| // Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <openssl/x509.h> |
| |
| #include <assert.h> |
| #include <limits.h> |
| |
| #include <openssl/asn1.h> |
| #include <openssl/asn1t.h> |
| #include <openssl/bio.h> |
| #include <openssl/err.h> |
| #include <openssl/evp.h> |
| #include <openssl/obj.h> |
| |
| #include "../rsa/internal.h" |
| #include "internal.h" |
| |
| |
| static int rsa_pss_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, |
| void *exarg) { |
| if (operation == ASN1_OP_FREE_PRE) { |
| RSA_PSS_PARAMS *pss = (RSA_PSS_PARAMS *)*pval; |
| X509_ALGOR_free(pss->maskHash); |
| } |
| return 1; |
| } |
| |
| ASN1_SEQUENCE_cb(RSA_PSS_PARAMS, rsa_pss_cb) = { |
| ASN1_EXP_OPT(RSA_PSS_PARAMS, hashAlgorithm, X509_ALGOR, 0), |
| ASN1_EXP_OPT(RSA_PSS_PARAMS, maskGenAlgorithm, X509_ALGOR, 1), |
| ASN1_EXP_OPT(RSA_PSS_PARAMS, saltLength, ASN1_INTEGER, 2), |
| ASN1_EXP_OPT(RSA_PSS_PARAMS, trailerField, ASN1_INTEGER, 3), |
| } ASN1_SEQUENCE_END_cb(RSA_PSS_PARAMS, RSA_PSS_PARAMS) |
| |
| IMPLEMENT_ASN1_FUNCTIONS_const(RSA_PSS_PARAMS) |
| |
| |
| static int rsa_pss_decode(const X509_ALGOR *alg, rsa_pss_params_t *out) { |
| if (alg->parameter == nullptr || alg->parameter->type != V_ASN1_SEQUENCE) { |
| return 0; |
| } |
| |
| // Although a syntax error in DER, we tolerate an explicitly-encoded trailer. |
| // See the certificates in cl/362617931. |
| CBS cbs; |
| CBS_init(&cbs, alg->parameter->value.sequence->data, |
| alg->parameter->value.sequence->length); |
| return rsa_parse_pss_params(&cbs, out, /*allow_explicit_trailer=*/true) && |
| CBS_len(&cbs) == 0; |
| } |
| |
| int x509_rsa_ctx_to_pss(EVP_MD_CTX *ctx, X509_ALGOR *algor) { |
| const EVP_MD *sigmd, *mgf1md; |
| int saltlen; |
| if (!EVP_PKEY_CTX_get_signature_md(ctx->pctx, &sigmd) || |
| !EVP_PKEY_CTX_get_rsa_mgf1_md(ctx->pctx, &mgf1md) || |
| !EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx->pctx, &saltlen)) { |
| return 0; |
| } |
| |
| if (sigmd != mgf1md) { |
| OPENSSL_PUT_ERROR(X509, X509_R_INVALID_PSS_PARAMETERS); |
| return 0; |
| } |
| int md_len = (int)EVP_MD_size(sigmd); |
| if (saltlen != RSA_PSS_SALTLEN_DIGEST && saltlen != md_len) { |
| OPENSSL_PUT_ERROR(X509, X509_R_INVALID_PSS_PARAMETERS); |
| return 0; |
| } |
| |
| rsa_pss_params_t params; |
| switch (EVP_MD_type(sigmd)) { |
| case NID_sha256: |
| params = rsa_pss_sha256; |
| break; |
| case NID_sha384: |
| params = rsa_pss_sha384; |
| break; |
| case NID_sha512: |
| params = rsa_pss_sha512; |
| break; |
| default: |
| OPENSSL_PUT_ERROR(X509, X509_R_INVALID_PSS_PARAMETERS); |
| return 0; |
| } |
| |
| // Encode |params| to an |ASN1_STRING|. |
| uint8_t buf[128]; // The largest param fits comfortably in 128 bytes. |
| CBB cbb; |
| CBB_init_fixed(&cbb, buf, sizeof(buf)); |
| if (!rsa_marshal_pss_params(&cbb, params)) { |
| return 0; |
| } |
| bssl::UniquePtr<ASN1_STRING> params_str( |
| ASN1_STRING_type_new(V_ASN1_SEQUENCE)); |
| if (params_str == nullptr || |
| !ASN1_STRING_set(params_str.get(), CBB_data(&cbb), CBB_len(&cbb))) { |
| return 0; |
| } |
| |
| if (!X509_ALGOR_set0(algor, OBJ_nid2obj(NID_rsassaPss), V_ASN1_SEQUENCE, |
| params_str.get())) { |
| return 0; |
| } |
| params_str.release(); // |X509_ALGOR_set0| took ownership. |
| return 1; |
| } |
| |
| int x509_rsa_pss_to_ctx(EVP_MD_CTX *ctx, const X509_ALGOR *sigalg, |
| EVP_PKEY *pkey) { |
| assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); |
| rsa_pss_params_t params; |
| if (!rsa_pss_decode(sigalg, ¶ms)) { |
| OPENSSL_PUT_ERROR(X509, X509_R_INVALID_PSS_PARAMETERS); |
| return 0; |
| } |
| |
| const EVP_MD *md = rsa_pss_params_get_md(params); |
| EVP_PKEY_CTX *pctx; |
| if (!EVP_DigestVerifyInit(ctx, &pctx, md, nullptr, pkey) || |
| !EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) || |
| !EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, RSA_PSS_SALTLEN_DIGEST) || |
| !EVP_PKEY_CTX_set_rsa_mgf1_md(pctx, md)) { |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| int x509_print_rsa_pss_params(BIO *bp, const X509_ALGOR *sigalg, int indent, |
| ASN1_PCTX *pctx) { |
| assert(OBJ_obj2nid(sigalg->algorithm) == NID_rsassaPss); |
| rsa_pss_params_t params; |
| if (!rsa_pss_decode(sigalg, ¶ms)) { |
| return BIO_puts(bp, " (INVALID PSS PARAMETERS)\n") <= 0; |
| } |
| |
| const char *hash_str = nullptr; |
| uint32_t salt_len = 0; |
| switch (params) { |
| case rsa_pss_sha256: |
| hash_str = "sha256"; |
| salt_len = 32; |
| break; |
| case rsa_pss_sha384: |
| hash_str = "sha384"; |
| salt_len = 48; |
| break; |
| case rsa_pss_sha512: |
| hash_str = "sha512"; |
| salt_len = 64; |
| break; |
| } |
| |
| if (BIO_puts(bp, "\n") <= 0 || // |
| !BIO_indent(bp, indent, 128) || // |
| BIO_printf(bp, "Hash Algorithm: %s\n", hash_str) <= 0 || |
| !BIO_indent(bp, indent, 128) || // |
| BIO_printf(bp, "Mask Algorithm: mgf1 with %s\n", hash_str) <= 0 || |
| !BIO_indent(bp, indent, 128) || // |
| BIO_printf(bp, "Salt Length: 0x%x\n", salt_len) <= 0 || |
| !BIO_indent(bp, indent, 128) || // |
| BIO_puts(bp, "Trailer Field: 0xBC (default)\n") <= 0) { |
| return 0; |
| } |
| |
| return 1; |
| } |