xref: /freebsd/crypto/heimdal/lib/hx509/crypto.c (revision c6879c6c14eedbd060ba588a3129a6c60ebbe783)
1c19800e8SDoug Rabson /*
2ae771770SStanislav Sedov  * Copyright (c) 2004 - 2007 Kungliga Tekniska Högskolan
3c19800e8SDoug Rabson  * (Royal Institute of Technology, Stockholm, Sweden).
4c19800e8SDoug Rabson  * All rights reserved.
5c19800e8SDoug Rabson  *
6c19800e8SDoug Rabson  * Redistribution and use in source and binary forms, with or without
7c19800e8SDoug Rabson  * modification, are permitted provided that the following conditions
8c19800e8SDoug Rabson  * are met:
9c19800e8SDoug Rabson  *
10c19800e8SDoug Rabson  * 1. Redistributions of source code must retain the above copyright
11c19800e8SDoug Rabson  *    notice, this list of conditions and the following disclaimer.
12c19800e8SDoug Rabson  *
13c19800e8SDoug Rabson  * 2. Redistributions in binary form must reproduce the above copyright
14c19800e8SDoug Rabson  *    notice, this list of conditions and the following disclaimer in the
15c19800e8SDoug Rabson  *    documentation and/or other materials provided with the distribution.
16c19800e8SDoug Rabson  *
17c19800e8SDoug Rabson  * 3. Neither the name of the Institute nor the names of its contributors
18c19800e8SDoug Rabson  *    may be used to endorse or promote products derived from this software
19c19800e8SDoug Rabson  *    without specific prior written permission.
20c19800e8SDoug Rabson  *
21c19800e8SDoug Rabson  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22c19800e8SDoug Rabson  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23c19800e8SDoug Rabson  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24c19800e8SDoug Rabson  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25c19800e8SDoug Rabson  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26c19800e8SDoug Rabson  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27c19800e8SDoug Rabson  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28c19800e8SDoug Rabson  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29c19800e8SDoug Rabson  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30c19800e8SDoug Rabson  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31c19800e8SDoug Rabson  * SUCH DAMAGE.
32c19800e8SDoug Rabson  */
33c19800e8SDoug Rabson 
34c19800e8SDoug Rabson #include "hx_locl.h"
35c19800e8SDoug Rabson 
36c19800e8SDoug Rabson struct hx509_crypto;
37c19800e8SDoug Rabson 
38c19800e8SDoug Rabson struct signature_alg;
39c19800e8SDoug Rabson 
40c19800e8SDoug Rabson struct hx509_generate_private_context {
41c19800e8SDoug Rabson     const heim_oid *key_oid;
42c19800e8SDoug Rabson     int isCA;
43c19800e8SDoug Rabson     unsigned long num_bits;
44c19800e8SDoug Rabson };
45c19800e8SDoug Rabson 
46c19800e8SDoug Rabson struct hx509_private_key_ops {
47c19800e8SDoug Rabson     const char *pemtype;
48ae771770SStanislav Sedov     const heim_oid *key_oid;
49ae771770SStanislav Sedov     int (*available)(const hx509_private_key,
50ae771770SStanislav Sedov 		     const AlgorithmIdentifier *);
51c19800e8SDoug Rabson     int (*get_spki)(hx509_context,
52c19800e8SDoug Rabson 		    const hx509_private_key,
53c19800e8SDoug Rabson 		    SubjectPublicKeyInfo *);
54c19800e8SDoug Rabson     int (*export)(hx509_context context,
55c19800e8SDoug Rabson 		  const hx509_private_key,
56ae771770SStanislav Sedov 		  hx509_key_format_t,
57c19800e8SDoug Rabson 		  heim_octet_string *);
58ae771770SStanislav Sedov     int (*import)(hx509_context, const AlgorithmIdentifier *,
59ae771770SStanislav Sedov 		  const void *, size_t, hx509_key_format_t,
60ae771770SStanislav Sedov 		  hx509_private_key);
61c19800e8SDoug Rabson     int (*generate_private_key)(hx509_context,
62c19800e8SDoug Rabson 				struct hx509_generate_private_context *,
63c19800e8SDoug Rabson 				hx509_private_key);
64c19800e8SDoug Rabson     BIGNUM *(*get_internal)(hx509_context, hx509_private_key, const char *);
65c19800e8SDoug Rabson };
66c19800e8SDoug Rabson 
67c19800e8SDoug Rabson struct hx509_private_key {
68c19800e8SDoug Rabson     unsigned int ref;
69c19800e8SDoug Rabson     const struct signature_alg *md;
70c19800e8SDoug Rabson     const heim_oid *signature_alg;
71c19800e8SDoug Rabson     union {
72c19800e8SDoug Rabson 	RSA *rsa;
73c19800e8SDoug Rabson 	void *keydata;
74ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
75ae771770SStanislav Sedov 	EC_KEY *ecdsa;
76ae771770SStanislav Sedov #endif
77c19800e8SDoug Rabson     } private_key;
78c19800e8SDoug Rabson     hx509_private_key_ops *ops;
79c19800e8SDoug Rabson };
80c19800e8SDoug Rabson 
81c19800e8SDoug Rabson /*
82c19800e8SDoug Rabson  *
83c19800e8SDoug Rabson  */
84c19800e8SDoug Rabson 
85c19800e8SDoug Rabson struct signature_alg {
86c19800e8SDoug Rabson     const char *name;
87ae771770SStanislav Sedov     const heim_oid *sig_oid;
88ae771770SStanislav Sedov     const AlgorithmIdentifier *sig_alg;
89ae771770SStanislav Sedov     const heim_oid *key_oid;
90ae771770SStanislav Sedov     const AlgorithmIdentifier *digest_alg;
91c19800e8SDoug Rabson     int flags;
92ae771770SStanislav Sedov #define PROVIDE_CONF	0x1
93ae771770SStanislav Sedov #define REQUIRE_SIGNER	0x2
94ae771770SStanislav Sedov #define SELF_SIGNED_OK	0x4
95c19800e8SDoug Rabson 
96c19800e8SDoug Rabson #define SIG_DIGEST	0x100
97c19800e8SDoug Rabson #define SIG_PUBLIC_SIG	0x200
98c19800e8SDoug Rabson #define SIG_SECRET	0x400
99c19800e8SDoug Rabson 
100c19800e8SDoug Rabson #define RA_RSA_USES_DIGEST_INFO 0x1000000
101c19800e8SDoug Rabson 
102ae771770SStanislav Sedov     time_t best_before; /* refuse signature made after best before date */
103ae771770SStanislav Sedov     const EVP_MD *(*evp_md)(void);
104c19800e8SDoug Rabson     int (*verify_signature)(hx509_context context,
105c19800e8SDoug Rabson 			    const struct signature_alg *,
106c19800e8SDoug Rabson 			    const Certificate *,
107c19800e8SDoug Rabson 			    const AlgorithmIdentifier *,
108c19800e8SDoug Rabson 			    const heim_octet_string *,
109c19800e8SDoug Rabson 			    const heim_octet_string *);
110c19800e8SDoug Rabson     int (*create_signature)(hx509_context,
111c19800e8SDoug Rabson 			    const struct signature_alg *,
112c19800e8SDoug Rabson 			    const hx509_private_key,
113c19800e8SDoug Rabson 			    const AlgorithmIdentifier *,
114c19800e8SDoug Rabson 			    const heim_octet_string *,
115c19800e8SDoug Rabson 			    AlgorithmIdentifier *,
116c19800e8SDoug Rabson 			    heim_octet_string *);
117ae771770SStanislav Sedov     int digest_size;
118ae771770SStanislav Sedov };
119ae771770SStanislav Sedov 
120ae771770SStanislav Sedov static const struct signature_alg *
121ae771770SStanislav Sedov find_sig_alg(const heim_oid *oid);
122ae771770SStanislav Sedov 
123ae771770SStanislav Sedov /*
124ae771770SStanislav Sedov  *
125ae771770SStanislav Sedov  */
126ae771770SStanislav Sedov 
127ae771770SStanislav Sedov static const heim_octet_string null_entry_oid = { 2, rk_UNCONST("\x05\x00") };
128ae771770SStanislav Sedov 
129ae771770SStanislav Sedov static const unsigned sha512_oid_tree[] = { 2, 16, 840, 1, 101, 3, 4, 2, 3 };
130ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_sha512_data = {
131ae771770SStanislav Sedov     { 9, rk_UNCONST(sha512_oid_tree) }, rk_UNCONST(&null_entry_oid)
132ae771770SStanislav Sedov };
133ae771770SStanislav Sedov 
134ae771770SStanislav Sedov static const unsigned sha384_oid_tree[] = { 2, 16, 840, 1, 101, 3, 4, 2, 2 };
135ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_sha384_data = {
136ae771770SStanislav Sedov     { 9, rk_UNCONST(sha384_oid_tree) }, rk_UNCONST(&null_entry_oid)
137ae771770SStanislav Sedov };
138ae771770SStanislav Sedov 
139ae771770SStanislav Sedov static const unsigned sha256_oid_tree[] = { 2, 16, 840, 1, 101, 3, 4, 2, 1 };
140ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_sha256_data = {
141ae771770SStanislav Sedov     { 9, rk_UNCONST(sha256_oid_tree) }, rk_UNCONST(&null_entry_oid)
142ae771770SStanislav Sedov };
143ae771770SStanislav Sedov 
144ae771770SStanislav Sedov static const unsigned sha1_oid_tree[] = { 1, 3, 14, 3, 2, 26 };
145ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_sha1_data = {
146ae771770SStanislav Sedov     { 6, rk_UNCONST(sha1_oid_tree) }, rk_UNCONST(&null_entry_oid)
147ae771770SStanislav Sedov };
148ae771770SStanislav Sedov 
149ae771770SStanislav Sedov static const unsigned md5_oid_tree[] = { 1, 2, 840, 113549, 2, 5 };
150ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_md5_data = {
151ae771770SStanislav Sedov     { 6, rk_UNCONST(md5_oid_tree) }, rk_UNCONST(&null_entry_oid)
152ae771770SStanislav Sedov };
153ae771770SStanislav Sedov 
154ae771770SStanislav Sedov static const unsigned ecPublicKey[] ={ 1, 2, 840, 10045, 2, 1 };
155ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_ecPublicKey = {
156ae771770SStanislav Sedov     { 6, rk_UNCONST(ecPublicKey) }, NULL
157ae771770SStanislav Sedov };
158ae771770SStanislav Sedov 
159ae771770SStanislav Sedov static const unsigned ecdsa_with_sha256_oid[] ={ 1, 2, 840, 10045, 4, 3, 2 };
160ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha256_data = {
161ae771770SStanislav Sedov     { 7, rk_UNCONST(ecdsa_with_sha256_oid) }, NULL
162ae771770SStanislav Sedov };
163ae771770SStanislav Sedov 
164ae771770SStanislav Sedov static const unsigned ecdsa_with_sha1_oid[] ={ 1, 2, 840, 10045, 4, 1 };
165ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha1_data = {
166ae771770SStanislav Sedov     { 6, rk_UNCONST(ecdsa_with_sha1_oid) }, NULL
167ae771770SStanislav Sedov };
168ae771770SStanislav Sedov 
169ae771770SStanislav Sedov static const unsigned rsa_with_sha512_oid[] ={ 1, 2, 840, 113549, 1, 1, 13 };
170ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_with_sha512_data = {
171ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_with_sha512_oid) }, NULL
172ae771770SStanislav Sedov };
173ae771770SStanislav Sedov 
174ae771770SStanislav Sedov static const unsigned rsa_with_sha384_oid[] ={ 1, 2, 840, 113549, 1, 1, 12 };
175ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_with_sha384_data = {
176ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_with_sha384_oid) }, NULL
177ae771770SStanislav Sedov };
178ae771770SStanislav Sedov 
179ae771770SStanislav Sedov static const unsigned rsa_with_sha256_oid[] ={ 1, 2, 840, 113549, 1, 1, 11 };
180ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_with_sha256_data = {
181ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_with_sha256_oid) }, NULL
182ae771770SStanislav Sedov };
183ae771770SStanislav Sedov 
184ae771770SStanislav Sedov static const unsigned rsa_with_sha1_oid[] ={ 1, 2, 840, 113549, 1, 1, 5 };
185ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_with_sha1_data = {
186ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_with_sha1_oid) }, NULL
187ae771770SStanislav Sedov };
188ae771770SStanislav Sedov 
189ae771770SStanislav Sedov static const unsigned rsa_with_md5_oid[] ={ 1, 2, 840, 113549, 1, 1, 4 };
190ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_with_md5_data = {
191ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_with_md5_oid) }, NULL
192ae771770SStanislav Sedov };
193ae771770SStanislav Sedov 
194ae771770SStanislav Sedov static const unsigned rsa_oid[] ={ 1, 2, 840, 113549, 1, 1, 1 };
195ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_data = {
196ae771770SStanislav Sedov     { 7, rk_UNCONST(rsa_oid) }, NULL
197ae771770SStanislav Sedov };
198ae771770SStanislav Sedov 
199ae771770SStanislav Sedov static const unsigned rsa_pkcs1_x509_oid[] ={ 1, 2, 752, 43, 16, 1 };
200ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_signature_rsa_pkcs1_x509_data = {
201ae771770SStanislav Sedov     { 6, rk_UNCONST(rsa_pkcs1_x509_oid) }, NULL
202ae771770SStanislav Sedov };
203ae771770SStanislav Sedov 
204ae771770SStanislav Sedov static const unsigned des_rsdi_ede3_cbc_oid[] ={ 1, 2, 840, 113549, 3, 7 };
205ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_des_rsdi_ede3_cbc_oid = {
206ae771770SStanislav Sedov     { 6, rk_UNCONST(des_rsdi_ede3_cbc_oid) }, NULL
207ae771770SStanislav Sedov };
208ae771770SStanislav Sedov 
209ae771770SStanislav Sedov static const unsigned aes128_cbc_oid[] ={ 2, 16, 840, 1, 101, 3, 4, 1, 2 };
210ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_crypto_aes128_cbc_data = {
211ae771770SStanislav Sedov     { 9, rk_UNCONST(aes128_cbc_oid) }, NULL
212ae771770SStanislav Sedov };
213ae771770SStanislav Sedov 
214ae771770SStanislav Sedov static const unsigned aes256_cbc_oid[] ={ 2, 16, 840, 1, 101, 3, 4, 1, 42 };
215ae771770SStanislav Sedov const AlgorithmIdentifier _hx509_crypto_aes256_cbc_data = {
216ae771770SStanislav Sedov     { 9, rk_UNCONST(aes256_cbc_oid) }, NULL
217c19800e8SDoug Rabson };
218c19800e8SDoug Rabson 
219c19800e8SDoug Rabson /*
220c19800e8SDoug Rabson  *
221c19800e8SDoug Rabson  */
222c19800e8SDoug Rabson 
223c19800e8SDoug Rabson static BIGNUM *
heim_int2BN(const heim_integer * i)224c19800e8SDoug Rabson heim_int2BN(const heim_integer *i)
225c19800e8SDoug Rabson {
226c19800e8SDoug Rabson     BIGNUM *bn;
227c19800e8SDoug Rabson 
228c19800e8SDoug Rabson     bn = BN_bin2bn(i->data, i->length, NULL);
229*e4456411SJohn Baldwin     if (bn != NULL)
230c19800e8SDoug Rabson 	    BN_set_negative(bn, i->negative);
231c19800e8SDoug Rabson     return bn;
232c19800e8SDoug Rabson }
233c19800e8SDoug Rabson 
234c19800e8SDoug Rabson /*
235c19800e8SDoug Rabson  *
236c19800e8SDoug Rabson  */
237c19800e8SDoug Rabson 
238c19800e8SDoug Rabson static int
set_digest_alg(DigestAlgorithmIdentifier * id,const heim_oid * oid,const void * param,size_t length)239c19800e8SDoug Rabson set_digest_alg(DigestAlgorithmIdentifier *id,
240c19800e8SDoug Rabson 	       const heim_oid *oid,
241c19800e8SDoug Rabson 	       const void *param, size_t length)
242c19800e8SDoug Rabson {
243c19800e8SDoug Rabson     int ret;
244c19800e8SDoug Rabson     if (param) {
245c19800e8SDoug Rabson 	id->parameters = malloc(sizeof(*id->parameters));
246c19800e8SDoug Rabson 	if (id->parameters == NULL)
247c19800e8SDoug Rabson 	    return ENOMEM;
248c19800e8SDoug Rabson 	id->parameters->data = malloc(length);
249c19800e8SDoug Rabson 	if (id->parameters->data == NULL) {
250c19800e8SDoug Rabson 	    free(id->parameters);
251c19800e8SDoug Rabson 	    id->parameters = NULL;
252c19800e8SDoug Rabson 	    return ENOMEM;
253c19800e8SDoug Rabson 	}
254c19800e8SDoug Rabson 	memcpy(id->parameters->data, param, length);
255c19800e8SDoug Rabson 	id->parameters->length = length;
256c19800e8SDoug Rabson     } else
257c19800e8SDoug Rabson 	id->parameters = NULL;
258c19800e8SDoug Rabson     ret = der_copy_oid(oid, &id->algorithm);
259c19800e8SDoug Rabson     if (ret) {
260c19800e8SDoug Rabson 	if (id->parameters) {
261c19800e8SDoug Rabson 	    free(id->parameters->data);
262c19800e8SDoug Rabson 	    free(id->parameters);
263c19800e8SDoug Rabson 	    id->parameters = NULL;
264c19800e8SDoug Rabson 	}
265c19800e8SDoug Rabson 	return ret;
266c19800e8SDoug Rabson     }
267c19800e8SDoug Rabson     return 0;
268c19800e8SDoug Rabson }
269c19800e8SDoug Rabson 
270ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
271ae771770SStanislav Sedov 
272ae771770SStanislav Sedov static int
heim_oid2ecnid(heim_oid * oid)273ae771770SStanislav Sedov heim_oid2ecnid(heim_oid *oid)
274ae771770SStanislav Sedov {
275ae771770SStanislav Sedov     /*
276ae771770SStanislav Sedov      * Now map to openssl OID fun
277ae771770SStanislav Sedov      */
278ae771770SStanislav Sedov 
279ae771770SStanislav Sedov     if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP256R1) == 0)
280ae771770SStanislav Sedov 	return NID_X9_62_prime256v1;
281ae771770SStanislav Sedov     else if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP160R1) == 0)
282ae771770SStanislav Sedov 	return NID_secp160r1;
283ae771770SStanislav Sedov     else if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP160R2) == 0)
284ae771770SStanislav Sedov 	return NID_secp160r2;
285ae771770SStanislav Sedov 
286ae771770SStanislav Sedov     return -1;
287ae771770SStanislav Sedov }
288ae771770SStanislav Sedov 
289ae771770SStanislav Sedov static int
parse_ECParameters(hx509_context context,heim_octet_string * parameters,int * nid)290ae771770SStanislav Sedov parse_ECParameters(hx509_context context,
291ae771770SStanislav Sedov 		   heim_octet_string *parameters, int *nid)
292ae771770SStanislav Sedov {
293ae771770SStanislav Sedov     ECParameters ecparam;
294ae771770SStanislav Sedov     size_t size;
295ae771770SStanislav Sedov     int ret;
296ae771770SStanislav Sedov 
297ae771770SStanislav Sedov     if (parameters == NULL) {
298ae771770SStanislav Sedov 	ret = HX509_PARSING_KEY_FAILED;
299ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret,
300ae771770SStanislav Sedov 			       "EC parameters missing");
301ae771770SStanislav Sedov 	return ret;
302ae771770SStanislav Sedov     }
303ae771770SStanislav Sedov 
304ae771770SStanislav Sedov     ret = decode_ECParameters(parameters->data, parameters->length,
305ae771770SStanislav Sedov 			      &ecparam, &size);
306ae771770SStanislav Sedov     if (ret) {
307ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret,
308ae771770SStanislav Sedov 			       "Failed to decode EC parameters");
309ae771770SStanislav Sedov 	return ret;
310ae771770SStanislav Sedov     }
311ae771770SStanislav Sedov 
312ae771770SStanislav Sedov     if (ecparam.element != choice_ECParameters_namedCurve) {
313ae771770SStanislav Sedov 	free_ECParameters(&ecparam);
314ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret,
315ae771770SStanislav Sedov 			       "EC parameters is not a named curve");
316ae771770SStanislav Sedov 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
317ae771770SStanislav Sedov     }
318ae771770SStanislav Sedov 
319ae771770SStanislav Sedov     *nid = heim_oid2ecnid(&ecparam.u.namedCurve);
320ae771770SStanislav Sedov     free_ECParameters(&ecparam);
321ae771770SStanislav Sedov     if (*nid == -1) {
322ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret,
323ae771770SStanislav Sedov 			       "Failed to find matcing NID for EC curve");
324ae771770SStanislav Sedov 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
325ae771770SStanislav Sedov     }
326ae771770SStanislav Sedov     return 0;
327ae771770SStanislav Sedov }
328ae771770SStanislav Sedov 
329ae771770SStanislav Sedov 
330ae771770SStanislav Sedov /*
331ae771770SStanislav Sedov  *
332ae771770SStanislav Sedov  */
333ae771770SStanislav Sedov 
334ae771770SStanislav Sedov static int
ecdsa_verify_signature(hx509_context context,const struct signature_alg * sig_alg,const Certificate * signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,const heim_octet_string * sig)335ae771770SStanislav Sedov ecdsa_verify_signature(hx509_context context,
336ae771770SStanislav Sedov 		       const struct signature_alg *sig_alg,
337ae771770SStanislav Sedov 		       const Certificate *signer,
338ae771770SStanislav Sedov 		       const AlgorithmIdentifier *alg,
339ae771770SStanislav Sedov 		       const heim_octet_string *data,
340ae771770SStanislav Sedov 		       const heim_octet_string *sig)
341ae771770SStanislav Sedov {
342ae771770SStanislav Sedov     const AlgorithmIdentifier *digest_alg;
343ae771770SStanislav Sedov     const SubjectPublicKeyInfo *spi;
344ae771770SStanislav Sedov     heim_octet_string digest;
345ae771770SStanislav Sedov     int ret;
346ae771770SStanislav Sedov     EC_KEY *key = NULL;
347ae771770SStanislav Sedov     int groupnid;
348ae771770SStanislav Sedov     EC_GROUP *group;
349ae771770SStanislav Sedov     const unsigned char *p;
350ae771770SStanislav Sedov     long len;
351ae771770SStanislav Sedov 
352ae771770SStanislav Sedov     digest_alg = sig_alg->digest_alg;
353ae771770SStanislav Sedov 
354ae771770SStanislav Sedov     ret = _hx509_create_signature(context,
355ae771770SStanislav Sedov 				  NULL,
356ae771770SStanislav Sedov 				  digest_alg,
357ae771770SStanislav Sedov 				  data,
358ae771770SStanislav Sedov 				  NULL,
359ae771770SStanislav Sedov 				  &digest);
360ae771770SStanislav Sedov     if (ret)
361ae771770SStanislav Sedov 	return ret;
362ae771770SStanislav Sedov 
363ae771770SStanislav Sedov     /* set up EC KEY */
364ae771770SStanislav Sedov     spi = &signer->tbsCertificate.subjectPublicKeyInfo;
365ae771770SStanislav Sedov 
366ae771770SStanislav Sedov     if (der_heim_oid_cmp(&spi->algorithm.algorithm, ASN1_OID_ID_ECPUBLICKEY) != 0)
367ae771770SStanislav Sedov 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
368ae771770SStanislav Sedov 
369ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
370ae771770SStanislav Sedov     /*
371ae771770SStanislav Sedov      * Find the group id
372ae771770SStanislav Sedov      */
373ae771770SStanislav Sedov 
374ae771770SStanislav Sedov     ret = parse_ECParameters(context, spi->algorithm.parameters, &groupnid);
375ae771770SStanislav Sedov     if (ret) {
376ae771770SStanislav Sedov 	der_free_octet_string(&digest);
377ae771770SStanislav Sedov 	return ret;
378ae771770SStanislav Sedov     }
379ae771770SStanislav Sedov 
380ae771770SStanislav Sedov     /*
381ae771770SStanislav Sedov      * Create group, key, parse key
382ae771770SStanislav Sedov      */
383ae771770SStanislav Sedov 
384ae771770SStanislav Sedov     key = EC_KEY_new();
385ae771770SStanislav Sedov     group = EC_GROUP_new_by_curve_name(groupnid);
386ae771770SStanislav Sedov     EC_KEY_set_group(key, group);
387ae771770SStanislav Sedov     EC_GROUP_free(group);
388ae771770SStanislav Sedov 
389ae771770SStanislav Sedov     p = spi->subjectPublicKey.data;
390ae771770SStanislav Sedov     len = spi->subjectPublicKey.length / 8;
391ae771770SStanislav Sedov 
392ae771770SStanislav Sedov     if (o2i_ECPublicKey(&key, &p, len) == NULL) {
393ae771770SStanislav Sedov 	EC_KEY_free(key);
394ae771770SStanislav Sedov 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
395ae771770SStanislav Sedov     }
396ae771770SStanislav Sedov #else
397ae771770SStanislav Sedov     key = SubjectPublicKeyInfo2EC_KEY(spi);
398ae771770SStanislav Sedov #endif
399ae771770SStanislav Sedov 
400ae771770SStanislav Sedov     ret = ECDSA_verify(-1, digest.data, digest.length,
401ae771770SStanislav Sedov 		       sig->data, sig->length, key);
402ae771770SStanislav Sedov     der_free_octet_string(&digest);
403ae771770SStanislav Sedov     EC_KEY_free(key);
404ae771770SStanislav Sedov     if (ret != 1) {
405ae771770SStanislav Sedov 	ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
406ae771770SStanislav Sedov 	return ret;
407ae771770SStanislav Sedov     }
408ae771770SStanislav Sedov 
409ae771770SStanislav Sedov     return 0;
410ae771770SStanislav Sedov }
411ae771770SStanislav Sedov 
412ae771770SStanislav Sedov static int
ecdsa_create_signature(hx509_context context,const struct signature_alg * sig_alg,const hx509_private_key signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,AlgorithmIdentifier * signatureAlgorithm,heim_octet_string * sig)413ae771770SStanislav Sedov ecdsa_create_signature(hx509_context context,
414ae771770SStanislav Sedov 		       const struct signature_alg *sig_alg,
415ae771770SStanislav Sedov 		       const hx509_private_key signer,
416ae771770SStanislav Sedov 		       const AlgorithmIdentifier *alg,
417ae771770SStanislav Sedov 		       const heim_octet_string *data,
418ae771770SStanislav Sedov 		       AlgorithmIdentifier *signatureAlgorithm,
419ae771770SStanislav Sedov 		       heim_octet_string *sig)
420ae771770SStanislav Sedov {
421ae771770SStanislav Sedov     const AlgorithmIdentifier *digest_alg;
422ae771770SStanislav Sedov     heim_octet_string indata;
423ae771770SStanislav Sedov     const heim_oid *sig_oid;
424ae771770SStanislav Sedov     unsigned int siglen;
425ae771770SStanislav Sedov     int ret;
426ae771770SStanislav Sedov 
427ae771770SStanislav Sedov     if (signer->ops && der_heim_oid_cmp(signer->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) != 0)
428ae771770SStanislav Sedov 	_hx509_abort("internal error passing private key to wrong ops");
429ae771770SStanislav Sedov 
430ae771770SStanislav Sedov     sig_oid = sig_alg->sig_oid;
431ae771770SStanislav Sedov     digest_alg = sig_alg->digest_alg;
432ae771770SStanislav Sedov 
433ae771770SStanislav Sedov     if (signatureAlgorithm) {
434ae771770SStanislav Sedov 	ret = set_digest_alg(signatureAlgorithm, sig_oid, "\x05\x00", 2);
435ae771770SStanislav Sedov 	if (ret) {
436ae771770SStanislav Sedov 	    hx509_clear_error_string(context);
437ae771770SStanislav Sedov 	    goto error;
438ae771770SStanislav Sedov 	}
439ae771770SStanislav Sedov     }
440ae771770SStanislav Sedov 
441ae771770SStanislav Sedov     ret = _hx509_create_signature(context,
442ae771770SStanislav Sedov 				  NULL,
443ae771770SStanislav Sedov 				  digest_alg,
444ae771770SStanislav Sedov 				  data,
445ae771770SStanislav Sedov 				  NULL,
446ae771770SStanislav Sedov 				  &indata);
447ae771770SStanislav Sedov     if (ret) {
448ae771770SStanislav Sedov 	if (signatureAlgorithm)
449ae771770SStanislav Sedov 	    free_AlgorithmIdentifier(signatureAlgorithm);
450ae771770SStanislav Sedov 	goto error;
451ae771770SStanislav Sedov     }
452ae771770SStanislav Sedov 
453ae771770SStanislav Sedov     sig->length = ECDSA_size(signer->private_key.ecdsa);
454ae771770SStanislav Sedov     sig->data = malloc(sig->length);
455ae771770SStanislav Sedov     if (sig->data == NULL) {
456ae771770SStanislav Sedov 	der_free_octet_string(&indata);
457ae771770SStanislav Sedov 	ret = ENOMEM;
458ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret, "out of memory");
459ae771770SStanislav Sedov 	goto error;
460ae771770SStanislav Sedov     }
461ae771770SStanislav Sedov 
462ae771770SStanislav Sedov     siglen = sig->length;
463ae771770SStanislav Sedov 
464ae771770SStanislav Sedov     ret = ECDSA_sign(-1, indata.data, indata.length,
465ae771770SStanislav Sedov 		     sig->data, &siglen, signer->private_key.ecdsa);
466ae771770SStanislav Sedov     der_free_octet_string(&indata);
467ae771770SStanislav Sedov     if (ret != 1) {
468ae771770SStanislav Sedov 	ret = HX509_CMS_FAILED_CREATE_SIGATURE;
469ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, ret,
470ae771770SStanislav Sedov 			       "ECDSA sign failed: %d", ret);
471ae771770SStanislav Sedov 	goto error;
472ae771770SStanislav Sedov     }
473ae771770SStanislav Sedov     if (siglen > sig->length)
474ae771770SStanislav Sedov 	_hx509_abort("ECDSA signature prelen longer the output len");
475ae771770SStanislav Sedov 
476ae771770SStanislav Sedov     sig->length = siglen;
477ae771770SStanislav Sedov 
478ae771770SStanislav Sedov     return 0;
479ae771770SStanislav Sedov  error:
480ae771770SStanislav Sedov     if (signatureAlgorithm)
481ae771770SStanislav Sedov 	free_AlgorithmIdentifier(signatureAlgorithm);
482ae771770SStanislav Sedov     return ret;
483ae771770SStanislav Sedov }
484ae771770SStanislav Sedov 
485ae771770SStanislav Sedov static int
ecdsa_available(const hx509_private_key signer,const AlgorithmIdentifier * sig_alg)486ae771770SStanislav Sedov ecdsa_available(const hx509_private_key signer,
487ae771770SStanislav Sedov 		const AlgorithmIdentifier *sig_alg)
488ae771770SStanislav Sedov {
489ae771770SStanislav Sedov     const struct signature_alg *sig;
490ae771770SStanislav Sedov     const EC_GROUP *group;
491ae771770SStanislav Sedov     BN_CTX *bnctx = NULL;
492ae771770SStanislav Sedov     BIGNUM *order = NULL;
493ae771770SStanislav Sedov     int ret = 0;
494ae771770SStanislav Sedov 
495ae771770SStanislav Sedov     if (der_heim_oid_cmp(signer->ops->key_oid, &asn1_oid_id_ecPublicKey) != 0)
496ae771770SStanislav Sedov 	_hx509_abort("internal error passing private key to wrong ops");
497ae771770SStanislav Sedov 
498ae771770SStanislav Sedov     sig = find_sig_alg(&sig_alg->algorithm);
499ae771770SStanislav Sedov 
500ae771770SStanislav Sedov     if (sig == NULL || sig->digest_size == 0)
501ae771770SStanislav Sedov 	return 0;
502ae771770SStanislav Sedov 
503ae771770SStanislav Sedov     group = EC_KEY_get0_group(signer->private_key.ecdsa);
504ae771770SStanislav Sedov     if (group == NULL)
505ae771770SStanislav Sedov 	return 0;
506ae771770SStanislav Sedov 
507ae771770SStanislav Sedov     bnctx = BN_CTX_new();
508ae771770SStanislav Sedov     order = BN_new();
509ae771770SStanislav Sedov     if (order == NULL)
510ae771770SStanislav Sedov 	goto err;
511ae771770SStanislav Sedov 
512ae771770SStanislav Sedov     if (EC_GROUP_get_order(group, order, bnctx) != 1)
513ae771770SStanislav Sedov 	goto err;
514ae771770SStanislav Sedov 
515ae771770SStanislav Sedov     if (BN_num_bytes(order) > sig->digest_size)
516ae771770SStanislav Sedov 	ret = 1;
517ae771770SStanislav Sedov  err:
518ae771770SStanislav Sedov     if (bnctx)
519ae771770SStanislav Sedov 	BN_CTX_free(bnctx);
520ae771770SStanislav Sedov     if (order)
521ae771770SStanislav Sedov 	BN_clear_free(order);
522ae771770SStanislav Sedov 
523ae771770SStanislav Sedov     return ret;
524ae771770SStanislav Sedov }
525ae771770SStanislav Sedov 
526ae771770SStanislav Sedov 
527ae771770SStanislav Sedov #endif /* HAVE_OPENSSL */
528ae771770SStanislav Sedov 
529c19800e8SDoug Rabson /*
530c19800e8SDoug Rabson  *
531c19800e8SDoug Rabson  */
532c19800e8SDoug Rabson 
533c19800e8SDoug Rabson static int
rsa_verify_signature(hx509_context context,const struct signature_alg * sig_alg,const Certificate * signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,const heim_octet_string * sig)534c19800e8SDoug Rabson rsa_verify_signature(hx509_context context,
535c19800e8SDoug Rabson 		     const struct signature_alg *sig_alg,
536c19800e8SDoug Rabson 		     const Certificate *signer,
537c19800e8SDoug Rabson 		     const AlgorithmIdentifier *alg,
538c19800e8SDoug Rabson 		     const heim_octet_string *data,
539c19800e8SDoug Rabson 		     const heim_octet_string *sig)
540c19800e8SDoug Rabson {
541c19800e8SDoug Rabson     const SubjectPublicKeyInfo *spi;
542c19800e8SDoug Rabson     DigestInfo di;
543c19800e8SDoug Rabson     unsigned char *to;
544c19800e8SDoug Rabson     int tosize, retsize;
545c19800e8SDoug Rabson     int ret;
546c19800e8SDoug Rabson     RSA *rsa;
547c19800e8SDoug Rabson     size_t size;
548ae771770SStanislav Sedov     const unsigned char *p;
549c19800e8SDoug Rabson 
550c19800e8SDoug Rabson     memset(&di, 0, sizeof(di));
551c19800e8SDoug Rabson 
552c19800e8SDoug Rabson     spi = &signer->tbsCertificate.subjectPublicKeyInfo;
553c19800e8SDoug Rabson 
554ae771770SStanislav Sedov     p = spi->subjectPublicKey.data;
555ae771770SStanislav Sedov     size = spi->subjectPublicKey.length / 8;
556ae771770SStanislav Sedov 
557ae771770SStanislav Sedov     rsa = d2i_RSAPublicKey(NULL, &p, size);
558c19800e8SDoug Rabson     if (rsa == NULL) {
559c19800e8SDoug Rabson 	ret = ENOMEM;
560c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
561c19800e8SDoug Rabson 	goto out;
562c19800e8SDoug Rabson     }
563c19800e8SDoug Rabson 
564c19800e8SDoug Rabson     tosize = RSA_size(rsa);
565c19800e8SDoug Rabson     to = malloc(tosize);
566c19800e8SDoug Rabson     if (to == NULL) {
567c19800e8SDoug Rabson 	ret = ENOMEM;
568c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
569c19800e8SDoug Rabson 	goto out;
570c19800e8SDoug Rabson     }
571c19800e8SDoug Rabson 
572c19800e8SDoug Rabson     retsize = RSA_public_decrypt(sig->length, (unsigned char *)sig->data,
573c19800e8SDoug Rabson 				 to, rsa, RSA_PKCS1_PADDING);
574c19800e8SDoug Rabson     if (retsize <= 0) {
575c19800e8SDoug Rabson 	ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
576c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret,
577c19800e8SDoug Rabson 			       "RSA public decrypt failed: %d", retsize);
578c19800e8SDoug Rabson 	free(to);
579c19800e8SDoug Rabson 	goto out;
580c19800e8SDoug Rabson     }
581c19800e8SDoug Rabson     if (retsize > tosize)
582c19800e8SDoug Rabson 	_hx509_abort("internal rsa decryption failure: ret > tosize");
583c19800e8SDoug Rabson 
584c19800e8SDoug Rabson     if (sig_alg->flags & RA_RSA_USES_DIGEST_INFO) {
585c19800e8SDoug Rabson 
586c19800e8SDoug Rabson 	ret = decode_DigestInfo(to, retsize, &di, &size);
587c19800e8SDoug Rabson 	free(to);
588c19800e8SDoug Rabson 	if (ret) {
589c19800e8SDoug Rabson 	    goto out;
590c19800e8SDoug Rabson 	}
591c19800e8SDoug Rabson 
592c19800e8SDoug Rabson 	/* Check for extra data inside the sigature */
593ae771770SStanislav Sedov 	if (size != (size_t)retsize) {
594c19800e8SDoug Rabson 	    ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
595c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "size from decryption mismatch");
596c19800e8SDoug Rabson 	    goto out;
597c19800e8SDoug Rabson 	}
598c19800e8SDoug Rabson 
599ae771770SStanislav Sedov 	if (sig_alg->digest_alg &&
600c19800e8SDoug Rabson 	    der_heim_oid_cmp(&di.digestAlgorithm.algorithm,
601ae771770SStanislav Sedov 			     &sig_alg->digest_alg->algorithm) != 0)
602c19800e8SDoug Rabson 	{
603c19800e8SDoug Rabson 	    ret = HX509_CRYPTO_OID_MISMATCH;
604c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "object identifier in RSA sig mismatch");
605c19800e8SDoug Rabson 	    goto out;
606c19800e8SDoug Rabson 	}
607c19800e8SDoug Rabson 
608c19800e8SDoug Rabson 	/* verify that the parameters are NULL or the NULL-type */
609c19800e8SDoug Rabson 	if (di.digestAlgorithm.parameters != NULL &&
610c19800e8SDoug Rabson 	    (di.digestAlgorithm.parameters->length != 2 ||
611c19800e8SDoug Rabson 	     memcmp(di.digestAlgorithm.parameters->data, "\x05\x00", 2) != 0))
612c19800e8SDoug Rabson 	{
613c19800e8SDoug Rabson 	    ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
614c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "Extra parameters inside RSA signature");
615c19800e8SDoug Rabson 	    goto out;
616c19800e8SDoug Rabson 	}
617c19800e8SDoug Rabson 
618c19800e8SDoug Rabson 	ret = _hx509_verify_signature(context,
619c19800e8SDoug Rabson 				      NULL,
620c19800e8SDoug Rabson 				      &di.digestAlgorithm,
621c19800e8SDoug Rabson 				      data,
622c19800e8SDoug Rabson 				      &di.digest);
623c19800e8SDoug Rabson     } else {
624ae771770SStanislav Sedov 	if ((size_t)retsize != data->length ||
625ae771770SStanislav Sedov 	    ct_memcmp(to, data->data, retsize) != 0)
626c19800e8SDoug Rabson 	{
627c19800e8SDoug Rabson 	    ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
628c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "RSA Signature incorrect");
629c19800e8SDoug Rabson 	    goto out;
630c19800e8SDoug Rabson 	}
631c19800e8SDoug Rabson 	free(to);
632c19800e8SDoug Rabson     }
633ae771770SStanislav Sedov     ret = 0;
634c19800e8SDoug Rabson 
635c19800e8SDoug Rabson  out:
636c19800e8SDoug Rabson     free_DigestInfo(&di);
637ae771770SStanislav Sedov     if (rsa)
638c19800e8SDoug Rabson 	RSA_free(rsa);
639c19800e8SDoug Rabson     return ret;
640c19800e8SDoug Rabson }
641c19800e8SDoug Rabson 
642c19800e8SDoug Rabson static int
rsa_create_signature(hx509_context context,const struct signature_alg * sig_alg,const hx509_private_key signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,AlgorithmIdentifier * signatureAlgorithm,heim_octet_string * sig)643c19800e8SDoug Rabson rsa_create_signature(hx509_context context,
644c19800e8SDoug Rabson 		     const struct signature_alg *sig_alg,
645c19800e8SDoug Rabson 		     const hx509_private_key signer,
646c19800e8SDoug Rabson 		     const AlgorithmIdentifier *alg,
647c19800e8SDoug Rabson 		     const heim_octet_string *data,
648c19800e8SDoug Rabson 		     AlgorithmIdentifier *signatureAlgorithm,
649c19800e8SDoug Rabson 		     heim_octet_string *sig)
650c19800e8SDoug Rabson {
651c19800e8SDoug Rabson     const AlgorithmIdentifier *digest_alg;
652c19800e8SDoug Rabson     heim_octet_string indata;
653c19800e8SDoug Rabson     const heim_oid *sig_oid;
654c19800e8SDoug Rabson     size_t size;
655c19800e8SDoug Rabson     int ret;
656c19800e8SDoug Rabson 
657ae771770SStanislav Sedov     if (signer->ops && der_heim_oid_cmp(signer->ops->key_oid, ASN1_OID_ID_PKCS1_RSAENCRYPTION) != 0)
658ae771770SStanislav Sedov 	return HX509_ALG_NOT_SUPP;
659ae771770SStanislav Sedov 
660c19800e8SDoug Rabson     if (alg)
661c19800e8SDoug Rabson 	sig_oid = &alg->algorithm;
662c19800e8SDoug Rabson     else
663c19800e8SDoug Rabson 	sig_oid = signer->signature_alg;
664c19800e8SDoug Rabson 
665ae771770SStanislav Sedov     if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_SHA512WITHRSAENCRYPTION) == 0) {
666ae771770SStanislav Sedov 	digest_alg = hx509_signature_sha512();
667ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_SHA384WITHRSAENCRYPTION) == 0) {
668ae771770SStanislav Sedov 	digest_alg = hx509_signature_sha384();
669ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_SHA256WITHRSAENCRYPTION) == 0) {
670c19800e8SDoug Rabson 	digest_alg = hx509_signature_sha256();
671ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION) == 0) {
672c19800e8SDoug Rabson 	digest_alg = hx509_signature_sha1();
673ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_MD5WITHRSAENCRYPTION) == 0) {
674c19800e8SDoug Rabson 	digest_alg = hx509_signature_md5();
675ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_MD5WITHRSAENCRYPTION) == 0) {
676c19800e8SDoug Rabson 	digest_alg = hx509_signature_md5();
677ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_DSA_WITH_SHA1) == 0) {
678c19800e8SDoug Rabson 	digest_alg = hx509_signature_sha1();
679ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_PKCS1_RSAENCRYPTION) == 0) {
680c19800e8SDoug Rabson 	digest_alg = hx509_signature_sha1();
681ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(sig_oid, ASN1_OID_ID_HEIM_RSA_PKCS1_X509) == 0) {
682c19800e8SDoug Rabson 	digest_alg = NULL;
683c19800e8SDoug Rabson     } else
684c19800e8SDoug Rabson 	return HX509_ALG_NOT_SUPP;
685c19800e8SDoug Rabson 
686c19800e8SDoug Rabson     if (signatureAlgorithm) {
687c19800e8SDoug Rabson 	ret = set_digest_alg(signatureAlgorithm, sig_oid, "\x05\x00", 2);
688c19800e8SDoug Rabson 	if (ret) {
689c19800e8SDoug Rabson 	    hx509_clear_error_string(context);
690c19800e8SDoug Rabson 	    return ret;
691c19800e8SDoug Rabson 	}
692c19800e8SDoug Rabson     }
693c19800e8SDoug Rabson 
694c19800e8SDoug Rabson     if (digest_alg) {
695c19800e8SDoug Rabson 	DigestInfo di;
696c19800e8SDoug Rabson 	memset(&di, 0, sizeof(di));
697c19800e8SDoug Rabson 
698c19800e8SDoug Rabson 	ret = _hx509_create_signature(context,
699c19800e8SDoug Rabson 				      NULL,
700c19800e8SDoug Rabson 				      digest_alg,
701c19800e8SDoug Rabson 				      data,
702c19800e8SDoug Rabson 				      &di.digestAlgorithm,
703c19800e8SDoug Rabson 				      &di.digest);
704c19800e8SDoug Rabson 	if (ret)
705c19800e8SDoug Rabson 	    return ret;
706c19800e8SDoug Rabson 	ASN1_MALLOC_ENCODE(DigestInfo,
707c19800e8SDoug Rabson 			   indata.data,
708c19800e8SDoug Rabson 			   indata.length,
709c19800e8SDoug Rabson 			   &di,
710c19800e8SDoug Rabson 			   &size,
711c19800e8SDoug Rabson 			   ret);
712c19800e8SDoug Rabson 	free_DigestInfo(&di);
713c19800e8SDoug Rabson 	if (ret) {
714c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "out of memory");
715c19800e8SDoug Rabson 	    return ret;
716c19800e8SDoug Rabson 	}
717c19800e8SDoug Rabson 	if (indata.length != size)
718c19800e8SDoug Rabson 	    _hx509_abort("internal ASN.1 encoder error");
719c19800e8SDoug Rabson     } else {
720c19800e8SDoug Rabson 	indata = *data;
721c19800e8SDoug Rabson     }
722c19800e8SDoug Rabson 
723c19800e8SDoug Rabson     sig->length = RSA_size(signer->private_key.rsa);
724c19800e8SDoug Rabson     sig->data = malloc(sig->length);
725c19800e8SDoug Rabson     if (sig->data == NULL) {
726c19800e8SDoug Rabson 	der_free_octet_string(&indata);
727c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
728c19800e8SDoug Rabson 	return ENOMEM;
729c19800e8SDoug Rabson     }
730c19800e8SDoug Rabson 
731c19800e8SDoug Rabson     ret = RSA_private_encrypt(indata.length, indata.data,
732c19800e8SDoug Rabson 			      sig->data,
733c19800e8SDoug Rabson 			      signer->private_key.rsa,
734c19800e8SDoug Rabson 			      RSA_PKCS1_PADDING);
735c19800e8SDoug Rabson     if (indata.data != data->data)
736c19800e8SDoug Rabson 	der_free_octet_string(&indata);
737c19800e8SDoug Rabson     if (ret <= 0) {
738c19800e8SDoug Rabson 	ret = HX509_CMS_FAILED_CREATE_SIGATURE;
739c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret,
740ae771770SStanislav Sedov 			       "RSA private encrypt failed: %d", ret);
741c19800e8SDoug Rabson 	return ret;
742c19800e8SDoug Rabson     }
743ae771770SStanislav Sedov     if ((size_t)ret > sig->length)
744c19800e8SDoug Rabson 	_hx509_abort("RSA signature prelen longer the output len");
745c19800e8SDoug Rabson 
746c19800e8SDoug Rabson     sig->length = ret;
747c19800e8SDoug Rabson 
748c19800e8SDoug Rabson     return 0;
749c19800e8SDoug Rabson }
750c19800e8SDoug Rabson 
751c19800e8SDoug Rabson static int
rsa_private_key_import(hx509_context context,const AlgorithmIdentifier * keyai,const void * data,size_t len,hx509_key_format_t format,hx509_private_key private_key)752c19800e8SDoug Rabson rsa_private_key_import(hx509_context context,
753ae771770SStanislav Sedov 		       const AlgorithmIdentifier *keyai,
754c19800e8SDoug Rabson 		       const void *data,
755c19800e8SDoug Rabson 		       size_t len,
756ae771770SStanislav Sedov 		       hx509_key_format_t format,
757c19800e8SDoug Rabson 		       hx509_private_key private_key)
758c19800e8SDoug Rabson {
759ae771770SStanislav Sedov     switch (format) {
760ae771770SStanislav Sedov     case HX509_KEY_FORMAT_DER: {
761c19800e8SDoug Rabson 	const unsigned char *p = data;
762c19800e8SDoug Rabson 
763c19800e8SDoug Rabson 	private_key->private_key.rsa =
764c19800e8SDoug Rabson 	    d2i_RSAPrivateKey(NULL, &p, len);
765c19800e8SDoug Rabson 	if (private_key->private_key.rsa == NULL) {
766c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
767c19800e8SDoug Rabson 				   "Failed to parse RSA key");
768c19800e8SDoug Rabson 	    return HX509_PARSING_KEY_FAILED;
769c19800e8SDoug Rabson 	}
770ae771770SStanislav Sedov 	private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION;
771ae771770SStanislav Sedov 	break;
772ae771770SStanislav Sedov 
773ae771770SStanislav Sedov     }
774ae771770SStanislav Sedov     default:
775ae771770SStanislav Sedov 	return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
776ae771770SStanislav Sedov     }
777c19800e8SDoug Rabson 
778c19800e8SDoug Rabson     return 0;
779c19800e8SDoug Rabson }
780c19800e8SDoug Rabson 
781c19800e8SDoug Rabson static int
rsa_private_key2SPKI(hx509_context context,hx509_private_key private_key,SubjectPublicKeyInfo * spki)782c19800e8SDoug Rabson rsa_private_key2SPKI(hx509_context context,
783c19800e8SDoug Rabson 		     hx509_private_key private_key,
784c19800e8SDoug Rabson 		     SubjectPublicKeyInfo *spki)
785c19800e8SDoug Rabson {
786c19800e8SDoug Rabson     int len, ret;
787c19800e8SDoug Rabson 
788c19800e8SDoug Rabson     memset(spki, 0, sizeof(*spki));
789c19800e8SDoug Rabson 
790c19800e8SDoug Rabson     len = i2d_RSAPublicKey(private_key->private_key.rsa, NULL);
791c19800e8SDoug Rabson 
792c19800e8SDoug Rabson     spki->subjectPublicKey.data = malloc(len);
793c19800e8SDoug Rabson     if (spki->subjectPublicKey.data == NULL) {
794c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "malloc - out of memory");
795c19800e8SDoug Rabson 	return ENOMEM;
796c19800e8SDoug Rabson     }
797c19800e8SDoug Rabson     spki->subjectPublicKey.length = len * 8;
798c19800e8SDoug Rabson 
799ae771770SStanislav Sedov     ret = set_digest_alg(&spki->algorithm, ASN1_OID_ID_PKCS1_RSAENCRYPTION,
800c19800e8SDoug Rabson 			 "\x05\x00", 2);
801c19800e8SDoug Rabson     if (ret) {
802c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "malloc - out of memory");
803c19800e8SDoug Rabson 	free(spki->subjectPublicKey.data);
804c19800e8SDoug Rabson 	spki->subjectPublicKey.data = NULL;
805c19800e8SDoug Rabson 	spki->subjectPublicKey.length = 0;
806c19800e8SDoug Rabson 	return ret;
807c19800e8SDoug Rabson     }
808c19800e8SDoug Rabson 
809c19800e8SDoug Rabson     {
810c19800e8SDoug Rabson 	unsigned char *pp = spki->subjectPublicKey.data;
811c19800e8SDoug Rabson 	i2d_RSAPublicKey(private_key->private_key.rsa, &pp);
812c19800e8SDoug Rabson     }
813c19800e8SDoug Rabson 
814c19800e8SDoug Rabson     return 0;
815c19800e8SDoug Rabson }
816c19800e8SDoug Rabson 
817c19800e8SDoug Rabson static int
rsa_generate_private_key(hx509_context context,struct hx509_generate_private_context * ctx,hx509_private_key private_key)818c19800e8SDoug Rabson rsa_generate_private_key(hx509_context context,
819c19800e8SDoug Rabson 			 struct hx509_generate_private_context *ctx,
820c19800e8SDoug Rabson 			 hx509_private_key private_key)
821c19800e8SDoug Rabson {
822c19800e8SDoug Rabson     BIGNUM *e;
823c19800e8SDoug Rabson     int ret;
824c19800e8SDoug Rabson     unsigned long bits;
825c19800e8SDoug Rabson 
826c19800e8SDoug Rabson     static const int default_rsa_e = 65537;
827ae771770SStanislav Sedov     static const int default_rsa_bits = 2048;
828c19800e8SDoug Rabson 
829c19800e8SDoug Rabson     private_key->private_key.rsa = RSA_new();
830c19800e8SDoug Rabson     if (private_key->private_key.rsa == NULL) {
831c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
832c19800e8SDoug Rabson 			       "Failed to generate RSA key");
833c19800e8SDoug Rabson 	return HX509_PARSING_KEY_FAILED;
834c19800e8SDoug Rabson     }
835c19800e8SDoug Rabson 
836c19800e8SDoug Rabson     e = BN_new();
837c19800e8SDoug Rabson     BN_set_word(e, default_rsa_e);
838c19800e8SDoug Rabson 
839c19800e8SDoug Rabson     bits = default_rsa_bits;
840c19800e8SDoug Rabson 
841c19800e8SDoug Rabson     if (ctx->num_bits)
842c19800e8SDoug Rabson 	bits = ctx->num_bits;
843c19800e8SDoug Rabson 
844c19800e8SDoug Rabson     ret = RSA_generate_key_ex(private_key->private_key.rsa, bits, e, NULL);
845c19800e8SDoug Rabson     BN_free(e);
846c19800e8SDoug Rabson     if (ret != 1) {
847c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
848c19800e8SDoug Rabson 			       "Failed to generate RSA key");
849c19800e8SDoug Rabson 	return HX509_PARSING_KEY_FAILED;
850c19800e8SDoug Rabson     }
851ae771770SStanislav Sedov     private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION;
852c19800e8SDoug Rabson 
853c19800e8SDoug Rabson     return 0;
854c19800e8SDoug Rabson }
855c19800e8SDoug Rabson 
856c19800e8SDoug Rabson static int
rsa_private_key_export(hx509_context context,const hx509_private_key key,hx509_key_format_t format,heim_octet_string * data)857c19800e8SDoug Rabson rsa_private_key_export(hx509_context context,
858c19800e8SDoug Rabson 		       const hx509_private_key key,
859ae771770SStanislav Sedov 		       hx509_key_format_t format,
860c19800e8SDoug Rabson 		       heim_octet_string *data)
861c19800e8SDoug Rabson {
862c19800e8SDoug Rabson     int ret;
863c19800e8SDoug Rabson 
864c19800e8SDoug Rabson     data->data = NULL;
865c19800e8SDoug Rabson     data->length = 0;
866c19800e8SDoug Rabson 
867ae771770SStanislav Sedov     switch (format) {
868ae771770SStanislav Sedov     case HX509_KEY_FORMAT_DER:
869ae771770SStanislav Sedov 
870c19800e8SDoug Rabson 	ret = i2d_RSAPrivateKey(key->private_key.rsa, NULL);
871c19800e8SDoug Rabson 	if (ret <= 0) {
872c19800e8SDoug Rabson 	    ret = EINVAL;
873c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret,
874c19800e8SDoug Rabson 			       "Private key is not exportable");
875c19800e8SDoug Rabson 	    return ret;
876c19800e8SDoug Rabson 	}
877c19800e8SDoug Rabson 
878c19800e8SDoug Rabson 	data->data = malloc(ret);
879c19800e8SDoug Rabson 	if (data->data == NULL) {
880c19800e8SDoug Rabson 	    ret = ENOMEM;
881c19800e8SDoug Rabson 	    hx509_set_error_string(context, 0, ret, "malloc out of memory");
882c19800e8SDoug Rabson 	    return ret;
883c19800e8SDoug Rabson 	}
884c19800e8SDoug Rabson 	data->length = ret;
885c19800e8SDoug Rabson 
886c19800e8SDoug Rabson 	{
887c19800e8SDoug Rabson 	    unsigned char *p = data->data;
888c19800e8SDoug Rabson 	    i2d_RSAPrivateKey(key->private_key.rsa, &p);
889c19800e8SDoug Rabson 	}
890ae771770SStanislav Sedov 	break;
891ae771770SStanislav Sedov     default:
892ae771770SStanislav Sedov 	return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
893ae771770SStanislav Sedov     }
894c19800e8SDoug Rabson 
895c19800e8SDoug Rabson     return 0;
896c19800e8SDoug Rabson }
897c19800e8SDoug Rabson 
898c19800e8SDoug Rabson static BIGNUM *
rsa_get_internal(hx509_context context,hx509_private_key key,const char * type)899ae771770SStanislav Sedov rsa_get_internal(hx509_context context,
900ae771770SStanislav Sedov 		 hx509_private_key key,
901ae771770SStanislav Sedov 		 const char *type)
902c19800e8SDoug Rabson {
903*e4456411SJohn Baldwin     const BIGNUM *n;
904*e4456411SJohn Baldwin 
905c19800e8SDoug Rabson     if (strcasecmp(type, "rsa-modulus") == 0) {
906*e4456411SJohn Baldwin 	RSA_get0_key(key->private_key.rsa, &n, NULL, NULL);
907c19800e8SDoug Rabson     } else if (strcasecmp(type, "rsa-exponent") == 0) {
908*e4456411SJohn Baldwin 	RSA_get0_key(key->private_key.rsa, NULL, &n, NULL);
909c19800e8SDoug Rabson     } else
910c19800e8SDoug Rabson 	return NULL;
911*e4456411SJohn Baldwin     return BN_dup(n);
912c19800e8SDoug Rabson }
913c19800e8SDoug Rabson 
914c19800e8SDoug Rabson 
915c19800e8SDoug Rabson 
916c19800e8SDoug Rabson static hx509_private_key_ops rsa_private_key_ops = {
917c19800e8SDoug Rabson     "RSA PRIVATE KEY",
918ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
919ae771770SStanislav Sedov     NULL,
920c19800e8SDoug Rabson     rsa_private_key2SPKI,
921c19800e8SDoug Rabson     rsa_private_key_export,
922c19800e8SDoug Rabson     rsa_private_key_import,
923c19800e8SDoug Rabson     rsa_generate_private_key,
924c19800e8SDoug Rabson     rsa_get_internal
925c19800e8SDoug Rabson };
926c19800e8SDoug Rabson 
927ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
928ae771770SStanislav Sedov 
929ae771770SStanislav Sedov static int
ecdsa_private_key2SPKI(hx509_context context,hx509_private_key private_key,SubjectPublicKeyInfo * spki)930ae771770SStanislav Sedov ecdsa_private_key2SPKI(hx509_context context,
931ae771770SStanislav Sedov 		       hx509_private_key private_key,
932ae771770SStanislav Sedov 		       SubjectPublicKeyInfo *spki)
933ae771770SStanislav Sedov {
934ae771770SStanislav Sedov     memset(spki, 0, sizeof(*spki));
935ae771770SStanislav Sedov     return ENOMEM;
936ae771770SStanislav Sedov }
937ae771770SStanislav Sedov 
938ae771770SStanislav Sedov static int
ecdsa_private_key_export(hx509_context context,const hx509_private_key key,hx509_key_format_t format,heim_octet_string * data)939ae771770SStanislav Sedov ecdsa_private_key_export(hx509_context context,
940ae771770SStanislav Sedov 			 const hx509_private_key key,
941ae771770SStanislav Sedov 			 hx509_key_format_t format,
942ae771770SStanislav Sedov 			 heim_octet_string *data)
943ae771770SStanislav Sedov {
944ae771770SStanislav Sedov     return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
945ae771770SStanislav Sedov }
946ae771770SStanislav Sedov 
947ae771770SStanislav Sedov static int
ecdsa_private_key_import(hx509_context context,const AlgorithmIdentifier * keyai,const void * data,size_t len,hx509_key_format_t format,hx509_private_key private_key)948ae771770SStanislav Sedov ecdsa_private_key_import(hx509_context context,
949ae771770SStanislav Sedov 			 const AlgorithmIdentifier *keyai,
950ae771770SStanislav Sedov 			 const void *data,
951ae771770SStanislav Sedov 			 size_t len,
952ae771770SStanislav Sedov 			 hx509_key_format_t format,
953ae771770SStanislav Sedov 			 hx509_private_key private_key)
954ae771770SStanislav Sedov {
955ae771770SStanislav Sedov     const unsigned char *p = data;
956ae771770SStanislav Sedov     EC_KEY **pkey = NULL;
957ae771770SStanislav Sedov 
958ae771770SStanislav Sedov     if (keyai->parameters) {
959ae771770SStanislav Sedov 	EC_GROUP *group;
960ae771770SStanislav Sedov 	int groupnid;
961ae771770SStanislav Sedov 	EC_KEY *key;
962ae771770SStanislav Sedov 	int ret;
963ae771770SStanislav Sedov 
964ae771770SStanislav Sedov 	ret = parse_ECParameters(context, keyai->parameters, &groupnid);
965ae771770SStanislav Sedov 	if (ret)
966ae771770SStanislav Sedov 	    return ret;
967ae771770SStanislav Sedov 
968ae771770SStanislav Sedov 	key = EC_KEY_new();
969ae771770SStanislav Sedov 	if (key == NULL)
970ae771770SStanislav Sedov 	    return ENOMEM;
971ae771770SStanislav Sedov 
972ae771770SStanislav Sedov 	group = EC_GROUP_new_by_curve_name(groupnid);
973ae771770SStanislav Sedov 	if (group == NULL) {
974ae771770SStanislav Sedov 	    EC_KEY_free(key);
975ae771770SStanislav Sedov 	    return ENOMEM;
976ae771770SStanislav Sedov 	}
977ae771770SStanislav Sedov 	EC_GROUP_set_asn1_flag(group, OPENSSL_EC_NAMED_CURVE);
978ae771770SStanislav Sedov 	if (EC_KEY_set_group(key, group) == 0) {
979ae771770SStanislav Sedov 	    EC_KEY_free(key);
980ae771770SStanislav Sedov 	    EC_GROUP_free(group);
981ae771770SStanislav Sedov 	    return ENOMEM;
982ae771770SStanislav Sedov 	}
983ae771770SStanislav Sedov 	EC_GROUP_free(group);
984ae771770SStanislav Sedov 	pkey = &key;
985ae771770SStanislav Sedov     }
986ae771770SStanislav Sedov 
987ae771770SStanislav Sedov     switch (format) {
988ae771770SStanislav Sedov     case HX509_KEY_FORMAT_DER:
989ae771770SStanislav Sedov 
990ae771770SStanislav Sedov 	private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len);
991ae771770SStanislav Sedov 	if (private_key->private_key.ecdsa == NULL) {
992ae771770SStanislav Sedov 	    hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
993ae771770SStanislav Sedov 				   "Failed to parse EC private key");
994ae771770SStanislav Sedov 	    return HX509_PARSING_KEY_FAILED;
995ae771770SStanislav Sedov 	}
996ae771770SStanislav Sedov 	private_key->signature_alg = ASN1_OID_ID_ECDSA_WITH_SHA256;
997ae771770SStanislav Sedov 	break;
998ae771770SStanislav Sedov 
999ae771770SStanislav Sedov     default:
1000ae771770SStanislav Sedov 	return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
1001ae771770SStanislav Sedov     }
1002ae771770SStanislav Sedov 
1003ae771770SStanislav Sedov     return 0;
1004ae771770SStanislav Sedov }
1005ae771770SStanislav Sedov 
1006ae771770SStanislav Sedov static int
ecdsa_generate_private_key(hx509_context context,struct hx509_generate_private_context * ctx,hx509_private_key private_key)1007ae771770SStanislav Sedov ecdsa_generate_private_key(hx509_context context,
1008ae771770SStanislav Sedov 			   struct hx509_generate_private_context *ctx,
1009ae771770SStanislav Sedov 			   hx509_private_key private_key)
1010ae771770SStanislav Sedov {
1011ae771770SStanislav Sedov     return ENOMEM;
1012ae771770SStanislav Sedov }
1013ae771770SStanislav Sedov 
1014ae771770SStanislav Sedov static BIGNUM *
ecdsa_get_internal(hx509_context context,hx509_private_key key,const char * type)1015ae771770SStanislav Sedov ecdsa_get_internal(hx509_context context,
1016ae771770SStanislav Sedov 		   hx509_private_key key,
1017ae771770SStanislav Sedov 		   const char *type)
1018ae771770SStanislav Sedov {
1019ae771770SStanislav Sedov     return NULL;
1020ae771770SStanislav Sedov }
1021ae771770SStanislav Sedov 
1022ae771770SStanislav Sedov 
1023ae771770SStanislav Sedov static hx509_private_key_ops ecdsa_private_key_ops = {
1024ae771770SStanislav Sedov     "EC PRIVATE KEY",
1025ae771770SStanislav Sedov     ASN1_OID_ID_ECPUBLICKEY,
1026ae771770SStanislav Sedov     ecdsa_available,
1027ae771770SStanislav Sedov     ecdsa_private_key2SPKI,
1028ae771770SStanislav Sedov     ecdsa_private_key_export,
1029ae771770SStanislav Sedov     ecdsa_private_key_import,
1030ae771770SStanislav Sedov     ecdsa_generate_private_key,
1031ae771770SStanislav Sedov     ecdsa_get_internal
1032ae771770SStanislav Sedov };
1033ae771770SStanislav Sedov 
1034ae771770SStanislav Sedov #endif /* HAVE_OPENSSL */
1035c19800e8SDoug Rabson 
1036c19800e8SDoug Rabson /*
1037c19800e8SDoug Rabson  *
1038c19800e8SDoug Rabson  */
1039c19800e8SDoug Rabson 
1040c19800e8SDoug Rabson static int
dsa_verify_signature(hx509_context context,const struct signature_alg * sig_alg,const Certificate * signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,const heim_octet_string * sig)1041c19800e8SDoug Rabson dsa_verify_signature(hx509_context context,
1042c19800e8SDoug Rabson 		     const struct signature_alg *sig_alg,
1043c19800e8SDoug Rabson 		     const Certificate *signer,
1044c19800e8SDoug Rabson 		     const AlgorithmIdentifier *alg,
1045c19800e8SDoug Rabson 		     const heim_octet_string *data,
1046c19800e8SDoug Rabson 		     const heim_octet_string *sig)
1047c19800e8SDoug Rabson {
1048c19800e8SDoug Rabson     const SubjectPublicKeyInfo *spi;
1049c19800e8SDoug Rabson     DSAPublicKey pk;
1050c19800e8SDoug Rabson     DSAParams param;
1051c19800e8SDoug Rabson     size_t size;
1052*e4456411SJohn Baldwin     BIGNUM *key, *p, *q, *g;
1053c19800e8SDoug Rabson     DSA *dsa;
1054c19800e8SDoug Rabson     int ret;
1055c19800e8SDoug Rabson 
1056c19800e8SDoug Rabson     spi = &signer->tbsCertificate.subjectPublicKeyInfo;
1057c19800e8SDoug Rabson 
1058c19800e8SDoug Rabson     dsa = DSA_new();
1059c19800e8SDoug Rabson     if (dsa == NULL) {
1060c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1061c19800e8SDoug Rabson 	return ENOMEM;
1062c19800e8SDoug Rabson     }
1063c19800e8SDoug Rabson 
1064c19800e8SDoug Rabson     ret = decode_DSAPublicKey(spi->subjectPublicKey.data,
1065c19800e8SDoug Rabson 			      spi->subjectPublicKey.length / 8,
1066c19800e8SDoug Rabson 			      &pk, &size);
1067c19800e8SDoug Rabson     if (ret)
1068c19800e8SDoug Rabson 	goto out;
1069c19800e8SDoug Rabson 
1070*e4456411SJohn Baldwin     key = heim_int2BN(&pk);
1071c19800e8SDoug Rabson 
1072c19800e8SDoug Rabson     free_DSAPublicKey(&pk);
1073c19800e8SDoug Rabson 
1074*e4456411SJohn Baldwin     if (key == NULL) {
1075c19800e8SDoug Rabson 	ret = ENOMEM;
1076c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
1077c19800e8SDoug Rabson 	goto out;
1078c19800e8SDoug Rabson     }
1079c19800e8SDoug Rabson 
1080*e4456411SJohn Baldwin     ret = DSA_set0_key(dsa, key, NULL);
1081*e4456411SJohn Baldwin 
1082*e4456411SJohn Baldwin     if (ret != 1) {
1083*e4456411SJohn Baldwin 	BN_free(key);
1084*e4456411SJohn Baldwin 	ret = EINVAL;
1085*e4456411SJohn Baldwin 	hx509_set_error_string(context, 0, ret, "failed to set DSA key");
1086*e4456411SJohn Baldwin 	goto out;
1087*e4456411SJohn Baldwin     }
1088*e4456411SJohn Baldwin 
1089c19800e8SDoug Rabson     if (spi->algorithm.parameters == NULL) {
1090c19800e8SDoug Rabson 	ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
1091c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "DSA parameters missing");
1092c19800e8SDoug Rabson 	goto out;
1093c19800e8SDoug Rabson     }
1094c19800e8SDoug Rabson 
1095c19800e8SDoug Rabson     ret = decode_DSAParams(spi->algorithm.parameters->data,
1096c19800e8SDoug Rabson 			   spi->algorithm.parameters->length,
1097c19800e8SDoug Rabson 			   &param,
1098c19800e8SDoug Rabson 			   &size);
1099c19800e8SDoug Rabson     if (ret) {
1100c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "DSA parameters failed to decode");
1101c19800e8SDoug Rabson 	goto out;
1102c19800e8SDoug Rabson     }
1103c19800e8SDoug Rabson 
1104*e4456411SJohn Baldwin     p = heim_int2BN(&param.p);
1105*e4456411SJohn Baldwin     q = heim_int2BN(&param.q);
1106*e4456411SJohn Baldwin     g = heim_int2BN(&param.g);
1107c19800e8SDoug Rabson 
1108c19800e8SDoug Rabson     free_DSAParams(&param);
1109c19800e8SDoug Rabson 
1110*e4456411SJohn Baldwin     if (p == NULL || q == NULL || g == NULL) {
1111*e4456411SJohn Baldwin 	BN_free(p);
1112*e4456411SJohn Baldwin 	BN_free(q);
1113*e4456411SJohn Baldwin 	BN_free(g);
1114c19800e8SDoug Rabson 	ret = ENOMEM;
1115c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
1116c19800e8SDoug Rabson 	goto out;
1117c19800e8SDoug Rabson     }
1118c19800e8SDoug Rabson 
1119*e4456411SJohn Baldwin     ret = DSA_set0_pqg(dsa, p, q, g);
1120*e4456411SJohn Baldwin 
1121*e4456411SJohn Baldwin     if (ret != 1) {
1122*e4456411SJohn Baldwin 	BN_free(p);
1123*e4456411SJohn Baldwin 	BN_free(q);
1124*e4456411SJohn Baldwin 	BN_free(g);
1125*e4456411SJohn Baldwin 	ret = EINVAL;
1126*e4456411SJohn Baldwin 	hx509_set_error_string(context, 0, ret, "failed to set DSA parameters");
1127*e4456411SJohn Baldwin 	goto out;
1128*e4456411SJohn Baldwin     }
1129*e4456411SJohn Baldwin 
1130c19800e8SDoug Rabson     ret = DSA_verify(-1, data->data, data->length,
1131c19800e8SDoug Rabson 		     (unsigned char*)sig->data, sig->length,
1132c19800e8SDoug Rabson 		     dsa);
1133c19800e8SDoug Rabson     if (ret == 1)
1134c19800e8SDoug Rabson 	ret = 0;
1135c19800e8SDoug Rabson     else if (ret == 0 || ret == -1) {
1136c19800e8SDoug Rabson 	ret = HX509_CRYPTO_BAD_SIGNATURE;
1137c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "BAD DSA sigature");
1138c19800e8SDoug Rabson     } else {
1139c19800e8SDoug Rabson 	ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
1140c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "Invalid format of DSA sigature");
1141c19800e8SDoug Rabson     }
1142c19800e8SDoug Rabson 
1143c19800e8SDoug Rabson  out:
1144c19800e8SDoug Rabson     DSA_free(dsa);
1145c19800e8SDoug Rabson 
1146c19800e8SDoug Rabson     return ret;
1147c19800e8SDoug Rabson }
1148c19800e8SDoug Rabson 
1149c19800e8SDoug Rabson #if 0
1150c19800e8SDoug Rabson static int
1151c19800e8SDoug Rabson dsa_parse_private_key(hx509_context context,
1152c19800e8SDoug Rabson 		      const void *data,
1153c19800e8SDoug Rabson 		      size_t len,
1154c19800e8SDoug Rabson 		      hx509_private_key private_key)
1155c19800e8SDoug Rabson {
1156c19800e8SDoug Rabson     const unsigned char *p = data;
1157c19800e8SDoug Rabson 
1158c19800e8SDoug Rabson     private_key->private_key.dsa =
1159c19800e8SDoug Rabson 	d2i_DSAPrivateKey(NULL, &p, len);
1160c19800e8SDoug Rabson     if (private_key->private_key.dsa == NULL)
1161c19800e8SDoug Rabson 	return EINVAL;
1162ae771770SStanislav Sedov     private_key->signature_alg = ASN1_OID_ID_DSA_WITH_SHA1;
1163c19800e8SDoug Rabson 
1164c19800e8SDoug Rabson     return 0;
1165c19800e8SDoug Rabson /* else */
1166c19800e8SDoug Rabson     hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
1167c19800e8SDoug Rabson 			   "No support to parse DSA keys");
1168c19800e8SDoug Rabson     return HX509_PARSING_KEY_FAILED;
1169c19800e8SDoug Rabson }
1170c19800e8SDoug Rabson #endif
1171c19800e8SDoug Rabson 
1172c19800e8SDoug Rabson static int
evp_md_create_signature(hx509_context context,const struct signature_alg * sig_alg,const hx509_private_key signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,AlgorithmIdentifier * signatureAlgorithm,heim_octet_string * sig)1173ae771770SStanislav Sedov evp_md_create_signature(hx509_context context,
1174c19800e8SDoug Rabson 			const struct signature_alg *sig_alg,
1175c19800e8SDoug Rabson 			const hx509_private_key signer,
1176c19800e8SDoug Rabson 			const AlgorithmIdentifier *alg,
1177c19800e8SDoug Rabson 			const heim_octet_string *data,
1178c19800e8SDoug Rabson 			AlgorithmIdentifier *signatureAlgorithm,
1179c19800e8SDoug Rabson 			heim_octet_string *sig)
1180c19800e8SDoug Rabson {
1181ae771770SStanislav Sedov     size_t sigsize = EVP_MD_size(sig_alg->evp_md());
1182ae771770SStanislav Sedov     EVP_MD_CTX *ctx;
1183c19800e8SDoug Rabson 
1184c19800e8SDoug Rabson     memset(sig, 0, sizeof(*sig));
1185c19800e8SDoug Rabson 
1186c19800e8SDoug Rabson     if (signatureAlgorithm) {
1187c19800e8SDoug Rabson 	int ret;
1188ae771770SStanislav Sedov 	ret = set_digest_alg(signatureAlgorithm, sig_alg->sig_oid,
1189c19800e8SDoug Rabson 			     "\x05\x00", 2);
1190c19800e8SDoug Rabson 	if (ret)
1191c19800e8SDoug Rabson 	    return ret;
1192c19800e8SDoug Rabson     }
1193c19800e8SDoug Rabson 
1194c19800e8SDoug Rabson 
1195ae771770SStanislav Sedov     sig->data = malloc(sigsize);
1196c19800e8SDoug Rabson     if (sig->data == NULL) {
1197c19800e8SDoug Rabson 	sig->length = 0;
1198c19800e8SDoug Rabson 	return ENOMEM;
1199c19800e8SDoug Rabson     }
1200ae771770SStanislav Sedov     sig->length = sigsize;
1201c19800e8SDoug Rabson 
1202ae771770SStanislav Sedov     ctx = EVP_MD_CTX_create();
1203ae771770SStanislav Sedov     EVP_DigestInit_ex(ctx, sig_alg->evp_md(), NULL);
1204ae771770SStanislav Sedov     EVP_DigestUpdate(ctx, data->data, data->length);
1205ae771770SStanislav Sedov     EVP_DigestFinal_ex(ctx, sig->data, NULL);
1206ae771770SStanislav Sedov     EVP_MD_CTX_destroy(ctx);
1207ae771770SStanislav Sedov 
1208c19800e8SDoug Rabson 
1209c19800e8SDoug Rabson     return 0;
1210c19800e8SDoug Rabson }
1211c19800e8SDoug Rabson 
1212c19800e8SDoug Rabson static int
evp_md_verify_signature(hx509_context context,const struct signature_alg * sig_alg,const Certificate * signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,const heim_octet_string * sig)1213ae771770SStanislav Sedov evp_md_verify_signature(hx509_context context,
1214c19800e8SDoug Rabson 			const struct signature_alg *sig_alg,
1215c19800e8SDoug Rabson 			const Certificate *signer,
1216c19800e8SDoug Rabson 			const AlgorithmIdentifier *alg,
1217c19800e8SDoug Rabson 			const heim_octet_string *data,
1218c19800e8SDoug Rabson 			const heim_octet_string *sig)
1219c19800e8SDoug Rabson {
1220ae771770SStanislav Sedov     unsigned char digest[EVP_MAX_MD_SIZE];
1221ae771770SStanislav Sedov     EVP_MD_CTX *ctx;
1222ae771770SStanislav Sedov     size_t sigsize = EVP_MD_size(sig_alg->evp_md());
1223c19800e8SDoug Rabson 
1224ae771770SStanislav Sedov     if (sig->length != sigsize || sigsize > sizeof(digest)) {
1225c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_CRYPTO_SIG_INVALID_FORMAT,
1226c19800e8SDoug Rabson 			       "SHA256 sigature have wrong length");
1227c19800e8SDoug Rabson 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
1228c19800e8SDoug Rabson     }
1229c19800e8SDoug Rabson 
1230ae771770SStanislav Sedov     ctx = EVP_MD_CTX_create();
1231ae771770SStanislav Sedov     EVP_DigestInit_ex(ctx, sig_alg->evp_md(), NULL);
1232ae771770SStanislav Sedov     EVP_DigestUpdate(ctx, data->data, data->length);
1233ae771770SStanislav Sedov     EVP_DigestFinal_ex(ctx, digest, NULL);
1234ae771770SStanislav Sedov     EVP_MD_CTX_destroy(ctx);
1235c19800e8SDoug Rabson 
1236ae771770SStanislav Sedov     if (ct_memcmp(digest, sig->data, sigsize) != 0) {
1237c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_CRYPTO_BAD_SIGNATURE,
1238ae771770SStanislav Sedov 			       "Bad %s sigature", sig_alg->name);
1239c19800e8SDoug Rabson 	return HX509_CRYPTO_BAD_SIGNATURE;
1240c19800e8SDoug Rabson     }
1241c19800e8SDoug Rabson 
1242c19800e8SDoug Rabson     return 0;
1243c19800e8SDoug Rabson }
1244c19800e8SDoug Rabson 
1245ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
1246c19800e8SDoug Rabson 
1247ae771770SStanislav Sedov static const struct signature_alg ecdsa_with_sha256_alg = {
1248ae771770SStanislav Sedov     "ecdsa-with-sha256",
1249ae771770SStanislav Sedov     ASN1_OID_ID_ECDSA_WITH_SHA256,
1250ae771770SStanislav Sedov     &_hx509_signature_ecdsa_with_sha256_data,
1251ae771770SStanislav Sedov     ASN1_OID_ID_ECPUBLICKEY,
1252ae771770SStanislav Sedov     &_hx509_signature_sha256_data,
1253ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1254ae771770SStanislav Sedov     0,
1255ae771770SStanislav Sedov     NULL,
1256ae771770SStanislav Sedov     ecdsa_verify_signature,
1257ae771770SStanislav Sedov     ecdsa_create_signature,
1258ae771770SStanislav Sedov     32
1259ae771770SStanislav Sedov };
1260c19800e8SDoug Rabson 
1261ae771770SStanislav Sedov static const struct signature_alg ecdsa_with_sha1_alg = {
1262ae771770SStanislav Sedov     "ecdsa-with-sha1",
1263ae771770SStanislav Sedov     ASN1_OID_ID_ECDSA_WITH_SHA1,
1264ae771770SStanislav Sedov     &_hx509_signature_ecdsa_with_sha1_data,
1265ae771770SStanislav Sedov     ASN1_OID_ID_ECPUBLICKEY,
1266ae771770SStanislav Sedov     &_hx509_signature_sha1_data,
1267ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1268ae771770SStanislav Sedov     0,
1269ae771770SStanislav Sedov     NULL,
1270ae771770SStanislav Sedov     ecdsa_verify_signature,
1271ae771770SStanislav Sedov     ecdsa_create_signature,
1272ae771770SStanislav Sedov     20
1273ae771770SStanislav Sedov };
1274c19800e8SDoug Rabson 
1275ae771770SStanislav Sedov #endif
1276c19800e8SDoug Rabson 
1277c19800e8SDoug Rabson static const struct signature_alg heim_rsa_pkcs1_x509 = {
1278c19800e8SDoug Rabson     "rsa-pkcs1-x509",
1279ae771770SStanislav Sedov     ASN1_OID_ID_HEIM_RSA_PKCS1_X509,
1280ae771770SStanislav Sedov     &_hx509_signature_rsa_pkcs1_x509_data,
1281ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1282c19800e8SDoug Rabson     NULL,
1283c19800e8SDoug Rabson     PROVIDE_CONF|REQUIRE_SIGNER|SIG_PUBLIC_SIG,
1284ae771770SStanislav Sedov     0,
1285ae771770SStanislav Sedov     NULL,
1286c19800e8SDoug Rabson     rsa_verify_signature,
1287ae771770SStanislav Sedov     rsa_create_signature,
1288ae771770SStanislav Sedov     0
1289c19800e8SDoug Rabson };
1290c19800e8SDoug Rabson 
1291c19800e8SDoug Rabson static const struct signature_alg pkcs1_rsa_sha1_alg = {
1292c19800e8SDoug Rabson     "rsa",
1293ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1294ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha1_data,
1295ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1296c19800e8SDoug Rabson     NULL,
1297ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1298ae771770SStanislav Sedov     0,
1299ae771770SStanislav Sedov     NULL,
1300c19800e8SDoug Rabson     rsa_verify_signature,
1301ae771770SStanislav Sedov     rsa_create_signature,
1302ae771770SStanislav Sedov     0
1303ae771770SStanislav Sedov };
1304ae771770SStanislav Sedov 
1305ae771770SStanislav Sedov static const struct signature_alg rsa_with_sha512_alg = {
1306ae771770SStanislav Sedov     "rsa-with-sha512",
1307ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_SHA512WITHRSAENCRYPTION,
1308ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha512_data,
1309ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1310ae771770SStanislav Sedov     &_hx509_signature_sha512_data,
1311ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1312ae771770SStanislav Sedov     0,
1313ae771770SStanislav Sedov     NULL,
1314ae771770SStanislav Sedov     rsa_verify_signature,
1315ae771770SStanislav Sedov     rsa_create_signature,
1316ae771770SStanislav Sedov     0
1317ae771770SStanislav Sedov };
1318ae771770SStanislav Sedov 
1319ae771770SStanislav Sedov static const struct signature_alg rsa_with_sha384_alg = {
1320ae771770SStanislav Sedov     "rsa-with-sha384",
1321ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_SHA384WITHRSAENCRYPTION,
1322ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha384_data,
1323ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1324ae771770SStanislav Sedov     &_hx509_signature_sha384_data,
1325ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1326ae771770SStanislav Sedov     0,
1327ae771770SStanislav Sedov     NULL,
1328ae771770SStanislav Sedov     rsa_verify_signature,
1329ae771770SStanislav Sedov     rsa_create_signature,
1330ae771770SStanislav Sedov     0
1331c19800e8SDoug Rabson };
1332c19800e8SDoug Rabson 
1333c19800e8SDoug Rabson static const struct signature_alg rsa_with_sha256_alg = {
1334c19800e8SDoug Rabson     "rsa-with-sha256",
1335ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_SHA256WITHRSAENCRYPTION,
1336ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha256_data,
1337ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1338ae771770SStanislav Sedov     &_hx509_signature_sha256_data,
1339ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1340ae771770SStanislav Sedov     0,
1341ae771770SStanislav Sedov     NULL,
1342c19800e8SDoug Rabson     rsa_verify_signature,
1343ae771770SStanislav Sedov     rsa_create_signature,
1344ae771770SStanislav Sedov     0
1345c19800e8SDoug Rabson };
1346c19800e8SDoug Rabson 
1347c19800e8SDoug Rabson static const struct signature_alg rsa_with_sha1_alg = {
1348c19800e8SDoug Rabson     "rsa-with-sha1",
1349ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION,
1350ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha1_data,
1351ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1352ae771770SStanislav Sedov     &_hx509_signature_sha1_data,
1353ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1354ae771770SStanislav Sedov     0,
1355ae771770SStanislav Sedov     NULL,
1356c19800e8SDoug Rabson     rsa_verify_signature,
1357ae771770SStanislav Sedov     rsa_create_signature,
1358ae771770SStanislav Sedov     0
1359ae771770SStanislav Sedov };
1360ae771770SStanislav Sedov 
1361ae771770SStanislav Sedov static const struct signature_alg rsa_with_sha1_alg_secsig = {
1362ae771770SStanislav Sedov     "rsa-with-sha1",
1363ae771770SStanislav Sedov     ASN1_OID_ID_SECSIG_SHA_1WITHRSAENCRYPTION,
1364ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha1_data,
1365ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1366ae771770SStanislav Sedov     &_hx509_signature_sha1_data,
1367ae771770SStanislav Sedov     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG|SELF_SIGNED_OK,
1368ae771770SStanislav Sedov     0,
1369ae771770SStanislav Sedov     NULL,
1370ae771770SStanislav Sedov     rsa_verify_signature,
1371ae771770SStanislav Sedov     rsa_create_signature,
1372ae771770SStanislav Sedov     0
1373c19800e8SDoug Rabson };
1374c19800e8SDoug Rabson 
1375c19800e8SDoug Rabson static const struct signature_alg rsa_with_md5_alg = {
1376c19800e8SDoug Rabson     "rsa-with-md5",
1377ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_MD5WITHRSAENCRYPTION,
1378ae771770SStanislav Sedov     &_hx509_signature_rsa_with_md5_data,
1379ae771770SStanislav Sedov     ASN1_OID_ID_PKCS1_RSAENCRYPTION,
1380ae771770SStanislav Sedov     &_hx509_signature_md5_data,
1381c19800e8SDoug Rabson     PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|SIG_PUBLIC_SIG,
1382ae771770SStanislav Sedov     1230739889,
1383ae771770SStanislav Sedov     NULL,
1384c19800e8SDoug Rabson     rsa_verify_signature,
1385ae771770SStanislav Sedov     rsa_create_signature,
1386ae771770SStanislav Sedov     0
1387c19800e8SDoug Rabson };
1388c19800e8SDoug Rabson 
1389c19800e8SDoug Rabson static const struct signature_alg dsa_sha1_alg = {
1390c19800e8SDoug Rabson     "dsa-with-sha1",
1391ae771770SStanislav Sedov     ASN1_OID_ID_DSA_WITH_SHA1,
1392c19800e8SDoug Rabson     NULL,
1393ae771770SStanislav Sedov     ASN1_OID_ID_DSA,
1394ae771770SStanislav Sedov     &_hx509_signature_sha1_data,
1395c19800e8SDoug Rabson     PROVIDE_CONF|REQUIRE_SIGNER|SIG_PUBLIC_SIG,
1396ae771770SStanislav Sedov     0,
1397ae771770SStanislav Sedov     NULL,
1398c19800e8SDoug Rabson     dsa_verify_signature,
1399c19800e8SDoug Rabson     /* create_signature */ NULL,
1400ae771770SStanislav Sedov     0
1401ae771770SStanislav Sedov };
1402ae771770SStanislav Sedov 
1403ae771770SStanislav Sedov static const struct signature_alg sha512_alg = {
1404ae771770SStanislav Sedov     "sha-512",
1405ae771770SStanislav Sedov     ASN1_OID_ID_SHA512,
1406ae771770SStanislav Sedov     &_hx509_signature_sha512_data,
1407ae771770SStanislav Sedov     NULL,
1408ae771770SStanislav Sedov     NULL,
1409ae771770SStanislav Sedov     SIG_DIGEST,
1410ae771770SStanislav Sedov     0,
1411ae771770SStanislav Sedov     EVP_sha512,
1412ae771770SStanislav Sedov     evp_md_verify_signature,
1413ae771770SStanislav Sedov     evp_md_create_signature,
1414ae771770SStanislav Sedov     0
1415ae771770SStanislav Sedov };
1416ae771770SStanislav Sedov 
1417ae771770SStanislav Sedov static const struct signature_alg sha384_alg = {
1418ae771770SStanislav Sedov     "sha-384",
1419ae771770SStanislav Sedov     ASN1_OID_ID_SHA512,
1420ae771770SStanislav Sedov     &_hx509_signature_sha384_data,
1421ae771770SStanislav Sedov     NULL,
1422ae771770SStanislav Sedov     NULL,
1423ae771770SStanislav Sedov     SIG_DIGEST,
1424ae771770SStanislav Sedov     0,
1425ae771770SStanislav Sedov     EVP_sha384,
1426ae771770SStanislav Sedov     evp_md_verify_signature,
1427ae771770SStanislav Sedov     evp_md_create_signature,
1428ae771770SStanislav Sedov     0
1429c19800e8SDoug Rabson };
1430c19800e8SDoug Rabson 
1431c19800e8SDoug Rabson static const struct signature_alg sha256_alg = {
1432c19800e8SDoug Rabson     "sha-256",
1433ae771770SStanislav Sedov     ASN1_OID_ID_SHA256,
1434ae771770SStanislav Sedov     &_hx509_signature_sha256_data,
1435c19800e8SDoug Rabson     NULL,
1436c19800e8SDoug Rabson     NULL,
1437c19800e8SDoug Rabson     SIG_DIGEST,
1438ae771770SStanislav Sedov     0,
1439ae771770SStanislav Sedov     EVP_sha256,
1440ae771770SStanislav Sedov     evp_md_verify_signature,
1441ae771770SStanislav Sedov     evp_md_create_signature,
1442ae771770SStanislav Sedov     0
1443c19800e8SDoug Rabson };
1444c19800e8SDoug Rabson 
1445c19800e8SDoug Rabson static const struct signature_alg sha1_alg = {
1446c19800e8SDoug Rabson     "sha1",
1447ae771770SStanislav Sedov     ASN1_OID_ID_SECSIG_SHA_1,
1448ae771770SStanislav Sedov     &_hx509_signature_sha1_data,
1449c19800e8SDoug Rabson     NULL,
1450c19800e8SDoug Rabson     NULL,
1451c19800e8SDoug Rabson     SIG_DIGEST,
1452ae771770SStanislav Sedov     0,
1453ae771770SStanislav Sedov     EVP_sha1,
1454ae771770SStanislav Sedov     evp_md_verify_signature,
1455ae771770SStanislav Sedov     evp_md_create_signature,
1456ae771770SStanislav Sedov     0
1457c19800e8SDoug Rabson };
1458c19800e8SDoug Rabson 
1459c19800e8SDoug Rabson static const struct signature_alg md5_alg = {
1460c19800e8SDoug Rabson     "rsa-md5",
1461ae771770SStanislav Sedov     ASN1_OID_ID_RSA_DIGEST_MD5,
1462ae771770SStanislav Sedov     &_hx509_signature_md5_data,
1463c19800e8SDoug Rabson     NULL,
1464c19800e8SDoug Rabson     NULL,
1465c19800e8SDoug Rabson     SIG_DIGEST,
1466ae771770SStanislav Sedov     0,
1467ae771770SStanislav Sedov     EVP_md5,
1468ae771770SStanislav Sedov     evp_md_verify_signature,
1469c19800e8SDoug Rabson     NULL,
1470ae771770SStanislav Sedov     0
1471c19800e8SDoug Rabson };
1472c19800e8SDoug Rabson 
1473c19800e8SDoug Rabson /*
1474c19800e8SDoug Rabson  * Order matter in this structure, "best" first for each "key
1475ae771770SStanislav Sedov  * compatible" type (type is ECDSA, RSA, DSA, none, etc)
1476c19800e8SDoug Rabson  */
1477c19800e8SDoug Rabson 
1478c19800e8SDoug Rabson static const struct signature_alg *sig_algs[] = {
1479ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
1480ae771770SStanislav Sedov     &ecdsa_with_sha256_alg,
1481ae771770SStanislav Sedov     &ecdsa_with_sha1_alg,
1482ae771770SStanislav Sedov #endif
1483ae771770SStanislav Sedov     &rsa_with_sha512_alg,
1484ae771770SStanislav Sedov     &rsa_with_sha384_alg,
1485c19800e8SDoug Rabson     &rsa_with_sha256_alg,
1486c19800e8SDoug Rabson     &rsa_with_sha1_alg,
1487ae771770SStanislav Sedov     &rsa_with_sha1_alg_secsig,
1488c19800e8SDoug Rabson     &pkcs1_rsa_sha1_alg,
1489c19800e8SDoug Rabson     &rsa_with_md5_alg,
1490c19800e8SDoug Rabson     &heim_rsa_pkcs1_x509,
1491c19800e8SDoug Rabson     &dsa_sha1_alg,
1492ae771770SStanislav Sedov     &sha512_alg,
1493ae771770SStanislav Sedov     &sha384_alg,
1494c19800e8SDoug Rabson     &sha256_alg,
1495c19800e8SDoug Rabson     &sha1_alg,
1496c19800e8SDoug Rabson     &md5_alg,
1497c19800e8SDoug Rabson     NULL
1498c19800e8SDoug Rabson };
1499c19800e8SDoug Rabson 
1500c19800e8SDoug Rabson static const struct signature_alg *
find_sig_alg(const heim_oid * oid)1501c19800e8SDoug Rabson find_sig_alg(const heim_oid *oid)
1502c19800e8SDoug Rabson {
1503ae771770SStanislav Sedov     unsigned int i;
1504c19800e8SDoug Rabson     for (i = 0; sig_algs[i]; i++)
1505ae771770SStanislav Sedov 	if (der_heim_oid_cmp(sig_algs[i]->sig_oid, oid) == 0)
1506c19800e8SDoug Rabson 	    return sig_algs[i];
1507c19800e8SDoug Rabson     return NULL;
1508c19800e8SDoug Rabson }
1509c19800e8SDoug Rabson 
1510ae771770SStanislav Sedov static const AlgorithmIdentifier *
alg_for_privatekey(const hx509_private_key pk,int type)1511ae771770SStanislav Sedov alg_for_privatekey(const hx509_private_key pk, int type)
1512ae771770SStanislav Sedov {
1513ae771770SStanislav Sedov     const heim_oid *keytype;
1514ae771770SStanislav Sedov     unsigned int i;
1515ae771770SStanislav Sedov 
1516ae771770SStanislav Sedov     if (pk->ops == NULL)
1517ae771770SStanislav Sedov 	return NULL;
1518ae771770SStanislav Sedov 
1519ae771770SStanislav Sedov     keytype = pk->ops->key_oid;
1520ae771770SStanislav Sedov 
1521ae771770SStanislav Sedov     for (i = 0; sig_algs[i]; i++) {
1522ae771770SStanislav Sedov 	if (sig_algs[i]->key_oid == NULL)
1523ae771770SStanislav Sedov 	    continue;
1524ae771770SStanislav Sedov 	if (der_heim_oid_cmp(sig_algs[i]->key_oid, keytype) != 0)
1525ae771770SStanislav Sedov 	    continue;
1526ae771770SStanislav Sedov 	if (pk->ops->available &&
1527ae771770SStanislav Sedov 	    pk->ops->available(pk, sig_algs[i]->sig_alg) == 0)
1528ae771770SStanislav Sedov 	    continue;
1529ae771770SStanislav Sedov 	if (type == HX509_SELECT_PUBLIC_SIG)
1530ae771770SStanislav Sedov 	    return sig_algs[i]->sig_alg;
1531ae771770SStanislav Sedov 	if (type == HX509_SELECT_DIGEST)
1532ae771770SStanislav Sedov 	    return sig_algs[i]->digest_alg;
1533ae771770SStanislav Sedov 
1534ae771770SStanislav Sedov 	return NULL;
1535ae771770SStanislav Sedov     }
1536ae771770SStanislav Sedov     return NULL;
1537ae771770SStanislav Sedov }
1538ae771770SStanislav Sedov 
1539c19800e8SDoug Rabson /*
1540c19800e8SDoug Rabson  *
1541c19800e8SDoug Rabson  */
1542c19800e8SDoug Rabson 
1543c19800e8SDoug Rabson static struct hx509_private_key_ops *private_algs[] = {
1544c19800e8SDoug Rabson     &rsa_private_key_ops,
1545ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
1546ae771770SStanislav Sedov     &ecdsa_private_key_ops,
1547ae771770SStanislav Sedov #endif
1548c19800e8SDoug Rabson     NULL
1549c19800e8SDoug Rabson };
1550c19800e8SDoug Rabson 
1551ae771770SStanislav Sedov hx509_private_key_ops *
hx509_find_private_alg(const heim_oid * oid)1552ae771770SStanislav Sedov hx509_find_private_alg(const heim_oid *oid)
1553c19800e8SDoug Rabson {
1554c19800e8SDoug Rabson     int i;
1555c19800e8SDoug Rabson     for (i = 0; private_algs[i]; i++) {
1556c19800e8SDoug Rabson 	if (private_algs[i]->key_oid == NULL)
1557c19800e8SDoug Rabson 	    continue;
1558ae771770SStanislav Sedov 	if (der_heim_oid_cmp(private_algs[i]->key_oid, oid) == 0)
1559c19800e8SDoug Rabson 	    return private_algs[i];
1560c19800e8SDoug Rabson     }
1561c19800e8SDoug Rabson     return NULL;
1562c19800e8SDoug Rabson }
1563c19800e8SDoug Rabson 
1564ae771770SStanislav Sedov /*
1565ae771770SStanislav Sedov  * Check if the algorithm `alg' have a best before date, and if it
1566ae771770SStanislav Sedov  * des, make sure the its before the time `t'.
1567ae771770SStanislav Sedov  */
1568ae771770SStanislav Sedov 
1569ae771770SStanislav Sedov int
_hx509_signature_best_before(hx509_context context,const AlgorithmIdentifier * alg,time_t t)1570ae771770SStanislav Sedov _hx509_signature_best_before(hx509_context context,
1571ae771770SStanislav Sedov 			     const AlgorithmIdentifier *alg,
1572ae771770SStanislav Sedov 			     time_t t)
1573ae771770SStanislav Sedov {
1574ae771770SStanislav Sedov     const struct signature_alg *md;
1575ae771770SStanislav Sedov 
1576ae771770SStanislav Sedov     md = find_sig_alg(&alg->algorithm);
1577ae771770SStanislav Sedov     if (md == NULL) {
1578ae771770SStanislav Sedov 	hx509_clear_error_string(context);
1579ae771770SStanislav Sedov 	return HX509_SIG_ALG_NO_SUPPORTED;
1580ae771770SStanislav Sedov     }
1581ae771770SStanislav Sedov     if (md->best_before && md->best_before < t) {
1582ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, HX509_CRYPTO_ALGORITHM_BEST_BEFORE,
1583ae771770SStanislav Sedov 			       "Algorithm %s has passed it best before date",
1584ae771770SStanislav Sedov 			       md->name);
1585ae771770SStanislav Sedov 	return HX509_CRYPTO_ALGORITHM_BEST_BEFORE;
1586ae771770SStanislav Sedov     }
1587ae771770SStanislav Sedov     return 0;
1588ae771770SStanislav Sedov }
1589ae771770SStanislav Sedov 
1590ae771770SStanislav Sedov int
_hx509_self_signed_valid(hx509_context context,const AlgorithmIdentifier * alg)1591ae771770SStanislav Sedov _hx509_self_signed_valid(hx509_context context,
1592ae771770SStanislav Sedov 			 const AlgorithmIdentifier *alg)
1593ae771770SStanislav Sedov {
1594ae771770SStanislav Sedov     const struct signature_alg *md;
1595ae771770SStanislav Sedov 
1596ae771770SStanislav Sedov     md = find_sig_alg(&alg->algorithm);
1597ae771770SStanislav Sedov     if (md == NULL) {
1598ae771770SStanislav Sedov 	hx509_clear_error_string(context);
1599ae771770SStanislav Sedov 	return HX509_SIG_ALG_NO_SUPPORTED;
1600ae771770SStanislav Sedov     }
1601ae771770SStanislav Sedov     if ((md->flags & SELF_SIGNED_OK) == 0) {
1602ae771770SStanislav Sedov 	hx509_set_error_string(context, 0, HX509_CRYPTO_ALGORITHM_BEST_BEFORE,
1603ae771770SStanislav Sedov 			       "Algorithm %s not trusted for self signatures",
1604ae771770SStanislav Sedov 			       md->name);
1605ae771770SStanislav Sedov 	return HX509_CRYPTO_ALGORITHM_BEST_BEFORE;
1606ae771770SStanislav Sedov     }
1607ae771770SStanislav Sedov     return 0;
1608ae771770SStanislav Sedov }
1609ae771770SStanislav Sedov 
1610c19800e8SDoug Rabson 
1611c19800e8SDoug Rabson int
_hx509_verify_signature(hx509_context context,const hx509_cert cert,const AlgorithmIdentifier * alg,const heim_octet_string * data,const heim_octet_string * sig)1612c19800e8SDoug Rabson _hx509_verify_signature(hx509_context context,
1613ae771770SStanislav Sedov 			const hx509_cert cert,
1614c19800e8SDoug Rabson 			const AlgorithmIdentifier *alg,
1615c19800e8SDoug Rabson 			const heim_octet_string *data,
1616c19800e8SDoug Rabson 			const heim_octet_string *sig)
1617c19800e8SDoug Rabson {
1618c19800e8SDoug Rabson     const struct signature_alg *md;
1619ae771770SStanislav Sedov     const Certificate *signer = NULL;
1620ae771770SStanislav Sedov 
1621ae771770SStanislav Sedov     if (cert)
1622ae771770SStanislav Sedov 	signer = _hx509_get_cert(cert);
1623c19800e8SDoug Rabson 
1624c19800e8SDoug Rabson     md = find_sig_alg(&alg->algorithm);
1625c19800e8SDoug Rabson     if (md == NULL) {
1626c19800e8SDoug Rabson 	hx509_clear_error_string(context);
1627c19800e8SDoug Rabson 	return HX509_SIG_ALG_NO_SUPPORTED;
1628c19800e8SDoug Rabson     }
1629c19800e8SDoug Rabson     if (signer && (md->flags & PROVIDE_CONF) == 0) {
1630c19800e8SDoug Rabson 	hx509_clear_error_string(context);
1631c19800e8SDoug Rabson 	return HX509_CRYPTO_SIG_NO_CONF;
1632c19800e8SDoug Rabson     }
1633c19800e8SDoug Rabson     if (signer == NULL && (md->flags & REQUIRE_SIGNER)) {
1634c19800e8SDoug Rabson 	    hx509_clear_error_string(context);
1635c19800e8SDoug Rabson 	return HX509_CRYPTO_SIGNATURE_WITHOUT_SIGNER;
1636c19800e8SDoug Rabson     }
1637c19800e8SDoug Rabson     if (md->key_oid && signer) {
1638c19800e8SDoug Rabson 	const SubjectPublicKeyInfo *spi;
1639c19800e8SDoug Rabson 	spi = &signer->tbsCertificate.subjectPublicKeyInfo;
1640c19800e8SDoug Rabson 
1641ae771770SStanislav Sedov 	if (der_heim_oid_cmp(&spi->algorithm.algorithm, md->key_oid) != 0) {
1642c19800e8SDoug Rabson 	    hx509_clear_error_string(context);
1643c19800e8SDoug Rabson 	    return HX509_SIG_ALG_DONT_MATCH_KEY_ALG;
1644c19800e8SDoug Rabson 	}
1645c19800e8SDoug Rabson     }
1646c19800e8SDoug Rabson     return (*md->verify_signature)(context, md, signer, alg, data, sig);
1647c19800e8SDoug Rabson }
1648c19800e8SDoug Rabson 
1649c19800e8SDoug Rabson int
_hx509_create_signature(hx509_context context,const hx509_private_key signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,AlgorithmIdentifier * signatureAlgorithm,heim_octet_string * sig)1650c19800e8SDoug Rabson _hx509_create_signature(hx509_context context,
1651c19800e8SDoug Rabson 			const hx509_private_key signer,
1652c19800e8SDoug Rabson 			const AlgorithmIdentifier *alg,
1653c19800e8SDoug Rabson 			const heim_octet_string *data,
1654c19800e8SDoug Rabson 			AlgorithmIdentifier *signatureAlgorithm,
1655c19800e8SDoug Rabson 			heim_octet_string *sig)
1656c19800e8SDoug Rabson {
1657c19800e8SDoug Rabson     const struct signature_alg *md;
1658c19800e8SDoug Rabson 
1659c19800e8SDoug Rabson     md = find_sig_alg(&alg->algorithm);
1660c19800e8SDoug Rabson     if (md == NULL) {
1661c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_SIG_ALG_NO_SUPPORTED,
1662c19800e8SDoug Rabson 	    "algorithm no supported");
1663c19800e8SDoug Rabson 	return HX509_SIG_ALG_NO_SUPPORTED;
1664c19800e8SDoug Rabson     }
1665c19800e8SDoug Rabson 
1666c19800e8SDoug Rabson     if (signer && (md->flags & PROVIDE_CONF) == 0) {
1667c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_SIG_ALG_NO_SUPPORTED,
1668c19800e8SDoug Rabson 	    "algorithm provides no conf");
1669c19800e8SDoug Rabson 	return HX509_CRYPTO_SIG_NO_CONF;
1670c19800e8SDoug Rabson     }
1671c19800e8SDoug Rabson 
1672c19800e8SDoug Rabson     return (*md->create_signature)(context, md, signer, alg, data,
1673c19800e8SDoug Rabson 				   signatureAlgorithm, sig);
1674c19800e8SDoug Rabson }
1675c19800e8SDoug Rabson 
1676c19800e8SDoug Rabson int
_hx509_create_signature_bitstring(hx509_context context,const hx509_private_key signer,const AlgorithmIdentifier * alg,const heim_octet_string * data,AlgorithmIdentifier * signatureAlgorithm,heim_bit_string * sig)1677c19800e8SDoug Rabson _hx509_create_signature_bitstring(hx509_context context,
1678c19800e8SDoug Rabson 				  const hx509_private_key signer,
1679c19800e8SDoug Rabson 				  const AlgorithmIdentifier *alg,
1680c19800e8SDoug Rabson 				  const heim_octet_string *data,
1681c19800e8SDoug Rabson 				  AlgorithmIdentifier *signatureAlgorithm,
1682c19800e8SDoug Rabson 				  heim_bit_string *sig)
1683c19800e8SDoug Rabson {
1684c19800e8SDoug Rabson     heim_octet_string os;
1685c19800e8SDoug Rabson     int ret;
1686c19800e8SDoug Rabson 
1687c19800e8SDoug Rabson     ret = _hx509_create_signature(context, signer, alg,
1688c19800e8SDoug Rabson 				  data, signatureAlgorithm, &os);
1689c19800e8SDoug Rabson     if (ret)
1690c19800e8SDoug Rabson 	return ret;
1691c19800e8SDoug Rabson     sig->data = os.data;
1692c19800e8SDoug Rabson     sig->length = os.length * 8;
1693c19800e8SDoug Rabson     return 0;
1694c19800e8SDoug Rabson }
1695c19800e8SDoug Rabson 
1696c19800e8SDoug Rabson int
_hx509_public_encrypt(hx509_context context,const heim_octet_string * cleartext,const Certificate * cert,heim_oid * encryption_oid,heim_octet_string * ciphertext)1697c19800e8SDoug Rabson _hx509_public_encrypt(hx509_context context,
1698c19800e8SDoug Rabson 		      const heim_octet_string *cleartext,
1699c19800e8SDoug Rabson 		      const Certificate *cert,
1700c19800e8SDoug Rabson 		      heim_oid *encryption_oid,
1701c19800e8SDoug Rabson 		      heim_octet_string *ciphertext)
1702c19800e8SDoug Rabson {
1703c19800e8SDoug Rabson     const SubjectPublicKeyInfo *spi;
1704c19800e8SDoug Rabson     unsigned char *to;
1705c19800e8SDoug Rabson     int tosize;
1706c19800e8SDoug Rabson     int ret;
1707c19800e8SDoug Rabson     RSA *rsa;
1708c19800e8SDoug Rabson     size_t size;
1709ae771770SStanislav Sedov     const unsigned char *p;
1710c19800e8SDoug Rabson 
1711c19800e8SDoug Rabson     ciphertext->data = NULL;
1712c19800e8SDoug Rabson     ciphertext->length = 0;
1713c19800e8SDoug Rabson 
1714c19800e8SDoug Rabson     spi = &cert->tbsCertificate.subjectPublicKeyInfo;
1715c19800e8SDoug Rabson 
1716ae771770SStanislav Sedov     p = spi->subjectPublicKey.data;
1717ae771770SStanislav Sedov     size = spi->subjectPublicKey.length / 8;
1718ae771770SStanislav Sedov 
1719ae771770SStanislav Sedov     rsa = d2i_RSAPublicKey(NULL, &p, size);
1720c19800e8SDoug Rabson     if (rsa == NULL) {
1721c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1722c19800e8SDoug Rabson 	return ENOMEM;
1723c19800e8SDoug Rabson     }
1724c19800e8SDoug Rabson 
1725c19800e8SDoug Rabson     tosize = RSA_size(rsa);
1726c19800e8SDoug Rabson     to = malloc(tosize);
1727c19800e8SDoug Rabson     if (to == NULL) {
1728c19800e8SDoug Rabson 	RSA_free(rsa);
1729c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1730c19800e8SDoug Rabson 	return ENOMEM;
1731c19800e8SDoug Rabson     }
1732c19800e8SDoug Rabson 
1733c19800e8SDoug Rabson     ret = RSA_public_encrypt(cleartext->length,
1734c19800e8SDoug Rabson 			     (unsigned char *)cleartext->data,
1735c19800e8SDoug Rabson 			     to, rsa, RSA_PKCS1_PADDING);
1736c19800e8SDoug Rabson     RSA_free(rsa);
1737c19800e8SDoug Rabson     if (ret <= 0) {
1738c19800e8SDoug Rabson 	free(to);
1739c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_CRYPTO_RSA_PUBLIC_ENCRYPT,
1740c19800e8SDoug Rabson 			       "RSA public encrypt failed with %d", ret);
1741c19800e8SDoug Rabson 	return HX509_CRYPTO_RSA_PUBLIC_ENCRYPT;
1742c19800e8SDoug Rabson     }
1743c19800e8SDoug Rabson     if (ret > tosize)
1744c19800e8SDoug Rabson 	_hx509_abort("internal rsa decryption failure: ret > tosize");
1745c19800e8SDoug Rabson 
1746c19800e8SDoug Rabson     ciphertext->length = ret;
1747c19800e8SDoug Rabson     ciphertext->data = to;
1748c19800e8SDoug Rabson 
1749ae771770SStanislav Sedov     ret = der_copy_oid(ASN1_OID_ID_PKCS1_RSAENCRYPTION, encryption_oid);
1750c19800e8SDoug Rabson     if (ret) {
1751c19800e8SDoug Rabson 	der_free_octet_string(ciphertext);
1752c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1753c19800e8SDoug Rabson 	return ENOMEM;
1754c19800e8SDoug Rabson     }
1755c19800e8SDoug Rabson 
1756c19800e8SDoug Rabson     return 0;
1757c19800e8SDoug Rabson }
1758c19800e8SDoug Rabson 
1759c19800e8SDoug Rabson int
hx509_private_key_private_decrypt(hx509_context context,const heim_octet_string * ciphertext,const heim_oid * encryption_oid,hx509_private_key p,heim_octet_string * cleartext)1760ae771770SStanislav Sedov hx509_private_key_private_decrypt(hx509_context context,
1761c19800e8SDoug Rabson 				   const heim_octet_string *ciphertext,
1762c19800e8SDoug Rabson 				   const heim_oid *encryption_oid,
1763c19800e8SDoug Rabson 				   hx509_private_key p,
1764c19800e8SDoug Rabson 				   heim_octet_string *cleartext)
1765c19800e8SDoug Rabson {
1766c19800e8SDoug Rabson     int ret;
1767c19800e8SDoug Rabson 
1768c19800e8SDoug Rabson     cleartext->data = NULL;
1769c19800e8SDoug Rabson     cleartext->length = 0;
1770c19800e8SDoug Rabson 
1771c19800e8SDoug Rabson     if (p->private_key.rsa == NULL) {
1772c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_PRIVATE_KEY_MISSING,
1773c19800e8SDoug Rabson 			       "Private RSA key missing");
1774c19800e8SDoug Rabson 	return HX509_PRIVATE_KEY_MISSING;
1775c19800e8SDoug Rabson     }
1776c19800e8SDoug Rabson 
1777c19800e8SDoug Rabson     cleartext->length = RSA_size(p->private_key.rsa);
1778c19800e8SDoug Rabson     cleartext->data = malloc(cleartext->length);
1779c19800e8SDoug Rabson     if (cleartext->data == NULL) {
1780c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1781c19800e8SDoug Rabson 	return ENOMEM;
1782c19800e8SDoug Rabson     }
1783c19800e8SDoug Rabson     ret = RSA_private_decrypt(ciphertext->length, ciphertext->data,
1784c19800e8SDoug Rabson 			      cleartext->data,
1785c19800e8SDoug Rabson 			      p->private_key.rsa,
1786c19800e8SDoug Rabson 			      RSA_PKCS1_PADDING);
1787c19800e8SDoug Rabson     if (ret <= 0) {
1788c19800e8SDoug Rabson 	der_free_octet_string(cleartext);
1789c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_CRYPTO_RSA_PRIVATE_DECRYPT,
1790c19800e8SDoug Rabson 			       "Failed to decrypt using private key: %d", ret);
1791c19800e8SDoug Rabson 	return HX509_CRYPTO_RSA_PRIVATE_DECRYPT;
1792c19800e8SDoug Rabson     }
1793ae771770SStanislav Sedov     if (cleartext->length < (size_t)ret)
1794c19800e8SDoug Rabson 	_hx509_abort("internal rsa decryption failure: ret > tosize");
1795c19800e8SDoug Rabson 
1796c19800e8SDoug Rabson     cleartext->length = ret;
1797c19800e8SDoug Rabson 
1798c19800e8SDoug Rabson     return 0;
1799c19800e8SDoug Rabson }
1800c19800e8SDoug Rabson 
1801c19800e8SDoug Rabson 
1802c19800e8SDoug Rabson int
hx509_parse_private_key(hx509_context context,const AlgorithmIdentifier * keyai,const void * data,size_t len,hx509_key_format_t format,hx509_private_key * private_key)1803ae771770SStanislav Sedov hx509_parse_private_key(hx509_context context,
1804ae771770SStanislav Sedov 			 const AlgorithmIdentifier *keyai,
1805c19800e8SDoug Rabson 			 const void *data,
1806c19800e8SDoug Rabson 			 size_t len,
1807ae771770SStanislav Sedov 			 hx509_key_format_t format,
1808c19800e8SDoug Rabson 			 hx509_private_key *private_key)
1809c19800e8SDoug Rabson {
1810c19800e8SDoug Rabson     struct hx509_private_key_ops *ops;
1811c19800e8SDoug Rabson     int ret;
1812c19800e8SDoug Rabson 
1813c19800e8SDoug Rabson     *private_key = NULL;
1814c19800e8SDoug Rabson 
1815ae771770SStanislav Sedov     ops = hx509_find_private_alg(&keyai->algorithm);
1816c19800e8SDoug Rabson     if (ops == NULL) {
1817c19800e8SDoug Rabson 	hx509_clear_error_string(context);
1818c19800e8SDoug Rabson 	return HX509_SIG_ALG_NO_SUPPORTED;
1819c19800e8SDoug Rabson     }
1820c19800e8SDoug Rabson 
1821ae771770SStanislav Sedov     ret = hx509_private_key_init(private_key, ops, NULL);
1822c19800e8SDoug Rabson     if (ret) {
1823c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
1824c19800e8SDoug Rabson 	return ret;
1825c19800e8SDoug Rabson     }
1826c19800e8SDoug Rabson 
1827ae771770SStanislav Sedov     ret = (*ops->import)(context, keyai, data, len, format, *private_key);
1828c19800e8SDoug Rabson     if (ret)
1829ae771770SStanislav Sedov 	hx509_private_key_free(private_key);
1830c19800e8SDoug Rabson 
1831c19800e8SDoug Rabson     return ret;
1832c19800e8SDoug Rabson }
1833c19800e8SDoug Rabson 
1834c19800e8SDoug Rabson /*
1835c19800e8SDoug Rabson  *
1836c19800e8SDoug Rabson  */
1837c19800e8SDoug Rabson 
1838c19800e8SDoug Rabson int
hx509_private_key2SPKI(hx509_context context,hx509_private_key private_key,SubjectPublicKeyInfo * spki)1839ae771770SStanislav Sedov hx509_private_key2SPKI(hx509_context context,
1840c19800e8SDoug Rabson 			hx509_private_key private_key,
1841c19800e8SDoug Rabson 			SubjectPublicKeyInfo *spki)
1842c19800e8SDoug Rabson {
1843c19800e8SDoug Rabson     const struct hx509_private_key_ops *ops = private_key->ops;
1844c19800e8SDoug Rabson     if (ops == NULL || ops->get_spki == NULL) {
1845c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_UNIMPLEMENTED_OPERATION,
1846c19800e8SDoug Rabson 			       "Private key have no key2SPKI function");
1847c19800e8SDoug Rabson 	return HX509_UNIMPLEMENTED_OPERATION;
1848c19800e8SDoug Rabson     }
1849c19800e8SDoug Rabson     return (*ops->get_spki)(context, private_key, spki);
1850c19800e8SDoug Rabson }
1851c19800e8SDoug Rabson 
1852c19800e8SDoug Rabson int
_hx509_generate_private_key_init(hx509_context context,const heim_oid * oid,struct hx509_generate_private_context ** ctx)1853c19800e8SDoug Rabson _hx509_generate_private_key_init(hx509_context context,
1854c19800e8SDoug Rabson 				 const heim_oid *oid,
1855c19800e8SDoug Rabson 				 struct hx509_generate_private_context **ctx)
1856c19800e8SDoug Rabson {
1857c19800e8SDoug Rabson     *ctx = NULL;
1858c19800e8SDoug Rabson 
1859ae771770SStanislav Sedov     if (der_heim_oid_cmp(oid, ASN1_OID_ID_PKCS1_RSAENCRYPTION) != 0) {
1860c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, EINVAL,
1861c19800e8SDoug Rabson 			       "private key not an RSA key");
1862c19800e8SDoug Rabson 	return EINVAL;
1863c19800e8SDoug Rabson     }
1864c19800e8SDoug Rabson 
1865c19800e8SDoug Rabson     *ctx = calloc(1, sizeof(**ctx));
1866c19800e8SDoug Rabson     if (*ctx == NULL) {
1867c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1868c19800e8SDoug Rabson 	return ENOMEM;
1869c19800e8SDoug Rabson     }
1870c19800e8SDoug Rabson     (*ctx)->key_oid = oid;
1871c19800e8SDoug Rabson 
1872c19800e8SDoug Rabson     return 0;
1873c19800e8SDoug Rabson }
1874c19800e8SDoug Rabson 
1875c19800e8SDoug Rabson int
_hx509_generate_private_key_is_ca(hx509_context context,struct hx509_generate_private_context * ctx)1876c19800e8SDoug Rabson _hx509_generate_private_key_is_ca(hx509_context context,
1877c19800e8SDoug Rabson 				  struct hx509_generate_private_context *ctx)
1878c19800e8SDoug Rabson {
1879c19800e8SDoug Rabson     ctx->isCA = 1;
1880c19800e8SDoug Rabson     return 0;
1881c19800e8SDoug Rabson }
1882c19800e8SDoug Rabson 
1883c19800e8SDoug Rabson int
_hx509_generate_private_key_bits(hx509_context context,struct hx509_generate_private_context * ctx,unsigned long bits)1884c19800e8SDoug Rabson _hx509_generate_private_key_bits(hx509_context context,
1885c19800e8SDoug Rabson 				 struct hx509_generate_private_context *ctx,
1886c19800e8SDoug Rabson 				 unsigned long bits)
1887c19800e8SDoug Rabson {
1888c19800e8SDoug Rabson     ctx->num_bits = bits;
1889c19800e8SDoug Rabson     return 0;
1890c19800e8SDoug Rabson }
1891c19800e8SDoug Rabson 
1892c19800e8SDoug Rabson 
1893c19800e8SDoug Rabson void
_hx509_generate_private_key_free(struct hx509_generate_private_context ** ctx)1894c19800e8SDoug Rabson _hx509_generate_private_key_free(struct hx509_generate_private_context **ctx)
1895c19800e8SDoug Rabson {
1896c19800e8SDoug Rabson     free(*ctx);
1897c19800e8SDoug Rabson     *ctx = NULL;
1898c19800e8SDoug Rabson }
1899c19800e8SDoug Rabson 
1900c19800e8SDoug Rabson int
_hx509_generate_private_key(hx509_context context,struct hx509_generate_private_context * ctx,hx509_private_key * private_key)1901c19800e8SDoug Rabson _hx509_generate_private_key(hx509_context context,
1902c19800e8SDoug Rabson 			    struct hx509_generate_private_context *ctx,
1903c19800e8SDoug Rabson 			    hx509_private_key *private_key)
1904c19800e8SDoug Rabson {
1905c19800e8SDoug Rabson     struct hx509_private_key_ops *ops;
1906c19800e8SDoug Rabson     int ret;
1907c19800e8SDoug Rabson 
1908c19800e8SDoug Rabson     *private_key = NULL;
1909c19800e8SDoug Rabson 
1910ae771770SStanislav Sedov     ops = hx509_find_private_alg(ctx->key_oid);
1911c19800e8SDoug Rabson     if (ops == NULL) {
1912c19800e8SDoug Rabson 	hx509_clear_error_string(context);
1913c19800e8SDoug Rabson 	return HX509_SIG_ALG_NO_SUPPORTED;
1914c19800e8SDoug Rabson     }
1915c19800e8SDoug Rabson 
1916ae771770SStanislav Sedov     ret = hx509_private_key_init(private_key, ops, NULL);
1917c19800e8SDoug Rabson     if (ret) {
1918c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "out of memory");
1919c19800e8SDoug Rabson 	return ret;
1920c19800e8SDoug Rabson     }
1921c19800e8SDoug Rabson 
1922c19800e8SDoug Rabson     ret = (*ops->generate_private_key)(context, ctx, *private_key);
1923c19800e8SDoug Rabson     if (ret)
1924ae771770SStanislav Sedov 	hx509_private_key_free(private_key);
1925c19800e8SDoug Rabson 
1926c19800e8SDoug Rabson     return ret;
1927c19800e8SDoug Rabson }
1928c19800e8SDoug Rabson 
1929c19800e8SDoug Rabson /*
1930c19800e8SDoug Rabson  *
1931c19800e8SDoug Rabson  */
1932c19800e8SDoug Rabson 
1933c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_sha512(void)1934c19800e8SDoug Rabson hx509_signature_sha512(void)
1935c19800e8SDoug Rabson { return &_hx509_signature_sha512_data; }
1936c19800e8SDoug Rabson 
1937c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_sha384(void)1938c19800e8SDoug Rabson hx509_signature_sha384(void)
1939c19800e8SDoug Rabson { return &_hx509_signature_sha384_data; }
1940c19800e8SDoug Rabson 
1941c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_sha256(void)1942c19800e8SDoug Rabson hx509_signature_sha256(void)
1943c19800e8SDoug Rabson { return &_hx509_signature_sha256_data; }
1944c19800e8SDoug Rabson 
1945c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_sha1(void)1946c19800e8SDoug Rabson hx509_signature_sha1(void)
1947c19800e8SDoug Rabson { return &_hx509_signature_sha1_data; }
1948c19800e8SDoug Rabson 
1949c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_md5(void)1950c19800e8SDoug Rabson hx509_signature_md5(void)
1951c19800e8SDoug Rabson { return &_hx509_signature_md5_data; }
1952c19800e8SDoug Rabson 
1953c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_ecPublicKey(void)1954ae771770SStanislav Sedov hx509_signature_ecPublicKey(void)
1955ae771770SStanislav Sedov { return &_hx509_signature_ecPublicKey; }
1956ae771770SStanislav Sedov 
1957ae771770SStanislav Sedov const AlgorithmIdentifier *
hx509_signature_ecdsa_with_sha256(void)1958ae771770SStanislav Sedov hx509_signature_ecdsa_with_sha256(void)
1959ae771770SStanislav Sedov { return &_hx509_signature_ecdsa_with_sha256_data; }
1960ae771770SStanislav Sedov 
1961ae771770SStanislav Sedov const AlgorithmIdentifier *
hx509_signature_ecdsa_with_sha1(void)1962ae771770SStanislav Sedov hx509_signature_ecdsa_with_sha1(void)
1963ae771770SStanislav Sedov { return &_hx509_signature_ecdsa_with_sha1_data; }
1964c19800e8SDoug Rabson 
1965c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_with_sha512(void)1966c19800e8SDoug Rabson hx509_signature_rsa_with_sha512(void)
1967c19800e8SDoug Rabson { return &_hx509_signature_rsa_with_sha512_data; }
1968c19800e8SDoug Rabson 
1969c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_with_sha384(void)1970c19800e8SDoug Rabson hx509_signature_rsa_with_sha384(void)
1971c19800e8SDoug Rabson { return &_hx509_signature_rsa_with_sha384_data; }
1972c19800e8SDoug Rabson 
1973c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_with_sha256(void)1974c19800e8SDoug Rabson hx509_signature_rsa_with_sha256(void)
1975c19800e8SDoug Rabson { return &_hx509_signature_rsa_with_sha256_data; }
1976c19800e8SDoug Rabson 
1977c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_with_sha1(void)1978c19800e8SDoug Rabson hx509_signature_rsa_with_sha1(void)
1979c19800e8SDoug Rabson { return &_hx509_signature_rsa_with_sha1_data; }
1980c19800e8SDoug Rabson 
1981c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_with_md5(void)1982c19800e8SDoug Rabson hx509_signature_rsa_with_md5(void)
1983c19800e8SDoug Rabson { return &_hx509_signature_rsa_with_md5_data; }
1984c19800e8SDoug Rabson 
1985c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa(void)1986c19800e8SDoug Rabson hx509_signature_rsa(void)
1987c19800e8SDoug Rabson { return &_hx509_signature_rsa_data; }
1988c19800e8SDoug Rabson 
1989c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_signature_rsa_pkcs1_x509(void)1990c19800e8SDoug Rabson hx509_signature_rsa_pkcs1_x509(void)
1991c19800e8SDoug Rabson { return &_hx509_signature_rsa_pkcs1_x509_data; }
1992c19800e8SDoug Rabson 
1993c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_crypto_des_rsdi_ede3_cbc(void)1994c19800e8SDoug Rabson hx509_crypto_des_rsdi_ede3_cbc(void)
1995c19800e8SDoug Rabson { return &_hx509_des_rsdi_ede3_cbc_oid; }
1996c19800e8SDoug Rabson 
1997c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_crypto_aes128_cbc(void)1998c19800e8SDoug Rabson hx509_crypto_aes128_cbc(void)
1999c19800e8SDoug Rabson { return &_hx509_crypto_aes128_cbc_data; }
2000c19800e8SDoug Rabson 
2001c19800e8SDoug Rabson const AlgorithmIdentifier *
hx509_crypto_aes256_cbc(void)2002c19800e8SDoug Rabson hx509_crypto_aes256_cbc(void)
2003c19800e8SDoug Rabson { return &_hx509_crypto_aes256_cbc_data; }
2004c19800e8SDoug Rabson 
2005c19800e8SDoug Rabson /*
2006c19800e8SDoug Rabson  *
2007c19800e8SDoug Rabson  */
2008c19800e8SDoug Rabson 
2009c19800e8SDoug Rabson const AlgorithmIdentifier * _hx509_crypto_default_sig_alg =
2010ae771770SStanislav Sedov     &_hx509_signature_rsa_with_sha256_data;
2011c19800e8SDoug Rabson const AlgorithmIdentifier * _hx509_crypto_default_digest_alg =
2012ae771770SStanislav Sedov     &_hx509_signature_sha256_data;
2013c19800e8SDoug Rabson const AlgorithmIdentifier * _hx509_crypto_default_secret_alg =
2014c19800e8SDoug Rabson     &_hx509_crypto_aes128_cbc_data;
2015c19800e8SDoug Rabson 
2016c19800e8SDoug Rabson /*
2017c19800e8SDoug Rabson  *
2018c19800e8SDoug Rabson  */
2019c19800e8SDoug Rabson 
2020c19800e8SDoug Rabson int
hx509_private_key_init(hx509_private_key * key,hx509_private_key_ops * ops,void * keydata)2021ae771770SStanislav Sedov hx509_private_key_init(hx509_private_key *key,
2022c19800e8SDoug Rabson 			hx509_private_key_ops *ops,
2023c19800e8SDoug Rabson 			void *keydata)
2024c19800e8SDoug Rabson {
2025c19800e8SDoug Rabson     *key = calloc(1, sizeof(**key));
2026c19800e8SDoug Rabson     if (*key == NULL)
2027c19800e8SDoug Rabson 	return ENOMEM;
2028c19800e8SDoug Rabson     (*key)->ref = 1;
2029c19800e8SDoug Rabson     (*key)->ops = ops;
2030c19800e8SDoug Rabson     (*key)->private_key.keydata = keydata;
2031c19800e8SDoug Rabson     return 0;
2032c19800e8SDoug Rabson }
2033c19800e8SDoug Rabson 
2034c19800e8SDoug Rabson hx509_private_key
_hx509_private_key_ref(hx509_private_key key)2035c19800e8SDoug Rabson _hx509_private_key_ref(hx509_private_key key)
2036c19800e8SDoug Rabson {
2037c19800e8SDoug Rabson     if (key->ref == 0)
2038ae771770SStanislav Sedov 	_hx509_abort("key refcount <= 0 on ref");
2039ae771770SStanislav Sedov     key->ref++;
2040ae771770SStanislav Sedov     if (key->ref == UINT_MAX)
2041ae771770SStanislav Sedov 	_hx509_abort("key refcount == UINT_MAX on ref");
2042c19800e8SDoug Rabson     return key;
2043c19800e8SDoug Rabson }
2044c19800e8SDoug Rabson 
2045c19800e8SDoug Rabson const char *
_hx509_private_pem_name(hx509_private_key key)2046c19800e8SDoug Rabson _hx509_private_pem_name(hx509_private_key key)
2047c19800e8SDoug Rabson {
2048c19800e8SDoug Rabson     return key->ops->pemtype;
2049c19800e8SDoug Rabson }
2050c19800e8SDoug Rabson 
2051c19800e8SDoug Rabson int
hx509_private_key_free(hx509_private_key * key)2052ae771770SStanislav Sedov hx509_private_key_free(hx509_private_key *key)
2053c19800e8SDoug Rabson {
2054c19800e8SDoug Rabson     if (key == NULL || *key == NULL)
2055c19800e8SDoug Rabson 	return 0;
2056c19800e8SDoug Rabson 
2057ae771770SStanislav Sedov     if ((*key)->ref == 0)
2058ae771770SStanislav Sedov 	_hx509_abort("key refcount == 0 on free");
2059c19800e8SDoug Rabson     if (--(*key)->ref > 0)
2060c19800e8SDoug Rabson 	return 0;
2061c19800e8SDoug Rabson 
2062ae771770SStanislav Sedov     if ((*key)->ops && der_heim_oid_cmp((*key)->ops->key_oid, ASN1_OID_ID_PKCS1_RSAENCRYPTION) == 0) {
2063c19800e8SDoug Rabson 	if ((*key)->private_key.rsa)
2064c19800e8SDoug Rabson 	    RSA_free((*key)->private_key.rsa);
2065ae771770SStanislav Sedov #ifdef HAVE_OPENSSL
2066ae771770SStanislav Sedov     } else if ((*key)->ops && der_heim_oid_cmp((*key)->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) == 0) {
2067ae771770SStanislav Sedov 	if ((*key)->private_key.ecdsa)
2068ae771770SStanislav Sedov 	    EC_KEY_free((*key)->private_key.ecdsa);
2069ae771770SStanislav Sedov #endif
2070ae771770SStanislav Sedov     }
2071c19800e8SDoug Rabson     (*key)->private_key.rsa = NULL;
2072c19800e8SDoug Rabson     free(*key);
2073c19800e8SDoug Rabson     *key = NULL;
2074c19800e8SDoug Rabson     return 0;
2075c19800e8SDoug Rabson }
2076c19800e8SDoug Rabson 
2077c19800e8SDoug Rabson void
hx509_private_key_assign_rsa(hx509_private_key key,void * ptr)2078ae771770SStanislav Sedov hx509_private_key_assign_rsa(hx509_private_key key, void *ptr)
2079c19800e8SDoug Rabson {
2080c19800e8SDoug Rabson     if (key->private_key.rsa)
2081c19800e8SDoug Rabson 	RSA_free(key->private_key.rsa);
2082c19800e8SDoug Rabson     key->private_key.rsa = ptr;
2083ae771770SStanislav Sedov     key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION;
2084c19800e8SDoug Rabson     key->md = &pkcs1_rsa_sha1_alg;
2085c19800e8SDoug Rabson }
2086c19800e8SDoug Rabson 
2087c19800e8SDoug Rabson int
_hx509_private_key_oid(hx509_context context,const hx509_private_key key,heim_oid * data)2088c19800e8SDoug Rabson _hx509_private_key_oid(hx509_context context,
2089c19800e8SDoug Rabson 		       const hx509_private_key key,
2090c19800e8SDoug Rabson 		       heim_oid *data)
2091c19800e8SDoug Rabson {
2092c19800e8SDoug Rabson     int ret;
2093ae771770SStanislav Sedov     ret = der_copy_oid(key->ops->key_oid, data);
2094c19800e8SDoug Rabson     if (ret)
2095c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, ret, "malloc out of memory");
2096c19800e8SDoug Rabson     return ret;
2097c19800e8SDoug Rabson }
2098c19800e8SDoug Rabson 
2099c19800e8SDoug Rabson int
_hx509_private_key_exportable(hx509_private_key key)2100c19800e8SDoug Rabson _hx509_private_key_exportable(hx509_private_key key)
2101c19800e8SDoug Rabson {
2102c19800e8SDoug Rabson     if (key->ops->export == NULL)
2103c19800e8SDoug Rabson 	return 0;
2104c19800e8SDoug Rabson     return 1;
2105c19800e8SDoug Rabson }
2106c19800e8SDoug Rabson 
2107c19800e8SDoug Rabson BIGNUM *
_hx509_private_key_get_internal(hx509_context context,hx509_private_key key,const char * type)2108c19800e8SDoug Rabson _hx509_private_key_get_internal(hx509_context context,
2109c19800e8SDoug Rabson 				hx509_private_key key,
2110c19800e8SDoug Rabson 				const char *type)
2111c19800e8SDoug Rabson {
2112c19800e8SDoug Rabson     if (key->ops->get_internal == NULL)
2113c19800e8SDoug Rabson 	return NULL;
2114c19800e8SDoug Rabson     return (*key->ops->get_internal)(context, key, type);
2115c19800e8SDoug Rabson }
2116c19800e8SDoug Rabson 
2117c19800e8SDoug Rabson int
_hx509_private_key_export(hx509_context context,const hx509_private_key key,hx509_key_format_t format,heim_octet_string * data)2118c19800e8SDoug Rabson _hx509_private_key_export(hx509_context context,
2119c19800e8SDoug Rabson 			  const hx509_private_key key,
2120ae771770SStanislav Sedov 			  hx509_key_format_t format,
2121c19800e8SDoug Rabson 			  heim_octet_string *data)
2122c19800e8SDoug Rabson {
2123c19800e8SDoug Rabson     if (key->ops->export == NULL) {
2124c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2125c19800e8SDoug Rabson 	return HX509_UNIMPLEMENTED_OPERATION;
2126c19800e8SDoug Rabson     }
2127ae771770SStanislav Sedov     return (*key->ops->export)(context, key, format, data);
2128c19800e8SDoug Rabson }
2129c19800e8SDoug Rabson 
2130c19800e8SDoug Rabson /*
2131c19800e8SDoug Rabson  *
2132c19800e8SDoug Rabson  */
2133c19800e8SDoug Rabson 
2134c19800e8SDoug Rabson struct hx509cipher {
2135c19800e8SDoug Rabson     const char *name;
2136ae771770SStanislav Sedov     int flags;
2137ae771770SStanislav Sedov #define CIPHER_WEAK 1
2138ae771770SStanislav Sedov     const heim_oid *oid;
2139c19800e8SDoug Rabson     const AlgorithmIdentifier *(*ai_func)(void);
2140c19800e8SDoug Rabson     const EVP_CIPHER *(*evp_func)(void);
2141c19800e8SDoug Rabson     int (*get_params)(hx509_context, const hx509_crypto,
2142c19800e8SDoug Rabson 		      const heim_octet_string *, heim_octet_string *);
2143c19800e8SDoug Rabson     int (*set_params)(hx509_context, const heim_octet_string *,
2144c19800e8SDoug Rabson 		      hx509_crypto, heim_octet_string *);
2145c19800e8SDoug Rabson };
2146c19800e8SDoug Rabson 
2147c19800e8SDoug Rabson struct hx509_crypto_data {
2148c19800e8SDoug Rabson     char *name;
2149ae771770SStanislav Sedov     int flags;
2150ae771770SStanislav Sedov #define ALLOW_WEAK 	1
2151ae771770SStanislav Sedov 
2152ae771770SStanislav Sedov #define PADDING_NONE	2
2153ae771770SStanislav Sedov #define PADDING_PKCS7	4
2154ae771770SStanislav Sedov #define PADDING_FLAGS	(2|4)
2155c19800e8SDoug Rabson     const struct hx509cipher *cipher;
2156c19800e8SDoug Rabson     const EVP_CIPHER *c;
2157c19800e8SDoug Rabson     heim_octet_string key;
2158c19800e8SDoug Rabson     heim_oid oid;
2159c19800e8SDoug Rabson     void *param;
2160c19800e8SDoug Rabson };
2161c19800e8SDoug Rabson 
2162c19800e8SDoug Rabson /*
2163c19800e8SDoug Rabson  *
2164c19800e8SDoug Rabson  */
2165c19800e8SDoug Rabson 
2166ae771770SStanislav Sedov static unsigned private_rc2_40_oid_data[] = { 127, 1 };
2167c19800e8SDoug Rabson 
2168ae771770SStanislav Sedov static heim_oid asn1_oid_private_rc2_40 =
2169ae771770SStanislav Sedov     { 2, private_rc2_40_oid_data };
2170c19800e8SDoug Rabson 
2171c19800e8SDoug Rabson /*
2172c19800e8SDoug Rabson  *
2173c19800e8SDoug Rabson  */
2174c19800e8SDoug Rabson 
2175c19800e8SDoug Rabson static int
CMSCBCParam_get(hx509_context context,const hx509_crypto crypto,const heim_octet_string * ivec,heim_octet_string * param)2176c19800e8SDoug Rabson CMSCBCParam_get(hx509_context context, const hx509_crypto crypto,
2177c19800e8SDoug Rabson 		 const heim_octet_string *ivec, heim_octet_string *param)
2178c19800e8SDoug Rabson {
2179c19800e8SDoug Rabson     size_t size;
2180c19800e8SDoug Rabson     int ret;
2181c19800e8SDoug Rabson 
2182c19800e8SDoug Rabson     assert(crypto->param == NULL);
2183c19800e8SDoug Rabson     if (ivec == NULL)
2184c19800e8SDoug Rabson 	return 0;
2185c19800e8SDoug Rabson 
2186c19800e8SDoug Rabson     ASN1_MALLOC_ENCODE(CMSCBCParameter, param->data, param->length,
2187c19800e8SDoug Rabson 		       ivec, &size, ret);
2188c19800e8SDoug Rabson     if (ret == 0 && size != param->length)
2189c19800e8SDoug Rabson 	_hx509_abort("Internal asn1 encoder failure");
2190c19800e8SDoug Rabson     if (ret)
2191c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2192c19800e8SDoug Rabson     return ret;
2193c19800e8SDoug Rabson }
2194c19800e8SDoug Rabson 
2195c19800e8SDoug Rabson static int
CMSCBCParam_set(hx509_context context,const heim_octet_string * param,hx509_crypto crypto,heim_octet_string * ivec)2196c19800e8SDoug Rabson CMSCBCParam_set(hx509_context context, const heim_octet_string *param,
2197c19800e8SDoug Rabson 		hx509_crypto crypto, heim_octet_string *ivec)
2198c19800e8SDoug Rabson {
2199c19800e8SDoug Rabson     int ret;
2200c19800e8SDoug Rabson     if (ivec == NULL)
2201c19800e8SDoug Rabson 	return 0;
2202c19800e8SDoug Rabson 
2203c19800e8SDoug Rabson     ret = decode_CMSCBCParameter(param->data, param->length, ivec, NULL);
2204c19800e8SDoug Rabson     if (ret)
2205c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2206c19800e8SDoug Rabson 
2207c19800e8SDoug Rabson     return ret;
2208c19800e8SDoug Rabson }
2209c19800e8SDoug Rabson 
2210c19800e8SDoug Rabson struct _RC2_params {
2211c19800e8SDoug Rabson     int maximum_effective_key;
2212c19800e8SDoug Rabson };
2213c19800e8SDoug Rabson 
2214c19800e8SDoug Rabson static int
CMSRC2CBCParam_get(hx509_context context,const hx509_crypto crypto,const heim_octet_string * ivec,heim_octet_string * param)2215c19800e8SDoug Rabson CMSRC2CBCParam_get(hx509_context context, const hx509_crypto crypto,
2216c19800e8SDoug Rabson 		   const heim_octet_string *ivec, heim_octet_string *param)
2217c19800e8SDoug Rabson {
2218c19800e8SDoug Rabson     CMSRC2CBCParameter rc2params;
2219c19800e8SDoug Rabson     const struct _RC2_params *p = crypto->param;
2220c19800e8SDoug Rabson     int maximum_effective_key = 128;
2221c19800e8SDoug Rabson     size_t size;
2222c19800e8SDoug Rabson     int ret;
2223c19800e8SDoug Rabson 
2224c19800e8SDoug Rabson     memset(&rc2params, 0, sizeof(rc2params));
2225c19800e8SDoug Rabson 
2226c19800e8SDoug Rabson     if (p)
2227c19800e8SDoug Rabson 	maximum_effective_key = p->maximum_effective_key;
2228c19800e8SDoug Rabson 
2229c19800e8SDoug Rabson     switch(maximum_effective_key) {
2230c19800e8SDoug Rabson     case 40:
2231c19800e8SDoug Rabson 	rc2params.rc2ParameterVersion = 160;
2232c19800e8SDoug Rabson 	break;
2233c19800e8SDoug Rabson     case 64:
2234c19800e8SDoug Rabson 	rc2params.rc2ParameterVersion = 120;
2235c19800e8SDoug Rabson 	break;
2236c19800e8SDoug Rabson     case 128:
2237c19800e8SDoug Rabson 	rc2params.rc2ParameterVersion = 58;
2238c19800e8SDoug Rabson 	break;
2239c19800e8SDoug Rabson     }
2240c19800e8SDoug Rabson     rc2params.iv = *ivec;
2241c19800e8SDoug Rabson 
2242c19800e8SDoug Rabson     ASN1_MALLOC_ENCODE(CMSRC2CBCParameter, param->data, param->length,
2243c19800e8SDoug Rabson 		       &rc2params, &size, ret);
2244c19800e8SDoug Rabson     if (ret == 0 && size != param->length)
2245c19800e8SDoug Rabson 	_hx509_abort("Internal asn1 encoder failure");
2246c19800e8SDoug Rabson 
2247c19800e8SDoug Rabson     return ret;
2248c19800e8SDoug Rabson }
2249c19800e8SDoug Rabson 
2250c19800e8SDoug Rabson static int
CMSRC2CBCParam_set(hx509_context context,const heim_octet_string * param,hx509_crypto crypto,heim_octet_string * ivec)2251c19800e8SDoug Rabson CMSRC2CBCParam_set(hx509_context context, const heim_octet_string *param,
2252c19800e8SDoug Rabson 		   hx509_crypto crypto, heim_octet_string *ivec)
2253c19800e8SDoug Rabson {
2254c19800e8SDoug Rabson     CMSRC2CBCParameter rc2param;
2255c19800e8SDoug Rabson     struct _RC2_params *p;
2256c19800e8SDoug Rabson     size_t size;
2257c19800e8SDoug Rabson     int ret;
2258c19800e8SDoug Rabson 
2259c19800e8SDoug Rabson     ret = decode_CMSRC2CBCParameter(param->data, param->length,
2260c19800e8SDoug Rabson 				    &rc2param, &size);
2261c19800e8SDoug Rabson     if (ret) {
2262c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2263c19800e8SDoug Rabson 	return ret;
2264c19800e8SDoug Rabson     }
2265c19800e8SDoug Rabson 
2266c19800e8SDoug Rabson     p = calloc(1, sizeof(*p));
2267c19800e8SDoug Rabson     if (p == NULL) {
2268c19800e8SDoug Rabson 	free_CMSRC2CBCParameter(&rc2param);
2269c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2270c19800e8SDoug Rabson 	return ENOMEM;
2271c19800e8SDoug Rabson     }
2272c19800e8SDoug Rabson     switch(rc2param.rc2ParameterVersion) {
2273c19800e8SDoug Rabson     case 160:
2274c19800e8SDoug Rabson 	crypto->c = EVP_rc2_40_cbc();
2275c19800e8SDoug Rabson 	p->maximum_effective_key = 40;
2276c19800e8SDoug Rabson 	break;
2277c19800e8SDoug Rabson     case 120:
2278c19800e8SDoug Rabson 	crypto->c = EVP_rc2_64_cbc();
2279c19800e8SDoug Rabson 	p->maximum_effective_key = 64;
2280c19800e8SDoug Rabson 	break;
2281c19800e8SDoug Rabson     case 58:
2282c19800e8SDoug Rabson 	crypto->c = EVP_rc2_cbc();
2283c19800e8SDoug Rabson 	p->maximum_effective_key = 128;
2284c19800e8SDoug Rabson 	break;
2285c19800e8SDoug Rabson     default:
2286c19800e8SDoug Rabson 	free(p);
2287c19800e8SDoug Rabson 	free_CMSRC2CBCParameter(&rc2param);
2288c19800e8SDoug Rabson 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
2289c19800e8SDoug Rabson     }
2290c19800e8SDoug Rabson     if (ivec)
2291c19800e8SDoug Rabson 	ret = der_copy_octet_string(&rc2param.iv, ivec);
2292c19800e8SDoug Rabson     free_CMSRC2CBCParameter(&rc2param);
2293c19800e8SDoug Rabson     if (ret) {
2294c19800e8SDoug Rabson 	free(p);
2295c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2296c19800e8SDoug Rabson     } else
2297c19800e8SDoug Rabson 	crypto->param = p;
2298c19800e8SDoug Rabson 
2299c19800e8SDoug Rabson     return ret;
2300c19800e8SDoug Rabson }
2301c19800e8SDoug Rabson 
2302c19800e8SDoug Rabson /*
2303c19800e8SDoug Rabson  *
2304c19800e8SDoug Rabson  */
2305c19800e8SDoug Rabson 
2306c19800e8SDoug Rabson static const struct hx509cipher ciphers[] = {
2307c19800e8SDoug Rabson     {
2308c19800e8SDoug Rabson 	"rc2-cbc",
2309ae771770SStanislav Sedov 	CIPHER_WEAK,
2310ae771770SStanislav Sedov 	ASN1_OID_ID_PKCS3_RC2_CBC,
2311c19800e8SDoug Rabson 	NULL,
2312c19800e8SDoug Rabson 	EVP_rc2_cbc,
2313c19800e8SDoug Rabson 	CMSRC2CBCParam_get,
2314c19800e8SDoug Rabson 	CMSRC2CBCParam_set
2315c19800e8SDoug Rabson     },
2316c19800e8SDoug Rabson     {
2317c19800e8SDoug Rabson 	"rc2-cbc",
2318ae771770SStanislav Sedov 	CIPHER_WEAK,
2319ae771770SStanislav Sedov 	ASN1_OID_ID_RSADSI_RC2_CBC,
2320c19800e8SDoug Rabson 	NULL,
2321c19800e8SDoug Rabson 	EVP_rc2_cbc,
2322c19800e8SDoug Rabson 	CMSRC2CBCParam_get,
2323c19800e8SDoug Rabson 	CMSRC2CBCParam_set
2324c19800e8SDoug Rabson     },
2325c19800e8SDoug Rabson     {
2326c19800e8SDoug Rabson 	"rc2-40-cbc",
2327ae771770SStanislav Sedov 	CIPHER_WEAK,
2328ae771770SStanislav Sedov 	&asn1_oid_private_rc2_40,
2329c19800e8SDoug Rabson 	NULL,
2330c19800e8SDoug Rabson 	EVP_rc2_40_cbc,
2331c19800e8SDoug Rabson 	CMSRC2CBCParam_get,
2332c19800e8SDoug Rabson 	CMSRC2CBCParam_set
2333c19800e8SDoug Rabson     },
2334c19800e8SDoug Rabson     {
2335c19800e8SDoug Rabson 	"des-ede3-cbc",
2336ae771770SStanislav Sedov 	0,
2337ae771770SStanislav Sedov 	ASN1_OID_ID_PKCS3_DES_EDE3_CBC,
2338c19800e8SDoug Rabson 	NULL,
2339c19800e8SDoug Rabson 	EVP_des_ede3_cbc,
2340c19800e8SDoug Rabson 	CMSCBCParam_get,
2341c19800e8SDoug Rabson 	CMSCBCParam_set
2342c19800e8SDoug Rabson     },
2343c19800e8SDoug Rabson     {
2344c19800e8SDoug Rabson 	"des-ede3-cbc",
2345ae771770SStanislav Sedov 	0,
2346ae771770SStanislav Sedov 	ASN1_OID_ID_RSADSI_DES_EDE3_CBC,
2347c19800e8SDoug Rabson 	hx509_crypto_des_rsdi_ede3_cbc,
2348c19800e8SDoug Rabson 	EVP_des_ede3_cbc,
2349c19800e8SDoug Rabson 	CMSCBCParam_get,
2350c19800e8SDoug Rabson 	CMSCBCParam_set
2351c19800e8SDoug Rabson     },
2352c19800e8SDoug Rabson     {
2353c19800e8SDoug Rabson 	"aes-128-cbc",
2354ae771770SStanislav Sedov 	0,
2355ae771770SStanislav Sedov 	ASN1_OID_ID_AES_128_CBC,
2356c19800e8SDoug Rabson 	hx509_crypto_aes128_cbc,
2357c19800e8SDoug Rabson 	EVP_aes_128_cbc,
2358c19800e8SDoug Rabson 	CMSCBCParam_get,
2359c19800e8SDoug Rabson 	CMSCBCParam_set
2360c19800e8SDoug Rabson     },
2361c19800e8SDoug Rabson     {
2362c19800e8SDoug Rabson 	"aes-192-cbc",
2363ae771770SStanislav Sedov 	0,
2364ae771770SStanislav Sedov 	ASN1_OID_ID_AES_192_CBC,
2365c19800e8SDoug Rabson 	NULL,
2366c19800e8SDoug Rabson 	EVP_aes_192_cbc,
2367c19800e8SDoug Rabson 	CMSCBCParam_get,
2368c19800e8SDoug Rabson 	CMSCBCParam_set
2369c19800e8SDoug Rabson     },
2370c19800e8SDoug Rabson     {
2371c19800e8SDoug Rabson 	"aes-256-cbc",
2372ae771770SStanislav Sedov 	0,
2373ae771770SStanislav Sedov 	ASN1_OID_ID_AES_256_CBC,
2374c19800e8SDoug Rabson 	hx509_crypto_aes256_cbc,
2375c19800e8SDoug Rabson 	EVP_aes_256_cbc,
2376c19800e8SDoug Rabson 	CMSCBCParam_get,
2377c19800e8SDoug Rabson 	CMSCBCParam_set
2378c19800e8SDoug Rabson     }
2379c19800e8SDoug Rabson };
2380c19800e8SDoug Rabson 
2381c19800e8SDoug Rabson static const struct hx509cipher *
find_cipher_by_oid(const heim_oid * oid)2382c19800e8SDoug Rabson find_cipher_by_oid(const heim_oid *oid)
2383c19800e8SDoug Rabson {
2384ae771770SStanislav Sedov     size_t i;
2385c19800e8SDoug Rabson 
2386c19800e8SDoug Rabson     for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2387ae771770SStanislav Sedov 	if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0)
2388c19800e8SDoug Rabson 	    return &ciphers[i];
2389c19800e8SDoug Rabson 
2390c19800e8SDoug Rabson     return NULL;
2391c19800e8SDoug Rabson }
2392c19800e8SDoug Rabson 
2393c19800e8SDoug Rabson static const struct hx509cipher *
find_cipher_by_name(const char * name)2394c19800e8SDoug Rabson find_cipher_by_name(const char *name)
2395c19800e8SDoug Rabson {
2396ae771770SStanislav Sedov     size_t i;
2397c19800e8SDoug Rabson 
2398c19800e8SDoug Rabson     for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2399c19800e8SDoug Rabson 	if (strcasecmp(name, ciphers[i].name) == 0)
2400c19800e8SDoug Rabson 	    return &ciphers[i];
2401c19800e8SDoug Rabson 
2402c19800e8SDoug Rabson     return NULL;
2403c19800e8SDoug Rabson }
2404c19800e8SDoug Rabson 
2405c19800e8SDoug Rabson 
2406c19800e8SDoug Rabson const heim_oid *
hx509_crypto_enctype_by_name(const char * name)2407c19800e8SDoug Rabson hx509_crypto_enctype_by_name(const char *name)
2408c19800e8SDoug Rabson {
2409c19800e8SDoug Rabson     const struct hx509cipher *cipher;
2410c19800e8SDoug Rabson 
2411c19800e8SDoug Rabson     cipher = find_cipher_by_name(name);
2412c19800e8SDoug Rabson     if (cipher == NULL)
2413c19800e8SDoug Rabson 	return NULL;
2414ae771770SStanislav Sedov     return cipher->oid;
2415c19800e8SDoug Rabson }
2416c19800e8SDoug Rabson 
2417c19800e8SDoug Rabson int
hx509_crypto_init(hx509_context context,const char * provider,const heim_oid * enctype,hx509_crypto * crypto)2418c19800e8SDoug Rabson hx509_crypto_init(hx509_context context,
2419c19800e8SDoug Rabson 		  const char *provider,
2420c19800e8SDoug Rabson 		  const heim_oid *enctype,
2421c19800e8SDoug Rabson 		  hx509_crypto *crypto)
2422c19800e8SDoug Rabson {
2423c19800e8SDoug Rabson     const struct hx509cipher *cipher;
2424c19800e8SDoug Rabson 
2425c19800e8SDoug Rabson     *crypto = NULL;
2426c19800e8SDoug Rabson 
2427c19800e8SDoug Rabson     cipher = find_cipher_by_oid(enctype);
2428c19800e8SDoug Rabson     if (cipher == NULL) {
2429c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_ALG_NOT_SUPP,
2430c19800e8SDoug Rabson 			       "Algorithm not supported");
2431c19800e8SDoug Rabson 	return HX509_ALG_NOT_SUPP;
2432c19800e8SDoug Rabson     }
2433c19800e8SDoug Rabson 
2434c19800e8SDoug Rabson     *crypto = calloc(1, sizeof(**crypto));
2435c19800e8SDoug Rabson     if (*crypto == NULL) {
2436c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2437c19800e8SDoug Rabson 	return ENOMEM;
2438c19800e8SDoug Rabson     }
2439c19800e8SDoug Rabson 
2440ae771770SStanislav Sedov     (*crypto)->flags = PADDING_PKCS7;
2441c19800e8SDoug Rabson     (*crypto)->cipher = cipher;
2442c19800e8SDoug Rabson     (*crypto)->c = (*cipher->evp_func)();
2443c19800e8SDoug Rabson 
2444c19800e8SDoug Rabson     if (der_copy_oid(enctype, &(*crypto)->oid)) {
2445c19800e8SDoug Rabson 	hx509_crypto_destroy(*crypto);
2446c19800e8SDoug Rabson 	*crypto = NULL;
2447c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2448c19800e8SDoug Rabson 	return ENOMEM;
2449c19800e8SDoug Rabson     }
2450c19800e8SDoug Rabson 
2451c19800e8SDoug Rabson     return 0;
2452c19800e8SDoug Rabson }
2453c19800e8SDoug Rabson 
2454c19800e8SDoug Rabson const char *
hx509_crypto_provider(hx509_crypto crypto)2455c19800e8SDoug Rabson hx509_crypto_provider(hx509_crypto crypto)
2456c19800e8SDoug Rabson {
2457c19800e8SDoug Rabson     return "unknown";
2458c19800e8SDoug Rabson }
2459c19800e8SDoug Rabson 
2460c19800e8SDoug Rabson void
hx509_crypto_destroy(hx509_crypto crypto)2461c19800e8SDoug Rabson hx509_crypto_destroy(hx509_crypto crypto)
2462c19800e8SDoug Rabson {
2463c19800e8SDoug Rabson     if (crypto->name)
2464c19800e8SDoug Rabson 	free(crypto->name);
2465c19800e8SDoug Rabson     if (crypto->key.data)
2466c19800e8SDoug Rabson 	free(crypto->key.data);
2467c19800e8SDoug Rabson     if (crypto->param)
2468c19800e8SDoug Rabson 	free(crypto->param);
2469c19800e8SDoug Rabson     der_free_oid(&crypto->oid);
2470c19800e8SDoug Rabson     memset(crypto, 0, sizeof(*crypto));
2471c19800e8SDoug Rabson     free(crypto);
2472c19800e8SDoug Rabson }
2473c19800e8SDoug Rabson 
2474c19800e8SDoug Rabson int
hx509_crypto_set_key_name(hx509_crypto crypto,const char * name)2475c19800e8SDoug Rabson hx509_crypto_set_key_name(hx509_crypto crypto, const char *name)
2476c19800e8SDoug Rabson {
2477c19800e8SDoug Rabson     return 0;
2478c19800e8SDoug Rabson }
2479c19800e8SDoug Rabson 
2480ae771770SStanislav Sedov void
hx509_crypto_allow_weak(hx509_crypto crypto)2481ae771770SStanislav Sedov hx509_crypto_allow_weak(hx509_crypto crypto)
2482ae771770SStanislav Sedov {
2483ae771770SStanislav Sedov     crypto->flags |= ALLOW_WEAK;
2484ae771770SStanislav Sedov }
2485ae771770SStanislav Sedov 
2486ae771770SStanislav Sedov void
hx509_crypto_set_padding(hx509_crypto crypto,int padding_type)2487ae771770SStanislav Sedov hx509_crypto_set_padding(hx509_crypto crypto, int padding_type)
2488ae771770SStanislav Sedov {
2489ae771770SStanislav Sedov     switch (padding_type) {
2490ae771770SStanislav Sedov     case HX509_CRYPTO_PADDING_PKCS7:
2491ae771770SStanislav Sedov 	crypto->flags &= ~PADDING_FLAGS;
2492ae771770SStanislav Sedov 	crypto->flags |= PADDING_PKCS7;
2493ae771770SStanislav Sedov 	break;
2494ae771770SStanislav Sedov     case HX509_CRYPTO_PADDING_NONE:
2495ae771770SStanislav Sedov 	crypto->flags &= ~PADDING_FLAGS;
2496ae771770SStanislav Sedov 	crypto->flags |= PADDING_NONE;
2497ae771770SStanislav Sedov 	break;
2498ae771770SStanislav Sedov     default:
2499ae771770SStanislav Sedov 	_hx509_abort("Invalid padding");
2500ae771770SStanislav Sedov     }
2501ae771770SStanislav Sedov }
2502ae771770SStanislav Sedov 
2503c19800e8SDoug Rabson int
hx509_crypto_set_key_data(hx509_crypto crypto,const void * data,size_t length)2504c19800e8SDoug Rabson hx509_crypto_set_key_data(hx509_crypto crypto, const void *data, size_t length)
2505c19800e8SDoug Rabson {
2506ae771770SStanislav Sedov     if (EVP_CIPHER_key_length(crypto->c) > (int)length)
2507c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2508c19800e8SDoug Rabson 
2509c19800e8SDoug Rabson     if (crypto->key.data) {
2510c19800e8SDoug Rabson 	free(crypto->key.data);
2511c19800e8SDoug Rabson 	crypto->key.data = NULL;
2512c19800e8SDoug Rabson 	crypto->key.length = 0;
2513c19800e8SDoug Rabson     }
2514c19800e8SDoug Rabson     crypto->key.data = malloc(length);
2515c19800e8SDoug Rabson     if (crypto->key.data == NULL)
2516c19800e8SDoug Rabson 	return ENOMEM;
2517c19800e8SDoug Rabson     memcpy(crypto->key.data, data, length);
2518c19800e8SDoug Rabson     crypto->key.length = length;
2519c19800e8SDoug Rabson 
2520c19800e8SDoug Rabson     return 0;
2521c19800e8SDoug Rabson }
2522c19800e8SDoug Rabson 
2523c19800e8SDoug Rabson int
hx509_crypto_set_random_key(hx509_crypto crypto,heim_octet_string * key)2524c19800e8SDoug Rabson hx509_crypto_set_random_key(hx509_crypto crypto, heim_octet_string *key)
2525c19800e8SDoug Rabson {
2526c19800e8SDoug Rabson     if (crypto->key.data) {
2527c19800e8SDoug Rabson 	free(crypto->key.data);
2528c19800e8SDoug Rabson 	crypto->key.length = 0;
2529c19800e8SDoug Rabson     }
2530c19800e8SDoug Rabson 
2531c19800e8SDoug Rabson     crypto->key.length = EVP_CIPHER_key_length(crypto->c);
2532c19800e8SDoug Rabson     crypto->key.data = malloc(crypto->key.length);
2533c19800e8SDoug Rabson     if (crypto->key.data == NULL) {
2534c19800e8SDoug Rabson 	crypto->key.length = 0;
2535c19800e8SDoug Rabson 	return ENOMEM;
2536c19800e8SDoug Rabson     }
2537c19800e8SDoug Rabson     if (RAND_bytes(crypto->key.data, crypto->key.length) <= 0) {
2538c19800e8SDoug Rabson 	free(crypto->key.data);
2539c19800e8SDoug Rabson 	crypto->key.data = NULL;
2540c19800e8SDoug Rabson 	crypto->key.length = 0;
2541c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2542c19800e8SDoug Rabson     }
2543c19800e8SDoug Rabson     if (key)
2544c19800e8SDoug Rabson 	return der_copy_octet_string(&crypto->key, key);
2545c19800e8SDoug Rabson     else
2546c19800e8SDoug Rabson 	return 0;
2547c19800e8SDoug Rabson }
2548c19800e8SDoug Rabson 
2549c19800e8SDoug Rabson int
hx509_crypto_set_params(hx509_context context,hx509_crypto crypto,const heim_octet_string * param,heim_octet_string * ivec)2550c19800e8SDoug Rabson hx509_crypto_set_params(hx509_context context,
2551c19800e8SDoug Rabson 			hx509_crypto crypto,
2552c19800e8SDoug Rabson 			const heim_octet_string *param,
2553c19800e8SDoug Rabson 			heim_octet_string *ivec)
2554c19800e8SDoug Rabson {
2555c19800e8SDoug Rabson     return (*crypto->cipher->set_params)(context, param, crypto, ivec);
2556c19800e8SDoug Rabson }
2557c19800e8SDoug Rabson 
2558c19800e8SDoug Rabson int
hx509_crypto_get_params(hx509_context context,hx509_crypto crypto,const heim_octet_string * ivec,heim_octet_string * param)2559c19800e8SDoug Rabson hx509_crypto_get_params(hx509_context context,
2560c19800e8SDoug Rabson 			hx509_crypto crypto,
2561c19800e8SDoug Rabson 			const heim_octet_string *ivec,
2562c19800e8SDoug Rabson 			heim_octet_string *param)
2563c19800e8SDoug Rabson {
2564c19800e8SDoug Rabson     return (*crypto->cipher->get_params)(context, crypto, ivec, param);
2565c19800e8SDoug Rabson }
2566c19800e8SDoug Rabson 
2567c19800e8SDoug Rabson int
hx509_crypto_random_iv(hx509_crypto crypto,heim_octet_string * ivec)2568c19800e8SDoug Rabson hx509_crypto_random_iv(hx509_crypto crypto, heim_octet_string *ivec)
2569c19800e8SDoug Rabson {
2570c19800e8SDoug Rabson     ivec->length = EVP_CIPHER_iv_length(crypto->c);
2571c19800e8SDoug Rabson     ivec->data = malloc(ivec->length);
2572c19800e8SDoug Rabson     if (ivec->data == NULL) {
2573c19800e8SDoug Rabson 	ivec->length = 0;
2574c19800e8SDoug Rabson 	return ENOMEM;
2575c19800e8SDoug Rabson     }
2576c19800e8SDoug Rabson 
2577c19800e8SDoug Rabson     if (RAND_bytes(ivec->data, ivec->length) <= 0) {
2578c19800e8SDoug Rabson 	free(ivec->data);
2579c19800e8SDoug Rabson 	ivec->data = NULL;
2580c19800e8SDoug Rabson 	ivec->length = 0;
2581c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2582c19800e8SDoug Rabson     }
2583c19800e8SDoug Rabson     return 0;
2584c19800e8SDoug Rabson }
2585c19800e8SDoug Rabson 
2586c19800e8SDoug Rabson int
hx509_crypto_encrypt(hx509_crypto crypto,const void * data,const size_t length,const heim_octet_string * ivec,heim_octet_string ** ciphertext)2587c19800e8SDoug Rabson hx509_crypto_encrypt(hx509_crypto crypto,
2588c19800e8SDoug Rabson 		     const void *data,
2589c19800e8SDoug Rabson 		     const size_t length,
2590c19800e8SDoug Rabson 		     const heim_octet_string *ivec,
2591c19800e8SDoug Rabson 		     heim_octet_string **ciphertext)
2592c19800e8SDoug Rabson {
2593*e4456411SJohn Baldwin     EVP_CIPHER_CTX *evp;
2594ae771770SStanislav Sedov     size_t padsize, bsize;
2595c19800e8SDoug Rabson     int ret;
2596c19800e8SDoug Rabson 
2597c19800e8SDoug Rabson     *ciphertext = NULL;
2598c19800e8SDoug Rabson 
2599ae771770SStanislav Sedov     if ((crypto->cipher->flags & CIPHER_WEAK) &&
2600ae771770SStanislav Sedov 	(crypto->flags & ALLOW_WEAK) == 0)
2601ae771770SStanislav Sedov 	return HX509_CRYPTO_ALGORITHM_BEST_BEFORE;
2602ae771770SStanislav Sedov 
2603ae771770SStanislav Sedov     assert(EVP_CIPHER_iv_length(crypto->c) == (int)ivec->length);
2604c19800e8SDoug Rabson 
2605*e4456411SJohn Baldwin     evp = EVP_CIPHER_CTX_new();
2606*e4456411SJohn Baldwin     if (evp == NULL)
2607*e4456411SJohn Baldwin 	return ENOMEM;
2608c19800e8SDoug Rabson 
2609*e4456411SJohn Baldwin     ret = EVP_CipherInit_ex(evp, crypto->c, NULL,
2610c19800e8SDoug Rabson 			    crypto->key.data, ivec->data, 1);
2611c19800e8SDoug Rabson     if (ret != 1) {
2612c19800e8SDoug Rabson 	ret = HX509_CRYPTO_INTERNAL_ERROR;
2613c19800e8SDoug Rabson 	goto out;
2614c19800e8SDoug Rabson     }
2615c19800e8SDoug Rabson 
2616c19800e8SDoug Rabson     *ciphertext = calloc(1, sizeof(**ciphertext));
2617c19800e8SDoug Rabson     if (*ciphertext == NULL) {
2618c19800e8SDoug Rabson 	ret = ENOMEM;
2619c19800e8SDoug Rabson 	goto out;
2620c19800e8SDoug Rabson     }
2621c19800e8SDoug Rabson 
2622ae771770SStanislav Sedov     assert(crypto->flags & PADDING_FLAGS);
2623ae771770SStanislav Sedov 
2624ae771770SStanislav Sedov     bsize = EVP_CIPHER_block_size(crypto->c);
2625c19800e8SDoug Rabson     padsize = 0;
2626ae771770SStanislav Sedov 
2627ae771770SStanislav Sedov     if (crypto->flags & PADDING_NONE) {
2628ae771770SStanislav Sedov 	if (bsize != 1 && (length % bsize) != 0)
2629ae771770SStanislav Sedov 	    return HX509_CMS_PADDING_ERROR;
2630ae771770SStanislav Sedov     } else if (crypto->flags & PADDING_PKCS7) {
2631ae771770SStanislav Sedov 	if (bsize != 1)
2632c19800e8SDoug Rabson 	    padsize = bsize - (length % bsize);
2633c19800e8SDoug Rabson     }
2634ae771770SStanislav Sedov 
2635c19800e8SDoug Rabson     (*ciphertext)->length = length + padsize;
2636c19800e8SDoug Rabson     (*ciphertext)->data = malloc(length + padsize);
2637c19800e8SDoug Rabson     if ((*ciphertext)->data == NULL) {
2638c19800e8SDoug Rabson 	ret = ENOMEM;
2639c19800e8SDoug Rabson 	goto out;
2640c19800e8SDoug Rabson     }
2641c19800e8SDoug Rabson 
2642c19800e8SDoug Rabson     memcpy((*ciphertext)->data, data, length);
2643c19800e8SDoug Rabson     if (padsize) {
2644ae771770SStanislav Sedov 	size_t i;
2645c19800e8SDoug Rabson 	unsigned char *p = (*ciphertext)->data;
2646c19800e8SDoug Rabson 	p += length;
2647c19800e8SDoug Rabson 	for (i = 0; i < padsize; i++)
2648c19800e8SDoug Rabson 	    *p++ = padsize;
2649c19800e8SDoug Rabson     }
2650c19800e8SDoug Rabson 
2651*e4456411SJohn Baldwin     ret = EVP_Cipher(evp, (*ciphertext)->data,
2652c19800e8SDoug Rabson 		     (*ciphertext)->data,
2653c19800e8SDoug Rabson 		     length + padsize);
2654c19800e8SDoug Rabson     if (ret != 1) {
2655c19800e8SDoug Rabson 	ret = HX509_CRYPTO_INTERNAL_ERROR;
2656c19800e8SDoug Rabson 	goto out;
2657c19800e8SDoug Rabson     }
2658c19800e8SDoug Rabson     ret = 0;
2659c19800e8SDoug Rabson 
2660c19800e8SDoug Rabson  out:
2661c19800e8SDoug Rabson     if (ret) {
2662c19800e8SDoug Rabson 	if (*ciphertext) {
2663c19800e8SDoug Rabson 	    if ((*ciphertext)->data) {
2664c19800e8SDoug Rabson 		free((*ciphertext)->data);
2665c19800e8SDoug Rabson 	    }
2666c19800e8SDoug Rabson 	    free(*ciphertext);
2667c19800e8SDoug Rabson 	    *ciphertext = NULL;
2668c19800e8SDoug Rabson 	}
2669c19800e8SDoug Rabson     }
2670*e4456411SJohn Baldwin     EVP_CIPHER_CTX_free(evp);
2671c19800e8SDoug Rabson 
2672c19800e8SDoug Rabson     return ret;
2673c19800e8SDoug Rabson }
2674c19800e8SDoug Rabson 
2675c19800e8SDoug Rabson int
hx509_crypto_decrypt(hx509_crypto crypto,const void * data,const size_t length,heim_octet_string * ivec,heim_octet_string * clear)2676c19800e8SDoug Rabson hx509_crypto_decrypt(hx509_crypto crypto,
2677c19800e8SDoug Rabson 		     const void *data,
2678c19800e8SDoug Rabson 		     const size_t length,
2679c19800e8SDoug Rabson 		     heim_octet_string *ivec,
2680c19800e8SDoug Rabson 		     heim_octet_string *clear)
2681c19800e8SDoug Rabson {
2682*e4456411SJohn Baldwin     EVP_CIPHER_CTX *evp;
2683c19800e8SDoug Rabson     void *idata = NULL;
2684c19800e8SDoug Rabson     int ret;
2685c19800e8SDoug Rabson 
2686c19800e8SDoug Rabson     clear->data = NULL;
2687c19800e8SDoug Rabson     clear->length = 0;
2688c19800e8SDoug Rabson 
2689ae771770SStanislav Sedov     if ((crypto->cipher->flags & CIPHER_WEAK) &&
2690ae771770SStanislav Sedov 	(crypto->flags & ALLOW_WEAK) == 0)
2691ae771770SStanislav Sedov 	return HX509_CRYPTO_ALGORITHM_BEST_BEFORE;
2692ae771770SStanislav Sedov 
2693ae771770SStanislav Sedov     if (ivec && EVP_CIPHER_iv_length(crypto->c) < (int)ivec->length)
2694c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2695c19800e8SDoug Rabson 
2696c19800e8SDoug Rabson     if (crypto->key.data == NULL)
2697c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2698c19800e8SDoug Rabson 
2699c19800e8SDoug Rabson     if (ivec)
2700c19800e8SDoug Rabson 	idata = ivec->data;
2701c19800e8SDoug Rabson 
2702*e4456411SJohn Baldwin     evp = EVP_CIPHER_CTX_new();
2703*e4456411SJohn Baldwin     if (evp == NULL)
2704*e4456411SJohn Baldwin 	return ENOMEM;
2705c19800e8SDoug Rabson 
2706*e4456411SJohn Baldwin     ret = EVP_CipherInit_ex(evp, crypto->c, NULL,
2707c19800e8SDoug Rabson 			    crypto->key.data, idata, 0);
2708c19800e8SDoug Rabson     if (ret != 1) {
2709*e4456411SJohn Baldwin 	EVP_CIPHER_CTX_free(evp);
2710c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2711c19800e8SDoug Rabson     }
2712c19800e8SDoug Rabson 
2713c19800e8SDoug Rabson     clear->length = length;
2714c19800e8SDoug Rabson     clear->data = malloc(length);
2715c19800e8SDoug Rabson     if (clear->data == NULL) {
2716*e4456411SJohn Baldwin 	EVP_CIPHER_CTX_free(evp);
2717c19800e8SDoug Rabson 	clear->length = 0;
2718c19800e8SDoug Rabson 	return ENOMEM;
2719c19800e8SDoug Rabson     }
2720c19800e8SDoug Rabson 
2721*e4456411SJohn Baldwin     if (EVP_Cipher(evp, clear->data, data, length) != 1) {
2722*e4456411SJohn Baldwin 	EVP_CIPHER_CTX_free(evp);
2723c19800e8SDoug Rabson 	return HX509_CRYPTO_INTERNAL_ERROR;
2724c19800e8SDoug Rabson     }
2725*e4456411SJohn Baldwin     EVP_CIPHER_CTX_free(evp);
2726c19800e8SDoug Rabson 
2727ae771770SStanislav Sedov     if ((crypto->flags & PADDING_PKCS7) && EVP_CIPHER_block_size(crypto->c) > 1) {
2728c19800e8SDoug Rabson 	int padsize;
2729c19800e8SDoug Rabson 	unsigned char *p;
2730c19800e8SDoug Rabson 	int j, bsize = EVP_CIPHER_block_size(crypto->c);
2731c19800e8SDoug Rabson 
2732ae771770SStanislav Sedov 	if ((int)clear->length < bsize) {
2733c19800e8SDoug Rabson 	    ret = HX509_CMS_PADDING_ERROR;
2734c19800e8SDoug Rabson 	    goto out;
2735c19800e8SDoug Rabson 	}
2736c19800e8SDoug Rabson 
2737c19800e8SDoug Rabson 	p = clear->data;
2738c19800e8SDoug Rabson 	p += clear->length - 1;
2739c19800e8SDoug Rabson 	padsize = *p;
2740c19800e8SDoug Rabson 	if (padsize > bsize) {
2741c19800e8SDoug Rabson 	    ret = HX509_CMS_PADDING_ERROR;
2742c19800e8SDoug Rabson 	    goto out;
2743c19800e8SDoug Rabson 	}
2744c19800e8SDoug Rabson 	clear->length -= padsize;
2745c19800e8SDoug Rabson 	for (j = 0; j < padsize; j++) {
2746c19800e8SDoug Rabson 	    if (*p-- != padsize) {
2747c19800e8SDoug Rabson 		ret = HX509_CMS_PADDING_ERROR;
2748c19800e8SDoug Rabson 		goto out;
2749c19800e8SDoug Rabson 	    }
2750c19800e8SDoug Rabson 	}
2751c19800e8SDoug Rabson     }
2752c19800e8SDoug Rabson 
2753c19800e8SDoug Rabson     return 0;
2754c19800e8SDoug Rabson 
2755c19800e8SDoug Rabson  out:
2756c19800e8SDoug Rabson     if (clear->data)
2757c19800e8SDoug Rabson 	free(clear->data);
2758c19800e8SDoug Rabson     clear->data = NULL;
2759c19800e8SDoug Rabson     clear->length = 0;
2760c19800e8SDoug Rabson     return ret;
2761c19800e8SDoug Rabson }
2762c19800e8SDoug Rabson 
2763c19800e8SDoug Rabson typedef int (*PBE_string2key_func)(hx509_context,
2764c19800e8SDoug Rabson 				   const char *,
2765c19800e8SDoug Rabson 				   const heim_octet_string *,
2766c19800e8SDoug Rabson 				   hx509_crypto *, heim_octet_string *,
2767c19800e8SDoug Rabson 				   heim_octet_string *,
2768c19800e8SDoug Rabson 				   const heim_oid *, const EVP_MD *);
2769c19800e8SDoug Rabson 
2770c19800e8SDoug Rabson static int
PBE_string2key(hx509_context context,const char * password,const heim_octet_string * parameters,hx509_crypto * crypto,heim_octet_string * key,heim_octet_string * iv,const heim_oid * enc_oid,const EVP_MD * md)2771c19800e8SDoug Rabson PBE_string2key(hx509_context context,
2772c19800e8SDoug Rabson 	       const char *password,
2773c19800e8SDoug Rabson 	       const heim_octet_string *parameters,
2774c19800e8SDoug Rabson 	       hx509_crypto *crypto,
2775c19800e8SDoug Rabson 	       heim_octet_string *key, heim_octet_string *iv,
2776c19800e8SDoug Rabson 	       const heim_oid *enc_oid,
2777c19800e8SDoug Rabson 	       const EVP_MD *md)
2778c19800e8SDoug Rabson {
2779c19800e8SDoug Rabson     PKCS12_PBEParams p12params;
2780c19800e8SDoug Rabson     int passwordlen;
2781c19800e8SDoug Rabson     hx509_crypto c;
2782c19800e8SDoug Rabson     int iter, saltlen, ret;
2783c19800e8SDoug Rabson     unsigned char *salt;
2784c19800e8SDoug Rabson 
2785c19800e8SDoug Rabson     passwordlen = password ? strlen(password) : 0;
2786c19800e8SDoug Rabson 
2787c19800e8SDoug Rabson     if (parameters == NULL)
2788c19800e8SDoug Rabson  	return HX509_ALG_NOT_SUPP;
2789c19800e8SDoug Rabson 
2790c19800e8SDoug Rabson     ret = decode_PKCS12_PBEParams(parameters->data,
2791c19800e8SDoug Rabson 				  parameters->length,
2792c19800e8SDoug Rabson 				  &p12params, NULL);
2793c19800e8SDoug Rabson     if (ret)
2794c19800e8SDoug Rabson 	goto out;
2795c19800e8SDoug Rabson 
2796c19800e8SDoug Rabson     if (p12params.iterations)
2797c19800e8SDoug Rabson 	iter = *p12params.iterations;
2798c19800e8SDoug Rabson     else
2799c19800e8SDoug Rabson 	iter = 1;
2800c19800e8SDoug Rabson     salt = p12params.salt.data;
2801c19800e8SDoug Rabson     saltlen = p12params.salt.length;
2802c19800e8SDoug Rabson 
2803c19800e8SDoug Rabson     if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2804c19800e8SDoug Rabson 			 PKCS12_KEY_ID, iter, key->length, key->data, md)) {
2805c19800e8SDoug Rabson 	ret = HX509_CRYPTO_INTERNAL_ERROR;
2806c19800e8SDoug Rabson 	goto out;
2807c19800e8SDoug Rabson     }
2808c19800e8SDoug Rabson 
2809c19800e8SDoug Rabson     if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2810c19800e8SDoug Rabson 			 PKCS12_IV_ID, iter, iv->length, iv->data, md)) {
2811c19800e8SDoug Rabson 	ret = HX509_CRYPTO_INTERNAL_ERROR;
2812c19800e8SDoug Rabson 	goto out;
2813c19800e8SDoug Rabson     }
2814c19800e8SDoug Rabson 
2815c19800e8SDoug Rabson     ret = hx509_crypto_init(context, NULL, enc_oid, &c);
2816c19800e8SDoug Rabson     if (ret)
2817c19800e8SDoug Rabson 	goto out;
2818c19800e8SDoug Rabson 
2819ae771770SStanislav Sedov     hx509_crypto_allow_weak(c);
2820ae771770SStanislav Sedov 
2821c19800e8SDoug Rabson     ret = hx509_crypto_set_key_data(c, key->data, key->length);
2822c19800e8SDoug Rabson     if (ret) {
2823c19800e8SDoug Rabson 	hx509_crypto_destroy(c);
2824c19800e8SDoug Rabson 	goto out;
2825c19800e8SDoug Rabson     }
2826c19800e8SDoug Rabson 
2827c19800e8SDoug Rabson     *crypto = c;
2828c19800e8SDoug Rabson out:
2829c19800e8SDoug Rabson     free_PKCS12_PBEParams(&p12params);
2830c19800e8SDoug Rabson     return ret;
2831c19800e8SDoug Rabson }
2832c19800e8SDoug Rabson 
2833c19800e8SDoug Rabson static const heim_oid *
find_string2key(const heim_oid * oid,const EVP_CIPHER ** c,const EVP_MD ** md,PBE_string2key_func * s2k)2834c19800e8SDoug Rabson find_string2key(const heim_oid *oid,
2835c19800e8SDoug Rabson 		const EVP_CIPHER **c,
2836c19800e8SDoug Rabson 		const EVP_MD **md,
2837c19800e8SDoug Rabson 		PBE_string2key_func *s2k)
2838c19800e8SDoug Rabson {
2839ae771770SStanislav Sedov     if (der_heim_oid_cmp(oid, ASN1_OID_ID_PBEWITHSHAAND40BITRC2_CBC) == 0) {
2840c19800e8SDoug Rabson 	*c = EVP_rc2_40_cbc();
2841c19800e8SDoug Rabson 	*md = EVP_sha1();
2842c19800e8SDoug Rabson 	*s2k = PBE_string2key;
2843ae771770SStanislav Sedov 	return &asn1_oid_private_rc2_40;
2844ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(oid, ASN1_OID_ID_PBEWITHSHAAND128BITRC2_CBC) == 0) {
2845c19800e8SDoug Rabson 	*c = EVP_rc2_cbc();
2846c19800e8SDoug Rabson 	*md = EVP_sha1();
2847c19800e8SDoug Rabson 	*s2k = PBE_string2key;
2848ae771770SStanislav Sedov 	return ASN1_OID_ID_PKCS3_RC2_CBC;
2849c19800e8SDoug Rabson #if 0
2850ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(oid, ASN1_OID_ID_PBEWITHSHAAND40BITRC4) == 0) {
2851c19800e8SDoug Rabson 	*c = EVP_rc4_40();
2852c19800e8SDoug Rabson 	*md = EVP_sha1();
2853c19800e8SDoug Rabson 	*s2k = PBE_string2key;
2854c19800e8SDoug Rabson 	return NULL;
2855ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(oid, ASN1_OID_ID_PBEWITHSHAAND128BITRC4) == 0) {
2856c19800e8SDoug Rabson 	*c = EVP_rc4();
2857c19800e8SDoug Rabson 	*md = EVP_sha1();
2858c19800e8SDoug Rabson 	*s2k = PBE_string2key;
2859ae771770SStanislav Sedov 	return ASN1_OID_ID_PKCS3_RC4;
2860c19800e8SDoug Rabson #endif
2861ae771770SStanislav Sedov     } else if (der_heim_oid_cmp(oid, ASN1_OID_ID_PBEWITHSHAAND3_KEYTRIPLEDES_CBC) == 0) {
2862c19800e8SDoug Rabson 	*c = EVP_des_ede3_cbc();
2863c19800e8SDoug Rabson 	*md = EVP_sha1();
2864c19800e8SDoug Rabson 	*s2k = PBE_string2key;
2865ae771770SStanislav Sedov 	return ASN1_OID_ID_PKCS3_DES_EDE3_CBC;
2866c19800e8SDoug Rabson     }
2867c19800e8SDoug Rabson 
2868c19800e8SDoug Rabson     return NULL;
2869c19800e8SDoug Rabson }
2870c19800e8SDoug Rabson 
2871c19800e8SDoug Rabson /*
2872c19800e8SDoug Rabson  *
2873c19800e8SDoug Rabson  */
2874c19800e8SDoug Rabson 
2875c19800e8SDoug Rabson int
_hx509_pbe_encrypt(hx509_context context,hx509_lock lock,const AlgorithmIdentifier * ai,const heim_octet_string * content,heim_octet_string * econtent)2876c19800e8SDoug Rabson _hx509_pbe_encrypt(hx509_context context,
2877c19800e8SDoug Rabson 		   hx509_lock lock,
2878c19800e8SDoug Rabson 		   const AlgorithmIdentifier *ai,
2879c19800e8SDoug Rabson 		   const heim_octet_string *content,
2880c19800e8SDoug Rabson 		   heim_octet_string *econtent)
2881c19800e8SDoug Rabson {
2882c19800e8SDoug Rabson     hx509_clear_error_string(context);
2883c19800e8SDoug Rabson     return EINVAL;
2884c19800e8SDoug Rabson }
2885c19800e8SDoug Rabson 
2886c19800e8SDoug Rabson /*
2887c19800e8SDoug Rabson  *
2888c19800e8SDoug Rabson  */
2889c19800e8SDoug Rabson 
2890c19800e8SDoug Rabson int
_hx509_pbe_decrypt(hx509_context context,hx509_lock lock,const AlgorithmIdentifier * ai,const heim_octet_string * econtent,heim_octet_string * content)2891c19800e8SDoug Rabson _hx509_pbe_decrypt(hx509_context context,
2892c19800e8SDoug Rabson 		   hx509_lock lock,
2893c19800e8SDoug Rabson 		   const AlgorithmIdentifier *ai,
2894c19800e8SDoug Rabson 		   const heim_octet_string *econtent,
2895c19800e8SDoug Rabson 		   heim_octet_string *content)
2896c19800e8SDoug Rabson {
2897c19800e8SDoug Rabson     const struct _hx509_password *pw;
2898c19800e8SDoug Rabson     heim_octet_string key, iv;
2899c19800e8SDoug Rabson     const heim_oid *enc_oid;
2900c19800e8SDoug Rabson     const EVP_CIPHER *c;
2901c19800e8SDoug Rabson     const EVP_MD *md;
2902c19800e8SDoug Rabson     PBE_string2key_func s2k;
2903ae771770SStanislav Sedov     int ret = 0;
2904ae771770SStanislav Sedov     size_t i;
2905c19800e8SDoug Rabson 
2906c19800e8SDoug Rabson     memset(&key, 0, sizeof(key));
2907c19800e8SDoug Rabson     memset(&iv, 0, sizeof(iv));
2908c19800e8SDoug Rabson 
2909c19800e8SDoug Rabson     memset(content, 0, sizeof(*content));
2910c19800e8SDoug Rabson 
2911c19800e8SDoug Rabson     enc_oid = find_string2key(&ai->algorithm, &c, &md, &s2k);
2912c19800e8SDoug Rabson     if (enc_oid == NULL) {
2913c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, HX509_ALG_NOT_SUPP,
2914c19800e8SDoug Rabson 			       "String to key algorithm not supported");
2915c19800e8SDoug Rabson 	ret = HX509_ALG_NOT_SUPP;
2916c19800e8SDoug Rabson 	goto out;
2917c19800e8SDoug Rabson     }
2918c19800e8SDoug Rabson 
2919c19800e8SDoug Rabson     key.length = EVP_CIPHER_key_length(c);
2920c19800e8SDoug Rabson     key.data = malloc(key.length);
2921c19800e8SDoug Rabson     if (key.data == NULL) {
2922c19800e8SDoug Rabson 	ret = ENOMEM;
2923c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2924c19800e8SDoug Rabson 	goto out;
2925c19800e8SDoug Rabson     }
2926c19800e8SDoug Rabson 
2927c19800e8SDoug Rabson     iv.length = EVP_CIPHER_iv_length(c);
2928c19800e8SDoug Rabson     iv.data = malloc(iv.length);
2929c19800e8SDoug Rabson     if (iv.data == NULL) {
2930c19800e8SDoug Rabson 	ret = ENOMEM;
2931c19800e8SDoug Rabson 	hx509_clear_error_string(context);
2932c19800e8SDoug Rabson 	goto out;
2933c19800e8SDoug Rabson     }
2934c19800e8SDoug Rabson 
2935c19800e8SDoug Rabson     pw = _hx509_lock_get_passwords(lock);
2936c19800e8SDoug Rabson 
2937c19800e8SDoug Rabson     ret = HX509_CRYPTO_INTERNAL_ERROR;
2938c19800e8SDoug Rabson     for (i = 0; i < pw->len + 1; i++) {
2939c19800e8SDoug Rabson 	hx509_crypto crypto;
2940c19800e8SDoug Rabson 	const char *password;
2941c19800e8SDoug Rabson 
2942c19800e8SDoug Rabson 	if (i < pw->len)
2943c19800e8SDoug Rabson 	    password = pw->val[i];
2944c19800e8SDoug Rabson 	else if (i < pw->len + 1)
2945c19800e8SDoug Rabson 	    password = "";
2946c19800e8SDoug Rabson 	else
2947c19800e8SDoug Rabson 	    password = NULL;
2948c19800e8SDoug Rabson 
2949c19800e8SDoug Rabson 	ret = (*s2k)(context, password, ai->parameters, &crypto,
2950c19800e8SDoug Rabson 		     &key, &iv, enc_oid, md);
2951c19800e8SDoug Rabson 	if (ret)
2952c19800e8SDoug Rabson 	    goto out;
2953c19800e8SDoug Rabson 
2954c19800e8SDoug Rabson 	ret = hx509_crypto_decrypt(crypto,
2955c19800e8SDoug Rabson 				   econtent->data,
2956c19800e8SDoug Rabson 				   econtent->length,
2957c19800e8SDoug Rabson 				   &iv,
2958c19800e8SDoug Rabson 				   content);
2959c19800e8SDoug Rabson 	hx509_crypto_destroy(crypto);
2960c19800e8SDoug Rabson 	if (ret == 0)
2961c19800e8SDoug Rabson 	    goto out;
2962c19800e8SDoug Rabson 
2963c19800e8SDoug Rabson     }
2964c19800e8SDoug Rabson out:
2965c19800e8SDoug Rabson     if (key.data)
2966c19800e8SDoug Rabson 	der_free_octet_string(&key);
2967c19800e8SDoug Rabson     if (iv.data)
2968c19800e8SDoug Rabson 	der_free_octet_string(&iv);
2969c19800e8SDoug Rabson     return ret;
2970c19800e8SDoug Rabson }
2971c19800e8SDoug Rabson 
2972c19800e8SDoug Rabson /*
2973c19800e8SDoug Rabson  *
2974c19800e8SDoug Rabson  */
2975c19800e8SDoug Rabson 
2976c19800e8SDoug Rabson 
2977ae771770SStanislav Sedov static int
match_keys_rsa(hx509_cert c,hx509_private_key private_key)2978ae771770SStanislav Sedov match_keys_rsa(hx509_cert c, hx509_private_key private_key)
2979c19800e8SDoug Rabson {
2980c19800e8SDoug Rabson     const Certificate *cert;
2981c19800e8SDoug Rabson     const SubjectPublicKeyInfo *spi;
2982c19800e8SDoug Rabson     RSAPublicKey pk;
2983c19800e8SDoug Rabson     RSA *rsa;
2984*e4456411SJohn Baldwin     const BIGNUM *d, *p, *q, *dmp1, *dmq1, *iqmp;
2985*e4456411SJohn Baldwin     BIGNUM *new_d, *new_p, *new_q, *new_dmp1, *new_dmq1, *new_iqmp, *n, *e;
2986c19800e8SDoug Rabson     size_t size;
2987c19800e8SDoug Rabson     int ret;
2988c19800e8SDoug Rabson 
2989c19800e8SDoug Rabson     if (private_key->private_key.rsa == NULL)
2990c19800e8SDoug Rabson 	return 0;
2991c19800e8SDoug Rabson 
2992c19800e8SDoug Rabson     rsa = private_key->private_key.rsa;
2993*e4456411SJohn Baldwin     RSA_get0_key(rsa, NULL, NULL, &d);
2994*e4456411SJohn Baldwin     RSA_get0_factors(rsa, &p, &q);
2995*e4456411SJohn Baldwin     RSA_get0_crt_params(rsa, &dmp1, &dmq1, &iqmp);
2996*e4456411SJohn Baldwin     if (d == NULL || p == NULL || q == NULL)
2997c19800e8SDoug Rabson 	return 0;
2998c19800e8SDoug Rabson 
2999c19800e8SDoug Rabson     cert = _hx509_get_cert(c);
3000c19800e8SDoug Rabson     spi = &cert->tbsCertificate.subjectPublicKeyInfo;
3001c19800e8SDoug Rabson 
3002c19800e8SDoug Rabson     rsa = RSA_new();
3003c19800e8SDoug Rabson     if (rsa == NULL)
3004c19800e8SDoug Rabson 	return 0;
3005c19800e8SDoug Rabson 
3006c19800e8SDoug Rabson     ret = decode_RSAPublicKey(spi->subjectPublicKey.data,
3007c19800e8SDoug Rabson 			      spi->subjectPublicKey.length / 8,
3008c19800e8SDoug Rabson 			      &pk, &size);
3009c19800e8SDoug Rabson     if (ret) {
3010c19800e8SDoug Rabson 	RSA_free(rsa);
3011c19800e8SDoug Rabson 	return 0;
3012c19800e8SDoug Rabson     }
3013*e4456411SJohn Baldwin     n = heim_int2BN(&pk.modulus);
3014*e4456411SJohn Baldwin     e = heim_int2BN(&pk.publicExponent);
3015c19800e8SDoug Rabson 
3016c19800e8SDoug Rabson     free_RSAPublicKey(&pk);
3017c19800e8SDoug Rabson 
3018*e4456411SJohn Baldwin     new_d = BN_dup(d);
3019*e4456411SJohn Baldwin     new_p = BN_dup(p);
3020*e4456411SJohn Baldwin     new_q = BN_dup(q);
3021*e4456411SJohn Baldwin     new_dmp1 = BN_dup(dmp1);
3022*e4456411SJohn Baldwin     new_dmq1 = BN_dup(dmq1);
3023*e4456411SJohn Baldwin     new_iqmp = BN_dup(iqmp);
3024c19800e8SDoug Rabson 
3025*e4456411SJohn Baldwin     if (n == NULL || e == NULL ||
3026*e4456411SJohn Baldwin 	new_d == NULL || new_p == NULL|| new_q == NULL ||
3027*e4456411SJohn Baldwin 	new_dmp1 == NULL || new_dmq1 == NULL || new_iqmp == NULL) {
3028*e4456411SJohn Baldwin 	BN_free(n);
3029*e4456411SJohn Baldwin 	BN_free(e);
3030*e4456411SJohn Baldwin 	BN_free(new_d);
3031*e4456411SJohn Baldwin 	BN_free(new_p);
3032*e4456411SJohn Baldwin 	BN_free(new_q);
3033*e4456411SJohn Baldwin 	BN_free(new_dmp1);
3034*e4456411SJohn Baldwin 	BN_free(new_dmq1);
3035*e4456411SJohn Baldwin 	BN_free(new_iqmp);
3036*e4456411SJohn Baldwin 	RSA_free(rsa);
3037*e4456411SJohn Baldwin 	return 0;
3038*e4456411SJohn Baldwin     }
3039*e4456411SJohn Baldwin 
3040*e4456411SJohn Baldwin     ret = RSA_set0_key(rsa, new_d, n, e);
3041*e4456411SJohn Baldwin 
3042*e4456411SJohn Baldwin     if (ret != 1) {
3043*e4456411SJohn Baldwin 	BN_free(n);
3044*e4456411SJohn Baldwin 	BN_free(e);
3045*e4456411SJohn Baldwin 	BN_free(new_d);
3046*e4456411SJohn Baldwin 	BN_free(new_p);
3047*e4456411SJohn Baldwin 	BN_free(new_q);
3048*e4456411SJohn Baldwin 	BN_free(new_dmp1);
3049*e4456411SJohn Baldwin 	BN_free(new_dmq1);
3050*e4456411SJohn Baldwin 	BN_free(new_iqmp);
3051*e4456411SJohn Baldwin 	RSA_free(rsa);
3052*e4456411SJohn Baldwin 	return 0;
3053*e4456411SJohn Baldwin     }
3054*e4456411SJohn Baldwin 
3055*e4456411SJohn Baldwin     ret = RSA_set0_factors(rsa, new_p, new_q);
3056*e4456411SJohn Baldwin 
3057*e4456411SJohn Baldwin     if (ret != 1) {
3058*e4456411SJohn Baldwin 	BN_free(new_p);
3059*e4456411SJohn Baldwin 	BN_free(new_q);
3060*e4456411SJohn Baldwin 	BN_free(new_dmp1);
3061*e4456411SJohn Baldwin 	BN_free(new_dmq1);
3062*e4456411SJohn Baldwin 	BN_free(new_iqmp);
3063*e4456411SJohn Baldwin 	RSA_free(rsa);
3064*e4456411SJohn Baldwin 	return 0;
3065*e4456411SJohn Baldwin     }
3066*e4456411SJohn Baldwin 
3067*e4456411SJohn Baldwin     ret = RSA_set0_crt_params(rsa, new_dmp1, new_dmq1, new_iqmp);
3068*e4456411SJohn Baldwin 
3069*e4456411SJohn Baldwin     if (ret != 1) {
3070*e4456411SJohn Baldwin 	BN_free(new_dmp1);
3071*e4456411SJohn Baldwin 	BN_free(new_dmq1);
3072*e4456411SJohn Baldwin 	BN_free(new_iqmp);
3073c19800e8SDoug Rabson 	RSA_free(rsa);
3074c19800e8SDoug Rabson 	return 0;
3075c19800e8SDoug Rabson     }
3076c19800e8SDoug Rabson 
3077c19800e8SDoug Rabson     ret = RSA_check_key(rsa);
3078c19800e8SDoug Rabson     RSA_free(rsa);
3079c19800e8SDoug Rabson 
3080c19800e8SDoug Rabson     return ret == 1;
3081c19800e8SDoug Rabson }
3082c19800e8SDoug Rabson 
3083ae771770SStanislav Sedov static int
match_keys_ec(hx509_cert c,hx509_private_key private_key)3084ae771770SStanislav Sedov match_keys_ec(hx509_cert c, hx509_private_key private_key)
3085ae771770SStanislav Sedov {
3086ae771770SStanislav Sedov     return 1; /* XXX use EC_KEY_check_key */
3087ae771770SStanislav Sedov }
3088ae771770SStanislav Sedov 
3089ae771770SStanislav Sedov 
3090ae771770SStanislav Sedov int
_hx509_match_keys(hx509_cert c,hx509_private_key key)3091ae771770SStanislav Sedov _hx509_match_keys(hx509_cert c, hx509_private_key key)
3092ae771770SStanislav Sedov {
3093ae771770SStanislav Sedov     if (der_heim_oid_cmp(key->ops->key_oid, ASN1_OID_ID_PKCS1_RSAENCRYPTION) == 0)
3094ae771770SStanislav Sedov 	return match_keys_rsa(c, key);
3095ae771770SStanislav Sedov     if (der_heim_oid_cmp(key->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) == 0)
3096ae771770SStanislav Sedov 	return match_keys_ec(c, key);
3097ae771770SStanislav Sedov     return 0;
3098ae771770SStanislav Sedov 
3099ae771770SStanislav Sedov }
3100ae771770SStanislav Sedov 
3101ae771770SStanislav Sedov 
3102c19800e8SDoug Rabson static const heim_oid *
find_keytype(const hx509_private_key key)3103c19800e8SDoug Rabson find_keytype(const hx509_private_key key)
3104c19800e8SDoug Rabson {
3105c19800e8SDoug Rabson     const struct signature_alg *md;
3106c19800e8SDoug Rabson 
3107c19800e8SDoug Rabson     if (key == NULL)
3108c19800e8SDoug Rabson 	return NULL;
3109c19800e8SDoug Rabson 
3110c19800e8SDoug Rabson     md = find_sig_alg(key->signature_alg);
3111c19800e8SDoug Rabson     if (md == NULL)
3112c19800e8SDoug Rabson 	return NULL;
3113ae771770SStanislav Sedov     return md->key_oid;
3114c19800e8SDoug Rabson }
3115c19800e8SDoug Rabson 
3116c19800e8SDoug Rabson int
hx509_crypto_select(const hx509_context context,int type,const hx509_private_key source,hx509_peer_info peer,AlgorithmIdentifier * selected)3117c19800e8SDoug Rabson hx509_crypto_select(const hx509_context context,
3118c19800e8SDoug Rabson 		    int type,
3119c19800e8SDoug Rabson 		    const hx509_private_key source,
3120c19800e8SDoug Rabson 		    hx509_peer_info peer,
3121c19800e8SDoug Rabson 		    AlgorithmIdentifier *selected)
3122c19800e8SDoug Rabson {
3123ae771770SStanislav Sedov     const AlgorithmIdentifier *def = NULL;
3124c19800e8SDoug Rabson     size_t i, j;
3125c19800e8SDoug Rabson     int ret, bits;
3126c19800e8SDoug Rabson 
3127c19800e8SDoug Rabson     memset(selected, 0, sizeof(*selected));
3128c19800e8SDoug Rabson 
3129c19800e8SDoug Rabson     if (type == HX509_SELECT_DIGEST) {
3130c19800e8SDoug Rabson 	bits = SIG_DIGEST;
3131ae771770SStanislav Sedov 	if (source)
3132ae771770SStanislav Sedov 	    def = alg_for_privatekey(source, type);
3133ae771770SStanislav Sedov 	if (def == NULL)
3134c19800e8SDoug Rabson 	    def = _hx509_crypto_default_digest_alg;
3135c19800e8SDoug Rabson     } else if (type == HX509_SELECT_PUBLIC_SIG) {
3136c19800e8SDoug Rabson 	bits = SIG_PUBLIC_SIG;
3137ae771770SStanislav Sedov 	/* XXX depend on `source´ and `peer´ */
3138ae771770SStanislav Sedov 	if (source)
3139ae771770SStanislav Sedov 	    def = alg_for_privatekey(source, type);
3140ae771770SStanislav Sedov 	if (def == NULL)
3141c19800e8SDoug Rabson 	    def = _hx509_crypto_default_sig_alg;
3142c19800e8SDoug Rabson     } else if (type == HX509_SELECT_SECRET_ENC) {
3143c19800e8SDoug Rabson 	bits = SIG_SECRET;
3144c19800e8SDoug Rabson 	def = _hx509_crypto_default_secret_alg;
3145c19800e8SDoug Rabson     } else {
3146c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, EINVAL,
3147c19800e8SDoug Rabson 			       "Unknown type %d of selection", type);
3148c19800e8SDoug Rabson 	return EINVAL;
3149c19800e8SDoug Rabson     }
3150c19800e8SDoug Rabson 
3151c19800e8SDoug Rabson     if (peer) {
3152c19800e8SDoug Rabson 	const heim_oid *keytype = NULL;
3153c19800e8SDoug Rabson 
3154c19800e8SDoug Rabson 	keytype = find_keytype(source);
3155c19800e8SDoug Rabson 
3156c19800e8SDoug Rabson 	for (i = 0; i < peer->len; i++) {
3157c19800e8SDoug Rabson 	    for (j = 0; sig_algs[j]; j++) {
3158c19800e8SDoug Rabson 		if ((sig_algs[j]->flags & bits) != bits)
3159c19800e8SDoug Rabson 		    continue;
3160ae771770SStanislav Sedov 		if (der_heim_oid_cmp(sig_algs[j]->sig_oid,
3161c19800e8SDoug Rabson 				     &peer->val[i].algorithm) != 0)
3162c19800e8SDoug Rabson 		    continue;
3163c19800e8SDoug Rabson 		if (keytype && sig_algs[j]->key_oid &&
3164ae771770SStanislav Sedov 		    der_heim_oid_cmp(keytype, sig_algs[j]->key_oid))
3165c19800e8SDoug Rabson 		    continue;
3166c19800e8SDoug Rabson 
3167c19800e8SDoug Rabson 		/* found one, use that */
3168c19800e8SDoug Rabson 		ret = copy_AlgorithmIdentifier(&peer->val[i], selected);
3169c19800e8SDoug Rabson 		if (ret)
3170c19800e8SDoug Rabson 		    hx509_clear_error_string(context);
3171c19800e8SDoug Rabson 		return ret;
3172c19800e8SDoug Rabson 	    }
3173c19800e8SDoug Rabson 	    if (bits & SIG_SECRET) {
3174c19800e8SDoug Rabson 		const struct hx509cipher *cipher;
3175c19800e8SDoug Rabson 
3176c19800e8SDoug Rabson 		cipher = find_cipher_by_oid(&peer->val[i].algorithm);
3177c19800e8SDoug Rabson 		if (cipher == NULL)
3178c19800e8SDoug Rabson 		    continue;
3179c19800e8SDoug Rabson 		if (cipher->ai_func == NULL)
3180c19800e8SDoug Rabson 		    continue;
3181c19800e8SDoug Rabson 		ret = copy_AlgorithmIdentifier(cipher->ai_func(), selected);
3182c19800e8SDoug Rabson 		if (ret)
3183c19800e8SDoug Rabson 		    hx509_clear_error_string(context);
3184c19800e8SDoug Rabson 		return ret;
3185c19800e8SDoug Rabson 	    }
3186c19800e8SDoug Rabson 	}
3187c19800e8SDoug Rabson     }
3188c19800e8SDoug Rabson 
3189c19800e8SDoug Rabson     /* use default */
3190c19800e8SDoug Rabson     ret = copy_AlgorithmIdentifier(def, selected);
3191c19800e8SDoug Rabson     if (ret)
3192c19800e8SDoug Rabson 	hx509_clear_error_string(context);
3193c19800e8SDoug Rabson     return ret;
3194c19800e8SDoug Rabson }
3195c19800e8SDoug Rabson 
3196c19800e8SDoug Rabson int
hx509_crypto_available(hx509_context context,int type,hx509_cert source,AlgorithmIdentifier ** val,unsigned int * plen)3197c19800e8SDoug Rabson hx509_crypto_available(hx509_context context,
3198c19800e8SDoug Rabson 		       int type,
3199c19800e8SDoug Rabson 		       hx509_cert source,
3200c19800e8SDoug Rabson 		       AlgorithmIdentifier **val,
3201c19800e8SDoug Rabson 		       unsigned int *plen)
3202c19800e8SDoug Rabson {
3203c19800e8SDoug Rabson     const heim_oid *keytype = NULL;
3204c19800e8SDoug Rabson     unsigned int len, i;
3205c19800e8SDoug Rabson     void *ptr;
3206c19800e8SDoug Rabson     int bits, ret;
3207c19800e8SDoug Rabson 
3208c19800e8SDoug Rabson     *val = NULL;
3209c19800e8SDoug Rabson 
3210c19800e8SDoug Rabson     if (type == HX509_SELECT_ALL) {
3211c19800e8SDoug Rabson 	bits = SIG_DIGEST | SIG_PUBLIC_SIG | SIG_SECRET;
3212c19800e8SDoug Rabson     } else if (type == HX509_SELECT_DIGEST) {
3213c19800e8SDoug Rabson 	bits = SIG_DIGEST;
3214c19800e8SDoug Rabson     } else if (type == HX509_SELECT_PUBLIC_SIG) {
3215c19800e8SDoug Rabson 	bits = SIG_PUBLIC_SIG;
3216c19800e8SDoug Rabson     } else {
3217c19800e8SDoug Rabson 	hx509_set_error_string(context, 0, EINVAL,
3218c19800e8SDoug Rabson 			       "Unknown type %d of available", type);
3219c19800e8SDoug Rabson 	return EINVAL;
3220c19800e8SDoug Rabson     }
3221c19800e8SDoug Rabson 
3222c19800e8SDoug Rabson     if (source)
3223c19800e8SDoug Rabson 	keytype = find_keytype(_hx509_cert_private_key(source));
3224c19800e8SDoug Rabson 
3225c19800e8SDoug Rabson     len = 0;
3226c19800e8SDoug Rabson     for (i = 0; sig_algs[i]; i++) {
3227c19800e8SDoug Rabson 	if ((sig_algs[i]->flags & bits) == 0)
3228c19800e8SDoug Rabson 	    continue;
3229c19800e8SDoug Rabson 	if (sig_algs[i]->sig_alg == NULL)
3230c19800e8SDoug Rabson 	    continue;
3231c19800e8SDoug Rabson 	if (keytype && sig_algs[i]->key_oid &&
3232ae771770SStanislav Sedov 	    der_heim_oid_cmp(sig_algs[i]->key_oid, keytype))
3233c19800e8SDoug Rabson 	    continue;
3234c19800e8SDoug Rabson 
3235c19800e8SDoug Rabson 	/* found one, add that to the list */
3236c19800e8SDoug Rabson 	ptr = realloc(*val, sizeof(**val) * (len + 1));
3237c19800e8SDoug Rabson 	if (ptr == NULL)
3238c19800e8SDoug Rabson 	    goto out;
3239c19800e8SDoug Rabson 	*val = ptr;
3240c19800e8SDoug Rabson 
3241ae771770SStanislav Sedov 	ret = copy_AlgorithmIdentifier(sig_algs[i]->sig_alg, &(*val)[len]);
3242c19800e8SDoug Rabson 	if (ret)
3243c19800e8SDoug Rabson 	    goto out;
3244c19800e8SDoug Rabson 	len++;
3245c19800e8SDoug Rabson     }
3246c19800e8SDoug Rabson 
3247c19800e8SDoug Rabson     /* Add AES */
3248c19800e8SDoug Rabson     if (bits & SIG_SECRET) {
3249c19800e8SDoug Rabson 
3250c19800e8SDoug Rabson 	for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) {
3251c19800e8SDoug Rabson 
3252ae771770SStanislav Sedov 	    if (ciphers[i].flags & CIPHER_WEAK)
3253ae771770SStanislav Sedov 		continue;
3254c19800e8SDoug Rabson 	    if (ciphers[i].ai_func == NULL)
3255c19800e8SDoug Rabson 		continue;
3256c19800e8SDoug Rabson 
3257c19800e8SDoug Rabson 	    ptr = realloc(*val, sizeof(**val) * (len + 1));
3258c19800e8SDoug Rabson 	    if (ptr == NULL)
3259c19800e8SDoug Rabson 		goto out;
3260c19800e8SDoug Rabson 	    *val = ptr;
3261c19800e8SDoug Rabson 
3262c19800e8SDoug Rabson 	    ret = copy_AlgorithmIdentifier((ciphers[i].ai_func)(), &(*val)[len]);
3263c19800e8SDoug Rabson 	    if (ret)
3264c19800e8SDoug Rabson 		goto out;
3265c19800e8SDoug Rabson 	    len++;
3266c19800e8SDoug Rabson 	}
3267c19800e8SDoug Rabson     }
3268c19800e8SDoug Rabson 
3269c19800e8SDoug Rabson     *plen = len;
3270c19800e8SDoug Rabson     return 0;
3271c19800e8SDoug Rabson 
3272c19800e8SDoug Rabson out:
3273c19800e8SDoug Rabson     for (i = 0; i < len; i++)
3274c19800e8SDoug Rabson 	free_AlgorithmIdentifier(&(*val)[i]);
3275c19800e8SDoug Rabson     free(*val);
3276c19800e8SDoug Rabson     *val = NULL;
3277c19800e8SDoug Rabson     hx509_set_error_string(context, 0, ENOMEM, "out of memory");
3278c19800e8SDoug Rabson     return ENOMEM;
3279c19800e8SDoug Rabson }
3280c19800e8SDoug Rabson 
3281c19800e8SDoug Rabson void
hx509_crypto_free_algs(AlgorithmIdentifier * val,unsigned int len)3282c19800e8SDoug Rabson hx509_crypto_free_algs(AlgorithmIdentifier *val,
3283c19800e8SDoug Rabson 		       unsigned int len)
3284c19800e8SDoug Rabson {
3285c19800e8SDoug Rabson     unsigned int i;
3286c19800e8SDoug Rabson     for (i = 0; i < len; i++)
3287c19800e8SDoug Rabson 	free_AlgorithmIdentifier(&val[i]);
3288c19800e8SDoug Rabson     free(val);
3289c19800e8SDoug Rabson }
3290