Cryptographic schema integrity verification for AI tools - Rust implementation using ECDSA P-256.
SchemaPin provides a robust framework for verifying the integrity and authenticity of JSON schemas used by AI tools and services. This Rust implementation uses ECDSA P-256 cryptographic signatures to ensure that schemas haven't been tampered with and come from trusted sources.
This implementation is fully compatible with the Python, JavaScript, and Go implementations, using the same cryptographic standards:
- ECDSA with P-256 curve (secp256r1) for signatures
- SHA-256 for hashing
- PKCS#8 PEM format for key serialization
- ECDSA P-256 Key Generation: Generate ECDSA P-256 key pairs for signing and verification
- Digital Signatures: Sign data using ECDSA with SHA-256
- Signature Verification: Verify signatures to ensure data integrity
- Key ID Calculation: Generate SHA-256 fingerprints for key identification
- PEM Format Support: Full support for PKCS#8 key formats
- Schema Canonicalization: Deterministic JSON serialization for consistent hashing
- Trust Bundles: Offline verification with pre-shared discovery documents
- Resolver Abstraction: Pluggable discovery via local files, trust bundles, or HTTP
- TOFU Key Pinning: Trust-on-first-use key pinning per tool+domain
- Revocation Checking: Combined simple list and standalone document revocation
- Cross-Language Compatibility: Compatible with Python, JavaScript, and Go implementations
Add this to your Cargo.toml:
[dependencies]
schemapin = "1.2.0"To enable HTTP-based discovery (requires async runtime):
[dependencies]
schemapin = { version = "1.2.0", features = ["fetch"] }| Feature | Description |
|---|---|
default |
Everything except HTTP (all types, canonicalize, pinning, resolvers, offline verification) |
fetch |
Adds WellKnownResolver, AsyncSchemaResolver, fetch_well_known(), verify_schema(). Brings in reqwest, tokio, async-trait. |
use schemapin::crypto::{generate_key_pair, sign_data, verify_signature, calculate_key_id};
// Generate a new key pair
let key_pair = generate_key_pair().unwrap();
// Sign some data
let data = b"Hello, World!";
let signature = sign_data(&key_pair.private_key_pem, data).unwrap();
// Verify the signature
let is_valid = verify_signature(&key_pair.public_key_pem, data, &signature).unwrap();
assert!(is_valid);
// Calculate key ID
let key_id = calculate_key_id(&key_pair.public_key_pem).unwrap();
println!("Key ID: {}", key_id);use schemapin::canonicalize::canonicalize_and_hash;
use schemapin::crypto::{generate_key_pair, sign_data};
use schemapin::discovery::build_well_known_response;
use schemapin::pinning::KeyPinStore;
use schemapin::verification::verify_schema_offline;
use serde_json::json;
// Developer: sign a schema
let key_pair = generate_key_pair().unwrap();
let schema = json!({"name": "my_tool", "description": "A useful tool"});
let hash = canonicalize_and_hash(&schema);
let signature = sign_data(&key_pair.private_key_pem, &hash).unwrap();
// Build discovery response
let discovery = build_well_known_response(
&key_pair.public_key_pem, Some("My Corp"), vec![], "1.2",
);
// Client: verify the schema offline
let mut pin_store = KeyPinStore::new();
let result = verify_schema_offline(
&schema, &signature, "example.com", "my_tool",
&discovery, None, &mut pin_store,
);
assert!(result.valid);use schemapin::resolver::TrustBundleResolver;
use schemapin::verification::verify_schema_with_resolver;
use schemapin::pinning::KeyPinStore;
// Load a trust bundle from JSON
let bundle_json = std::fs::read_to_string("trust-bundle.json").unwrap();
let resolver = TrustBundleResolver::from_json(&bundle_json).unwrap();
// Verify using the resolver
let mut pin_store = KeyPinStore::new();
let schema = serde_json::json!({"name": "my_tool"});
let result = verify_schema_with_resolver(
&schema, "base64-signature", "example.com", "my_tool",
&resolver, &mut pin_store,
);# Build (no HTTP dependencies)
cargo build
# Build with HTTP support
cargo build --features fetch
# Run tests
cargo test
# Run tests with all features
cargo test --all-features
# Check code quality
cargo clippy
cargo clippy --all-features
# Format code
cargo fmtThis implementation uses:
- ECDSA with P-256 curve (secp256r1) for signatures
- SHA-256 for hashing and signature algorithms
- Secure random number generation via
OsRng - Constant-time operations where possible
The cryptographic operations are provided by the p256 crate, which implements the ECDSA algorithm according to industry standards.
This Rust implementation is designed to be fully compatible with other SchemaPin implementations:
- Identical signature format: Base64-encoded ECDSA signatures
- Compatible key formats: PKCS#8 PEM encoding
- Same fingerprint calculation: SHA-256 hash of DER-encoded public keys
- Interoperable signatures: Can verify signatures from Python/JavaScript/Go implementations
The crate provides two error types:
crypto::Error: Low-level cryptographic errors (Ecdsa,Pkcs8,Base64,Signature,InvalidKeyFormat)error::Error: Unified error type for the full verification workflow, wrappingcrypto::Errorand addingDiscovery,Revocation,Verification,Json,Io, and feature-gatedHttpvariants
p256: ECDSA P-256 cryptographic operationsrand: Secure random number generationsha2: SHA-256 hashingbase64: Base64 encoding/decodinghex: Hexadecimal encodingserde,serde_json: Serialization supportthiserror: Error derive macroschrono: Timestamp handlingreqwest(optional,fetch): HTTP clienttokio(optional,fetch): Async runtimeasync-trait(optional,fetch): Async trait support
MIT License - see the main project LICENSE file for details.