module Network.TLS.Handshake.Key
( encryptRSA
, signRSA
, decryptRSA
, verifyRSA
, generateDHE
, generateECDHE
) where
import Data.ByteString (ByteString)
import qualified Data.ByteString as B
import Network.TLS.Handshake.State
import Network.TLS.State (withRNG, getVersion)
import Network.TLS.Crypto
import Network.TLS.Types
import Network.TLS.Context.Internal
encryptRSA :: Context -> ByteString -> IO ByteString
encryptRSA ctx content = do
publicKey <- usingHState ctx getRemotePublicKey
usingState_ ctx $ do
v <- withRNG $ kxEncrypt publicKey content
case v of
Left err -> fail ("rsa encrypt failed: " ++ show err)
Right econtent -> return econtent
signRSA :: Context -> Role -> Hash -> ByteString -> IO ByteString
signRSA ctx _ hsh content = do
privateKey <- usingHState ctx getLocalPrivateKey
usingState_ ctx $ do
r <- withRNG $ kxSign privateKey hsh content
case r of
Left err -> fail ("rsa sign failed: " ++ show err)
Right econtent -> return econtent
decryptRSA :: Context -> ByteString -> IO (Either KxError ByteString)
decryptRSA ctx econtent = do
privateKey <- usingHState ctx getLocalPrivateKey
usingState_ ctx $ do
ver <- getVersion
let cipher = if ver < TLS10 then econtent else B.drop 2 econtent
withRNG $ kxDecrypt privateKey cipher
verifyRSA :: Context -> Role -> Hash -> ByteString -> ByteString -> IO Bool
verifyRSA ctx _ hsh econtent sign = do
publicKey <- usingHState ctx getRemotePublicKey
return $ kxVerify publicKey hsh econtent sign
generateDHE :: Context -> DHParams -> IO (DHPrivate, DHPublic)
generateDHE ctx dhp = usingState_ ctx $ withRNG $ dhGenerateKeyPair dhp
generateECDHE :: Context -> ECDHParams -> IO (ECDHPrivate, ECDHPublic)
generateECDHE ctx dhp = usingState_ ctx $ withRNG $ ecdhGenerateKeyPair dhp