spdb_sm2/
signature.rs

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
use crate::encrypt;
use crate::error::Sm2Error;
use base64::engine::general_purpose::STANDARD;
use base64::Engine;
use byteorder::{BigEndian, WriteBytesExt};
use libsm::sm2::ecc::{EccCtx, Point};
use libsm::sm2::signature::Signature;
use libsm::sm3::hash::Sm3Hash;
use num_bigint::BigUint;
use num_traits::{One, Zero};
use sha1::Digest;
use smcrypto::sm3;


/// # 普通签名
///
/// - data: 待签名数据
/// - secret: 私钥( APP唯一秘钥:X_SPDB_CLIENT_SECRET, 秘钥有过期时间,注意存储方式 )
pub fn sign_body(data: &str, secret: &str) -> Result<String, Sm2Error> {
    let data = sha1_base64(data);
    let data = sm3::sm3_hash(data.as_bytes());
    encrypt(&data, secret)
}

/// # 全报文签名
///
/// 此处提供公钥与私钥是为了减少私钥推导公钥的时间
/// - data: 待签名数据
/// - pk: 客户端公钥( client_sm2_public_key )
/// - sk: 客户端私钥( client_sm2_private_key )
pub fn sign(msg: &[u8], pk: &str, sk: &str) -> Result<String, Sm2Error> {
    let curve = &EccCtx::new();
    let pk = &hex::decode(pk)?;
    let pk = load_pubkey(curve, pk)?;
    let sk = &hex::decode(sk)?;
    let sk = BigUint::from_bytes_be(sk);
    // sm3杂凑
    let digest = sign_hash(curve, &pk, msg)?;
    let signature = sign_raw(curve, &digest[..], &sk)?;
    let base64 = STANDARD.encode(signature);
    Ok(base64)
}

/// # 签名验签
///
/// - msg: 待验签数据, 如:SBmIZpPZUpsdEc+QHJ0xiNY6qAw= (一般在解密Body数据,进过sha1_base64后得到的数据)
/// - public_key: 公钥字符串( SPDB_PublicKey )
/// - signature: 签名字符串 (Header x-spdb-signature )
pub fn verify(msg: &[u8], pk: &str, sign: &str) -> Result<bool, Sm2Error> {
    let sig = Signature::der_decode(&hex::decode(STANDARD.decode(sign)?)?).map_err(|e| Sm2Error::LibSmError(format!("{}", e)))?;
    let pk = efficient_sm2::PublicKey::from_slice(&hex::decode(&pk[2..])?);
    let signature = efficient_sm2::Signature::new(&sig.get_r().to_bytes_be(), &sig.get_s().to_bytes_be()).map_err(|e| Sm2Error::LibSmError(format!("{:?}", e)))?;
    if signature.verify(&pk, msg).is_ok() {
        return Ok(true);
    }
    Ok(false)
}

/// # 通过SHA-1生成data的摘要,并转base64
///
/// 在通知回调或请求响应中,对解密报文进行签名验证时需要先生成base64。
pub fn sha1_base64(data: &str) -> String {
    let mut hasher = sha1::Sha1::new();
    hasher.update(data);
    let hash_bytes = hasher.finalize();
    STANDARD.encode(hash_bytes)
}

fn load_pubkey(curve: &EccCtx, buf: &[u8]) -> Result<Point, Sm2Error> {
    curve.bytes_to_point(buf).map_err(|e| Sm2Error::LibSmError(e.to_string()))
}
fn sign_hash(curve: &EccCtx, pk: &Point, msg: &[u8]) -> Result<[u8; 32], Sm2Error> {
    let id = "1234567812345678";
    let mut prepend: Vec<u8> = Vec::new();
    prepend.write_u16::<BigEndian>((id.len() * 8) as u16).map_err(|e| Sm2Error::LibSmError(e.to_string()))?;
    for c in id.bytes() {
        prepend.push(c);
    }

    let mut a = curve.get_a().to_bytes();
    let mut b = curve.get_b().to_bytes();

    prepend.append(&mut a);
    prepend.append(&mut b);

    let (x_g, y_g) = curve.to_affine(
        &curve.generator().map_err(|e| Sm2Error::LibSmError(e.to_string()))?
    ).map_err(|e| Sm2Error::LibSmError(e.to_string()))?;
    let (mut x_g, mut y_g) = (x_g.to_bytes(), y_g.to_bytes());
    prepend.append(&mut x_g);
    prepend.append(&mut y_g);

    let (x_a, y_a) = curve.to_affine(pk).map_err(|e| Sm2Error::LibSmError(e.to_string()))?;
    let (mut x_a, mut y_a) = (x_a.to_bytes(), y_a.to_bytes());
    prepend.append(&mut x_a);
    prepend.append(&mut y_a);

    let mut hasher = Sm3Hash::new(&prepend[..]);
    let z_a = hasher.get_hash();

    // Z_A = HASH_256(ID_LEN || ID || x_G || y_G || x_A || y_A)

    // e = HASH_256(Z_A || M)

    let mut prepended_msg: Vec<u8> = Vec::new();
    prepended_msg.extend_from_slice(&z_a[..]);
    prepended_msg.extend_from_slice(msg);

    let mut hasher = Sm3Hash::new(&prepended_msg[..]);
    Ok(hasher.get_hash())
}
fn sign_raw(curve: &EccCtx, digest: &[u8], sk: &BigUint) -> Result<String, Sm2Error> {
    // Get the value "e", which is the hash of message and ID, EC parameters and public key
    let e = BigUint::from_bytes_be(digest);
    // two while loops
    loop {
        // (x_1, y_1) = g^kg
        let k = BigUint::from_bytes_be(&hex::decode("dc388f4220a38e285ebb3da2bfd48ff2d52358030e13672c76ceceebcb03991f")?);
        let p_1 = curve.bytes_to_point(&hex::decode("047121548af8b601e2ebec3c7b679429f0d3387b5f3ea7883925c68fdd1161a73fa593a5dd16c9248b93ef9d8d85053715754e050cc199e94ac332cfdde8bdff52")?)
            .map_err(|e| Sm2Error::LibSmError(e.to_string()))?;

        let (x_1, _) = curve.to_affine(&p_1).map_err(|e| Sm2Error::LibSmError(e.to_string()))?;
        let x_1 = x_1.to_biguint();

        // r = e + x_1
        let r = (&e + x_1) % curve.get_n();
        if r == BigUint::zero() || &r + &k == *curve.get_n() {
            continue;
        }

        // s = (1 + sk)^-1 * (k - r * sk)
        let s1 = curve.inv_n(&(sk + BigUint::one())).map_err(|e| Sm2Error::LibSmError(e.to_string()))?;

        let mut s2_1 = &r * sk;
        if s2_1 < k {
            s2_1 += curve.get_n();
        }
        let mut s2 = s2_1 - k;
        s2 %= curve.get_n();
        let s2 = curve.get_n() - s2;

        let s = (s1 * s2) % curve.get_n();

        if s != BigUint::zero() {
            // Output the signature (r, s)
            let signature = yasna::construct_der(|writer| {
                writer.write_sequence(|writer| {
                    writer.next().write_biguint(&r);
                    writer.next().write_biguint(&s);
                })
            });
            // hex
            let signature = hex::encode(signature);
            return Ok(signature);
        }
        return Err(Sm2Error::LibSmError("Signature failed".to_string()));
    }
}

#[cfg(test)]
mod tests {
    #[test]
    fn test_sign() {
        let msg = r#"hello world"#;
        let pk = "04ff055e4349345eba0fc69362f483f4f408d876dda2520e8e424e81978129da56b19587538253a2406d035a8d9981efeeac60ec72b3308b9a07a5398b61d3d189";
        let sk = "6d7964184b735645ef49b3c1ee5a2c2efdbd15d6c9d851c57eef341ed0e1eb1b";

        // 全报文签名
        let signature = super::sign(msg.as_bytes(), pk, sk).unwrap();
        assert_eq!(signature, "MzA0NjAyMjEwMDgwMGM3NDg0NTlkZDQ2MTdlMzMzNWM3OGRjNDJlOGFjZWU0OTg5YmYwYjk2NzFmYWYzZjkxN2ZkNmU0NGFhOTkwMjIxMDBjOGM2YjhiZjI5NzRmNzljYWE3Mjc4MzZjZjgwMTc2MzI0YmI1YjkxZDFkYWQzNjIzMWQyODA2MDVhZTNhNDYy");

        // 验签签名
        let verify = super::verify(msg.as_bytes(), pk, &signature).unwrap();
        assert_eq!(verify, true);

        // 普通签名
        let secret = "ZTPkMS00ZNTP5NzPwNjAu";
        let signature = super::sign_body(msg, secret).unwrap();
        assert_eq!(signature, "ZTVlOGU0YzZmYjk0N2JiZDQxNDdmZjgyNTgwYTVhMzgxMjVmN2U5M2Q1MzA0NTg2YmJkNjljMmJiYWZlNWMyZWZlY2JiOWI0YmQzNWQ1YWE3OTZlYTkzY2Q0M2RmNmM2ZGEyMzA1NGJiOTEzMTJmMDE5YzI2YzVjOTZhYWVmYmNmMzkwYjMzZTNlY2Q3MzQzMjMwNWM1YzYzNTQ3ZmI0OQ==");
    }

    #[test]
    fn test_verify() {
        let signature = "MzA0NTAyMjEwMGVkOWQ3ZjY3YzhkNmU3NGVmODJjZDJjNDI2N2IwMDQ4ZDliZjc0NDcwNThmNGY4Mzc4NmUyZjI1OGVhNjRhYjQwMjIwMTE1NjM3ZTRmNGY5YWE4Yzg5NmQ3MTE0NjNkN2E3OGEzZGE1NjQ0NDQyOWU2NTlmNTk2NWMwMjJkNmVhNzMxYw==";
        let body = "M2YyZWFlOTU4MzBkZTUxMGQyOTNjNmUzYzA1ODg2NjM=";
        let secret = "ZTPkMS00ZNTP5NzPwNjAu";
        let spdb_pk = "04049bc3c83c5709b1b9d7fce408095809f20ee9cd16fde7944f95fa21392f109bd3c7caed077e41682126f383e547bd48899f9c279cff5f2f06ca0e41013abf11";

        // 先解密报文
        let msg = crate::decrypt(&body, secret).unwrap();
        assert_eq!(msg, "hello world");
        // 验证签名
        let verify = super::verify(crate::sha1_base64(&msg).as_bytes(), spdb_pk, &signature).unwrap();
        assert_eq!(verify, true);
    }
}