use openssl::{
hash::MessageDigest,
pkey::PKey,
rsa::{Padding, Rsa},
sign::{RsaPssSaltlen, Verifier},
};
use crate::crypto::raw_signature::{
openssl::OpenSslMutex, RawSignatureValidationError, RawSignatureValidator,
};
#[non_exhaustive]
pub enum RsaValidator {
Ps256,
Ps384,
Ps512,
}
impl RawSignatureValidator for RsaValidator {
fn validate(
&self,
sig: &[u8],
data: &[u8],
public_key: &[u8],
) -> Result<(), RawSignatureValidationError> {
let _openssl = OpenSslMutex::acquire()?;
let rsa = Rsa::public_key_from_der(public_key)?;
let n = rsa.n().to_owned()?;
let e = rsa.e().to_owned()?;
let new_rsa = Rsa::from_public_components(n, e)?;
let public_key = PKey::from_rsa(new_rsa)?;
let mut verifier = match self {
Self::Ps256 => {
let mut verifier = Verifier::new(MessageDigest::sha256(), &public_key)?;
verifier.set_rsa_padding(Padding::PKCS1_PSS)?;
verifier.set_rsa_mgf1_md(MessageDigest::sha256())?;
verifier.set_rsa_pss_saltlen(RsaPssSaltlen::DIGEST_LENGTH)?;
verifier
}
Self::Ps384 => {
let mut verifier = Verifier::new(MessageDigest::sha384(), &public_key)?;
verifier.set_rsa_padding(Padding::PKCS1_PSS)?;
verifier.set_rsa_mgf1_md(MessageDigest::sha384())?;
verifier.set_rsa_pss_saltlen(RsaPssSaltlen::DIGEST_LENGTH)?;
verifier
}
Self::Ps512 => {
let mut verifier = Verifier::new(MessageDigest::sha512(), &public_key)?;
verifier.set_rsa_padding(Padding::PKCS1_PSS)?;
verifier.set_rsa_mgf1_md(MessageDigest::sha512())?;
verifier.set_rsa_pss_saltlen(RsaPssSaltlen::DIGEST_LENGTH)?;
verifier
}
};
if verifier.verify_oneshot(sig, data)? {
Ok(())
} else {
Err(RawSignatureValidationError::SignatureMismatch)
}
}
}