1use super::digest_scalar::digest_scalar;
18use crate::{
19 arithmetic::montgomery::*,
20 cpu, digest,
21 ec::{
22 self,
23 suite_b::{ops::*, private_key},
24 },
25 error,
26 io::der,
27 limb, pkcs8, rand, sealed, signature,
28};
29pub struct EcdsaSigningAlgorithm {
31 curve: &'static ec::Curve,
32 private_scalar_ops: &'static PrivateScalarOps,
33 private_key_ops: &'static PrivateKeyOps,
34 digest_alg: &'static digest::Algorithm,
35 pkcs8_template: &'static pkcs8::Template,
36 format_rs: fn(ops: &'static ScalarOps, r: &Scalar, s: &Scalar, out: &mut [u8]) -> usize,
37 id: AlgorithmID,
38}
39
40#[derive(Debug, Eq, PartialEq)]
41enum AlgorithmID {
42 ECDSA_P256_SHA256_FIXED_SIGNING,
43 ECDSA_P384_SHA384_FIXED_SIGNING,
44 ECDSA_P256_SHA256_ASN1_SIGNING,
45 ECDSA_P384_SHA384_ASN1_SIGNING,
46}
47
48derive_debug_via_id!(EcdsaSigningAlgorithm);
49
50impl PartialEq for EcdsaSigningAlgorithm {
51 fn eq(&self, other: &Self) -> bool {
52 self.id == other.id
53 }
54}
55
56impl Eq for EcdsaSigningAlgorithm {}
57
58impl sealed::Sealed for EcdsaSigningAlgorithm {}
59
60pub struct EcdsaKeyPair {
62 d: Scalar<R>,
63 nonce_key: NonceRandomKey,
64 alg: &'static EcdsaSigningAlgorithm,
65 public_key: PublicKey,
66}
67
68derive_debug_via_field!(EcdsaKeyPair, stringify!(EcdsaKeyPair), public_key);
69
70impl EcdsaKeyPair {
71 pub fn generate_pkcs8(
83 alg: &'static EcdsaSigningAlgorithm,
84 rng: &dyn rand::SecureRandom,
85 ) -> Result<pkcs8::Document, error::Unspecified> {
86 let cpu = cpu::features();
87 let private_key = ec::Seed::generate(alg.curve, rng, cpu)?;
88 let public_key = private_key.compute_public_key(cpu)?;
89 Ok(pkcs8::wrap_key(
90 alg.pkcs8_template,
91 private_key.bytes_less_safe(),
92 public_key.as_ref(),
93 ))
94 }
95
96 pub fn from_pkcs8(
107 alg: &'static EcdsaSigningAlgorithm,
108 pkcs8: &[u8],
109 rng: &dyn rand::SecureRandom,
110 ) -> Result<Self, error::KeyRejected> {
111 let key_pair = ec::suite_b::key_pair_from_pkcs8(
112 alg.curve,
113 alg.pkcs8_template,
114 untrusted::Input::from(pkcs8),
115 cpu::features(),
116 )?;
117 Self::new(alg, key_pair, rng)
118 }
119
120 pub fn from_private_key_and_public_key(
137 alg: &'static EcdsaSigningAlgorithm,
138 private_key: &[u8],
139 public_key: &[u8],
140 rng: &dyn rand::SecureRandom,
141 ) -> Result<Self, error::KeyRejected> {
142 let key_pair = ec::suite_b::key_pair_from_bytes(
143 alg.curve,
144 untrusted::Input::from(private_key),
145 untrusted::Input::from(public_key),
146 cpu::features(),
147 )?;
148 Self::new(alg, key_pair, rng)
149 }
150
151 fn new(
152 alg: &'static EcdsaSigningAlgorithm,
153 key_pair: ec::KeyPair,
154 rng: &dyn rand::SecureRandom,
155 ) -> Result<Self, error::KeyRejected> {
156 let cpu = cpu::features();
157
158 let (seed, public_key) = key_pair.split();
159 let n = &alg.private_scalar_ops.scalar_ops.scalar_modulus(cpu);
160 let d = private_key::private_key_as_scalar(n, &seed);
161 let d = alg.private_scalar_ops.to_mont(&d, cpu);
162
163 let nonce_key = NonceRandomKey::new(alg, &seed, rng)?;
164 Ok(Self {
165 d,
166 nonce_key,
167 alg,
168 public_key: PublicKey(public_key),
169 })
170 }
171
172 pub fn sign(
174 &self,
175 rng: &dyn rand::SecureRandom,
176 message: &[u8],
177 ) -> Result<signature::Signature, error::Unspecified> {
178 let cpu = cpu::features();
179
180 let h = digest::digest(self.alg.digest_alg, message);
182
183 let nonce_rng = NonceRandom {
187 key: &self.nonce_key,
188 message_digest: &h,
189 rng,
190 };
191
192 self.sign_digest(h, &nonce_rng, cpu)
193 }
194
195 #[cfg(test)]
196 fn sign_with_fixed_nonce_during_test(
197 &self,
198 rng: &dyn rand::SecureRandom,
199 message: &[u8],
200 ) -> Result<signature::Signature, error::Unspecified> {
201 let h = digest::digest(self.alg.digest_alg, message);
203
204 self.sign_digest(h, rng, cpu::features())
205 }
206
207 fn sign_digest(
210 &self,
211 h: digest::Digest,
212 rng: &dyn rand::SecureRandom,
213 cpu: cpu::Features,
214 ) -> Result<signature::Signature, error::Unspecified> {
215 let ops = self.alg.private_scalar_ops;
240 let scalar_ops = ops.scalar_ops;
241 let cops = scalar_ops.common;
242 let private_key_ops = self.alg.private_key_ops;
243 let q = &cops.elem_modulus(cpu);
244 let n = &scalar_ops.scalar_modulus(cpu);
245
246 for _ in 0..100 {
247 let k = private_key::random_scalar(self.alg.private_key_ops, n, rng)?;
250 let k_inv = ops.scalar_inv_to_mont(&k, cpu);
251
252 let r = private_key_ops.point_mul_base(&k, cpu);
254
255 let r = {
257 let (x, _) = private_key::affine_from_jacobian(private_key_ops, q, &r)?;
258 let x = q.elem_unencoded(&x);
259 n.elem_reduced_to_scalar(&x)
260 };
261 if n.is_zero(&r) {
262 continue;
263 }
264
265 let e = digest_scalar(n, h);
269
270 let s = {
272 let mut e_plus_dr = scalar_ops.scalar_product(&self.d, &r, cpu);
273 n.add_assign(&mut e_plus_dr, &e);
274 scalar_ops.scalar_product(&k_inv, &e_plus_dr, cpu)
275 };
276 if n.is_zero(&s) {
277 continue;
278 }
279
280 return Ok(signature::Signature::new(|sig_bytes| {
282 (self.alg.format_rs)(scalar_ops, &r, &s, sig_bytes)
283 }));
284 }
285
286 Err(error::Unspecified)
287 }
288}
289
290struct NonceRandom<'a> {
293 key: &'a NonceRandomKey,
294 message_digest: &'a digest::Digest,
295 rng: &'a dyn rand::SecureRandom,
296}
297
298impl core::fmt::Debug for NonceRandom<'_> {
299 fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
300 f.debug_struct("NonceRandom").finish()
301 }
302}
303
304impl rand::sealed::SecureRandom for NonceRandom<'_> {
305 fn fill_impl(&self, dest: &mut [u8]) -> Result<(), error::Unspecified> {
306 let digest_alg = self.key.0.algorithm();
314 let mut ctx = digest::Context::new(digest_alg);
315
316 let key = self.key.0.as_ref();
318 ctx.update(key);
319
320 assert!(key.len() <= digest_alg.block_len() / 2);
324 {
325 let mut rand = [0u8; digest::MAX_BLOCK_LEN];
326 let rand = &mut rand[..digest_alg.block_len() - key.len()];
327 assert!(rand.len() >= dest.len());
328 self.rng.fill(rand)?;
329 ctx.update(rand);
330 }
331
332 ctx.update(self.message_digest.as_ref());
333
334 let nonce = ctx.finish();
335
336 dest.copy_from_slice(nonce.as_ref());
339
340 Ok(())
341 }
342}
343
344impl sealed::Sealed for NonceRandom<'_> {}
345
346struct NonceRandomKey(digest::Digest);
347
348impl NonceRandomKey {
349 fn new(
350 alg: &EcdsaSigningAlgorithm,
351 seed: &ec::Seed,
352 rng: &dyn rand::SecureRandom,
353 ) -> Result<Self, error::KeyRejected> {
354 let mut rand = [0; digest::MAX_OUTPUT_LEN];
355 let rand = &mut rand[0..alg.curve.elem_scalar_seed_len];
356
357 rng.fill(rand)
361 .map_err(|error::Unspecified| error::KeyRejected::rng_failed())?;
362
363 let mut ctx = digest::Context::new(alg.digest_alg);
364 ctx.update(rand);
365 ctx.update(seed.bytes_less_safe());
366 Ok(Self(ctx.finish()))
367 }
368}
369
370impl signature::KeyPair for EcdsaKeyPair {
371 type PublicKey = PublicKey;
372
373 fn public_key(&self) -> &Self::PublicKey {
374 &self.public_key
375 }
376}
377
378#[derive(Clone, Copy)]
379pub struct PublicKey(ec::PublicKey);
380
381derive_debug_self_as_ref_hex_bytes!(PublicKey);
382
383impl AsRef<[u8]> for PublicKey {
384 fn as_ref(&self) -> &[u8] {
385 self.0.as_ref()
386 }
387}
388
389fn format_rs_fixed(ops: &'static ScalarOps, r: &Scalar, s: &Scalar, out: &mut [u8]) -> usize {
390 let scalar_len = ops.scalar_bytes_len();
391
392 let (r_out, rest) = out.split_at_mut(scalar_len);
393 limb::big_endian_from_limbs(ops.leak_limbs(r), r_out);
394
395 let (s_out, _) = rest.split_at_mut(scalar_len);
396 limb::big_endian_from_limbs(ops.leak_limbs(s), s_out);
397
398 2 * scalar_len
399}
400
401fn format_rs_asn1(ops: &'static ScalarOps, r: &Scalar, s: &Scalar, out: &mut [u8]) -> usize {
402 fn format_integer_tlv(ops: &ScalarOps, a: &Scalar, out: &mut [u8]) -> usize {
405 let mut fixed = [0u8; ec::SCALAR_MAX_BYTES + 1];
406 let fixed = &mut fixed[..(ops.scalar_bytes_len() + 1)];
407 limb::big_endian_from_limbs(ops.leak_limbs(a), &mut fixed[1..]);
408
409 debug_assert_eq!(fixed[0], 0);
412
413 let first_index = fixed.iter().position(|b| *b != 0).unwrap();
415
416 let first_index = if fixed[first_index] & 0x80 != 0 {
418 first_index - 1
419 } else {
420 first_index
421 };
422 let value = &fixed[first_index..];
423
424 out[0] = der::Tag::Integer.into();
425
426 assert!(value.len() < 128);
428 #[allow(clippy::cast_possible_truncation)]
429 {
430 out[1] = value.len() as u8;
431 }
432
433 out[2..][..value.len()].copy_from_slice(value);
434
435 2 + value.len()
436 }
437
438 out[0] = der::Tag::Sequence.into();
439 let r_tlv_len = format_integer_tlv(ops, r, &mut out[2..]);
440 let s_tlv_len = format_integer_tlv(ops, s, &mut out[2..][r_tlv_len..]);
441
442 let value_len = r_tlv_len + s_tlv_len;
444 assert!(value_len < 128);
445 #[allow(clippy::cast_possible_truncation)]
446 {
447 out[1] = value_len as u8;
448 }
449
450 2 + value_len
451}
452
453pub static ECDSA_P256_SHA256_FIXED_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm {
459 curve: &ec::suite_b::curve::P256,
460 private_scalar_ops: &p256::PRIVATE_SCALAR_OPS,
461 private_key_ops: &p256::PRIVATE_KEY_OPS,
462 digest_alg: &digest::SHA256,
463 pkcs8_template: &EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE,
464 format_rs: format_rs_fixed,
465 id: AlgorithmID::ECDSA_P256_SHA256_FIXED_SIGNING,
466};
467
468pub static ECDSA_P384_SHA384_FIXED_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm {
474 curve: &ec::suite_b::curve::P384,
475 private_scalar_ops: &p384::PRIVATE_SCALAR_OPS,
476 private_key_ops: &p384::PRIVATE_KEY_OPS,
477 digest_alg: &digest::SHA384,
478 pkcs8_template: &EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE,
479 format_rs: format_rs_fixed,
480 id: AlgorithmID::ECDSA_P384_SHA384_FIXED_SIGNING,
481};
482
483pub static ECDSA_P256_SHA256_ASN1_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm {
489 curve: &ec::suite_b::curve::P256,
490 private_scalar_ops: &p256::PRIVATE_SCALAR_OPS,
491 private_key_ops: &p256::PRIVATE_KEY_OPS,
492 digest_alg: &digest::SHA256,
493 pkcs8_template: &EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE,
494 format_rs: format_rs_asn1,
495 id: AlgorithmID::ECDSA_P256_SHA256_ASN1_SIGNING,
496};
497
498pub static ECDSA_P384_SHA384_ASN1_SIGNING: EcdsaSigningAlgorithm = EcdsaSigningAlgorithm {
504 curve: &ec::suite_b::curve::P384,
505 private_scalar_ops: &p384::PRIVATE_SCALAR_OPS,
506 private_key_ops: &p384::PRIVATE_KEY_OPS,
507 digest_alg: &digest::SHA384,
508 pkcs8_template: &EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE,
509 format_rs: format_rs_asn1,
510 id: AlgorithmID::ECDSA_P384_SHA384_ASN1_SIGNING,
511};
512
513static EC_PUBLIC_KEY_P256_PKCS8_V1_TEMPLATE: pkcs8::Template = pkcs8::Template {
514 bytes: include_bytes!("ecPublicKey_p256_pkcs8_v1_template.der"),
515 alg_id_range: core::ops::Range { start: 8, end: 27 },
516 curve_id_index: 9,
517 private_key_index: 0x24,
518};
519
520static EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE: pkcs8::Template = pkcs8::Template {
521 bytes: include_bytes!("ecPublicKey_p384_pkcs8_v1_template.der"),
522 alg_id_range: core::ops::Range { start: 8, end: 24 },
523 curve_id_index: 9,
524 private_key_index: 0x23,
525};
526
527#[cfg(test)]
528mod tests {
529 use crate::testutil as test;
530 use crate::{rand, signature};
531
532 #[test]
533 fn signature_ecdsa_sign_fixed_test() {
534 let rng = rand::SystemRandom::new();
535
536 test::run(
537 test_vector_file!("ecdsa_sign_fixed_tests.txt"),
538 |section, test_case| {
539 assert_eq!(section, "");
540
541 let curve_name = test_case.consume_string("Curve");
542 let digest_name = test_case.consume_string("Digest");
543 let msg = test_case.consume_bytes("Msg");
544 let d = test_case.consume_bytes("d");
545 let q = test_case.consume_bytes("Q");
546 let k = test_case.consume_bytes("k");
547
548 let expected_result = test_case.consume_bytes("Sig");
549
550 let alg = match (curve_name.as_str(), digest_name.as_str()) {
551 ("P-256", "SHA256") => &signature::ECDSA_P256_SHA256_FIXED_SIGNING,
552 ("P-384", "SHA384") => &signature::ECDSA_P384_SHA384_FIXED_SIGNING,
553 _ => {
554 panic!("Unsupported curve+digest: {}+{}", curve_name, digest_name);
555 }
556 };
557
558 let private_key =
559 signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q, &rng)
560 .unwrap();
561 let rng = test::rand::FixedSliceRandom { bytes: &k };
562
563 let actual_result = private_key
564 .sign_with_fixed_nonce_during_test(&rng, &msg)
565 .unwrap();
566
567 assert_eq!(actual_result.as_ref(), &expected_result[..]);
568
569 Ok(())
570 },
571 );
572 }
573
574 #[test]
575 fn signature_ecdsa_sign_asn1_test() {
576 let rng = rand::SystemRandom::new();
577
578 test::run(
579 test_vector_file!("ecdsa_sign_asn1_tests.txt"),
580 |section, test_case| {
581 assert_eq!(section, "");
582
583 let curve_name = test_case.consume_string("Curve");
584 let digest_name = test_case.consume_string("Digest");
585 let msg = test_case.consume_bytes("Msg");
586 let d = test_case.consume_bytes("d");
587 let q = test_case.consume_bytes("Q");
588 let k = test_case.consume_bytes("k");
589
590 let expected_result = test_case.consume_bytes("Sig");
591
592 let alg = match (curve_name.as_str(), digest_name.as_str()) {
593 ("P-256", "SHA256") => &signature::ECDSA_P256_SHA256_ASN1_SIGNING,
594 ("P-384", "SHA384") => &signature::ECDSA_P384_SHA384_ASN1_SIGNING,
595 _ => {
596 panic!("Unsupported curve+digest: {}+{}", curve_name, digest_name);
597 }
598 };
599
600 let private_key =
601 signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q, &rng)
602 .unwrap();
603 let rng = test::rand::FixedSliceRandom { bytes: &k };
604
605 let actual_result = private_key
606 .sign_with_fixed_nonce_during_test(&rng, &msg)
607 .unwrap();
608
609 assert_eq!(actual_result.as_ref(), &expected_result[..]);
610
611 Ok(())
612 },
613 );
614 }
615}