Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(121)

Side by Side Diff: nss/lib/pk11wrap/pk11sdr.c

Issue 2078763002: Delete bundled copy of NSS and replace with README. (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/nss@master
Patch Set: Delete bundled copy of NSS and replace with README. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « nss/lib/pk11wrap/pk11sdr.h ('k') | nss/lib/pk11wrap/pk11skey.c » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4
5 #include "seccomon.h"
6 #include "secoid.h"
7 #include "secasn1.h"
8 #include "pkcs11.h"
9 #include "pk11func.h"
10 #include "pk11sdr.h"
11
12 /*
13 * Data structure and template for encoding the result of an SDR operation
14 * This is temporary. It should include the algorithm ID of the encryption mec hanism
15 */
16 struct SDRResult
17 {
18 SECItem keyid;
19 SECAlgorithmID alg;
20 SECItem data;
21 };
22 typedef struct SDRResult SDRResult;
23
24 SEC_ASN1_MKSUB(SECOID_AlgorithmIDTemplate)
25
26 static SEC_ASN1Template template[] = {
27 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof (SDRResult) },
28 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) },
29 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg),
30 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) },
31 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, data) },
32 { 0 }
33 };
34
35 static unsigned char keyID[] = {
36 0xF8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
37 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
38 };
39
40 static SECItem keyIDItem = {
41 0,
42 keyID,
43 sizeof keyID
44 };
45
46 /* local utility function for padding an incoming data block
47 * to the mechanism block size.
48 */
49 static SECStatus
50 padBlock(SECItem *data, int blockSize, SECItem *result)
51 {
52 SECStatus rv = SECSuccess;
53 int padLength;
54 unsigned int i;
55
56 result->data = 0;
57 result->len = 0;
58
59 /* This algorithm always adds to the block (to indicate the number
60 * of pad bytes). So allocate a block large enough.
61 */
62 padLength = blockSize - (data->len % blockSize);
63 result->len = data->len + padLength;
64 result->data = (unsigned char *)PORT_Alloc(result->len);
65
66 /* Copy the data */
67 PORT_Memcpy(result->data, data->data, data->len);
68
69 /* Add the pad values */
70 for(i = data->len; i < result->len; i++)
71 result->data[i] = (unsigned char)padLength;
72
73 return rv;
74 }
75
76 static SECStatus
77 unpadBlock(SECItem *data, int blockSize, SECItem *result)
78 {
79 SECStatus rv = SECSuccess;
80 int padLength;
81 unsigned int i;
82
83 result->data = 0;
84 result->len = 0;
85
86 /* Remove the padding from the end if the input data */
87 if (data->len == 0 || data->len % blockSize != 0) { rv = SECFailure; goto los er; }
88
89 padLength = data->data[data->len-1];
90 if (padLength > blockSize) { rv = SECFailure; goto loser; }
91
92 /* verify padding */
93 for (i=data->len - padLength; i < data->len; i++) {
94 if (data->data[i] != padLength) {
95 rv = SECFailure;
96 goto loser;
97 }
98 }
99
100 result->len = data->len - padLength;
101 result->data = (unsigned char *)PORT_Alloc(result->len);
102 if (!result->data) { rv = SECFailure; goto loser; }
103
104 PORT_Memcpy(result->data, data->data, result->len);
105
106 if (padLength < 2) {
107 return SECWouldBlock;
108 }
109
110 loser:
111 return rv;
112 }
113
114 static PRLock *pk11sdrLock = NULL;
115
116 void
117 pk11sdr_Init (void)
118 {
119 pk11sdrLock = PR_NewLock();
120 }
121
122 void
123 pk11sdr_Shutdown(void)
124 {
125 if (pk11sdrLock) {
126 PR_DestroyLock(pk11sdrLock);
127 pk11sdrLock = NULL;
128 }
129 }
130
131 /*
132 * PK11SDR_Encrypt
133 * Encrypt a block of data using the symmetric key identified. The result
134 * is an ASN.1 (DER) encoded block of keyid, params and data.
135 */
136 SECStatus
137 PK11SDR_Encrypt(SECItem *keyid, SECItem *data, SECItem *result, void *cx)
138 {
139 SECStatus rv = SECSuccess;
140 PK11SlotInfo *slot = 0;
141 PK11SymKey *key = 0;
142 SECItem *params = 0;
143 PK11Context *ctx = 0;
144 CK_MECHANISM_TYPE type;
145 SDRResult sdrResult;
146 SECItem paddedData;
147 SECItem *pKeyID;
148 PLArenaPool *arena = 0;
149
150 /* Initialize */
151 paddedData.len = 0;
152 paddedData.data = 0;
153
154 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE);
155 if (!arena) { rv = SECFailure; goto loser; }
156
157 /* 1. Locate the requested keyid, or the default key (which has a keyid)
158 * 2. Create an encryption context
159 * 3. Encrypt
160 * 4. Encode the results (using ASN.1)
161 */
162
163 slot = PK11_GetInternalKeySlot();
164 if (!slot) { rv = SECFailure; goto loser; }
165
166 /* Use triple-DES */
167 type = CKM_DES3_CBC;
168
169 /*
170 * Login to the internal token before we look for the key, otherwise we
171 * won't find it.
172 */
173 rv = PK11_Authenticate(slot, PR_TRUE, cx);
174 if (rv != SECSuccess) goto loser;
175
176 /* Find the key to use */
177 pKeyID = keyid;
178 if (pKeyID->len == 0) {
179 pKeyID = &keyIDItem; /* Use default value */
180
181 /* put in a course lock to prevent a race between not finding the
182 * key and creating one.
183 */
184
185 if (pk11sdrLock) PR_Lock(pk11sdrLock);
186
187 /* Try to find the key */
188 key = PK11_FindFixedKey(slot, type, pKeyID, cx);
189
190 /* If the default key doesn't exist yet, try to create it */
191 if (!key) key = PK11_GenDES3TokenKey(slot, pKeyID, cx);
192 if (pk11sdrLock) PR_Unlock(pk11sdrLock);
193 } else {
194 key = PK11_FindFixedKey(slot, type, pKeyID, cx);
195 }
196
197 if (!key) { rv = SECFailure; goto loser; }
198
199 params = PK11_GenerateNewParam(type, key);
200 if (!params) { rv = SECFailure; goto loser; }
201
202 ctx = PK11_CreateContextBySymKey(type, CKA_ENCRYPT, key, params);
203 if (!ctx) { rv = SECFailure; goto loser; }
204
205 rv = padBlock(data, PK11_GetBlockSize(type, 0), &paddedData);
206 if (rv != SECSuccess) goto loser;
207
208 sdrResult.data.len = paddedData.len;
209 sdrResult.data.data = (unsigned char *)PORT_ArenaAlloc(arena, sdrResult.data.l en);
210
211 rv = PK11_CipherOp(ctx, sdrResult.data.data, (int*)&sdrResult.data.len, sdrRes ult.data.len,
212 paddedData.data, paddedData.len);
213 if (rv != SECSuccess) goto loser;
214
215 PK11_Finalize(ctx);
216
217 sdrResult.keyid = *pKeyID;
218
219 rv = PK11_ParamToAlgid(SEC_OID_DES_EDE3_CBC, params, arena, &sdrResult.alg);
220 if (rv != SECSuccess) goto loser;
221
222 if (!SEC_ASN1EncodeItem(0, result, &sdrResult, template)) { rv = SECFailure; g oto loser; }
223
224 loser:
225 SECITEM_ZfreeItem(&paddedData, PR_FALSE);
226 if (arena) PORT_FreeArena(arena, PR_TRUE);
227 if (ctx) PK11_DestroyContext(ctx, PR_TRUE);
228 if (params) SECITEM_ZfreeItem(params, PR_TRUE);
229 if (key) PK11_FreeSymKey(key);
230 if (slot) PK11_FreeSlot(slot);
231
232 return rv;
233 }
234
235 /* decrypt a block */
236 static SECStatus
237 pk11Decrypt(PK11SlotInfo *slot, PLArenaPool *arena,
238 CK_MECHANISM_TYPE type, PK11SymKey *key,
239 SECItem *params, SECItem *in, SECItem *result)
240 {
241 PK11Context *ctx = 0;
242 SECItem paddedResult;
243 SECStatus rv;
244
245 paddedResult.len = 0;
246 paddedResult.data = 0;
247
248 ctx = PK11_CreateContextBySymKey(type, CKA_DECRYPT, key, params);
249 if (!ctx) { rv = SECFailure; goto loser; }
250
251 paddedResult.len = in->len;
252 paddedResult.data = PORT_ArenaAlloc(arena, paddedResult.len);
253
254 rv = PK11_CipherOp(ctx, paddedResult.data,
255 (int*)&paddedResult.len, paddedResult.len,
256 in->data, in->len);
257 if (rv != SECSuccess) goto loser;
258
259 PK11_Finalize(ctx);
260
261 /* Remove the padding */
262 rv = unpadBlock(&paddedResult, PK11_GetBlockSize(type, 0), result);
263 if (rv) goto loser;
264
265 loser:
266 if (ctx) PK11_DestroyContext(ctx, PR_TRUE);
267 return rv;
268 }
269
270 /*
271 * PK11SDR_Decrypt
272 * Decrypt a block of data produced by PK11SDR_Encrypt. The key used is identi fied
273 * by the keyid field within the input.
274 */
275 SECStatus
276 PK11SDR_Decrypt(SECItem *data, SECItem *result, void *cx)
277 {
278 SECStatus rv = SECSuccess;
279 PK11SlotInfo *slot = 0;
280 PK11SymKey *key = 0;
281 CK_MECHANISM_TYPE type;
282 SDRResult sdrResult;
283 SECItem *params = 0;
284 SECItem possibleResult = { 0, NULL, 0 };
285 PLArenaPool *arena = 0;
286
287 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE);
288 if (!arena) { rv = SECFailure; goto loser; }
289
290 /* Decode the incoming data */
291 memset(&sdrResult, 0, sizeof sdrResult);
292 rv = SEC_QuickDERDecodeItem(arena, &sdrResult, template, data);
293 if (rv != SECSuccess) goto loser; /* Invalid format */
294
295 /* Find the slot and key for the given keyid */
296 slot = PK11_GetInternalKeySlot();
297 if (!slot) { rv = SECFailure; goto loser; }
298
299 rv = PK11_Authenticate(slot, PR_TRUE, cx);
300 if (rv != SECSuccess) goto loser;
301
302 /* Get the parameter values from the data */
303 params = PK11_ParamFromAlgid(&sdrResult.alg);
304 if (!params) { rv = SECFailure; goto loser; }
305
306 /* Use triple-DES (Should look up the algorithm) */
307 type = CKM_DES3_CBC;
308 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx);
309 if (!key) {
310 rv = SECFailure;
311 } else {
312 rv = pk11Decrypt(slot, arena, type, key, params,
313 &sdrResult.data, result);
314 }
315
316 /*
317 * if the pad value was too small (1 or 2), then it's statistically
318 * 'likely' that (1 in 256) that we may not have the correct key.
319 * Check the other keys for a better match. If we find none, use
320 * this result.
321 */
322 if (rv == SECWouldBlock) {
323 possibleResult = *result;
324 }
325
326 /*
327 * handle the case where your key indicies may have been broken
328 */
329 if (rv != SECSuccess) {
330 PK11SymKey *keyList = PK11_ListFixedKeysInSlot(slot, NULL, cx);
331 PK11SymKey *testKey = NULL;
332 PK11SymKey *nextKey = NULL;
333
334 for (testKey = keyList; testKey;
335 testKey = PK11_GetNextSymKey(testKey)) {
336 rv = pk11Decrypt(slot, arena, type, testKey, params,
337 &sdrResult.data, result);
338 if (rv == SECSuccess) {
339 break;
340 }
341 /* found a close match. If it's our first remember it */
342 if (rv == SECWouldBlock) {
343 if (possibleResult.data) {
344 /* this is unlikely but possible. If we hit this condition,
345 * we have no way of knowing which possibility to prefer.
346 * in this case we just match the key the application
347 * thought was the right one */
348 SECITEM_ZfreeItem(result, PR_FALSE);
349 } else {
350 possibleResult = *result;
351 }
352 }
353 }
354
355 /* free the list */
356 for (testKey = keyList; testKey; testKey = nextKey) {
357 nextKey = PK11_GetNextSymKey(testKey);
358 PK11_FreeSymKey(testKey);
359 }
360 }
361
362 /* we didn't find a better key, use the one with a small pad value */
363 if ((rv != SECSuccess) && (possibleResult.data)) {
364 *result = possibleResult;
365 possibleResult.data = NULL;
366 rv = SECSuccess;
367 }
368
369 loser:
370 if (arena) PORT_FreeArena(arena, PR_TRUE);
371 if (key) PK11_FreeSymKey(key);
372 if (params) SECITEM_ZfreeItem(params, PR_TRUE);
373 if (slot) PK11_FreeSlot(slot);
374 if (possibleResult.data) SECITEM_ZfreeItem(&possibleResult, PR_FALSE);
375
376 return rv;
377 }
OLDNEW
« no previous file with comments | « nss/lib/pk11wrap/pk11sdr.h ('k') | nss/lib/pk11wrap/pk11skey.c » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698