[e16e8f2] | 1 | /* |
---|
| 2 | * Copyright(C) 2006 Cameron Rich |
---|
| 3 | * |
---|
| 4 | * This library is free software; you can redistribute it and/or modify |
---|
| 5 | * it under the terms of the GNU Lesser General Public License as published by |
---|
| 6 | * the Free Software Foundation; either version 2.1 of the License, or |
---|
| 7 | * (at your option) any later version. |
---|
| 8 | * |
---|
| 9 | * This library is distributed in the hope that it will be useful, |
---|
| 10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
| 12 | * GNU Lesser General Public License for more details. |
---|
| 13 | * |
---|
| 14 | * You should have received a copy of the GNU Lesser General Public License |
---|
| 15 | * along with this library; if not, write to the Free Software |
---|
| 16 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
---|
| 17 | */ |
---|
| 18 | |
---|
| 19 | /** |
---|
| 20 | * Implements the RSA public encryption algorithm. Uses the bigint library to |
---|
| 21 | * perform its calculations. |
---|
| 22 | */ |
---|
| 23 | |
---|
| 24 | #include <stdio.h> |
---|
| 25 | #include <string.h> |
---|
| 26 | #include <time.h> |
---|
| 27 | #include <stdlib.h> |
---|
| 28 | #include "crypto.h" |
---|
| 29 | |
---|
| 30 | #ifdef CONFIG_BIGINT_CRT |
---|
| 31 | static bigint *bi_crt(const RSA_CTX *rsa, bigint *bi); |
---|
| 32 | #endif |
---|
| 33 | |
---|
| 34 | void RSA_priv_key_new(RSA_CTX **ctx, |
---|
| 35 | const uint8_t *modulus, int mod_len, |
---|
| 36 | const uint8_t *pub_exp, int pub_len, |
---|
| 37 | const uint8_t *priv_exp, int priv_len |
---|
| 38 | #if CONFIG_BIGINT_CRT |
---|
| 39 | , const uint8_t *p, int p_len, |
---|
| 40 | const uint8_t *q, int q_len, |
---|
| 41 | const uint8_t *dP, int dP_len, |
---|
| 42 | const uint8_t *dQ, int dQ_len, |
---|
| 43 | const uint8_t *qInv, int qInv_len |
---|
| 44 | #endif |
---|
| 45 | ) |
---|
| 46 | { |
---|
| 47 | RSA_CTX *rsa_ctx; |
---|
| 48 | BI_CTX *bi_ctx; |
---|
| 49 | RSA_pub_key_new(ctx, modulus, mod_len, pub_exp, pub_len); |
---|
| 50 | rsa_ctx = *ctx; |
---|
| 51 | bi_ctx = rsa_ctx->bi_ctx; |
---|
| 52 | rsa_ctx->d = bi_import(bi_ctx, priv_exp, priv_len); |
---|
| 53 | bi_permanent(rsa_ctx->d); |
---|
| 54 | |
---|
| 55 | #ifdef CONFIG_BIGINT_CRT |
---|
| 56 | rsa_ctx->p = bi_import(bi_ctx, p, p_len); |
---|
| 57 | rsa_ctx->q = bi_import(bi_ctx, q, q_len); |
---|
| 58 | rsa_ctx->dP = bi_import(bi_ctx, dP, dP_len); |
---|
| 59 | rsa_ctx->dQ = bi_import(bi_ctx, dQ, dQ_len); |
---|
| 60 | rsa_ctx->qInv = bi_import(bi_ctx, qInv, qInv_len); |
---|
| 61 | bi_permanent(rsa_ctx->dP); |
---|
| 62 | bi_permanent(rsa_ctx->dQ); |
---|
| 63 | bi_permanent(rsa_ctx->qInv); |
---|
| 64 | bi_set_mod(bi_ctx, rsa_ctx->p, BIGINT_P_OFFSET); |
---|
| 65 | bi_set_mod(bi_ctx, rsa_ctx->q, BIGINT_Q_OFFSET); |
---|
| 66 | #endif |
---|
| 67 | } |
---|
| 68 | |
---|
| 69 | void RSA_pub_key_new(RSA_CTX **ctx, |
---|
| 70 | const uint8_t *modulus, int mod_len, |
---|
| 71 | const uint8_t *pub_exp, int pub_len) |
---|
| 72 | { |
---|
| 73 | RSA_CTX *rsa_ctx; |
---|
| 74 | BI_CTX *bi_ctx = bi_initialize(); |
---|
| 75 | *ctx = (RSA_CTX *)calloc(1, sizeof(RSA_CTX)); |
---|
| 76 | rsa_ctx = *ctx; |
---|
| 77 | rsa_ctx->bi_ctx = bi_ctx; |
---|
| 78 | rsa_ctx->num_octets = (mod_len & 0xFFF0); |
---|
| 79 | rsa_ctx->m = bi_import(bi_ctx, modulus, mod_len); |
---|
| 80 | bi_set_mod(bi_ctx, rsa_ctx->m, BIGINT_M_OFFSET); |
---|
| 81 | rsa_ctx->e = bi_import(bi_ctx, pub_exp, pub_len); |
---|
| 82 | bi_permanent(rsa_ctx->e); |
---|
| 83 | } |
---|
| 84 | |
---|
| 85 | /** |
---|
| 86 | * Free up any RSA context resources. |
---|
| 87 | */ |
---|
| 88 | void RSA_free(RSA_CTX *rsa_ctx) |
---|
| 89 | { |
---|
| 90 | BI_CTX *bi_ctx; |
---|
| 91 | if (rsa_ctx == NULL) /* deal with ptrs that are null */ |
---|
| 92 | return; |
---|
| 93 | |
---|
| 94 | bi_ctx = rsa_ctx->bi_ctx; |
---|
| 95 | |
---|
| 96 | bi_depermanent(rsa_ctx->e); |
---|
| 97 | bi_free(bi_ctx, rsa_ctx->e); |
---|
| 98 | bi_free_mod(rsa_ctx->bi_ctx, BIGINT_M_OFFSET); |
---|
| 99 | |
---|
| 100 | if (rsa_ctx->d) |
---|
| 101 | { |
---|
| 102 | bi_depermanent(rsa_ctx->d); |
---|
| 103 | bi_free(bi_ctx, rsa_ctx->d); |
---|
| 104 | #ifdef CONFIG_BIGINT_CRT |
---|
| 105 | bi_depermanent(rsa_ctx->dP); |
---|
| 106 | bi_depermanent(rsa_ctx->dQ); |
---|
| 107 | bi_depermanent(rsa_ctx->qInv); |
---|
| 108 | bi_free(bi_ctx, rsa_ctx->dP); |
---|
| 109 | bi_free(bi_ctx, rsa_ctx->dQ); |
---|
| 110 | bi_free(bi_ctx, rsa_ctx->qInv); |
---|
| 111 | bi_free_mod(rsa_ctx->bi_ctx, BIGINT_P_OFFSET); |
---|
| 112 | bi_free_mod(rsa_ctx->bi_ctx, BIGINT_Q_OFFSET); |
---|
| 113 | #endif |
---|
| 114 | } |
---|
| 115 | |
---|
| 116 | bi_terminate(bi_ctx); |
---|
| 117 | free(rsa_ctx); |
---|
| 118 | } |
---|
| 119 | |
---|
| 120 | /** |
---|
| 121 | * @brief Use PKCS1.5 for decryption/verification. |
---|
| 122 | * @param ctx [in] The context |
---|
| 123 | * @param in_data [in] The data to encrypt (must be < modulus size-11) |
---|
| 124 | * @param out_data [out] The encrypted data. |
---|
| 125 | * @param is_decryption [in] Decryption or verify operation. |
---|
| 126 | * @return The number of bytes that were originally encrypted. -1 on error. |
---|
| 127 | * @see http://www.rsasecurity.com/rsalabs/node.asp?id=2125 |
---|
| 128 | */ |
---|
| 129 | int RSA_decrypt(const RSA_CTX *ctx, const uint8_t *in_data, |
---|
| 130 | uint8_t *out_data, int is_decryption) |
---|
| 131 | { |
---|
| 132 | int byte_size = ctx->num_octets; |
---|
| 133 | uint8_t *block; |
---|
| 134 | int i, size; |
---|
| 135 | bigint *decrypted_bi, *dat_bi; |
---|
| 136 | |
---|
| 137 | memset(out_data, 0, byte_size); /* initialise */ |
---|
| 138 | |
---|
| 139 | /* decrypt */ |
---|
| 140 | dat_bi = bi_import(ctx->bi_ctx, in_data, byte_size); |
---|
| 141 | #ifdef CONFIG_SSL_CERT_VERIFICATION |
---|
| 142 | decrypted_bi = is_decryption ? /* decrypt or verify? */ |
---|
| 143 | RSA_private(ctx, dat_bi) : RSA_public(ctx, dat_bi); |
---|
| 144 | #else /* always a decryption */ |
---|
| 145 | decrypted_bi = RSA_private(ctx, dat_bi); |
---|
| 146 | #endif |
---|
| 147 | |
---|
| 148 | /* convert to a normal block */ |
---|
| 149 | block = (uint8_t *)malloc(byte_size); |
---|
| 150 | bi_export(ctx->bi_ctx, decrypted_bi, block, byte_size); |
---|
| 151 | |
---|
| 152 | i = 10; /* start at the first possible non-padded byte */ |
---|
| 153 | |
---|
| 154 | #ifdef CONFIG_SSL_CERT_VERIFICATION |
---|
| 155 | if (is_decryption == 0) /* PKCS1.5 signing pads with "0xff"s */ |
---|
| 156 | { |
---|
| 157 | while (block[i++] == 0xff && i < byte_size); |
---|
| 158 | |
---|
| 159 | if (block[i-2] != 0xff) |
---|
| 160 | i = byte_size; /*ensure size is 0 */ |
---|
| 161 | } |
---|
| 162 | else /* PKCS1.5 encryption padding is random */ |
---|
| 163 | #endif |
---|
| 164 | { |
---|
| 165 | while (block[i++] && i < byte_size); |
---|
| 166 | } |
---|
| 167 | size = byte_size - i; |
---|
| 168 | |
---|
| 169 | /* get only the bit we want */ |
---|
| 170 | if (size > 0) |
---|
| 171 | memcpy(out_data, &block[i], size); |
---|
| 172 | |
---|
| 173 | free(block); |
---|
| 174 | return size ? size : -1; |
---|
| 175 | } |
---|
| 176 | |
---|
| 177 | /** |
---|
| 178 | * Performs m = c^d mod n |
---|
| 179 | */ |
---|
| 180 | bigint *RSA_private(const RSA_CTX *c, bigint *bi_msg) |
---|
| 181 | { |
---|
| 182 | #ifdef CONFIG_BIGINT_CRT |
---|
| 183 | return bi_crt(c, bi_msg); |
---|
| 184 | #else |
---|
| 185 | BI_CTX *ctx = c->bi_ctx; |
---|
| 186 | ctx->mod_offset = BIGINT_M_OFFSET; |
---|
| 187 | return bi_mod_power(ctx, bi_msg, c->d); |
---|
| 188 | #endif |
---|
| 189 | } |
---|
| 190 | |
---|
| 191 | #ifdef CONFIG_BIGINT_CRT |
---|
| 192 | /** |
---|
| 193 | * Use the Chinese Remainder Theorem to quickly perform RSA decrypts. |
---|
| 194 | * This should really be in bigint.c (and was at one stage), but needs |
---|
| 195 | * access to the RSA_CTX context... |
---|
| 196 | */ |
---|
| 197 | static bigint *bi_crt(const RSA_CTX *rsa, bigint *bi) |
---|
| 198 | { |
---|
| 199 | BI_CTX *ctx = rsa->bi_ctx; |
---|
| 200 | bigint *m1, *m2, *h; |
---|
| 201 | |
---|
| 202 | /* Montgomery has a condition the 0 < x, y < m and these products violate |
---|
| 203 | * that condition. So disable Montgomery when using CRT */ |
---|
| 204 | #if defined(CONFIG_BIGINT_MONTGOMERY) |
---|
| 205 | ctx->use_classical = 1; |
---|
| 206 | #endif |
---|
| 207 | ctx->mod_offset = BIGINT_P_OFFSET; |
---|
| 208 | m1 = bi_mod_power(ctx, bi_copy(bi), rsa->dP); |
---|
| 209 | |
---|
| 210 | ctx->mod_offset = BIGINT_Q_OFFSET; |
---|
| 211 | m2 = bi_mod_power(ctx, bi, rsa->dQ); |
---|
| 212 | |
---|
| 213 | h = bi_subtract(ctx, bi_add(ctx, m1, rsa->p), bi_copy(m2), NULL); |
---|
| 214 | h = bi_multiply(ctx, h, rsa->qInv); |
---|
| 215 | ctx->mod_offset = BIGINT_P_OFFSET; |
---|
| 216 | h = bi_residue(ctx, h); |
---|
| 217 | #if defined(CONFIG_BIGINT_MONTGOMERY) |
---|
| 218 | ctx->use_classical = 0; /* reset for any further operation */ |
---|
| 219 | #endif |
---|
| 220 | return bi_add(ctx, m2, bi_multiply(ctx, rsa->q, h)); |
---|
| 221 | } |
---|
| 222 | #endif |
---|
| 223 | |
---|
| 224 | #ifdef CONFIG_SSL_FULL_MODE |
---|
| 225 | /** |
---|
| 226 | * Used for diagnostics. |
---|
| 227 | */ |
---|
| 228 | void RSA_print(const RSA_CTX *rsa_ctx) |
---|
| 229 | { |
---|
| 230 | if (rsa_ctx == NULL) |
---|
| 231 | return; |
---|
| 232 | |
---|
| 233 | printf("----------------- RSA DEBUG ----------------\n"); |
---|
| 234 | printf("Size:\t%d\n", rsa_ctx->num_octets); |
---|
| 235 | bi_print("Modulus", rsa_ctx->m); |
---|
| 236 | bi_print("Public Key", rsa_ctx->e); |
---|
| 237 | bi_print("Private Key", rsa_ctx->d); |
---|
| 238 | } |
---|
| 239 | #endif |
---|
| 240 | |
---|
| 241 | #ifdef CONFIG_SSL_CERT_VERIFICATION |
---|
| 242 | /** |
---|
| 243 | * Performs c = m^e mod n |
---|
| 244 | */ |
---|
| 245 | bigint *RSA_public(const RSA_CTX * c, bigint *bi_msg) |
---|
| 246 | { |
---|
| 247 | c->bi_ctx->mod_offset = BIGINT_M_OFFSET; |
---|
| 248 | return bi_mod_power(c->bi_ctx, bi_msg, c->e); |
---|
| 249 | } |
---|
| 250 | |
---|
| 251 | /** |
---|
| 252 | * Use PKCS1.5 for encryption/signing. |
---|
| 253 | * see http://www.rsasecurity.com/rsalabs/node.asp?id=2125 |
---|
| 254 | */ |
---|
| 255 | int RSA_encrypt(const RSA_CTX *ctx, const uint8_t *in_data, uint16_t in_len, |
---|
| 256 | uint8_t *out_data, int is_signing) |
---|
| 257 | { |
---|
| 258 | int byte_size = ctx->num_octets; |
---|
| 259 | int num_pads_needed = byte_size-in_len-3; |
---|
| 260 | bigint *dat_bi, *encrypt_bi; |
---|
| 261 | |
---|
| 262 | /* note: in_len+11 must be > byte_size */ |
---|
| 263 | out_data[0] = 0; /* ensure encryption block is < modulus */ |
---|
| 264 | |
---|
| 265 | if (is_signing) |
---|
| 266 | { |
---|
| 267 | out_data[1] = 1; /* PKCS1.5 signing pads with "0xff"'s */ |
---|
| 268 | memset(&out_data[2], 0xff, num_pads_needed); |
---|
| 269 | } |
---|
| 270 | else /* randomize the encryption padding with non-zero bytes */ |
---|
| 271 | { |
---|
| 272 | out_data[1] = 2; |
---|
| 273 | get_random_NZ(num_pads_needed, &out_data[2]); |
---|
| 274 | } |
---|
| 275 | |
---|
| 276 | out_data[2+num_pads_needed] = 0; |
---|
| 277 | memcpy(&out_data[3+num_pads_needed], in_data, in_len); |
---|
| 278 | |
---|
| 279 | /* now encrypt it */ |
---|
| 280 | dat_bi = bi_import(ctx->bi_ctx, out_data, byte_size); |
---|
| 281 | encrypt_bi = is_signing ? RSA_private(ctx, dat_bi) : |
---|
| 282 | RSA_public(ctx, dat_bi); |
---|
| 283 | bi_export(ctx->bi_ctx, encrypt_bi, out_data, byte_size); |
---|
| 284 | return byte_size; |
---|
| 285 | } |
---|
| 286 | |
---|
| 287 | #if 0 |
---|
| 288 | /** |
---|
| 289 | * Take a signature and decrypt it. |
---|
| 290 | */ |
---|
| 291 | bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, |
---|
| 292 | bigint *modulus, bigint *pub_exp) |
---|
| 293 | { |
---|
| 294 | uint8_t *block; |
---|
| 295 | int i, size; |
---|
| 296 | bigint *decrypted_bi, *dat_bi; |
---|
| 297 | bigint *bir = NULL; |
---|
| 298 | |
---|
| 299 | block = (uint8_t *)malloc(sig_len); |
---|
| 300 | |
---|
| 301 | /* decrypt */ |
---|
| 302 | dat_bi = bi_import(ctx, sig, sig_len); |
---|
| 303 | ctx->mod_offset = BIGINT_M_OFFSET; |
---|
| 304 | |
---|
| 305 | /* convert to a normal block */ |
---|
| 306 | decrypted_bi = bi_mod_power2(ctx, dat_bi, modulus, pub_exp); |
---|
| 307 | |
---|
| 308 | bi_export(ctx, decrypted_bi, block, sig_len); |
---|
| 309 | ctx->mod_offset = BIGINT_M_OFFSET; |
---|
| 310 | |
---|
| 311 | i = 10; /* start at the first possible non-padded byte */ |
---|
| 312 | while (block[i++] && i < sig_len); |
---|
| 313 | size = sig_len - i; |
---|
| 314 | |
---|
| 315 | /* get only the bit we want */ |
---|
| 316 | if (size > 0) |
---|
| 317 | { |
---|
| 318 | int len; |
---|
| 319 | const uint8_t *sig_ptr = x509_get_signature(&block[i], &len); |
---|
| 320 | |
---|
| 321 | if (sig_ptr) |
---|
| 322 | { |
---|
| 323 | bir = bi_import(ctx, sig_ptr, len); |
---|
| 324 | } |
---|
| 325 | } |
---|
| 326 | |
---|
| 327 | free(block); |
---|
| 328 | return bir; |
---|
| 329 | } |
---|
| 330 | #endif |
---|
| 331 | |
---|
| 332 | #endif /* CONFIG_SSL_CERT_VERIFICATION */ |
---|