use crate::{public::EcdsaPublicKey, Algorithm, EcdsaCurve, Error, Result};
use core::fmt;
use encoding::{CheckedSum, Decode, Encode, Reader, Writer};
use sec1::consts::{U32, U48, U66};
use subtle::{Choice, ConstantTimeEq};
use zeroize::Zeroize;
#[cfg(feature = "rand_core")]
use rand_core::CryptoRngCore;
#[derive(Clone)]
pub struct EcdsaPrivateKey<const SIZE: usize> {
bytes: [u8; SIZE],
}
impl<const SIZE: usize> EcdsaPrivateKey<SIZE> {
pub fn as_slice(&self) -> &[u8] {
self.bytes.as_ref()
}
pub fn into_bytes(self) -> [u8; SIZE] {
self.bytes
}
fn needs_leading_zero(&self) -> bool {
self.bytes[0] >= 0x80
}
}
impl<const SIZE: usize> Decode for EcdsaPrivateKey<SIZE> {
type Error = Error;
fn decode(reader: &mut impl Reader) -> Result<Self> {
reader.read_prefixed(|reader| {
if reader.remaining_len() == SIZE.checked_add(1).ok_or(encoding::Error::Length)? {
if u8::decode(reader)? != 0 {
return Err(Error::FormatEncoding);
}
}
let mut bytes = [0u8; SIZE];
reader.read(&mut bytes)?;
Ok(Self { bytes })
})
}
}
impl<const SIZE: usize> Encode for EcdsaPrivateKey<SIZE> {
fn encoded_len(&self) -> encoding::Result<usize> {
[4, self.needs_leading_zero().into(), SIZE].checked_sum()
}
fn encode(&self, writer: &mut impl Writer) -> encoding::Result<()> {
[self.needs_leading_zero().into(), SIZE]
.checked_sum()?
.encode(writer)?;
if self.needs_leading_zero() {
writer.write(&[0])?;
}
writer.write(&self.bytes)?;
Ok(())
}
}
impl<const SIZE: usize> AsRef<[u8; SIZE]> for EcdsaPrivateKey<SIZE> {
fn as_ref(&self) -> &[u8; SIZE] {
&self.bytes
}
}
impl<const SIZE: usize> ConstantTimeEq for EcdsaPrivateKey<SIZE> {
fn ct_eq(&self, other: &Self) -> Choice {
self.as_ref().ct_eq(other.as_ref())
}
}
impl<const SIZE: usize> PartialEq for EcdsaPrivateKey<SIZE> {
fn eq(&self, other: &Self) -> bool {
self.ct_eq(other).into()
}
}
impl<const SIZE: usize> Eq for EcdsaPrivateKey<SIZE> {}
impl<const SIZE: usize> fmt::Debug for EcdsaPrivateKey<SIZE> {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
f.debug_struct("EcdsaPrivateKey").finish_non_exhaustive()
}
}
impl<const SIZE: usize> fmt::LowerHex for EcdsaPrivateKey<SIZE> {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
for byte in self.as_ref() {
write!(f, "{byte:02x}")?;
}
Ok(())
}
}
impl<const SIZE: usize> fmt::UpperHex for EcdsaPrivateKey<SIZE> {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
for byte in self.as_ref() {
write!(f, "{byte:02X}")?;
}
Ok(())
}
}
impl<const SIZE: usize> Drop for EcdsaPrivateKey<SIZE> {
fn drop(&mut self) {
self.bytes.zeroize();
}
}
#[cfg(feature = "p256")]
impl From<p256::SecretKey> for EcdsaPrivateKey<32> {
fn from(sk: p256::SecretKey) -> EcdsaPrivateKey<32> {
EcdsaPrivateKey {
bytes: sk.to_bytes().into(),
}
}
}
#[cfg(feature = "p384")]
impl From<p384::SecretKey> for EcdsaPrivateKey<48> {
fn from(sk: p384::SecretKey) -> EcdsaPrivateKey<48> {
EcdsaPrivateKey {
bytes: sk.to_bytes().into(),
}
}
}
#[cfg(feature = "p521")]
impl From<p521::SecretKey> for EcdsaPrivateKey<66> {
fn from(sk: p521::SecretKey) -> EcdsaPrivateKey<66> {
let mut bytes = [0u8; 66];
bytes.copy_from_slice(&sk.to_bytes());
EcdsaPrivateKey { bytes }
}
}
#[derive(Clone, Debug)]
pub enum EcdsaKeypair {
NistP256 {
public: sec1::EncodedPoint<U32>,
private: EcdsaPrivateKey<32>,
},
NistP384 {
public: sec1::EncodedPoint<U48>,
private: EcdsaPrivateKey<48>,
},
NistP521 {
public: sec1::EncodedPoint<U66>,
private: EcdsaPrivateKey<66>,
},
}
impl EcdsaKeypair {
#[cfg(feature = "rand_core")]
#[allow(unused_variables)]
pub fn random(rng: &mut impl CryptoRngCore, curve: EcdsaCurve) -> Result<Self> {
match curve {
#[cfg(feature = "p256")]
EcdsaCurve::NistP256 => {
let private = p256::SecretKey::random(rng);
let public = private.public_key();
Ok(EcdsaKeypair::NistP256 {
private: private.into(),
public: public.into(),
})
}
#[cfg(feature = "p384")]
EcdsaCurve::NistP384 => {
let private = p384::SecretKey::random(rng);
let public = private.public_key();
Ok(EcdsaKeypair::NistP384 {
private: private.into(),
public: public.into(),
})
}
#[cfg(feature = "p521")]
EcdsaCurve::NistP521 => {
let private = p521::SecretKey::random(rng);
let public = private.public_key();
Ok(EcdsaKeypair::NistP521 {
private: private.into(),
public: public.into(),
})
}
#[cfg(not(all(feature = "p256", feature = "p384", feature = "p521")))]
_ => Err(Error::AlgorithmUnknown),
}
}
pub fn algorithm(&self) -> Algorithm {
Algorithm::Ecdsa {
curve: self.curve(),
}
}
pub fn curve(&self) -> EcdsaCurve {
match self {
Self::NistP256 { .. } => EcdsaCurve::NistP256,
Self::NistP384 { .. } => EcdsaCurve::NistP384,
Self::NistP521 { .. } => EcdsaCurve::NistP521,
}
}
pub fn public_key_bytes(&self) -> &[u8] {
match self {
Self::NistP256 { public, .. } => public.as_ref(),
Self::NistP384 { public, .. } => public.as_ref(),
Self::NistP521 { public, .. } => public.as_ref(),
}
}
pub fn private_key_bytes(&self) -> &[u8] {
match self {
Self::NistP256 { private, .. } => private.as_ref(),
Self::NistP384 { private, .. } => private.as_ref(),
Self::NistP521 { private, .. } => private.as_ref(),
}
}
}
impl ConstantTimeEq for EcdsaKeypair {
fn ct_eq(&self, other: &Self) -> Choice {
let public_eq =
Choice::from((EcdsaPublicKey::from(self) == EcdsaPublicKey::from(other)) as u8);
let private_key_a = match self {
Self::NistP256 { private, .. } => private.as_slice(),
Self::NistP384 { private, .. } => private.as_slice(),
Self::NistP521 { private, .. } => private.as_slice(),
};
let private_key_b = match other {
Self::NistP256 { private, .. } => private.as_slice(),
Self::NistP384 { private, .. } => private.as_slice(),
Self::NistP521 { private, .. } => private.as_slice(),
};
public_eq & private_key_a.ct_eq(private_key_b)
}
}
impl Eq for EcdsaKeypair {}
impl PartialEq for EcdsaKeypair {
fn eq(&self, other: &Self) -> bool {
self.ct_eq(other).into()
}
}
impl Decode for EcdsaKeypair {
type Error = Error;
fn decode(reader: &mut impl Reader) -> Result<Self> {
match EcdsaPublicKey::decode(reader)? {
EcdsaPublicKey::NistP256(public) => {
let private = EcdsaPrivateKey::<32>::decode(reader)?;
Ok(Self::NistP256 { public, private })
}
EcdsaPublicKey::NistP384(public) => {
let private = EcdsaPrivateKey::<48>::decode(reader)?;
Ok(Self::NistP384 { public, private })
}
EcdsaPublicKey::NistP521(public) => {
let private = EcdsaPrivateKey::<66>::decode(reader)?;
Ok(Self::NistP521 { public, private })
}
}
}
}
impl Encode for EcdsaKeypair {
fn encoded_len(&self) -> encoding::Result<usize> {
let public_len = EcdsaPublicKey::from(self).encoded_len()?;
let private_len = match self {
Self::NistP256 { private, .. } => private.encoded_len()?,
Self::NistP384 { private, .. } => private.encoded_len()?,
Self::NistP521 { private, .. } => private.encoded_len()?,
};
[public_len, private_len].checked_sum()
}
fn encode(&self, writer: &mut impl Writer) -> encoding::Result<()> {
EcdsaPublicKey::from(self).encode(writer)?;
match self {
Self::NistP256 { private, .. } => private.encode(writer)?,
Self::NistP384 { private, .. } => private.encode(writer)?,
Self::NistP521 { private, .. } => private.encode(writer)?,
}
Ok(())
}
}
impl From<EcdsaKeypair> for EcdsaPublicKey {
fn from(keypair: EcdsaKeypair) -> EcdsaPublicKey {
EcdsaPublicKey::from(&keypair)
}
}
impl From<&EcdsaKeypair> for EcdsaPublicKey {
fn from(keypair: &EcdsaKeypair) -> EcdsaPublicKey {
match keypair {
EcdsaKeypair::NistP256 { public, .. } => EcdsaPublicKey::NistP256(*public),
EcdsaKeypair::NistP384 { public, .. } => EcdsaPublicKey::NistP384(*public),
EcdsaKeypair::NistP521 { public, .. } => EcdsaPublicKey::NistP521(*public),
}
}
}