-
Notifications
You must be signed in to change notification settings - Fork 212
/
Copy pathdsa.rs
231 lines (192 loc) · 6.81 KB
/
dsa.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
//! SM2 Digital Signature Algorithm (SM2DSA) as defined in [draft-shen-sm2-ecdsa § 5].
//!
//! ## Usage
//!
//! NOTE: requires the `dsa` crate feature enabled, and `rand_core` dependency
//! with `getrandom` feature enabled.
//!
#![cfg_attr(feature = "std", doc = "```")]
#![cfg_attr(not(feature = "std"), doc = "```ignore")]
//! # fn example() -> Result<(), Box<dyn std::error::Error>> {
//! use rand_core::{OsRng, TryRngCore}; // requires 'os_rng` feature
//! use sm2::{
//! dsa::{Signature, SigningKey, signature::Signer},
//! SecretKey
//! };
//!
//! // Signing
//! let secret_key = SecretKey::try_from_rng(&mut OsRng).unwrap(); // serialize with `::to_bytes()`
//! let distid = "[email protected]"; // distinguishing identifier
//! let signing_key = SigningKey::new(distid, &secret_key)?;
//! let verifying_key_bytes = signing_key.verifying_key().to_sec1_bytes();
//! let message = b"test message";
//! let signature: Signature = signing_key.sign(message);
//!
//! // Verifying
//! use sm2::dsa::{VerifyingKey, signature::Verifier};
//!
//! let verifying_key = VerifyingKey::from_sec1_bytes(distid, &verifying_key_bytes)?;
//! verifying_key.verify(message, &signature)?;
//! # Ok(())
//! # }
//! ```
//!
//! [draft-shen-sm2-ecdsa § 5]: https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02#section-5
#[cfg(feature = "arithmetic")]
mod signing;
#[cfg(feature = "arithmetic")]
mod verifying;
pub use signature;
#[cfg(feature = "arithmetic")]
pub use self::{signing::SigningKey, verifying::VerifyingKey};
use crate::{FieldBytes, NonZeroScalar, Sm2};
use core::fmt::{self, Debug};
use signature::{Error, Result, SignatureEncoding};
#[cfg(feature = "alloc")]
use alloc::vec::Vec;
#[cfg(all(feature = "alloc", feature = "pkcs8"))]
use crate::pkcs8::{
AlgorithmIdentifierRef, ObjectIdentifier, der, der::AnyRef,
spki::AssociatedAlgorithmIdentifier, spki::SignatureBitStringEncoding,
};
/// SM2DSA signature serialized as bytes.
pub type SignatureBytes = [u8; Signature::BYTE_SIZE];
/// Primitive scalar type (works without the `arithmetic` feature).
type ScalarPrimitive = elliptic_curve::ScalarPrimitive<Sm2>;
/// SM2DSA signature.
#[derive(Copy, Clone, Eq, PartialEq)]
pub struct Signature {
r: ScalarPrimitive,
s: ScalarPrimitive,
}
impl Signature {
/// Size of an encoded SM2DSA signature in bytes.
pub const BYTE_SIZE: usize = 64;
/// Parse an SM2DSA signature from a byte array.
pub fn from_bytes(bytes: &SignatureBytes) -> Result<Self> {
let (r_bytes, s_bytes) = bytes.split_at(Self::BYTE_SIZE / 2);
let r = ScalarPrimitive::from_slice(r_bytes).map_err(|_| Error::new())?;
let s = ScalarPrimitive::from_slice(s_bytes).map_err(|_| Error::new())?;
if r.is_zero().into() || s.is_zero().into() {
return Err(Error::new());
}
Ok(Self { r, s })
}
/// Parse an SM2DSA signature from a byte slice.
pub fn from_slice(bytes: &[u8]) -> Result<Self> {
SignatureBytes::try_from(bytes)
.map_err(|_| Error::new())?
.try_into()
}
/// Create a [`Signature`] from the serialized `r` and `s` scalar values
/// which comprise the signature.
#[inline]
pub fn from_scalars(r: impl Into<FieldBytes>, s: impl Into<FieldBytes>) -> Result<Self> {
Self::try_from(r.into().concat(s.into()).as_slice())
}
/// Serialize this signature as bytes.
pub fn to_bytes(&self) -> SignatureBytes {
let mut ret = [0; Self::BYTE_SIZE];
let (r_bytes, s_bytes) = ret.split_at_mut(Self::BYTE_SIZE / 2);
r_bytes.copy_from_slice(&self.r.to_bytes());
s_bytes.copy_from_slice(&self.s.to_bytes());
ret
}
/// Bytes for the `R` component of a signature.
pub fn r_bytes(&self) -> FieldBytes {
self.r.to_bytes()
}
/// Bytes for the `s` component of a signature.
pub fn s_bytes(&self) -> FieldBytes {
self.s.to_bytes()
}
/// Convert this signature into a byte vector.
#[cfg(feature = "alloc")]
pub fn to_vec(&self) -> Vec<u8> {
self.to_bytes().to_vec()
}
}
#[cfg(feature = "arithmetic")]
impl Signature {
/// Get the `r` component of this signature
pub fn r(&self) -> NonZeroScalar {
NonZeroScalar::new(self.r.into()).unwrap()
}
/// Get the `s` component of this signature
pub fn s(&self) -> NonZeroScalar {
NonZeroScalar::new(self.s.into()).unwrap()
}
/// Split the signature into its `r` and `s` scalars.
pub fn split_scalars(&self) -> (NonZeroScalar, NonZeroScalar) {
(self.r(), self.s())
}
}
impl Debug for Signature {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
write!(f, "sm2::dsa::Signature(")?;
for byte in self.to_bytes() {
write!(f, "{:02X}", byte)?;
}
write!(f, ")")
}
}
impl From<Signature> for SignatureBytes {
fn from(signature: Signature) -> SignatureBytes {
signature.to_bytes()
}
}
impl From<&Signature> for SignatureBytes {
fn from(signature: &Signature) -> SignatureBytes {
signature.to_bytes()
}
}
impl SignatureEncoding for Signature {
type Repr = SignatureBytes;
fn to_bytes(&self) -> Self::Repr {
self.into()
}
fn encoded_len(&self) -> usize {
Self::BYTE_SIZE
}
}
impl TryFrom<SignatureBytes> for Signature {
type Error = Error;
fn try_from(signature: SignatureBytes) -> Result<Signature> {
Signature::from_bytes(&signature)
}
}
impl TryFrom<&SignatureBytes> for Signature {
type Error = Error;
fn try_from(signature: &SignatureBytes) -> Result<Signature> {
Signature::from_bytes(signature)
}
}
impl TryFrom<&[u8]> for Signature {
type Error = Error;
fn try_from(bytes: &[u8]) -> Result<Signature> {
Signature::from_slice(bytes)
}
}
#[cfg(all(feature = "alloc", feature = "pkcs8"))]
impl SignatureBitStringEncoding for Signature {
fn to_bitstring(&self) -> der::Result<der::asn1::BitString> {
der::asn1::BitString::new(0, self.to_vec())
}
}
#[cfg(all(feature = "alloc", feature = "pkcs8"))]
impl AssociatedAlgorithmIdentifier for Signature {
type Params = AnyRef<'static>;
const ALGORITHM_IDENTIFIER: AlgorithmIdentifierRef<'static> = AlgorithmIdentifierRef {
// Reference: https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3#section-8.1.3
// ```
// "1.2.156.10197.1.501" for "Digital Signature: SM2 and SM3"
// o "id-dsa-sm2sm3" "{id-int dsa-sm2sm3(501)}"
// ```
//
// NOTE: Here [`Signature`] represent an SM2 signed object with an SM3 hash (implementation detail
// of [`sm2::dsa::SigningKey`] and [`sm2::dsa::VerifyingKey`], that might need to change
// once/if the hash function gets modular.
oid: ObjectIdentifier::new_unwrap("1.2.156.10197.1.501"),
parameters: None,
};
}