| <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><meta name="generator" content="rustdoc"><meta name="description" content="Source of the Rust file `/root/.cargo/git/checkouts/incubator-teaclave-crates-c8106113f74feefc/ede1f68/ring/src/ec/suite_b/ecdsa/signing.rs`."><meta name="keywords" content="rust, rustlang, rust-lang"><title>signing.rs - source</title><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../SourceSerif4-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../FiraSans-Regular.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../FiraSans-Medium.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../SourceCodePro-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../SourceSerif4-Bold.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../../../SourceCodePro-Semibold.ttf.woff2"><link rel="stylesheet" href="../../../../../normalize.css"><link rel="stylesheet" href="../../../../../rustdoc.css" id="mainThemeStyle"><link rel="stylesheet" href="../../../../../ayu.css" disabled><link rel="stylesheet" href="../../../../../dark.css" disabled><link rel="stylesheet" href="../../../../../light.css" id="themeStyle"><script id="default-settings" ></script><script src="../../../../../storage.js"></script><script defer src="../../../../../source-script.js"></script><script defer src="../../../../../source-files.js"></script><script defer src="../../../../../main.js"></script><noscript><link rel="stylesheet" href="../../../../../noscript.css"></noscript><link rel="alternate icon" type="image/png" href="../../../../../favicon-16x16.png"><link rel="alternate icon" type="image/png" href="../../../../../favicon-32x32.png"><link rel="icon" type="image/svg+xml" href="../../../../../favicon.svg"></head><body class="rustdoc source"><!--[if lte IE 11]><div class="warning">This old browser is unsupported and will most likely display funky things.</div><![endif]--><nav class="sidebar"><a class="sidebar-logo" href="../../../../../ring/index.html"><div class="logo-container"><img class="rust-logo" src="../../../../../rust-logo.svg" alt="logo"></div></a></nav><main><div class="width-limiter"><nav class="sub"><a class="sub-logo-container" href="../../../../../ring/index.html"><img class="rust-logo" src="../../../../../rust-logo.svg" alt="logo"></a><form class="search-form"><div class="search-container"><span></span><input class="search-input" name="search" autocomplete="off" spellcheck="false" placeholder="Click or press ‘S’ to search, ‘?’ for more options…" type="search"><div id="help-button" title="help" tabindex="-1"><a href="../../../../../help.html">?</a></div><div id="settings-menu" tabindex="-1"><a href="../../../../../settings.html" title="settings"><img width="22" height="22" alt="Change settings" src="../../../../../wheel.svg"></a></div></div></form></nav><section id="main-content" class="content"><div class="example-wrap"><pre class="src-line-numbers"><span id="1">1</span> |
| <span id="2">2</span> |
| <span id="3">3</span> |
| <span id="4">4</span> |
| <span id="5">5</span> |
| <span id="6">6</span> |
| <span id="7">7</span> |
| <span id="8">8</span> |
| <span id="9">9</span> |
| <span id="10">10</span> |
| <span id="11">11</span> |
| <span id="12">12</span> |
| <span id="13">13</span> |
| <span id="14">14</span> |
| <span id="15">15</span> |
| <span id="16">16</span> |
| <span id="17">17</span> |
| <span id="18">18</span> |
| <span id="19">19</span> |
| <span id="20">20</span> |
| <span id="21">21</span> |
| <span id="22">22</span> |
| <span id="23">23</span> |
| <span id="24">24</span> |
| <span id="25">25</span> |
| <span id="26">26</span> |
| <span id="27">27</span> |
| <span id="28">28</span> |
| <span id="29">29</span> |
| <span id="30">30</span> |
| <span id="31">31</span> |
| <span id="32">32</span> |
| <span id="33">33</span> |
| <span id="34">34</span> |
| <span id="35">35</span> |
| <span id="36">36</span> |
| <span id="37">37</span> |
| <span id="38">38</span> |
| <span id="39">39</span> |
| <span id="40">40</span> |
| <span id="41">41</span> |
| <span id="42">42</span> |
| <span id="43">43</span> |
| <span id="44">44</span> |
| <span id="45">45</span> |
| <span id="46">46</span> |
| <span id="47">47</span> |
| <span id="48">48</span> |
| <span id="49">49</span> |
| <span id="50">50</span> |
| <span id="51">51</span> |
| <span id="52">52</span> |
| <span id="53">53</span> |
| <span id="54">54</span> |
| <span id="55">55</span> |
| <span id="56">56</span> |
| <span id="57">57</span> |
| <span id="58">58</span> |
| <span id="59">59</span> |
| <span id="60">60</span> |
| <span id="61">61</span> |
| <span id="62">62</span> |
| <span id="63">63</span> |
| <span id="64">64</span> |
| <span id="65">65</span> |
| <span id="66">66</span> |
| <span id="67">67</span> |
| <span id="68">68</span> |
| <span id="69">69</span> |
| <span id="70">70</span> |
| <span id="71">71</span> |
| <span id="72">72</span> |
| <span id="73">73</span> |
| <span id="74">74</span> |
| <span id="75">75</span> |
| <span id="76">76</span> |
| <span id="77">77</span> |
| <span id="78">78</span> |
| <span id="79">79</span> |
| <span id="80">80</span> |
| <span id="81">81</span> |
| <span id="82">82</span> |
| <span id="83">83</span> |
| <span id="84">84</span> |
| <span id="85">85</span> |
| <span id="86">86</span> |
| <span id="87">87</span> |
| <span id="88">88</span> |
| <span id="89">89</span> |
| <span id="90">90</span> |
| <span id="91">91</span> |
| <span id="92">92</span> |
| <span id="93">93</span> |
| <span id="94">94</span> |
| <span id="95">95</span> |
| <span id="96">96</span> |
| <span id="97">97</span> |
| <span id="98">98</span> |
| <span id="99">99</span> |
| <span id="100">100</span> |
| <span id="101">101</span> |
| <span id="102">102</span> |
| <span id="103">103</span> |
| <span id="104">104</span> |
| <span id="105">105</span> |
| <span id="106">106</span> |
| <span id="107">107</span> |
| <span id="108">108</span> |
| <span id="109">109</span> |
| <span id="110">110</span> |
| <span id="111">111</span> |
| <span id="112">112</span> |
| <span id="113">113</span> |
| <span id="114">114</span> |
| <span id="115">115</span> |
| <span id="116">116</span> |
| <span id="117">117</span> |
| <span id="118">118</span> |
| <span id="119">119</span> |
| <span id="120">120</span> |
| <span id="121">121</span> |
| <span id="122">122</span> |
| <span id="123">123</span> |
| <span id="124">124</span> |
| <span id="125">125</span> |
| <span id="126">126</span> |
| <span id="127">127</span> |
| <span id="128">128</span> |
| <span id="129">129</span> |
| <span id="130">130</span> |
| <span id="131">131</span> |
| <span id="132">132</span> |
| <span id="133">133</span> |
| <span id="134">134</span> |
| <span id="135">135</span> |
| <span id="136">136</span> |
| <span id="137">137</span> |
| <span id="138">138</span> |
| <span id="139">139</span> |
| <span id="140">140</span> |
| <span id="141">141</span> |
| <span id="142">142</span> |
| <span id="143">143</span> |
| <span id="144">144</span> |
| <span id="145">145</span> |
| <span id="146">146</span> |
| <span id="147">147</span> |
| <span id="148">148</span> |
| <span id="149">149</span> |
| <span id="150">150</span> |
| <span id="151">151</span> |
| <span id="152">152</span> |
| <span id="153">153</span> |
| <span id="154">154</span> |
| <span id="155">155</span> |
| <span id="156">156</span> |
| <span id="157">157</span> |
| <span id="158">158</span> |
| <span id="159">159</span> |
| <span id="160">160</span> |
| <span id="161">161</span> |
| <span id="162">162</span> |
| <span id="163">163</span> |
| <span id="164">164</span> |
| <span id="165">165</span> |
| <span id="166">166</span> |
| <span id="167">167</span> |
| <span id="168">168</span> |
| <span id="169">169</span> |
| <span id="170">170</span> |
| <span id="171">171</span> |
| <span id="172">172</span> |
| <span id="173">173</span> |
| <span id="174">174</span> |
| <span id="175">175</span> |
| <span id="176">176</span> |
| <span id="177">177</span> |
| <span id="178">178</span> |
| <span id="179">179</span> |
| <span id="180">180</span> |
| <span id="181">181</span> |
| <span id="182">182</span> |
| <span id="183">183</span> |
| <span id="184">184</span> |
| <span id="185">185</span> |
| <span id="186">186</span> |
| <span id="187">187</span> |
| <span id="188">188</span> |
| <span id="189">189</span> |
| <span id="190">190</span> |
| <span id="191">191</span> |
| <span id="192">192</span> |
| <span id="193">193</span> |
| <span id="194">194</span> |
| <span id="195">195</span> |
| <span id="196">196</span> |
| <span id="197">197</span> |
| <span id="198">198</span> |
| <span id="199">199</span> |
| <span id="200">200</span> |
| <span id="201">201</span> |
| <span id="202">202</span> |
| <span id="203">203</span> |
| <span id="204">204</span> |
| <span id="205">205</span> |
| <span id="206">206</span> |
| <span id="207">207</span> |
| <span id="208">208</span> |
| <span id="209">209</span> |
| <span id="210">210</span> |
| <span id="211">211</span> |
| <span id="212">212</span> |
| <span id="213">213</span> |
| <span id="214">214</span> |
| <span id="215">215</span> |
| <span id="216">216</span> |
| <span id="217">217</span> |
| <span id="218">218</span> |
| <span id="219">219</span> |
| <span id="220">220</span> |
| <span id="221">221</span> |
| <span id="222">222</span> |
| <span id="223">223</span> |
| <span id="224">224</span> |
| <span id="225">225</span> |
| <span id="226">226</span> |
| <span id="227">227</span> |
| <span id="228">228</span> |
| <span id="229">229</span> |
| <span id="230">230</span> |
| <span id="231">231</span> |
| <span id="232">232</span> |
| <span id="233">233</span> |
| <span id="234">234</span> |
| <span id="235">235</span> |
| <span id="236">236</span> |
| <span id="237">237</span> |
| <span id="238">238</span> |
| <span id="239">239</span> |
| <span id="240">240</span> |
| <span id="241">241</span> |
| <span id="242">242</span> |
| <span id="243">243</span> |
| <span id="244">244</span> |
| <span id="245">245</span> |
| <span id="246">246</span> |
| <span id="247">247</span> |
| <span id="248">248</span> |
| <span id="249">249</span> |
| <span id="250">250</span> |
| <span id="251">251</span> |
| <span id="252">252</span> |
| <span id="253">253</span> |
| <span id="254">254</span> |
| <span id="255">255</span> |
| <span id="256">256</span> |
| <span id="257">257</span> |
| <span id="258">258</span> |
| <span id="259">259</span> |
| <span id="260">260</span> |
| <span id="261">261</span> |
| <span id="262">262</span> |
| <span id="263">263</span> |
| <span id="264">264</span> |
| <span id="265">265</span> |
| <span id="266">266</span> |
| <span id="267">267</span> |
| <span id="268">268</span> |
| <span id="269">269</span> |
| <span id="270">270</span> |
| <span id="271">271</span> |
| <span id="272">272</span> |
| <span id="273">273</span> |
| <span id="274">274</span> |
| <span id="275">275</span> |
| <span id="276">276</span> |
| <span id="277">277</span> |
| <span id="278">278</span> |
| <span id="279">279</span> |
| <span id="280">280</span> |
| <span id="281">281</span> |
| <span id="282">282</span> |
| <span id="283">283</span> |
| <span id="284">284</span> |
| <span id="285">285</span> |
| <span id="286">286</span> |
| <span id="287">287</span> |
| <span id="288">288</span> |
| <span id="289">289</span> |
| <span id="290">290</span> |
| <span id="291">291</span> |
| <span id="292">292</span> |
| <span id="293">293</span> |
| <span id="294">294</span> |
| <span id="295">295</span> |
| <span id="296">296</span> |
| <span id="297">297</span> |
| <span id="298">298</span> |
| <span id="299">299</span> |
| <span id="300">300</span> |
| <span id="301">301</span> |
| <span id="302">302</span> |
| <span id="303">303</span> |
| <span id="304">304</span> |
| <span id="305">305</span> |
| <span id="306">306</span> |
| <span id="307">307</span> |
| <span id="308">308</span> |
| <span id="309">309</span> |
| <span id="310">310</span> |
| <span id="311">311</span> |
| <span id="312">312</span> |
| <span id="313">313</span> |
| <span id="314">314</span> |
| <span id="315">315</span> |
| <span id="316">316</span> |
| <span id="317">317</span> |
| <span id="318">318</span> |
| <span id="319">319</span> |
| <span id="320">320</span> |
| <span id="321">321</span> |
| <span id="322">322</span> |
| <span id="323">323</span> |
| <span id="324">324</span> |
| <span id="325">325</span> |
| <span id="326">326</span> |
| <span id="327">327</span> |
| <span id="328">328</span> |
| <span id="329">329</span> |
| <span id="330">330</span> |
| <span id="331">331</span> |
| <span id="332">332</span> |
| <span id="333">333</span> |
| <span id="334">334</span> |
| <span id="335">335</span> |
| <span id="336">336</span> |
| <span id="337">337</span> |
| <span id="338">338</span> |
| <span id="339">339</span> |
| <span id="340">340</span> |
| <span id="341">341</span> |
| <span id="342">342</span> |
| <span id="343">343</span> |
| <span id="344">344</span> |
| <span id="345">345</span> |
| <span id="346">346</span> |
| <span id="347">347</span> |
| <span id="348">348</span> |
| <span id="349">349</span> |
| <span id="350">350</span> |
| <span id="351">351</span> |
| <span id="352">352</span> |
| <span id="353">353</span> |
| <span id="354">354</span> |
| <span id="355">355</span> |
| <span id="356">356</span> |
| <span id="357">357</span> |
| <span id="358">358</span> |
| <span id="359">359</span> |
| <span id="360">360</span> |
| <span id="361">361</span> |
| <span id="362">362</span> |
| <span id="363">363</span> |
| <span id="364">364</span> |
| <span id="365">365</span> |
| <span id="366">366</span> |
| <span id="367">367</span> |
| <span id="368">368</span> |
| <span id="369">369</span> |
| <span id="370">370</span> |
| <span id="371">371</span> |
| <span id="372">372</span> |
| <span id="373">373</span> |
| <span id="374">374</span> |
| <span id="375">375</span> |
| <span id="376">376</span> |
| <span id="377">377</span> |
| <span id="378">378</span> |
| <span id="379">379</span> |
| <span id="380">380</span> |
| <span id="381">381</span> |
| <span id="382">382</span> |
| <span id="383">383</span> |
| <span id="384">384</span> |
| <span id="385">385</span> |
| <span id="386">386</span> |
| <span id="387">387</span> |
| <span id="388">388</span> |
| <span id="389">389</span> |
| <span id="390">390</span> |
| <span id="391">391</span> |
| <span id="392">392</span> |
| <span id="393">393</span> |
| <span id="394">394</span> |
| <span id="395">395</span> |
| <span id="396">396</span> |
| <span id="397">397</span> |
| <span id="398">398</span> |
| <span id="399">399</span> |
| <span id="400">400</span> |
| <span id="401">401</span> |
| <span id="402">402</span> |
| <span id="403">403</span> |
| <span id="404">404</span> |
| <span id="405">405</span> |
| <span id="406">406</span> |
| <span id="407">407</span> |
| <span id="408">408</span> |
| <span id="409">409</span> |
| <span id="410">410</span> |
| <span id="411">411</span> |
| <span id="412">412</span> |
| <span id="413">413</span> |
| <span id="414">414</span> |
| <span id="415">415</span> |
| <span id="416">416</span> |
| <span id="417">417</span> |
| <span id="418">418</span> |
| <span id="419">419</span> |
| <span id="420">420</span> |
| <span id="421">421</span> |
| <span id="422">422</span> |
| <span id="423">423</span> |
| <span id="424">424</span> |
| <span id="425">425</span> |
| <span id="426">426</span> |
| <span id="427">427</span> |
| <span id="428">428</span> |
| <span id="429">429</span> |
| <span id="430">430</span> |
| <span id="431">431</span> |
| <span id="432">432</span> |
| <span id="433">433</span> |
| <span id="434">434</span> |
| <span id="435">435</span> |
| <span id="436">436</span> |
| <span id="437">437</span> |
| <span id="438">438</span> |
| <span id="439">439</span> |
| <span id="440">440</span> |
| <span id="441">441</span> |
| <span id="442">442</span> |
| <span id="443">443</span> |
| <span id="444">444</span> |
| <span id="445">445</span> |
| <span id="446">446</span> |
| <span id="447">447</span> |
| <span id="448">448</span> |
| <span id="449">449</span> |
| <span id="450">450</span> |
| <span id="451">451</span> |
| <span id="452">452</span> |
| <span id="453">453</span> |
| <span id="454">454</span> |
| <span id="455">455</span> |
| <span id="456">456</span> |
| <span id="457">457</span> |
| <span id="458">458</span> |
| <span id="459">459</span> |
| <span id="460">460</span> |
| <span id="461">461</span> |
| <span id="462">462</span> |
| <span id="463">463</span> |
| <span id="464">464</span> |
| <span id="465">465</span> |
| <span id="466">466</span> |
| <span id="467">467</span> |
| <span id="468">468</span> |
| <span id="469">469</span> |
| <span id="470">470</span> |
| <span id="471">471</span> |
| <span id="472">472</span> |
| <span id="473">473</span> |
| <span id="474">474</span> |
| <span id="475">475</span> |
| <span id="476">476</span> |
| <span id="477">477</span> |
| <span id="478">478</span> |
| <span id="479">479</span> |
| <span id="480">480</span> |
| <span id="481">481</span> |
| <span id="482">482</span> |
| <span id="483">483</span> |
| <span id="484">484</span> |
| <span id="485">485</span> |
| <span id="486">486</span> |
| <span id="487">487</span> |
| <span id="488">488</span> |
| <span id="489">489</span> |
| <span id="490">490</span> |
| <span id="491">491</span> |
| <span id="492">492</span> |
| <span id="493">493</span> |
| <span id="494">494</span> |
| <span id="495">495</span> |
| <span id="496">496</span> |
| <span id="497">497</span> |
| <span id="498">498</span> |
| <span id="499">499</span> |
| <span id="500">500</span> |
| <span id="501">501</span> |
| <span id="502">502</span> |
| <span id="503">503</span> |
| <span id="504">504</span> |
| <span id="505">505</span> |
| <span id="506">506</span> |
| <span id="507">507</span> |
| <span id="508">508</span> |
| <span id="509">509</span> |
| <span id="510">510</span> |
| <span id="511">511</span> |
| <span id="512">512</span> |
| <span id="513">513</span> |
| <span id="514">514</span> |
| <span id="515">515</span> |
| <span id="516">516</span> |
| <span id="517">517</span> |
| <span id="518">518</span> |
| <span id="519">519</span> |
| <span id="520">520</span> |
| <span id="521">521</span> |
| <span id="522">522</span> |
| <span id="523">523</span> |
| <span id="524">524</span> |
| <span id="525">525</span> |
| <span id="526">526</span> |
| <span id="527">527</span> |
| <span id="528">528</span> |
| <span id="529">529</span> |
| <span id="530">530</span> |
| <span id="531">531</span> |
| <span id="532">532</span> |
| <span id="533">533</span> |
| <span id="534">534</span> |
| <span id="535">535</span> |
| <span id="536">536</span> |
| <span id="537">537</span> |
| <span id="538">538</span> |
| <span id="539">539</span> |
| <span id="540">540</span> |
| <span id="541">541</span> |
| <span id="542">542</span> |
| <span id="543">543</span> |
| <span id="544">544</span> |
| <span id="545">545</span> |
| <span id="546">546</span> |
| <span id="547">547</span> |
| <span id="548">548</span> |
| <span id="549">549</span> |
| <span id="550">550</span> |
| <span id="551">551</span> |
| <span id="552">552</span> |
| <span id="553">553</span> |
| <span id="554">554</span> |
| <span id="555">555</span> |
| <span id="556">556</span> |
| <span id="557">557</span> |
| <span id="558">558</span> |
| <span id="559">559</span> |
| <span id="560">560</span> |
| <span id="561">561</span> |
| <span id="562">562</span> |
| <span id="563">563</span> |
| <span id="564">564</span> |
| <span id="565">565</span> |
| <span id="566">566</span> |
| <span id="567">567</span> |
| <span id="568">568</span> |
| <span id="569">569</span> |
| <span id="570">570</span> |
| <span id="571">571</span> |
| <span id="572">572</span> |
| <span id="573">573</span> |
| <span id="574">574</span> |
| <span id="575">575</span> |
| <span id="576">576</span> |
| <span id="577">577</span> |
| <span id="578">578</span> |
| <span id="579">579</span> |
| <span id="580">580</span> |
| <span id="581">581</span> |
| <span id="582">582</span> |
| <span id="583">583</span> |
| <span id="584">584</span> |
| <span id="585">585</span> |
| <span id="586">586</span> |
| <span id="587">587</span> |
| <span id="588">588</span> |
| <span id="589">589</span> |
| <span id="590">590</span> |
| <span id="591">591</span> |
| <span id="592">592</span> |
| <span id="593">593</span> |
| <span id="594">594</span> |
| <span id="595">595</span> |
| <span id="596">596</span> |
| <span id="597">597</span> |
| </pre><pre class="rust"><code><span class="comment">// Copyright 2015-2016 Brian Smith. |
| // |
| // Permission to use, copy, modify, and/or distribute this software for any |
| // purpose with or without fee is hereby granted, provided that the above |
| // copyright notice and this permission notice appear in all copies. |
| // |
| // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES |
| // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY |
| // SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| |
| </span><span class="doccomment">//! ECDSA Signatures using the P-256 and P-384 curves. |
| |
| </span><span class="kw">use </span><span class="kw">super</span>::digest_scalar::digest_scalar; |
| <span class="kw">use crate</span>::{ |
| arithmetic::montgomery::<span class="kw-2">*</span>, |
| cpu, digest, |
| ec::{ |
| <span class="self">self</span>, |
| suite_b::{ops::<span class="kw-2">*</span>, private_key}, |
| }, |
| error, |
| io::der, |
| limb, pkcs8, rand, sealed, signature, |
| }; |
| <span class="doccomment">/// An ECDSA signing algorithm. |
| </span><span class="kw">pub struct </span>EcdsaSigningAlgorithm { |
| curve: <span class="kw-2">&</span><span class="lifetime">'static </span>ec::Curve, |
| private_scalar_ops: <span class="kw-2">&</span><span class="lifetime">'static </span>PrivateScalarOps, |
| private_key_ops: <span class="kw-2">&</span><span class="lifetime">'static </span>PrivateKeyOps, |
| digest_alg: <span class="kw-2">&</span><span class="lifetime">'static </span>digest::Algorithm, |
| pkcs8_template: <span class="kw-2">&</span><span class="lifetime">'static </span>pkcs8::Template, |
| format_rs: <span class="kw">fn</span>(ops: <span class="kw-2">&</span><span class="lifetime">'static </span>ScalarOps, r: <span class="kw-2">&</span>Scalar, s: <span class="kw-2">&</span>Scalar, out: <span class="kw-2">&mut </span>[u8]) -> usize, |
| id: AlgorithmID, |
| } |
| |
| <span class="attribute">#[derive(Debug, Eq, PartialEq)] |
| </span><span class="kw">enum </span>AlgorithmID { |
| ECDSA_P256_SHA256_FIXED_SIGNING, |
| ECDSA_P384_SHA384_FIXED_SIGNING, |
| ECDSA_P256_SHA256_ASN1_SIGNING, |
| ECDSA_P384_SHA384_ASN1_SIGNING, |
| } |
| |
| <span class="macro">derive_debug_via_id!</span>(EcdsaSigningAlgorithm); |
| |
| <span class="kw">impl </span>PartialEq <span class="kw">for </span>EcdsaSigningAlgorithm { |
| <span class="kw">fn </span>eq(<span class="kw-2">&</span><span class="self">self</span>, other: <span class="kw-2">&</span><span class="self">Self</span>) -> bool { |
| <span class="self">self</span>.id == other.id |
| } |
| } |
| |
| <span class="kw">impl </span>Eq <span class="kw">for </span>EcdsaSigningAlgorithm {} |
| |
| <span class="kw">impl </span>sealed::Sealed <span class="kw">for </span>EcdsaSigningAlgorithm {} |
| |
| <span class="doccomment">/// An ECDSA key pair, used for signing. |
| </span><span class="kw">pub struct </span>EcdsaKeyPair { |
| d: Scalar<R>, |
| nonce_key: NonceRandomKey, |
| alg: <span class="kw-2">&</span><span class="lifetime">'static </span>EcdsaSigningAlgorithm, |
| public_key: PublicKey, |
| } |
| |
| <span class="macro">derive_debug_via_field!</span>(EcdsaKeyPair, <span class="macro">stringify!</span>(EcdsaKeyPair), public_key); |
| |
| <span class="kw">impl </span>EcdsaKeyPair { |
| <span class="doccomment">/// Generates a new key pair and returns the key pair serialized as a |
| /// PKCS#8 document. |
| /// |
| /// The PKCS#8 document will be a v1 `OneAsymmetricKey` with the public key |
| /// included in the `ECPrivateKey` structure, as described in |
| /// [RFC 5958 Section 2] and [RFC 5915]. The `ECPrivateKey` structure will |
| /// not have a `parameters` field so the generated key is compatible with |
| /// PKCS#11. |
| /// |
| /// [RFC 5915]: https://tools.ietf.org/html/rfc5915 |
| /// [RFC 5958 Section 2]: https://tools.ietf.org/html/rfc5958#section-2 |
| </span><span class="kw">pub fn </span>generate_pkcs8( |
| alg: <span class="kw-2">&</span><span class="lifetime">'static </span>EcdsaSigningAlgorithm, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| ) -> <span class="prelude-ty">Result</span><pkcs8::Document, error::Unspecified> { |
| <span class="kw">let </span>private_key = ec::Seed::generate(alg.curve, rng, cpu::features())<span class="question-mark">?</span>; |
| <span class="kw">let </span>public_key = private_key.compute_public_key()<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(pkcs8::wrap_key( |
| <span class="kw-2">&</span>alg.pkcs8_template, |
| private_key.bytes_less_safe(), |
| public_key.as_ref(), |
| )) |
| } |
| |
| <span class="doccomment">/// Constructs an ECDSA key pair by parsing an unencrypted PKCS#8 v1 |
| /// id-ecPublicKey `ECPrivateKey` key. |
| /// |
| /// The input must be in PKCS#8 v1 format. It must contain the public key in |
| /// the `ECPrivateKey` structure; `from_pkcs8()` will verify that the public |
| /// key and the private key are consistent with each other. The algorithm |
| /// identifier must identify the curve by name; it must not use an |
| /// "explicit" encoding of the curve. The `parameters` field of the |
| /// `ECPrivateKey`, if present, must be the same named curve that is in the |
| /// algorithm identifier in the PKCS#8 header. |
| </span><span class="kw">pub fn </span>from_pkcs8( |
| alg: <span class="kw-2">&</span><span class="lifetime">'static </span>EcdsaSigningAlgorithm, |
| pkcs8: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><<span class="self">Self</span>, error::KeyRejected> { |
| <span class="kw">let </span>key_pair = ec::suite_b::key_pair_from_pkcs8( |
| alg.curve, |
| alg.pkcs8_template, |
| untrusted::Input::from(pkcs8), |
| cpu::features(), |
| )<span class="question-mark">?</span>; |
| <span class="kw">let </span>rng = rand::SystemRandom::new(); <span class="comment">// TODO: make this a parameter. |
| </span><span class="self">Self</span>::new(alg, key_pair, <span class="kw-2">&</span>rng) |
| } |
| |
| <span class="doccomment">/// Constructs an ECDSA key pair from the private key and public key bytes |
| /// |
| /// The private key must encoded as a big-endian fixed-length integer. For |
| /// example, a P-256 private key must be 32 bytes prefixed with leading |
| /// zeros as needed. |
| /// |
| /// The public key is encoding in uncompressed form using the |
| /// Octet-String-to-Elliptic-Curve-Point algorithm in |
| /// [SEC 1: Elliptic Curve Cryptography, Version 2.0]. |
| /// |
| /// This is intended for use by code that deserializes key pairs. It is |
| /// recommended to use `EcdsaKeyPair::from_pkcs8()` (with a PKCS#8-encoded |
| /// key) instead. |
| /// |
| /// [SEC 1: Elliptic Curve Cryptography, Version 2.0]: |
| /// http://www.secg.org/sec1-v2.pdf |
| </span><span class="kw">pub fn </span>from_private_key_and_public_key( |
| alg: <span class="kw-2">&</span><span class="lifetime">'static </span>EcdsaSigningAlgorithm, |
| private_key: <span class="kw-2">&</span>[u8], |
| public_key: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><<span class="self">Self</span>, error::KeyRejected> { |
| <span class="kw">let </span>key_pair = ec::suite_b::key_pair_from_bytes( |
| alg.curve, |
| untrusted::Input::from(private_key), |
| untrusted::Input::from(public_key), |
| cpu::features(), |
| )<span class="question-mark">?</span>; |
| <span class="kw">let </span>rng = rand::SystemRandom::new(); <span class="comment">// TODO: make this a parameter. |
| </span><span class="self">Self</span>::new(alg, key_pair, <span class="kw-2">&</span>rng) |
| } |
| |
| <span class="kw">fn </span>new( |
| alg: <span class="kw-2">&</span><span class="lifetime">'static </span>EcdsaSigningAlgorithm, |
| key_pair: ec::KeyPair, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| ) -> <span class="prelude-ty">Result</span><<span class="self">Self</span>, error::KeyRejected> { |
| <span class="kw">let </span>(seed, public_key) = key_pair.split(); |
| <span class="kw">let </span>d = private_key::private_key_as_scalar(alg.private_key_ops, <span class="kw-2">&</span>seed); |
| <span class="kw">let </span>d = alg |
| .private_scalar_ops |
| .scalar_ops |
| .scalar_product(<span class="kw-2">&</span>d, <span class="kw-2">&</span>alg.private_scalar_ops.oneRR_mod_n); |
| |
| <span class="kw">let </span>nonce_key = NonceRandomKey::new(alg, <span class="kw-2">&</span>seed, rng)<span class="question-mark">?</span>; |
| <span class="prelude-val">Ok</span>(<span class="self">Self </span>{ |
| d, |
| nonce_key, |
| alg, |
| public_key: PublicKey(public_key), |
| }) |
| } |
| |
| <span class="doccomment">/// Deprecated. Returns the signature of the `message` using a random nonce |
| /// generated by `rng`. |
| </span><span class="kw">pub fn </span>sign( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| message: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><signature::Signature, error::Unspecified> { |
| <span class="comment">// Step 4 (out of order). |
| </span><span class="kw">let </span>h = digest::digest(<span class="self">self</span>.alg.digest_alg, message); |
| |
| <span class="comment">// Incorporate `h` into the nonce to hedge against faulty RNGs. (This |
| // is not an approved random number generator that is mandated in |
| // the spec.) |
| </span><span class="kw">let </span>nonce_rng = NonceRandom { |
| key: <span class="kw-2">&</span><span class="self">self</span>.nonce_key, |
| message_digest: <span class="kw-2">&</span>h, |
| rng, |
| }; |
| |
| <span class="self">self</span>.sign_digest(h, <span class="kw-2">&</span>nonce_rng) |
| } |
| |
| <span class="attribute">#[cfg(test)] |
| </span><span class="kw">fn </span>sign_with_fixed_nonce_during_test( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| message: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Result</span><signature::Signature, error::Unspecified> { |
| <span class="comment">// Step 4 (out of order). |
| </span><span class="kw">let </span>h = digest::digest(<span class="self">self</span>.alg.digest_alg, message); |
| |
| <span class="self">self</span>.sign_digest(h, rng) |
| } |
| |
| <span class="doccomment">/// Returns the signature of message digest `h` using a "random" nonce |
| /// generated by `rng`. |
| </span><span class="kw">fn </span>sign_digest( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| h: digest::Digest, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| ) -> <span class="prelude-ty">Result</span><signature::Signature, error::Unspecified> { |
| <span class="comment">// NSA Suite B Implementer's Guide to ECDSA Section 3.4.1: ECDSA |
| // Signature Generation. |
| |
| // NSA Guide Prerequisites: |
| // |
| // Prior to generating an ECDSA signature, the signatory shall |
| // obtain: |
| // |
| // 1. an authentic copy of the domain parameters, |
| // 2. a digital signature key pair (d,Q), either generated by a |
| // method from Appendix A.1, or obtained from a trusted third |
| // party, |
| // 3. assurance of the validity of the public key Q (see Appendix |
| // A.3), and |
| // 4. assurance that he/she/it actually possesses the associated |
| // private key d (see [SP800-89] Section 6). |
| // |
| // The domain parameters are hard-coded into the source code. |
| // `EcdsaKeyPair::generate_pkcs8()` can be used to meet the second |
| // requirement; otherwise, it is up to the user to ensure the key pair |
| // was obtained from a trusted private key. The constructors for |
| // `EcdsaKeyPair` ensure that #3 and #4 are met subject to the caveats |
| // in SP800-89 Section 6. |
| |
| </span><span class="kw">let </span>ops = <span class="self">self</span>.alg.private_scalar_ops; |
| <span class="kw">let </span>scalar_ops = ops.scalar_ops; |
| <span class="kw">let </span>cops = scalar_ops.common; |
| <span class="kw">let </span>private_key_ops = <span class="self">self</span>.alg.private_key_ops; |
| |
| <span class="kw">for _ in </span><span class="number">0</span>..<span class="number">100 </span>{ |
| <span class="comment">// XXX: iteration conut? |
| // Step 1. |
| </span><span class="kw">let </span>k = private_key::random_scalar(<span class="self">self</span>.alg.private_key_ops, rng)<span class="question-mark">?</span>; |
| <span class="kw">let </span>k_inv = scalar_ops.scalar_inv_to_mont(<span class="kw-2">&</span>k); |
| |
| <span class="comment">// Step 2. |
| </span><span class="kw">let </span>r = private_key_ops.point_mul_base(<span class="kw-2">&</span>k); |
| |
| <span class="comment">// Step 3. |
| </span><span class="kw">let </span>r = { |
| <span class="kw">let </span>(x, <span class="kw">_</span>) = private_key::affine_from_jacobian(private_key_ops, <span class="kw-2">&</span>r)<span class="question-mark">?</span>; |
| <span class="kw">let </span>x = cops.elem_unencoded(<span class="kw-2">&</span>x); |
| elem_reduced_to_scalar(cops, <span class="kw-2">&</span>x) |
| }; |
| <span class="kw">if </span>cops.is_zero(<span class="kw-2">&</span>r) { |
| <span class="kw">continue</span>; |
| } |
| |
| <span class="comment">// Step 4 is done by the caller. |
| |
| // Step 5. |
| </span><span class="kw">let </span>e = digest_scalar(scalar_ops, h); |
| |
| <span class="comment">// Step 6. |
| </span><span class="kw">let </span>s = { |
| <span class="kw">let </span>dr = scalar_ops.scalar_product(<span class="kw-2">&</span><span class="self">self</span>.d, <span class="kw-2">&</span>r); |
| <span class="kw">let </span>e_plus_dr = scalar_sum(cops, <span class="kw-2">&</span>e, <span class="kw-2">&</span>dr); |
| scalar_ops.scalar_product(<span class="kw-2">&</span>k_inv, <span class="kw-2">&</span>e_plus_dr) |
| }; |
| <span class="kw">if </span>cops.is_zero(<span class="kw-2">&</span>s) { |
| <span class="kw">continue</span>; |
| } |
| |
| <span class="comment">// Step 7 with encoding. |
| </span><span class="kw">return </span><span class="prelude-val">Ok</span>(signature::Signature::new(|sig_bytes| { |
| (<span class="self">self</span>.alg.format_rs)(scalar_ops, <span class="kw-2">&</span>r, <span class="kw-2">&</span>s, sig_bytes) |
| })); |
| } |
| |
| <span class="prelude-val">Err</span>(error::Unspecified) |
| } |
| } |
| |
| <span class="doccomment">/// Generates an ECDSA nonce in a way that attempts to protect against a faulty |
| /// `SecureRandom`. |
| </span><span class="kw">struct </span>NonceRandom<<span class="lifetime">'a</span>> { |
| key: <span class="kw-2">&</span><span class="lifetime">'a </span>NonceRandomKey, |
| message_digest: <span class="kw-2">&</span><span class="lifetime">'a </span>digest::Digest, |
| rng: <span class="kw-2">&</span><span class="lifetime">'a </span><span class="kw">dyn </span>rand::SecureRandom, |
| } |
| |
| <span class="kw">impl </span>core::fmt::Debug <span class="kw">for </span>NonceRandom<<span class="lifetime">'_</span>> { |
| <span class="kw">fn </span>fmt(<span class="kw-2">&</span><span class="self">self</span>, f: <span class="kw-2">&mut </span>core::fmt::Formatter<<span class="lifetime">'_</span>>) -> core::fmt::Result { |
| f.debug_struct(<span class="string">"NonceRandom"</span>).finish() |
| } |
| } |
| |
| <span class="kw">impl </span>rand::sealed::SecureRandom <span class="kw">for </span>NonceRandom<<span class="lifetime">'_</span>> { |
| <span class="kw">fn </span>fill_impl(<span class="kw-2">&</span><span class="self">self</span>, dest: <span class="kw-2">&mut </span>[u8]) -> <span class="prelude-ty">Result</span><(), error::Unspecified> { |
| <span class="comment">// Use the same digest algorithm that will be used to digest the |
| // message. The digest algorithm's output is exactly the right size; |
| // this is checked below. |
| // |
| // XXX(perf): The single iteration will require two digest block |
| // operations because the amount of data digested is larger than one |
| // block. |
| </span><span class="kw">let </span>digest_alg = <span class="self">self</span>.key.<span class="number">0</span>.algorithm(); |
| <span class="kw">let </span><span class="kw-2">mut </span>ctx = digest::Context::new(digest_alg); |
| |
| <span class="comment">// Digest the randomized digest of the private key. |
| </span><span class="kw">let </span>key = <span class="self">self</span>.key.<span class="number">0</span>.as_ref(); |
| ctx.update(key); |
| |
| <span class="comment">// The random value is digested between the key and the message so that |
| // the key and the message are not directly digested in the same digest |
| // block. |
| </span><span class="macro">assert!</span>(key.len() <= digest_alg.block_len / <span class="number">2</span>); |
| { |
| <span class="kw">let </span><span class="kw-2">mut </span>rand = [<span class="number">0u8</span>; digest::MAX_BLOCK_LEN]; |
| <span class="kw">let </span>rand = <span class="kw-2">&mut </span>rand[..digest_alg.block_len - key.len()]; |
| <span class="macro">assert!</span>(rand.len() >= dest.len()); |
| <span class="self">self</span>.rng.fill(rand)<span class="question-mark">?</span>; |
| ctx.update(rand); |
| } |
| |
| ctx.update(<span class="self">self</span>.message_digest.as_ref()); |
| |
| <span class="kw">let </span>nonce = ctx.finish(); |
| |
| <span class="comment">// `copy_from_slice()` panics if the lengths differ, so we don't have |
| // to separately assert that the lengths are the same. |
| </span>dest.copy_from_slice(nonce.as_ref()); |
| |
| <span class="prelude-val">Ok</span>(()) |
| } |
| } |
| |
| <span class="kw">impl</span><<span class="lifetime">'a</span>> sealed::Sealed <span class="kw">for </span>NonceRandom<<span class="lifetime">'a</span>> {} |
| |
| <span class="kw">struct </span>NonceRandomKey(digest::Digest); |
| |
| <span class="kw">impl </span>NonceRandomKey { |
| <span class="kw">fn </span>new( |
| alg: <span class="kw-2">&</span>EcdsaSigningAlgorithm, |
| seed: <span class="kw-2">&</span>ec::Seed, |
| rng: <span class="kw-2">&</span><span class="kw">dyn </span>rand::SecureRandom, |
| ) -> <span class="prelude-ty">Result</span><<span class="self">Self</span>, error::KeyRejected> { |
| <span class="kw">let </span><span class="kw-2">mut </span>rand = [<span class="number">0</span>; digest::MAX_OUTPUT_LEN]; |
| <span class="kw">let </span>rand = <span class="kw-2">&mut </span>rand[<span class="number">0</span>..alg.curve.elem_scalar_seed_len]; |
| |
| <span class="comment">// XXX: `KeyRejected` isn't the right way to model failure of the RNG, |
| // but to fix that we'd need to break the API by changing the result type. |
| // TODO: Fix the API in the next breaking release. |
| </span>rng.fill(rand) |
| .map_err(|error::Unspecified| error::KeyRejected::rng_failed())<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>ctx = digest::Context::new(alg.digest_alg); |
| ctx.update(rand); |
| ctx.update(seed.bytes_less_safe()); |
| <span class="prelude-val">Ok</span>(NonceRandomKey(ctx.finish())) |
| } |
| } |
| |
| <span class="kw">impl </span>signature::KeyPair <span class="kw">for </span>EcdsaKeyPair { |
| <span class="kw">type </span>PublicKey = PublicKey; |
| |
| <span class="kw">fn </span>public_key(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="kw-2">&</span><span class="self">Self</span>::PublicKey { |
| <span class="kw-2">&</span><span class="self">self</span>.public_key |
| } |
| } |
| |
| <span class="attribute">#[derive(Clone, Copy)] |
| </span><span class="kw">pub struct </span>PublicKey(ec::PublicKey); |
| |
| <span class="macro">derive_debug_self_as_ref_hex_bytes!</span>(PublicKey); |
| |
| <span class="kw">impl </span>AsRef<[u8]> <span class="kw">for </span>PublicKey { |
| <span class="kw">fn </span>as_ref(<span class="kw-2">&</span><span class="self">self</span>) -> <span class="kw-2">&</span>[u8] { |
| <span class="self">self</span>.<span class="number">0</span>.as_ref() |
| } |
| } |
| |
| <span class="kw">fn </span>format_rs_fixed(ops: <span class="kw-2">&</span><span class="lifetime">'static </span>ScalarOps, r: <span class="kw-2">&</span>Scalar, s: <span class="kw-2">&</span>Scalar, out: <span class="kw-2">&mut </span>[u8]) -> usize { |
| <span class="kw">let </span>scalar_len = ops.scalar_bytes_len(); |
| |
| <span class="kw">let </span>(r_out, rest) = out.split_at_mut(scalar_len); |
| limb::big_endian_from_limbs(<span class="kw-2">&</span>r.limbs[..ops.common.num_limbs], r_out); |
| |
| <span class="kw">let </span>(s_out, <span class="kw">_</span>) = rest.split_at_mut(scalar_len); |
| limb::big_endian_from_limbs(<span class="kw-2">&</span>s.limbs[..ops.common.num_limbs], s_out); |
| |
| <span class="number">2 </span>* scalar_len |
| } |
| |
| <span class="kw">fn </span>format_rs_asn1(ops: <span class="kw-2">&</span><span class="lifetime">'static </span>ScalarOps, r: <span class="kw-2">&</span>Scalar, s: <span class="kw-2">&</span>Scalar, out: <span class="kw-2">&mut </span>[u8]) -> usize { |
| <span class="comment">// This assumes `a` is not zero since neither `r` or `s` is allowed to be |
| // zero. |
| </span><span class="kw">fn </span>format_integer_tlv(ops: <span class="kw-2">&</span>ScalarOps, a: <span class="kw-2">&</span>Scalar, out: <span class="kw-2">&mut </span>[u8]) -> usize { |
| <span class="kw">let </span><span class="kw-2">mut </span>fixed = [<span class="number">0u8</span>; ec::SCALAR_MAX_BYTES + <span class="number">1</span>]; |
| <span class="kw">let </span>fixed = <span class="kw-2">&mut </span>fixed[..(ops.scalar_bytes_len() + <span class="number">1</span>)]; |
| limb::big_endian_from_limbs(<span class="kw-2">&</span>a.limbs[..ops.common.num_limbs], <span class="kw-2">&mut </span>fixed[<span class="number">1</span>..]); |
| |
| <span class="comment">// Since `a_fixed_out` is an extra byte long, it is guaranteed to start |
| // with a zero. |
| </span><span class="macro">debug_assert_eq!</span>(fixed[<span class="number">0</span>], <span class="number">0</span>); |
| |
| <span class="comment">// There must be at least one non-zero byte since `a` isn't zero. |
| </span><span class="kw">let </span>first_index = fixed.iter().position(|b| <span class="kw-2">*</span>b != <span class="number">0</span>).unwrap(); |
| |
| <span class="comment">// If the first byte has its high bit set, it needs to be prefixed with 0x00. |
| </span><span class="kw">let </span>first_index = <span class="kw">if </span>fixed[first_index] & <span class="number">0x80 </span>!= <span class="number">0 </span>{ |
| first_index - <span class="number">1 |
| </span>} <span class="kw">else </span>{ |
| first_index |
| }; |
| <span class="kw">let </span>value = <span class="kw-2">&</span>fixed[first_index..]; |
| |
| out[<span class="number">0</span>] = der::Tag::Integer <span class="kw">as </span>u8; |
| |
| <span class="comment">// Lengths less than 128 are encoded in one byte. |
| </span><span class="macro">assert!</span>(value.len() < <span class="number">128</span>); |
| out[<span class="number">1</span>] = value.len() <span class="kw">as </span>u8; |
| |
| out[<span class="number">2</span>..][..value.len()].copy_from_slice(<span class="kw-2">&</span>value); |
| |
| <span class="number">2 </span>+ value.len() |
| } |
| |
| out[<span class="number">0</span>] = der::Tag::Sequence <span class="kw">as </span>u8; |
| <span class="kw">let </span>r_tlv_len = format_integer_tlv(ops, r, <span class="kw-2">&mut </span>out[<span class="number">2</span>..]); |
| <span class="kw">let </span>s_tlv_len = format_integer_tlv(ops, s, <span class="kw-2">&mut </span>out[<span class="number">2</span>..][r_tlv_len..]); |
| |
| <span class="comment">// Lengths less than 128 are encoded in one byte. |
| </span><span class="kw">let </span>value_len = r_tlv_len + s_tlv_len; |
| <span class="macro">assert!</span>(value_len < <span class="number">128</span>); |
| out[<span class="number">1</span>] = value_len <span class="kw">as </span>u8; |
| |
| <span class="number">2 </span>+ value_len |
| } |
| |
| <span class="doccomment">/// Signing of fixed-length (PKCS#11 style) ECDSA signatures using the |
| /// P-256 curve and SHA-256. |
| /// |
| /// See "`ECDSA_*_FIXED` Details" in `ring::signature`'s module-level |
| /// documentation for more details. |
| </span><span class="kw">pub static </span>ECDSA_P256_SHA256_FIXED_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm { |
| curve: <span class="kw-2">&</span>ec::suite_b::curve::P256, |
| private_scalar_ops: <span class="kw-2">&</span>p256::PRIVATE_SCALAR_OPS, |
| private_key_ops: <span class="kw-2">&</span>p256::PRIVATE_KEY_OPS, |
| digest_alg: <span class="kw-2">&</span>digest::SHA256, |
| pkcs8_template: <span class="kw-2">&</span>EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE, |
| format_rs: format_rs_fixed, |
| id: AlgorithmID::ECDSA_P256_SHA256_FIXED_SIGNING, |
| }; |
| |
| <span class="doccomment">/// Signing of fixed-length (PKCS#11 style) ECDSA signatures using the |
| /// P-384 curve and SHA-384. |
| /// |
| /// See "`ECDSA_*_FIXED` Details" in `ring::signature`'s module-level |
| /// documentation for more details. |
| </span><span class="kw">pub static </span>ECDSA_P384_SHA384_FIXED_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm { |
| curve: <span class="kw-2">&</span>ec::suite_b::curve::P384, |
| private_scalar_ops: <span class="kw-2">&</span>p384::PRIVATE_SCALAR_OPS, |
| private_key_ops: <span class="kw-2">&</span>p384::PRIVATE_KEY_OPS, |
| digest_alg: <span class="kw-2">&</span>digest::SHA384, |
| pkcs8_template: <span class="kw-2">&</span>EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE, |
| format_rs: format_rs_fixed, |
| id: AlgorithmID::ECDSA_P384_SHA384_FIXED_SIGNING, |
| }; |
| |
| <span class="doccomment">/// Signing of ASN.1 DER-encoded ECDSA signatures using the P-256 curve and |
| /// SHA-256. |
| /// |
| /// See "`ECDSA_*_ASN1` Details" in `ring::signature`'s module-level |
| /// documentation for more details. |
| </span><span class="kw">pub static </span>ECDSA_P256_SHA256_ASN1_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm { |
| curve: <span class="kw-2">&</span>ec::suite_b::curve::P256, |
| private_scalar_ops: <span class="kw-2">&</span>p256::PRIVATE_SCALAR_OPS, |
| private_key_ops: <span class="kw-2">&</span>p256::PRIVATE_KEY_OPS, |
| digest_alg: <span class="kw-2">&</span>digest::SHA256, |
| pkcs8_template: <span class="kw-2">&</span>EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE, |
| format_rs: format_rs_asn1, |
| id: AlgorithmID::ECDSA_P256_SHA256_ASN1_SIGNING, |
| }; |
| |
| <span class="doccomment">/// Signing of ASN.1 DER-encoded ECDSA signatures using the P-384 curve and |
| /// SHA-384. |
| /// |
| /// See "`ECDSA_*_ASN1` Details" in `ring::signature`'s module-level |
| /// documentation for more details. |
| </span><span class="kw">pub static </span>ECDSA_P384_SHA384_ASN1_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm { |
| curve: <span class="kw-2">&</span>ec::suite_b::curve::P384, |
| private_scalar_ops: <span class="kw-2">&</span>p384::PRIVATE_SCALAR_OPS, |
| private_key_ops: <span class="kw-2">&</span>p384::PRIVATE_KEY_OPS, |
| digest_alg: <span class="kw-2">&</span>digest::SHA384, |
| pkcs8_template: <span class="kw-2">&</span>EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE, |
| format_rs: format_rs_asn1, |
| id: AlgorithmID::ECDSA_P384_SHA384_ASN1_SIGNING, |
| }; |
| |
| <span class="kw">static </span>EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE: pkcs8::Template = pkcs8::Template { |
| bytes: <span class="macro">include_bytes!</span>(<span class="string">"ecPublicKey_p256_pkcs8_v1_template.der"</span>), |
| alg_id_range: core::ops::Range { start: <span class="number">8</span>, end: <span class="number">27 </span>}, |
| curve_id_index: <span class="number">9</span>, |
| private_key_index: <span class="number">0x24</span>, |
| }; |
| |
| <span class="kw">static </span>EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE: pkcs8::Template = pkcs8::Template { |
| bytes: <span class="macro">include_bytes!</span>(<span class="string">"ecPublicKey_p384_pkcs8_v1_template.der"</span>), |
| alg_id_range: core::ops::Range { start: <span class="number">8</span>, end: <span class="number">24 </span>}, |
| curve_id_index: <span class="number">9</span>, |
| private_key_index: <span class="number">0x23</span>, |
| }; |
| |
| <span class="attribute">#[cfg(test)] |
| </span><span class="kw">mod </span>tests { |
| <span class="kw">use crate</span>::{signature, test}; |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>signature_ecdsa_sign_fixed_test() { |
| test::run( |
| <span class="macro">test_file!</span>(<span class="string">"ecdsa_sign_fixed_tests.txt"</span>), |
| |section, test_case| { |
| <span class="macro">assert_eq!</span>(section, <span class="string">""</span>); |
| |
| <span class="kw">let </span>curve_name = test_case.consume_string(<span class="string">"Curve"</span>); |
| <span class="kw">let </span>digest_name = test_case.consume_string(<span class="string">"Digest"</span>); |
| <span class="kw">let </span>msg = test_case.consume_bytes(<span class="string">"Msg"</span>); |
| <span class="kw">let </span>d = test_case.consume_bytes(<span class="string">"d"</span>); |
| <span class="kw">let </span>q = test_case.consume_bytes(<span class="string">"Q"</span>); |
| <span class="kw">let </span>k = test_case.consume_bytes(<span class="string">"k"</span>); |
| |
| <span class="kw">let </span>expected_result = test_case.consume_bytes(<span class="string">"Sig"</span>); |
| |
| <span class="kw">let </span>alg = <span class="kw">match </span>(curve_name.as_str(), digest_name.as_str()) { |
| (<span class="string">"P-256"</span>, <span class="string">"SHA256"</span>) => <span class="kw-2">&</span>signature::ECDSA_P256_SHA256_FIXED_SIGNING, |
| (<span class="string">"P-384"</span>, <span class="string">"SHA384"</span>) => <span class="kw-2">&</span>signature::ECDSA_P384_SHA384_FIXED_SIGNING, |
| <span class="kw">_ </span>=> { |
| <span class="macro">panic!</span>(<span class="string">"Unsupported curve+digest: {}+{}"</span>, curve_name, digest_name); |
| } |
| }; |
| |
| <span class="kw">let </span>private_key = |
| signature::EcdsaKeyPair::from_private_key_and_public_key(alg, <span class="kw-2">&</span>d, <span class="kw-2">&</span>q).unwrap(); |
| <span class="kw">let </span>rng = test::rand::FixedSliceRandom { bytes: <span class="kw-2">&</span>k }; |
| |
| <span class="kw">let </span>actual_result = private_key |
| .sign_with_fixed_nonce_during_test(<span class="kw-2">&</span>rng, <span class="kw-2">&</span>msg) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(actual_result.as_ref(), <span class="kw-2">&</span>expected_result[..]); |
| |
| <span class="prelude-val">Ok</span>(()) |
| }, |
| ); |
| } |
| |
| <span class="attribute">#[test] |
| </span><span class="kw">fn </span>signature_ecdsa_sign_asn1_test() { |
| test::run( |
| <span class="macro">test_file!</span>(<span class="string">"ecdsa_sign_asn1_tests.txt"</span>), |
| |section, test_case| { |
| <span class="macro">assert_eq!</span>(section, <span class="string">""</span>); |
| |
| <span class="kw">let </span>curve_name = test_case.consume_string(<span class="string">"Curve"</span>); |
| <span class="kw">let </span>digest_name = test_case.consume_string(<span class="string">"Digest"</span>); |
| <span class="kw">let </span>msg = test_case.consume_bytes(<span class="string">"Msg"</span>); |
| <span class="kw">let </span>d = test_case.consume_bytes(<span class="string">"d"</span>); |
| <span class="kw">let </span>q = test_case.consume_bytes(<span class="string">"Q"</span>); |
| <span class="kw">let </span>k = test_case.consume_bytes(<span class="string">"k"</span>); |
| |
| <span class="kw">let </span>expected_result = test_case.consume_bytes(<span class="string">"Sig"</span>); |
| |
| <span class="kw">let </span>alg = <span class="kw">match </span>(curve_name.as_str(), digest_name.as_str()) { |
| (<span class="string">"P-256"</span>, <span class="string">"SHA256"</span>) => <span class="kw-2">&</span>signature::ECDSA_P256_SHA256_ASN1_SIGNING, |
| (<span class="string">"P-384"</span>, <span class="string">"SHA384"</span>) => <span class="kw-2">&</span>signature::ECDSA_P384_SHA384_ASN1_SIGNING, |
| <span class="kw">_ </span>=> { |
| <span class="macro">panic!</span>(<span class="string">"Unsupported curve+digest: {}+{}"</span>, curve_name, digest_name); |
| } |
| }; |
| |
| <span class="kw">let </span>private_key = |
| signature::EcdsaKeyPair::from_private_key_and_public_key(alg, <span class="kw-2">&</span>d, <span class="kw-2">&</span>q).unwrap(); |
| <span class="kw">let </span>rng = test::rand::FixedSliceRandom { bytes: <span class="kw-2">&</span>k }; |
| |
| <span class="kw">let </span>actual_result = private_key |
| .sign_with_fixed_nonce_during_test(<span class="kw-2">&</span>rng, <span class="kw-2">&</span>msg) |
| .unwrap(); |
| |
| <span class="macro">assert_eq!</span>(actual_result.as_ref(), <span class="kw-2">&</span>expected_result[..]); |
| |
| <span class="prelude-val">Ok</span>(()) |
| }, |
| ); |
| } |
| } |
| </code></pre></div> |
| </section></div></main><div id="rustdoc-vars" data-root-path="../../../../../" data-current-crate="ring" data-themes="ayu,dark,light" data-resource-suffix="" data-rustdoc-version="1.66.0-nightly (5c8bff74b 2022-10-21)" ></div></body></html> |