-
Notifications
You must be signed in to change notification settings - Fork 180
Closed
Description
While working on yubikey-piv I was testing the RSA logic by implementing OAEP around it. What I ended up doing was copying in all the logic from #18, and replacing:
let mut em = {
let mut c = BigUint::from_bytes_be(ciphertext);
let mut m = internals::decrypt(rng, priv_key, &c)?;
let em = internals::left_pad(&m.to_bytes_be(), k);
c.zeroize();
m.zeroize();
em
};with
let mut em = {
let m = yubikey.decrypt_data(&ciphertext, algorithm, slot).unwrap();
// I forgot to check if the padding was actually necessary
left_pad(&m, k)
};It seems like the way to achieve this more generally (across all decryption schemes) would be with a trait of the form:
trait PrivateKey {
/// Do NOT use directly! Only for implementors.
fn raw_decryption_primitive<R: Rng>(
&self,
rng: Option<&mut R>,
ciphertext: &[u8],
) -> Result<Vec<u8>>;
/// Decrypt the given message.
fn decrypt(&self, padding: PaddingScheme, ciphertext: &[u8]) -> Result<Vec<u8>> {
...
}
/// Decrypt the given message.
/// Uses `rng` to blind the decryption process.
pub fn decrypt_blinded<R: Rng>(
&self,
rng: &mut R,
padding: PaddingScheme,
ciphertext: &[u8],
) -> Result<Vec<u8>> {
...
}
fn decrypt_oaep(...) -> Result<...> {
oaep::decrypt(...)
}
}
impl PrivateKey for RSAPrivateKey {
fn raw_decryption_primitive<R: Rng>(
&self,
rng: Option<&mut R>,
ciphertext: &[u8],
) -> Result<Vec<u8>> {
let mut c = BigUint::from_bytes_be(ciphertext);
let mut m = internals::decrypt(rng, priv_key, &c)?;
let em = internals::left_pad(&m.to_bytes_be(), k);
c.zeroize();
m.zeroize();
em
}
}Then in yubikey-piv we could do something like:
struct YubiKeyRsaPrivateKey {
yubikey: &mut YubiKey,
algorithm: AlgorithmId,
slot: SlotId,
}
impl PrivateKey for YubiKeyRsaPrivateKey {
fn raw_decryption_primitive<R: Rng>(
&self,
_rng: Option<&mut R>,
ciphertext: &[u8],
) -> Result<Vec<u8>> {
self.yubikey.decrypt_data(&ciphertext, self.algorithm, self.slot).map_err(|e| e.into())
}
}Thoughts? The part I dislike about the above sketch is that the raw RSA decryption primitive is exposed in the API, but this needs to happen somewhere if this kind of interoperability and code de-duplication were to happen at all.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels