use async_trait::async_trait;
use bcder::Oid;
use crate::crypto::raw_signature::{
oids::*, AsyncRawSignatureValidator, RawSignatureValidationError, RawSignatureValidator,
SigningAlg,
};
mod ecdsa_validator;
pub(crate) use ecdsa_validator::EcdsaValidator;
mod ed25519_validator;
pub(crate) use ed25519_validator::Ed25519Validator;
mod rsa_legacy_validator;
pub(crate) use rsa_legacy_validator::RsaLegacyValidator;
mod rsa_validator;
pub(crate) use rsa_validator::RsaValidator;
struct AsyncRawSignatureValidatorAdapter {
validator: Box<dyn RawSignatureValidator>,
}
impl AsyncRawSignatureValidatorAdapter {
fn new(validator: Box<dyn RawSignatureValidator>) -> Self {
Self { validator }
}
}
#[async_trait(?Send)]
impl AsyncRawSignatureValidator for AsyncRawSignatureValidatorAdapter {
async fn validate_async(
&self,
sig: &[u8],
data: &[u8],
public_key: &[u8],
) -> Result<(), RawSignatureValidationError> {
self.validator.validate(sig, data, public_key)
}
}
pub(crate) fn async_validator_for_signing_alg(
alg: SigningAlg,
) -> Option<Box<dyn AsyncRawSignatureValidator>> {
let validator = validator_for_signing_alg(alg)?;
Some(Box::new(AsyncRawSignatureValidatorAdapter::new(validator)))
}
pub(crate) fn async_validator_for_sig_and_hash_algs(
sig_alg: &Oid,
hash_alg: &Oid,
) -> Option<Box<dyn AsyncRawSignatureValidator>> {
let validator = validator_for_sig_and_hash_algs(sig_alg, hash_alg)?;
Some(Box::new(AsyncRawSignatureValidatorAdapter::new(validator)))
}
pub fn validator_for_signing_alg(alg: SigningAlg) -> Option<Box<dyn RawSignatureValidator>> {
match alg {
SigningAlg::Ed25519 => Some(Box::new(Ed25519Validator {})),
SigningAlg::Ps256 => Some(Box::new(RsaValidator::Ps256)),
SigningAlg::Ps384 => Some(Box::new(RsaValidator::Ps384)),
SigningAlg::Ps512 => Some(Box::new(RsaValidator::Ps512)),
SigningAlg::Es256 => Some(Box::new(EcdsaValidator::Es256)),
SigningAlg::Es384 => Some(Box::new(EcdsaValidator::Es384)),
SigningAlg::Es512 => Some(Box::new(EcdsaValidator::Es512)),
_ => None,
}
}
pub(crate) fn validator_for_sig_and_hash_algs<T: AsRef<[u8]>, U: AsRef<[u8]>>(
sig_alg: &Oid<T>,
hash_alg: &Oid<U>,
) -> Option<Box<dyn RawSignatureValidator>> {
if sig_alg.as_ref() == ECDSA_WITH_SHA256_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es256));
}
if sig_alg.as_ref() == ECDSA_WITH_SHA384_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es384));
}
if sig_alg.as_ref() == ECDSA_WITH_SHA512_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es512));
}
if sig_alg.as_ref() == SHA256_WITH_RSAENCRYPTION_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa256));
}
if sig_alg.as_ref() == SHA384_WITH_RSAENCRYPTION_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa384));
}
if sig_alg.as_ref() == SHA512_WITH_RSAENCRYPTION_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa512));
}
if sig_alg.as_ref() == ED25519_OID.as_bytes() {
return Some(Box::new(Ed25519Validator {}));
}
if sig_alg.as_ref() == RSA_OID.as_bytes() {
if hash_alg.as_ref() == SHA256_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa256));
} else if hash_alg.as_ref() == SHA384_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa384));
} else if hash_alg.as_ref() == SHA512_OID.as_bytes() {
return Some(Box::new(RsaLegacyValidator::Rsa512));
}
}
if sig_alg.as_ref() == RSA_PSS_OID.as_bytes() {
if hash_alg.as_ref() == SHA256_OID.as_bytes() {
return Some(Box::new(RsaValidator::Ps256));
} else if hash_alg.as_ref() == SHA384_OID.as_bytes() {
return Some(Box::new(RsaValidator::Ps384));
} else if hash_alg.as_ref() == SHA512_OID.as_bytes() {
return Some(Box::new(RsaValidator::Ps512));
}
}
if sig_alg.as_ref() == EC_PUBLICKEY_OID.as_bytes() {
if hash_alg.as_ref() == SHA256_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es256));
} else if hash_alg.as_ref() == SHA384_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es384));
} else if hash_alg.as_ref() == SHA512_OID.as_bytes() {
return Some(Box::new(EcdsaValidator::Es512));
}
}
if sig_alg.as_ref() == ED25519_OID.as_bytes() {
return Some(Box::new(Ed25519Validator {}));
}
None
}
#[cfg(test)]
mod tests {
#![allow(clippy::expect_used)]
#![allow(clippy::panic)]
#![allow(clippy::unwrap_used)]
use bcder::Oid;
use rasn::types::OctetString;
#[cfg(all(target_arch = "wasm32", not(target_os = "wasi")))]
use wasm_bindgen_test::wasm_bindgen_test;
use crate::crypto::raw_signature::{rust_native, RawSignatureValidationError, SigningAlg};
const SAMPLE_DATA: &[u8] = b"some sample content to sign";
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn es256() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Es256).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn es256_bad_signature() {
let mut signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig")
.to_vec();
assert_ne!(signature[10], 10);
signature[10] = 10;
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Es256).unwrap();
assert_eq!(
validator
.validate(&signature, SAMPLE_DATA, pub_key)
.unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn es256_bad_data() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let mut data = SAMPLE_DATA.to_vec();
data[10] = 0;
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Es256).unwrap();
assert_eq!(
validator.validate(signature, &data, pub_key).unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn es384() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es384.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es384.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Es384).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn es512() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es512.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es512.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Es512).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ed25519() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ed25519.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ed25519.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ed25519).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ed25519_bad_data() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ed25519.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ed25519.pub_key");
let mut data = SAMPLE_DATA.to_vec();
data[5] = 10;
data[6] = 11;
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ed25519).unwrap();
assert_eq!(
validator.validate(signature, &data, pub_key).unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ps256() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ps256).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ps256_bad_signature() {
let mut signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.raw_sig")
.to_vec();
assert_ne!(signature[10], 10);
signature[10] = 10;
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ps256).unwrap();
assert_eq!(
validator
.validate(&signature, SAMPLE_DATA, pub_key)
.unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ps256_bad_data() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps256.pub_key");
let mut data = SAMPLE_DATA.to_vec();
data[10] = 0;
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ps256).unwrap();
assert_eq!(
validator.validate(signature, &data, pub_key).unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ps384() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps384.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps384.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ps384).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn ps512() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps512.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/ps512.pub_key");
let validator =
rust_native::validators::validator_for_signing_alg(SigningAlg::Ps512).unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
const RSA_OID: Oid<OctetString> = bcder::Oid(OctetString::from_static(&[
42, 134, 72, 134, 247, 13, 1, 1, 1,
]));
const SHA256_OID: Oid<OctetString> =
bcder::Oid(OctetString::from_static(&[96, 134, 72, 1, 101, 3, 4, 2, 1]));
const SHA384_OID: Oid<OctetString> =
bcder::Oid(OctetString::from_static(&[96, 134, 72, 1, 101, 3, 4, 2, 2]));
const SHA512_OID: Oid<OctetString> =
bcder::Oid(OctetString::from_static(&[96, 134, 72, 1, 101, 3, 4, 2, 3]));
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn legacy_rs256() {
let signature = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.raw_sig"
);
let pub_key = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.pub_key"
);
let validator =
rust_native::validators::validator_for_sig_and_hash_algs(&RSA_OID, &SHA256_OID)
.unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn legacy_rs256_bad_signature() {
let mut signature = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.raw_sig"
)
.to_vec();
assert_ne!(signature[10], 10);
signature[10] = 10;
let pub_key = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.pub_key"
);
let validator =
rust_native::validators::validator_for_sig_and_hash_algs(&RSA_OID, &SHA256_OID)
.unwrap();
assert_eq!(
validator
.validate(&signature, SAMPLE_DATA, pub_key)
.unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn legacy_rs256_bad_data() {
let signature = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.raw_sig"
);
let pub_key = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs256.pub_key"
);
let mut data = SAMPLE_DATA.to_vec();
data[10] = 0;
let validator =
rust_native::validators::validator_for_sig_and_hash_algs(&RSA_OID, &SHA256_OID)
.unwrap();
assert_eq!(
validator.validate(signature, &data, pub_key).unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn rs384() {
let signature = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs384.raw_sig"
);
let pub_key = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs384.pub_key"
);
let validator =
rust_native::validators::validator_for_sig_and_hash_algs(&RSA_OID, &SHA384_OID)
.unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
#[test]
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
fn rs512() {
let signature = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs512.raw_sig"
);
let pub_key = include_bytes!(
"../../../../../tests/fixtures/crypto/raw_signature/legacy/rs512.pub_key"
);
let validator =
rust_native::validators::validator_for_sig_and_hash_algs(&RSA_OID, &SHA512_OID)
.unwrap();
validator.validate(signature, SAMPLE_DATA, pub_key).unwrap();
}
}
#[cfg(test)]
#[cfg(target_arch = "wasm32")]
mod async_validator_tests {
#![allow(clippy::expect_used)]
#![allow(clippy::panic)]
#![allow(clippy::unwrap_used)]
#[cfg(not(target_os = "wasi"))]
use wasm_bindgen_test::wasm_bindgen_test;
use crate::crypto::raw_signature::{
async_validator_for_signing_alg, RawSignatureValidationError, SigningAlg,
};
const SAMPLE_DATA: &[u8] = b"some sample content to sign";
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
#[cfg_attr(target_os = "wasi", wstd::test)]
async fn es256() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let validator = async_validator_for_signing_alg(SigningAlg::Es256).unwrap();
validator
.validate_async(signature, SAMPLE_DATA, pub_key)
.await
.unwrap();
}
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
#[cfg_attr(target_os = "wasi", wstd::test)]
async fn es256_bad_signature() {
let mut signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig")
.to_vec();
assert_ne!(signature[10], 10);
signature[10] = 10;
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let validator = async_validator_for_signing_alg(SigningAlg::Es256).unwrap();
assert_eq!(
validator
.validate_async(&signature, SAMPLE_DATA, pub_key)
.await
.unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
#[cfg_attr(target_os = "wasi", wstd::test)]
async fn es256_bad_data() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es256.pub_key");
let mut data = SAMPLE_DATA.to_vec();
data[10] = 0;
let validator = async_validator_for_signing_alg(SigningAlg::Es256).unwrap();
assert_eq!(
validator
.validate_async(signature, &data, pub_key)
.await
.unwrap_err(),
RawSignatureValidationError::SignatureMismatch
);
}
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
#[cfg_attr(target_os = "wasi", wstd::test)]
async fn es384() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es384.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es384.pub_key");
let validator = async_validator_for_signing_alg(SigningAlg::Es384).unwrap();
validator
.validate_async(signature, SAMPLE_DATA, pub_key)
.await
.unwrap();
}
#[cfg_attr(
all(target_arch = "wasm32", not(target_os = "wasi")),
wasm_bindgen_test
)]
#[cfg_attr(target_os = "wasi", wstd::test)]
async fn es512() {
let signature =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es512.raw_sig");
let pub_key =
include_bytes!("../../../../../tests/fixtures/crypto/raw_signature/es512.pub_key");
let validator = async_validator_for_signing_alg(SigningAlg::Es512).unwrap();
validator
.validate_async(signature, SAMPLE_DATA, pub_key)
.await
.unwrap();
}
}