use openssl::{
bn::BigNum, ec::EcKey, ecdsa::EcdsaSig, hash::MessageDigest, pkey::PKey, sign::Verifier,
};
use crate::raw_signature::{
openssl::OpenSslMutex, RawSignatureValidationError, RawSignatureValidator,
};
#[non_exhaustive]
pub enum EcdsaValidator {
Es256,
Es384,
Es512,
}
impl RawSignatureValidator for EcdsaValidator {
fn validate(
&self,
sig: &[u8],
data: &[u8],
public_key: &[u8],
) -> Result<(), RawSignatureValidationError> {
let _openssl = OpenSslMutex::acquire()?;
let public_key = EcKey::public_key_from_der(public_key)?;
let key = PKey::from_ec_key(public_key)?;
let mut verifier = match self {
Self::Es256 => Verifier::new(MessageDigest::sha256(), &key)?,
Self::Es384 => Verifier::new(MessageDigest::sha384(), &key)?,
Self::Es512 => Verifier::new(MessageDigest::sha512(), &key)?,
};
let is_p1363 = match self {
Self::Es256 => sig.len() == 64,
Self::Es384 => sig.len() == 96,
Self::Es512 => sig.len() == 132,
};
let sig_der = if is_p1363 {
let sig_len = sig.len() / 2;
let r = BigNum::from_slice(&sig[0..sig_len])?;
let s = BigNum::from_slice(&sig[sig_len..])?;
EcdsaSig::from_private_components(r, s)?.to_der()?
} else {
sig.to_vec()
};
verifier.update(data)?;
if verifier.verify(&sig_der)? {
Ok(())
} else {
Err(RawSignatureValidationError::SignatureMismatch)
}
}
}