209/// You can then use these objects like so:
210///
211/// ```rust
212/// # use tor_llcrypto::rng::FakeEntropicRng;
213/// # let mut rng = FakeEntropicRng(rand::rng());
214/// # use rand::Rng;
215/// use tor_key_forge::define_curve25519_keypair;
216/// use tor_key_forge::Keygen;
217///
218/// define_curve25519_keypair!(
219///     // This is Alice's keypair.
220///     AliceEnc
221/// );
222/// define_curve25519_keypair!(BobEnc);
223///
224/// let alice_kp = AliceEncKeypair::generate(&mut rng).expect("Failed alice keygen");
225/// let bob_kp = BobEncKeypair::generate(&mut rng).expect("Failed bob keygen");
226///
227/// // Using the public key wrapper
228/// let alice_shared_secret = alice_kp.diffie_hellman(bob_kp.public());
229/// // Using the direct curve25519::PublicKey.
230/// let bob_shared_secret = bob_kp.diffie_hellman(&alice_kp.public().0);
231///
232/// assert_eq!(alice_shared_secret.as_bytes(), bob_shared_secret.as_bytes());
233/// ```
234#[macro_export]
235macro_rules! define_curve25519_keypair {
236    ($(#[ $docs_and_attrs:meta ])*
237    $vis:vis $base_name:ident) => {
238        $crate::macro_deps::paste! {
239            #[derive($crate::derive_deftly::Deftly)]
240            #[derive_deftly($crate::macro_deps::Curve25519Keypair)]
241            #[deftly(kp(pubkey = $base_name "PublicKey"))]
242            #[non_exhaustive]
243            $(#[ $docs_and_attrs ])*
244            $vis struct [<$base_name "Keypair">]($crate::macro_deps::curve25519::StaticKeypair);
245        }
246    };
247}
248
249define_derive_deftly! {
250    /// Implement set of helper functions around a type wrapping an ed25519::Keypair.
251    export Curve25519Keypair for struct:
252
253    // Enforce that the object has a single field. We want to avoid the implementer to start
254    // storing metadata or other things in this object that is meant specifically to be
255    // a semantic wrapper around an Curve25519 keypair.
256    ${if not(approx_equal(${for fields { 1 }}, 1)) { ${error "Single field only"}}}
257
258    ${define KP_NAME $( $fname )}
259    ${define PK_NAME ${tmeta(kp(pubkey)) as ident}}
260
261    /// Public key component of this keypair. Useful if we move the public key around,
262    /// it then keeps it semantic with the name and less prone to errors.
263    #[derive(Clone, Debug, PartialEq, Eq)]
264    #[derive($crate::macro_deps::derive_more::From, $crate::macro_deps::derive_more::Into)]
265    #[non_exhaustive]
266    $tvis struct $PK_NAME ($crate::macro_deps::curve25519::PublicKey);
267
268    impl std::borrow::Borrow<$crate::macro_deps::curve25519::PublicKey> for $PK_NAME {
269        #[inline]
270        fn borrow(&self) -> &$crate::macro_deps::curve25519::PublicKey {
271            &self.0
272        }
273    }
274
275    impl $ttype {
276        /// Build the raw inner public key into the wrapper public key object.
277        $tvis fn public(&self) -> $PK_NAME {
278            $PK_NAME(self.$KP_NAME.public.clone())
279        }
280
281        /// Wrapper around the diffie_hellman() function of the underlying type. This is pretty fun
282        /// because it accepts both the PK_NAME wrapper or the raw inner curve25519::PublicKey.
283        $tvis fn diffie_hellman<T>(&self, pk: T) -> $crate::macro_deps::curve25519::SharedSecret
284        where
285            T: std::borrow::Borrow<$crate::macro_deps::curve25519::PublicKey>
286        {
287            self.$KP_NAME.secret.diffie_hellman(pk.borrow())
288        }
289    }
290
291    impl From<$crate::macro_deps::curve25519::StaticKeypair> for $ttype {
292        fn from(kp: $crate::macro_deps::curve25519::StaticKeypair) -> Self {
293            Self(kp)
294        }
295    }
296
297    /// Implementing EncodableItem, ToEncodableKey and Keygen allows this wrapper key to be stored
298    /// in a keystore.
299
300    impl $crate::ItemType for $ttype {
301        fn item_type() -> $crate::KeystoreItemType {
302            $crate::KeyType::X25519StaticKeypair.into()
303        }
304    }
305
306    impl $crate::EncodableItem for $ttype {
307        fn as_keystore_item(&self) -> $crate::Result<$crate::KeystoreItem> {
308            self.$KP_NAME.as_keystore_item()
309        }
310    }
311
312    impl $crate::ToEncodableKey for $ttype {
313        type Key = $crate::macro_deps::curve25519::StaticKeypair;
314        type KeyPair = $ttype;
315
316        fn to_encodable_key(self) -> Self::Key {
317            self.$KP_NAME
318        }
319        fn from_encodable_key(key: Self::Key) -> Self {
320            Self(key)
321        }
322    }
323
324    impl $crate::Keygen for $ttype {
325        fn generate(mut rng: &mut dyn $crate::KeygenRng) -> $crate::Result<Self>
326        where
327            Self: Sized
328        {
329            let secret = $crate::macro_deps::curve25519::StaticSecret::random_from_rng(rng);
330            let public: $crate::macro_deps::curve25519::PublicKey = (&secret).into();
331            let kp = $crate::macro_deps::curve25519::StaticKeypair {
332                secret: secret.into(),
333                public: public.into(),
334            };
335            Ok(kp.into())
336        }
337    }
338}
339
340/// Create an RSA keypair wrapper given a visibility and a struct name.
341///
342/// # Syntax:
343/// ```rust,ignore
344/// define_rsa_keypair(<visibility> <prefix>)
345/// ```
346///
347/// This macro creates a struct tuple named `<prefix>Keypair` which contains the lower-level
348/// cryptographic keypair for an RSA keypair. It derives the deftly RsaKeypair template
349/// which in turn creates `<prefix>PublicKey` along a series of useful methods.
350///
351/// The keypair is NOT clonable by design in order to avoid duplicating secret key material.
352///
353/// # Example:
354///
355/// ```rust
356/// use tor_key_forge::define_rsa_keypair;
357///
358/// define_rsa_keypair!(NonPublicSigning);
359/// define_rsa_keypair!(pub PublicSigning);
360/// define_rsa_keypair!(pub(crate) CratePublicSigning);
361/// ```
362///
363/// The above results in `NonPublicSigningKeypair` and `NonPublicSigningPublicKey` struct being
364/// created and usable with a series of useful methods. Same for the other defines.
365///
366/// You can then use these objects like so:
367///
368/// ```rust
369/// # use tor_llcrypto::rng::FakeEntropicRng;
370/// # let mut rng = FakeEntropicRng(rand::rng());
371/// use rand::Rng;
372/// use tor_key_forge::Keygen;
373/// use tor_key_forge::define_rsa_keypair;
374/// use tor_llcrypto::pk::ValidatableSignature;
375/// use tor_llcrypto::pk::rsa::KeyPair;
376///
377/// define_rsa_keypair!(
378///     /// Our signing key.
379///     MyRsa
380/// );
381///
382/// let signing_kp = MyRsaKeypair::generate(&mut rng).expect("Invalid keygen");
383/// let signing_pubkey = signing_kp.public();
384/// // Lets sign this wonderful message.
385/// let message = "Workers want rights, not your opinion".as_bytes();
386/// let sig = signing_kp.sign(&message).expect("Error signing message");
387///
388/// // You can then verify either directly with the keypair or the public key.
389/// assert!(signing_kp.verify(&sig, &message));
390/// assert!(signing_pubkey.verify(&sig, &message));
391/// ```
392#[macro_export]
393macro_rules! define_rsa_keypair {
394    ($(#[ $docs_and_attrs:meta ])*
395     $vis:vis $base_name:ident) => {
396        $crate::macro_deps::paste! {
397            #[derive($crate::derive_deftly::Deftly)]
398            #[derive_deftly($crate::macro_deps::RsaKeypair)]
399            #[deftly(kp(pubkey = $base_name "PublicKey"))]
400            #[non_exhaustive]
401            $(#[ $docs_and_attrs ])*
402            $vis struct [<$base_name "Keypair">]($crate::macro_deps::rsa::KeyPair);
403        }
404    };
405}
406
407define_derive_deftly! {
408    /// Implement set of helper functions around a type wrapping a rsa::KeyPair.
409    export RsaKeypair for struct:
410
411    // Enforce that the object has a single field. We want to avoid the implementer to start
412    // storing metadata or other things in this object that is meant specifically to be
413    // a semantic wrapper around an RSA keypair.
414    ${if not(approx_equal(${for fields { 1 }}, 1)) { ${error "Single field only"}}}
415
416    ${define KP_NAME $( $fname )}
417    ${define PK_NAME ${tmeta(kp(pubkey)) as ident}}
418
419    /// Public key component of this keypair. Useful if we move the public key around,
420    /// it then keeps it semantic with the name and less prone to errors.
421    #[derive(Clone, Debug, PartialEq, Eq)]
422    #[derive($crate::macro_deps::derive_more::From, $crate::macro_deps::derive_more::Into)]
423    #[non_exhaustive]
424    $tvis struct $PK_NAME ($tvis $crate::macro_deps::rsa::PublicKey);
425
426    impl $PK_NAME {
427        /// Verify the signature of a given message.
428        #[allow(unused)]
429        $tvis fn verify(&self, sig: &[u8], text: &[u8]) -> bool {
430            use $crate::macro_deps::ValidatableSignature;
431            $crate::macro_deps::rsa::ValidatableRsaSignature::new(&self.0, sig, text).is_valid()
432        }
433    }
434
435    // We don't expect all implementations to use all code.
436    #[allow(unused)]
437    impl $ttype {
438        /// Build the raw inner public key into the wrapper public key object.
439        $tvis fn public(&self) -> $PK_NAME {
440            $PK_NAME((&self.$KP_NAME).into())
441        }
442
443        /// Sign the given message.
444        $tvis fn sign(&self, message: &[u8]) -> Result<Vec<u8>, $crate::macro_deps::rsa::Error> {
445            self.0.sign(message)
446        }
447
448        /// Verify the signature of a given message.
449        $tvis fn verify(&self, sig: &[u8], text: &[u8]) -> bool {
450            use $crate::macro_deps::ValidatableSignature;
451            $crate::macro_deps::rsa::ValidatableRsaSignature::new(
452                &self.0.to_public_key(), sig, text
453            ).is_valid()
454        }
455
456        /// Return a RsaIdentity built from this keypair.
457        $tvis fn to_rsa_identity(&self) -> $crate::macro_deps::rsa::RsaIdentity {
458            self.public().0.to_rsa_identity()
459        }
460    }
461
462    impl From<$crate::macro_deps::rsa::KeyPair> for $ttype {
463        fn from(kp: $crate::macro_deps::rsa::KeyPair) -> Self {
464            Self(kp)
465        }
466    }
467
468    /// Implementing EncodableItem, ToEncodableKey and Keygen allows this wrapper key to be stored
469    /// in a keystore.
470
471    impl $crate::ItemType for $ttype {
472        fn item_type() -> $crate::KeystoreItemType {
473            $crate::KeyType::RsaKeypair.into()
474        }
475    }
476
477    impl $crate::EncodableItem for $ttype {
478        fn as_keystore_item(&self) -> $crate::Result<$crate::KeystoreItem> {
479            self.$KP_NAME.as_keystore_item()
480        }
481    }
482
483    impl $crate::ToEncodableKey for $ttype {
484        type Key = $crate::macro_deps::rsa::KeyPair;
485        type KeyPair = $ttype;
486
487        fn to_encodable_key(self) -> Self::Key {
488            self.$KP_NAME
489        }
490        fn from_encodable_key(key: Self::Key) -> Self {
491            Self(key)
492        }
493    }
494
495    impl $crate::Keygen for $ttype {
496        fn generate(mut rng: &mut dyn $crate::KeygenRng) -> $crate::Result<Self>
497        where
498            Self: Sized
499        {
500            Ok(Self { $KP_NAME: $crate::macro_deps::rsa::KeyPair::generate(&mut rng)? })
501        }
502    }
503}
504
505// Re-export dependencies as `tor_key_forge::macro_deps` that we use to make this macro work.
506#[doc(hidden)]
507pub mod deps {
508    pub use derive_deftly_template_Curve25519Keypair;
509    pub use derive_deftly_template_Ed25519Keypair;
510    pub use derive_deftly_template_RsaKeypair;
511    pub use derive_more;
512    pub use paste::paste;
513    pub use signature;
514    pub use tor_llcrypto::pk::{ValidatableSignature, curve25519, ed25519, rsa};
515}
516
517#[cfg(test)]
518mod test {
519    use crate::Keygen;
520    use tor_basic_utils::test_rng::testing_rng;
521    use tor_llcrypto::{pk::ed25519::Ed25519SigningKey, rng::FakeEntropicRng};
522
523    #[test]
524    fn deftly_ed25519_keypair() {
525        define_ed25519_keypair!(SomeEd25519);
526
527        let mut rng = FakeEntropicRng(testing_rng());
528        let kp = SomeEd25519Keypair::generate(&mut rng).expect("Failed to gen key");
529
530        // Make sure the generated public key from our wrapper is the same as the
531        // underlying keypair.
532        let pubkey = kp.public();
533        assert_eq!(pubkey.0, kp.0.verifying_key());
534
535        // Message to sign and verify.
536        let msg: [u8; 4] = [2, 3, 4, 5];
537        let msg_bad: [u8; 4] = [2, 3, 4, 6];
538
539        let sig = kp.sign(msg.as_slice());
540        assert!(kp.verify(sig, msg.as_slice()));
541        // Lets make sure we don't validate another message.
542        assert!(!kp.verify(sig, msg_bad.as_slice()));
543    }
544
545    #[test]
546    fn deftly_rsa_keypair() {
547        define_rsa_keypair!(SomeRsa);
548
549        let mut rng = FakeEntropicRng(testing_rng());
550        let kp = SomeRsaKeypair::generate(&mut rng).expect("Failed to gen key");
551
552        // Make sure the generated public key from our wrapper is the same as the
553        // underlying keypair.
554        let pubkey = kp.public();
555        assert_eq!(pubkey.0, kp.0.to_public_key());
556
557        // Message to sign and verify.
558        let msg: [u8; 4] = [2, 3, 4, 5];
559        let msg_bad: [u8; 4] = [2, 3, 4, 6];
560
561        let sig = kp.sign(msg.as_slice()).expect("Failed to sign message.");
562        assert!(kp.verify(&sig, msg.as_slice()));
563        // Lets make sure we don't validate another message.
564        assert!(!kp.verify(&sig, msg_bad.as_slice()));
565    }
566}