blob: 96b6de2e61f8215ffeb51e3946ddc831b0207ba9 [file] [log] [blame]
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
package signature
import (
"bytes"
"crypto/elliptic"
"encoding/asn1"
"fmt"
"math/big"
)
// asn1encode encodes the given ECDSA signature using ASN.1 encoding.
func asn1encode(sig *ECDSASignature) ([]byte, error) {
ret, err := asn1.Marshal(*sig)
if err != nil {
return nil, fmt.Errorf("asn.1 encoding failed")
}
return ret, nil
}
var errAsn1Decoding = fmt.Errorf("asn.1 decoding failed")
// asn1decode verifies the given ECDSA signature and decodes it if it is valid.
// Since asn1.Unmarshal() doesn't do a strict verification on its input, it will
// accept signatures with trailing data. Thus, we add an additional check to make sure
// that the input follows strict DER encoding: after unmarshalling the signature bytes,
// we marshal the obtained signature object again. Since DER encoding is deterministic,
// we expect that the obtained bytes would be equal to the input.
func asn1decode(b []byte) (*ECDSASignature, error) {
// parse the signature
sig := new(ECDSASignature)
_, err := asn1.Unmarshal(b, sig)
if err != nil {
return nil, errAsn1Decoding
}
// encode the signature again
encoded, err := asn1.Marshal(*sig)
if err != nil {
return nil, errAsn1Decoding
}
if !bytes.Equal(b, encoded) {
return nil, errAsn1Decoding
}
return sig, nil
}
func ieeeSignatureSize(curveName string) (int, error) {
switch curveName {
case elliptic.P256().Params().Name:
return 64, nil
case elliptic.P384().Params().Name:
return 96, nil
case elliptic.P521().Params().Name:
return 132, nil
default:
return 0, fmt.Errorf("ieeeP1363 unsupported curve name: %q", curveName)
}
}
func ieeeP1363Encode(sig *ECDSASignature, curveName string) ([]byte, error) {
sigSize, err := ieeeSignatureSize(curveName)
if err != nil {
return nil, err
}
enc := make([]byte, sigSize)
// sigR and sigS must be half the size of the signature. If not, we need to pad them with zeros.
offset := 0
if len(sig.R.Bytes()) < (sigSize / 2) {
offset += (sigSize / 2) - len(sig.R.Bytes())
}
// Copy sigR after any zero-padding.
copy(enc[offset:], sig.R.Bytes())
// Skip the bytes of sigR.
offset = sigSize / 2
if len(sig.S.Bytes()) < (sigSize / 2) {
offset += (sigSize / 2) - len(sig.S.Bytes())
}
// Copy sigS after sigR and any zero-padding.
copy(enc[offset:], sig.S.Bytes())
return enc, nil
}
func ieeeP1363Decode(encodedBytes []byte) (*ECDSASignature, error) {
if len(encodedBytes) == 0 || len(encodedBytes) > 132 || len(encodedBytes)%2 != 0 {
return nil, fmt.Errorf("ecdsa: Invalid IEEE_P1363 encoded bytes")
}
r := new(big.Int).SetBytes(encodedBytes[:len(encodedBytes)/2])
s := new(big.Int).SetBytes(encodedBytes[len(encodedBytes)/2:])
return &ECDSASignature{R: r, S: s}, nil
}