ledger_device_sdk 1.35.0

Ledger device Rust SDK
//! Ledger PKI module
//!
//! Provides functions to verify data using the loaded certificate.

use crate::ecc::CurvesId;
use crate::io::Reply;
use ledger_secure_sdk_sys::{
    CERTIFICATE_TRUSTED_NAME_MAXLEN, cx_ecfp_384_public_key_t, os_pki_get_info, os_pki_verify,
};

/// PKI verification errors
/// Indicates the result of a PKI verification operation.
#[repr(u16)]
pub enum PkiVerifyError {
    /// No certificate was found.
    MissingCertificate = 1,
    /// The certificate was not used for the correct purpose.
    WrongCertificateUsage = 2,
    /// The certificate was not issued for the correct curve.
    WrongCertificateCurve = 3,
    /// The signature is invalid.
    WrongSignature = 4,
}

const PKI_VERIFY_ERROR_BASE: u16 = 0x6900;

impl From<PkiVerifyError> for Reply {
    fn from(e: PkiVerifyError) -> Reply {
        Reply(PKI_VERIFY_ERROR_BASE | e as u16)
    }
}
/// Verify hash using the loaded certificate
/// # Arguments
/// * `hash` - The hash to verify
/// * `expected_key_usage` - The expected key usage of the certificate.
/// * `expected_curve` - The expected curve of the certificate. See [CurvesId] enum
/// * `signature` - The signature to verify
/// # Returns
/// * `Ok(())` if the verification is successful
/// * `Err(PkiVerifyError)` if the verification fails
pub fn pki_check_signature(
    hash: &mut [u8],
    expected_key_usage: u8,
    expected_curve: CurvesId,
    signature: &mut [u8],
) -> Result<(), PkiVerifyError> {
    let certificate_name = [0u8; CERTIFICATE_TRUSTED_NAME_MAXLEN as usize];
    let mut certificate_name_len: usize = 0;
    let mut key_usage: u8 = 0;
    let mut pub_key = cx_ecfp_384_public_key_t::default();

    let err = unsafe {
        os_pki_get_info(
            &mut key_usage as *mut u8,
            certificate_name.as_ptr() as *mut u8,
            &mut certificate_name_len as *mut usize,
            &mut pub_key as *mut cx_ecfp_384_public_key_t,
        )
    };
    if err != 0 {
        return Err(PkiVerifyError::MissingCertificate);
    }
    if key_usage != expected_key_usage {
        return Err(PkiVerifyError::WrongCertificateUsage);
    }
    if pub_key.curve != expected_curve as u8 {
        return Err(PkiVerifyError::WrongCertificateCurve);
    }

    let err = unsafe {
        os_pki_verify(
            hash.as_mut_ptr() as *mut u8,
            hash.len(),
            signature.as_mut_ptr() as *mut u8,
            signature.len(),
        )
    };
    if err {
        Ok(())
    } else {
        Err(PkiVerifyError::WrongSignature)
    }
}