| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499 |
- /*
- * libwebsockets - small server side websockets and web server implementation
- *
- * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to
- * deal in the Software without restriction, including without limitation the
- * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
- * sell copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- *
- * lws_genrsa provides an RSA abstraction api in lws that works the
- * same whether you are using openssl or mbedtls crypto functions underneath.
- */
- #include "private-lib-core.h"
- #include "private-lib-tls-mbedtls.h"
- #include <mbedtls/rsa.h>
- void
- lws_genrsa_destroy_elements(struct lws_gencrypto_keyelem *el)
- {
- int n;
- for (n = 0; n < LWS_GENCRYPTO_RSA_KEYEL_COUNT; n++)
- if (el[n].buf)
- lws_free_set_NULL(el[n].buf);
- }
- static int mode_map[] = { MBEDTLS_RSA_PKCS_V15, MBEDTLS_RSA_PKCS_V21 };
- int
- lws_genrsa_create(struct lws_genrsa_ctx *ctx, struct lws_gencrypto_keyelem *el,
- struct lws_context *context, enum enum_genrsa_mode mode,
- enum lws_genhash_types oaep_hashid)
- {
- memset(ctx, 0, sizeof(*ctx));
- ctx->ctx = lws_zalloc(sizeof(*ctx->ctx), "genrsa");
- if (!ctx->ctx)
- return 1;
- ctx->context = context;
- ctx->mode = mode;
- if (mode >= LGRSAM_COUNT)
- return -1;
- mbedtls_rsa_init(ctx->ctx, mode_map[mode], 0);
- ctx->ctx->padding = mode_map[mode];
- ctx->ctx->hash_id = lws_gencrypto_mbedtls_hash_to_MD_TYPE(oaep_hashid);
- {
- int n;
- mbedtls_mpi *mpi[LWS_GENCRYPTO_RSA_KEYEL_COUNT] = {
- &ctx->ctx->E, &ctx->ctx->N, &ctx->ctx->D, &ctx->ctx->P,
- &ctx->ctx->Q, &ctx->ctx->DP, &ctx->ctx->DQ,
- &ctx->ctx->QP,
- };
- for (n = 0; n < LWS_GENCRYPTO_RSA_KEYEL_COUNT; n++)
- if (el[n].buf &&
- mbedtls_mpi_read_binary(mpi[n], el[n].buf,
- el[n].len)) {
- lwsl_notice("mpi load failed\n");
- lws_free_set_NULL(ctx->ctx);
- return -1;
- }
- /* mbedtls... compute missing P & Q */
- if ( el[LWS_GENCRYPTO_RSA_KEYEL_D].len &&
- !el[LWS_GENCRYPTO_RSA_KEYEL_P].len &&
- !el[LWS_GENCRYPTO_RSA_KEYEL_Q].len) {
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- if (mbedtls_rsa_complete(ctx->ctx)) {
- lwsl_notice("mbedtls_rsa_complete failed\n");
- #else
- {
- lwsl_notice("%s: you have to provide P and Q\n", __func__);
- #endif
- lws_free_set_NULL(ctx->ctx);
- return -1;
- }
- }
- }
- ctx->ctx->len = el[LWS_GENCRYPTO_RSA_KEYEL_N].len;
- return 0;
- }
- static int
- _rngf(void *context, unsigned char *buf, size_t len)
- {
- if ((size_t)lws_get_random(context, buf, len) == len)
- return 0;
- return -1;
- }
- int
- lws_genrsa_new_keypair(struct lws_context *context, struct lws_genrsa_ctx *ctx,
- enum enum_genrsa_mode mode, struct lws_gencrypto_keyelem *el,
- int bits)
- {
- int n;
- memset(ctx, 0, sizeof(*ctx));
- ctx->ctx = lws_zalloc(sizeof(*ctx->ctx), "genrsa");
- if (!ctx->ctx)
- return -1;
- ctx->context = context;
- ctx->mode = mode;
- if (mode >= LGRSAM_COUNT)
- return -1;
- mbedtls_rsa_init(ctx->ctx, mode_map[mode], 0);
- n = mbedtls_rsa_gen_key(ctx->ctx, _rngf, context, bits, 65537);
- if (n) {
- lwsl_err("mbedtls_rsa_gen_key failed 0x%x\n", -n);
- goto cleanup_1;
- }
- {
- mbedtls_mpi *mpi[LWS_GENCRYPTO_RSA_KEYEL_COUNT] = {
- &ctx->ctx->E, &ctx->ctx->N, &ctx->ctx->D, &ctx->ctx->P,
- &ctx->ctx->Q, &ctx->ctx->DP, &ctx->ctx->DQ,
- &ctx->ctx->QP,
- };
- for (n = 0; n < LWS_GENCRYPTO_RSA_KEYEL_COUNT; n++)
- if (mbedtls_mpi_size(mpi[n])) {
- el[n].buf = lws_malloc(
- mbedtls_mpi_size(mpi[n]), "genrsakey");
- if (!el[n].buf)
- goto cleanup;
- el[n].len = mbedtls_mpi_size(mpi[n]);
- if (mbedtls_mpi_write_binary(mpi[n], el[n].buf,
- el[n].len))
- goto cleanup;
- }
- }
- return 0;
- cleanup:
- for (n = 0; n < LWS_GENCRYPTO_RSA_KEYEL_COUNT; n++)
- if (el[n].buf)
- lws_free_set_NULL(el[n].buf);
- cleanup_1:
- lws_free(ctx->ctx);
- return -1;
- }
- int
- lws_genrsa_public_decrypt(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- size_t in_len, uint8_t *out, size_t out_max)
- {
- size_t olen = 0;
- int n;
- ctx->ctx->len = in_len;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsaes_pkcs1_v15_decrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PUBLIC,
- &olen, in, out,
- out_max);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsaes_oaep_decrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PUBLIC,
- NULL, 0,
- &olen, in, out, out_max);
- break;
- default:
- return -1;
- }
- if (n) {
- lwsl_notice("%s: -0x%x\n", __func__, -n);
- return -1;
- }
- return olen;
- }
- int
- lws_genrsa_private_decrypt(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- size_t in_len, uint8_t *out, size_t out_max)
- {
- size_t olen = 0;
- int n;
- ctx->ctx->len = in_len;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsaes_pkcs1_v15_decrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PRIVATE,
- &olen, in, out,
- out_max);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsaes_oaep_decrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PRIVATE,
- NULL, 0,
- &olen, in, out, out_max);
- break;
- default:
- return -1;
- }
- if (n) {
- lwsl_notice("%s: -0x%x\n", __func__, -n);
- return -1;
- }
- return olen;
- }
- int
- lws_genrsa_public_encrypt(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- size_t in_len, uint8_t *out)
- {
- int n;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsaes_pkcs1_v15_encrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PUBLIC,
- in_len, in, out);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsaes_oaep_encrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PUBLIC,
- NULL, 0,
- in_len, in, out);
- break;
- default:
- return -1;
- }
- if (n < 0) {
- lwsl_notice("%s: -0x%x: in_len: %d\n", __func__, -n,
- (int)in_len);
- return -1;
- }
- return mbedtls_mpi_size(&ctx->ctx->N);
- }
- int
- lws_genrsa_private_encrypt(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- size_t in_len, uint8_t *out)
- {
- int n;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsaes_pkcs1_v15_encrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PRIVATE,
- in_len, in, out);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsaes_oaep_encrypt(ctx->ctx, _rngf,
- ctx->context,
- MBEDTLS_RSA_PRIVATE,
- NULL, 0,
- in_len, in, out);
- break;
- default:
- return -1;
- }
- if (n) {
- lwsl_notice("%s: -0x%x: in_len: %d\n", __func__, -n,
- (int)in_len);
- return -1;
- }
- return mbedtls_mpi_size(&ctx->ctx->N);
- }
- int
- lws_genrsa_hash_sig_verify(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- enum lws_genhash_types hash_type, const uint8_t *sig,
- size_t sig_len)
- {
- int n, h = lws_gencrypto_mbedtls_hash_to_MD_TYPE(hash_type);
- if (h < 0)
- return -1;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsassa_pkcs1_v15_verify(ctx->ctx, NULL, NULL,
- MBEDTLS_RSA_PUBLIC,
- h, 0, in, sig);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsassa_pss_verify(ctx->ctx, NULL, NULL,
- MBEDTLS_RSA_PUBLIC,
- h, 0, in, sig);
- break;
- default:
- return -1;
- }
- if (n < 0) {
- lwsl_notice("%s: -0x%x\n", __func__, -n);
- return -1;
- }
- return n;
- }
- int
- lws_genrsa_hash_sign(struct lws_genrsa_ctx *ctx, const uint8_t *in,
- enum lws_genhash_types hash_type, uint8_t *sig,
- size_t sig_len)
- {
- int n, h = lws_gencrypto_mbedtls_hash_to_MD_TYPE(hash_type);
- if (h < 0)
- return -1;
- #if defined(LWS_HAVE_mbedtls_rsa_complete)
- mbedtls_rsa_complete(ctx->ctx);
- #endif
- /*
- * The "sig" buffer must be as large as the size of ctx->N
- * (eg. 128 bytes if RSA-1024 is used).
- */
- if (sig_len < ctx->ctx->len)
- return -1;
- switch(ctx->mode) {
- case LGRSAM_PKCS1_1_5:
- n = mbedtls_rsa_rsassa_pkcs1_v15_sign(ctx->ctx, NULL, NULL,
- MBEDTLS_RSA_PRIVATE,
- h, 0, in, sig);
- break;
- case LGRSAM_PKCS1_OAEP_PSS:
- n = mbedtls_rsa_rsassa_pss_sign(ctx->ctx, NULL, NULL,
- MBEDTLS_RSA_PRIVATE,
- h, 0, in, sig);
- break;
- default:
- return -1;
- }
- if (n < 0) {
- lwsl_notice("%s: -0x%x\n", __func__, -n);
- return -1;
- }
- return ctx->ctx->len;
- }
- int
- lws_genrsa_render_pkey_asn1(struct lws_genrsa_ctx *ctx, int _private,
- uint8_t *pkey_asn1, size_t pkey_asn1_len)
- {
- uint8_t *p = pkey_asn1, *totlen, *end = pkey_asn1 + pkey_asn1_len - 1;
- mbedtls_mpi *mpi[LWS_GENCRYPTO_RSA_KEYEL_COUNT] = {
- &ctx->ctx->N, &ctx->ctx->E, &ctx->ctx->D, &ctx->ctx->P,
- &ctx->ctx->Q, &ctx->ctx->DP, &ctx->ctx->DQ,
- &ctx->ctx->QP,
- };
- int n;
- /* 30 82 - sequence
- * 09 29 <-- length(0x0929) less 4 bytes
- * 02 01 <- length (1)
- * 00
- * 02 82
- * 02 01 <- length (513) N
- * ...
- *
- * 02 03 <- length (3) E
- * 01 00 01
- *
- * 02 82
- * 02 00 <- length (512) D P Q EXP1 EXP2 COEFF
- *
- * */
- *p++ = 0x30;
- *p++ = 0x82;
- totlen = p;
- p += 2;
- *p++ = 0x02;
- *p++ = 0x01;
- *p++ = 0x00;
- for (n = 0; n < LWS_GENCRYPTO_RSA_KEYEL_COUNT; n++) {
- int m = mbedtls_mpi_size(mpi[n]);
- uint8_t *elen;
- *p++ = 0x02;
- elen = p;
- if (m < 0x7f)
- *p++ = m;
- else {
- *p++ = 0x82;
- *p++ = m >> 8;
- *p++ = m & 0xff;
- }
- if (p + m > end)
- return -1;
- if (mbedtls_mpi_write_binary(mpi[n], p, m))
- return -1;
- if (p[0] & 0x80) {
- p[0] = 0x00;
- if (mbedtls_mpi_write_binary(mpi[n], &p[1], m))
- return -1;
- m++;
- }
- if (m < 0x7f)
- *elen = m;
- else {
- *elen++ = 0x82;
- *elen++ = m >> 8;
- *elen = m & 0xff;
- }
- p += m;
- }
- n = lws_ptr_diff(p, pkey_asn1);
- *totlen++ = (n - 4) >> 8;
- *totlen = (n - 4) & 0xff;
- return n;
- }
- void
- lws_genrsa_destroy(struct lws_genrsa_ctx *ctx)
- {
- if (!ctx->ctx)
- return;
- mbedtls_rsa_free(ctx->ctx);
- lws_free(ctx->ctx);
- ctx->ctx = NULL;
- }
|