Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/crypto/openssl/providers/common/der/der_rsa_key.c
48383 views
1
/*
2
* Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
3
*
4
* Licensed under the Apache License 2.0 (the "License"). You may not use
5
* this file except in compliance with the License. You can obtain a copy
6
* in the file LICENSE in the source distribution or at
7
* https://www.openssl.org/source/license.html
8
*/
9
10
/*
11
* RSA low level APIs are deprecated for public use, but still ok for
12
* internal use.
13
*/
14
#include "internal/deprecated.h"
15
16
#include <openssl/obj_mac.h>
17
#include "internal/cryptlib.h"
18
#include "prov/der_rsa.h"
19
#include "prov/der_digests.h"
20
21
/* More complex pre-compiled sequences. */
22
23
/*-
24
* From https://tools.ietf.org/html/rfc8017#appendix-A.2.1
25
*
26
* OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
27
* { OID id-sha1 PARAMETERS NULL }|
28
* { OID id-sha224 PARAMETERS NULL }|
29
* { OID id-sha256 PARAMETERS NULL }|
30
* { OID id-sha384 PARAMETERS NULL }|
31
* { OID id-sha512 PARAMETERS NULL }|
32
* { OID id-sha512-224 PARAMETERS NULL }|
33
* { OID id-sha512-256 PARAMETERS NULL },
34
* ... -- Allows for future expansion --
35
* }
36
*/
37
#define DER_V_NULL DER_P_NULL, 0
38
#define DER_SZ_NULL 2
39
40
/*
41
* The names for the hash function AlgorithmIdentifiers are borrowed and
42
* expanded from https://tools.ietf.org/html/rfc4055#section-2.1
43
*
44
* sha1Identifier AlgorithmIdentifier ::= { id-sha1, NULL }
45
* sha224Identifier AlgorithmIdentifier ::= { id-sha224, NULL }
46
* sha256Identifier AlgorithmIdentifier ::= { id-sha256, NULL }
47
* sha384Identifier AlgorithmIdentifier ::= { id-sha384, NULL }
48
* sha512Identifier AlgorithmIdentifier ::= { id-sha512, NULL }
49
*/
50
/*
51
* NOTE: Some of the arrays aren't used other than inside sizeof(), which
52
* clang complains about (-Wno-unneeded-internal-declaration). To get
53
* around that, we make them non-static, and declare them an extra time to
54
* avoid compilers complaining about definitions without declarations.
55
*/
56
#define DER_AID_V_sha1Identifier \
57
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
58
DER_OID_SZ_id_sha1 + DER_SZ_NULL, \
59
DER_OID_V_id_sha1, \
60
DER_V_NULL
61
extern const unsigned char ossl_der_aid_sha1Identifier[];
62
const unsigned char ossl_der_aid_sha1Identifier[] = {
63
DER_AID_V_sha1Identifier
64
};
65
#define DER_AID_SZ_sha1Identifier sizeof(ossl_der_aid_sha1Identifier)
66
67
#define DER_AID_V_sha224Identifier \
68
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
69
DER_OID_SZ_id_sha224 + DER_SZ_NULL, \
70
DER_OID_V_id_sha224, \
71
DER_V_NULL
72
extern const unsigned char ossl_der_aid_sha224Identifier[];
73
const unsigned char ossl_der_aid_sha224Identifier[] = {
74
DER_AID_V_sha224Identifier
75
};
76
#define DER_AID_SZ_sha224Identifier sizeof(ossl_der_aid_sha224Identifier)
77
78
#define DER_AID_V_sha256Identifier \
79
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
80
DER_OID_SZ_id_sha256 + DER_SZ_NULL, \
81
DER_OID_V_id_sha256, \
82
DER_V_NULL
83
extern const unsigned char ossl_der_aid_sha256Identifier[];
84
const unsigned char ossl_der_aid_sha256Identifier[] = {
85
DER_AID_V_sha256Identifier
86
};
87
#define DER_AID_SZ_sha256Identifier sizeof(ossl_der_aid_sha256Identifier)
88
89
#define DER_AID_V_sha384Identifier \
90
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
91
DER_OID_SZ_id_sha384 + DER_SZ_NULL, \
92
DER_OID_V_id_sha384, \
93
DER_V_NULL
94
extern const unsigned char ossl_der_aid_sha384Identifier[];
95
const unsigned char ossl_der_aid_sha384Identifier[] = {
96
DER_AID_V_sha384Identifier
97
};
98
#define DER_AID_SZ_sha384Identifier sizeof(ossl_der_aid_sha384Identifier)
99
100
#define DER_AID_V_sha512Identifier \
101
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
102
DER_OID_SZ_id_sha512 + DER_SZ_NULL, \
103
DER_OID_V_id_sha512, \
104
DER_V_NULL
105
extern const unsigned char ossl_der_aid_sha512Identifier[];
106
const unsigned char ossl_der_aid_sha512Identifier[] = {
107
DER_AID_V_sha512Identifier
108
};
109
#define DER_AID_SZ_sha512Identifier sizeof(ossl_der_aid_sha512Identifier)
110
111
#define DER_AID_V_sha512_224Identifier \
112
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
113
DER_OID_SZ_id_sha512_224 + DER_SZ_NULL, \
114
DER_OID_V_id_sha512_224, \
115
DER_V_NULL
116
extern const unsigned char ossl_der_aid_sha512_224Identifier[];
117
const unsigned char ossl_der_aid_sha512_224Identifier[] = {
118
DER_AID_V_sha512_224Identifier
119
};
120
#define DER_AID_SZ_sha512_224Identifier sizeof(ossl_der_aid_sha512_224Identifier)
121
122
#define DER_AID_V_sha512_256Identifier \
123
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
124
DER_OID_SZ_id_sha512_256 + DER_SZ_NULL, \
125
DER_OID_V_id_sha512_256, \
126
DER_V_NULL
127
extern const unsigned char ossl_der_aid_sha512_256Identifier[];
128
const unsigned char ossl_der_aid_sha512_256Identifier[] = {
129
DER_AID_V_sha512_256Identifier
130
};
131
#define DER_AID_SZ_sha512_256Identifier sizeof(ossl_der_aid_sha512_256Identifier)
132
133
/*-
134
* From https://tools.ietf.org/html/rfc8017#appendix-A.2.1
135
*
136
* HashAlgorithm ::= AlgorithmIdentifier {
137
* {OAEP-PSSDigestAlgorithms}
138
* }
139
*
140
* ...
141
*
142
* PKCS1MGFAlgorithms ALGORITHM-IDENTIFIER ::= {
143
* { OID id-mgf1 PARAMETERS HashAlgorithm },
144
* ... -- Allows for future expansion --
145
* }
146
*/
147
148
/*
149
* The names for the MGF1 AlgorithmIdentifiers are borrowed and expanded
150
* from https://tools.ietf.org/html/rfc4055#section-2.1
151
*
152
* mgf1SHA1Identifier AlgorithmIdentifier ::=
153
* { id-mgf1, sha1Identifier }
154
* mgf1SHA224Identifier AlgorithmIdentifier ::=
155
* { id-mgf1, sha224Identifier }
156
* mgf1SHA256Identifier AlgorithmIdentifier ::=
157
* { id-mgf1, sha256Identifier }
158
* mgf1SHA384Identifier AlgorithmIdentifier ::=
159
* { id-mgf1, sha384Identifier }
160
* mgf1SHA512Identifier AlgorithmIdentifier ::=
161
* { id-mgf1, sha512Identifier }
162
*/
163
#if 0 /* Currently unused */
164
#define DER_AID_V_mgf1SHA1Identifier \
165
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
166
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha1Identifier, \
167
DER_OID_V_id_mgf1, \
168
DER_AID_V_sha1Identifier
169
static const unsigned char der_aid_mgf1SHA1Identifier[] = {
170
DER_AID_V_mgf1SHA1Identifier
171
};
172
#define DER_AID_SZ_mgf1SHA1Identifier sizeof(der_aid_mgf1SHA1Identifier)
173
#endif
174
175
#define DER_AID_V_mgf1SHA224Identifier \
176
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
177
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha224Identifier, \
178
DER_OID_V_id_mgf1, \
179
DER_AID_V_sha224Identifier
180
static const unsigned char der_aid_mgf1SHA224Identifier[] = {
181
DER_AID_V_mgf1SHA224Identifier
182
};
183
#define DER_AID_SZ_mgf1SHA224Identifier sizeof(der_aid_mgf1SHA224Identifier)
184
185
#define DER_AID_V_mgf1SHA256Identifier \
186
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
187
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha256Identifier, \
188
DER_OID_V_id_mgf1, \
189
DER_AID_V_sha256Identifier
190
static const unsigned char der_aid_mgf1SHA256Identifier[] = {
191
DER_AID_V_mgf1SHA256Identifier
192
};
193
#define DER_AID_SZ_mgf1SHA256Identifier sizeof(der_aid_mgf1SHA256Identifier)
194
195
#define DER_AID_V_mgf1SHA384Identifier \
196
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
197
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha384Identifier, \
198
DER_OID_V_id_mgf1, \
199
DER_AID_V_sha384Identifier
200
static const unsigned char der_aid_mgf1SHA384Identifier[] = {
201
DER_AID_V_mgf1SHA384Identifier
202
};
203
#define DER_AID_SZ_mgf1SHA384Identifier sizeof(der_aid_mgf1SHA384Identifier)
204
205
#define DER_AID_V_mgf1SHA512Identifier \
206
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
207
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512Identifier, \
208
DER_OID_V_id_mgf1, \
209
DER_AID_V_sha512Identifier
210
static const unsigned char der_aid_mgf1SHA512Identifier[] = {
211
DER_AID_V_mgf1SHA512Identifier
212
};
213
#define DER_AID_SZ_mgf1SHA512Identifier sizeof(der_aid_mgf1SHA512Identifier)
214
215
#define DER_AID_V_mgf1SHA512_224Identifier \
216
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
217
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512_224Identifier, \
218
DER_OID_V_id_mgf1, \
219
DER_AID_V_sha512_224Identifier
220
static const unsigned char der_aid_mgf1SHA512_224Identifier[] = {
221
DER_AID_V_mgf1SHA512_224Identifier
222
};
223
#define DER_AID_SZ_mgf1SHA512_224Identifier sizeof(der_aid_mgf1SHA512_224Identifier)
224
225
#define DER_AID_V_mgf1SHA512_256Identifier \
226
DER_P_SEQUENCE|DER_F_CONSTRUCTED, \
227
DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512_256Identifier, \
228
DER_OID_V_id_mgf1, \
229
DER_AID_V_sha512_256Identifier
230
static const unsigned char der_aid_mgf1SHA512_256Identifier[] = {
231
DER_AID_V_mgf1SHA512_256Identifier
232
};
233
#define DER_AID_SZ_mgf1SHA512_256Identifier sizeof(der_aid_mgf1SHA512_256Identifier)
234
235
236
#define MGF1_SHA_CASE(bits, var) \
237
case NID_sha##bits: \
238
var = der_aid_mgf1SHA##bits##Identifier; \
239
var##_sz = sizeof(der_aid_mgf1SHA##bits##Identifier); \
240
break;
241
242
/*-
243
* The name is borrowed from https://tools.ietf.org/html/rfc8017#appendix-A.2.1
244
*
245
* MaskGenAlgorithm ::= AlgorithmIdentifier { {PKCS1MGFAlgorithms} }
246
*/
247
static int DER_w_MaskGenAlgorithm(WPACKET *pkt, int tag,
248
const RSA_PSS_PARAMS_30 *pss)
249
{
250
if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) {
251
int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss);
252
const unsigned char *maskgenalg = NULL;
253
size_t maskgenalg_sz = 0;
254
255
switch (maskgenhashalg_nid) {
256
case NID_sha1:
257
break;
258
MGF1_SHA_CASE(224, maskgenalg);
259
MGF1_SHA_CASE(256, maskgenalg);
260
MGF1_SHA_CASE(384, maskgenalg);
261
MGF1_SHA_CASE(512, maskgenalg);
262
MGF1_SHA_CASE(512_224, maskgenalg);
263
MGF1_SHA_CASE(512_256, maskgenalg);
264
default:
265
return 0;
266
}
267
268
/* If there is none (or it was the default), we write nothing */
269
if (maskgenalg == NULL)
270
return 1;
271
272
return ossl_DER_w_precompiled(pkt, tag, maskgenalg, maskgenalg_sz);
273
}
274
return 0;
275
}
276
277
#define OAEP_PSS_MD_CASE(name, var) \
278
case NID_##name: \
279
var = ossl_der_aid_##name##Identifier; \
280
var##_sz = sizeof(ossl_der_aid_##name##Identifier); \
281
break;
282
283
int ossl_DER_w_RSASSA_PSS_params(WPACKET *pkt, int tag,
284
const RSA_PSS_PARAMS_30 *pss)
285
{
286
int hashalg_nid, default_hashalg_nid;
287
int saltlen, default_saltlen;
288
int trailerfield, default_trailerfield;
289
const unsigned char *hashalg = NULL;
290
size_t hashalg_sz = 0;
291
292
/*
293
* For an unrestricted key, this function should not have been called;
294
* the caller must be in control, because unrestricted keys are permitted
295
* in some situations (when encoding the public key in a SubjectKeyInfo,
296
* for example) while not in others, and this function doesn't know the
297
* intent. Therefore, we assert that here, the PSS parameters must show
298
* that the key is restricted.
299
*/
300
if (!ossl_assert(pss != NULL
301
&& !ossl_rsa_pss_params_30_is_unrestricted(pss)))
302
return 0;
303
304
hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss);
305
saltlen = ossl_rsa_pss_params_30_saltlen(pss);
306
trailerfield = ossl_rsa_pss_params_30_trailerfield(pss);
307
308
if (saltlen < 0) {
309
ERR_raise(ERR_LIB_RSA, RSA_R_INVALID_SALT_LENGTH);
310
return 0;
311
}
312
if (trailerfield != 1) {
313
ERR_raise(ERR_LIB_RSA, RSA_R_INVALID_TRAILER);
314
return 0;
315
}
316
317
/* Getting default values */
318
default_hashalg_nid = ossl_rsa_pss_params_30_hashalg(NULL);
319
default_saltlen = ossl_rsa_pss_params_30_saltlen(NULL);
320
default_trailerfield = ossl_rsa_pss_params_30_trailerfield(NULL);
321
322
/*
323
* From https://tools.ietf.org/html/rfc8017#appendix-A.2.1:
324
*
325
* OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
326
* { OID id-sha1 PARAMETERS NULL }|
327
* { OID id-sha224 PARAMETERS NULL }|
328
* { OID id-sha256 PARAMETERS NULL }|
329
* { OID id-sha384 PARAMETERS NULL }|
330
* { OID id-sha512 PARAMETERS NULL }|
331
* { OID id-sha512-224 PARAMETERS NULL }|
332
* { OID id-sha512-256 PARAMETERS NULL },
333
* ... -- Allows for future expansion --
334
* }
335
*/
336
switch (hashalg_nid) {
337
OAEP_PSS_MD_CASE(sha1, hashalg);
338
OAEP_PSS_MD_CASE(sha224, hashalg);
339
OAEP_PSS_MD_CASE(sha256, hashalg);
340
OAEP_PSS_MD_CASE(sha384, hashalg);
341
OAEP_PSS_MD_CASE(sha512, hashalg);
342
OAEP_PSS_MD_CASE(sha512_224, hashalg);
343
OAEP_PSS_MD_CASE(sha512_256, hashalg);
344
default:
345
return 0;
346
}
347
348
return ossl_DER_w_begin_sequence(pkt, tag)
349
&& (trailerfield == default_trailerfield
350
|| ossl_DER_w_uint32(pkt, 3, (uint32_t)trailerfield))
351
&& (saltlen == default_saltlen || ossl_DER_w_uint32(pkt, 2, (uint32_t)saltlen))
352
&& DER_w_MaskGenAlgorithm(pkt, 1, pss)
353
&& (hashalg_nid == default_hashalg_nid
354
|| ossl_DER_w_precompiled(pkt, 0, hashalg, hashalg_sz))
355
&& ossl_DER_w_end_sequence(pkt, tag);
356
}
357
358
/* Aliases so we can have a uniform RSA_CASE */
359
#define ossl_der_oid_rsassaPss ossl_der_oid_id_RSASSA_PSS
360
361
#define RSA_CASE(name, var) \
362
var##_nid = NID_##name; \
363
var##_oid = ossl_der_oid_##name; \
364
var##_oid_sz = sizeof(ossl_der_oid_##name); \
365
break;
366
367
int ossl_DER_w_algorithmIdentifier_RSA_PSS(WPACKET *pkt, int tag,
368
int rsa_type,
369
const RSA_PSS_PARAMS_30 *pss)
370
{
371
int rsa_nid = NID_undef;
372
const unsigned char *rsa_oid = NULL;
373
size_t rsa_oid_sz = 0;
374
375
switch (rsa_type) {
376
case RSA_FLAG_TYPE_RSA:
377
RSA_CASE(rsaEncryption, rsa);
378
case RSA_FLAG_TYPE_RSASSAPSS:
379
RSA_CASE(rsassaPss, rsa);
380
}
381
382
if (rsa_oid == NULL)
383
return 0;
384
385
return ossl_DER_w_begin_sequence(pkt, tag)
386
&& (rsa_nid != NID_rsassaPss
387
|| ossl_rsa_pss_params_30_is_unrestricted(pss)
388
|| ossl_DER_w_RSASSA_PSS_params(pkt, -1, pss))
389
&& ossl_DER_w_precompiled(pkt, -1, rsa_oid, rsa_oid_sz)
390
&& ossl_DER_w_end_sequence(pkt, tag);
391
}
392
393
int ossl_DER_w_algorithmIdentifier_RSA(WPACKET *pkt, int tag, RSA *rsa)
394
{
395
int rsa_type = RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK);
396
RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30(rsa);
397
398
return ossl_DER_w_algorithmIdentifier_RSA_PSS(pkt, tag, rsa_type,
399
pss_params);
400
}
401
402