File: signer_linux.go

package info (click to toggle)
golang-github-mendersoftware-mender-artifact 3.9.0%2Bds1-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, experimental
  • size: 4,136 kB
  • sloc: makefile: 128; sh: 128
file content (91 lines) | stat: -rw-r--r-- 2,447 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
// Copyright 2022 Northern.tech AS
//
//    Licensed under the Apache License, Version 2.0 (the "License");
//    you may not use this file except in compliance with the License.
//    You may obtain a copy of the License at
//
//        http://www.apache.org/licenses/LICENSE-2.0
//
//    Unless required by applicable law or agreed to in writing, software
//    distributed under the License is distributed on an "AS IS" BASIS,
//    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//    See the License for the specific language governing permissions and
//    limitations under the License.

//go:build linux
// +build linux

package artifact

import (
	"encoding/base64"
	"strings"

	"github.com/mendersoftware/openssl"
	"github.com/pkg/errors"
)

const (
	pkcs11URIPrefix = "pkcs11:"
	pkcsEngineId    = "pkcs11"
)

type PKCS11Signer struct {
	Key openssl.PrivateKey
}

func NewPKCS11Signer(pkcsKey string) (*PKCS11Signer, error) {
	if len(pkcsKey) == 0 {
		return nil, errors.New("PKCS#11 signer: missing key")
	}

	key, err := loadPrivateKey(pkcsKey, pkcsEngineId)
	if err != nil {
		return nil, errors.Wrap(err, "PKCS#11: failed to load private key")
	}

	return &PKCS11Signer{
		Key: key,
	}, nil
}

func (s *PKCS11Signer) Sign(message []byte) ([]byte, error) {
	sig, err := s.Key.SignPKCS1v15(openssl.SHA256_Method, message[:])
	if err != nil {
		return nil, errors.Wrap(err, "PKCS#11 signer: error signing image")
	}

	enc := make([]byte, base64.StdEncoding.EncodedLen(len(sig)))
	base64.StdEncoding.Encode(enc, sig)
	return enc, nil
}

func (s *PKCS11Signer) Verify(message, sig []byte) error {
	dec := make([]byte, base64.StdEncoding.DecodedLen(len(sig)))
	decLen, err := base64.StdEncoding.Decode(dec, sig)
	if err != nil {
		return errors.Wrap(err, "signer: error decoding signature")
	}
	err = s.Key.VerifyPKCS1v15(openssl.SHA256_Method, message[:], dec[:decLen])
	return errors.Wrap(err, "failed to verify PKCS#11 signature")
}

var engineLoadPrivateKeyFunc = openssl.EngineLoadPrivateKey

func loadPrivateKey(keyFile string, engineId string) (key openssl.PrivateKey, err error) {
	if strings.HasPrefix(keyFile, pkcs11URIPrefix) {
		engine, err := openssl.EngineById(engineId)
		if err != nil {
			return nil, err
		}

		key, err = engineLoadPrivateKeyFunc(engine, keyFile)
		if err != nil {
			return nil, err
		}
	} else {
		return nil, errors.New("PKCS#11 URI prefix not found")
	}

	return key, nil
}