| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 #include "cryptohi.h" | |
| 5 #include "keyhi.h" | |
| 6 #include "secoid.h" | |
| 7 #include "secitem.h" | |
| 8 #include "secder.h" | |
| 9 #include "base64.h" | |
| 10 #include "secasn1.h" | |
| 11 #include "cert.h" | |
| 12 #include "pk11func.h" | |
| 13 #include "secerr.h" | |
| 14 #include "secdig.h" | |
| 15 #include "prtime.h" | |
| 16 #include "keyi.h" | |
| 17 | |
| 18 SEC_ASN1_MKSUB(SECOID_AlgorithmIDTemplate) | |
| 19 SEC_ASN1_MKSUB(SEC_IntegerTemplate) | |
| 20 | |
| 21 const SEC_ASN1Template CERT_SubjectPublicKeyInfoTemplate[] = { | |
| 22 { SEC_ASN1_SEQUENCE, | |
| 23 0, NULL, sizeof(CERTSubjectPublicKeyInfo) }, | |
| 24 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, | |
| 25 offsetof(CERTSubjectPublicKeyInfo,algorithm), | |
| 26 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) }, | |
| 27 { SEC_ASN1_BIT_STRING, | |
| 28 offsetof(CERTSubjectPublicKeyInfo,subjectPublicKey), }, | |
| 29 { 0, } | |
| 30 }; | |
| 31 | |
| 32 const SEC_ASN1Template CERT_PublicKeyAndChallengeTemplate[] = | |
| 33 { | |
| 34 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(CERTPublicKeyAndChallenge) }, | |
| 35 { SEC_ASN1_ANY, offsetof(CERTPublicKeyAndChallenge,spki) }, | |
| 36 { SEC_ASN1_IA5_STRING, offsetof(CERTPublicKeyAndChallenge,challenge) }, | |
| 37 { 0 } | |
| 38 }; | |
| 39 | |
| 40 const SEC_ASN1Template SECKEY_RSAPublicKeyTemplate[] = { | |
| 41 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYPublicKey) }, | |
| 42 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.rsa.modulus), }, | |
| 43 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.rsa.publicExponent), }, | |
| 44 { 0, } | |
| 45 }; | |
| 46 | |
| 47 static const SEC_ASN1Template seckey_PointerToAlgorithmIDTemplate[] = { | |
| 48 { SEC_ASN1_POINTER | SEC_ASN1_XTRN, 0, | |
| 49 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) } | |
| 50 }; | |
| 51 | |
| 52 /* Parameters for SEC_OID_PKCS1_RSA_PSS_SIGNATURE */ | |
| 53 const SEC_ASN1Template SECKEY_RSAPSSParamsTemplate[] = | |
| 54 { | |
| 55 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYRSAPSSParams) }, | |
| 56 { SEC_ASN1_OPTIONAL | SEC_ASN1_CONSTRUCTED | SEC_ASN1_EXPLICIT | | |
| 57 SEC_ASN1_CONTEXT_SPECIFIC | 0, | |
| 58 offsetof(SECKEYRSAPSSParams, hashAlg), | |
| 59 seckey_PointerToAlgorithmIDTemplate }, | |
| 60 { SEC_ASN1_OPTIONAL | SEC_ASN1_CONSTRUCTED | SEC_ASN1_EXPLICIT | | |
| 61 SEC_ASN1_CONTEXT_SPECIFIC | 1, | |
| 62 offsetof(SECKEYRSAPSSParams, maskAlg), | |
| 63 seckey_PointerToAlgorithmIDTemplate }, | |
| 64 { SEC_ASN1_OPTIONAL | SEC_ASN1_CONSTRUCTED | SEC_ASN1_EXPLICIT | | |
| 65 SEC_ASN1_XTRN | SEC_ASN1_CONTEXT_SPECIFIC | 2, | |
| 66 offsetof(SECKEYRSAPSSParams, saltLength), | |
| 67 SEC_ASN1_SUB(SEC_IntegerTemplate) }, | |
| 68 { SEC_ASN1_OPTIONAL | SEC_ASN1_CONSTRUCTED | SEC_ASN1_EXPLICIT | | |
| 69 SEC_ASN1_XTRN | SEC_ASN1_CONTEXT_SPECIFIC | 3, | |
| 70 offsetof(SECKEYRSAPSSParams, trailerField), | |
| 71 SEC_ASN1_SUB(SEC_IntegerTemplate) }, | |
| 72 { 0 } | |
| 73 }; | |
| 74 | |
| 75 const SEC_ASN1Template SECKEY_DSAPublicKeyTemplate[] = { | |
| 76 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.dsa.publicValue), }, | |
| 77 { 0, } | |
| 78 }; | |
| 79 | |
| 80 const SEC_ASN1Template SECKEY_PQGParamsTemplate[] = { | |
| 81 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYPQGParams) }, | |
| 82 { SEC_ASN1_INTEGER, offsetof(SECKEYPQGParams,prime) }, | |
| 83 { SEC_ASN1_INTEGER, offsetof(SECKEYPQGParams,subPrime) }, | |
| 84 { SEC_ASN1_INTEGER, offsetof(SECKEYPQGParams,base) }, | |
| 85 { 0, } | |
| 86 }; | |
| 87 | |
| 88 const SEC_ASN1Template SECKEY_DHPublicKeyTemplate[] = { | |
| 89 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.dh.publicValue), }, | |
| 90 { 0, } | |
| 91 }; | |
| 92 | |
| 93 const SEC_ASN1Template SECKEY_DHParamKeyTemplate[] = { | |
| 94 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYPublicKey) }, | |
| 95 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.dh.prime), }, | |
| 96 { SEC_ASN1_INTEGER, offsetof(SECKEYPublicKey,u.dh.base), }, | |
| 97 /* XXX chrisk: this needs to be expanded for decoding of j and validationPar
ms (RFC2459 7.3.2) */ | |
| 98 { SEC_ASN1_SKIP_REST }, | |
| 99 { 0, } | |
| 100 }; | |
| 101 | |
| 102 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_DSAPublicKeyTemplate) | |
| 103 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_RSAPublicKeyTemplate) | |
| 104 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_RSAPSSParamsTemplate) | |
| 105 SEC_ASN1_CHOOSER_IMPLEMENT(CERT_SubjectPublicKeyInfoTemplate) | |
| 106 | |
| 107 /* | |
| 108 * See bugzilla bug 125359 | |
| 109 * Since NSS (via PKCS#11) wants to handle big integers as unsigned ints, | |
| 110 * all of the templates above that en/decode into integers must be converted | |
| 111 * from ASN.1's signed integer type. This is done by marking either the | |
| 112 * source or destination (encoding or decoding, respectively) type as | |
| 113 * siUnsignedInteger. | |
| 114 */ | |
| 115 static void | |
| 116 prepare_rsa_pub_key_for_asn1(SECKEYPublicKey *pubk) | |
| 117 { | |
| 118 pubk->u.rsa.modulus.type = siUnsignedInteger; | |
| 119 pubk->u.rsa.publicExponent.type = siUnsignedInteger; | |
| 120 } | |
| 121 | |
| 122 static void | |
| 123 prepare_dsa_pub_key_for_asn1(SECKEYPublicKey *pubk) | |
| 124 { | |
| 125 pubk->u.dsa.publicValue.type = siUnsignedInteger; | |
| 126 } | |
| 127 | |
| 128 static void | |
| 129 prepare_pqg_params_for_asn1(SECKEYPQGParams *params) | |
| 130 { | |
| 131 params->prime.type = siUnsignedInteger; | |
| 132 params->subPrime.type = siUnsignedInteger; | |
| 133 params->base.type = siUnsignedInteger; | |
| 134 } | |
| 135 | |
| 136 static void | |
| 137 prepare_dh_pub_key_for_asn1(SECKEYPublicKey *pubk) | |
| 138 { | |
| 139 pubk->u.dh.prime.type = siUnsignedInteger; | |
| 140 pubk->u.dh.base.type = siUnsignedInteger; | |
| 141 pubk->u.dh.publicValue.type = siUnsignedInteger; | |
| 142 } | |
| 143 | |
| 144 /* Create an RSA key pair is any slot able to do so. | |
| 145 ** The created keys are "session" (temporary), not "token" (permanent), | |
| 146 ** and they are "sensitive", which makes them costly to move to another token. | |
| 147 */ | |
| 148 SECKEYPrivateKey * | |
| 149 SECKEY_CreateRSAPrivateKey(int keySizeInBits,SECKEYPublicKey **pubk, void *cx) | |
| 150 { | |
| 151 SECKEYPrivateKey *privk; | |
| 152 PK11RSAGenParams param; | |
| 153 PK11SlotInfo *slot = PK11_GetBestSlot(CKM_RSA_PKCS_KEY_PAIR_GEN,cx); | |
| 154 if (!slot) { | |
| 155 return NULL; | |
| 156 } | |
| 157 | |
| 158 param.keySizeInBits = keySizeInBits; | |
| 159 param.pe = 65537L; | |
| 160 | |
| 161 privk = PK11_GenerateKeyPair(slot,CKM_RSA_PKCS_KEY_PAIR_GEN,¶m,pubk, | |
| 162 PR_FALSE, PR_TRUE, cx); | |
| 163 PK11_FreeSlot(slot); | |
| 164 return(privk); | |
| 165 } | |
| 166 | |
| 167 /* Create a DH key pair in any slot able to do so, | |
| 168 ** This is a "session" (temporary), not "token" (permanent) key. | |
| 169 ** Because of the high probability that this key will need to be moved to | |
| 170 ** another token, and the high cost of moving "sensitive" keys, we attempt | |
| 171 ** to create this key pair without the "sensitive" attribute, but revert to | |
| 172 ** creating a "sensitive" key if necessary. | |
| 173 */ | |
| 174 SECKEYPrivateKey * | |
| 175 SECKEY_CreateDHPrivateKey(SECKEYDHParams *param, SECKEYPublicKey **pubk, void *c
x) | |
| 176 { | |
| 177 SECKEYPrivateKey *privk; | |
| 178 PK11SlotInfo *slot; | |
| 179 | |
| 180 if (!param || !param->base.data || !param->prime.data || | |
| 181 param->prime.len < 512/8 || param->base.len == 0 || | |
| 182 param->base.len > param->prime.len + 1 || | |
| 183 (param->base.len == 1 && param->base.data[0] == 0)) { | |
| 184 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 185 return NULL; | |
| 186 } | |
| 187 | |
| 188 slot = PK11_GetBestSlot(CKM_DH_PKCS_KEY_PAIR_GEN,cx); | |
| 189 if (!slot) { | |
| 190 return NULL; | |
| 191 } | |
| 192 | |
| 193 privk = PK11_GenerateKeyPair(slot, CKM_DH_PKCS_KEY_PAIR_GEN, param, | |
| 194 pubk, PR_FALSE, PR_FALSE, cx); | |
| 195 if (!privk) | |
| 196 privk = PK11_GenerateKeyPair(slot, CKM_DH_PKCS_KEY_PAIR_GEN, param, | |
| 197 pubk, PR_FALSE, PR_TRUE, cx); | |
| 198 | |
| 199 PK11_FreeSlot(slot); | |
| 200 return(privk); | |
| 201 } | |
| 202 | |
| 203 /* Create an EC key pair in any slot able to do so, | |
| 204 ** This is a "session" (temporary), not "token" (permanent) key. | |
| 205 ** Because of the high probability that this key will need to be moved to | |
| 206 ** another token, and the high cost of moving "sensitive" keys, we attempt | |
| 207 ** to create this key pair without the "sensitive" attribute, but revert to | |
| 208 ** creating a "sensitive" key if necessary. | |
| 209 */ | |
| 210 SECKEYPrivateKey * | |
| 211 SECKEY_CreateECPrivateKey(SECKEYECParams *param, SECKEYPublicKey **pubk, void *c
x) | |
| 212 { | |
| 213 SECKEYPrivateKey *privk; | |
| 214 PK11SlotInfo *slot = PK11_GetBestSlot(CKM_EC_KEY_PAIR_GEN,cx); | |
| 215 if (!slot) { | |
| 216 return NULL; | |
| 217 } | |
| 218 | |
| 219 privk = PK11_GenerateKeyPairWithOpFlags(slot, CKM_EC_KEY_PAIR_GEN, | |
| 220 param, pubk, | |
| 221 PK11_ATTR_SESSION | PK11_ATTR_INSENSITIVE | | |
| 222 PK11_ATTR_PUBLIC, | |
| 223 CKF_DERIVE, CKF_DERIVE|CKF_SIGN,cx); | |
| 224 if (!privk) | |
| 225 privk = PK11_GenerateKeyPairWithOpFlags(slot, CKM_EC_KEY_PAIR_GEN, | |
| 226 param, pubk, | |
| 227 PK11_ATTR_SESSION | PK11_ATTR_SENSITIVE | | |
| 228 PK11_ATTR_PRIVATE, | |
| 229 CKF_DERIVE, CKF_DERIVE|CKF_SIGN,cx); | |
| 230 | |
| 231 PK11_FreeSlot(slot); | |
| 232 return(privk); | |
| 233 } | |
| 234 | |
| 235 void | |
| 236 SECKEY_DestroyPrivateKey(SECKEYPrivateKey *privk) | |
| 237 { | |
| 238 if (privk) { | |
| 239 if (privk->pkcs11Slot) { | |
| 240 if (privk->pkcs11IsTemp) { | |
| 241 PK11_DestroyObject(privk->pkcs11Slot,privk->pkcs11ID); | |
| 242 } | |
| 243 PK11_FreeSlot(privk->pkcs11Slot); | |
| 244 | |
| 245 } | |
| 246 if (privk->arena) { | |
| 247 PORT_FreeArena(privk->arena, PR_TRUE); | |
| 248 } | |
| 249 } | |
| 250 } | |
| 251 | |
| 252 void | |
| 253 SECKEY_DestroyPublicKey(SECKEYPublicKey *pubk) | |
| 254 { | |
| 255 if (pubk) { | |
| 256 if (pubk->pkcs11Slot) { | |
| 257 if (!PK11_IsPermObject(pubk->pkcs11Slot,pubk->pkcs11ID)) { | |
| 258 PK11_DestroyObject(pubk->pkcs11Slot,pubk->pkcs11ID); | |
| 259 } | |
| 260 PK11_FreeSlot(pubk->pkcs11Slot); | |
| 261 } | |
| 262 if (pubk->arena) { | |
| 263 PORT_FreeArena(pubk->arena, PR_FALSE); | |
| 264 } | |
| 265 } | |
| 266 } | |
| 267 | |
| 268 SECStatus | |
| 269 SECKEY_CopySubjectPublicKeyInfo(PRArenaPool *arena, | |
| 270 CERTSubjectPublicKeyInfo *to, | |
| 271 CERTSubjectPublicKeyInfo *from) | |
| 272 { | |
| 273 SECStatus rv; | |
| 274 SECItem spk; | |
| 275 | |
| 276 rv = SECOID_CopyAlgorithmID(arena, &to->algorithm, &from->algorithm); | |
| 277 if (rv == SECSuccess) { | |
| 278 /* | |
| 279 * subjectPublicKey is a bit string, whose length is in bits. | |
| 280 * Convert the length from bits to bytes for SECITEM_CopyItem. | |
| 281 */ | |
| 282 spk = from->subjectPublicKey; | |
| 283 DER_ConvertBitString(&spk); | |
| 284 rv = SECITEM_CopyItem(arena, &to->subjectPublicKey, &spk); | |
| 285 /* Set the length back to bits. */ | |
| 286 if (rv == SECSuccess) { | |
| 287 to->subjectPublicKey.len = from->subjectPublicKey.len; | |
| 288 } | |
| 289 } | |
| 290 | |
| 291 return rv; | |
| 292 } | |
| 293 | |
| 294 /* Procedure to update the pqg parameters for a cert's public key. | |
| 295 * pqg parameters only need to be updated for DSA certificates. | |
| 296 * The procedure uses calls to itself recursively to update a certificate | |
| 297 * issuer's pqg parameters. Some important rules are: | |
| 298 * - Do nothing if the cert already has PQG parameters. | |
| 299 * - If the cert does not have PQG parameters, obtain them from the issuer. | |
| 300 * - A valid cert chain cannot have a DSA cert without | |
| 301 * pqg parameters that has a parent that is not a DSA cert. */ | |
| 302 | |
| 303 static SECStatus | |
| 304 seckey_UpdateCertPQGChain(CERTCertificate * subjectCert, int count) | |
| 305 { | |
| 306 SECStatus rv; | |
| 307 SECOidData *oid=NULL; | |
| 308 int tag; | |
| 309 CERTSubjectPublicKeyInfo * subjectSpki=NULL; | |
| 310 CERTSubjectPublicKeyInfo * issuerSpki=NULL; | |
| 311 CERTCertificate *issuerCert = NULL; | |
| 312 | |
| 313 rv = SECSuccess; | |
| 314 | |
| 315 /* increment cert chain length counter*/ | |
| 316 count++; | |
| 317 | |
| 318 /* check if cert chain length exceeds the maximum length*/ | |
| 319 if (count > CERT_MAX_CERT_CHAIN) { | |
| 320 return SECFailure; | |
| 321 } | |
| 322 | |
| 323 oid = SECOID_FindOID(&subjectCert->subjectPublicKeyInfo.algorithm.algorithm)
; | |
| 324 if (oid != NULL) { | |
| 325 tag = oid->offset; | |
| 326 | |
| 327 /* Check if cert has a DSA or EC public key. If not, return | |
| 328 * success since no PQG params need to be updated. | |
| 329 * | |
| 330 * Question: do we really need to do this for EC keys. They don't have | |
| 331 * PQG parameters, but they do have parameters. The question is does | |
| 332 * the child cert inherit thost parameters for EC from the parent, or | |
| 333 * do we always include those parameters in each cert. | |
| 334 */ | |
| 335 | |
| 336 if ( (tag != SEC_OID_ANSIX9_DSA_SIGNATURE) && | |
| 337 (tag != SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST) && | |
| 338 (tag != SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST) && | |
| 339 (tag != SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST) && | |
| 340 (tag != SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST) && | |
| 341 (tag != SEC_OID_SDN702_DSA_SIGNATURE) && | |
| 342 (tag != SEC_OID_ANSIX962_EC_PUBLIC_KEY) ) { | |
| 343 | |
| 344 return SECSuccess; | |
| 345 } | |
| 346 } else { | |
| 347 return SECFailure; /* return failure if oid is NULL */ | |
| 348 } | |
| 349 | |
| 350 /* if cert has PQG parameters, return success */ | |
| 351 | |
| 352 subjectSpki=&subjectCert->subjectPublicKeyInfo; | |
| 353 | |
| 354 if (subjectSpki->algorithm.parameters.len != 0) { | |
| 355 return SECSuccess; | |
| 356 } | |
| 357 | |
| 358 /* check if the cert is self-signed */ | |
| 359 if (subjectCert->isRoot) { | |
| 360 /* fail since cert is self-signed and has no pqg params. */ | |
| 361 return SECFailure; | |
| 362 } | |
| 363 | |
| 364 /* get issuer cert */ | |
| 365 issuerCert = CERT_FindCertIssuer(subjectCert, PR_Now(), certUsageAnyCA); | |
| 366 if ( ! issuerCert ) { | |
| 367 return SECFailure; | |
| 368 } | |
| 369 | |
| 370 /* if parent is not DSA, return failure since | |
| 371 we don't allow this case. */ | |
| 372 | |
| 373 oid = SECOID_FindOID(&issuerCert->subjectPublicKeyInfo.algorithm.algorithm); | |
| 374 if (oid != NULL) { | |
| 375 tag = oid->offset; | |
| 376 | |
| 377 /* Check if issuer cert has a DSA public key. If not, | |
| 378 * return failure. */ | |
| 379 | |
| 380 if ( (tag != SEC_OID_ANSIX9_DSA_SIGNATURE) && | |
| 381 (tag != SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST) && | |
| 382 (tag != SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST) && | |
| 383 (tag != SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST) && | |
| 384 (tag != SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST) && | |
| 385 (tag != SEC_OID_SDN702_DSA_SIGNATURE) && | |
| 386 (tag != SEC_OID_ANSIX962_EC_PUBLIC_KEY) ) { | |
| 387 rv = SECFailure; | |
| 388 goto loser; | |
| 389 } | |
| 390 } else { | |
| 391 rv = SECFailure; /* return failure if oid is NULL */ | |
| 392 goto loser; | |
| 393 } | |
| 394 | |
| 395 | |
| 396 /* at this point the subject cert has no pqg parameters and the | |
| 397 * issuer cert has a DSA public key. Update the issuer's | |
| 398 * pqg parameters with a recursive call to this same function. */ | |
| 399 | |
| 400 rv = seckey_UpdateCertPQGChain(issuerCert, count); | |
| 401 if (rv != SECSuccess) { | |
| 402 rv = SECFailure; | |
| 403 goto loser; | |
| 404 } | |
| 405 | |
| 406 /* ensure issuer has pqg parameters */ | |
| 407 | |
| 408 issuerSpki=&issuerCert->subjectPublicKeyInfo; | |
| 409 if (issuerSpki->algorithm.parameters.len == 0) { | |
| 410 rv = SECFailure; | |
| 411 } | |
| 412 | |
| 413 /* if update was successful and pqg params present, then copy the | |
| 414 * parameters to the subject cert's key. */ | |
| 415 | |
| 416 if (rv == SECSuccess) { | |
| 417 rv = SECITEM_CopyItem(subjectCert->arena, | |
| 418 &subjectSpki->algorithm.parameters, | |
| 419 &issuerSpki->algorithm.parameters); | |
| 420 } | |
| 421 | |
| 422 loser: | |
| 423 if (issuerCert) { | |
| 424 CERT_DestroyCertificate(issuerCert); | |
| 425 } | |
| 426 return rv; | |
| 427 | |
| 428 } | |
| 429 | |
| 430 | |
| 431 SECStatus | |
| 432 SECKEY_UpdateCertPQG(CERTCertificate * subjectCert) | |
| 433 { | |
| 434 if (!subjectCert) { | |
| 435 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 436 return SECFailure; | |
| 437 } | |
| 438 return seckey_UpdateCertPQGChain(subjectCert,0); | |
| 439 } | |
| 440 | |
| 441 | |
| 442 /* Decode the DSA PQG parameters. The params could be stored in two | |
| 443 * possible formats, the old fortezza-only wrapped format or | |
| 444 * the normal standard format. Store the decoded parameters in | |
| 445 * a V3 certificate data structure. */ | |
| 446 | |
| 447 SECStatus | |
| 448 SECKEY_DSADecodePQG(PRArenaPool *arena, SECKEYPublicKey *pubk, SECItem *params)
{ | |
| 449 SECStatus rv; | |
| 450 SECItem newparams; | |
| 451 | |
| 452 if (params == NULL) return SECFailure; | |
| 453 | |
| 454 if (params->data == NULL) return SECFailure; | |
| 455 | |
| 456 PORT_Assert(arena); | |
| 457 | |
| 458 /* make a copy of the data into the arena so QuickDER output is valid */ | |
| 459 rv = SECITEM_CopyItem(arena, &newparams, params); | |
| 460 | |
| 461 /* Check if params use the standard format. | |
| 462 * The value 0xa1 will appear in the first byte of the parameter data | |
| 463 * if the PQG parameters are not using the standard format. This | |
| 464 * code should be changed to use a better method to detect non-standard | |
| 465 * parameters. */ | |
| 466 | |
| 467 if ((newparams.data[0] != 0xa1) && | |
| 468 (newparams.data[0] != 0xa0)) { | |
| 469 | |
| 470 if (SECSuccess == rv) { | |
| 471 /* PQG params are in the standard format */ | |
| 472 prepare_pqg_params_for_asn1(&pubk->u.dsa.params); | |
| 473 rv = SEC_QuickDERDecodeItem(arena, &pubk->u.dsa.params, | |
| 474 SECKEY_PQGParamsTemplate, | |
| 475 &newparams); | |
| 476 } | |
| 477 } else { | |
| 478 | |
| 479 if (SECSuccess == rv) { | |
| 480 /* else the old fortezza-only wrapped format is used. */ | |
| 481 PORT_SetError(SEC_ERROR_BAD_DER); | |
| 482 rv = SECFailure; | |
| 483 } | |
| 484 } | |
| 485 return rv; | |
| 486 } | |
| 487 | |
| 488 | |
| 489 /* Function used to make an oid tag to a key type */ | |
| 490 KeyType | |
| 491 seckey_GetKeyType (SECOidTag tag) { | |
| 492 KeyType keyType; | |
| 493 | |
| 494 switch (tag) { | |
| 495 case SEC_OID_X500_RSA_ENCRYPTION: | |
| 496 case SEC_OID_PKCS1_RSA_ENCRYPTION: | |
| 497 keyType = rsaKey; | |
| 498 break; | |
| 499 case SEC_OID_PKCS1_RSA_PSS_SIGNATURE: | |
| 500 keyType = rsaPssKey; | |
| 501 break; | |
| 502 case SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION: | |
| 503 keyType = rsaOaepKey; | |
| 504 break; | |
| 505 case SEC_OID_ANSIX9_DSA_SIGNATURE: | |
| 506 keyType = dsaKey; | |
| 507 break; | |
| 508 case SEC_OID_MISSI_KEA_DSS_OLD: | |
| 509 case SEC_OID_MISSI_KEA_DSS: | |
| 510 case SEC_OID_MISSI_DSS_OLD: | |
| 511 case SEC_OID_MISSI_DSS: | |
| 512 keyType = fortezzaKey; | |
| 513 break; | |
| 514 case SEC_OID_MISSI_KEA: | |
| 515 case SEC_OID_MISSI_ALT_KEA: | |
| 516 keyType = keaKey; | |
| 517 break; | |
| 518 case SEC_OID_X942_DIFFIE_HELMAN_KEY: | |
| 519 keyType = dhKey; | |
| 520 break; | |
| 521 case SEC_OID_ANSIX962_EC_PUBLIC_KEY: | |
| 522 keyType = ecKey; | |
| 523 break; | |
| 524 /* accommodate applications that hand us a signature type when they | |
| 525 * should be handing us a cipher type */ | |
| 526 case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION: | |
| 527 case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION: | |
| 528 case SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION: | |
| 529 case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION: | |
| 530 case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION: | |
| 531 case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION: | |
| 532 keyType = rsaKey; | |
| 533 break; | |
| 534 default: | |
| 535 keyType = nullKey; | |
| 536 } | |
| 537 return keyType; | |
| 538 } | |
| 539 | |
| 540 /* Function used to determine what kind of cert we are dealing with. */ | |
| 541 KeyType | |
| 542 CERT_GetCertKeyType (CERTSubjectPublicKeyInfo *spki) | |
| 543 { | |
| 544 return seckey_GetKeyType(SECOID_GetAlgorithmTag(&spki->algorithm)); | |
| 545 } | |
| 546 | |
| 547 static SECKEYPublicKey * | |
| 548 seckey_ExtractPublicKey(CERTSubjectPublicKeyInfo *spki) | |
| 549 { | |
| 550 SECKEYPublicKey *pubk; | |
| 551 SECItem os, newOs, newParms; | |
| 552 SECStatus rv; | |
| 553 PRArenaPool *arena; | |
| 554 SECOidTag tag; | |
| 555 | |
| 556 arena = PORT_NewArena (DER_DEFAULT_CHUNKSIZE); | |
| 557 if (arena == NULL) | |
| 558 return NULL; | |
| 559 | |
| 560 pubk = (SECKEYPublicKey *) PORT_ArenaZAlloc(arena, sizeof(SECKEYPublicKey)); | |
| 561 if (pubk == NULL) { | |
| 562 PORT_FreeArena (arena, PR_FALSE); | |
| 563 return NULL; | |
| 564 } | |
| 565 | |
| 566 pubk->arena = arena; | |
| 567 pubk->pkcs11Slot = 0; | |
| 568 pubk->pkcs11ID = CK_INVALID_HANDLE; | |
| 569 | |
| 570 | |
| 571 /* Convert bit string length from bits to bytes */ | |
| 572 os = spki->subjectPublicKey; | |
| 573 DER_ConvertBitString (&os); | |
| 574 | |
| 575 tag = SECOID_GetAlgorithmTag(&spki->algorithm); | |
| 576 | |
| 577 /* copy the DER into the arena, since Quick DER returns data that points | |
| 578 into the DER input, which may get freed by the caller */ | |
| 579 rv = SECITEM_CopyItem(arena, &newOs, &os); | |
| 580 if ( rv == SECSuccess ) | |
| 581 switch ( tag ) { | |
| 582 case SEC_OID_X500_RSA_ENCRYPTION: | |
| 583 case SEC_OID_PKCS1_RSA_ENCRYPTION: | |
| 584 pubk->keyType = rsaKey; | |
| 585 prepare_rsa_pub_key_for_asn1(pubk); | |
| 586 rv = SEC_QuickDERDecodeItem(arena, pubk, SECKEY_RSAPublicKeyTemplate, &n
ewOs); | |
| 587 if (rv == SECSuccess) | |
| 588 return pubk; | |
| 589 break; | |
| 590 case SEC_OID_ANSIX9_DSA_SIGNATURE: | |
| 591 case SEC_OID_SDN702_DSA_SIGNATURE: | |
| 592 pubk->keyType = dsaKey; | |
| 593 prepare_dsa_pub_key_for_asn1(pubk); | |
| 594 rv = SEC_QuickDERDecodeItem(arena, pubk, SECKEY_DSAPublicKeyTemplate, &n
ewOs); | |
| 595 if (rv != SECSuccess) break; | |
| 596 | |
| 597 rv = SECKEY_DSADecodePQG(arena, pubk, | |
| 598 &spki->algorithm.parameters); | |
| 599 | |
| 600 if (rv == SECSuccess) return pubk; | |
| 601 break; | |
| 602 case SEC_OID_X942_DIFFIE_HELMAN_KEY: | |
| 603 pubk->keyType = dhKey; | |
| 604 prepare_dh_pub_key_for_asn1(pubk); | |
| 605 rv = SEC_QuickDERDecodeItem(arena, pubk, SECKEY_DHPublicKeyTemplate, &ne
wOs); | |
| 606 if (rv != SECSuccess) break; | |
| 607 | |
| 608 /* copy the DER into the arena, since Quick DER returns data that points | |
| 609 into the DER input, which may get freed by the caller */ | |
| 610 rv = SECITEM_CopyItem(arena, &newParms, &spki->algorithm.parameters); | |
| 611 if ( rv != SECSuccess ) | |
| 612 break; | |
| 613 | |
| 614 rv = SEC_QuickDERDecodeItem(arena, pubk, SECKEY_DHParamKeyTemplate, | |
| 615 &newParms); | |
| 616 | |
| 617 if (rv == SECSuccess) return pubk; | |
| 618 break; | |
| 619 case SEC_OID_ANSIX962_EC_PUBLIC_KEY: | |
| 620 pubk->keyType = ecKey; | |
| 621 pubk->u.ec.size = 0; | |
| 622 | |
| 623 /* Since PKCS#11 directly takes the DER encoding of EC params | |
| 624 * and public value, we don't need any decoding here. | |
| 625 */ | |
| 626 rv = SECITEM_CopyItem(arena, &pubk->u.ec.DEREncodedParams, | |
| 627 &spki->algorithm.parameters); | |
| 628 if ( rv != SECSuccess ) | |
| 629 break; | |
| 630 rv = SECITEM_CopyItem(arena, &pubk->u.ec.publicValue, &newOs); | |
| 631 if (rv == SECSuccess) return pubk; | |
| 632 break; | |
| 633 | |
| 634 default: | |
| 635 PORT_SetError(SEC_ERROR_UNSUPPORTED_KEYALG); | |
| 636 rv = SECFailure; | |
| 637 break; | |
| 638 } | |
| 639 | |
| 640 SECKEY_DestroyPublicKey (pubk); | |
| 641 return NULL; | |
| 642 } | |
| 643 | |
| 644 | |
| 645 /* required for JSS */ | |
| 646 SECKEYPublicKey * | |
| 647 SECKEY_ExtractPublicKey(CERTSubjectPublicKeyInfo *spki) | |
| 648 { | |
| 649 return seckey_ExtractPublicKey(spki); | |
| 650 } | |
| 651 | |
| 652 SECKEYPublicKey * | |
| 653 CERT_ExtractPublicKey(CERTCertificate *cert) | |
| 654 { | |
| 655 SECStatus rv; | |
| 656 | |
| 657 if (!cert) { | |
| 658 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 659 return NULL; | |
| 660 } | |
| 661 rv = SECKEY_UpdateCertPQG(cert); | |
| 662 if (rv != SECSuccess) return NULL; | |
| 663 | |
| 664 return seckey_ExtractPublicKey(&cert->subjectPublicKeyInfo); | |
| 665 } | |
| 666 | |
| 667 int | |
| 668 SECKEY_ECParamsToKeySize(const SECItem *encodedParams) | |
| 669 { | |
| 670 SECOidTag tag; | |
| 671 SECItem oid = { siBuffer, NULL, 0}; | |
| 672 | |
| 673 /* The encodedParams data contains 0x06 (SEC_ASN1_OBJECT_ID), | |
| 674 * followed by the length of the curve oid and the curve oid. | |
| 675 */ | |
| 676 oid.len = encodedParams->data[1]; | |
| 677 oid.data = encodedParams->data + 2; | |
| 678 if ((tag = SECOID_FindOIDTag(&oid)) == SEC_OID_UNKNOWN) | |
| 679 return 0; | |
| 680 | |
| 681 switch (tag) { | |
| 682 case SEC_OID_SECG_EC_SECP112R1: | |
| 683 case SEC_OID_SECG_EC_SECP112R2: | |
| 684 return 112; | |
| 685 | |
| 686 case SEC_OID_SECG_EC_SECT113R1: | |
| 687 case SEC_OID_SECG_EC_SECT113R2: | |
| 688 return 113; | |
| 689 | |
| 690 case SEC_OID_SECG_EC_SECP128R1: | |
| 691 case SEC_OID_SECG_EC_SECP128R2: | |
| 692 return 128; | |
| 693 | |
| 694 case SEC_OID_SECG_EC_SECT131R1: | |
| 695 case SEC_OID_SECG_EC_SECT131R2: | |
| 696 return 131; | |
| 697 | |
| 698 case SEC_OID_SECG_EC_SECP160K1: | |
| 699 case SEC_OID_SECG_EC_SECP160R1: | |
| 700 case SEC_OID_SECG_EC_SECP160R2: | |
| 701 return 160; | |
| 702 | |
| 703 case SEC_OID_SECG_EC_SECT163K1: | |
| 704 case SEC_OID_SECG_EC_SECT163R1: | |
| 705 case SEC_OID_SECG_EC_SECT163R2: | |
| 706 case SEC_OID_ANSIX962_EC_C2PNB163V1: | |
| 707 case SEC_OID_ANSIX962_EC_C2PNB163V2: | |
| 708 case SEC_OID_ANSIX962_EC_C2PNB163V3: | |
| 709 return 163; | |
| 710 | |
| 711 case SEC_OID_ANSIX962_EC_C2PNB176V1: | |
| 712 return 176; | |
| 713 | |
| 714 case SEC_OID_ANSIX962_EC_C2TNB191V1: | |
| 715 case SEC_OID_ANSIX962_EC_C2TNB191V2: | |
| 716 case SEC_OID_ANSIX962_EC_C2TNB191V3: | |
| 717 case SEC_OID_ANSIX962_EC_C2ONB191V4: | |
| 718 case SEC_OID_ANSIX962_EC_C2ONB191V5: | |
| 719 return 191; | |
| 720 | |
| 721 case SEC_OID_SECG_EC_SECP192K1: | |
| 722 case SEC_OID_ANSIX962_EC_PRIME192V1: | |
| 723 case SEC_OID_ANSIX962_EC_PRIME192V2: | |
| 724 case SEC_OID_ANSIX962_EC_PRIME192V3: | |
| 725 return 192; | |
| 726 | |
| 727 case SEC_OID_SECG_EC_SECT193R1: | |
| 728 case SEC_OID_SECG_EC_SECT193R2: | |
| 729 return 193; | |
| 730 | |
| 731 case SEC_OID_ANSIX962_EC_C2PNB208W1: | |
| 732 return 208; | |
| 733 | |
| 734 case SEC_OID_SECG_EC_SECP224K1: | |
| 735 case SEC_OID_SECG_EC_SECP224R1: | |
| 736 return 224; | |
| 737 | |
| 738 case SEC_OID_SECG_EC_SECT233K1: | |
| 739 case SEC_OID_SECG_EC_SECT233R1: | |
| 740 return 233; | |
| 741 | |
| 742 case SEC_OID_SECG_EC_SECT239K1: | |
| 743 case SEC_OID_ANSIX962_EC_C2TNB239V1: | |
| 744 case SEC_OID_ANSIX962_EC_C2TNB239V2: | |
| 745 case SEC_OID_ANSIX962_EC_C2TNB239V3: | |
| 746 case SEC_OID_ANSIX962_EC_C2ONB239V4: | |
| 747 case SEC_OID_ANSIX962_EC_C2ONB239V5: | |
| 748 case SEC_OID_ANSIX962_EC_PRIME239V1: | |
| 749 case SEC_OID_ANSIX962_EC_PRIME239V2: | |
| 750 case SEC_OID_ANSIX962_EC_PRIME239V3: | |
| 751 return 239; | |
| 752 | |
| 753 case SEC_OID_SECG_EC_SECP256K1: | |
| 754 case SEC_OID_ANSIX962_EC_PRIME256V1: | |
| 755 return 256; | |
| 756 | |
| 757 case SEC_OID_ANSIX962_EC_C2PNB272W1: | |
| 758 return 272; | |
| 759 | |
| 760 case SEC_OID_SECG_EC_SECT283K1: | |
| 761 case SEC_OID_SECG_EC_SECT283R1: | |
| 762 return 283; | |
| 763 | |
| 764 case SEC_OID_ANSIX962_EC_C2PNB304W1: | |
| 765 return 304; | |
| 766 | |
| 767 case SEC_OID_ANSIX962_EC_C2TNB359V1: | |
| 768 return 359; | |
| 769 | |
| 770 case SEC_OID_ANSIX962_EC_C2PNB368W1: | |
| 771 return 368; | |
| 772 | |
| 773 case SEC_OID_SECG_EC_SECP384R1: | |
| 774 return 384; | |
| 775 | |
| 776 case SEC_OID_SECG_EC_SECT409K1: | |
| 777 case SEC_OID_SECG_EC_SECT409R1: | |
| 778 return 409; | |
| 779 | |
| 780 case SEC_OID_ANSIX962_EC_C2TNB431R1: | |
| 781 return 431; | |
| 782 | |
| 783 case SEC_OID_SECG_EC_SECP521R1: | |
| 784 return 521; | |
| 785 | |
| 786 case SEC_OID_SECG_EC_SECT571K1: | |
| 787 case SEC_OID_SECG_EC_SECT571R1: | |
| 788 return 571; | |
| 789 | |
| 790 default: | |
| 791 PORT_SetError(SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE); | |
| 792 return 0; | |
| 793 } | |
| 794 } | |
| 795 | |
| 796 int | |
| 797 SECKEY_ECParamsToBasePointOrderLen(const SECItem *encodedParams) | |
| 798 { | |
| 799 SECOidTag tag; | |
| 800 SECItem oid = { siBuffer, NULL, 0}; | |
| 801 | |
| 802 /* The encodedParams data contains 0x06 (SEC_ASN1_OBJECT_ID), | |
| 803 * followed by the length of the curve oid and the curve oid. | |
| 804 */ | |
| 805 oid.len = encodedParams->data[1]; | |
| 806 oid.data = encodedParams->data + 2; | |
| 807 if ((tag = SECOID_FindOIDTag(&oid)) == SEC_OID_UNKNOWN) | |
| 808 return 0; | |
| 809 | |
| 810 switch (tag) { | |
| 811 case SEC_OID_SECG_EC_SECP112R1: | |
| 812 return 112; | |
| 813 case SEC_OID_SECG_EC_SECP112R2: | |
| 814 return 110; | |
| 815 | |
| 816 case SEC_OID_SECG_EC_SECT113R1: | |
| 817 case SEC_OID_SECG_EC_SECT113R2: | |
| 818 return 113; | |
| 819 | |
| 820 case SEC_OID_SECG_EC_SECP128R1: | |
| 821 return 128; | |
| 822 case SEC_OID_SECG_EC_SECP128R2: | |
| 823 return 126; | |
| 824 | |
| 825 case SEC_OID_SECG_EC_SECT131R1: | |
| 826 case SEC_OID_SECG_EC_SECT131R2: | |
| 827 return 131; | |
| 828 | |
| 829 case SEC_OID_SECG_EC_SECP160K1: | |
| 830 case SEC_OID_SECG_EC_SECP160R1: | |
| 831 case SEC_OID_SECG_EC_SECP160R2: | |
| 832 return 161; | |
| 833 | |
| 834 case SEC_OID_SECG_EC_SECT163K1: | |
| 835 return 163; | |
| 836 case SEC_OID_SECG_EC_SECT163R1: | |
| 837 return 162; | |
| 838 case SEC_OID_SECG_EC_SECT163R2: | |
| 839 case SEC_OID_ANSIX962_EC_C2PNB163V1: | |
| 840 return 163; | |
| 841 case SEC_OID_ANSIX962_EC_C2PNB163V2: | |
| 842 case SEC_OID_ANSIX962_EC_C2PNB163V3: | |
| 843 return 162; | |
| 844 | |
| 845 case SEC_OID_ANSIX962_EC_C2PNB176V1: | |
| 846 return 161; | |
| 847 | |
| 848 case SEC_OID_ANSIX962_EC_C2TNB191V1: | |
| 849 return 191; | |
| 850 case SEC_OID_ANSIX962_EC_C2TNB191V2: | |
| 851 return 190; | |
| 852 case SEC_OID_ANSIX962_EC_C2TNB191V3: | |
| 853 return 189; | |
| 854 case SEC_OID_ANSIX962_EC_C2ONB191V4: | |
| 855 return 191; | |
| 856 case SEC_OID_ANSIX962_EC_C2ONB191V5: | |
| 857 return 188; | |
| 858 | |
| 859 case SEC_OID_SECG_EC_SECP192K1: | |
| 860 case SEC_OID_ANSIX962_EC_PRIME192V1: | |
| 861 case SEC_OID_ANSIX962_EC_PRIME192V2: | |
| 862 case SEC_OID_ANSIX962_EC_PRIME192V3: | |
| 863 return 192; | |
| 864 | |
| 865 case SEC_OID_SECG_EC_SECT193R1: | |
| 866 case SEC_OID_SECG_EC_SECT193R2: | |
| 867 return 193; | |
| 868 | |
| 869 case SEC_OID_ANSIX962_EC_C2PNB208W1: | |
| 870 return 193; | |
| 871 | |
| 872 case SEC_OID_SECG_EC_SECP224K1: | |
| 873 return 225; | |
| 874 case SEC_OID_SECG_EC_SECP224R1: | |
| 875 return 224; | |
| 876 | |
| 877 case SEC_OID_SECG_EC_SECT233K1: | |
| 878 return 232; | |
| 879 case SEC_OID_SECG_EC_SECT233R1: | |
| 880 return 233; | |
| 881 | |
| 882 case SEC_OID_SECG_EC_SECT239K1: | |
| 883 case SEC_OID_ANSIX962_EC_C2TNB239V1: | |
| 884 return 238; | |
| 885 case SEC_OID_ANSIX962_EC_C2TNB239V2: | |
| 886 return 237; | |
| 887 case SEC_OID_ANSIX962_EC_C2TNB239V3: | |
| 888 return 236; | |
| 889 case SEC_OID_ANSIX962_EC_C2ONB239V4: | |
| 890 return 238; | |
| 891 case SEC_OID_ANSIX962_EC_C2ONB239V5: | |
| 892 return 237; | |
| 893 case SEC_OID_ANSIX962_EC_PRIME239V1: | |
| 894 case SEC_OID_ANSIX962_EC_PRIME239V2: | |
| 895 case SEC_OID_ANSIX962_EC_PRIME239V3: | |
| 896 return 239; | |
| 897 | |
| 898 case SEC_OID_SECG_EC_SECP256K1: | |
| 899 case SEC_OID_ANSIX962_EC_PRIME256V1: | |
| 900 return 256; | |
| 901 | |
| 902 case SEC_OID_ANSIX962_EC_C2PNB272W1: | |
| 903 return 257; | |
| 904 | |
| 905 case SEC_OID_SECG_EC_SECT283K1: | |
| 906 return 281; | |
| 907 case SEC_OID_SECG_EC_SECT283R1: | |
| 908 return 282; | |
| 909 | |
| 910 case SEC_OID_ANSIX962_EC_C2PNB304W1: | |
| 911 return 289; | |
| 912 | |
| 913 case SEC_OID_ANSIX962_EC_C2TNB359V1: | |
| 914 return 353; | |
| 915 | |
| 916 case SEC_OID_ANSIX962_EC_C2PNB368W1: | |
| 917 return 353; | |
| 918 | |
| 919 case SEC_OID_SECG_EC_SECP384R1: | |
| 920 return 384; | |
| 921 | |
| 922 case SEC_OID_SECG_EC_SECT409K1: | |
| 923 return 407; | |
| 924 case SEC_OID_SECG_EC_SECT409R1: | |
| 925 return 409; | |
| 926 | |
| 927 case SEC_OID_ANSIX962_EC_C2TNB431R1: | |
| 928 return 418; | |
| 929 | |
| 930 case SEC_OID_SECG_EC_SECP521R1: | |
| 931 return 521; | |
| 932 | |
| 933 case SEC_OID_SECG_EC_SECT571K1: | |
| 934 case SEC_OID_SECG_EC_SECT571R1: | |
| 935 return 570; | |
| 936 | |
| 937 default: | |
| 938 PORT_SetError(SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE); | |
| 939 return 0; | |
| 940 } | |
| 941 } | |
| 942 | |
| 943 /* returns key strength in bytes (not bits) */ | |
| 944 unsigned | |
| 945 SECKEY_PublicKeyStrength(const SECKEYPublicKey *pubk) | |
| 946 { | |
| 947 unsigned char b0; | |
| 948 unsigned size; | |
| 949 | |
| 950 /* interpret modulus length as key strength */ | |
| 951 if (!pubk) | |
| 952 goto loser; | |
| 953 switch (pubk->keyType) { | |
| 954 case rsaKey: | |
| 955 if (!pubk->u.rsa.modulus.data) break; | |
| 956 b0 = pubk->u.rsa.modulus.data[0]; | |
| 957 return b0 ? pubk->u.rsa.modulus.len : pubk->u.rsa.modulus.len - 1; | |
| 958 case dsaKey: | |
| 959 if (!pubk->u.dsa.publicValue.data) break; | |
| 960 b0 = pubk->u.dsa.publicValue.data[0]; | |
| 961 return b0 ? pubk->u.dsa.publicValue.len : | |
| 962 pubk->u.dsa.publicValue.len - 1; | |
| 963 case dhKey: | |
| 964 if (!pubk->u.dh.publicValue.data) break; | |
| 965 b0 = pubk->u.dh.publicValue.data[0]; | |
| 966 return b0 ? pubk->u.dh.publicValue.len : | |
| 967 pubk->u.dh.publicValue.len - 1; | |
| 968 case ecKey: | |
| 969 /* Get the key size in bits and adjust */ | |
| 970 size = SECKEY_ECParamsToKeySize(&pubk->u.ec.DEREncodedParams); | |
| 971 return (size + 7)/8; | |
| 972 default: | |
| 973 break; | |
| 974 } | |
| 975 loser: | |
| 976 PORT_SetError(SEC_ERROR_INVALID_KEY); | |
| 977 return 0; | |
| 978 } | |
| 979 | |
| 980 /* returns key strength in bits */ | |
| 981 unsigned | |
| 982 SECKEY_PublicKeyStrengthInBits(const SECKEYPublicKey *pubk) | |
| 983 { | |
| 984 unsigned size; | |
| 985 switch (pubk->keyType) { | |
| 986 case rsaKey: | |
| 987 case dsaKey: | |
| 988 case dhKey: | |
| 989 return SECKEY_PublicKeyStrength(pubk) * 8; /* 1 byte = 8 bits */ | |
| 990 case ecKey: | |
| 991 size = SECKEY_ECParamsToKeySize(&pubk->u.ec.DEREncodedParams); | |
| 992 return size; | |
| 993 default: | |
| 994 break; | |
| 995 } | |
| 996 PORT_SetError(SEC_ERROR_INVALID_KEY); | |
| 997 return 0; | |
| 998 } | |
| 999 | |
| 1000 /* returns signature length in bytes (not bits) */ | |
| 1001 unsigned | |
| 1002 SECKEY_SignatureLen(const SECKEYPublicKey *pubk) | |
| 1003 { | |
| 1004 unsigned char b0; | |
| 1005 unsigned size; | |
| 1006 | |
| 1007 switch (pubk->keyType) { | |
| 1008 case rsaKey: | |
| 1009 b0 = pubk->u.rsa.modulus.data[0]; | |
| 1010 return b0 ? pubk->u.rsa.modulus.len : pubk->u.rsa.modulus.len - 1; | |
| 1011 case dsaKey: | |
| 1012 return pubk->u.dsa.params.subPrime.len * 2; | |
| 1013 case ecKey: | |
| 1014 /* Get the base point order length in bits and adjust */ | |
| 1015 size = SECKEY_ECParamsToBasePointOrderLen( | |
| 1016 &pubk->u.ec.DEREncodedParams); | |
| 1017 return ((size + 7)/8) * 2; | |
| 1018 default: | |
| 1019 break; | |
| 1020 } | |
| 1021 PORT_SetError(SEC_ERROR_INVALID_KEY); | |
| 1022 return 0; | |
| 1023 } | |
| 1024 | |
| 1025 SECKEYPrivateKey * | |
| 1026 SECKEY_CopyPrivateKey(const SECKEYPrivateKey *privk) | |
| 1027 { | |
| 1028 SECKEYPrivateKey *copyk; | |
| 1029 PRArenaPool *arena; | |
| 1030 | |
| 1031 if (!privk || !privk->pkcs11Slot) { | |
| 1032 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 1033 return NULL; | |
| 1034 } | |
| 1035 | |
| 1036 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1037 if (arena == NULL) { | |
| 1038 return NULL; | |
| 1039 } | |
| 1040 | |
| 1041 copyk = (SECKEYPrivateKey *) PORT_ArenaZAlloc (arena, sizeof (SECKEYPrivateK
ey)); | |
| 1042 if (copyk) { | |
| 1043 copyk->arena = arena; | |
| 1044 copyk->keyType = privk->keyType; | |
| 1045 | |
| 1046 /* copy the PKCS #11 parameters */ | |
| 1047 copyk->pkcs11Slot = PK11_ReferenceSlot(privk->pkcs11Slot); | |
| 1048 /* if the key we're referencing was a temparary key we have just | |
| 1049 * created, that we want to go away when we're through, we need | |
| 1050 * to make a copy of it */ | |
| 1051 if (privk->pkcs11IsTemp) { | |
| 1052 copyk->pkcs11ID = | |
| 1053 PK11_CopyKey(privk->pkcs11Slot,privk->pkcs11ID); | |
| 1054 if (copyk->pkcs11ID == CK_INVALID_HANDLE) goto fail; | |
| 1055 } else { | |
| 1056 copyk->pkcs11ID = privk->pkcs11ID; | |
| 1057 } | |
| 1058 copyk->pkcs11IsTemp = privk->pkcs11IsTemp; | |
| 1059 copyk->wincx = privk->wincx; | |
| 1060 copyk->staticflags = privk->staticflags; | |
| 1061 return copyk; | |
| 1062 } else { | |
| 1063 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1064 } | |
| 1065 | |
| 1066 fail: | |
| 1067 PORT_FreeArena (arena, PR_FALSE); | |
| 1068 return NULL; | |
| 1069 } | |
| 1070 | |
| 1071 SECKEYPublicKey * | |
| 1072 SECKEY_CopyPublicKey(const SECKEYPublicKey *pubk) | |
| 1073 { | |
| 1074 SECKEYPublicKey *copyk; | |
| 1075 PRArenaPool *arena; | |
| 1076 SECStatus rv = SECSuccess; | |
| 1077 | |
| 1078 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1079 if (arena == NULL) { | |
| 1080 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1081 return NULL; | |
| 1082 } | |
| 1083 | |
| 1084 copyk = (SECKEYPublicKey *) PORT_ArenaZAlloc (arena, sizeof (SECKEYPublicKey
)); | |
| 1085 if (!copyk) { | |
| 1086 PORT_FreeArena (arena, PR_FALSE); | |
| 1087 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1088 return NULL; | |
| 1089 } | |
| 1090 | |
| 1091 copyk->arena = arena; | |
| 1092 copyk->keyType = pubk->keyType; | |
| 1093 if (pubk->pkcs11Slot && | |
| 1094 PK11_IsPermObject(pubk->pkcs11Slot,pubk->pkcs11ID)) { | |
| 1095 copyk->pkcs11Slot = PK11_ReferenceSlot(pubk->pkcs11Slot); | |
| 1096 copyk->pkcs11ID = pubk->pkcs11ID; | |
| 1097 } else { | |
| 1098 copyk->pkcs11Slot = NULL; /* go get own reference */ | |
| 1099 copyk->pkcs11ID = CK_INVALID_HANDLE; | |
| 1100 } | |
| 1101 switch (pubk->keyType) { | |
| 1102 case rsaKey: | |
| 1103 rv = SECITEM_CopyItem(arena, ©k->u.rsa.modulus, | |
| 1104 &pubk->u.rsa.modulus); | |
| 1105 if (rv == SECSuccess) { | |
| 1106 rv = SECITEM_CopyItem (arena, ©k->u.rsa.publicExponent, | |
| 1107 &pubk->u.rsa.publicExponent); | |
| 1108 if (rv == SECSuccess) | |
| 1109 return copyk; | |
| 1110 } | |
| 1111 break; | |
| 1112 case dsaKey: | |
| 1113 rv = SECITEM_CopyItem(arena, ©k->u.dsa.publicValue, | |
| 1114 &pubk->u.dsa.publicValue); | |
| 1115 if (rv != SECSuccess) break; | |
| 1116 rv = SECITEM_CopyItem(arena, ©k->u.dsa.params.prime, | |
| 1117 &pubk->u.dsa.params.prime); | |
| 1118 if (rv != SECSuccess) break; | |
| 1119 rv = SECITEM_CopyItem(arena, ©k->u.dsa.params.subPrime, | |
| 1120 &pubk->u.dsa.params.subPrime); | |
| 1121 if (rv != SECSuccess) break; | |
| 1122 rv = SECITEM_CopyItem(arena, ©k->u.dsa.params.base, | |
| 1123 &pubk->u.dsa.params.base); | |
| 1124 break; | |
| 1125 case dhKey: | |
| 1126 rv = SECITEM_CopyItem(arena,©k->u.dh.prime,&pubk->u.dh.prime); | |
| 1127 if (rv != SECSuccess) break; | |
| 1128 rv = SECITEM_CopyItem(arena,©k->u.dh.base,&pubk->u.dh.base); | |
| 1129 if (rv != SECSuccess) break; | |
| 1130 rv = SECITEM_CopyItem(arena, ©k->u.dh.publicValue, | |
| 1131 &pubk->u.dh.publicValue); | |
| 1132 break; | |
| 1133 case ecKey: | |
| 1134 copyk->u.ec.size = pubk->u.ec.size; | |
| 1135 rv = SECITEM_CopyItem(arena,©k->u.ec.DEREncodedParams, | |
| 1136 &pubk->u.ec.DEREncodedParams); | |
| 1137 if (rv != SECSuccess) break; | |
| 1138 rv = SECITEM_CopyItem(arena,©k->u.ec.publicValue, | |
| 1139 &pubk->u.ec.publicValue); | |
| 1140 break; | |
| 1141 case nullKey: | |
| 1142 return copyk; | |
| 1143 default: | |
| 1144 PORT_SetError(SEC_ERROR_INVALID_KEY); | |
| 1145 rv = SECFailure; | |
| 1146 break; | |
| 1147 } | |
| 1148 if (rv == SECSuccess) | |
| 1149 return copyk; | |
| 1150 | |
| 1151 SECKEY_DestroyPublicKey (copyk); | |
| 1152 return NULL; | |
| 1153 } | |
| 1154 | |
| 1155 | |
| 1156 SECKEYPublicKey * | |
| 1157 SECKEY_ConvertToPublicKey(SECKEYPrivateKey *privk) | |
| 1158 { | |
| 1159 SECKEYPublicKey *pubk; | |
| 1160 PRArenaPool *arena; | |
| 1161 CERTCertificate *cert; | |
| 1162 SECStatus rv; | |
| 1163 | |
| 1164 /* | |
| 1165 * First try to look up the cert. | |
| 1166 */ | |
| 1167 cert = PK11_GetCertFromPrivateKey(privk); | |
| 1168 if (cert) { | |
| 1169 pubk = CERT_ExtractPublicKey(cert); | |
| 1170 CERT_DestroyCertificate(cert); | |
| 1171 return pubk; | |
| 1172 } | |
| 1173 | |
| 1174 /* couldn't find the cert, build pub key by hand */ | |
| 1175 arena = PORT_NewArena (DER_DEFAULT_CHUNKSIZE); | |
| 1176 if (arena == NULL) { | |
| 1177 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1178 return NULL; | |
| 1179 } | |
| 1180 pubk = (SECKEYPublicKey *)PORT_ArenaZAlloc(arena, | |
| 1181 sizeof (SECKEYPublicKey)); | |
| 1182 if (pubk == NULL) { | |
| 1183 PORT_FreeArena(arena,PR_FALSE); | |
| 1184 return NULL; | |
| 1185 } | |
| 1186 pubk->keyType = privk->keyType; | |
| 1187 pubk->pkcs11Slot = NULL; | |
| 1188 pubk->pkcs11ID = CK_INVALID_HANDLE; | |
| 1189 pubk->arena = arena; | |
| 1190 | |
| 1191 switch(privk->keyType) { | |
| 1192 case nullKey: | |
| 1193 case dhKey: | |
| 1194 case dsaKey: | |
| 1195 /* Nothing to query, if the cert isn't there, we're done -- no way | |
| 1196 * to get the public key */ | |
| 1197 break; | |
| 1198 case rsaKey: | |
| 1199 rv = PK11_ReadAttribute(privk->pkcs11Slot,privk->pkcs11ID, | |
| 1200 CKA_MODULUS,arena,&pubk->u.rsa.modulus); | |
| 1201 if (rv != SECSuccess) break; | |
| 1202 rv = PK11_ReadAttribute(privk->pkcs11Slot,privk->pkcs11ID, | |
| 1203 CKA_PUBLIC_EXPONENT,arena,&pubk->u.rsa.publicExponent); | |
| 1204 if (rv != SECSuccess) break; | |
| 1205 return pubk; | |
| 1206 break; | |
| 1207 default: | |
| 1208 break; | |
| 1209 } | |
| 1210 | |
| 1211 PORT_FreeArena (arena, PR_FALSE); | |
| 1212 return NULL; | |
| 1213 } | |
| 1214 | |
| 1215 CERTSubjectPublicKeyInfo * | |
| 1216 SECKEY_CreateSubjectPublicKeyInfo(SECKEYPublicKey *pubk) | |
| 1217 { | |
| 1218 CERTSubjectPublicKeyInfo *spki; | |
| 1219 PRArenaPool *arena; | |
| 1220 SECItem params = { siBuffer, NULL, 0 }; | |
| 1221 | |
| 1222 if (!pubk) { | |
| 1223 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 1224 return NULL; | |
| 1225 } | |
| 1226 | |
| 1227 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1228 if (arena == NULL) { | |
| 1229 PORT_SetError(SEC_ERROR_NO_MEMORY); | |
| 1230 return NULL; | |
| 1231 } | |
| 1232 | |
| 1233 spki = (CERTSubjectPublicKeyInfo *) PORT_ArenaZAlloc(arena, sizeof (*spki)); | |
| 1234 if (spki != NULL) { | |
| 1235 SECStatus rv; | |
| 1236 SECItem *rv_item; | |
| 1237 | |
| 1238 spki->arena = arena; | |
| 1239 switch(pubk->keyType) { | |
| 1240 case rsaKey: | |
| 1241 rv = SECOID_SetAlgorithmID(arena, &spki->algorithm, | |
| 1242 SEC_OID_PKCS1_RSA_ENCRYPTION, 0); | |
| 1243 if (rv == SECSuccess) { | |
| 1244 /* | |
| 1245 * DER encode the public key into the subjectPublicKeyInfo. | |
| 1246 */ | |
| 1247 prepare_rsa_pub_key_for_asn1(pubk); | |
| 1248 rv_item = SEC_ASN1EncodeItem(arena, &spki->subjectPublicKey, | |
| 1249 pubk, SECKEY_RSAPublicKeyTemplate); | |
| 1250 if (rv_item != NULL) { | |
| 1251 /* | |
| 1252 * The stored value is supposed to be a BIT_STRING, | |
| 1253 * so convert the length. | |
| 1254 */ | |
| 1255 spki->subjectPublicKey.len <<= 3; | |
| 1256 /* | |
| 1257 * We got a good one; return it. | |
| 1258 */ | |
| 1259 return spki; | |
| 1260 } | |
| 1261 } | |
| 1262 break; | |
| 1263 case dsaKey: | |
| 1264 /* DER encode the params. */ | |
| 1265 prepare_pqg_params_for_asn1(&pubk->u.dsa.params); | |
| 1266 rv_item = SEC_ASN1EncodeItem(arena, ¶ms, &pubk->u.dsa.params, | |
| 1267 SECKEY_PQGParamsTemplate); | |
| 1268 if (rv_item != NULL) { | |
| 1269 rv = SECOID_SetAlgorithmID(arena, &spki->algorithm, | |
| 1270 SEC_OID_ANSIX9_DSA_SIGNATURE, | |
| 1271 ¶ms); | |
| 1272 if (rv == SECSuccess) { | |
| 1273 /* | |
| 1274 * DER encode the public key into the subjectPublicKeyInfo. | |
| 1275 */ | |
| 1276 prepare_dsa_pub_key_for_asn1(pubk); | |
| 1277 rv_item = SEC_ASN1EncodeItem(arena, &spki->subjectPublicKey, | |
| 1278 pubk, | |
| 1279 SECKEY_DSAPublicKeyTemplate); | |
| 1280 if (rv_item != NULL) { | |
| 1281 /* | |
| 1282 * The stored value is supposed to be a BIT_STRING, | |
| 1283 * so convert the length. | |
| 1284 */ | |
| 1285 spki->subjectPublicKey.len <<= 3; | |
| 1286 /* | |
| 1287 * We got a good one; return it. | |
| 1288 */ | |
| 1289 return spki; | |
| 1290 } | |
| 1291 } | |
| 1292 } | |
| 1293 SECITEM_FreeItem(¶ms, PR_FALSE); | |
| 1294 break; | |
| 1295 case ecKey: | |
| 1296 rv = SECITEM_CopyItem(arena, ¶ms, | |
| 1297 &pubk->u.ec.DEREncodedParams); | |
| 1298 if (rv != SECSuccess) break; | |
| 1299 | |
| 1300 rv = SECOID_SetAlgorithmID(arena, &spki->algorithm, | |
| 1301 SEC_OID_ANSIX962_EC_PUBLIC_KEY, | |
| 1302 ¶ms); | |
| 1303 if (rv != SECSuccess) break; | |
| 1304 | |
| 1305 rv = SECITEM_CopyItem(arena, &spki->subjectPublicKey, | |
| 1306 &pubk->u.ec.publicValue); | |
| 1307 | |
| 1308 if (rv == SECSuccess) { | |
| 1309 /* | |
| 1310 * The stored value is supposed to be a BIT_STRING, | |
| 1311 * so convert the length. | |
| 1312 */ | |
| 1313 spki->subjectPublicKey.len <<= 3; | |
| 1314 /* | |
| 1315 * We got a good one; return it. | |
| 1316 */ | |
| 1317 return spki; | |
| 1318 } | |
| 1319 break; | |
| 1320 case dhKey: /* later... */ | |
| 1321 | |
| 1322 break; | |
| 1323 default: | |
| 1324 break; | |
| 1325 } | |
| 1326 } else { | |
| 1327 PORT_SetError(SEC_ERROR_NO_MEMORY); | |
| 1328 } | |
| 1329 | |
| 1330 PORT_FreeArena(arena, PR_FALSE); | |
| 1331 return NULL; | |
| 1332 } | |
| 1333 | |
| 1334 void | |
| 1335 SECKEY_DestroySubjectPublicKeyInfo(CERTSubjectPublicKeyInfo *spki) | |
| 1336 { | |
| 1337 if (spki && spki->arena) { | |
| 1338 PORT_FreeArena(spki->arena, PR_FALSE); | |
| 1339 } | |
| 1340 } | |
| 1341 | |
| 1342 /* | |
| 1343 * this only works for RSA keys... need to do something | |
| 1344 * similiar to CERT_ExtractPublicKey for other key times. | |
| 1345 */ | |
| 1346 SECKEYPublicKey * | |
| 1347 SECKEY_DecodeDERPublicKey(SECItem *pubkder) | |
| 1348 { | |
| 1349 PRArenaPool *arena; | |
| 1350 SECKEYPublicKey *pubk; | |
| 1351 SECStatus rv; | |
| 1352 SECItem newPubkder; | |
| 1353 | |
| 1354 arena = PORT_NewArena (DER_DEFAULT_CHUNKSIZE); | |
| 1355 if (arena == NULL) { | |
| 1356 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1357 return NULL; | |
| 1358 } | |
| 1359 | |
| 1360 pubk = (SECKEYPublicKey *) PORT_ArenaZAlloc (arena, sizeof (SECKEYPublicKey)
); | |
| 1361 if (pubk != NULL) { | |
| 1362 pubk->arena = arena; | |
| 1363 pubk->pkcs11Slot = NULL; | |
| 1364 pubk->pkcs11ID = 0; | |
| 1365 prepare_rsa_pub_key_for_asn1(pubk); | |
| 1366 /* copy the DER into the arena, since Quick DER returns data that points | |
| 1367 into the DER input, which may get freed by the caller */ | |
| 1368 rv = SECITEM_CopyItem(arena, &newPubkder, pubkder); | |
| 1369 if ( rv == SECSuccess ) { | |
| 1370 rv = SEC_QuickDERDecodeItem(arena, pubk, SECKEY_RSAPublicKeyTemplate
, | |
| 1371 &newPubkder); | |
| 1372 } | |
| 1373 if (rv == SECSuccess) | |
| 1374 return pubk; | |
| 1375 SECKEY_DestroyPublicKey (pubk); | |
| 1376 } else { | |
| 1377 PORT_SetError (SEC_ERROR_NO_MEMORY); | |
| 1378 } | |
| 1379 | |
| 1380 PORT_FreeArena (arena, PR_FALSE); | |
| 1381 return NULL; | |
| 1382 } | |
| 1383 | |
| 1384 /* | |
| 1385 * Decode a base64 ascii encoded DER encoded public key. | |
| 1386 */ | |
| 1387 SECKEYPublicKey * | |
| 1388 SECKEY_ConvertAndDecodePublicKey(char *pubkstr) | |
| 1389 { | |
| 1390 SECKEYPublicKey *pubk; | |
| 1391 SECStatus rv; | |
| 1392 SECItem der; | |
| 1393 | |
| 1394 rv = ATOB_ConvertAsciiToItem (&der, pubkstr); | |
| 1395 if (rv != SECSuccess) | |
| 1396 return NULL; | |
| 1397 | |
| 1398 pubk = SECKEY_DecodeDERPublicKey (&der); | |
| 1399 | |
| 1400 PORT_Free (der.data); | |
| 1401 return pubk; | |
| 1402 } | |
| 1403 | |
| 1404 SECItem * | |
| 1405 SECKEY_EncodeDERSubjectPublicKeyInfo(SECKEYPublicKey *pubk) | |
| 1406 { | |
| 1407 CERTSubjectPublicKeyInfo *spki=NULL; | |
| 1408 SECItem *spkiDER=NULL; | |
| 1409 | |
| 1410 /* get the subjectpublickeyinfo */ | |
| 1411 spki = SECKEY_CreateSubjectPublicKeyInfo(pubk); | |
| 1412 if( spki == NULL ) { | |
| 1413 goto finish; | |
| 1414 } | |
| 1415 | |
| 1416 /* DER-encode the subjectpublickeyinfo */ | |
| 1417 spkiDER = SEC_ASN1EncodeItem(NULL /*arena*/, NULL/*dest*/, spki, | |
| 1418 CERT_SubjectPublicKeyInfoTemplate); | |
| 1419 | |
| 1420 SECKEY_DestroySubjectPublicKeyInfo(spki); | |
| 1421 | |
| 1422 finish: | |
| 1423 return spkiDER; | |
| 1424 } | |
| 1425 | |
| 1426 | |
| 1427 CERTSubjectPublicKeyInfo * | |
| 1428 SECKEY_DecodeDERSubjectPublicKeyInfo(SECItem *spkider) | |
| 1429 { | |
| 1430 PRArenaPool *arena; | |
| 1431 CERTSubjectPublicKeyInfo *spki; | |
| 1432 SECStatus rv; | |
| 1433 SECItem newSpkider; | |
| 1434 | |
| 1435 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1436 if (arena == NULL) { | |
| 1437 PORT_SetError(SEC_ERROR_NO_MEMORY); | |
| 1438 return NULL; | |
| 1439 } | |
| 1440 | |
| 1441 spki = (CERTSubjectPublicKeyInfo *) | |
| 1442 PORT_ArenaZAlloc(arena, sizeof (CERTSubjectPublicKeyInfo)); | |
| 1443 if (spki != NULL) { | |
| 1444 spki->arena = arena; | |
| 1445 | |
| 1446 /* copy the DER into the arena, since Quick DER returns data that points | |
| 1447 into the DER input, which may get freed by the caller */ | |
| 1448 rv = SECITEM_CopyItem(arena, &newSpkider, spkider); | |
| 1449 if ( rv == SECSuccess ) { | |
| 1450 rv = SEC_QuickDERDecodeItem(arena,spki, | |
| 1451 CERT_SubjectPublicKeyInfoTemplate, &newSpkid
er); | |
| 1452 } | |
| 1453 if (rv == SECSuccess) | |
| 1454 return spki; | |
| 1455 } else { | |
| 1456 PORT_SetError(SEC_ERROR_NO_MEMORY); | |
| 1457 } | |
| 1458 | |
| 1459 PORT_FreeArena(arena, PR_FALSE); | |
| 1460 return NULL; | |
| 1461 } | |
| 1462 | |
| 1463 /* | |
| 1464 * Decode a base64 ascii encoded DER encoded subject public key info. | |
| 1465 */ | |
| 1466 CERTSubjectPublicKeyInfo * | |
| 1467 SECKEY_ConvertAndDecodeSubjectPublicKeyInfo(char *spkistr) | |
| 1468 { | |
| 1469 CERTSubjectPublicKeyInfo *spki; | |
| 1470 SECStatus rv; | |
| 1471 SECItem der; | |
| 1472 | |
| 1473 rv = ATOB_ConvertAsciiToItem(&der, spkistr); | |
| 1474 if (rv != SECSuccess) | |
| 1475 return NULL; | |
| 1476 | |
| 1477 spki = SECKEY_DecodeDERSubjectPublicKeyInfo(&der); | |
| 1478 | |
| 1479 PORT_Free(der.data); | |
| 1480 return spki; | |
| 1481 } | |
| 1482 | |
| 1483 /* | |
| 1484 * Decode a base64 ascii encoded DER encoded public key and challenge | |
| 1485 * Verify digital signature and make sure challenge matches | |
| 1486 */ | |
| 1487 CERTSubjectPublicKeyInfo * | |
| 1488 SECKEY_ConvertAndDecodePublicKeyAndChallenge(char *pkacstr, char *challenge, | |
| 1489 void *wincx) | |
| 1490 { | |
| 1491 CERTSubjectPublicKeyInfo *spki = NULL; | |
| 1492 CERTPublicKeyAndChallenge pkac; | |
| 1493 SECStatus rv; | |
| 1494 SECItem signedItem; | |
| 1495 PRArenaPool *arena = NULL; | |
| 1496 CERTSignedData sd; | |
| 1497 SECItem sig; | |
| 1498 SECKEYPublicKey *pubKey = NULL; | |
| 1499 unsigned int len; | |
| 1500 | |
| 1501 signedItem.data = NULL; | |
| 1502 | |
| 1503 /* convert the base64 encoded data to binary */ | |
| 1504 rv = ATOB_ConvertAsciiToItem(&signedItem, pkacstr); | |
| 1505 if (rv != SECSuccess) { | |
| 1506 goto loser; | |
| 1507 } | |
| 1508 | |
| 1509 /* create an arena */ | |
| 1510 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1511 if (arena == NULL) { | |
| 1512 goto loser; | |
| 1513 } | |
| 1514 | |
| 1515 /* decode the outer wrapping of signed data */ | |
| 1516 PORT_Memset(&sd, 0, sizeof(CERTSignedData)); | |
| 1517 rv = SEC_QuickDERDecodeItem(arena, &sd, CERT_SignedDataTemplate, &signedItem
); | |
| 1518 if ( rv ) { | |
| 1519 goto loser; | |
| 1520 } | |
| 1521 | |
| 1522 /* decode the public key and challenge wrapper */ | |
| 1523 PORT_Memset(&pkac, 0, sizeof(CERTPublicKeyAndChallenge)); | |
| 1524 rv = SEC_QuickDERDecodeItem(arena, &pkac, CERT_PublicKeyAndChallengeTemplate
, | |
| 1525 &sd.data); | |
| 1526 if ( rv ) { | |
| 1527 goto loser; | |
| 1528 } | |
| 1529 | |
| 1530 /* decode the subject public key info */ | |
| 1531 spki = SECKEY_DecodeDERSubjectPublicKeyInfo(&pkac.spki); | |
| 1532 if ( spki == NULL ) { | |
| 1533 goto loser; | |
| 1534 } | |
| 1535 | |
| 1536 /* get the public key */ | |
| 1537 pubKey = seckey_ExtractPublicKey(spki); | |
| 1538 if ( pubKey == NULL ) { | |
| 1539 goto loser; | |
| 1540 } | |
| 1541 | |
| 1542 /* check the signature */ | |
| 1543 sig = sd.signature; | |
| 1544 DER_ConvertBitString(&sig); | |
| 1545 rv = VFY_VerifyDataWithAlgorithmID(sd.data.data, sd.data.len, pubKey, &sig, | |
| 1546 &(sd.signatureAlgorithm), NULL, wincx); | |
| 1547 if ( rv != SECSuccess ) { | |
| 1548 goto loser; | |
| 1549 } | |
| 1550 | |
| 1551 /* check the challenge */ | |
| 1552 if ( challenge ) { | |
| 1553 len = PORT_Strlen(challenge); | |
| 1554 /* length is right */ | |
| 1555 if ( len != pkac.challenge.len ) { | |
| 1556 goto loser; | |
| 1557 } | |
| 1558 /* actual data is right */ | |
| 1559 if ( PORT_Memcmp(challenge, pkac.challenge.data, len) != 0 ) { | |
| 1560 goto loser; | |
| 1561 } | |
| 1562 } | |
| 1563 goto done; | |
| 1564 | |
| 1565 loser: | |
| 1566 /* make sure that we return null if we got an error */ | |
| 1567 if ( spki ) { | |
| 1568 SECKEY_DestroySubjectPublicKeyInfo(spki); | |
| 1569 } | |
| 1570 spki = NULL; | |
| 1571 | |
| 1572 done: | |
| 1573 if ( signedItem.data ) { | |
| 1574 PORT_Free(signedItem.data); | |
| 1575 } | |
| 1576 if ( arena ) { | |
| 1577 PORT_FreeArena(arena, PR_FALSE); | |
| 1578 } | |
| 1579 if ( pubKey ) { | |
| 1580 SECKEY_DestroyPublicKey(pubKey); | |
| 1581 } | |
| 1582 | |
| 1583 return spki; | |
| 1584 } | |
| 1585 | |
| 1586 void | |
| 1587 SECKEY_DestroyPrivateKeyInfo(SECKEYPrivateKeyInfo *pvk, | |
| 1588 PRBool freeit) | |
| 1589 { | |
| 1590 PRArenaPool *poolp; | |
| 1591 | |
| 1592 if(pvk != NULL) { | |
| 1593 if(pvk->arena) { | |
| 1594 poolp = pvk->arena; | |
| 1595 /* zero structure since PORT_FreeArena does not support | |
| 1596 * this yet. | |
| 1597 */ | |
| 1598 PORT_Memset(pvk->privateKey.data, 0, pvk->privateKey.len); | |
| 1599 PORT_Memset((char *)pvk, 0, sizeof(*pvk)); | |
| 1600 if(freeit == PR_TRUE) { | |
| 1601 PORT_FreeArena(poolp, PR_TRUE); | |
| 1602 } else { | |
| 1603 pvk->arena = poolp; | |
| 1604 } | |
| 1605 } else { | |
| 1606 SECITEM_ZfreeItem(&pvk->version, PR_FALSE); | |
| 1607 SECITEM_ZfreeItem(&pvk->privateKey, PR_FALSE); | |
| 1608 SECOID_DestroyAlgorithmID(&pvk->algorithm, PR_FALSE); | |
| 1609 PORT_Memset((char *)pvk, 0, sizeof(*pvk)); | |
| 1610 if(freeit == PR_TRUE) { | |
| 1611 PORT_Free(pvk); | |
| 1612 } | |
| 1613 } | |
| 1614 } | |
| 1615 } | |
| 1616 | |
| 1617 void | |
| 1618 SECKEY_DestroyEncryptedPrivateKeyInfo(SECKEYEncryptedPrivateKeyInfo *epki, | |
| 1619 PRBool freeit) | |
| 1620 { | |
| 1621 PRArenaPool *poolp; | |
| 1622 | |
| 1623 if(epki != NULL) { | |
| 1624 if(epki->arena) { | |
| 1625 poolp = epki->arena; | |
| 1626 /* zero structure since PORT_FreeArena does not support | |
| 1627 * this yet. | |
| 1628 */ | |
| 1629 PORT_Memset(epki->encryptedData.data, 0, epki->encryptedData.len); | |
| 1630 PORT_Memset((char *)epki, 0, sizeof(*epki)); | |
| 1631 if(freeit == PR_TRUE) { | |
| 1632 PORT_FreeArena(poolp, PR_TRUE); | |
| 1633 } else { | |
| 1634 epki->arena = poolp; | |
| 1635 } | |
| 1636 } else { | |
| 1637 SECITEM_ZfreeItem(&epki->encryptedData, PR_FALSE); | |
| 1638 SECOID_DestroyAlgorithmID(&epki->algorithm, PR_FALSE); | |
| 1639 PORT_Memset((char *)epki, 0, sizeof(*epki)); | |
| 1640 if(freeit == PR_TRUE) { | |
| 1641 PORT_Free(epki); | |
| 1642 } | |
| 1643 } | |
| 1644 } | |
| 1645 } | |
| 1646 | |
| 1647 SECStatus | |
| 1648 SECKEY_CopyPrivateKeyInfo(PRArenaPool *poolp, | |
| 1649 SECKEYPrivateKeyInfo *to, | |
| 1650 SECKEYPrivateKeyInfo *from) | |
| 1651 { | |
| 1652 SECStatus rv = SECFailure; | |
| 1653 | |
| 1654 if((to == NULL) || (from == NULL)) { | |
| 1655 return SECFailure; | |
| 1656 } | |
| 1657 | |
| 1658 rv = SECOID_CopyAlgorithmID(poolp, &to->algorithm, &from->algorithm); | |
| 1659 if(rv != SECSuccess) { | |
| 1660 return SECFailure; | |
| 1661 } | |
| 1662 rv = SECITEM_CopyItem(poolp, &to->privateKey, &from->privateKey); | |
| 1663 if(rv != SECSuccess) { | |
| 1664 return SECFailure; | |
| 1665 } | |
| 1666 rv = SECITEM_CopyItem(poolp, &to->version, &from->version); | |
| 1667 | |
| 1668 return rv; | |
| 1669 } | |
| 1670 | |
| 1671 SECStatus | |
| 1672 SECKEY_CopyEncryptedPrivateKeyInfo(PRArenaPool *poolp, | |
| 1673 SECKEYEncryptedPrivateKeyInfo *to, | |
| 1674 SECKEYEncryptedPrivateKeyInfo *from) | |
| 1675 { | |
| 1676 SECStatus rv = SECFailure; | |
| 1677 | |
| 1678 if((to == NULL) || (from == NULL)) { | |
| 1679 return SECFailure; | |
| 1680 } | |
| 1681 | |
| 1682 rv = SECOID_CopyAlgorithmID(poolp, &to->algorithm, &from->algorithm); | |
| 1683 if(rv != SECSuccess) { | |
| 1684 return SECFailure; | |
| 1685 } | |
| 1686 rv = SECITEM_CopyItem(poolp, &to->encryptedData, &from->encryptedData); | |
| 1687 | |
| 1688 return rv; | |
| 1689 } | |
| 1690 | |
| 1691 KeyType | |
| 1692 SECKEY_GetPrivateKeyType(SECKEYPrivateKey *privKey) | |
| 1693 { | |
| 1694 return privKey->keyType; | |
| 1695 } | |
| 1696 | |
| 1697 KeyType | |
| 1698 SECKEY_GetPublicKeyType(SECKEYPublicKey *pubKey) | |
| 1699 { | |
| 1700 return pubKey->keyType; | |
| 1701 } | |
| 1702 | |
| 1703 SECKEYPublicKey* | |
| 1704 SECKEY_ImportDERPublicKey(SECItem *derKey, CK_KEY_TYPE type) | |
| 1705 { | |
| 1706 SECKEYPublicKey *pubk = NULL; | |
| 1707 SECStatus rv = SECFailure; | |
| 1708 SECItem newDerKey; | |
| 1709 PRArenaPool *arena = NULL; | |
| 1710 | |
| 1711 if (!derKey) { | |
| 1712 return NULL; | |
| 1713 } | |
| 1714 | |
| 1715 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1716 if (arena == NULL) { | |
| 1717 PORT_SetError(SEC_ERROR_NO_MEMORY); | |
| 1718 goto finish; | |
| 1719 } | |
| 1720 | |
| 1721 pubk = PORT_ArenaZNew(arena, SECKEYPublicKey); | |
| 1722 if (pubk == NULL) { | |
| 1723 goto finish; | |
| 1724 } | |
| 1725 pubk->arena = arena; | |
| 1726 | |
| 1727 rv = SECITEM_CopyItem(pubk->arena, &newDerKey, derKey); | |
| 1728 if (SECSuccess != rv) { | |
| 1729 goto finish; | |
| 1730 } | |
| 1731 | |
| 1732 pubk->pkcs11Slot = NULL; | |
| 1733 pubk->pkcs11ID = CK_INVALID_HANDLE; | |
| 1734 | |
| 1735 switch( type ) { | |
| 1736 case CKK_RSA: | |
| 1737 prepare_rsa_pub_key_for_asn1(pubk); | |
| 1738 rv = SEC_QuickDERDecodeItem(pubk->arena, pubk, SECKEY_RSAPublicKeyTempla
te, &newDerKey); | |
| 1739 pubk->keyType = rsaKey; | |
| 1740 break; | |
| 1741 case CKK_DSA: | |
| 1742 prepare_dsa_pub_key_for_asn1(pubk); | |
| 1743 rv = SEC_QuickDERDecodeItem(pubk->arena, pubk, SECKEY_DSAPublicKeyTempla
te, &newDerKey); | |
| 1744 pubk->keyType = dsaKey; | |
| 1745 break; | |
| 1746 case CKK_DH: | |
| 1747 prepare_dh_pub_key_for_asn1(pubk); | |
| 1748 rv = SEC_QuickDERDecodeItem(pubk->arena, pubk, SECKEY_DHPublicKeyTemplat
e, &newDerKey); | |
| 1749 pubk->keyType = dhKey; | |
| 1750 break; | |
| 1751 default: | |
| 1752 rv = SECFailure; | |
| 1753 break; | |
| 1754 } | |
| 1755 | |
| 1756 finish: | |
| 1757 if (rv != SECSuccess) { | |
| 1758 if (arena != NULL) { | |
| 1759 PORT_FreeArena(arena, PR_TRUE); | |
| 1760 } | |
| 1761 pubk = NULL; | |
| 1762 } | |
| 1763 return pubk; | |
| 1764 } | |
| 1765 | |
| 1766 SECKEYPrivateKeyList* | |
| 1767 SECKEY_NewPrivateKeyList(void) | |
| 1768 { | |
| 1769 PRArenaPool *arena = NULL; | |
| 1770 SECKEYPrivateKeyList *ret = NULL; | |
| 1771 | |
| 1772 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1773 if ( arena == NULL ) { | |
| 1774 goto loser; | |
| 1775 } | |
| 1776 | |
| 1777 ret = (SECKEYPrivateKeyList *)PORT_ArenaZAlloc(arena, | |
| 1778 sizeof(SECKEYPrivateKeyList)); | |
| 1779 if ( ret == NULL ) { | |
| 1780 goto loser; | |
| 1781 } | |
| 1782 | |
| 1783 ret->arena = arena; | |
| 1784 | |
| 1785 PR_INIT_CLIST(&ret->list); | |
| 1786 | |
| 1787 return(ret); | |
| 1788 | |
| 1789 loser: | |
| 1790 if ( arena != NULL ) { | |
| 1791 PORT_FreeArena(arena, PR_FALSE); | |
| 1792 } | |
| 1793 | |
| 1794 return(NULL); | |
| 1795 } | |
| 1796 | |
| 1797 void | |
| 1798 SECKEY_DestroyPrivateKeyList(SECKEYPrivateKeyList *keys) | |
| 1799 { | |
| 1800 while( !PR_CLIST_IS_EMPTY(&keys->list) ) { | |
| 1801 SECKEY_RemovePrivateKeyListNode( | |
| 1802 (SECKEYPrivateKeyListNode*)(PR_LIST_HEAD(&keys->list)) ); | |
| 1803 } | |
| 1804 | |
| 1805 PORT_FreeArena(keys->arena, PR_FALSE); | |
| 1806 | |
| 1807 return; | |
| 1808 } | |
| 1809 | |
| 1810 | |
| 1811 void | |
| 1812 SECKEY_RemovePrivateKeyListNode(SECKEYPrivateKeyListNode *node) | |
| 1813 { | |
| 1814 PR_ASSERT(node->key); | |
| 1815 SECKEY_DestroyPrivateKey(node->key); | |
| 1816 node->key = NULL; | |
| 1817 PR_REMOVE_LINK(&node->links); | |
| 1818 return; | |
| 1819 | |
| 1820 } | |
| 1821 | |
| 1822 SECStatus | |
| 1823 SECKEY_AddPrivateKeyToListTail( SECKEYPrivateKeyList *list, | |
| 1824 SECKEYPrivateKey *key) | |
| 1825 { | |
| 1826 SECKEYPrivateKeyListNode *node; | |
| 1827 | |
| 1828 node = (SECKEYPrivateKeyListNode *)PORT_ArenaZAlloc(list->arena, | |
| 1829 sizeof(SECKEYPrivateKeyListNode)); | |
| 1830 if ( node == NULL ) { | |
| 1831 goto loser; | |
| 1832 } | |
| 1833 | |
| 1834 PR_INSERT_BEFORE(&node->links, &list->list); | |
| 1835 node->key = key; | |
| 1836 return(SECSuccess); | |
| 1837 | |
| 1838 loser: | |
| 1839 return(SECFailure); | |
| 1840 } | |
| 1841 | |
| 1842 | |
| 1843 SECKEYPublicKeyList* | |
| 1844 SECKEY_NewPublicKeyList(void) | |
| 1845 { | |
| 1846 PRArenaPool *arena = NULL; | |
| 1847 SECKEYPublicKeyList *ret = NULL; | |
| 1848 | |
| 1849 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 1850 if ( arena == NULL ) { | |
| 1851 goto loser; | |
| 1852 } | |
| 1853 | |
| 1854 ret = (SECKEYPublicKeyList *)PORT_ArenaZAlloc(arena, | |
| 1855 sizeof(SECKEYPublicKeyList)); | |
| 1856 if ( ret == NULL ) { | |
| 1857 goto loser; | |
| 1858 } | |
| 1859 | |
| 1860 ret->arena = arena; | |
| 1861 | |
| 1862 PR_INIT_CLIST(&ret->list); | |
| 1863 | |
| 1864 return(ret); | |
| 1865 | |
| 1866 loser: | |
| 1867 if ( arena != NULL ) { | |
| 1868 PORT_FreeArena(arena, PR_FALSE); | |
| 1869 } | |
| 1870 | |
| 1871 return(NULL); | |
| 1872 } | |
| 1873 | |
| 1874 void | |
| 1875 SECKEY_DestroyPublicKeyList(SECKEYPublicKeyList *keys) | |
| 1876 { | |
| 1877 while( !PR_CLIST_IS_EMPTY(&keys->list) ) { | |
| 1878 SECKEY_RemovePublicKeyListNode( | |
| 1879 (SECKEYPublicKeyListNode*)(PR_LIST_HEAD(&keys->list)) ); | |
| 1880 } | |
| 1881 | |
| 1882 PORT_FreeArena(keys->arena, PR_FALSE); | |
| 1883 | |
| 1884 return; | |
| 1885 } | |
| 1886 | |
| 1887 | |
| 1888 void | |
| 1889 SECKEY_RemovePublicKeyListNode(SECKEYPublicKeyListNode *node) | |
| 1890 { | |
| 1891 PR_ASSERT(node->key); | |
| 1892 SECKEY_DestroyPublicKey(node->key); | |
| 1893 node->key = NULL; | |
| 1894 PR_REMOVE_LINK(&node->links); | |
| 1895 return; | |
| 1896 | |
| 1897 } | |
| 1898 | |
| 1899 SECStatus | |
| 1900 SECKEY_AddPublicKeyToListTail( SECKEYPublicKeyList *list, | |
| 1901 SECKEYPublicKey *key) | |
| 1902 { | |
| 1903 SECKEYPublicKeyListNode *node; | |
| 1904 | |
| 1905 node = (SECKEYPublicKeyListNode *)PORT_ArenaZAlloc(list->arena, | |
| 1906 sizeof(SECKEYPublicKeyListNode)); | |
| 1907 if ( node == NULL ) { | |
| 1908 goto loser; | |
| 1909 } | |
| 1910 | |
| 1911 PR_INSERT_BEFORE(&node->links, &list->list); | |
| 1912 node->key = key; | |
| 1913 return(SECSuccess); | |
| 1914 | |
| 1915 loser: | |
| 1916 return(SECFailure); | |
| 1917 } | |
| 1918 | |
| 1919 #define SECKEY_CacheAttribute(key, attribute) \ | |
| 1920 if (CK_TRUE == PK11_HasAttributeSet(key->pkcs11Slot, key->pkcs11ID, attribut
e, PR_FALSE)) { \ | |
| 1921 key->staticflags |= SECKEY_##attribute; \ | |
| 1922 } else { \ | |
| 1923 key->staticflags &= (~SECKEY_##attribute); \ | |
| 1924 } | |
| 1925 | |
| 1926 SECStatus | |
| 1927 SECKEY_CacheStaticFlags(SECKEYPrivateKey* key) | |
| 1928 { | |
| 1929 SECStatus rv = SECFailure; | |
| 1930 if (key && key->pkcs11Slot && key->pkcs11ID) { | |
| 1931 key->staticflags |= SECKEY_Attributes_Cached; | |
| 1932 SECKEY_CacheAttribute(key, CKA_PRIVATE); | |
| 1933 SECKEY_CacheAttribute(key, CKA_ALWAYS_AUTHENTICATE); | |
| 1934 rv = SECSuccess; | |
| 1935 } | |
| 1936 return rv; | |
| 1937 } | |
| OLD | NEW |