Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/contrib/bearssl/tools/keys.c
39537 views
1
/*
2
* Copyright (c) 2016 Thomas Pornin <[email protected]>
3
*
4
* Permission is hereby granted, free of charge, to any person obtaining
5
* a copy of this software and associated documentation files (the
6
* "Software"), to deal in the Software without restriction, including
7
* without limitation the rights to use, copy, modify, merge, publish,
8
* distribute, sublicense, and/or sell copies of the Software, and to
9
* permit persons to whom the Software is furnished to do so, subject to
10
* the following conditions:
11
*
12
* The above copyright notice and this permission notice shall be
13
* included in all copies or substantial portions of the Software.
14
*
15
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22
* SOFTWARE.
23
*/
24
25
#include <stdio.h>
26
#include <stdlib.h>
27
#include <string.h>
28
#include <stdint.h>
29
#include <errno.h>
30
31
#include "brssl.h"
32
#include "bearssl.h"
33
34
static private_key *
35
decode_key(const unsigned char *buf, size_t len)
36
{
37
br_skey_decoder_context dc;
38
int err;
39
private_key *sk;
40
41
br_skey_decoder_init(&dc);
42
br_skey_decoder_push(&dc, buf, len);
43
err = br_skey_decoder_last_error(&dc);
44
if (err != 0) {
45
const char *errname, *errmsg;
46
47
fprintf(stderr, "ERROR (decoding): err=%d\n", err);
48
errname = find_error_name(err, &errmsg);
49
if (errname != NULL) {
50
fprintf(stderr, " %s: %s\n", errname, errmsg);
51
} else {
52
fprintf(stderr, " (unknown)\n");
53
}
54
return NULL;
55
}
56
switch (br_skey_decoder_key_type(&dc)) {
57
const br_rsa_private_key *rk;
58
const br_ec_private_key *ek;
59
60
case BR_KEYTYPE_RSA:
61
rk = br_skey_decoder_get_rsa(&dc);
62
sk = xmalloc(sizeof *sk);
63
sk->key_type = BR_KEYTYPE_RSA;
64
sk->key.rsa.n_bitlen = rk->n_bitlen;
65
sk->key.rsa.p = xblobdup(rk->p, rk->plen);
66
sk->key.rsa.plen = rk->plen;
67
sk->key.rsa.q = xblobdup(rk->q, rk->qlen);
68
sk->key.rsa.qlen = rk->qlen;
69
sk->key.rsa.dp = xblobdup(rk->dp, rk->dplen);
70
sk->key.rsa.dplen = rk->dplen;
71
sk->key.rsa.dq = xblobdup(rk->dq, rk->dqlen);
72
sk->key.rsa.dqlen = rk->dqlen;
73
sk->key.rsa.iq = xblobdup(rk->iq, rk->iqlen);
74
sk->key.rsa.iqlen = rk->iqlen;
75
break;
76
77
case BR_KEYTYPE_EC:
78
ek = br_skey_decoder_get_ec(&dc);
79
sk = xmalloc(sizeof *sk);
80
sk->key_type = BR_KEYTYPE_EC;
81
sk->key.ec.curve = ek->curve;
82
sk->key.ec.x = xblobdup(ek->x, ek->xlen);
83
sk->key.ec.xlen = ek->xlen;
84
break;
85
86
default:
87
fprintf(stderr, "Unknown key type: %d\n",
88
br_skey_decoder_key_type(&dc));
89
sk = NULL;
90
break;
91
}
92
93
return sk;
94
}
95
96
/* see brssl.h */
97
private_key *
98
read_private_key(const char *fname)
99
{
100
unsigned char *buf;
101
size_t len;
102
private_key *sk;
103
pem_object *pos;
104
size_t num, u;
105
106
buf = NULL;
107
pos = NULL;
108
sk = NULL;
109
buf = read_file(fname, &len);
110
if (buf == NULL) {
111
goto deckey_exit;
112
}
113
if (looks_like_DER(buf, len)) {
114
sk = decode_key(buf, len);
115
goto deckey_exit;
116
} else {
117
pos = decode_pem(buf, len, &num);
118
if (pos == NULL) {
119
goto deckey_exit;
120
}
121
for (u = 0; pos[u].name; u ++) {
122
const char *name;
123
124
name = pos[u].name;
125
if (eqstr(name, "RSA PRIVATE KEY")
126
|| eqstr(name, "EC PRIVATE KEY")
127
|| eqstr(name, "PRIVATE KEY"))
128
{
129
sk = decode_key(pos[u].data, pos[u].data_len);
130
goto deckey_exit;
131
}
132
}
133
fprintf(stderr, "ERROR: no private key in file '%s'\n", fname);
134
goto deckey_exit;
135
}
136
137
deckey_exit:
138
if (buf != NULL) {
139
xfree(buf);
140
}
141
if (pos != NULL) {
142
for (u = 0; pos[u].name; u ++) {
143
free_pem_object_contents(&pos[u]);
144
}
145
xfree(pos);
146
}
147
return sk;
148
}
149
150
/* see brssl.h */
151
void
152
free_private_key(private_key *sk)
153
{
154
if (sk == NULL) {
155
return;
156
}
157
switch (sk->key_type) {
158
case BR_KEYTYPE_RSA:
159
xfree(sk->key.rsa.p);
160
xfree(sk->key.rsa.q);
161
xfree(sk->key.rsa.dp);
162
xfree(sk->key.rsa.dq);
163
xfree(sk->key.rsa.iq);
164
break;
165
case BR_KEYTYPE_EC:
166
xfree(sk->key.ec.x);
167
break;
168
}
169
xfree(sk);
170
}
171
172
/*
173
* OID for hash functions in RSA signatures.
174
*/
175
static const unsigned char HASH_OID_SHA1[] = {
176
0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A
177
};
178
179
static const unsigned char HASH_OID_SHA224[] = {
180
0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04
181
};
182
183
static const unsigned char HASH_OID_SHA256[] = {
184
0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01
185
};
186
187
static const unsigned char HASH_OID_SHA384[] = {
188
0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02
189
};
190
191
static const unsigned char HASH_OID_SHA512[] = {
192
0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03
193
};
194
195
static const unsigned char *HASH_OID[] = {
196
HASH_OID_SHA1,
197
HASH_OID_SHA224,
198
HASH_OID_SHA256,
199
HASH_OID_SHA384,
200
HASH_OID_SHA512
201
};
202
203
/* see brssl.h */
204
const unsigned char *
205
get_hash_oid(int id)
206
{
207
if (id >= 2 && id <= 6) {
208
return HASH_OID[id - 2];
209
} else {
210
return NULL;
211
}
212
}
213
214
/* see brssl.h */
215
const br_hash_class *
216
get_hash_impl(int hash_id)
217
{
218
size_t u;
219
220
if (hash_id == 0) {
221
return &br_md5sha1_vtable;
222
}
223
for (u = 0; hash_functions[u].name; u ++) {
224
const br_hash_class *hc;
225
int id;
226
227
hc = hash_functions[u].hclass;
228
id = (hc->desc >> BR_HASHDESC_ID_OFF) & BR_HASHDESC_ID_MASK;
229
if (id == hash_id) {
230
return hc;
231
}
232
}
233
return NULL;
234
}
235
236