Skip to content

Commit 2accae1

Browse files
committed
ECDSA: Add RNG as an input parameter to EcdsaKeyPair::from_pkcs8.
Resolve an old TODO now that we can make breaking API changes.
1 parent b94d61e commit 2accae1

File tree

2 files changed

+24
-14
lines changed

2 files changed

+24
-14
lines changed

src/ec/suite_b/ecdsa/signing.rs

+13-7
Original file line numberDiff line numberDiff line change
@@ -105,15 +105,15 @@ impl EcdsaKeyPair {
105105
pub fn from_pkcs8(
106106
alg: &'static EcdsaSigningAlgorithm,
107107
pkcs8: &[u8],
108+
rng: &dyn rand::SecureRandom,
108109
) -> Result<Self, error::KeyRejected> {
109110
let key_pair = ec::suite_b::key_pair_from_pkcs8(
110111
alg.curve,
111112
alg.pkcs8_template,
112113
untrusted::Input::from(pkcs8),
113114
cpu::features(),
114115
)?;
115-
let rng = rand::SystemRandom::new(); // TODO: make this a parameter.
116-
Self::new(alg, key_pair, &rng)
116+
Self::new(alg, key_pair, rng)
117117
}
118118

119119
/// Constructs an ECDSA key pair from the private key and public key bytes
@@ -136,15 +136,15 @@ impl EcdsaKeyPair {
136136
alg: &'static EcdsaSigningAlgorithm,
137137
private_key: &[u8],
138138
public_key: &[u8],
139+
rng: &dyn rand::SecureRandom,
139140
) -> Result<Self, error::KeyRejected> {
140141
let key_pair = ec::suite_b::key_pair_from_bytes(
141142
alg.curve,
142143
untrusted::Input::from(private_key),
143144
untrusted::Input::from(public_key),
144145
cpu::features(),
145146
)?;
146-
let rng = rand::SystemRandom::new(); // TODO: make this a parameter.
147-
Self::new(alg, key_pair, &rng)
147+
Self::new(alg, key_pair, rng)
148148
}
149149

150150
fn new(
@@ -515,10 +515,12 @@ static EC_PUBLIC_KEY_P384_PKCS8_V1_TEMPLATE: pkcs8::Template = pkcs8::Template {
515515

516516
#[cfg(test)]
517517
mod tests {
518-
use crate::{signature, test};
518+
use crate::{rand, signature, test};
519519

520520
#[test]
521521
fn signature_ecdsa_sign_fixed_test() {
522+
let rng = rand::SystemRandom::new();
523+
522524
test::run(
523525
test_file!("ecdsa_sign_fixed_tests.txt"),
524526
|section, test_case| {
@@ -542,7 +544,8 @@ mod tests {
542544
};
543545

544546
let private_key =
545-
signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q).unwrap();
547+
signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q, &rng)
548+
.unwrap();
546549
let rng = test::rand::FixedSliceRandom { bytes: &k };
547550

548551
let actual_result = private_key
@@ -558,6 +561,8 @@ mod tests {
558561

559562
#[test]
560563
fn signature_ecdsa_sign_asn1_test() {
564+
let rng = rand::SystemRandom::new();
565+
561566
test::run(
562567
test_file!("ecdsa_sign_asn1_tests.txt"),
563568
|section, test_case| {
@@ -581,7 +586,8 @@ mod tests {
581586
};
582587

583588
let private_key =
584-
signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q).unwrap();
589+
signature::EcdsaKeyPair::from_private_key_and_public_key(alg, &d, &q, &rng)
590+
.unwrap();
585591
let rng = test::rand::FixedSliceRandom { bytes: &k };
586592

587593
let actual_result = private_key

tests/ecdsa_tests.rs

+11-7
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ use ring::{
2222

2323
#[test]
2424
fn ecdsa_from_pkcs8_test() {
25+
let rng = rand::SystemRandom::new();
26+
2527
test::run(
2628
test_file!("ecdsa_from_pkcs8_tests.txt"),
2729
|section, test_case| {
@@ -57,7 +59,7 @@ fn ecdsa_from_pkcs8_test() {
5759
let error = test_case.consume_optional_string("Error");
5860

5961
match (
60-
signature::EcdsaKeyPair::from_pkcs8(this_fixed, &input),
62+
signature::EcdsaKeyPair::from_pkcs8(this_fixed, &input, &rng),
6163
error.clone(),
6264
) {
6365
(Ok(_), None) => (),
@@ -67,7 +69,7 @@ fn ecdsa_from_pkcs8_test() {
6769
};
6870

6971
match (
70-
signature::EcdsaKeyPair::from_pkcs8(this_asn1, &input),
72+
signature::EcdsaKeyPair::from_pkcs8(this_asn1, &input, &rng),
7173
error,
7274
) {
7375
(Ok(_), None) => (),
@@ -76,8 +78,8 @@ fn ecdsa_from_pkcs8_test() {
7678
(Err(actual), Some(expected)) => assert_eq!(format!("{}", actual), expected),
7779
};
7880

79-
assert!(signature::EcdsaKeyPair::from_pkcs8(other_fixed, &input).is_err());
80-
assert!(signature::EcdsaKeyPair::from_pkcs8(other_asn1, &input).is_err());
81+
assert!(signature::EcdsaKeyPair::from_pkcs8(other_fixed, &input, &rng).is_err());
82+
assert!(signature::EcdsaKeyPair::from_pkcs8(other_asn1, &input, &rng).is_err());
8183

8284
Ok(())
8385
},
@@ -104,7 +106,7 @@ fn ecdsa_generate_pkcs8_test() {
104106
println!();
105107

106108
#[cfg(feature = "alloc")]
107-
let _ = signature::EcdsaKeyPair::from_pkcs8(*alg, pkcs8.as_ref()).unwrap();
109+
let _ = signature::EcdsaKeyPair::from_pkcs8(*alg, pkcs8.as_ref(), &rng).unwrap();
108110
}
109111
}
110112

@@ -181,9 +183,11 @@ fn ecdsa_test_public_key_coverage() {
181183
const PUBLIC_KEY: &[u8] = include_bytes!("ecdsa_test_public_key_p256.der");
182184
const PUBLIC_KEY_DEBUG: &str = include_str!("ecdsa_test_public_key_p256_debug.txt");
183185

186+
let rng = rand::SystemRandom::new();
184187
let key_pair = signature::EcdsaKeyPair::from_pkcs8(
185188
&signature::ECDSA_P256_SHA256_FIXED_SIGNING,
186189
PRIVATE_KEY,
190+
&rng,
187191
)
188192
.unwrap();
189193

@@ -246,7 +250,7 @@ fn signature_ecdsa_sign_fixed_sign_and_verify_test() {
246250
};
247251

248252
let private_key =
249-
signature::EcdsaKeyPair::from_private_key_and_public_key(signing_alg, &d, &q)
253+
signature::EcdsaKeyPair::from_private_key_and_public_key(signing_alg, &d, &q, &rng)
250254
.unwrap();
251255

252256
let signature = private_key.sign(&rng, &msg).unwrap();
@@ -300,7 +304,7 @@ fn signature_ecdsa_sign_asn1_test() {
300304
};
301305

302306
let private_key =
303-
signature::EcdsaKeyPair::from_private_key_and_public_key(signing_alg, &d, &q)
307+
signature::EcdsaKeyPair::from_private_key_and_public_key(signing_alg, &d, &q, &rng)
304308
.unwrap();
305309

306310
let signature = private_key.sign(&rng, &msg).unwrap();

0 commit comments

Comments
 (0)