line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
/** |
2
|
|
|
|
|
|
|
* @file rsa.c |
3
|
|
|
|
|
|
|
* @version 950bba4 (HEAD -> master) |
4
|
|
|
|
|
|
|
* |
5
|
|
|
|
|
|
|
* RSA crypto. |
6
|
|
|
|
|
|
|
*/ |
7
|
|
|
|
|
|
|
/* |
8
|
|
|
|
|
|
|
* Copyright (c) 2013-2017 INSIDE Secure Corporation |
9
|
|
|
|
|
|
|
* Copyright (c) PeerSec Networks, 2002-2011 |
10
|
|
|
|
|
|
|
* All Rights Reserved |
11
|
|
|
|
|
|
|
* |
12
|
|
|
|
|
|
|
* The latest version of this code is available at http://www.matrixssl.org |
13
|
|
|
|
|
|
|
* |
14
|
|
|
|
|
|
|
* This software is open source; you can redistribute it and/or modify |
15
|
|
|
|
|
|
|
* it under the terms of the GNU General Public License as published by |
16
|
|
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or |
17
|
|
|
|
|
|
|
* (at your option) any later version. |
18
|
|
|
|
|
|
|
* |
19
|
|
|
|
|
|
|
* This General Public License does NOT permit incorporating this software |
20
|
|
|
|
|
|
|
* into proprietary programs. If you are unable to comply with the GPL, a |
21
|
|
|
|
|
|
|
* commercial license for this software may be purchased from INSIDE at |
22
|
|
|
|
|
|
|
* http://www.insidesecure.com/ |
23
|
|
|
|
|
|
|
* |
24
|
|
|
|
|
|
|
* This program is distributed in WITHOUT ANY WARRANTY; without even the |
25
|
|
|
|
|
|
|
* implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
26
|
|
|
|
|
|
|
* See the GNU General Public License for more details. |
27
|
|
|
|
|
|
|
* |
28
|
|
|
|
|
|
|
* You should have received a copy of the GNU General Public License |
29
|
|
|
|
|
|
|
* along with this program; if not, write to the Free Software |
30
|
|
|
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
31
|
|
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html |
32
|
|
|
|
|
|
|
*/ |
33
|
|
|
|
|
|
|
/******************************************************************************/ |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
#include "../cryptoImpl.h" |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
/******************************************************************************/ |
38
|
|
|
|
|
|
|
/* TODO - the following functions are not implementation layer specific... |
39
|
|
|
|
|
|
|
move to a common file? |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
Matrix-specific starts at #ifdef USE_MATRIX_RSA |
42
|
|
|
|
|
|
|
*/ |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
#define ASN_OVERHEAD_LEN_RSA_SHA2 19 |
45
|
|
|
|
|
|
|
#define ASN_OVERHEAD_LEN_RSA_SHA1 15 |
46
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
#ifdef USE_MATRIX_RSA |
48
|
1057
|
|
|
|
|
|
int32_t pubRsaDecryptSignedElement(psPool_t *pool, psRsaKey_t *key, |
49
|
|
|
|
|
|
|
unsigned char *in, psSize_t inlen, |
50
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
51
|
|
|
|
|
|
|
void *data) |
52
|
|
|
|
|
|
|
{ |
53
|
|
|
|
|
|
|
int32_t signatureAlgorithm, rc; |
54
|
|
|
|
|
|
|
|
55
|
1057
|
|
|
|
|
|
rc = psHashLenToSigAlg(outlen, PS_RSA); |
56
|
1057
|
50
|
|
|
|
|
if (rc < 0) |
57
|
|
|
|
|
|
|
{ |
58
|
0
|
|
|
|
|
|
return rc; |
59
|
|
|
|
|
|
|
} |
60
|
|
|
|
|
|
|
|
61
|
1057
|
|
|
|
|
|
signatureAlgorithm = rc; |
62
|
|
|
|
|
|
|
|
63
|
1057
|
|
|
|
|
|
return pubRsaDecryptSignedElementExt(pool, key, in, inlen, |
64
|
|
|
|
|
|
|
out, outlen, |
65
|
|
|
|
|
|
|
signatureAlgorithm, data); |
66
|
|
|
|
|
|
|
} |
67
|
|
|
|
|
|
|
|
68
|
1057
|
|
|
|
|
|
int32_t pubRsaDecryptSignedElementExt(psPool_t *pool, psRsaKey_t *key, |
69
|
|
|
|
|
|
|
unsigned char *in, psSize_t inlen, |
70
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
71
|
|
|
|
|
|
|
int32_t signatureAlgorithm, void *data) |
72
|
|
|
|
|
|
|
{ |
73
|
|
|
|
|
|
|
unsigned char *c, *front, *end; |
74
|
|
|
|
|
|
|
uint16_t outlenWithAsn, len, plen; |
75
|
|
|
|
|
|
|
int32_t oi, rc; |
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
/* The issue here is that the standard RSA decryption routine requires |
78
|
|
|
|
|
|
|
the user to know the output length (usually just a hash size). With |
79
|
|
|
|
|
|
|
these "digitally signed elements" there is an algorithm |
80
|
|
|
|
|
|
|
identifier surrounding the hash so we use the known magic numbers as |
81
|
|
|
|
|
|
|
additional lengths of the wrapper since it is a defined ASN sequence, |
82
|
|
|
|
|
|
|
ASN algorithm oid, and ASN octet string */ |
83
|
1057
|
50
|
|
|
|
|
if (outlen == SHA256_HASH_SIZE) |
84
|
|
|
|
|
|
|
{ |
85
|
1057
|
|
|
|
|
|
outlenWithAsn = SHA256_HASH_SIZE + ASN_OVERHEAD_LEN_RSA_SHA2; |
86
|
|
|
|
|
|
|
} |
87
|
0
|
0
|
|
|
|
|
else if (outlen == SHA1_HASH_SIZE) |
88
|
|
|
|
|
|
|
{ |
89
|
0
|
|
|
|
|
|
outlenWithAsn = SHA1_HASH_SIZE + ASN_OVERHEAD_LEN_RSA_SHA1; |
90
|
|
|
|
|
|
|
} |
91
|
0
|
0
|
|
|
|
|
else if (outlen == SHA384_HASH_SIZE) |
92
|
|
|
|
|
|
|
{ |
93
|
0
|
|
|
|
|
|
outlenWithAsn = SHA384_HASH_SIZE + ASN_OVERHEAD_LEN_RSA_SHA2; |
94
|
|
|
|
|
|
|
} |
95
|
0
|
0
|
|
|
|
|
else if (outlen == SHA512_HASH_SIZE) |
96
|
|
|
|
|
|
|
{ |
97
|
0
|
|
|
|
|
|
outlenWithAsn = SHA512_HASH_SIZE + ASN_OVERHEAD_LEN_RSA_SHA2; |
98
|
|
|
|
|
|
|
} |
99
|
|
|
|
|
|
|
else |
100
|
|
|
|
|
|
|
{ |
101
|
|
|
|
|
|
|
psTraceIntCrypto("Unsupported decryptSignedElement hash %d\n", outlen); |
102
|
0
|
|
|
|
|
|
return PS_FAILURE; |
103
|
|
|
|
|
|
|
} |
104
|
|
|
|
|
|
|
|
105
|
1057
|
|
|
|
|
|
front = c = psMalloc(pool, outlenWithAsn); |
106
|
1057
|
50
|
|
|
|
|
if (front == NULL) |
107
|
|
|
|
|
|
|
{ |
108
|
0
|
|
|
|
|
|
return PS_MEM_FAIL; |
109
|
|
|
|
|
|
|
} |
110
|
|
|
|
|
|
|
|
111
|
1057
|
50
|
|
|
|
|
if ((rc = psRsaDecryptPub(pool, key, in, inlen, c, outlenWithAsn, data)) < 0) |
112
|
|
|
|
|
|
|
{ |
113
|
0
|
|
|
|
|
|
psFree(front, pool); |
114
|
|
|
|
|
|
|
psTraceCrypto("Couldn't public decrypt signed element\n"); |
115
|
0
|
|
|
|
|
|
return rc; |
116
|
|
|
|
|
|
|
} |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
/* Parse it */ |
119
|
1057
|
|
|
|
|
|
end = c + outlenWithAsn; |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
/* @note Below we do a typecast to const to avoid a compiler warning, |
122
|
|
|
|
|
|
|
although it should be fine to pass a non const pointer into an |
123
|
|
|
|
|
|
|
api declaring it const, since it is just the API declaring the |
124
|
|
|
|
|
|
|
contents will not be modified within the API. */ |
125
|
1057
|
50
|
|
|
|
|
if (getAsnSequence((const unsigned char **) &c, |
126
|
1057
|
|
|
|
|
|
(uint16_t) (end - c), &len) < 0) |
127
|
|
|
|
|
|
|
{ |
128
|
|
|
|
|
|
|
psTraceCrypto("Couldn't parse signed element sequence\n"); |
129
|
0
|
|
|
|
|
|
psFree(front, pool); |
130
|
0
|
|
|
|
|
|
return PS_FAILURE; |
131
|
|
|
|
|
|
|
} |
132
|
1057
|
50
|
|
|
|
|
if (getAsnAlgorithmIdentifier((const unsigned char **) &c, |
133
|
1057
|
|
|
|
|
|
(uint16_t) (end - c), &oi, &plen) < 0) |
134
|
|
|
|
|
|
|
{ |
135
|
|
|
|
|
|
|
psTraceCrypto("Couldn't parse signed element octet string\n"); |
136
|
0
|
|
|
|
|
|
psFree(front, pool); |
137
|
0
|
|
|
|
|
|
return PS_FAILURE; |
138
|
|
|
|
|
|
|
} |
139
|
|
|
|
|
|
|
|
140
|
1057
|
50
|
|
|
|
|
if (oi == OID_SHA256_ALG) |
141
|
|
|
|
|
|
|
{ |
142
|
1057
|
50
|
|
|
|
|
psAssert(outlen == SHA256_HASH_SIZE); |
143
|
|
|
|
|
|
|
} |
144
|
0
|
0
|
|
|
|
|
else if (oi == OID_SHA1_ALG) |
145
|
|
|
|
|
|
|
{ |
146
|
0
|
0
|
|
|
|
|
psAssert(outlen == SHA1_HASH_SIZE); |
147
|
|
|
|
|
|
|
} |
148
|
0
|
0
|
|
|
|
|
else if (oi == OID_SHA384_ALG) |
149
|
|
|
|
|
|
|
{ |
150
|
0
|
0
|
|
|
|
|
psAssert(outlen == SHA384_HASH_SIZE); |
151
|
|
|
|
|
|
|
} |
152
|
|
|
|
|
|
|
# ifdef USE_MD2 |
153
|
|
|
|
|
|
|
else if (oi == OID_MD2_ALG) |
154
|
|
|
|
|
|
|
{ |
155
|
|
|
|
|
|
|
psAssert(outlen == MD5_HASH_SIZE); |
156
|
|
|
|
|
|
|
} |
157
|
|
|
|
|
|
|
# endif /* USE_MD2 */ |
158
|
|
|
|
|
|
|
# ifdef USE_MD5 |
159
|
0
|
0
|
|
|
|
|
else if (oi == OID_MD5_ALG) |
160
|
|
|
|
|
|
|
{ |
161
|
0
|
0
|
|
|
|
|
psAssert(outlen == MD5_HASH_SIZE); |
162
|
|
|
|
|
|
|
} |
163
|
|
|
|
|
|
|
# endif /* USE_MD5 */ |
164
|
|
|
|
|
|
|
else |
165
|
|
|
|
|
|
|
{ |
166
|
0
|
0
|
|
|
|
|
psAssert(outlen == SHA512_HASH_SIZE); |
167
|
|
|
|
|
|
|
} |
168
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
/* Note the last test here requires the buffer to be exactly outlen bytes */ |
170
|
2114
|
50
|
|
|
|
|
if ((end - c) < 1 || (*c++ != ASN_OCTET_STRING) || |
171
|
2114
|
50
|
|
|
|
|
getAsnLength((const unsigned char **) &c, (uint16_t) (end - c), &len) < 0 || |
172
|
1057
|
|
|
|
|
|
(uint32_t) (end - c) != outlen) |
173
|
|
|
|
|
|
|
{ |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
psTraceCrypto("Couldn't parse signed element octet string\n"); |
176
|
0
|
|
|
|
|
|
psFree(front, pool); |
177
|
0
|
|
|
|
|
|
return PS_FAILURE; |
178
|
|
|
|
|
|
|
} |
179
|
|
|
|
|
|
|
/* Will finally be sitting at the hash now */ |
180
|
1057
|
|
|
|
|
|
memcpy(out, c, outlen); |
181
|
1057
|
|
|
|
|
|
psFree(front, pool); |
182
|
1057
|
|
|
|
|
|
return PS_SUCCESS; |
183
|
|
|
|
|
|
|
} |
184
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
/* |
186
|
|
|
|
|
|
|
ASN wrappers around standard hash signatures. These versions sign |
187
|
|
|
|
|
|
|
a BER wrapped hash. Here are the well-defined wrappers: |
188
|
|
|
|
|
|
|
*/ |
189
|
|
|
|
|
|
|
static const unsigned char asn256dsWrap[] = { 0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, |
190
|
|
|
|
|
|
|
0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02,0x01, 0x05, 0x00, 0x04, 0x20 }; |
191
|
|
|
|
|
|
|
# ifdef USE_SHA384 |
192
|
|
|
|
|
|
|
static const unsigned char asn384dsWrap[] = { 0x30, 0x41, 0x30, 0x0D, 0x06, 0x09, 0x60, |
193
|
|
|
|
|
|
|
0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02,0x02, 0x05, 0x00, 0x04, 0x30 }; |
194
|
|
|
|
|
|
|
# endif |
195
|
|
|
|
|
|
|
static const unsigned char asn1dsWrap[] = { 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, |
196
|
|
|
|
|
|
|
0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14 }; |
197
|
|
|
|
|
|
|
|
198
|
1146
|
|
|
|
|
|
int32_t privRsaEncryptSignedElement(psPool_t *pool, psRsaKey_t *key, |
199
|
|
|
|
|
|
|
const unsigned char *in, psSize_t inlen, |
200
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
201
|
|
|
|
|
|
|
void *data) |
202
|
|
|
|
|
|
|
{ |
203
|
|
|
|
|
|
|
unsigned char c[MAX_HASH_SIZE + ASN_OVERHEAD_LEN_RSA_SHA2]; |
204
|
|
|
|
|
|
|
uint32_t inlenWithAsn; |
205
|
|
|
|
|
|
|
|
206
|
1146
|
|
|
|
|
|
switch (inlen) |
207
|
|
|
|
|
|
|
{ |
208
|
|
|
|
|
|
|
# ifdef USE_SHA256 |
209
|
|
|
|
|
|
|
case SHA256_HASH_SIZE: |
210
|
1146
|
|
|
|
|
|
inlenWithAsn = inlen + ASN_OVERHEAD_LEN_RSA_SHA2; |
211
|
1146
|
|
|
|
|
|
memcpy(c, asn256dsWrap, ASN_OVERHEAD_LEN_RSA_SHA2); |
212
|
1146
|
|
|
|
|
|
memcpy(c + ASN_OVERHEAD_LEN_RSA_SHA2, in, inlen); |
213
|
1146
|
|
|
|
|
|
break; |
214
|
|
|
|
|
|
|
# endif |
215
|
|
|
|
|
|
|
# ifdef USE_SHA1 |
216
|
|
|
|
|
|
|
case SHA1_HASH_SIZE: |
217
|
0
|
|
|
|
|
|
inlenWithAsn = inlen + ASN_OVERHEAD_LEN_RSA_SHA1; |
218
|
0
|
|
|
|
|
|
memcpy(c, asn1dsWrap, ASN_OVERHEAD_LEN_RSA_SHA1); |
219
|
0
|
|
|
|
|
|
memcpy(c + ASN_OVERHEAD_LEN_RSA_SHA1, in, inlen); |
220
|
0
|
|
|
|
|
|
break; |
221
|
|
|
|
|
|
|
# endif |
222
|
|
|
|
|
|
|
# ifdef USE_SHA384 |
223
|
|
|
|
|
|
|
case SHA384_HASH_SIZE: |
224
|
0
|
|
|
|
|
|
inlenWithAsn = inlen + ASN_OVERHEAD_LEN_RSA_SHA2; |
225
|
0
|
|
|
|
|
|
memcpy(c, asn384dsWrap, ASN_OVERHEAD_LEN_RSA_SHA2); |
226
|
0
|
|
|
|
|
|
memcpy(c + ASN_OVERHEAD_LEN_RSA_SHA2, in, inlen); |
227
|
0
|
|
|
|
|
|
break; |
228
|
|
|
|
|
|
|
# endif |
229
|
|
|
|
|
|
|
default: |
230
|
0
|
|
|
|
|
|
return PS_UNSUPPORTED_FAIL; |
231
|
|
|
|
|
|
|
} |
232
|
1146
|
50
|
|
|
|
|
if (psRsaEncryptPriv(pool, key, c, inlenWithAsn, |
233
|
|
|
|
|
|
|
out, outlen, data) < 0) |
234
|
|
|
|
|
|
|
{ |
235
|
|
|
|
|
|
|
psTraceCrypto("privRsaEncryptSignedElement failed\n"); |
236
|
0
|
|
|
|
|
|
memzero_s(c, sizeof(c)); |
237
|
0
|
|
|
|
|
|
return PS_PLATFORM_FAIL; |
238
|
|
|
|
|
|
|
} |
239
|
1146
|
|
|
|
|
|
memzero_s(c, sizeof(c)); |
240
|
1146
|
|
|
|
|
|
return PS_SUCCESS; |
241
|
|
|
|
|
|
|
} |
242
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
/******************************************************************************/ |
244
|
|
|
|
|
|
|
/** |
245
|
|
|
|
|
|
|
Initialize an allocated RSA key. |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
@note that in this case, a psRsaKey_t is a structure type. |
248
|
|
|
|
|
|
|
This means that the caller must have statically or dynamically allocated |
249
|
|
|
|
|
|
|
the structure before calling this Api. |
250
|
|
|
|
|
|
|
|
251
|
|
|
|
|
|
|
TODO, may not be necessary, since crypt apis also take pool. |
252
|
|
|
|
|
|
|
@param[in] pool The pool to use to allocate any temporary working memory |
253
|
|
|
|
|
|
|
beyond what is provided in the 'key' structure. |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
@param[in,out] key A pointer to an allocated (statically or dynamically) |
256
|
|
|
|
|
|
|
key structure to be initalized as a blank RSA keypair. |
257
|
|
|
|
|
|
|
*/ |
258
|
3541
|
|
|
|
|
|
int32_t psRsaInitKey(psPool_t *pool, psRsaKey_t *key) |
259
|
|
|
|
|
|
|
{ |
260
|
3541
|
50
|
|
|
|
|
if (!key) |
261
|
|
|
|
|
|
|
{ |
262
|
0
|
|
|
|
|
|
return PS_MEM_FAIL; |
263
|
|
|
|
|
|
|
} |
264
|
3541
|
|
|
|
|
|
memset(key, 0x0, sizeof(psRsaKey_t)); |
265
|
3541
|
|
|
|
|
|
key->pool = pool; |
266
|
3541
|
|
|
|
|
|
return PS_SUCCESS; |
267
|
|
|
|
|
|
|
} |
268
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
/* |
270
|
|
|
|
|
|
|
Zero an RSA key. The caller is responsible for freeing 'key' if it is |
271
|
|
|
|
|
|
|
allocated (or not if it is static, or stack based). |
272
|
|
|
|
|
|
|
*/ |
273
|
3290
|
|
|
|
|
|
void psRsaClearKey(psRsaKey_t *key) |
274
|
|
|
|
|
|
|
{ |
275
|
3290
|
|
|
|
|
|
pstm_clear(&(key->N)); |
276
|
3290
|
|
|
|
|
|
pstm_clear(&(key->e)); |
277
|
3290
|
|
|
|
|
|
pstm_clear(&(key->d)); |
278
|
3290
|
|
|
|
|
|
pstm_clear(&(key->p)); |
279
|
3290
|
|
|
|
|
|
pstm_clear(&(key->q)); |
280
|
3290
|
|
|
|
|
|
pstm_clear(&(key->dP)); |
281
|
3290
|
|
|
|
|
|
pstm_clear(&(key->dQ)); |
282
|
3290
|
|
|
|
|
|
pstm_clear(&(key->qP)); |
283
|
3290
|
|
|
|
|
|
key->size = 0; |
284
|
3290
|
|
|
|
|
|
key->optimized = 0; |
285
|
3290
|
|
|
|
|
|
key->pool = NULL; |
286
|
3290
|
|
|
|
|
|
} |
287
|
|
|
|
|
|
|
|
288
|
|
|
|
|
|
|
/* 'to' key digits are allocated here */ |
289
|
128
|
|
|
|
|
|
int32_t psRsaCopyKey(psRsaKey_t *to, const psRsaKey_t *from) |
290
|
|
|
|
|
|
|
{ |
291
|
128
|
|
|
|
|
|
int32_t err = 0; |
292
|
|
|
|
|
|
|
|
293
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->N, &from->N, 0)) != PSTM_OKAY) |
294
|
|
|
|
|
|
|
{ |
295
|
0
|
|
|
|
|
|
goto error; |
296
|
|
|
|
|
|
|
} |
297
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->e, &from->e, 0)) != PSTM_OKAY) |
298
|
|
|
|
|
|
|
{ |
299
|
0
|
|
|
|
|
|
goto error; |
300
|
|
|
|
|
|
|
} |
301
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->d, &from->d, 0)) != PSTM_OKAY) |
302
|
|
|
|
|
|
|
{ |
303
|
0
|
|
|
|
|
|
goto error; |
304
|
|
|
|
|
|
|
} |
305
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->p, &from->p, 0)) != PSTM_OKAY) |
306
|
|
|
|
|
|
|
{ |
307
|
0
|
|
|
|
|
|
goto error; |
308
|
|
|
|
|
|
|
} |
309
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->q, &from->q, 0)) != PSTM_OKAY) |
310
|
|
|
|
|
|
|
{ |
311
|
0
|
|
|
|
|
|
goto error; |
312
|
|
|
|
|
|
|
} |
313
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->dP, &from->dP, 0)) != PSTM_OKAY) |
314
|
|
|
|
|
|
|
{ |
315
|
0
|
|
|
|
|
|
goto error; |
316
|
|
|
|
|
|
|
} |
317
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->dQ, &from->dQ, 0)) != PSTM_OKAY) |
318
|
|
|
|
|
|
|
{ |
319
|
0
|
|
|
|
|
|
goto error; |
320
|
|
|
|
|
|
|
} |
321
|
128
|
50
|
|
|
|
|
if ((err = pstm_init_copy(from->pool, &to->qP, &from->qP, 0)) != PSTM_OKAY) |
322
|
|
|
|
|
|
|
{ |
323
|
0
|
|
|
|
|
|
goto error; |
324
|
|
|
|
|
|
|
} |
325
|
128
|
|
|
|
|
|
to->size = from->size; |
326
|
128
|
|
|
|
|
|
to->optimized = from->optimized; |
327
|
128
|
|
|
|
|
|
to->pool = from->pool; |
328
|
|
|
|
|
|
|
error: |
329
|
128
|
50
|
|
|
|
|
if (err < 0) |
330
|
|
|
|
|
|
|
{ |
331
|
0
|
|
|
|
|
|
psRsaClearKey(to); |
332
|
|
|
|
|
|
|
} |
333
|
128
|
|
|
|
|
|
return err; |
334
|
|
|
|
|
|
|
} |
335
|
|
|
|
|
|
|
#endif /* USE_MATRIX_RSA */ |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
#ifdef USE_RSA |
338
|
|
|
|
|
|
|
/******************************************************************************/ |
339
|
|
|
|
|
|
|
/** |
340
|
|
|
|
|
|
|
Get the size in bytes of the RSA public exponent. |
341
|
|
|
|
|
|
|
Eg. 128 for 1024 bit RSA keys, 256 for 2048 and 512 for 4096 bit keys. |
342
|
|
|
|
|
|
|
@param[in] key RSA key |
343
|
|
|
|
|
|
|
@return Number of bytes of public exponent. |
344
|
|
|
|
|
|
|
*/ |
345
|
3153
|
|
|
|
|
|
psSize_t psRsaSize(const psRsaKey_t *key) |
346
|
|
|
|
|
|
|
{ |
347
|
3153
|
|
|
|
|
|
return key->size; |
348
|
|
|
|
|
|
|
} |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
/******************************************************************************/ |
351
|
|
|
|
|
|
|
/** |
352
|
|
|
|
|
|
|
Compare if the public modulus and exponent is the same between two keys. |
353
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
@return < 0 on failure, >= 0 on success. |
355
|
|
|
|
|
|
|
*/ |
356
|
250
|
|
|
|
|
|
int32_t psRsaCmpPubKey(const psRsaKey_t *k1, const psRsaKey_t *k2) |
357
|
|
|
|
|
|
|
{ |
358
|
500
|
|
|
|
|
|
if ((pstm_cmp(&k1->N, &k2->N) == PSTM_EQ) && |
359
|
250
|
|
|
|
|
|
(pstm_cmp(&k1->e, &k2->e) == PSTM_EQ)) |
360
|
|
|
|
|
|
|
{ |
361
|
250
|
|
|
|
|
|
return PS_SUCCESS; |
362
|
|
|
|
|
|
|
} |
363
|
0
|
|
|
|
|
|
return PS_FAIL; |
364
|
|
|
|
|
|
|
} |
365
|
|
|
|
|
|
|
|
366
|
|
|
|
|
|
|
# ifdef OLD |
367
|
|
|
|
|
|
|
/******************************************************************************/ |
368
|
|
|
|
|
|
|
/* |
369
|
|
|
|
|
|
|
*/ |
370
|
|
|
|
|
|
|
static int32_t getBig(psPool_t *pool, const unsigned char **pp, psSize_t len, |
371
|
|
|
|
|
|
|
pstm_int *big) |
372
|
|
|
|
|
|
|
{ |
373
|
|
|
|
|
|
|
const unsigned char *p = *pp; |
374
|
|
|
|
|
|
|
psSize_t vlen; |
375
|
|
|
|
|
|
|
|
376
|
|
|
|
|
|
|
if (len < 1 || *(p++) != ASN_INTEGER || |
377
|
|
|
|
|
|
|
getAsnLength(&p, len - 1, &vlen) < 0 || (len - 1) < vlen) |
378
|
|
|
|
|
|
|
{ |
379
|
|
|
|
|
|
|
return PS_PARSE_FAIL; |
380
|
|
|
|
|
|
|
} |
381
|
|
|
|
|
|
|
/* Make a smart size since we know the length */ |
382
|
|
|
|
|
|
|
if (pstm_init_for_read_unsigned_bin(pool, big, vlen) != PSTM_OKAY) |
383
|
|
|
|
|
|
|
{ |
384
|
|
|
|
|
|
|
return PS_MEM_FAIL; |
385
|
|
|
|
|
|
|
} |
386
|
|
|
|
|
|
|
if (pstm_read_unsigned_bin(big, p, vlen) != 0) |
387
|
|
|
|
|
|
|
{ |
388
|
|
|
|
|
|
|
pstm_clear(big); |
389
|
|
|
|
|
|
|
psTraceCrypto("ASN getBig failed\n"); |
390
|
|
|
|
|
|
|
return PS_PARSE_FAIL; |
391
|
|
|
|
|
|
|
} |
392
|
|
|
|
|
|
|
*pp = p + vlen; |
393
|
|
|
|
|
|
|
return PS_SUCCESS; |
394
|
|
|
|
|
|
|
} |
395
|
|
|
|
|
|
|
# endif |
396
|
|
|
|
|
|
|
|
397
|
|
|
|
|
|
|
/******************************************************************************/ |
398
|
|
|
|
|
|
|
/** |
399
|
|
|
|
|
|
|
Parse an RSA public key from an ASN.1 byte stream. |
400
|
|
|
|
|
|
|
@return < 0 on error, >= 0 on success. |
401
|
|
|
|
|
|
|
*/ |
402
|
2774
|
|
|
|
|
|
int32_t psRsaParseAsnPubKey(psPool_t *pool, |
403
|
|
|
|
|
|
|
const unsigned char **pp, psSize_t len, |
404
|
|
|
|
|
|
|
psRsaKey_t *key, unsigned char sha1KeyHash[SHA1_HASH_SIZE]) |
405
|
|
|
|
|
|
|
{ |
406
|
|
|
|
|
|
|
# ifdef USE_SHA1 |
407
|
|
|
|
|
|
|
psDigestContext_t dc; |
408
|
|
|
|
|
|
|
# endif |
409
|
2774
|
|
|
|
|
|
const unsigned char *p = *pp; |
410
|
|
|
|
|
|
|
const unsigned char *end; |
411
|
|
|
|
|
|
|
psSize_t keylen, seqlen; |
412
|
|
|
|
|
|
|
|
413
|
5548
|
50
|
|
|
|
|
if (len < 1 || (*(p++) != ASN_BIT_STRING) || |
414
|
5548
|
50
|
|
|
|
|
getAsnLength(&p, len - 1, &keylen) < 0 || |
415
|
2774
|
|
|
|
|
|
(len - 1) < keylen) |
416
|
|
|
|
|
|
|
{ |
417
|
|
|
|
|
|
|
goto L_FAIL; |
418
|
|
|
|
|
|
|
} |
419
|
2774
|
50
|
|
|
|
|
if (*p++ != 0) |
420
|
|
|
|
|
|
|
{ |
421
|
0
|
|
|
|
|
|
goto L_FAIL; |
422
|
|
|
|
|
|
|
} |
423
|
2774
|
50
|
|
|
|
|
if (keylen < 1) |
424
|
|
|
|
|
|
|
{ |
425
|
0
|
|
|
|
|
|
goto L_FAIL; |
426
|
|
|
|
|
|
|
} |
427
|
|
|
|
|
|
|
# ifdef USE_SHA1 |
428
|
|
|
|
|
|
|
/* A public key hash is used in PKI tools (OCSP, Trusted CA indication). |
429
|
|
|
|
|
|
|
Standard RSA form - SHA-1 hash of the value of the BIT STRING |
430
|
|
|
|
|
|
|
subjectPublicKey [excluding the tag, length, and number of unused |
431
|
|
|
|
|
|
|
bits] */ |
432
|
2774
|
|
|
|
|
|
psSha1PreInit(&dc.sha1); |
433
|
2774
|
|
|
|
|
|
psSha1Init(&dc.sha1); |
434
|
2774
|
|
|
|
|
|
psSha1Update(&dc.sha1, p, keylen - 1); |
435
|
2774
|
|
|
|
|
|
psSha1Final(&dc.sha1, sha1KeyHash); |
436
|
|
|
|
|
|
|
# endif |
437
|
|
|
|
|
|
|
|
438
|
2774
|
50
|
|
|
|
|
if (getAsnSequence(&p, keylen, &seqlen) < 0) |
439
|
|
|
|
|
|
|
{ |
440
|
0
|
|
|
|
|
|
goto L_FAIL; |
441
|
|
|
|
|
|
|
} |
442
|
|
|
|
|
|
|
|
443
|
2774
|
|
|
|
|
|
end = p + seqlen; |
444
|
5548
|
|
|
|
|
|
if (pstm_read_asn(pool, &p, (uint16_t) (end - p), &key->N) < 0 || |
445
|
2774
|
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &key->e) < 0) |
446
|
|
|
|
|
|
|
{ |
447
|
|
|
|
|
|
|
|
448
|
|
|
|
|
|
|
goto L_FAIL; |
449
|
|
|
|
|
|
|
} |
450
|
2774
|
|
|
|
|
|
key->size = pstm_unsigned_bin_size(&key->N); |
451
|
2774
|
|
|
|
|
|
key->pool = pool; |
452
|
|
|
|
|
|
|
# ifdef USE_TILERA_RSA |
453
|
|
|
|
|
|
|
# ifdef USE_RSA_PUBLIC_NONBLOCKING |
454
|
|
|
|
|
|
|
key->nonBlock = 1; |
455
|
|
|
|
|
|
|
# else |
456
|
|
|
|
|
|
|
key->nonBlock = 0; |
457
|
|
|
|
|
|
|
# endif |
458
|
|
|
|
|
|
|
# endif |
459
|
2774
|
|
|
|
|
|
*pp = p; |
460
|
2774
|
|
|
|
|
|
return PS_SUCCESS; |
461
|
|
|
|
|
|
|
L_FAIL: |
462
|
|
|
|
|
|
|
psTraceIntCrypto("psRsaReadAsnPubKey error on byte %d\n", p - *pp); |
463
|
2774
|
|
|
|
|
|
return PS_PARSE_FAIL; |
464
|
|
|
|
|
|
|
} |
465
|
|
|
|
|
|
|
|
466
|
|
|
|
|
|
|
# ifdef USE_PRIVATE_KEY_PARSING |
467
|
|
|
|
|
|
|
/******************************************************************************/ |
468
|
|
|
|
|
|
|
/** |
469
|
|
|
|
|
|
|
Parse a a private key structure in DER formatted ASN.1 |
470
|
|
|
|
|
|
|
Per ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf |
471
|
|
|
|
|
|
|
RSAPrivateKey ::= SEQUENCE { |
472
|
|
|
|
|
|
|
version Version, |
473
|
|
|
|
|
|
|
modulus INTEGER, -- n |
474
|
|
|
|
|
|
|
publicExponent INTEGER, -- e |
475
|
|
|
|
|
|
|
privateExponent INTEGER, -- d |
476
|
|
|
|
|
|
|
prime1 INTEGER, -- p |
477
|
|
|
|
|
|
|
prime2 INTEGER, -- q |
478
|
|
|
|
|
|
|
exponent1 INTEGER, -- d mod (p-1) |
479
|
|
|
|
|
|
|
exponent2 INTEGER, -- d mod (q-1) |
480
|
|
|
|
|
|
|
coefficient INTEGER, -- (inverse of q) mod p |
481
|
|
|
|
|
|
|
otherPrimeInfos OtherPrimeInfos OPTIONAL |
482
|
|
|
|
|
|
|
} |
483
|
|
|
|
|
|
|
Version ::= INTEGER { two-prime(0), multi(1) } |
484
|
|
|
|
|
|
|
(CONSTRAINED BY {-- version must be multi if otherPrimeInfos present --}) |
485
|
|
|
|
|
|
|
|
486
|
|
|
|
|
|
|
Which should look something like this in hex (pipe character |
487
|
|
|
|
|
|
|
is used as a delimiter): |
488
|
|
|
|
|
|
|
ftp://ftp.rsa.com/pub/pkcs/ascii/layman.asc |
489
|
|
|
|
|
|
|
30 Tag in binary: 00|1|10000 -> UNIVERSAL | CONSTRUCTED | SEQUENCE (16) |
490
|
|
|
|
|
|
|
82 Length in binary: 1 | 0000010 -> LONG LENGTH | LENGTH BYTES (2) |
491
|
|
|
|
|
|
|
04 A4 Length Bytes (1188) |
492
|
|
|
|
|
|
|
02 Tag in binary: 00|0|00010 -> UNIVERSAL | PRIMITIVE | INTEGER (2) |
493
|
|
|
|
|
|
|
01 Length in binary: 0|0000001 -> SHORT LENGTH | LENGTH (1) |
494
|
|
|
|
|
|
|
00 INTEGER value (0) - RSAPrivateKey.version |
495
|
|
|
|
|
|
|
02 Tag in binary: 00|0|00010 -> UNIVERSAL | PRIMITIVE | INTEGER (2) |
496
|
|
|
|
|
|
|
82 Length in binary: 1 | 0000010 -> LONG LENGTH | LENGTH BYTES (2) |
497
|
|
|
|
|
|
|
01 01 Length Bytes (257) |
498
|
|
|
|
|
|
|
[] 257 Bytes of data - RSAPrivateKey.modulus (2048 bit key) |
499
|
|
|
|
|
|
|
02 Tag in binary: 00|0|00010 -> UNIVERSAL | PRIMITIVE | INTEGER (2) |
500
|
|
|
|
|
|
|
03 Length in binary: 0|0000011 -> SHORT LENGTH | LENGTH (3) |
501
|
|
|
|
|
|
|
01 00 01 INTEGER value (65537) - RSAPrivateKey.publicExponent |
502
|
|
|
|
|
|
|
... |
503
|
|
|
|
|
|
|
|
504
|
|
|
|
|
|
|
OtherPrimeInfos is not supported in this routine, and an error will be |
505
|
|
|
|
|
|
|
returned if they are present |
506
|
|
|
|
|
|
|
|
507
|
|
|
|
|
|
|
@return < 0 on error, >= 0 on success. |
508
|
|
|
|
|
|
|
*/ |
509
|
383
|
|
|
|
|
|
int32_t psRsaParsePkcs1PrivKey(psPool_t *pool, |
510
|
|
|
|
|
|
|
const unsigned char *p, psSize_t size, |
511
|
|
|
|
|
|
|
psRsaKey_t *key) |
512
|
|
|
|
|
|
|
{ |
513
|
|
|
|
|
|
|
const unsigned char *end, *seq; |
514
|
|
|
|
|
|
|
int32_t version; |
515
|
|
|
|
|
|
|
psSize_t seqlen; |
516
|
|
|
|
|
|
|
|
517
|
383
|
50
|
|
|
|
|
if (psRsaInitKey(pool, key) < 0) |
518
|
|
|
|
|
|
|
{ |
519
|
0
|
|
|
|
|
|
return PS_MEM_FAIL; |
520
|
|
|
|
|
|
|
} |
521
|
383
|
|
|
|
|
|
end = p + size; |
522
|
383
|
100
|
|
|
|
|
if (getAsnSequence(&p, size, &seqlen) < 0) |
523
|
|
|
|
|
|
|
{ |
524
|
2
|
|
|
|
|
|
psRsaClearKey(key); |
525
|
2
|
|
|
|
|
|
return PS_PARSE_FAIL; |
526
|
|
|
|
|
|
|
} |
527
|
381
|
|
|
|
|
|
seq = p; |
528
|
762
|
50
|
|
|
|
|
if (getAsnInteger(&p, (uint16_t) (end - p), &version) < 0 || version != 0 || |
529
|
632
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->N)) < 0 || |
530
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->e)) < 0 || |
531
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->d)) < 0 || |
532
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->p)) < 0 || |
533
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->q)) < 0 || |
534
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->dP)) < 0 || |
535
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->dQ)) < 0 || |
536
|
502
|
50
|
|
|
|
|
pstm_read_asn(pool, &p, (uint16_t) (end - p), &(key->qP)) < 0 || |
537
|
251
|
|
|
|
|
|
(uint16_t) (p - seq) != seqlen) |
538
|
|
|
|
|
|
|
{ |
539
|
|
|
|
|
|
|
|
540
|
|
|
|
|
|
|
psTraceCrypto("ASN RSA private key extract parse error\n"); |
541
|
130
|
|
|
|
|
|
psRsaClearKey(key); |
542
|
130
|
|
|
|
|
|
return PS_PARSE_FAIL; |
543
|
|
|
|
|
|
|
} |
544
|
|
|
|
|
|
|
|
545
|
|
|
|
|
|
|
# ifdef USE_TILERA_RSA |
546
|
|
|
|
|
|
|
/* EIP-54 usage limitation that some operands must be larger than others. |
547
|
|
|
|
|
|
|
If you are seeing RSA unpad failures after decryption, try toggling |
548
|
|
|
|
|
|
|
this swap. It does seem to work 100% of the time by either performing |
549
|
|
|
|
|
|
|
or not performing this swap. */ |
550
|
|
|
|
|
|
|
/* EIP-24 requires dP > dQ. Swap and recalc qP */ |
551
|
|
|
|
|
|
|
if (pstm_cmp_mag(&key->p, &key->q) == PSTM_LT) |
552
|
|
|
|
|
|
|
{ |
553
|
|
|
|
|
|
|
pstm_exch(&key->dP, &key->dQ); |
554
|
|
|
|
|
|
|
pstm_exch(&key->p, &key->q); |
555
|
|
|
|
|
|
|
pstm_zero(&key->qP); |
556
|
|
|
|
|
|
|
pstm_invmod(pool, &key->q, &key->p, &key->qP); |
557
|
|
|
|
|
|
|
} |
558
|
|
|
|
|
|
|
# ifdef USE_RSA_PRIVATE_NONBLOCKING |
559
|
|
|
|
|
|
|
key->nonBlock = 1; |
560
|
|
|
|
|
|
|
# else |
561
|
|
|
|
|
|
|
key->nonBlock = 0; |
562
|
|
|
|
|
|
|
# endif |
563
|
|
|
|
|
|
|
# endif /* USE_TILERA_RSA */ |
564
|
|
|
|
|
|
|
|
565
|
|
|
|
|
|
|
/* |
566
|
|
|
|
|
|
|
If we made it here, the key is ready for optimized decryption |
567
|
|
|
|
|
|
|
Set the key length of the key |
568
|
|
|
|
|
|
|
*/ |
569
|
251
|
|
|
|
|
|
key->optimized = 1; |
570
|
251
|
|
|
|
|
|
key->size = pstm_unsigned_bin_size(&key->N); |
571
|
|
|
|
|
|
|
|
572
|
|
|
|
|
|
|
/* Should be at the end */ |
573
|
251
|
100
|
|
|
|
|
if (end != p) |
574
|
|
|
|
|
|
|
{ |
575
|
|
|
|
|
|
|
/* If this stream came from an encrypted file, there could be |
576
|
|
|
|
|
|
|
padding bytes on the end */ |
577
|
1
|
|
|
|
|
|
seqlen = (uint16_t) (end - p); |
578
|
9
|
100
|
|
|
|
|
while (p < end) |
579
|
|
|
|
|
|
|
{ |
580
|
8
|
|
|
|
|
|
if (*p != seqlen) |
581
|
|
|
|
|
|
|
{ |
582
|
|
|
|
|
|
|
psTraceCrypto("Problem at end of private key parse\n"); |
583
|
|
|
|
|
|
|
} |
584
|
8
|
|
|
|
|
|
p++; |
585
|
|
|
|
|
|
|
} |
586
|
|
|
|
|
|
|
} |
587
|
|
|
|
|
|
|
|
588
|
383
|
|
|
|
|
|
return PS_SUCCESS; |
589
|
|
|
|
|
|
|
} |
590
|
|
|
|
|
|
|
# endif /* USE_PRIVATE_KEY_PARSING */ |
591
|
|
|
|
|
|
|
#endif /* USE_RSA */ |
592
|
|
|
|
|
|
|
|
593
|
|
|
|
|
|
|
#ifdef USE_MATRIX_RSA |
594
|
|
|
|
|
|
|
/******************************************************************************/ |
595
|
|
|
|
|
|
|
/** |
596
|
|
|
|
|
|
|
Primary RSA crypto routine, with either public or private key. |
597
|
|
|
|
|
|
|
|
598
|
|
|
|
|
|
|
@param[in] pool Pool to use for temporary memory allocation for this op. |
599
|
|
|
|
|
|
|
@param[in] key RSA key to use for this operation. |
600
|
|
|
|
|
|
|
@param[in] in Pointer to allocated buffer to encrypt. |
601
|
|
|
|
|
|
|
@param[in] inlen Number of bytes pointed to by 'in' to encrypt. |
602
|
|
|
|
|
|
|
@param[out] out Pointer to allocated buffer to store encrypted data. |
603
|
|
|
|
|
|
|
@param[out] outlen Number of bytes written to 'out' buffer. |
604
|
|
|
|
|
|
|
@param[in] type PS_PRIVKEY or PS_PUBKEY. |
605
|
|
|
|
|
|
|
@param[in] data TODO Hardware context. |
606
|
|
|
|
|
|
|
|
607
|
|
|
|
|
|
|
@return 0 on success, < 0 on failure. |
608
|
|
|
|
|
|
|
|
609
|
|
|
|
|
|
|
@note 'out' and 'in' can be equal for in-situ operation. |
610
|
|
|
|
|
|
|
*/ |
611
|
4501
|
|
|
|
|
|
int32_t psRsaCrypt(psPool_t *pool, psRsaKey_t *key, |
612
|
|
|
|
|
|
|
const unsigned char *in, psSize_t inlen, |
613
|
|
|
|
|
|
|
unsigned char *out, psSize_t *outlen, |
614
|
|
|
|
|
|
|
uint8_t type, void *data) |
615
|
|
|
|
|
|
|
{ |
616
|
|
|
|
|
|
|
pstm_int tmp, tmpa, tmpb; |
617
|
|
|
|
|
|
|
int32_t res; |
618
|
|
|
|
|
|
|
uint32_t x; |
619
|
|
|
|
|
|
|
|
620
|
4501
|
50
|
|
|
|
|
if (in == NULL || out == NULL || outlen == NULL || key == NULL) |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
621
|
|
|
|
|
|
|
{ |
622
|
|
|
|
|
|
|
psTraceCrypto("NULL parameter error in psRsaCrypt\n"); |
623
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
624
|
|
|
|
|
|
|
} |
625
|
|
|
|
|
|
|
|
626
|
4501
|
|
|
|
|
|
tmp.dp = tmpa.dp = tmpb.dp = NULL; |
627
|
|
|
|
|
|
|
|
628
|
|
|
|
|
|
|
/* Init and copy into tmp */ |
629
|
4501
|
50
|
|
|
|
|
if (pstm_init_for_read_unsigned_bin(pool, &tmp, inlen + sizeof(pstm_digit)) |
630
|
|
|
|
|
|
|
!= PS_SUCCESS) |
631
|
|
|
|
|
|
|
{ |
632
|
0
|
|
|
|
|
|
return PS_FAILURE; |
633
|
|
|
|
|
|
|
} |
634
|
4501
|
50
|
|
|
|
|
if (pstm_read_unsigned_bin(&tmp, (unsigned char *) in, inlen) != PS_SUCCESS) |
635
|
|
|
|
|
|
|
{ |
636
|
0
|
|
|
|
|
|
pstm_clear(&tmp); |
637
|
0
|
|
|
|
|
|
return PS_FAILURE; |
638
|
|
|
|
|
|
|
} |
639
|
|
|
|
|
|
|
/* Sanity check on the input */ |
640
|
4501
|
50
|
|
|
|
|
if (pstm_cmp(&key->N, &tmp) == PSTM_LT) |
641
|
|
|
|
|
|
|
{ |
642
|
0
|
|
|
|
|
|
res = PS_LIMIT_FAIL; |
643
|
0
|
|
|
|
|
|
goto done; |
644
|
|
|
|
|
|
|
} |
645
|
4501
|
100
|
|
|
|
|
if (type == PS_PRIVKEY) |
646
|
|
|
|
|
|
|
{ |
647
|
1147
|
50
|
|
|
|
|
if (key->optimized) |
648
|
|
|
|
|
|
|
{ |
649
|
1147
|
50
|
|
|
|
|
if (pstm_init_size(pool, &tmpa, key->p.alloc) != PS_SUCCESS) |
650
|
|
|
|
|
|
|
{ |
651
|
0
|
|
|
|
|
|
res = PS_FAILURE; |
652
|
0
|
|
|
|
|
|
goto done; |
653
|
|
|
|
|
|
|
} |
654
|
1147
|
50
|
|
|
|
|
if (pstm_init_size(pool, &tmpb, key->q.alloc) != PS_SUCCESS) |
655
|
|
|
|
|
|
|
{ |
656
|
0
|
|
|
|
|
|
pstm_clear(&tmpa); |
657
|
0
|
|
|
|
|
|
res = PS_FAILURE; |
658
|
0
|
|
|
|
|
|
goto done; |
659
|
|
|
|
|
|
|
} |
660
|
1147
|
50
|
|
|
|
|
if (pstm_exptmod(pool, &tmp, &key->dP, &key->p, &tmpa) != |
661
|
|
|
|
|
|
|
PS_SUCCESS) |
662
|
|
|
|
|
|
|
{ |
663
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: pstm_exptmod dP, p\n"); |
664
|
0
|
|
|
|
|
|
goto error; |
665
|
|
|
|
|
|
|
} |
666
|
1147
|
50
|
|
|
|
|
if (pstm_exptmod(pool, &tmp, &key->dQ, &key->q, &tmpb) != |
667
|
|
|
|
|
|
|
PS_SUCCESS) |
668
|
|
|
|
|
|
|
{ |
669
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: pstm_exptmod dQ, q\n"); |
670
|
0
|
|
|
|
|
|
goto error; |
671
|
|
|
|
|
|
|
} |
672
|
1147
|
50
|
|
|
|
|
if (pstm_sub(&tmpa, &tmpb, &tmp) != PS_SUCCESS) |
673
|
|
|
|
|
|
|
{ |
674
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: sub tmpb, tmp\n"); |
675
|
0
|
|
|
|
|
|
goto error; |
676
|
|
|
|
|
|
|
} |
677
|
1147
|
50
|
|
|
|
|
if (pstm_mulmod(pool, &tmp, &key->qP, &key->p, &tmp) != PS_SUCCESS) |
678
|
|
|
|
|
|
|
{ |
679
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: pstm_mulmod qP, p\n"); |
680
|
0
|
|
|
|
|
|
goto error; |
681
|
|
|
|
|
|
|
} |
682
|
1147
|
50
|
|
|
|
|
if (pstm_mul_comba(pool, &tmp, &key->q, &tmp, NULL, 0) |
683
|
|
|
|
|
|
|
!= PS_SUCCESS) |
684
|
|
|
|
|
|
|
{ |
685
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: pstm_mul q \n"); |
686
|
0
|
|
|
|
|
|
goto error; |
687
|
|
|
|
|
|
|
} |
688
|
1147
|
50
|
|
|
|
|
if (pstm_add(&tmp, &tmpb, &tmp) != PS_SUCCESS) |
689
|
|
|
|
|
|
|
{ |
690
|
|
|
|
|
|
|
psTraceCrypto("decrypt error: pstm_add tmp \n"); |
691
|
0
|
|
|
|
|
|
goto error; |
692
|
|
|
|
|
|
|
} |
693
|
|
|
|
|
|
|
} |
694
|
|
|
|
|
|
|
else |
695
|
|
|
|
|
|
|
{ |
696
|
0
|
0
|
|
|
|
|
if (pstm_exptmod(pool, &tmp, &key->d, &key->N, &tmp) != |
697
|
|
|
|
|
|
|
PS_SUCCESS) |
698
|
|
|
|
|
|
|
{ |
699
|
|
|
|
|
|
|
psTraceCrypto("psRsaCrypt error: pstm_exptmod\n"); |
700
|
0
|
|
|
|
|
|
goto error; |
701
|
|
|
|
|
|
|
} |
702
|
|
|
|
|
|
|
} |
703
|
|
|
|
|
|
|
} |
704
|
3354
|
50
|
|
|
|
|
else if (type == PS_PUBKEY) |
705
|
|
|
|
|
|
|
{ |
706
|
3354
|
50
|
|
|
|
|
if (pstm_exptmod(pool, &tmp, &key->e, &key->N, &tmp) != PS_SUCCESS) |
707
|
|
|
|
|
|
|
{ |
708
|
|
|
|
|
|
|
psTraceCrypto("psRsaCrypt error: pstm_exptmod\n"); |
709
|
0
|
|
|
|
|
|
goto error; |
710
|
|
|
|
|
|
|
} |
711
|
|
|
|
|
|
|
} |
712
|
|
|
|
|
|
|
else |
713
|
|
|
|
|
|
|
{ |
714
|
|
|
|
|
|
|
psTraceCrypto("psRsaCrypt error: invalid type param\n"); |
715
|
0
|
|
|
|
|
|
goto error; |
716
|
|
|
|
|
|
|
} |
717
|
|
|
|
|
|
|
/* Read it back */ |
718
|
4501
|
|
|
|
|
|
x = pstm_unsigned_bin_size(&key->N); |
719
|
|
|
|
|
|
|
|
720
|
4501
|
50
|
|
|
|
|
if ((uint32) x > *outlen) |
721
|
|
|
|
|
|
|
{ |
722
|
0
|
|
|
|
|
|
res = -1; |
723
|
|
|
|
|
|
|
psTraceCrypto("psRsaCrypt error: pstm_unsigned_bin_size\n"); |
724
|
0
|
|
|
|
|
|
goto done; |
725
|
|
|
|
|
|
|
} |
726
|
|
|
|
|
|
|
/* We want the encrypted value to always be the key size. Pad with 0x0 */ |
727
|
4501
|
50
|
|
|
|
|
while ((uint32) x < (unsigned long) key->size) |
728
|
|
|
|
|
|
|
{ |
729
|
0
|
|
|
|
|
|
*out++ = 0x0; |
730
|
0
|
|
|
|
|
|
x++; |
731
|
|
|
|
|
|
|
} |
732
|
|
|
|
|
|
|
|
733
|
4501
|
|
|
|
|
|
*outlen = x; |
734
|
|
|
|
|
|
|
/* Convert it */ |
735
|
4501
|
|
|
|
|
|
memset(out, 0x0, x); |
736
|
|
|
|
|
|
|
|
737
|
4501
|
50
|
|
|
|
|
if (pstm_to_unsigned_bin(pool, &tmp, out + (x - pstm_unsigned_bin_size(&tmp))) |
738
|
|
|
|
|
|
|
!= PS_SUCCESS) |
739
|
|
|
|
|
|
|
{ |
740
|
|
|
|
|
|
|
psTraceCrypto("psRsaCrypt error: pstm_to_unsigned_bin\n"); |
741
|
0
|
|
|
|
|
|
goto error; |
742
|
|
|
|
|
|
|
} |
743
|
|
|
|
|
|
|
/* Clean up and return */ |
744
|
4501
|
|
|
|
|
|
res = PS_SUCCESS; |
745
|
4501
|
|
|
|
|
|
goto done; |
746
|
|
|
|
|
|
|
error: |
747
|
0
|
|
|
|
|
|
res = PS_FAILURE; |
748
|
|
|
|
|
|
|
done: |
749
|
4501
|
100
|
|
|
|
|
if (type == PS_PRIVKEY && key->optimized) |
|
|
50
|
|
|
|
|
|
750
|
|
|
|
|
|
|
{ |
751
|
1147
|
|
|
|
|
|
pstm_clear_multi(&tmpa, &tmpb, NULL, NULL, NULL, NULL, NULL, NULL); |
752
|
|
|
|
|
|
|
} |
753
|
4501
|
|
|
|
|
|
pstm_clear(&tmp); |
754
|
4501
|
|
|
|
|
|
return res; |
755
|
|
|
|
|
|
|
} |
756
|
|
|
|
|
|
|
|
757
|
|
|
|
|
|
|
/******************************************************************************/ |
758
|
|
|
|
|
|
|
/** |
759
|
|
|
|
|
|
|
RSA private encryption. This is used by a private key holder to sign |
760
|
|
|
|
|
|
|
data that can be verified by psRsaDecryptPub(). |
761
|
|
|
|
|
|
|
|
762
|
|
|
|
|
|
|
@param[in] pool Pool to use for temporary memory allocation for this op. |
763
|
|
|
|
|
|
|
@param[in] key RSA key to use for this operation. |
764
|
|
|
|
|
|
|
@param[in] in Pointer to allocated buffer to encrypt. |
765
|
|
|
|
|
|
|
@param[in] inlen Number of bytes pointed to by 'in' to encrypt. |
766
|
|
|
|
|
|
|
@param[out] out Pointer to allocated buffer to store encrypted data. |
767
|
|
|
|
|
|
|
@param[out] outlen Number of bytes written to 'out' buffer. |
768
|
|
|
|
|
|
|
@param[in] data TODO Hardware context. |
769
|
|
|
|
|
|
|
|
770
|
|
|
|
|
|
|
@return 0 on success, < 0 on failure. |
771
|
|
|
|
|
|
|
*/ |
772
|
1146
|
|
|
|
|
|
int32_t psRsaEncryptPriv(psPool_t *pool, psRsaKey_t *key, |
773
|
|
|
|
|
|
|
const unsigned char *in, psSize_t inlen, |
774
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
775
|
|
|
|
|
|
|
void *data) |
776
|
|
|
|
|
|
|
{ |
777
|
1146
|
|
|
|
|
|
unsigned char *verify = NULL; |
778
|
1146
|
|
|
|
|
|
unsigned char *tmpout = NULL; |
779
|
|
|
|
|
|
|
int32_t err; |
780
|
|
|
|
|
|
|
psSize_t size, olen; |
781
|
|
|
|
|
|
|
|
782
|
|
|
|
|
|
|
/** @security We follow the FIPS 186 recommendation for minimum data to sign. */ |
783
|
1146
|
50
|
|
|
|
|
if (inlen < 28) |
784
|
|
|
|
|
|
|
{ |
785
|
|
|
|
|
|
|
psTraceCrypto("Error inlen < 28 bytes in psRsaEncryptPriv\n"); |
786
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
787
|
|
|
|
|
|
|
} |
788
|
1146
|
|
|
|
|
|
size = key->size; |
789
|
1146
|
50
|
|
|
|
|
if (outlen < size) |
790
|
|
|
|
|
|
|
{ |
791
|
|
|
|
|
|
|
psTraceCrypto("Error on bad outlen parameter to psRsaEncryptPriv\n"); |
792
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
793
|
|
|
|
|
|
|
} |
794
|
1146
|
|
|
|
|
|
olen = outlen; /* Save in case we zero 'out' later */ |
795
|
1146
|
50
|
|
|
|
|
if ((err = pkcs1Pad(in, inlen, out, size, PS_PUBKEY, data)) < PS_SUCCESS) |
796
|
|
|
|
|
|
|
{ |
797
|
|
|
|
|
|
|
psTraceCrypto("Error padding psRsaEncryptPriv. Likely data too long\n"); |
798
|
0
|
|
|
|
|
|
return err; |
799
|
|
|
|
|
|
|
} |
800
|
1146
|
50
|
|
|
|
|
if ((err = psRsaCrypt(pool, key, out, size, out, &outlen, |
801
|
|
|
|
|
|
|
PS_PRIVKEY, data)) < PS_SUCCESS) |
802
|
|
|
|
|
|
|
{ |
803
|
|
|
|
|
|
|
psTraceCrypto("Error performing psRsaEncryptPriv\n"); |
804
|
0
|
|
|
|
|
|
return err; |
805
|
|
|
|
|
|
|
} |
806
|
1146
|
50
|
|
|
|
|
if (outlen != size) |
807
|
|
|
|
|
|
|
{ |
808
|
0
|
|
|
|
|
|
goto L_FAIL; |
809
|
|
|
|
|
|
|
} |
810
|
|
|
|
|
|
|
|
811
|
|
|
|
|
|
|
/** |
812
|
|
|
|
|
|
|
@security Verify the signature we just made before it is used |
813
|
|
|
|
|
|
|
by the caller. If the signature is invalid for some reason |
814
|
|
|
|
|
|
|
(hardware or software error or memory overrun), it can |
815
|
|
|
|
|
|
|
leak information on the private key. |
816
|
|
|
|
|
|
|
*/ |
817
|
1146
|
50
|
|
|
|
|
if ((verify = psMalloc(pool, inlen)) == NULL) |
818
|
|
|
|
|
|
|
{ |
819
|
0
|
|
|
|
|
|
goto L_FAIL; |
820
|
|
|
|
|
|
|
} |
821
|
|
|
|
|
|
|
/* psRsaDecryptPub overwrites the input, so duplicate it here */ |
822
|
1146
|
50
|
|
|
|
|
if ((tmpout = psMalloc(pool, outlen)) == NULL) |
823
|
|
|
|
|
|
|
{ |
824
|
0
|
|
|
|
|
|
goto L_FAIL; |
825
|
|
|
|
|
|
|
} |
826
|
1146
|
|
|
|
|
|
memcpy(tmpout, out, outlen); |
827
|
1146
|
50
|
|
|
|
|
if (psRsaDecryptPub(pool, key, |
828
|
|
|
|
|
|
|
tmpout, outlen, verify, inlen, data) < 0) |
829
|
|
|
|
|
|
|
{ |
830
|
0
|
|
|
|
|
|
goto L_FAIL; |
831
|
|
|
|
|
|
|
} |
832
|
1146
|
50
|
|
|
|
|
if (memcmpct(in, verify, inlen) != 0) |
833
|
|
|
|
|
|
|
{ |
834
|
0
|
|
|
|
|
|
goto L_FAIL; |
835
|
|
|
|
|
|
|
} |
836
|
1146
|
|
|
|
|
|
memzero_s(verify, inlen); |
837
|
1146
|
|
|
|
|
|
psFree(verify, pool); |
838
|
1146
|
|
|
|
|
|
memzero_s(tmpout, outlen); |
839
|
1146
|
|
|
|
|
|
psFree(tmpout, pool); |
840
|
|
|
|
|
|
|
|
841
|
1146
|
|
|
|
|
|
return PS_SUCCESS; |
842
|
|
|
|
|
|
|
|
843
|
|
|
|
|
|
|
L_FAIL: |
844
|
0
|
|
|
|
|
|
memzero_s(out, olen); /* Clear, to ensure bad result isn't used */ |
845
|
0
|
0
|
|
|
|
|
if (tmpout) |
846
|
|
|
|
|
|
|
{ |
847
|
0
|
|
|
|
|
|
memzero_s(tmpout, outlen); |
848
|
0
|
|
|
|
|
|
psFree(tmpout, pool); |
849
|
|
|
|
|
|
|
} |
850
|
0
|
0
|
|
|
|
|
if (verify) |
851
|
|
|
|
|
|
|
{ |
852
|
0
|
|
|
|
|
|
memzero_s(verify, inlen); |
853
|
0
|
|
|
|
|
|
psFree(verify, pool); |
854
|
|
|
|
|
|
|
} |
855
|
|
|
|
|
|
|
psTraceCrypto("Signature mismatch in psRsaEncryptPriv\n"); |
856
|
0
|
|
|
|
|
|
return PS_FAIL; |
857
|
|
|
|
|
|
|
} |
858
|
|
|
|
|
|
|
|
859
|
|
|
|
|
|
|
/******************************************************************************/ |
860
|
|
|
|
|
|
|
/** |
861
|
|
|
|
|
|
|
RSA public encryption. This is used by a public key holder to do |
862
|
|
|
|
|
|
|
key exchange with the private key holder, which can access the key using |
863
|
|
|
|
|
|
|
psRsaDecryptPriv(). |
864
|
|
|
|
|
|
|
|
865
|
|
|
|
|
|
|
@param[in] pool Pool to use for temporary memory allocation for this op. |
866
|
|
|
|
|
|
|
@param[in] key RSA key to use for this operation. |
867
|
|
|
|
|
|
|
@param[in] in Pointer to allocated buffer to encrypt. |
868
|
|
|
|
|
|
|
@param[in] inlen Number of bytes pointed to by 'in' to encrypt. |
869
|
|
|
|
|
|
|
@param[out] out Pointer to allocated buffer to store encrypted data. |
870
|
|
|
|
|
|
|
@param[in] expected output length |
871
|
|
|
|
|
|
|
@param[in] data TODO Hardware context. |
872
|
|
|
|
|
|
|
|
873
|
|
|
|
|
|
|
@return 0 on success, < 0 on failure. |
874
|
|
|
|
|
|
|
*/ |
875
|
1
|
|
|
|
|
|
int32_t psRsaEncryptPub(psPool_t *pool, psRsaKey_t *key, |
876
|
|
|
|
|
|
|
const unsigned char *in, psSize_t inlen, |
877
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
878
|
|
|
|
|
|
|
void *data) |
879
|
|
|
|
|
|
|
{ |
880
|
|
|
|
|
|
|
int32_t err; |
881
|
|
|
|
|
|
|
psSize_t size; |
882
|
|
|
|
|
|
|
|
883
|
1
|
|
|
|
|
|
size = key->size; |
884
|
1
|
50
|
|
|
|
|
if (outlen < size) |
885
|
|
|
|
|
|
|
{ |
886
|
|
|
|
|
|
|
psTraceCrypto("Error on bad outlen parameter to psRsaEncryptPub\n"); |
887
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
888
|
|
|
|
|
|
|
} |
889
|
|
|
|
|
|
|
|
890
|
1
|
50
|
|
|
|
|
if ((err = pkcs1Pad(in, inlen, out, size, PS_PRIVKEY, data)) |
891
|
|
|
|
|
|
|
< PS_SUCCESS) |
892
|
|
|
|
|
|
|
{ |
893
|
|
|
|
|
|
|
psTraceCrypto("Error padding psRsaEncryptPub. Likely data too long\n"); |
894
|
0
|
|
|
|
|
|
return err; |
895
|
|
|
|
|
|
|
} |
896
|
1
|
50
|
|
|
|
|
if ((err = psRsaCrypt(pool, key, out, size, out, &outlen, |
897
|
|
|
|
|
|
|
PS_PUBKEY, data)) < PS_SUCCESS) |
898
|
|
|
|
|
|
|
{ |
899
|
|
|
|
|
|
|
psTraceCrypto("Error performing psRsaEncryptPub\n"); |
900
|
0
|
|
|
|
|
|
return err; |
901
|
|
|
|
|
|
|
} |
902
|
1
|
50
|
|
|
|
|
if (outlen != size) |
903
|
|
|
|
|
|
|
{ |
904
|
|
|
|
|
|
|
psTraceCrypto("Encrypted size error in psRsaEncryptPub\n"); |
905
|
0
|
|
|
|
|
|
return PS_FAILURE; |
906
|
|
|
|
|
|
|
} |
907
|
1
|
|
|
|
|
|
return PS_SUCCESS; |
908
|
|
|
|
|
|
|
} |
909
|
|
|
|
|
|
|
|
910
|
|
|
|
|
|
|
/******************************************************************************/ |
911
|
|
|
|
|
|
|
/** |
912
|
|
|
|
|
|
|
RSA private decryption. This is used by a private key holder to decrypt |
913
|
|
|
|
|
|
|
a key exchange with the public key holder, which encodes the key using |
914
|
|
|
|
|
|
|
psRsaEncryptPub(). |
915
|
|
|
|
|
|
|
|
916
|
|
|
|
|
|
|
@param[in] pool Pool to use for temporary memory allocation for this op. |
917
|
|
|
|
|
|
|
@param[in] key RSA key to use for this operation. |
918
|
|
|
|
|
|
|
@param[in,out] in Pointer to allocated buffer to encrypt. |
919
|
|
|
|
|
|
|
@param[in] inlen Number of bytes pointed to by 'in' to encrypt. |
920
|
|
|
|
|
|
|
@param[out] out Pointer to allocated buffer to store encrypted data. |
921
|
|
|
|
|
|
|
@param[out] outlen Number of bytes written to 'out' buffer. |
922
|
|
|
|
|
|
|
@param[in] data TODO Hardware context. |
923
|
|
|
|
|
|
|
|
924
|
|
|
|
|
|
|
@return 0 on success, < 0 on failure. |
925
|
|
|
|
|
|
|
|
926
|
|
|
|
|
|
|
TODO -fix |
927
|
|
|
|
|
|
|
@note this function writes over the 'in' buffer |
928
|
|
|
|
|
|
|
*/ |
929
|
1
|
|
|
|
|
|
int32_t psRsaDecryptPriv(psPool_t *pool, psRsaKey_t *key, |
930
|
|
|
|
|
|
|
unsigned char *in, psSize_t inlen, |
931
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
932
|
|
|
|
|
|
|
void *data) |
933
|
|
|
|
|
|
|
{ |
934
|
|
|
|
|
|
|
int32_t err; |
935
|
|
|
|
|
|
|
psSize_t ptLen; |
936
|
|
|
|
|
|
|
|
937
|
1
|
50
|
|
|
|
|
if (inlen != key->size) |
938
|
|
|
|
|
|
|
{ |
939
|
|
|
|
|
|
|
psTraceCrypto("Error on bad inlen parameter to psRsaDecryptPriv\n"); |
940
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
941
|
|
|
|
|
|
|
} |
942
|
1
|
|
|
|
|
|
ptLen = inlen; |
943
|
1
|
50
|
|
|
|
|
if ((err = psRsaCrypt(pool, key, in, inlen, in, &ptLen, |
944
|
|
|
|
|
|
|
PS_PRIVKEY, data)) < PS_SUCCESS) |
945
|
|
|
|
|
|
|
{ |
946
|
|
|
|
|
|
|
psTraceCrypto("Error performing psRsaDecryptPriv\n"); |
947
|
0
|
|
|
|
|
|
return err; |
948
|
|
|
|
|
|
|
} |
949
|
1
|
50
|
|
|
|
|
if (ptLen != inlen) |
950
|
|
|
|
|
|
|
{ |
951
|
|
|
|
|
|
|
psTraceCrypto("Decrypted size error in psRsaDecryptPriv\n"); |
952
|
0
|
|
|
|
|
|
return PS_FAILURE; |
953
|
|
|
|
|
|
|
} |
954
|
1
|
|
|
|
|
|
err = pkcs1Unpad(in, inlen, out, outlen, PS_PRIVKEY); |
955
|
1
|
|
|
|
|
|
memset(in, 0x0, inlen); |
956
|
1
|
|
|
|
|
|
return err; |
957
|
|
|
|
|
|
|
} |
958
|
|
|
|
|
|
|
|
959
|
|
|
|
|
|
|
/******************************************************************************/ |
960
|
|
|
|
|
|
|
/** |
961
|
|
|
|
|
|
|
RSA public decryption. This is used by a public key holder to verify |
962
|
|
|
|
|
|
|
a signature by the private key holder, who signs using psRsaEncryptPriv(). |
963
|
|
|
|
|
|
|
|
964
|
|
|
|
|
|
|
@param[in] pool Pool to use for temporary memory allocation for this op. |
965
|
|
|
|
|
|
|
@param[in] key RSA key to use for this operation. |
966
|
|
|
|
|
|
|
@param[in,out] in Pointer to allocated buffer to encrypt. |
967
|
|
|
|
|
|
|
@param[in] inlen Number of bytes pointed to by 'in' to encrypt. |
968
|
|
|
|
|
|
|
@param[out] out Pointer to allocated buffer to store encrypted data. |
969
|
|
|
|
|
|
|
@param[in] outlen length of expected output. |
970
|
|
|
|
|
|
|
@param[in] data TODO Hardware context. |
971
|
|
|
|
|
|
|
|
972
|
|
|
|
|
|
|
@return 0 on success, < 0 on failure. |
973
|
|
|
|
|
|
|
|
974
|
|
|
|
|
|
|
TODO -fix |
975
|
|
|
|
|
|
|
@note this function writes over the 'in' buffer |
976
|
|
|
|
|
|
|
*/ |
977
|
3353
|
|
|
|
|
|
int32_t psRsaDecryptPub(psPool_t *pool, psRsaKey_t *key, |
978
|
|
|
|
|
|
|
unsigned char *in, psSize_t inlen, |
979
|
|
|
|
|
|
|
unsigned char *out, psSize_t outlen, |
980
|
|
|
|
|
|
|
void *data) |
981
|
|
|
|
|
|
|
{ |
982
|
|
|
|
|
|
|
int32_t err; |
983
|
|
|
|
|
|
|
psSize_t ptLen; |
984
|
|
|
|
|
|
|
|
985
|
3353
|
50
|
|
|
|
|
if (inlen != key->size) |
986
|
|
|
|
|
|
|
{ |
987
|
|
|
|
|
|
|
psTraceCrypto("Error on bad inlen parameter to psRsaDecryptPub\n"); |
988
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
989
|
|
|
|
|
|
|
} |
990
|
3353
|
|
|
|
|
|
ptLen = inlen; |
991
|
3353
|
50
|
|
|
|
|
if ((err = psRsaCrypt(pool, key, in, inlen, in, &ptLen, |
992
|
|
|
|
|
|
|
PS_PUBKEY, data)) < PS_SUCCESS) |
993
|
|
|
|
|
|
|
{ |
994
|
|
|
|
|
|
|
psTraceCrypto("Error performing psRsaDecryptPub\n"); |
995
|
0
|
|
|
|
|
|
return err; |
996
|
|
|
|
|
|
|
} |
997
|
3353
|
50
|
|
|
|
|
if (ptLen != inlen) |
998
|
|
|
|
|
|
|
{ |
999
|
|
|
|
|
|
|
psTraceIntCrypto("Decrypted size error in psRsaDecryptPub %d\n", ptLen); |
1000
|
0
|
|
|
|
|
|
return PS_FAILURE; |
1001
|
|
|
|
|
|
|
} |
1002
|
3353
|
50
|
|
|
|
|
if ((err = pkcs1Unpad(in, inlen, out, outlen, PS_PUBKEY)) < 0) |
1003
|
|
|
|
|
|
|
{ |
1004
|
0
|
|
|
|
|
|
return err; |
1005
|
|
|
|
|
|
|
} |
1006
|
3353
|
|
|
|
|
|
return PS_SUCCESS; |
1007
|
|
|
|
|
|
|
} |
1008
|
|
|
|
|
|
|
|
1009
|
|
|
|
|
|
|
#endif /* USE_MATRIX_RSA */ |
1010
|
|
|
|
|
|
|
|
1011
|
|
|
|
|
|
|
/******************************************************************************/ |
1012
|
|
|
|
|
|
|
|