lib/cose/algorithm/ecdsa.rb in cose-0.10.0 vs lib/cose/algorithm/ecdsa.rb in cose-0.11.0

- old
+ new

@@ -2,10 +2,11 @@ require "cose/algorithm/signature_algorithm" require "cose/error" require "cose/key/ec2" require "openssl" +require "openssl/signature_algorithm/ecdsa" module COSE module Algorithm class ECDSA < SignatureAlgorithm attr_reader :hash_function @@ -14,48 +15,23 @@ super(*args) @hash_function = hash_function end - def compatible_key?(key) - to_pkey(key) - rescue COSE::Error - false - end - private - def valid_signature?(key, signature, verification_data) - pkey = to_pkey(key) - - pkey.verify(hash_function, in_der(signature, pkey.group.degree), verification_data) + def signature_algorithm_class + OpenSSL::SignatureAlgorithm::ECDSA end def to_pkey(key) case key when COSE::Key::EC2 key.to_pkey when OpenSSL::PKey::EC key else raise(COSE::Error, "Incompatible key for algorithm") - end - end - - # Borrowed from jwt rubygem. - # https://github.com/jwt/ruby-jwt/blob/7a6a3f1dbaff806993156d1dff9c217bb2523ff8/lib/jwt/security_utils.rb#L34-L39 - # - # Hopefully this will be provided by openssl rubygem in the future. - def in_der(signature, key_length) - n = (key_length.to_f / BYTE_LENGTH).ceil - - if signature.size == n * 2 - r = signature[0..(n - 1)] - s = signature[n..-1] - - OpenSSL::ASN1::Sequence.new([r, s].map { |int| OpenSSL::ASN1::Integer.new(OpenSSL::BN.new(int, 2)) }).to_der - else - signature end end end end end