dnssec_keygen.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. package dns
  2. import (
  3. "crypto"
  4. "crypto/dsa"
  5. "crypto/ecdsa"
  6. "crypto/elliptic"
  7. "crypto/rand"
  8. "crypto/rsa"
  9. "math/big"
  10. "golang.org/x/crypto/ed25519"
  11. )
  12. // Generate generates a DNSKEY of the given bit size.
  13. // The public part is put inside the DNSKEY record.
  14. // The Algorithm in the key must be set as this will define
  15. // what kind of DNSKEY will be generated.
  16. // The ECDSA algorithms imply a fixed keysize, in that case
  17. // bits should be set to the size of the algorithm.
  18. func (k *DNSKEY) Generate(bits int) (crypto.PrivateKey, error) {
  19. switch k.Algorithm {
  20. case DSA, DSANSEC3SHA1:
  21. if bits != 1024 {
  22. return nil, ErrKeySize
  23. }
  24. case RSAMD5, RSASHA1, RSASHA256, RSASHA1NSEC3SHA1:
  25. if bits < 512 || bits > 4096 {
  26. return nil, ErrKeySize
  27. }
  28. case RSASHA512:
  29. if bits < 1024 || bits > 4096 {
  30. return nil, ErrKeySize
  31. }
  32. case ECDSAP256SHA256:
  33. if bits != 256 {
  34. return nil, ErrKeySize
  35. }
  36. case ECDSAP384SHA384:
  37. if bits != 384 {
  38. return nil, ErrKeySize
  39. }
  40. case ED25519:
  41. if bits != 256 {
  42. return nil, ErrKeySize
  43. }
  44. }
  45. switch k.Algorithm {
  46. case DSA, DSANSEC3SHA1:
  47. params := new(dsa.Parameters)
  48. if err := dsa.GenerateParameters(params, rand.Reader, dsa.L1024N160); err != nil {
  49. return nil, err
  50. }
  51. priv := new(dsa.PrivateKey)
  52. priv.PublicKey.Parameters = *params
  53. err := dsa.GenerateKey(priv, rand.Reader)
  54. if err != nil {
  55. return nil, err
  56. }
  57. k.setPublicKeyDSA(params.Q, params.P, params.G, priv.PublicKey.Y)
  58. return priv, nil
  59. case RSAMD5, RSASHA1, RSASHA256, RSASHA512, RSASHA1NSEC3SHA1:
  60. priv, err := rsa.GenerateKey(rand.Reader, bits)
  61. if err != nil {
  62. return nil, err
  63. }
  64. k.setPublicKeyRSA(priv.PublicKey.E, priv.PublicKey.N)
  65. return priv, nil
  66. case ECDSAP256SHA256, ECDSAP384SHA384:
  67. var c elliptic.Curve
  68. switch k.Algorithm {
  69. case ECDSAP256SHA256:
  70. c = elliptic.P256()
  71. case ECDSAP384SHA384:
  72. c = elliptic.P384()
  73. }
  74. priv, err := ecdsa.GenerateKey(c, rand.Reader)
  75. if err != nil {
  76. return nil, err
  77. }
  78. k.setPublicKeyECDSA(priv.PublicKey.X, priv.PublicKey.Y)
  79. return priv, nil
  80. case ED25519:
  81. pub, priv, err := ed25519.GenerateKey(rand.Reader)
  82. if err != nil {
  83. return nil, err
  84. }
  85. k.setPublicKeyED25519(pub)
  86. return priv, nil
  87. default:
  88. return nil, ErrAlg
  89. }
  90. }
  91. // Set the public key (the value E and N)
  92. func (k *DNSKEY) setPublicKeyRSA(_E int, _N *big.Int) bool {
  93. if _E == 0 || _N == nil {
  94. return false
  95. }
  96. buf := exponentToBuf(_E)
  97. buf = append(buf, _N.Bytes()...)
  98. k.PublicKey = toBase64(buf)
  99. return true
  100. }
  101. // Set the public key for Elliptic Curves
  102. func (k *DNSKEY) setPublicKeyECDSA(_X, _Y *big.Int) bool {
  103. if _X == nil || _Y == nil {
  104. return false
  105. }
  106. var intlen int
  107. switch k.Algorithm {
  108. case ECDSAP256SHA256:
  109. intlen = 32
  110. case ECDSAP384SHA384:
  111. intlen = 48
  112. }
  113. k.PublicKey = toBase64(curveToBuf(_X, _Y, intlen))
  114. return true
  115. }
  116. // Set the public key for DSA
  117. func (k *DNSKEY) setPublicKeyDSA(_Q, _P, _G, _Y *big.Int) bool {
  118. if _Q == nil || _P == nil || _G == nil || _Y == nil {
  119. return false
  120. }
  121. buf := dsaToBuf(_Q, _P, _G, _Y)
  122. k.PublicKey = toBase64(buf)
  123. return true
  124. }
  125. // Set the public key for Ed25519
  126. func (k *DNSKEY) setPublicKeyED25519(_K ed25519.PublicKey) bool {
  127. if _K == nil {
  128. return false
  129. }
  130. k.PublicKey = toBase64(_K)
  131. return true
  132. }
  133. // Set the public key (the values E and N) for RSA
  134. // RFC 3110: Section 2. RSA Public KEY Resource Records
  135. func exponentToBuf(_E int) []byte {
  136. var buf []byte
  137. i := big.NewInt(int64(_E)).Bytes()
  138. if len(i) < 256 {
  139. buf = make([]byte, 1, 1+len(i))
  140. buf[0] = uint8(len(i))
  141. } else {
  142. buf = make([]byte, 3, 3+len(i))
  143. buf[0] = 0
  144. buf[1] = uint8(len(i) >> 8)
  145. buf[2] = uint8(len(i))
  146. }
  147. buf = append(buf, i...)
  148. return buf
  149. }
  150. // Set the public key for X and Y for Curve. The two
  151. // values are just concatenated.
  152. func curveToBuf(_X, _Y *big.Int, intlen int) []byte {
  153. buf := intToBytes(_X, intlen)
  154. buf = append(buf, intToBytes(_Y, intlen)...)
  155. return buf
  156. }
  157. // Set the public key for X and Y for Curve. The two
  158. // values are just concatenated.
  159. func dsaToBuf(_Q, _P, _G, _Y *big.Int) []byte {
  160. t := divRoundUp(divRoundUp(_G.BitLen(), 8)-64, 8)
  161. buf := []byte{byte(t)}
  162. buf = append(buf, intToBytes(_Q, 20)...)
  163. buf = append(buf, intToBytes(_P, 64+t*8)...)
  164. buf = append(buf, intToBytes(_G, 64+t*8)...)
  165. buf = append(buf, intToBytes(_Y, 64+t*8)...)
  166. return buf
  167. }