139beb93cSSam Leffler /* 239beb93cSSam Leffler * WPA Supplicant / Crypto wrapper for internal crypto implementation 339beb93cSSam Leffler * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> 439beb93cSSam Leffler * 539beb93cSSam Leffler * This program is free software; you can redistribute it and/or modify 639beb93cSSam Leffler * it under the terms of the GNU General Public License version 2 as 739beb93cSSam Leffler * published by the Free Software Foundation. 839beb93cSSam Leffler * 939beb93cSSam Leffler * Alternatively, this software may be distributed under the terms of BSD 1039beb93cSSam Leffler * license. 1139beb93cSSam Leffler * 1239beb93cSSam Leffler * See README and COPYING for more details. 1339beb93cSSam Leffler */ 1439beb93cSSam Leffler 1539beb93cSSam Leffler #include "includes.h" 1639beb93cSSam Leffler 1739beb93cSSam Leffler #include "common.h" 1839beb93cSSam Leffler #include "crypto.h" 1939beb93cSSam Leffler #include "md5.h" 2039beb93cSSam Leffler #include "sha1.h" 2139beb93cSSam Leffler #include "rc4.h" 2239beb93cSSam Leffler #include "aes.h" 2339beb93cSSam Leffler #include "tls/rsa.h" 2439beb93cSSam Leffler #include "tls/bignum.h" 2539beb93cSSam Leffler #include "tls/asn1.h" 2639beb93cSSam Leffler 2739beb93cSSam Leffler 2839beb93cSSam Leffler #ifdef EAP_TLS_FUNCS 2939beb93cSSam Leffler 3039beb93cSSam Leffler #ifdef CONFIG_TLS_INTERNAL 3139beb93cSSam Leffler 3239beb93cSSam Leffler /* from des.c */ 3339beb93cSSam Leffler struct des3_key_s { 3439beb93cSSam Leffler u32 ek[3][32]; 3539beb93cSSam Leffler u32 dk[3][32]; 3639beb93cSSam Leffler }; 3739beb93cSSam Leffler 3839beb93cSSam Leffler void des3_key_setup(const u8 *key, struct des3_key_s *dkey); 3939beb93cSSam Leffler void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 4039beb93cSSam Leffler void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain); 4139beb93cSSam Leffler 4239beb93cSSam Leffler 4339beb93cSSam Leffler struct MD5Context { 4439beb93cSSam Leffler u32 buf[4]; 4539beb93cSSam Leffler u32 bits[2]; 4639beb93cSSam Leffler u8 in[64]; 4739beb93cSSam Leffler }; 4839beb93cSSam Leffler 4939beb93cSSam Leffler struct SHA1Context { 5039beb93cSSam Leffler u32 state[5]; 5139beb93cSSam Leffler u32 count[2]; 5239beb93cSSam Leffler unsigned char buffer[64]; 5339beb93cSSam Leffler }; 5439beb93cSSam Leffler 5539beb93cSSam Leffler 5639beb93cSSam Leffler struct crypto_hash { 5739beb93cSSam Leffler enum crypto_hash_alg alg; 5839beb93cSSam Leffler union { 5939beb93cSSam Leffler struct MD5Context md5; 6039beb93cSSam Leffler struct SHA1Context sha1; 6139beb93cSSam Leffler } u; 6239beb93cSSam Leffler u8 key[64]; 6339beb93cSSam Leffler size_t key_len; 6439beb93cSSam Leffler }; 6539beb93cSSam Leffler 6639beb93cSSam Leffler 6739beb93cSSam Leffler struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 6839beb93cSSam Leffler size_t key_len) 6939beb93cSSam Leffler { 7039beb93cSSam Leffler struct crypto_hash *ctx; 7139beb93cSSam Leffler u8 k_pad[64]; 7239beb93cSSam Leffler u8 tk[20]; 7339beb93cSSam Leffler size_t i; 7439beb93cSSam Leffler 7539beb93cSSam Leffler ctx = os_zalloc(sizeof(*ctx)); 7639beb93cSSam Leffler if (ctx == NULL) 7739beb93cSSam Leffler return NULL; 7839beb93cSSam Leffler 7939beb93cSSam Leffler ctx->alg = alg; 8039beb93cSSam Leffler 8139beb93cSSam Leffler switch (alg) { 8239beb93cSSam Leffler case CRYPTO_HASH_ALG_MD5: 8339beb93cSSam Leffler MD5Init(&ctx->u.md5); 8439beb93cSSam Leffler break; 8539beb93cSSam Leffler case CRYPTO_HASH_ALG_SHA1: 8639beb93cSSam Leffler SHA1Init(&ctx->u.sha1); 8739beb93cSSam Leffler break; 8839beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_MD5: 8939beb93cSSam Leffler if (key_len > sizeof(k_pad)) { 9039beb93cSSam Leffler MD5Init(&ctx->u.md5); 9139beb93cSSam Leffler MD5Update(&ctx->u.md5, key, key_len); 9239beb93cSSam Leffler MD5Final(tk, &ctx->u.md5); 9339beb93cSSam Leffler key = tk; 9439beb93cSSam Leffler key_len = 16; 9539beb93cSSam Leffler } 9639beb93cSSam Leffler os_memcpy(ctx->key, key, key_len); 9739beb93cSSam Leffler ctx->key_len = key_len; 9839beb93cSSam Leffler 9939beb93cSSam Leffler os_memcpy(k_pad, key, key_len); 10039beb93cSSam Leffler os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); 10139beb93cSSam Leffler for (i = 0; i < sizeof(k_pad); i++) 10239beb93cSSam Leffler k_pad[i] ^= 0x36; 10339beb93cSSam Leffler MD5Init(&ctx->u.md5); 10439beb93cSSam Leffler MD5Update(&ctx->u.md5, k_pad, sizeof(k_pad)); 10539beb93cSSam Leffler break; 10639beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_SHA1: 10739beb93cSSam Leffler if (key_len > sizeof(k_pad)) { 10839beb93cSSam Leffler SHA1Init(&ctx->u.sha1); 10939beb93cSSam Leffler SHA1Update(&ctx->u.sha1, key, key_len); 11039beb93cSSam Leffler SHA1Final(tk, &ctx->u.sha1); 11139beb93cSSam Leffler key = tk; 11239beb93cSSam Leffler key_len = 20; 11339beb93cSSam Leffler } 11439beb93cSSam Leffler os_memcpy(ctx->key, key, key_len); 11539beb93cSSam Leffler ctx->key_len = key_len; 11639beb93cSSam Leffler 11739beb93cSSam Leffler os_memcpy(k_pad, key, key_len); 11839beb93cSSam Leffler os_memset(k_pad + key_len, 0, sizeof(k_pad) - key_len); 11939beb93cSSam Leffler for (i = 0; i < sizeof(k_pad); i++) 12039beb93cSSam Leffler k_pad[i] ^= 0x36; 12139beb93cSSam Leffler SHA1Init(&ctx->u.sha1); 12239beb93cSSam Leffler SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); 12339beb93cSSam Leffler break; 12439beb93cSSam Leffler default: 12539beb93cSSam Leffler os_free(ctx); 12639beb93cSSam Leffler return NULL; 12739beb93cSSam Leffler } 12839beb93cSSam Leffler 12939beb93cSSam Leffler return ctx; 13039beb93cSSam Leffler } 13139beb93cSSam Leffler 13239beb93cSSam Leffler 13339beb93cSSam Leffler void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) 13439beb93cSSam Leffler { 13539beb93cSSam Leffler if (ctx == NULL) 13639beb93cSSam Leffler return; 13739beb93cSSam Leffler 13839beb93cSSam Leffler switch (ctx->alg) { 13939beb93cSSam Leffler case CRYPTO_HASH_ALG_MD5: 14039beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_MD5: 14139beb93cSSam Leffler MD5Update(&ctx->u.md5, data, len); 14239beb93cSSam Leffler break; 14339beb93cSSam Leffler case CRYPTO_HASH_ALG_SHA1: 14439beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_SHA1: 14539beb93cSSam Leffler SHA1Update(&ctx->u.sha1, data, len); 14639beb93cSSam Leffler break; 14739beb93cSSam Leffler } 14839beb93cSSam Leffler } 14939beb93cSSam Leffler 15039beb93cSSam Leffler 15139beb93cSSam Leffler int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) 15239beb93cSSam Leffler { 15339beb93cSSam Leffler u8 k_pad[64]; 15439beb93cSSam Leffler size_t i; 15539beb93cSSam Leffler 15639beb93cSSam Leffler if (ctx == NULL) 15739beb93cSSam Leffler return -2; 15839beb93cSSam Leffler 15939beb93cSSam Leffler if (mac == NULL || len == NULL) { 16039beb93cSSam Leffler os_free(ctx); 16139beb93cSSam Leffler return 0; 16239beb93cSSam Leffler } 16339beb93cSSam Leffler 16439beb93cSSam Leffler switch (ctx->alg) { 16539beb93cSSam Leffler case CRYPTO_HASH_ALG_MD5: 16639beb93cSSam Leffler if (*len < 16) { 16739beb93cSSam Leffler *len = 16; 16839beb93cSSam Leffler os_free(ctx); 16939beb93cSSam Leffler return -1; 17039beb93cSSam Leffler } 17139beb93cSSam Leffler *len = 16; 17239beb93cSSam Leffler MD5Final(mac, &ctx->u.md5); 17339beb93cSSam Leffler break; 17439beb93cSSam Leffler case CRYPTO_HASH_ALG_SHA1: 17539beb93cSSam Leffler if (*len < 20) { 17639beb93cSSam Leffler *len = 20; 17739beb93cSSam Leffler os_free(ctx); 17839beb93cSSam Leffler return -1; 17939beb93cSSam Leffler } 18039beb93cSSam Leffler *len = 20; 18139beb93cSSam Leffler SHA1Final(mac, &ctx->u.sha1); 18239beb93cSSam Leffler break; 18339beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_MD5: 18439beb93cSSam Leffler if (*len < 16) { 18539beb93cSSam Leffler *len = 16; 18639beb93cSSam Leffler os_free(ctx); 18739beb93cSSam Leffler return -1; 18839beb93cSSam Leffler } 18939beb93cSSam Leffler *len = 16; 19039beb93cSSam Leffler 19139beb93cSSam Leffler MD5Final(mac, &ctx->u.md5); 19239beb93cSSam Leffler 19339beb93cSSam Leffler os_memcpy(k_pad, ctx->key, ctx->key_len); 19439beb93cSSam Leffler os_memset(k_pad + ctx->key_len, 0, 19539beb93cSSam Leffler sizeof(k_pad) - ctx->key_len); 19639beb93cSSam Leffler for (i = 0; i < sizeof(k_pad); i++) 19739beb93cSSam Leffler k_pad[i] ^= 0x5c; 19839beb93cSSam Leffler MD5Init(&ctx->u.md5); 19939beb93cSSam Leffler MD5Update(&ctx->u.md5, k_pad, sizeof(k_pad)); 20039beb93cSSam Leffler MD5Update(&ctx->u.md5, mac, 16); 20139beb93cSSam Leffler MD5Final(mac, &ctx->u.md5); 20239beb93cSSam Leffler break; 20339beb93cSSam Leffler case CRYPTO_HASH_ALG_HMAC_SHA1: 20439beb93cSSam Leffler if (*len < 20) { 20539beb93cSSam Leffler *len = 20; 20639beb93cSSam Leffler os_free(ctx); 20739beb93cSSam Leffler return -1; 20839beb93cSSam Leffler } 20939beb93cSSam Leffler *len = 20; 21039beb93cSSam Leffler 21139beb93cSSam Leffler SHA1Final(mac, &ctx->u.sha1); 21239beb93cSSam Leffler 21339beb93cSSam Leffler os_memcpy(k_pad, ctx->key, ctx->key_len); 21439beb93cSSam Leffler os_memset(k_pad + ctx->key_len, 0, 21539beb93cSSam Leffler sizeof(k_pad) - ctx->key_len); 21639beb93cSSam Leffler for (i = 0; i < sizeof(k_pad); i++) 21739beb93cSSam Leffler k_pad[i] ^= 0x5c; 21839beb93cSSam Leffler SHA1Init(&ctx->u.sha1); 21939beb93cSSam Leffler SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); 22039beb93cSSam Leffler SHA1Update(&ctx->u.sha1, mac, 20); 22139beb93cSSam Leffler SHA1Final(mac, &ctx->u.sha1); 22239beb93cSSam Leffler break; 22339beb93cSSam Leffler } 22439beb93cSSam Leffler 22539beb93cSSam Leffler os_free(ctx); 22639beb93cSSam Leffler 22739beb93cSSam Leffler return 0; 22839beb93cSSam Leffler } 22939beb93cSSam Leffler 23039beb93cSSam Leffler 23139beb93cSSam Leffler struct crypto_cipher { 23239beb93cSSam Leffler enum crypto_cipher_alg alg; 23339beb93cSSam Leffler union { 23439beb93cSSam Leffler struct { 23539beb93cSSam Leffler size_t used_bytes; 23639beb93cSSam Leffler u8 key[16]; 23739beb93cSSam Leffler size_t keylen; 23839beb93cSSam Leffler } rc4; 23939beb93cSSam Leffler struct { 24039beb93cSSam Leffler u8 cbc[32]; 24139beb93cSSam Leffler size_t block_size; 24239beb93cSSam Leffler void *ctx_enc; 24339beb93cSSam Leffler void *ctx_dec; 24439beb93cSSam Leffler } aes; 24539beb93cSSam Leffler struct { 24639beb93cSSam Leffler struct des3_key_s key; 24739beb93cSSam Leffler u8 cbc[8]; 24839beb93cSSam Leffler } des3; 24939beb93cSSam Leffler } u; 25039beb93cSSam Leffler }; 25139beb93cSSam Leffler 25239beb93cSSam Leffler 25339beb93cSSam Leffler struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 25439beb93cSSam Leffler const u8 *iv, const u8 *key, 25539beb93cSSam Leffler size_t key_len) 25639beb93cSSam Leffler { 25739beb93cSSam Leffler struct crypto_cipher *ctx; 25839beb93cSSam Leffler 25939beb93cSSam Leffler ctx = os_zalloc(sizeof(*ctx)); 26039beb93cSSam Leffler if (ctx == NULL) 26139beb93cSSam Leffler return NULL; 26239beb93cSSam Leffler 26339beb93cSSam Leffler ctx->alg = alg; 26439beb93cSSam Leffler 26539beb93cSSam Leffler switch (alg) { 26639beb93cSSam Leffler case CRYPTO_CIPHER_ALG_RC4: 26739beb93cSSam Leffler if (key_len > sizeof(ctx->u.rc4.key)) { 26839beb93cSSam Leffler os_free(ctx); 26939beb93cSSam Leffler return NULL; 27039beb93cSSam Leffler } 27139beb93cSSam Leffler ctx->u.rc4.keylen = key_len; 27239beb93cSSam Leffler os_memcpy(ctx->u.rc4.key, key, key_len); 27339beb93cSSam Leffler break; 27439beb93cSSam Leffler case CRYPTO_CIPHER_ALG_AES: 27539beb93cSSam Leffler if (key_len > sizeof(ctx->u.aes.cbc)) { 27639beb93cSSam Leffler os_free(ctx); 27739beb93cSSam Leffler return NULL; 27839beb93cSSam Leffler } 27939beb93cSSam Leffler ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 28039beb93cSSam Leffler if (ctx->u.aes.ctx_enc == NULL) { 28139beb93cSSam Leffler os_free(ctx); 28239beb93cSSam Leffler return NULL; 28339beb93cSSam Leffler } 28439beb93cSSam Leffler ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 28539beb93cSSam Leffler if (ctx->u.aes.ctx_dec == NULL) { 28639beb93cSSam Leffler aes_encrypt_deinit(ctx->u.aes.ctx_enc); 28739beb93cSSam Leffler os_free(ctx); 28839beb93cSSam Leffler return NULL; 28939beb93cSSam Leffler } 29039beb93cSSam Leffler ctx->u.aes.block_size = key_len; 29139beb93cSSam Leffler os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 29239beb93cSSam Leffler break; 29339beb93cSSam Leffler case CRYPTO_CIPHER_ALG_3DES: 29439beb93cSSam Leffler if (key_len != 24) { 29539beb93cSSam Leffler os_free(ctx); 29639beb93cSSam Leffler return NULL; 29739beb93cSSam Leffler } 29839beb93cSSam Leffler des3_key_setup(key, &ctx->u.des3.key); 29939beb93cSSam Leffler os_memcpy(ctx->u.des3.cbc, iv, 8); 30039beb93cSSam Leffler break; 30139beb93cSSam Leffler default: 30239beb93cSSam Leffler os_free(ctx); 30339beb93cSSam Leffler return NULL; 30439beb93cSSam Leffler } 30539beb93cSSam Leffler 30639beb93cSSam Leffler return ctx; 30739beb93cSSam Leffler } 30839beb93cSSam Leffler 30939beb93cSSam Leffler 31039beb93cSSam Leffler int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, 31139beb93cSSam Leffler u8 *crypt, size_t len) 31239beb93cSSam Leffler { 31339beb93cSSam Leffler size_t i, j, blocks; 31439beb93cSSam Leffler 31539beb93cSSam Leffler switch (ctx->alg) { 31639beb93cSSam Leffler case CRYPTO_CIPHER_ALG_RC4: 31739beb93cSSam Leffler if (plain != crypt) 31839beb93cSSam Leffler os_memcpy(crypt, plain, len); 31939beb93cSSam Leffler rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 32039beb93cSSam Leffler ctx->u.rc4.used_bytes, crypt, len); 32139beb93cSSam Leffler ctx->u.rc4.used_bytes += len; 32239beb93cSSam Leffler break; 32339beb93cSSam Leffler case CRYPTO_CIPHER_ALG_AES: 32439beb93cSSam Leffler if (len % ctx->u.aes.block_size) 32539beb93cSSam Leffler return -1; 32639beb93cSSam Leffler blocks = len / ctx->u.aes.block_size; 32739beb93cSSam Leffler for (i = 0; i < blocks; i++) { 32839beb93cSSam Leffler for (j = 0; j < ctx->u.aes.block_size; j++) 32939beb93cSSam Leffler ctx->u.aes.cbc[j] ^= plain[j]; 33039beb93cSSam Leffler aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 33139beb93cSSam Leffler ctx->u.aes.cbc); 33239beb93cSSam Leffler os_memcpy(crypt, ctx->u.aes.cbc, 33339beb93cSSam Leffler ctx->u.aes.block_size); 33439beb93cSSam Leffler plain += ctx->u.aes.block_size; 33539beb93cSSam Leffler crypt += ctx->u.aes.block_size; 33639beb93cSSam Leffler } 33739beb93cSSam Leffler break; 33839beb93cSSam Leffler case CRYPTO_CIPHER_ALG_3DES: 33939beb93cSSam Leffler if (len % 8) 34039beb93cSSam Leffler return -1; 34139beb93cSSam Leffler blocks = len / 8; 34239beb93cSSam Leffler for (i = 0; i < blocks; i++) { 34339beb93cSSam Leffler for (j = 0; j < 8; j++) 34439beb93cSSam Leffler ctx->u.des3.cbc[j] ^= plain[j]; 34539beb93cSSam Leffler des3_encrypt(ctx->u.des3.cbc, &ctx->u.des3.key, 34639beb93cSSam Leffler ctx->u.des3.cbc); 34739beb93cSSam Leffler os_memcpy(crypt, ctx->u.des3.cbc, 8); 34839beb93cSSam Leffler plain += 8; 34939beb93cSSam Leffler crypt += 8; 35039beb93cSSam Leffler } 35139beb93cSSam Leffler break; 35239beb93cSSam Leffler default: 35339beb93cSSam Leffler return -1; 35439beb93cSSam Leffler } 35539beb93cSSam Leffler 35639beb93cSSam Leffler return 0; 35739beb93cSSam Leffler } 35839beb93cSSam Leffler 35939beb93cSSam Leffler 36039beb93cSSam Leffler int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, 36139beb93cSSam Leffler u8 *plain, size_t len) 36239beb93cSSam Leffler { 36339beb93cSSam Leffler size_t i, j, blocks; 36439beb93cSSam Leffler u8 tmp[32]; 36539beb93cSSam Leffler 36639beb93cSSam Leffler switch (ctx->alg) { 36739beb93cSSam Leffler case CRYPTO_CIPHER_ALG_RC4: 36839beb93cSSam Leffler if (plain != crypt) 36939beb93cSSam Leffler os_memcpy(plain, crypt, len); 37039beb93cSSam Leffler rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 37139beb93cSSam Leffler ctx->u.rc4.used_bytes, plain, len); 37239beb93cSSam Leffler ctx->u.rc4.used_bytes += len; 37339beb93cSSam Leffler break; 37439beb93cSSam Leffler case CRYPTO_CIPHER_ALG_AES: 37539beb93cSSam Leffler if (len % ctx->u.aes.block_size) 37639beb93cSSam Leffler return -1; 37739beb93cSSam Leffler blocks = len / ctx->u.aes.block_size; 37839beb93cSSam Leffler for (i = 0; i < blocks; i++) { 37939beb93cSSam Leffler os_memcpy(tmp, crypt, ctx->u.aes.block_size); 38039beb93cSSam Leffler aes_decrypt(ctx->u.aes.ctx_dec, crypt, plain); 38139beb93cSSam Leffler for (j = 0; j < ctx->u.aes.block_size; j++) 38239beb93cSSam Leffler plain[j] ^= ctx->u.aes.cbc[j]; 38339beb93cSSam Leffler os_memcpy(ctx->u.aes.cbc, tmp, ctx->u.aes.block_size); 38439beb93cSSam Leffler plain += ctx->u.aes.block_size; 38539beb93cSSam Leffler crypt += ctx->u.aes.block_size; 38639beb93cSSam Leffler } 38739beb93cSSam Leffler break; 38839beb93cSSam Leffler case CRYPTO_CIPHER_ALG_3DES: 38939beb93cSSam Leffler if (len % 8) 39039beb93cSSam Leffler return -1; 39139beb93cSSam Leffler blocks = len / 8; 39239beb93cSSam Leffler for (i = 0; i < blocks; i++) { 39339beb93cSSam Leffler os_memcpy(tmp, crypt, 8); 39439beb93cSSam Leffler des3_decrypt(crypt, &ctx->u.des3.key, plain); 39539beb93cSSam Leffler for (j = 0; j < 8; j++) 39639beb93cSSam Leffler plain[j] ^= ctx->u.des3.cbc[j]; 39739beb93cSSam Leffler os_memcpy(ctx->u.des3.cbc, tmp, 8); 39839beb93cSSam Leffler plain += 8; 39939beb93cSSam Leffler crypt += 8; 40039beb93cSSam Leffler } 40139beb93cSSam Leffler break; 40239beb93cSSam Leffler default: 40339beb93cSSam Leffler return -1; 40439beb93cSSam Leffler } 40539beb93cSSam Leffler 40639beb93cSSam Leffler return 0; 40739beb93cSSam Leffler } 40839beb93cSSam Leffler 40939beb93cSSam Leffler 41039beb93cSSam Leffler void crypto_cipher_deinit(struct crypto_cipher *ctx) 41139beb93cSSam Leffler { 41239beb93cSSam Leffler switch (ctx->alg) { 41339beb93cSSam Leffler case CRYPTO_CIPHER_ALG_AES: 41439beb93cSSam Leffler aes_encrypt_deinit(ctx->u.aes.ctx_enc); 41539beb93cSSam Leffler aes_decrypt_deinit(ctx->u.aes.ctx_dec); 41639beb93cSSam Leffler break; 41739beb93cSSam Leffler case CRYPTO_CIPHER_ALG_3DES: 41839beb93cSSam Leffler break; 41939beb93cSSam Leffler default: 42039beb93cSSam Leffler break; 42139beb93cSSam Leffler } 42239beb93cSSam Leffler os_free(ctx); 42339beb93cSSam Leffler } 42439beb93cSSam Leffler 42539beb93cSSam Leffler 42639beb93cSSam Leffler /* Dummy structures; these are just typecast to struct crypto_rsa_key */ 42739beb93cSSam Leffler struct crypto_public_key; 42839beb93cSSam Leffler struct crypto_private_key; 42939beb93cSSam Leffler 43039beb93cSSam Leffler 43139beb93cSSam Leffler struct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len) 43239beb93cSSam Leffler { 43339beb93cSSam Leffler return (struct crypto_public_key *) 43439beb93cSSam Leffler crypto_rsa_import_public_key(key, len); 43539beb93cSSam Leffler } 43639beb93cSSam Leffler 43739beb93cSSam Leffler 43839beb93cSSam Leffler static struct crypto_private_key * 43939beb93cSSam Leffler crypto_pkcs8_key_import(const u8 *buf, size_t len) 44039beb93cSSam Leffler { 44139beb93cSSam Leffler struct asn1_hdr hdr; 44239beb93cSSam Leffler const u8 *pos, *end; 44339beb93cSSam Leffler struct bignum *zero; 44439beb93cSSam Leffler struct asn1_oid oid; 44539beb93cSSam Leffler char obuf[80]; 44639beb93cSSam Leffler 44739beb93cSSam Leffler /* PKCS #8, Chapter 6 */ 44839beb93cSSam Leffler 44939beb93cSSam Leffler /* PrivateKeyInfo ::= SEQUENCE */ 45039beb93cSSam Leffler if (asn1_get_next(buf, len, &hdr) < 0 || 45139beb93cSSam Leffler hdr.class != ASN1_CLASS_UNIVERSAL || 45239beb93cSSam Leffler hdr.tag != ASN1_TAG_SEQUENCE) { 45339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 45439beb93cSSam Leffler "header (SEQUENCE); assume PKCS #8 not used"); 45539beb93cSSam Leffler return NULL; 45639beb93cSSam Leffler } 45739beb93cSSam Leffler pos = hdr.payload; 45839beb93cSSam Leffler end = pos + hdr.length; 45939beb93cSSam Leffler 46039beb93cSSam Leffler /* version Version (Version ::= INTEGER) */ 46139beb93cSSam Leffler if (asn1_get_next(pos, end - pos, &hdr) < 0 || 46239beb93cSSam Leffler hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) { 46339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 46439beb93cSSam Leffler "class %d tag 0x%x; assume PKCS #8 not used", 46539beb93cSSam Leffler hdr.class, hdr.tag); 46639beb93cSSam Leffler return NULL; 46739beb93cSSam Leffler } 46839beb93cSSam Leffler 46939beb93cSSam Leffler zero = bignum_init(); 47039beb93cSSam Leffler if (zero == NULL) 47139beb93cSSam Leffler return NULL; 47239beb93cSSam Leffler 47339beb93cSSam Leffler if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { 47439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 47539beb93cSSam Leffler bignum_deinit(zero); 47639beb93cSSam Leffler return NULL; 47739beb93cSSam Leffler } 47839beb93cSSam Leffler pos = hdr.payload + hdr.length; 47939beb93cSSam Leffler 48039beb93cSSam Leffler if (bignum_cmp_d(zero, 0) != 0) { 48139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 48239beb93cSSam Leffler "beginning of private key; not found; assume " 48339beb93cSSam Leffler "PKCS #8 not used"); 48439beb93cSSam Leffler bignum_deinit(zero); 48539beb93cSSam Leffler return NULL; 48639beb93cSSam Leffler } 48739beb93cSSam Leffler bignum_deinit(zero); 48839beb93cSSam Leffler 48939beb93cSSam Leffler /* privateKeyAlgorithm PrivateKeyAlgorithmIdentifier 49039beb93cSSam Leffler * (PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier) */ 49139beb93cSSam Leffler if (asn1_get_next(pos, len, &hdr) < 0 || 49239beb93cSSam Leffler hdr.class != ASN1_CLASS_UNIVERSAL || 49339beb93cSSam Leffler hdr.tag != ASN1_TAG_SEQUENCE) { 49439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 49539beb93cSSam Leffler "(AlgorithmIdentifier) - found class %d tag 0x%x; " 49639beb93cSSam Leffler "assume PKCS #8 not used", 49739beb93cSSam Leffler hdr.class, hdr.tag); 49839beb93cSSam Leffler return NULL; 49939beb93cSSam Leffler } 50039beb93cSSam Leffler 50139beb93cSSam Leffler if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 50239beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 50339beb93cSSam Leffler "(algorithm); assume PKCS #8 not used"); 50439beb93cSSam Leffler return NULL; 50539beb93cSSam Leffler } 50639beb93cSSam Leffler 50739beb93cSSam Leffler asn1_oid_to_str(&oid, obuf, sizeof(obuf)); 50839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 50939beb93cSSam Leffler 51039beb93cSSam Leffler if (oid.len != 7 || 51139beb93cSSam Leffler oid.oid[0] != 1 /* iso */ || 51239beb93cSSam Leffler oid.oid[1] != 2 /* member-body */ || 51339beb93cSSam Leffler oid.oid[2] != 840 /* us */ || 51439beb93cSSam Leffler oid.oid[3] != 113549 /* rsadsi */ || 51539beb93cSSam Leffler oid.oid[4] != 1 /* pkcs */ || 51639beb93cSSam Leffler oid.oid[5] != 1 /* pkcs-1 */ || 51739beb93cSSam Leffler oid.oid[6] != 1 /* rsaEncryption */) { 51839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 51939beb93cSSam Leffler "algorithm %s", obuf); 52039beb93cSSam Leffler return NULL; 52139beb93cSSam Leffler } 52239beb93cSSam Leffler 52339beb93cSSam Leffler pos = hdr.payload + hdr.length; 52439beb93cSSam Leffler 52539beb93cSSam Leffler /* privateKey PrivateKey (PrivateKey ::= OCTET STRING) */ 52639beb93cSSam Leffler if (asn1_get_next(pos, end - pos, &hdr) < 0 || 52739beb93cSSam Leffler hdr.class != ASN1_CLASS_UNIVERSAL || 52839beb93cSSam Leffler hdr.tag != ASN1_TAG_OCTETSTRING) { 52939beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 53039beb93cSSam Leffler "(privateKey) - found class %d tag 0x%x", 53139beb93cSSam Leffler hdr.class, hdr.tag); 53239beb93cSSam Leffler return NULL; 53339beb93cSSam Leffler } 53439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey"); 53539beb93cSSam Leffler 53639beb93cSSam Leffler return (struct crypto_private_key *) 53739beb93cSSam Leffler crypto_rsa_import_private_key(hdr.payload, hdr.length); 53839beb93cSSam Leffler } 53939beb93cSSam Leffler 54039beb93cSSam Leffler 54139beb93cSSam Leffler struct crypto_private_key * crypto_private_key_import(const u8 *key, 54239beb93cSSam Leffler size_t len) 54339beb93cSSam Leffler { 54439beb93cSSam Leffler struct crypto_private_key *res; 54539beb93cSSam Leffler 54639beb93cSSam Leffler /* First, check for possible PKCS #8 encoding */ 54739beb93cSSam Leffler res = crypto_pkcs8_key_import(key, len); 54839beb93cSSam Leffler if (res) 54939beb93cSSam Leffler return res; 55039beb93cSSam Leffler 55139beb93cSSam Leffler /* Not PKCS#8, so try to import PKCS #1 encoded RSA private key */ 55239beb93cSSam Leffler wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private " 55339beb93cSSam Leffler "key"); 55439beb93cSSam Leffler return (struct crypto_private_key *) 55539beb93cSSam Leffler crypto_rsa_import_private_key(key, len); 55639beb93cSSam Leffler } 55739beb93cSSam Leffler 55839beb93cSSam Leffler 55939beb93cSSam Leffler struct crypto_public_key * crypto_public_key_from_cert(const u8 *buf, 56039beb93cSSam Leffler size_t len) 56139beb93cSSam Leffler { 56239beb93cSSam Leffler /* No X.509 support in crypto_internal.c */ 56339beb93cSSam Leffler return NULL; 56439beb93cSSam Leffler } 56539beb93cSSam Leffler 56639beb93cSSam Leffler 56739beb93cSSam Leffler static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, 56839beb93cSSam Leffler const u8 *in, size_t inlen, 56939beb93cSSam Leffler u8 *out, size_t *outlen) 57039beb93cSSam Leffler { 57139beb93cSSam Leffler size_t ps_len; 57239beb93cSSam Leffler u8 *pos; 57339beb93cSSam Leffler 57439beb93cSSam Leffler /* 57539beb93cSSam Leffler * PKCS #1 v1.5, 8.1: 57639beb93cSSam Leffler * 57739beb93cSSam Leffler * EB = 00 || BT || PS || 00 || D 57839beb93cSSam Leffler * BT = 00 or 01 for private-key operation; 02 for public-key operation 57939beb93cSSam Leffler * PS = k-3-||D||; at least eight octets 58039beb93cSSam Leffler * (BT=0: PS=0x00, BT=1: PS=0xff, BT=2: PS=pseudorandom non-zero) 58139beb93cSSam Leffler * k = length of modulus in octets (modlen) 58239beb93cSSam Leffler */ 58339beb93cSSam Leffler 58439beb93cSSam Leffler if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 58539beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 58639beb93cSSam Leffler "lengths (modlen=%lu outlen=%lu inlen=%lu)", 58739beb93cSSam Leffler __func__, (unsigned long) modlen, 58839beb93cSSam Leffler (unsigned long) *outlen, 58939beb93cSSam Leffler (unsigned long) inlen); 59039beb93cSSam Leffler return -1; 59139beb93cSSam Leffler } 59239beb93cSSam Leffler 59339beb93cSSam Leffler pos = out; 59439beb93cSSam Leffler *pos++ = 0x00; 59539beb93cSSam Leffler *pos++ = block_type; /* BT */ 59639beb93cSSam Leffler ps_len = modlen - inlen - 3; 59739beb93cSSam Leffler switch (block_type) { 59839beb93cSSam Leffler case 0: 59939beb93cSSam Leffler os_memset(pos, 0x00, ps_len); 60039beb93cSSam Leffler pos += ps_len; 60139beb93cSSam Leffler break; 60239beb93cSSam Leffler case 1: 60339beb93cSSam Leffler os_memset(pos, 0xff, ps_len); 60439beb93cSSam Leffler pos += ps_len; 60539beb93cSSam Leffler break; 60639beb93cSSam Leffler case 2: 60739beb93cSSam Leffler if (os_get_random(pos, ps_len) < 0) { 60839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 60939beb93cSSam Leffler "random data for PS", __func__); 61039beb93cSSam Leffler return -1; 61139beb93cSSam Leffler } 61239beb93cSSam Leffler while (ps_len--) { 61339beb93cSSam Leffler if (*pos == 0x00) 61439beb93cSSam Leffler *pos = 0x01; 61539beb93cSSam Leffler pos++; 61639beb93cSSam Leffler } 61739beb93cSSam Leffler break; 61839beb93cSSam Leffler default: 61939beb93cSSam Leffler wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 62039beb93cSSam Leffler "%d", __func__, block_type); 62139beb93cSSam Leffler return -1; 62239beb93cSSam Leffler } 62339beb93cSSam Leffler *pos++ = 0x00; 62439beb93cSSam Leffler os_memcpy(pos, in, inlen); /* D */ 62539beb93cSSam Leffler 62639beb93cSSam Leffler return 0; 62739beb93cSSam Leffler } 62839beb93cSSam Leffler 62939beb93cSSam Leffler 63039beb93cSSam Leffler static int crypto_rsa_encrypt_pkcs1(int block_type, struct crypto_rsa_key *key, 63139beb93cSSam Leffler int use_private, 63239beb93cSSam Leffler const u8 *in, size_t inlen, 63339beb93cSSam Leffler u8 *out, size_t *outlen) 63439beb93cSSam Leffler { 63539beb93cSSam Leffler size_t modlen; 63639beb93cSSam Leffler 63739beb93cSSam Leffler modlen = crypto_rsa_get_modulus_len(key); 63839beb93cSSam Leffler 63939beb93cSSam Leffler if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 64039beb93cSSam Leffler out, outlen) < 0) 64139beb93cSSam Leffler return -1; 64239beb93cSSam Leffler 64339beb93cSSam Leffler return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 64439beb93cSSam Leffler } 64539beb93cSSam Leffler 64639beb93cSSam Leffler 64739beb93cSSam Leffler int crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, 64839beb93cSSam Leffler const u8 *in, size_t inlen, 64939beb93cSSam Leffler u8 *out, size_t *outlen) 65039beb93cSSam Leffler { 65139beb93cSSam Leffler return crypto_rsa_encrypt_pkcs1(2, (struct crypto_rsa_key *) key, 65239beb93cSSam Leffler 0, in, inlen, out, outlen); 65339beb93cSSam Leffler } 65439beb93cSSam Leffler 65539beb93cSSam Leffler 65639beb93cSSam Leffler int crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, 65739beb93cSSam Leffler const u8 *in, size_t inlen, 65839beb93cSSam Leffler u8 *out, size_t *outlen) 65939beb93cSSam Leffler { 66039beb93cSSam Leffler struct crypto_rsa_key *rkey = (struct crypto_rsa_key *) key; 66139beb93cSSam Leffler int res; 66239beb93cSSam Leffler u8 *pos, *end; 66339beb93cSSam Leffler 66439beb93cSSam Leffler res = crypto_rsa_exptmod(in, inlen, out, outlen, rkey, 1); 66539beb93cSSam Leffler if (res) 66639beb93cSSam Leffler return res; 66739beb93cSSam Leffler 66839beb93cSSam Leffler if (*outlen < 2 || out[0] != 0 || out[1] != 2) 66939beb93cSSam Leffler return -1; 67039beb93cSSam Leffler 67139beb93cSSam Leffler /* Skip PS (pseudorandom non-zero octets) */ 67239beb93cSSam Leffler pos = out + 2; 67339beb93cSSam Leffler end = out + *outlen; 67439beb93cSSam Leffler while (*pos && pos < end) 67539beb93cSSam Leffler pos++; 67639beb93cSSam Leffler if (pos == end) 67739beb93cSSam Leffler return -1; 67839beb93cSSam Leffler pos++; 67939beb93cSSam Leffler 68039beb93cSSam Leffler *outlen -= pos - out; 68139beb93cSSam Leffler 68239beb93cSSam Leffler /* Strip PKCS #1 header */ 68339beb93cSSam Leffler os_memmove(out, pos, *outlen); 68439beb93cSSam Leffler 68539beb93cSSam Leffler return 0; 68639beb93cSSam Leffler } 68739beb93cSSam Leffler 68839beb93cSSam Leffler 68939beb93cSSam Leffler int crypto_private_key_sign_pkcs1(struct crypto_private_key *key, 69039beb93cSSam Leffler const u8 *in, size_t inlen, 69139beb93cSSam Leffler u8 *out, size_t *outlen) 69239beb93cSSam Leffler { 69339beb93cSSam Leffler return crypto_rsa_encrypt_pkcs1(1, (struct crypto_rsa_key *) key, 69439beb93cSSam Leffler 1, in, inlen, out, outlen); 69539beb93cSSam Leffler } 69639beb93cSSam Leffler 69739beb93cSSam Leffler 69839beb93cSSam Leffler void crypto_public_key_free(struct crypto_public_key *key) 69939beb93cSSam Leffler { 70039beb93cSSam Leffler crypto_rsa_free((struct crypto_rsa_key *) key); 70139beb93cSSam Leffler } 70239beb93cSSam Leffler 70339beb93cSSam Leffler 70439beb93cSSam Leffler void crypto_private_key_free(struct crypto_private_key *key) 70539beb93cSSam Leffler { 70639beb93cSSam Leffler crypto_rsa_free((struct crypto_rsa_key *) key); 70739beb93cSSam Leffler } 70839beb93cSSam Leffler 70939beb93cSSam Leffler 71039beb93cSSam Leffler int crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, 71139beb93cSSam Leffler const u8 *crypt, size_t crypt_len, 71239beb93cSSam Leffler u8 *plain, size_t *plain_len) 71339beb93cSSam Leffler { 71439beb93cSSam Leffler size_t len; 71539beb93cSSam Leffler u8 *pos; 71639beb93cSSam Leffler 71739beb93cSSam Leffler len = *plain_len; 71839beb93cSSam Leffler if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, 71939beb93cSSam Leffler (struct crypto_rsa_key *) key, 0) < 0) 72039beb93cSSam Leffler return -1; 72139beb93cSSam Leffler 72239beb93cSSam Leffler /* 72339beb93cSSam Leffler * PKCS #1 v1.5, 8.1: 72439beb93cSSam Leffler * 72539beb93cSSam Leffler * EB = 00 || BT || PS || 00 || D 72639beb93cSSam Leffler * BT = 00 or 01 72739beb93cSSam Leffler * PS = k-3-||D|| times (00 if BT=00) or (FF if BT=01) 72839beb93cSSam Leffler * k = length of modulus in octets 72939beb93cSSam Leffler */ 73039beb93cSSam Leffler 73139beb93cSSam Leffler if (len < 3 + 8 + 16 /* min hash len */ || 73239beb93cSSam Leffler plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 73339beb93cSSam Leffler wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " 73439beb93cSSam Leffler "structure"); 73539beb93cSSam Leffler return -1; 73639beb93cSSam Leffler } 73739beb93cSSam Leffler 73839beb93cSSam Leffler pos = plain + 3; 73939beb93cSSam Leffler if (plain[1] == 0x00) { 74039beb93cSSam Leffler /* BT = 00 */ 74139beb93cSSam Leffler if (plain[2] != 0x00) { 74239beb93cSSam Leffler wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " 74339beb93cSSam Leffler "PS (BT=00)"); 74439beb93cSSam Leffler return -1; 74539beb93cSSam Leffler } 74639beb93cSSam Leffler while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 74739beb93cSSam Leffler pos++; 74839beb93cSSam Leffler } else { 74939beb93cSSam Leffler /* BT = 01 */ 75039beb93cSSam Leffler if (plain[2] != 0xff) { 75139beb93cSSam Leffler wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " 75239beb93cSSam Leffler "PS (BT=01)"); 75339beb93cSSam Leffler return -1; 75439beb93cSSam Leffler } 75539beb93cSSam Leffler while (pos < plain + len && *pos == 0xff) 75639beb93cSSam Leffler pos++; 75739beb93cSSam Leffler } 75839beb93cSSam Leffler 75939beb93cSSam Leffler if (pos - plain - 2 < 8) { 76039beb93cSSam Leffler /* PKCS #1 v1.5, 8.1: At least eight octets long PS */ 76139beb93cSSam Leffler wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " 76239beb93cSSam Leffler "padding"); 76339beb93cSSam Leffler return -1; 76439beb93cSSam Leffler } 76539beb93cSSam Leffler 76639beb93cSSam Leffler if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 76739beb93cSSam Leffler wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " 76839beb93cSSam Leffler "structure (2)"); 76939beb93cSSam Leffler return -1; 77039beb93cSSam Leffler } 77139beb93cSSam Leffler pos++; 77239beb93cSSam Leffler len -= pos - plain; 77339beb93cSSam Leffler 77439beb93cSSam Leffler /* Strip PKCS #1 header */ 77539beb93cSSam Leffler os_memmove(plain, pos, len); 77639beb93cSSam Leffler *plain_len = len; 77739beb93cSSam Leffler 77839beb93cSSam Leffler return 0; 77939beb93cSSam Leffler } 78039beb93cSSam Leffler 78139beb93cSSam Leffler 78239beb93cSSam Leffler int crypto_global_init(void) 78339beb93cSSam Leffler { 78439beb93cSSam Leffler return 0; 78539beb93cSSam Leffler } 78639beb93cSSam Leffler 78739beb93cSSam Leffler 78839beb93cSSam Leffler void crypto_global_deinit(void) 78939beb93cSSam Leffler { 79039beb93cSSam Leffler } 79139beb93cSSam Leffler 79239beb93cSSam Leffler 79339beb93cSSam Leffler #if defined(EAP_FAST) || defined(CONFIG_WPS) 79439beb93cSSam Leffler 79539beb93cSSam Leffler int crypto_mod_exp(const u8 *base, size_t base_len, 79639beb93cSSam Leffler const u8 *power, size_t power_len, 79739beb93cSSam Leffler const u8 *modulus, size_t modulus_len, 79839beb93cSSam Leffler u8 *result, size_t *result_len) 79939beb93cSSam Leffler { 80039beb93cSSam Leffler struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result; 80139beb93cSSam Leffler int ret = -1; 80239beb93cSSam Leffler 80339beb93cSSam Leffler bn_base = bignum_init(); 80439beb93cSSam Leffler bn_exp = bignum_init(); 80539beb93cSSam Leffler bn_modulus = bignum_init(); 80639beb93cSSam Leffler bn_result = bignum_init(); 80739beb93cSSam Leffler 80839beb93cSSam Leffler if (bn_base == NULL || bn_exp == NULL || bn_modulus == NULL || 80939beb93cSSam Leffler bn_result == NULL) 81039beb93cSSam Leffler goto error; 81139beb93cSSam Leffler 81239beb93cSSam Leffler if (bignum_set_unsigned_bin(bn_base, base, base_len) < 0 || 81339beb93cSSam Leffler bignum_set_unsigned_bin(bn_exp, power, power_len) < 0 || 81439beb93cSSam Leffler bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) 81539beb93cSSam Leffler goto error; 81639beb93cSSam Leffler 81739beb93cSSam Leffler if (bignum_exptmod(bn_base, bn_exp, bn_modulus, bn_result) < 0) 81839beb93cSSam Leffler goto error; 81939beb93cSSam Leffler 82039beb93cSSam Leffler ret = bignum_get_unsigned_bin(bn_result, result, result_len); 82139beb93cSSam Leffler 82239beb93cSSam Leffler error: 82339beb93cSSam Leffler bignum_deinit(bn_base); 82439beb93cSSam Leffler bignum_deinit(bn_exp); 82539beb93cSSam Leffler bignum_deinit(bn_modulus); 82639beb93cSSam Leffler bignum_deinit(bn_result); 82739beb93cSSam Leffler return ret; 82839beb93cSSam Leffler } 82939beb93cSSam Leffler 83039beb93cSSam Leffler #endif /* EAP_FAST || CONFIG_WPS */ 83139beb93cSSam Leffler 83239beb93cSSam Leffler 83339beb93cSSam Leffler #endif /* CONFIG_TLS_INTERNAL */ 83439beb93cSSam Leffler 83539beb93cSSam Leffler #endif /* EAP_TLS_FUNCS */ 836