/* Copyright Suzhou Tongji Fintech Research Institute 2017 All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package gmtls import ( "crypto" "crypto/ecdsa" "crypto/rsa" "encoding/asn1" "errors" "fmt" "github.com/tjfoc/gmsm/sm2" ) // pickSignatureAlgorithm selects a signature algorithm that is compatible with // the given public key and the list of algorithms from the peer and this side. // The lists of signature algorithms (peerSigAlgs and ourSigAlgs) are ignored // for tlsVersion < VersionTLS12. // // The returned SignatureScheme codepoint is only meaningful for TLS 1.2, // previous TLS versions have a fixed hash function. func pickSignatureAlgorithm(pubkey crypto.PublicKey, peerSigAlgs, ourSigAlgs []SignatureScheme, tlsVersion uint16) (sigAlg SignatureScheme, sigType uint8, hashFunc crypto.Hash, err error) { if tlsVersion < VersionTLS12 || len(peerSigAlgs) == 0 { // For TLS 1.1 and before, the signature algorithm could not be // negotiated and the hash is fixed based on the signature type. // For TLS 1.2, if the client didn't send signature_algorithms // extension then we can assume that it supports SHA1. See // https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1 switch pubkey.(type) { case *rsa.PublicKey: if tlsVersion < VersionTLS12 { return 0, signaturePKCS1v15, crypto.MD5SHA1, nil } else { return PKCS1WithSHA1, signaturePKCS1v15, crypto.SHA1, nil } case *ecdsa.PublicKey: return ECDSAWithSHA1, signatureECDSA, crypto.SHA1, nil case *sm2.PublicKey: return SM2WITHSM3, signatureSM2, crypto.SHA1, nil default: return 0, 0, 0, fmt.Errorf("tls: unsupported public key: %T", pubkey) } } for _, sigAlg := range peerSigAlgs { if !isSupportedSignatureAlgorithm(sigAlg, ourSigAlgs) { continue } hashAlg, err := lookupTLSHash(sigAlg) if err != nil { panic("tls: supported signature algorithm has an unknown hash function") } sigType := signatureFromSignatureScheme(sigAlg) switch pubkey.(type) { case *rsa.PublicKey: if sigType == signaturePKCS1v15 || sigType == signatureRSAPSS { return sigAlg, sigType, hashAlg, nil } case *ecdsa.PublicKey: if sigType == signatureECDSA { return sigAlg, sigType, hashAlg, nil } case *sm2.PublicKey: if sigType == signatureECDSA { return sigAlg, sigType, hashAlg, nil } default: return 0, 0, 0, fmt.Errorf("tls: unsupported public key: %T", pubkey) } } return 0, 0, 0, errors.New("tls: peer doesn't support any common signature algorithms") } // verifyHandshakeSignature verifies a signature against pre-hashed handshake // contents. func verifyHandshakeSignature(sigType uint8, pubkey crypto.PublicKey, hashFunc crypto.Hash, digest, sig []byte) error { switch sigType { case signatureECDSA: pubKey, ok := pubkey.(*ecdsa.PublicKey) if !ok { return errors.New("tls: ECDSA signing requires a ECDSA public key") } ecdsaSig := new(ecdsaSignature) if _, err := asn1.Unmarshal(sig, ecdsaSig); err != nil { return err } if ecdsaSig.R.Sign() <= 0 || ecdsaSig.S.Sign() <= 0 { return errors.New("tls: ECDSA signature contained zero or negative values") } if pubKey.Curve == sm2.P256Sm2() { sm2Public := sm2.PublicKey{ Curve: pubKey.Curve, X: pubKey.X, Y: pubKey.Y, } if !sm2Public.Verify(digest, sig) { return errors.New("tls: SM2 verification failure") } } else if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) { return errors.New("tls: ECDSA verification failure") } case signaturePKCS1v15: pubKey, ok := pubkey.(*rsa.PublicKey) if !ok { return errors.New("tls: RSA signing requires a RSA public key") } if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, digest, sig); err != nil { return err } case signatureRSAPSS: pubKey, ok := pubkey.(*rsa.PublicKey) if !ok { return errors.New("tls: RSA signing requires a RSA public key") } signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash} if err := rsa.VerifyPSS(pubKey, hashFunc, digest, sig, signOpts); err != nil { return err } case signatureSM2: pubKey, ok := pubkey.(*sm2.PublicKey) if !ok { return errors.New("tls: SM2 signing requires a SM2 public key") } if ok := pubKey.Verify(digest, sig); !ok { return errors.New("verify sm2 signature error") } default: return errors.New("tls: unknown signature algorithm") } return nil }