Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 20 additions & 0 deletions ssh-key/src/error.rs
Original file line number Diff line number Diff line change
Expand Up @@ -145,18 +145,38 @@ impl From<encoding::pem::Error> for Error {
}
}

#[cfg(not(feature = "std"))]
impl From<signature::Error> for Error {
fn from(_: signature::Error) -> Error {
Error::Crypto
}
}

#[cfg(feature = "std")]
impl From<signature::Error> for Error {
fn from(err: signature::Error) -> Error {
use std::error::Error as _;

err.source()
.and_then(|source| source.downcast_ref().copied())
.unwrap_or(Error::Crypto)
}
}

#[cfg(not(feature = "std"))]
impl From<Error> for signature::Error {
fn from(_: Error) -> signature::Error {
signature::Error::new()
}
}

#[cfg(feature = "std")]
impl From<Error> for signature::Error {
fn from(err: Error) -> signature::Error {
signature::Error::from_source(err)
}
}

#[cfg(feature = "alloc")]
impl From<alloc::string::FromUtf8Error> for Error {
fn from(err: alloc::string::FromUtf8Error) -> Error {
Expand Down
15 changes: 8 additions & 7 deletions ssh-key/src/signature.rs
Original file line number Diff line number Diff line change
Expand Up @@ -282,7 +282,7 @@ impl Signer<Signature> for private::KeypairData {
Self::Ed25519(keypair) => keypair.try_sign(message),
#[cfg(feature = "rsa")]
Self::Rsa(keypair) => keypair.try_sign(message),
_ => Err(signature::Error::new()),
_ => Err(self.algorithm()?.unsupported_error().into()),
}
}
}
Expand All @@ -308,7 +308,7 @@ impl Verifier<Signature> for public::KeyData {
#[cfg(feature = "rsa")]
Self::Rsa(pk) => pk.verify(message, signature),
#[allow(unreachable_patterns)]
_ => Err(signature::Error::new()),
_ => Err(self.algorithm().unsupported_error().into()),
}
}
}
Expand Down Expand Up @@ -338,7 +338,7 @@ impl Verifier<Signature> for DsaPublicKey {
.verify_digest(Sha1::new_with_prefix(message), &signature)
.map_err(|_| signature::Error::new())
}
_ => Err(signature::Error::new()),
_ => Err(signature.algorithm().unsupported_error().into()),
}
}
}
Expand Down Expand Up @@ -557,7 +557,7 @@ impl Signer<Signature> for EcdsaKeypair {
Self::NistP256 { private, .. } => private.try_sign(message),
#[cfg(feature = "p384")]
Self::NistP384 { private, .. } => private.try_sign(message),
_ => Err(signature::Error::new()),
_ => Err(self.algorithm().unsupported_error().into()),
}
}
}
Expand Down Expand Up @@ -591,16 +591,17 @@ impl Verifier<Signature> for EcdsaPublicKey {
let signature = p256::ecdsa::Signature::try_from(signature)?;
verifying_key.verify(message, &signature)
}

#[cfg(feature = "p384")]
EcdsaCurve::NistP384 => {
let verifying_key = p384::ecdsa::VerifyingKey::try_from(self)?;
let signature = p384::ecdsa::Signature::try_from(signature)?;
verifying_key.verify(message, &signature)
}

_ => Err(signature::Error::new()),
_ => Err(signature.algorithm().unsupported_error().into()),
},
_ => Err(signature::Error::new()),
_ => Err(signature.algorithm().unsupported_error().into()),
}
}
}
Expand Down Expand Up @@ -637,7 +638,7 @@ impl Verifier<Signature> for RsaPublicKey {
.map_err(|_| signature::Error::new()),
}
}
_ => Err(signature::Error::new()),
_ => Err(signature.algorithm().unsupported_error().into()),
}
}
}
Expand Down