Streamline _open style calls

Those now return {ok, Msg} or
{error, term()} so you are kind of
forced to match on them. This is
likely to help with correctnes.
This commit is contained in:
Jesper Louis Andersen 2020-02-06 11:48:57 +01:00
parent 7999d08e9d
commit f580f6525b
7 changed files with 45 additions and 103 deletions

View File

@ -9,9 +9,12 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
- Go through all calls and make them return streamlined exceptions if applicable. - Go through all calls and make them return streamlined exceptions if applicable.
Pretty large change, but OTOH, this ought to happen before a 1.0 release as well. Pretty large change, but OTOH, this ought to happen before a 1.0 release as well.
- sign - Generichashes must support the finalized state
- Implement missing EQC tests - Implement missing EQC tests
- stream_chacha20...
- stream_xor...
- generichash...
## [Unreleased] ## [Unreleased]

View File

@ -9,4 +9,8 @@ ERL_NIF_TERM enacl_error_tuple(ErlNifEnv *env, char *error_atom) {
ERL_NIF_TERM enacl_internal_error(ErlNifEnv *env) { ERL_NIF_TERM enacl_internal_error(ErlNifEnv *env) {
return enif_raise_exception(env, enif_make_atom(env, "enacl_internal_error")); return enif_raise_exception(env, enif_make_atom(env, "enacl_internal_error"));
}
ERL_NIF_TERM enacl_error_finalized(ErlNifEnv *env) {
return enif_raise_exception(env, enif_make_atom(env, "enacl_finalized"));
} }

View File

@ -9,6 +9,7 @@
#define ATOM_FALSE "false" #define ATOM_FALSE "false"
ERL_NIF_TERM enacl_error_tuple(ErlNifEnv *, char *); ERL_NIF_TERM enacl_error_tuple(ErlNifEnv *, char *);
ERL_NIF_TERM enacl_error_finalized(ErlNifEnv *);
ERL_NIF_TERM enacl_internal_error(ErlNifEnv *); ERL_NIF_TERM enacl_internal_error(ErlNifEnv *);
#endif #endif

View File

@ -130,9 +130,11 @@ ERL_NIF_TERM enacl_crypto_secretbox_open(ErlNifEnv *env, int argc,
return enacl_error_tuple(env, "failed_verification"); return enacl_error_tuple(env, "failed_verification");
} }
return enif_make_sub_binary( ERL_NIF_TERM ret_ok = enif_make_atom(env, ATOM_OK);
ERL_NIF_TERM ret_bin = enif_make_sub_binary(
env, enif_make_binary(env, &padded_msg), crypto_secretbox_ZEROBYTES, env, enif_make_binary(env, &padded_msg), crypto_secretbox_ZEROBYTES,
padded_ciphertext.size - crypto_secretbox_ZEROBYTES); padded_ciphertext.size - crypto_secretbox_ZEROBYTES);
return enif_make_tuple2(env, ret_ok, ret_bin);
} }
ERL_NIF_TERM enacl_crypto_stream_chacha20(ErlNifEnv *env, int argc, ERL_NIF_TERM enacl_crypto_stream_chacha20(ErlNifEnv *env, int argc,

View File

@ -56,24 +56,20 @@ ERL_NIF_TERM enacl_crypto_sign_init(ErlNifEnv *env, int argc,
if ((obj = enif_alloc_resource(enacl_sign_ctx_rtype, if ((obj = enif_alloc_resource(enacl_sign_ctx_rtype,
sizeof(enacl_sign_ctx))) == NULL) { sizeof(enacl_sign_ctx))) == NULL) {
ret = enacl_error_tuple(env, "alloc_failed"); goto err;
goto done;
} }
obj->alive = 0; obj->alive = 0;
obj->state = enif_alloc(crypto_sign_statebytes()); obj->state = enif_alloc(crypto_sign_statebytes());
if (obj->state == NULL) { if (obj->state == NULL) {
ret = enacl_error_tuple(env, "state_malloc");
goto release; goto release;
} }
obj->alive = 1; obj->alive = 1;
if ((obj->mtx = enif_mutex_create("enacl.sign")) == NULL) { if ((obj->mtx = enif_mutex_create("enacl.sign")) == NULL) {
ret = enacl_error_tuple(env, "mutex_create");
goto free; goto free;
} }
if (0 != crypto_sign_init(obj->state)) { if (0 != crypto_sign_init(obj->state)) {
ret = enacl_error_tuple(env, "sign_init_error");
goto free; goto free;
} }
@ -94,6 +90,8 @@ free:
release: release:
// This also frees the mutex via the destructor // This also frees the mutex via the destructor
enif_release_resource(obj); enif_release_resource(obj);
err:
ret = enacl_internal_error(env);
done: done:
return ret; return ret;
} }
@ -120,12 +118,12 @@ ERL_NIF_TERM enacl_crypto_sign_update(ErlNifEnv *env, int argc,
enif_mutex_lock(obj->mtx); enif_mutex_lock(obj->mtx);
if (!obj->alive) { if (!obj->alive) {
ret = enacl_error_tuple(env, "finalized"); ret = enacl_error_finalized(env);
goto done; goto done;
} }
if (0 != crypto_sign_update(obj->state, data.data, data.size)) { if (0 != crypto_sign_update(obj->state, data.data, data.size)) {
ret = enacl_error_tuple(env, "sign_update_error"); ret = enacl_internal_error(env); // This should never be hit
goto done; goto done;
} }
@ -157,19 +155,16 @@ ERL_NIF_TERM enacl_crypto_sign_final_create(ErlNifEnv *env, int argc,
enif_mutex_lock(obj->mtx); enif_mutex_lock(obj->mtx);
if (!obj->alive) { if (!obj->alive) {
ret = enacl_error_tuple(env, "finalized"); ret = enacl_error_finalized(env);
goto done; goto done;
} }
if (!enif_alloc_binary(crypto_sign_BYTES, &sig)) { if (!enif_alloc_binary(crypto_sign_BYTES, &sig)) {
ret = enacl_error_tuple(env, "alloc_failed"); ret = enacl_internal_error(env);
goto done; goto done;
} }
if (0 != crypto_sign_final_create(obj->state, sig.data, &siglen, sk.data)) { crypto_sign_final_create(obj->state, sig.data, &siglen, sk.data);
ret = enacl_error_tuple(env, "sign_error");
goto release;
}
ERL_NIF_TERM ok = enif_make_atom(env, ATOM_OK); ERL_NIF_TERM ok = enif_make_atom(env, ATOM_OK);
ERL_NIF_TERM signature = enif_make_binary(env, &sig); ERL_NIF_TERM signature = enif_make_binary(env, &sig);
@ -179,8 +174,6 @@ ERL_NIF_TERM enacl_crypto_sign_final_create(ErlNifEnv *env, int argc,
bad_arg: bad_arg:
return enif_make_badarg(env); return enif_make_badarg(env);
release:
enif_release_binary(&sig);
cleanup: cleanup:
obj->alive = 0; obj->alive = 0;
sodium_memzero(obj->state, crypto_sign_statebytes()); sodium_memzero(obj->state, crypto_sign_statebytes());
@ -210,7 +203,7 @@ ERL_NIF_TERM enacl_crypto_sign_final_verify(ErlNifEnv *env, int argc,
enif_mutex_lock(obj->mtx); enif_mutex_lock(obj->mtx);
if (!obj->alive) { if (!obj->alive) {
ret = enacl_error_tuple(env, "finalized"); ret = enacl_error_finalized(env);
goto done; goto done;
} }
@ -246,12 +239,12 @@ enacl_crypto_sign_ed25519_keypair(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_sign_ed25519_PUBLICKEYBYTES, &pk)) { if (!enif_alloc_binary(crypto_sign_ed25519_PUBLICKEYBYTES, &pk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (!enif_alloc_binary(crypto_sign_ed25519_SECRETKEYBYTES, &sk)) { if (!enif_alloc_binary(crypto_sign_ed25519_SECRETKEYBYTES, &sk)) {
enif_release_binary(&pk); enif_release_binary(&pk);
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
crypto_sign_ed25519_keypair(pk.data, sk.data); crypto_sign_ed25519_keypair(pk.data, sk.data);
@ -271,13 +264,10 @@ enacl_crypto_sign_ed25519_sk_to_pk(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_sign_ed25519_PUBLICKEYBYTES, &pk)) { if (!enif_alloc_binary(crypto_sign_ed25519_PUBLICKEYBYTES, &pk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (crypto_sign_ed25519_sk_to_pk(pk.data, sk.data) != 0) { crypto_sign_ed25519_sk_to_pk(pk.data, sk.data);
enif_release_binary(&pk);
return enacl_error_tuple(env, "crypto_sign_ed25519_sk_to_pk_failed");
}
return enif_make_binary(env, &pk); return enif_make_binary(env, &pk);
} }
@ -293,14 +283,10 @@ enacl_crypto_sign_ed25519_public_to_curve25519(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_scalarmult_curve25519_BYTES, &curve25519_pk)) { if (!enif_alloc_binary(crypto_scalarmult_curve25519_BYTES, &curve25519_pk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (crypto_sign_ed25519_pk_to_curve25519(curve25519_pk.data, crypto_sign_ed25519_pk_to_curve25519(curve25519_pk.data, ed25519_pk.data);
ed25519_pk.data) != 0) {
enif_release_binary(&curve25519_pk);
return enacl_error_tuple(env, "ed25519_public_to_curve25519_failed");
}
return enif_make_binary(env, &curve25519_pk); return enif_make_binary(env, &curve25519_pk);
} }
@ -316,14 +302,10 @@ enacl_crypto_sign_ed25519_secret_to_curve25519(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_scalarmult_curve25519_BYTES, &curve25519_sk)) { if (!enif_alloc_binary(crypto_scalarmult_curve25519_BYTES, &curve25519_sk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (crypto_sign_ed25519_sk_to_curve25519(curve25519_sk.data, crypto_sign_ed25519_sk_to_curve25519(curve25519_sk.data, ed25519_sk.data);
ed25519_sk.data) != 0) {
enif_release_binary(&curve25519_sk);
return enacl_error_tuple(env, "ed25519_secret_to_curve25519_failed");
}
return enif_make_binary(env, &curve25519_sk); return enif_make_binary(env, &curve25519_sk);
} }
@ -364,12 +346,12 @@ ERL_NIF_TERM enacl_crypto_sign_keypair(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_sign_PUBLICKEYBYTES, &pk)) { if (!enif_alloc_binary(crypto_sign_PUBLICKEYBYTES, &pk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (!enif_alloc_binary(crypto_sign_SECRETKEYBYTES, &sk)) { if (!enif_alloc_binary(crypto_sign_SECRETKEYBYTES, &sk)) {
enif_release_binary(&pk); enif_release_binary(&pk);
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
crypto_sign_keypair(pk.data, sk.data); crypto_sign_keypair(pk.data, sk.data);
@ -387,12 +369,12 @@ ERL_NIF_TERM enacl_crypto_sign_seed_keypair(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_sign_PUBLICKEYBYTES, &pk)) { if (!enif_alloc_binary(crypto_sign_PUBLICKEYBYTES, &pk)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (!enif_alloc_binary(crypto_sign_SECRETKEYBYTES, &sk)) { if (!enif_alloc_binary(crypto_sign_SECRETKEYBYTES, &sk)) {
enif_release_binary(&pk); enif_release_binary(&pk);
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
crypto_sign_seed_keypair(pk.data, sk.data, seed.data); crypto_sign_seed_keypair(pk.data, sk.data, seed.data);
@ -401,11 +383,6 @@ ERL_NIF_TERM enacl_crypto_sign_seed_keypair(ErlNifEnv *env, int argc,
enif_make_binary(env, &sk)); enif_make_binary(env, &sk));
} }
/*
int crypto_sign(unsigned char *sm, unsigned long long *smlen,
const unsigned char *m, unsigned long long mlen,
const unsigned char *sk);
*/
ERL_NIF_TERM enacl_crypto_sign(ErlNifEnv *env, int argc, ERL_NIF_TERM enacl_crypto_sign(ErlNifEnv *env, int argc,
ERL_NIF_TERM const argv[]) { ERL_NIF_TERM const argv[]) {
ErlNifBinary m, sk, sm; ErlNifBinary m, sk, sm;
@ -421,7 +398,7 @@ ERL_NIF_TERM enacl_crypto_sign(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(m.size + crypto_sign_BYTES, &sm)) { if (!enif_alloc_binary(m.size + crypto_sign_BYTES, &sm)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
crypto_sign(sm.data, &smlen, m.data, m.size, sk.data); crypto_sign(sm.data, &smlen, m.data, m.size, sk.data);
@ -429,11 +406,6 @@ ERL_NIF_TERM enacl_crypto_sign(ErlNifEnv *env, int argc,
return enif_make_sub_binary(env, enif_make_binary(env, &sm), 0, smlen); return enif_make_sub_binary(env, enif_make_binary(env, &sm), 0, smlen);
} }
/*
int crypto_sign_open(unsigned char *m, unsigned long long *mlen,
const unsigned char *sm, unsigned long long smlen,
const unsigned char *pk);
*/
ERL_NIF_TERM enacl_crypto_sign_open(ErlNifEnv *env, int argc, ERL_NIF_TERM enacl_crypto_sign_open(ErlNifEnv *env, int argc,
ERL_NIF_TERM const argv[]) { ERL_NIF_TERM const argv[]) {
ErlNifBinary m, sm, pk; ErlNifBinary m, sm, pk;
@ -449,22 +421,20 @@ ERL_NIF_TERM enacl_crypto_sign_open(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(sm.size, &m)) { if (!enif_alloc_binary(sm.size, &m)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
if (0 == crypto_sign_open(m.data, &mlen, sm.data, sm.size, pk.data)) { if (0 == crypto_sign_open(m.data, &mlen, sm.data, sm.size, pk.data)) {
return enif_make_sub_binary(env, enif_make_binary(env, &m), 0, mlen); ERL_NIF_TERM ret_ok = enif_make_atom(env, ATOM_OK);
ERL_NIF_TERM ret_bin =
enif_make_sub_binary(env, enif_make_binary(env, &m), 0, mlen);
return enif_make_tuple2(env, ret_ok, ret_bin);
} else { } else {
enif_release_binary(&m); enif_release_binary(&m);
return enacl_error_tuple(env, "failed_verification"); return enacl_error_tuple(env, "failed_verification");
} }
} }
/*
int crypto_sign_detached(unsigned char *sig, unsigned long long *siglen,
const unsigned char *m, unsigned long long mlen,
const unsigned char *sk);
*/
ERL_NIF_TERM enacl_crypto_sign_detached(ErlNifEnv *env, int argc, ERL_NIF_TERM enacl_crypto_sign_detached(ErlNifEnv *env, int argc,
ERL_NIF_TERM const argv[]) { ERL_NIF_TERM const argv[]) {
ErlNifBinary m, sk, sig; ErlNifBinary m, sk, sig;
@ -480,7 +450,7 @@ ERL_NIF_TERM enacl_crypto_sign_detached(ErlNifEnv *env, int argc,
} }
if (!enif_alloc_binary(crypto_sign_BYTES, &sig)) { if (!enif_alloc_binary(crypto_sign_BYTES, &sig)) {
return enacl_error_tuple(env, "alloc_failed"); return enacl_internal_error(env);
} }
crypto_sign_detached(sig.data, &siglen, m.data, m.size, sk.data); crypto_sign_detached(sig.data, &siglen, m.data, m.size, sk.data);
@ -488,12 +458,6 @@ ERL_NIF_TERM enacl_crypto_sign_detached(ErlNifEnv *env, int argc,
return enif_make_binary(env, &sig); return enif_make_binary(env, &sig);
} }
/*
int crypto_sign_verify_detached(const unsigned char *sig,
const unsigned char *m,
unsigned long long mlen,
const unsigned char *pk);
*/
ERL_NIF_TERM ERL_NIF_TERM
enacl_crypto_sign_verify_detached(ErlNifEnv *env, int argc, enacl_crypto_sign_verify_detached(ErlNifEnv *env, int argc,
ERL_NIF_TERM const argv[]) { ERL_NIF_TERM const argv[]) {

View File

@ -607,24 +607,6 @@ xor_bytes(<<A, As/binary>>, <<B, Bs/binary>>) ->
[A bxor B | xor_bytes(As, Bs)]; [A bxor B | xor_bytes(As, Bs)];
xor_bytes(<<>>, <<>>) -> []. xor_bytes(<<>>, <<>>) -> [].
%% prop_stream_xor_correct() ->
%% ?FORALL({Msg, Nonce, Key},
%% {?FAULT_RATE(1, 40, g_iodata()),
%% ?FAULT_RATE(1, 40, nonce()),
%% ?FAULT_RATE(1, 40, secret_key())},
%% case v_iodata(Msg) andalso nonce_valid(Nonce) andalso secret_key_valid(Key) of
%% true ->
%% Stream = enacl:stream(iolist_size(Msg), Nonce, Key),
%% CipherText = enacl:stream_xor(Msg, Nonce, Key),
%% StreamXor = enacl:stream_xor(CipherText, Nonce, Key),
%% conjunction([
%% {'xor', equals(iolist_to_binary(Msg), StreamXor)},
%% {stream, equals(iolist_to_binary(xor_bytes(Stream, iolist_to_binary(Msg))), CipherText)}
%% ]);
%% false ->
%% badargs(fun() -> enacl:stream_xor(Msg, Nonce, Key) end)
%% end).
%% CRYPTO AUTH %% CRYPTO AUTH
%% ------------------------------------------------------------ %% ------------------------------------------------------------
%% * auth/2 %% * auth/2

View File

@ -30,7 +30,6 @@
box_secret_key_bytes/0, box_secret_key_bytes/0,
box_beforenm_bytes/0, box_beforenm_bytes/0,
%% EQC
sign_keypair_public_size/0, sign_keypair_public_size/0,
sign_keypair_secret_size/0, sign_keypair_secret_size/0,
sign_keypair_seed_size/0, sign_keypair_seed_size/0,
@ -46,7 +45,6 @@
sign_final_create/2, sign_final_create/2,
sign_final_verify/3, sign_final_verify/3,
%% EQC
box_seal/2, box_seal/2,
box_seal_open/3 box_seal_open/3
]). ]).
@ -73,7 +71,6 @@
aead_chacha20poly1305_ietf_ABYTES/0, aead_chacha20poly1305_ietf_ABYTES/0,
aead_chacha20poly1305_ietf_MESSAGEBYTES_MAX/0, aead_chacha20poly1305_ietf_MESSAGEBYTES_MAX/0,
%% No Tests!
aead_xchacha20poly1305_ietf_encrypt/4, aead_xchacha20poly1305_ietf_encrypt/4,
aead_xchacha20poly1305_ietf_decrypt/4, aead_xchacha20poly1305_ietf_decrypt/4,
aead_xchacha20poly1305_ietf_KEYBYTES/0, aead_xchacha20poly1305_ietf_KEYBYTES/0,
@ -111,16 +108,14 @@
generichash_update/2, generichash_update/2,
generichash_final/1, generichash_final/1,
%% No Tests! %% EQC!
shorthash_key_size/0, shorthash_key_size/0,
shorthash_size/0, shorthash_size/0,
shorthash/2, shorthash/2,
%% No Tests!
pwhash/4, pwhash/4,
pwhash_str/3, pwhash_str/3,
%% EQC
pwhash/2, pwhash/2,
pwhash_str/1, pwhash_str/1,
pwhash_str_verify/2 pwhash_str_verify/2
@ -602,10 +597,7 @@ sign(M, SK) ->
PK :: binary(), PK :: binary(),
M :: binary(). M :: binary().
sign_open(SM, PK) -> sign_open(SM, PK) ->
case enacl_nif:crypto_sign_open(SM, PK) of enacl_nif:crypto_sign_open(SM, PK).
M when is_binary(M) -> {ok, M};
{error, Err} -> {error, Err}
end.
%% @doc sign_detached/2 computes a digital signature given a message and a secret key. %% @doc sign_detached/2 computes a digital signature given a message and a secret key.
%% %%
@ -742,17 +734,11 @@ secretbox(Msg, Nonce, Key) ->
secretbox_open(CipherText, Nonce, Key) -> secretbox_open(CipherText, Nonce, Key) ->
case iolist_size(CipherText) of case iolist_size(CipherText) of
K when K =< ?SECRETBOX_SIZE -> K when K =< ?SECRETBOX_SIZE ->
R = case enacl_nif:crypto_secretbox_open_b([?S_BOXZEROBYTES, CipherText], R = enacl_nif:crypto_secretbox_open_b([?S_BOXZEROBYTES, CipherText],
Nonce, Key) of Nonce, Key),
{error, Err} -> {error, Err};
Bin when is_binary(Bin) -> {ok, Bin}
end,
bump(R, ?SECRETBOX_OPEN_REDUCTIONS, ?SECRETBOX_SIZE, K); bump(R, ?SECRETBOX_OPEN_REDUCTIONS, ?SECRETBOX_SIZE, K);
_ -> _ ->
case enacl_nif:crypto_secretbox_open([?S_BOXZEROBYTES, CipherText], Nonce, Key) of enacl_nif:crypto_secretbox_open([?S_BOXZEROBYTES, CipherText], Nonce, Key)
{error, Err} -> {error, Err};
Bin when is_binary(Bin) -> {ok, Bin}
end
end. end.
%% @doc secretbox_nonce_size/0 returns the size of the secretbox nonce %% @doc secretbox_nonce_size/0 returns the size of the secretbox nonce