mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-28 05:52:19 +01:00
11281 lines
314 KiB
C
11281 lines
314 KiB
C
/* pk.c
|
|
*
|
|
* Copyright (C) 2006-2022 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <wolfssl/wolfcrypt/settings.h>
|
|
|
|
#if !defined(WOLFSSL_PK_INCLUDED)
|
|
#ifndef WOLFSSL_IGNORE_FILE_WARN
|
|
#warning pk.c does not need to be compiled separately from ssl.c
|
|
#endif
|
|
#else
|
|
|
|
#ifndef NO_RSA
|
|
#include <wolfssl/wolfcrypt/rsa.h>
|
|
#endif
|
|
|
|
#if defined(OPENSSL_EXTRA) && !defined(NO_BIO) && defined(WOLFSSL_KEY_GEN) && \
|
|
(!defined(HAVE_USER_RSA) || defined(HAVE_ECC) || \
|
|
(!defined(NO_DSA) && !defined(HAVE_SELFTEST)))
|
|
/* Forward declaration for wolfSSL_PEM_write_bio_RSA_PUBKEY,
|
|
* wolfSSL_PEM_write_bio_DSA_PUBKEY and wolfSSL_PEM_write_bio_EC_PUBKEY.
|
|
* Implementation in ssl.c.
|
|
*/
|
|
static int pem_write_bio_pubkey(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key);
|
|
#endif
|
|
|
|
/*******************************************************************************
|
|
* COMMON FUNCTIONS
|
|
******************************************************************************/
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
|
|
#if !defined(NO_CERTS) && defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
|
|
!defined(NO_STDIO_FILESYSTEM) && (!defined(NO_RSA) || !defined(NO_DSA) || \
|
|
defined(HAVE_ECC))
|
|
/* Print the number bn in hex with name field and indentation indent to file fp.
|
|
*
|
|
* Used by wolfSSL_DSA_print_fp, wolfSSL_RSA_print_fp and
|
|
* wolfSSL_EC_KEY_print_fp to print DSA, RSA and ECC keys and parameters.
|
|
*
|
|
* @param [in] fp File pointer to write to.
|
|
* @param [in] indent Number of spaces to prepend to each line.
|
|
* @param [in] field Name of field.
|
|
* @param [in] bn Big number to print.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
* @return BAD_FUNC_ARG when fp is invalid, indent is less than 0, or field or
|
|
* bn or NULL.
|
|
*/
|
|
static int pk_bn_field_print_fp(XFILE fp, int indent, const char* field,
|
|
const WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const int HEX_INDENT = 4;
|
|
static const int MAX_DIGITS_PER_LINE = 30;
|
|
|
|
int ret = 1;
|
|
int i = 0;
|
|
char* buf = NULL;
|
|
|
|
/* Internal function - assume parameters are valid. */
|
|
|
|
/* Convert BN to hexadecimal character array (allocates buffer). */
|
|
buf = wolfSSL_BN_bn2hex(bn);
|
|
if (buf == NULL) {
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Print leading spaces, name and spaces before data. */
|
|
if (indent > 0) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
if (XFPRINTF(fp, "%s:\n", field) < 0)
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
if (indent > 0) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
if (XFPRINTF(fp, "%*s", HEX_INDENT, "") < 0)
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Print first byte - should always exist. */
|
|
if ((buf[i] != '\0') && (buf[i+1] != '\0')) {
|
|
if (XFPRINTF(fp, "%c", buf[i++]) < 0)
|
|
ret = 0;
|
|
else if (XFPRINTF(fp, "%c", buf[i++]) < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Print each hexadecimal character with byte separator. */
|
|
while ((buf[i] != '\0') && (buf[i+1] != '\0')) {
|
|
/* Byte separator every two nibbles - one byte. */
|
|
if (XFPRINTF(fp, ":") < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
/* New line after every 15 bytes - 30 nibbles. */
|
|
if (i % MAX_DIGITS_PER_LINE == 0) {
|
|
if (XFPRINTF(fp, "\n") < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
if (indent > 0) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
if (XFPRINTF(fp, "%*s", HEX_INDENT, "") < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
/* Print two nibbles - one byte. */
|
|
if (XFPRINTF(fp, "%c", buf[i++]) < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
if (XFPRINTF(fp, "%c", buf[i++]) < 0) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
/* Ensure on new line after data. */
|
|
if (XFPRINTF(fp, "\n") < 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Dispose of any allocated character array. */
|
|
XFREE(buf, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !NO_CERTS && XFPRINTF && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM &&
|
|
* (!NO_DSA || !NO_RSA || HAVE_ECC) */
|
|
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
#if defined(XSNPRINTF) && !defined(NO_BIO) && !defined(NO_RSA) && \
|
|
!defined(HAVE_FAST_RSA)
|
|
/* snprintf() must be available */
|
|
|
|
/* Maximum number of extra indent spaces on each line. */
|
|
#define PRINT_NUM_MAX_INDENT 48
|
|
/* Maximum size of a line containing a value. */
|
|
#define PRINT_NUM_MAX_VALUE_LINE PRINT_NUM_MAX_INDENT
|
|
/* Number of leading spaces on each line. */
|
|
#define PRINT_NUM_INDENT_CNT 4
|
|
/* Indent spaces for number lines. */
|
|
#define PRINT_NUM_INDENT " "
|
|
/* 4 leading spaces and 15 bytes with colons is a complete line. */
|
|
#define PRINT_NUM_MAX_DIGIT_LINE (PRINT_NUM_INDENT_CNT + 3 * 15)
|
|
|
|
/* Print indent to BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] line Buffer to put characters to before writing to BIO.
|
|
* @param [in] lineLen Length of buffer.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_print_indent(WOLFSSL_BIO* bio, char* line, int lineLen,
|
|
int indent)
|
|
{
|
|
int ret = 1;
|
|
|
|
if (indent > 0) {
|
|
/* Print indent spaces. */
|
|
int len_wanted = XSNPRINTF(line, lineLen, "%*s", indent, " ");
|
|
if (len_wanted >= lineLen) {
|
|
WOLFSSL_MSG("Buffer overflow formatting indentation");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
/* Write indents string to BIO */
|
|
if (wolfSSL_BIO_write(bio, line, len_wanted) <= 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Print out name, and value in decimal and hex to BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] value MP integer to write.
|
|
* @param [in] name Name of value.
|
|
* @param [in] indent Number of leading spaces before line.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_print_value(WOLFSSL_BIO* bio, mp_int* value,
|
|
const char* name, int indent)
|
|
{
|
|
int ret = 1;
|
|
int len;
|
|
char line[PRINT_NUM_MAX_VALUE_LINE + 1];
|
|
word32 v;
|
|
|
|
/* Get the length of hex encoded value. */
|
|
len = mp_unsigned_bin_size(value);
|
|
/* Value must no more than 32-bits - 4 bytes. */
|
|
if ((len < 0) || (len > 4)) {
|
|
WOLFSSL_MSG("Error getting exponent size");
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Print any indent spaces. */
|
|
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
|
|
}
|
|
if (ret == 1) {
|
|
/* Get 32-bits of value. */
|
|
v = (word32)value->dp[0];
|
|
/* Print the line to the string. */
|
|
len = (int)XSNPRINTF(line, sizeof(line), "%s %u (0x%x)\n", name, v,
|
|
v);
|
|
if (len >= (int)sizeof(line)) {
|
|
WOLFSSL_MSG("Buffer overflow while formatting value");
|
|
ret = 0;
|
|
} else {
|
|
/* Write string to BIO */
|
|
if (wolfSSL_BIO_write(bio, line, len) <= 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Print out name and multi-precision number to BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] num MP integer to write.
|
|
* @param [in] name Name of value.
|
|
* @param [in] indent Number of leading spaces before each line.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_print_number(WOLFSSL_BIO* bio, mp_int* num, const char* name,
|
|
int indent)
|
|
{
|
|
int ret = 1;
|
|
int rawLen = 0;
|
|
byte* rawKey = NULL;
|
|
char line[PRINT_NUM_MAX_DIGIT_LINE + 1];
|
|
int li = 0; /* Line index. */
|
|
int i;
|
|
|
|
/* Allocate a buffer to hold binary encoded data. */
|
|
rawLen = mp_unsigned_bin_size(num);
|
|
if (rawLen == 0) {
|
|
WOLFSSL_MSG("Invalid number");
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
rawKey = (byte*)XMALLOC(rawLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (rawKey == NULL) {
|
|
WOLFSSL_MSG("Memory error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
/* Encode number as big-endian byte array. */
|
|
if ((ret == 1) && (mp_to_unsigned_bin(num, rawKey) < 0)) {
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Print any indent spaces. */
|
|
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
|
|
}
|
|
if (ret == 1) {
|
|
/* Print header string line to string. */
|
|
li = XSNPRINTF(line, sizeof(line), "%s\n", name);
|
|
if (li >= (int)sizeof(line)) {
|
|
WOLFSSL_MSG("Buffer overflow formatting name");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Print any indent spaces. */
|
|
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
|
|
}
|
|
if (ret == 1) {
|
|
/* Start first digit line with spaces.
|
|
* Writing out zeros ensures number is a positive value. */
|
|
li = XSNPRINTF(line, sizeof(line), PRINT_NUM_INDENT "%s",
|
|
mp_leading_bit(num) ? "00:" : "");
|
|
if (li >= (int)sizeof(line)) {
|
|
WOLFSSL_MSG("Buffer overflow formatting spaces");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Put out each line of numbers. */
|
|
for (i = 0; (ret == 1) && (i < rawLen); i++) {
|
|
/* Encode another byte as 2 hex digits and append colon. */
|
|
int len_wanted = XSNPRINTF(line + li, sizeof(line) - li, "%02x:",
|
|
rawKey[i]);
|
|
/* Check if there was room -- if not, print the current line, not
|
|
* including the newest octet.
|
|
*/
|
|
if (len_wanted >= (int)sizeof(line) - li) {
|
|
/* bump current octet to the next line. */
|
|
--i;
|
|
/* More bytes coming so add a line break. */
|
|
line[li++] = '\n';
|
|
/* Write out the line. */
|
|
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Print any indent spaces. */
|
|
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
|
|
}
|
|
/* Put the leading spaces on new line. */
|
|
XSTRNCPY(line, PRINT_NUM_INDENT, PRINT_NUM_INDENT_CNT + 1);
|
|
li = PRINT_NUM_INDENT_CNT;
|
|
}
|
|
else {
|
|
li += len_wanted;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Put out last line - replace last colon with carriage return. */
|
|
line[li-1] = '\n';
|
|
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Dispose of any allocated data. */
|
|
XFREE(rawKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
|
|
#endif /* XSNPRINTF && !NO_BIO && !NO_RSA && !HAVE_FAST_RSA */
|
|
|
|
#ifndef NO_RSA
|
|
|
|
/* Uses the DER SEQUENCE to determine size of DER data.
|
|
*
|
|
* Outer SEQUENCE encapsulates all the DER encoding.
|
|
* Add the length of the SEQUENCE data to the length of the SEQUENCE header.
|
|
*
|
|
* @param [in] seq Buffer holding DER encoded sequence.
|
|
* @param [in] len Length of data in buffer (may be larger than SEQ).
|
|
* @return Size of complete DER encoding on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_der_length(const unsigned char* seq, int len)
|
|
{
|
|
int ret = 0;
|
|
word32 i = 0;
|
|
|
|
/* Check it is a SEQUENCE and get the length of the underlying data.
|
|
* i is updated to be after SEQUENCE header bytes.
|
|
*/
|
|
if (GetSequence_ex(seq, &i, &ret, len, 0) >= 0) {
|
|
/* Add SEQUENCE header length to underlying data length. */
|
|
ret += (int)i;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* NO_RSA */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
/*******************************************************************************
|
|
* START OF RSA API
|
|
******************************************************************************/
|
|
|
|
#ifndef NO_RSA
|
|
|
|
/*
|
|
* RSA METHOD
|
|
* Could be used to hold function pointers to implementations of RSA operations.
|
|
*/
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
/* Return a blank RSA method and set the name and flags.
|
|
*
|
|
* Only one implementation of RSA operations.
|
|
* name is duplicated.
|
|
*
|
|
* @param [in] name Name to use in method.
|
|
* @param [in] flags Flags to set into method.
|
|
* @return Newly allocated RSA method on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA_METHOD *wolfSSL_RSA_meth_new(const char *name, int flags)
|
|
{
|
|
WOLFSSL_RSA_METHOD* meth = NULL;
|
|
int name_len = 0;
|
|
int err;
|
|
|
|
/* Validate name is not NULL. */
|
|
err = (name == NULL);
|
|
if (!err) {
|
|
/* Allocate an RSA METHOD to return. */
|
|
meth = (WOLFSSL_RSA_METHOD*)XMALLOC(sizeof(WOLFSSL_RSA_METHOD), NULL,
|
|
DYNAMIC_TYPE_OPENSSL);
|
|
err = (meth == NULL);
|
|
}
|
|
if (!err) {
|
|
XMEMSET(meth, 0, sizeof(*meth));
|
|
meth->flags = flags;
|
|
meth->dynamic = 1;
|
|
|
|
name_len = (int)XSTRLEN(name);
|
|
meth->name = (char*)XMALLOC(name_len + 1, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
err = (meth->name == NULL);
|
|
}
|
|
if (!err) {
|
|
XMEMCPY(meth->name, name, name_len+1);
|
|
}
|
|
|
|
if (err) {
|
|
/* meth->name won't be allocated on error. */
|
|
XFREE(meth, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
}
|
|
return meth;
|
|
}
|
|
|
|
/* Default RSA method is one with wolfSSL name and no flags.
|
|
*
|
|
* @return Newly allocated wolfSSL RSA method on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
const WOLFSSL_RSA_METHOD* wolfSSL_RSA_get_default_method(void)
|
|
{
|
|
static const WOLFSSL_RSA_METHOD wolfssl_rsa_meth = {
|
|
0, /* No flags. */
|
|
(char*)"wolfSSL RSA",
|
|
0 /* Static definition. */
|
|
};
|
|
return &wolfssl_rsa_meth;
|
|
}
|
|
|
|
/* Dispose of RSA method and allocated data.
|
|
*
|
|
* @param [in] meth RSA method to free.
|
|
*/
|
|
void wolfSSL_RSA_meth_free(WOLFSSL_RSA_METHOD *meth)
|
|
{
|
|
/* Free method if available and dynamically allocated. */
|
|
if ((meth != NULL) && meth->dynamic) {
|
|
/* Name was duplicated and must be freed. */
|
|
XFREE(meth->name, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
/* Dispose of RSA method. */
|
|
XFREE(meth, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
}
|
|
}
|
|
|
|
#ifndef NO_WOLFSSL_STUB
|
|
/* Stub function for any RSA method setting function.
|
|
*
|
|
* Nothing is stored - not even flags or name.
|
|
*
|
|
* @param [in] meth RSA method.
|
|
* @param [in] p A pointer.
|
|
* @return 1 to indicate success.
|
|
*/
|
|
int wolfSSL_RSA_meth_set(WOLFSSL_RSA_METHOD *meth, void* p)
|
|
{
|
|
WOLFSSL_STUB("RSA_METHOD is not implemented.");
|
|
|
|
(void)meth;
|
|
(void)p;
|
|
|
|
return 1;
|
|
}
|
|
#endif /* !NO_WOLFSSL_STUB */
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
/*
|
|
* RSA constructor/deconstructor APIs
|
|
*/
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
/* Dispose of RSA key and allocated data.
|
|
*
|
|
* Cannot use rsa after this call.
|
|
*
|
|
* @param [in] rsa RSA key to free.
|
|
*/
|
|
void wolfSSL_RSA_free(WOLFSSL_RSA* rsa)
|
|
{
|
|
int doFree = 1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_free");
|
|
|
|
/* Validate parameter. */
|
|
if (rsa == NULL) {
|
|
doFree = 0;
|
|
}
|
|
if (doFree) {
|
|
int isZero;
|
|
int err;
|
|
|
|
/* Decrement reference count. */
|
|
wolfSSL_RefDec(&rsa->ref, &isZero, &err);
|
|
if (err == 0) {
|
|
/* Continue if reference count is zero. */
|
|
doFree = isZero;
|
|
}
|
|
else {
|
|
/* Didn't reference decrement so can't free. */
|
|
doFree = 0;
|
|
}
|
|
}
|
|
if (doFree) {
|
|
void* heap = rsa->heap;
|
|
|
|
/* Dispose of allocated reference counting data. */
|
|
wolfSSL_RefFree(&rsa->ref);
|
|
|
|
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
|
|
wolfSSL_CRYPTO_cleanup_ex_data(&rsa->ex_data);
|
|
#endif
|
|
|
|
if (rsa->internal != NULL) {
|
|
#if !defined(HAVE_FIPS) && !defined(HAVE_USER_RSA) && \
|
|
!defined(HAVE_FAST_RSA) && defined(WC_RSA_BLINDING)
|
|
/* Check if RNG is owned before freeing it. */
|
|
if (rsa->ownRng) {
|
|
WC_RNG* rng = ((RsaKey*)(rsa->internal))->rng;
|
|
if ((rng != NULL) && (rng != wolfssl_get_global_rng())) {
|
|
wc_FreeRng(rng);
|
|
XFREE(rng, heap, DYNAMIC_TYPE_RNG);
|
|
}
|
|
/* RNG isn't freed by wolfCrypt RSA free. */
|
|
}
|
|
#endif
|
|
/* Dispose of allocated data in wolfCrypt RSA key. */
|
|
wc_FreeRsaKey((RsaKey*)rsa->internal);
|
|
/* Dispose of memory for wolfCrypt RSA key. */
|
|
XFREE(rsa->internal, heap, DYNAMIC_TYPE_RSA);
|
|
}
|
|
|
|
/* Dispose of external representation of RSA values. */
|
|
wolfSSL_BN_clear_free(rsa->iqmp);
|
|
wolfSSL_BN_clear_free(rsa->dmq1);
|
|
wolfSSL_BN_clear_free(rsa->dmp1);
|
|
wolfSSL_BN_clear_free(rsa->q);
|
|
wolfSSL_BN_clear_free(rsa->p);
|
|
wolfSSL_BN_clear_free(rsa->d);
|
|
wolfSSL_BN_free(rsa->e);
|
|
wolfSSL_BN_free(rsa->n);
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
if (rsa->meth) {
|
|
wolfSSL_RSA_meth_free((WOLFSSL_RSA_METHOD*)rsa->meth);
|
|
}
|
|
#endif
|
|
|
|
/* Set back to NULLs for safety. */
|
|
ForceZero(rsa, sizeof(*rsa));
|
|
|
|
XFREE(rsa, heap, DYNAMIC_TYPE_RSA);
|
|
(void)heap;
|
|
}
|
|
}
|
|
|
|
/* Allocate and initialize a new RSA key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] heap Heap hint.
|
|
* @param [in] devId Device identifier value.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_RSA_new_ex(void* heap, int devId)
|
|
{
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
RsaKey* key = NULL;
|
|
int err = 0;
|
|
int rsaKeyInited = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_new");
|
|
|
|
/* Allocate memory for new wolfCrypt RSA key. */
|
|
key = (RsaKey*)XMALLOC(sizeof(RsaKey), heap, DYNAMIC_TYPE_RSA);
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_new malloc RsaKey failure");
|
|
err = 1;
|
|
}
|
|
if (!err) {
|
|
/* Allocate memory for new RSA key. */
|
|
rsa = (WOLFSSL_RSA*)XMALLOC(sizeof(WOLFSSL_RSA), heap,
|
|
DYNAMIC_TYPE_RSA);
|
|
if (rsa == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_new malloc WOLFSSL_RSA failure");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (!err) {
|
|
/* Clear all fields of RSA key. */
|
|
XMEMSET(rsa, 0, sizeof(WOLFSSL_RSA));
|
|
/* Cache heap to use for all allocations. */
|
|
rsa->heap = heap;
|
|
#ifdef OPENSSL_EXTRA
|
|
/* Always have a method set. */
|
|
rsa->meth = wolfSSL_RSA_get_default_method();
|
|
#endif
|
|
|
|
/* Initialize reference counting. */
|
|
wolfSSL_RefInit(&rsa->ref, &err);
|
|
}
|
|
if (!err) {
|
|
/* Initialize wolfCrypt RSA key. */
|
|
if (wc_InitRsaKey_ex(key, heap, devId) != 0) {
|
|
WOLFSSL_MSG("InitRsaKey WOLFSSL_RSA failure");
|
|
err = 1;
|
|
}
|
|
else {
|
|
rsaKeyInited = 1;
|
|
}
|
|
}
|
|
#if !defined(HAVE_FIPS) && !defined(HAVE_USER_RSA) && \
|
|
!defined(HAVE_FAST_RSA) && defined(WC_RSA_BLINDING)
|
|
if (!err) {
|
|
WC_RNG* rng;
|
|
|
|
/* Create a local RNG. */
|
|
rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), heap, DYNAMIC_TYPE_RNG);
|
|
if ((rng != NULL) && (wc_InitRng_ex(rng, heap, devId) != 0)) {
|
|
WOLFSSL_MSG("InitRng failure, attempting to use global RNG");
|
|
XFREE(rng, heap, DYNAMIC_TYPE_RNG);
|
|
rng = NULL;
|
|
}
|
|
|
|
rsa->ownRng = 1;
|
|
if (rng == NULL) {
|
|
/* Get the wolfSSL global RNG - not thread safe. */
|
|
rng = wolfssl_get_global_rng();
|
|
rsa->ownRng = 0;
|
|
}
|
|
if (rng == NULL) {
|
|
/* Couldn't create global either. */
|
|
WOLFSSL_MSG("wolfSSL_RSA_new no WC_RNG for blinding");
|
|
err = 1;
|
|
}
|
|
else {
|
|
/* Set the local or global RNG into the wolfCrypt RSA key. */
|
|
(void)wc_RsaSetRNG(key, rng);
|
|
/* Won't fail as key and rng are not NULL. */
|
|
}
|
|
}
|
|
#endif /* !HAVE_FIPS && !HAVE_USER_RSA && !HAVE_FAST_RSA &&
|
|
* WC_RSA_BLINDING */
|
|
if (!err) {
|
|
/* Set wolfCrypt RSA key into RSA key. */
|
|
rsa->internal = key;
|
|
/* Data from external RSA key has not been set into internal one. */
|
|
rsa->inSet = 0;
|
|
}
|
|
|
|
if (err) {
|
|
/* Dispose of any allocated data on error. */
|
|
/* No failure after RNG allocation - no need to free RNG. */
|
|
if (rsaKeyInited) {
|
|
wc_FreeRsaKey(key);
|
|
}
|
|
XFREE(key, heap, DYNAMIC_TYPE_RSA);
|
|
XFREE(rsa, heap, DYNAMIC_TYPE_RSA);
|
|
/* Return NULL. */
|
|
rsa = NULL;
|
|
}
|
|
return rsa;
|
|
}
|
|
|
|
/* Allocate and initialize a new RSA key.
|
|
*
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_RSA_new(void)
|
|
{
|
|
/* Call wolfSSL API to do work. */
|
|
return wolfSSL_RSA_new_ex(NULL, INVALID_DEVID);
|
|
}
|
|
|
|
/* Increments ref count of RSA key.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @return 1 on success
|
|
* @return 0 on error
|
|
*/
|
|
int wolfSSL_RSA_up_ref(WOLFSSL_RSA* rsa)
|
|
{
|
|
int err = 0;
|
|
if (rsa != NULL) {
|
|
wolfSSL_RefInc(&rsa->ref, &err);
|
|
}
|
|
return !err;
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
|
|
/* Allocate a new RSA key and make it a copy.
|
|
*
|
|
* Encodes to and from DER to copy.
|
|
*
|
|
* @param [in] rsa RSA key to duplicate.
|
|
* @return RSA key on success.
|
|
* @return NULL on error.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_RSAPublicKey_dup(WOLFSSL_RSA *rsa)
|
|
{
|
|
WOLFSSL_RSA* ret = NULL;
|
|
int derSz = 0;
|
|
byte* derBuf = NULL;
|
|
int err;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSAPublicKey_dup");
|
|
|
|
err = (rsa == NULL);
|
|
if (!err) {
|
|
/* Create a new RSA key to return. */
|
|
ret = wolfSSL_RSA_new();
|
|
if (ret == NULL) {
|
|
WOLFSSL_MSG("Error creating a new WOLFSSL_RSA structure");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (!err) {
|
|
/* Encode RSA public key to copy to DER - allocates DER buffer. */
|
|
if ((derSz = wolfSSL_RSA_To_Der(rsa, &derBuf, 1, rsa->heap)) < 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (!err) {
|
|
/* Decode DER of the RSA public key into new key. */
|
|
if (wolfSSL_RSA_LoadDer_ex(ret, derBuf, derSz,
|
|
WOLFSSL_RSA_LOAD_PUBLIC) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_LoadDer_ex failed");
|
|
err = 1;
|
|
}
|
|
}
|
|
|
|
/* Dispose of any allocated DER buffer. */
|
|
XFREE(derBuf, rsa ? rsa->heap : NULL, DYNAMIC_TYPE_ASN1);
|
|
if (err) {
|
|
/* Disposes of any created RSA key - on error. */
|
|
wolfSSL_RSA_free(ret);
|
|
ret = NULL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* wolfSSL_RSAPrivateKey_dup not supported */
|
|
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
static int wolfSSL_RSA_To_Der_ex(WOLFSSL_RSA* rsa, byte** outBuf, int publicKey,
|
|
void* heap);
|
|
#endif
|
|
|
|
/*
|
|
* RSA to/from bin APIs
|
|
*/
|
|
|
|
/* Convert RSA public key data to internal.
|
|
*
|
|
* Creates new RSA key from the DER encoded RSA public key.
|
|
*
|
|
* @param [out] out Pointer to RSA key to return through. May be NULL.
|
|
* @param [in, out] derBuf Pointer to start of DER encoded data.
|
|
* @parma [in] derSz Length of the data in the DER buffer.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA *wolfSSL_d2i_RSAPublicKey(WOLFSSL_RSA **out,
|
|
const unsigned char **derBuf, long derSz)
|
|
{
|
|
WOLFSSL_RSA *rsa = NULL;
|
|
int err = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_RSAPublicKey");
|
|
|
|
/* Validate parameters. */
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("Bad argument");
|
|
err = 1;
|
|
}
|
|
/* Create a new RSA key to return. */
|
|
if ((!err) && ((rsa = wolfSSL_RSA_new()) == NULL)) {
|
|
WOLFSSL_MSG("RSA_new failed");
|
|
err = 1;
|
|
}
|
|
/* Decode RSA key from DER. */
|
|
if ((!err) && (wolfSSL_RSA_LoadDer_ex(rsa, *derBuf, (int)derSz,
|
|
WOLFSSL_RSA_LOAD_PUBLIC) != 1)) {
|
|
WOLFSSL_MSG("RSA_LoadDer failed");
|
|
err = 1;
|
|
}
|
|
if ((!err) && (out != NULL)) {
|
|
/* Return through parameter too. */
|
|
*out = rsa;
|
|
/* Move buffer on by the used amount. */
|
|
*derBuf += wolfssl_der_length(*derBuf, (int)derSz);
|
|
}
|
|
|
|
if (err) {
|
|
/* Dispose of any created RSA key. */
|
|
wolfSSL_RSA_free(rsa);
|
|
rsa = NULL;
|
|
}
|
|
return rsa;
|
|
}
|
|
|
|
/* Convert RSA private key data to internal.
|
|
*
|
|
* Create a new RSA key from the DER encoded RSA private key.
|
|
*
|
|
* @param [out] out Pointer to RSA key to return through. May be NULL.
|
|
* @param [in, out] derBuf Pointer to start of DER encoded data.
|
|
* @parma [in] derSz Length of the data in the DER buffer.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA *wolfSSL_d2i_RSAPrivateKey(WOLFSSL_RSA **out,
|
|
const unsigned char **derBuf, long derSz)
|
|
{
|
|
WOLFSSL_RSA *rsa = NULL;
|
|
int err = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_RSAPublicKey");
|
|
|
|
/* Validate parameters. */
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("Bad argument");
|
|
err = 1;
|
|
}
|
|
/* Create a new RSA key to return. */
|
|
if ((!err) && ((rsa = wolfSSL_RSA_new()) == NULL)) {
|
|
WOLFSSL_MSG("RSA_new failed");
|
|
err = 1;
|
|
}
|
|
/* Decode RSA key from DER. */
|
|
if ((!err) && (wolfSSL_RSA_LoadDer_ex(rsa, *derBuf, (int)derSz,
|
|
WOLFSSL_RSA_LOAD_PRIVATE) != 1)) {
|
|
WOLFSSL_MSG("RSA_LoadDer failed");
|
|
err = 1;
|
|
}
|
|
if ((!err) && (out != NULL)) {
|
|
/* Return through parameter too. */
|
|
*out = rsa;
|
|
/* Move buffer on by the used amount. */
|
|
*derBuf += wolfssl_der_length(*derBuf, (int)derSz);
|
|
}
|
|
|
|
if (err) {
|
|
/* Dispose of any created RSA key. */
|
|
wolfSSL_RSA_free(rsa);
|
|
rsa = NULL;
|
|
}
|
|
return rsa;
|
|
}
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA) && \
|
|
!defined(HAVE_FAST_RSA)
|
|
/* Converts an internal RSA structure to DER format for the private key.
|
|
*
|
|
* If "pp" is null then buffer size only is returned.
|
|
* If "*pp" is null then a created buffer is set in *pp and the caller is
|
|
* responsible for free'ing it.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in, out] pp On in, pointer to allocated buffer or NULL.
|
|
* May be NULL.
|
|
* On out, newly allocated buffer or pointer to byte after
|
|
* encoding in passed in buffer.
|
|
*
|
|
* @return Size of DER encoding on success
|
|
* @return BAD_FUNC_ARG when rsa is NULL.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_i2d_RSAPrivateKey(WOLFSSL_RSA *rsa, unsigned char **pp)
|
|
{
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_i2d_RSAPrivateKey");
|
|
|
|
/* Validate parameters. */
|
|
if (rsa == NULL) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
/* Encode the RSA key as a DER. Call allocates buffer into pp.
|
|
* No heap hint as this gets returned to the user */
|
|
else if ((ret = wolfSSL_RSA_To_Der_ex(rsa, pp, 0, NULL)) < 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed");
|
|
ret = 0;
|
|
}
|
|
|
|
/* Size of DER encoding. */
|
|
return ret;
|
|
}
|
|
|
|
/* Converts an internal RSA structure to DER format for the public key.
|
|
*
|
|
* If "pp" is null then buffer size only is returned.
|
|
* If "*pp" is null then a created buffer is set in *pp and the caller is
|
|
* responsible for free'ing it.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in, out] pp On in, pointer to allocated buffer or NULL.
|
|
* May be NULL.
|
|
* On out, newly allocated buffer or pointer to byte after
|
|
* encoding in passed in buffer.
|
|
* @return Size of DER encoding on success
|
|
* @return BAD_FUNC_ARG when rsa is NULL.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_i2d_RSAPublicKey(WOLFSSL_RSA *rsa, unsigned char **pp)
|
|
{
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_i2d_RSAPublicKey");
|
|
|
|
/* check for bad functions arguments */
|
|
if (rsa == NULL) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
/* Encode the RSA key as a DER. Call allocates buffer into pp.
|
|
* No heap hint as this gets returned to the user */
|
|
else if ((ret = wolfSSL_RSA_To_Der_ex(rsa, pp, 1, NULL)) < 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed");
|
|
ret = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA) &&
|
|
* !defined(HAVE_FAST_RSA) */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
/*
|
|
* RSA to/from BIO APIs
|
|
*/
|
|
|
|
/* wolfSSL_d2i_RSAPublicKey_bio not supported */
|
|
|
|
#if defined(OPENSSL_ALL) || defined(WOLFSSL_ASIO) || defined(WOLFSSL_HAPROXY) \
|
|
|| defined(WOLFSSL_NGINX) || defined(WOLFSSL_QT)
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA) && \
|
|
!defined(HAVE_FAST_RSA) && !defined(NO_BIO)
|
|
|
|
/* Read DER data from a BIO.
|
|
*
|
|
* DER structures start with a constructed sequence. Use this to calculate the
|
|
* total length of the DER data.
|
|
*
|
|
* @param [in] bio BIO object to read from.
|
|
* @param [out] out Buffer holding DER encoding.
|
|
* @return Number of bytes to DER encoding on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_read_der_bio(WOLFSSL_BIO* bio, unsigned char** out)
|
|
{
|
|
int err = 0;
|
|
unsigned char seq[MAX_SEQ_SZ];
|
|
unsigned char* der = NULL;
|
|
int derLen = 0;
|
|
|
|
/* Read in a minimal amount to get a SEQUENCE header of any size. */
|
|
if (wolfSSL_BIO_read(bio, seq, sizeof(seq)) != sizeof(seq)) {
|
|
WOLFSSL_MSG("wolfSSL_BIO_read() of sequence failure");
|
|
err = 1;
|
|
}
|
|
/* Calculate complete DER encoding length. */
|
|
if ((!err) && ((derLen = wolfssl_der_length(seq, sizeof(seq))) <= 0)) {
|
|
WOLFSSL_MSG("DER SEQUENCE decode failed");
|
|
err = 1;
|
|
}
|
|
/* Allocate a buffer to read DER data into. */
|
|
if ((!err) && ((der = (unsigned char*)XMALLOC(derLen, bio->heap,
|
|
DYNAMIC_TYPE_TMP_BUFFER)) == NULL)) {
|
|
WOLFSSL_MSG("Malloc failure");
|
|
err = 1;
|
|
}
|
|
if (!err) {
|
|
/* Calculate the unread amount. */
|
|
int len = derLen - sizeof(seq);
|
|
/* Copy the previously read data into the buffer. */
|
|
XMEMCPY(der, seq, sizeof(seq));
|
|
/* Read rest of DER data from BIO. */
|
|
if (wolfSSL_BIO_read(bio, der + sizeof(seq), len) != len) {
|
|
WOLFSSL_MSG("wolfSSL_BIO_read() failure");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (!err) {
|
|
/* Return buffer through parameter. */
|
|
*out = der;
|
|
}
|
|
|
|
if (err) {
|
|
/* Dispose of any allocated buffer on error. */
|
|
XFREE(der, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
derLen = 0;
|
|
}
|
|
return derLen;
|
|
}
|
|
|
|
/* Reads the RSA private key data from a BIO to the internal form.
|
|
*
|
|
* Creates new RSA key from the DER encoded RSA private key read from the BIO.
|
|
*
|
|
* @param [in] bio BIO object to read from.
|
|
* @param [out] out Pointer to RSA key to return through. May be NULL.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_d2i_RSAPrivateKey_bio(WOLFSSL_BIO *bio, WOLFSSL_RSA **out)
|
|
{
|
|
WOLFSSL_RSA* key = NULL;
|
|
unsigned char* der = NULL;
|
|
int derLen = 0;
|
|
int err;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_RSAPrivateKey_bio()");
|
|
|
|
/* Validate parameters. */
|
|
err = (bio == NULL);
|
|
/* Read just DER encoding from BIO - buffer allocated in call. */
|
|
if ((!err) && ((derLen = wolfssl_read_der_bio(bio, &der)) == 0)) {
|
|
err = 1;
|
|
}
|
|
if (!err) {
|
|
/* Keep der for call to deallocate. */
|
|
const unsigned char* cder = der;
|
|
/* Create an RSA key from the data from the BIO. */
|
|
key = wolfSSL_d2i_RSAPrivateKey(NULL, &cder, derLen);
|
|
err = (key == NULL);
|
|
}
|
|
if ((!err) && (out != NULL)) {
|
|
/* Return the created RSA key through the parameter. */
|
|
*out = key;
|
|
}
|
|
|
|
if (err) {
|
|
/* Dispose of created key on error. */
|
|
wolfSSL_RSA_free(key);
|
|
key = NULL;
|
|
}
|
|
/* Dispose of allocated data. */
|
|
XFREE(der, bio ? bio->heap : NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return key;
|
|
}
|
|
#endif /* defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA) &&
|
|
* !defined(HAVE_FAST_RSA) && !NO_BIO */
|
|
|
|
#endif /* OPENSSL_ALL || WOLFSSL_ASIO || WOLFSSL_HAPROXY || WOLFSSL_QT */
|
|
|
|
/*
|
|
* RSA DER APIs
|
|
*/
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
/* Create a DER encoding of key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] outBuf Allocated buffer containing DER encoding.
|
|
* May be NULL.
|
|
* @param [in] publicKey Whether to encode as public key.
|
|
* @return Encoding size on success.
|
|
* @return -ve on failure.
|
|
*/
|
|
int wolfSSL_RSA_To_Der(WOLFSSL_RSA* rsa, byte** outBuf, int publicKey,
|
|
void* heap)
|
|
{
|
|
byte* p = NULL;
|
|
int ret;
|
|
|
|
if (outBuf != NULL) {
|
|
p = *outBuf;
|
|
}
|
|
ret = wolfSSL_RSA_To_Der_ex(rsa, outBuf, publicKey, heap);
|
|
if ((ret > 0) && (p != NULL)) {
|
|
*outBuf = p;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* Create a DER encoding of key.
|
|
*
|
|
* Buffer allocated with heap and DYNAMIC_TYPE_TMP_BUFFER.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in, out] outBuf On in, pointer to allocated buffer or NULL.
|
|
* May be NULL.
|
|
* On out, newly allocated buffer or pointer to byte
|
|
* after encoding in passed in buffer.
|
|
* @param [in] publicKey Whether to encode as public key.
|
|
* @return Encoding size on success.
|
|
* @return -ve on failure.
|
|
*/
|
|
static int wolfSSL_RSA_To_Der_ex(WOLFSSL_RSA* rsa, byte** outBuf, int publicKey,
|
|
void* heap)
|
|
{
|
|
int ret = 1;
|
|
int derSz = 0;
|
|
byte* derBuf = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_To_Der");
|
|
|
|
/* Unused if memory is disabled. */
|
|
(void)heap;
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || ((publicKey != 0) && (publicKey != 1))) {
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_To_Der", BAD_FUNC_ARG);
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
/* Push external RSA data into internal RSA key if not set. */
|
|
if ((ret == 1) && (!rsa->inSet)) {
|
|
ret = SetRsaInternal(rsa);
|
|
}
|
|
/* wc_RsaKeyToPublicDer encode regardless of values. */
|
|
if ((ret == 1) && publicKey && (mp_iszero(&((RsaKey*)rsa->internal)->n) ||
|
|
mp_iszero(&((RsaKey*)rsa->internal)->e))) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
if (publicKey) {
|
|
/* Calculate length of DER encoded RSA public key. */
|
|
derSz = wc_RsaPublicKeyDerSize((RsaKey*)rsa->internal, 1);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_RsaPublicKeyDerSize failed");
|
|
ret = derSz;
|
|
}
|
|
}
|
|
else {
|
|
/* Calculate length of DER encoded RSA private key. */
|
|
derSz = wc_RsaKeyToDer((RsaKey*)rsa->internal, NULL, 0);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_RsaKeyToDer failed");
|
|
ret = derSz;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ((ret == 1) && (outBuf != NULL)) {
|
|
derBuf = *outBuf;
|
|
if (derBuf == NULL) {
|
|
/* Allocate buffer to hold DER encoded RSA key. */
|
|
derBuf = (byte*)XMALLOC(derSz, heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
ret = MEMORY_ERROR;
|
|
}
|
|
}
|
|
}
|
|
if ((ret == 1) && (outBuf != NULL)) {
|
|
if (publicKey) {
|
|
/* RSA public key to DER. */
|
|
derSz = wc_RsaKeyToPublicDer((RsaKey*)rsa->internal, derBuf, derSz);
|
|
}
|
|
else {
|
|
/* RSA private key to DER. */
|
|
derSz = wc_RsaKeyToDer((RsaKey*)rsa->internal, derBuf, derSz);
|
|
}
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("RSA key encoding failed");
|
|
ret = derSz;
|
|
}
|
|
else if ((*outBuf) != NULL) {
|
|
derBuf = NULL;
|
|
*outBuf += derSz;
|
|
}
|
|
else {
|
|
/* Return allocated buffer. */
|
|
*outBuf = derBuf;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Success - return DER encoding size. */
|
|
ret = derSz;
|
|
}
|
|
|
|
if ((outBuf != NULL) && (*outBuf != derBuf)) {
|
|
/* Not returning buffer, needs to be disposed of. */
|
|
XFREE(derBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
}
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_To_Der", ret);
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
|
|
/* Load the DER encoded private RSA key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] derBuf Buffer holding DER encoding.
|
|
* @param [in] derSz Length of DER encoding.
|
|
* @return 1 on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_LoadDer(WOLFSSL_RSA* rsa, const unsigned char* derBuf,
|
|
int derSz)
|
|
{
|
|
/* Call implementation that handles both private and public keys. */
|
|
return wolfSSL_RSA_LoadDer_ex(rsa, derBuf, derSz, WOLFSSL_RSA_LOAD_PRIVATE);
|
|
}
|
|
|
|
/* Load the DER encoded public or private RSA key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] derBuf Buffer holding DER encoding.
|
|
* @param [in] derSz Length of DER encoding.
|
|
* @param [in] opt Indicates public or private key.
|
|
* (WOLFSSL_RSA_LOAD_PUBLIC or WOLFSSL_RSA_LOAD_PRIVATE)
|
|
* @return 1 on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_LoadDer_ex(WOLFSSL_RSA* rsa, const unsigned char* derBuf,
|
|
int derSz, int opt)
|
|
{
|
|
int ret = 1;
|
|
int res;
|
|
word32 idx = 0;
|
|
word32 algId;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_LoadDer");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->internal == NULL) || (derBuf == NULL) ||
|
|
(derSz <= 0)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
rsa->pkcs8HeaderSz = 0;
|
|
/* Check if input buffer has PKCS8 header. In the case that it does not
|
|
* have a PKCS8 header then do not error out. */
|
|
res = ToTraditionalInline_ex((const byte*)derBuf, &idx, (word32)derSz,
|
|
&algId);
|
|
if (res > 0) {
|
|
/* Store size of PKCS#8 header for encoding. */
|
|
WOLFSSL_MSG("Found PKCS8 header");
|
|
rsa->pkcs8HeaderSz = (word16)idx;
|
|
}
|
|
/* When decoding and not PKCS#8, return will be ASN_PARSE_E. */
|
|
else if (res != ASN_PARSE_E) {
|
|
/* Something went wrong while decoding. */
|
|
WOLFSSL_MSG("Unexpected error with trying to remove PKCS#8 header");
|
|
ret = -1;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Decode private or public key data. */
|
|
if (opt == WOLFSSL_RSA_LOAD_PRIVATE) {
|
|
res = wc_RsaPrivateKeyDecode(derBuf, &idx, (RsaKey*)rsa->internal,
|
|
derSz);
|
|
}
|
|
else {
|
|
res = wc_RsaPublicKeyDecode(derBuf, &idx, (RsaKey*)rsa->internal,
|
|
derSz);
|
|
}
|
|
/* Check for error. */
|
|
if (res < 0) {
|
|
if (opt == WOLFSSL_RSA_LOAD_PRIVATE) {
|
|
WOLFSSL_MSG("RsaPrivateKeyDecode failed");
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("RsaPublicKeyDecode failed");
|
|
}
|
|
WOLFSSL_ERROR_VERBOSE(res);
|
|
ret = -1;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Set external RSA key data from wolfCrypt key. */
|
|
if (SetRsaExternal(rsa) != 1) {
|
|
ret = -1;
|
|
}
|
|
else {
|
|
rsa->inSet = 1;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
/*
|
|
* RSA PEM APIs
|
|
*/
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
#ifndef NO_BIO
|
|
|
|
/* Writes PEM encoding of an RSA private key to a BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @param [in] cipher Cipher to use when PEM encrypted.
|
|
* @param [in] passwd Password string when PEM encrypted.
|
|
* @param [in] len Length of password string when PEM encrypted.
|
|
* @param [in] cb Password callback to use when PEM encrypted.
|
|
* @param [in] arg NUL terminated string for passphrase when PEM encrypted.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_bio_RSAPrivateKey(WOLFSSL_BIO* bio, WOLFSSL_RSA* rsa,
|
|
const WOLFSSL_EVP_CIPHER* cipher, unsigned char* passwd, int len,
|
|
wc_pem_password_cb* cb, void* arg)
|
|
{
|
|
int ret = 1;
|
|
WOLFSSL_EVP_PKEY* pkey = NULL;
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
int derSz;
|
|
byte* derBuf = NULL;
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
|
|
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_RSAPrivateKey");
|
|
|
|
/* Validate parameters. */
|
|
if ((bio == NULL) || (rsa == NULL)) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Create a new EVP PKEY to hold data. */
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Setup EVP_PKEY. */
|
|
pkey->type = EVP_PKEY_RSA;
|
|
pkey->rsa = rsa;
|
|
pkey->ownRsa = 0;
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
/* Encode key as DER - buffer allocated in call. */
|
|
if ((derSz = wolfSSL_RSA_To_Der(rsa, &derBuf, 0, bio->heap)) < 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed");
|
|
ret = 0;
|
|
}
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed to get buffer");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Store that buffer and length into EVP_PKEY. */
|
|
pkey->pkey.ptr = (char*)derBuf;
|
|
pkey->pkey_sz = derSz;
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
|
|
|
|
/* Use EVP_PKEY API to create PEM encoding and write to BIO. */
|
|
ret = wolfSSL_PEM_write_bio_PrivateKey(bio, pkey, cipher, passwd, len,
|
|
cb, arg);
|
|
}
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
/* Dispose of DER buffer. */
|
|
XFREE(derBuf, bio ? bio->heap : NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (pkey != NULL) {
|
|
pkey->pkey.ptr = NULL;
|
|
pkey->pkey_sz = 0;
|
|
}
|
|
#endif
|
|
/* Dispose of EVP_PEY - no longer needed. */
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA)
|
|
/* Writes PEM encoding of an RSA public key to a BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_bio_RSA_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 1;
|
|
WOLFSSL_EVP_PKEY* pkey = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_RSA_PUBKEY");
|
|
|
|
/* Validate parameters. */
|
|
if ((bio == NULL) || (rsa == NULL)) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Create a new EVP PKEY to hold data. */
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Setup EVP_PKEY */
|
|
pkey->type = EVP_PKEY_RSA;
|
|
pkey->rsa = rsa;
|
|
pkey->ownRsa = 0;
|
|
|
|
/* Use internal EVP_PKEY API to create PEM encoding and write to BIO. */
|
|
ret = pem_write_bio_pubkey(bio, pkey);
|
|
}
|
|
|
|
/* Dispose of EVP_PEY - no longer needed. */
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* Writes PEM encoding of an RSA public key to a file pointer.
|
|
*
|
|
* TODO: Make API available even without BIOs.
|
|
*
|
|
* @param [in] fp File pointer to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_RSAPublicKey(XFILE fp, WOLFSSL_RSA* key)
|
|
{
|
|
int ret = 1;
|
|
WOLFSSL_BIO* bio = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_RSAPublicKey");
|
|
|
|
/* Validate parameters. */
|
|
if ((fp == XBADFILE) || (key == NULL)) {
|
|
WOLFSSL_MSG("Bad argument.");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Create a file BIO to write into with file pointer. */
|
|
bio = wolfSSL_BIO_new_fp(fp, BIO_NOCLOSE);
|
|
if (bio == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_BIO_new failed.");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Call BIO version of API to do work. */
|
|
ret = wolfSSL_PEM_write_bio_RSA_PUBKEY(bio, key);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_bio_RSA_PUBKEY failed.");
|
|
}
|
|
}
|
|
|
|
/* Dispose of BIO - no longer needed. */
|
|
wolfSSL_BIO_free(bio);
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_RSAPublicKey", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !NO_FILESYSTEM */
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA */
|
|
|
|
/* Create an RSA public key by reading the PEM encoded data from the BIO.
|
|
*
|
|
* @param [in] bio BIO object to read from.
|
|
* @param [out] out RSA key created.
|
|
* @param [in] cb Password callback when PEM encrypted.
|
|
* @param [in] pass NUL terminated string for passphrase when PEM encrypted.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA *wolfSSL_PEM_read_bio_RSA_PUBKEY(WOLFSSL_BIO* bio,
|
|
WOLFSSL_RSA** out, wc_pem_password_cb* cb, void *pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_RSA_PUBKEY");
|
|
|
|
/* Read into a new EVP_PKEY. */
|
|
pkey = wolfSSL_PEM_read_bio_PUBKEY(bio, NULL, cb, pass);
|
|
if (pkey != NULL) {
|
|
/* Since the WOLFSSL_RSA structure is being taken from WOLFSSL_EVP_PKEY
|
|
* the flag indicating that the WOLFSSL_RSA structure is owned should be
|
|
* FALSE to avoid having it free'd. */
|
|
pkey->ownRsa = 0;
|
|
rsa = pkey->rsa;
|
|
if (out != NULL) {
|
|
*out = rsa;
|
|
}
|
|
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
}
|
|
|
|
return rsa;
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* Create an RSA public key by reading the PEM encoded data from the BIO.
|
|
*
|
|
* @param [in] fp File pointer to read from.
|
|
* @param [out] out RSA key created.
|
|
* @param [in] cb Password callback when PEM encrypted.
|
|
* @param [in] pass NUL terminated string for passphrase when PEM encrypted.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA *wolfSSL_PEM_read_RSA_PUBKEY(XFILE fp,
|
|
WOLFSSL_RSA** out, wc_pem_password_cb* cb, void *pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_RSA_PUBKEY");
|
|
|
|
/* Validate parameters. */
|
|
if (fp == NULL) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_read_RSA_PUBKEY", BAD_FUNC_ARG);
|
|
return NULL;
|
|
}
|
|
|
|
/* Read into a new EVP_PKEY. */
|
|
pkey = wolfSSL_PEM_read_PUBKEY(fp, NULL, cb, pass);
|
|
if (pkey != NULL) {
|
|
/* Since the WOLFSSL_RSA structure is being taken from WOLFSSL_EVP_PKEY
|
|
* the flag indicating that the WOLFSSL_RSA structure is owned should be
|
|
* FALSE to avoid having it free'd. */
|
|
pkey->ownRsa = 0;
|
|
rsa = pkey->rsa;
|
|
if (out != NULL) {
|
|
*out = rsa;
|
|
}
|
|
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("wolfSSL_PEM_read_PUBKEY failed");
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_read_RSA_PUBKEY", 0);
|
|
|
|
return rsa;
|
|
}
|
|
#endif /* NO_FILESYSTEM */
|
|
#endif /* !NO_BIO */
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_USER_RSA) && \
|
|
(defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
|
|
|
|
/* Writes PEM encoding of an RSA private key to newly allocated buffer.
|
|
*
|
|
* Buffer returned was allocated with: DYNAMIC_TYPE_KEY.
|
|
*
|
|
* @param [in] rsa RSA key to write.
|
|
* @param [in] cipher Cipher to use when PEM encrypted. May be NULL.
|
|
* @param [in] passwd Password string when PEM encrypted. May be NULL.
|
|
* @param [in] passwdSz Length of password string when PEM encrypted.
|
|
* @param [out] pem Allocated buffer with PEM encoding.
|
|
* @param [out] plen Length of PEM encoding.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_mem_RSAPrivateKey(RSA* rsa, const EVP_CIPHER* cipher,
|
|
unsigned char* passwd, int passwdSz, unsigned char **pem, int *plen)
|
|
{
|
|
int ret = 1;
|
|
byte* derBuf = NULL;
|
|
byte* tmp = NULL;
|
|
byte* cipherInfo = NULL;
|
|
int derSz = 0;
|
|
int pemSz;
|
|
const int type = PRIVATEKEY_TYPE;
|
|
const char* header = NULL;
|
|
const char* footer = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_mem_RSAPrivateKey");
|
|
|
|
/* Validate parameters. */
|
|
if ((pem == NULL) || (plen == NULL) || (rsa == NULL) ||
|
|
(rsa->internal == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
/* Get PEM header and footer strings. */
|
|
if ((ret == 1) && (wc_PemGetHeaderFooter(type, &header, &footer) != 0)) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* Set the RSA key data into the wolfCrypt RSA key if not done so. */
|
|
if ((ret == 1) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* Encode wolfCrypt RSA key to DER - derBuf allocated in call. */
|
|
if ((ret == 1) && ((derSz = wolfSSL_RSA_To_Der(rsa, &derBuf, 0,
|
|
rsa->heap)) < 0)) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_To_Der failed");
|
|
ret = 0;
|
|
}
|
|
|
|
/* Encrypt DER buffer if required. */
|
|
if ((ret == 1) && (passwd != NULL) && (passwdSz > 0) && (cipher != NULL)) {
|
|
int blockSz = wolfSSL_EVP_CIPHER_block_size(cipher);
|
|
byte *tmpBuf;
|
|
|
|
/* Add space for padding. */
|
|
tmpBuf = (byte*)XREALLOC(derBuf, derSz + blockSz, rsa->heap,
|
|
DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (tmpBuf == NULL) {
|
|
WOLFSSL_MSG("Extending DER buffer failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
ret = 0;
|
|
}
|
|
else {
|
|
derBuf = tmpBuf;
|
|
|
|
/* Encrypt DER inline. */
|
|
ret = EncryptDerKey(derBuf, &derSz, cipher, passwd, passwdSz,
|
|
&cipherInfo, derSz + blockSz);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("EncryptDerKey failed");
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Calculate PEM encoding size. */
|
|
pemSz = wc_DerToPemEx(derBuf, derSz, NULL, 0, cipherInfo, type);
|
|
if (pemSz <= 0) {
|
|
WOLFSSL_MSG("wc_DerToPemEx failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Allocate space for PEM encoding plus a NUL terminator. */
|
|
tmp = (byte*)XMALLOC(pemSz + 1, NULL, DYNAMIC_TYPE_KEY);
|
|
if (tmp == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* DER to PEM */
|
|
pemSz = wc_DerToPemEx(derBuf, derSz, tmp, pemSz, cipherInfo, type);
|
|
if (pemSz <= 0) {
|
|
WOLFSSL_MSG("wc_DerToPemEx failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* NUL terminate string - PEM. */
|
|
tmp[pemSz] = 0x00;
|
|
/* Return allocated buffer and size. */
|
|
*pem = tmp;
|
|
*plen = pemSz;
|
|
/* Don't free returning buffer. */
|
|
tmp = NULL;
|
|
}
|
|
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_KEY);
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
XFREE(derBuf, rsa ? rsa->heap : NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* Writes PEM encoding of an RSA private key to a file pointer.
|
|
*
|
|
* TODO: Support use of the password callback and callback context.
|
|
*
|
|
* @param [in] fp File pointer to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @param [in] cipher Cipher to use when PEM encrypted. May be NULL.
|
|
* @param [in] passwd Password string when PEM encrypted. May be NULL.
|
|
* @param [in] passwdSz Length of password string when PEM encrypted.
|
|
* @param [in] cb Password callback to use when PEM encrypted. Unused.
|
|
* @param [in] arg NUL terminated string for passphrase when PEM
|
|
* encrypted. Unused.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_RSAPrivateKey(XFILE fp, WOLFSSL_RSA *rsa,
|
|
const EVP_CIPHER *cipher, unsigned char *passwd, int passwdSz,
|
|
wc_pem_password_cb *cb, void *arg)
|
|
{
|
|
int ret = 1;
|
|
byte* pem = NULL;
|
|
int plen;
|
|
|
|
(void)cb;
|
|
(void)arg;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_RSAPrivateKey");
|
|
|
|
/* Validate parameters. */
|
|
if ((fp == XBADFILE) || (rsa == NULL) || (rsa->internal == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Write PEM to buffer that is allocated in the call. */
|
|
ret = wolfSSL_PEM_write_mem_RSAPrivateKey(rsa, cipher, passwd, passwdSz,
|
|
&pem, &plen);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_mem_RSAPrivateKey failed");
|
|
}
|
|
}
|
|
/* Write PEM to file pointer. */
|
|
if ((ret == 1) && ((int)XFWRITE(pem, plen, 1, fp) != 1)) {
|
|
WOLFSSL_MSG("RSA private key file write failed");
|
|
ret = 0;
|
|
}
|
|
|
|
/* Dispose of any allocated PEM buffer. */
|
|
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
|
|
return ret;
|
|
}
|
|
#endif /* NO_FILESYSTEM */
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_USER_RSA && WOLFSSL_PEM_TO_DER */
|
|
|
|
#ifndef NO_BIO
|
|
|
|
/* Create an RSA private key by reading the PEM encoded data from the BIO.
|
|
*
|
|
* @param [in] bio BIO object to read from.
|
|
* @param [out] out RSA key created.
|
|
* @param [in] cb Password callback when PEM encrypted.
|
|
* @param [in] pass NUL terminated string for passphrase when PEM encrypted.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_PEM_read_bio_RSAPrivateKey(WOLFSSL_BIO* bio,
|
|
WOLFSSL_RSA** out, wc_pem_password_cb* cb, void* pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
|
|
WOLFSSL_ENTER("PEM_read_bio_RSAPrivateKey");
|
|
|
|
/* Read PEM encoded RSA private key from a BIO. using generic EVP function.
|
|
*/
|
|
pkey = wolfSSL_PEM_read_bio_PrivateKey(bio, NULL, cb, pass);
|
|
if (pkey != NULL) {
|
|
/* Since the WOLFSSL_RSA structure is being taken from WOLFSSL_EVP_PKEY
|
|
* the flag indicating that the WOLFSSL_RSA structure is owned should be
|
|
* FALSE to avoid having it free'd. */
|
|
pkey->ownRsa = 0;
|
|
rsa = pkey->rsa;
|
|
if (out != NULL) {
|
|
/* Return WOLFSSL_RSA object through parameter too. */
|
|
*out = rsa;
|
|
}
|
|
}
|
|
|
|
/* Dispose of EVP_PKEY wrapper. */
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return rsa;
|
|
}
|
|
|
|
/* Create an RSA private key by reading the PEM encoded data from the file
|
|
* pointer.
|
|
*
|
|
* @param [in] fp File pointer to read from.
|
|
* @param [out] out RSA key created.
|
|
* @param [in] cb Password callback when PEM encrypted.
|
|
* @param [in] pass NUL terminated string for passphrase when PEM encrypted.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
#ifndef NO_FILESYSTEM
|
|
WOLFSSL_RSA* wolfSSL_PEM_read_RSAPrivateKey(XFILE fp, WOLFSSL_RSA** out,
|
|
wc_pem_password_cb* cb, void* pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
|
|
WOLFSSL_ENTER("PEM_read_RSAPrivateKey");
|
|
|
|
/* Read PEM encoded RSA private key from a file pointer. using generic EVP
|
|
* function.
|
|
*/
|
|
pkey = wolfSSL_PEM_read_PrivateKey(fp, NULL, cb, pass);
|
|
if (pkey != NULL) {
|
|
/* Since the WOLFSSL_RSA structure is being taken from WOLFSSL_EVP_PKEY
|
|
* the flag indicating that the WOLFSSL_RSA structure is owned should be
|
|
* FALSE to avoid having it free'd. */
|
|
pkey->ownRsa = 0;
|
|
rsa = pkey->rsa;
|
|
if (out != NULL) {
|
|
/* Return WOLFSSL_RSA object through parameter too. */
|
|
*out = rsa;
|
|
}
|
|
}
|
|
|
|
/* Dispose of EVP_PKEY wrapper. */
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return rsa;
|
|
}
|
|
#endif /* !NO_FILESYSTEM */
|
|
|
|
#endif /* NO_BIO */
|
|
|
|
#if !defined(NO_FILESYSTEM)
|
|
#ifndef NO_WOLFSSL_STUB
|
|
/* Create an RSA public key by reading the PEM encoded data from the BIO.
|
|
*
|
|
* TODO: implement
|
|
*
|
|
* @param [in] bio BIO object to read from.
|
|
* @param [out] out RSA key created.
|
|
* @param [in] cb Password callback when PEM encrypted. May be NULL.
|
|
* @param [in] pass NUL terminated string for passphrase when PEM encrypted.
|
|
* May be NULL.
|
|
* @return RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_PEM_read_RSAPublicKey(XFILE fp, WOLFSSL_RSA** rsa,
|
|
wc_pem_password_cb* cb, void* pass)
|
|
{
|
|
WOLFSSL_STUB("PEM_read_RSAPublicKey");
|
|
WOLFSSL_MSG("wolfSSL_PEM_read_RSAPublicKey not implemented");
|
|
|
|
(void)fp;
|
|
(void)rsa;
|
|
(void)cb;
|
|
(void)pass;
|
|
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
#ifndef NO_WOLFSSL_STUB
|
|
/* Writes PEM encoding of an RSA public key to a file pointer.
|
|
*
|
|
* TODO: implement by calling wolfSSL_PEM_write_RSAPublicKey()?
|
|
*
|
|
* @param [in] fp File pointer to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_PEM_write_RSA_PUBKEY(XFILE fp, WOLFSSL_RSA *rsa)
|
|
{
|
|
WOLFSSL_STUB("PEM_write_RSA_PUBKEY");
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_RSA_PUBKEY not implemented");
|
|
|
|
(void)fp;
|
|
(void)rsa;
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#endif /* NO_FILESYSTEM */
|
|
|
|
/*
|
|
* RSA print APIs
|
|
*/
|
|
|
|
#if defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
|
|
!defined(NO_STDIO_FILESYSTEM)
|
|
/* Print an RSA key to a file pointer.
|
|
*
|
|
* @param [in] fp File pointer to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @param [in] indent Number of spaces to prepend to each line.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_print_fp(XFILE fp, WOLFSSL_RSA* rsa, int indent)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_print_fp");
|
|
|
|
/* Validate parameters. */
|
|
if ((fp == XBADFILE) || (rsa == NULL)) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* Set the external data from the wolfCrypt RSA key if not done. */
|
|
if ((ret == 1) && (!rsa->exSet)) {
|
|
ret = SetRsaExternal(rsa);
|
|
}
|
|
|
|
/* Get the key size from modulus if available. */
|
|
if ((ret == 1) && (rsa->n != NULL)) {
|
|
int keySize = wolfSSL_BN_num_bits(rsa->n);
|
|
if (keySize == 0) {
|
|
ret = 0;
|
|
}
|
|
else {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
else if (XFPRINTF(fp, "RSA Private-Key: (%d bit, 2 primes)\n",
|
|
keySize) < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
/* Print out any components available. */
|
|
if ((ret == 1) && (rsa->n != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "modulus", rsa->n);
|
|
}
|
|
if ((ret == 1) && (rsa->d != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "privateExponent", rsa->d);
|
|
}
|
|
if ((ret == 1) && (rsa->p != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "prime1", rsa->p);
|
|
}
|
|
if ((ret == 1) && (rsa->q != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "prime2", rsa->q);
|
|
}
|
|
if ((ret == 1) && (rsa->dmp1 != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "exponent1", rsa->dmp1);
|
|
}
|
|
if ((ret == 1) && (rsa->dmq1 != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "exponent2", rsa->dmq1);
|
|
}
|
|
if ((ret == 1) && (rsa->iqmp != NULL)) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "coefficient", rsa->iqmp);
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_print_fp", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* XFPRINTF && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
|
|
|
|
#if defined(XSNPRINTF) && !defined(NO_BIO) && !defined(HAVE_FAST_RSA)
|
|
/* snprintf() must be available */
|
|
|
|
/* Maximum size of a header line. */
|
|
#define RSA_PRINT_MAX_HEADER_LINE PRINT_NUM_MAX_INDENT
|
|
|
|
/* Writes the human readable form of RSA to a BIO.
|
|
*
|
|
* @param [in] bio BIO object to write to.
|
|
* @param [in] rsa RSA key to write.
|
|
* @param [in] indent Number of spaces before each line.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_print(WOLFSSL_BIO* bio, WOLFSSL_RSA* rsa, int indent)
|
|
{
|
|
int ret = 1;
|
|
int sz = 0;
|
|
RsaKey* key = NULL;
|
|
char line[RSA_PRINT_MAX_HEADER_LINE];
|
|
int len;
|
|
int i = 0;
|
|
mp_int *num = NULL;
|
|
/* Header strings. */
|
|
const char *name[] = {
|
|
"Modulus:", "Exponent:", "PrivateExponent:", "Prime1:", "Prime2:",
|
|
"Exponent1:", "Exponent2:", "Coefficient:"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_print");
|
|
|
|
/* Validate parameters. */
|
|
if ((bio == NULL) || (rsa == NULL) || (indent > PRINT_NUM_MAX_INDENT)) {
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
key = (RsaKey*)rsa->internal;
|
|
|
|
/* Get size in bits of key for printing out. */
|
|
sz = wolfSSL_RSA_bits(rsa);
|
|
if (sz <= 0) {
|
|
WOLFSSL_MSG("Error getting RSA key size");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Print any indent spaces. */
|
|
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
|
|
}
|
|
if (ret == 1) {
|
|
/* Print header line. */
|
|
len = XSNPRINTF(line, sizeof(line), "\nRSA %s: (%d bit)\n",
|
|
(!mp_iszero(&key->d)) ? "Private-Key" : "Public-Key", sz);
|
|
if (len >= (int)sizeof(line)) {
|
|
WOLFSSL_MSG("Buffer overflow while formatting key preamble");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
if (wolfSSL_BIO_write(bio, line, len) <= 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
for (i = 0; (ret == 1) && (i < RSA_INTS); i++) {
|
|
/* Get mp_int for index. */
|
|
switch(i) {
|
|
case 0:
|
|
/* Print out modulus */
|
|
num = &key->n;
|
|
break;
|
|
case 1:
|
|
num = &key->e;
|
|
break;
|
|
case 2:
|
|
num = &key->d;
|
|
break;
|
|
case 3:
|
|
num = &key->p;
|
|
break;
|
|
case 4:
|
|
num = &key->q;
|
|
break;
|
|
case 5:
|
|
num = &key->dP;
|
|
break;
|
|
case 6:
|
|
num = &key->dQ;
|
|
break;
|
|
case 7:
|
|
num = &key->u;
|
|
break;
|
|
default:
|
|
WOLFSSL_MSG("Bad index value");
|
|
}
|
|
|
|
if (i == 1) {
|
|
/* Print exponent as a 32-bit value. */
|
|
ret = wolfssl_print_value(bio, num, name[i], indent);
|
|
}
|
|
else if (!mp_iszero(num)) {
|
|
/* Print name and MP integer. */
|
|
ret = wolfssl_print_number(bio, num, name[i], indent);
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* XSNPRINTF && !NO_BIO && !HAVE_FAST_RSA */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
/*
|
|
* RSA get/set/test APIs
|
|
*/
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
#if !defined(HAVE_USER_RSA) && !defined(HAVE_FAST_RSA)
|
|
/* Set RSA key data (external) from wolfCrypt RSA key (internal).
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int SetRsaExternal(WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("SetRsaExternal");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->internal == NULL)) {
|
|
WOLFSSL_MSG("rsa key NULL error");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
RsaKey* key = (RsaKey*)rsa->internal;
|
|
|
|
/* Copy modulus. */
|
|
ret = SetIndividualExternal(&rsa->n, &key->n);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa n error");
|
|
}
|
|
if (ret == 1) {
|
|
/* Copy public exponent. */
|
|
ret = SetIndividualExternal(&rsa->e, &key->e);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa e error");
|
|
}
|
|
}
|
|
|
|
if (key->type == RSA_PRIVATE) {
|
|
if (ret == 1) {
|
|
/* Copy private exponent. */
|
|
ret = SetIndividualExternal(&rsa->d, &key->d);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa d error");
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Copy first prime. */
|
|
ret = SetIndividualExternal(&rsa->p, &key->p);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa p error");
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Copy second prime. */
|
|
ret = SetIndividualExternal(&rsa->q, &key->q);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa q error");
|
|
}
|
|
}
|
|
#ifndef RSA_LOW_MEM
|
|
if (ret == 1) {
|
|
/* Copy d mod p-1. */
|
|
ret = SetIndividualExternal(&rsa->dmp1, &key->dP);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa dP error");
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Copy d mod q-1. */
|
|
ret = SetIndividualExternal(&rsa->dmq1, &key->dQ);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa dq error");
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Copy 1/q mod p. */
|
|
ret = SetIndividualExternal(&rsa->iqmp, &key->u);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("rsa u error");
|
|
}
|
|
}
|
|
#endif /* !RSA_LOW_MEM */
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* External values set. */
|
|
rsa->exSet = 1;
|
|
}
|
|
else {
|
|
/* Return 0 on failure. */
|
|
ret = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* !HAVE_USER_RSA && !HAVE_FAST_RSA */
|
|
#endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
#if !defined(HAVE_USER_RSA) && !defined(HAVE_FAST_RSA)
|
|
/* Set wolfCrypt RSA key data (internal) from RSA key (external).
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int SetRsaInternal(WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("SetRsaInternal");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->internal == NULL)) {
|
|
WOLFSSL_MSG("rsa key NULL error");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
RsaKey* key = (RsaKey*)rsa->internal;
|
|
|
|
/* Copy down modulus if available. */
|
|
if ((rsa->n != NULL) && (SetIndividualInternal(rsa->n, &key->n) != 1)) {
|
|
WOLFSSL_MSG("rsa n key error");
|
|
ret = -1;
|
|
}
|
|
|
|
/* Copy down public exponent if available. */
|
|
if ((ret == 1) && (rsa->e != NULL) &&
|
|
(SetIndividualInternal(rsa->e, &key->e) != 1)) {
|
|
WOLFSSL_MSG("rsa e key error");
|
|
ret = -1;
|
|
}
|
|
|
|
/* Enough numbers for public key */
|
|
key->type = RSA_PUBLIC;
|
|
|
|
/* Copy down private exponent if available. */
|
|
if ((ret == 1) && (rsa->d != NULL)) {
|
|
if (SetIndividualInternal(rsa->d, &key->d) != 1) {
|
|
WOLFSSL_MSG("rsa d key error");
|
|
ret = -1;
|
|
}
|
|
else {
|
|
/* Enough numbers for private key */
|
|
key->type = RSA_PRIVATE;
|
|
}
|
|
}
|
|
|
|
/* Copy down first prime if available. */
|
|
if ((ret == 1) && (rsa->p != NULL) &&
|
|
(SetIndividualInternal(rsa->p, &key->p) != 1)) {
|
|
WOLFSSL_MSG("rsa p key error");
|
|
ret = -1;
|
|
}
|
|
|
|
/* Copy down second prime if available. */
|
|
if ((ret == 1) && (rsa->q != NULL) &&
|
|
(SetIndividualInternal(rsa->q, &key->q) != 1)) {
|
|
WOLFSSL_MSG("rsa q key error");
|
|
ret = -1;
|
|
}
|
|
|
|
#ifndef RSA_LOW_MEM
|
|
/* Copy down d mod p-1 if available. */
|
|
if ((ret == 1) && (rsa->dmp1 != NULL) &&
|
|
(SetIndividualInternal(rsa->dmp1, &key->dP) != 1)) {
|
|
WOLFSSL_MSG("rsa dP key error");
|
|
ret = -1;
|
|
}
|
|
|
|
/* Copy down d mod q-1 if available. */
|
|
if ((ret == 1) && (rsa->dmp1 != NULL) &&
|
|
(SetIndividualInternal(rsa->dmq1, &key->dQ) != 1)) {
|
|
WOLFSSL_MSG("rsa dQ key error");
|
|
ret = -1;
|
|
}
|
|
|
|
/* Copy down 1/q mod p if available. */
|
|
if ((ret == 1) && (rsa->iqmp != NULL) &&
|
|
(SetIndividualInternal(rsa->iqmp, &key->u) != 1)) {
|
|
WOLFSSL_MSG("rsa u key error");
|
|
ret = -1;
|
|
}
|
|
#endif /* !RSA_LOW_MEM */
|
|
|
|
if (ret == 1) {
|
|
/* All available numbers have been set down. */
|
|
rsa->inSet = 1;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* HAVE_USER_RSA */
|
|
|
|
/* Set the RSA method into object.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] meth RSA method.
|
|
* @return 1 always.
|
|
*/
|
|
int wolfSSL_RSA_set_method(WOLFSSL_RSA *rsa, WOLFSSL_RSA_METHOD *meth)
|
|
{
|
|
if (rsa != NULL) {
|
|
/* Store the method into object. */
|
|
rsa->meth = meth;
|
|
/* Copy over flags. */
|
|
rsa->flags = meth->flags;
|
|
}
|
|
/* OpenSSL always assumes it will work. */
|
|
return 1;
|
|
}
|
|
|
|
/* Get the RSA method from the RSA object.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return RSA method on success.
|
|
* @return NULL when RSA is NULL or no method set.
|
|
*/
|
|
const WOLFSSL_RSA_METHOD* wolfSSL_RSA_get_method(const WOLFSSL_RSA *rsa)
|
|
{
|
|
return (rsa != NULL) ? rsa->meth : NULL;
|
|
}
|
|
|
|
/* Get the size in bytes of the RSA key.
|
|
*
|
|
* Return compliant with OpenSSL
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return RSA modulus size in bytes.
|
|
* @return 0 on error.
|
|
*/
|
|
int wolfSSL_RSA_size(const WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_size");
|
|
|
|
if (rsa != NULL) {
|
|
/* Make sure we have set the RSA values into wolfCrypt RSA key. */
|
|
if (rsa->inSet || (SetRsaInternal((WOLFSSL_RSA*)rsa) == 1)) {
|
|
/* Get key size in bytes using wolfCrypt RSA key. */
|
|
ret = wc_RsaEncryptSize((RsaKey*)rsa->internal);
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Get the size in bits of the RSA key.
|
|
*
|
|
* Uses external modulus field.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return RSA modulus size in bits.
|
|
* @return 0 on error.
|
|
*/
|
|
int wolfSSL_RSA_bits(const WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_bits");
|
|
|
|
if (rsa != NULL) {
|
|
/* Get number of bits in external modulus. */
|
|
ret = wolfSSL_BN_num_bits(rsa->n);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifndef HAVE_USER_RSA
|
|
|
|
/* Get the BN objects that are the Chinese-Remainder Theorem (CRT) parameters.
|
|
*
|
|
* Only for those that are not NULL parameters.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] dmp1 BN that is d mod (p - 1). May be NULL.
|
|
* @param [out] dmq1 BN that is d mod (q - 1). May be NULL.
|
|
* @param [out] iqmp BN that is 1/q mod p. May be NULL.
|
|
*/
|
|
void wolfSSL_RSA_get0_crt_params(const WOLFSSL_RSA *rsa,
|
|
const WOLFSSL_BIGNUM **dmp1, const WOLFSSL_BIGNUM **dmq1,
|
|
const WOLFSSL_BIGNUM **iqmp)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_get0_crt_params");
|
|
|
|
/* For any parameters not NULL, return the BN from the key or NULL. */
|
|
if (dmp1 != NULL) {
|
|
*dmp1 = (rsa != NULL) ? rsa->dmp1 : NULL;
|
|
}
|
|
if (dmq1 != NULL) {
|
|
*dmq1 = (rsa != NULL) ? rsa->dmq1 : NULL;
|
|
}
|
|
if (iqmp != NULL) {
|
|
*iqmp = (rsa != NULL) ? rsa->iqmp : NULL;
|
|
}
|
|
}
|
|
|
|
/* Set the BN objects that are the Chinese-Remainder Theorem (CRT) parameters
|
|
* into RSA key.
|
|
*
|
|
* If CRT parameter is NULL then there must be one in the RSA key already.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] dmp1 BN that is d mod (p - 1). May be NULL.
|
|
* @param [in] dmq1 BN that is d mod (q - 1). May be NULL.
|
|
* @param [in] iqmp BN that is 1/q mod p. May be NULL.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_set0_crt_params(WOLFSSL_RSA *rsa, WOLFSSL_BIGNUM *dmp1,
|
|
WOLFSSL_BIGNUM *dmq1, WOLFSSL_BIGNUM *iqmp)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_set0_crt_params");
|
|
|
|
/* If a param is NULL in rsa then it must be non-NULL in the
|
|
* corresponding user input. */
|
|
if ((rsa == NULL) || ((rsa->dmp1 == NULL) && (dmp1 == NULL)) ||
|
|
((rsa->dmq1 == NULL) && (dmq1 == NULL)) ||
|
|
((rsa->iqmp == NULL) && (iqmp == NULL))) {
|
|
WOLFSSL_MSG("Bad parameters");
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Replace the BNs. */
|
|
if (dmp1 != NULL) {
|
|
wolfSSL_BN_clear_free(rsa->dmp1);
|
|
rsa->dmp1 = dmp1;
|
|
}
|
|
if (dmq1 != NULL) {
|
|
wolfSSL_BN_clear_free(rsa->dmq1);
|
|
rsa->dmq1 = dmq1;
|
|
}
|
|
if (iqmp != NULL) {
|
|
wolfSSL_BN_clear_free(rsa->iqmp);
|
|
rsa->iqmp = iqmp;
|
|
}
|
|
|
|
/* Set the values into the wolfCrypt RSA key. */
|
|
if (SetRsaInternal(rsa) != 1) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Get the BN objects that are the factors of the RSA key (two primes p and q).
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] p BN that is first prime. May be NULL.
|
|
* @param [out] q BN that is second prime. May be NULL.
|
|
*/
|
|
void wolfSSL_RSA_get0_factors(const WOLFSSL_RSA *rsa, const WOLFSSL_BIGNUM **p,
|
|
const WOLFSSL_BIGNUM **q)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_get0_factors");
|
|
|
|
/* For any primes not NULL, return the BN from the key or NULL. */
|
|
if (p != NULL) {
|
|
*p = (rsa != NULL) ? rsa->p : NULL;
|
|
}
|
|
if (q != NULL) {
|
|
*q = (rsa != NULL) ? rsa->q : NULL;
|
|
}
|
|
}
|
|
|
|
/* Set the BN objects that are the factors of the RSA key (two primes p and q).
|
|
*
|
|
* If factor parameter is NULL then there must be one in the RSA key already.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] p BN that is first prime. May be NULL.
|
|
* @param [in] q BN that is second prime. May be NULL.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_set0_factors(WOLFSSL_RSA *rsa, WOLFSSL_BIGNUM *p,
|
|
WOLFSSL_BIGNUM *q)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_set0_factors");
|
|
|
|
/* If a param is null in r then it must be non-null in the
|
|
* corresponding user input. */
|
|
if (rsa == NULL || ((rsa->p == NULL) && (p == NULL)) ||
|
|
((rsa->q == NULL) && (q == NULL))) {
|
|
WOLFSSL_MSG("Bad parameters");
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Replace the BNs. */
|
|
if (p != NULL) {
|
|
wolfSSL_BN_clear_free(rsa->p);
|
|
rsa->p = p;
|
|
}
|
|
if (q != NULL) {
|
|
wolfSSL_BN_clear_free(rsa->q);
|
|
rsa->q = q;
|
|
}
|
|
|
|
/* Set the values into the wolfCrypt RSA key. */
|
|
if (SetRsaInternal(rsa) != 1) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Get the BN objects for the basic key numbers of the RSA key (modulus, public
|
|
* exponent, private exponent).
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] n BN that is the modulus. May be NULL.
|
|
* @param [out] e BN that is the public exponent. May be NULL.
|
|
* @param [out] d BN that is the private exponent. May be NULL.
|
|
*/
|
|
void wolfSSL_RSA_get0_key(const WOLFSSL_RSA *rsa, const WOLFSSL_BIGNUM **n,
|
|
const WOLFSSL_BIGNUM **e, const WOLFSSL_BIGNUM **d)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_get0_key");
|
|
|
|
/* For any parameters not NULL, return the BN from the key or NULL. */
|
|
if (n != NULL) {
|
|
*n = (rsa != NULL) ? rsa->n : NULL;
|
|
}
|
|
if (e != NULL) {
|
|
*e = (rsa != NULL) ? rsa->e : NULL;
|
|
}
|
|
if (d != NULL) {
|
|
*d = (rsa != NULL) ? rsa->d : NULL;
|
|
}
|
|
}
|
|
|
|
/* Set the BN objects for the basic key numbers into the RSA key (modulus,
|
|
* public exponent, private exponent).
|
|
*
|
|
* If BN parameter is NULL then there must be one in the RSA key already.
|
|
*
|
|
* @param [in,out] rsa RSA key.
|
|
* @param [in] n BN that is the modulus. May be NULL.
|
|
* @param [in] e BN that is the public exponent. May be NULL.
|
|
* @param [in] d BN that is the private exponent. May be NULL.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_set0_key(WOLFSSL_RSA *rsa, WOLFSSL_BIGNUM *n, WOLFSSL_BIGNUM *e,
|
|
WOLFSSL_BIGNUM *d)
|
|
{
|
|
int ret = 1;
|
|
|
|
/* If the fields n and e in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL for n and e. d may be
|
|
* left NULL (in case only the public key is used).
|
|
*/
|
|
if ((rsa == NULL) || ((rsa->n == NULL) && (n == NULL)) ||
|
|
((rsa->e == NULL) && (e == NULL))) {
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
/* Replace the BNs. */
|
|
if (n != NULL) {
|
|
wolfSSL_BN_free(rsa->n);
|
|
rsa->n = n;
|
|
}
|
|
if (e != NULL) {
|
|
wolfSSL_BN_free(rsa->e);
|
|
rsa->e = e;
|
|
}
|
|
if (d != NULL) {
|
|
/* Private key is sensitive data. */
|
|
wolfSSL_BN_clear_free(rsa->d);
|
|
rsa->d = d;
|
|
}
|
|
|
|
/* Set the values into the wolfCrypt RSA key. */
|
|
if (SetRsaInternal(rsa) != 1) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* !HAVE_USER_RSA */
|
|
|
|
/* Get the flags of the RSA key.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return Flags set in RSA key on success.
|
|
* @return 0 when RSA key is NULL.
|
|
*/
|
|
int wolfSSL_RSA_flags(const WOLFSSL_RSA *rsa)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Get flags from the RSA key if available. */
|
|
if (rsa != NULL) {
|
|
ret = rsa->flags;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Set the flags into the RSA key.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] flags Flags to set.
|
|
*/
|
|
void wolfSSL_RSA_set_flags(WOLFSSL_RSA *rsa, int flags)
|
|
{
|
|
/* Add the flags into RSA key if available. */
|
|
if (rsa != NULL) {
|
|
rsa->flags |= flags;
|
|
}
|
|
}
|
|
|
|
/* Clear the flags in the RSA key.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] flags Flags to clear.
|
|
*/
|
|
void wolfSSL_RSA_clear_flags(WOLFSSL_RSA *rsa, int flags)
|
|
{
|
|
/* Clear the flags passed in that are on the RSA key if available. */
|
|
if (rsa != NULL) {
|
|
rsa->flags &= ~flags;
|
|
}
|
|
}
|
|
|
|
/* Test the flags in the RSA key.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return Matching flags of RSA key on success.
|
|
* @return 0 when RSA key is NULL.
|
|
*/
|
|
int wolfSSL_RSA_test_flags(const WOLFSSL_RSA *rsa, int flags)
|
|
{
|
|
/* Return the flags passed in that are set on the RSA key if available. */
|
|
return (rsa != NULL) ? (rsa->flags & flags) : 0;
|
|
}
|
|
|
|
/* Get the extra data, by index, associated with the RSA key.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] idx Index of extra data.
|
|
* @return Extra data (anonymous type) on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
void* wolfSSL_RSA_get_ex_data(const WOLFSSL_RSA *rsa, int idx)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_get_ex_data");
|
|
|
|
#ifdef HAVE_EX_DATA
|
|
return (rsa == NULL) ? NULL :
|
|
wolfSSL_CRYPTO_get_ex_data(&rsa->ex_data, idx);
|
|
#else
|
|
(void)rsa;
|
|
(void)idx;
|
|
|
|
return NULL;
|
|
#endif
|
|
}
|
|
|
|
/* Set extra data against the RSA key at an index.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] idx Index set set extra data at.
|
|
* @param [in] data Extra data of anonymous type.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_set_ex_data(WOLFSSL_RSA *rsa, int idx, void *data)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_set_ex_data");
|
|
|
|
#ifdef HAVE_EX_DATA
|
|
return (rsa == NULL) ? 0 :
|
|
wolfSSL_CRYPTO_set_ex_data(&rsa->ex_data, idx, data);
|
|
#else
|
|
(void)rsa;
|
|
(void)idx;
|
|
(void)data;
|
|
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
|
|
/* Set the extra data and cleanup callback against the RSA key at an index.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] idx Index set set extra data at.
|
|
* @param [in] data Extra data of anonymous type.
|
|
* @param [in] freeCb Callback function to free extra data.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_set_ex_data_with_cleanup(WOLFSSL_RSA *rsa, int idx, void *data,
|
|
wolfSSL_ex_data_cleanup_routine_t freeCb)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_RSA_set_ex_data_with_cleanup");
|
|
|
|
return (rsa == NULL) ? 0 :
|
|
wolfSSL_CRYPTO_set_ex_data_with_cleanup(&rsa->ex_data, idx, data,
|
|
freeCb);
|
|
}
|
|
#endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
|
|
|
|
/*
|
|
* RSA check key APIs
|
|
*/
|
|
|
|
#ifdef WOLFSSL_RSA_KEY_CHECK
|
|
/* Check that the RSA key is valid using wolfCrypt.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_check_key(const WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_check_key");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->internal == NULL)) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* Constant RSA - assume internal data has been set. */
|
|
|
|
/* Check wolfCrypt RSA key. */
|
|
if ((ret == 1) && (wc_CheckRsaKey((RsaKey*)rsa->internal) != 0)) {
|
|
ret = 0;
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_check_key", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_RSA_KEY_CHECK */
|
|
|
|
/*
|
|
* RSA generate APIs
|
|
*/
|
|
|
|
#if !defined(HAVE_USER_RSA) && !defined(HAVE_FAST_RSA)
|
|
/* Get a random number generator associated with the RSA key.
|
|
*
|
|
* If not able, then get the global if possible.
|
|
* *tmpRng must not be an initialized RNG.
|
|
* *tmpRng is allocated when WOLFSSL_SMALL_STACK is defined and an RNG isn't
|
|
* associated with the wolfCrypt RSA key.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] tmpRng Temporary random number generator.
|
|
* @param [out] initTmpRng Temporary random number generator was initialized.
|
|
*
|
|
* @return A wolfCrypt RNG to use on success.
|
|
* @return NULL on error.
|
|
*/
|
|
WC_RNG* WOLFSSL_RSA_GetRNG(WOLFSSL_RSA* rsa, WC_RNG** tmpRng, int* initTmpRng)
|
|
{
|
|
WC_RNG* rng = NULL;
|
|
int err = 0;
|
|
|
|
/* Check validity of parameters. */
|
|
if ((rsa == NULL) || (initTmpRng == NULL)) {
|
|
err = 1;
|
|
}
|
|
if (!err) {
|
|
/* Haven't initialized any RNG passed through tmpRng. */
|
|
*initTmpRng = 0;
|
|
|
|
#if !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING)
|
|
/* Use wolfCrypt RSA key's RNG if available/set. */
|
|
rng = ((RsaKey*)rsa->internal)->rng;
|
|
#endif
|
|
}
|
|
if ((!err) && (rng == NULL) && (tmpRng != NULL)) {
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Allocate RNG object . */
|
|
rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#else
|
|
/* Use object in *tmpRng. */
|
|
rng = *tmpRng;
|
|
#endif
|
|
/* Initialize RNG object passed in or allocated. */
|
|
if ((rng != NULL) && (wc_InitRng(rng) == 0)) {
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Return RNG through tmpRng as well. */
|
|
*tmpRng = rng;
|
|
#endif
|
|
/* Indicate RNG object must be finalized before freeing. */
|
|
*initTmpRng = 1;
|
|
}
|
|
if (*tmpRng == NULL) {
|
|
WOLFSSL_MSG("Couldn't use local RNG, trying global");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of allocated RNG and *tmpRng stays NULL. */
|
|
XFREE(rng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
}
|
|
|
|
return rng;
|
|
}
|
|
#endif
|
|
|
|
/* Use the wolfCrypt RSA APIs to generate a new RSA key.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @param [in] bits Number of bits that the modulus must have.
|
|
* @param [in] e A BN object holding the public exponent to use.
|
|
* @param [in] cb Status callback. Unused.
|
|
* @return 0 on success.
|
|
* @return wolfSSL native error code on error.
|
|
*/
|
|
static int wolfssl_rsa_generate_key_native(WOLFSSL_RSA* rsa, int bits,
|
|
WOLFSSL_BIGNUM* e, void* cb)
|
|
{
|
|
#ifdef WOLFSSL_KEY_GEN
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG _tmpRng[1];
|
|
WC_RNG* tmpRng = _tmpRng;
|
|
#endif
|
|
int initTmpRng = 0;
|
|
WC_RNG* rng = NULL;
|
|
#endif
|
|
|
|
(void)cb;
|
|
|
|
WOLFSSL_ENTER("wolfssl_rsa_generate_key_native");
|
|
|
|
#ifdef WOLFSSL_KEY_GEN
|
|
/* Get RNG in wolfCrypt RSA key or initialize a new one (or global). */
|
|
rng = WOLFSSL_RSA_GetRNG(rsa, (WC_RNG**)&tmpRng, &initTmpRng);
|
|
if (rng == NULL) {
|
|
/* Something went wrong so return memory error. */
|
|
ret = MEMORY_E;
|
|
}
|
|
if (ret == 0) {
|
|
/* Generate an RSA key. */
|
|
ret = wc_MakeRsaKey((RsaKey*)rsa->internal, bits,
|
|
(long)wolfSSL_BN_get_word(e), rng);
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_MakeRsaKey failed");
|
|
}
|
|
}
|
|
if (ret == 0) {
|
|
/* Get the values from wolfCrypt RSA key into external RSA key. */
|
|
ret = SetRsaExternal(rsa);
|
|
if (ret == 1) {
|
|
/* Internal matches external. */
|
|
rsa->inSet = 1;
|
|
/* Return success. */
|
|
ret = 0;
|
|
}
|
|
else {
|
|
/* Something went wrong so return memory error. */
|
|
ret = MEMORY_E;
|
|
}
|
|
}
|
|
|
|
/* Finalize RNG if initialized in WOLFSSL_RSA_GetRNG(). */
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of any allocated RNG. */
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
#else
|
|
WOLFSSL_MSG("No Key Gen built in");
|
|
|
|
(void)rsa;
|
|
(void)e;
|
|
(void)bits;
|
|
|
|
return NOT_COMPILED_IN;
|
|
#endif
|
|
}
|
|
|
|
/* Generate an RSA key that has the specified modulus size and public exponent.
|
|
*
|
|
* Note: Because of wc_MakeRsaKey an RSA key size generated can be rounded
|
|
* down to nearest multiple of 8. For example generating a key of size
|
|
* 2999 bits will make a key of size 374 bytes instead of 375 bytes.
|
|
*
|
|
* @param [in] bits Number of bits that the modulus must have i.e. 2048.
|
|
* @param [in] e Public exponent to use i.e. 65537.
|
|
* @param [in] cb Status callback. Unused.
|
|
* @param [in] data Data to pass to status callback. Unused.
|
|
* @return A new RSA key on success.
|
|
* @return NULL on failure.
|
|
*/
|
|
WOLFSSL_RSA* wolfSSL_RSA_generate_key(int bits, unsigned long e,
|
|
void(*cb)(int, int, void*), void* data)
|
|
{
|
|
WOLFSSL_RSA* rsa = NULL;
|
|
WOLFSSL_BIGNUM* bn = NULL;
|
|
int err = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_generate_key");
|
|
|
|
(void)cb;
|
|
(void)data;
|
|
|
|
/* Validate bits. */
|
|
if (bits < 0) {
|
|
WOLFSSL_MSG("Bad argument: bits was less than 0");
|
|
err = 1;
|
|
}
|
|
/* Create a new BN to hold public exponent - for when wolfCrypt supports
|
|
* longer values. */
|
|
if ((!err) && ((bn = wolfSSL_BN_new()) == NULL)) {
|
|
WOLFSSL_MSG("Error creating big number");
|
|
err = 1;
|
|
}
|
|
/* Set public exponent. */
|
|
if ((!err) && (wolfSSL_BN_set_word(bn, e) != 1)) {
|
|
WOLFSSL_MSG("Error using e value");
|
|
err = 1;
|
|
}
|
|
|
|
/* Create an RSA key object to hold generated key. */
|
|
if ((!err) && ((rsa = wolfSSL_RSA_new()) == NULL)) {
|
|
WOLFSSL_MSG("memory error");
|
|
err = 1;
|
|
}
|
|
while (!err) {
|
|
int ret;
|
|
|
|
/* Use wolfCrypt to generate RSA key. */
|
|
ret = wolfssl_rsa_generate_key_native(rsa, bits, bn, NULL);
|
|
#ifdef HAVE_FIPS
|
|
/* Keep trying if failed to find a prime. */
|
|
if (ret == PRIME_GEN_E) {
|
|
continue;
|
|
}
|
|
#endif
|
|
if (ret != WOLFSSL_ERROR_NONE) {
|
|
/* Unrecoverable error in generation. */
|
|
err = 1;
|
|
}
|
|
/* Done generating - unrecoverable error or success. */
|
|
break;
|
|
}
|
|
if (err) {
|
|
/* Dispose of RSA key object if generation didn't work. */
|
|
wolfSSL_RSA_free(rsa);
|
|
/* Returning NULL on error. */
|
|
rsa = NULL;
|
|
}
|
|
/* Dispose of the temporary BN used for the public exponent. */
|
|
wolfSSL_BN_free(bn);
|
|
|
|
return rsa;
|
|
}
|
|
|
|
/* Generate an RSA key that has the specified modulus size and public exponent.
|
|
*
|
|
* Note: Because of wc_MakeRsaKey an RSA key size generated can be rounded
|
|
* down to nearest multiple of 8. For example generating a key of size
|
|
* 2999 bits will make a key of size 374 bytes instead of 375 bytes.
|
|
*
|
|
* @param [in] bits Number of bits that the modulus must have i.e. 2048.
|
|
* @param [in] e Public exponent to use, i.e. 65537, as a BN.
|
|
* @param [in] cb Status callback. Unused.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_generate_key_ex(WOLFSSL_RSA* rsa, int bits, WOLFSSL_BIGNUM* e,
|
|
void* cb)
|
|
{
|
|
int ret = 1;
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->internal == NULL)) {
|
|
WOLFSSL_MSG("bad arguments");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
for (;;) {
|
|
/* Use wolfCrypt to generate RSA key. */
|
|
int gen_ret = wolfssl_rsa_generate_key_native(rsa, bits, e, cb);
|
|
#ifdef HAVE_FIPS
|
|
/* Keep trying again if public key value didn't work. */
|
|
if (gen_ret == PRIME_GEN_E) {
|
|
continue;
|
|
}
|
|
#endif
|
|
if (gen_ret != WOLFSSL_ERROR_NONE) {
|
|
/* Unrecoverable error in generation. */
|
|
ret = 0;
|
|
}
|
|
/* Done generating - unrecoverable error or success. */
|
|
break;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
/*
|
|
* RSA padding APIs
|
|
*/
|
|
|
|
#if defined(WC_RSA_PSS) && (defined(OPENSSL_ALL) || defined(WOLFSSL_ASIO) || \
|
|
defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_NGINX))
|
|
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
|
|
/* Add PKCS#1 PSS padding to hash.
|
|
*
|
|
*
|
|
* +-----------+
|
|
* | M |
|
|
* +-----------+
|
|
* |
|
|
* V
|
|
* Hash
|
|
* |
|
|
* V
|
|
* +--------+----------+----------+
|
|
* M' = |Padding1| mHash | salt |
|
|
* +--------+----------+----------+
|
|
* |
|
|
* +--------+----------+ V
|
|
* DB = |Padding2|maskedseed| Hash
|
|
* +--------+----------+ |
|
|
* | |
|
|
* V | +--+
|
|
* xor <--- MGF <---| |bc|
|
|
* | | +--+
|
|
* | | |
|
|
* V V V
|
|
* +-------------------+----------+--+
|
|
* EM = | maskedDB |maskedseed|bc|
|
|
* +-------------------+----------+--+
|
|
* Diagram taken from https://tools.ietf.org/html/rfc3447#section-9.1
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [out] em Encoded message.
|
|
* @param [in[ mHash Message hash.
|
|
* @param [in] hashAlg Hash algorithm.
|
|
* @param [in] saltLen Length of salt to generate.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_padding_add_PKCS1_PSS(WOLFSSL_RSA *rsa, unsigned char *em,
|
|
const unsigned char *mHash, const WOLFSSL_EVP_MD *hashAlg, int saltLen)
|
|
{
|
|
int ret = 1;
|
|
enum wc_HashType hashType;
|
|
int hashLen;
|
|
int emLen;
|
|
int mgf;
|
|
int initTmpRng = 0;
|
|
WC_RNG *rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG _tmpRng[1];
|
|
WC_RNG* tmpRng = _tmpRng;
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_padding_add_PKCS1_PSS");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (em == NULL) || (mHash == NULL) || (hashAlg == NULL)) {
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get/create an RNG. */
|
|
rng = WOLFSSL_RSA_GetRNG(rsa, (WC_RNG**)&tmpRng, &initTmpRng);
|
|
if (rng == NULL) {
|
|
WOLFSSL_MSG("WOLFSSL_RSA_GetRNG error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* TODO: use wolfCrypt RSA key to get emLen and bits? */
|
|
/* Set the external data from the wolfCrypt RSA key if not done. */
|
|
if ((ret == 1) && (!rsa->exSet)) {
|
|
ret = SetRsaExternal(rsa);
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get the wolfCrypt hash algorithm type. */
|
|
hashType = EvpMd2MacType(hashAlg);
|
|
if (hashType > WC_HASH_TYPE_MAX) {
|
|
WOLFSSL_MSG("EvpMd2MacType error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Get the wolfCrypt MGF algorithm from hash algorithm. */
|
|
mgf = wc_hash2mgf(hashType);
|
|
if (mgf == WC_MGF1NONE) {
|
|
WOLFSSL_MSG("wc_hash2mgf error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Get the length of the hash output. */
|
|
hashLen = wolfSSL_EVP_MD_size(hashAlg);
|
|
if (hashLen < 0) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_MD_size error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get length of RSA key - encrypted message length. */
|
|
emLen = wolfSSL_RSA_size(rsa);
|
|
if (ret <= 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_size error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Calculate the salt length to use for special cases. */
|
|
/* TODO: use special case wolfCrypt values? */
|
|
switch (saltLen) {
|
|
/* Negative saltLen values are treated differently. */
|
|
case RSA_PSS_SALTLEN_DIGEST:
|
|
saltLen = hashLen;
|
|
break;
|
|
case RSA_PSS_SALTLEN_MAX_SIGN:
|
|
case RSA_PSS_SALTLEN_MAX:
|
|
#ifdef WOLFSSL_PSS_LONG_SALT
|
|
saltLen = emLen - hashLen - 2;
|
|
#else
|
|
saltLen = hashLen;
|
|
#endif
|
|
break;
|
|
default:
|
|
if (saltLen < 0) {
|
|
/* No other negative values implemented. */
|
|
WOLFSSL_MSG("invalid saltLen");
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Generate RSA PKCS#1 PSS padding for hash using wolfCrypt. */
|
|
if (wc_RsaPad_ex(mHash, hashLen, em, emLen, RSA_BLOCK_TYPE_1, rng,
|
|
WC_RSA_PSS_PAD, hashType, mgf, NULL, 0, saltLen,
|
|
wolfSSL_BN_num_bits(rsa->n), NULL) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_RsaPad_ex error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Finalize RNG if initialized in WOLFSSL_RSA_GetRNG(). */
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of any allocated RNG. */
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Checks that the hash is valid for the RSA PKCS#1 PSS encoded message.
|
|
*
|
|
* Refer to wolfSSL_RSA_padding_add_PKCS1_PSS for a diagram.
|
|
*
|
|
* @param [in] rsa RSA key.
|
|
* @param [in[ mHash Message hash.
|
|
* @param [in] hashAlg Hash algorithm.
|
|
* @param [in] em Encoded message.
|
|
* @param [in] saltLen Length of salt to generate.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_verify_PKCS1_PSS(WOLFSSL_RSA *rsa, const unsigned char *mHash,
|
|
const WOLFSSL_EVP_MD *hashAlg,
|
|
const unsigned char *em, int saltLen)
|
|
{
|
|
int ret = 1;
|
|
int hashLen;
|
|
int mgf;
|
|
int emLen;
|
|
int mPrimeLen;
|
|
enum wc_HashType hashType;
|
|
byte *mPrime = NULL;
|
|
byte *buf = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_verify_PKCS1_PSS");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (mHash == NULL) || (hashAlg == NULL) || (em == NULL)) {
|
|
ret = 0;
|
|
}
|
|
|
|
/* TODO: use wolfCrypt RSA key to get emLen and bits? */
|
|
/* Set the external data from the wolfCrypt RSA key if not done. */
|
|
if ((ret == 1) && (!rsa->exSet)) {
|
|
ret = SetRsaExternal(rsa);
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get hash length for hash algorithm. */
|
|
hashLen = wolfSSL_EVP_MD_size(hashAlg);
|
|
if (hashLen < 0) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get length of RSA key - encrypted message length. */
|
|
emLen = wolfSSL_RSA_size(rsa);
|
|
if (emLen <= 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_size error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Calculate the salt length to use for special cases. */
|
|
/* TODO: use special case wolfCrypt values. */
|
|
switch (saltLen) {
|
|
/* Negative saltLen values are treated differently */
|
|
case RSA_PSS_SALTLEN_DIGEST:
|
|
saltLen = hashLen;
|
|
break;
|
|
case RSA_PSS_SALTLEN_MAX_SIGN:
|
|
case RSA_PSS_SALTLEN_MAX:
|
|
#ifdef WOLFSSL_PSS_LONG_SALT
|
|
saltLen = emLen - hashLen - 2;
|
|
#else
|
|
saltLen = hashLen;
|
|
#endif
|
|
break;
|
|
default:
|
|
if (saltLen < 0) {
|
|
/* No other negative values implemented. */
|
|
WOLFSSL_MSG("invalid saltLen");
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get the wolfCrypt hash algorithm type. */
|
|
hashType = EvpMd2MacType(hashAlg);
|
|
if (hashType > WC_HASH_TYPE_MAX) {
|
|
WOLFSSL_MSG("EvpMd2MacType error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get the wolfCrypt MGF algorithm from hash algorithm. */
|
|
if ((mgf = wc_hash2mgf(hashType)) == WC_MGF1NONE) {
|
|
WOLFSSL_MSG("wc_hash2mgf error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Allocate buffer to unpad inline with. */
|
|
buf = (byte*)XMALLOC(emLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (buf == NULL) {
|
|
WOLFSSL_MSG("malloc error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Copy encrypted message to temp for inline unpadding. */
|
|
XMEMCPY(buf, em, emLen);
|
|
|
|
/* Remove and verify the PSS padding. */
|
|
mPrimeLen = wc_RsaUnPad_ex(buf, emLen, &mPrime, RSA_BLOCK_TYPE_1,
|
|
WC_RSA_PSS_PAD, hashType, mgf, NULL, 0, saltLen,
|
|
wolfSSL_BN_num_bits(rsa->n), NULL);
|
|
if (mPrimeLen < 0) {
|
|
WOLFSSL_MSG("wc_RsaPad_ex error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Verify the hash is correct. */
|
|
if (wc_RsaPSS_CheckPadding_ex(mHash, hashLen, mPrime, mPrimeLen,
|
|
hashType, saltLen, wolfSSL_BN_num_bits(rsa->n)) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_RsaPSS_CheckPadding_ex error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Dispose of any allocated buffer. */
|
|
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
#endif /* !HAVE_FIPS || FIPS_VERSION_GT(2,0) */
|
|
#endif /* WC_RSA_PSS && (OPENSSL_ALL || WOLFSSL_ASIO || WOLFSSL_HAPROXY ||
|
|
* WOLFSSL_NGINX) */
|
|
|
|
/*
|
|
* RSA sign/verify APIs
|
|
*/
|
|
|
|
#ifndef WOLFSSL_PSS_SALT_LEN_DISCOVER
|
|
#define DEF_PSS_SALT_LEN RSA_PSS_SALT_LEN_DEFAULT
|
|
#else
|
|
#define DEF_PSS_SALT_LEN RSA_PSS_SALT_LEN_DISCOVER
|
|
#endif
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
|
|
#if !defined(HAVE_USER_RSA)
|
|
|
|
/* Encode the message hash.
|
|
*
|
|
* Used by signing and verification.
|
|
*
|
|
* @param [in] hashAlg Hash algorithm OID.
|
|
* @param [in] hash Hash of message to encode for signing.
|
|
* @param [in] hLen Length of hash of message.
|
|
* @param [out] enc Encoded message hash.
|
|
* @param [out] encLen Length of encoded message hash.
|
|
* @param [in] padding Which padding scheme is being used.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
static int wolfssl_rsa_sig_encode(int hashAlg, const unsigned char* hash,
|
|
unsigned int hLen, unsigned char* enc, unsigned int* encLen, int padding)
|
|
{
|
|
int ret = 1;
|
|
int hType = WC_HASH_TYPE_NONE;
|
|
|
|
/* Validate parameters. */
|
|
if ((hash == NULL) || (enc == NULL) || (encLen == NULL)) {
|
|
ret = 0;
|
|
}
|
|
|
|
if ((ret == 1) && (hashAlg != NID_undef) &&
|
|
(padding == RSA_PKCS1_PADDING)) {
|
|
/* Convert hash algorithm to hash type for PKCS#1.5 padding. */
|
|
hType = nid2oid(hashAlg, oidHashType);
|
|
if (hType == -1) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
if ((ret == 1) && (padding == RSA_PKCS1_PADDING)) {
|
|
/* PKCS#1.5 encoding. */
|
|
word32 encSz = wc_EncodeSignature(enc, hash, hLen, hType);
|
|
if (encSz == 0) {
|
|
WOLFSSL_MSG("Bad Encode Signature");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
*encLen = (unsigned int)encSz;
|
|
}
|
|
}
|
|
/* Other padding schemes require the hash as is. */
|
|
if ((ret == 1) && (padding != RSA_PKCS1_PADDING)) {
|
|
XMEMCPY(enc, hash, hLen);
|
|
*encLen = hLen;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Sign the message hash using hash algorithm and RSA key.
|
|
*
|
|
* @param [in] hashAlg Hash algorithm OID.
|
|
* @param [in] hash Hash of message to encode for signing.
|
|
* @param [in] hLen Length of hash of message.
|
|
* @param [out] enc Encoded message hash.
|
|
* @param [out] encLen Length of encoded message hash.
|
|
* @param [in] rsa RSA key.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_sign(int hashAlg, const unsigned char* hash, unsigned int hLen,
|
|
unsigned char* sigRet, unsigned int* sigLen, WOLFSSL_RSA* rsa)
|
|
{
|
|
if (sigLen != NULL) {
|
|
/* No size checking in this API */
|
|
*sigLen = RSA_MAX_SIZE / CHAR_BIT;
|
|
}
|
|
/* flag is 1: output complete signature. */
|
|
return wolfSSL_RSA_sign_generic_padding(hashAlg, hash, hLen, sigRet,
|
|
sigLen, rsa, 1, RSA_PKCS1_PADDING);
|
|
}
|
|
|
|
/* Sign the message hash using hash algorithm and RSA key.
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] hashAlg Hash algorithm NID.
|
|
* @param [in] hash Hash of message to encode for signing.
|
|
* @param [in] hLen Length of hash of message.
|
|
* @param [out] enc Encoded message hash.
|
|
* @param [out] encLen Length of encoded message hash.
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] flag When 1: Output encrypted signature.
|
|
* When 0: Output encoded hash.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_sign_ex(int hashAlg, const unsigned char* hash,
|
|
unsigned int hLen, unsigned char* sigRet, unsigned int* sigLen,
|
|
WOLFSSL_RSA* rsa, int flag)
|
|
{
|
|
int ret = 0;
|
|
|
|
if ((flag == 0) || (flag == 1)) {
|
|
if (sigLen != NULL) {
|
|
/* No size checking in this API */
|
|
*sigLen = RSA_MAX_SIZE / CHAR_BIT;
|
|
}
|
|
ret = wolfSSL_RSA_sign_generic_padding(hashAlg, hash, hLen, sigRet,
|
|
sigLen, rsa, flag, RSA_PKCS1_PADDING);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* Sign a message hash with the chosen message digest, padding, and RSA key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] hashAlg Hash NID
|
|
* @param [in] hash Message hash to sign.
|
|
* @param [in] mLen Length of message hash to sign.
|
|
* @param [out] sigRet Output buffer.
|
|
* @param [in, out] sigLen On Input: length of sigRet buffer.
|
|
* On Output: length of data written to sigRet.
|
|
* @param [in] rsa RSA key used to sign the input.
|
|
* @param [in] flag 1: Output the signature.
|
|
* 0: Output the value that the unpadded signature
|
|
* should be compared to.
|
|
* @param [in] padding Padding to use. Only RSA_PKCS1_PSS_PADDING and
|
|
* RSA_PKCS1_PADDING are currently supported for
|
|
* signing.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_sign_generic_padding(int hashAlg, const unsigned char* hash,
|
|
unsigned int hLen, unsigned char* sigRet, unsigned int* sigLen,
|
|
WOLFSSL_RSA* rsa, int flag, int padding)
|
|
{
|
|
int ret = 1;
|
|
word32 outLen = 0;
|
|
int signSz;
|
|
WC_RNG* rng = NULL;
|
|
int initTmpRng = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
byte* encodedSig = NULL;
|
|
#else
|
|
WC_RNG _tmpRng[1];
|
|
WC_RNG* tmpRng = _tmpRng;
|
|
byte encodedSig[MAX_ENCODED_SIG_SZ];
|
|
#endif
|
|
unsigned int encSz;
|
|
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_sign_generic_padding");
|
|
|
|
if (flag == 0) {
|
|
/* Only encode message. */
|
|
return wolfssl_rsa_sig_encode(hashAlg, hash, hLen, sigRet, sigLen,
|
|
padding);
|
|
}
|
|
|
|
/* Validate parameters. */
|
|
if ((hash == NULL) || (sigRet == NULL) || sigLen == NULL || rsa == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
/* Set wolfCrypt RSA key data from external if not already done. */
|
|
if ((ret == 1) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Get the maximum signature length. */
|
|
outLen = (word32)wolfSSL_BN_num_bytes(rsa->n);
|
|
/* Check not an error return. */
|
|
if (outLen == 0) {
|
|
WOLFSSL_MSG("Bad RSA size");
|
|
ret = 0;
|
|
}
|
|
/* Check signature buffer is big enough. */
|
|
else if (outLen > *sigLen) {
|
|
WOLFSSL_MSG("Output buffer too small");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
if (ret == 1) {
|
|
/* Allocate encoded signature buffer if doing PKCS#1 padding. */
|
|
encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
|
|
DYNAMIC_TYPE_SIGNATURE);
|
|
if (encodedSig == NULL) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if (ret == 1) {
|
|
/* Get/create an RNG. */
|
|
rng = WOLFSSL_RSA_GetRNG(rsa, (WC_RNG**)&tmpRng, &initTmpRng);
|
|
if (rng == NULL) {
|
|
WOLFSSL_MSG("WOLFSSL_RSA_GetRNG error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Either encodes with PKCS#1.5 or copies hash into encodedSig. */
|
|
if ((ret == 1) && (wolfssl_rsa_sig_encode(hashAlg, hash, hLen, encodedSig,
|
|
&encSz, padding) == 0)) {
|
|
WOLFSSL_MSG("Bad Encode Signature");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
switch (padding) {
|
|
#if defined(WC_RSA_NO_PADDING) || defined(WC_RSA_DIRECT)
|
|
case RSA_NO_PADDING:
|
|
if ((signSz = wc_RsaDirect(encodedSig, encSz, sigRet, &outLen,
|
|
(RsaKey*)rsa->internal, RSA_PRIVATE_ENCRYPT, rng)) <= 0) {
|
|
WOLFSSL_MSG("Bad Rsa Sign no pad");
|
|
ret = 0;
|
|
}
|
|
break;
|
|
#endif
|
|
#if defined(WC_RSA_PSS) && !defined(HAVE_SELFTEST) && \
|
|
(!defined(HAVE_FIPS) || FIPS_VERSION_GE(5,1))
|
|
case RSA_PKCS1_PSS_PADDING:
|
|
{
|
|
enum wc_HashType hType =
|
|
wc_OidGetHash(nid2oid(hashAlg, oidHashType));
|
|
#ifndef WOLFSSL_PSS_SALT_LEN_DISCOVER
|
|
WOLFSSL_MSG("Using RSA-PSS with hash length salt. "
|
|
"OpenSSL uses max length by default.");
|
|
#endif
|
|
/* Create RSA PSS signature. */
|
|
if ((signSz = wc_RsaPSS_Sign_ex(encodedSig, encSz, sigRet, outLen,
|
|
hType, wc_hash2mgf(hType), DEF_PSS_SALT_LEN,
|
|
(RsaKey*)rsa->internal, rng)) <= 0) {
|
|
WOLFSSL_MSG("Bad Rsa Sign");
|
|
ret = 0;
|
|
}
|
|
break;
|
|
}
|
|
#endif
|
|
#ifndef WC_NO_RSA_OAEP
|
|
case RSA_PKCS1_OAEP_PADDING:
|
|
/* Not a signature padding scheme. */
|
|
WOLFSSL_MSG("RSA_PKCS1_OAEP_PADDING not supported for signing");
|
|
ret = 0;
|
|
break;
|
|
#endif
|
|
case RSA_PKCS1_PADDING:
|
|
{
|
|
/* Sign (private encrypt) PKCS#1 encoded signature. */
|
|
if ((signSz = wc_RsaSSL_Sign(encodedSig, encSz, sigRet, outLen,
|
|
(RsaKey*)rsa->internal, rng)) <= 0) {
|
|
WOLFSSL_MSG("Bad Rsa Sign");
|
|
ret = 0;
|
|
}
|
|
break;
|
|
}
|
|
default:
|
|
WOLFSSL_MSG("Unsupported padding");
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Return the size of signature generated. */
|
|
*sigLen = (unsigned int)signSz;
|
|
}
|
|
|
|
/* Finalize RNG if initialized in WOLFSSL_RSA_GetRNG(). */
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of any allocated RNG and encoded signature. */
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
XFREE(encodedSig, NULL, DYNAMIC_TYPE_SIGNATURE);
|
|
#endif
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_sign_generic_padding", ret);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* Verify a message hash with the chosen message digest, padding, and RSA key.
|
|
*
|
|
* @param [in] hashAlg Hash NID
|
|
* @param [in] hash Message hash.
|
|
* @param [in] mLen Length of message hash.
|
|
* @param [in] sigRet Signature data.
|
|
* @param [in] sigLen Length of signature data.
|
|
* @param [in] rsa RSA key used to sign the input
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_verify(int hashAlg, const unsigned char* hash,
|
|
unsigned int hLen, const unsigned char* sig, unsigned int sigLen,
|
|
WOLFSSL_RSA* rsa)
|
|
{
|
|
return wolfSSL_RSA_verify_ex(hashAlg, hash, hLen, sig, sigLen, rsa,
|
|
RSA_PKCS1_PADDING);
|
|
}
|
|
|
|
/**
|
|
* Verify a message hash with the chosen message digest, padding, and RSA key.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in] hashAlg Hash NID
|
|
* @param [in] hash Message hash.
|
|
* @param [in] mLen Length of message hash.
|
|
* @param [in] sigRet Signature data.
|
|
* @param [in] sigLen Length of signature data.
|
|
* @param [in] rsa RSA key used to sign the input
|
|
* @param [in] padding Padding to use. Only RSA_PKCS1_PSS_PADDING and
|
|
* RSA_PKCS1_PADDING are currently supported for
|
|
* signing.
|
|
* @return 1 on success.
|
|
* @return 0 on failure.
|
|
*/
|
|
int wolfSSL_RSA_verify_ex(int hashAlg, const unsigned char* hash,
|
|
unsigned int hLen, const unsigned char* sig, unsigned int sigLen,
|
|
WOLFSSL_RSA* rsa, int padding)
|
|
{
|
|
int ret = 1;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
unsigned char* encodedSig = NULL;
|
|
#else
|
|
unsigned char encodedSig[MAX_ENCODED_SIG_SZ];
|
|
#endif
|
|
unsigned char* sigDec = NULL;
|
|
unsigned int len = MAX_ENCODED_SIG_SZ;
|
|
int verLen;
|
|
#if (!defined(HAVE_FIPS) || FIPS_VERSION_GE(5, 1)) && !defined(HAVE_SELFTEST)
|
|
enum wc_HashType hType = WC_HASH_TYPE_NONE;
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RSA_verify");
|
|
|
|
/* Validate parameters. */
|
|
if ((hash == NULL) || (sig == NULL) || (rsa == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Allocate memory for decrypted signature. */
|
|
sigDec = (unsigned char *)XMALLOC(sigLen, NULL,
|
|
DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (sigDec == NULL) {
|
|
WOLFSSL_MSG("Memory failure");
|
|
ret = 0;
|
|
}
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
if ((ret == 1) && (padding != RSA_PKCS1_PSS_PADDING)) {
|
|
/* Allocate memory for encoded signature. */
|
|
encodedSig = (unsigned char *)XMALLOC(len, NULL,
|
|
DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (encodedSig == NULL) {
|
|
WOLFSSL_MSG("Memory failure");
|
|
ret = 0;
|
|
}
|
|
}
|
|
#endif
|
|
if ((ret == 1) && (padding != RSA_PKCS1_PSS_PADDING)) {
|
|
/* Make encoded signature to compare with decrypted signature. */
|
|
if (wolfssl_rsa_sig_encode(hashAlg, hash, hLen, encodedSig, &len,
|
|
padding) <= 0) {
|
|
WOLFSSL_MSG("Message Digest Error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Decrypt signature */
|
|
#if (!defined(HAVE_FIPS) || FIPS_VERSION_GE(5, 1)) && \
|
|
!defined(HAVE_SELFTEST)
|
|
hType = wc_OidGetHash(nid2oid(hashAlg, oidHashType));
|
|
if ((verLen = wc_RsaSSL_Verify_ex2(sig, sigLen, (unsigned char *)sigDec,
|
|
sigLen, (RsaKey*)rsa->internal, padding, hType)) <= 0) {
|
|
WOLFSSL_MSG("RSA Decrypt error");
|
|
ret = 0;
|
|
}
|
|
#else
|
|
verLen = wc_RsaSSL_Verify(sig, sigLen, (unsigned char *)sigDec, sigLen,
|
|
(RsaKey*)rsa->internal);
|
|
if (verLen < 0) {
|
|
ret = 0;
|
|
}
|
|
#endif
|
|
}
|
|
if (ret == 1) {
|
|
#if defined(WC_RSA_PSS) && !defined(HAVE_SELFTEST) && \
|
|
(!defined(HAVE_FIPS) || FIPS_VERSION_GE(5, 1))
|
|
if (padding == RSA_PKCS1_PSS_PADDING) {
|
|
/* Check PSS padding is valid. */
|
|
if (wc_RsaPSS_CheckPadding_ex(hash, hLen, sigDec, verLen,
|
|
hType, DEF_PSS_SALT_LEN,
|
|
mp_count_bits(&((RsaKey*)rsa->internal)->n)) != 0) {
|
|
WOLFSSL_MSG("wc_RsaPSS_CheckPadding_ex error");
|
|
ret = 0;
|
|
}
|
|
}
|
|
else
|
|
#endif /* WC_RSA_PSS && !HAVE_SELFTEST && (!HAVE_FIPS ||
|
|
* FIPS_VERSION >= 5.1) */
|
|
/* Compare decrypted signature to encoded signature. */
|
|
if ((int)len != verLen || XMEMCMP(encodedSig, sigDec, verLen) != 0) {
|
|
WOLFSSL_MSG("wolfSSL_RSA_verify_ex failed");
|
|
ret = 0;
|
|
}
|
|
}
|
|
|
|
/* Dispose of any allocated data. */
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(encodedSig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
XFREE(sigDec, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* RSA public/private encrypt/decrypt APIs
|
|
*/
|
|
|
|
#if !defined(HAVE_USER_RSA) && !defined(HAVE_FAST_RSA)
|
|
|
|
/* Encrypt with the RSA public key.
|
|
*
|
|
* Return compliant with OpenSSL.
|
|
*
|
|
* @param [in] len Length of data to encrypt.
|
|
* @param [in] from Data to encrypt.
|
|
* @param [out] to Encrypted data.
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] padding Type of padding to place around plaintext.
|
|
* @return Size of encrypted data on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_public_encrypt(int len, const unsigned char* from,
|
|
unsigned char* to, WOLFSSL_RSA* rsa, int padding)
|
|
{
|
|
int ret = 0;
|
|
int initTmpRng = 0;
|
|
WC_RNG *rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG _tmpRng[1];
|
|
WC_RNG* tmpRng = _tmpRng;
|
|
#endif
|
|
#if !defined(HAVE_FIPS)
|
|
int mgf = WC_MGF1NONE;
|
|
enum wc_HashType hash = WC_HASH_TYPE_NONE;
|
|
int pad_type;
|
|
#endif
|
|
int outLen = 0;
|
|
|
|
WOLFSSL_ENTER("RSA_public_encrypt");
|
|
|
|
/* Validate parameters. */
|
|
if ((len < 0) || (rsa == NULL) || (rsa->internal == NULL) ||
|
|
(from == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
#if !defined(HAVE_FIPS)
|
|
/* Convert to wolfCrypt padding, hash and MGF. */
|
|
switch (padding) {
|
|
case RSA_PKCS1_PADDING:
|
|
pad_type = WC_RSA_PKCSV15_PAD;
|
|
break;
|
|
case RSA_PKCS1_OAEP_PADDING:
|
|
pad_type = WC_RSA_OAEP_PAD;
|
|
hash = WC_HASH_TYPE_SHA;
|
|
mgf = WC_MGF1SHA1;
|
|
break;
|
|
case RSA_NO_PADDING:
|
|
pad_type = WC_RSA_NO_PAD;
|
|
break;
|
|
default:
|
|
WOLFSSL_MSG("RSA_public_encrypt doesn't support padding scheme");
|
|
ret = -1;
|
|
}
|
|
#else
|
|
/* Check for supported padding schemes in FIPS. */
|
|
/* TODO: Do we support more schemes in later versions of FIPS? */
|
|
if (padding != RSA_PKCS1_PADDING) {
|
|
WOLFSSL_MSG("RSA_public_encrypt pad type not supported in FIPS");
|
|
ret = -1;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* Set wolfCrypt RSA key data from external if not already done. */
|
|
if ((ret == 0) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Calculate maximum length of encrypted data. */
|
|
outLen = wolfSSL_RSA_size(rsa);
|
|
if (outLen == 0) {
|
|
WOLFSSL_MSG("Bad RSA size");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Get an RNG. */
|
|
rng = WOLFSSL_RSA_GetRNG(rsa, (WC_RNG**)&tmpRng, &initTmpRng);
|
|
if (rng == NULL) {
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Use wolfCrypt to public-encrypt with RSA key. */
|
|
#if !defined(HAVE_FIPS)
|
|
ret = wc_RsaPublicEncrypt_ex(from, len, to, outLen,
|
|
(RsaKey*)rsa->internal, rng, pad_type, hash, mgf, NULL, 0);
|
|
#else
|
|
ret = wc_RsaPublicEncrypt(from, len, to, outLen, (RsaKey*)rsa->internal,
|
|
rng);
|
|
#endif
|
|
}
|
|
|
|
/* Finalize RNG if initialized in WOLFSSL_RSA_GetRNG(). */
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of any allocated RNG. */
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
/* wolfCrypt error means return -1. */
|
|
if (ret <= 0) {
|
|
ret = -1;
|
|
}
|
|
WOLFSSL_LEAVE("RSA_public_encrypt", ret);
|
|
return ret;
|
|
}
|
|
|
|
/* Decrypt with the RSA public key.
|
|
*
|
|
* Return compliant with OpenSSL.
|
|
*
|
|
* @param [in] len Length of encrypted data.
|
|
* @param [in] from Encrypted data.
|
|
* @param [out] to Decrypted data.
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] padding Type of padding to around plaintext to remove.
|
|
* @return Size of decrypted data on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_private_decrypt(int len, const unsigned char* from,
|
|
unsigned char* to, WOLFSSL_RSA* rsa, int padding)
|
|
{
|
|
int ret = 0;
|
|
#if !defined(HAVE_FIPS)
|
|
int mgf = WC_MGF1NONE;
|
|
enum wc_HashType hash = WC_HASH_TYPE_NONE;
|
|
int pad_type = WC_RSA_NO_PAD;
|
|
#endif
|
|
int outLen = 0;
|
|
|
|
WOLFSSL_ENTER("RSA_private_decrypt");
|
|
|
|
/* Validate parameters. */
|
|
if ((len < 0) || (rsa == NULL) || (rsa->internal == NULL) ||
|
|
(from == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
#if !defined(HAVE_FIPS)
|
|
switch (padding) {
|
|
case RSA_PKCS1_PADDING:
|
|
pad_type = WC_RSA_PKCSV15_PAD;
|
|
break;
|
|
case RSA_PKCS1_OAEP_PADDING:
|
|
pad_type = WC_RSA_OAEP_PAD;
|
|
hash = WC_HASH_TYPE_SHA;
|
|
mgf = WC_MGF1SHA1;
|
|
break;
|
|
case RSA_NO_PADDING:
|
|
pad_type = WC_RSA_NO_PAD;
|
|
break;
|
|
default:
|
|
WOLFSSL_MSG("RSA_private_decrypt unsupported padding");
|
|
ret = -1;
|
|
}
|
|
#else
|
|
/* Check for supported padding schemes in FIPS. */
|
|
/* TODO: Do we support more schemes in later versions of FIPS? */
|
|
if (padding != RSA_PKCS1_PADDING) {
|
|
WOLFSSL_MSG("RSA_public_encrypt pad type not supported in FIPS");
|
|
ret = -1;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* Set wolfCrypt RSA key data from external if not already done. */
|
|
if ((ret == 0) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Calculate maximum length of decrypted data. */
|
|
outLen = wolfSSL_RSA_size(rsa);
|
|
if (outLen == 0) {
|
|
WOLFSSL_MSG("Bad RSA size");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Use wolfCrypt to private-decrypt with RSA key.
|
|
* Size of 'to' buffer must be size of RSA key */
|
|
#if !defined(HAVE_FIPS)
|
|
ret = wc_RsaPrivateDecrypt_ex(from, len, to, outLen,
|
|
(RsaKey*)rsa->internal, pad_type, hash, mgf, NULL, 0);
|
|
#else
|
|
ret = wc_RsaPrivateDecrypt(from, len, to, outLen,
|
|
(RsaKey*)rsa->internal);
|
|
#endif
|
|
}
|
|
|
|
/* wolfCrypt error means return -1. */
|
|
if (ret <= 0) {
|
|
ret = -1;
|
|
}
|
|
WOLFSSL_LEAVE("RSA_private_decrypt", ret);
|
|
return ret;
|
|
}
|
|
|
|
/* Decrypt with the RSA public key.
|
|
*
|
|
* @param [in] len Length of encrypted data.
|
|
* @param [in] from Encrypted data.
|
|
* @param [out] to Decrypted data.
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] padding Type of padding to around plaintext to remove.
|
|
* @return Size of decrypted data on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_public_decrypt(int len, const unsigned char* from,
|
|
unsigned char* to, WOLFSSL_RSA* rsa, int padding)
|
|
{
|
|
int ret = 0;
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
int pad_type = WC_RSA_NO_PAD;
|
|
#endif
|
|
int outLen = 0;
|
|
|
|
WOLFSSL_ENTER("RSA_public_decrypt");
|
|
|
|
/* Validate parameters. */
|
|
if ((len < 0) || (rsa == NULL) || (rsa->internal == NULL) ||
|
|
(from == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
switch (padding) {
|
|
case RSA_PKCS1_PADDING:
|
|
pad_type = WC_RSA_PKCSV15_PAD;
|
|
break;
|
|
case RSA_NO_PADDING:
|
|
pad_type = WC_RSA_NO_PAD;
|
|
break;
|
|
/* TODO: RSA_X931_PADDING not supported */
|
|
default:
|
|
WOLFSSL_MSG("RSA_public_decrypt unsupported padding");
|
|
ret = -1;
|
|
}
|
|
#else
|
|
if (padding != RSA_PKCS1_PADDING) {
|
|
WOLFSSL_MSG("RSA_public_decrypt pad type not supported in FIPS");
|
|
ret = -1;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* Set wolfCrypt RSA key data from external if not already done. */
|
|
if ((ret == 0) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Calculate maximum length of encrypted data. */
|
|
outLen = wolfSSL_RSA_size(rsa);
|
|
if (outLen == 0) {
|
|
WOLFSSL_MSG("Bad RSA size");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Use wolfCrypt to public-decrypt with RSA key. */
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
/* Size of 'to' buffer must be size of RSA key. */
|
|
ret = wc_RsaSSL_Verify_ex(from, len, to, outLen,
|
|
(RsaKey*)rsa->internal, pad_type);
|
|
#else
|
|
/* For FIPS v1/v2 only PKCSV15 padding is supported */
|
|
ret = wc_RsaSSL_Verify(from, len, to, outLen, (RsaKey*)rsa->internal);
|
|
#endif
|
|
}
|
|
|
|
/* wolfCrypt error means return -1. */
|
|
if (ret <= 0) {
|
|
ret = -1;
|
|
}
|
|
WOLFSSL_LEAVE("RSA_public_decrypt", ret);
|
|
return ret;
|
|
}
|
|
|
|
/* Encrypt with the RSA private key.
|
|
*
|
|
* Calls wc_RsaSSL_Sign.
|
|
*
|
|
* @param [in] len Length of data to encrypt.
|
|
* @param [in] from Data to encrypt.
|
|
* @param [out] to Encrypted data.
|
|
* @param [in] rsa RSA key.
|
|
* @param [in] padding Type of padding to place around plaintext.
|
|
* @return Size of encrypted data on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_private_encrypt(int len, const unsigned char* from,
|
|
unsigned char* to, WOLFSSL_RSA* rsa, int padding)
|
|
{
|
|
int ret = 0;
|
|
int initTmpRng = 0;
|
|
WC_RNG *rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG _tmpRng[1];
|
|
WC_RNG* tmpRng = _tmpRng;
|
|
#endif
|
|
|
|
WOLFSSL_MSG("wolfSSL_RSA_private_encrypt");
|
|
|
|
/* Validate parameters. */
|
|
if ((len < 0) || (rsa == NULL) || (rsa->internal == NULL) ||
|
|
(from == NULL)) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
switch (padding) {
|
|
case RSA_PKCS1_PADDING:
|
|
#ifdef WC_RSA_NO_PADDING
|
|
case RSA_NO_PADDING:
|
|
#endif
|
|
break;
|
|
/* TODO: RSA_X931_PADDING not supported */
|
|
default:
|
|
WOLFSSL_MSG("RSA_private_encrypt unsupported padding");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
/* Set wolfCrypt RSA key data from external if not already done. */
|
|
if ((ret == 0) && (!rsa->inSet) && (SetRsaInternal(rsa) != 1)) {
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Get an RNG. */
|
|
rng = WOLFSSL_RSA_GetRNG(rsa, (WC_RNG**)&tmpRng, &initTmpRng);
|
|
if (rng == NULL) {
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Use wolfCrypt to private-encrypt with RSA key.
|
|
* Size of output buffer must be size of RSA key. */
|
|
if (padding == RSA_PKCS1_PADDING) {
|
|
ret = wc_RsaSSL_Sign(from, (word32)len, to, wolfSSL_RSA_size(rsa),
|
|
(RsaKey*)rsa->internal, rng);
|
|
}
|
|
#ifdef WC_RSA_NO_PADDING
|
|
else if (padding == RSA_NO_PADDING) {
|
|
word32 outLen = wolfSSL_RSA_size(rsa);
|
|
ret = wc_RsaFunction(from, (word32)len, to, &outLen,
|
|
RSA_PRIVATE_ENCRYPT, (RsaKey*)rsa->internal, rng);
|
|
if (ret == 0)
|
|
ret = (int)outLen;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* Finalize RNG if initialized in WOLFSSL_RSA_GetRNG(). */
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
/* Dispose of any allocated RNG. */
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
/* wolfCrypt error means return -1. */
|
|
if (ret <= 0) {
|
|
ret = -1;
|
|
}
|
|
WOLFSSL_LEAVE("wolfSSL_RSA_private_encrypt", ret);
|
|
return ret;
|
|
}
|
|
#endif /* !HAVE_USER_RSA && !HAVE_FAST_RSA */
|
|
|
|
/*
|
|
* RSA misc operation APIs
|
|
*/
|
|
|
|
/* Calculate d mod p-1 and q-1 into BNs.
|
|
*
|
|
* wolfSSL API.
|
|
*
|
|
* @param [in, out] rsa RSA key.
|
|
* @return 1 on success.
|
|
* @return -1 on failure.
|
|
*/
|
|
int wolfSSL_RSA_GenAdd(WOLFSSL_RSA* rsa)
|
|
{
|
|
int ret = 1;
|
|
int err;
|
|
mp_int* t = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int *tmp = (mp_int *)XMALLOC(sizeof(*tmp), rsa->heap,
|
|
DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (tmp == NULL) {
|
|
WOLFSSL_MSG("out of memory");
|
|
return -1;
|
|
}
|
|
#else
|
|
mp_int tmp[1];
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("wolfSSL_RsaGenAdd");
|
|
|
|
/* Validate parameters. */
|
|
if ((rsa == NULL) || (rsa->p == NULL) || (rsa->q == NULL) ||
|
|
(rsa->d == NULL) || (rsa->dmp1 == NULL) || (rsa->dmq1 == NULL)) {
|
|
WOLFSSL_MSG("rsa no init error");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
/* Initialize temp MP integer. */
|
|
if (mp_init(tmp) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_init error");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
if (ret == 1) {
|
|
t = tmp;
|
|
|
|
/* Sub 1 from p into temp. */
|
|
err = mp_sub_d((mp_int*)rsa->p->internal, 1, tmp);
|
|
if (err != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_sub_d error");
|
|
ret = -1;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Calculate d mod (p - 1) into dmp1 MP integer of BN. */
|
|
err = mp_mod((mp_int*)rsa->d->internal, tmp,
|
|
(mp_int*)rsa->dmp1->internal);
|
|
if (err != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_mod error");
|
|
ret = -1;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Sub 1 from q into temp. */
|
|
err = mp_sub_d((mp_int*)rsa->q->internal, 1, tmp);
|
|
if (err != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_sub_d error");
|
|
ret = -1;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
/* Calculate d mod (q - 1) into dmq1 MP integer of BN. */
|
|
err = mp_mod((mp_int*)rsa->d->internal, tmp,
|
|
(mp_int*)rsa->dmq1->internal);
|
|
if (err != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_mod error");
|
|
ret = -1;
|
|
}
|
|
}
|
|
|
|
mp_clear(t);
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmp, rsa->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* !HAVE_USER_RSA */
|
|
|
|
#ifndef NO_WOLFSSL_STUB
|
|
/* Enable blinding for RSA key operations.
|
|
*
|
|
* Blinding is a compile time option in wolfCrypt.
|
|
*
|
|
* @param [in] rsa RSA key. Unused.
|
|
* @param [in] bnCtx BN context to use for blinding. Unused.
|
|
* @return 1 always.
|
|
*/
|
|
int wolfSSL_RSA_blinding_on(WOLFSSL_RSA* rsa, WOLFSSL_BN_CTX* bnCtx)
|
|
{
|
|
WOLFSSL_STUB("RSA_blinding_on");
|
|
WOLFSSL_MSG("wolfSSL_RSA_blinding_on");
|
|
|
|
(void)rsa;
|
|
(void)bnCtx;
|
|
|
|
return 1; /* on by default */
|
|
}
|
|
#endif
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#endif /* !NO_RSA */
|
|
|
|
/*******************************************************************************
|
|
* END OF RSA API
|
|
******************************************************************************/
|
|
|
|
|
|
/*******************************************************************************
|
|
* START OF DSA API
|
|
******************************************************************************/
|
|
|
|
#ifndef NO_DSA
|
|
|
|
#if defined(OPENSSL_EXTRA) && defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
|
|
!defined(NO_STDIO_FILESYSTEM)
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_DSA_print_fp(XFILE fp, WOLFSSL_DSA* dsa, int indent)
|
|
{
|
|
int ret = 1;
|
|
int pBits;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_print_fp");
|
|
|
|
if (fp == XBADFILE || dsa == NULL) {
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1 && dsa->p != NULL) {
|
|
pBits = wolfSSL_BN_num_bits(dsa->p);
|
|
if (pBits == 0) {
|
|
ret = 0;
|
|
}
|
|
else {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
else if (XFPRINTF(fp, "Private-Key: (%d bit)\n", pBits) < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1 && dsa->priv_key != NULL) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "priv", dsa->priv_key);
|
|
}
|
|
if (ret == 1 && dsa->pub_key != NULL) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "pub", dsa->pub_key);
|
|
}
|
|
if (ret == 1 && dsa->p != NULL) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "P", dsa->p);
|
|
}
|
|
if (ret == 1 && dsa->q != NULL) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "Q", dsa->q);
|
|
}
|
|
if (ret == 1 && dsa->g != NULL) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "G", dsa->g);
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_DSA_print_fp", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* OPENSSL_EXTRA && XSNPRINTF && !NO_FILESYSTEM && NO_STDIO_FILESYSTEM */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
static void InitwolfSSL_DSA(WOLFSSL_DSA* dsa)
|
|
{
|
|
if (dsa) {
|
|
dsa->p = NULL;
|
|
dsa->q = NULL;
|
|
dsa->g = NULL;
|
|
dsa->pub_key = NULL;
|
|
dsa->priv_key = NULL;
|
|
dsa->internal = NULL;
|
|
dsa->inSet = 0;
|
|
dsa->exSet = 0;
|
|
}
|
|
}
|
|
|
|
|
|
WOLFSSL_DSA* wolfSSL_DSA_new(void)
|
|
{
|
|
WOLFSSL_DSA* external;
|
|
DsaKey* key;
|
|
|
|
WOLFSSL_MSG("wolfSSL_DSA_new");
|
|
|
|
key = (DsaKey*) XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_new malloc DsaKey failure");
|
|
return NULL;
|
|
}
|
|
|
|
external = (WOLFSSL_DSA*) XMALLOC(sizeof(WOLFSSL_DSA), NULL,
|
|
DYNAMIC_TYPE_DSA);
|
|
if (external == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_new malloc WOLFSSL_DSA failure");
|
|
XFREE(key, NULL, DYNAMIC_TYPE_DSA);
|
|
return NULL;
|
|
}
|
|
|
|
InitwolfSSL_DSA(external);
|
|
if (wc_InitDsaKey(key) != 0) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_new InitDsaKey failure");
|
|
XFREE(key, NULL, DYNAMIC_TYPE_DSA);
|
|
wolfSSL_DSA_free(external);
|
|
return NULL;
|
|
}
|
|
external->internal = key;
|
|
|
|
return external;
|
|
}
|
|
|
|
|
|
void wolfSSL_DSA_free(WOLFSSL_DSA* dsa)
|
|
{
|
|
WOLFSSL_MSG("wolfSSL_DSA_free");
|
|
|
|
if (dsa) {
|
|
if (dsa->internal) {
|
|
FreeDsaKey((DsaKey*)dsa->internal);
|
|
XFREE(dsa->internal, NULL, DYNAMIC_TYPE_DSA);
|
|
dsa->internal = NULL;
|
|
}
|
|
wolfSSL_BN_free(dsa->priv_key);
|
|
wolfSSL_BN_free(dsa->pub_key);
|
|
wolfSSL_BN_free(dsa->g);
|
|
wolfSSL_BN_free(dsa->q);
|
|
wolfSSL_BN_free(dsa->p);
|
|
InitwolfSSL_DSA(dsa); /* set back to NULLs for safety */
|
|
|
|
XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
|
|
|
|
/* dsa = NULL, don't try to access or double free it */
|
|
}
|
|
}
|
|
|
|
/* wolfSSL -> OpenSSL */
|
|
int SetDsaExternal(WOLFSSL_DSA* dsa)
|
|
{
|
|
DsaKey* key;
|
|
WOLFSSL_MSG("Entering SetDsaExternal");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("dsa key NULL error");
|
|
return -1;
|
|
}
|
|
|
|
key = (DsaKey*)dsa->internal;
|
|
|
|
if (SetIndividualExternal(&dsa->p, &key->p) != 1) {
|
|
WOLFSSL_MSG("dsa p key error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->q, &key->q) != 1) {
|
|
WOLFSSL_MSG("dsa q key error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->g, &key->g) != 1) {
|
|
WOLFSSL_MSG("dsa g key error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->pub_key, &key->y) != 1) {
|
|
WOLFSSL_MSG("dsa y key error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->priv_key, &key->x) != 1) {
|
|
WOLFSSL_MSG("dsa x key error");
|
|
return -1;
|
|
}
|
|
|
|
dsa->exSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
/* Openssl -> WolfSSL */
|
|
int SetDsaInternal(WOLFSSL_DSA* dsa)
|
|
{
|
|
DsaKey* key;
|
|
WOLFSSL_MSG("Entering SetDsaInternal");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("dsa key NULL error");
|
|
return -1;
|
|
}
|
|
|
|
key = (DsaKey*)dsa->internal;
|
|
|
|
if (dsa->p != NULL &&
|
|
SetIndividualInternal(dsa->p, &key->p) != 1) {
|
|
WOLFSSL_MSG("rsa p key error");
|
|
return -1;
|
|
}
|
|
|
|
if (dsa->q != NULL &&
|
|
SetIndividualInternal(dsa->q, &key->q) != 1) {
|
|
WOLFSSL_MSG("rsa q key error");
|
|
return -1;
|
|
}
|
|
|
|
if (dsa->g != NULL &&
|
|
SetIndividualInternal(dsa->g, &key->g) != 1) {
|
|
WOLFSSL_MSG("rsa g key error");
|
|
return -1;
|
|
}
|
|
|
|
if (dsa->pub_key != NULL) {
|
|
if (SetIndividualInternal(dsa->pub_key, &key->y) != 1) {
|
|
WOLFSSL_MSG("rsa pub_key error");
|
|
return -1;
|
|
}
|
|
|
|
/* public key */
|
|
key->type = DSA_PUBLIC;
|
|
}
|
|
|
|
if (dsa->priv_key != NULL) {
|
|
if (SetIndividualInternal(dsa->priv_key, &key->x) != 1) {
|
|
WOLFSSL_MSG("rsa priv_key error");
|
|
return -1;
|
|
}
|
|
|
|
/* private key */
|
|
key->type = DSA_PRIVATE;
|
|
}
|
|
|
|
dsa->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_DSA_generate_key(WOLFSSL_DSA* dsa)
|
|
{
|
|
int ret = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_generate_key");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (dsa->inSet == 0) {
|
|
WOLFSSL_MSG("No DSA internal set, do it");
|
|
|
|
if (SetDsaInternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaInternal failed");
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
#ifdef WOLFSSL_KEY_GEN
|
|
{
|
|
int initTmpRng = 0;
|
|
WC_RNG *rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG *tmpRng;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return -1;
|
|
#endif
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng) {
|
|
/* These were allocated above by SetDsaInternal(). They should
|
|
* be cleared before wc_MakeDsaKey() which reinitializes
|
|
* x and y. */
|
|
mp_clear(&((DsaKey*)dsa->internal)->x);
|
|
mp_clear(&((DsaKey*)dsa->internal)->y);
|
|
|
|
if (wc_MakeDsaKey(rng, (DsaKey*)dsa->internal) != MP_OKAY)
|
|
WOLFSSL_MSG("wc_MakeDsaKey failed");
|
|
else if (SetDsaExternal(dsa) != 1)
|
|
WOLFSSL_MSG("SetDsaExternal failed");
|
|
else
|
|
ret = 1;
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
}
|
|
#else /* WOLFSSL_KEY_GEN */
|
|
WOLFSSL_MSG("No Key Gen built in");
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* Returns a pointer to a new WOLFSSL_DSA structure on success and NULL on fail
|
|
*/
|
|
WOLFSSL_DSA* wolfSSL_DSA_generate_parameters(int bits, unsigned char* seed,
|
|
int seedLen, int* counterRet, unsigned long* hRet,
|
|
WOLFSSL_BN_CB cb, void* CBArg)
|
|
{
|
|
WOLFSSL_DSA* dsa;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_generate_parameters()");
|
|
|
|
(void)cb;
|
|
(void)CBArg;
|
|
dsa = wolfSSL_DSA_new();
|
|
if (dsa == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_DSA_generate_parameters_ex(dsa, bits, seed, seedLen,
|
|
counterRet, hRet, NULL) != 1) {
|
|
wolfSSL_DSA_free(dsa);
|
|
return NULL;
|
|
}
|
|
|
|
return dsa;
|
|
}
|
|
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits,
|
|
unsigned char* seed, int seedLen,
|
|
int* counterRet,
|
|
unsigned long* hRet, void* cb)
|
|
{
|
|
int ret = 0;
|
|
|
|
(void)bits;
|
|
(void)seed;
|
|
(void)seedLen;
|
|
(void)counterRet;
|
|
(void)hRet;
|
|
(void)cb;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_generate_parameters_ex");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_KEY_GEN
|
|
{
|
|
int initTmpRng = 0;
|
|
WC_RNG *rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG *tmpRng;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return -1;
|
|
#endif
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng) {
|
|
if (wc_MakeDsaParameters(rng, bits,
|
|
(DsaKey*)dsa->internal) != MP_OKAY)
|
|
WOLFSSL_MSG("wc_MakeDsaParameters failed");
|
|
else if (SetDsaExternal(dsa) != 1)
|
|
WOLFSSL_MSG("SetDsaExternal failed");
|
|
else
|
|
ret = 1;
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
}
|
|
#else /* WOLFSSL_KEY_GEN */
|
|
WOLFSSL_MSG("No Key Gen built in");
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
void wolfSSL_DSA_get0_pqg(const WOLFSSL_DSA *d, const WOLFSSL_BIGNUM **p,
|
|
const WOLFSSL_BIGNUM **q, const WOLFSSL_BIGNUM **g)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_get0_pqg");
|
|
if (d != NULL) {
|
|
if (p != NULL)
|
|
*p = d->p;
|
|
if (q != NULL)
|
|
*q = d->q;
|
|
if (g != NULL)
|
|
*g = d->g;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_DSA_set0_pqg(WOLFSSL_DSA *d, WOLFSSL_BIGNUM *p,
|
|
WOLFSSL_BIGNUM *q, WOLFSSL_BIGNUM *g)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_set0_pqg");
|
|
if (d == NULL || p == NULL || q == NULL || g == NULL) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return 0;
|
|
}
|
|
wolfSSL_BN_free(d->p);
|
|
wolfSSL_BN_free(d->q);
|
|
wolfSSL_BN_free(d->g);
|
|
d->p = p;
|
|
d->q = q;
|
|
d->g = g;
|
|
return 1;
|
|
}
|
|
|
|
void wolfSSL_DSA_get0_key(const WOLFSSL_DSA *d,
|
|
const WOLFSSL_BIGNUM **pub_key, const WOLFSSL_BIGNUM **priv_key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_get0_key");
|
|
if (d != NULL) {
|
|
if (pub_key != NULL)
|
|
*pub_key = d->pub_key;
|
|
if (priv_key != NULL)
|
|
*priv_key = d->priv_key;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_DSA_set0_key(WOLFSSL_DSA *d, WOLFSSL_BIGNUM *pub_key,
|
|
WOLFSSL_BIGNUM *priv_key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_set0_key");
|
|
|
|
/* The private key may be NULL */
|
|
if (pub_key == NULL) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return 0;
|
|
}
|
|
|
|
wolfSSL_BN_free(d->pub_key);
|
|
wolfSSL_BN_free(d->priv_key);
|
|
d->pub_key = pub_key;
|
|
d->priv_key = priv_key;
|
|
|
|
return 1;
|
|
}
|
|
|
|
WOLFSSL_DSA_SIG* wolfSSL_DSA_SIG_new(void)
|
|
{
|
|
WOLFSSL_DSA_SIG* sig;
|
|
WOLFSSL_ENTER("wolfSSL_DSA_SIG_new");
|
|
sig = (WOLFSSL_DSA_SIG*)XMALLOC(sizeof(WOLFSSL_DSA_SIG), NULL,
|
|
DYNAMIC_TYPE_OPENSSL);
|
|
if (sig)
|
|
XMEMSET(sig, 0, sizeof(WOLFSSL_DSA_SIG));
|
|
return sig;
|
|
}
|
|
|
|
void wolfSSL_DSA_SIG_free(WOLFSSL_DSA_SIG *sig)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_SIG_free");
|
|
if (sig) {
|
|
if (sig->r) {
|
|
wolfSSL_BN_free(sig->r);
|
|
}
|
|
if (sig->s) {
|
|
wolfSSL_BN_free(sig->s);
|
|
}
|
|
XFREE(sig, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
}
|
|
}
|
|
|
|
void wolfSSL_DSA_SIG_get0(const WOLFSSL_DSA_SIG *sig,
|
|
const WOLFSSL_BIGNUM **r, const WOLFSSL_BIGNUM **s)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_SIG_get0");
|
|
if (sig != NULL) {
|
|
*r = sig->r;
|
|
*s = sig->s;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_DSA_SIG_set0(WOLFSSL_DSA_SIG *sig, WOLFSSL_BIGNUM *r,
|
|
WOLFSSL_BIGNUM *s)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DSA_SIG_set0");
|
|
if (r == NULL || s == NULL) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return 0;
|
|
}
|
|
|
|
wolfSSL_BN_clear_free(sig->r);
|
|
wolfSSL_BN_clear_free(sig->s);
|
|
sig->r = r;
|
|
sig->s = s;
|
|
|
|
return 1;
|
|
}
|
|
|
|
#ifndef HAVE_SELFTEST
|
|
/**
|
|
*
|
|
* @param sig The input signature to encode
|
|
* @param out The output buffer. If *out is NULL then a new buffer is
|
|
* allocated. Otherwise the output is written to the buffer.
|
|
* @return length on success and -1 on error
|
|
*/
|
|
int wolfSSL_i2d_DSA_SIG(const WOLFSSL_DSA_SIG *sig, byte **out)
|
|
{
|
|
/* Space for sequence + two asn ints */
|
|
byte buf[MAX_SEQ_SZ + 2*(ASN_TAG_SZ + MAX_LENGTH_SZ + DSA_MAX_HALF_SIZE)];
|
|
word32 bufLen = sizeof(buf);
|
|
|
|
WOLFSSL_ENTER("wolfSSL_i2d_DSA_SIG");
|
|
|
|
if (sig == NULL || sig->r == NULL || sig->s == NULL ||
|
|
out == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (StoreECC_DSA_Sig(buf, &bufLen,
|
|
(mp_int*)sig->r->internal, (mp_int*)sig->s->internal) != 0) {
|
|
WOLFSSL_MSG("StoreECC_DSA_Sig error");
|
|
return -1;
|
|
}
|
|
|
|
if (*out == NULL) {
|
|
byte* tmp = (byte*)XMALLOC(bufLen, NULL, DYNAMIC_TYPE_ASN1);
|
|
if (tmp == NULL) {
|
|
WOLFSSL_MSG("malloc error");
|
|
return -1;
|
|
}
|
|
*out = tmp;
|
|
}
|
|
|
|
XMEMCPY(*out, buf, bufLen);
|
|
|
|
return (int)bufLen;
|
|
}
|
|
|
|
/**
|
|
* Same as wolfSSL_DSA_SIG_new but also initializes the internal bignums as well.
|
|
* @return New WOLFSSL_DSA_SIG with r and s created as well
|
|
*/
|
|
static WOLFSSL_DSA_SIG* wolfSSL_DSA_SIG_new_bn(void)
|
|
{
|
|
WOLFSSL_DSA_SIG* ret;
|
|
|
|
if ((ret = wolfSSL_DSA_SIG_new()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_SIG_new error");
|
|
return NULL;
|
|
}
|
|
|
|
if ((ret->r = wolfSSL_BN_new()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_BN_new error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
if ((ret->s = wolfSSL_BN_new()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_BN_new error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* This parses a DER encoded ASN.1 structure. The ASN.1 encoding is:
|
|
* ASN1_SEQUENCE
|
|
* ASN1_INTEGER (DSA r)
|
|
* ASN1_INTEGER (DSA s)
|
|
* Alternatively, if the input is DSA_160_SIG_SIZE or DSA_256_SIG_SIZE in
|
|
* length then this API interprets this as two unsigned binary numbers.
|
|
* @param sig If non-null then free'd first and then newly created
|
|
* WOLFSSL_DSA_SIG is assigned
|
|
* @param pp Input buffer that is moved forward on success
|
|
* @param length Length of input buffer
|
|
* @return Newly created WOLFSSL_DSA_SIG on success or NULL on failure
|
|
*/
|
|
WOLFSSL_DSA_SIG* wolfSSL_d2i_DSA_SIG(WOLFSSL_DSA_SIG **sig,
|
|
const unsigned char **pp, long length)
|
|
{
|
|
WOLFSSL_DSA_SIG* ret;
|
|
mp_int* r;
|
|
mp_int* s;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_DSA_SIG");
|
|
|
|
if (pp == NULL || *pp == NULL || length < 0) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return NULL;
|
|
}
|
|
|
|
if ((ret = wolfSSL_DSA_SIG_new_bn()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_SIG_new_bn error");
|
|
return NULL;
|
|
}
|
|
|
|
r = (mp_int*)ret->r->internal;
|
|
s = (mp_int*)ret->s->internal;
|
|
|
|
if (DecodeECC_DSA_Sig(*pp, (word32)length, r, s) != 0) {
|
|
if (length == DSA_160_SIG_SIZE || length == DSA_256_SIG_SIZE) {
|
|
/* Two raw numbers of length/2 size each */
|
|
if (mp_read_unsigned_bin(r, *pp, (int)length/2) != 0) {
|
|
WOLFSSL_MSG("r mp_read_unsigned_bin error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
if (mp_read_unsigned_bin(s, *pp + (length/2), (int)length/2) != 0) {
|
|
WOLFSSL_MSG("s mp_read_unsigned_bin error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
*pp += length;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("DecodeECC_DSA_Sig error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
}
|
|
else {
|
|
/* DecodeECC_DSA_Sig success move pointer forward */
|
|
#ifndef NO_STRICT_ECDSA_LEN
|
|
*pp += length;
|
|
#else
|
|
{
|
|
/* We need to figure out how much to move by ourselves */
|
|
word32 idx = 0;
|
|
int len = 0;
|
|
if (GetSequence(*pp, &idx, &len, (word32)length) < 0) {
|
|
WOLFSSL_MSG("GetSequence error");
|
|
wolfSSL_DSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
*pp += len;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
if (sig != NULL) {
|
|
if (*sig != NULL)
|
|
wolfSSL_DSA_SIG_free(*sig);
|
|
*sig = ret;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* HAVE_SELFTEST */
|
|
|
|
/* return 1 on success, < 0 otherwise */
|
|
int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
|
|
WOLFSSL_DSA* dsa)
|
|
{
|
|
int ret = -1;
|
|
int initTmpRng = 0;
|
|
WC_RNG* rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_do_sign");
|
|
|
|
if (d == NULL || sigRet == NULL || dsa == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return ret;
|
|
}
|
|
|
|
if (dsa->inSet == 0) {
|
|
WOLFSSL_MSG("No DSA internal set, do it");
|
|
if (SetDsaInternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaInternal failed");
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return -1;
|
|
#endif
|
|
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng) {
|
|
if (wc_DsaSign(d, sigRet, (DsaKey*)dsa->internal, rng) < 0)
|
|
WOLFSSL_MSG("DsaSign failed");
|
|
else
|
|
ret = 1;
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifndef HAVE_SELFTEST
|
|
WOLFSSL_DSA_SIG* wolfSSL_DSA_do_sign_ex(const unsigned char* digest,
|
|
int inLen, WOLFSSL_DSA* dsa)
|
|
{
|
|
byte sigBin[DSA_MAX_SIG_SIZE];
|
|
const byte *tmp = sigBin;
|
|
int sigLen;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_do_sign_ex");
|
|
|
|
if (!digest || !dsa || inLen != WC_SHA_DIGEST_SIZE) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_DSA_do_sign(digest, sigBin, dsa) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_DSA_do_sign error");
|
|
return NULL;
|
|
}
|
|
|
|
if (dsa->internal == NULL) {
|
|
WOLFSSL_MSG("dsa->internal is null");
|
|
return NULL;
|
|
}
|
|
|
|
sigLen = mp_unsigned_bin_size(&((DsaKey*)dsa->internal)->q);
|
|
if (sigLen <= 0) {
|
|
WOLFSSL_MSG("mp_unsigned_bin_size error");
|
|
return NULL;
|
|
}
|
|
|
|
/* 2 * sigLen for the two points r and s */
|
|
return wolfSSL_d2i_DSA_SIG(NULL, &tmp, 2 * sigLen);
|
|
}
|
|
#endif /* !HAVE_SELFTEST */
|
|
|
|
int wolfSSL_DSA_do_verify(const unsigned char* d, unsigned char* sig,
|
|
WOLFSSL_DSA* dsa, int *dsacheck)
|
|
{
|
|
int ret = -1;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_do_verify");
|
|
|
|
if (d == NULL || sig == NULL || dsa == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
if (dsa->inSet == 0)
|
|
{
|
|
WOLFSSL_MSG("No DSA internal set, do it");
|
|
|
|
if (SetDsaInternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaInternal failed");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
ret = DsaVerify(d, sig, (DsaKey*)dsa->internal, dsacheck);
|
|
if (ret != 0 || *dsacheck != 1) {
|
|
WOLFSSL_MSG("DsaVerify failed");
|
|
return ret;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
int wolfSSL_DSA_bits(const WOLFSSL_DSA *d)
|
|
{
|
|
if (!d)
|
|
return 0;
|
|
if (!d->exSet && SetDsaExternal((WOLFSSL_DSA*)d) != 1)
|
|
return 0;
|
|
return wolfSSL_BN_num_bits(d->p);
|
|
}
|
|
|
|
#ifndef HAVE_SELFTEST
|
|
int wolfSSL_DSA_do_verify_ex(const unsigned char* digest, int digest_len,
|
|
WOLFSSL_DSA_SIG* sig, WOLFSSL_DSA* dsa)
|
|
{
|
|
int dsacheck, sz;
|
|
byte sigBin[DSA_MAX_SIG_SIZE];
|
|
byte* sigBinPtr = sigBin;
|
|
DsaKey* key;
|
|
int qSz;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_do_verify_ex");
|
|
|
|
if (!digest || !sig || !dsa || digest_len != WC_SHA_DIGEST_SIZE) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (!sig->r || !sig->s) {
|
|
WOLFSSL_MSG("No signature found in DSA_SIG");
|
|
return 0;
|
|
}
|
|
|
|
if (dsa->inSet == 0) {
|
|
WOLFSSL_MSG("No DSA internal set, do it");
|
|
if (SetDsaInternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
key = (DsaKey*)dsa->internal;
|
|
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("dsa->internal is null");
|
|
return 0;
|
|
}
|
|
|
|
qSz = mp_unsigned_bin_size(&key->q);
|
|
if (qSz < 0 || qSz > DSA_MAX_HALF_SIZE) {
|
|
WOLFSSL_MSG("mp_unsigned_bin_size error");
|
|
return 0;
|
|
}
|
|
|
|
/* read r */
|
|
/* front pad with zeros */
|
|
if ((sz = wolfSSL_BN_num_bytes(sig->r)) < 0 || sz > DSA_MAX_HALF_SIZE)
|
|
return 0;
|
|
while (sz++ < qSz)
|
|
*sigBinPtr++ = 0;
|
|
if (wolfSSL_BN_bn2bin(sig->r, sigBinPtr) == -1)
|
|
return 0;
|
|
|
|
/* Move to s */
|
|
sigBinPtr = sigBin + qSz;
|
|
|
|
/* read s */
|
|
/* front pad with zeros */
|
|
if ((sz = wolfSSL_BN_num_bytes(sig->s)) < 0 || sz > DSA_MAX_HALF_SIZE)
|
|
return 0;
|
|
while (sz++ < qSz)
|
|
*sigBinPtr++ = 0;
|
|
if (wolfSSL_BN_bn2bin(sig->s, sigBinPtr) == -1)
|
|
return 0;
|
|
|
|
if ((wolfSSL_DSA_do_verify(digest, sigBin, dsa, &dsacheck)
|
|
!= 1) || dsacheck != 1) {
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* !HAVE_SELFTEST */
|
|
|
|
WOLFSSL_API int wolfSSL_i2d_DSAparams(const WOLFSSL_DSA* dsa,
|
|
unsigned char** out)
|
|
{
|
|
int ret = 0;
|
|
word32 derLen = 0;
|
|
int preAllocated = 1;
|
|
DsaKey* key = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_i2d_DSAparams");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL || out == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
key = (DsaKey*)dsa->internal;
|
|
ret = wc_DsaKeyToParamsDer_ex(key, NULL, &derLen);
|
|
if (ret == LENGTH_ONLY_E) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 0 && *out == NULL) {
|
|
/* If we're allocating out for the caller, we don't increment out just
|
|
past the end of the DER buffer. If out is already allocated, we do.
|
|
(OpenSSL convention) */
|
|
preAllocated = 0;
|
|
*out = (unsigned char*)XMALLOC(derLen, key->heap, DYNAMIC_TYPE_OPENSSL);
|
|
if (*out == NULL) {
|
|
ret = MEMORY_E;
|
|
}
|
|
}
|
|
if (ret == 0) {
|
|
ret = wc_DsaKeyToParamsDer_ex(key, *out, &derLen);
|
|
}
|
|
if (ret >= 0 && preAllocated == 1) {
|
|
*out += derLen;
|
|
}
|
|
|
|
if (ret < 0 && preAllocated == 0) {
|
|
XFREE(*out, key ? key->heap : NULL, DYNAMIC_TYPE_OPENSSL);
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_i2d_DSAparams", ret);
|
|
|
|
return ret;
|
|
}
|
|
|
|
WOLFSSL_DSA* wolfSSL_d2i_DSAparams(WOLFSSL_DSA** dsa, const unsigned char** der,
|
|
long derLen)
|
|
{
|
|
WOLFSSL_DSA* ret = NULL;
|
|
int err = 0;
|
|
word32 idx = 0;
|
|
int asnLen;
|
|
DsaKey* internalKey = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_DSAparams");
|
|
|
|
if (der == NULL || *der == NULL || derLen <= 0) {
|
|
err = 1;
|
|
}
|
|
if (err == 0) {
|
|
ret = wolfSSL_DSA_new();
|
|
err = ret == NULL;
|
|
}
|
|
if (err == 0) {
|
|
err = GetSequence(*der, &idx, &asnLen, (word32)derLen) <= 0;
|
|
}
|
|
if (err == 0) {
|
|
internalKey = (DsaKey*)ret->internal;
|
|
err = GetInt(&internalKey->p, *der, &idx, (word32)derLen) != 0;
|
|
}
|
|
if (err == 0) {
|
|
err = GetInt(&internalKey->q, *der, &idx, (word32)derLen) != 0;
|
|
}
|
|
if (err == 0) {
|
|
err = GetInt(&internalKey->g, *der, &idx, (word32)derLen) != 0;
|
|
}
|
|
if (err == 0) {
|
|
err = SetIndividualExternal(&ret->p, &internalKey->p)
|
|
!= 1;
|
|
}
|
|
if (err == 0) {
|
|
err = SetIndividualExternal(&ret->q, &internalKey->q)
|
|
!= 1;
|
|
}
|
|
if (err == 0) {
|
|
err = SetIndividualExternal(&ret->g, &internalKey->g)
|
|
!= 1;
|
|
}
|
|
if (err == 0 && dsa != NULL) {
|
|
*dsa = ret;
|
|
}
|
|
|
|
if (err != 0 && ret != NULL) {
|
|
wolfSSL_DSA_free(ret);
|
|
ret = NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(WOLFSSL_KEY_GEN)
|
|
#ifndef NO_BIO
|
|
|
|
/* Takes a DSA Privatekey and writes it out to a WOLFSSL_BIO
|
|
* Returns 1 or 0
|
|
*/
|
|
int wolfSSL_PEM_write_bio_DSAPrivateKey(WOLFSSL_BIO* bio, WOLFSSL_DSA* dsa,
|
|
const EVP_CIPHER* cipher,
|
|
unsigned char* passwd, int len,
|
|
wc_pem_password_cb* cb, void* arg)
|
|
{
|
|
int ret = 0, der_max_len = 0, derSz = 0;
|
|
byte *derBuf;
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_DSAPrivateKey");
|
|
|
|
if (bio == NULL || dsa == NULL) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
return 0;
|
|
}
|
|
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
return 0;
|
|
}
|
|
|
|
pkey->type = EVP_PKEY_DSA;
|
|
pkey->dsa = dsa;
|
|
pkey->ownDsa = 0;
|
|
|
|
/* 4 > size of pub, priv, p, q, g + ASN.1 additional information */
|
|
der_max_len = MAX_DSA_PRIVKEY_SZ;
|
|
|
|
derBuf = (byte*)XMALLOC(der_max_len, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("Malloc failed");
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
/* convert key to der format */
|
|
derSz = wc_DsaKeyToDer((DsaKey*)dsa->internal, derBuf, der_max_len);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_DsaKeyToDer failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
pkey->pkey.ptr = (char*)XMALLOC(derSz, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (pkey->pkey.ptr == NULL) {
|
|
WOLFSSL_MSG("key malloc failed");
|
|
XFREE(derBuf, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
/* add der info to the evp key */
|
|
pkey->pkey_sz = derSz;
|
|
XMEMCPY(pkey->pkey.ptr, derBuf, derSz);
|
|
XFREE(derBuf, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
|
|
ret = wolfSSL_PEM_write_bio_PrivateKey(bio, pkey, cipher, passwd, len,
|
|
cb, arg);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifndef HAVE_SELFTEST
|
|
/* Takes a DSA public key and writes it out to a WOLFSSL_BIO
|
|
* Returns 1 or 0
|
|
*/
|
|
int wolfSSL_PEM_write_bio_DSA_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_DSA* dsa)
|
|
{
|
|
int ret = 0;
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_DSA_PUBKEY");
|
|
|
|
if (bio == NULL || dsa == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
return 0;
|
|
}
|
|
|
|
pkey->type = EVP_PKEY_DSA;
|
|
pkey->dsa = dsa;
|
|
pkey->ownDsa = 0;
|
|
|
|
ret = pem_write_bio_pubkey(bio, pkey);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return ret;
|
|
}
|
|
#endif /* HAVE_SELFTEST */
|
|
#endif /* !NO_BIO */
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_mem_DSAPrivateKey(WOLFSSL_DSA* dsa,
|
|
const EVP_CIPHER* cipher,
|
|
unsigned char* passwd, int passwdSz,
|
|
unsigned char **pem, int *plen)
|
|
{
|
|
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
|
|
byte *derBuf, *tmp, *cipherInfo = NULL;
|
|
int der_max_len = 0, derSz = 0;
|
|
const int type = DSA_PRIVATEKEY_TYPE;
|
|
const char* header = NULL;
|
|
const char* footer = NULL;
|
|
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_mem_DSAPrivateKey");
|
|
|
|
if (pem == NULL || plen == NULL || dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (wc_PemGetHeaderFooter(type, &header, &footer) != 0)
|
|
return 0;
|
|
|
|
if (dsa->inSet == 0) {
|
|
WOLFSSL_MSG("No DSA internal set, do it");
|
|
|
|
if (SetDsaInternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
der_max_len = MAX_DSA_PRIVKEY_SZ;
|
|
|
|
derBuf = (byte*)XMALLOC(der_max_len, NULL, DYNAMIC_TYPE_DER);
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
return 0;
|
|
}
|
|
|
|
/* Key to DER */
|
|
derSz = wc_DsaKeyToDer((DsaKey*)dsa->internal, derBuf, der_max_len);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_DsaKeyToDer failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
return 0;
|
|
}
|
|
|
|
/* encrypt DER buffer if required */
|
|
if (passwd != NULL && passwdSz > 0 && cipher != NULL) {
|
|
int ret;
|
|
|
|
ret = EncryptDerKey(derBuf, &derSz, cipher,
|
|
passwd, passwdSz, &cipherInfo, der_max_len);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("EncryptDerKey failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
return ret;
|
|
}
|
|
/* tmp buffer with a max size */
|
|
*plen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
|
|
(int)XSTRLEN(footer) + 1 + HEADER_ENCRYPTED_KEY_SIZE;
|
|
}
|
|
else { /* tmp buffer with a max size */
|
|
*plen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
|
|
(int)XSTRLEN(footer) + 1;
|
|
}
|
|
|
|
tmp = (byte*)XMALLOC(*plen, NULL, DYNAMIC_TYPE_PEM);
|
|
if (tmp == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
return 0;
|
|
}
|
|
|
|
/* DER to PEM */
|
|
*plen = wc_DerToPemEx(derBuf, derSz, tmp, *plen, cipherInfo, type);
|
|
if (*plen <= 0) {
|
|
WOLFSSL_MSG("wc_DerToPemEx failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
return 0;
|
|
}
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
|
|
*pem = (byte*)XMALLOC((*plen)+1, NULL, DYNAMIC_TYPE_KEY);
|
|
if (*pem == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
return 0;
|
|
}
|
|
XMEMSET(*pem, 0, (*plen)+1);
|
|
|
|
if (XMEMCPY(*pem, tmp, *plen) == NULL) {
|
|
WOLFSSL_MSG("XMEMCPY failed");
|
|
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
return 0;
|
|
}
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
|
|
return 1;
|
|
#else
|
|
(void)dsa;
|
|
(void)cipher;
|
|
(void)passwd;
|
|
(void)passwdSz;
|
|
(void)pem;
|
|
(void)plen;
|
|
return 0;
|
|
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_DSAPrivateKey(XFILE fp, WOLFSSL_DSA *dsa,
|
|
const EVP_CIPHER *enc,
|
|
unsigned char *kstr, int klen,
|
|
wc_pem_password_cb *cb, void *u)
|
|
{
|
|
byte *pem;
|
|
int plen, ret;
|
|
|
|
(void)cb;
|
|
(void)u;
|
|
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_DSAPrivateKey");
|
|
|
|
if (fp == XBADFILE || dsa == NULL || dsa->internal == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
ret = wolfSSL_PEM_write_mem_DSAPrivateKey(dsa, enc, kstr, klen, &pem,
|
|
&plen);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_mem_DSAPrivateKey failed");
|
|
return 0;
|
|
}
|
|
|
|
ret = (int)XFWRITE(pem, plen, 1, fp);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("DSA private key file write failed");
|
|
return 0;
|
|
}
|
|
|
|
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
|
|
return 1;
|
|
}
|
|
|
|
#endif /* NO_FILESYSTEM */
|
|
#endif /* defined(WOLFSSL_KEY_GEN) */
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
#ifndef NO_WOLFSSL_STUB
|
|
int wolfSSL_PEM_write_DSA_PUBKEY(XFILE fp, WOLFSSL_DSA *x)
|
|
{
|
|
(void)fp;
|
|
(void)x;
|
|
WOLFSSL_STUB("PEM_write_DSA_PUBKEY");
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_DSA_PUBKEY not implemented");
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
#endif /* NO_FILESYSTEM */
|
|
|
|
#ifndef NO_BIO
|
|
|
|
#if (defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)) && (!defined(NO_CERTS) && \
|
|
!defined(NO_FILESYSTEM) && defined(WOLFSSL_KEY_GEN))
|
|
/* Uses the same format of input as wolfSSL_PEM_read_bio_PrivateKey but expects
|
|
* the results to be an DSA key.
|
|
*
|
|
* bio structure to read DSA private key from
|
|
* dsa if not null is then set to the result
|
|
* cb password callback for reading PEM
|
|
* pass password string
|
|
*
|
|
* returns a pointer to a new WOLFSSL_DSA structure on success and NULL on fail
|
|
*/
|
|
WOLFSSL_DSA* wolfSSL_PEM_read_bio_DSAPrivateKey(WOLFSSL_BIO* bio,
|
|
WOLFSSL_DSA** dsa,
|
|
wc_pem_password_cb* cb,
|
|
void* pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey = NULL;
|
|
WOLFSSL_DSA* local;
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSAPrivateKey");
|
|
|
|
|
|
pkey = wolfSSL_PEM_read_bio_PrivateKey(bio, NULL, cb, pass);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("Error in PEM_read_bio_PrivateKey");
|
|
return NULL;
|
|
}
|
|
/* Since the WOLFSSL_DSA structure is being taken from WOLFSSL_EVP_PKEY the
|
|
* flag indicating that the WOLFSSL_DSA structure is owned should be FALSE
|
|
* to avoid having it free'd */
|
|
pkey->ownDsa = 0;
|
|
local = pkey->dsa;
|
|
if (dsa != NULL) {
|
|
*dsa = local;
|
|
}
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return local;
|
|
}
|
|
|
|
/* Reads an DSA public key from a WOLFSSL_BIO into a WOLFSSL_DSA.
|
|
* Returns 1 or 0
|
|
*/
|
|
WOLFSSL_DSA *wolfSSL_PEM_read_bio_DSA_PUBKEY(WOLFSSL_BIO* bio,WOLFSSL_DSA** dsa,
|
|
wc_pem_password_cb* cb, void* pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_DSA* local;
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSA_PUBKEY");
|
|
|
|
pkey = wolfSSL_PEM_read_bio_PUBKEY(bio, NULL, cb, pass);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_read_bio_PUBKEY failed");
|
|
return NULL;
|
|
}
|
|
|
|
/* Since the WOLFSSL_DSA structure is being taken from WOLFSSL_EVP_PKEY the
|
|
* flag indicating that the WOLFSSL_DSA structure is owned should be FALSE
|
|
* to avoid having it free'd */
|
|
pkey->ownDsa = 0;
|
|
local = pkey->dsa;
|
|
if (dsa != NULL) {
|
|
*dsa = local;
|
|
}
|
|
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return local;
|
|
}
|
|
#endif /* (OPENSSL_EXTRA || OPENSSL_ALL) && (!NO_CERTS &&
|
|
!NO_FILESYSTEM && WOLFSSL_KEY_GEN) */
|
|
|
|
#endif /* NO_BIO */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
/* return 1 if success, -1 if error */
|
|
int wolfSSL_DSA_LoadDer(WOLFSSL_DSA* dsa, const unsigned char* derBuf, int derSz)
|
|
{
|
|
word32 idx = 0;
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_LoadDer");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL || derBuf == NULL || derSz <= 0) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
ret = DsaPrivateKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal, derSz);
|
|
if (ret < 0) {
|
|
WOLFSSL_MSG("DsaPrivateKeyDecode failed");
|
|
return -1;
|
|
}
|
|
|
|
if (SetDsaExternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaExternal failed");
|
|
return -1;
|
|
}
|
|
|
|
dsa->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Loads DSA key from DER buffer. opt = DSA_LOAD_PRIVATE or DSA_LOAD_PUBLIC.
|
|
returns 1 on success, or 0 on failure. */
|
|
int wolfSSL_DSA_LoadDer_ex(WOLFSSL_DSA* dsa, const unsigned char* derBuf,
|
|
int derSz, int opt)
|
|
{
|
|
word32 idx = 0;
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_LoadDer");
|
|
|
|
if (dsa == NULL || dsa->internal == NULL || derBuf == NULL || derSz <= 0) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (opt == WOLFSSL_DSA_LOAD_PRIVATE) {
|
|
ret = DsaPrivateKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal, derSz);
|
|
}
|
|
else {
|
|
ret = DsaPublicKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal, derSz);
|
|
}
|
|
|
|
if (ret < 0 && opt == WOLFSSL_DSA_LOAD_PRIVATE) {
|
|
WOLFSSL_ERROR_VERBOSE(ret);
|
|
WOLFSSL_MSG("DsaPrivateKeyDecode failed");
|
|
return -1;
|
|
}
|
|
else if (ret < 0 && opt == WOLFSSL_DSA_LOAD_PUBLIC) {
|
|
WOLFSSL_ERROR_VERBOSE(ret);
|
|
WOLFSSL_MSG("DsaPublicKeyDecode failed");
|
|
return -1;
|
|
}
|
|
|
|
if (SetDsaExternal(dsa) != 1) {
|
|
WOLFSSL_MSG("SetDsaExternal failed");
|
|
return -1;
|
|
}
|
|
|
|
dsa->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
#ifndef NO_BIO
|
|
WOLFSSL_DSA *wolfSSL_PEM_read_bio_DSAparams(WOLFSSL_BIO *bp, WOLFSSL_DSA **x,
|
|
wc_pem_password_cb *cb, void *u)
|
|
{
|
|
WOLFSSL_DSA* dsa;
|
|
DsaKey* key;
|
|
int length;
|
|
unsigned char* buf;
|
|
word32 bufSz;
|
|
int ret;
|
|
word32 idx = 0;
|
|
DerBuffer* pDer;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSAparams");
|
|
|
|
ret = wolfSSL_BIO_get_mem_data(bp, &buf);
|
|
if (ret <= 0) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_DSAparams", ret);
|
|
return NULL;
|
|
}
|
|
|
|
bufSz = (word32)ret;
|
|
|
|
if (cb != NULL || u != NULL) {
|
|
/*
|
|
* cb is for a call back when encountering encrypted PEM files
|
|
* if cb == NULL and u != NULL then u = null terminated password string
|
|
*/
|
|
WOLFSSL_MSG("Not yet supporting call back or password for encrypted PEM");
|
|
}
|
|
|
|
if (PemToDer(buf, (long)bufSz, DSA_PARAM_TYPE, &pDer, NULL, NULL,
|
|
NULL) < 0 ) {
|
|
WOLFSSL_MSG("Issue converting from PEM to DER");
|
|
return NULL;
|
|
}
|
|
|
|
if (GetSequence(pDer->buffer, &idx, &length, pDer->length) < 0) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_DSAparams", ret);
|
|
FreeDer(&pDer);
|
|
return NULL;
|
|
}
|
|
|
|
dsa = wolfSSL_DSA_new();
|
|
if (dsa == NULL) {
|
|
FreeDer(&pDer);
|
|
WOLFSSL_MSG("Error creating DSA struct");
|
|
return NULL;
|
|
}
|
|
|
|
key = (DsaKey*)dsa->internal;
|
|
if (key == NULL) {
|
|
FreeDer(&pDer);
|
|
wolfSSL_DSA_free(dsa);
|
|
WOLFSSL_MSG("Error finding DSA key struct");
|
|
return NULL;
|
|
}
|
|
|
|
if (GetInt(&key->p, pDer->buffer, &idx, pDer->length) < 0 ||
|
|
GetInt(&key->q, pDer->buffer, &idx, pDer->length) < 0 ||
|
|
GetInt(&key->g, pDer->buffer, &idx, pDer->length) < 0 ) {
|
|
WOLFSSL_MSG("dsa key error");
|
|
FreeDer(&pDer);
|
|
wolfSSL_DSA_free(dsa);
|
|
return NULL;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->p, &key->p) != 1) {
|
|
WOLFSSL_MSG("dsa p key error");
|
|
FreeDer(&pDer);
|
|
wolfSSL_DSA_free(dsa);
|
|
return NULL;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->q, &key->q) != 1) {
|
|
WOLFSSL_MSG("dsa q key error");
|
|
FreeDer(&pDer);
|
|
wolfSSL_DSA_free(dsa);
|
|
return NULL;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dsa->g, &key->g) != 1) {
|
|
WOLFSSL_MSG("dsa g key error");
|
|
FreeDer(&pDer);
|
|
wolfSSL_DSA_free(dsa);
|
|
return NULL;
|
|
}
|
|
|
|
if (x != NULL) {
|
|
*x = dsa;
|
|
}
|
|
|
|
FreeDer(&pDer);
|
|
return dsa;
|
|
}
|
|
#endif /* !NO_BIO */
|
|
|
|
#if !defined(NO_DH)
|
|
WOLFSSL_DH *wolfSSL_DSA_dup_DH(const WOLFSSL_DSA *dsa)
|
|
{
|
|
WOLFSSL_DH* dh;
|
|
DhKey* key;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DSA_dup_DH");
|
|
|
|
if (dsa == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
dh = wolfSSL_DH_new();
|
|
if (dh == NULL) {
|
|
return NULL;
|
|
}
|
|
key = (DhKey*)dh->internal;
|
|
|
|
if (dsa->p != NULL &&
|
|
SetIndividualInternal(((WOLFSSL_DSA*)dsa)->p, &key->p)
|
|
!= 1) {
|
|
WOLFSSL_MSG("rsa p key error");
|
|
wolfSSL_DH_free(dh);
|
|
return NULL;
|
|
}
|
|
if (dsa->g != NULL &&
|
|
SetIndividualInternal(((WOLFSSL_DSA*)dsa)->g, &key->g)
|
|
!= 1) {
|
|
WOLFSSL_MSG("rsa g key error");
|
|
wolfSSL_DH_free(dh);
|
|
return NULL;
|
|
}
|
|
|
|
if (SetIndividualExternal(&dh->p, &key->p) != 1) {
|
|
WOLFSSL_MSG("dsa p key error");
|
|
wolfSSL_DH_free(dh);
|
|
return NULL;
|
|
}
|
|
if (SetIndividualExternal(&dh->g, &key->g) != 1) {
|
|
WOLFSSL_MSG("dsa g key error");
|
|
wolfSSL_DH_free(dh);
|
|
return NULL;
|
|
}
|
|
|
|
return dh;
|
|
}
|
|
#endif /* !NO_DH */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#endif /* !NO_DSA */
|
|
|
|
/*******************************************************************************
|
|
* END OF DSA API
|
|
******************************************************************************/
|
|
|
|
|
|
/*******************************************************************************
|
|
* START OF DH API
|
|
******************************************************************************/
|
|
|
|
#ifndef NO_DH
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
#ifndef NO_CERTS
|
|
|
|
#ifdef OPENSSL_ALL
|
|
|
|
int wolfSSL_DH_check(const WOLFSSL_DH *dh, int *codes)
|
|
{
|
|
int isPrime = MP_NO, codeTmp = 0;
|
|
WC_RNG rng;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_check");
|
|
if (dh == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
if (dh->g == NULL || dh->g->internal == NULL) {
|
|
codeTmp = DH_NOT_SUITABLE_GENERATOR;
|
|
}
|
|
|
|
if (dh->p == NULL || dh->p->internal == NULL) {
|
|
codeTmp = DH_CHECK_P_NOT_PRIME;
|
|
}
|
|
else
|
|
{
|
|
/* test if dh->p has prime */
|
|
if (wc_InitRng(&rng) == 0) {
|
|
mp_prime_is_prime_ex((mp_int*)dh->p->internal,8,&isPrime,&rng);
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Error initializing rng");
|
|
return 0;
|
|
}
|
|
wc_FreeRng(&rng);
|
|
if (isPrime != MP_YES) {
|
|
codeTmp = DH_CHECK_P_NOT_PRIME;
|
|
}
|
|
}
|
|
/* User may choose to enter NULL for codes if they don't want to check it*/
|
|
if (codes != NULL) {
|
|
*codes = codeTmp;
|
|
}
|
|
|
|
/* if codeTmp was set,some check was flagged invalid */
|
|
if (codeTmp) {
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
|
|
/* Converts DER encoded DH parameters to a WOLFSSL_DH structure.
|
|
*
|
|
* dh : structure to copy DH parameters into.
|
|
* pp : DER encoded DH parameters
|
|
* length : length to copy
|
|
*
|
|
* Returns pointer to WOLFSSL_DH structure on success, or NULL on failure
|
|
*/
|
|
WOLFSSL_DH *wolfSSL_d2i_DHparams(WOLFSSL_DH **dh, const unsigned char **pp,
|
|
long length)
|
|
{
|
|
WOLFSSL_DH *newDH = NULL;
|
|
int ret;
|
|
word32 idx = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_d2i_DHparams");
|
|
|
|
if (pp == NULL || length <= 0) {
|
|
WOLFSSL_MSG("bad argument");
|
|
return NULL;
|
|
}
|
|
|
|
if ((newDH = wolfSSL_DH_new()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new() failed");
|
|
return NULL;
|
|
}
|
|
|
|
ret = wc_DhKeyDecode(*pp, &idx, (DhKey*)newDH->internal, (word32)length);
|
|
if (ret != 0) {
|
|
WOLFSSL_MSG("DhKeyDecode() failed");
|
|
wolfSSL_DH_free(newDH);
|
|
return NULL;
|
|
}
|
|
newDH->inSet = 1;
|
|
|
|
if (SetDhExternal(newDH) != 1) {
|
|
WOLFSSL_MSG("SetDhExternal failed");
|
|
wolfSSL_DH_free(newDH);
|
|
return NULL;
|
|
}
|
|
|
|
*pp += length;
|
|
if (dh != NULL) {
|
|
*dh = newDH;
|
|
}
|
|
|
|
return newDH;
|
|
}
|
|
#endif /* !(FIPS_VERSION == 1) */
|
|
|
|
#define ASN_LEN_SIZE(l) \
|
|
(((l) < 128) ? 1 : (((l) < 256) ? 2 : 3))
|
|
|
|
/* Converts internal WOLFSSL_DH structure to DER encoded DH.
|
|
*
|
|
* dh : structure to copy DH parameters from.
|
|
* out : DER buffer for DH parameters
|
|
*
|
|
* Returns size of DER on success and 0 if error
|
|
*/
|
|
int wolfSSL_i2d_DHparams(const WOLFSSL_DH *dh, unsigned char **out)
|
|
{
|
|
word32 len;
|
|
int ret = 0;
|
|
int pSz;
|
|
int gSz;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_i2d_DHparams");
|
|
|
|
if (dh == NULL) {
|
|
WOLFSSL_MSG("Bad parameters");
|
|
return 0;
|
|
}
|
|
|
|
/* Get total length */
|
|
pSz = mp_unsigned_bin_size((mp_int*)dh->p->internal);
|
|
gSz = mp_unsigned_bin_size((mp_int*)dh->g->internal);
|
|
len = 1 + ASN_LEN_SIZE(pSz) + mp_leading_bit((mp_int*)dh->p->internal) +
|
|
pSz +
|
|
1 + ASN_LEN_SIZE(gSz) + mp_leading_bit((mp_int*)dh->g->internal) +
|
|
gSz;
|
|
|
|
/* Two bytes required for length if ASN.1 SEQ data greater than 127 bytes
|
|
* and less than 256 bytes.
|
|
*/
|
|
len += 1 + ASN_LEN_SIZE(len);
|
|
|
|
if (out != NULL && *out != NULL) {
|
|
ret = StoreDHparams(*out, &len, (mp_int*)dh->p->internal,
|
|
(mp_int*)dh->g->internal);
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("StoreDHparams error");
|
|
len = 0;
|
|
}
|
|
else{
|
|
*out += len;
|
|
}
|
|
}
|
|
return (int)len;
|
|
}
|
|
|
|
#endif /* OPENSSL_ALL */
|
|
|
|
#endif /* !NO_CERTS */
|
|
|
|
long wolfSSL_set_tmp_dh(WOLFSSL *ssl, WOLFSSL_DH *dh)
|
|
{
|
|
int pSz, gSz;
|
|
byte *p, *g;
|
|
int ret = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_set_tmp_dh");
|
|
|
|
if (!ssl || !dh)
|
|
return BAD_FUNC_ARG;
|
|
|
|
/* Get needed size for p and g */
|
|
pSz = wolfSSL_BN_bn2bin(dh->p, NULL);
|
|
gSz = wolfSSL_BN_bn2bin(dh->g, NULL);
|
|
|
|
if (pSz <= 0 || gSz <= 0)
|
|
return -1;
|
|
|
|
p = (byte*)XMALLOC(pSz, ssl->heap, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
if (!p)
|
|
return MEMORY_E;
|
|
|
|
g = (byte*)XMALLOC(gSz, ssl->heap, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
if (!g) {
|
|
XFREE(p, ssl->heap, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
return MEMORY_E;
|
|
}
|
|
|
|
pSz = wolfSSL_BN_bn2bin(dh->p, p);
|
|
gSz = wolfSSL_BN_bn2bin(dh->g, g);
|
|
|
|
if (pSz >= 0 && gSz >= 0) /* Conversion successful */
|
|
ret = wolfSSL_SetTmpDH(ssl, p, pSz, g, gSz);
|
|
|
|
XFREE(p, ssl->heap, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(g, ssl->heap, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
|
|
return pSz > 0 && gSz > 0 ? ret : -1;
|
|
}
|
|
|
|
|
|
static void InitwolfSSL_DH(WOLFSSL_DH* dh)
|
|
{
|
|
if (dh) {
|
|
XMEMSET(dh, 0, sizeof(WOLFSSL_DH));
|
|
}
|
|
}
|
|
|
|
|
|
WOLFSSL_DH* wolfSSL_DH_new(void)
|
|
{
|
|
WOLFSSL_DH* external;
|
|
DhKey* key;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_new");
|
|
|
|
key = (DhKey*) XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new malloc DhKey failure");
|
|
return NULL;
|
|
}
|
|
|
|
external = (WOLFSSL_DH*) XMALLOC(sizeof(WOLFSSL_DH), NULL,
|
|
DYNAMIC_TYPE_DH);
|
|
if (external == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new malloc WOLFSSL_DH failure");
|
|
XFREE(key, NULL, DYNAMIC_TYPE_DH);
|
|
return NULL;
|
|
}
|
|
|
|
InitwolfSSL_DH(external);
|
|
|
|
external->refCount = 1;
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_InitMutex(&external->refMutex) != 0) {
|
|
WOLFSSL_MSG("wc_InitMutex WOLFSSL_DH failure");
|
|
XFREE(key, NULL, DYNAMIC_TYPE_DH);
|
|
XFREE(external, NULL, DYNAMIC_TYPE_DH);
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
if (wc_InitDhKey(key) != 0) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new InitDhKey failure");
|
|
XFREE(key, NULL, DYNAMIC_TYPE_DH);
|
|
XFREE(external, NULL, DYNAMIC_TYPE_DH);
|
|
return NULL;
|
|
}
|
|
external->internal = key;
|
|
external->priv_key = wolfSSL_BN_new();
|
|
external->pub_key = wolfSSL_BN_new();
|
|
|
|
return external;
|
|
}
|
|
|
|
WOLFSSL_DH* wolfSSL_DH_new_by_nid(int nid)
|
|
{
|
|
WOLFSSL_DH* dh = NULL;
|
|
int err = 0;
|
|
#if defined(HAVE_PUBLIC_FFDHE) || (defined(HAVE_FIPS) && FIPS_VERSION_EQ(2,0))
|
|
const DhParams* params = NULL;
|
|
WOLFSSL_BIGNUM* pBn = NULL;
|
|
WOLFSSL_BIGNUM* gBn = NULL;
|
|
WOLFSSL_BIGNUM* qBn = NULL;
|
|
#elif !defined(HAVE_PUBLIC_FFDHE) && (!defined(HAVE_FIPS) || \
|
|
FIPS_VERSION_GT(2,0))
|
|
int name = 0;
|
|
#ifdef HAVE_FFDHE_Q
|
|
int elements = ELEMENT_P | ELEMENT_G | ELEMENT_Q;
|
|
#else
|
|
int elements = ELEMENT_P | ELEMENT_G;
|
|
#endif /* HAVE_FFDHE_Q */
|
|
#endif /* HAVE_PUBLIC_FFDHE || (HAVE_FIPS && HAVE_FIPS_VERSION == 2) */
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_new_by_nid");
|
|
|
|
/* HAVE_PUBLIC_FFDHE not required to expose wc_Dh_ffdhe* functions in FIPS v2
|
|
* module */
|
|
#if defined(HAVE_PUBLIC_FFDHE) || (defined(HAVE_FIPS) && FIPS_VERSION_EQ(2,0))
|
|
switch (nid) {
|
|
#ifdef HAVE_FFDHE_2048
|
|
case NID_ffdhe2048:
|
|
params = wc_Dh_ffdhe2048_Get();
|
|
break;
|
|
#endif /* HAVE_FFDHE_2048 */
|
|
#ifdef HAVE_FFDHE_3072
|
|
case NID_ffdhe3072:
|
|
params = wc_Dh_ffdhe3072_Get();
|
|
break;
|
|
#endif /* HAVE_FFDHE_3072 */
|
|
#ifdef HAVE_FFDHE_4096
|
|
case NID_ffdhe4096:
|
|
params = wc_Dh_ffdhe4096_Get();
|
|
break;
|
|
#endif /* HAVE_FFDHE_4096 */
|
|
default:
|
|
break;
|
|
}
|
|
if (params == NULL) {
|
|
WOLFSSL_MSG("Unable to find DH params for nid.");
|
|
err = 1;
|
|
}
|
|
if (err == 0) {
|
|
dh = wolfSSL_DH_new();
|
|
if (dh == NULL) {
|
|
WOLFSSL_MSG("Failed to create WOLFSSL_DH.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
pBn = wolfSSL_BN_bin2bn(params->p, params->p_len, NULL);
|
|
if (pBn == NULL) {
|
|
WOLFSSL_MSG("Error converting p hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
gBn = wolfSSL_BN_bin2bn(params->g, params->g_len, NULL);
|
|
if (gBn == NULL) {
|
|
WOLFSSL_MSG("Error converting g hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
#ifdef HAVE_FFDHE_Q
|
|
if (err == 0) {
|
|
qBn = wolfSSL_BN_bin2bn(params->q, params->q_len, NULL);
|
|
if (qBn == NULL) {
|
|
WOLFSSL_MSG("Error converting q hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
#endif
|
|
#if defined(OPENSSL_ALL) || defined(OPENSSL_VERSION_NUMBER) && \
|
|
OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
if (err == 0 && wolfSSL_DH_set0_pqg(dh, pBn, qBn, gBn) != 1) {
|
|
WOLFSSL_MSG("Failed to set DH params.");
|
|
err = 1;
|
|
}
|
|
#else
|
|
if (err == 0) {
|
|
dh->p = pBn;
|
|
dh->q = qBn;
|
|
dh->g = gBn;
|
|
if (SetDhInternal(dh) != 1) {
|
|
WOLFSSL_MSG("Failed to set internal DH params.");
|
|
err = 1;
|
|
}
|
|
}
|
|
#endif /* OPENSSL_ALL || OPENSSL_VERSION_NUMBER >= 0x10100000L */
|
|
|
|
if (err == 1) {
|
|
wolfSSL_BN_free(pBn);
|
|
wolfSSL_BN_free(gBn);
|
|
wolfSSL_BN_free(qBn);
|
|
}
|
|
/* FIPS v2 and lower doesn't support wc_DhSetNamedKey. */
|
|
#elif !defined(HAVE_PUBLIC_FFDHE) && (!defined(HAVE_FIPS) || \
|
|
FIPS_VERSION_GT(2,0))
|
|
switch (nid) {
|
|
#ifdef HAVE_FFDHE_2048
|
|
case NID_ffdhe2048:
|
|
name = WC_FFDHE_2048;
|
|
break;
|
|
#endif /* HAVE_FFDHE_2048 */
|
|
#ifdef HAVE_FFDHE_3072
|
|
case NID_ffdhe3072:
|
|
name = WC_FFDHE_3072;
|
|
break;
|
|
#endif /* HAVE_FFDHE_3072 */
|
|
#ifdef HAVE_FFDHE_4096
|
|
case NID_ffdhe4096:
|
|
name = WC_FFDHE_4096;
|
|
break;
|
|
#endif /* HAVE_FFDHE_4096 */
|
|
default:
|
|
err = 1;
|
|
WOLFSSL_MSG("Unable to find DH params for nid.");
|
|
break;
|
|
}
|
|
if (err == 0) {
|
|
dh = wolfSSL_DH_new();
|
|
if (dh == NULL) {
|
|
WOLFSSL_MSG("Failed to create WOLFSSL_DH.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0 && wc_DhSetNamedKey((DhKey*)dh->internal, name) != 0) {
|
|
WOLFSSL_MSG("wc_DhSetNamedKey failed.");
|
|
err = 1;
|
|
}
|
|
if (err == 0 && SetDhExternal_ex(dh, elements) != 1) {
|
|
WOLFSSL_MSG("Failed to set external DH params.");
|
|
err = 1;
|
|
}
|
|
#else
|
|
/* Unsupported configuration. */
|
|
err = 1;
|
|
#endif /* HAVE_PUBLIC_FFDHE || FIPS_VERSION_GT(2,0) */
|
|
|
|
if (err == 1 && dh != NULL) {
|
|
wolfSSL_DH_free(dh);
|
|
dh = NULL;
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_DH_new_by_nid", err);
|
|
|
|
return dh;
|
|
}
|
|
|
|
void wolfSSL_DH_free(WOLFSSL_DH* dh)
|
|
{
|
|
int doFree = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_free");
|
|
|
|
if (dh) {
|
|
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_LockMutex(&dh->refMutex) != 0) {
|
|
WOLFSSL_MSG("Could not lock DH mutex");
|
|
}
|
|
#endif
|
|
/* only free if all references to it are done */
|
|
dh->refCount--;
|
|
if (dh->refCount == 0) {
|
|
doFree = 1;
|
|
}
|
|
#ifndef SINGLE_THREADED
|
|
wc_UnLockMutex(&dh->refMutex);
|
|
#endif
|
|
|
|
if (doFree == 0) {
|
|
return;
|
|
}
|
|
|
|
#ifndef SINGLE_THREADED
|
|
wc_FreeMutex(&dh->refMutex);
|
|
#endif
|
|
|
|
if (dh->internal) {
|
|
wc_FreeDhKey((DhKey*)dh->internal);
|
|
XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
|
|
dh->internal = NULL;
|
|
}
|
|
wolfSSL_BN_free(dh->priv_key);
|
|
wolfSSL_BN_free(dh->pub_key);
|
|
wolfSSL_BN_free(dh->g);
|
|
wolfSSL_BN_free(dh->p);
|
|
wolfSSL_BN_free(dh->q);
|
|
InitwolfSSL_DH(dh); /* set back to NULLs for safety */
|
|
|
|
XFREE(dh, NULL, DYNAMIC_TYPE_DH);
|
|
}
|
|
}
|
|
|
|
int wolfSSL_DH_up_ref(WOLFSSL_DH* dh)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DH_up_ref");
|
|
|
|
if (dh) {
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_LockMutex(&dh->refMutex) != 0) {
|
|
WOLFSSL_MSG("Failed to lock DH mutex");
|
|
}
|
|
#endif
|
|
dh->refCount++;
|
|
#ifndef SINGLE_THREADED
|
|
wc_UnLockMutex(&dh->refMutex);
|
|
#endif
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int SetDhInternal(WOLFSSL_DH* dh)
|
|
{
|
|
int ret = -1;
|
|
int pSz = 1024;
|
|
int gSz = 1024;
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
int privSz = 256; /* Up to 2048-bit */
|
|
int pubSz = 256;
|
|
#endif
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
unsigned char* p = NULL;
|
|
unsigned char* g = NULL;
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
unsigned char* priv_key = NULL;
|
|
unsigned char* pub_key = NULL;
|
|
#endif
|
|
#else
|
|
unsigned char p[1024];
|
|
unsigned char g[1024];
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
unsigned char priv_key[256];
|
|
unsigned char pub_key[256];
|
|
#endif
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("SetDhInternal");
|
|
|
|
if (dh == NULL || dh->p == NULL || dh->g == NULL)
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
else if (wolfSSL_BN_bn2bin(dh->p, NULL) > pSz)
|
|
WOLFSSL_MSG("Bad p internal size");
|
|
else if (wolfSSL_BN_bn2bin(dh->g, NULL) > gSz)
|
|
WOLFSSL_MSG("Bad g internal size");
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
else if (wolfSSL_BN_bn2bin(dh->priv_key, NULL) > privSz)
|
|
WOLFSSL_MSG("Bad private key internal size");
|
|
else if (wolfSSL_BN_bn2bin(dh->pub_key, NULL) > privSz)
|
|
WOLFSSL_MSG("Bad public key internal size");
|
|
#endif
|
|
else {
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
p = (unsigned char*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
g = (unsigned char*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
priv_key = (unsigned char*)XMALLOC(privSz, NULL,
|
|
DYNAMIC_TYPE_PRIVATE_KEY);
|
|
pub_key = (unsigned char*)XMALLOC(pubSz, NULL,
|
|
DYNAMIC_TYPE_PUBLIC_KEY);
|
|
#endif
|
|
|
|
if (p == NULL || g == NULL) {
|
|
XFREE(p, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(g, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_SMALL_STACK */
|
|
|
|
/* Free so that mp_init's don't leak */
|
|
wc_FreeDhKey((DhKey*)dh->internal);
|
|
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
privSz = wolfSSL_BN_bn2bin(dh->priv_key, priv_key);
|
|
pubSz = wolfSSL_BN_bn2bin(dh->pub_key, pub_key);
|
|
if (privSz <= 0) {
|
|
WOLFSSL_MSG("No private key size.");
|
|
}
|
|
if (pubSz <= 0) {
|
|
WOLFSSL_MSG("No public key size.");
|
|
}
|
|
if (privSz > 0 || pubSz > 0) {
|
|
ret = wc_DhImportKeyPair((DhKey*)dh->internal, priv_key, privSz,
|
|
pub_key, pubSz);
|
|
if (ret == 0) {
|
|
ret = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Failed setting private or public key.");
|
|
ret = 0;
|
|
}
|
|
}
|
|
#endif /* WOLFSSL_DH_EXTRA */
|
|
|
|
pSz = wolfSSL_BN_bn2bin(dh->p, p);
|
|
gSz = wolfSSL_BN_bn2bin(dh->g, g);
|
|
|
|
if (pSz <= 0 || gSz <= 0)
|
|
WOLFSSL_MSG("Bad BN2bin set");
|
|
else if (wc_DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0)
|
|
WOLFSSL_MSG("Bad DH SetKey");
|
|
else {
|
|
dh->inSet = 1;
|
|
ret = 1;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(p, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(g, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
XFREE(priv_key, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
|
|
XFREE(pub_key, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
#endif
|
|
#endif
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(WOLFSSL_QT) || defined(OPENSSL_ALL) \
|
|
|| defined(WOLFSSL_OPENSSH) || defined(OPENSSL_EXTRA)
|
|
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
WOLFSSL_DH* wolfSSL_DH_dup(WOLFSSL_DH* dh)
|
|
{
|
|
WOLFSSL_DH* ret = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_dup");
|
|
|
|
if (!dh) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return NULL;
|
|
}
|
|
|
|
if (dh->inSet == 0 && SetDhInternal(dh) != 1) {
|
|
WOLFSSL_MSG("Bad DH set internal");
|
|
return NULL;
|
|
}
|
|
|
|
if (!(ret = wolfSSL_DH_new())) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new error");
|
|
return NULL;
|
|
}
|
|
|
|
if (wc_DhKeyCopy((DhKey*)dh->internal, (DhKey*)ret->internal) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_DhKeyCopy error");
|
|
wolfSSL_DH_free(ret);
|
|
return NULL;
|
|
}
|
|
ret->inSet = 1;
|
|
|
|
if (SetDhExternal(ret) != 1) {
|
|
WOLFSSL_MSG("SetDhExternal error");
|
|
wolfSSL_DH_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_DH_EXTRA */
|
|
|
|
/* Set the members of DhKey into WOLFSSL_DH
|
|
* Specify elements to set via the 2nd parameter
|
|
*/
|
|
int SetDhExternal_ex(WOLFSSL_DH *dh, int elm)
|
|
{
|
|
DhKey *key;
|
|
WOLFSSL_MSG("Entering SetDhExternal_ex");
|
|
|
|
if (dh == NULL || dh->internal == NULL) {
|
|
WOLFSSL_MSG("dh key NULL error");
|
|
return -1;
|
|
}
|
|
|
|
key = (DhKey*)dh->internal;
|
|
|
|
if (elm & ELEMENT_P) {
|
|
if (SetIndividualExternal(&dh->p, &key->p) != 1) {
|
|
WOLFSSL_MSG("dh param p error");
|
|
return -1;
|
|
}
|
|
}
|
|
if (elm & ELEMENT_Q) {
|
|
if (SetIndividualExternal(&dh->q, &key->q) != 1) {
|
|
WOLFSSL_MSG("dh param q error");
|
|
return -1;
|
|
}
|
|
}
|
|
if (elm & ELEMENT_G) {
|
|
if (SetIndividualExternal(&dh->g, &key->g) != 1) {
|
|
WOLFSSL_MSG("dh param g error");
|
|
return -1;
|
|
}
|
|
}
|
|
#ifdef WOLFSSL_DH_EXTRA
|
|
if (elm & ELEMENT_PRV) {
|
|
if (SetIndividualExternal(&dh->priv_key, &key->priv) !=
|
|
1) {
|
|
WOLFSSL_MSG("No DH Private Key");
|
|
return -1;
|
|
}
|
|
}
|
|
if (elm & ELEMENT_PUB) {
|
|
if (SetIndividualExternal(&dh->pub_key, &key->pub) != 1) {
|
|
WOLFSSL_MSG("No DH Public Key");
|
|
return -1;
|
|
}
|
|
}
|
|
#endif /* WOLFSSL_DH_EXTRA */
|
|
|
|
dh->exSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
/* Set the members of DhKey into WOLFSSL_DH
|
|
* DhKey was populated from wc_DhKeyDecode
|
|
* p, g, pub_key and pri_key are set.
|
|
*/
|
|
int SetDhExternal(WOLFSSL_DH *dh)
|
|
{
|
|
int elements = ELEMENT_P | ELEMENT_G | ELEMENT_PUB | ELEMENT_PRV;
|
|
WOLFSSL_MSG("Entering SetDhExternal");
|
|
return SetDhExternal_ex(dh, elements);
|
|
}
|
|
#endif /* WOLFSSL_QT || OPENSSL_ALL || WOLFSSL_OPENSSH || OPENSSL_EXTRA */
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* DH prime size in bytes if success, 0 if error
|
|
*/
|
|
int wolfSSL_DH_size(WOLFSSL_DH* dh)
|
|
{
|
|
WOLFSSL_MSG("wolfSSL_DH_size");
|
|
|
|
if (dh == NULL)
|
|
return -1;
|
|
|
|
return wolfSSL_BN_num_bytes(dh->p);
|
|
}
|
|
|
|
/* This sets a big number with the 768-bit prime from RFC 2409.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_768_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A63A3620FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_768_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 768 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 1024-bit prime from RFC 2409.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_1024_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE65381FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_1024_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 1024 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 1536-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_1536_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA237327FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_1536_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 1536 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 2048-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_2048_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA18217C32905E462E36CE3B"
|
|
"E39E772C180E86039B2783A2EC07A28F"
|
|
"B5C55DF06F4C52C9DE2BCBF695581718"
|
|
"3995497CEA956AE515D2261898FA0510"
|
|
"15728E5A8AACAA68FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_2048_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 2048 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 3072-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_3072_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA18217C32905E462E36CE3B"
|
|
"E39E772C180E86039B2783A2EC07A28F"
|
|
"B5C55DF06F4C52C9DE2BCBF695581718"
|
|
"3995497CEA956AE515D2261898FA0510"
|
|
"15728E5A8AAAC42DAD33170D04507A33"
|
|
"A85521ABDF1CBA64ECFB850458DBEF0A"
|
|
"8AEA71575D060C7DB3970F85A6E1E4C7"
|
|
"ABF5AE8CDB0933D71E8C94E04A25619D"
|
|
"CEE3D2261AD2EE6BF12FFA06D98A0864"
|
|
"D87602733EC86A64521F2B18177B200C"
|
|
"BBE117577A615D6C770988C0BAD946E2"
|
|
"08E24FA074E5AB3143DB5BFCE0FD108E"
|
|
"4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_3072_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 3072 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 4096-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_4096_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA18217C32905E462E36CE3B"
|
|
"E39E772C180E86039B2783A2EC07A28F"
|
|
"B5C55DF06F4C52C9DE2BCBF695581718"
|
|
"3995497CEA956AE515D2261898FA0510"
|
|
"15728E5A8AAAC42DAD33170D04507A33"
|
|
"A85521ABDF1CBA64ECFB850458DBEF0A"
|
|
"8AEA71575D060C7DB3970F85A6E1E4C7"
|
|
"ABF5AE8CDB0933D71E8C94E04A25619D"
|
|
"CEE3D2261AD2EE6BF12FFA06D98A0864"
|
|
"D87602733EC86A64521F2B18177B200C"
|
|
"BBE117577A615D6C770988C0BAD946E2"
|
|
"08E24FA074E5AB3143DB5BFCE0FD108E"
|
|
"4B82D120A92108011A723C12A787E6D7"
|
|
"88719A10BDBA5B2699C327186AF4E23C"
|
|
"1A946834B6150BDA2583E9CA2AD44CE8"
|
|
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
|
|
"287C59474E6BC05D99B2964FA090C3A2"
|
|
"233BA186515BE7ED1F612970CEE2D7AF"
|
|
"B81BDD762170481CD0069127D5B05AA9"
|
|
"93B4EA988D8FDDC186FFB7DC90A6C08F"
|
|
"4DF435C934063199FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_4096_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 4096 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* This sets a big number with the 6144-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_6144_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA18217C32905E462E36CE3B"
|
|
"E39E772C180E86039B2783A2EC07A28F"
|
|
"B5C55DF06F4C52C9DE2BCBF695581718"
|
|
"3995497CEA956AE515D2261898FA0510"
|
|
"15728E5A8AAAC42DAD33170D04507A33"
|
|
"A85521ABDF1CBA64ECFB850458DBEF0A"
|
|
"8AEA71575D060C7DB3970F85A6E1E4C7"
|
|
"ABF5AE8CDB0933D71E8C94E04A25619D"
|
|
"CEE3D2261AD2EE6BF12FFA06D98A0864"
|
|
"D87602733EC86A64521F2B18177B200C"
|
|
"BBE117577A615D6C770988C0BAD946E2"
|
|
"08E24FA074E5AB3143DB5BFCE0FD108E"
|
|
"4B82D120A92108011A723C12A787E6D7"
|
|
"88719A10BDBA5B2699C327186AF4E23C"
|
|
"1A946834B6150BDA2583E9CA2AD44CE8"
|
|
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
|
|
"287C59474E6BC05D99B2964FA090C3A2"
|
|
"233BA186515BE7ED1F612970CEE2D7AF"
|
|
"B81BDD762170481CD0069127D5B05AA9"
|
|
"93B4EA988D8FDDC186FFB7DC90A6C08F"
|
|
"4DF435C93402849236C3FAB4D27C7026"
|
|
"C1D4DCB2602646DEC9751E763DBA37BD"
|
|
"F8FF9406AD9E530EE5DB382F413001AE"
|
|
"B06A53ED9027D831179727B0865A8918"
|
|
"DA3EDBEBCF9B14ED44CE6CBACED4BB1B"
|
|
"DB7F1447E6CC254B332051512BD7AF42"
|
|
"6FB8F401378CD2BF5983CA01C64B92EC"
|
|
"F032EA15D1721D03F482D7CE6E74FEF6"
|
|
"D55E702F46980C82B5A84031900B1C9E"
|
|
"59E7C97FBEC7E8F323A97A7E36CC88BE"
|
|
"0F1D45B7FF585AC54BD407B22B4154AA"
|
|
"CC8F6D7EBF48E1D814CC5ED20F8037E0"
|
|
"A79715EEF29BE32806A1D58BB7C5DA76"
|
|
"F550AA3D8A1FBFF0EB19CCB1A313D55C"
|
|
"DA56C9EC2EF29632387FE8D76E3C0468"
|
|
"043E8F663F4860EE12BF2D5B0B7474D6"
|
|
"E694F91E6DCC4024FFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_6144_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 6144 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
|
|
/* This sets a big number with the 8192-bit prime from RFC 3526.
|
|
*
|
|
* bn if not NULL then the big number structure is used. If NULL then a new
|
|
* big number structure is created.
|
|
*
|
|
* Returns a WOLFSSL_BIGNUM structure on success and NULL with failure.
|
|
*/
|
|
WOLFSSL_BIGNUM* wolfSSL_DH_8192_prime(WOLFSSL_BIGNUM* bn)
|
|
{
|
|
static const char prm[] = {
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
|
|
"C4C6628B80DC1CD129024E088A67CC74"
|
|
"020BBEA63B139B22514A08798E3404DD"
|
|
"EF9519B3CD3A431B302B0A6DF25F1437"
|
|
"4FE1356D6D51C245E485B576625E7EC6"
|
|
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE6"
|
|
"49286651ECE45B3DC2007CB8A163BF05"
|
|
"98DA48361C55D39A69163FA8FD24CF5F"
|
|
"83655D23DCA3AD961C62F356208552BB"
|
|
"9ED529077096966D670C354E4ABC9804"
|
|
"F1746C08CA18217C32905E462E36CE3B"
|
|
"E39E772C180E86039B2783A2EC07A28F"
|
|
"B5C55DF06F4C52C9DE2BCBF695581718"
|
|
"3995497CEA956AE515D2261898FA0510"
|
|
"15728E5A8AAAC42DAD33170D04507A33"
|
|
"A85521ABDF1CBA64ECFB850458DBEF0A"
|
|
"8AEA71575D060C7DB3970F85A6E1E4C7"
|
|
"ABF5AE8CDB0933D71E8C94E04A25619D"
|
|
"CEE3D2261AD2EE6BF12FFA06D98A0864"
|
|
"D87602733EC86A64521F2B18177B200C"
|
|
"BBE117577A615D6C770988C0BAD946E2"
|
|
"08E24FA074E5AB3143DB5BFCE0FD108E"
|
|
"4B82D120A92108011A723C12A787E6D7"
|
|
"88719A10BDBA5B2699C327186AF4E23C"
|
|
"1A946834B6150BDA2583E9CA2AD44CE8"
|
|
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
|
|
"287C59474E6BC05D99B2964FA090C3A2"
|
|
"233BA186515BE7ED1F612970CEE2D7AF"
|
|
"B81BDD762170481CD0069127D5B05AA9"
|
|
"93B4EA988D8FDDC186FFB7DC90A6C08F"
|
|
"4DF435C93402849236C3FAB4D27C7026"
|
|
"C1D4DCB2602646DEC9751E763DBA37BD"
|
|
"F8FF9406AD9E530EE5DB382F413001AE"
|
|
"B06A53ED9027D831179727B0865A8918"
|
|
"DA3EDBEBCF9B14ED44CE6CBACED4BB1B"
|
|
"DB7F1447E6CC254B332051512BD7AF42"
|
|
"6FB8F401378CD2BF5983CA01C64B92EC"
|
|
"F032EA15D1721D03F482D7CE6E74FEF6"
|
|
"D55E702F46980C82B5A84031900B1C9E"
|
|
"59E7C97FBEC7E8F323A97A7E36CC88BE"
|
|
"0F1D45B7FF585AC54BD407B22B4154AA"
|
|
"CC8F6D7EBF48E1D814CC5ED20F8037E0"
|
|
"A79715EEF29BE32806A1D58BB7C5DA76"
|
|
"F550AA3D8A1FBFF0EB19CCB1A313D55C"
|
|
"DA56C9EC2EF29632387FE8D76E3C0468"
|
|
"043E8F663F4860EE12BF2D5B0B7474D6"
|
|
"E694F91E6DBE115974A3926F12FEE5E4"
|
|
"38777CB6A932DF8CD8BEC4D073B931BA"
|
|
"3BC832B68D9DD300741FA7BF8AFC47ED"
|
|
"2576F6936BA424663AAB639C5AE4F568"
|
|
"3423B4742BF1C978238F16CBE39D652D"
|
|
"E3FDB8BEFC848AD922222E04A4037C07"
|
|
"13EB57A81A23F0C73473FC646CEA306B"
|
|
"4BCBC8862F8385DDFA9D4B7FA2C087E8"
|
|
"79683303ED5BDD3A062B3CF5B3A278A6"
|
|
"6D2A13F83F44F82DDF310EE074AB6A36"
|
|
"4597E899A0255DC164F31CC50846851D"
|
|
"F9AB48195DED7EA1B1D510BD7EE74D73"
|
|
"FAF36BC31ECFA268359046F4EB879F92"
|
|
"4009438B481C6CD7889A002ED5EE382B"
|
|
"C9190DA6FC026E479558E4475677E9AA"
|
|
"9E3050E2765694DFC81F56E880B96E71"
|
|
"60C980DD98EDD3DFFFFFFFFFFFFFFFFF"
|
|
};
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_8192_prime");
|
|
|
|
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
|
|
WOLFSSL_MSG("Error converting DH 8192 prime to big number");
|
|
return NULL;
|
|
}
|
|
|
|
return bn;
|
|
}
|
|
|
|
/* The functions inside the macro guard below are fine to use with FIPS provided
|
|
* WOLFSSL_DH_EXTRA isn't defined. That define will cause SetDhInternal to have
|
|
* a call to wc_DhImportKeyPair, which isn't defined in the FIPS v2 module. */
|
|
#if !defined(HAVE_FIPS) || (defined(HAVE_FIPS) && !defined(WOLFSSL_DH_EXTRA)) \
|
|
|| (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION>2))
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_DH_generate_key(WOLFSSL_DH* dh)
|
|
{
|
|
int ret = 0;
|
|
word32 pubSz = 0;
|
|
word32 privSz = 0;
|
|
int initTmpRng = 0;
|
|
WC_RNG* rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
unsigned char* pub = NULL;
|
|
unsigned char* priv = NULL;
|
|
|
|
WOLFSSL_MSG("wolfSSL_DH_generate_key");
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL) {
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
if (dh == NULL || dh->p == NULL || dh->g == NULL)
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
else if (dh->inSet == 0 && SetDhInternal(dh) != 1)
|
|
WOLFSSL_MSG("Bad DH set internal");
|
|
else if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng) {
|
|
pubSz = wolfSSL_BN_num_bytes(dh->p);
|
|
if (dh->length) {
|
|
privSz = dh->length/8; /* to bytes */
|
|
} else {
|
|
privSz = pubSz;
|
|
}
|
|
if (pubSz > 0) {
|
|
pub = (unsigned char*)XMALLOC(pubSz,
|
|
NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
}
|
|
if (privSz > 0) {
|
|
priv = (unsigned char*)XMALLOC(privSz,
|
|
NULL, DYNAMIC_TYPE_PRIVATE_KEY);
|
|
}
|
|
PRIVATE_KEY_UNLOCK();
|
|
if (pub == NULL || priv == NULL) {
|
|
WOLFSSL_MSG("Unable to malloc memory");
|
|
}
|
|
else if (wc_DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz,
|
|
pub, &pubSz) < 0)
|
|
WOLFSSL_MSG("Bad wc_DhGenerateKeyPair");
|
|
else {
|
|
if (dh->pub_key)
|
|
wolfSSL_BN_free(dh->pub_key);
|
|
|
|
dh->pub_key = wolfSSL_BN_new();
|
|
if (dh->pub_key == NULL) {
|
|
WOLFSSL_MSG("Bad DH new pub");
|
|
}
|
|
if (dh->priv_key)
|
|
wolfSSL_BN_free(dh->priv_key);
|
|
|
|
dh->priv_key = wolfSSL_BN_new();
|
|
|
|
if (dh->priv_key == NULL) {
|
|
WOLFSSL_MSG("Bad DH new priv");
|
|
}
|
|
|
|
if (dh->pub_key && dh->priv_key) {
|
|
if (wolfSSL_BN_bin2bn(pub, pubSz, dh->pub_key) == NULL)
|
|
WOLFSSL_MSG("Bad DH bn2bin error pub");
|
|
else if (wolfSSL_BN_bin2bn(priv, privSz, dh->priv_key) == NULL)
|
|
WOLFSSL_MSG("Bad DH bn2bin error priv");
|
|
else
|
|
ret = 1;
|
|
}
|
|
}
|
|
PRIVATE_KEY_LOCK();
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
XFREE(pub, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(priv, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* size of shared secret if success, -1 if error
|
|
*/
|
|
int wolfSSL_DH_compute_key(unsigned char* key, const WOLFSSL_BIGNUM* otherPub,
|
|
WOLFSSL_DH* dh)
|
|
{
|
|
int ret = -1;
|
|
word32 keySz = 0;
|
|
int pubSz = 1024;
|
|
int privSz = 1024;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
unsigned char* pub;
|
|
unsigned char* priv = NULL;
|
|
#else
|
|
unsigned char pub [1024];
|
|
unsigned char priv[1024];
|
|
#endif
|
|
|
|
WOLFSSL_MSG("wolfSSL_DH_compute_key");
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
if (pub == NULL)
|
|
return ret;
|
|
|
|
priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
|
|
if (priv == NULL) {
|
|
XFREE(pub, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
if (dh == NULL || dh->priv_key == NULL || otherPub == NULL)
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
else if ((keySz = (word32)DH_size(dh)) == 0)
|
|
WOLFSSL_MSG("Bad DH_size");
|
|
else if (wolfSSL_BN_bn2bin(dh->priv_key, NULL) > (int)privSz)
|
|
WOLFSSL_MSG("Bad priv internal size");
|
|
else if (wolfSSL_BN_bn2bin(otherPub, NULL) > (int)pubSz)
|
|
WOLFSSL_MSG("Bad otherPub size");
|
|
else {
|
|
privSz = wolfSSL_BN_bn2bin(dh->priv_key, priv);
|
|
pubSz = wolfSSL_BN_bn2bin(otherPub, pub);
|
|
if (dh->inSet == 0 && SetDhInternal(dh) != 1) {
|
|
WOLFSSL_MSG("Bad DH set internal");
|
|
}
|
|
PRIVATE_KEY_UNLOCK();
|
|
if (privSz <= 0 || pubSz <= 0)
|
|
WOLFSSL_MSG("Bad BN2bin set");
|
|
else if (wc_DhAgree((DhKey*)dh->internal, key, &keySz,
|
|
priv, privSz, pub, pubSz) < 0)
|
|
WOLFSSL_MSG("wc_DhAgree failed");
|
|
else
|
|
ret = (int)keySz;
|
|
PRIVATE_KEY_LOCK();
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(pub, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(priv, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
|
|
#endif
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_DH_compute_key", ret);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
#if defined(OPENSSL_ALL) || \
|
|
defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
int wolfSSL_DH_set_length(WOLFSSL_DH *dh, long len)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DH_set_length");
|
|
|
|
/* len is checked at generation */
|
|
if (dh == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
dh->length = (int)len;
|
|
return 1;
|
|
}
|
|
|
|
/* ownership of p,q,and g get taken over by "dh" on success and should be free'd
|
|
* with a call to wolfSSL_DH_free -- not individually.
|
|
*
|
|
* returns 1 on success
|
|
*/
|
|
int wolfSSL_DH_set0_pqg(WOLFSSL_DH *dh, WOLFSSL_BIGNUM *p,
|
|
WOLFSSL_BIGNUM *q, WOLFSSL_BIGNUM *g)
|
|
{
|
|
int ret;
|
|
WOLFSSL_ENTER("wolfSSL_DH_set0_pqg");
|
|
|
|
/* q can be NULL */
|
|
if (dh == NULL || p == NULL || g == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* free existing internal DH structure and recreate with new p / g */
|
|
if (dh->inSet) {
|
|
#ifndef HAVE_SELFTEST
|
|
ret = wc_FreeDhKey((DhKey*)dh->internal);
|
|
if (ret != 0) {
|
|
WOLFSSL_MSG("Unable to free internal DH key");
|
|
return 0;
|
|
}
|
|
#else
|
|
/* Selftest code has this API with a void return type */
|
|
wc_FreeDhKey((DhKey*)dh->internal);
|
|
#endif
|
|
}
|
|
|
|
wolfSSL_BN_free(dh->p);
|
|
wolfSSL_BN_free(dh->q);
|
|
wolfSSL_BN_free(dh->g);
|
|
|
|
dh->p = p;
|
|
dh->q = q;
|
|
dh->g = g;
|
|
|
|
ret = SetDhInternal(dh);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("Unable to set internal DH key");
|
|
dh->p = NULL;
|
|
dh->q = NULL;
|
|
dh->g = NULL;
|
|
dh->inSet = 0;
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* OPENSSL_ALL || (v1.1.0 or later) */
|
|
#endif /* !HAVE_FIPS || (HAVE_FIPS && !WOLFSSL_DH_EXTRA) ||
|
|
* HAVE_FIPS_VERSION > 2 */
|
|
|
|
void wolfSSL_DH_get0_key(const WOLFSSL_DH *dh,
|
|
const WOLFSSL_BIGNUM **pub_key, const WOLFSSL_BIGNUM **priv_key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DH_get0_key");
|
|
|
|
if (dh != NULL) {
|
|
if (pub_key != NULL && dh->pub_key != NULL &&
|
|
wolfSSL_BN_is_zero(dh->pub_key) != 1)
|
|
*pub_key = dh->pub_key;
|
|
if (priv_key != NULL && dh->priv_key != NULL &&
|
|
wolfSSL_BN_is_zero(dh->priv_key) != 1)
|
|
*priv_key = dh->priv_key;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_DH_set0_key(WOLFSSL_DH *dh, WOLFSSL_BIGNUM *pub_key,
|
|
WOLFSSL_BIGNUM *priv_key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DH_set0_key");
|
|
|
|
if (dh == NULL)
|
|
return 0;
|
|
|
|
if (pub_key != NULL) {
|
|
wolfSSL_BN_free(dh->pub_key);
|
|
dh->pub_key = pub_key;
|
|
}
|
|
|
|
if (priv_key != NULL) {
|
|
wolfSSL_BN_free(dh->priv_key);
|
|
dh->priv_key = priv_key;
|
|
}
|
|
|
|
if (dh->p == NULL || dh->g == NULL)
|
|
return 1; /* Allow loading parameters afterwards */
|
|
else
|
|
return SetDhInternal(dh);
|
|
}
|
|
|
|
/* See RFC 5114 section 2.3, "2048-bit MODP Group with 256-bit Prime Order
|
|
* Subgroup." */
|
|
WOLFSSL_DH* wolfSSL_DH_get_2048_256(void)
|
|
{
|
|
WOLFSSL_DH* ret;
|
|
int err = 0;
|
|
const byte pHex[] = {
|
|
0x87, 0xA8, 0xE6, 0x1D, 0xB4, 0xB6, 0x66, 0x3C, 0xFF, 0xBB, 0xD1, 0x9C,
|
|
0x65, 0x19, 0x59, 0x99, 0x8C, 0xEE, 0xF6, 0x08, 0x66, 0x0D, 0xD0, 0xF2,
|
|
0x5D, 0x2C, 0xEE, 0xD4, 0x43, 0x5E, 0x3B, 0x00, 0xE0, 0x0D, 0xF8, 0xF1,
|
|
0xD6, 0x19, 0x57, 0xD4, 0xFA, 0xF7, 0xDF, 0x45, 0x61, 0xB2, 0xAA, 0x30,
|
|
0x16, 0xC3, 0xD9, 0x11, 0x34, 0x09, 0x6F, 0xAA, 0x3B, 0xF4, 0x29, 0x6D,
|
|
0x83, 0x0E, 0x9A, 0x7C, 0x20, 0x9E, 0x0C, 0x64, 0x97, 0x51, 0x7A, 0xBD,
|
|
0x5A, 0x8A, 0x9D, 0x30, 0x6B, 0xCF, 0x67, 0xED, 0x91, 0xF9, 0xE6, 0x72,
|
|
0x5B, 0x47, 0x58, 0xC0, 0x22, 0xE0, 0xB1, 0xEF, 0x42, 0x75, 0xBF, 0x7B,
|
|
0x6C, 0x5B, 0xFC, 0x11, 0xD4, 0x5F, 0x90, 0x88, 0xB9, 0x41, 0xF5, 0x4E,
|
|
0xB1, 0xE5, 0x9B, 0xB8, 0xBC, 0x39, 0xA0, 0xBF, 0x12, 0x30, 0x7F, 0x5C,
|
|
0x4F, 0xDB, 0x70, 0xC5, 0x81, 0xB2, 0x3F, 0x76, 0xB6, 0x3A, 0xCA, 0xE1,
|
|
0xCA, 0xA6, 0xB7, 0x90, 0x2D, 0x52, 0x52, 0x67, 0x35, 0x48, 0x8A, 0x0E,
|
|
0xF1, 0x3C, 0x6D, 0x9A, 0x51, 0xBF, 0xA4, 0xAB, 0x3A, 0xD8, 0x34, 0x77,
|
|
0x96, 0x52, 0x4D, 0x8E, 0xF6, 0xA1, 0x67, 0xB5, 0xA4, 0x18, 0x25, 0xD9,
|
|
0x67, 0xE1, 0x44, 0xE5, 0x14, 0x05, 0x64, 0x25, 0x1C, 0xCA, 0xCB, 0x83,
|
|
0xE6, 0xB4, 0x86, 0xF6, 0xB3, 0xCA, 0x3F, 0x79, 0x71, 0x50, 0x60, 0x26,
|
|
0xC0, 0xB8, 0x57, 0xF6, 0x89, 0x96, 0x28, 0x56, 0xDE, 0xD4, 0x01, 0x0A,
|
|
0xBD, 0x0B, 0xE6, 0x21, 0xC3, 0xA3, 0x96, 0x0A, 0x54, 0xE7, 0x10, 0xC3,
|
|
0x75, 0xF2, 0x63, 0x75, 0xD7, 0x01, 0x41, 0x03, 0xA4, 0xB5, 0x43, 0x30,
|
|
0xC1, 0x98, 0xAF, 0x12, 0x61, 0x16, 0xD2, 0x27, 0x6E, 0x11, 0x71, 0x5F,
|
|
0x69, 0x38, 0x77, 0xFA, 0xD7, 0xEF, 0x09, 0xCA, 0xDB, 0x09, 0x4A, 0xE9,
|
|
0x1E, 0x1A, 0x15, 0x97
|
|
};
|
|
const byte gHex[] = {
|
|
0x3F, 0xB3, 0x2C, 0x9B, 0x73, 0x13, 0x4D, 0x0B, 0x2E, 0x77, 0x50, 0x66,
|
|
0x60, 0xED, 0xBD, 0x48, 0x4C, 0xA7, 0xB1, 0x8F, 0x21, 0xEF, 0x20, 0x54,
|
|
0x07, 0xF4, 0x79, 0x3A, 0x1A, 0x0B, 0xA1, 0x25, 0x10, 0xDB, 0xC1, 0x50,
|
|
0x77, 0xBE, 0x46, 0x3F, 0xFF, 0x4F, 0xED, 0x4A, 0xAC, 0x0B, 0xB5, 0x55,
|
|
0xBE, 0x3A, 0x6C, 0x1B, 0x0C, 0x6B, 0x47, 0xB1, 0xBC, 0x37, 0x73, 0xBF,
|
|
0x7E, 0x8C, 0x6F, 0x62, 0x90, 0x12, 0x28, 0xF8, 0xC2, 0x8C, 0xBB, 0x18,
|
|
0xA5, 0x5A, 0xE3, 0x13, 0x41, 0x00, 0x0A, 0x65, 0x01, 0x96, 0xF9, 0x31,
|
|
0xC7, 0x7A, 0x57, 0xF2, 0xDD, 0xF4, 0x63, 0xE5, 0xE9, 0xEC, 0x14, 0x4B,
|
|
0x77, 0x7D, 0xE6, 0x2A, 0xAA, 0xB8, 0xA8, 0x62, 0x8A, 0xC3, 0x76, 0xD2,
|
|
0x82, 0xD6, 0xED, 0x38, 0x64, 0xE6, 0x79, 0x82, 0x42, 0x8E, 0xBC, 0x83,
|
|
0x1D, 0x14, 0x34, 0x8F, 0x6F, 0x2F, 0x91, 0x93, 0xB5, 0x04, 0x5A, 0xF2,
|
|
0x76, 0x71, 0x64, 0xE1, 0xDF, 0xC9, 0x67, 0xC1, 0xFB, 0x3F, 0x2E, 0x55,
|
|
0xA4, 0xBD, 0x1B, 0xFF, 0xE8, 0x3B, 0x9C, 0x80, 0xD0, 0x52, 0xB9, 0x85,
|
|
0xD1, 0x82, 0xEA, 0x0A, 0xDB, 0x2A, 0x3B, 0x73, 0x13, 0xD3, 0xFE, 0x14,
|
|
0xC8, 0x48, 0x4B, 0x1E, 0x05, 0x25, 0x88, 0xB9, 0xB7, 0xD2, 0xBB, 0xD2,
|
|
0xDF, 0x01, 0x61, 0x99, 0xEC, 0xD0, 0x6E, 0x15, 0x57, 0xCD, 0x09, 0x15,
|
|
0xB3, 0x35, 0x3B, 0xBB, 0x64, 0xE0, 0xEC, 0x37, 0x7F, 0xD0, 0x28, 0x37,
|
|
0x0D, 0xF9, 0x2B, 0x52, 0xC7, 0x89, 0x14, 0x28, 0xCD, 0xC6, 0x7E, 0xB6,
|
|
0x18, 0x4B, 0x52, 0x3D, 0x1D, 0xB2, 0x46, 0xC3, 0x2F, 0x63, 0x07, 0x84,
|
|
0x90, 0xF0, 0x0E, 0xF8, 0xD6, 0x47, 0xD1, 0x48, 0xD4, 0x79, 0x54, 0x51,
|
|
0x5E, 0x23, 0x27, 0xCF, 0xEF, 0x98, 0xC5, 0x82, 0x66, 0x4B, 0x4C, 0x0F,
|
|
0x6C, 0xC4, 0x16, 0x59
|
|
};
|
|
const byte qHex[] = {
|
|
0x8C, 0xF8, 0x36, 0x42, 0xA7, 0x09, 0xA0, 0x97, 0xB4, 0x47, 0x99, 0x76,
|
|
0x40, 0x12, 0x9D, 0xA2, 0x99, 0xB1, 0xA4, 0x7D, 0x1E, 0xB3, 0x75, 0x0B,
|
|
0xA3, 0x08, 0xB0, 0xFE, 0x64, 0xF5, 0xFB, 0xD3
|
|
};
|
|
WOLFSSL_BIGNUM* pBn = NULL;
|
|
WOLFSSL_BIGNUM* gBn = NULL;
|
|
WOLFSSL_BIGNUM* qBn = NULL;
|
|
|
|
ret = wolfSSL_DH_new();
|
|
if (ret == NULL) {
|
|
err = 1;
|
|
}
|
|
if (err == 0) {
|
|
pBn = wolfSSL_BN_bin2bn(pHex, (int)sizeof(pHex), NULL);
|
|
if (pBn == NULL) {
|
|
WOLFSSL_MSG("Error converting p hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
gBn = wolfSSL_BN_bin2bn(gHex, (int)sizeof(gHex), NULL);
|
|
if (gBn == NULL) {
|
|
WOLFSSL_MSG("Error converting g hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
qBn = wolfSSL_BN_bin2bn(qHex, (int)sizeof(qHex), NULL);
|
|
if (qBn == NULL) {
|
|
WOLFSSL_MSG("Error converting q hex to WOLFSSL_BIGNUM.");
|
|
err = 1;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
#if defined(OPENSSL_ALL) || \
|
|
defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
if (wolfSSL_DH_set0_pqg(ret, pBn, qBn, gBn) != 1) {
|
|
WOLFSSL_MSG("Error setting DH parameters.");
|
|
err = 1;
|
|
}
|
|
#else
|
|
ret->p = pBn;
|
|
ret->q = qBn;
|
|
ret->g = gBn;
|
|
|
|
if (SetDhInternal(ret) != 1) {
|
|
WOLFSSL_MSG("Error setting DH parameters.");
|
|
err = 1;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
if (err == 1) {
|
|
wolfSSL_BN_free(pBn);
|
|
wolfSSL_BN_free(gBn);
|
|
wolfSSL_BN_free(qBn);
|
|
wolfSSL_DH_free(ret);
|
|
ret = NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(WOLFSSL_QT) || defined(OPENSSL_ALL) || \
|
|
defined(WOLFSSL_OPENSSH) || defined(OPENSSL_EXTRA)
|
|
/* return 1 if success, -1 if error */
|
|
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
|
|
int wolfSSL_DH_LoadDer(WOLFSSL_DH* dh, const unsigned char* derBuf, int derSz)
|
|
{
|
|
word32 idx = 0;
|
|
int ret;
|
|
|
|
if (dh == NULL || dh->internal == NULL || derBuf == NULL || derSz <= 0) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
ret = wc_DhKeyDecode(derBuf, &idx, (DhKey*)dh->internal, (word32)derSz);
|
|
if (ret < 0) {
|
|
WOLFSSL_MSG("wc_DhKeyDecode failed");
|
|
return -1;
|
|
}
|
|
dh->inSet = 1;
|
|
|
|
if (SetDhExternal(dh) != 1) {
|
|
WOLFSSL_MSG("SetDhExternal failed");
|
|
return -1;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* !HAVE_FIPS || FIPS_VERION > 2 */
|
|
#endif /* WOLFSSL_QT || OPENSSL_ALL || WOLFSSL_OPENSSH || OPENSSL_EXTRA */
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
|
|
|| defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
|
|
|
|
#ifndef NO_BIO
|
|
WOLFSSL_DH *wolfSSL_PEM_read_bio_DHparams(WOLFSSL_BIO *bio, WOLFSSL_DH **x,
|
|
wc_pem_password_cb *cb, void *u)
|
|
{
|
|
#ifndef NO_FILESYSTEM
|
|
WOLFSSL_DH* localDh = NULL;
|
|
unsigned char* mem = NULL;
|
|
word32 size;
|
|
long sz;
|
|
int ret;
|
|
DerBuffer *der = NULL;
|
|
byte* p = NULL;
|
|
byte* g = NULL;
|
|
word32 pSz = MAX_DH_SIZE;
|
|
word32 gSz = MAX_DH_SIZE;
|
|
int memAlloced = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DHparams");
|
|
(void)cb;
|
|
(void)u;
|
|
|
|
if (bio == NULL) {
|
|
WOLFSSL_MSG("Bad Function Argument bio is NULL");
|
|
return NULL;
|
|
}
|
|
|
|
if (bio->type == WOLFSSL_BIO_MEMORY) {
|
|
/* Use the buffer directly. */
|
|
ret = wolfSSL_BIO_get_mem_data(bio, &mem);
|
|
if (mem == NULL || ret <= 0) {
|
|
WOLFSSL_MSG("Failed to get data from bio struct");
|
|
goto end;
|
|
}
|
|
size = ret;
|
|
}
|
|
else if (bio->type == WOLFSSL_BIO_FILE) {
|
|
/* Read whole file into a new buffer. */
|
|
if (XFSEEK((XFILE)bio->ptr, 0, SEEK_END) != 0)
|
|
goto end;
|
|
sz = XFTELL((XFILE)bio->ptr);
|
|
if (XFSEEK((XFILE)bio->ptr, 0, SEEK_SET) != 0)
|
|
goto end;
|
|
if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0L) {
|
|
WOLFSSL_MSG("PEM_read_bio_DHparams file size error");
|
|
goto end;
|
|
}
|
|
mem = (unsigned char*)XMALLOC(sz, NULL, DYNAMIC_TYPE_PEM);
|
|
if (mem == NULL)
|
|
goto end;
|
|
memAlloced = 1;
|
|
|
|
if (wolfSSL_BIO_read(bio, (char *)mem, (int)sz) <= 0)
|
|
goto end;
|
|
size = (word32)sz;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("BIO type not supported for reading DH parameters");
|
|
goto end;
|
|
}
|
|
|
|
ret = PemToDer(mem, size, DH_PARAM_TYPE, &der, NULL, NULL, NULL);
|
|
if (ret < 0) {
|
|
/* Also try X9.42 format */
|
|
ret = PemToDer(mem, size, X942_PARAM_TYPE, &der, NULL, NULL, NULL);
|
|
}
|
|
if (ret != 0)
|
|
goto end;
|
|
|
|
/* Use the object passed in, otherwise allocate a new object */
|
|
if (x != NULL)
|
|
localDh = *x;
|
|
if (localDh == NULL) {
|
|
localDh = wolfSSL_DH_new();
|
|
if (localDh == NULL)
|
|
goto end;
|
|
}
|
|
|
|
/* Load data in manually */
|
|
p = (byte*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
g = (byte*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
if (p == NULL || g == NULL)
|
|
goto end;
|
|
/* Extract the p and g as data from the DER encoded DH parameters. */
|
|
ret = wc_DhParamsLoad(der->buffer, der->length, p, &pSz, g, &gSz);
|
|
if (ret != 0) {
|
|
if (x != NULL && localDh != *x)
|
|
XFREE(localDh, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
localDh = NULL;
|
|
goto end;
|
|
}
|
|
|
|
if (x != NULL)
|
|
*x = localDh;
|
|
|
|
/* Put p and g in as big numbers. */
|
|
if (localDh->p != NULL) {
|
|
wolfSSL_BN_free(localDh->p);
|
|
localDh->p = NULL;
|
|
}
|
|
if (localDh->g != NULL) {
|
|
wolfSSL_BN_free(localDh->g);
|
|
localDh->g = NULL;
|
|
}
|
|
localDh->p = wolfSSL_BN_bin2bn(p, pSz, NULL);
|
|
localDh->g = wolfSSL_BN_bin2bn(g, gSz, NULL);
|
|
if (localDh->p == NULL || localDh->g == NULL) {
|
|
if (x != NULL && localDh != *x)
|
|
wolfSSL_DH_free(localDh);
|
|
localDh = NULL;
|
|
}
|
|
|
|
if (localDh != NULL && localDh->inSet == 0) {
|
|
if (SetDhInternal(localDh) != 1) {
|
|
WOLFSSL_MSG("Unable to set internal DH structure");
|
|
wolfSSL_DH_free(localDh);
|
|
localDh = NULL;
|
|
}
|
|
}
|
|
|
|
end:
|
|
if (memAlloced) XFREE(mem, NULL, DYNAMIC_TYPE_PEM);
|
|
if (der != NULL) FreeDer(&der);
|
|
XFREE(p, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
XFREE(g, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
|
|
return localDh;
|
|
#else
|
|
(void)bio;
|
|
(void)x;
|
|
(void)cb;
|
|
(void)u;
|
|
return NULL;
|
|
#endif
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* Reads DH parameters from a file pointer into WOLFSSL_DH structure.
|
|
*
|
|
* fp file pointer to read DH parameter file from
|
|
* x output WOLFSSL_DH to be created and populated from fp
|
|
* cb password callback, to be used to decrypt encrypted DH parameters PEM
|
|
* u context pointer to user-defined data to be received back in password cb
|
|
*
|
|
* Returns new WOLFSSL_DH structure pointer on success, NULL on failure. */
|
|
WOLFSSL_DH *wolfSSL_PEM_read_DHparams(XFILE fp, WOLFSSL_DH **x,
|
|
wc_pem_password_cb *cb, void *u)
|
|
{
|
|
WOLFSSL_BIO* fbio = NULL;
|
|
WOLFSSL_DH* dh = NULL;
|
|
|
|
if (fp == NULL) {
|
|
WOLFSSL_MSG("DH parameter file cannot be NULL");
|
|
return NULL;
|
|
}
|
|
|
|
fbio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
|
|
if (fbio == NULL) {
|
|
WOLFSSL_MSG("Unable to create file BIO to process DH PEM");
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_BIO_set_fp(fbio, fp, BIO_NOCLOSE) != 1) {
|
|
wolfSSL_BIO_free(fbio);
|
|
WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
|
|
return NULL;
|
|
}
|
|
|
|
/* wolfSSL_PEM_read_bio_DHparams() sanitizes x, cb, u args */
|
|
dh = wolfSSL_PEM_read_bio_DHparams(fbio, x, cb, u);
|
|
wolfSSL_BIO_free(fbio);
|
|
return dh;
|
|
}
|
|
#endif /* !NO_FILESYSTEM */
|
|
|
|
#endif /* !NO_BIO */
|
|
|
|
#if defined(WOLFSSL_DH_EXTRA) && !defined(NO_FILESYSTEM)
|
|
/* Writes the DH parameters in PEM format from "dh" out to the file pointer
|
|
* passed in.
|
|
*
|
|
* returns 1 on success
|
|
*/
|
|
int wolfSSL_PEM_write_DHparams(XFILE fp, WOLFSSL_DH* dh)
|
|
{
|
|
int ret;
|
|
word32 derSz = 0, pemSz = 0;
|
|
byte *der, *pem;
|
|
DhKey* key;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_DHparams");
|
|
|
|
if (dh == NULL) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", BAD_FUNC_ARG);
|
|
return 0;
|
|
}
|
|
|
|
if (dh->inSet == 0) {
|
|
if (SetDhInternal(dh) != 1) {
|
|
WOLFSSL_MSG("Unable to set internal DH structure");
|
|
return 0;
|
|
}
|
|
}
|
|
key = (DhKey*)dh->internal;
|
|
ret = wc_DhParamsToDer(key, NULL, &derSz);
|
|
if (ret != LENGTH_ONLY_E) {
|
|
WOLFSSL_MSG("Failed to get size of DH params");
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
|
|
return 0;
|
|
}
|
|
|
|
der = (byte*)XMALLOC(derSz, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (der == NULL) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", MEMORY_E);
|
|
return 0;
|
|
}
|
|
ret = wc_DhParamsToDer(key, der, &derSz);
|
|
if (ret <= 0) {
|
|
WOLFSSL_MSG("Failed to export DH params");
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
|
|
XFREE(der, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return 0;
|
|
}
|
|
|
|
/* convert to PEM */
|
|
ret = wc_DerToPem(der, derSz, NULL, 0, DH_PARAM_TYPE);
|
|
if (ret < 0) {
|
|
WOLFSSL_MSG("Failed to convert DH params to PEM");
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
|
|
XFREE(der, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
pemSz = (word32)ret;
|
|
|
|
pem = (byte*)XMALLOC(pemSz, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (pem == NULL) {
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", MEMORY_E);
|
|
XFREE(der, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
ret = wc_DerToPem(der, derSz, pem, pemSz, DH_PARAM_TYPE);
|
|
XFREE(der, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (ret < 0) {
|
|
WOLFSSL_MSG("Failed to convert DH params to PEM");
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
|
|
XFREE(pem, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return ret;
|
|
}
|
|
|
|
ret = (int)XFWRITE(pem, 1, pemSz, fp);
|
|
XFREE(pem, key->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (ret <= 0) {
|
|
WOLFSSL_MSG("Failed to write to file");
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
|
|
return 0;
|
|
}
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", 1);
|
|
return 1;
|
|
}
|
|
#endif /* WOLFSSL_DH_EXTRA && !NO_FILESYSTEM */
|
|
|
|
#endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE ||
|
|
* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
|
|
(defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
|
|
defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
|
|
defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)))
|
|
|
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST)
|
|
WOLFSSL_DH *wolfSSL_DH_generate_parameters(int prime_len, int generator,
|
|
void (*callback) (int, int, void *), void *cb_arg)
|
|
{
|
|
WOLFSSL_DH* dh;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_generate_parameters");
|
|
(void)callback;
|
|
(void)cb_arg;
|
|
|
|
if ((dh = wolfSSL_DH_new()) == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_DH_new error");
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_DH_generate_parameters_ex(dh, prime_len, generator, NULL)
|
|
!= 1) {
|
|
WOLFSSL_MSG("wolfSSL_DH_generate_parameters_ex error");
|
|
wolfSSL_DH_free(dh);
|
|
return NULL;
|
|
}
|
|
|
|
return dh;
|
|
}
|
|
|
|
int wolfSSL_DH_generate_parameters_ex(WOLFSSL_DH* dh, int prime_len,
|
|
int generator, void (*callback) (int, int, void *))
|
|
{
|
|
DhKey* key;
|
|
WC_RNG* rng;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_DH_generate_parameters_ex");
|
|
(void)callback;
|
|
(void)generator;
|
|
|
|
if (dh == NULL) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return 0;
|
|
}
|
|
|
|
if ((rng = wolfssl_get_global_rng()) == NULL) {
|
|
if (wolfSSL_RAND_Init() != 1) {
|
|
WOLFSSL_MSG("No RNG to use");
|
|
return 0;
|
|
}
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
/* Don't need SetDhInternal call since we are generating
|
|
* parameters ourselves */
|
|
|
|
key = (DhKey*)dh->internal;
|
|
|
|
/* Free so that mp_init's don't leak */
|
|
wc_FreeDhKey(key);
|
|
|
|
if (wc_DhGenerateParams(rng, prime_len, key) != 0) {
|
|
WOLFSSL_MSG("wc_DhGenerateParams error");
|
|
return 0;
|
|
}
|
|
dh->inSet = 1;
|
|
|
|
WOLFSSL_MSG("wolfSSL does not support using a custom generator.");
|
|
|
|
if (SetDhExternal(dh) != 1) {
|
|
WOLFSSL_MSG("SetDhExternal error");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_SELFTEST */
|
|
|
|
#endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
|
|
* HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
|
|
* HAVE_SBLIM_SFCB)) */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
|
|
/**
|
|
* Return DH p, q and g parameters
|
|
* @param dh a pointer to WOLFSSL_DH
|
|
* @param p a pointer to WOLFSSL_BIGNUM to be obtained from dh
|
|
* @param q a pointer to WOLFSSL_BIGNUM to be obtained from dh
|
|
* @param g a pointer to WOLFSSL_BIGNUM to be obtained from dh
|
|
*/
|
|
void wolfSSL_DH_get0_pqg(const WOLFSSL_DH *dh, const WOLFSSL_BIGNUM **p,
|
|
const WOLFSSL_BIGNUM **q, const WOLFSSL_BIGNUM **g)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_DH_get0_pqg");
|
|
if (dh == NULL)
|
|
return;
|
|
|
|
if (p != NULL)
|
|
*p = dh->p;
|
|
if (q != NULL)
|
|
*q = dh->q;
|
|
if (g != NULL)
|
|
*g = dh->g;
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#endif /* NO_DH */
|
|
|
|
/*******************************************************************************
|
|
* END OF DH API
|
|
******************************************************************************/
|
|
|
|
|
|
/*******************************************************************************
|
|
* START OF EC API
|
|
******************************************************************************/
|
|
|
|
#ifdef HAVE_ECC
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
|
|
#ifndef NO_CERTS
|
|
|
|
#if defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
|
|
!defined(NO_STDIO_FILESYSTEM)
|
|
int wolfSSL_EC_KEY_print_fp(XFILE fp, WOLFSSL_EC_KEY* key, int indent)
|
|
{
|
|
int ret = 1;
|
|
int bits = 0;
|
|
int priv = 0;
|
|
int nid = 0;
|
|
const char* curve;
|
|
const char* nistName;
|
|
WOLFSSL_BIGNUM* pubBn = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_print_fp");
|
|
|
|
if (fp == XBADFILE || key == NULL || key->group == NULL || indent < 0) {
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
bits = wolfSSL_EC_GROUP_order_bits(key->group);
|
|
if (bits <= 0) {
|
|
WOLFSSL_MSG("Failed to get group order bits.");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
}
|
|
if (ret == 1) {
|
|
if (key->priv_key != NULL && !wolfSSL_BN_is_zero(key->priv_key)) {
|
|
if (XFPRINTF(fp, "Private-Key: (%d bit)\n", bits) < 0)
|
|
ret = 0;
|
|
priv = 1;
|
|
}
|
|
else {
|
|
if (XFPRINTF(fp, "Public-Key: (%d bit)\n", bits) < 0)
|
|
ret = 0;
|
|
}
|
|
|
|
if (priv) {
|
|
ret = pk_bn_field_print_fp(fp, indent, "priv", key->priv_key);
|
|
}
|
|
}
|
|
if (ret == 1 && key->pub_key != NULL && key->pub_key->exSet) {
|
|
pubBn = wolfSSL_EC_POINT_point2bn(key->group, key->pub_key,
|
|
POINT_CONVERSION_UNCOMPRESSED, NULL,
|
|
NULL);
|
|
if (pubBn == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_point2bn failed.");
|
|
ret = 0;
|
|
}
|
|
else {
|
|
ret = pk_bn_field_print_fp(fp, indent, "pub", pubBn);
|
|
}
|
|
}
|
|
if (ret == 1) {
|
|
nid = wolfSSL_EC_GROUP_get_curve_name(key->group);
|
|
if (nid > 0) {
|
|
curve = wolfSSL_OBJ_nid2ln(nid);
|
|
if (curve != NULL) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
else if (XFPRINTF(fp, "ASN1 OID: %s\n", curve) < 0)
|
|
ret = 0;
|
|
}
|
|
nistName = wolfSSL_EC_curve_nid2nist(nid);
|
|
if (nistName != NULL) {
|
|
if (XFPRINTF(fp, "%*s", indent, "") < 0)
|
|
ret = 0;
|
|
else if (XFPRINTF(fp, "NIST CURVE: %s\n", nistName) < 0)
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (pubBn != NULL) {
|
|
wolfSSL_BN_free(pubBn);
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_EC_KEY_print_fp", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* XFPRINTF && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
|
|
|
|
#if defined(OPENSSL_ALL)
|
|
|
|
/* Copies ecc_key into new WOLFSSL_EC_KEY object
|
|
*
|
|
* src : EC_KEY to duplicate. If EC_KEY is not null, create new EC_KEY and copy
|
|
* internal ecc_key from src to dup.
|
|
*
|
|
* Returns pointer to duplicate EC_KEY.
|
|
*/
|
|
WOLFSSL_EC_KEY *wolfSSL_EC_KEY_dup(const WOLFSSL_EC_KEY *src)
|
|
{
|
|
WOLFSSL_EC_KEY *newKey;
|
|
ecc_key *key, *srcKey;
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_dup");
|
|
|
|
if (src == NULL || src->internal == NULL || src->group == NULL || \
|
|
src->pub_key == NULL || src->priv_key == NULL) {
|
|
|
|
WOLFSSL_MSG("src NULL error");
|
|
return NULL;
|
|
}
|
|
|
|
newKey = wolfSSL_EC_KEY_new();
|
|
if (newKey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new error");
|
|
return NULL;
|
|
}
|
|
|
|
key = (ecc_key*)newKey->internal;
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("ecc_key NULL error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
srcKey = (ecc_key*)src->internal;
|
|
|
|
/* ecc_key */
|
|
/* copy pubkey */
|
|
ret = wc_ecc_copy_point(&srcKey->pubkey, &key->pubkey);
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_copy_point error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
/* copy private key k */
|
|
ret = mp_copy(&srcKey->k, &key->k);
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_copy error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
/* copy domain parameters */
|
|
if (srcKey->dp) {
|
|
ret = wc_ecc_set_curve(key, 0, srcKey->dp->id);
|
|
if (ret != 0) {
|
|
WOLFSSL_MSG("wc_ecc_set_curve error");
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
key->type = srcKey->type;
|
|
key->idx = srcKey->idx;
|
|
key->state = srcKey->state;
|
|
key->flags = srcKey->flags;
|
|
|
|
/* Copy group */
|
|
if (newKey->group == NULL) {
|
|
WOLFSSL_MSG("EC_GROUP_new_by_curve_name error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
newKey->group->curve_idx = src->group->curve_idx;
|
|
newKey->group->curve_nid = src->group->curve_nid;
|
|
newKey->group->curve_oid = src->group->curve_oid;
|
|
|
|
/* Copy public key */
|
|
if (src->pub_key->internal == NULL || newKey->pub_key->internal == NULL) {
|
|
WOLFSSL_MSG("NULL pub_key error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
/* Copy public key internal */
|
|
ret = wc_ecc_copy_point((ecc_point*)src->pub_key->internal,
|
|
(ecc_point*)newKey->pub_key->internal);
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_copy_point error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
/* Copy X, Y, Z */
|
|
newKey->pub_key->X = wolfSSL_BN_dup(src->pub_key->X);
|
|
if (!newKey->pub_key->X && src->pub_key->X) {
|
|
WOLFSSL_MSG("Error copying EC_POINT");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
newKey->pub_key->Y = wolfSSL_BN_dup(src->pub_key->Y);
|
|
if (!newKey->pub_key->Y && src->pub_key->Y) {
|
|
WOLFSSL_MSG("Error copying EC_POINT");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
newKey->pub_key->Z = wolfSSL_BN_dup(src->pub_key->Z);
|
|
if (!newKey->pub_key->Z && src->pub_key->Z) {
|
|
WOLFSSL_MSG("Error copying EC_POINT");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
newKey->pub_key->inSet = src->pub_key->inSet;
|
|
newKey->pub_key->exSet = src->pub_key->exSet;
|
|
newKey->pkcs8HeaderSz = src->pkcs8HeaderSz;
|
|
|
|
/* Copy private key */
|
|
if (src->priv_key->internal == NULL || newKey->priv_key->internal == NULL) {
|
|
WOLFSSL_MSG("NULL priv_key error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
/* Free priv_key before call to newKey function */
|
|
wolfSSL_BN_free(newKey->priv_key);
|
|
newKey->priv_key = wolfSSL_BN_dup(src->priv_key);
|
|
if (newKey->priv_key == NULL) {
|
|
WOLFSSL_MSG("BN_newKey error");
|
|
wolfSSL_EC_KEY_free(newKey);
|
|
return NULL;
|
|
}
|
|
|
|
return newKey;
|
|
}
|
|
|
|
#endif /* OPENSSL_ALL */
|
|
|
|
#endif /* !NO_CERTS */
|
|
|
|
#ifdef ALT_ECC_SIZE
|
|
static int SetIndividualInternalEcc(WOLFSSL_BIGNUM* bn, mp_int* mpi)
|
|
{
|
|
WOLFSSL_MSG("Entering SetIndividualInternal");
|
|
|
|
if (bn == NULL || bn->internal == NULL) {
|
|
WOLFSSL_MSG("bn NULL error");
|
|
return -1;
|
|
}
|
|
|
|
if (mpi == NULL) {
|
|
WOLFSSL_MSG("mpi NULL error");
|
|
return -1;
|
|
}
|
|
|
|
if (mp_copy((mp_int*)bn->internal, mpi) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_copy error");
|
|
return -1;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* ALT_ECC_SIZE */
|
|
|
|
/* EC_POINT Openssl -> WolfSSL */
|
|
static int SetECPointInternal(WOLFSSL_EC_POINT *p)
|
|
{
|
|
ecc_point* point;
|
|
WOLFSSL_ENTER("SetECPointInternal");
|
|
|
|
if (p == NULL || p->internal == NULL) {
|
|
WOLFSSL_MSG("ECPoint NULL error");
|
|
return -1;
|
|
}
|
|
|
|
point = (ecc_point*)p->internal;
|
|
|
|
#ifndef ALT_ECC_SIZE
|
|
if (p->X != NULL && SetIndividualInternal(p->X, point->x)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point X error");
|
|
return -1;
|
|
}
|
|
|
|
if (p->Y != NULL && SetIndividualInternal(p->Y, point->y)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point Y error");
|
|
return -1;
|
|
}
|
|
|
|
if (p->Z != NULL && SetIndividualInternal(p->Z, point->z)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point Z error");
|
|
return -1;
|
|
}
|
|
#else
|
|
if (p->X != NULL && SetIndividualInternalEcc(p->X, point->x)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point X error");
|
|
return -1;
|
|
}
|
|
|
|
if (p->Y != NULL && SetIndividualInternalEcc(p->Y, point->y)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point Y error");
|
|
return -1;
|
|
}
|
|
|
|
if (p->Z != NULL && SetIndividualInternalEcc(p->Z, point->z)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecc point Z error");
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
p->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* EC_POINT WolfSSL -> OpenSSL */
|
|
static int SetECPointExternal(WOLFSSL_EC_POINT *p)
|
|
{
|
|
ecc_point* point;
|
|
|
|
WOLFSSL_ENTER("SetECPointExternal");
|
|
|
|
if (p == NULL || p->internal == NULL) {
|
|
WOLFSSL_MSG("ECPoint NULL error");
|
|
return -1;
|
|
}
|
|
|
|
point = (ecc_point*)p->internal;
|
|
|
|
if (SetIndividualExternal(&p->X, point->x) != 1) {
|
|
WOLFSSL_MSG("ecc point X error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&p->Y, point->y) != 1) {
|
|
WOLFSSL_MSG("ecc point Y error");
|
|
return -1;
|
|
}
|
|
|
|
if (SetIndividualExternal(&p->Z, point->z) != 1) {
|
|
WOLFSSL_MSG("ecc point Z error");
|
|
return -1;
|
|
}
|
|
|
|
p->exSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
/* EC_KEY wolfSSL -> OpenSSL */
|
|
int SetECKeyExternal(WOLFSSL_EC_KEY* eckey)
|
|
{
|
|
ecc_key* key;
|
|
|
|
WOLFSSL_ENTER("SetECKeyExternal");
|
|
|
|
if (eckey == NULL || eckey->internal == NULL) {
|
|
WOLFSSL_MSG("ec key NULL error");
|
|
return -1;
|
|
}
|
|
|
|
key = (ecc_key*)eckey->internal;
|
|
|
|
/* set group (OID, nid and idx) */
|
|
eckey->group->curve_oid = ecc_sets[key->idx].oidSum;
|
|
eckey->group->curve_nid = EccEnumToNID(ecc_sets[key->idx].id);
|
|
eckey->group->curve_idx = key->idx;
|
|
|
|
if (eckey->pub_key->internal != NULL) {
|
|
/* set the internal public key */
|
|
if (wc_ecc_copy_point(&key->pubkey,
|
|
(ecc_point*)eckey->pub_key->internal) != MP_OKAY) {
|
|
WOLFSSL_MSG("SetECKeyExternal ecc_copy_point failed");
|
|
return -1;
|
|
}
|
|
|
|
/* set the external pubkey (point) */
|
|
if (SetECPointExternal(eckey->pub_key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyExternal SetECPointExternal failed");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
/* set the external privkey */
|
|
if (key->type == ECC_PRIVATEKEY) {
|
|
if (SetIndividualExternal(&eckey->priv_key, &key->k) != 1) {
|
|
WOLFSSL_MSG("ec priv key error");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
eckey->exSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* EC_KEY Openssl -> WolfSSL */
|
|
int SetECKeyInternal(WOLFSSL_EC_KEY* eckey)
|
|
{
|
|
ecc_key* key;
|
|
|
|
WOLFSSL_ENTER("SetECKeyInternal");
|
|
|
|
if (eckey == NULL || eckey->internal == NULL || eckey->group == NULL) {
|
|
WOLFSSL_MSG("ec key NULL error");
|
|
return -1;
|
|
}
|
|
|
|
key = (ecc_key*)eckey->internal;
|
|
|
|
/* validate group */
|
|
if ((eckey->group->curve_idx < 0) ||
|
|
(wc_ecc_is_valid_idx(eckey->group->curve_idx) == 0)) {
|
|
WOLFSSL_MSG("invalid curve idx");
|
|
return -1;
|
|
}
|
|
|
|
/* set group (idx of curve and corresponding domain parameters) */
|
|
key->idx = eckey->group->curve_idx;
|
|
key->dp = &ecc_sets[key->idx];
|
|
|
|
/* set pubkey (point) */
|
|
if (eckey->pub_key != NULL) {
|
|
if (SetECPointInternal(eckey->pub_key) != 1) {
|
|
WOLFSSL_MSG("ec key pub error");
|
|
return -1;
|
|
}
|
|
|
|
/* copy over the public point to key */
|
|
if (wc_ecc_copy_point((ecc_point*)eckey->pub_key->internal,
|
|
&key->pubkey) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_copy_point error");
|
|
return -1;
|
|
}
|
|
|
|
/* public key */
|
|
key->type = ECC_PUBLICKEY;
|
|
}
|
|
|
|
/* set privkey */
|
|
if (eckey->priv_key != NULL) {
|
|
if (SetIndividualInternal(eckey->priv_key, &key->k)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ec key priv error");
|
|
return -1;
|
|
}
|
|
|
|
/* private key */
|
|
if (!mp_iszero(&key->k))
|
|
key->type = ECC_PRIVATEKEY;
|
|
}
|
|
|
|
eckey->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
WOLFSSL_EC_POINT *wolfSSL_EC_KEY_get0_public_key(const WOLFSSL_EC_KEY *key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_get0_public_key");
|
|
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_get0_public_key Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
return key->pub_key;
|
|
}
|
|
|
|
const WOLFSSL_EC_GROUP *wolfSSL_EC_KEY_get0_group(const WOLFSSL_EC_KEY *key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_get0_group");
|
|
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_get0_group Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
return key->group;
|
|
}
|
|
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_KEY_set_private_key(WOLFSSL_EC_KEY *key,
|
|
const WOLFSSL_BIGNUM *priv_key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_set_private_key");
|
|
|
|
if (key == NULL || priv_key == NULL) {
|
|
WOLFSSL_MSG("Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* free key if previously set */
|
|
if (key->priv_key != NULL)
|
|
wolfSSL_BN_free(key->priv_key);
|
|
|
|
key->priv_key = wolfSSL_BN_dup(priv_key);
|
|
if (key->priv_key == NULL) {
|
|
WOLFSSL_MSG("key ecc priv key NULL");
|
|
return 0;
|
|
}
|
|
|
|
if (SetECKeyInternal(key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
wolfSSL_BN_free(key->priv_key);
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
WOLFSSL_BIGNUM *wolfSSL_EC_KEY_get0_private_key(const WOLFSSL_EC_KEY *key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_get0_private_key");
|
|
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_get0_private_key Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_BN_is_zero(key->priv_key)) {
|
|
/* return NULL if not set */
|
|
return NULL;
|
|
}
|
|
|
|
return key->priv_key;
|
|
}
|
|
|
|
WOLFSSL_EC_KEY *wolfSSL_EC_KEY_new_by_curve_name(int nid)
|
|
{
|
|
WOLFSSL_EC_KEY *key;
|
|
int x;
|
|
int eccEnum = NIDToEccEnum(nid);
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_new_by_curve_name");
|
|
|
|
key = wolfSSL_EC_KEY_new();
|
|
if (key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new failure");
|
|
return NULL;
|
|
}
|
|
|
|
/* set the nid of the curve */
|
|
key->group->curve_nid = nid;
|
|
|
|
if (eccEnum != -1) {
|
|
/* search and set the corresponding internal curve idx */
|
|
for (x = 0; ecc_sets[x].size != 0; x++)
|
|
if (ecc_sets[x].id == eccEnum) {
|
|
key->group->curve_idx = x;
|
|
key->group->curve_oid = ecc_sets[x].oidSum;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return key;
|
|
}
|
|
|
|
const char* wolfSSL_EC_curve_nid2nist(int nid)
|
|
{
|
|
const WOLF_EC_NIST_NAME* nist_name;
|
|
for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
|
|
if (nist_name->nid == nid) {
|
|
return nist_name->name;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* return nist curve id
|
|
* @param name nist curve name
|
|
* @return nist curve id when found, 0 when not found
|
|
*/
|
|
int wolfSSL_EC_curve_nist2nid(const char* name)
|
|
{
|
|
const WOLF_EC_NIST_NAME* nist_name;
|
|
for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
|
|
if (XSTRCMP(nist_name->name, name) == 0) {
|
|
return nist_name->nid;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void InitwolfSSL_ECKey(WOLFSSL_EC_KEY* key)
|
|
{
|
|
if (key) {
|
|
key->group = NULL;
|
|
key->pub_key = NULL;
|
|
key->priv_key = NULL;
|
|
key->internal = NULL;
|
|
key->inSet = 0;
|
|
key->exSet = 0;
|
|
key->form = POINT_CONVERSION_UNCOMPRESSED;
|
|
}
|
|
}
|
|
|
|
WOLFSSL_EC_KEY *wolfSSL_EC_KEY_new_ex(void* heap, int devId)
|
|
{
|
|
WOLFSSL_EC_KEY *external;
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_new");
|
|
|
|
external = (WOLFSSL_EC_KEY*)XMALLOC(sizeof(WOLFSSL_EC_KEY), heap,
|
|
DYNAMIC_TYPE_ECC);
|
|
if (external == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new malloc WOLFSSL_EC_KEY failure");
|
|
return NULL;
|
|
}
|
|
XMEMSET(external, 0, sizeof(WOLFSSL_EC_KEY));
|
|
external->heap = heap;
|
|
|
|
InitwolfSSL_ECKey(external);
|
|
|
|
external->refCount = 1;
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_InitMutex(&external->refMutex) != 0) {
|
|
WOLFSSL_MSG("wc_InitMutex WOLFSSL_EC_KEY failure");
|
|
XFREE(external, heap, DYNAMIC_TYPE_ECC);
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
external->internal = (ecc_key*)XMALLOC(sizeof(ecc_key), heap,
|
|
DYNAMIC_TYPE_ECC);
|
|
if (external->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new malloc ecc key failure");
|
|
goto error;
|
|
}
|
|
XMEMSET(external->internal, 0, sizeof(ecc_key));
|
|
|
|
if (wc_ecc_init_ex((ecc_key*)external->internal, heap, devId) != 0) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new init ecc key failure");
|
|
goto error;
|
|
}
|
|
|
|
/* Group unknown at creation */
|
|
external->group = wolfSSL_EC_GROUP_new_by_curve_name(NID_undef);
|
|
if (external->group == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new malloc WOLFSSL_EC_GROUP failure");
|
|
goto error;
|
|
}
|
|
|
|
/* public key */
|
|
external->pub_key = wolfSSL_EC_POINT_new(external->group);
|
|
if (external->pub_key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_new failure");
|
|
goto error;
|
|
}
|
|
|
|
/* private key */
|
|
external->priv_key = wolfSSL_BN_new();
|
|
if (external->priv_key == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_BN_new failure");
|
|
goto error;
|
|
}
|
|
|
|
return external;
|
|
error:
|
|
wolfSSL_EC_KEY_free(external);
|
|
return NULL;
|
|
}
|
|
|
|
WOLFSSL_EC_KEY *wolfSSL_EC_KEY_new(void)
|
|
{
|
|
return wolfSSL_EC_KEY_new_ex(NULL, INVALID_DEVID);
|
|
}
|
|
|
|
void wolfSSL_EC_KEY_free(WOLFSSL_EC_KEY *key)
|
|
{
|
|
int doFree = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_free");
|
|
|
|
if (key != NULL) {
|
|
void* heap = key->heap;
|
|
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_LockMutex(&key->refMutex) != 0) {
|
|
WOLFSSL_MSG("Could not lock EC_KEY mutex");
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
/* only free if all references to it are done */
|
|
key->refCount--;
|
|
if (key->refCount == 0) {
|
|
doFree = 1;
|
|
}
|
|
#ifndef SINGLE_THREADED
|
|
wc_UnLockMutex(&key->refMutex);
|
|
#endif
|
|
|
|
if (doFree == 0) {
|
|
return;
|
|
}
|
|
|
|
#ifndef SINGLE_THREADED
|
|
wc_FreeMutex(&key->refMutex);
|
|
#endif
|
|
|
|
if (key->internal != NULL) {
|
|
wc_ecc_free((ecc_key*)key->internal);
|
|
XFREE(key->internal, heap, DYNAMIC_TYPE_ECC);
|
|
}
|
|
wolfSSL_BN_free(key->priv_key);
|
|
wolfSSL_EC_POINT_free(key->pub_key);
|
|
wolfSSL_EC_GROUP_free(key->group);
|
|
InitwolfSSL_ECKey(key); /* set back to NULLs for safety */
|
|
|
|
XFREE(key, heap, DYNAMIC_TYPE_ECC);
|
|
(void)heap;
|
|
/* key = NULL, don't try to access or double free it */
|
|
}
|
|
}
|
|
|
|
/* Increments ref count of WOLFSSL_EC_KEY.
|
|
* Return 1 on success, 0 on error */
|
|
int wolfSSL_EC_KEY_up_ref(WOLFSSL_EC_KEY* key)
|
|
{
|
|
if (key) {
|
|
#ifndef SINGLE_THREADED
|
|
if (wc_LockMutex(&key->refMutex) != 0) {
|
|
WOLFSSL_MSG("Failed to lock EC_KEY mutex");
|
|
}
|
|
#endif
|
|
key->refCount++;
|
|
#ifndef SINGLE_THREADED
|
|
wc_UnLockMutex(&key->refMutex);
|
|
#endif
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* set the group in WOLFSSL_EC_KEY and return 1 on success */
|
|
int wolfSSL_EC_KEY_set_group(WOLFSSL_EC_KEY *key, WOLFSSL_EC_GROUP *group)
|
|
{
|
|
if (key == NULL || group == NULL)
|
|
return 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_set_group");
|
|
|
|
if (key->group != NULL) {
|
|
/* free the current group */
|
|
wolfSSL_EC_GROUP_free(key->group);
|
|
}
|
|
|
|
key->group = wolfSSL_EC_GROUP_dup(group);
|
|
if (key->group == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
int wolfSSL_EC_KEY_generate_key(WOLFSSL_EC_KEY *key)
|
|
{
|
|
int initTmpRng = 0;
|
|
int eccEnum;
|
|
WC_RNG* rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
int ret;
|
|
ecc_key* ecKey;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_generate_key");
|
|
|
|
if (key == NULL || key->internal == NULL ||
|
|
key->group == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key Bad arguments");
|
|
return 0;
|
|
}
|
|
if (key->group->curve_idx < 0) {
|
|
/* generate key using the default curve */
|
|
/* group should be set, but to retain compat use index 0 */
|
|
key->group->curve_idx = ECC_CURVE_DEF;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return 0;
|
|
#endif
|
|
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key failed to set RNG");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
/* NIDToEccEnum returns -1 for invalid NID so if key->group->curve_nid
|
|
* is 0 then pass ECC_CURVE_DEF as arg */
|
|
ecKey = (ecc_key*)key->internal;
|
|
eccEnum = key->group->curve_nid ?
|
|
NIDToEccEnum(key->group->curve_nid) : ECC_CURVE_DEF;
|
|
ret = wc_ecc_make_key_ex(rng, 0, ecKey, eccEnum);
|
|
#if defined(WOLFSSL_ASYNC_CRYPT)
|
|
ret = wc_AsyncWait(ret, &ecKey->asyncDev, WC_ASYNC_FLAG_NONE);
|
|
#endif
|
|
|
|
if (ret != 0) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key wc_ecc_make_key failed");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
|
|
if (SetECKeyExternal(key) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key SetECKeyExternal failed");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
#ifndef NO_WOLFSSL_STUB
|
|
void wolfSSL_EC_KEY_set_asn1_flag(WOLFSSL_EC_KEY *key, int asn1_flag)
|
|
{
|
|
(void)key;
|
|
(void)asn1_flag;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_set_asn1_flag");
|
|
WOLFSSL_STUB("EC_KEY_set_asn1_flag");
|
|
}
|
|
#endif
|
|
|
|
static int setupPoint(const WOLFSSL_EC_POINT *p) {
|
|
if (!p) {
|
|
return 0;
|
|
}
|
|
if (p->inSet == 0) {
|
|
WOLFSSL_MSG("No ECPoint internal set, do it");
|
|
|
|
if (SetECPointInternal((WOLFSSL_EC_POINT *)p) != 1) {
|
|
WOLFSSL_MSG("SetECPointInternal SetECPointInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_KEY_set_public_key(WOLFSSL_EC_KEY *key,
|
|
const WOLFSSL_EC_POINT *pub)
|
|
{
|
|
ecc_point *pub_p, *key_p;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_set_public_key");
|
|
|
|
if (key == NULL || key->internal == NULL ||
|
|
pub == NULL || pub->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_set_public_key Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (key->inSet == 0) {
|
|
if (SetECKeyInternal(key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (setupPoint(pub) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
pub_p = (ecc_point*)pub->internal;
|
|
key_p = (ecc_point*)key->pub_key->internal;
|
|
|
|
/* create new point if required */
|
|
if (key_p == NULL)
|
|
key_p = wc_ecc_new_point();
|
|
|
|
if (key_p == NULL) {
|
|
WOLFSSL_MSG("key ecc point NULL");
|
|
return 0;
|
|
}
|
|
|
|
if (wc_ecc_copy_point(pub_p, key_p) != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_copy_point failure");
|
|
return 0;
|
|
}
|
|
|
|
if (SetECPointExternal(key->pub_key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return 0;
|
|
}
|
|
|
|
if (SetECKeyInternal(key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return 0;
|
|
}
|
|
|
|
wolfSSL_EC_POINT_dump("pub", pub);
|
|
wolfSSL_EC_POINT_dump("key->pub_key", key->pub_key);
|
|
|
|
return 1;
|
|
}
|
|
|
|
int wolfSSL_EC_KEY_check_key(const WOLFSSL_EC_KEY *key)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_check_key");
|
|
|
|
if (key == NULL || key->internal == NULL) {
|
|
WOLFSSL_MSG("Bad parameter");
|
|
return 0;
|
|
}
|
|
|
|
if (key->inSet == 0) {
|
|
if (SetECKeyInternal((WOLFSSL_EC_KEY*)key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
return wc_ecc_check_key((ecc_key*)key->internal) == 0 ?
|
|
1 : 0;
|
|
}
|
|
/* End EC_KEY */
|
|
|
|
/* Calculate and return maximum size of the ECDSA signature for the curve */
|
|
int wolfSSL_ECDSA_size(const WOLFSSL_EC_KEY *key)
|
|
{
|
|
const EC_GROUP *group;
|
|
int bits, bytes;
|
|
word32 headerSz = SIG_HEADER_SZ; /* 2*ASN_TAG + 2*LEN(ENUM) */
|
|
|
|
if (key == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
if ((group = wolfSSL_EC_KEY_get0_group(key)) == NULL) {
|
|
return 0;
|
|
}
|
|
if ((bits = wolfSSL_EC_GROUP_order_bits(group)) == 0) {
|
|
/* group is not set */
|
|
return 0;
|
|
}
|
|
|
|
bytes = (bits + 7) / 8; /* bytes needed to hold bits */
|
|
return headerSz +
|
|
ECC_MAX_PAD_SZ + /* possible leading zeroes in r and s */
|
|
bytes + bytes; /* r and s */
|
|
}
|
|
|
|
int wolfSSL_ECDSA_sign(int type,
|
|
const unsigned char *digest, int digestSz,
|
|
unsigned char *sig, unsigned int *sigSz, WOLFSSL_EC_KEY *key)
|
|
{
|
|
int ret = 1;
|
|
WC_RNG* rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
#endif
|
|
int initTmpRng = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_sign");
|
|
|
|
if (!key) {
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return 0;
|
|
#endif
|
|
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
if (rng) {
|
|
if (wc_ecc_sign_hash(digest, digestSz, sig, sigSz, rng,
|
|
(ecc_key*)key->internal) != 0) {
|
|
ret = 0;
|
|
}
|
|
if (initTmpRng) {
|
|
wc_FreeRng(tmpRng);
|
|
}
|
|
} else {
|
|
ret = 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
if (tmpRng)
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
|
|
(void)type;
|
|
return ret;
|
|
}
|
|
|
|
int wolfSSL_ECDSA_verify(int type,
|
|
const unsigned char *digest, int digestSz,
|
|
const unsigned char *sig, int sigSz, WOLFSSL_EC_KEY *key)
|
|
{
|
|
int ret = 1;
|
|
int verify = 0;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_verify");
|
|
|
|
if (key == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
if (wc_ecc_verify_hash(sig, sigSz, digest, digestSz,
|
|
&verify, (ecc_key*)key->internal) != 0) {
|
|
ret = 0;
|
|
}
|
|
if (ret == 1 && verify != 1) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_verify failed");
|
|
ret = 0;
|
|
}
|
|
|
|
(void)type;
|
|
return ret;
|
|
}
|
|
|
|
#ifndef HAVE_SELFTEST
|
|
/* ECC point compression types were not included in selftest ecc.h */
|
|
|
|
char* wolfSSL_EC_POINT_point2hex(const WOLFSSL_EC_GROUP* group,
|
|
const WOLFSSL_EC_POINT* point, int form,
|
|
WOLFSSL_BN_CTX* ctx)
|
|
{
|
|
static const char* hexDigit = "0123456789ABCDEF";
|
|
char* hex = NULL;
|
|
int id;
|
|
int i, sz, len;
|
|
|
|
(void)ctx;
|
|
|
|
if (group == NULL || point == NULL)
|
|
return NULL;
|
|
|
|
id = wc_ecc_get_curve_id(group->curve_idx);
|
|
|
|
if ((sz = wc_ecc_get_curve_size_from_id(id)) < 0)
|
|
return NULL;
|
|
|
|
len = sz + 1;
|
|
if (form == POINT_CONVERSION_UNCOMPRESSED)
|
|
len += sz;
|
|
hex = (char*)XMALLOC(2 * len + 1, NULL, DYNAMIC_TYPE_ECC);
|
|
if (hex == NULL)
|
|
return NULL;
|
|
XMEMSET(hex, 0, 2 * len + 1);
|
|
|
|
/* Put in x-ordinate after format byte. */
|
|
i = sz - mp_unsigned_bin_size((mp_int*)point->X->internal) + 1;
|
|
if (mp_to_unsigned_bin((mp_int*)point->X->internal, (byte*)(hex + i)) < 0) {
|
|
XFREE(hex, NULL, DYNAMIC_TYPE_ECC);
|
|
return NULL;
|
|
}
|
|
|
|
if (form == POINT_CONVERSION_COMPRESSED) {
|
|
hex[0] = mp_isodd((mp_int*)point->Y->internal) ? ECC_POINT_COMP_ODD :
|
|
ECC_POINT_COMP_EVEN;
|
|
}
|
|
else {
|
|
hex[0] = ECC_POINT_UNCOMP;
|
|
/* Put in y-ordinate after x-ordinate */
|
|
i = 1 + 2 * sz - mp_unsigned_bin_size((mp_int*)point->Y->internal);
|
|
if (mp_to_unsigned_bin((mp_int*)point->Y->internal,
|
|
(byte*)(hex + i)) < 0) {
|
|
XFREE(hex, NULL, DYNAMIC_TYPE_ECC);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
for (i = len-1; i >= 0; i--) {
|
|
byte b = hex[i];
|
|
hex[i * 2 + 1] = hexDigit[b & 0xf];
|
|
hex[i * 2 ] = hexDigit[b >> 4];
|
|
}
|
|
|
|
return hex;
|
|
}
|
|
|
|
#endif /* HAVE_SELFTEST */
|
|
|
|
void wolfSSL_EC_POINT_dump(const char *msg, const WOLFSSL_EC_POINT *p)
|
|
{
|
|
#if defined(DEBUG_WOLFSSL)
|
|
char *num;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_dump");
|
|
|
|
if (!WOLFSSL_IS_DEBUG_ON() || wolfSSL_GetLoggingCb()) {
|
|
return;
|
|
}
|
|
|
|
if (p == NULL) {
|
|
printf("%s = NULL", msg);
|
|
return;
|
|
}
|
|
|
|
printf("%s:\n\tinSet=%d, exSet=%d\n", msg, p->inSet, p->exSet);
|
|
num = wolfSSL_BN_bn2hex(p->X);
|
|
printf("\tX = %s\n", num);
|
|
XFREE(num, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
num = wolfSSL_BN_bn2hex(p->Y);
|
|
printf("\tY = %s\n", num);
|
|
XFREE(num, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
num = wolfSSL_BN_bn2hex(p->Z);
|
|
printf("\tZ = %s\n", num);
|
|
XFREE(num, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
#else
|
|
(void)msg;
|
|
(void)p;
|
|
#endif
|
|
}
|
|
|
|
/* Start EC_GROUP */
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 0 if equal, 1 if not and -1 in case of error
|
|
*/
|
|
int wolfSSL_EC_GROUP_cmp(const WOLFSSL_EC_GROUP *a, const WOLFSSL_EC_GROUP *b,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
(void)ctx;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_cmp");
|
|
|
|
if (a == NULL || b == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_cmp Bad arguments");
|
|
return -1;
|
|
}
|
|
|
|
/* ok */
|
|
if ((a->curve_idx == b->curve_idx) && (a->curve_nid == b->curve_nid))
|
|
return 0;
|
|
|
|
/* ko */
|
|
return 1;
|
|
}
|
|
|
|
WOLFSSL_EC_GROUP *wolfSSL_EC_GROUP_dup(const WOLFSSL_EC_GROUP *src)
|
|
{
|
|
if (!src)
|
|
return NULL;
|
|
return wolfSSL_EC_GROUP_new_by_curve_name(src->curve_nid);
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
const WOLFSSL_EC_METHOD* wolfSSL_EC_GROUP_method_of(
|
|
const WOLFSSL_EC_GROUP *group)
|
|
{
|
|
return group;
|
|
}
|
|
|
|
int wolfSSL_EC_METHOD_get_field_type(const WOLFSSL_EC_METHOD *meth)
|
|
{
|
|
if (meth) {
|
|
return NID_X9_62_prime_field;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void wolfSSL_EC_GROUP_free(WOLFSSL_EC_GROUP *group)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_free");
|
|
|
|
XFREE(group, NULL, DYNAMIC_TYPE_ECC);
|
|
/* group = NULL, don't try to access or double free it */
|
|
}
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
#ifndef NO_WOLFSSL_STUB
|
|
void wolfSSL_EC_GROUP_set_asn1_flag(WOLFSSL_EC_GROUP *group, int flag)
|
|
{
|
|
(void)group;
|
|
(void)flag;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_set_asn1_flag");
|
|
WOLFSSL_STUB("EC_GROUP_set_asn1_flag");
|
|
}
|
|
#endif
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* the curve nid if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_GROUP_get_curve_name(const WOLFSSL_EC_GROUP *group)
|
|
{
|
|
int nid;
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_get_curve_name");
|
|
|
|
if (group == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_get_curve_name Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* If curve_nid is ECC Enum type, return corresponding OpenSSL nid */
|
|
if ((nid = EccEnumToNID(group->curve_nid)) != -1)
|
|
return nid;
|
|
|
|
return group->curve_nid;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* the degree of the curve if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_GROUP_get_degree(const WOLFSSL_EC_GROUP *group)
|
|
{
|
|
int nid;
|
|
int tmp;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_get_degree");
|
|
|
|
if (group == NULL || group->curve_idx < 0) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_get_degree Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* If curve_nid passed in is an ecc_curve_id enum, convert it to the
|
|
corresponding OpenSSL NID */
|
|
tmp = EccEnumToNID(group->curve_nid);
|
|
if (tmp != -1) {
|
|
nid = tmp;
|
|
}
|
|
else {
|
|
nid = group->curve_nid;
|
|
}
|
|
|
|
switch(nid) {
|
|
case NID_secp112r1:
|
|
case NID_secp112r2:
|
|
return 112;
|
|
case NID_secp128r1:
|
|
case NID_secp128r2:
|
|
return 128;
|
|
case NID_secp160k1:
|
|
case NID_secp160r1:
|
|
case NID_secp160r2:
|
|
case NID_brainpoolP160r1:
|
|
return 160;
|
|
case NID_secp192k1:
|
|
case NID_brainpoolP192r1:
|
|
case NID_X9_62_prime192v1:
|
|
return 192;
|
|
case NID_secp224k1:
|
|
case NID_secp224r1:
|
|
case NID_brainpoolP224r1:
|
|
return 224;
|
|
case NID_secp256k1:
|
|
case NID_brainpoolP256r1:
|
|
case NID_X9_62_prime256v1:
|
|
return 256;
|
|
case NID_brainpoolP320r1:
|
|
return 320;
|
|
case NID_secp384r1:
|
|
case NID_brainpoolP384r1:
|
|
return 384;
|
|
case NID_secp521r1:
|
|
return 521;
|
|
case NID_brainpoolP512r1:
|
|
return 512;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
|
|
WOLFSSL_EC_GROUP *wolfSSL_EC_GROUP_new_by_curve_name(int nid)
|
|
{
|
|
WOLFSSL_EC_GROUP *g;
|
|
int x, eccEnum;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_GROUP_new_by_curve_name");
|
|
|
|
/* curve group */
|
|
g = (WOLFSSL_EC_GROUP*)XMALLOC(sizeof(WOLFSSL_EC_GROUP), NULL,
|
|
DYNAMIC_TYPE_ECC);
|
|
if (g == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_new_by_curve_name malloc failure");
|
|
return NULL;
|
|
}
|
|
XMEMSET(g, 0, sizeof(WOLFSSL_EC_GROUP));
|
|
|
|
/* set the nid of the curve */
|
|
g->curve_nid = nid;
|
|
g->curve_idx = -1;
|
|
|
|
/* If NID passed in is OpenSSL type, convert it to ecc_curve_id enum */
|
|
eccEnum = NIDToEccEnum(nid);
|
|
if (eccEnum != -1) {
|
|
/* search and set the corresponding internal curve idx */
|
|
for (x = 0; ecc_sets[x].size != 0; x++) {
|
|
if (ecc_sets[x].id == eccEnum) {
|
|
g->curve_idx = x;
|
|
g->curve_oid = ecc_sets[x].oidSum;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return g;
|
|
}
|
|
|
|
/* Converts OpenSSL NID value of ECC curves to the associated enum values in
|
|
ecc_curve_id, used by ecc_sets[].*/
|
|
int NIDToEccEnum(int n)
|
|
{
|
|
WOLFSSL_ENTER("NIDToEccEnum()");
|
|
|
|
switch(n) {
|
|
case NID_X9_62_prime192v1:
|
|
return ECC_SECP192R1;
|
|
case NID_X9_62_prime192v2:
|
|
return ECC_PRIME192V2;
|
|
case NID_X9_62_prime192v3:
|
|
return ECC_PRIME192V3;
|
|
case NID_X9_62_prime239v1:
|
|
return ECC_PRIME239V1;
|
|
case NID_X9_62_prime239v2:
|
|
return ECC_PRIME239V2;
|
|
case NID_X9_62_prime239v3:
|
|
return ECC_PRIME239V3;
|
|
case NID_X9_62_prime256v1:
|
|
return ECC_SECP256R1;
|
|
case NID_secp112r1:
|
|
return ECC_SECP112R1;
|
|
case NID_secp112r2:
|
|
return ECC_SECP112R2;
|
|
case NID_secp128r1:
|
|
return ECC_SECP128R1;
|
|
case NID_secp128r2:
|
|
return ECC_SECP128R2;
|
|
case NID_secp160r1:
|
|
return ECC_SECP160R1;
|
|
case NID_secp160r2:
|
|
return ECC_SECP160R2;
|
|
case NID_secp224r1:
|
|
return ECC_SECP224R1;
|
|
case NID_secp384r1:
|
|
return ECC_SECP384R1;
|
|
case NID_secp521r1:
|
|
return ECC_SECP521R1;
|
|
case NID_secp160k1:
|
|
return ECC_SECP160K1;
|
|
case NID_secp192k1:
|
|
return ECC_SECP192K1;
|
|
case NID_secp224k1:
|
|
return ECC_SECP224K1;
|
|
case NID_secp256k1:
|
|
return ECC_SECP256K1;
|
|
case NID_brainpoolP160r1:
|
|
return ECC_BRAINPOOLP160R1;
|
|
case NID_brainpoolP192r1:
|
|
return ECC_BRAINPOOLP192R1;
|
|
case NID_brainpoolP224r1:
|
|
return ECC_BRAINPOOLP224R1;
|
|
case NID_brainpoolP256r1:
|
|
return ECC_BRAINPOOLP256R1;
|
|
case NID_brainpoolP320r1:
|
|
return ECC_BRAINPOOLP320R1;
|
|
case NID_brainpoolP384r1:
|
|
return ECC_BRAINPOOLP384R1;
|
|
case NID_brainpoolP512r1:
|
|
return ECC_BRAINPOOLP512R1;
|
|
default:
|
|
WOLFSSL_MSG("NID not found");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_EC_GROUP_order_bits(const WOLFSSL_EC_GROUP *group)
|
|
{
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int *order = (mp_int *)XMALLOC(sizeof(*order), NULL,
|
|
DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (order == NULL)
|
|
return 0;
|
|
#else
|
|
mp_int order[1];
|
|
#endif
|
|
|
|
if (group == NULL || group->curve_idx < 0) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_order_bits NULL error");
|
|
ret = -1;
|
|
}
|
|
|
|
if (ret == 0)
|
|
ret = mp_init(order);
|
|
|
|
if (ret == 0) {
|
|
ret = mp_read_radix(order, ecc_sets[group->curve_idx].order,
|
|
MP_RADIX_HEX);
|
|
if (ret == 0)
|
|
ret = mp_count_bits(order);
|
|
mp_clear(order);
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(order, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
#endif
|
|
|
|
if (ret == -1)
|
|
ret = 0;
|
|
|
|
return ret;
|
|
}
|
|
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
|
|
|
|
#if defined(OPENSSL_EXTRA)
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_GROUP_get_order(const WOLFSSL_EC_GROUP *group,
|
|
WOLFSSL_BIGNUM *order, WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
(void)ctx;
|
|
|
|
if (group == NULL || order == NULL || order->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_get_order NULL error");
|
|
return 0;
|
|
}
|
|
|
|
if (mp_init((mp_int*)order->internal) != MP_OKAY) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_get_order mp_init failure");
|
|
return 0;
|
|
}
|
|
|
|
if (mp_read_radix((mp_int*)order->internal,
|
|
ecc_sets[group->curve_idx].order, MP_RADIX_HEX) != MP_OKAY) {
|
|
WOLFSSL_MSG("wolfSSL_EC_GROUP_get_order mp_read order failure");
|
|
mp_clear((mp_int*)order->internal);
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* End EC_GROUP */
|
|
|
|
/* Start EC_POINT */
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_ECPoint_i2d(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *p,
|
|
unsigned char *out, unsigned int *len)
|
|
{
|
|
int err;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECPoint_i2d");
|
|
|
|
if (group == NULL || p == NULL || len == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECPoint_i2d NULL error");
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(p) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
if (out != NULL) {
|
|
wolfSSL_EC_POINT_dump("i2d p", p);
|
|
}
|
|
|
|
err = wc_ecc_export_point_der(group->curve_idx, (ecc_point*)p->internal,
|
|
out, len);
|
|
if (err != MP_OKAY && !(out == NULL && err == LENGTH_ONLY_E)) {
|
|
WOLFSSL_MSG("wolfSSL_ECPoint_i2d wc_ecc_export_point_der failed");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_ECPoint_d2i(unsigned char *in, unsigned int len,
|
|
const WOLFSSL_EC_GROUP *group, WOLFSSL_EC_POINT *p)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_ECPoint_d2i");
|
|
|
|
if (group == NULL || p == NULL || p->internal == NULL || in == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECPoint_d2i NULL error");
|
|
return 0;
|
|
}
|
|
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
if (wc_ecc_import_point_der_ex(in, len, group->curve_idx,
|
|
(ecc_point*)p->internal, 0) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_import_point_der_ex failed");
|
|
return 0;
|
|
}
|
|
#else
|
|
/* ECC_POINT_UNCOMP is not defined CAVP self test so use magic number */
|
|
if (in[0] == 0x04) {
|
|
if (wc_ecc_import_point_der(in, len, group->curve_idx,
|
|
(ecc_point*)p->internal) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_import_point_der failed");
|
|
return 0;
|
|
}
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("Only uncompressed points supported with HAVE_SELFTEST");
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
/* Set new external point */
|
|
if (SetECPointExternal(p) != 1) {
|
|
WOLFSSL_MSG("SetECPointExternal failed");
|
|
return 0;
|
|
}
|
|
|
|
wolfSSL_EC_POINT_dump("d2i p", p);
|
|
|
|
return 1;
|
|
}
|
|
|
|
size_t wolfSSL_EC_POINT_point2oct(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *p,
|
|
char form,
|
|
byte *buf, size_t len, WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
word32 min_len = (word32)len;
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
int compressed = form == POINT_CONVERSION_COMPRESSED ? 1 : 0;
|
|
#endif /* !HAVE_SELFTEST */
|
|
|
|
WOLFSSL_ENTER("EC_POINT_point2oct");
|
|
|
|
if (!group || !p) {
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(p) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
if (wolfSSL_EC_POINT_is_at_infinity(group, p)) {
|
|
/* encodes to a single 0 octet */
|
|
if (buf != NULL) {
|
|
if (len < 1) {
|
|
ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, EC_R_BUFFER_TOO_SMALL);
|
|
return 0;
|
|
}
|
|
buf[0] = 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
if (form != POINT_CONVERSION_UNCOMPRESSED
|
|
#ifndef HAVE_SELFTEST
|
|
&& form != POINT_CONVERSION_COMPRESSED
|
|
#endif /* !HAVE_SELFTEST */
|
|
) {
|
|
WOLFSSL_MSG("Unsupported curve form");
|
|
return 0;
|
|
}
|
|
|
|
#if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
if (wc_ecc_export_point_der_ex(group->curve_idx, (ecc_point*)p->internal,
|
|
buf, &min_len, compressed) != (buf ? MP_OKAY : LENGTH_ONLY_E)) {
|
|
return 0;
|
|
}
|
|
#else
|
|
if (wc_ecc_export_point_der(group->curve_idx, (ecc_point*)p->internal,
|
|
buf, &min_len) != (buf ? MP_OKAY : LENGTH_ONLY_E)) {
|
|
return 0;
|
|
}
|
|
#endif /* !HAVE_SELFTEST */
|
|
|
|
(void)ctx;
|
|
|
|
return (size_t)min_len;
|
|
}
|
|
|
|
|
|
int wolfSSL_EC_POINT_oct2point(const WOLFSSL_EC_GROUP *group,
|
|
WOLFSSL_EC_POINT *p, const unsigned char *buf,
|
|
size_t len, WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_oct2point");
|
|
|
|
if (!group || !p) {
|
|
return 0;
|
|
}
|
|
|
|
(void)ctx;
|
|
|
|
return wolfSSL_ECPoint_d2i((unsigned char*)buf, (unsigned int)len, group, p);
|
|
}
|
|
|
|
|
|
WOLFSSL_EC_KEY *wolfSSL_o2i_ECPublicKey(WOLFSSL_EC_KEY **a, const unsigned char **in,
|
|
long len)
|
|
{
|
|
WOLFSSL_EC_KEY* ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_o2i_ECPublicKey");
|
|
|
|
if (!a || !*a || !(*a)->group || !in || !*in || len <= 0) {
|
|
WOLFSSL_MSG("wolfSSL_o2i_ECPublicKey Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
ret = *a;
|
|
|
|
if (wolfSSL_EC_POINT_oct2point(ret->group, ret->pub_key, *in, len, NULL)
|
|
!= 1) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_oct2point error");
|
|
return NULL;
|
|
}
|
|
|
|
*in += len;
|
|
return ret;
|
|
}
|
|
|
|
int wolfSSL_i2o_ECPublicKey(const WOLFSSL_EC_KEY *in, unsigned char **out)
|
|
{
|
|
size_t len;
|
|
unsigned char *tmp = NULL;
|
|
char form;
|
|
WOLFSSL_ENTER("wolfSSL_i2o_ECPublicKey");
|
|
|
|
if (!in) {
|
|
WOLFSSL_MSG("wolfSSL_i2o_ECPublicKey Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (!in->exSet) {
|
|
if (SetECKeyExternal((WOLFSSL_EC_KEY*)in) != 1) {
|
|
WOLFSSL_MSG("SetECKeyExternal failure");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
#ifdef HAVE_COMP_KEY
|
|
/* Default to compressed form if not set */
|
|
form = in->form == POINT_CONVERSION_UNCOMPRESSED ?
|
|
POINT_CONVERSION_UNCOMPRESSED:
|
|
POINT_CONVERSION_COMPRESSED;
|
|
#else
|
|
form = POINT_CONVERSION_UNCOMPRESSED;
|
|
#endif
|
|
|
|
len = wolfSSL_EC_POINT_point2oct(in->group, in->pub_key, form,
|
|
NULL, 0, NULL);
|
|
|
|
if (len != 0 && out) {
|
|
if (!*out) {
|
|
if (!(tmp = (unsigned char*)XMALLOC(len, NULL,
|
|
DYNAMIC_TYPE_OPENSSL))) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
return 0;
|
|
}
|
|
*out = tmp;
|
|
}
|
|
|
|
if (wolfSSL_EC_POINT_point2oct(in->group, in->pub_key, form, *out,
|
|
len, NULL) == 0) {
|
|
if (tmp) {
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
*out = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
if (!tmp) {
|
|
/* Move buffer forward if it was not alloced in this function */
|
|
*out += len;
|
|
}
|
|
}
|
|
|
|
return (int)len;
|
|
}
|
|
|
|
#ifdef HAVE_ECC_KEY_IMPORT
|
|
WOLFSSL_EC_KEY *wolfSSL_d2i_ECPrivateKey(WOLFSSL_EC_KEY **key, const unsigned char **in,
|
|
long len)
|
|
{
|
|
word32 idx = 0;
|
|
WOLFSSL_EC_KEY *eckey = NULL;
|
|
WOLFSSL_ENTER("wolfSSL_d2i_ECPrivateKey");
|
|
|
|
if (!in || !*in || len <= 0) {
|
|
WOLFSSL_MSG("wolfSSL_d2i_ECPrivateKey Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
if (!(eckey = wolfSSL_EC_KEY_new())) {
|
|
WOLFSSL_MSG("wolfSSL_EC_KEY_new error");
|
|
return NULL;
|
|
}
|
|
|
|
if (wc_EccPrivateKeyDecode(*in, &idx, (ecc_key*)eckey->internal,
|
|
(word32)len) != 0) {
|
|
WOLFSSL_MSG("wc_EccPrivateKeyDecode error");
|
|
goto error;
|
|
}
|
|
|
|
eckey->inSet = 1;
|
|
|
|
if (SetECKeyExternal(eckey) != 1) {
|
|
WOLFSSL_MSG("SetECKeyExternal error");
|
|
goto error;
|
|
}
|
|
|
|
if (key) {
|
|
*key = eckey;
|
|
}
|
|
|
|
return eckey;
|
|
|
|
error:
|
|
wolfSSL_EC_KEY_free(eckey);
|
|
return NULL;
|
|
}
|
|
#endif /* HAVE_ECC_KEY_IMPORT */
|
|
|
|
int wolfSSL_i2d_ECPrivateKey(const WOLFSSL_EC_KEY *in, unsigned char **out)
|
|
{
|
|
word32 len;
|
|
byte* buf = NULL;
|
|
WOLFSSL_ENTER("wolfSSL_i2d_ECPrivateKey");
|
|
|
|
if (!in) {
|
|
WOLFSSL_MSG("wolfSSL_i2d_ECPrivateKey Bad arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (!in->inSet && SetECKeyInternal(
|
|
(WOLFSSL_EC_KEY*)in) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal error");
|
|
return 0;
|
|
}
|
|
|
|
if ((len = wc_EccKeyDerSize((ecc_key*)in->internal, 0)) <= 0) {
|
|
WOLFSSL_MSG("wc_EccKeyDerSize error");
|
|
return 0;
|
|
}
|
|
|
|
if (out) {
|
|
if (!(buf = (byte*)XMALLOC(len, NULL, DYNAMIC_TYPE_TMP_BUFFER))) {
|
|
WOLFSSL_MSG("tmp buffer malloc error");
|
|
return 0;
|
|
}
|
|
|
|
if (wc_EccPrivateKeyToDer((ecc_key*)in->internal, buf, len) < 0) {
|
|
WOLFSSL_MSG("wc_EccPrivateKeyToDer error");
|
|
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
return 0;
|
|
}
|
|
|
|
if (*out) {
|
|
XMEMCPY(*out, buf, len);
|
|
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
}
|
|
else {
|
|
*out = buf;
|
|
}
|
|
}
|
|
|
|
return (int)len;
|
|
}
|
|
|
|
void wolfSSL_EC_KEY_set_conv_form(WOLFSSL_EC_KEY *eckey, char form)
|
|
{
|
|
if (eckey && (form == POINT_CONVERSION_UNCOMPRESSED
|
|
#ifdef HAVE_COMP_KEY
|
|
|| form == POINT_CONVERSION_COMPRESSED
|
|
#endif
|
|
)) {
|
|
eckey->form = form;
|
|
} else {
|
|
WOLFSSL_MSG("Incorrect form or HAVE_COMP_KEY not compiled in");
|
|
}
|
|
}
|
|
|
|
point_conversion_form_t wolfSSL_EC_KEY_get_conv_form(const WOLFSSL_EC_KEY* key)
|
|
{
|
|
if (key != NULL) {
|
|
return key->form;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/* wolfSSL_EC_POINT_point2bn should return "in" if not null */
|
|
WOLFSSL_BIGNUM *wolfSSL_EC_POINT_point2bn(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *p, char form, WOLFSSL_BIGNUM *in,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
size_t len;
|
|
byte *buf;
|
|
WOLFSSL_BIGNUM *ret = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_oct2point");
|
|
|
|
if (!group || !p) {
|
|
return NULL;
|
|
}
|
|
|
|
if ((len = wolfSSL_EC_POINT_point2oct(group, p, form,
|
|
NULL, 0, ctx)) == 0) {
|
|
return NULL;
|
|
}
|
|
|
|
if (!(buf = (byte*)XMALLOC(len, NULL, DYNAMIC_TYPE_TMP_BUFFER))) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
return NULL;
|
|
}
|
|
|
|
if (wolfSSL_EC_POINT_point2oct(group, p, form,
|
|
buf, len, ctx) == len) {
|
|
ret = wolfSSL_BN_bin2bn(buf, (int)len, in);
|
|
}
|
|
|
|
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(USE_ECC_B_PARAM) && (!defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0))
|
|
int wolfSSL_EC_POINT_is_on_curve(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *point,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
(void)ctx;
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_is_on_curve");
|
|
|
|
if (!group || !point) {
|
|
WOLFSSL_MSG("Invalid arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (!point->inSet && SetECPointInternal((WOLFSSL_EC_POINT*)point)) {
|
|
WOLFSSL_MSG("SetECPointInternal error");
|
|
return 0;
|
|
}
|
|
|
|
return wc_ecc_point_is_on_curve((ecc_point*)point->internal,
|
|
group->curve_idx)
|
|
== MP_OKAY ? 1 : 0;
|
|
}
|
|
#endif /* USE_ECC_B_PARAM && !(FIPS_VERSION <= 2) */
|
|
|
|
WOLFSSL_EC_POINT *wolfSSL_EC_POINT_new(const WOLFSSL_EC_GROUP *group)
|
|
{
|
|
WOLFSSL_EC_POINT *p;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_new");
|
|
|
|
if (group == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_new NULL error");
|
|
return NULL;
|
|
}
|
|
|
|
p = (WOLFSSL_EC_POINT *)XMALLOC(sizeof(WOLFSSL_EC_POINT), NULL,
|
|
DYNAMIC_TYPE_ECC);
|
|
if (p == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_new malloc ecc point failure");
|
|
return NULL;
|
|
}
|
|
XMEMSET(p, 0, sizeof(WOLFSSL_EC_POINT));
|
|
|
|
p->internal = wc_ecc_new_point();
|
|
if (p->internal == NULL) {
|
|
WOLFSSL_MSG("ecc_new_point failure");
|
|
XFREE(p, NULL, DYNAMIC_TYPE_ECC);
|
|
return NULL;
|
|
}
|
|
|
|
return p;
|
|
}
|
|
|
|
#if !defined(WOLFSSL_SP_MATH) && !defined(WOLF_CRYPTO_CB_ONLY_ECC)
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_POINT_get_affine_coordinates_GFp(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *point,
|
|
WOLFSSL_BIGNUM *x,
|
|
WOLFSSL_BIGNUM *y,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
mp_digit mp;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int* modulus = NULL;
|
|
#else
|
|
mp_int modulus[1];
|
|
#endif
|
|
(void)ctx;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_get_affine_coordinates_GFp");
|
|
|
|
if (group == NULL || point == NULL || point->internal == NULL ||
|
|
x == NULL || y == NULL ||
|
|
wolfSSL_EC_POINT_is_at_infinity(group, point)) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_get_affine_coordinates_GFp NULL error");
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(point) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
modulus = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (modulus == NULL) {
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
if (!wolfSSL_BN_is_one(point->Z)) {
|
|
if (mp_init(modulus) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_init failed");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
/* Map the Jacobian point back to affine space */
|
|
if (mp_read_radix(modulus, ecc_sets[group->curve_idx].prime,
|
|
MP_RADIX_HEX) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix failed");
|
|
mp_clear(modulus);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
if (mp_montgomery_setup(modulus, &mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_montgomery_setup failed");
|
|
mp_clear(modulus);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
if (ecc_map((ecc_point*)point->internal, modulus, mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_map failed");
|
|
mp_clear(modulus);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
if (SetECPointExternal((WOLFSSL_EC_POINT *)point) != 1) {
|
|
WOLFSSL_MSG("SetECPointExternal failed");
|
|
mp_clear(modulus);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
mp_clear(modulus);
|
|
}
|
|
|
|
BN_copy(x, point->X);
|
|
BN_copy(y, point->Y);
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(modulus, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
int wolfSSL_EC_POINT_set_affine_coordinates_GFp(const WOLFSSL_EC_GROUP *group,
|
|
WOLFSSL_EC_POINT *point,
|
|
const WOLFSSL_BIGNUM *x,
|
|
const WOLFSSL_BIGNUM *y,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
(void)ctx;
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_set_affine_coordinates_GFp");
|
|
|
|
if (group == NULL || point == NULL || point->internal == NULL ||
|
|
x == NULL || y == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_set_affine_coordinates_GFp NULL error");
|
|
return 0;
|
|
}
|
|
|
|
if (!point->X) {
|
|
point->X = wolfSSL_BN_new();
|
|
}
|
|
if (!point->Y) {
|
|
point->Y = wolfSSL_BN_new();
|
|
}
|
|
if (!point->Z) {
|
|
point->Z = wolfSSL_BN_new();
|
|
}
|
|
if (!point->X || !point->Y || !point->Z) {
|
|
WOLFSSL_MSG("wolfSSL_BN_new failed");
|
|
return 0;
|
|
}
|
|
|
|
BN_copy(point->X, x);
|
|
BN_copy(point->Y, y);
|
|
BN_copy(point->Z, wolfSSL_BN_value_one());
|
|
|
|
if (SetECPointInternal((WOLFSSL_EC_POINT *)point) != 1) {
|
|
WOLFSSL_MSG("SetECPointInternal failed");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
#if !defined(WOLFSSL_ATECC508A) && !defined(WOLFSSL_ATECC608A) && \
|
|
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_SP_MATH) && \
|
|
!defined(WOLF_CRYPTO_CB_ONLY_ECC)
|
|
int wolfSSL_EC_POINT_add(const WOLFSSL_EC_GROUP *group, WOLFSSL_EC_POINT *r,
|
|
const WOLFSSL_EC_POINT *p1,
|
|
const WOLFSSL_EC_POINT *p2, WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int* a = NULL;
|
|
mp_int* prime = NULL;
|
|
mp_int* mu = NULL;
|
|
#else
|
|
mp_int a[1];
|
|
mp_int prime[1];
|
|
mp_int mu[1];
|
|
#endif
|
|
mp_digit mp = 0;
|
|
ecc_point* montP1 = NULL;
|
|
ecc_point* montP2 = NULL;
|
|
ecc_point* eccP1;
|
|
ecc_point* eccP2;
|
|
int ret = 0;
|
|
|
|
(void)ctx;
|
|
|
|
if (!group || !r || !p1 || !p2) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_add error");
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(r) != 1 ||
|
|
setupPoint(p1) != 1 ||
|
|
setupPoint(p2) != 1) {
|
|
WOLFSSL_MSG("setupPoint error");
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
a = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (a == NULL) {
|
|
WOLFSSL_MSG("Failed to allocate memory for mp_int a");
|
|
return 0;
|
|
}
|
|
prime = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (prime == NULL) {
|
|
WOLFSSL_MSG("Failed to allocate memory for mp_int prime");
|
|
XFREE(a, NULL, DYNAMIC_TYPE_BIGINT);
|
|
return 0;
|
|
}
|
|
mu = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (mu == NULL) {
|
|
WOLFSSL_MSG("Failed to allocate memory for mp_int mu");
|
|
XFREE(a, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
return 0;
|
|
}
|
|
XMEMSET(a, 0, sizeof(mp_int));
|
|
XMEMSET(prime, 0, sizeof(mp_int));
|
|
XMEMSET(mu, 0, sizeof(mp_int));
|
|
#endif
|
|
|
|
/* read the curve prime and a */
|
|
if (mp_init_multi(prime, a, mu, NULL, NULL, NULL) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_init_multi error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (mp_read_radix(a, ecc_sets[group->curve_idx].Af, MP_RADIX_HEX)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix a error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (mp_read_radix(prime, ecc_sets[group->curve_idx].prime, MP_RADIX_HEX)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix prime error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (mp_montgomery_setup(prime, &mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_montgomery_setup nqm error");
|
|
goto cleanup;
|
|
}
|
|
|
|
eccP1 = (ecc_point*)p1->internal;
|
|
eccP2 = (ecc_point*)p2->internal;
|
|
|
|
if (!(montP1 = wc_ecc_new_point_h(NULL)) ||
|
|
!(montP2 = wc_ecc_new_point_h(NULL))) {
|
|
WOLFSSL_MSG("wc_ecc_new_point_h nqm error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((mp_montgomery_calc_normalization(mu, prime)) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_montgomery_calc_normalization error");
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Convert to Montgomery form */
|
|
if (mp_cmp_d(mu, 1) == MP_EQ) {
|
|
if (wc_ecc_copy_point(eccP1, montP1) != MP_OKAY ||
|
|
wc_ecc_copy_point(eccP2, montP2) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_copy_point error");
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
if (mp_mulmod(eccP1->x, mu, prime, montP1->x) != MP_OKAY ||
|
|
mp_mulmod(eccP1->y, mu, prime, montP1->y) != MP_OKAY ||
|
|
mp_mulmod(eccP1->z, mu, prime, montP1->z) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_mulmod error");
|
|
goto cleanup;
|
|
}
|
|
if (mp_mulmod(eccP2->x, mu, prime, montP2->x) != MP_OKAY ||
|
|
mp_mulmod(eccP2->y, mu, prime, montP2->y) != MP_OKAY ||
|
|
mp_mulmod(eccP2->z, mu, prime, montP2->z) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_mulmod error");
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (ecc_projective_add_point(montP1, montP2, (ecc_point*)r->internal,
|
|
a, prime, mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_projective_add_point error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (ecc_map((ecc_point*)r->internal, prime, mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_map error");
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 1;
|
|
cleanup:
|
|
mp_clear(a);
|
|
mp_clear(prime);
|
|
mp_clear(mu);
|
|
wc_ecc_del_point_h(montP1, NULL);
|
|
wc_ecc_del_point_h(montP2, NULL);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(a, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(mu, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
/* Calculate the value: generator * n + q * m
|
|
* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_EC_POINT_mul(const WOLFSSL_EC_GROUP *group, WOLFSSL_EC_POINT *r,
|
|
const WOLFSSL_BIGNUM *n, const WOLFSSL_EC_POINT *q,
|
|
const WOLFSSL_BIGNUM *m, WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int* a = NULL;
|
|
mp_int* prime = NULL;
|
|
#else
|
|
mp_int a[1], prime[1];
|
|
#endif
|
|
int ret = 0;
|
|
ecc_point* result = NULL;
|
|
ecc_point* tmp = NULL;
|
|
|
|
(void)ctx;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_mul");
|
|
|
|
if (!group || !r) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_mul NULL error");
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
a = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (a == NULL) {
|
|
return 0;
|
|
}
|
|
prime = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (prime == NULL) {
|
|
XFREE(a, NULL, DYNAMIC_TYPE_BIGINT);
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
if (!(result = wc_ecc_new_point())) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_new error");
|
|
return 0;
|
|
}
|
|
|
|
/* read the curve prime and a */
|
|
if (mp_init_multi(prime, a, NULL, NULL, NULL, NULL) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_init_multi error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (q && setupPoint(q) != 1) {
|
|
WOLFSSL_MSG("setupPoint error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (mp_read_radix(prime, ecc_sets[group->curve_idx].prime, MP_RADIX_HEX)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix prime error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (mp_read_radix(a, ecc_sets[group->curve_idx].Af, MP_RADIX_HEX)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix a error");
|
|
goto cleanup;
|
|
}
|
|
|
|
if (n) {
|
|
/* load generator */
|
|
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
|
|
if (wc_ecc_get_generator(result, group->curve_idx)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_get_generator error");
|
|
goto cleanup;
|
|
}
|
|
#else
|
|
/* wc_ecc_get_generator is not defined in the FIPS v2 module. */
|
|
if (mp_read_radix(result->x, ecc_sets[group->curve_idx].Gx,
|
|
MP_RADIX_HEX) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix Gx error");
|
|
goto cleanup;
|
|
}
|
|
if (mp_read_radix(result->y, ecc_sets[group->curve_idx].Gy,
|
|
MP_RADIX_HEX) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_read_radix Gy error");
|
|
goto cleanup;
|
|
}
|
|
if (mp_set(result->z, 1) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_set Gz error");
|
|
goto cleanup;
|
|
}
|
|
#endif /* NOPT_FIPS_VERSION == 2 */
|
|
}
|
|
|
|
if (n && q && m) {
|
|
/* r = generator * n + q * m */
|
|
#ifdef ECC_SHAMIR
|
|
if (ecc_mul2add(result, (mp_int*)n->internal,
|
|
(ecc_point*)q->internal, (mp_int*)m->internal,
|
|
result, a, prime, NULL)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_mul2add error");
|
|
goto cleanup;
|
|
}
|
|
#else
|
|
mp_digit mp = 0;
|
|
if (mp_montgomery_setup(prime, &mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_montgomery_setup nqm error");
|
|
goto cleanup;
|
|
}
|
|
if (!(tmp = wc_ecc_new_point())) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_new nqm error");
|
|
goto cleanup;
|
|
}
|
|
/* r = generator * n */
|
|
if (wc_ecc_mulmod((mp_int*)n->internal, result, result, a, prime, 0)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_mulmod nqm error");
|
|
goto cleanup;
|
|
}
|
|
/* tmp = q * m */
|
|
if (wc_ecc_mulmod((mp_int*)m->internal, (ecc_point*)q->internal,
|
|
tmp, a, prime, 0) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_mulmod nqm error");
|
|
goto cleanup;
|
|
}
|
|
/* result = result + tmp */
|
|
if (ecc_projective_add_point(tmp, result, result, a, prime, mp)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_mulmod nqm error");
|
|
goto cleanup;
|
|
}
|
|
if (ecc_map(result, prime, mp) != MP_OKAY) {
|
|
WOLFSSL_MSG("ecc_map nqm error");
|
|
goto cleanup;
|
|
}
|
|
#endif
|
|
}
|
|
else if (n) {
|
|
/* r = generator * n */
|
|
if (wc_ecc_mulmod((mp_int*)n->internal, result, result, a, prime, 1)
|
|
!= MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_mulmod gn error");
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else if (q && m) {
|
|
/* r = q * m */
|
|
if (wc_ecc_mulmod((mp_int*)m->internal, (ecc_point*)q->internal,
|
|
result, a, prime, 1) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_mulmod qm error");
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
/* copy to destination */
|
|
if (wc_ecc_copy_point(result, (ecc_point*)r->internal)) {
|
|
WOLFSSL_MSG("wc_ecc_copy_point error");
|
|
goto cleanup;
|
|
}
|
|
r->inSet = 1;
|
|
if (SetECPointExternal(r) != 1) {
|
|
WOLFSSL_MSG("SetECPointExternal error");
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 1;
|
|
cleanup:
|
|
mp_clear(a);
|
|
mp_clear(prime);
|
|
wc_ecc_del_point(result);
|
|
wc_ecc_del_point(tmp);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(a, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return ret;
|
|
}
|
|
#endif /* !WOLFSSL_ATECC508A && !WOLFSSL_ATECC608A && !HAVE_SELFTEST &&
|
|
* !WOLFSSL_SP_MATH */
|
|
|
|
/* (x, y) -> (x, -y) */
|
|
int wolfSSL_EC_POINT_invert(const WOLFSSL_EC_GROUP *group, WOLFSSL_EC_POINT *a,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
ecc_point* p;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
mp_int* prime = NULL;
|
|
#else
|
|
mp_int prime[1];
|
|
#endif
|
|
|
|
(void)ctx;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_invert");
|
|
|
|
if (!group || !a || !a->internal || setupPoint(a) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
p = (ecc_point*)a->internal;
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
prime = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (prime == NULL) {
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
/* read the curve prime and a */
|
|
if (mp_init_multi(prime, NULL, NULL, NULL, NULL, NULL) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_init_multi error");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
if (mp_sub(prime, p->y, p->y) != MP_OKAY) {
|
|
WOLFSSL_MSG("mp_sub error");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
if (SetECPointExternal(a) != 1) {
|
|
WOLFSSL_MSG("SetECPointExternal error");
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(prime, NULL, DYNAMIC_TYPE_BIGINT);
|
|
#endif
|
|
|
|
return 1;
|
|
}
|
|
|
|
void wolfSSL_EC_POINT_clear_free(WOLFSSL_EC_POINT *p)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_clear_free");
|
|
|
|
wolfSSL_EC_POINT_free(p);
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 0 if equal, 1 if not and -1 in case of error
|
|
*/
|
|
int wolfSSL_EC_POINT_cmp(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *a, const WOLFSSL_EC_POINT *b,
|
|
WOLFSSL_BN_CTX *ctx)
|
|
{
|
|
int ret;
|
|
|
|
(void)ctx;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_cmp");
|
|
|
|
if (group == NULL || a == NULL || a->internal == NULL || b == NULL ||
|
|
b->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_cmp Bad arguments");
|
|
return -1;
|
|
}
|
|
|
|
ret = wc_ecc_cmp_point((ecc_point*)a->internal, (ecc_point*)b->internal);
|
|
if (ret == MP_EQ)
|
|
return 0;
|
|
else if (ret == MP_LT || ret == MP_GT)
|
|
return 1;
|
|
|
|
return -1;
|
|
}
|
|
|
|
int wolfSSL_EC_POINT_copy(WOLFSSL_EC_POINT *dest, const WOLFSSL_EC_POINT *src)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_copy");
|
|
|
|
if (!dest || !src) {
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(src) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
if (wc_ecc_copy_point((ecc_point*) dest->internal,
|
|
(ecc_point*) src->internal) != MP_OKAY) {
|
|
return 0;
|
|
}
|
|
|
|
dest->inSet = 1;
|
|
|
|
if (SetECPointExternal(dest) != 1) {
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#endif /* OPENSSL_EXTRA */
|
|
|
|
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
|
void wolfSSL_EC_POINT_free(WOLFSSL_EC_POINT *p)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_free");
|
|
|
|
if (p != NULL) {
|
|
if (p->internal != NULL) {
|
|
wc_ecc_del_point((ecc_point*)p->internal);
|
|
p->internal = NULL;
|
|
}
|
|
|
|
wolfSSL_BN_free(p->X);
|
|
wolfSSL_BN_free(p->Y);
|
|
wolfSSL_BN_free(p->Z);
|
|
p->X = NULL;
|
|
p->Y = NULL;
|
|
p->Z = NULL;
|
|
p->inSet = p->exSet = 0;
|
|
|
|
XFREE(p, NULL, DYNAMIC_TYPE_ECC);
|
|
/* p = NULL, don't try to access or double free it */
|
|
}
|
|
}
|
|
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
|
|
|
#ifdef OPENSSL_EXTRA
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if point at infinity, 0 else
|
|
*/
|
|
int wolfSSL_EC_POINT_is_at_infinity(const WOLFSSL_EC_GROUP *group,
|
|
const WOLFSSL_EC_POINT *point)
|
|
{
|
|
int ret;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_POINT_is_at_infinity");
|
|
|
|
if (group == NULL || point == NULL || point->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EC_POINT_is_at_infinity NULL error");
|
|
return 0;
|
|
}
|
|
|
|
if (setupPoint(point) != 1) {
|
|
return 0;
|
|
}
|
|
#ifndef WOLF_CRYPTO_CB_ONLY_ECC
|
|
ret = wc_ecc_point_is_at_infinity((ecc_point*)point->internal);
|
|
if (ret < 0) {
|
|
WOLFSSL_MSG("ecc_point_is_at_infinity failure");
|
|
return 0;
|
|
}
|
|
#else
|
|
WOLFSSL_MSG("ecc_point_is_at_infinitiy compiled out");
|
|
return 0;
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
/* End EC_POINT */
|
|
|
|
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
|
|
size_t wolfSSL_EC_get_builtin_curves(WOLFSSL_EC_BUILTIN_CURVE *r, size_t nitems)
|
|
{
|
|
size_t i, min_nitems;
|
|
#ifdef HAVE_SELFTEST
|
|
size_t ecc_sets_count;
|
|
for (i = 0; ecc_sets[i].size != 0 && ecc_sets[i].name != NULL; i++);
|
|
ecc_sets_count = i;
|
|
#endif
|
|
|
|
if (r == NULL || nitems == 0)
|
|
return ecc_sets_count;
|
|
|
|
min_nitems = nitems < ecc_sets_count ? nitems : ecc_sets_count;
|
|
|
|
for (i = 0; i < min_nitems; i++) {
|
|
r[i].nid = EccEnumToNID(ecc_sets[i].id);
|
|
r[i].comment = wolfSSL_OBJ_nid2sn(r[i].nid);
|
|
}
|
|
|
|
return min_nitems;
|
|
}
|
|
#endif /* !HAVE_FIPS || FIPS_VERSION_GT(2,0) */
|
|
|
|
/* Start ECDSA_SIG */
|
|
void wolfSSL_ECDSA_SIG_free(WOLFSSL_ECDSA_SIG *sig)
|
|
{
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_SIG_free");
|
|
|
|
if (sig) {
|
|
wolfSSL_BN_free(sig->r);
|
|
wolfSSL_BN_free(sig->s);
|
|
|
|
XFREE(sig, NULL, DYNAMIC_TYPE_ECC);
|
|
}
|
|
}
|
|
|
|
WOLFSSL_ECDSA_SIG *wolfSSL_ECDSA_SIG_new(void)
|
|
{
|
|
WOLFSSL_ECDSA_SIG *sig;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_SIG_new");
|
|
|
|
sig = (WOLFSSL_ECDSA_SIG*) XMALLOC(sizeof(WOLFSSL_ECDSA_SIG), NULL,
|
|
DYNAMIC_TYPE_ECC);
|
|
if (sig == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_SIG_new malloc ECDSA signature failure");
|
|
return NULL;
|
|
}
|
|
|
|
sig->s = NULL;
|
|
sig->r = wolfSSL_BN_new();
|
|
if (sig->r == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_SIG_new malloc ECDSA r failure");
|
|
wolfSSL_ECDSA_SIG_free(sig);
|
|
return NULL;
|
|
}
|
|
|
|
sig->s = wolfSSL_BN_new();
|
|
if (sig->s == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_SIG_new malloc ECDSA s failure");
|
|
wolfSSL_ECDSA_SIG_free(sig);
|
|
return NULL;
|
|
}
|
|
|
|
return sig;
|
|
}
|
|
|
|
void wolfSSL_ECDSA_SIG_get0(const WOLFSSL_ECDSA_SIG* sig,
|
|
const WOLFSSL_BIGNUM** r, const WOLFSSL_BIGNUM** s)
|
|
{
|
|
if (sig == NULL) {
|
|
return;
|
|
}
|
|
|
|
if (r != NULL) {
|
|
*r = sig->r;
|
|
}
|
|
if (s != NULL) {
|
|
*s = sig->s;
|
|
}
|
|
}
|
|
|
|
int wolfSSL_ECDSA_SIG_set0(WOLFSSL_ECDSA_SIG* sig, WOLFSSL_BIGNUM* r,
|
|
WOLFSSL_BIGNUM* s)
|
|
{
|
|
if (sig == NULL || r == NULL || s == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
wolfSSL_BN_free(sig->r);
|
|
wolfSSL_BN_free(sig->s);
|
|
|
|
sig->r = r;
|
|
sig->s = s;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* return signature structure on success, NULL otherwise */
|
|
WOLFSSL_ECDSA_SIG *wolfSSL_ECDSA_do_sign(const unsigned char *d, int dlen,
|
|
WOLFSSL_EC_KEY *key)
|
|
{
|
|
WOLFSSL_ECDSA_SIG *sig = NULL;
|
|
int initTmpRng = 0;
|
|
WC_RNG* rng = NULL;
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
WC_RNG* tmpRng = NULL;
|
|
byte* out = NULL;
|
|
mp_int* sig_r = NULL;
|
|
mp_int* sig_s = NULL;
|
|
#else
|
|
WC_RNG tmpRng[1];
|
|
byte out[ECC_BUFSIZE];
|
|
mp_int sig_r[1], sig_s[1];
|
|
#endif
|
|
word32 outlen = ECC_BUFSIZE;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_do_sign");
|
|
|
|
if (d == NULL || key == NULL || key->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_do_sign Bad arguments");
|
|
return NULL;
|
|
}
|
|
|
|
/* set internal key if not done */
|
|
if (key->inSet == 0)
|
|
{
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_do_sign No EC key internal set, do it");
|
|
|
|
if (SetECKeyInternal(key) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_do_sign SetECKeyInternal failed");
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
tmpRng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
|
|
if (tmpRng == NULL)
|
|
return NULL;
|
|
out = (byte*)XMALLOC(outlen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (out == NULL) {
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
return NULL;
|
|
}
|
|
sig_r = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (sig_r == NULL) {
|
|
XFREE(out, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
return NULL;
|
|
}
|
|
sig_s = (mp_int*)XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
|
|
if (sig_s == NULL) {
|
|
XFREE(sig_r, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(out, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
if (wc_InitRng(tmpRng) == 0) {
|
|
rng = tmpRng;
|
|
initTmpRng = 1;
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_do_sign Bad RNG Init, trying global");
|
|
rng = wolfssl_get_global_rng();
|
|
}
|
|
|
|
if (rng) {
|
|
/* use wc_ecc_sign_hash because it supports crypto callbacks */
|
|
if (wc_ecc_sign_hash(d, dlen, out, &outlen, rng,
|
|
(ecc_key*)key->internal) == 0) {
|
|
if (mp_init_multi(sig_r, sig_s, NULL, NULL, NULL, NULL) == MP_OKAY) {
|
|
/* put signature blob in ECDSA structure */
|
|
if (DecodeECC_DSA_Sig(out, outlen, sig_r, sig_s) == 0) {
|
|
sig = wolfSSL_ECDSA_SIG_new();
|
|
if (sig == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_SIG_new failed");
|
|
}
|
|
else if (SetIndividualExternal(&sig->r, sig_r)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecdsa r key error");
|
|
wolfSSL_ECDSA_SIG_free(sig);
|
|
sig = NULL;
|
|
}
|
|
else if (SetIndividualExternal(&sig->s, sig_s)
|
|
!= 1) {
|
|
WOLFSSL_MSG("ecdsa s key error");
|
|
wolfSSL_ECDSA_SIG_free(sig);
|
|
sig = NULL;
|
|
}
|
|
}
|
|
mp_free(sig_r);
|
|
mp_free(sig_s);
|
|
}
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("wc_ecc_sign_hash failed");
|
|
}
|
|
}
|
|
|
|
if (initTmpRng)
|
|
wc_FreeRng(tmpRng);
|
|
#ifdef WOLFSSL_SMALL_STACK
|
|
XFREE(sig_s, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(sig_r, NULL, DYNAMIC_TYPE_BIGINT);
|
|
XFREE(out, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
|
|
#endif
|
|
|
|
return sig;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 for a valid signature, 0 for an invalid signature and -1 on error
|
|
*/
|
|
int wolfSSL_ECDSA_do_verify(const unsigned char *d, int dlen,
|
|
const WOLFSSL_ECDSA_SIG *sig, WOLFSSL_EC_KEY *key)
|
|
{
|
|
int check_sign = 0;
|
|
#ifdef WOLF_CRYPTO_CB_ONLY_ECC
|
|
byte signature[ECC_MAX_SIG_SIZE];
|
|
word32 signaturelen = (word32)sizeof(signature);
|
|
char* r;
|
|
char* s;
|
|
int ret = 0;
|
|
#endif
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDSA_do_verify");
|
|
|
|
if (d == NULL || sig == NULL || key == NULL || key->internal == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_ECDSA_do_verify Bad arguments");
|
|
return -1;
|
|
}
|
|
|
|
/* set internal key if not done */
|
|
if (key->inSet == 0)
|
|
{
|
|
WOLFSSL_MSG("No EC key internal set, do it");
|
|
|
|
if (SetECKeyInternal(key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
#ifndef WOLF_CRYPTO_CB_ONLY_ECC
|
|
if (wc_ecc_verify_hash_ex((mp_int*)sig->r->internal,
|
|
(mp_int*)sig->s->internal, d, dlen, &check_sign,
|
|
(ecc_key *)key->internal) != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_verify_hash failed");
|
|
return -1;
|
|
}
|
|
else if (check_sign == 0) {
|
|
WOLFSSL_MSG("wc_ecc_verify_hash incorrect signature detected");
|
|
return 0;
|
|
}
|
|
#else
|
|
/* convert big number to hex */
|
|
r = wolfSSL_BN_bn2hex(sig->r);
|
|
s = wolfSSL_BN_bn2hex(sig->s);
|
|
/* get DER-encoded ECDSA signature */
|
|
ret = wc_ecc_rs_to_sig((const char*)r, (const char*)s,
|
|
signature, &signaturelen);
|
|
/* free r and s */
|
|
if (r)
|
|
XFREE(r, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
if (s)
|
|
XFREE(s, NULL, DYNAMIC_TYPE_OPENSSL);
|
|
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_verify_hash failed");
|
|
return -1;
|
|
}
|
|
/* verify hash. expects to call wc_CryptoCb_EccVerify internally */
|
|
ret = wc_ecc_verify_hash(signature, signaturelen, d, dlen, &check_sign,
|
|
(ecc_key*)key->internal);
|
|
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_verify_hash failed");
|
|
return -1;
|
|
}
|
|
else if (check_sign == 0) {
|
|
WOLFSSL_MSG("wc_ecc_verify_hash incorrect signature detected");
|
|
return 0;
|
|
}
|
|
#endif /* WOLF_CRYPTO_CB_ONLY_ECC */
|
|
|
|
return 1;
|
|
}
|
|
|
|
WOLFSSL_ECDSA_SIG *wolfSSL_d2i_ECDSA_SIG(WOLFSSL_ECDSA_SIG **sig,
|
|
const unsigned char **pp, long len)
|
|
{
|
|
WOLFSSL_ECDSA_SIG *s = NULL;
|
|
|
|
if (pp == NULL)
|
|
return NULL;
|
|
if (sig != NULL)
|
|
s = *sig;
|
|
if (s == NULL) {
|
|
s = wolfSSL_ECDSA_SIG_new();
|
|
if (s == NULL)
|
|
return NULL;
|
|
}
|
|
|
|
/* DecodeECC_DSA_Sig calls mp_init, so free these */
|
|
mp_free((mp_int*)s->r->internal);
|
|
mp_free((mp_int*)s->s->internal);
|
|
|
|
if (DecodeECC_DSA_Sig(*pp, (word32)len, (mp_int*)s->r->internal,
|
|
(mp_int*)s->s->internal) != MP_OKAY) {
|
|
if (sig == NULL || *sig == NULL)
|
|
wolfSSL_ECDSA_SIG_free(s);
|
|
return NULL;
|
|
}
|
|
|
|
*pp += len;
|
|
if (sig != NULL)
|
|
*sig = s;
|
|
return s;
|
|
}
|
|
|
|
int wolfSSL_i2d_ECDSA_SIG(const WOLFSSL_ECDSA_SIG *sig, unsigned char **pp)
|
|
{
|
|
word32 len;
|
|
|
|
if (sig == NULL)
|
|
return 0;
|
|
|
|
/* ASN.1: SEQ + INT + INT
|
|
* ASN.1 Integer must be a positive value - prepend zero if number has
|
|
* top bit set.
|
|
*/
|
|
len = 2 + mp_leading_bit((mp_int*)sig->r->internal) +
|
|
mp_unsigned_bin_size((mp_int*)sig->r->internal) +
|
|
2 + mp_leading_bit((mp_int*)sig->s->internal) +
|
|
mp_unsigned_bin_size((mp_int*)sig->s->internal);
|
|
/* Two bytes required for length if ASN.1 SEQ data greater than 127 bytes
|
|
* and less than 256 bytes.
|
|
*/
|
|
len = 1 + ((len > 127) ? 2 : 1) + len;
|
|
if (pp != NULL && *pp != NULL) {
|
|
if (StoreECC_DSA_Sig(*pp, &len, (mp_int*)sig->r->internal,
|
|
(mp_int*)sig->s->internal) != MP_OKAY) {
|
|
len = 0;
|
|
}
|
|
else
|
|
*pp += len;
|
|
}
|
|
|
|
return (int)len;
|
|
}
|
|
/* End ECDSA_SIG */
|
|
|
|
#ifndef WOLF_CRYPTO_CB_ONLY_ECC
|
|
/* Start ECDH */
|
|
/* return code compliant with OpenSSL :
|
|
* length of computed key if success, -1 if error
|
|
*/
|
|
int wolfSSL_ECDH_compute_key(void *out, size_t outlen,
|
|
const WOLFSSL_EC_POINT *pub_key,
|
|
WOLFSSL_EC_KEY *ecdh,
|
|
void *(*KDF) (const void *in, size_t inlen,
|
|
void *out, size_t *outlen))
|
|
{
|
|
word32 len;
|
|
ecc_key* key;
|
|
int ret;
|
|
#if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_SELFTEST) && \
|
|
(!defined(HAVE_FIPS) || FIPS_VERSION_GE(5,0))
|
|
int setGlobalRNG = 0;
|
|
#endif
|
|
(void)KDF;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_ECDH_compute_key");
|
|
|
|
if (out == NULL || pub_key == NULL || pub_key->internal == NULL ||
|
|
ecdh == NULL || ecdh->internal == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
/* set internal key if not done */
|
|
if (ecdh->inSet == 0)
|
|
{
|
|
WOLFSSL_MSG("No EC key internal set, do it");
|
|
|
|
if (SetECKeyInternal(ecdh) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
len = (word32)outlen;
|
|
key = (ecc_key*)ecdh->internal;
|
|
|
|
#if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_SELFTEST) && \
|
|
(!defined(HAVE_FIPS) || FIPS_VERSION_GE(5,0))
|
|
if (key->rng == NULL) {
|
|
if ((key->rng = wolfssl_get_global_rng()) == NULL) {
|
|
if (wolfSSL_RAND_Init() != 1) {
|
|
WOLFSSL_MSG("No RNG to use");
|
|
return -1;
|
|
}
|
|
key->rng = wolfssl_get_global_rng();
|
|
}
|
|
setGlobalRNG = 1;
|
|
}
|
|
#endif
|
|
PRIVATE_KEY_UNLOCK();
|
|
ret = wc_ecc_shared_secret_ssh(key, (ecc_point*)pub_key->internal,
|
|
(byte *)out, &len);
|
|
PRIVATE_KEY_LOCK();
|
|
#if defined(ECC_TIMING_RESISTANT) && !defined(HAVE_SELFTEST) && \
|
|
(!defined(HAVE_FIPS) || FIPS_VERSION_GE(5,0))
|
|
if (setGlobalRNG)
|
|
key->rng = NULL;
|
|
#endif
|
|
if (ret != MP_OKAY) {
|
|
WOLFSSL_MSG("wc_ecc_shared_secret failed");
|
|
return -1;
|
|
}
|
|
|
|
return len;
|
|
}
|
|
#endif /* WOLF_CRYPTO_CB_ONLY_ECC */
|
|
/* End ECDH */
|
|
#if !defined(NO_FILESYSTEM)
|
|
|
|
#ifndef NO_BIO
|
|
|
|
#ifdef WOLFSSL_KEY_GEN
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_EC_PUBKEY(XFILE fp, WOLFSSL_EC_KEY* key)
|
|
{
|
|
int ret = 1;
|
|
WOLFSSL_BIO* bio = NULL;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_EC_PUBKEY");
|
|
|
|
if (fp == XBADFILE || key == NULL) {
|
|
WOLFSSL_MSG("Bad argument.");
|
|
ret = 0;
|
|
}
|
|
|
|
if (ret == 1) {
|
|
bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
|
|
if (bio == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_BIO_new failed.");
|
|
ret = 0;
|
|
}
|
|
else if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_BIO_set_fp failed.");
|
|
ret = 0;
|
|
}
|
|
}
|
|
if (ret == 1 && wolfSSL_PEM_write_bio_EC_PUBKEY(bio, key)
|
|
!= 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_bio_EC_PUBKEY failed.");
|
|
ret = 0;
|
|
}
|
|
|
|
if (bio != NULL) {
|
|
wolfSSL_BIO_free(bio);
|
|
}
|
|
|
|
WOLFSSL_LEAVE("wolfSSL_PEM_write_EC_PUBKEY", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
/* Uses the same format of input as wolfSSL_PEM_read_bio_PrivateKey but expects
|
|
* the results to be an EC key.
|
|
*
|
|
* bio structure to read EC private key from
|
|
* ec if not null is then set to the result
|
|
* cb password callback for reading PEM
|
|
* pass password string
|
|
*
|
|
* returns a pointer to a new WOLFSSL_EC_KEY struct on success and NULL on fail
|
|
*/
|
|
|
|
WOLFSSL_EC_KEY* wolfSSL_PEM_read_bio_EC_PUBKEY(WOLFSSL_BIO* bio,
|
|
WOLFSSL_EC_KEY** ec,
|
|
wc_pem_password_cb* cb,
|
|
void *pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_EC_KEY* local;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_EC_PUBKEY");
|
|
|
|
pkey = wolfSSL_PEM_read_bio_PUBKEY(bio, NULL, cb, pass);
|
|
if (pkey == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Since the WOLFSSL_EC_KEY structure is being taken from WOLFSSL_EVP_PKEY the
|
|
* flag indicating that the WOLFSSL_EC_KEY structure is owned should be FALSE
|
|
* flag indicating that the WOLFSSL_EC_KEY structure is owned should be FALSE
|
|
* to avoid having it free'd */
|
|
pkey->ownEcc = 0;
|
|
local = pkey->ecc;
|
|
if (ec != NULL) {
|
|
*ec = local;
|
|
}
|
|
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return local;
|
|
}
|
|
|
|
/* Reads a private EC key from a WOLFSSL_BIO into a WOLFSSL_EC_KEY.
|
|
* Returns 1 or 0
|
|
*/
|
|
WOLFSSL_EC_KEY* wolfSSL_PEM_read_bio_ECPrivateKey(WOLFSSL_BIO* bio,
|
|
WOLFSSL_EC_KEY** ec,
|
|
wc_pem_password_cb* cb,
|
|
void *pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_EC_KEY* local;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_ECPrivateKey");
|
|
|
|
pkey = wolfSSL_PEM_read_bio_PrivateKey(bio, NULL, cb, pass);
|
|
if (pkey == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Since the WOLFSSL_EC_KEY structure is being taken from WOLFSSL_EVP_PKEY the
|
|
* flag indicating that the WOLFSSL_EC_KEY structure is owned should be FALSE
|
|
* to avoid having it free'd */
|
|
pkey->ownEcc = 0;
|
|
local = pkey->ecc;
|
|
if (ec != NULL) {
|
|
*ec = local;
|
|
}
|
|
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return local;
|
|
}
|
|
#endif /* !NO_BIO */
|
|
#endif /* NO_FILESYSTEM */
|
|
|
|
#if defined(WOLFSSL_KEY_GEN)
|
|
#ifndef NO_BIO
|
|
/* Takes a public WOLFSSL_EC_KEY and writes it out to WOLFSSL_BIO
|
|
* Returns 1 or 0
|
|
*/
|
|
int wolfSSL_PEM_write_bio_EC_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_EC_KEY* ec)
|
|
{
|
|
int ret = 0;
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_EC_PUBKEY");
|
|
|
|
if (bio == NULL || ec == NULL) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* Initialize pkey structure */
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
return 0;
|
|
}
|
|
|
|
/* Set pkey info */
|
|
pkey->ecc = ec;
|
|
pkey->ownEcc = 0; /* pkey does not own ECC */
|
|
pkey->type = EVP_PKEY_EC;
|
|
|
|
if ((ret = pem_write_bio_pubkey(bio, pkey)) != 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_bio_PUBKEY failed");
|
|
}
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_bio_ECPrivateKey(WOLFSSL_BIO* bio, WOLFSSL_EC_KEY* ec,
|
|
const EVP_CIPHER* cipher,
|
|
unsigned char* passwd, int len,
|
|
wc_pem_password_cb* cb, void* arg)
|
|
{
|
|
int ret = 0, der_max_len = 0, derSz = 0;
|
|
byte *derBuf;
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_ENTER("WOLFSSL_PEM_write_bio_ECPrivateKey");
|
|
|
|
if (bio == NULL || ec == NULL) {
|
|
WOLFSSL_MSG("Bad Function Arguments");
|
|
return 0;
|
|
}
|
|
|
|
/* Initialize pkey structure */
|
|
pkey = wolfSSL_EVP_PKEY_new_ex(bio->heap);
|
|
if (pkey == NULL) {
|
|
WOLFSSL_MSG("wolfSSL_EVP_PKEY_new_ex failed");
|
|
return 0;
|
|
}
|
|
|
|
/* Set pkey info */
|
|
pkey->ecc = ec;
|
|
pkey->ownEcc = 0; /* pkey does not own ECC */
|
|
pkey->type = EVP_PKEY_EC;
|
|
|
|
/* 4 > size of pub, priv + ASN.1 additional informations
|
|
*/
|
|
der_max_len = 4 * wc_ecc_size((ecc_key*)ec->internal) + AES_BLOCK_SIZE;
|
|
|
|
derBuf = (byte*)XMALLOC(der_max_len, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("Malloc failed");
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
/* convert key to der format */
|
|
derSz = wc_EccKeyToDer((ecc_key*)ec->internal, derBuf, der_max_len);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_EccKeyToDer failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
pkey->pkey.ptr = (char*)XMALLOC(derSz, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
if (pkey->pkey.ptr == NULL) {
|
|
WOLFSSL_MSG("key malloc failed");
|
|
XFREE(derBuf, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return 0;
|
|
}
|
|
|
|
/* add der info to the evp key */
|
|
pkey->pkey_sz = derSz;
|
|
XMEMCPY(pkey->pkey.ptr, derBuf, derSz);
|
|
XFREE(derBuf, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
|
|
|
|
ret = wolfSSL_PEM_write_bio_PrivateKey(bio, pkey, cipher, passwd, len,
|
|
cb, arg);
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* !NO_BIO */
|
|
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_mem_ECPrivateKey(WOLFSSL_EC_KEY* ecc,
|
|
const EVP_CIPHER* cipher,
|
|
unsigned char* passwd, int passwdSz,
|
|
unsigned char **pem, int *plen)
|
|
{
|
|
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
|
|
byte *derBuf, *tmp, *cipherInfo = NULL;
|
|
int der_max_len = 0, derSz = 0;
|
|
const int type = ECC_PRIVATEKEY_TYPE;
|
|
const char* header = NULL;
|
|
const char* footer = NULL;
|
|
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_mem_ECPrivateKey");
|
|
if (pem == NULL || plen == NULL || ecc == NULL || ecc->internal == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
if (wc_PemGetHeaderFooter(type, &header, &footer) != 0)
|
|
return 0;
|
|
|
|
if (ecc->inSet == 0) {
|
|
WOLFSSL_MSG("No ECC internal set, do it");
|
|
|
|
if (SetECKeyInternal(ecc) != 1) {
|
|
WOLFSSL_MSG("SetECKeyInternal failed");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/* 4 > size of pub, priv + ASN.1 additional information */
|
|
der_max_len = 4 * wc_ecc_size((ecc_key*)ecc->internal) + AES_BLOCK_SIZE;
|
|
|
|
derBuf = (byte*)XMALLOC(der_max_len, NULL, DYNAMIC_TYPE_DER);
|
|
if (derBuf == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
return 0;
|
|
}
|
|
|
|
/* Key to DER */
|
|
derSz = wc_EccKeyToDer((ecc_key*)ecc->internal, derBuf, der_max_len);
|
|
if (derSz < 0) {
|
|
WOLFSSL_MSG("wc_EccKeyToDer failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
return 0;
|
|
}
|
|
|
|
/* encrypt DER buffer if required */
|
|
if (passwd != NULL && passwdSz > 0 && cipher != NULL) {
|
|
int ret;
|
|
|
|
ret = EncryptDerKey(derBuf, &derSz, cipher,
|
|
passwd, passwdSz, &cipherInfo, der_max_len);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("EncryptDerKey failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
return ret;
|
|
}
|
|
|
|
/* tmp buffer with a max size */
|
|
*plen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
|
|
(int)XSTRLEN(footer) + 1 + HEADER_ENCRYPTED_KEY_SIZE;
|
|
}
|
|
else { /* tmp buffer with a max size */
|
|
*plen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
|
|
(int)XSTRLEN(footer) + 1;
|
|
}
|
|
|
|
tmp = (byte*)XMALLOC(*plen, NULL, DYNAMIC_TYPE_PEM);
|
|
if (tmp == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
return 0;
|
|
}
|
|
|
|
/* DER to PEM */
|
|
*plen = wc_DerToPemEx(derBuf, derSz, tmp, *plen, cipherInfo, type);
|
|
if (*plen <= 0) {
|
|
WOLFSSL_MSG("wc_DerToPemEx failed");
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
return 0;
|
|
}
|
|
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
|
if (cipherInfo != NULL)
|
|
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
|
|
|
|
*pem = (byte*)XMALLOC((*plen)+1, NULL, DYNAMIC_TYPE_KEY);
|
|
if (*pem == NULL) {
|
|
WOLFSSL_MSG("malloc failed");
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
return 0;
|
|
}
|
|
XMEMSET(*pem, 0, (*plen)+1);
|
|
|
|
if (XMEMCPY(*pem, tmp, *plen) == NULL) {
|
|
WOLFSSL_MSG("XMEMCPY failed");
|
|
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
return 0;
|
|
}
|
|
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
|
|
|
|
return 1;
|
|
#else
|
|
(void)ecc;
|
|
(void)cipher;
|
|
(void)passwd;
|
|
(void)passwdSz;
|
|
(void)pem;
|
|
(void)plen;
|
|
return 0;
|
|
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
|
|
}
|
|
|
|
#ifndef NO_FILESYSTEM
|
|
/* return code compliant with OpenSSL :
|
|
* 1 if success, 0 if error
|
|
*/
|
|
int wolfSSL_PEM_write_ECPrivateKey(XFILE fp, WOLFSSL_EC_KEY *ecc,
|
|
const EVP_CIPHER *enc,
|
|
unsigned char *kstr, int klen,
|
|
wc_pem_password_cb *cb, void *u)
|
|
{
|
|
byte *pem;
|
|
int plen, ret;
|
|
|
|
(void)cb;
|
|
(void)u;
|
|
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_ECPrivateKey");
|
|
|
|
if (fp == XBADFILE || ecc == NULL || ecc->internal == NULL) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return 0;
|
|
}
|
|
|
|
ret = wolfSSL_PEM_write_mem_ECPrivateKey(ecc, enc, kstr, klen, &pem, &plen);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("wolfSSL_PEM_write_mem_ECPrivateKey failed");
|
|
return 0;
|
|
}
|
|
|
|
ret = (int)XFWRITE(pem, plen, 1, fp);
|
|
if (ret != 1) {
|
|
WOLFSSL_MSG("ECC private key file write failed");
|
|
return 0;
|
|
}
|
|
|
|
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
|
|
return 1;
|
|
}
|
|
|
|
#endif /* NO_FILESYSTEM */
|
|
#endif /* defined(WOLFSSL_KEY_GEN) */
|
|
|
|
#ifndef NO_BIO
|
|
|
|
/* returns a new WOLFSSL_EC_GROUP structure on success and NULL on fail */
|
|
WOLFSSL_EC_GROUP* wolfSSL_PEM_read_bio_ECPKParameters(WOLFSSL_BIO* bio,
|
|
WOLFSSL_EC_GROUP** group, wc_pem_password_cb* cb, void* pass)
|
|
{
|
|
WOLFSSL_EVP_PKEY* pkey;
|
|
WOLFSSL_EC_GROUP* ret = NULL;
|
|
|
|
/* check on if bio is null is done in wolfSSL_PEM_read_bio_PrivateKey */
|
|
pkey = wolfSSL_PEM_read_bio_PrivateKey(bio, NULL, cb, pass);
|
|
if (pkey != NULL) {
|
|
if (pkey->type != EVP_PKEY_EC) {
|
|
WOLFSSL_MSG("Unexpected key type");
|
|
}
|
|
else {
|
|
ret = (WOLFSSL_EC_GROUP*)wolfSSL_EC_KEY_get0_group(pkey->ecc);
|
|
|
|
/* set ecc group to null so it is not free'd when pkey is free'd */
|
|
pkey->ecc->group = NULL;
|
|
}
|
|
}
|
|
|
|
(void)group;
|
|
wolfSSL_EVP_PKEY_free(pkey);
|
|
return ret;
|
|
}
|
|
|
|
#endif /* !NO_BIO */
|
|
|
|
/* return 1 if success, -1 if error */
|
|
int wolfSSL_EC_KEY_LoadDer(WOLFSSL_EC_KEY* key, const unsigned char* derBuf,
|
|
int derSz)
|
|
{
|
|
return wolfSSL_EC_KEY_LoadDer_ex(key, derBuf, derSz,
|
|
WOLFSSL_EC_KEY_LOAD_PRIVATE);
|
|
}
|
|
|
|
int wolfSSL_EC_KEY_LoadDer_ex(WOLFSSL_EC_KEY* key, const unsigned char* derBuf,
|
|
int derSz, int opt)
|
|
{
|
|
int ret;
|
|
word32 idx = 0;
|
|
word32 algId;
|
|
|
|
WOLFSSL_ENTER("wolfSSL_EC_KEY_LoadDer");
|
|
|
|
if (key == NULL || key->internal == NULL || derBuf == NULL || derSz <= 0) {
|
|
WOLFSSL_MSG("Bad function arguments");
|
|
return -1;
|
|
}
|
|
|
|
key->pkcs8HeaderSz = 0;
|
|
|
|
/* Check if input buffer has PKCS8 header. In the case that it does not
|
|
* have a PKCS8 header then do not error out. */
|
|
if ((ret = ToTraditionalInline_ex((const byte*)derBuf, &idx, (word32)derSz,
|
|
&algId)) > 0) {
|
|
WOLFSSL_MSG("Found PKCS8 header");
|
|
key->pkcs8HeaderSz = (word16)idx;
|
|
}
|
|
else {
|
|
if (ret != ASN_PARSE_E) {
|
|
WOLFSSL_MSG("Unexpected error with trying to remove PKCS8 header");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (opt == WOLFSSL_EC_KEY_LOAD_PRIVATE) {
|
|
ret = wc_EccPrivateKeyDecode(derBuf, &idx, (ecc_key*)key->internal,
|
|
derSz);
|
|
}
|
|
else {
|
|
ret = wc_EccPublicKeyDecode(derBuf, &idx, (ecc_key*)key->internal,
|
|
derSz);
|
|
}
|
|
if (ret < 0) {
|
|
if (opt == WOLFSSL_EC_KEY_LOAD_PRIVATE) {
|
|
WOLFSSL_MSG("wc_EccPrivateKeyDecode failed");
|
|
}
|
|
else {
|
|
WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
if (SetECKeyExternal(key) != 1) {
|
|
WOLFSSL_MSG("SetECKeyExternal failed");
|
|
return -1;
|
|
}
|
|
|
|
key->inSet = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
|
|
|
|
#endif /* HAVE_ECC */
|
|
|
|
/*******************************************************************************
|
|
* END OF EC API
|
|
******************************************************************************/
|
|
|
|
#endif /* !WOLFSSL_PK_INCLUDED */
|
|
|