package blsgen import ( "bufio" "crypto/aes" "crypto/cipher" "crypto/md5" "crypto/rand" "encoding/hex" "encoding/json" "io" "io/ioutil" "os" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/kms" ffi_bls "github.com/harmony-one/bls/ffi/go/bls" "github.com/harmony-one/harmony/crypto/bls" "github.com/pkg/errors" ) type awsConfiguration struct { AccessKey string `json:"aws-access-key-id"` SecretKey string `json:"aws-secret-access-key"` Region string `json:"aws-region"` } // GenBLSKeyWithPassPhrase generates bls key with passphrase and write into disk. func GenBLSKeyWithPassPhrase(passphrase string) (*ffi_bls.SecretKey, string, error) { privateKey := bls.RandPrivateKey() publickKey := privateKey.GetPublicKey() fileName := publickKey.SerializeToHexStr() + ".key" privateKeyHex := privateKey.SerializeToHexStr() // Encrypt with passphrase encryptedPrivateKeyStr, err := encrypt([]byte(privateKeyHex), passphrase) if err != nil { return nil, "", err } // Write to file. err = WriteToFile(fileName, encryptedPrivateKeyStr) return privateKey, fileName, err } // WritePriKeyWithPassPhrase writes encrypted key with passphrase. func WritePriKeyWithPassPhrase( privateKey *ffi_bls.SecretKey, passphrase string, ) (string, error) { publickKey := privateKey.GetPublicKey() fileName := publickKey.SerializeToHexStr() + ".key" privateKeyHex := privateKey.SerializeToHexStr() // Encrypt with passphrase encryptedPrivateKeyStr, err := encrypt([]byte(privateKeyHex), passphrase) if err != nil { return "", err } // Write to file. if err := WriteToFile(fileName, encryptedPrivateKeyStr); err != nil { return fileName, err } return fileName, nil } // WriteToFile will print any string of text to a file safely by // checking for errors and syncing at the end. func WriteToFile(filename string, data string) error { file, err := os.Create(filename) if err != nil { return err } defer file.Close() _, err = io.WriteString(file, data) if err != nil { return err } return file.Sync() } // LoadBLSKeyWithPassPhrase loads bls key with passphrase. func LoadBLSKeyWithPassPhrase(fileName, passphrase string) (*ffi_bls.SecretKey, error) { encryptedPrivateKeyBytes, err := ioutil.ReadFile(fileName) if err != nil { return nil, errors.Wrapf(err, "attemped to load from %s", fileName) } for len(passphrase) > 0 && passphrase[len(passphrase)-1] == '\n' { passphrase = passphrase[:len(passphrase)-1] } decryptedBytes, err := decrypt(encryptedPrivateKeyBytes, passphrase) if err != nil { return nil, err } priKey := &ffi_bls.SecretKey{} if err := priKey.DeserializeHexStr(string(decryptedBytes)); err != nil { return nil, errors.Wrapf( err, "could not deserialize byte content of %s as BLS secret key", fileName, ) } return priKey, nil } // Readln reads aws configuratoin from prompt with a timeout func Readln(timeout time.Duration) (string, error) { s := make(chan string) e := make(chan error) go func() { reader := bufio.NewReader(os.Stdin) line, err := reader.ReadString('\n') if err != nil { e <- err } else { s <- line } close(s) close(e) }() select { case line := <-s: return line, nil case err := <-e: return "", err case <-time.After(timeout): return "", errors.New("Timeout") } } // LoadAwsCMKEncryptedBLSKey loads aws encrypted bls key. func LoadAwsCMKEncryptedBLSKey(fileName, awsSettingString string) (*ffi_bls.SecretKey, error) { if awsSettingString == "" { return nil, errors.New("aws credential is not set") } var awsConfig awsConfiguration if err := json.Unmarshal([]byte(awsSettingString), &awsConfig); err != nil { return nil, errors.New(awsSettingString + " is not a valid JSON string for setting aws configuration.") } // Initialize a session that the aws SDK uses to load sess, err := session.NewSessionWithOptions(session.Options{ SharedConfigState: session.SharedConfigEnable, }) if err != nil { return nil, errors.Wrapf(err, "failed to create aws session") } // Create KMS service client svc := kms.New(sess, &aws.Config{ Region: aws.String(awsConfig.Region), Credentials: credentials.NewStaticCredentials(awsConfig.AccessKey, awsConfig.SecretKey, ""), }) encryptedPrivateKeyBytes, err := ioutil.ReadFile(fileName) if err != nil { return nil, errors.Wrapf(err, "fail read at: %s", fileName) } unhexed := make([]byte, hex.DecodedLen(len(encryptedPrivateKeyBytes))) if _, err = hex.Decode(unhexed, encryptedPrivateKeyBytes); err != nil { return nil, err } clearKey, err := svc.Decrypt(&kms.DecryptInput{ CiphertextBlob: unhexed, }) if err != nil { return nil, err } priKey := &ffi_bls.SecretKey{} if err = priKey.DeserializeHexStr(hex.EncodeToString(clearKey.Plaintext)); err != nil { return nil, errors.Wrapf(err, "failed to deserialize the decrypted bls private key") } return priKey, nil } func createHash(key string) string { hasher := md5.New() hasher.Write([]byte(key)) return hex.EncodeToString(hasher.Sum(nil)) } func encrypt(data []byte, passphrase string) (string, error) { block, _ := aes.NewCipher([]byte(createHash(passphrase))) gcm, err := cipher.NewGCM(block) if err != nil { return "", err } nonce := make([]byte, gcm.NonceSize()) if _, err = io.ReadFull(rand.Reader, nonce); err != nil { return "", err } ciphertext := gcm.Seal(nonce, nonce, data, nil) return hex.EncodeToString(ciphertext), nil } func decrypt(encrypted []byte, passphrase string) (decrypted []byte, err error) { unhexed := make([]byte, hex.DecodedLen(len(encrypted))) if _, err = hex.Decode(unhexed, encrypted); err == nil { if decrypted, err = decryptRaw(unhexed, passphrase); err == nil { return decrypted, nil } } // At this point err != nil, either from hex decode or from decryptRaw. decrypted, binErr := decryptRaw(encrypted, passphrase) if binErr != nil { // Disregard binary decryption error and return the original error, // because our canonical form is hex and not binary. return nil, err } return decrypted, nil } func decryptRaw(data []byte, passphrase string) ([]byte, error) { var err error key := []byte(createHash(passphrase)) block, err := aes.NewCipher(key) if err != nil { return nil, err } gcm, err := cipher.NewGCM(block) if err != nil { return nil, err } nonceSize := gcm.NonceSize() nonce, ciphertext := data[:nonceSize], data[nonceSize:] plaintext, err := gcm.Open(nil, nonce, ciphertext, nil) return plaintext, err } func decryptNonHumanReadable(data []byte, passphrase string) ([]byte, error) { var err error key := []byte(createHash(passphrase)) block, err := aes.NewCipher(key) if err != nil { return nil, err } gcm, err := cipher.NewGCM(block) if err != nil { panic(err.Error()) } nonceSize := gcm.NonceSize() nonce, ciphertext := data[:nonceSize], data[nonceSize:] plaintext, err := gcm.Open(nil, nonce, ciphertext, nil) if err != nil { return nil, err } return plaintext, nil } // LoadNonHumanReadableBLSKeyWithPassPhrase loads bls key with passphrase. func LoadNonHumanReadableBLSKeyWithPassPhrase(fileName, passFile string) (*ffi_bls.SecretKey, error) { encryptedPrivateKeyBytes, err := ioutil.ReadFile(fileName) if err != nil { return nil, err } data, err := ioutil.ReadFile(passFile) if err != nil { return nil, err } passphrase := string(data) for len(passphrase) > 0 && passphrase[len(passphrase)-1] == '\n' { passphrase = passphrase[:len(passphrase)-1] } decryptedBytes, err := decryptNonHumanReadable(encryptedPrivateKeyBytes, passphrase) if err != nil { return nil, err } priKey := &ffi_bls.SecretKey{} priKey.DeserializeHexStr(string(decryptedBytes)) return priKey, nil }