Skip to content

Commit e7c4368

Browse files
edef1cFiloSottile
authored andcommitted
acme: expect standard ASN.1 signatures from ECDSA Client.Key
Previously, an ECDSA crypto.Signer would have been expected to return a signature in RFC7518 format, which violates crypto.Signer's interface contract. Fixes golang/go#35829 Change-Id: Id0cc2d9296cfb9f89925ab9ac02e12d68eec734b Reviewed-on: https://go-review.googlesource.com/c/crypto/+/209537 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Filippo Valsorda <filippo@golang.org>
1 parent 0a08dad commit e7c4368

File tree

2 files changed

+36
-19
lines changed

2 files changed

+36
-19
lines changed

acme/jws.go

+15-12
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ import (
1111
"crypto/rsa"
1212
"crypto/sha256"
1313
_ "crypto/sha512" // need for EC keys
14+
"encoding/asn1"
1415
"encoding/base64"
1516
"encoding/json"
1617
"fmt"
@@ -126,21 +127,23 @@ func jwkEncode(pub crypto.PublicKey) (string, error) {
126127

127128
// jwsSign signs the digest using the given key.
128129
// The hash is unused for ECDSA keys.
129-
//
130-
// Note: non-stdlib crypto.Signer implementations are expected to return
131-
// the signature in the format as specified in RFC7518.
132-
// See https://tools.ietf.org/html/rfc7518 for more details.
133130
func jwsSign(key crypto.Signer, hash crypto.Hash, digest []byte) ([]byte, error) {
134-
if key, ok := key.(*ecdsa.PrivateKey); ok {
135-
// The key.Sign method of ecdsa returns ASN1-encoded signature.
136-
// So, we use the package Sign function instead
137-
// to get R and S values directly and format the result accordingly.
138-
r, s, err := ecdsa.Sign(rand.Reader, key, digest)
131+
switch pub := key.Public().(type) {
132+
case *rsa.PublicKey:
133+
return key.Sign(rand.Reader, digest, hash)
134+
case *ecdsa.PublicKey:
135+
sigASN1, err := key.Sign(rand.Reader, digest, hash)
139136
if err != nil {
140137
return nil, err
141138
}
142-
rb, sb := r.Bytes(), s.Bytes()
143-
size := key.Params().BitSize / 8
139+
140+
var rs struct{ R, S *big.Int }
141+
if _, err := asn1.Unmarshal(sigASN1, &rs); err != nil {
142+
return nil, err
143+
}
144+
145+
rb, sb := rs.R.Bytes(), rs.S.Bytes()
146+
size := pub.Params().BitSize / 8
144147
if size%8 > 0 {
145148
size++
146149
}
@@ -149,7 +152,7 @@ func jwsSign(key crypto.Signer, hash crypto.Hash, digest []byte) ([]byte, error)
149152
copy(sig[size*2-len(sb):], sb)
150153
return sig, nil
151154
}
152-
return key.Sign(rand.Reader, digest, hash)
155+
return nil, ErrUnsupportedKey
153156
}
154157

155158
// jwsHasher indicates suitable JWS algorithm name and a hash function

acme/jws_test.go

+21-7
Original file line numberDiff line numberDiff line change
@@ -323,6 +323,14 @@ func TestJWSEncodeJSONCustom(t *testing.T) {
323323
// printf 'testsig' | b64raw
324324
testsig = "dGVzdHNpZw"
325325

326+
// the example P256 curve point from https://tools.ietf.org/html/rfc7515#appendix-A.3.1
327+
// encoded as ASN.1…
328+
es256stdsig = "MEUCIA7RIVN5Y2xIPC9/FVgH1AKjsigDOvl8fheBmsMWnqZlAiEA" +
329+
"xQoH04w8cOXY8S2vCEpUgKZlkMXyk1Cajz9/ioOjVNU"
330+
// …and RFC7518 (https://tools.ietf.org/html/rfc7518#section-3.4)
331+
es256jwsig = "DtEhU3ljbEg8L38VWAfUAqOyKAM6-Xx-F4GawxaepmXFCgfTjDxw" +
332+
"5djxLa8ISlSApmWQxfKTUJqPP3-Kg6NU1Q"
333+
326334
// printf '{"alg":"ES256","jwk":{"crv":"P-256","kty":"EC","x":<testKeyECPubY>,"y":<testKeyECPubY>},"nonce":"nonce","url":"url"}' | b64raw
327335
es256phead = "eyJhbGciOiJFUzI1NiIsImp3ayI6eyJjcnYiOiJQLTI1NiIsImt0" +
328336
"eSI6IkVDIiwieCI6IjVsaEV1ZzV4SzR4QkRaMm5BYmF4THRhTGl2" +
@@ -345,19 +353,25 @@ func TestJWSEncodeJSONCustom(t *testing.T) {
345353
)
346354

347355
tt := []struct {
348-
alg, phead string
349-
pub crypto.PublicKey
356+
alg, phead string
357+
pub crypto.PublicKey
358+
stdsig, jwsig string
350359
}{
351-
{"ES256", es256phead, testKeyEC.Public()},
352-
{"RS256", rs256phead, testKey.Public()},
360+
{"ES256", es256phead, testKeyEC.Public(), es256stdsig, es256jwsig},
361+
{"RS256", rs256phead, testKey.Public(), testsig, testsig},
353362
}
354363
for _, tc := range tt {
355364
tc := tc
356365
t.Run(tc.alg, func(t *testing.T) {
366+
stdsig, err := base64.RawStdEncoding.DecodeString(tc.stdsig)
367+
if err != nil {
368+
t.Errorf("couldn't decode test vector: %v", err)
369+
}
357370
signer := &customTestSigner{
358-
sig: []byte("testsig"),
371+
sig: stdsig,
359372
pub: tc.pub,
360373
}
374+
361375
b, err := jwsEncodeJSON(claims, signer, noKeyID, "nonce", "url")
362376
if err != nil {
363377
t.Fatal(err)
@@ -372,8 +386,8 @@ func TestJWSEncodeJSONCustom(t *testing.T) {
372386
if j.Payload != payload {
373387
t.Errorf("j.Payload = %q\nwant %q", j.Payload, payload)
374388
}
375-
if j.Signature != testsig {
376-
t.Errorf("j.Signature = %q\nwant %q", j.Signature, testsig)
389+
if j.Signature != tc.jwsig {
390+
t.Errorf("j.Signature = %q\nwant %q", j.Signature, tc.jwsig)
377391
}
378392
})
379393
}

0 commit comments

Comments
 (0)