| <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><meta name="generator" content="rustdoc"><meta name="description" content="Source of the Rust file `/root/.cargo/registry/src/github.com-1ecc6299db9ec823/openssl-0.10.54/src/sign.rs`."><meta name="keywords" content="rust, rustlang, rust-lang"><title>sign.rs - source</title><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceSerif4-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../FiraSans-Regular.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../FiraSans-Medium.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceCodePro-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceSerif4-Bold.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../SourceCodePro-Semibold.ttf.woff2"><link rel="stylesheet" href="../../normalize.css"><link rel="stylesheet" href="../../rustdoc.css" id="mainThemeStyle"><link rel="stylesheet" href="../../ayu.css" disabled><link rel="stylesheet" href="../../dark.css" disabled><link rel="stylesheet" href="../../light.css" id="themeStyle"><script id="default-settings" ></script><script src="../../storage.js"></script><script defer src="../../source-script.js"></script><script defer src="../../source-files.js"></script><script defer src="../../main.js"></script><noscript><link rel="stylesheet" href="../../noscript.css"></noscript><link rel="alternate icon" type="image/png" href="../../favicon-16x16.png"><link rel="alternate icon" type="image/png" href="../../favicon-32x32.png"><link rel="icon" type="image/svg+xml" href="../../favicon.svg"></head><body class="rustdoc source"><!--[if lte IE 11]><div class="warning">This old browser is unsupported and will most likely display funky things.</div><![endif]--><nav class="sidebar"><a class="sidebar-logo" href="../../openssl/index.html"><div class="logo-container"><img class="rust-logo" src="../../rust-logo.svg" alt="logo"></div></a></nav><main><div class="width-limiter"><nav class="sub"><a class="sub-logo-container" href="../../openssl/index.html"><img class="rust-logo" src="../../rust-logo.svg" alt="logo"></a><form class="search-form"><div class="search-container"><span></span><input class="search-input" name="search" autocomplete="off" spellcheck="false" placeholder="Click or press ‘S’ to search, ‘?’ for more options…" type="search"><div id="help-button" title="help" tabindex="-1"><a href="../../help.html">?</a></div><div id="settings-menu" tabindex="-1"><a href="../../settings.html" title="settings"><img width="22" height="22" alt="Change settings" src="../../wheel.svg"></a></div></div></form></nav><section id="main-content" class="content"><div class="example-wrap"><pre class="src-line-numbers"><span id="1">1</span> |
| <span id="2">2</span> |
| <span id="3">3</span> |
| <span id="4">4</span> |
| <span id="5">5</span> |
| <span id="6">6</span> |
| <span id="7">7</span> |
| <span id="8">8</span> |
| <span id="9">9</span> |
| <span id="10">10</span> |
| <span id="11">11</span> |
| <span id="12">12</span> |
| <span id="13">13</span> |
| <span id="14">14</span> |
| <span id="15">15</span> |
| <span id="16">16</span> |
| <span id="17">17</span> |
| <span id="18">18</span> |
| <span id="19">19</span> |
| <span id="20">20</span> |
| <span id="21">21</span> |
| <span id="22">22</span> |
| <span id="23">23</span> |
| <span id="24">24</span> |
| <span id="25">25</span> |
| <span id="26">26</span> |
| <span id="27">27</span> |
| <span id="28">28</span> |
| <span id="29">29</span> |
| <span id="30">30</span> |
| <span id="31">31</span> |
| <span id="32">32</span> |
| <span id="33">33</span> |
| <span id="34">34</span> |
| <span id="35">35</span> |
| <span id="36">36</span> |
| <span id="37">37</span> |
| <span id="38">38</span> |
| <span id="39">39</span> |
| <span id="40">40</span> |
| <span id="41">41</span> |
| <span id="42">42</span> |
| <span id="43">43</span> |
| <span id="44">44</span> |
| <span id="45">45</span> |
| <span id="46">46</span> |
| <span id="47">47</span> |
| <span id="48">48</span> |
| <span id="49">49</span> |
| <span id="50">50</span> |
| <span id="51">51</span> |
| <span id="52">52</span> |
| <span id="53">53</span> |
| <span id="54">54</span> |
| <span id="55">55</span> |
| <span id="56">56</span> |
| <span id="57">57</span> |
| <span id="58">58</span> |
| <span id="59">59</span> |
| <span id="60">60</span> |
| <span id="61">61</span> |
| <span id="62">62</span> |
| <span id="63">63</span> |
| <span id="64">64</span> |
| <span id="65">65</span> |
| <span id="66">66</span> |
| <span id="67">67</span> |
| <span id="68">68</span> |
| <span id="69">69</span> |
| <span id="70">70</span> |
| <span id="71">71</span> |
| <span id="72">72</span> |
| <span id="73">73</span> |
| <span id="74">74</span> |
| <span id="75">75</span> |
| <span id="76">76</span> |
| <span id="77">77</span> |
| <span id="78">78</span> |
| <span id="79">79</span> |
| <span id="80">80</span> |
| <span id="81">81</span> |
| <span id="82">82</span> |
| <span id="83">83</span> |
| <span id="84">84</span> |
| <span id="85">85</span> |
| <span id="86">86</span> |
| <span id="87">87</span> |
| <span id="88">88</span> |
| <span id="89">89</span> |
| <span id="90">90</span> |
| <span id="91">91</span> |
| <span id="92">92</span> |
| <span id="93">93</span> |
| <span id="94">94</span> |
| <span id="95">95</span> |
| <span id="96">96</span> |
| <span id="97">97</span> |
| <span id="98">98</span> |
| <span id="99">99</span> |
| <span id="100">100</span> |
| <span id="101">101</span> |
| <span id="102">102</span> |
| <span id="103">103</span> |
| <span id="104">104</span> |
| <span id="105">105</span> |
| <span id="106">106</span> |
| <span id="107">107</span> |
| <span id="108">108</span> |
| <span id="109">109</span> |
| <span id="110">110</span> |
| <span id="111">111</span> |
| <span id="112">112</span> |
| <span id="113">113</span> |
| <span id="114">114</span> |
| <span id="115">115</span> |
| <span id="116">116</span> |
| <span id="117">117</span> |
| <span id="118">118</span> |
| <span id="119">119</span> |
| <span id="120">120</span> |
| <span id="121">121</span> |
| <span id="122">122</span> |
| <span id="123">123</span> |
| <span id="124">124</span> |
| <span id="125">125</span> |
| <span id="126">126</span> |
| <span id="127">127</span> |
| <span id="128">128</span> |
| <span id="129">129</span> |
| <span id="130">130</span> |
| <span id="131">131</span> |
| <span id="132">132</span> |
| <span id="133">133</span> |
| <span id="134">134</span> |
| <span id="135">135</span> |
| <span id="136">136</span> |
| <span id="137">137</span> |
| <span id="138">138</span> |
| <span id="139">139</span> |
| <span id="140">140</span> |
| <span id="141">141</span> |
| <span id="142">142</span> |
| <span id="143">143</span> |
| <span id="144">144</span> |
| <span id="145">145</span> |
| <span id="146">146</span> |
| <span id="147">147</span> |
| <span id="148">148</span> |
| <span id="149">149</span> |
| <span id="150">150</span> |
| <span id="151">151</span> |
| <span id="152">152</span> |
| <span id="153">153</span> |
| <span id="154">154</span> |
| <span id="155">155</span> |
| <span id="156">156</span> |
| <span id="157">157</span> |
| <span id="158">158</span> |
| <span id="159">159</span> |
| <span id="160">160</span> |
| <span id="161">161</span> |
| <span id="162">162</span> |
| <span id="163">163</span> |
| <span id="164">164</span> |
| <span id="165">165</span> |
| <span id="166">166</span> |
| <span id="167">167</span> |
| <span id="168">168</span> |
| <span id="169">169</span> |
| <span id="170">170</span> |
| <span id="171">171</span> |
| <span id="172">172</span> |
| <span id="173">173</span> |
| <span id="174">174</span> |
| <span id="175">175</span> |
| <span id="176">176</span> |
| <span id="177">177</span> |
| <span id="178">178</span> |
| <span id="179">179</span> |
| <span id="180">180</span> |
| <span id="181">181</span> |
| <span id="182">182</span> |
| <span id="183">183</span> |
| <span id="184">184</span> |
| <span id="185">185</span> |
| <span id="186">186</span> |
| <span id="187">187</span> |
| <span id="188">188</span> |
| <span id="189">189</span> |
| <span id="190">190</span> |
| <span id="191">191</span> |
| <span id="192">192</span> |
| <span id="193">193</span> |
| <span id="194">194</span> |
| <span id="195">195</span> |
| <span id="196">196</span> |
| <span id="197">197</span> |
| <span id="198">198</span> |
| <span id="199">199</span> |
| <span id="200">200</span> |
| <span id="201">201</span> |
| <span id="202">202</span> |
| <span id="203">203</span> |
| <span id="204">204</span> |
| <span id="205">205</span> |
| <span id="206">206</span> |
| <span id="207">207</span> |
| <span id="208">208</span> |
| <span id="209">209</span> |
| <span id="210">210</span> |
| <span id="211">211</span> |
| <span id="212">212</span> |
| <span id="213">213</span> |
| <span id="214">214</span> |
| <span id="215">215</span> |
| <span id="216">216</span> |
| <span id="217">217</span> |
| <span id="218">218</span> |
| <span id="219">219</span> |
| <span id="220">220</span> |
| <span id="221">221</span> |
| <span id="222">222</span> |
| <span id="223">223</span> |
| <span id="224">224</span> |
| <span id="225">225</span> |
| <span id="226">226</span> |
| <span id="227">227</span> |
| <span id="228">228</span> |
| <span id="229">229</span> |
| <span id="230">230</span> |
| <span id="231">231</span> |
| <span id="232">232</span> |
| <span id="233">233</span> |
| <span id="234">234</span> |
| <span id="235">235</span> |
| <span id="236">236</span> |
| <span id="237">237</span> |
| <span id="238">238</span> |
| <span id="239">239</span> |
| <span id="240">240</span> |
| <span id="241">241</span> |
| <span id="242">242</span> |
| <span id="243">243</span> |
| <span id="244">244</span> |
| <span id="245">245</span> |
| <span id="246">246</span> |
| <span id="247">247</span> |
| <span id="248">248</span> |
| <span id="249">249</span> |
| <span id="250">250</span> |
| <span id="251">251</span> |
| <span id="252">252</span> |
| <span id="253">253</span> |
| <span id="254">254</span> |
| <span id="255">255</span> |
| <span id="256">256</span> |
| <span id="257">257</span> |
| <span id="258">258</span> |
| <span id="259">259</span> |
| <span id="260">260</span> |
| <span id="261">261</span> |
| <span id="262">262</span> |
| <span id="263">263</span> |
| <span id="264">264</span> |
| <span id="265">265</span> |
| <span id="266">266</span> |
| <span id="267">267</span> |
| <span id="268">268</span> |
| <span id="269">269</span> |
| <span id="270">270</span> |
| <span id="271">271</span> |
| <span id="272">272</span> |
| <span id="273">273</span> |
| <span id="274">274</span> |
| <span id="275">275</span> |
| <span id="276">276</span> |
| <span id="277">277</span> |
| <span id="278">278</span> |
| <span id="279">279</span> |
| <span id="280">280</span> |
| <span id="281">281</span> |
| <span id="282">282</span> |
| <span id="283">283</span> |
| <span id="284">284</span> |
| <span id="285">285</span> |
| <span id="286">286</span> |
| <span id="287">287</span> |
| <span id="288">288</span> |
| <span id="289">289</span> |
| <span id="290">290</span> |
| <span id="291">291</span> |
| <span id="292">292</span> |
| <span id="293">293</span> |
| <span id="294">294</span> |
| <span id="295">295</span> |
| <span id="296">296</span> |
| <span id="297">297</span> |
| <span id="298">298</span> |
| <span id="299">299</span> |
| <span id="300">300</span> |
| <span id="301">301</span> |
| <span id="302">302</span> |
| <span id="303">303</span> |
| <span id="304">304</span> |
| <span id="305">305</span> |
| <span id="306">306</span> |
| <span id="307">307</span> |
| <span id="308">308</span> |
| <span id="309">309</span> |
| <span id="310">310</span> |
| <span id="311">311</span> |
| <span id="312">312</span> |
| <span id="313">313</span> |
| <span id="314">314</span> |
| <span id="315">315</span> |
| <span id="316">316</span> |
| <span id="317">317</span> |
| <span id="318">318</span> |
| <span id="319">319</span> |
| <span id="320">320</span> |
| <span id="321">321</span> |
| <span id="322">322</span> |
| <span id="323">323</span> |
| <span id="324">324</span> |
| <span id="325">325</span> |
| <span id="326">326</span> |
| <span id="327">327</span> |
| <span id="328">328</span> |
| <span id="329">329</span> |
| <span id="330">330</span> |
| <span id="331">331</span> |
| <span id="332">332</span> |
| <span id="333">333</span> |
| <span id="334">334</span> |
| <span id="335">335</span> |
| <span id="336">336</span> |
| <span id="337">337</span> |
| <span id="338">338</span> |
| <span id="339">339</span> |
| <span id="340">340</span> |
| <span id="341">341</span> |
| <span id="342">342</span> |
| <span id="343">343</span> |
| <span id="344">344</span> |
| <span id="345">345</span> |
| <span id="346">346</span> |
| <span id="347">347</span> |
| <span id="348">348</span> |
| <span id="349">349</span> |
| <span id="350">350</span> |
| <span id="351">351</span> |
| <span id="352">352</span> |
| <span id="353">353</span> |
| <span id="354">354</span> |
| <span id="355">355</span> |
| <span id="356">356</span> |
| <span id="357">357</span> |
| <span id="358">358</span> |
| <span id="359">359</span> |
| <span id="360">360</span> |
| <span id="361">361</span> |
| <span id="362">362</span> |
| <span id="363">363</span> |
| <span id="364">364</span> |
| <span id="365">365</span> |
| <span id="366">366</span> |
| <span id="367">367</span> |
| <span id="368">368</span> |
| <span id="369">369</span> |
| <span id="370">370</span> |
| <span id="371">371</span> |
| <span id="372">372</span> |
| <span id="373">373</span> |
| <span id="374">374</span> |
| <span id="375">375</span> |
| <span id="376">376</span> |
| <span id="377">377</span> |
| <span id="378">378</span> |
| <span id="379">379</span> |
| <span id="380">380</span> |
| <span id="381">381</span> |
| <span id="382">382</span> |
| <span id="383">383</span> |
| <span id="384">384</span> |
| <span id="385">385</span> |
| <span id="386">386</span> |
| <span id="387">387</span> |
| <span id="388">388</span> |
| <span id="389">389</span> |
| <span id="390">390</span> |
| <span id="391">391</span> |
| <span id="392">392</span> |
| <span id="393">393</span> |
| <span id="394">394</span> |
| <span id="395">395</span> |
| <span id="396">396</span> |
| <span id="397">397</span> |
| <span id="398">398</span> |
| <span id="399">399</span> |
| <span id="400">400</span> |
| <span id="401">401</span> |
| <span id="402">402</span> |
| <span id="403">403</span> |
| <span id="404">404</span> |
| <span id="405">405</span> |
| <span id="406">406</span> |
| <span id="407">407</span> |
| <span id="408">408</span> |
| <span id="409">409</span> |
| <span id="410">410</span> |
| <span id="411">411</span> |
| <span id="412">412</span> |
| <span id="413">413</span> |
| <span id="414">414</span> |
| <span id="415">415</span> |
| <span id="416">416</span> |
| <span id="417">417</span> |
| <span id="418">418</span> |
| <span id="419">419</span> |
| <span id="420">420</span> |
| <span id="421">421</span> |
| <span id="422">422</span> |
| <span id="423">423</span> |
| <span id="424">424</span> |
| <span id="425">425</span> |
| <span id="426">426</span> |
| <span id="427">427</span> |
| <span id="428">428</span> |
| <span id="429">429</span> |
| <span id="430">430</span> |
| <span id="431">431</span> |
| <span id="432">432</span> |
| <span id="433">433</span> |
| <span id="434">434</span> |
| <span id="435">435</span> |
| <span id="436">436</span> |
| <span id="437">437</span> |
| <span id="438">438</span> |
| <span id="439">439</span> |
| <span id="440">440</span> |
| <span id="441">441</span> |
| <span id="442">442</span> |
| <span id="443">443</span> |
| <span id="444">444</span> |
| <span id="445">445</span> |
| <span id="446">446</span> |
| <span id="447">447</span> |
| <span id="448">448</span> |
| <span id="449">449</span> |
| <span id="450">450</span> |
| <span id="451">451</span> |
| <span id="452">452</span> |
| <span id="453">453</span> |
| <span id="454">454</span> |
| <span id="455">455</span> |
| <span id="456">456</span> |
| <span id="457">457</span> |
| <span id="458">458</span> |
| <span id="459">459</span> |
| <span id="460">460</span> |
| <span id="461">461</span> |
| <span id="462">462</span> |
| <span id="463">463</span> |
| <span id="464">464</span> |
| <span id="465">465</span> |
| <span id="466">466</span> |
| <span id="467">467</span> |
| <span id="468">468</span> |
| <span id="469">469</span> |
| <span id="470">470</span> |
| <span id="471">471</span> |
| <span id="472">472</span> |
| <span id="473">473</span> |
| <span id="474">474</span> |
| <span id="475">475</span> |
| <span id="476">476</span> |
| <span id="477">477</span> |
| <span id="478">478</span> |
| <span id="479">479</span> |
| <span id="480">480</span> |
| <span id="481">481</span> |
| <span id="482">482</span> |
| <span id="483">483</span> |
| <span id="484">484</span> |
| <span id="485">485</span> |
| <span id="486">486</span> |
| <span id="487">487</span> |
| <span id="488">488</span> |
| <span id="489">489</span> |
| <span id="490">490</span> |
| <span id="491">491</span> |
| <span id="492">492</span> |
| <span id="493">493</span> |
| <span id="494">494</span> |
| <span id="495">495</span> |
| <span id="496">496</span> |
| <span id="497">497</span> |
| <span id="498">498</span> |
| <span id="499">499</span> |
| <span id="500">500</span> |
| <span id="501">501</span> |
| <span id="502">502</span> |
| <span id="503">503</span> |
| <span id="504">504</span> |
| <span id="505">505</span> |
| <span id="506">506</span> |
| <span id="507">507</span> |
| <span id="508">508</span> |
| <span id="509">509</span> |
| <span id="510">510</span> |
| <span id="511">511</span> |
| <span id="512">512</span> |
| <span id="513">513</span> |
| <span id="514">514</span> |
| <span id="515">515</span> |
| <span id="516">516</span> |
| <span id="517">517</span> |
| <span id="518">518</span> |
| <span id="519">519</span> |
| <span id="520">520</span> |
| <span id="521">521</span> |
| <span id="522">522</span> |
| <span id="523">523</span> |
| <span id="524">524</span> |
| <span id="525">525</span> |
| <span id="526">526</span> |
| <span id="527">527</span> |
| <span id="528">528</span> |
| <span id="529">529</span> |
| <span id="530">530</span> |
| <span id="531">531</span> |
| <span id="532">532</span> |
| <span id="533">533</span> |
| <span id="534">534</span> |
| <span id="535">535</span> |
| <span id="536">536</span> |
| <span id="537">537</span> |
| <span id="538">538</span> |
| <span id="539">539</span> |
| <span id="540">540</span> |
| <span id="541">541</span> |
| <span id="542">542</span> |
| <span id="543">543</span> |
| <span id="544">544</span> |
| <span id="545">545</span> |
| <span id="546">546</span> |
| <span id="547">547</span> |
| <span id="548">548</span> |
| <span id="549">549</span> |
| <span id="550">550</span> |
| <span id="551">551</span> |
| <span id="552">552</span> |
| <span id="553">553</span> |
| <span id="554">554</span> |
| <span id="555">555</span> |
| <span id="556">556</span> |
| <span id="557">557</span> |
| <span id="558">558</span> |
| <span id="559">559</span> |
| <span id="560">560</span> |
| <span id="561">561</span> |
| <span id="562">562</span> |
| <span id="563">563</span> |
| <span id="564">564</span> |
| <span id="565">565</span> |
| <span id="566">566</span> |
| <span id="567">567</span> |
| <span id="568">568</span> |
| <span id="569">569</span> |
| <span id="570">570</span> |
| <span id="571">571</span> |
| <span id="572">572</span> |
| <span id="573">573</span> |
| <span id="574">574</span> |
| <span id="575">575</span> |
| <span id="576">576</span> |
| <span id="577">577</span> |
| <span id="578">578</span> |
| <span id="579">579</span> |
| <span id="580">580</span> |
| <span id="581">581</span> |
| <span id="582">582</span> |
| <span id="583">583</span> |
| <span id="584">584</span> |
| <span id="585">585</span> |
| <span id="586">586</span> |
| <span id="587">587</span> |
| <span id="588">588</span> |
| <span id="589">589</span> |
| <span id="590">590</span> |
| <span id="591">591</span> |
| <span id="592">592</span> |
| <span id="593">593</span> |
| <span id="594">594</span> |
| <span id="595">595</span> |
| <span id="596">596</span> |
| <span id="597">597</span> |
| <span id="598">598</span> |
| <span id="599">599</span> |
| <span id="600">600</span> |
| <span id="601">601</span> |
| <span id="602">602</span> |
| <span id="603">603</span> |
| <span id="604">604</span> |
| <span id="605">605</span> |
| <span id="606">606</span> |
| <span id="607">607</span> |
| <span id="608">608</span> |
| <span id="609">609</span> |
| <span id="610">610</span> |
| <span id="611">611</span> |
| <span id="612">612</span> |
| <span id="613">613</span> |
| <span id="614">614</span> |
| <span id="615">615</span> |
| <span id="616">616</span> |
| <span id="617">617</span> |
| <span id="618">618</span> |
| <span id="619">619</span> |
| <span id="620">620</span> |
| <span id="621">621</span> |
| <span id="622">622</span> |
| <span id="623">623</span> |
| <span id="624">624</span> |
| <span id="625">625</span> |
| <span id="626">626</span> |
| <span id="627">627</span> |
| <span id="628">628</span> |
| <span id="629">629</span> |
| <span id="630">630</span> |
| <span id="631">631</span> |
| <span id="632">632</span> |
| <span id="633">633</span> |
| <span id="634">634</span> |
| <span id="635">635</span> |
| <span id="636">636</span> |
| <span id="637">637</span> |
| <span id="638">638</span> |
| <span id="639">639</span> |
| <span id="640">640</span> |
| <span id="641">641</span> |
| <span id="642">642</span> |
| <span id="643">643</span> |
| <span id="644">644</span> |
| <span id="645">645</span> |
| <span id="646">646</span> |
| <span id="647">647</span> |
| <span id="648">648</span> |
| <span id="649">649</span> |
| <span id="650">650</span> |
| <span id="651">651</span> |
| <span id="652">652</span> |
| <span id="653">653</span> |
| <span id="654">654</span> |
| <span id="655">655</span> |
| <span id="656">656</span> |
| <span id="657">657</span> |
| <span id="658">658</span> |
| <span id="659">659</span> |
| <span id="660">660</span> |
| <span id="661">661</span> |
| <span id="662">662</span> |
| <span id="663">663</span> |
| <span id="664">664</span> |
| <span id="665">665</span> |
| <span id="666">666</span> |
| <span id="667">667</span> |
| <span id="668">668</span> |
| <span id="669">669</span> |
| <span id="670">670</span> |
| <span id="671">671</span> |
| <span id="672">672</span> |
| <span id="673">673</span> |
| <span id="674">674</span> |
| <span id="675">675</span> |
| <span id="676">676</span> |
| <span id="677">677</span> |
| <span id="678">678</span> |
| <span id="679">679</span> |
| <span id="680">680</span> |
| <span id="681">681</span> |
| <span id="682">682</span> |
| <span id="683">683</span> |
| <span id="684">684</span> |
| <span id="685">685</span> |
| <span id="686">686</span> |
| <span id="687">687</span> |
| <span id="688">688</span> |
| <span id="689">689</span> |
| <span id="690">690</span> |
| <span id="691">691</span> |
| <span id="692">692</span> |
| <span id="693">693</span> |
| <span id="694">694</span> |
| <span id="695">695</span> |
| <span id="696">696</span> |
| <span id="697">697</span> |
| <span id="698">698</span> |
| <span id="699">699</span> |
| <span id="700">700</span> |
| <span id="701">701</span> |
| <span id="702">702</span> |
| <span id="703">703</span> |
| <span id="704">704</span> |
| <span id="705">705</span> |
| <span id="706">706</span> |
| <span id="707">707</span> |
| <span id="708">708</span> |
| <span id="709">709</span> |
| <span id="710">710</span> |
| <span id="711">711</span> |
| <span id="712">712</span> |
| <span id="713">713</span> |
| <span id="714">714</span> |
| <span id="715">715</span> |
| <span id="716">716</span> |
| <span id="717">717</span> |
| <span id="718">718</span> |
| <span id="719">719</span> |
| <span id="720">720</span> |
| <span id="721">721</span> |
| <span id="722">722</span> |
| <span id="723">723</span> |
| <span id="724">724</span> |
| <span id="725">725</span> |
| <span id="726">726</span> |
| <span id="727">727</span> |
| <span id="728">728</span> |
| <span id="729">729</span> |
| <span id="730">730</span> |
| <span id="731">731</span> |
| <span id="732">732</span> |
| <span id="733">733</span> |
| <span id="734">734</span> |
| <span id="735">735</span> |
| <span id="736">736</span> |
| <span id="737">737</span> |
| <span id="738">738</span> |
| <span id="739">739</span> |
| <span id="740">740</span> |
| <span id="741">741</span> |
| <span id="742">742</span> |
| <span id="743">743</span> |
| <span id="744">744</span> |
| <span id="745">745</span> |
| <span id="746">746</span> |
| <span id="747">747</span> |
| <span id="748">748</span> |
| <span id="749">749</span> |
| <span id="750">750</span> |
| <span id="751">751</span> |
| <span id="752">752</span> |
| <span id="753">753</span> |
| <span id="754">754</span> |
| <span id="755">755</span> |
| <span id="756">756</span> |
| <span id="757">757</span> |
| <span id="758">758</span> |
| <span id="759">759</span> |
| <span id="760">760</span> |
| <span id="761">761</span> |
| <span id="762">762</span> |
| <span id="763">763</span> |
| <span id="764">764</span> |
| <span id="765">765</span> |
| <span id="766">766</span> |
| <span id="767">767</span> |
| <span id="768">768</span> |
| <span id="769">769</span> |
| <span id="770">770</span> |
| <span id="771">771</span> |
| <span id="772">772</span> |
| <span id="773">773</span> |
| <span id="774">774</span> |
| <span id="775">775</span> |
| <span id="776">776</span> |
| <span id="777">777</span> |
| <span id="778">778</span> |
| <span id="779">779</span> |
| <span id="780">780</span> |
| <span id="781">781</span> |
| <span id="782">782</span> |
| <span id="783">783</span> |
| <span id="784">784</span> |
| <span id="785">785</span> |
| <span id="786">786</span> |
| <span id="787">787</span> |
| <span id="788">788</span> |
| <span id="789">789</span> |
| <span id="790">790</span> |
| <span id="791">791</span> |
| <span id="792">792</span> |
| <span id="793">793</span> |
| <span id="794">794</span> |
| <span id="795">795</span> |
| <span id="796">796</span> |
| <span id="797">797</span> |
| <span id="798">798</span> |
| <span id="799">799</span> |
| <span id="800">800</span> |
| <span id="801">801</span> |
| <span id="802">802</span> |
| <span id="803">803</span> |
| <span id="804">804</span> |
| <span id="805">805</span> |
| <span id="806">806</span> |
| <span id="807">807</span> |
| <span id="808">808</span> |
| <span id="809">809</span> |
| <span id="810">810</span> |
| <span id="811">811</span> |
| <span id="812">812</span> |
| <span id="813">813</span> |
| <span id="814">814</span> |
| <span id="815">815</span> |
| <span id="816">816</span> |
| <span id="817">817</span> |
| <span id="818">818</span> |
| <span id="819">819</span> |
| <span id="820">820</span> |
| <span id="821">821</span> |
| <span id="822">822</span> |
| <span id="823">823</span> |
| <span id="824">824</span> |
| <span id="825">825</span> |
| <span id="826">826</span> |
| <span id="827">827</span> |
| <span id="828">828</span> |
| <span id="829">829</span> |
| <span id="830">830</span> |
| <span id="831">831</span> |
| <span id="832">832</span> |
| <span id="833">833</span> |
| <span id="834">834</span> |
| <span id="835">835</span> |
| <span id="836">836</span> |
| <span id="837">837</span> |
| <span id="838">838</span> |
| <span id="839">839</span> |
| <span id="840">840</span> |
| <span id="841">841</span> |
| <span id="842">842</span> |
| <span id="843">843</span> |
| <span id="844">844</span> |
| <span id="845">845</span> |
| <span id="846">846</span> |
| <span id="847">847</span> |
| <span id="848">848</span> |
| <span id="849">849</span> |
| <span id="850">850</span> |
| <span id="851">851</span> |
| <span id="852">852</span> |
| <span id="853">853</span> |
| <span id="854">854</span> |
| <span id="855">855</span> |
| <span id="856">856</span> |
| <span id="857">857</span> |
| <span id="858">858</span> |
| <span id="859">859</span> |
| <span id="860">860</span> |
| <span id="861">861</span> |
| <span id="862">862</span> |
| <span id="863">863</span> |
| <span id="864">864</span> |
| <span id="865">865</span> |
| <span id="866">866</span> |
| <span id="867">867</span> |
| <span id="868">868</span> |
| <span id="869">869</span> |
| <span id="870">870</span> |
| <span id="871">871</span> |
| <span id="872">872</span> |
| <span id="873">873</span> |
| <span id="874">874</span> |
| <span id="875">875</span> |
| <span id="876">876</span> |
| <span id="877">877</span> |
| <span id="878">878</span> |
| <span id="879">879</span> |
| <span id="880">880</span> |
| <span id="881">881</span> |
| <span id="882">882</span> |
| <span id="883">883</span> |
| <span id="884">884</span> |
| <span id="885">885</span> |
| <span id="886">886</span> |
| </pre><pre class="rust"><code><span class="doccomment">//! Message signatures. |
| //! |
| //! The `Signer` allows for the computation of cryptographic signatures of |
| //! data given a private key. The `Verifier` can then be used with the |
| //! corresponding public key to verify the integrity and authenticity of that |
| //! data given the signature. |
| //! |
| //! # Examples |
| //! |
| //! Sign and verify data given an RSA keypair: |
| //! |
| //! ```rust |
| //! use openssl::sign::{Signer, Verifier}; |
| //! use openssl::rsa::Rsa; |
| //! use openssl::pkey::PKey; |
| //! use openssl::hash::MessageDigest; |
| //! |
| //! // Generate a keypair |
| //! let keypair = Rsa::generate(2048).unwrap(); |
| //! let keypair = PKey::from_rsa(keypair).unwrap(); |
| //! |
| //! let data = b"hello, world!"; |
| //! let data2 = b"hola, mundo!"; |
| //! |
| //! // Sign the data |
| //! let mut signer = Signer::new(MessageDigest::sha256(), &keypair).unwrap(); |
| //! signer.update(data).unwrap(); |
| //! signer.update(data2).unwrap(); |
| //! let signature = signer.sign_to_vec().unwrap(); |
| //! |
| //! // Verify the data |
| //! let mut verifier = Verifier::new(MessageDigest::sha256(), &keypair).unwrap(); |
| //! verifier.update(data).unwrap(); |
| //! verifier.update(data2).unwrap(); |
| //! assert!(verifier.verify(&signature).unwrap()); |
| //! ``` |
| |
| </span><span class="attribute">#![cfg_attr( |
| not(boringssl), |
| doc = <span class="string">r#"\ |
| |
| Compute an HMAC: |
| |
| ```rust |
| use openssl::hash::MessageDigest; |
| use openssl::memcmp; |
| use openssl::pkey::PKey; |
| use openssl::sign::Signer; |
| |
| // Create a PKey |
| let key = PKey::hmac(b"my secret").unwrap(); |
| |
| let data = b"hello, world!"; |
| let data2 = b"hola, mundo!"; |
| |
| // Compute the HMAC |
| let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); |
| signer.update(data).unwrap(); |
| signer.update(data2).unwrap(); |
| let hmac = signer.sign_to_vec().unwrap(); |
| |
| // `Verifier` cannot be used with HMACs; use the `memcmp::eq` function instead |
| // |
| // Do not simply check for equality with `==`! |
| # let target = hmac.clone(); |
| assert!(memcmp::eq(&hmac, &target)); |
| ```"# |
| </span>)] |
| |
| </span><span class="kw">use </span>cfg_if::cfg_if; |
| <span class="kw">use </span>foreign_types::ForeignTypeRef; |
| <span class="kw">use </span>libc::c_int; |
| <span class="kw">use </span>std::io::{<span class="self">self</span>, Write}; |
| <span class="kw">use </span>std::marker::PhantomData; |
| <span class="kw">use </span>std::ptr; |
| |
| <span class="kw">use </span><span class="kw">crate</span>::error::ErrorStack; |
| <span class="kw">use </span><span class="kw">crate</span>::hash::MessageDigest; |
| <span class="kw">use </span><span class="kw">crate</span>::pkey::{HasPrivate, HasPublic, PKeyRef}; |
| <span class="kw">use </span><span class="kw">crate</span>::rsa::Padding; |
| <span class="kw">use crate</span>::{cvt, cvt_p}; |
| |
| <span class="macro">cfg_if! </span>{ |
| <span class="kw">if </span><span class="attribute">#[cfg(ossl110)] </span>{ |
| <span class="kw">use </span>ffi::{EVP_MD_CTX_free, EVP_MD_CTX_new}; |
| } <span class="kw">else </span>{ |
| <span class="kw">use </span>ffi::{EVP_MD_CTX_create <span class="kw">as </span>EVP_MD_CTX_new, EVP_MD_CTX_destroy <span class="kw">as </span>EVP_MD_CTX_free}; |
| } |
| } |
| |
| <span class="doccomment">/// Salt lengths that must be used with `set_rsa_pss_saltlen`. |
| </span><span class="kw">pub struct </span>RsaPssSaltlen(c_int); |
| |
| <span class="kw">impl </span>RsaPssSaltlen { |
| <span class="doccomment">/// Returns the integer representation of `RsaPssSaltlen`. |
| </span><span class="kw">fn </span>as_raw(<span class="kw-2">&</span><span class="self">self</span>) -> c_int { |
| <span class="self">self</span>.<span class="number">0 |
| </span>} |
| |
| <span class="doccomment">/// Sets the salt length to the given value. |
| </span><span class="kw">pub fn </span>custom(val: c_int) -> RsaPssSaltlen { |
| RsaPssSaltlen(val) |
| } |
| |
| <span class="doccomment">/// The salt length is set to the digest length. |
| /// Corresponds to the special value `-1`. |
| </span><span class="kw">pub const </span>DIGEST_LENGTH: RsaPssSaltlen = RsaPssSaltlen(-<span class="number">1</span>); |
| <span class="doccomment">/// The salt length is set to the maximum permissible value. |
| /// Corresponds to the special value `-2`. |
| </span><span class="kw">pub const </span>MAXIMUM_LENGTH: RsaPssSaltlen = RsaPssSaltlen(-<span class="number">2</span>); |
| } |
| |
| <span class="doccomment">/// A type which computes cryptographic signatures of data. |
| </span><span class="kw">pub struct </span>Signer<<span class="lifetime">'a</span>> { |
| md_ctx: <span class="kw-2">*mut </span>ffi::EVP_MD_CTX, |
| pctx: <span class="kw-2">*mut </span>ffi::EVP_PKEY_CTX, |
| _p: PhantomData<<span class="kw-2">&</span><span class="lifetime">'a </span>()>, |
| } |
| |
| <span class="kw">unsafe impl </span>Sync <span class="kw">for </span>Signer<<span class="lifetime">'_</span>> {} |
| <span class="kw">unsafe impl </span>Send <span class="kw">for </span>Signer<<span class="lifetime">'_</span>> {} |
| |
| <span class="kw">impl </span>Drop <span class="kw">for </span>Signer<<span class="lifetime">'_</span>> { |
| <span class="kw">fn </span>drop(<span class="kw-2">&mut </span><span class="self">self</span>) { |
| <span class="comment">// pkey_ctx is owned by the md_ctx, so no need to explicitly free it. |
| </span><span class="kw">unsafe </span>{ |
| EVP_MD_CTX_free(<span class="self">self</span>.md_ctx); |
| } |
| } |
| } |
| |
| <span class="attribute">#[allow(clippy::len_without_is_empty)] |
| </span><span class="kw">impl </span>Signer<<span class="lifetime">'_</span>> { |
| <span class="doccomment">/// Creates a new `Signer`. |
| /// |
| /// This cannot be used with Ed25519 or Ed448 keys. Please refer to |
| /// `new_without_digest`. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestSignInit`]. |
| /// |
| /// [`EVP_DigestSignInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestSignInit.html |
| </span><span class="kw">pub fn </span>new<<span class="lifetime">'a</span>, T>(type_: MessageDigest, pkey: <span class="kw-2">&</span>PKeyRef<T>) -> <span class="prelude-ty">Result</span><Signer<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPrivate, |
| { |
| <span class="self">Self</span>::new_intern(<span class="prelude-val">Some</span>(type_), pkey) |
| } |
| |
| <span class="doccomment">/// Creates a new `Signer` without a digest. |
| /// |
| /// This is the only way to create a `Verifier` for Ed25519 or Ed448 keys. |
| /// It can also be used to create a CMAC. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestSignInit`]. |
| /// |
| /// [`EVP_DigestSignInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestSignInit.html |
| </span><span class="kw">pub fn </span>new_without_digest<<span class="lifetime">'a</span>, T>(pkey: <span class="kw-2">&</span>PKeyRef<T>) -> <span class="prelude-ty">Result</span><Signer<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPrivate, |
| { |
| <span class="self">Self</span>::new_intern(<span class="prelude-val">None</span>, pkey) |
| } |
| |
| <span class="kw">fn </span>new_intern<<span class="lifetime">'a</span>, T>( |
| type_: <span class="prelude-ty">Option</span><MessageDigest>, |
| pkey: <span class="kw-2">&</span>PKeyRef<T>, |
| ) -> <span class="prelude-ty">Result</span><Signer<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPrivate, |
| { |
| <span class="kw">unsafe </span>{ |
| ffi::init(); |
| |
| <span class="kw">let </span>ctx = cvt_p(EVP_MD_CTX_new())<span class="question-mark">?</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>pctx: <span class="kw-2">*mut </span>ffi::EVP_PKEY_CTX = ptr::null_mut(); |
| <span class="kw">let </span>r = ffi::EVP_DigestSignInit( |
| ctx, |
| <span class="kw-2">&mut </span>pctx, |
| type_.map(|t| t.as_ptr()).unwrap_or(ptr::null()), |
| ptr::null_mut(), |
| pkey.as_ptr(), |
| ); |
| <span class="kw">if </span>r != <span class="number">1 </span>{ |
| EVP_MD_CTX_free(ctx); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(ErrorStack::get()); |
| } |
| |
| <span class="macro">assert!</span>(!pctx.is_null()); |
| |
| <span class="prelude-val">Ok</span>(Signer { |
| md_ctx: ctx, |
| pctx, |
| _p: PhantomData, |
| }) |
| } |
| } |
| |
| <span class="doccomment">/// Returns the RSA padding mode in use. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to `EVP_PKEY_CTX_get_rsa_padding`. |
| </span><span class="kw">pub fn </span>rsa_padding(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><Padding, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>pad = <span class="number">0</span>; |
| cvt(ffi::EVP_PKEY_CTX_get_rsa_padding(<span class="self">self</span>.pctx, <span class="kw-2">&mut </span>pad)) |
| .map(|<span class="kw">_</span>| Padding::from_raw(pad)) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA padding mode. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_padding`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_padding`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_CTX_set_rsa_padding.html |
| </span><span class="kw">pub fn </span>set_rsa_padding(<span class="kw-2">&mut </span><span class="self">self</span>, padding: Padding) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_padding( |
| <span class="self">self</span>.pctx, |
| padding.as_raw(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA PSS salt length. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_pss_saltlen`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_pss_saltlen`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_CTX_set_rsa_pss_saltlen.html |
| </span><span class="kw">pub fn </span>set_rsa_pss_saltlen(<span class="kw-2">&mut </span><span class="self">self</span>, len: RsaPssSaltlen) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_pss_saltlen( |
| <span class="self">self</span>.pctx, |
| len.as_raw(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA MGF1 algorithm. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_mgf1_md`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_mgf1_md`]: https://www.openssl.org/docs/manmaster/man7/RSA-PSS.html |
| </span><span class="kw">pub fn </span>set_rsa_mgf1_md(<span class="kw-2">&mut </span><span class="self">self</span>, md: MessageDigest) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_mgf1_md( |
| <span class="self">self</span>.pctx, |
| md.as_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Feeds more data into the `Signer`. |
| /// |
| /// Please note that PureEdDSA (Ed25519 and Ed448 keys) do not support streaming. |
| /// Use `sign_oneshot` instead. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestUpdate`]. |
| /// |
| /// [`EVP_DigestUpdate`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestInit.html |
| </span><span class="kw">pub fn </span>update(<span class="kw-2">&mut </span><span class="self">self</span>, buf: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_DigestUpdate( |
| <span class="self">self</span>.md_ctx, |
| buf.as_ptr() <span class="kw">as </span><span class="kw-2">*const </span><span class="kw">_</span>, |
| buf.len(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Computes an upper bound on the signature length. |
| /// |
| /// The actual signature may be shorter than this value. Check the return value of |
| /// `sign` to get the exact length. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestSignFinal`]. |
| /// |
| /// [`EVP_DigestSignFinal`]: https://www.openssl.org/docs/manmaster/crypto/EVP_DigestSignFinal.html |
| </span><span class="kw">pub fn </span>len(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="self">self</span>.len_intern() |
| } |
| |
| <span class="attribute">#[cfg(all(not(ossl111), not(boringssl), not(libressl370)))] |
| </span><span class="kw">fn </span>len_intern(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>len = <span class="number">0</span>; |
| cvt(ffi::EVP_DigestSignFinal( |
| <span class="self">self</span>.md_ctx, |
| ptr::null_mut(), |
| <span class="kw-2">&mut </span>len, |
| ))<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(len) |
| } |
| } |
| |
| <span class="attribute">#[cfg(any(ossl111, boringssl, libressl370))] |
| </span><span class="kw">fn </span>len_intern(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>len = <span class="number">0</span>; |
| cvt(ffi::EVP_DigestSign( |
| <span class="self">self</span>.md_ctx, |
| ptr::null_mut(), |
| <span class="kw-2">&mut </span>len, |
| ptr::null(), |
| <span class="number">0</span>, |
| ))<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(len) |
| } |
| } |
| |
| <span class="doccomment">/// Writes the signature into the provided buffer, returning the number of bytes written. |
| /// |
| /// This method will fail if the buffer is not large enough for the signature. Use the `len` |
| /// method to get an upper bound on the required size. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestSignFinal`]. |
| /// |
| /// [`EVP_DigestSignFinal`]: https://www.openssl.org/docs/manmaster/crypto/EVP_DigestSignFinal.html |
| </span><span class="kw">pub fn </span>sign(<span class="kw-2">&</span><span class="self">self</span>, buf: <span class="kw-2">&mut </span>[u8]) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>len = buf.len(); |
| cvt(ffi::EVP_DigestSignFinal( |
| <span class="self">self</span>.md_ctx, |
| buf.as_mut_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, |
| <span class="kw-2">&mut </span>len, |
| ))<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(len) |
| } |
| } |
| |
| <span class="doccomment">/// Returns the signature. |
| /// |
| /// This is a simple convenience wrapper over `len` and `sign`. |
| </span><span class="kw">pub fn </span>sign_to_vec(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>buf = <span class="macro">vec!</span>[<span class="number">0</span>; <span class="self">self</span>.len()<span class="question-mark">?</span>]; |
| <span class="kw">let </span>len = <span class="self">self</span>.sign(<span class="kw-2">&mut </span>buf)<span class="question-mark">?</span>; |
| <span class="comment">// The advertised length is not always equal to the real length for things like DSA |
| </span>buf.truncate(len); |
| <span class="prelude-val">Ok</span>(buf) |
| } |
| |
| <span class="doccomment">/// Signs the data in `data_buf` and writes the signature into the buffer `sig_buf`, returning the |
| /// number of bytes written. |
| /// |
| /// For PureEdDSA (Ed25519 and Ed448 keys), this is the only way to sign data. |
| /// |
| /// This method will fail if the buffer is not large enough for the signature. Use the `len` |
| /// method to get an upper bound on the required size. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestSign`]. |
| /// |
| /// [`EVP_DigestSign`]: https://www.openssl.org/docs/man1.1.1/man3/EVP_DigestSign.html |
| </span><span class="attribute">#[cfg(any(ossl111, boringssl, libressl370))] |
| </span><span class="kw">pub fn </span>sign_oneshot( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sig_buf: <span class="kw-2">&mut </span>[u8], |
| data_buf: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><usize, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>sig_len = sig_buf.len(); |
| cvt(ffi::EVP_DigestSign( |
| <span class="self">self</span>.md_ctx, |
| sig_buf.as_mut_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, |
| <span class="kw-2">&mut </span>sig_len, |
| data_buf.as_ptr() <span class="kw">as </span><span class="kw-2">*const </span><span class="kw">_</span>, |
| data_buf.len(), |
| ))<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(sig_len) |
| } |
| } |
| |
| <span class="doccomment">/// Returns the signature. |
| /// |
| /// This is a simple convenience wrapper over `len` and `sign_oneshot`. |
| </span><span class="attribute">#[cfg(any(ossl111, boringssl, libressl370))] |
| </span><span class="kw">pub fn </span>sign_oneshot_to_vec(<span class="kw-2">&mut </span><span class="self">self</span>, data_buf: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><Vec<u8>, ErrorStack> { |
| <span class="kw">let </span><span class="kw-2">mut </span>sig_buf = <span class="macro">vec!</span>[<span class="number">0</span>; <span class="self">self</span>.len()<span class="question-mark">?</span>]; |
| <span class="kw">let </span>len = <span class="self">self</span>.sign_oneshot(<span class="kw-2">&mut </span>sig_buf, data_buf)<span class="question-mark">?</span>; |
| <span class="comment">// The advertised length is not always equal to the real length for things like DSA |
| </span>sig_buf.truncate(len); |
| <span class="prelude-val">Ok</span>(sig_buf) |
| } |
| } |
| |
| <span class="kw">impl</span><<span class="lifetime">'a</span>> Write <span class="kw">for </span>Signer<<span class="lifetime">'a</span>> { |
| <span class="kw">fn </span>write(<span class="kw-2">&mut </span><span class="self">self</span>, buf: <span class="kw-2">&</span>[u8]) -> io::Result<usize> { |
| <span class="self">self</span>.update(buf)<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(buf.len()) |
| } |
| |
| <span class="kw">fn </span>flush(<span class="kw-2">&mut </span><span class="self">self</span>) -> io::Result<()> { |
| <span class="prelude-val">Ok</span>(()) |
| } |
| } |
| |
| <span class="doccomment">/// A type which can be used to verify the integrity and authenticity |
| /// of data given the signature. |
| </span><span class="kw">pub struct </span>Verifier<<span class="lifetime">'a</span>> { |
| md_ctx: <span class="kw-2">*mut </span>ffi::EVP_MD_CTX, |
| pctx: <span class="kw-2">*mut </span>ffi::EVP_PKEY_CTX, |
| pkey_pd: PhantomData<<span class="kw-2">&</span><span class="lifetime">'a </span>()>, |
| } |
| |
| <span class="kw">unsafe impl</span><<span class="lifetime">'a</span>> Sync <span class="kw">for </span>Verifier<<span class="lifetime">'a</span>> {} |
| <span class="kw">unsafe impl</span><<span class="lifetime">'a</span>> Send <span class="kw">for </span>Verifier<<span class="lifetime">'a</span>> {} |
| |
| <span class="kw">impl</span><<span class="lifetime">'a</span>> Drop <span class="kw">for </span>Verifier<<span class="lifetime">'a</span>> { |
| <span class="kw">fn </span>drop(<span class="kw-2">&mut </span><span class="self">self</span>) { |
| <span class="comment">// pkey_ctx is owned by the md_ctx, so no need to explicitly free it. |
| </span><span class="kw">unsafe </span>{ |
| EVP_MD_CTX_free(<span class="self">self</span>.md_ctx); |
| } |
| } |
| } |
| |
| <span class="doccomment">/// A type which verifies cryptographic signatures of data. |
| </span><span class="kw">impl</span><<span class="lifetime">'a</span>> Verifier<<span class="lifetime">'a</span>> { |
| <span class="doccomment">/// Creates a new `Verifier`. |
| /// |
| /// This cannot be used with Ed25519 or Ed448 keys. Please refer to |
| /// [`Verifier::new_without_digest`]. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestVerifyInit`]. |
| /// |
| /// [`EVP_DigestVerifyInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestVerifyInit.html |
| </span><span class="kw">pub fn </span>new<T>(type_: MessageDigest, pkey: <span class="kw-2">&</span><span class="lifetime">'a </span>PKeyRef<T>) -> <span class="prelude-ty">Result</span><Verifier<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPublic, |
| { |
| Verifier::new_intern(<span class="prelude-val">Some</span>(type_), pkey) |
| } |
| |
| <span class="doccomment">/// Creates a new `Verifier` without a digest. |
| /// |
| /// This is the only way to create a `Verifier` for Ed25519 or Ed448 keys. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestVerifyInit`]. |
| /// |
| /// [`EVP_DigestVerifyInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestVerifyInit.html |
| </span><span class="kw">pub fn </span>new_without_digest<T>(pkey: <span class="kw-2">&</span><span class="lifetime">'a </span>PKeyRef<T>) -> <span class="prelude-ty">Result</span><Verifier<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPublic, |
| { |
| Verifier::new_intern(<span class="prelude-val">None</span>, pkey) |
| } |
| |
| <span class="kw">fn </span>new_intern<T>( |
| type_: <span class="prelude-ty">Option</span><MessageDigest>, |
| pkey: <span class="kw-2">&</span><span class="lifetime">'a </span>PKeyRef<T>, |
| ) -> <span class="prelude-ty">Result</span><Verifier<<span class="lifetime">'a</span>>, ErrorStack> |
| <span class="kw">where |
| </span>T: HasPublic, |
| { |
| <span class="kw">unsafe </span>{ |
| ffi::init(); |
| |
| <span class="kw">let </span>ctx = cvt_p(EVP_MD_CTX_new())<span class="question-mark">?</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>pctx: <span class="kw-2">*mut </span>ffi::EVP_PKEY_CTX = ptr::null_mut(); |
| <span class="kw">let </span>r = ffi::EVP_DigestVerifyInit( |
| ctx, |
| <span class="kw-2">&mut </span>pctx, |
| type_.map(|t| t.as_ptr()).unwrap_or(ptr::null()), |
| ptr::null_mut(), |
| pkey.as_ptr(), |
| ); |
| <span class="kw">if </span>r != <span class="number">1 </span>{ |
| EVP_MD_CTX_free(ctx); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(ErrorStack::get()); |
| } |
| |
| <span class="macro">assert!</span>(!pctx.is_null()); |
| |
| <span class="prelude-val">Ok</span>(Verifier { |
| md_ctx: ctx, |
| pctx, |
| pkey_pd: PhantomData, |
| }) |
| } |
| } |
| |
| <span class="doccomment">/// Returns the RSA padding mode in use. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to `EVP_PKEY_CTX_get_rsa_padding`. |
| </span><span class="kw">pub fn </span>rsa_padding(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="prelude-ty">Result</span><Padding, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span><span class="kw-2">mut </span>pad = <span class="number">0</span>; |
| cvt(ffi::EVP_PKEY_CTX_get_rsa_padding(<span class="self">self</span>.pctx, <span class="kw-2">&mut </span>pad)) |
| .map(|<span class="kw">_</span>| Padding::from_raw(pad)) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA padding mode. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_padding`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_padding`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_CTX_set_rsa_padding.html |
| </span><span class="kw">pub fn </span>set_rsa_padding(<span class="kw-2">&mut </span><span class="self">self</span>, padding: Padding) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_padding( |
| <span class="self">self</span>.pctx, |
| padding.as_raw(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA PSS salt length. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_pss_saltlen`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_pss_saltlen`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_CTX_set_rsa_pss_saltlen.html |
| </span><span class="kw">pub fn </span>set_rsa_pss_saltlen(<span class="kw-2">&mut </span><span class="self">self</span>, len: RsaPssSaltlen) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_pss_saltlen( |
| <span class="self">self</span>.pctx, |
| len.as_raw(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Sets the RSA MGF1 algorithm. |
| /// |
| /// This is only useful for RSA keys. |
| /// |
| /// This corresponds to [`EVP_PKEY_CTX_set_rsa_mgf1_md`]. |
| /// |
| /// [`EVP_PKEY_CTX_set_rsa_mgf1_md`]: https://www.openssl.org/docs/manmaster/man7/RSA-PSS.html |
| </span><span class="kw">pub fn </span>set_rsa_mgf1_md(<span class="kw-2">&mut </span><span class="self">self</span>, md: MessageDigest) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_PKEY_CTX_set_rsa_mgf1_md( |
| <span class="self">self</span>.pctx, |
| md.as_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Feeds more data into the `Verifier`. |
| /// |
| /// Please note that PureEdDSA (Ed25519 and Ed448 keys) do not support streaming. |
| /// Use [`Verifier::verify_oneshot`] instead. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestUpdate`]. |
| /// |
| /// [`EVP_DigestUpdate`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestInit.html |
| </span><span class="kw">pub fn </span>update(<span class="kw-2">&mut </span><span class="self">self</span>, buf: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><(), ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| cvt(ffi::EVP_DigestUpdate( |
| <span class="self">self</span>.md_ctx, |
| buf.as_ptr() <span class="kw">as </span><span class="kw-2">*const </span><span class="kw">_</span>, |
| buf.len(), |
| )) |
| .map(|<span class="kw">_</span>| ()) |
| } |
| } |
| |
| <span class="doccomment">/// Determines if the data fed into the `Verifier` matches the provided signature. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestVerifyFinal`]. |
| /// |
| /// [`EVP_DigestVerifyFinal`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestVerifyFinal.html |
| </span><span class="kw">pub fn </span>verify(<span class="kw-2">&</span><span class="self">self</span>, signature: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><bool, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span>r = |
| EVP_DigestVerifyFinal(<span class="self">self</span>.md_ctx, signature.as_ptr() <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, signature.len()); |
| <span class="kw">match </span>r { |
| <span class="number">1 </span>=> <span class="prelude-val">Ok</span>(<span class="bool-val">true</span>), |
| <span class="number">0 </span>=> { |
| ErrorStack::get(); <span class="comment">// discard error stack |
| </span><span class="prelude-val">Ok</span>(<span class="bool-val">false</span>) |
| } |
| <span class="kw">_ </span>=> <span class="prelude-val">Err</span>(ErrorStack::get()), |
| } |
| } |
| } |
| |
| <span class="doccomment">/// Determines if the data given in `buf` matches the provided signature. |
| /// |
| /// OpenSSL documentation at [`EVP_DigestVerify`]. |
| /// |
| /// [`EVP_DigestVerify`]: https://www.openssl.org/docs/man1.1.1/man3/EVP_DigestVerify.html |
| </span><span class="attribute">#[cfg(any(ossl111, boringssl, libressl370))] |
| </span><span class="kw">pub fn </span>verify_oneshot(<span class="kw-2">&mut </span><span class="self">self</span>, signature: <span class="kw-2">&</span>[u8], buf: <span class="kw-2">&</span>[u8]) -> <span class="prelude-ty">Result</span><bool, ErrorStack> { |
| <span class="kw">unsafe </span>{ |
| <span class="kw">let </span>r = ffi::EVP_DigestVerify( |
| <span class="self">self</span>.md_ctx, |
| signature.as_ptr() <span class="kw">as </span><span class="kw-2">*const </span><span class="kw">_</span>, |
| signature.len(), |
| buf.as_ptr() <span class="kw">as </span><span class="kw-2">*const </span><span class="kw">_</span>, |
| buf.len(), |
| ); |
| <span class="kw">match </span>r { |
| <span class="number">1 </span>=> <span class="prelude-val">Ok</span>(<span class="bool-val">true</span>), |
| <span class="number">0 </span>=> { |
| ErrorStack::get(); |
| <span class="prelude-val">Ok</span>(<span class="bool-val">false</span>) |
| } |
| <span class="kw">_ </span>=> <span class="prelude-val">Err</span>(ErrorStack::get()), |
| } |
| } |
| } |
| } |
| |
| <span class="kw">impl</span><<span class="lifetime">'a</span>> Write <span class="kw">for </span>Verifier<<span class="lifetime">'a</span>> { |
| <span class="kw">fn </span>write(<span class="kw-2">&mut </span><span class="self">self</span>, buf: <span class="kw-2">&</span>[u8]) -> io::Result<usize> { |
| <span class="self">self</span>.update(buf)<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(buf.len()) |
| } |
| |
| <span class="kw">fn </span>flush(<span class="kw-2">&mut </span><span class="self">self</span>) -> io::Result<()> { |
| <span class="prelude-val">Ok</span>(()) |
| } |
| } |
| |
| <span class="attribute">#[cfg(not(ossl101))] |
| </span><span class="kw">use </span>ffi::EVP_DigestVerifyFinal; |
| |
| <span class="attribute">#[cfg(ossl101)] |
| #[allow(bad_style)] |
| </span><span class="kw">unsafe fn </span>EVP_DigestVerifyFinal( |
| ctx: <span class="kw-2">*mut </span>ffi::EVP_MD_CTX, |
| sigret: <span class="kw-2">*const </span>::libc::c_uchar, |
| siglen: ::libc::size_t, |
| ) -> ::libc::c_int { |
| ffi::EVP_DigestVerifyFinal(ctx, sigret <span class="kw">as </span><span class="kw-2">*mut </span><span class="kw">_</span>, siglen) |
| } |
| |
| <span class="attribute">#[cfg(test)] |
| </span><span class="kw">mod </span>test { |
| <span class="kw">use </span>hex::{<span class="self">self</span>, FromHex}; |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">use </span>std::iter; |
| |
| <span class="kw">use </span><span class="kw">crate</span>::ec::{EcGroup, EcKey}; |
| <span class="kw">use </span><span class="kw">crate</span>::hash::MessageDigest; |
| <span class="kw">use </span><span class="kw">crate</span>::nid::Nid; |
| <span class="kw">use </span><span class="kw">crate</span>::pkey::PKey; |
| <span class="kw">use </span><span class="kw">crate</span>::rsa::{Padding, Rsa}; |
| <span class="attribute">#[cfg(ossl111)] |
| </span><span class="kw">use </span><span class="kw">crate</span>::sign::RsaPssSaltlen; |
| <span class="kw">use </span><span class="kw">crate</span>::sign::{Signer, Verifier}; |
| |
| <span class="kw">const </span>INPUT: <span class="kw-2">&</span>str = |
| <span class="string">"65794a68624763694f694a53557a49314e694a392e65794a7063334d694f694a71623255694c41304b49434a6c\ |
| 654841694f6a457a4d4441344d546b7a4f44417344516f67496d6830644841364c79396c654746746347786c4c\ |
| 6d4e76625339706331397962323930496a7030636e566c6651"</span>; |
| |
| <span class="kw">const </span>SIGNATURE: <span class="kw-2">&</span>str = |
| <span class="string">"702e218943e88fd11eb5d82dbf7845f34106ae1b81fff7731116add1717d83656d420afd3c96eedd73a2663e51\ |
| 66687b000b87226e0187ed1073f945e582adfcef16d85a798ee8c66ddb3db8975b17d09402beedd5d9d9700710\ |
| 8db28160d5f8040ca7445762b81fbe7ff9d92e0ae76f24f25b33bbe6f44ae61eb1040acb20044d3ef9128ed401\ |
| 30795bd4bd3b41eecad066ab651981fde48df77f372dc38b9fafdd3befb18b5da3cc3c2eb02f9e3a41d612caad\ |
| 15911273a05f23b9e838faaf849d698429ef5a1e88798236c3d40e604522a544c8f27a7a2db80663d16cf7caea\ |
| 56de405cb2215a45b2c25566b55ac1a748a070dfc8a32a469543d019eefb47"</span>; |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>rsa_sign() { |
| <span class="kw">let </span>key = <span class="macro">include_bytes!</span>(<span class="string">"../test/rsa.pem"</span>); |
| <span class="kw">let </span>private_key = Rsa::private_key_from_pem(key).unwrap(); |
| <span class="kw">let </span>pkey = PKey::from_rsa(private_key).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new(MessageDigest::sha256(), <span class="kw-2">&</span>pkey).unwrap(); |
| <span class="macro">assert_eq!</span>(signer.rsa_padding().unwrap(), Padding::PKCS1); |
| signer.set_rsa_padding(Padding::PKCS1).unwrap(); |
| signer.update(<span class="kw-2">&</span>Vec::from_hex(INPUT).unwrap()).unwrap(); |
| <span class="kw">let </span>result = signer.sign_to_vec().unwrap(); |
| |
| <span class="macro">assert_eq!</span>(hex::encode(result), SIGNATURE); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>rsa_verify_ok() { |
| <span class="kw">let </span>key = <span class="macro">include_bytes!</span>(<span class="string">"../test/rsa.pem"</span>); |
| <span class="kw">let </span>private_key = Rsa::private_key_from_pem(key).unwrap(); |
| <span class="kw">let </span>pkey = PKey::from_rsa(private_key).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>verifier = Verifier::new(MessageDigest::sha256(), <span class="kw-2">&</span>pkey).unwrap(); |
| <span class="macro">assert_eq!</span>(verifier.rsa_padding().unwrap(), Padding::PKCS1); |
| verifier.update(<span class="kw-2">&</span>Vec::from_hex(INPUT).unwrap()).unwrap(); |
| <span class="macro">assert!</span>(verifier.verify(<span class="kw-2">&</span>Vec::from_hex(SIGNATURE).unwrap()).unwrap()); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>rsa_verify_invalid() { |
| <span class="kw">let </span>key = <span class="macro">include_bytes!</span>(<span class="string">"../test/rsa.pem"</span>); |
| <span class="kw">let </span>private_key = Rsa::private_key_from_pem(key).unwrap(); |
| <span class="kw">let </span>pkey = PKey::from_rsa(private_key).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>verifier = Verifier::new(MessageDigest::sha256(), <span class="kw-2">&</span>pkey).unwrap(); |
| verifier.update(<span class="kw-2">&</span>Vec::from_hex(INPUT).unwrap()).unwrap(); |
| verifier.update(<span class="string">b"foobar"</span>).unwrap(); |
| <span class="macro">assert!</span>(!verifier.verify(<span class="kw-2">&</span>Vec::from_hex(SIGNATURE).unwrap()).unwrap()); |
| } |
| |
| <span class="attribute">#[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>test_hmac(ty: MessageDigest, tests: <span class="kw-2">&</span>[(Vec<u8>, Vec<u8>, Vec<u8>)]) { |
| <span class="kw">for </span>(key, data, res) <span class="kw">in </span>tests.iter() { |
| <span class="kw">let </span>pkey = PKey::hmac(key).unwrap(); |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new(ty, <span class="kw-2">&</span>pkey).unwrap(); |
| signer.update(data).unwrap(); |
| <span class="macro">assert_eq!</span>(signer.sign_to_vec().unwrap(), <span class="kw-2">*</span>res); |
| } |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>hmac_md5() { |
| <span class="comment">// test vectors from RFC 2202 |
| </span><span class="kw">let </span>tests: [(Vec<u8>, Vec<u8>, Vec<u8>); <span class="number">7</span>] = [ |
| ( |
| iter::repeat(<span class="number">0x0b_u8</span>).take(<span class="number">16</span>).collect(), |
| <span class="string">b"Hi There"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"9294727a3638bb1c13f48ef8158bfc9d"</span>).unwrap(), |
| ), |
| ( |
| <span class="string">b"Jefe"</span>.to_vec(), |
| <span class="string">b"what do ya want for nothing?"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"750c783e6ab0b503eaa86e310a5db738"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">16</span>).collect(), |
| iter::repeat(<span class="number">0xdd_u8</span>).take(<span class="number">50</span>).collect(), |
| Vec::from_hex(<span class="string">"56be34521d144c88dbb8c733f0e8b3f6"</span>).unwrap(), |
| ), |
| ( |
| Vec::from_hex(<span class="string">"0102030405060708090a0b0c0d0e0f10111213141516171819"</span>).unwrap(), |
| iter::repeat(<span class="number">0xcd_u8</span>).take(<span class="number">50</span>).collect(), |
| Vec::from_hex(<span class="string">"697eaf0aca3a3aea3a75164746ffaa79"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0x0c_u8</span>).take(<span class="number">16</span>).collect(), |
| <span class="string">b"Test With Truncation"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"56461ef2342edc00f9bab995690efd4c"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">80</span>).collect(), |
| <span class="string">b"Test Using Larger Than Block-Size Key - Hash Key First"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">80</span>).collect(), |
| <span class="string">b"Test Using Larger Than Block-Size Key \ |
| and Larger Than One Block-Size Data" |
| </span>.to_vec(), |
| Vec::from_hex(<span class="string">"6f630fad67cda0ee1fb1f562db3aa53e"</span>).unwrap(), |
| ), |
| ]; |
| |
| test_hmac(MessageDigest::md5(), <span class="kw-2">&</span>tests); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(not(boringssl))] |
| </span><span class="kw">fn </span>hmac_sha1() { |
| <span class="comment">// test vectors from RFC 2202 |
| </span><span class="kw">let </span>tests: [(Vec<u8>, Vec<u8>, Vec<u8>); <span class="number">7</span>] = [ |
| ( |
| iter::repeat(<span class="number">0x0b_u8</span>).take(<span class="number">20</span>).collect(), |
| <span class="string">b"Hi There"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"b617318655057264e28bc0b6fb378c8ef146be00"</span>).unwrap(), |
| ), |
| ( |
| <span class="string">b"Jefe"</span>.to_vec(), |
| <span class="string">b"what do ya want for nothing?"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"effcdf6ae5eb2fa2d27416d5f184df9c259a7c79"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">20</span>).collect(), |
| iter::repeat(<span class="number">0xdd_u8</span>).take(<span class="number">50</span>).collect(), |
| Vec::from_hex(<span class="string">"125d7342b9ac11cd91a39af48aa17b4f63f175d3"</span>).unwrap(), |
| ), |
| ( |
| Vec::from_hex(<span class="string">"0102030405060708090a0b0c0d0e0f10111213141516171819"</span>).unwrap(), |
| iter::repeat(<span class="number">0xcd_u8</span>).take(<span class="number">50</span>).collect(), |
| Vec::from_hex(<span class="string">"4c9007f4026250c6bc8414f9bf50c86c2d7235da"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0x0c_u8</span>).take(<span class="number">20</span>).collect(), |
| <span class="string">b"Test With Truncation"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"4c1a03424b55e07fe7f27be1d58bb9324a9a5a04"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">80</span>).collect(), |
| <span class="string">b"Test Using Larger Than Block-Size Key - Hash Key First"</span>.to_vec(), |
| Vec::from_hex(<span class="string">"aa4ae5e15272d00e95705637ce8a3b55ed402112"</span>).unwrap(), |
| ), |
| ( |
| iter::repeat(<span class="number">0xaa_u8</span>).take(<span class="number">80</span>).collect(), |
| <span class="string">b"Test Using Larger Than Block-Size Key \ |
| and Larger Than One Block-Size Data" |
| </span>.to_vec(), |
| Vec::from_hex(<span class="string">"e8e99d0f45237d786d6bbaa7965c7808bbff1a91"</span>).unwrap(), |
| ), |
| ]; |
| |
| test_hmac(MessageDigest::sha1(), <span class="kw-2">&</span>tests); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(ossl110)] |
| </span><span class="kw">fn </span>test_cmac() { |
| <span class="kw">let </span>cipher = <span class="kw">crate</span>::symm::Cipher::aes_128_cbc(); |
| <span class="kw">let </span>key = Vec::from_hex(<span class="string">"9294727a3638bb1c13f48ef8158bfc9d"</span>).unwrap(); |
| <span class="kw">let </span>pkey = PKey::cmac(<span class="kw-2">&</span>cipher, <span class="kw-2">&</span>key).unwrap(); |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new_without_digest(<span class="kw-2">&</span>pkey).unwrap(); |
| |
| <span class="kw">let </span>data = <span class="string">b"Hi There"</span>; |
| signer.update(data <span class="kw">as </span><span class="kw-2">&</span>[u8]).unwrap(); |
| |
| <span class="kw">let </span>expected = <span class="macro">vec!</span>[ |
| <span class="number">136</span>, <span class="number">101</span>, <span class="number">61</span>, <span class="number">167</span>, <span class="number">61</span>, <span class="number">30</span>, <span class="number">248</span>, <span class="number">234</span>, <span class="number">124</span>, <span class="number">166</span>, <span class="number">196</span>, <span class="number">157</span>, <span class="number">203</span>, <span class="number">52</span>, <span class="number">171</span>, <span class="number">19</span>, |
| ]; |
| <span class="macro">assert_eq!</span>(signer.sign_to_vec().unwrap(), expected); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>ec() { |
| <span class="kw">let </span>group = EcGroup::from_curve_name(Nid::X9_62_PRIME256V1).unwrap(); |
| <span class="kw">let </span>key = EcKey::generate(<span class="kw-2">&</span>group).unwrap(); |
| <span class="kw">let </span>key = PKey::from_ec_key(key).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new(MessageDigest::sha256(), <span class="kw-2">&</span>key).unwrap(); |
| signer.update(<span class="string">b"hello world"</span>).unwrap(); |
| <span class="kw">let </span>signature = signer.sign_to_vec().unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>verifier = Verifier::new(MessageDigest::sha256(), <span class="kw-2">&</span>key).unwrap(); |
| verifier.update(<span class="string">b"hello world"</span>).unwrap(); |
| <span class="macro">assert!</span>(verifier.verify(<span class="kw-2">&</span>signature).unwrap()); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(any(ossl111, boringssl, libressl370))] |
| </span><span class="kw">fn </span>eddsa() { |
| <span class="kw">let </span>key = PKey::generate_ed25519().unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new_without_digest(<span class="kw-2">&</span>key).unwrap(); |
| <span class="kw">let </span>signature = signer.sign_oneshot_to_vec(<span class="string">b"hello world"</span>).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>verifier = Verifier::new_without_digest(<span class="kw-2">&</span>key).unwrap(); |
| <span class="macro">assert!</span>(verifier.verify_oneshot(<span class="kw-2">&</span>signature, <span class="string">b"hello world"</span>).unwrap()); |
| } |
| |
| <span class="attribute">#[test] |
| #[cfg(ossl111)] |
| </span><span class="kw">fn </span>rsa_sign_verify() { |
| <span class="kw">let </span>key = <span class="macro">include_bytes!</span>(<span class="string">"../test/rsa.pem"</span>); |
| <span class="kw">let </span>private_key = Rsa::private_key_from_pem(key).unwrap(); |
| <span class="kw">let </span>pkey = PKey::from_rsa(private_key).unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>signer = Signer::new(MessageDigest::sha256(), <span class="kw-2">&</span>pkey).unwrap(); |
| signer.set_rsa_padding(Padding::PKCS1_PSS).unwrap(); |
| <span class="macro">assert_eq!</span>(signer.rsa_padding().unwrap(), Padding::PKCS1_PSS); |
| signer |
| .set_rsa_pss_saltlen(RsaPssSaltlen::DIGEST_LENGTH) |
| .unwrap(); |
| signer.set_rsa_mgf1_md(MessageDigest::sha256()).unwrap(); |
| signer.update(<span class="kw-2">&</span>Vec::from_hex(INPUT).unwrap()).unwrap(); |
| <span class="kw">let </span>signature = signer.sign_to_vec().unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>verifier = Verifier::new(MessageDigest::sha256(), <span class="kw-2">&</span>pkey).unwrap(); |
| verifier.set_rsa_padding(Padding::PKCS1_PSS).unwrap(); |
| verifier |
| .set_rsa_pss_saltlen(RsaPssSaltlen::DIGEST_LENGTH) |
| .unwrap(); |
| verifier.set_rsa_mgf1_md(MessageDigest::sha256()).unwrap(); |
| verifier.update(<span class="kw-2">&</span>Vec::from_hex(INPUT).unwrap()).unwrap(); |
| <span class="macro">assert!</span>(verifier.verify(<span class="kw-2">&</span>signature).unwrap()); |
| } |
| } |
| </code></pre></div> |
| </section></div></main><div id="rustdoc-vars" data-root-path="../../" data-current-crate="openssl" data-themes="ayu,dark,light" data-resource-suffix="" data-rustdoc-version="1.66.0-nightly (5c8bff74b 2022-10-21)" ></div></body></html> |