| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 | |
| 5 #include "seccomon.h" | |
| 6 #include "secoid.h" | |
| 7 #include "secasn1.h" | |
| 8 #include "pkcs11.h" | |
| 9 #include "pk11func.h" | |
| 10 #include "pk11sdr.h" | |
| 11 | |
| 12 /* | |
| 13 * Data structure and template for encoding the result of an SDR operation | |
| 14 * This is temporary. It should include the algorithm ID of the encryption mec
hanism | |
| 15 */ | |
| 16 struct SDRResult | |
| 17 { | |
| 18 SECItem keyid; | |
| 19 SECAlgorithmID alg; | |
| 20 SECItem data; | |
| 21 }; | |
| 22 typedef struct SDRResult SDRResult; | |
| 23 | |
| 24 SEC_ASN1_MKSUB(SECOID_AlgorithmIDTemplate) | |
| 25 | |
| 26 static SEC_ASN1Template template[] = { | |
| 27 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof (SDRResult) }, | |
| 28 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) }, | |
| 29 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg), | |
| 30 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) }, | |
| 31 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, data) }, | |
| 32 { 0 } | |
| 33 }; | |
| 34 | |
| 35 static unsigned char keyID[] = { | |
| 36 0xF8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |
| 37 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 | |
| 38 }; | |
| 39 | |
| 40 static SECItem keyIDItem = { | |
| 41 0, | |
| 42 keyID, | |
| 43 sizeof keyID | |
| 44 }; | |
| 45 | |
| 46 /* local utility function for padding an incoming data block | |
| 47 * to the mechanism block size. | |
| 48 */ | |
| 49 static SECStatus | |
| 50 padBlock(SECItem *data, int blockSize, SECItem *result) | |
| 51 { | |
| 52 SECStatus rv = SECSuccess; | |
| 53 int padLength; | |
| 54 unsigned int i; | |
| 55 | |
| 56 result->data = 0; | |
| 57 result->len = 0; | |
| 58 | |
| 59 /* This algorithm always adds to the block (to indicate the number | |
| 60 * of pad bytes). So allocate a block large enough. | |
| 61 */ | |
| 62 padLength = blockSize - (data->len % blockSize); | |
| 63 result->len = data->len + padLength; | |
| 64 result->data = (unsigned char *)PORT_Alloc(result->len); | |
| 65 | |
| 66 /* Copy the data */ | |
| 67 PORT_Memcpy(result->data, data->data, data->len); | |
| 68 | |
| 69 /* Add the pad values */ | |
| 70 for(i = data->len; i < result->len; i++) | |
| 71 result->data[i] = (unsigned char)padLength; | |
| 72 | |
| 73 return rv; | |
| 74 } | |
| 75 | |
| 76 static SECStatus | |
| 77 unpadBlock(SECItem *data, int blockSize, SECItem *result) | |
| 78 { | |
| 79 SECStatus rv = SECSuccess; | |
| 80 int padLength; | |
| 81 unsigned int i; | |
| 82 | |
| 83 result->data = 0; | |
| 84 result->len = 0; | |
| 85 | |
| 86 /* Remove the padding from the end if the input data */ | |
| 87 if (data->len == 0 || data->len % blockSize != 0) { rv = SECFailure; goto los
er; } | |
| 88 | |
| 89 padLength = data->data[data->len-1]; | |
| 90 if (padLength > blockSize) { rv = SECFailure; goto loser; } | |
| 91 | |
| 92 /* verify padding */ | |
| 93 for (i=data->len - padLength; i < data->len; i++) { | |
| 94 if (data->data[i] != padLength) { | |
| 95 rv = SECFailure; | |
| 96 goto loser; | |
| 97 } | |
| 98 } | |
| 99 | |
| 100 result->len = data->len - padLength; | |
| 101 result->data = (unsigned char *)PORT_Alloc(result->len); | |
| 102 if (!result->data) { rv = SECFailure; goto loser; } | |
| 103 | |
| 104 PORT_Memcpy(result->data, data->data, result->len); | |
| 105 | |
| 106 if (padLength < 2) { | |
| 107 return SECWouldBlock; | |
| 108 } | |
| 109 | |
| 110 loser: | |
| 111 return rv; | |
| 112 } | |
| 113 | |
| 114 static PRLock *pk11sdrLock = NULL; | |
| 115 | |
| 116 void | |
| 117 pk11sdr_Init (void) | |
| 118 { | |
| 119 pk11sdrLock = PR_NewLock(); | |
| 120 } | |
| 121 | |
| 122 void | |
| 123 pk11sdr_Shutdown(void) | |
| 124 { | |
| 125 if (pk11sdrLock) { | |
| 126 PR_DestroyLock(pk11sdrLock); | |
| 127 pk11sdrLock = NULL; | |
| 128 } | |
| 129 } | |
| 130 | |
| 131 /* | |
| 132 * PK11SDR_Encrypt | |
| 133 * Encrypt a block of data using the symmetric key identified. The result | |
| 134 * is an ASN.1 (DER) encoded block of keyid, params and data. | |
| 135 */ | |
| 136 SECStatus | |
| 137 PK11SDR_Encrypt(SECItem *keyid, SECItem *data, SECItem *result, void *cx) | |
| 138 { | |
| 139 SECStatus rv = SECSuccess; | |
| 140 PK11SlotInfo *slot = 0; | |
| 141 PK11SymKey *key = 0; | |
| 142 SECItem *params = 0; | |
| 143 PK11Context *ctx = 0; | |
| 144 CK_MECHANISM_TYPE type; | |
| 145 SDRResult sdrResult; | |
| 146 SECItem paddedData; | |
| 147 SECItem *pKeyID; | |
| 148 PLArenaPool *arena = 0; | |
| 149 | |
| 150 /* Initialize */ | |
| 151 paddedData.len = 0; | |
| 152 paddedData.data = 0; | |
| 153 | |
| 154 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE); | |
| 155 if (!arena) { rv = SECFailure; goto loser; } | |
| 156 | |
| 157 /* 1. Locate the requested keyid, or the default key (which has a keyid) | |
| 158 * 2. Create an encryption context | |
| 159 * 3. Encrypt | |
| 160 * 4. Encode the results (using ASN.1) | |
| 161 */ | |
| 162 | |
| 163 slot = PK11_GetInternalKeySlot(); | |
| 164 if (!slot) { rv = SECFailure; goto loser; } | |
| 165 | |
| 166 /* Use triple-DES */ | |
| 167 type = CKM_DES3_CBC; | |
| 168 | |
| 169 /* | |
| 170 * Login to the internal token before we look for the key, otherwise we | |
| 171 * won't find it. | |
| 172 */ | |
| 173 rv = PK11_Authenticate(slot, PR_TRUE, cx); | |
| 174 if (rv != SECSuccess) goto loser; | |
| 175 | |
| 176 /* Find the key to use */ | |
| 177 pKeyID = keyid; | |
| 178 if (pKeyID->len == 0) { | |
| 179 pKeyID = &keyIDItem; /* Use default value */ | |
| 180 | |
| 181 /* put in a course lock to prevent a race between not finding the | |
| 182 * key and creating one. | |
| 183 */ | |
| 184 | |
| 185 if (pk11sdrLock) PR_Lock(pk11sdrLock); | |
| 186 | |
| 187 /* Try to find the key */ | |
| 188 key = PK11_FindFixedKey(slot, type, pKeyID, cx); | |
| 189 | |
| 190 /* If the default key doesn't exist yet, try to create it */ | |
| 191 if (!key) key = PK11_GenDES3TokenKey(slot, pKeyID, cx); | |
| 192 if (pk11sdrLock) PR_Unlock(pk11sdrLock); | |
| 193 } else { | |
| 194 key = PK11_FindFixedKey(slot, type, pKeyID, cx); | |
| 195 } | |
| 196 | |
| 197 if (!key) { rv = SECFailure; goto loser; } | |
| 198 | |
| 199 params = PK11_GenerateNewParam(type, key); | |
| 200 if (!params) { rv = SECFailure; goto loser; } | |
| 201 | |
| 202 ctx = PK11_CreateContextBySymKey(type, CKA_ENCRYPT, key, params); | |
| 203 if (!ctx) { rv = SECFailure; goto loser; } | |
| 204 | |
| 205 rv = padBlock(data, PK11_GetBlockSize(type, 0), &paddedData); | |
| 206 if (rv != SECSuccess) goto loser; | |
| 207 | |
| 208 sdrResult.data.len = paddedData.len; | |
| 209 sdrResult.data.data = (unsigned char *)PORT_ArenaAlloc(arena, sdrResult.data.l
en); | |
| 210 | |
| 211 rv = PK11_CipherOp(ctx, sdrResult.data.data, (int*)&sdrResult.data.len, sdrRes
ult.data.len, | |
| 212 paddedData.data, paddedData.len); | |
| 213 if (rv != SECSuccess) goto loser; | |
| 214 | |
| 215 PK11_Finalize(ctx); | |
| 216 | |
| 217 sdrResult.keyid = *pKeyID; | |
| 218 | |
| 219 rv = PK11_ParamToAlgid(SEC_OID_DES_EDE3_CBC, params, arena, &sdrResult.alg); | |
| 220 if (rv != SECSuccess) goto loser; | |
| 221 | |
| 222 if (!SEC_ASN1EncodeItem(0, result, &sdrResult, template)) { rv = SECFailure; g
oto loser; } | |
| 223 | |
| 224 loser: | |
| 225 SECITEM_ZfreeItem(&paddedData, PR_FALSE); | |
| 226 if (arena) PORT_FreeArena(arena, PR_TRUE); | |
| 227 if (ctx) PK11_DestroyContext(ctx, PR_TRUE); | |
| 228 if (params) SECITEM_ZfreeItem(params, PR_TRUE); | |
| 229 if (key) PK11_FreeSymKey(key); | |
| 230 if (slot) PK11_FreeSlot(slot); | |
| 231 | |
| 232 return rv; | |
| 233 } | |
| 234 | |
| 235 /* decrypt a block */ | |
| 236 static SECStatus | |
| 237 pk11Decrypt(PK11SlotInfo *slot, PLArenaPool *arena, | |
| 238 CK_MECHANISM_TYPE type, PK11SymKey *key, | |
| 239 SECItem *params, SECItem *in, SECItem *result) | |
| 240 { | |
| 241 PK11Context *ctx = 0; | |
| 242 SECItem paddedResult; | |
| 243 SECStatus rv; | |
| 244 | |
| 245 paddedResult.len = 0; | |
| 246 paddedResult.data = 0; | |
| 247 | |
| 248 ctx = PK11_CreateContextBySymKey(type, CKA_DECRYPT, key, params); | |
| 249 if (!ctx) { rv = SECFailure; goto loser; } | |
| 250 | |
| 251 paddedResult.len = in->len; | |
| 252 paddedResult.data = PORT_ArenaAlloc(arena, paddedResult.len); | |
| 253 | |
| 254 rv = PK11_CipherOp(ctx, paddedResult.data, | |
| 255 (int*)&paddedResult.len, paddedResult.len, | |
| 256 in->data, in->len); | |
| 257 if (rv != SECSuccess) goto loser; | |
| 258 | |
| 259 PK11_Finalize(ctx); | |
| 260 | |
| 261 /* Remove the padding */ | |
| 262 rv = unpadBlock(&paddedResult, PK11_GetBlockSize(type, 0), result); | |
| 263 if (rv) goto loser; | |
| 264 | |
| 265 loser: | |
| 266 if (ctx) PK11_DestroyContext(ctx, PR_TRUE); | |
| 267 return rv; | |
| 268 } | |
| 269 | |
| 270 /* | |
| 271 * PK11SDR_Decrypt | |
| 272 * Decrypt a block of data produced by PK11SDR_Encrypt. The key used is identi
fied | |
| 273 * by the keyid field within the input. | |
| 274 */ | |
| 275 SECStatus | |
| 276 PK11SDR_Decrypt(SECItem *data, SECItem *result, void *cx) | |
| 277 { | |
| 278 SECStatus rv = SECSuccess; | |
| 279 PK11SlotInfo *slot = 0; | |
| 280 PK11SymKey *key = 0; | |
| 281 CK_MECHANISM_TYPE type; | |
| 282 SDRResult sdrResult; | |
| 283 SECItem *params = 0; | |
| 284 SECItem possibleResult = { 0, NULL, 0 }; | |
| 285 PLArenaPool *arena = 0; | |
| 286 | |
| 287 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE); | |
| 288 if (!arena) { rv = SECFailure; goto loser; } | |
| 289 | |
| 290 /* Decode the incoming data */ | |
| 291 memset(&sdrResult, 0, sizeof sdrResult); | |
| 292 rv = SEC_QuickDERDecodeItem(arena, &sdrResult, template, data); | |
| 293 if (rv != SECSuccess) goto loser; /* Invalid format */ | |
| 294 | |
| 295 /* Find the slot and key for the given keyid */ | |
| 296 slot = PK11_GetInternalKeySlot(); | |
| 297 if (!slot) { rv = SECFailure; goto loser; } | |
| 298 | |
| 299 rv = PK11_Authenticate(slot, PR_TRUE, cx); | |
| 300 if (rv != SECSuccess) goto loser; | |
| 301 | |
| 302 /* Get the parameter values from the data */ | |
| 303 params = PK11_ParamFromAlgid(&sdrResult.alg); | |
| 304 if (!params) { rv = SECFailure; goto loser; } | |
| 305 | |
| 306 /* Use triple-DES (Should look up the algorithm) */ | |
| 307 type = CKM_DES3_CBC; | |
| 308 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx); | |
| 309 if (!key) { | |
| 310 rv = SECFailure; | |
| 311 } else { | |
| 312 rv = pk11Decrypt(slot, arena, type, key, params, | |
| 313 &sdrResult.data, result); | |
| 314 } | |
| 315 | |
| 316 /* | |
| 317 * if the pad value was too small (1 or 2), then it's statistically | |
| 318 * 'likely' that (1 in 256) that we may not have the correct key. | |
| 319 * Check the other keys for a better match. If we find none, use | |
| 320 * this result. | |
| 321 */ | |
| 322 if (rv == SECWouldBlock) { | |
| 323 possibleResult = *result; | |
| 324 } | |
| 325 | |
| 326 /* | |
| 327 * handle the case where your key indicies may have been broken | |
| 328 */ | |
| 329 if (rv != SECSuccess) { | |
| 330 PK11SymKey *keyList = PK11_ListFixedKeysInSlot(slot, NULL, cx); | |
| 331 PK11SymKey *testKey = NULL; | |
| 332 PK11SymKey *nextKey = NULL; | |
| 333 | |
| 334 for (testKey = keyList; testKey; | |
| 335 testKey = PK11_GetNextSymKey(testKey)) { | |
| 336 rv = pk11Decrypt(slot, arena, type, testKey, params, | |
| 337 &sdrResult.data, result); | |
| 338 if (rv == SECSuccess) { | |
| 339 break; | |
| 340 } | |
| 341 /* found a close match. If it's our first remember it */ | |
| 342 if (rv == SECWouldBlock) { | |
| 343 if (possibleResult.data) { | |
| 344 /* this is unlikely but possible. If we hit this condition, | |
| 345 * we have no way of knowing which possibility to prefer. | |
| 346 * in this case we just match the key the application | |
| 347 * thought was the right one */ | |
| 348 SECITEM_ZfreeItem(result, PR_FALSE); | |
| 349 } else { | |
| 350 possibleResult = *result; | |
| 351 } | |
| 352 } | |
| 353 } | |
| 354 | |
| 355 /* free the list */ | |
| 356 for (testKey = keyList; testKey; testKey = nextKey) { | |
| 357 nextKey = PK11_GetNextSymKey(testKey); | |
| 358 PK11_FreeSymKey(testKey); | |
| 359 } | |
| 360 } | |
| 361 | |
| 362 /* we didn't find a better key, use the one with a small pad value */ | |
| 363 if ((rv != SECSuccess) && (possibleResult.data)) { | |
| 364 *result = possibleResult; | |
| 365 possibleResult.data = NULL; | |
| 366 rv = SECSuccess; | |
| 367 } | |
| 368 | |
| 369 loser: | |
| 370 if (arena) PORT_FreeArena(arena, PR_TRUE); | |
| 371 if (key) PK11_FreeSymKey(key); | |
| 372 if (params) SECITEM_ZfreeItem(params, PR_TRUE); | |
| 373 if (slot) PK11_FreeSlot(slot); | |
| 374 if (possibleResult.data) SECITEM_ZfreeItem(&possibleResult, PR_FALSE); | |
| 375 | |
| 376 return rv; | |
| 377 } | |
| OLD | NEW |