Open-Transactions  0.93.0-ge03d287
 All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Friends Macros Pages
OTLowLevelKeyData.cpp
Go to the documentation of this file.
1 /************************************************************
2  *
3  * OTLowLevelKeyData.cpp
4  *
5  */
6 
7 /************************************************************
8  -----BEGIN PGP SIGNED MESSAGE-----
9  Hash: SHA1
10 
11  * OPEN TRANSACTIONS
12  *
13  * Financial Cryptography and Digital Cash
14  * Library, Protocol, API, Server, CLI, GUI
15  *
16  * -- Anonymous Numbered Accounts.
17  * -- Untraceable Digital Cash.
18  * -- Triple-Signed Receipts.
19  * -- Cheques, Vouchers, Transfers, Inboxes.
20  * -- Basket Currencies, Markets, Payment Plans.
21  * -- Signed, XML, Ricardian-style Contracts.
22  * -- Scripted smart contracts.
23  *
24  * Copyright (C) 2010-2013 by "Fellow Traveler" (A pseudonym)
25  *
26  * EMAIL:
28  *
29  * BITCOIN: 1NtTPVVjDsUfDWybS4BwvHpG2pdS9RnYyQ
30  *
31  * KEY FINGERPRINT (PGP Key in license file):
32  * 9DD5 90EB 9292 4B48 0484 7910 0308 00ED F951 BB8E
33  *
34  * OFFICIAL PROJECT WIKI(s):
35  * https://github.com/FellowTraveler/Moneychanger
36  * https://github.com/FellowTraveler/Open-Transactions/wiki
37  *
38  * WEBSITE:
39  * http://www.OpenTransactions.org/
40  *
41  * Components and licensing:
42  * -- Moneychanger..A Java client GUI.....LICENSE:.....GPLv3
43  * -- otlib.........A class library.......LICENSE:...LAGPLv3
44  * -- otapi.........A client API..........LICENSE:...LAGPLv3
45  * -- opentxs/ot....Command-line client...LICENSE:...LAGPLv3
46  * -- otserver......Server Application....LICENSE:....AGPLv3
47  * Github.com/FellowTraveler/Open-Transactions/wiki/Components
48  *
49  * All of the above OT components were designed and written by
50  * Fellow Traveler, with the exception of Moneychanger, which
51  * was contracted out to Vicky C ([email protected]).
52  * The open-source community has since actively contributed.
53  *
54  * -----------------------------------------------------
55  *
56  * LICENSE:
57  * This program is free software: you can redistribute it
58  * and/or modify it under the terms of the GNU Affero
59  * General Public License as published by the Free Software
60  * Foundation, either version 3 of the License, or (at your
61  * option) any later version.
62  *
63  * ADDITIONAL PERMISSION under the GNU Affero GPL version 3
64  * section 7: (This paragraph applies only to the LAGPLv3
65  * components listed above.) If you modify this Program, or
66  * any covered work, by linking or combining it with other
67  * code, such other code is not for that reason alone subject
68  * to any of the requirements of the GNU Affero GPL version 3.
69  * (==> This means if you are only using the OT API, then you
70  * don't have to open-source your code--only your changes to
71  * Open-Transactions itself must be open source. Similar to
72  * LGPLv3, except it applies to software-as-a-service, not
73  * just to distributing binaries.)
74  *
75  * Extra WAIVER for OpenSSL, Lucre, and all other libraries
76  * used by Open Transactions: This program is released under
77  * the AGPL with the additional exemption that compiling,
78  * linking, and/or using OpenSSL is allowed. The same is true
79  * for any other open source libraries included in this
80  * project: complete waiver from the AGPL is hereby granted to
81  * compile, link, and/or use them with Open-Transactions,
82  * according to their own terms, as long as the rest of the
83  * Open-Transactions terms remain respected, with regard to
84  * the Open-Transactions code itself.
85  *
86  * Lucre License:
87  * This code is also "dual-license", meaning that Ben Lau-
88  * rie's license must also be included and respected, since
89  * the code for Lucre is also included with Open Transactions.
90  * See Open-Transactions/src/otlib/lucre/LUCRE_LICENSE.txt
91  * The Laurie requirements are light, but if there is any
92  * problem with his license, simply remove the Lucre code.
93  * Although there are no other blind token algorithms in Open
94  * Transactions (yet. credlib is coming), the other functions
95  * will continue to operate.
96  * See Lucre on Github: https://github.com/benlaurie/lucre
97  * -----------------------------------------------------
98  * You should have received a copy of the GNU Affero General
99  * Public License along with this program. If not, see:
100  * http://www.gnu.org/licenses/
101  *
102  * If you would like to use this software outside of the free
103  * software license, please contact FellowTraveler.
104  * (Unfortunately many will run anonymously and untraceably,
105  * so who could really stop them?)
106  *
107  * DISCLAIMER:
108  * This program is distributed in the hope that it will be
109  * useful, but WITHOUT ANY WARRANTY; without even the implied
110  * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
111  * PURPOSE. See the GNU Affero General Public License for
112  * more details.
113 
114  -----BEGIN PGP SIGNATURE-----
115  Version: GnuPG v1.4.9 (Darwin)
116 
117  iQIcBAEBAgAGBQJRSsfJAAoJEAMIAO35UbuOQT8P/RJbka8etf7wbxdHQNAY+2cC
118  vDf8J3X8VI+pwMqv6wgTVy17venMZJa4I4ikXD/MRyWV1XbTG0mBXk/7AZk7Rexk
119  KTvL/U1kWiez6+8XXLye+k2JNM6v7eej8xMrqEcO0ZArh/DsLoIn1y8p8qjBI7+m
120  aE7lhstDiD0z8mwRRLKFLN2IH5rAFaZZUvj5ERJaoYUKdn4c+RcQVei2YOl4T0FU
121  LWND3YLoH8naqJXkaOKEN4UfJINCwxhe5Ke9wyfLWLUO7NamRkWD2T7CJ0xocnD1
122  sjAzlVGNgaFDRflfIF4QhBx1Ddl6wwhJfw+d08bjqblSq8aXDkmFA7HeunSFKkdn
123  oIEOEgyj+veuOMRJC5pnBJ9vV+7qRdDKQWaCKotynt4sWJDGQ9kWGWm74SsNaduN
124  TPMyr9kNmGsfR69Q2Zq/FLcLX/j8ESxU+HYUB4vaARw2xEOu2xwDDv6jt0j3Vqsg
125  x7rWv4S/Eh18FDNDkVRChiNoOIilLYLL6c38uMf1pnItBuxP3uhgY6COm59kVaRh
126  nyGTYCDYD2TK+fI9o89F1297uDCwEJ62U0Q7iTDp5QuXCoxkPfv8/kX6lS6T3y9G
127  M9mqIoLbIQ1EDntFv7/t6fUTS2+46uCrdZWbQ5RjYXdrzjij02nDmJAm2BngnZvd
128  kamH0Y/n11lCvo1oQxM+
129  =uSzz
130  -----END PGP SIGNATURE-----
131  **************************************************************/
132 
133 #include "stdafx.hpp"
134 
136 
137 #include "crypto/OTKeypair.hpp"
138 #include "OTLog.hpp"
139 
140 #if defined(OT_CRYPTO_USING_OPENSSL)
141 
143 
144 namespace opentxs
145 {
146 
148 {
149 public:
150  X509* m_pX509;
151  EVP_PKEY* m_pKey; // Instantiated form of key. (For private keys especially,
152  // we don't want it instantiated for any longer than
153  // absolutely necessary.)
154 };
155 
156 } // namespace opentxs
157 
158 #endif
159 
160 namespace opentxs
161 {
162 
164 {
165  if (m_bCleanup) Cleanup();
166  if (nullptr != dp) delete (dp);
167 }
168 
169 #if defined(OT_CRYPTO_USING_OPENSSL)
170 
172  : m_bCleanup(true)
173 {
175  dp->m_pX509 = nullptr;
176  dp->m_pKey = nullptr;
177 }
178 
179 // Don't force things by explicitly calling this function, unless you are SURE
180 // there's no one else cleaning up the same objects. Notice the if (m_bCleanup)
181 // just above in the destructor, for that very reason.
182 //
184 {
185  if (nullptr != dp->m_pKey) EVP_PKEY_free(dp->m_pKey);
186  dp->m_pKey = nullptr;
187  if (nullptr != dp->m_pX509) X509_free(dp->m_pX509);
188  dp->m_pX509 = nullptr;
189 }
190 
192 {
193 
194  // OpenSSL_BIO bio_err = nullptr;
195  X509* x509 = nullptr;
196  EVP_PKEY* pNewKey = nullptr;
197 
198  // CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); // memory leak detection.
199  // Leaving this for now.
200  // bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
201 
202  // actually generate the things. // TODO THESE PARAMETERS...(mkcert)
203  mkcert(&x509, &pNewKey, nBits, 0, 3650); // 3650=10 years. Todo hardcoded.
204  // Note: 512 bit key CRASHES
205  // 1024 is apparently a minimum requirement, if not an only requirement.
206  // Will need to go over just what sorts of keys are involved here... todo.
207 
208  if (nullptr == x509) {
209  otErr << __FUNCTION__
210  << ": Failed attempting to generate new x509 cert.\n";
211 
212  if (nullptr != pNewKey) EVP_PKEY_free(pNewKey);
213  pNewKey = nullptr;
214 
215  return false;
216  }
217 
218  if (nullptr == pNewKey) {
219  otErr << __FUNCTION__
220  << ": Failed attempting to generate new private key.\n";
221 
222  if (nullptr != x509) X509_free(x509);
223  x509 = nullptr;
224 
225  return false;
226  }
227 
228  // Below this point, x509 and pNewKey will need to be cleaned up properly.
229 
230  if (m_bCleanup) Cleanup();
231 
232  m_bCleanup = true;
233  dp->m_pKey = pNewKey;
234  dp->m_pX509 = x509;
235 
236  // --------COMMENT THIS OUT FOR PRODUCTION -------- TODO security
237  // (Debug only.)
238  // RSA_print_fp(stdout, pNewKey->pkey.rsa, 0); // human readable
239  // X509_print_fp(stdout, x509); // human readable
240 
241  // --------COMMENT THIS OUT FOR PRODUCTION -------- TODO security
242  // (Debug only.)
243  // write the private key, then the x509, to stdout.
244 
245  // OTPasswordData thePWData2("OTPseudonym::GenerateNym is calling
246  // PEM_write_PrivateKey...");
247  //
248  // PEM_write_PrivateKey(stdout, pNewKey, EVP_des_ede3_cbc(), nullptr, 0,
249  // OTAsymmetricKey::GetPasswordCallback(), &thePWData2);
250  // PEM_write_X509(stdout, x509);
251 
252  return true;
253 }
254 
256 {
257  OT_ASSERT(nullptr != dp->m_pKey);
258  OT_ASSERT(nullptr != dp->m_pX509);
259 
260  OT_ASSERT(nullptr != theKeypair.m_pkeyPublic);
261  OT_ASSERT(nullptr != theKeypair.m_pkeyPrivate);
262 
263  // Since we are in OpenSSL-specific code, we have to make sure these are
264  // OpenSSL-specific keys.
265  //
266  OTAsymmetricKey_OpenSSL* pPublicKey =
267  dynamic_cast<OTAsymmetricKey_OpenSSL*>(theKeypair.m_pkeyPublic);
268  OTAsymmetricKey_OpenSSL* pPrivateKey =
269  dynamic_cast<OTAsymmetricKey_OpenSSL*>(theKeypair.m_pkeyPrivate);
270 
271  if (nullptr == pPublicKey) {
272  otErr << __FUNCTION__ << ": dynamic_cast to OTAsymmetricKey_OpenSSL "
273  "failed. (theKeypair.m_pkeyPublic)\n";
274  return false;
275  }
276  if (nullptr == pPrivateKey) {
277  otErr << __FUNCTION__ << ": dynamic_cast to OTAsymmetricKey_OpenSSL "
278  "failed. (theKeypair.m_pkeyPrivate)\n";
279  return false;
280  }
281 
282  // Now we can call OpenSSL-specific methods on these keys...
283  //
284  pPublicKey->SetAsPublic();
285  // EVP_PKEY * pEVP_PubKey = X509_get_pubkey(m_pX509);
286  // OT_ASSERT(nullptr != pEVP_PubKey);
287  // pPublicKey-> SetKeyAsCopyOf(*pEVP_PubKey); // bool bIsPrivateKey=false
288  // by default.
289  pPublicKey->dp->SetKeyAsCopyOf(
290  *dp->m_pKey); // bool bIsPrivateKey=false by default.
291  // EVP_PKEY_free(pEVP_PubKey);
292  // pEVP_PubKey = nullptr;
293 
294  pPublicKey->dp->SetX509(dp->m_pX509); // m_pX509 is now owned by pPublicKey.
295  // (No need to free it in our own
296  // destructor anymore.)
297  dp->m_pX509 =
298  nullptr; // pPublicKey took ownership, so we don't want to ALSO
299  // clean it up, since pPublicKey already will do so.
300 
301  pPrivateKey->SetAsPrivate();
302  pPrivateKey->dp->SetKeyAsCopyOf(
303  *dp->m_pKey, true); // bool bIsPrivateKey=true; (Default is false)
304  // Since pPrivateKey only takes a COPY of m_pKey, we are still responsible
305  // to clean up m_pKey in our own destructor.
306  // (Assuming m_bCleanup is set to true, which is the default.) That's why
307  // I'm NOT setting it to nullptr, as I did above
308  // with m_pX509.
309 
310  EVP_PKEY_free(dp->m_pKey);
311  dp->m_pKey = nullptr;
312 
313  // Success! At this point, theKeypair's public and private keys have been
314  // set.
315  // Keep in mind though, they still won't be "quite right" until saved and
316  // loaded
317  // again, at least according to existing logic. That saving/reloading is
318  // currently
319  // performed in OTPseudonym::GenerateNym().
320  //
321  return true;
322 }
323 
324 #elif defined(OT_CRYPTO_USING_GPG)
325 
326 #else
327 
328 #endif
329 
330 } // namespace opentxs
bool MakeNewKeypair(int32_t nBits=1024)
#define OT_ASSERT(x)
Definition: Assert.hpp:150
OTLOG_IMPORT OTLogStream otErr
OTAsymmetricKey_OpenSSLPrivdp * dp
int32_t mkcert(X509 **x509p, EVP_PKEY **pkeyp, int32_t bits, int32_t serial, int32_t days)
Definition: mkcert.cpp:52
bool SetOntoKeypair(OTKeypair &theKeypair)
OTLowLevelKeyDataOpenSSLdp * dp