2018-04-19 09:27:55 +03:00
|
|
|
/+ tester
|
2018-04-27 23:31:18 +03:00
|
|
|
=, eyre
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
:::: %zuse additions
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
|
|
|
:: |base64: flexible base64 encoding for little-endian atoms
|
|
|
|
::
|
|
|
|
++ base64
|
|
|
|
:: pad: include padding when encoding, require when decoding
|
|
|
|
:: url: use url-safe characters '-' for '+' and '_' for '/'
|
|
|
|
::
|
|
|
|
=+ [pad=& url=|]
|
|
|
|
|%
|
|
|
|
:: +en:base64: encode atom to base64 cord
|
|
|
|
::
|
|
|
|
++ en
|
2018-04-30 19:17:53 +03:00
|
|
|
|= tig=@
|
|
|
|
^- cord
|
|
|
|
=/ poc (~(dif fo 3) 0 (met 3 tig))
|
|
|
|
=/ pad (lsh 3 poc (swp 3 tig))
|
|
|
|
=/ cha
|
|
|
|
?: url
|
|
|
|
'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_'
|
|
|
|
'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/'
|
|
|
|
%- crip
|
|
|
|
%- flop
|
|
|
|
%+ weld
|
|
|
|
?.(^pad ~ (reap poc '='))
|
|
|
|
%+ slag poc
|
|
|
|
|- ^- tape
|
|
|
|
?~ pad ~
|
|
|
|
=/ d (end 3 3 pad)
|
|
|
|
:* (cut 3 [(cut 0 [0 6] d) 1] cha)
|
|
|
|
(cut 3 [(cut 0 [6 6] d) 1] cha)
|
|
|
|
(cut 3 [(cut 0 [12 6] d) 1] cha)
|
|
|
|
(cut 3 [(cut 0 [18 6] d) 1] cha)
|
|
|
|
$(pad (rsh 3 3 pad))
|
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +de:base64: decode base64 cord to (unit @)
|
|
|
|
::
|
|
|
|
++ de
|
2018-04-30 19:17:53 +03:00
|
|
|
|= a=cord
|
|
|
|
^- (unit @)
|
|
|
|
%+ rush a
|
2018-05-25 10:28:26 +03:00
|
|
|
:: XX refactor and expose parser combinator
|
2018-04-30 19:17:53 +03:00
|
|
|
%+ cook (cury swp 3)
|
|
|
|
%+ bass 64
|
|
|
|
%+ cook welp
|
|
|
|
;~ plug
|
|
|
|
%- plus
|
|
|
|
;~ pose
|
|
|
|
(cook |=(a=@ (sub a 'A')) (shim 'A' 'Z'))
|
|
|
|
(cook |=(a=@ (sub a 'G')) (shim 'a' 'z'))
|
|
|
|
(cook |=(a=@ (add a 4)) (shim '0' '9'))
|
|
|
|
(cold 62 (just ?:(url '-' '+')))
|
|
|
|
(cold 63 (just ?:(url '_' '/')))
|
|
|
|
==
|
|
|
|
?: pad
|
|
|
|
(stun 0^2 (cold %0 tis))
|
|
|
|
=/ b (~(dif fo 4) 0 (met 3 a))
|
|
|
|
(cold (reap b %0) (easy ~))
|
|
|
|
==
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +en-base64url: url-safe base64 encoding, without padding
|
2018-04-30 19:17:53 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
++ en-base64url
|
|
|
|
~(en base64 | &)
|
|
|
|
:: +de-base64url: url-safe base64 decoding, without padding
|
2018-04-30 19:17:53 +03:00
|
|
|
::
|
|
|
|
++ de-base64url
|
|
|
|
~(de base64 | &)
|
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
:::: %/lib/pkcs
|
|
|
|
::
|
|
|
|
:: |asn1: small selection of types and constants for ASN.1
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: A minimal representation of some basic ASN.1 types,
|
|
|
|
:: created to support PKCS keys, digests, and cert requests.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-18 01:10:24 +03:00
|
|
|
++ asn1
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +bespoke:asn1: context-specific, generic ASN.1 tag type
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Note that *explicit* implies *constructed* (ie, bit 5 is set in DER).
|
2018-05-25 21:45:16 +03:00
|
|
|
::
|
|
|
|
+= bespoke
|
|
|
|
:: imp: & is implicit, | is explicit
|
|
|
|
:: tag: 5 bits for the custom tag number
|
|
|
|
::
|
|
|
|
[imp=? tag=@ud]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +spec:asn1: minimal representations of basic ASN.1 types
|
2018-05-25 21:45:16 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
+= spec
|
|
|
|
$% :: %int: arbitrary-sized, unsigned integers
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Unsigned integers, represented as having a positive sign.
|
|
|
|
:: Negative integers would be two's complement in DER,
|
|
|
|
:: but we don't need them.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%int int=@u]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %bit: very minimal support for bit strings
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Specifically, values must already be padded and byte-aligned.
|
|
|
|
:: Note that leading zeros are significant in ASN.1 bit strings,
|
|
|
|
:: so atomic encoding would be insufficient for complete support.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%bit bit=@ux]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %oct: octets in little-endian byte order
|
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%oct oct=@ux]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %nul: fully supported!
|
|
|
|
::
|
|
|
|
[%nul ~]
|
|
|
|
:: %obj: object identifiers, pre-packed
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Object identifiers are technically a sequence of integers,
|
|
|
|
:: represented here in their already-encoded form.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%obj obj=@ux]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %seq: a list of specs
|
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%seq seq=(list spec)]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %set: a logical set of specs
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Implemented here as a list for the sake of simplicity.
|
|
|
|
:: must be already deduplicated and sorted!
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%set set=(list spec)]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: %con: context-specific
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: General support for context-specific tags.
|
|
|
|
:: bes: custom tag number, implicit or explicit
|
|
|
|
:: con: already-encoded bytes
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%con bes=bespoke con=(list @D)]
|
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |obj:asn1: constant object ids, pre-encoded
|
|
|
|
::
|
|
|
|
++ obj
|
2018-05-18 01:10:24 +03:00
|
|
|
|% :: rfc4055
|
|
|
|
++ sha-256 0x1.0204.0365.0148.8660 :: 2.16.840.1.101.3.4.2.1
|
|
|
|
++ rsa 0x1.0101.0df7.8648.862a :: 1.2.840.113549.1.1.1
|
|
|
|
++ rsa-sha-256 0xb.0101.0df7.8648.862a :: 1.2.840.113549.1.1.11
|
|
|
|
:: rfc2985
|
|
|
|
++ csr-ext 0xe.0901.0df7.8648.862a :: 1.2.840.113549.1.9.14
|
|
|
|
:: rfc3280
|
|
|
|
++ sub-alt 0x11.1d55 :: 2.5.29.17
|
2018-05-17 21:27:15 +03:00
|
|
|
--
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |der: distinguished encoding rules for ASN.1
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: DER is a tag-length-value binary encoding for ASN.1, designed
|
|
|
|
:: so that there is only one (distinguished) valid encoding for an
|
|
|
|
:: instance of a type.
|
2018-05-25 21:45:16 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
++ der
|
|
|
|
|%
|
|
|
|
:: +en:der: encode +spec:asn1 to atom
|
|
|
|
::
|
|
|
|
++ en
|
2018-05-17 21:27:15 +03:00
|
|
|
=< |=(a=spec:asn1 `@ux`(rep 3 ~(ren raw a)))
|
2018-05-25 21:45:16 +03:00
|
|
|
|%
|
|
|
|
:: +raw:en:der: door for encoding +spec:asn1 to list of bytes
|
|
|
|
::
|
|
|
|
++ raw
|
2018-05-17 21:27:15 +03:00
|
|
|
|_ pec=spec:asn1
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +ren:raw:en:der: render +spec:asn1 to tag-length-value bytes
|
|
|
|
::
|
|
|
|
++ ren
|
|
|
|
^- (list @D)
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ a lem
|
|
|
|
[tag (weld (len a) a)]
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +tag:raw:en:der: tag byte
|
|
|
|
::
|
|
|
|
++ tag
|
|
|
|
^- @D
|
2018-05-17 21:27:15 +03:00
|
|
|
?- pec
|
|
|
|
[%int *] 2
|
|
|
|
[%bit *] 3
|
|
|
|
[%oct *] 4
|
|
|
|
[%nul *] 5
|
|
|
|
[%obj *] 6
|
2018-05-25 21:45:16 +03:00
|
|
|
[%seq *] 48 :: constructed: (con 0x20 16)
|
|
|
|
[%set *] 49 :: constructed: (con 0x20 17)
|
|
|
|
[%con *] ;: con
|
|
|
|
0x80 :: context-specifc
|
|
|
|
?:(imp.bes.pec 0 0x20) :: implicit?
|
|
|
|
(dis 0x1f tag.bes.pec) :: 5 bits of custom tag
|
|
|
|
==
|
2018-05-17 21:27:15 +03:00
|
|
|
==
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +lem:raw:en:der: element bytes
|
|
|
|
::
|
|
|
|
++ lem
|
|
|
|
^- (list @D)
|
2018-05-17 21:27:15 +03:00
|
|
|
?- pec
|
2018-05-25 21:45:16 +03:00
|
|
|
:: unsigned only, interpreted as positive-signed and
|
|
|
|
:: rendered in big-endian byte order. negative-signed would
|
|
|
|
:: be two's complement
|
|
|
|
::
|
|
|
|
[%int *] =/ a (flop (rip 3 int.pec))
|
2018-05-17 21:27:15 +03:00
|
|
|
?~ a [0 ~]
|
|
|
|
?:((lte i.a 127) a [0 a])
|
2018-05-25 21:45:16 +03:00
|
|
|
:: presumed to be already padded to a byte boundary
|
2018-05-17 21:27:15 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%bit *] [0 (rip 3 bit.pec)]
|
|
|
|
[%oct *] (rip 3 oct.pec)
|
2018-05-17 21:27:15 +03:00
|
|
|
[%nul *] ~
|
2018-05-25 21:45:16 +03:00
|
|
|
[%obj *] (rip 3 obj.pec)
|
2018-05-17 21:27:15 +03:00
|
|
|
::
|
|
|
|
[%seq *] %- zing
|
|
|
|
|- ^- (list (list @))
|
2018-05-25 21:45:16 +03:00
|
|
|
?~ seq.pec ~
|
|
|
|
:- ren(pec i.seq.pec)
|
|
|
|
$(seq.pec t.seq.pec)
|
|
|
|
:: presumed to be already deduplicated and sorted
|
2018-05-17 21:27:15 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%set *] %- zing
|
2018-05-17 21:27:15 +03:00
|
|
|
|- ^- (list (list @))
|
2018-05-25 21:45:16 +03:00
|
|
|
?~ set.pec ~
|
|
|
|
:- ren(pec i.set.pec)
|
|
|
|
$(set.pec t.set.pec)
|
|
|
|
:: already constructed
|
2018-05-17 21:27:15 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
[%con *] con.pec
|
2018-05-17 21:27:15 +03:00
|
|
|
==
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +len:raw:en:der: length bytes
|
|
|
|
::
|
|
|
|
++ len
|
|
|
|
|= a=(list @D)
|
|
|
|
^- (list @D)
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ b (lent a)
|
|
|
|
?: (lte b 127)
|
2018-05-18 01:10:24 +03:00
|
|
|
[b ~] :: note: big-endian
|
2018-05-17 21:27:15 +03:00
|
|
|
[(con 0x80 (met 3 b)) (flop (rip 3 b))]
|
|
|
|
--
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +de:der: decode atom to +spec:asn1
|
|
|
|
::
|
|
|
|
++ de
|
2018-05-25 21:45:16 +03:00
|
|
|
=< |=(a=@ `(unit spec:asn1)`(rush a parse))
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +parse:de:der: DER parser combinator
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
++ parse
|
2018-05-25 10:28:26 +03:00
|
|
|
%+ cook |*(a=* `spec:asn1`a) :: XX fix
|
2018-05-17 21:27:15 +03:00
|
|
|
:: ^- $-(nail (like spec:asn1))
|
|
|
|
;~ pose
|
2018-05-17 23:31:33 +03:00
|
|
|
(stag %int (bass 256 (sear int ;~(pfix (tag 2) till))))
|
|
|
|
(stag %bit (boss 256 (cook tail ;~(pfix (tag 3) till)))) :: XX test
|
|
|
|
(stag %oct (boss 256 ;~(pfix (tag 4) till)))
|
|
|
|
(stag %nul (cold ~ ;~(plug (tag 5) (tag 0))))
|
|
|
|
(stag %obj (boss 256 ;~(pfix (tag 6) till)))
|
|
|
|
(stag %seq (sear recur ;~(pfix (tag 48) till)))
|
|
|
|
(stag %set (sear recur ;~(pfix (tag 49) till)))
|
|
|
|
(stag %con ;~(plug (sear context next) till))
|
2018-05-17 21:27:15 +03:00
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +tag:de:der: parse tag byte
|
|
|
|
::
|
|
|
|
++ tag
|
2018-05-25 21:45:16 +03:00
|
|
|
|=(a=@D (just a))
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +int:de:der: sear unsigned big-endian bytes
|
|
|
|
::
|
|
|
|
++ int
|
2018-05-25 21:45:16 +03:00
|
|
|
|= a=(list @D)
|
|
|
|
^- (unit (list @D))
|
2018-05-17 23:31:33 +03:00
|
|
|
?~ a ~
|
|
|
|
?: ?=([@ ~] a) `a
|
|
|
|
?. =(0 i.a) `a
|
|
|
|
?.((gth i.t.a 127) ~ `t.a)
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +recur:de:der: parse bytes for a list of +spec:asn1
|
2018-05-17 23:31:33 +03:00
|
|
|
::
|
|
|
|
++ recur
|
2018-05-25 21:45:16 +03:00
|
|
|
|=(a=(list @) (rust a (star parse)))
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +context:de:der: decode context-specific tag byte
|
|
|
|
::
|
|
|
|
++ context
|
2018-05-25 21:45:16 +03:00
|
|
|
|= a=@D
|
|
|
|
^- (unit bespoke:asn1)
|
2018-05-17 23:31:33 +03:00
|
|
|
?. =(1 (cut 0 [7 1] a)) ~
|
|
|
|
:+ ~
|
|
|
|
=(1 (cut 0 [5 1] a))
|
|
|
|
(dis 0x1f a)
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +till:de:der: parser combinator for len-prefixed bytes
|
|
|
|
::
|
|
|
|
:: advance until
|
|
|
|
::
|
|
|
|
++ till
|
2018-05-17 21:27:15 +03:00
|
|
|
|= tub/nail
|
|
|
|
^- (like (list @D))
|
|
|
|
?~ q.tub
|
|
|
|
(fail tub)
|
2018-05-25 21:45:16 +03:00
|
|
|
:: fuz: first byte - length, or length of the length
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-17 21:27:15 +03:00
|
|
|
=* fuz i.q.tub
|
2018-05-25 21:45:16 +03:00
|
|
|
:: nex: offset of value bytes from fuz
|
|
|
|
:: len: length of value bytes
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-17 21:27:15 +03:00
|
|
|
=+ ^- [nex=@ len=@]
|
2018-05-25 21:45:16 +03:00
|
|
|
:: faz: meaningful bits in fuz
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ faz (end 0 7 fuz)
|
|
|
|
?: =(0 (cut 0 [7 1] fuz))
|
|
|
|
[0 faz]
|
|
|
|
[faz (rep 3 (flop (scag faz t.q.tub)))]
|
|
|
|
?: ?& !=(0 nex)
|
|
|
|
!=(nex (met 3 len))
|
|
|
|
==
|
|
|
|
(fail tub)
|
2018-05-25 21:45:16 +03:00
|
|
|
:: zuf: value bytes
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ zuf (swag [nex len] t.q.tub)
|
|
|
|
?. =(len (lent zuf))
|
|
|
|
(fail tub)
|
2018-05-25 21:45:16 +03:00
|
|
|
:: zaf: product nail
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ zaf [p.p.tub (add +(nex) q.p.tub)]
|
|
|
|
[zaf `[zuf zaf (slag (add nex len) t.q.tub)]]
|
|
|
|
--
|
2018-04-27 23:31:18 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |rsa: primitive, textbook RSA
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Unpadded, unsafe, unsuitable for encryption!
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ rsa
|
|
|
|
|%
|
|
|
|
:: +key:rsa: rsa public or private key
|
|
|
|
::
|
2018-05-16 22:38:50 +03:00
|
|
|
+= key
|
2018-05-25 10:28:26 +03:00
|
|
|
$: :: pub: public parameters (n=modulus, e=pub-exponent)
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-25 10:28:26 +03:00
|
|
|
pub=[n=@ux e=@ux]
|
|
|
|
:: sek: secret parameters (d=private-exponent, p/q=primes)
|
2018-05-28 08:57:58 +03:00
|
|
|
::
|
2018-05-16 22:38:50 +03:00
|
|
|
sek=(unit [d=@ux p=@ux q=@ux])
|
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +elcm:rsa: carmichael totient
|
|
|
|
::
|
|
|
|
++ elcm
|
2018-04-30 21:53:58 +03:00
|
|
|
|= [a=@ b=@]
|
|
|
|
(div (mul a b) d:(egcd a b))
|
2018-05-28 08:57:58 +03:00
|
|
|
:: +new-key:rsa: write somethingXXX
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ new-key
|
2018-04-30 21:53:58 +03:00
|
|
|
=/ e `@ux`65.537
|
|
|
|
|= [wid=@ eny=@]
|
|
|
|
^- key
|
|
|
|
=/ diw (rsh 0 1 wid)
|
|
|
|
=/ p=@ux (ramp:number diw [3 5 ~] eny)
|
|
|
|
=/ q=@ux (ramp:number diw [3 5 ~] +(eny))
|
|
|
|
=/ n=@ux (mul p q)
|
|
|
|
=/ d=@ux (~(inv fo (elcm (dec p) (dec q))) e)
|
2018-05-16 22:38:50 +03:00
|
|
|
[[n e] `[d p q]]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +en:rsa: primitive RSA encryption
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: ciphertext = message^e (mod n)
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ en
|
2018-04-30 21:53:58 +03:00
|
|
|
|= [m=@ k=key]
|
|
|
|
~| %rsa-len
|
2018-05-16 22:38:50 +03:00
|
|
|
?> (lte (met 0 m) (met 0 n.pub.k))
|
|
|
|
(~(exp fo n.pub.k) e.pub.k m)
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +de:rsa: primitive RSA decryption
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: message = ciphertext^d (mod e)
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-26 00:14:40 +03:00
|
|
|
++ de
|
2018-04-30 21:53:58 +03:00
|
|
|
|= [m=@ k=key]
|
|
|
|
:: XX assert rsa-len here too?
|
2018-05-16 22:38:50 +03:00
|
|
|
~| %rsa-need-ring
|
|
|
|
?> ?=(^ sek.k)
|
|
|
|
=/ fu (fu:number p.u.sek.k q.u.sek.k)
|
|
|
|
(out.fu (exp.fu d.u.sek.k (sit.fu m)))
|
2018-04-30 21:53:58 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +rs256: RSA signatures over a sha-256 digest
|
|
|
|
::
|
|
|
|
++ rs256
|
2018-04-19 09:27:55 +03:00
|
|
|
|_ k=key:rsa
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +emsa:rs256: message digest
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Padded, DER encoded sha-256 hash (EMSA-PKCS1-v1_5).
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ emsa
|
2018-04-28 06:52:52 +03:00
|
|
|
|= m=@
|
2018-05-16 22:38:50 +03:00
|
|
|
=/ emlen (met 3 n.pub.k)
|
2018-04-28 06:52:52 +03:00
|
|
|
=/ pec=spec:asn1
|
|
|
|
:~ %seq
|
|
|
|
[%seq [%obj sha-256:obj:asn1] [%nul ~] ~]
|
|
|
|
[%oct (shax m)]
|
|
|
|
==
|
2018-05-17 21:27:15 +03:00
|
|
|
=/ t=(list @) ~(ren raw:en:der pec)
|
2018-05-08 21:02:56 +03:00
|
|
|
=/ tlen (lent t)
|
|
|
|
?: (lth emlen (add 11 tlen))
|
|
|
|
~|(%emsa-too-short !!)
|
|
|
|
=/ ps (reap (sub emlen (add 3 tlen)) 0xff)
|
|
|
|
%+ rep 3
|
2018-05-18 01:10:24 +03:00
|
|
|
(flop (weld [0x0 0x1 ps] [0x0 t])) :: note: big-endian
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +sign:rs256: sign message
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: An RSA signature is the primitive decryption of the message hash.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ sign
|
|
|
|
|=(m=@ (de:rsa (emsa m) k))
|
|
|
|
:: +verify:rs256: verify signature
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: RSA signature verification confirms that the primitive encryption
|
|
|
|
:: of the signature matches the message hash.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ verify
|
2018-04-19 09:27:55 +03:00
|
|
|
|= [s=@ m=@]
|
2018-05-08 21:02:56 +03:00
|
|
|
=((emsa m) (en:rsa s k))
|
2018-04-19 09:27:55 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |pem: generic PEM implementation (rfc7468)
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: PEM is the base64 encoding of DER encoded data, with BEGIN and
|
|
|
|
:: END labels indicating some type.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ pem
|
|
|
|
|%
|
|
|
|
:: +en:pem: PEM encode
|
|
|
|
::
|
|
|
|
++ en
|
2018-05-17 08:40:22 +03:00
|
|
|
|= [lab=@t der=@ux]
|
|
|
|
^- wain
|
|
|
|
:: XX validate label?
|
|
|
|
:- (rap 3 ['-----BEGIN ' lab '-----' ~])
|
|
|
|
=/ a (en:base64 der)
|
|
|
|
|- ^- wain
|
|
|
|
?~ a
|
|
|
|
[(rap 3 ['-----END ' lab '-----' ~]) ~]
|
|
|
|
[(end 3 64 a) $(a (rsh 3 64 a))]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +de:pem: PEM decode
|
|
|
|
::
|
|
|
|
++ de
|
2018-05-17 08:40:22 +03:00
|
|
|
|= [lab=@t mep=wain]
|
|
|
|
^- (unit @ux)
|
|
|
|
=/ a (sub (lent mep) 2)
|
|
|
|
?~ mep ~
|
|
|
|
:: XX validate label?
|
|
|
|
?. =((rap 3 ['-----BEGIN ' lab '-----' ~]) i.mep) ~
|
|
|
|
?. =((rap 3 ['-----END ' lab '-----' ~]) (snag a t.mep)) ~
|
|
|
|
(de:base64 (rap 3 (scag a t.mep)))
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |pkcs1: RSA asymmetric cryptography (rfc3447)
|
|
|
|
::
|
|
|
|
++ pkcs1
|
|
|
|
|%
|
|
|
|
:: |spec:pkcs1: ASN.1 specs for RSA keys
|
|
|
|
::
|
2018-05-17 08:40:22 +03:00
|
|
|
++ spec
|
|
|
|
|%
|
2018-05-25 21:45:16 +03:00
|
|
|
:: |en:spec:pkcs1: ASN.1 encoding for RSA keys
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
++ en
|
|
|
|
|%
|
|
|
|
:: +pass:en:spec:pkcs1: encode public key to ASN.1
|
|
|
|
::
|
|
|
|
++ pass
|
|
|
|
|= k=key:rsa
|
|
|
|
^- spec:asn1
|
|
|
|
[%seq [%int n.pub.k] [%int e.pub.k] ~]
|
|
|
|
:: +ring:en:spec:pkcs1: encode private key to ASN.1
|
|
|
|
::
|
|
|
|
++ ring
|
|
|
|
|= k=key:rsa
|
|
|
|
^- spec:asn1
|
|
|
|
~| %rsa-need-ring
|
|
|
|
?> ?=(^ sek.k)
|
|
|
|
:~ %seq
|
|
|
|
[%int 0]
|
|
|
|
[%int n.pub.k]
|
|
|
|
[%int e.pub.k]
|
|
|
|
[%int d.u.sek.k]
|
|
|
|
[%int p.u.sek.k]
|
|
|
|
[%int q.u.sek.k]
|
|
|
|
[%int (mod d.u.sek.k (dec p.u.sek.k))]
|
|
|
|
[%int (mod d.u.sek.k (dec q.u.sek.k))]
|
|
|
|
[%int (~(inv fo p.u.sek.k) q.u.sek.k)]
|
|
|
|
==
|
|
|
|
--
|
|
|
|
:: |de:spec:pkcs1: ASN.1 decoding for RSA keys
|
2018-05-17 08:40:22 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
++ de
|
|
|
|
|%
|
|
|
|
:: +pass:de:spec:pkcs1: decode ASN.1 public key
|
|
|
|
::
|
|
|
|
++ pass
|
|
|
|
|= a=spec:asn1
|
|
|
|
^- (unit key:rsa)
|
|
|
|
?. ?=([%seq [%int *] [%int *] ~] a)
|
|
|
|
~
|
|
|
|
=* n int.i.seq.a
|
|
|
|
=* e int.i.t.seq.a
|
|
|
|
`[[n e] ~]
|
|
|
|
:: +ring:de:spec:pkcs1: decode ASN.1 private key
|
|
|
|
::
|
|
|
|
++ ring
|
|
|
|
|= a=spec:asn1
|
|
|
|
^- (unit key:rsa)
|
|
|
|
?. ?=([%seq *] a) ~
|
|
|
|
?. ?= $: [%int %0]
|
|
|
|
[%int *]
|
|
|
|
[%int *]
|
|
|
|
[%int *]
|
|
|
|
[%int *]
|
|
|
|
[%int *]
|
|
|
|
*
|
|
|
|
==
|
|
|
|
seq.a
|
|
|
|
~
|
|
|
|
=* n int.i.t.seq.a
|
|
|
|
=* e int.i.t.t.seq.a
|
|
|
|
=* d int.i.t.t.t.seq.a
|
|
|
|
=* p int.i.t.t.t.t.seq.a
|
|
|
|
=* q int.i.t.t.t.t.t.seq.a
|
|
|
|
`[[n e] `[d p q]]
|
|
|
|
--
|
2018-05-17 08:40:22 +03:00
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |der:pkcs1: DER encoding for RSA keys
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: En(coding) and de(coding) for public (pass) and private (ring) keys.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ der
|
|
|
|
|%
|
|
|
|
++ en
|
2018-05-17 08:40:22 +03:00
|
|
|
|%
|
2018-05-25 21:45:16 +03:00
|
|
|
++ pass |=(k=key:rsa `@ux`(en:^der (pass:en:spec k)))
|
|
|
|
++ ring |=(k=key:rsa `@ux`(en:^der (ring:en:spec k)))
|
2018-05-17 08:40:22 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
++ de
|
2018-05-11 06:13:30 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
++ pass |=(a=@ `(unit key:rsa)`(biff (de:^der a) pass:de:spec))
|
|
|
|
++ ring |=(a=@ `(unit key:rsa)`(biff (de:^der a) ring:de:spec))
|
2018-05-17 08:40:22 +03:00
|
|
|
--
|
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |pem:pkcs1: PEM encoding for RSA keys
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: En(coding) and de(coding) for public (pass) and private (ring) keys.
|
2018-05-17 08:40:22 +03:00
|
|
|
::
|
|
|
|
++ pem
|
|
|
|
|%
|
2018-05-25 10:28:26 +03:00
|
|
|
++ en
|
2018-05-17 08:40:22 +03:00
|
|
|
|%
|
|
|
|
++ pass |=(k=key:rsa (en:^pem 'RSA PUBLIC KEY' (pass:en:der k)))
|
|
|
|
++ ring |=(k=key:rsa (en:^pem 'RSA PRIVATE KEY' (ring:en:der k)))
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
++ de
|
2018-05-17 08:40:22 +03:00
|
|
|
|%
|
|
|
|
++ pass |=(mep=wain (biff (de:^pem 'RSA PUBLIC KEY' mep) pass:de:der))
|
|
|
|
++ ring |=(mep=wain (biff (de:^pem 'RSA PRIVATE KEY' mep) ring:de:der))
|
|
|
|
--
|
|
|
|
--
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |pkcs8: asymmetric cryptography (rfc5208)
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: RSA-only for now.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ pkcs8
|
|
|
|
|%
|
|
|
|
:: |spec:pkcs8: ASN.1 specs for asymmetric keys
|
|
|
|
::
|
2018-05-17 08:40:22 +03:00
|
|
|
++ spec
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
|
|
|
++ en
|
2018-05-17 08:40:22 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
:: +pass:spec:pkcs8: public key ASN.1
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ pass
|
2018-05-26 00:14:40 +03:00
|
|
|
|= k=key:rsa
|
|
|
|
^- spec:asn1
|
|
|
|
:~ %seq
|
|
|
|
[%seq [[%obj rsa:obj:asn1] [%nul ~] ~]]
|
|
|
|
[%bit (pass:en:der:pkcs1 k)]
|
|
|
|
==
|
|
|
|
:: +ring:spec:pkcs8: private key ASN.1
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ ring !!
|
2018-05-11 06:13:30 +03:00
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |de:spec:pkcs8:
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ de
|
2018-05-11 06:13:30 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
:: +pass:de:spec:pkcs8:
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-17 08:40:22 +03:00
|
|
|
++ pass
|
2018-05-26 00:14:40 +03:00
|
|
|
|= a=spec:asn1
|
2018-05-17 08:40:22 +03:00
|
|
|
^- (unit key:rsa)
|
2018-05-26 00:14:40 +03:00
|
|
|
?. ?=([%seq [%seq *] [%bit *] ~] a)
|
2018-05-17 08:40:22 +03:00
|
|
|
~
|
2018-05-26 00:14:40 +03:00
|
|
|
?. ?& ?=([[%obj *] [%nul ~] ~] seq.i.seq.a)
|
|
|
|
=(rsa:obj:asn1 obj.i.seq.i.seq.a)
|
2018-05-17 08:40:22 +03:00
|
|
|
==
|
|
|
|
~
|
2018-05-26 00:14:40 +03:00
|
|
|
(pass:de:der:pkcs1 bit.i.t.seq.a)
|
|
|
|
:: +ring:de:spec:pkcs8:
|
2018-05-11 06:13:30 +03:00
|
|
|
::
|
|
|
|
++ ring !!
|
|
|
|
--
|
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |der:pkcs8: DER encoding for asymmetric keys
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: En(coding) and de(coding) for public (pass) and private (ring) keys.
|
|
|
|
:: RSA-only for now.
|
2018-05-26 00:14:40 +03:00
|
|
|
::
|
|
|
|
++ der
|
|
|
|
|%
|
|
|
|
++ en
|
|
|
|
|%
|
|
|
|
++ pass |=(k=key:rsa `@ux`(en:^der (pass:en:spec k)))
|
|
|
|
++ ring !! ::|=(k=key:rsa `@ux`(en:^der (ring:spec k)))
|
|
|
|
--
|
|
|
|
++ de
|
|
|
|
|%
|
|
|
|
++ pass |=(a=@ `(unit key:rsa)`(biff (de:^der a) pass:de:spec))
|
|
|
|
++ ring !! ::|=(a=@ `(unit key:rsa)`(biff (de:^der a) ring:de:spec))
|
|
|
|
--
|
|
|
|
--
|
|
|
|
:: |pem:pkcs8: PEM encoding for asymmetric keys
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: En(coding) and de(coding) for public (pass) and private (ring) keys.
|
|
|
|
:: RSA-only for now.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ pem
|
|
|
|
|%
|
|
|
|
++ en
|
2018-05-11 06:13:30 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
++ pass |=(k=key:rsa (en:^pem 'PUBLIC KEY' (pass:en:der k)))
|
|
|
|
++ ring !! ::|=(k=key:rsa (en:^pem 'PUBLIC KEY' (ring:en:der k)))
|
2018-05-11 06:13:30 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
++ de
|
2018-05-11 06:13:30 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
++ pass |=(mep=wain (biff (de:^pem 'PUBLIC KEY' mep) pass:de:der))
|
|
|
|
++ ring !! ::|=(mep=wain (biff (de:^pem 'PRIVATE KEY' mep) ring:de:der))
|
2018-05-11 06:13:30 +03:00
|
|
|
--
|
|
|
|
--
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |pkcs10: certificate signing requests (rfc2986)
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Only implemented for RSA keys with subject-alternate names.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ pkcs10
|
|
|
|
=> |%
|
2018-05-25 21:45:16 +03:00
|
|
|
:: +csr:pkcs10: certificate request
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-18 01:10:24 +03:00
|
|
|
+= csr [key=key:rsa hot=(list (list @t))]
|
2018-05-17 08:40:22 +03:00
|
|
|
--
|
2018-05-11 07:53:10 +03:00
|
|
|
|%
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |spec:pkcs10: ASN.1 specs for certificate signing requests
|
2018-05-25 21:45:16 +03:00
|
|
|
::
|
2018-05-17 08:40:22 +03:00
|
|
|
++ spec
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
:: +en:spec:pkcs10: ASN.1 encoding for certificate signing requests
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-25 21:45:16 +03:00
|
|
|
++ en
|
2018-05-26 00:14:40 +03:00
|
|
|
|= csr
|
|
|
|
^- spec:asn1
|
|
|
|
|^ =/ dat=spec:asn1 (info key hot)
|
|
|
|
:~ %seq
|
|
|
|
dat
|
|
|
|
[%seq [[%obj rsa-sha-256:obj:asn1] [%nul ~] ~]]
|
|
|
|
:: big-endian signature bytes
|
|
|
|
[%bit (swp 3 (~(sign rs256 key) (en:^der dat)))]
|
|
|
|
==
|
|
|
|
:: +info:en:spec:pkcs10: certificate request info
|
2018-05-25 21:45:16 +03:00
|
|
|
::
|
2018-05-26 00:14:40 +03:00
|
|
|
++ info
|
2018-05-25 21:45:16 +03:00
|
|
|
|= csr
|
|
|
|
^- spec:asn1
|
2018-05-26 00:14:40 +03:00
|
|
|
:~ %seq
|
|
|
|
[%int 0]
|
|
|
|
[%seq ~]
|
|
|
|
(pass:en:spec:pkcs8 key)
|
2018-05-28 08:57:58 +03:00
|
|
|
:+ %con
|
|
|
|
`bespoke:asn1`[| 0]
|
|
|
|
%~ ren
|
|
|
|
raw:en:^der
|
2018-05-25 21:45:16 +03:00
|
|
|
:~ %seq
|
2018-05-26 00:14:40 +03:00
|
|
|
[%obj csr-ext:obj:asn1]
|
|
|
|
:~ %set
|
|
|
|
:~ %seq
|
|
|
|
:~ %seq
|
|
|
|
[%obj sub-alt:obj:asn1]
|
|
|
|
[%oct (en:^der (san hot))]
|
|
|
|
== == == == ==
|
|
|
|
:: +san:en:spec:pkcs10: subject-alternate-names
|
|
|
|
::
|
|
|
|
++ san
|
|
|
|
|= hot=(list (list @t))
|
|
|
|
^- spec:asn1
|
|
|
|
:- %seq
|
|
|
|
%+ turn hot
|
|
|
|
:: implicit, context-specific tag #2 (IA5String)
|
|
|
|
:: XX sanitize string?
|
2018-05-28 08:57:58 +03:00
|
|
|
|=(h=(list @t) [%con `bespoke:asn1`[& 2] (rip 3 (join '.' h))])
|
2018-05-25 21:45:16 +03:00
|
|
|
--
|
|
|
|
:: |de:spec:pkcs10: ASN.1 decoding for certificate signing requests
|
|
|
|
++ de !!
|
2018-05-17 08:40:22 +03:00
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |der:pkcs10: DER encoding for certificate signing requests
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-17 08:40:22 +03:00
|
|
|
++ der
|
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
++ en |=(a=csr `@ux`(en:^der (en:spec a)))
|
|
|
|
++ de !! ::|=(a=@ `(unit csr)`(biff (de:^der a) de:spec))
|
2018-05-11 07:53:10 +03:00
|
|
|
--
|
2018-05-26 00:14:40 +03:00
|
|
|
:: |pem:pkcs10: PEM encoding for certificate signing requests
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
2018-05-11 07:53:10 +03:00
|
|
|
++ pem
|
|
|
|
|%
|
2018-05-26 00:14:40 +03:00
|
|
|
++ en |=(a=csr (en:^pem 'CERTIFICATE REQUEST' (en:der a)))
|
|
|
|
++ de !! ::|=(mep=wain (biff (de:^pem 'CERTIFICATE REQUEST' mep) de:der))
|
2018-05-11 07:53:10 +03:00
|
|
|
--
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +en-json-sort: json encoding with sorted object keys
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: to be included in %zuse, with sorting optional?
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ en-json-sort :: XX rename
|
|
|
|
|^ |=([sor=$-(^ ?) val=json] (apex val sor ""))
|
2018-04-19 09:27:55 +03:00
|
|
|
:: :: ++apex:en-json:html
|
|
|
|
++ apex
|
|
|
|
=, en-json:html
|
|
|
|
|= {val/json sor/$-(^ ?) rez/tape}
|
|
|
|
^- tape
|
|
|
|
?~ val (weld "null" rez)
|
|
|
|
?- -.val
|
|
|
|
$a
|
|
|
|
:- '['
|
|
|
|
=. rez [']' rez]
|
|
|
|
!.
|
|
|
|
?~ p.val rez
|
|
|
|
|-
|
|
|
|
?~ t.p.val ^$(val i.p.val)
|
|
|
|
^$(val i.p.val, rez [',' $(p.val t.p.val)])
|
|
|
|
::
|
|
|
|
$b (weld ?:(p.val "true" "false") rez)
|
|
|
|
$n (weld (trip p.val) rez)
|
|
|
|
$s
|
|
|
|
:- '"'
|
|
|
|
=. rez ['"' rez]
|
|
|
|
=+ viz=(trip p.val)
|
|
|
|
!.
|
|
|
|
|- ^- tape
|
|
|
|
?~ viz rez
|
|
|
|
=+ hed=(jesc i.viz)
|
|
|
|
?: ?=({@ $~} hed)
|
|
|
|
[i.hed $(viz t.viz)]
|
|
|
|
(weld hed $(viz t.viz))
|
|
|
|
::
|
|
|
|
$o
|
|
|
|
:- '{'
|
|
|
|
=. rez ['}' rez]
|
|
|
|
=/ viz
|
|
|
|
%+ sort ~(tap by p.val)
|
|
|
|
|=((pair) (sor (head p) (head q)))
|
|
|
|
?~ viz rez
|
|
|
|
!.
|
|
|
|
|- ^+ rez
|
|
|
|
?~ t.viz ^$(val [%s p.i.viz], rez [':' ^$(val q.i.viz)])
|
|
|
|
=. rez [',' $(viz t.viz)]
|
|
|
|
^$(val [%s p.i.viz], rez [':' ^$(val q.i.viz)])
|
|
|
|
==
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
:: %/lib/jose
|
|
|
|
::
|
|
|
|
:: |jwk: json representations of cryptographic keys (rfc7517)
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Url-safe base64 encoding of key parameters in big-endian byte order.
|
|
|
|
:: RSA-only for now
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ jwk
|
|
|
|
|%
|
|
|
|
:: |en:jwk: encoding of json cryptographic keys
|
|
|
|
::
|
2018-05-09 07:03:51 +03:00
|
|
|
++ en
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
|
|
|
:: +pass:en:jwk: json encode public key
|
|
|
|
::
|
|
|
|
++ pass
|
2018-05-09 07:03:51 +03:00
|
|
|
|= k=key:rsa
|
|
|
|
^- json
|
|
|
|
:- %o %- my :~
|
|
|
|
kty+s+'RSA'
|
2018-05-26 00:14:40 +03:00
|
|
|
n+s+(en-base64url (swp 3 n.pub.k))
|
2018-05-16 22:38:50 +03:00
|
|
|
e+s+(en-base64url (swp 3 e.pub.k))
|
2018-05-09 07:03:51 +03:00
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +ring:en:jwk: json encode private key
|
|
|
|
::
|
|
|
|
++ ring
|
2018-05-09 20:45:39 +03:00
|
|
|
|= k=key:rsa
|
|
|
|
^- json
|
2018-05-16 22:38:50 +03:00
|
|
|
~| %rsa-need-ring
|
|
|
|
?> ?=(^ sek.k)
|
2018-05-09 20:45:39 +03:00
|
|
|
:- %o %- my :~
|
|
|
|
kty+s+'RSA'
|
2018-05-16 22:38:50 +03:00
|
|
|
n+s+(en-base64url (swp 3 n.pub.k))
|
|
|
|
e+s+(en-base64url (swp 3 e.pub.k))
|
|
|
|
d+s+(en-base64url (swp 3 d.u.sek.k))
|
|
|
|
p+s+(en-base64url (swp 3 p.u.sek.k))
|
|
|
|
q+s+(en-base64url (swp 3 q.u.sek.k))
|
2018-05-09 20:45:39 +03:00
|
|
|
==
|
2018-05-09 07:03:51 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |de:jwk: decoding of json cryptographic keys
|
|
|
|
::
|
2018-05-09 07:03:51 +03:00
|
|
|
++ de
|
2018-05-25 10:28:26 +03:00
|
|
|
|%
|
|
|
|
:: +pass:de:jwk: decode json public key
|
|
|
|
::
|
2018-05-26 00:14:40 +03:00
|
|
|
++ pass
|
2018-05-09 07:03:51 +03:00
|
|
|
=, dejs-soft:format
|
|
|
|
%+ ci
|
2018-05-09 20:45:39 +03:00
|
|
|
|= [kty=@t n=(unit @) e=(unit @)]
|
2018-05-16 22:38:50 +03:00
|
|
|
^- (unit key:rsa)
|
|
|
|
=/ swp (cury swp 3)
|
|
|
|
=/ pub (both (bind n swp) (bind e swp))
|
|
|
|
?~(pub ~ `[u.pub ~])
|
2018-05-09 07:03:51 +03:00
|
|
|
%- ot :~
|
|
|
|
kty+(su (jest 'RSA'))
|
|
|
|
n+(cu de-base64url so)
|
|
|
|
e+(cu de-base64url so)
|
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +ring:de:jwk: decode json private key
|
|
|
|
::
|
|
|
|
++ ring
|
2018-05-09 20:45:39 +03:00
|
|
|
=, dejs-soft:format
|
|
|
|
%+ ci
|
|
|
|
|= $: kty=@t
|
|
|
|
n=(unit @)
|
|
|
|
e=(unit @)
|
|
|
|
d=(unit @)
|
2018-05-16 22:38:50 +03:00
|
|
|
p=(unit @)
|
|
|
|
q=(unit @)
|
2018-05-09 20:45:39 +03:00
|
|
|
==
|
|
|
|
^- (unit key:rsa)
|
2018-05-16 22:38:50 +03:00
|
|
|
=/ swp (cury swp 3)
|
|
|
|
=/ pub (both (bind n swp) (bind e swp))
|
|
|
|
=/ sek :(both (bind d swp) (bind p swp) (bind q swp))
|
|
|
|
?:(|(?=(~ pub) ?=(~ sek)) ~ `[u.pub sek])
|
2018-05-09 20:45:39 +03:00
|
|
|
%- ot :~
|
|
|
|
kty+(su (jest 'RSA'))
|
|
|
|
n+(cu de-base64url so)
|
|
|
|
e+(cu de-base64url so)
|
|
|
|
d+(cu de-base64url so)
|
2018-05-16 22:38:50 +03:00
|
|
|
p+(cu de-base64url so)
|
|
|
|
q+(cu de-base64url so)
|
2018-05-09 20:45:39 +03:00
|
|
|
==
|
2018-05-09 07:03:51 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |thumb:jwk: "thumbprint" json-encoded key (rfc7638)
|
|
|
|
::
|
|
|
|
++ thumb
|
|
|
|
|%
|
|
|
|
:: +pass:thumb:jwk: thumbprint json-encoded public key
|
|
|
|
::
|
2018-05-17 19:36:29 +03:00
|
|
|
++ pass
|
|
|
|
|= k=key:rsa
|
|
|
|
(en-base64url (shax (crip (en-json-sort aor (pass:en k)))))
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +ring:thumb:jwk: thumbprint json-encoded private key
|
|
|
|
::
|
|
|
|
++ ring !!
|
2018-05-17 19:36:29 +03:00
|
|
|
--
|
2018-04-19 09:27:55 +03:00
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: |jws: json web signatures (rfc7515)
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Note: flattened signature form only.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ jws
|
|
|
|
|%
|
|
|
|
:: +sign:jws: sign json value
|
|
|
|
::
|
|
|
|
++ sign
|
|
|
|
|= [k=key:rsa pro=json lod=json]
|
2018-05-17 19:36:29 +03:00
|
|
|
|^ ^- json
|
|
|
|
=. pro header
|
|
|
|
=/ protect=cord (encode pro)
|
|
|
|
=/ payload=cord (encode lod)
|
|
|
|
:- %o %- my :~
|
|
|
|
protected+s+protect
|
|
|
|
payload+s+payload
|
|
|
|
signature+s+(sign protect payload)
|
|
|
|
==
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +header:sign:jws: set signature algorithm in header
|
2018-05-17 19:36:29 +03:00
|
|
|
::
|
|
|
|
++ header
|
|
|
|
?> ?=([%o *] pro)
|
|
|
|
^- json
|
|
|
|
[%o (~(put by p.pro) %alg s+'RS256')]
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +encode:sign:jws: encode json for signing
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Alphabetically sort object keys, url-safe base64 encode
|
|
|
|
:: the serialized json.
|
2018-05-17 19:36:29 +03:00
|
|
|
::
|
|
|
|
++ encode
|
|
|
|
|= jon=json
|
|
|
|
(en-base64url (crip (en-json-sort aor jon)))
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +sign:sign:jws: compute signature
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Url-safe base64 encode in big-endian byte order.
|
2018-05-17 19:36:29 +03:00
|
|
|
::
|
|
|
|
++ sign
|
|
|
|
|= [protect=cord payload=cord]
|
|
|
|
%- en-base64url
|
|
|
|
(swp 3 (~(sign rs256 k) (rap 3 ~[protect '.' payload])))
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +verify:jws: verify signature
|
2018-05-17 19:36:29 +03:00
|
|
|
::
|
|
|
|
++ verify !!
|
|
|
|
--
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +eor: explicit sort order comparator
|
|
|
|
::
|
2018-05-28 08:57:58 +03:00
|
|
|
:: Lookup :a and :b in :lit, and pass their indices to :com.
|
2018-05-25 10:28:26 +03:00
|
|
|
::
|
|
|
|
++ eor
|
2018-05-09 20:45:39 +03:00
|
|
|
|= [com=$-([@ @] ?) lit=(list)]
|
|
|
|
|= [a=* b=*]
|
|
|
|
^- ?
|
|
|
|
(fall (bind (both (find ~[a] lit) (find ~[b] lit)) com) |)
|
2018-05-25 10:28:26 +03:00
|
|
|
:: +join: join list of cords with separator
|
|
|
|
::
|
|
|
|
++ join
|
2018-05-24 19:57:06 +03:00
|
|
|
|= [sep=@t hot=(list @t)]
|
2018-05-15 07:26:59 +03:00
|
|
|
^- @t
|
2018-05-11 07:53:10 +03:00
|
|
|
=| out=(list @t)
|
2018-05-15 07:26:59 +03:00
|
|
|
?> ?=(^ hot)
|
2018-05-11 07:53:10 +03:00
|
|
|
|- ^- @t
|
|
|
|
?~ t.hot
|
|
|
|
(rap 3 [i.hot out])
|
2018-05-24 19:57:06 +03:00
|
|
|
$(out [sep i.hot out], hot t.hot)
|
2018-06-23 06:43:41 +03:00
|
|
|
:: |grab: acme api response json reparsers
|
2018-05-18 01:10:24 +03:00
|
|
|
::
|
2018-05-15 07:26:59 +03:00
|
|
|
++ grab
|
2018-04-19 09:27:55 +03:00
|
|
|
=, dejs:format
|
2018-05-15 07:26:59 +03:00
|
|
|
|%
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +json-purl: parse url
|
|
|
|
::
|
2018-05-15 07:26:59 +03:00
|
|
|
++ json-purl (su auri:de-purl:html)
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +directory: parse ACME service directory
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
|
|
|
++ directory
|
|
|
|
%- ot
|
|
|
|
:~ ['newAccount' json-purl]
|
|
|
|
['newNonce' json-purl]
|
|
|
|
['newOrder' json-purl]
|
|
|
|
['revokeCert' json-purl]
|
|
|
|
['keyChange' json-purl]
|
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +acct: parse ACME service account
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
|
|
|
++ acct
|
|
|
|
%- ot
|
|
|
|
:~ ['id' no]
|
|
|
|
['createdAt' so] :: XX (su iso-8601)
|
|
|
|
['status' so]
|
|
|
|
:: ignore key, contact, initialIp
|
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +order: parse certificate order
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
|
|
|
++ order
|
|
|
|
%- ot
|
|
|
|
:~ ['authorizations' (ar json-purl)]
|
|
|
|
['finalize' json-purl]
|
|
|
|
['expires' so] :: XX (su iso-8601)
|
2018-05-15 23:52:54 +03:00
|
|
|
['status' so]
|
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +finalizing-order: parse order in a finalizing state
|
|
|
|
::
|
|
|
|
:: XX remove once +order has optional keys
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
2018-05-18 19:50:45 +03:00
|
|
|
++ finalizing-order
|
|
|
|
%- ot
|
|
|
|
:~ ['expires' so] :: XX (su iso-8601)
|
|
|
|
['status' so]
|
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +final-order: parse order in a finalized state
|
|
|
|
::
|
|
|
|
:: XX remove once +order has optional keys
|
2018-05-18 19:50:45 +03:00
|
|
|
::
|
2018-05-15 23:52:54 +03:00
|
|
|
++ final-order
|
|
|
|
%- ot
|
2018-05-18 19:50:45 +03:00
|
|
|
:~ ['expires' so] :: XX (su iso-8601)
|
2018-05-15 23:52:54 +03:00
|
|
|
['status' so]
|
|
|
|
['certificate' json-purl]
|
2018-05-15 07:26:59 +03:00
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +auth: parse authorization
|
2018-05-15 07:26:59 +03:00
|
|
|
++ auth
|
|
|
|
=> |%
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +iden: parse dns identifier to +turf
|
|
|
|
::
|
2018-05-15 07:26:59 +03:00
|
|
|
++ iden
|
|
|
|
|= [typ=@t hot=host]
|
|
|
|
?>(&(?=(%dns typ) ?=([%& *] hot)) p.hot)
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +trial: transform parsed domain validation challenge
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
|
|
|
++ trial
|
|
|
|
|= a=(list [typ=@t sas=@t url=purl tok=@t])
|
|
|
|
^+ ?>(?=(^ a) i.a)
|
|
|
|
=/ b
|
|
|
|
(skim a |=([typ=@t *] ?=(%http-01 typ)))
|
|
|
|
?>(?=(^ b) i.b)
|
|
|
|
--
|
|
|
|
%- ot
|
|
|
|
:~ ['identifier' (cu iden (ot type+so value+(su thos:de-purl:html) ~))]
|
|
|
|
['status' so]
|
|
|
|
['expires' so] :: XX (su iso-8601)
|
2018-05-15 23:52:54 +03:00
|
|
|
['challenges' (cu trial (ar challenge))]
|
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +challenge: parse domain validation challenge
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
|
|
|
++ challenge
|
|
|
|
%- ot
|
|
|
|
:~ ['type' so]
|
|
|
|
['status' so]
|
|
|
|
['url' json-purl]
|
|
|
|
['token' so]
|
2018-05-15 07:26:59 +03:00
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +error: parse ACME service error response
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
|
|
|
++ error
|
|
|
|
%- ot
|
|
|
|
:~ ['type' so]
|
|
|
|
['detail' so]
|
|
|
|
==
|
|
|
|
--
|
2018-04-19 09:27:55 +03:00
|
|
|
--
|
|
|
|
::
|
|
|
|
:::: acme state
|
|
|
|
::
|
|
|
|
|%
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +move: output effect
|
|
|
|
::
|
|
|
|
+= move [bone card]
|
|
|
|
:: +card: output effect payload
|
|
|
|
::
|
|
|
|
+= card
|
|
|
|
$% [%hiss wire [~ ~] %httr %hiss hiss:eyre]
|
|
|
|
[%well wire path (unit mime)]
|
|
|
|
==
|
|
|
|
:: +turf: a domain, TLD first
|
|
|
|
::
|
|
|
|
+= turf (list @t)
|
|
|
|
:: +acct: an ACME service account
|
|
|
|
::
|
|
|
|
+= acct
|
|
|
|
$: :: key: account keypair
|
|
|
|
::
|
|
|
|
key=key:rsa
|
|
|
|
:: reg: account registration
|
|
|
|
::
|
|
|
|
reg=(unit [wen=@t kid=@t]) :: XX wen=@da
|
|
|
|
==
|
|
|
|
:: +config: finalized configuration
|
|
|
|
::
|
|
|
|
+= config
|
|
|
|
$: :: dom: domains
|
|
|
|
::
|
|
|
|
dom=(set turf)
|
|
|
|
:: key: certificate keypair
|
|
|
|
::
|
|
|
|
key=key:rsa
|
|
|
|
:: cer: signed certificate
|
|
|
|
::
|
|
|
|
cer=wain
|
|
|
|
:: exp: expiration date
|
|
|
|
::
|
|
|
|
exp=@da
|
|
|
|
:: dor: source ACME service order URL
|
|
|
|
::
|
|
|
|
dor=purl
|
|
|
|
==
|
|
|
|
:: +trial: domain validation challenge
|
|
|
|
::
|
|
|
|
+= trial
|
|
|
|
$% :: %http only for now
|
|
|
|
$: %http
|
|
|
|
:: ego: ACME service challenge url
|
|
|
|
::
|
|
|
|
ego=purl
|
|
|
|
:: tok: challenge token
|
|
|
|
::
|
|
|
|
tok=@t
|
|
|
|
:: sas: challenge status
|
|
|
|
::
|
|
|
|
sas=?(%recv %pend %auth)
|
|
|
|
== ==
|
|
|
|
:: +auth: domain authorization
|
|
|
|
::
|
|
|
|
+= auth
|
|
|
|
$: :: ego: ACME service authorization url
|
|
|
|
::
|
|
|
|
ego=purl
|
|
|
|
:: dom: domain under authorization
|
|
|
|
::
|
|
|
|
dom=turf
|
|
|
|
:: cal: domain validation challenge
|
|
|
|
::
|
|
|
|
cal=trial
|
|
|
|
==
|
|
|
|
:: +order-auth: domain authorization state for order processing
|
|
|
|
::
|
|
|
|
+= order-auth
|
|
|
|
$: :: pending: remote authorization urls
|
|
|
|
::
|
|
|
|
pending=(list purl)
|
|
|
|
:: active: authorization in progress
|
|
|
|
::
|
|
|
|
active=(unit [idx=@ auth])
|
|
|
|
:: done: finalized authorizations (XX or failed?)
|
|
|
|
::
|
|
|
|
done=(list auth)
|
|
|
|
==
|
|
|
|
:: +order: ACME certificate order
|
|
|
|
::
|
|
|
|
+= order
|
|
|
|
$: :: dom: domains
|
|
|
|
::
|
|
|
|
dom=(set turf)
|
|
|
|
:: sas: order state
|
|
|
|
::
|
|
|
|
sas=$@(%wake [%rest wen=@da])
|
|
|
|
:: exp: expiration date
|
|
|
|
::
|
|
|
|
:: XX @da once ISO-8601 parser
|
|
|
|
::
|
|
|
|
exp=@t
|
|
|
|
:: ego: ACME service order url
|
|
|
|
::
|
|
|
|
ego=purl
|
|
|
|
:: fin: ACME service order finalization url
|
|
|
|
::
|
|
|
|
fin=purl
|
|
|
|
:: key: certificate keypair
|
|
|
|
::
|
|
|
|
key=key:rsa
|
|
|
|
:: csr: DER-encoded PKCS10 certificate signing request
|
|
|
|
::
|
|
|
|
csr=@ux
|
|
|
|
:: aut: authorizations required by this order
|
|
|
|
::
|
|
|
|
aut=order-auth
|
|
|
|
==
|
|
|
|
:: +history: archive of past ACME service interactions
|
|
|
|
::
|
|
|
|
+= history
|
|
|
|
$: :: act: list of revoked account keypairs
|
|
|
|
::
|
|
|
|
act=(list acct)
|
|
|
|
:: fig: list of expired configurations
|
|
|
|
::
|
|
|
|
fig=(list config)
|
|
|
|
:: fal: list of failed order attempts
|
|
|
|
::
|
|
|
|
fal=(list order)
|
|
|
|
==
|
|
|
|
:: +directory: ACME v2 service directory
|
|
|
|
::
|
|
|
|
+= directory
|
|
|
|
$: :: reg: registration url (newAccount)
|
|
|
|
::
|
|
|
|
reg=purl
|
|
|
|
:: non: nonce creation url (newNonce)
|
|
|
|
::
|
|
|
|
non=purl
|
|
|
|
:: der: order creation url (newOrder)
|
|
|
|
::
|
|
|
|
der=purl
|
|
|
|
:: rev: certificate revocation url (revokeCert)
|
|
|
|
::
|
|
|
|
rev=purl
|
|
|
|
:: rek: account key revocation url (keyChange)
|
|
|
|
::
|
|
|
|
rek=purl
|
|
|
|
==
|
|
|
|
:: +acme: complete app state
|
|
|
|
::
|
|
|
|
+= acme
|
|
|
|
$: :: bas: ACME service root url
|
|
|
|
::
|
|
|
|
bas=purl
|
|
|
|
:: dir: ACME service directory
|
|
|
|
::
|
|
|
|
dir=directory
|
|
|
|
:: act: ACME service account
|
|
|
|
::
|
|
|
|
act=acct
|
|
|
|
:: liv: active, live configuration
|
|
|
|
::
|
|
|
|
liv=(unit config)
|
|
|
|
:: hit: ACME account history
|
|
|
|
::
|
|
|
|
hit=history
|
|
|
|
:: nonces: list of unused nonces
|
|
|
|
::
|
|
|
|
nonces=(list @t)
|
|
|
|
:: rod: active, in-progress order
|
|
|
|
::
|
|
|
|
rod=(unit order)
|
|
|
|
:: pen: pending domains for next order
|
|
|
|
::
|
|
|
|
pen=(unit (set turf))
|
|
|
|
:: cey: certificate key XX move?
|
|
|
|
::
|
|
|
|
cey=key:rsa
|
|
|
|
==
|
|
|
|
--
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
|
|
|
:::: acme app
|
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
:: mov: list of outgoing moves for the current transaction
|
|
|
|
::
|
2018-04-19 09:27:55 +03:00
|
|
|
=| mov=(list move)
|
2018-06-23 06:43:41 +03:00
|
|
|
::
|
2018-05-15 07:26:59 +03:00
|
|
|
|_ [bow=bowl:gall acme]
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +this: self
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX Should be a +* core alias, see urbit/arvo#712
|
|
|
|
::
|
|
|
|
++ this .
|
|
|
|
:: +emit: emit a move
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
|
|
|
++ emit
|
|
|
|
|= car=card
|
2018-04-24 08:49:21 +03:00
|
|
|
~& [%emit car]
|
2018-04-19 09:27:55 +03:00
|
|
|
this(mov [[ost.bow car] mov])
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +abet: finalize transaction
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
2018-04-19 09:27:55 +03:00
|
|
|
++ abet
|
2018-06-23 06:43:41 +03:00
|
|
|
^- (quip move _this)
|
2018-04-19 09:27:55 +03:00
|
|
|
[(flop mov) this(mov ~)]
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +request: generic http request
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-17 19:36:29 +03:00
|
|
|
++ request
|
2018-06-23 06:43:41 +03:00
|
|
|
|= [wir=wire req=hiss]
|
2018-05-15 23:52:54 +03:00
|
|
|
^- card
|
2018-06-23 06:43:41 +03:00
|
|
|
[%hiss wir [~ ~] %httr %hiss req]
|
|
|
|
:: +signed-request: JWS JSON POST
|
|
|
|
::
|
|
|
|
++ signed-request
|
|
|
|
|= [url=purl non=@t bod=json]
|
|
|
|
^- hiss
|
|
|
|
:^ url %post
|
|
|
|
(my content-type+['application/jose+json' ~] ~)
|
2018-05-15 07:26:59 +03:00
|
|
|
:- ~
|
2018-06-23 06:43:41 +03:00
|
|
|
^- octs
|
|
|
|
=; pro=json
|
|
|
|
(as-octt:mimes:html (en-json:html (sign:jws key.act pro bod)))
|
2018-04-19 09:27:55 +03:00
|
|
|
:- %o %- my :~
|
2018-06-23 06:43:41 +03:00
|
|
|
nonce+s+non
|
|
|
|
url+s+(crip (en-purl:html url))
|
|
|
|
?^ reg.act
|
|
|
|
kid+s+kid.u.reg.act
|
|
|
|
jwk+(pass:en:jwk key.act)
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +bad-nonce: check if an http response is a badNonce error
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ bad-nonce
|
|
|
|
|= rep=httr
|
|
|
|
^- ?
|
|
|
|
:: XX always 400?
|
|
|
|
?. =(400 p.rep) |
|
|
|
|
?~ r.rep |
|
|
|
|
=/ jon=(unit json) (de-json:html q.u.r.rep)
|
|
|
|
?~ jon |
|
|
|
|
:: XX unit parser, types
|
|
|
|
=('urn:ietf:params:acme:error:badNonce' +:(error:grab u.jon))
|
|
|
|
:: |effect: send moves to advance
|
2018-05-18 09:05:12 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ effect
|
|
|
|
|%
|
|
|
|
:: +directory: get ACME service directory
|
|
|
|
::
|
|
|
|
++ directory
|
|
|
|
^+ this
|
|
|
|
(emit (request /acme/directory/(scot %p our.bow) bas %get ~ ~)) :: XX now?
|
|
|
|
:: +nonce: get a new nonce for the next request
|
|
|
|
::
|
|
|
|
++ nonce
|
|
|
|
|= nex=wire
|
|
|
|
^+ this
|
|
|
|
?> ?=([%next *] nex) :: XX now?
|
|
|
|
(emit (request (weld `wire`/acme/nonce `wire`nex) non.dir %get ~ ~))
|
|
|
|
:: +register: create ACME service account
|
|
|
|
::
|
|
|
|
:: Note: accepts services ToS.
|
|
|
|
::
|
|
|
|
++ register
|
|
|
|
^+ this
|
|
|
|
?~ nonces
|
|
|
|
(nonce /next/register)
|
|
|
|
%- emit(nonces t.nonces, reg.act ~)
|
|
|
|
%+ request
|
|
|
|
/acme/register/(scot %p our.bow) :: XX now?
|
|
|
|
%^ signed-request reg.dir i.nonces
|
|
|
|
[%o (my [['termsOfServiceAgreed' b+&] ~])]
|
|
|
|
:: XX rekey
|
|
|
|
::
|
|
|
|
:: +new-order: create a new certificate order
|
|
|
|
::
|
|
|
|
++ new-order
|
|
|
|
^+ this
|
|
|
|
~| %new-order-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=([~ ^] pen) ~|(%no-domains !!)
|
|
|
|
?~ nonces
|
|
|
|
(nonce /next/new-order)
|
|
|
|
%- emit(nonces t.nonces)
|
|
|
|
%+ request
|
|
|
|
/acme/new-order/(scot %da now.bow)
|
|
|
|
%^ signed-request der.dir i.nonces
|
|
|
|
:- %o %- my :~
|
|
|
|
:- %identifiers
|
|
|
|
:- %a
|
|
|
|
%+ turn
|
|
|
|
~(tap in `(set turf)`u.pen)
|
|
|
|
|=(a=turf [%o (my type+s+'dns' value+s+(join '.' a) ~)])
|
|
|
|
==
|
|
|
|
:: +finalize-order: finalize completed order
|
|
|
|
::
|
|
|
|
++ finalize-order
|
|
|
|
^+ this
|
|
|
|
~| %finalize-order-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(~ pending.aut.u.rod) ~|(%pending-authz !!)
|
|
|
|
?. ?=(~ active.aut.u.rod) ~|(%active-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
?~ nonces
|
|
|
|
(nonce /next/finalize-order)
|
|
|
|
%- emit(nonces t.nonces)
|
|
|
|
%+ request
|
|
|
|
/acme/finalize-order/(scot %da now.bow)
|
|
|
|
%^ signed-request fin.u.rod i.nonces
|
|
|
|
[%o (my csr+s+(en-base64url csr.u.rod) ~)]
|
|
|
|
:: +check-order: check completed order for certificate availability
|
|
|
|
::
|
|
|
|
++ check-order
|
|
|
|
^+ this
|
|
|
|
~| %check-order-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(~ pending.aut.u.rod) ~|(%pending-authz !!)
|
|
|
|
?. ?=(~ active.aut.u.rod) ~|(%active-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
(emit (request /acme/check-order/(scot %da now.bow) ego.u.rod %get ~ ~))
|
|
|
|
:: +certificate: download PEM-encoded certificate
|
|
|
|
::
|
|
|
|
++ certificate
|
|
|
|
|= url=purl
|
|
|
|
^+ this
|
|
|
|
~| %certificate-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
=/ hed (my accept+['applicate/x-pem-file' ~] ~)
|
|
|
|
(emit (request /acme/certificate/(scot %da now.bow) url %get hed ~))
|
|
|
|
:: +get-authz: get next ACME service domain authorization object
|
|
|
|
::
|
|
|
|
++ get-authz
|
|
|
|
^+ this
|
|
|
|
~| %get-authz-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(^ pending.aut.u.rod) ~|(%no-pending-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
%- emit
|
|
|
|
(request /acme/get-authz/(scot %da now.bow) i.pending.aut.u.rod %get ~ ~)
|
|
|
|
:: XX check/finalize-authz ??
|
|
|
|
::
|
|
|
|
:: +save-trial: save ACME domain validation challenge to /.well-known/
|
|
|
|
::
|
|
|
|
++ save-trial
|
|
|
|
^+ this
|
|
|
|
~| %save-trial-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
=* aut u.active.aut.u.rod
|
|
|
|
%- emit
|
|
|
|
:^ %well
|
|
|
|
:: XX idx in wire?
|
|
|
|
/acme/save-trial/(scot %da now.bow)
|
|
|
|
/acme-challenge/[tok.cal.aut]
|
|
|
|
:+ ~
|
|
|
|
/text/plain
|
|
|
|
%- as-octs:mimes:html
|
|
|
|
(rap 3 [tok.cal.aut '.' (pass:thumb:jwk key.act) ~])
|
|
|
|
:: +test-trial: confirm that ACME domain validation challenge is available
|
|
|
|
::
|
|
|
|
++ test-trial
|
|
|
|
^+ this
|
|
|
|
~| %test-trial-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
=* aut u.active.aut.u.rod
|
|
|
|
=/ pat=path /'.well-known'/acme-challenge/[tok.cal.aut]
|
|
|
|
:: note: requires port 80, just as the ACME service will
|
|
|
|
=/ url=purl [[sec=| por=~ hos=[%& dom.aut]] [ext=~ pat] hed=~]
|
|
|
|
:: =/ url=purl [[sec=| por=`8.081 hos=[%& /localhost]] [ext=~ pat] hed=~]
|
|
|
|
:: XX idx in wire?
|
|
|
|
(emit (request /acme/test-trial/(scot %da now.bow) url %get ~ ~))
|
|
|
|
:: +finalize-trial: notify ACME service that challenge is ready
|
|
|
|
::
|
|
|
|
++ finalize-trial
|
|
|
|
^+ this
|
|
|
|
~| %test-trial-effect-fail
|
|
|
|
?. ?=(^ reg.act) ~|(%no-account !!)
|
|
|
|
?. ?=(^ rod) ~|(%no-active-order !!)
|
|
|
|
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
|
|
|
|
:: XX revisit wrt rate limits
|
|
|
|
?> ?=(%wake sas.u.rod)
|
|
|
|
=* aut u.active.aut.u.rod
|
|
|
|
?~ nonces
|
|
|
|
(nonce /next/finalize-trial)
|
|
|
|
%- emit(nonces t.nonces)
|
|
|
|
%+ request
|
|
|
|
:: XX idx in wire?
|
|
|
|
/acme/finalize-trial/(scot %da now.bow)
|
|
|
|
:: empty object included for signature
|
|
|
|
(signed-request ego.cal.aut i.nonces [%o ~])
|
|
|
|
:: XX delete-trial?
|
|
|
|
::
|
|
|
|
:: +retry: retry effect after timeout
|
|
|
|
::
|
|
|
|
++ retry !!
|
|
|
|
--
|
|
|
|
:: |event: accept event, emit next effect(s)
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX should these next effects be triggered at call sites instead?
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ event
|
|
|
|
|%
|
|
|
|
:: +directory: accept ACME service directory, trigger registration
|
|
|
|
::
|
|
|
|
++ directory
|
2018-06-23 07:11:22 +03:00
|
|
|
|= [wir=wire rep=httr]
|
2018-06-23 06:43:41 +03:00
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
:: XX never happened yet, wat do?
|
|
|
|
~& [%directory-fail rep]
|
|
|
|
this
|
|
|
|
=. dir (directory:grab (need (de-json:html q:(need r.rep))))
|
|
|
|
?~(reg.act register:effect this)
|
|
|
|
:: +nonce: accept new nonce (XX already saved?), trigger next effect
|
|
|
|
::
|
|
|
|
:: As specified in the wire.
|
|
|
|
::
|
|
|
|
++ nonce
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(204 p.rep)
|
|
|
|
:: XX never happened yet, retry nonce?
|
|
|
|
~& [%nonce-fail wir rep]
|
|
|
|
this
|
|
|
|
?. &(?=(^ wir) ?=([%next ^] t.wir))
|
|
|
|
~& [%unrecognized-nonce-wire wir]
|
|
|
|
this
|
|
|
|
=* nex i.t.t.wir
|
|
|
|
?+ nex
|
|
|
|
~& [%unknown-nonce-next nex]
|
|
|
|
this
|
|
|
|
%register register:effect
|
|
|
|
%new-order new-order:effect
|
|
|
|
%finalize-order finalize-order:effect
|
|
|
|
%finalize-trial finalize-trial:effect
|
2018-05-15 07:26:59 +03:00
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +register: accept ACME service registration
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ register
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(201 p.rep)
|
|
|
|
::XX 204?
|
|
|
|
?: (bad-nonce rep)
|
|
|
|
(nonce:effect /next/register)
|
|
|
|
:: XX retry immediately or backoff?
|
|
|
|
~& [%register-fail wir rep]
|
|
|
|
this
|
2018-05-15 07:26:59 +03:00
|
|
|
=/ loc=@t
|
|
|
|
q:(head (skim q.rep |=((pair @t @t) ?=(%location p))))
|
2018-05-18 18:34:55 +03:00
|
|
|
=/ wen=@t :: XX @da
|
|
|
|
?~ r.rep
|
|
|
|
(scot %da now.bow)
|
|
|
|
=/ bod=[id=@t wen=@t sas=@t]
|
|
|
|
(acct:grab (need (de-json:html q.u.r.rep)))
|
|
|
|
?> ?=(%valid sas.bod)
|
|
|
|
wen.bod
|
|
|
|
this(reg.act `[wen loc])
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX rekey
|
|
|
|
::
|
|
|
|
:: +new-order: order created, begin processing authorizations
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ new-order
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(201 p.rep)
|
|
|
|
?: (bad-nonce rep)
|
|
|
|
(nonce:effect /next/new-order)
|
|
|
|
:: XX retry immediately or backoff?
|
|
|
|
:: XX possible 204?
|
|
|
|
~& [%new-order-fail wir rep]
|
|
|
|
this
|
|
|
|
:: XX delete order if not?
|
|
|
|
?> ?=(^ pen)
|
2018-05-15 23:52:54 +03:00
|
|
|
=/ loc=@t
|
|
|
|
q:(head (skim q.rep |=((pair @t @t) ?=(%location p))))
|
2018-06-23 06:43:41 +03:00
|
|
|
=/ ego=purl (need (de-purl:html loc))
|
|
|
|
:: XX add parser output types
|
|
|
|
:: XX parse identifiers, confirm equal to pending domains
|
|
|
|
:: XX check status
|
2018-05-15 23:52:54 +03:00
|
|
|
=/ bod=[aut=(list purl) fin=purl exp=@t sas=@t]
|
2018-05-15 07:26:59 +03:00
|
|
|
(order:grab (need (de-json:html q:(need r.rep))))
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX maybe generate key here?
|
|
|
|
=/ csr=@ux (en:der:pkcs10 cey ~(tap in u.pen))
|
|
|
|
=/ dor=order
|
|
|
|
[dom=u.pen sas=%wake exp.bod ego fin.bod cey csr [aut.bod ~ ~]]
|
|
|
|
get-authz:effect(rod `dor, pen ~)
|
|
|
|
:: +finalize-order: order finalized, poll for certificate
|
2018-05-18 09:05:12 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ finalize-order
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
?: (bad-nonce rep)
|
|
|
|
(nonce:effect /next/finalize-order)
|
|
|
|
~& [%finalize-order-fail wir rep]
|
|
|
|
?> ?=(^ rod)
|
|
|
|
:: XX get the failure reason
|
|
|
|
this(rod ~, fal.hit [u.rod fal.hit])
|
|
|
|
?> ?=(^ rod)
|
|
|
|
:: XX rep body missing authorizations, need flexible/separate parser
|
2018-05-18 19:50:45 +03:00
|
|
|
:: XX finalizing-order
|
2018-05-18 19:23:34 +03:00
|
|
|
:: =/ bod=[aut=(list purl) fin=purl exp=@t sas=@t]
|
|
|
|
:: (order:grab (need (de-json:html q:(need r.rep))))
|
2018-05-15 23:52:54 +03:00
|
|
|
:: XX check status? (i don't think failures get here)
|
2018-06-23 06:43:41 +03:00
|
|
|
check-order:effect
|
|
|
|
:: +check-order: check if certificate is ready for finalized order
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
++ check-order
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
:: XX retry immediately? backoff?
|
|
|
|
~& [%check-order-fail wir rep]
|
|
|
|
this
|
|
|
|
?> ?=(^ rod)
|
2018-05-15 23:52:54 +03:00
|
|
|
=/ raw=json
|
|
|
|
(need (de-json:html q:(need r.rep)))
|
2018-05-18 19:50:45 +03:00
|
|
|
=/ bod=[exp=@t sas=@t]
|
|
|
|
(finalizing-order:grab raw)
|
2018-05-15 23:52:54 +03:00
|
|
|
?+ sas.bod
|
2018-06-23 06:43:41 +03:00
|
|
|
~& [%check-order-status-unknown sas.bod]
|
|
|
|
this
|
|
|
|
::
|
|
|
|
%invalid
|
|
|
|
~& [%check-order-fail %invalid wir rep]
|
|
|
|
:: XX check authz for debug info
|
|
|
|
:: XX send notification somehow?
|
|
|
|
:: XX start over with new order?
|
|
|
|
this
|
|
|
|
::
|
|
|
|
%pending
|
|
|
|
check-order:effect
|
|
|
|
::
|
|
|
|
%processing
|
|
|
|
check-order:effect
|
|
|
|
::
|
|
|
|
%valid
|
|
|
|
:: XX json reparser unit
|
|
|
|
=/ bod=[exp=@t sas=@t cer=purl]
|
|
|
|
(final-order:grab raw)
|
|
|
|
:: XX update order state
|
|
|
|
:: XX =< delete-trial
|
|
|
|
(certificate:effect cer.bod)
|
2018-05-15 23:52:54 +03:00
|
|
|
==
|
|
|
|
::
|
2018-06-23 06:43:41 +03:00
|
|
|
:: +certificate: accept PEM-encoded certificate
|
|
|
|
::
|
|
|
|
++ certificate
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
:: XX retry immediately? backoff?
|
|
|
|
~& [%certificate-fail wir rep]
|
|
|
|
this
|
|
|
|
?> ?=(^ rod)
|
|
|
|
=/ cer=wain (to-wain:format q:(need r.rep))
|
|
|
|
=/ fig=config
|
|
|
|
:: XX expiration date
|
|
|
|
[dom.u.rod key.u.rod cer *@da ego.u.rod]
|
|
|
|
=? fig.hit ?=(^ liv) [u.liv fig.hit]
|
|
|
|
this(liv `fig, rod ~)
|
|
|
|
:: XX send configuration to eyre
|
|
|
|
:: XX other subscribers?
|
|
|
|
:: +get-authz: accept ACME service authorization object
|
|
|
|
::
|
|
|
|
++ get-authz
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
:: XX retry immediately? backoff?
|
|
|
|
~& [%get-authz-fail wir rep]
|
|
|
|
this
|
|
|
|
?> ?=(^ rod)
|
|
|
|
?> ?=(^ pending.aut.u.rod)
|
|
|
|
:: XX parser types
|
|
|
|
=/ bod=[dom=turf sas=@t exp=@t cal=[typ=@t sas=@t ego=purl tok=@t]]
|
|
|
|
(auth:grab (need (de-json:html q:(need r.rep))))
|
|
|
|
=/ cal=trial
|
|
|
|
:: XX parse token to verify url-safe base64?
|
|
|
|
[%http ego.cal.bod tok.cal.bod %recv]
|
|
|
|
:: XX check that URLs are the same
|
|
|
|
=/ tau=auth [i.pending.aut.u.rod dom.bod cal]
|
|
|
|
:: XX get idx from wire instead?
|
|
|
|
=/ idx=@ud +((lent done.aut.u.rod))
|
|
|
|
=/ rod-aut=order-auth
|
|
|
|
%= aut.u.rod
|
|
|
|
pending t.pending.aut.u.rod
|
|
|
|
active `[idx tau]
|
|
|
|
==
|
|
|
|
=< test-trial:effect
|
|
|
|
save-trial:effect(aut.u.rod rod-aut)
|
|
|
|
:: XX check/finalize-authz ??
|
|
|
|
::
|
|
|
|
:: +test-trial: accept response from challenge test
|
|
|
|
::
|
|
|
|
:: Note that +save-trail:effect has no corresponding event.
|
|
|
|
::
|
|
|
|
++ test-trial
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
:: XX retry immediately? backoff?
|
|
|
|
~& [%test-trial-fail wir rep]
|
|
|
|
this
|
|
|
|
?> ?=(^ rod)
|
|
|
|
?> ?=(^ active.aut.u.rod)
|
|
|
|
:: XX check content type and response body
|
|
|
|
finalize-trial:effect
|
|
|
|
:: +finalize-trial:
|
|
|
|
::
|
|
|
|
++ finalize-trial
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^+ this
|
|
|
|
?. =(200 p.rep)
|
|
|
|
?: (bad-nonce rep)
|
|
|
|
(nonce:effect /next/finalize-trial)
|
|
|
|
:: XX retry? or cancel order?
|
|
|
|
:: XX 204 assume pending?
|
|
|
|
~& [%finalize-trial-fail wir rep]
|
|
|
|
:: XX handle "challenge is not pending"
|
|
|
|
this
|
|
|
|
?> ?=(^ rod)
|
|
|
|
?> ?=(^ active.aut.u.rod)
|
|
|
|
=* aut u.active.aut.u.rod
|
|
|
|
=/ bod=[typ=@t sas=@t url=purl tok=@t]
|
|
|
|
(challenge:grab (need (de-json:html q:(need r.rep))))
|
2018-06-24 05:31:20 +03:00
|
|
|
:: XX check for other possible values in 200 response
|
|
|
|
:: note: may have already been validated
|
|
|
|
?> ?=(?(%pending %valid) sas.bod)
|
2018-06-23 06:43:41 +03:00
|
|
|
=/ rod-aut=order-auth
|
|
|
|
aut.u.rod(active ~, done [+.aut(sas.cal %pend) done.aut.u.rod])
|
|
|
|
?~ pending.aut.u.rod
|
|
|
|
finalize-order:effect(aut.u.rod rod-aut)
|
|
|
|
get-authz:effect(aut.u.rod rod-aut)
|
|
|
|
:: XX delete-trial?
|
|
|
|
::
|
|
|
|
:: +retry: retry effect after timeout
|
|
|
|
::
|
|
|
|
++ retry
|
|
|
|
:: XX implement wire parsing / next effect
|
|
|
|
!!
|
|
|
|
--
|
|
|
|
:: +sigh-tang: handle http request failure
|
|
|
|
::
|
|
|
|
++ sigh-tang
|
|
|
|
|= [wir=wire saw=tang]
|
|
|
|
^- (quip move _this)
|
|
|
|
~& [%sigh-tang wir]
|
|
|
|
:: XX take evasive action
|
|
|
|
[((slog saw) ~) this]
|
|
|
|
:: +sigh-httr: accept http response
|
|
|
|
::
|
|
|
|
++ sigh-httr
|
|
|
|
|= [wir=wire rep=httr]
|
|
|
|
^- (quip move _this)
|
|
|
|
~& [wir rep]
|
|
|
|
?> ?=([%acme ^] wir)
|
|
|
|
:: add nonce to pool, if present
|
|
|
|
=/ nonhed (skim q.rep |=((pair @t @t) ?=(%replay-nonce p)))
|
|
|
|
=? nonces ?=(^ nonhed) [q.i.nonhed nonces]
|
|
|
|
=< abet
|
|
|
|
~| [%sigh-fail wir rep]
|
2018-06-23 07:11:22 +03:00
|
|
|
%. [t.wir rep]
|
2018-06-23 06:43:41 +03:00
|
|
|
?+ i.t.wir
|
|
|
|
~&([%unknown-wire i.t.wir] !!)
|
2018-06-23 07:11:22 +03:00
|
|
|
%directory directory:event
|
|
|
|
%nonce nonce:event
|
|
|
|
%register register:event
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX rekey
|
2018-06-23 07:11:22 +03:00
|
|
|
%new-order new-order:event
|
|
|
|
%finalize-order finalize-order:event
|
|
|
|
%check-order check-order:event
|
|
|
|
%certificate certificate:event
|
|
|
|
%get-authz get-authz:event
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX check/finalize-authz ??
|
2018-06-23 07:11:22 +03:00
|
|
|
%test-trial test-trial:event
|
|
|
|
%finalize-trial finalize-trial:event
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX delete-trial?
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
|
|
|
::
|
2018-05-17 06:08:15 +03:00
|
|
|
++ poke-noun
|
|
|
|
|= a=*
|
|
|
|
^- (quip move _this)
|
2018-06-23 06:43:41 +03:00
|
|
|
=< abet
|
|
|
|
?+ a
|
|
|
|
~&(+<+.this this)
|
|
|
|
%init init
|
|
|
|
%reg register:effect
|
|
|
|
%order new-order:effect
|
|
|
|
%auth get-authz:effect
|
|
|
|
%trial test-trial:effect
|
|
|
|
%final finalize-order:effect
|
|
|
|
%poll check-order:effect
|
|
|
|
%our (add-order /org/urbit/(crip +:(scow %p our.bow)) ~)
|
2018-05-17 06:08:15 +03:00
|
|
|
%test test
|
|
|
|
==
|
|
|
|
::
|
|
|
|
++ poke-path
|
2018-05-22 02:43:56 +03:00
|
|
|
|=(a=path abet:(add-order a ~))
|
2018-05-17 06:08:15 +03:00
|
|
|
::
|
2018-05-15 23:52:54 +03:00
|
|
|
:: ++ prep _[~ this]
|
2018-05-15 07:26:59 +03:00
|
|
|
++ prep
|
|
|
|
|= old=(unit acme)
|
2018-06-23 06:43:41 +03:00
|
|
|
^- (quip move _this)
|
|
|
|
?^ old
|
|
|
|
[~ this(+<+ u.old)]
|
|
|
|
?: ?=(?(%earl %pawn) (clan:title our.bow))
|
|
|
|
[~ this]
|
|
|
|
abet:init
|
2018-05-15 07:26:59 +03:00
|
|
|
::
|
2018-05-15 23:52:54 +03:00
|
|
|
++ rekey :: XX do something about this
|
2018-05-18 19:36:39 +03:00
|
|
|
|= eny=@
|
2018-05-15 23:52:54 +03:00
|
|
|
=| i=@
|
|
|
|
|- ^- key:rsa
|
2018-05-18 19:36:39 +03:00
|
|
|
=/ k (new-key:rsa 2.048 eny)
|
2018-05-16 22:38:50 +03:00
|
|
|
=/ m (met 0 n.pub.k)
|
2018-06-23 06:43:41 +03:00
|
|
|
:: ?: =(0 (mod m 8)) k
|
|
|
|
?: =(2.048 m) k
|
2018-05-15 23:52:54 +03:00
|
|
|
~& [%key iter=i width=m]
|
2018-05-18 19:36:39 +03:00
|
|
|
$(i +(i), eny +(eny))
|
2018-05-15 23:52:54 +03:00
|
|
|
::
|
2018-05-15 07:26:59 +03:00
|
|
|
++ init
|
|
|
|
=/ url
|
2018-05-17 06:08:15 +03:00
|
|
|
'https://acme-staging-v02.api.letsencrypt.org/directory'
|
2018-06-23 06:43:41 +03:00
|
|
|
=< directory:effect
|
|
|
|
%= this
|
2018-05-18 19:36:39 +03:00
|
|
|
bas (need (de-purl:html url))
|
2018-05-18 19:58:55 +03:00
|
|
|
act [(rekey eny.bow) ~]
|
|
|
|
cey (rekey (mix eny.bow (shaz now.bow)))
|
2018-05-18 19:36:39 +03:00
|
|
|
==
|
2018-05-17 06:08:15 +03:00
|
|
|
:: XX wait for DNS binding confirmation?
|
|
|
|
:: (add-order /org/urbit/(crip +:(scow %p our.bow)) ~)
|
|
|
|
::
|
|
|
|
++ add-order
|
|
|
|
|= dom=(list turf)
|
|
|
|
^+ this
|
2018-06-23 06:43:41 +03:00
|
|
|
:: XX we may have pending moves out for this order
|
|
|
|
:: XX put dates in wires, check against order creation date?
|
|
|
|
:: XX or re-use order-id?
|
|
|
|
=? fal.hit ?=(^ rod) [u.rod fal.hit]
|
|
|
|
:: XX check registration, defer
|
2018-06-24 06:27:43 +03:00
|
|
|
new-order:effect(rod ~, pen `(sy dom))
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
|
|
|
++ test
|
2018-04-27 23:31:18 +03:00
|
|
|
=, tester:tester
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ eny eny.bow
|
|
|
|
:: non-deterministic for now
|
|
|
|
:: 0vhu.gp79o.hi7at.smp8u.g5hhr.u3rff.st8ms.q4dc2.hv5ls.tp5cp.10qds.
|
|
|
|
:: h9bpt.vlmm7.lh375.f6u9n.krqv8.5jcml.cujkr.v1uqv.cjhe5.nplta
|
2018-05-11 22:19:26 +03:00
|
|
|
|^ =/ out=tang
|
2018-04-19 09:27:55 +03:00
|
|
|
;: weld
|
2018-04-30 19:17:53 +03:00
|
|
|
test-base64
|
2018-05-08 03:50:00 +03:00
|
|
|
test-asn1
|
2018-05-16 22:38:50 +03:00
|
|
|
test-rsakey
|
2018-05-09 02:56:56 +03:00
|
|
|
test-rsa
|
2018-04-30 19:17:53 +03:00
|
|
|
test-rsapem
|
2018-05-11 06:13:30 +03:00
|
|
|
test-rsa-pkcs8
|
2018-05-08 03:50:00 +03:00
|
|
|
test-rs256
|
2018-05-09 07:03:51 +03:00
|
|
|
test-jwk
|
2018-05-09 20:45:39 +03:00
|
|
|
test-jws
|
2018-05-11 07:53:10 +03:00
|
|
|
test-csr
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-06-23 06:43:41 +03:00
|
|
|
?~(out this ((slog out) this))
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-04-30 19:17:53 +03:00
|
|
|
++ test-base64
|
2018-04-19 09:27:55 +03:00
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
2018-05-08 23:13:38 +03:00
|
|
|
['AQAB' (en-base64url 65.537)]
|
2018-04-30 19:17:53 +03:00
|
|
|
%- expect-eq !>
|
2018-05-08 23:13:38 +03:00
|
|
|
[65.537 (need (de-base64url 'AQAB'))]
|
|
|
|
:: echo "hello" | base64
|
|
|
|
%- expect-eq !>
|
|
|
|
['aGVsbG8K' (en:base64 'hello\0a')]
|
|
|
|
%- expect-eq !>
|
|
|
|
['hello\0a' (need (de:base64 'aGVsbG8K'))]
|
|
|
|
:: echo -n -e "\x01\x01\x02\x03" | base64
|
|
|
|
%- expect-eq !>
|
|
|
|
['AQECAw==' (en:base64 (swp 3 0x101.0203))]
|
|
|
|
%- expect-eq !>
|
|
|
|
[0x302.0101 (need (de:base64 'AQECAw=='))]
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
|
|
|
::
|
2018-05-08 03:50:00 +03:00
|
|
|
++ test-asn1
|
|
|
|
=/ nul=spec:asn1 [%nul ~]
|
|
|
|
=/ int=spec:asn1 [%int 187]
|
|
|
|
=/ obj=spec:asn1 [%obj sha-256:obj:asn1]
|
|
|
|
=/ oct=spec:asn1 [%oct (shax 'hello\0a')]
|
|
|
|
=/ seq=spec:asn1 [%seq [%seq obj nul ~] oct ~]
|
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
|
|
|
:- [0x5 0x0 ~]
|
2018-05-17 21:27:15 +03:00
|
|
|
~(ren raw:en:der nul)
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-25 21:45:16 +03:00
|
|
|
[nul (scan ~(ren raw:en:der nul) parse:de:der)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
:- [0x2 0x2 0x0 0xbb ~]
|
2018-05-17 21:27:15 +03:00
|
|
|
~(ren raw:en:der int)
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-25 21:45:16 +03:00
|
|
|
[int (scan ~(ren raw:en:der int) parse:de:der)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
:- [0x6 0x9 0x60 0x86 0x48 0x1 0x65 0x3 0x4 0x2 0x1 ~]
|
2018-05-17 21:27:15 +03:00
|
|
|
~(ren raw:en:der obj)
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-25 21:45:16 +03:00
|
|
|
[obj (scan ~(ren raw:en:der obj) parse:de:der)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
:- 0x420.5891.b5b5.22d5.df08.6d0f.f0b1.10fb.
|
|
|
|
d9d2.1bb4.fc71.63af.34d0.8286.a2e8.46f6.be03
|
2018-05-17 21:27:15 +03:00
|
|
|
`@ux`(swp 3 (en:der oct))
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-25 21:45:16 +03:00
|
|
|
[oct (scan ~(ren raw:en:der oct) parse:de:der)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
:- 0x30.3130.0d06.0960.8648.0165.0304.0201.0500.0420.5891.b5b5.22d5.
|
|
|
|
df08.6d0f.f0b1.10fb.d9d2.1bb4.fc71.63af.34d0.8286.a2e8.46f6.be03
|
2018-05-17 21:27:15 +03:00
|
|
|
`@ux`(swp 3 (en:der seq))
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-25 21:45:16 +03:00
|
|
|
[seq (scan ~(ren raw:en:der seq) parse:de:der)]
|
2018-05-08 03:50:00 +03:00
|
|
|
==
|
|
|
|
::
|
2018-05-09 02:56:56 +03:00
|
|
|
++ test-rsakey
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ primes=(list @)
|
|
|
|
:~ 2 3 5 7 11 13 17 19 23 29 31 37 41 43
|
|
|
|
47 53 59 61 67 71 73 79 83 89 97 101 103 107
|
|
|
|
109 113 127 131 137 139 149 151 157 163 167 173 179 181
|
|
|
|
191 193 197 199 211 223 227 229 233 239 241 251 257 263
|
|
|
|
269 271 277 281 283 293 307 311 313 317 331 337 347 349
|
|
|
|
353 359 367 373 379 383 389 397 401 409 419 421 431 433
|
|
|
|
439 443 449 457 461 463 467 479 487 491 499 503 509 521
|
|
|
|
523 541 547 557 563 569 571 577 587 593 599 601 607 613
|
|
|
|
617 619 631 641 643 647 653 659 661 673 677 683 691 701
|
|
|
|
709 719 727 733 739 743 751
|
|
|
|
==
|
|
|
|
=/ k1 (new-key:rsa 2.048 eny)
|
|
|
|
::
|
2018-04-30 21:51:56 +03:00
|
|
|
=/ k2=key:rsa
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ p 0x1837.be57.1286.bf6a.3cf8.4716.634f.ef85.f947.c654.da6e.e222.
|
|
|
|
5654.9466.0ab0.a2ef.1985.1095.e3c3.9e74.9478.e3f3.ee92.f885.ec3c.
|
|
|
|
84c3.6b3c.9731.65f9.9d1d.f743.646f.37d7.82d8.3f4a.856c.6453.b2c8.
|
|
|
|
28d5.d720.145e.c7ab.4ba9.a9c2.6b8e.8819.7aa8.69b3.420f.dbfa.1ddb.
|
|
|
|
4d1a.9c2e.e25a.d4de.d351.945f.d7ca.74a4.815d.5f0e.9f44.df64.39bd
|
|
|
|
=/ q 0xf1bc.ec8f.d238.32d9.afb8.8083.76b3.82da.6274.f56e.1b5b.662b.
|
|
|
|
ab1b.1e01.fbd5.86c5.ba98.b246.b621.f190.2425.25ea.b39f.efa2.4fb8.
|
|
|
|
0d6b.c3c4.460d.e7df.d2f5.6604.51e0.415b.db60.db5a.6601.16c7.46ec.
|
|
|
|
5e67.9195.f3c9.80d3.47c5.fe24.fbfd.43c3.380a.40bd.c4f5.d65e.b93b.
|
|
|
|
60ca.5f26.4ed7.9c64.d26d.b0fe.985d.7be3.1308.34dd.b8c5.4d7c.d8a5
|
|
|
|
=/ n (mul p q)
|
|
|
|
=/ e 0x1.0001
|
|
|
|
=/ d (~(inv fo (elcm:rsa (dec p) (dec q))) e)
|
2018-05-16 22:38:50 +03:00
|
|
|
[[n e] `[d p q]]
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-11 22:19:26 +03:00
|
|
|
|^ ^- tang
|
2018-04-19 09:27:55 +03:00
|
|
|
;: weld
|
|
|
|
(check-primes k1)
|
|
|
|
(check-primes k2)
|
|
|
|
==
|
|
|
|
++ check-primes
|
|
|
|
=, number
|
|
|
|
|= k=key:rsa
|
2018-05-16 22:38:50 +03:00
|
|
|
?> ?=(^ sek.k)
|
2018-04-19 09:27:55 +03:00
|
|
|
%+ roll primes
|
2018-05-11 22:19:26 +03:00
|
|
|
|= [p=@ a=tang]
|
2018-04-19 09:27:55 +03:00
|
|
|
?^ a a
|
2018-05-16 22:38:50 +03:00
|
|
|
?: =(0 (mod n.pub.k p))
|
|
|
|
:~ leaf+"{(scow %ux n.pub.k)}"
|
2018-05-11 22:19:26 +03:00
|
|
|
:- %leaf
|
|
|
|
%+ weld
|
2018-05-16 22:38:50 +03:00
|
|
|
"n.pub.key (prime? {(scow %f (pram n.pub.k))})"
|
2018-05-11 22:19:26 +03:00
|
|
|
" divisible by {(scow %ud p)}:"
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-05-16 22:38:50 +03:00
|
|
|
?: =(0 (mod p.u.sek.k p))
|
|
|
|
:~ leaf+"{(scow %ux p.u.sek.k)}"
|
2018-05-11 22:19:26 +03:00
|
|
|
:- %leaf
|
|
|
|
%+ weld
|
2018-05-16 22:38:50 +03:00
|
|
|
"p.u.sek.key (prime? {(scow %f (pram p.u.sek.k))})"
|
2018-05-11 22:19:26 +03:00
|
|
|
" divisible by {(scow %ud p)}:"
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-05-16 22:38:50 +03:00
|
|
|
?: =(0 (mod q.u.sek.k p))
|
|
|
|
:~ leaf+"{(scow %ux q.u.sek.k)}"
|
2018-05-11 22:19:26 +03:00
|
|
|
:- %leaf
|
|
|
|
%+ weld
|
2018-05-16 22:38:50 +03:00
|
|
|
"q.u.sek.key (prime? {(scow %f (pram q.u.sek.k))})"
|
2018-05-11 22:19:26 +03:00
|
|
|
" divisible by {(scow %ud p)}:"
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
|
|
|
~
|
|
|
|
--
|
|
|
|
::
|
2018-05-01 05:15:57 +03:00
|
|
|
++ test-rsapem
|
2018-05-09 02:56:56 +03:00
|
|
|
:: ex from https://stackoverflow.com/a/19855935
|
2018-05-16 22:38:50 +03:00
|
|
|
=/ k1=key:rsa
|
|
|
|
:- [`@ux`187 `@ux`7]
|
|
|
|
[~ `@ux`23 `@ux`17 `@ux`11]
|
2018-05-08 03:50:00 +03:00
|
|
|
=/ kpem1=wain
|
2018-05-01 05:15:57 +03:00
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MBwCAQACAgC7AgEHAgEXAgERAgELAgEHAgEDAgEO'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
2018-05-08 03:50:00 +03:00
|
|
|
=/ k2=key:rsa
|
2018-05-16 22:38:50 +03:00
|
|
|
:* [n=`@ux`16.238.973.331.713.186.433 e=`@ux`65.537]
|
|
|
|
~
|
2018-05-08 03:50:00 +03:00
|
|
|
d=`@ux`3.298.243.342.098.580.397
|
2018-05-16 22:38:50 +03:00
|
|
|
p=`@ux`4.140.273.707
|
|
|
|
q=`@ux`3.922.198.019
|
2018-05-08 03:50:00 +03:00
|
|
|
==
|
2018-05-09 02:56:56 +03:00
|
|
|
:: openssl genrsa -out private.pem 64
|
2018-05-08 03:50:00 +03:00
|
|
|
=/ kpem2=wain
|
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MEACAQACCQDhXGw1Gc5agQIDAQABAggtxbbYRJVDrQIFAPbHkCsCBQDpx/4DAgUA'
|
|
|
|
'23X55QIFAIpPROsCBQC56nYF'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
2018-05-09 02:56:56 +03:00
|
|
|
:: openssl genrsa -out private.pem 2048
|
2018-05-08 03:50:00 +03:00
|
|
|
=/ kpem3=wain
|
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MIIEowIBAAKCAQEA2jJp8dgAKy5cSzDE4D+aUbKZsQoMhIWI2IFlE+AO0GCBMig5'
|
|
|
|
'qxx2IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8QIKRvkZaIwnA3Lz5UUrxgh96sezdX'
|
|
|
|
'CCSG7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3kneo5aAKMIPyOTzcY590UTc+luQ3'
|
|
|
|
'HhgSiNF3n5YQh24d3kS2YOUoSXQ13+YRljxNfBgXbV+C7/gO8mFxpkafhmgkIGNe'
|
|
|
|
'WlqT9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGvxvBMp3xUASlzYHiDntcB5MiOPRW6'
|
|
|
|
'BoIGI5qDFSYRZBky9crE7WAYgqtPtg21zvxwFwIDAQABAoIBAH0q7GGisj4TIziy'
|
|
|
|
'6k1lzwXMuaO4iwO+gokIeU5UessIgTSfpK1G73CnZaPstDPF1r/lncHfxZfTQuij'
|
|
|
|
'WOHsO7kt+x5+R0ebDd0ZGVA45fsrPrCUR2XRZmDRECuOfTJGA13G7F1B0kJUbfIb'
|
|
|
|
'gAGYIK8x236WNyIrntk804SGpTgstCsZ51rK5GL6diZVQbeU806oP1Zhx/ye//NR'
|
|
|
|
'mS5G0iil//H41pV5WGomOX0mq9/HYBZqCncqzLki6FFdmXykjz8snvXUR40S8B+a'
|
|
|
|
'0F/LN+549PSe2dp9h0Hx4HCJOsL9CyCQimqqqE8KPQ4BUz8q3+Mhx1xEyaxIlNH9'
|
|
|
|
'ECgo1CECgYEA+mi7vQRzstYJerbhCtaeFrOR/n8Dft7FyFN+5IV7H2omy6gf0zr1'
|
|
|
|
'GWjmph5R0sMPgL8uVRGANUrkuZZuCr35iY6zQpdCFB4D9t+zbTvTmrxt2oVaE16/'
|
|
|
|
'dIJ6b8cHzR2QrEh8uw5/rEKzWBCHNS8FvXHPvXvnacTZ5LZRK0ssshECgYEA3xGQ'
|
|
|
|
'nDlmRwyVto/1DQMLnjIMazQ719qtCO/pf4BHeqcDYnIwYb5zLBj2nPV8D9pqM1pG'
|
|
|
|
'OVuOgcC9IimrbHeeGwp1iSTH4AvxDIj6Iyrmbz2db3lGdHVk9xLvTiYzn2KK2sYx'
|
|
|
|
'mFl3DRBFutFQ2YxddqHbE3Ds96Y/uRXhqj7I16cCgYEA1AVNwHM+i1OS3yZtUUH6'
|
|
|
|
'xPnySWu9x/RTvpSDwnYKk8TLaHDH0Y//6y3Y7RqK6Utjmv1E+54/0d/B3imyrsG/'
|
|
|
|
'wWrj+SQdPO9VJ/is8XZQapnU4cs7Q19b+AhqJq58un2n+1e81J0oGPC47X3BHZTc'
|
|
|
|
'5VSyMpvwiqu0WmTMQT37cCECgYACMEbt8XY6bjotz13FIemERNNwXdPUe1XFR61P'
|
|
|
|
'ze9lmavj1GD7JIY2wYvx4Eq2URtHo7QarfZI+Z4hbq065DWN6F1c2hqH7TYRPGrP'
|
|
|
|
'24TlRIJ97H+vdtNlxS7J4oARKUNZgCZOa1pKq4UznwgfCkyEdHQUzb/VcjEf3MIZ'
|
|
|
|
'DIKl8wKBgBrsIjiDvpkfnpmQ7fehEJIi+V4SGskLxFH3ZTvngFFoYry3dL5gQ6mF'
|
|
|
|
'sDfrn4igIcEy6bMpJQ3lbwStyzcWZLMJgdI23FTlPXTEG7PclZSuxBpQpvg3MiVO'
|
|
|
|
'zqVTrhnY+TemcScSx5O6f32aDfOUWWCzmw/gzvJxUYlJqjqd7dlT'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
2018-05-17 08:40:22 +03:00
|
|
|
=/ kpem3-pub=wain
|
|
|
|
:~ '-----BEGIN RSA PUBLIC KEY-----'
|
|
|
|
'MIIBCgKCAQEA2jJp8dgAKy5cSzDE4D+aUbKZsQoMhIWI2IFlE+AO0GCBMig5qxx2'
|
|
|
|
'IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8QIKRvkZaIwnA3Lz5UUrxgh96sezdXCCSG'
|
|
|
|
'7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3kneo5aAKMIPyOTzcY590UTc+luQ3HhgS'
|
|
|
|
'iNF3n5YQh24d3kS2YOUoSXQ13+YRljxNfBgXbV+C7/gO8mFxpkafhmgkIGNeWlqT'
|
|
|
|
'9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGvxvBMp3xUASlzYHiDntcB5MiOPRW6BoIG'
|
|
|
|
'I5qDFSYRZBky9crE7WAYgqtPtg21zvxwFwIDAQAB'
|
|
|
|
'-----END RSA PUBLIC KEY-----'
|
|
|
|
==
|
2018-05-08 03:50:00 +03:00
|
|
|
=/ k3=key:rsa
|
2018-05-17 08:40:22 +03:00
|
|
|
(need (ring:de:pem:pkcs1 kpem3))
|
|
|
|
=/ k3-pub=key:rsa
|
|
|
|
(need (pass:de:pem:pkcs1 kpem3-pub))
|
2018-05-01 06:37:58 +03:00
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
2018-05-17 08:40:22 +03:00
|
|
|
[kpem1 (ring:en:pem:pkcs1 k1)]
|
|
|
|
%- expect-eq !>
|
|
|
|
[k1 (need (ring:de:pem:pkcs1 kpem1))]
|
|
|
|
%- expect-eq !>
|
|
|
|
[kpem2 (ring:en:pem:pkcs1 k2)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-17 08:40:22 +03:00
|
|
|
[k2 (need (ring:de:pem:pkcs1 kpem2))]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-17 08:40:22 +03:00
|
|
|
[kpem3 (ring:en:pem:pkcs1 k3)]
|
2018-05-01 06:37:58 +03:00
|
|
|
%- expect-eq !>
|
2018-05-17 08:40:22 +03:00
|
|
|
[kpem3-pub (pass:en:pem:pkcs1 k3)]
|
2018-05-08 03:50:00 +03:00
|
|
|
%- expect-eq !>
|
2018-05-17 08:40:22 +03:00
|
|
|
[k3-pub [pub.k3 ~]]
|
2018-05-01 06:37:58 +03:00
|
|
|
==
|
2018-05-01 05:15:57 +03:00
|
|
|
::
|
2018-05-11 06:13:30 +03:00
|
|
|
++ test-rsa-pkcs8
|
|
|
|
=/ kpem=wain
|
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MIIEowIBAAKCAQEA2jJp8dgAKy5cSzDE4D+aUbKZsQoMhIWI2IFlE+AO0GCBMig5'
|
|
|
|
'qxx2IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8QIKRvkZaIwnA3Lz5UUrxgh96sezdX'
|
|
|
|
'CCSG7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3kneo5aAKMIPyOTzcY590UTc+luQ3'
|
|
|
|
'HhgSiNF3n5YQh24d3kS2YOUoSXQ13+YRljxNfBgXbV+C7/gO8mFxpkafhmgkIGNe'
|
|
|
|
'WlqT9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGvxvBMp3xUASlzYHiDntcB5MiOPRW6'
|
|
|
|
'BoIGI5qDFSYRZBky9crE7WAYgqtPtg21zvxwFwIDAQABAoIBAH0q7GGisj4TIziy'
|
|
|
|
'6k1lzwXMuaO4iwO+gokIeU5UessIgTSfpK1G73CnZaPstDPF1r/lncHfxZfTQuij'
|
|
|
|
'WOHsO7kt+x5+R0ebDd0ZGVA45fsrPrCUR2XRZmDRECuOfTJGA13G7F1B0kJUbfIb'
|
|
|
|
'gAGYIK8x236WNyIrntk804SGpTgstCsZ51rK5GL6diZVQbeU806oP1Zhx/ye//NR'
|
|
|
|
'mS5G0iil//H41pV5WGomOX0mq9/HYBZqCncqzLki6FFdmXykjz8snvXUR40S8B+a'
|
|
|
|
'0F/LN+549PSe2dp9h0Hx4HCJOsL9CyCQimqqqE8KPQ4BUz8q3+Mhx1xEyaxIlNH9'
|
|
|
|
'ECgo1CECgYEA+mi7vQRzstYJerbhCtaeFrOR/n8Dft7FyFN+5IV7H2omy6gf0zr1'
|
|
|
|
'GWjmph5R0sMPgL8uVRGANUrkuZZuCr35iY6zQpdCFB4D9t+zbTvTmrxt2oVaE16/'
|
|
|
|
'dIJ6b8cHzR2QrEh8uw5/rEKzWBCHNS8FvXHPvXvnacTZ5LZRK0ssshECgYEA3xGQ'
|
|
|
|
'nDlmRwyVto/1DQMLnjIMazQ719qtCO/pf4BHeqcDYnIwYb5zLBj2nPV8D9pqM1pG'
|
|
|
|
'OVuOgcC9IimrbHeeGwp1iSTH4AvxDIj6Iyrmbz2db3lGdHVk9xLvTiYzn2KK2sYx'
|
|
|
|
'mFl3DRBFutFQ2YxddqHbE3Ds96Y/uRXhqj7I16cCgYEA1AVNwHM+i1OS3yZtUUH6'
|
|
|
|
'xPnySWu9x/RTvpSDwnYKk8TLaHDH0Y//6y3Y7RqK6Utjmv1E+54/0d/B3imyrsG/'
|
|
|
|
'wWrj+SQdPO9VJ/is8XZQapnU4cs7Q19b+AhqJq58un2n+1e81J0oGPC47X3BHZTc'
|
|
|
|
'5VSyMpvwiqu0WmTMQT37cCECgYACMEbt8XY6bjotz13FIemERNNwXdPUe1XFR61P'
|
|
|
|
'ze9lmavj1GD7JIY2wYvx4Eq2URtHo7QarfZI+Z4hbq065DWN6F1c2hqH7TYRPGrP'
|
|
|
|
'24TlRIJ97H+vdtNlxS7J4oARKUNZgCZOa1pKq4UznwgfCkyEdHQUzb/VcjEf3MIZ'
|
|
|
|
'DIKl8wKBgBrsIjiDvpkfnpmQ7fehEJIi+V4SGskLxFH3ZTvngFFoYry3dL5gQ6mF'
|
|
|
|
'sDfrn4igIcEy6bMpJQ3lbwStyzcWZLMJgdI23FTlPXTEG7PclZSuxBpQpvg3MiVO'
|
|
|
|
'zqVTrhnY+TemcScSx5O6f32aDfOUWWCzmw/gzvJxUYlJqjqd7dlT'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
|
|
|
=/ pub=wain
|
|
|
|
:~ '-----BEGIN PUBLIC KEY-----'
|
|
|
|
'MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2jJp8dgAKy5cSzDE4D+a'
|
|
|
|
'UbKZsQoMhIWI2IFlE+AO0GCBMig5qxx2IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8Q'
|
|
|
|
'IKRvkZaIwnA3Lz5UUrxgh96sezdXCCSG7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3'
|
|
|
|
'kneo5aAKMIPyOTzcY590UTc+luQ3HhgSiNF3n5YQh24d3kS2YOUoSXQ13+YRljxN'
|
|
|
|
'fBgXbV+C7/gO8mFxpkafhmgkIGNeWlqT9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGv'
|
|
|
|
'xvBMp3xUASlzYHiDntcB5MiOPRW6BoIGI5qDFSYRZBky9crE7WAYgqtPtg21zvxw'
|
|
|
|
'FwIDAQAB'
|
|
|
|
'-----END PUBLIC KEY-----'
|
|
|
|
==
|
|
|
|
=/ k=key:rsa
|
2018-05-17 08:40:22 +03:00
|
|
|
(need (ring:de:pem:pkcs1 kpem))
|
2018-05-11 06:13:30 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
[pub (pass:en:pem:pkcs8 k)]
|
|
|
|
::
|
2018-05-09 02:56:56 +03:00
|
|
|
++ test-rsa
|
2018-04-30 21:51:56 +03:00
|
|
|
=/ k1=key:rsa
|
|
|
|
=/ p `@ux`61
|
|
|
|
=/ q `@ux`53
|
|
|
|
=/ e `@ux`17
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ n (mul p q)
|
|
|
|
=/ d (~(inv fo (elcm:rsa (dec p) (dec q))) e)
|
2018-05-16 22:38:50 +03:00
|
|
|
[[n e] `[d p q]]
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-16 22:38:50 +03:00
|
|
|
=/ k2=key:rsa
|
|
|
|
:- [`@ux`143 `@ux`7]
|
|
|
|
[~ `@ux`103 `@ux`11 `@ux`13]
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-09 02:56:56 +03:00
|
|
|
:: ex from http://doctrina.org/How-RSA-Works-With-Examples.html
|
2018-04-30 21:51:56 +03:00
|
|
|
=/ k3=key:rsa
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ p
|
|
|
|
12.131.072.439.211.271.897.323.671.531.612.440.428.472.427.633.701.410.
|
|
|
|
925.634.549.312.301.964.373.042.085.619.324.197.365.322.416.866.541.
|
|
|
|
017.057.361.365.214.171.711.713.797.974.299.334.871.062.829.803.541
|
|
|
|
=/ q
|
|
|
|
12.027.524.255.478.748.885.956.220.793.734.512.128.733.387.803.682.075.
|
|
|
|
433.653.899.983.955.179.850.988.797.899.869.146.900.809.131.611.153.
|
|
|
|
346.817.050.832.096.022.160.146.366.346.391.812.470.987.105.415.233
|
|
|
|
=/ n (mul p q)
|
|
|
|
=/ e 65.537
|
|
|
|
=/ d (~(inv fo (elcm:rsa (dec p) (dec q))) e)
|
2018-05-16 22:38:50 +03:00
|
|
|
[[`@ux`n `@ux`e] `[`@ux`d `@ux`p `@ux`q]]
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ m3 (swp 3 'attack at dawn')
|
|
|
|
=/ c3
|
|
|
|
35.052.111.338.673.026.690.212.423.937.053.328.511.880.760.811.579.981.
|
|
|
|
620.642.802.346.685.810.623.109.850.235.943.049.080.973.386.241.113.
|
|
|
|
784.040.794.704.193.978.215.378.499.765.413.083.646.438.784.740.952.
|
|
|
|
306.932.534.945.195.080.183.861.574.225.226.218.879.827.232.453.912.
|
|
|
|
820.596.886.440.377.536.082.465.681.750.074.417.459.151.485.407.445.
|
|
|
|
862.511.023.472.235.560.823.053.497.791.518.928.820.272.257.787.786
|
|
|
|
::
|
2018-05-16 22:38:50 +03:00
|
|
|
?> ?=(^ sek.k1)
|
2018-04-19 09:27:55 +03:00
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
2018-05-16 22:38:50 +03:00
|
|
|
[413 d.u.sek.k1]
|
2018-04-19 09:27:55 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
[2.790 (en:rsa 65 k1)]
|
|
|
|
%- expect-eq !>
|
|
|
|
[65 (de:rsa 2.790 k1)]
|
|
|
|
::
|
|
|
|
%- expect-eq !>
|
|
|
|
[48 (en:rsa 9 k2)]
|
|
|
|
%- expect-eq !>
|
|
|
|
[9 (de:rsa 48 k2)]
|
|
|
|
::
|
|
|
|
%- expect-eq !>
|
|
|
|
[c3 (en:rsa m3 k3)]
|
|
|
|
%- expect-eq !>
|
|
|
|
[m3 (de:rsa c3 k3)]
|
|
|
|
==
|
2018-04-27 23:31:18 +03:00
|
|
|
::
|
2018-05-08 03:50:00 +03:00
|
|
|
++ test-rs256
|
2018-05-09 02:56:56 +03:00
|
|
|
:: ex from https://stackoverflow.com/a/41448118
|
2018-05-08 21:02:56 +03:00
|
|
|
=/ k1=key:rsa
|
2018-05-16 22:38:50 +03:00
|
|
|
:* :- n=0xc231.1fc5.fa31.d333.a409.bb4c.e95b.20d2.1cfc.e375.3871.7256.53a2.
|
2018-05-08 21:02:56 +03:00
|
|
|
8425.af6d.e97d.f202.0b23.633f.458d.f12a.6362.7121.bff4.e23c.e578.
|
|
|
|
7e07.7898.0578.61d1.ae60.ac2f
|
2018-05-16 22:38:50 +03:00
|
|
|
e=0x1.0001
|
|
|
|
~
|
|
|
|
d=0xd91.6719.eb10.3e24.768a.a386.8d2b.6bd0.a26b.dcec.9cc3.f86c.25ad.
|
2018-05-08 21:02:56 +03:00
|
|
|
ce33.dfdc.fb1a.4d50.3e07.3d7f.f5fd.748e.43f8.df02.a60e.d730.5314.
|
|
|
|
3e59.1e70.8df7.2c27.93e2.2b69
|
2018-05-16 22:38:50 +03:00
|
|
|
p=0xf7ef.37e6.7fa6.685a.c178.8b01.cf38.da20.ca4b.de5d.8b01.a71b.d28c.
|
|
|
|
65b4.09c3.6e4d
|
|
|
|
q=0xc882.5760.3fb8.a5e2.5e9d.db55.3a73.b647.a3ec.a6e9.abc6.c440.dbc7.
|
|
|
|
05f8.2ed4.da6b
|
2018-05-08 21:02:56 +03:00
|
|
|
==
|
|
|
|
=/ inp1 0x302.0101
|
|
|
|
=/ exp1
|
|
|
|
0x575c.8a41.09ed.6ea2.a708.6338.d150.a5bb.8205.142e.7785.47b5.0cc6.0198.
|
|
|
|
6807.0243.bf49.de7c.6039.0160.e392.faca.18f4.a05d.3a7a.88a4.de86.dd99.
|
|
|
|
f030.eb4a.a755.d7ce
|
2018-05-09 02:56:56 +03:00
|
|
|
=/ emsa1
|
|
|
|
0x1.ffff.ffff.ffff.ffff.ffff.0030.3130.0d06.0960.8648.0165.0304.0201.0500.
|
|
|
|
0420.9184.abd2.bb31.8731.d717.e972.0572.40ea.e26c.ca20.2a8d.35db.e9d2.
|
|
|
|
176f.5268.86a0
|
2018-05-08 21:02:56 +03:00
|
|
|
=/ kpem2=wain
|
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MIIEowIBAAKCAQEA2jJp8dgAKy5cSzDE4D+aUbKZsQoMhIWI2IFlE+AO0GCBMig5'
|
|
|
|
'qxx2IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8QIKRvkZaIwnA3Lz5UUrxgh96sezdX'
|
|
|
|
'CCSG7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3kneo5aAKMIPyOTzcY590UTc+luQ3'
|
|
|
|
'HhgSiNF3n5YQh24d3kS2YOUoSXQ13+YRljxNfBgXbV+C7/gO8mFxpkafhmgkIGNe'
|
|
|
|
'WlqT9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGvxvBMp3xUASlzYHiDntcB5MiOPRW6'
|
|
|
|
'BoIGI5qDFSYRZBky9crE7WAYgqtPtg21zvxwFwIDAQABAoIBAH0q7GGisj4TIziy'
|
|
|
|
'6k1lzwXMuaO4iwO+gokIeU5UessIgTSfpK1G73CnZaPstDPF1r/lncHfxZfTQuij'
|
|
|
|
'WOHsO7kt+x5+R0ebDd0ZGVA45fsrPrCUR2XRZmDRECuOfTJGA13G7F1B0kJUbfIb'
|
|
|
|
'gAGYIK8x236WNyIrntk804SGpTgstCsZ51rK5GL6diZVQbeU806oP1Zhx/ye//NR'
|
|
|
|
'mS5G0iil//H41pV5WGomOX0mq9/HYBZqCncqzLki6FFdmXykjz8snvXUR40S8B+a'
|
|
|
|
'0F/LN+549PSe2dp9h0Hx4HCJOsL9CyCQimqqqE8KPQ4BUz8q3+Mhx1xEyaxIlNH9'
|
|
|
|
'ECgo1CECgYEA+mi7vQRzstYJerbhCtaeFrOR/n8Dft7FyFN+5IV7H2omy6gf0zr1'
|
|
|
|
'GWjmph5R0sMPgL8uVRGANUrkuZZuCr35iY6zQpdCFB4D9t+zbTvTmrxt2oVaE16/'
|
|
|
|
'dIJ6b8cHzR2QrEh8uw5/rEKzWBCHNS8FvXHPvXvnacTZ5LZRK0ssshECgYEA3xGQ'
|
|
|
|
'nDlmRwyVto/1DQMLnjIMazQ719qtCO/pf4BHeqcDYnIwYb5zLBj2nPV8D9pqM1pG'
|
|
|
|
'OVuOgcC9IimrbHeeGwp1iSTH4AvxDIj6Iyrmbz2db3lGdHVk9xLvTiYzn2KK2sYx'
|
|
|
|
'mFl3DRBFutFQ2YxddqHbE3Ds96Y/uRXhqj7I16cCgYEA1AVNwHM+i1OS3yZtUUH6'
|
|
|
|
'xPnySWu9x/RTvpSDwnYKk8TLaHDH0Y//6y3Y7RqK6Utjmv1E+54/0d/B3imyrsG/'
|
|
|
|
'wWrj+SQdPO9VJ/is8XZQapnU4cs7Q19b+AhqJq58un2n+1e81J0oGPC47X3BHZTc'
|
|
|
|
'5VSyMpvwiqu0WmTMQT37cCECgYACMEbt8XY6bjotz13FIemERNNwXdPUe1XFR61P'
|
|
|
|
'ze9lmavj1GD7JIY2wYvx4Eq2URtHo7QarfZI+Z4hbq065DWN6F1c2hqH7TYRPGrP'
|
|
|
|
'24TlRIJ97H+vdtNlxS7J4oARKUNZgCZOa1pKq4UznwgfCkyEdHQUzb/VcjEf3MIZ'
|
|
|
|
'DIKl8wKBgBrsIjiDvpkfnpmQ7fehEJIi+V4SGskLxFH3ZTvngFFoYry3dL5gQ6mF'
|
|
|
|
'sDfrn4igIcEy6bMpJQ3lbwStyzcWZLMJgdI23FTlPXTEG7PclZSuxBpQpvg3MiVO'
|
|
|
|
'zqVTrhnY+TemcScSx5O6f32aDfOUWWCzmw/gzvJxUYlJqjqd7dlT'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
|
|
|
=/ k2=key:rsa
|
2018-05-17 08:40:22 +03:00
|
|
|
(need (ring:de:pem:pkcs1 kpem2))
|
2018-05-08 21:02:56 +03:00
|
|
|
=/ inp2=cord 'hello\0a'
|
|
|
|
=/ exp2=@ux
|
|
|
|
0x2920.bba3.cb38.bca6.3768.6345.c95e.0717.81bf.6c61.4006.6070.a7b5.e609.
|
|
|
|
f3b4.7f48.878b.d1f8.1882.8852.1db6.b6b5.a5fd.c23b.e764.b910.5a3f.fda9.
|
|
|
|
9d3a.e8bd.060a.ac06.58f1.487a.b50d.dee2.e161.0b74.4d3b.e6e3.7004.c721.
|
|
|
|
4f32.5c95.ce68.a008.b1e9.788b.375f.d389.0fa4.4012.c07a.8319.a183.02d5.
|
|
|
|
e2b8.10df.6ff7.f64a.6b85.3c7d.de80.19cf.ab6d.e588.40cb.0ea4.c436.8d8b.
|
|
|
|
47f7.cce6.b9bf.097d.3275.c128.147a.628d.2b7c.3912.3950.ef68.87b2.180d.
|
|
|
|
ba01.3b05.285d.3dfd.09ee.2f38.3111.9e4c.92c6.bf66.a91b.5762.3cdf.f8b7.
|
|
|
|
8281.81a2.8324.5330.43c1.035a.56c3.71b8.eb85.e660.c3a4.28b4.8af7.c16f.
|
|
|
|
7d7d.87cc.036d.aeb2.c757.30f5.f194.c90d.6bb4.5e5c.f95f.8e28.0fbc.5fb4.
|
|
|
|
b21a.e6fe
|
|
|
|
=/ exp2b64=cord
|
|
|
|
%+ rap 3
|
|
|
|
:~ 'KSC7o8s4vKY3aGNFyV4HF4G/bGFABmBwp7XmCfO0f0iHi9H4GIKIUh22trWl/cI752S5'
|
|
|
|
'EFo//amdOui9BgqsBljxSHq1Dd7i4WELdE075uNwBMchTzJclc5ooAix6XiLN1/TiQ+k'
|
|
|
|
'QBLAeoMZoYMC1eK4EN9v9/ZKa4U8fd6AGc+rbeWIQMsOpMQ2jYtH98zmub8JfTJ1wSgU'
|
|
|
|
'emKNK3w5EjlQ72iHshgNugE7BShdPf0J7i84MRGeTJLGv2apG1diPN/4t4KBgaKDJFMw'
|
|
|
|
'Q8EDWlbDcbjrheZgw6QotIr3wW99fYfMA22ussdXMPXxlMkNa7ReXPlfjigPvF+0shrm'
|
|
|
|
'/g=='
|
|
|
|
==
|
|
|
|
=/ sig=@ux (~(sign rs256 k2) inp2)
|
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
|
|
|
[exp1 (~(sign rs256 k1) inp1)]
|
|
|
|
%- expect-eq !>
|
|
|
|
[& (~(verify rs256 k1) exp1 inp1)]
|
2018-05-09 02:56:56 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
[emsa1 `@ux`(~(emsa rs256 k1) inp1)]
|
2018-05-08 21:02:56 +03:00
|
|
|
%- expect-eq !>
|
2018-05-11 18:03:56 +03:00
|
|
|
[& (~(verify rs256 k2) sig inp2)]
|
2018-05-08 21:02:56 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
[exp2 sig]
|
|
|
|
:: save kpem2 to private.pem
|
|
|
|
:: echo "hello" | openssl dgst -sha256 -sign private.pem | base64
|
|
|
|
%- expect-eq !>
|
|
|
|
[exp2b64 (en:base64 (swp 3 sig))]
|
|
|
|
==
|
2018-04-19 09:27:55 +03:00
|
|
|
::
|
2018-05-09 07:03:51 +03:00
|
|
|
++ test-jwk
|
2018-05-09 02:56:56 +03:00
|
|
|
:: rfc7638 section 3.1
|
2018-04-24 08:49:21 +03:00
|
|
|
=/ n
|
2018-04-19 09:27:55 +03:00
|
|
|
:~ '0vx7agoebGcQSuuPiLJXZptN9nndrQmbXEps2'
|
|
|
|
'aiAFbWhM78LhWx4cbbfAAtVT86zwu1RK7aPFFxuhDR1L6tSoc_BJECPebWKRXjBZCi'
|
|
|
|
'FV4n3oknjhMstn64tZ_2W-5JsGY4Hc5n9yBXArwl93lqt7_RN5w6Cf0h4QyQ5v-65Y'
|
|
|
|
'GjQR0_FDW2QvzqY368QQMicAtaSqzs8KJZgnYb9c7d0zgdAZHzu6qMQvRL5hajrn1n'
|
|
|
|
'91CbOpbISD08qNLyrdkt-bFTWhAI4vMQFh6WeZu0fM4lFd2NcRwr3XPksINHaQ-G_x'
|
|
|
|
'BniIqbw0Ls1jF44-csFCur-kEgU8awapJzKnqDKgw'
|
|
|
|
==
|
2018-05-09 07:03:51 +03:00
|
|
|
=/ jk=json
|
2018-04-19 09:27:55 +03:00
|
|
|
:- %o %- my :~
|
|
|
|
kty+s+'RSA'
|
2018-04-24 08:49:21 +03:00
|
|
|
n+s+(rap 3 n)
|
2018-05-09 20:45:39 +03:00
|
|
|
e+s+'AQAB'
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-05-09 07:03:51 +03:00
|
|
|
=/ k (need (pass:de:jwk jk))
|
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
|
|
|
:- jk
|
2018-05-16 22:38:50 +03:00
|
|
|
(pass:en:jwk k)
|
2018-05-09 07:03:51 +03:00
|
|
|
%- expect-eq !>
|
|
|
|
:- 'NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs'
|
2018-05-17 19:36:29 +03:00
|
|
|
(pass:thumb:jwk k)
|
2018-05-09 07:03:51 +03:00
|
|
|
==
|
2018-04-24 08:49:21 +03:00
|
|
|
::
|
2018-05-09 02:56:56 +03:00
|
|
|
++ test-jws
|
2018-05-09 20:45:39 +03:00
|
|
|
:: rfc7515 appendix 2
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ pt=@t
|
2018-04-24 08:49:21 +03:00
|
|
|
%+ rap 3
|
|
|
|
:~ '4BzEEOtIpmVdVEZNCqS7baC4crd0pqnRH_5IB3jw3bcxGn6QLvnEtfdUdi'
|
|
|
|
'YrqBdss1l58BQ3KhooKeQTa9AB0Hw_Py5PJdTJNPY8cQn7ouZ2KKDcmnPG'
|
|
|
|
'BY5t7yLc1QlQ5xHdwW1VhvKn-nXqhJTBgIPgtldC-KDV5z-y2XDwGUc'
|
|
|
|
==
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ qt=@t
|
2018-04-24 08:49:21 +03:00
|
|
|
%+ rap 3
|
|
|
|
:~ 'uQPEfgmVtjL0Uyyx88GZFF1fOunH3-7cepKmtH4pxhtCoHqpWmT8YAmZxa'
|
|
|
|
'ewHgHAjLYsp1ZSe7zFYHj7C6ul7TjeLQeZD_YwD66t62wDmpe_HlB-TnBA'
|
|
|
|
'-njbglfIsRLtXlnDzQkv5dTltRJ11BKBBypeeF6689rjcJIDEz9RWdc'
|
|
|
|
==
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ nt=@t
|
2018-04-24 08:49:21 +03:00
|
|
|
%+ rap 3
|
|
|
|
:~ 'ofgWCuLjybRlzo0tZWJjNiuSfb4p4fAkd_wWJcyQoTbji9k0l8W26mPddx'
|
|
|
|
'HmfHQp-Vaw-4qPCJrcS2mJPMEzP1Pt0Bm4d4QlL-yRT-SFd2lZS-pCgNMs'
|
|
|
|
'D1W_YpRPEwOWvG6b32690r2jZ47soMZo9wGzjb_7OMg0LOL-bSf63kpaSH'
|
|
|
|
'SXndS5z5rexMdbBYUsLA9e-KXBdQOS-UTo7WTBEMa2R2CapHg665xsmtdV'
|
|
|
|
'MTBQY4uDZlxvb3qCo5ZwKh9kG4LT6_I5IhlJH7aGhyxXFvUK-DWNmoudF8'
|
|
|
|
'NAco9_h9iaGNj8q2ethFkMLs91kzk2PAcDTW9gb54h4FRWyuXpoQ'
|
|
|
|
==
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ dt=@t
|
2018-04-24 08:49:21 +03:00
|
|
|
%+ rap 3
|
|
|
|
:~ 'Eq5xpGnNCivDflJsRQBXHx1hdR1k6Ulwe2JZD50LpXyWPEAeP88vLNO97I'
|
|
|
|
'jlA7_GQ5sLKMgvfTeXZx9SE-7YwVol2NXOoAJe46sui395IW_GO-pWJ1O0'
|
|
|
|
'BkTGoVEn2bKVRUCgu-GjBVaYLU6f3l9kJfFNS3E0QbVdxzubSu3Mkqzjkn'
|
|
|
|
'439X0M_V51gfpRLI9JYanrC4D4qAdGcopV_0ZHHzQlBjudU2QvXt4ehNYT'
|
|
|
|
'CBr6XCLQUShb1juUO1ZdiYoFaFQT5Tw8bGUl_x_jTj3ccPDVZFD9pIuhLh'
|
|
|
|
'BOneufuBiB4cS98l2SR_RQyGWSeWjnczT0QU91p1DhOVRuOopznQ'
|
|
|
|
==
|
2018-05-09 20:45:39 +03:00
|
|
|
=/ jk=json
|
|
|
|
:- %o %- my :~
|
|
|
|
kty+s+'RSA'
|
|
|
|
n+s+nt
|
|
|
|
e+s+'AQAB'
|
|
|
|
d+s+dt
|
|
|
|
p+s+pt
|
|
|
|
q+s+qt
|
|
|
|
==
|
|
|
|
=/ k=key:rsa (need (ring:de:jwk jk))
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ hed=json o+(my alg+s+'RS256' ~)
|
2018-05-09 20:45:39 +03:00
|
|
|
=/ hedt=@t 'eyJhbGciOiJSUzI1NiJ9'
|
2018-04-19 09:27:55 +03:00
|
|
|
=/ lod=json
|
|
|
|
:- %o %- my :~
|
|
|
|
iss+s+'joe'
|
|
|
|
exp+n+'1300819380'
|
|
|
|
['http://example.com/is_root' %b &]
|
|
|
|
==
|
2018-05-09 20:45:39 +03:00
|
|
|
=/ lodt=@t
|
|
|
|
%+ rap 3
|
|
|
|
:~ 'eyJpc3MiOiJqb2UiLCJleHAiOjEzMDA4MTkzODAsImh0dHA'
|
|
|
|
'6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ'
|
2018-04-24 08:49:21 +03:00
|
|
|
==
|
2018-05-09 20:45:39 +03:00
|
|
|
:: rfc example includes whitespace in json serialization
|
|
|
|
=/ lodt-ws=@t
|
|
|
|
%+ rap 3
|
|
|
|
:~ 'eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQo'
|
|
|
|
'gImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ'
|
|
|
|
==
|
|
|
|
=/ inp-ws=@t
|
|
|
|
(rap 3 [hedt '.' lodt-ws ~])
|
|
|
|
=/ exp-ws=@t
|
2018-04-24 08:49:21 +03:00
|
|
|
%+ rap 3
|
|
|
|
:~ 'cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7'
|
|
|
|
'AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4'
|
|
|
|
'BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K'
|
|
|
|
'0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqv'
|
|
|
|
'hJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrB'
|
|
|
|
'p0igcN_IoypGlUPQGe77Rw'
|
|
|
|
==
|
2018-05-09 20:45:39 +03:00
|
|
|
=/ lod-order=(list @t) ['iss' 'exp' 'http://example.com/is_root' ~]
|
2018-05-16 22:38:50 +03:00
|
|
|
?> ?=(^ sek.k)
|
2018-04-19 09:27:55 +03:00
|
|
|
;: weld
|
|
|
|
%- expect-eq !>
|
2018-05-09 20:45:39 +03:00
|
|
|
[jk (ring:en:jwk k)]
|
2018-04-24 08:49:21 +03:00
|
|
|
%- expect-eq !>
|
2018-05-16 22:38:50 +03:00
|
|
|
[n.pub.k `@ux`(mul p.u.sek.k q.u.sek.k)]
|
2018-04-24 08:49:21 +03:00
|
|
|
%- expect-eq !>
|
2018-05-16 22:38:50 +03:00
|
|
|
:- d.u.sek.k
|
|
|
|
`@ux`(~(inv fo (elcm:rsa (dec p.u.sek.k) (dec q.u.sek.k))) e.pub.k)
|
2018-04-24 08:49:21 +03:00
|
|
|
%- expect-eq !>
|
2018-05-09 20:45:39 +03:00
|
|
|
:- hedt
|
|
|
|
(en-base64url (crip (en-json-sort aor hed)))
|
2018-04-24 08:49:21 +03:00
|
|
|
%- expect-eq !>
|
2018-05-09 20:45:39 +03:00
|
|
|
:- lodt
|
|
|
|
(en-base64url (crip (en-json-sort (eor lte lod-order) lod)))
|
2018-04-24 08:49:21 +03:00
|
|
|
%- expect-eq !>
|
2018-05-09 20:45:39 +03:00
|
|
|
:- exp-ws
|
|
|
|
(en-base64url (swp 3 (~(sign rs256 k) inp-ws)))
|
2018-04-19 09:27:55 +03:00
|
|
|
==
|
2018-05-11 07:53:10 +03:00
|
|
|
::
|
|
|
|
++ test-csr
|
|
|
|
=/ kpem=wain
|
|
|
|
:~ '-----BEGIN RSA PRIVATE KEY-----'
|
|
|
|
'MIIEowIBAAKCAQEA2jJp8dgAKy5cSzDE4D+aUbKZsQoMhIWI2IFlE+AO0GCBMig5'
|
|
|
|
'qxx2IIAPVIcSi5fjOLtTHnuIZYw+s06qeb8QIKRvkZaIwnA3Lz5UUrxgh96sezdX'
|
|
|
|
'CCSG7FndIFskcT+zG00JL+fPRdlPjt1Vg2b3kneo5aAKMIPyOTzcY590UTc+luQ3'
|
|
|
|
'HhgSiNF3n5YQh24d3kS2YOUoSXQ13+YRljxNfBgXbV+C7/gO8mFxpkafhmgkIGNe'
|
|
|
|
'WlqT9oAIRa+gOx13uPAg+Jb/8lPV9bGaFqGvxvBMp3xUASlzYHiDntcB5MiOPRW6'
|
|
|
|
'BoIGI5qDFSYRZBky9crE7WAYgqtPtg21zvxwFwIDAQABAoIBAH0q7GGisj4TIziy'
|
|
|
|
'6k1lzwXMuaO4iwO+gokIeU5UessIgTSfpK1G73CnZaPstDPF1r/lncHfxZfTQuij'
|
|
|
|
'WOHsO7kt+x5+R0ebDd0ZGVA45fsrPrCUR2XRZmDRECuOfTJGA13G7F1B0kJUbfIb'
|
|
|
|
'gAGYIK8x236WNyIrntk804SGpTgstCsZ51rK5GL6diZVQbeU806oP1Zhx/ye//NR'
|
|
|
|
'mS5G0iil//H41pV5WGomOX0mq9/HYBZqCncqzLki6FFdmXykjz8snvXUR40S8B+a'
|
|
|
|
'0F/LN+549PSe2dp9h0Hx4HCJOsL9CyCQimqqqE8KPQ4BUz8q3+Mhx1xEyaxIlNH9'
|
|
|
|
'ECgo1CECgYEA+mi7vQRzstYJerbhCtaeFrOR/n8Dft7FyFN+5IV7H2omy6gf0zr1'
|
|
|
|
'GWjmph5R0sMPgL8uVRGANUrkuZZuCr35iY6zQpdCFB4D9t+zbTvTmrxt2oVaE16/'
|
|
|
|
'dIJ6b8cHzR2QrEh8uw5/rEKzWBCHNS8FvXHPvXvnacTZ5LZRK0ssshECgYEA3xGQ'
|
|
|
|
'nDlmRwyVto/1DQMLnjIMazQ719qtCO/pf4BHeqcDYnIwYb5zLBj2nPV8D9pqM1pG'
|
|
|
|
'OVuOgcC9IimrbHeeGwp1iSTH4AvxDIj6Iyrmbz2db3lGdHVk9xLvTiYzn2KK2sYx'
|
|
|
|
'mFl3DRBFutFQ2YxddqHbE3Ds96Y/uRXhqj7I16cCgYEA1AVNwHM+i1OS3yZtUUH6'
|
|
|
|
'xPnySWu9x/RTvpSDwnYKk8TLaHDH0Y//6y3Y7RqK6Utjmv1E+54/0d/B3imyrsG/'
|
|
|
|
'wWrj+SQdPO9VJ/is8XZQapnU4cs7Q19b+AhqJq58un2n+1e81J0oGPC47X3BHZTc'
|
|
|
|
'5VSyMpvwiqu0WmTMQT37cCECgYACMEbt8XY6bjotz13FIemERNNwXdPUe1XFR61P'
|
|
|
|
'ze9lmavj1GD7JIY2wYvx4Eq2URtHo7QarfZI+Z4hbq065DWN6F1c2hqH7TYRPGrP'
|
|
|
|
'24TlRIJ97H+vdtNlxS7J4oARKUNZgCZOa1pKq4UznwgfCkyEdHQUzb/VcjEf3MIZ'
|
|
|
|
'DIKl8wKBgBrsIjiDvpkfnpmQ7fehEJIi+V4SGskLxFH3ZTvngFFoYry3dL5gQ6mF'
|
|
|
|
'sDfrn4igIcEy6bMpJQ3lbwStyzcWZLMJgdI23FTlPXTEG7PclZSuxBpQpvg3MiVO'
|
|
|
|
'zqVTrhnY+TemcScSx5O6f32aDfOUWWCzmw/gzvJxUYlJqjqd7dlT'
|
|
|
|
'-----END RSA PRIVATE KEY-----'
|
|
|
|
==
|
|
|
|
=/ k=key:rsa
|
2018-05-17 08:40:22 +03:00
|
|
|
(need (ring:de:pem:pkcs1 kpem))
|
2018-05-11 07:53:10 +03:00
|
|
|
:: generated with openssl, certbot style
|
|
|
|
=/ csr-pem=wain
|
|
|
|
:~ '-----BEGIN CERTIFICATE REQUEST-----'
|
|
|
|
'MIICezCCAWMCAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANoy'
|
|
|
|
'afHYACsuXEswxOA/mlGymbEKDISFiNiBZRPgDtBggTIoOascdiCAD1SHEouX4zi7'
|
|
|
|
'Ux57iGWMPrNOqnm/ECCkb5GWiMJwNy8+VFK8YIferHs3VwgkhuxZ3SBbJHE/sxtN'
|
|
|
|
'CS/nz0XZT47dVYNm95J3qOWgCjCD8jk83GOfdFE3PpbkNx4YEojRd5+WEIduHd5E'
|
|
|
|
'tmDlKEl0Nd/mEZY8TXwYF21fgu/4DvJhcaZGn4ZoJCBjXlpak/aACEWvoDsdd7jw'
|
|
|
|
'IPiW//JT1fWxmhahr8bwTKd8VAEpc2B4g57XAeTIjj0VugaCBiOagxUmEWQZMvXK'
|
|
|
|
'xO1gGIKrT7YNtc78cBcCAwEAAaA2MDQGCSqGSIb3DQEJDjEnMCUwIwYDVR0RBBww'
|
|
|
|
'GoINem9kLnVyYml0Lm9yZ4IJem9kLnVyYml0MA0GCSqGSIb3DQEBCwUAA4IBAQCu'
|
|
|
|
'HdUqIlW8w7G7l3YxXfb0fn1HxD7zHf3QpNqDYZuDq958OhJNXYJ9EjiHBBEW5ySg'
|
|
|
|
'e7vyaaWh6UcVIu/RYFGbyVupNVbp4aS4U1LEEiqMQ6vQQnlSt7hVMi04bhf6X6jd'
|
|
|
|
'kkTJIB5OlmNh5z/mjvlIOyOCeitK5IMrStsUPE5F8OynMuzmBKq318LiwImO41Fu'
|
|
|
|
'S1M6rgPnvoZeqShLxnJduMcu7awHQ0tn2FmjwBpU713/tmNjtCLYYoBxsHM2ptxd'
|
|
|
|
'G3zcMSCDZ/CLXWoktkULdWNDED8meCKWQJxYuHjxY4JPIzIVdVN50xRcZEV7Z80l'
|
|
|
|
'bPcFaE8op3e2hIxzqi1t'
|
|
|
|
'-----END CERTIFICATE REQUEST-----'
|
|
|
|
==
|
|
|
|
=/ hot1 /org/urbit/zod
|
|
|
|
=/ hot2 /urbit/zod
|
|
|
|
%- expect-eq !>
|
|
|
|
:- csr-pem
|
|
|
|
(en:pem:pkcs10 k [hot1 hot2 ~])
|
2018-05-09 20:45:39 +03:00
|
|
|
--
|
2018-04-19 09:27:55 +03:00
|
|
|
--
|
|
|
|
|