-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add PK_Signature_Options #4318
base: master
Are you sure you want to change the base?
Add PK_Signature_Options #4318
Conversation
This comment was marked as resolved.
This comment was marked as resolved.
This comment was marked as duplicate.
This comment was marked as duplicate.
This comment was marked as outdated.
This comment was marked as outdated.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few minor comments from reading over the patch. I love the direction this is taking!
src/lib/pubkey/pk_keys.h
Outdated
*/ | ||
virtual std::unique_ptr<PK_Ops::Verification> create_verification_op(std::string_view params, | ||
std::string_view provider) const; | ||
virtual std::unique_ptr<PK_Ops::Verification> _create_verification_op(const PK_Signature_Options& options) const; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One could say that people have been warned in the doxygen comment, but its still a public member nevertheless. For good measure: perhaps leave a deprecated create_verification_op
that sets up the PK_Signature_Options
and calls into this new method?
Same suggestion for the signature op, obviously.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I always considered these functions internal and - had the convention existed earlier - they would have been _
prefixed. That said, they were not in fact _ prefixed, and I guess a compatability shim here isn’t that onerous.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not 100% sure, but another alternative perhaps: couldn't we move those into a protected:
region and declare the generic PK_Signer
, ...classes as friends? That might need a sort-of "landing pad" non-virtual method in the base class and protected pure virtual methods as customization points to delegate to (think update
vs. add_data
in Buffered_Computation
)
Certainly a lot of boilerplate just to omit underscored public methods. Just thinking out loud...
I'm in team "friends before private-ish public methods", if you couldn't tell. 😅
This comment was marked as duplicate.
This comment was marked as duplicate.
doc/deprecated.rst
Outdated
- Currently some public key padding mechanisms can be used with several | ||
different names. This is deprecated. | ||
"EMSA_PKCS1", "EMSA-PKCS1-v1_5", "EMSA3": Use "PKCS1v15" | ||
"PSSR_Raw": Use "PSS_Raw" | ||
"PSSR", "EMSA-PSS", "PSS-MGF1", "EMSA4": Use "PSS" | ||
"EMSA_X931", "EMSA2": Use "X9.31" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❤️
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably its worth to also adapt the padding documentation in this regard: https://botan.randombit.net/handbook/api_ref/pubkey.html#available-encryption-padding-schemes. It lists those "alternative names" without giving guidance on what is the "preferred" name.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, just noticed one more thing: When instantiating PSS, and asking the instance for its name()
, it identifies as "EMSA4". This is somewhat inconsistent with this deprecation notice. Also note, that this assumption is hard-coded at places. At least I just stumbled over this in RSA_Signature_Operation::algorithm_identifier()
in rsa.cpp
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah currently it's a bit of a mess atm. Similarly the OID definitions use the (would be) deprecated names. Fixing this should happen but it's a significant bit of work all on its own.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as resolved.
This comment was marked as resolved.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some more observations.
src/lib/pubkey/pk_options.h
Outdated
/// Specify the hash function to use for signing/verification | ||
/// | ||
/// Most, but not all, schemes require specifying a hash function. | ||
PK_Signature_Options with_hash(std::string_view hash) &&; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm a bit surprised by the constraints on the builder methods. I would have expected:
PK_Signature_Options& with_hash(std::string_view hash) {
set_or_throw(m_hash, hash);
return *this;
}
Some users would probably want to express things like this:
auto key = get_private_key();
auto opts = PK_Signature_Options("SHA-256");
if(key->algo_name() == "RSA) {
opts.with_padding("PSS");
}
if(key->algo_name() == "ML-DSA") {
opts.with_context("some context");
}
PK_Signer signer(key, opts);
I think people will grumble and then go for std::move(opts).with_context(...)
as a workaround. See pk_options_impl.cpp
😜.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I went this way to avoid the problem that if there is a unique_ptr<HashFunction>
in there we have to clone it for each and every with_foo
. There is maybe a better way to handle this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Returning a PK_Options&
(return *this
) avoids the copy, as long as the user doesn't assign it to another variable. That allows chaining with_*
just fine.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have to correct myself to a certain extent: When there's a unique_ptr<HashFunction>
you are forced to first create an lvalue of the PK_Options
. E.g. this wouldn't work:
auto opts = PK_Options().with_hash(Hash_Function::create_or_throw("SHA-256"));
// Above fails, because `with_hash()` returns a `PK_Options&` that cannot be copied into `auto opts`
// (because `PK_Options` contains a unique_ptr).
if (key->algo() == "ML-DSA") {
opts.with_context("some context");
}
In C++20 we'd have to overload with_hash()
for lvalue-ref and rvalue-ref. Providing both overloads, would compile the above example, as the rvalue-ref variant of with_hash()
would be called on the temporary object and the temporary would just propagate through with_hash()
and eventually end up initializing the auto opts
lvalue.
class PK_Options {
PK_Options& with_hash(std::unique_ptr<HashFunction> hash) & {
m_hash = std::move(hash);
return *this;
}
PK_Options with_hash(std::unique_ptr<HashFunction> hash) && {
return std::move(with_hash(std::move(hash)));
}
};
C++23 introduces "deducing this" which would come in handy here. Essentially, self
is deduced to either an lvalue-ref or an rvalue-ref. And the decltype(auto)
would just pass the lvalue/rvalue-ref along. The below snippet would also compile the above example in C++23 😢
class PK_Options {
decltype(auto) with_hash(this auto&& self, std::unique_ptr<HashFunction> hash) {
self.m_hash = std::move(hash);
return self;
}
};
This comment was marked as resolved.
This comment was marked as resolved.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
Here's another iteration (godbolt) that splits "building" and "consuming" into two classes. We hope that this results in a clearer interface that's harder to misuse: i.e. users cannot reach into the built-up options but have to push it into a consumer. This forces users to "commit" on a configuration and prevents consumers from retroactively adding options. The prototype in Godbolt might look quite complex, but the actual usage surface is super neat, in my opinion. Roughly like this: void end_user_view() {
auto opts = SignerBuilder()
.with_padding("OAEP")
.with_hash("SHA-256")
.with_context(as_byteview("API discussion"));
PK_Signer signer(key, opts.commit() /* transforms SignerBuilder into a SignerOptions */);
}
PK_Signer::PK_Signer(Private_Key& key, SignerOptions options)
m_op(key._create_signing_op(options)
{
options.validate_option_consumption(); // -> throws Invalid_Argument when some option was not consumed
}
PK_Signing_Op RSA_PrivateKey::_create_signing_op(SignerOptions& opts) {
const auto padding = opts.padding().required(); // throws Invalid_Argument if not provided
const auto hash = opts.hash().optional(); // std::nullopt if not provided (algorithm can decide what to do)
opts.context().not_implemented("comes in 3.8.0"); // explicitly consumes an option but throws Not_Implemented when provided
} The helpers |
c088f34
to
541b1f6
Compare
Without this patch, clang seemed to miscompile the retrofitting of the PK_Signer() legacy constructor. valgrind complained about uninitialized memory when building with clang in -O2 and -O3 (didn't test -O1).
e6a540b
to
9d8cee0
Compare
Rebased once more. The fix for SLH-DSA in 3.6.1 created a conflict again. |
Some initial idea (also regarding #4411). Inspired by: https://stackoverflow.com/questions/17604811/builder-pattern-in-c botan_pk_sign_options_t options;
botan_pk_sign_config_create(&options, rsa_private_key);
botan_pk_sign_config_set_ptr(options, BOTAN_PK_SIGN_RNG, rng);
botan_pk_sign_config_set_str(options, BOTAN_PK_SIGN_PADDING, "PSS");
botan_pk_sign_config_set_str(options, BOTAN_PK_SIGN_HASH, "SHA-256");
// or (?):
botan_pk_sign_config_set_ptr(options, BOTAN_PK_SIGN_HASH, hash_instance);
botan_pk_sign_config_set_int(options, BOTAN_PK_SIGN_SALT_SIZE, 64);
botan_pk_sign_config_set_opt(options, BOTAN_PK_SIGN_DER_ENCODED);
botan_pk_sign_config_set_opt(options, -BOTAN_PK_SIGN_DETERMINISTIC); // negative to unset
botan_pk_op_sign_t signer;
botan_pk_op_sign_create_from_options(&signer, options);
botan_pk_sign_destroy(options); // this could also be implicit in the previous call, not sure (?)
// use 'signer' as usual... |
Re the FFI story, looks good to me. Preferably with auto-destruction of options. |
@randombit I'd love to restart the discussion on this and hopefully converge on a design for the builder. We'd like to develop the pre-hash feature for SLH-DSA and ML-DSA based on it. That is the final work item for the BSI project and it would be great to have it land in 3.7.0. Let me know if you would like me to walk you through the idea of this rework. |
This allows controlling all details of how signatures are created, without having to stuff values into the single parameters string which was previously available.
This is still missing some bits, mostly around each scheme has to validate that the requests are sensible. For example right now for most algorithm if you set a context, we just ignore it instead of rejecting it.Should be covered now.There are also some future extension points to consider; for example for ECDSA/DSA we currently gate deterministic signatures just on the compile time existence of RFC6979. In the future this could be changed so that RFC6979 is only used if both available at compile time and requested.
Future work will add analogous options for encryption/decryption, and for KEM.
XMSS previously completely ignored it's parameters string. Eg a XMSS-SHA-512 key you could set params to "SHA-256" or "WHATEVER" or anything and it just worked. Now the parameters string, if set, must be exactly the hash function used by the key.
Todos
_
prefixed and "private")PK_Signature_Options("SHA-256").with_padding("PSSR")
and right now I think that doesn't work.PK_Signature_Options::with_hash
so the user can be extra explicit??EMSA::create
create_signature_op
_parse
, IDK]PK_Signature_Options
to FFI in the long run.