Coverage Report

Created: 2022-11-30 06:20

/src/openssl/crypto/rsa/rsa_ameth.c
Line
Count
Source (jump to first uncovered line)
1
/* crypto/rsa/rsa_ameth.c */
2
/*
3
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4
 * 2006.
5
 */
6
/* ====================================================================
7
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
8
 *
9
 * Redistribution and use in source and binary forms, with or without
10
 * modification, are permitted provided that the following conditions
11
 * are met:
12
 *
13
 * 1. Redistributions of source code must retain the above copyright
14
 *    notice, this list of conditions and the following disclaimer.
15
 *
16
 * 2. Redistributions in binary form must reproduce the above copyright
17
 *    notice, this list of conditions and the following disclaimer in
18
 *    the documentation and/or other materials provided with the
19
 *    distribution.
20
 *
21
 * 3. All advertising materials mentioning features or use of this
22
 *    software must display the following acknowledgment:
23
 *    "This product includes software developed by the OpenSSL Project
24
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25
 *
26
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27
 *    endorse or promote products derived from this software without
28
 *    prior written permission. For written permission, please contact
29
 *    licensing@OpenSSL.org.
30
 *
31
 * 5. Products derived from this software may not be called "OpenSSL"
32
 *    nor may "OpenSSL" appear in their names without prior written
33
 *    permission of the OpenSSL Project.
34
 *
35
 * 6. Redistributions of any form whatsoever must retain the following
36
 *    acknowledgment:
37
 *    "This product includes software developed by the OpenSSL Project
38
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39
 *
40
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51
 * OF THE POSSIBILITY OF SUCH DAMAGE.
52
 * ====================================================================
53
 *
54
 * This product includes cryptographic software written by Eric Young
55
 * (eay@cryptsoft.com).  This product includes software written by Tim
56
 * Hudson (tjh@cryptsoft.com).
57
 *
58
 */
59
60
#include <stdio.h>
61
#include "cryptlib.h"
62
#include <openssl/asn1t.h>
63
#include <openssl/x509.h>
64
#include <openssl/rsa.h>
65
#include <openssl/bn.h>
66
#ifndef OPENSSL_NO_CMS
67
# include <openssl/cms.h>
68
#endif
69
#include "asn1_locl.h"
70
71
#ifndef OPENSSL_NO_CMS
72
static int rsa_cms_sign(CMS_SignerInfo *si);
73
static int rsa_cms_verify(CMS_SignerInfo *si);
74
static int rsa_cms_decrypt(CMS_RecipientInfo *ri);
75
static int rsa_cms_encrypt(CMS_RecipientInfo *ri);
76
#endif
77
78
static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey)
79
0
{
80
0
    unsigned char *penc = NULL;
81
0
    int penclen;
82
0
    penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc);
83
0
    if (penclen <= 0)
84
0
        return 0;
85
0
    if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_RSA),
86
0
                               V_ASN1_NULL, NULL, penc, penclen))
87
0
        return 1;
88
89
0
    OPENSSL_free(penc);
90
0
    return 0;
91
0
}
92
93
static int rsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey)
94
0
{
95
0
    const unsigned char *p;
96
0
    int pklen;
97
0
    RSA *rsa = NULL;
98
0
    if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, NULL, pubkey))
99
0
        return 0;
100
0
    if (!(rsa = d2i_RSAPublicKey(NULL, &p, pklen))) {
101
0
        RSAerr(RSA_F_RSA_PUB_DECODE, ERR_R_RSA_LIB);
102
0
        return 0;
103
0
    }
104
0
    EVP_PKEY_assign_RSA(pkey, rsa);
105
0
    return 1;
106
0
}
107
108
static int rsa_pub_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
109
0
{
110
0
    if (BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) != 0
111
0
        || BN_cmp(b->pkey.rsa->e, a->pkey.rsa->e) != 0)
112
0
        return 0;
113
0
    return 1;
114
0
}
115
116
static int old_rsa_priv_decode(EVP_PKEY *pkey,
117
                               const unsigned char **pder, int derlen)
118
0
{
119
0
    RSA *rsa;
120
0
    if (!(rsa = d2i_RSAPrivateKey(NULL, pder, derlen))) {
121
0
        RSAerr(RSA_F_OLD_RSA_PRIV_DECODE, ERR_R_RSA_LIB);
122
0
        return 0;
123
0
    }
124
0
    EVP_PKEY_assign_RSA(pkey, rsa);
125
0
    return 1;
126
0
}
127
128
static int old_rsa_priv_encode(const EVP_PKEY *pkey, unsigned char **pder)
129
0
{
130
0
    return i2d_RSAPrivateKey(pkey->pkey.rsa, pder);
131
0
}
132
133
static int rsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey)
134
0
{
135
0
    unsigned char *rk = NULL;
136
0
    int rklen;
137
0
    rklen = i2d_RSAPrivateKey(pkey->pkey.rsa, &rk);
138
139
0
    if (rklen <= 0) {
140
0
        RSAerr(RSA_F_RSA_PRIV_ENCODE, ERR_R_MALLOC_FAILURE);
141
0
        return 0;
142
0
    }
143
144
0
    if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(NID_rsaEncryption), 0,
145
0
                         V_ASN1_NULL, NULL, rk, rklen)) {
146
0
        RSAerr(RSA_F_RSA_PRIV_ENCODE, ERR_R_MALLOC_FAILURE);
147
0
        return 0;
148
0
    }
149
150
0
    return 1;
151
0
}
152
153
static int rsa_priv_decode(EVP_PKEY *pkey, PKCS8_PRIV_KEY_INFO *p8)
154
0
{
155
0
    const unsigned char *p;
156
0
    int pklen;
157
0
    if (!PKCS8_pkey_get0(NULL, &p, &pklen, NULL, p8))
158
0
        return 0;
159
0
    return old_rsa_priv_decode(pkey, &p, pklen);
160
0
}
161
162
static int int_rsa_size(const EVP_PKEY *pkey)
163
0
{
164
0
    return RSA_size(pkey->pkey.rsa);
165
0
}
166
167
static int rsa_bits(const EVP_PKEY *pkey)
168
0
{
169
0
    return BN_num_bits(pkey->pkey.rsa->n);
170
0
}
171
172
static void int_rsa_free(EVP_PKEY *pkey)
173
0
{
174
0
    RSA_free(pkey->pkey.rsa);
175
0
}
176
177
static void update_buflen(const BIGNUM *b, size_t *pbuflen)
178
0
{
179
0
    size_t i;
180
0
    if (!b)
181
0
        return;
182
0
    if (*pbuflen < (i = (size_t)BN_num_bytes(b)))
183
0
        *pbuflen = i;
184
0
}
185
186
static int do_rsa_print(BIO *bp, const RSA *x, int off, int priv)
187
0
{
188
0
    char *str;
189
0
    const char *s;
190
0
    unsigned char *m = NULL;
191
0
    int ret = 0, mod_len = 0;
192
0
    size_t buf_len = 0;
193
194
0
    update_buflen(x->n, &buf_len);
195
0
    update_buflen(x->e, &buf_len);
196
197
0
    if (priv) {
198
0
        update_buflen(x->d, &buf_len);
199
0
        update_buflen(x->p, &buf_len);
200
0
        update_buflen(x->q, &buf_len);
201
0
        update_buflen(x->dmp1, &buf_len);
202
0
        update_buflen(x->dmq1, &buf_len);
203
0
        update_buflen(x->iqmp, &buf_len);
204
0
    }
205
206
0
    m = (unsigned char *)OPENSSL_malloc(buf_len + 10);
207
0
    if (m == NULL) {
208
0
        RSAerr(RSA_F_DO_RSA_PRINT, ERR_R_MALLOC_FAILURE);
209
0
        goto err;
210
0
    }
211
212
0
    if (x->n != NULL)
213
0
        mod_len = BN_num_bits(x->n);
214
215
0
    if (!BIO_indent(bp, off, 128))
216
0
        goto err;
217
218
0
    if (priv && x->d) {
219
0
        if (BIO_printf(bp, "Private-Key: (%d bit)\n", mod_len)
220
0
            <= 0)
221
0
            goto err;
222
0
        str = "modulus:";
223
0
        s = "publicExponent:";
224
0
    } else {
225
0
        if (BIO_printf(bp, "Public-Key: (%d bit)\n", mod_len)
226
0
            <= 0)
227
0
            goto err;
228
0
        str = "Modulus:";
229
0
        s = "Exponent:";
230
0
    }
231
0
    if (!ASN1_bn_print(bp, str, x->n, m, off))
232
0
        goto err;
233
0
    if (!ASN1_bn_print(bp, s, x->e, m, off))
234
0
        goto err;
235
0
    if (priv) {
236
0
        if (!ASN1_bn_print(bp, "privateExponent:", x->d, m, off))
237
0
            goto err;
238
0
        if (!ASN1_bn_print(bp, "prime1:", x->p, m, off))
239
0
            goto err;
240
0
        if (!ASN1_bn_print(bp, "prime2:", x->q, m, off))
241
0
            goto err;
242
0
        if (!ASN1_bn_print(bp, "exponent1:", x->dmp1, m, off))
243
0
            goto err;
244
0
        if (!ASN1_bn_print(bp, "exponent2:", x->dmq1, m, off))
245
0
            goto err;
246
0
        if (!ASN1_bn_print(bp, "coefficient:", x->iqmp, m, off))
247
0
            goto err;
248
0
    }
249
0
    ret = 1;
250
0
 err:
251
0
    if (m != NULL)
252
0
        OPENSSL_free(m);
253
0
    return (ret);
254
0
}
255
256
static int rsa_pub_print(BIO *bp, const EVP_PKEY *pkey, int indent,
257
                         ASN1_PCTX *ctx)
258
0
{
259
0
    return do_rsa_print(bp, pkey->pkey.rsa, indent, 0);
260
0
}
261
262
static int rsa_priv_print(BIO *bp, const EVP_PKEY *pkey, int indent,
263
                          ASN1_PCTX *ctx)
264
0
{
265
0
    return do_rsa_print(bp, pkey->pkey.rsa, indent, 1);
266
0
}
267
268
/* Given an MGF1 Algorithm ID decode to an Algorithm Identifier */
269
static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg)
270
0
{
271
0
    const unsigned char *p;
272
0
    int plen;
273
0
    if (alg == NULL || alg->parameter == NULL)
274
0
        return NULL;
275
0
    if (OBJ_obj2nid(alg->algorithm) != NID_mgf1)
276
0
        return NULL;
277
0
    if (alg->parameter->type != V_ASN1_SEQUENCE)
278
0
        return NULL;
279
280
0
    p = alg->parameter->value.sequence->data;
281
0
    plen = alg->parameter->value.sequence->length;
282
0
    return d2i_X509_ALGOR(NULL, &p, plen);
283
0
}
284
285
static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg,
286
                                      X509_ALGOR **pmaskHash)
287
0
{
288
0
    const unsigned char *p;
289
0
    int plen;
290
0
    RSA_PSS_PARAMS *pss;
291
292
0
    *pmaskHash = NULL;
293
294
0
    if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE)
295
0
        return NULL;
296
0
    p = alg->parameter->value.sequence->data;
297
0
    plen = alg->parameter->value.sequence->length;
298
0
    pss = d2i_RSA_PSS_PARAMS(NULL, &p, plen);
299
300
0
    if (!pss)
301
0
        return NULL;
302
303
0
    *pmaskHash = rsa_mgf1_decode(pss->maskGenAlgorithm);
304
305
0
    return pss;
306
0
}
307
308
static int rsa_pss_param_print(BIO *bp, RSA_PSS_PARAMS *pss,
309
                               X509_ALGOR *maskHash, int indent)
310
0
{
311
0
    int rv = 0;
312
0
    if (!pss) {
313
0
        if (BIO_puts(bp, " (INVALID PSS PARAMETERS)\n") <= 0)
314
0
            return 0;
315
0
        return 1;
316
0
    }
317
0
    if (BIO_puts(bp, "\n") <= 0)
318
0
        goto err;
319
0
    if (!BIO_indent(bp, indent, 128))
320
0
        goto err;
321
0
    if (BIO_puts(bp, "Hash Algorithm: ") <= 0)
322
0
        goto err;
323
324
0
    if (pss->hashAlgorithm) {
325
0
        if (i2a_ASN1_OBJECT(bp, pss->hashAlgorithm->algorithm) <= 0)
326
0
            goto err;
327
0
    } else if (BIO_puts(bp, "sha1 (default)") <= 0)
328
0
        goto err;
329
330
0
    if (BIO_puts(bp, "\n") <= 0)
331
0
        goto err;
332
333
0
    if (!BIO_indent(bp, indent, 128))
334
0
        goto err;
335
336
0
    if (BIO_puts(bp, "Mask Algorithm: ") <= 0)
337
0
        goto err;
338
0
    if (pss->maskGenAlgorithm) {
339
0
        if (i2a_ASN1_OBJECT(bp, pss->maskGenAlgorithm->algorithm) <= 0)
340
0
            goto err;
341
0
        if (BIO_puts(bp, " with ") <= 0)
342
0
            goto err;
343
0
        if (maskHash) {
344
0
            if (i2a_ASN1_OBJECT(bp, maskHash->algorithm) <= 0)
345
0
                goto err;
346
0
        } else if (BIO_puts(bp, "INVALID") <= 0)
347
0
            goto err;
348
0
    } else if (BIO_puts(bp, "mgf1 with sha1 (default)") <= 0)
349
0
        goto err;
350
0
    BIO_puts(bp, "\n");
351
352
0
    if (!BIO_indent(bp, indent, 128))
353
0
        goto err;
354
0
    if (BIO_puts(bp, "Salt Length: 0x") <= 0)
355
0
        goto err;
356
0
    if (pss->saltLength) {
357
0
        if (i2a_ASN1_INTEGER(bp, pss->saltLength) <= 0)
358
0
            goto err;
359
0
    } else if (BIO_puts(bp, "14 (default)") <= 0)
360
0
        goto err;
361
0
    BIO_puts(bp, "\n");
362
363
0
    if (!BIO_indent(bp, indent, 128))
364
0
        goto err;
365
0
    if (BIO_puts(bp, "Trailer Field: 0x") <= 0)
366
0
        goto err;
367
0
    if (pss->trailerField) {
368
0
        if (i2a_ASN1_INTEGER(bp, pss->trailerField) <= 0)
369
0
            goto err;
370
0
    } else if (BIO_puts(bp, "BC (default)") <= 0)
371
0
        goto err;
372
0
    BIO_puts(bp, "\n");
373
374
0
    rv = 1;
375
376
0
 err:
377
0
    return rv;
378
379
0
}
380
381
static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
382
                         const ASN1_STRING *sig, int indent, ASN1_PCTX *pctx)
383
0
{
384
0
    if (OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss) {
385
0
        int rv;
386
0
        RSA_PSS_PARAMS *pss;
387
0
        X509_ALGOR *maskHash;
388
0
        pss = rsa_pss_decode(sigalg, &maskHash);
389
0
        rv = rsa_pss_param_print(bp, pss, maskHash, indent);
390
0
        if (pss)
391
0
            RSA_PSS_PARAMS_free(pss);
392
0
        if (maskHash)
393
0
            X509_ALGOR_free(maskHash);
394
0
        if (!rv)
395
0
            return 0;
396
0
    } else if (!sig && BIO_puts(bp, "\n") <= 0)
397
0
        return 0;
398
0
    if (sig)
399
0
        return X509_signature_dump(bp, sig, indent);
400
0
    return 1;
401
0
}
402
403
static int rsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
404
0
{
405
0
    X509_ALGOR *alg = NULL;
406
0
    switch (op) {
407
408
0
    case ASN1_PKEY_CTRL_PKCS7_SIGN:
409
0
        if (arg1 == 0)
410
0
            PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg);
411
0
        break;
412
413
0
    case ASN1_PKEY_CTRL_PKCS7_ENCRYPT:
414
0
        if (arg1 == 0)
415
0
            PKCS7_RECIP_INFO_get0_alg(arg2, &alg);
416
0
        break;
417
0
#ifndef OPENSSL_NO_CMS
418
0
    case ASN1_PKEY_CTRL_CMS_SIGN:
419
0
        if (arg1 == 0)
420
0
            return rsa_cms_sign(arg2);
421
0
        else if (arg1 == 1)
422
0
            return rsa_cms_verify(arg2);
423
0
        break;
424
425
0
    case ASN1_PKEY_CTRL_CMS_ENVELOPE:
426
0
        if (arg1 == 0)
427
0
            return rsa_cms_encrypt(arg2);
428
0
        else if (arg1 == 1)
429
0
            return rsa_cms_decrypt(arg2);
430
0
        break;
431
432
0
    case ASN1_PKEY_CTRL_CMS_RI_TYPE:
433
0
        *(int *)arg2 = CMS_RECIPINFO_TRANS;
434
0
        return 1;
435
0
#endif
436
437
0
    case ASN1_PKEY_CTRL_DEFAULT_MD_NID:
438
0
        *(int *)arg2 = NID_sha256;
439
0
        return 1;
440
441
0
    default:
442
0
        return -2;
443
444
0
    }
445
446
0
    if (alg)
447
0
        X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption), V_ASN1_NULL, 0);
448
449
0
    return 1;
450
451
0
}
452
453
/* allocate and set algorithm ID from EVP_MD, default SHA1 */
454
static int rsa_md_to_algor(X509_ALGOR **palg, const EVP_MD *md)
455
0
{
456
0
    if (EVP_MD_type(md) == NID_sha1)
457
0
        return 1;
458
0
    *palg = X509_ALGOR_new();
459
0
    if (!*palg)
460
0
        return 0;
461
0
    X509_ALGOR_set_md(*palg, md);
462
0
    return 1;
463
0
}
464
465
/* Allocate and set MGF1 algorithm ID from EVP_MD */
466
static int rsa_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md)
467
0
{
468
0
    X509_ALGOR *algtmp = NULL;
469
0
    ASN1_STRING *stmp = NULL;
470
0
    *palg = NULL;
471
0
    if (EVP_MD_type(mgf1md) == NID_sha1)
472
0
        return 1;
473
    /* need to embed algorithm ID inside another */
474
0
    if (!rsa_md_to_algor(&algtmp, mgf1md))
475
0
        goto err;
476
0
    if (!ASN1_item_pack(algtmp, ASN1_ITEM_rptr(X509_ALGOR), &stmp))
477
0
         goto err;
478
0
    *palg = X509_ALGOR_new();
479
0
    if (!*palg)
480
0
        goto err;
481
0
    X509_ALGOR_set0(*palg, OBJ_nid2obj(NID_mgf1), V_ASN1_SEQUENCE, stmp);
482
0
    stmp = NULL;
483
0
 err:
484
0
    if (stmp)
485
0
        ASN1_STRING_free(stmp);
486
0
    if (algtmp)
487
0
        X509_ALGOR_free(algtmp);
488
0
    if (*palg)
489
0
        return 1;
490
0
    return 0;
491
0
}
492
493
/* convert algorithm ID to EVP_MD, default SHA1 */
494
static const EVP_MD *rsa_algor_to_md(X509_ALGOR *alg)
495
0
{
496
0
    const EVP_MD *md;
497
0
    if (!alg)
498
0
        return EVP_sha1();
499
0
    md = EVP_get_digestbyobj(alg->algorithm);
500
0
    if (md == NULL)
501
0
        RSAerr(RSA_F_RSA_ALGOR_TO_MD, RSA_R_UNKNOWN_DIGEST);
502
0
    return md;
503
0
}
504
505
/* convert MGF1 algorithm ID to EVP_MD, default SHA1 */
506
static const EVP_MD *rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash)
507
0
{
508
0
    const EVP_MD *md;
509
0
    if (!alg)
510
0
        return EVP_sha1();
511
    /* Check mask and lookup mask hash algorithm */
512
0
    if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) {
513
0
        RSAerr(RSA_F_RSA_MGF1_TO_MD, RSA_R_UNSUPPORTED_MASK_ALGORITHM);
514
0
        return NULL;
515
0
    }
516
0
    if (!maskHash) {
517
0
        RSAerr(RSA_F_RSA_MGF1_TO_MD, RSA_R_UNSUPPORTED_MASK_PARAMETER);
518
0
        return NULL;
519
0
    }
520
0
    md = EVP_get_digestbyobj(maskHash->algorithm);
521
0
    if (md == NULL) {
522
0
        RSAerr(RSA_F_RSA_MGF1_TO_MD, RSA_R_UNKNOWN_MASK_DIGEST);
523
0
        return NULL;
524
0
    }
525
0
    return md;
526
0
}
527
528
/*
529
 * Convert EVP_PKEY_CTX is PSS mode into corresponding algorithm parameter,
530
 * suitable for setting an AlgorithmIdentifier.
531
 */
532
533
static ASN1_STRING *rsa_ctx_to_pss(EVP_PKEY_CTX *pkctx)
534
0
{
535
0
    const EVP_MD *sigmd, *mgf1md;
536
0
    RSA_PSS_PARAMS *pss = NULL;
537
0
    ASN1_STRING *os = NULL;
538
0
    EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx);
539
0
    int saltlen, rv = 0;
540
0
    if (EVP_PKEY_CTX_get_signature_md(pkctx, &sigmd) <= 0)
541
0
        goto err;
542
0
    if (EVP_PKEY_CTX_get_rsa_mgf1_md(pkctx, &mgf1md) <= 0)
543
0
        goto err;
544
0
    if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen))
545
0
        goto err;
546
0
    if (saltlen == -1)
547
0
        saltlen = EVP_MD_size(sigmd);
548
0
    else if (saltlen == -2) {
549
0
        saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2;
550
0
        if (((EVP_PKEY_bits(pk) - 1) & 0x7) == 0)
551
0
            saltlen--;
552
0
    }
553
0
    pss = RSA_PSS_PARAMS_new();
554
0
    if (!pss)
555
0
        goto err;
556
0
    if (saltlen != 20) {
557
0
        pss->saltLength = ASN1_INTEGER_new();
558
0
        if (!pss->saltLength)
559
0
            goto err;
560
0
        if (!ASN1_INTEGER_set(pss->saltLength, saltlen))
561
0
            goto err;
562
0
    }
563
0
    if (!rsa_md_to_algor(&pss->hashAlgorithm, sigmd))
564
0
        goto err;
565
0
    if (!rsa_md_to_mgf1(&pss->maskGenAlgorithm, mgf1md))
566
0
        goto err;
567
    /* Finally create string with pss parameter encoding. */
568
0
    if (!ASN1_item_pack(pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), &os))
569
0
         goto err;
570
0
    rv = 1;
571
0
 err:
572
0
    if (pss)
573
0
        RSA_PSS_PARAMS_free(pss);
574
0
    if (rv)
575
0
        return os;
576
0
    if (os)
577
0
        ASN1_STRING_free(os);
578
0
    return NULL;
579
0
}
580
581
/*
582
 * From PSS AlgorithmIdentifier set public key parameters. If pkey isn't NULL
583
 * then the EVP_MD_CTX is setup and initalised. If it is NULL parameters are
584
 * passed to pkctx instead.
585
 */
586
587
static int rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx,
588
                          X509_ALGOR *sigalg, EVP_PKEY *pkey)
589
0
{
590
0
    int rv = -1;
591
0
    int saltlen;
592
0
    const EVP_MD *mgf1md = NULL, *md = NULL;
593
0
    RSA_PSS_PARAMS *pss;
594
0
    X509_ALGOR *maskHash;
595
    /* Sanity check: make sure it is PSS */
596
0
    if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) {
597
0
        RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_UNSUPPORTED_SIGNATURE_TYPE);
598
0
        return -1;
599
0
    }
600
    /* Decode PSS parameters */
601
0
    pss = rsa_pss_decode(sigalg, &maskHash);
602
603
0
    if (pss == NULL) {
604
0
        RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_INVALID_PSS_PARAMETERS);
605
0
        goto err;
606
0
    }
607
0
    mgf1md = rsa_mgf1_to_md(pss->maskGenAlgorithm, maskHash);
608
0
    if (!mgf1md)
609
0
        goto err;
610
0
    md = rsa_algor_to_md(pss->hashAlgorithm);
611
0
    if (!md)
612
0
        goto err;
613
614
0
    if (pss->saltLength) {
615
0
        saltlen = ASN1_INTEGER_get(pss->saltLength);
616
617
        /*
618
         * Could perform more salt length sanity checks but the main RSA
619
         * routines will trap other invalid values anyway.
620
         */
621
0
        if (saltlen < 0) {
622
0
            RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_INVALID_SALT_LENGTH);
623
0
            goto err;
624
0
        }
625
0
    } else
626
0
        saltlen = 20;
627
628
    /*
629
     * low-level routines support only trailer field 0xbc (value 1) and
630
     * PKCS#1 says we should reject any other value anyway.
631
     */
632
0
    if (pss->trailerField && ASN1_INTEGER_get(pss->trailerField) != 1) {
633
0
        RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_INVALID_TRAILER);
634
0
        goto err;
635
0
    }
636
637
    /* We have all parameters now set up context */
638
639
0
    if (pkey) {
640
0
        if (!EVP_DigestVerifyInit(ctx, &pkctx, md, NULL, pkey))
641
0
            goto err;
642
0
    } else {
643
0
        const EVP_MD *checkmd;
644
0
        if (EVP_PKEY_CTX_get_signature_md(pkctx, &checkmd) <= 0)
645
0
            goto err;
646
0
        if (EVP_MD_type(md) != EVP_MD_type(checkmd)) {
647
0
            RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_DIGEST_DOES_NOT_MATCH);
648
0
            goto err;
649
0
        }
650
0
    }
651
652
0
    if (EVP_PKEY_CTX_set_rsa_padding(pkctx, RSA_PKCS1_PSS_PADDING) <= 0)
653
0
        goto err;
654
655
0
    if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0)
656
0
        goto err;
657
658
0
    if (EVP_PKEY_CTX_set_rsa_mgf1_md(pkctx, mgf1md) <= 0)
659
0
        goto err;
660
    /* Carry on */
661
0
    rv = 1;
662
663
0
 err:
664
0
    RSA_PSS_PARAMS_free(pss);
665
0
    if (maskHash)
666
0
        X509_ALGOR_free(maskHash);
667
0
    return rv;
668
0
}
669
670
#ifndef OPENSSL_NO_CMS
671
static int rsa_cms_verify(CMS_SignerInfo *si)
672
0
{
673
0
    int nid, nid2;
674
0
    X509_ALGOR *alg;
675
0
    EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si);
676
0
    CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
677
0
    nid = OBJ_obj2nid(alg->algorithm);
678
0
    if (nid == NID_rsaEncryption)
679
0
        return 1;
680
0
    if (nid == NID_rsassaPss)
681
0
        return rsa_pss_to_ctx(NULL, pkctx, alg, NULL);
682
    /* Workaround for some implementation that use a signature OID */
683
0
    if (OBJ_find_sigid_algs(nid, NULL, &nid2)) {
684
0
        if (nid2 == NID_rsaEncryption)
685
0
            return 1;
686
0
    }
687
0
    return 0;
688
0
}
689
#endif
690
691
/*
692
 * Customised RSA item verification routine. This is called when a signature
693
 * is encountered requiring special handling. We currently only handle PSS.
694
 */
695
696
static int rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
697
                           X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
698
                           EVP_PKEY *pkey)
699
0
{
700
    /* Sanity check: make sure it is PSS */
701
0
    if (OBJ_obj2nid(sigalg->algorithm) != NID_rsassaPss) {
702
0
        RSAerr(RSA_F_RSA_ITEM_VERIFY, RSA_R_UNSUPPORTED_SIGNATURE_TYPE);
703
0
        return -1;
704
0
    }
705
0
    if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
706
        /* Carry on */
707
0
        return 2;
708
0
    }
709
0
    return -1;
710
0
}
711
712
#ifndef OPENSSL_NO_CMS
713
static int rsa_cms_sign(CMS_SignerInfo *si)
714
0
{
715
0
    int pad_mode = RSA_PKCS1_PADDING;
716
0
    X509_ALGOR *alg;
717
0
    EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si);
718
0
    ASN1_STRING *os = NULL;
719
0
    CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
720
0
    if (pkctx) {
721
0
        if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
722
0
            return 0;
723
0
    }
724
0
    if (pad_mode == RSA_PKCS1_PADDING) {
725
0
        X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption), V_ASN1_NULL, 0);
726
0
        return 1;
727
0
    }
728
    /* We don't support it */
729
0
    if (pad_mode != RSA_PKCS1_PSS_PADDING)
730
0
        return 0;
731
0
    os = rsa_ctx_to_pss(pkctx);
732
0
    if (!os)
733
0
        return 0;
734
0
    X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsassaPss), V_ASN1_SEQUENCE, os);
735
0
    return 1;
736
0
}
737
#endif
738
739
static int rsa_item_sign(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
740
                         X509_ALGOR *alg1, X509_ALGOR *alg2,
741
                         ASN1_BIT_STRING *sig)
742
0
{
743
0
    int pad_mode;
744
0
    EVP_PKEY_CTX *pkctx = ctx->pctx;
745
0
    if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
746
0
        return 0;
747
0
    if (pad_mode == RSA_PKCS1_PADDING)
748
0
        return 2;
749
0
    if (pad_mode == RSA_PKCS1_PSS_PADDING) {
750
0
        ASN1_STRING *os1 = NULL;
751
0
        os1 = rsa_ctx_to_pss(pkctx);
752
0
        if (!os1)
753
0
            return 0;
754
        /* Duplicate parameters if we have to */
755
0
        if (alg2) {
756
0
            ASN1_STRING *os2 = ASN1_STRING_dup(os1);
757
0
            if (!os2) {
758
0
                ASN1_STRING_free(os1);
759
0
                return 0;
760
0
            }
761
0
            X509_ALGOR_set0(alg2, OBJ_nid2obj(NID_rsassaPss),
762
0
                            V_ASN1_SEQUENCE, os2);
763
0
        }
764
0
        X509_ALGOR_set0(alg1, OBJ_nid2obj(NID_rsassaPss),
765
0
                        V_ASN1_SEQUENCE, os1);
766
0
        return 3;
767
0
    }
768
0
    return 2;
769
0
}
770
771
#ifndef OPENSSL_NO_CMS
772
static RSA_OAEP_PARAMS *rsa_oaep_decode(const X509_ALGOR *alg,
773
                                        X509_ALGOR **pmaskHash)
774
0
{
775
0
    const unsigned char *p;
776
0
    int plen;
777
0
    RSA_OAEP_PARAMS *pss;
778
779
0
    *pmaskHash = NULL;
780
781
0
    if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE)
782
0
        return NULL;
783
0
    p = alg->parameter->value.sequence->data;
784
0
    plen = alg->parameter->value.sequence->length;
785
0
    pss = d2i_RSA_OAEP_PARAMS(NULL, &p, plen);
786
787
0
    if (!pss)
788
0
        return NULL;
789
790
0
    *pmaskHash = rsa_mgf1_decode(pss->maskGenFunc);
791
792
0
    return pss;
793
0
}
794
795
static int rsa_cms_decrypt(CMS_RecipientInfo *ri)
796
0
{
797
0
    EVP_PKEY_CTX *pkctx;
798
0
    X509_ALGOR *cmsalg;
799
0
    int nid;
800
0
    int rv = -1;
801
0
    unsigned char *label = NULL;
802
0
    int labellen = 0;
803
0
    const EVP_MD *mgf1md = NULL, *md = NULL;
804
0
    RSA_OAEP_PARAMS *oaep;
805
0
    X509_ALGOR *maskHash;
806
0
    pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri);
807
0
    if (!pkctx)
808
0
        return 0;
809
0
    if (!CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &cmsalg))
810
0
        return -1;
811
0
    nid = OBJ_obj2nid(cmsalg->algorithm);
812
0
    if (nid == NID_rsaEncryption)
813
0
        return 1;
814
0
    if (nid != NID_rsaesOaep) {
815
0
        RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_UNSUPPORTED_ENCRYPTION_TYPE);
816
0
        return -1;
817
0
    }
818
    /* Decode OAEP parameters */
819
0
    oaep = rsa_oaep_decode(cmsalg, &maskHash);
820
821
0
    if (oaep == NULL) {
822
0
        RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_INVALID_OAEP_PARAMETERS);
823
0
        goto err;
824
0
    }
825
826
0
    mgf1md = rsa_mgf1_to_md(oaep->maskGenFunc, maskHash);
827
0
    if (!mgf1md)
828
0
        goto err;
829
0
    md = rsa_algor_to_md(oaep->hashFunc);
830
0
    if (!md)
831
0
        goto err;
832
833
0
    if (oaep->pSourceFunc) {
834
0
        X509_ALGOR *plab = oaep->pSourceFunc;
835
0
        if (OBJ_obj2nid(plab->algorithm) != NID_pSpecified) {
836
0
            RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_UNSUPPORTED_LABEL_SOURCE);
837
0
            goto err;
838
0
        }
839
0
        if (plab->parameter->type != V_ASN1_OCTET_STRING) {
840
0
            RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_INVALID_LABEL);
841
0
            goto err;
842
0
        }
843
844
0
        label = plab->parameter->value.octet_string->data;
845
        /* Stop label being freed when OAEP parameters are freed */
846
0
        plab->parameter->value.octet_string->data = NULL;
847
0
        labellen = plab->parameter->value.octet_string->length;
848
0
    }
849
850
0
    if (EVP_PKEY_CTX_set_rsa_padding(pkctx, RSA_PKCS1_OAEP_PADDING) <= 0)
851
0
        goto err;
852
0
    if (EVP_PKEY_CTX_set_rsa_oaep_md(pkctx, md) <= 0)
853
0
        goto err;
854
0
    if (EVP_PKEY_CTX_set_rsa_mgf1_md(pkctx, mgf1md) <= 0)
855
0
        goto err;
856
0
    if (EVP_PKEY_CTX_set0_rsa_oaep_label(pkctx, label, labellen) <= 0)
857
0
        goto err;
858
    /* Carry on */
859
0
    rv = 1;
860
861
0
 err:
862
0
    RSA_OAEP_PARAMS_free(oaep);
863
0
    if (maskHash)
864
0
        X509_ALGOR_free(maskHash);
865
0
    return rv;
866
0
}
867
868
static int rsa_cms_encrypt(CMS_RecipientInfo *ri)
869
0
{
870
0
    const EVP_MD *md, *mgf1md;
871
0
    RSA_OAEP_PARAMS *oaep = NULL;
872
0
    ASN1_STRING *os = NULL;
873
0
    X509_ALGOR *alg;
874
0
    EVP_PKEY_CTX *pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri);
875
0
    int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen;
876
0
    unsigned char *label;
877
0
    CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &alg);
878
0
    if (pkctx) {
879
0
        if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
880
0
            return 0;
881
0
    }
882
0
    if (pad_mode == RSA_PKCS1_PADDING) {
883
0
        X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption), V_ASN1_NULL, 0);
884
0
        return 1;
885
0
    }
886
    /* Not supported */
887
0
    if (pad_mode != RSA_PKCS1_OAEP_PADDING)
888
0
        return 0;
889
0
    if (EVP_PKEY_CTX_get_rsa_oaep_md(pkctx, &md) <= 0)
890
0
        goto err;
891
0
    if (EVP_PKEY_CTX_get_rsa_mgf1_md(pkctx, &mgf1md) <= 0)
892
0
        goto err;
893
0
    labellen = EVP_PKEY_CTX_get0_rsa_oaep_label(pkctx, &label);
894
0
    if (labellen < 0)
895
0
        goto err;
896
0
    oaep = RSA_OAEP_PARAMS_new();
897
0
    if (!oaep)
898
0
        goto err;
899
0
    if (!rsa_md_to_algor(&oaep->hashFunc, md))
900
0
        goto err;
901
0
    if (!rsa_md_to_mgf1(&oaep->maskGenFunc, mgf1md))
902
0
        goto err;
903
0
    if (labellen > 0) {
904
0
        ASN1_OCTET_STRING *los = ASN1_OCTET_STRING_new();
905
0
        oaep->pSourceFunc = X509_ALGOR_new();
906
0
        if (!oaep->pSourceFunc)
907
0
            goto err;
908
0
        if (!los)
909
0
            goto err;
910
0
        if (!ASN1_OCTET_STRING_set(los, label, labellen)) {
911
0
            ASN1_OCTET_STRING_free(los);
912
0
            goto err;
913
0
        }
914
0
        X509_ALGOR_set0(oaep->pSourceFunc, OBJ_nid2obj(NID_pSpecified),
915
0
                        V_ASN1_OCTET_STRING, los);
916
0
    }
917
    /* create string with pss parameter encoding. */
918
0
    if (!ASN1_item_pack(oaep, ASN1_ITEM_rptr(RSA_OAEP_PARAMS), &os))
919
0
         goto err;
920
0
    X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaesOaep), V_ASN1_SEQUENCE, os);
921
0
    os = NULL;
922
0
    rv = 1;
923
0
 err:
924
0
    if (oaep)
925
0
        RSA_OAEP_PARAMS_free(oaep);
926
0
    if (os)
927
0
        ASN1_STRING_free(os);
928
0
    return rv;
929
0
}
930
#endif
931
932
const EVP_PKEY_ASN1_METHOD rsa_asn1_meths[] = {
933
    {
934
     EVP_PKEY_RSA,
935
     EVP_PKEY_RSA,
936
     ASN1_PKEY_SIGPARAM_NULL,
937
938
     "RSA",
939
     "OpenSSL RSA method",
940
941
     rsa_pub_decode,
942
     rsa_pub_encode,
943
     rsa_pub_cmp,
944
     rsa_pub_print,
945
946
     rsa_priv_decode,
947
     rsa_priv_encode,
948
     rsa_priv_print,
949
950
     int_rsa_size,
951
     rsa_bits,
952
953
     0, 0, 0, 0, 0, 0,
954
955
     rsa_sig_print,
956
     int_rsa_free,
957
     rsa_pkey_ctrl,
958
     old_rsa_priv_decode,
959
     old_rsa_priv_encode,
960
     rsa_item_verify,
961
     rsa_item_sign},
962
963
    {
964
     EVP_PKEY_RSA2,
965
     EVP_PKEY_RSA,
966
     ASN1_PKEY_ALIAS}
967
};