]> git.ipfire.org Git - thirdparty/openssl.git/blame - providers/implementations/serializers/serializer_common.c
Add RSA key validation to default provider
[thirdparty/openssl.git] / providers / implementations / serializers / serializer_common.c
CommitLineData
cb58d81e
RL
1/*
2 * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include <openssl/opensslconf.h> /* SIXTY_FOUR_BIT_LONG, ... */
11#include <openssl/err.h>
12#include <openssl/pem.h> /* PEM_BUFSIZE */
13#include <openssl/pkcs12.h> /* PKCS8_encrypt() */
14#include <openssl/types.h>
15#include <openssl/x509.h> /* i2d_X509_PUBKEY_bio() */
16#include "crypto/bn.h" /* bn_get_words() */
17#include "prov/bio.h" /* ossl_prov_bio_printf() */
18#include "prov/implementations.h"
19#include "prov/providercommonerr.h" /* PROV_R_READ_KEY */
20#include "serializer_local.h"
21
22static PKCS8_PRIV_KEY_INFO *
23ossl_prov_p8info_from_obj(const void *obj, int obj_nid,
24 ASN1_STRING *params,
25 int params_type,
26 int (*k2d)(const void *obj,
27 unsigned char **pder))
28{
29 /* der, derlen store the key DER output and its length */
30 unsigned char *der = NULL;
31 int derlen;
32 /* The final PKCS#8 info */
33 PKCS8_PRIV_KEY_INFO *p8info = NULL;
34
35
36 if ((p8info = PKCS8_PRIV_KEY_INFO_new()) == NULL
37 || (derlen = k2d(obj, &der)) <= 0
38 || !PKCS8_pkey_set0(p8info, OBJ_nid2obj(obj_nid), 0,
39 params_type, params, der, derlen)) {
40 ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
41 PKCS8_PRIV_KEY_INFO_free(p8info);
42 OPENSSL_free(der);
43 p8info = NULL;
44 }
45
46 return p8info;
47}
48
49static X509_SIG *ossl_prov_encp8_from_p8info(PKCS8_PRIV_KEY_INFO *p8info,
50 struct pkcs8_encrypt_ctx_st *ctx)
51{
52 X509_SIG *p8 = NULL;
53 char buf[PEM_BUFSIZE];
54 const void *kstr = ctx->cipher_pass;
55 size_t klen = ctx->cipher_pass_length;
56
57 if (ctx->cipher == NULL)
58 return NULL;
59
60 if (kstr == NULL) {
61 if (!ctx->cb(buf, sizeof(buf), &klen, NULL, ctx->cbarg)) {
62 ERR_raise(ERR_LIB_PROV, PROV_R_READ_KEY);
63 return NULL;
64 }
65 kstr = buf;
66 }
67 /* NID == -1 means "standard" */
68 p8 = PKCS8_encrypt(-1, ctx->cipher, kstr, klen, NULL, 0, 0, p8info);
69 if (kstr == buf)
70 OPENSSL_cleanse(buf, klen);
71 return p8;
72}
73
74static X509_SIG *ossl_prov_encp8_from_obj(const void *obj, int obj_nid,
75 ASN1_STRING *params,
76 int params_type,
77 int (*k2d)(const void *obj,
78 unsigned char **pder),
79 struct pkcs8_encrypt_ctx_st *ctx)
80{
81 PKCS8_PRIV_KEY_INFO *p8info =
82 ossl_prov_p8info_from_obj(obj, obj_nid, params, params_type, k2d);
83 X509_SIG *p8 = ossl_prov_encp8_from_p8info(p8info, ctx);
84
85 PKCS8_PRIV_KEY_INFO_free(p8info);
86 return p8;
87}
88
89static X509_PUBKEY *ossl_prov_pubkey_from_obj(const void *obj, int obj_nid,
90 ASN1_STRING *params,
91 int params_type,
92 int (*k2d)(const void *obj,
93 unsigned char **pder))
94{
95 /* der, derlen store the key DER output and its length */
96 unsigned char *der = NULL;
97 int derlen;
98 /* The final X509_PUBKEY */
99 X509_PUBKEY *xpk = NULL;
100
101
102 if ((xpk = X509_PUBKEY_new()) == NULL
103 || (derlen = k2d(obj, &der)) <= 0
104 || !X509_PUBKEY_set0_param(xpk, OBJ_nid2obj(obj_nid),
105 params_type, params, der, derlen)) {
106 ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
107 X509_PUBKEY_free(xpk);
108 OPENSSL_free(der);
109 xpk = NULL;
110 }
111
112 return xpk;
113}
114
115OSSL_OP_keymgmt_importkey_fn *ossl_prov_get_importkey(const OSSL_DISPATCH *fns)
116{
117 /* Pilfer the keymgmt dispatch table */
118 for (; fns->function_id != 0; fns++)
119 if (fns->function_id == OSSL_FUNC_KEYMGMT_IMPORTKEY)
120 return OSSL_get_OP_keymgmt_importkey(fns);
121
122 return NULL;
123}
124
125# ifdef SIXTY_FOUR_BIT_LONG
126# define BN_FMTu "%lu"
127# define BN_FMTx "%lx"
128# endif
129
130# ifdef SIXTY_FOUR_BIT
131# define BN_FMTu "%llu"
132# define BN_FMTx "%llx"
133# endif
134
135# ifdef THIRTY_TWO_BIT
136# define BN_FMTu "%u"
137# define BN_FMTx "%x"
138# endif
139
140int ossl_prov_print_labeled_bignum(BIO *out, const char *label,
a88aef32 141 const BIGNUM *bn)
cb58d81e
RL
142{
143 const char *neg;
144 const char *post_label_spc = " ";
145 int bytes;
146 BN_ULONG *words;
a88aef32 147 int n, i;
cb58d81e 148
a88aef32 149 if (bn == NULL)
cb58d81e
RL
150 return 0;
151 if (label == NULL) {
152 label = "";
153 post_label_spc = "";
154 }
155
a88aef32
RL
156 bytes = BN_num_bytes(bn);
157 words = bn_get_words(bn);
158 neg = BN_is_negative(bn) ? "-" : "";
cb58d81e 159
a88aef32 160 if (BN_is_zero(bn))
cb58d81e
RL
161 return ossl_prov_bio_printf(out, "%s%s0\n", label, post_label_spc);
162
a88aef32 163 if (BN_num_bytes(bn) <= BN_BYTES)
cb58d81e
RL
164 return ossl_prov_bio_printf(out,
165 "%s%s%s" BN_FMTu " (%s0x" BN_FMTx ")\n",
166 label, post_label_spc, neg, words[0],
167 neg, words[0]);
168
169 if (neg[0] == '-')
170 neg = " (Negative)";
171
172 if (ossl_prov_bio_printf(out, "%s%s\n", label, neg) <= 0)
173 return 0;
174
a88aef32
RL
175 /* Keep track of how many bytes we have printed out so far */
176 n = 0;
177
178 /*
179 * OpenSSL BIGNUMs are little endian limbs, so we print them last to
180 * first limb.
181 * i is used as limb index, j is used as the "byte index" in the limb
182 */
183 for (i = bytes / BN_BYTES - 1; i >= 0; i--) {
184 BN_ULONG l = words[i];
185 int j;
186
187 for (j = BN_BYTES - 1; j >= 0; j--) {
188 int o = 8 * j;
189 int b = ((l & (0xffLU << o)) >> o) & 0xff;
190
191 /* Indent every new line with 4 spaces */
192 if ((n % 15) == 0) {
193 if (n > 0)
194 if (ossl_prov_bio_printf(out, "\n") <= 0)
195 return 0;
196 if (ossl_prov_bio_printf(out, " ") <= 0)
197 return 0;
198 }
cb58d81e 199
a88aef32
RL
200 /*
201 * Upper bit set, then we print an extra zero and pretend the
202 * BIGNUM was one byte longer
203 */
204 if (n == 0 && b > 127) {
205 if (ossl_prov_bio_printf(out, "%02x:", 0) <= 0)
206 return 0;
207 n++;
208 bytes++;
209 }
cb58d81e 210
a88aef32 211 if (++n < bytes) {
cb58d81e
RL
212 if (ossl_prov_bio_printf(out, "%02x:", b) <= 0)
213 return 0;
a88aef32
RL
214 } else {
215 if (ossl_prov_bio_printf(out, "%02x", b) <= 0)
216 return 0;
cb58d81e
RL
217 }
218 }
cb58d81e 219 }
a88aef32
RL
220 if (ossl_prov_bio_printf(out, "\n") <= 0)
221 return 0;
cb58d81e
RL
222
223 return 1;
224}
225
226/* p2s = param to asn1_string, k2d = key to der */
227int ossl_prov_write_priv_der_from_obj(BIO *out, const void *obj, int obj_nid,
228 int (*p2s)(const void *obj, int nid,
229 ASN1_STRING **str,
230 int *strtype),
231 int (*k2d)(const void *obj,
232 unsigned char **pder),
233 struct pkcs8_encrypt_ctx_st *ctx)
234{
235 int ret = 0;
236 ASN1_STRING *str = NULL;
237 int strtype = 0;
238
239 if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
240 return 0;
241
242 if (ctx->cipher_intent) {
243 X509_SIG *p8 =
244 ossl_prov_encp8_from_obj(obj, obj_nid, str, strtype, k2d, ctx);
245
246 if (p8 != NULL)
247 ret = i2d_PKCS8_bio(out, p8);
248
249 X509_SIG_free(p8);
250 } else {
251 PKCS8_PRIV_KEY_INFO *p8info =
252 ossl_prov_p8info_from_obj(obj, obj_nid, str, strtype, k2d);
253
254 if (p8info != NULL)
255 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8info);
256
257 PKCS8_PRIV_KEY_INFO_free(p8info);
258 }
259
260 return ret;
261}
262
263int ossl_prov_write_priv_pem_from_obj(BIO *out, const void *obj, int obj_nid,
264 int (*p2s)(const void *obj, int nid,
265 ASN1_STRING **str,
266 int *strtype),
267 int (*k2d)(const void *obj,
268 unsigned char **pder),
269 struct pkcs8_encrypt_ctx_st *ctx)
270{
271 int ret = 0;
272 ASN1_STRING *str = NULL;
273 int strtype = 0;
274
275 if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
276 return 0;
277
278 if (ctx->cipher_intent) {
279 X509_SIG *p8 = ossl_prov_encp8_from_obj(obj, obj_nid, str, strtype,
280 k2d, ctx);
281
282 if (p8 != NULL)
283 ret = PEM_write_bio_PKCS8(out, p8);
284
285 X509_SIG_free(p8);
286 } else {
287 PKCS8_PRIV_KEY_INFO *p8info =
288 ossl_prov_p8info_from_obj(obj, obj_nid, str, strtype, k2d);
289
290 if (p8info != NULL)
291 ret = PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8info);
292
293 PKCS8_PRIV_KEY_INFO_free(p8info);
294 }
295
296 return ret;
297}
298
299int ossl_prov_write_pub_der_from_obj(BIO *out, const void *obj, int obj_nid,
300 int (*p2s)(const void *obj, int nid,
301 ASN1_STRING **str,
302 int *strtype),
303 int (*k2d)(const void *obj,
304 unsigned char **pder))
305{
306 int ret = 0;
307 ASN1_STRING *str = NULL;
308 int strtype = 0;
309 X509_PUBKEY *xpk = NULL;
310
311 if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
312 return 0;
313
314 xpk = ossl_prov_pubkey_from_obj(obj, obj_nid, str, strtype, k2d);
315
316 if (xpk != NULL)
317 ret = i2d_X509_PUBKEY_bio(out, xpk);
318
319 /* Also frees |str| */
320 X509_PUBKEY_free(xpk);
321 return ret;
322}
323
324int ossl_prov_write_pub_pem_from_obj(BIO *out, const void *obj, int obj_nid,
325 int (*p2s)(const void *obj, int nid,
326 ASN1_STRING **str,
327 int *strtype),
328 int (*k2d)(const void *obj,
329 unsigned char **pder))
330{
331 int ret = 0;
332 ASN1_STRING *str = NULL;
333 int strtype = 0;
334 X509_PUBKEY *xpk = NULL;
335
336 if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
337 return 0;
338
339 xpk = ossl_prov_pubkey_from_obj(obj, obj_nid, str, strtype, k2d);
340
341 if (xpk != NULL)
342 ret = PEM_write_bio_X509_PUBKEY(out, xpk);
343
344 /* Also frees |str| */
345 X509_PUBKEY_free(xpk);
346 return ret;
347}
348