]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - tools/keys.c
Import bearssl-6433cc2
[FreeBSD/FreeBSD.git] / tools / keys.c
1 /*
2  * Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining 
5  * a copy of this software and associated documentation files (the
6  * "Software"), to deal in the Software without restriction, including
7  * without limitation the rights to use, copy, modify, merge, publish,
8  * distribute, sublicense, and/or sell copies of the Software, and to
9  * permit persons to whom the Software is furnished to do so, subject to
10  * the following conditions:
11  *
12  * The above copyright notice and this permission notice shall be 
13  * included in all copies or substantial portions of the Software.
14  *
15  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 
16  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
18  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22  * SOFTWARE.
23  */
24
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <stdint.h>
29 #include <errno.h>
30
31 #include "brssl.h"
32 #include "bearssl.h"
33
34 static private_key *
35 decode_key(const unsigned char *buf, size_t len)
36 {
37         br_skey_decoder_context dc;
38         int err;
39         private_key *sk;
40
41         br_skey_decoder_init(&dc);
42         br_skey_decoder_push(&dc, buf, len);
43         err = br_skey_decoder_last_error(&dc);
44         if (err != 0) {
45                 const char *errname, *errmsg;
46
47                 fprintf(stderr, "ERROR (decoding): err=%d\n", err);
48                 errname = find_error_name(err, &errmsg);
49                 if (errname != NULL) {
50                         fprintf(stderr, "  %s: %s\n", errname, errmsg);
51                 } else {
52                         fprintf(stderr, "  (unknown)\n");
53                 }
54                 return NULL;
55         }
56         switch (br_skey_decoder_key_type(&dc)) {
57                 const br_rsa_private_key *rk;
58                 const br_ec_private_key *ek;
59
60         case BR_KEYTYPE_RSA:
61                 rk = br_skey_decoder_get_rsa(&dc);
62                 sk = xmalloc(sizeof *sk);
63                 sk->key_type = BR_KEYTYPE_RSA;
64                 sk->key.rsa.n_bitlen = rk->n_bitlen;
65                 sk->key.rsa.p = xblobdup(rk->p, rk->plen);
66                 sk->key.rsa.plen = rk->plen;
67                 sk->key.rsa.q = xblobdup(rk->q, rk->qlen);
68                 sk->key.rsa.qlen = rk->qlen;
69                 sk->key.rsa.dp = xblobdup(rk->dp, rk->dplen);
70                 sk->key.rsa.dplen = rk->dplen;
71                 sk->key.rsa.dq = xblobdup(rk->dq, rk->dqlen);
72                 sk->key.rsa.dqlen = rk->dqlen;
73                 sk->key.rsa.iq = xblobdup(rk->iq, rk->iqlen);
74                 sk->key.rsa.iqlen = rk->iqlen;
75                 break;
76
77         case BR_KEYTYPE_EC:
78                 ek = br_skey_decoder_get_ec(&dc);
79                 sk = xmalloc(sizeof *sk);
80                 sk->key_type = BR_KEYTYPE_EC;
81                 sk->key.ec.curve = ek->curve;
82                 sk->key.ec.x = xblobdup(ek->x, ek->xlen);
83                 sk->key.ec.xlen = ek->xlen;
84                 break;
85
86         default:
87                 fprintf(stderr, "Unknown key type: %d\n",
88                         br_skey_decoder_key_type(&dc));
89                 sk = NULL;
90                 break;
91         }
92
93         return sk;
94 }
95
96 /* see brssl.h */
97 private_key *
98 read_private_key(const char *fname)
99 {
100         unsigned char *buf;
101         size_t len;
102         private_key *sk;
103         pem_object *pos;
104         size_t num, u;
105
106         buf = NULL;
107         pos = NULL;
108         sk = NULL;
109         buf = read_file(fname, &len);
110         if (buf == NULL) {
111                 goto deckey_exit;
112         }
113         if (looks_like_DER(buf, len)) {
114                 sk = decode_key(buf, len);
115                 goto deckey_exit;
116         } else {
117                 pos = decode_pem(buf, len, &num);
118                 if (pos == NULL) {
119                         goto deckey_exit;
120                 }
121                 for (u = 0; pos[u].name; u ++) {
122                         const char *name;
123
124                         name = pos[u].name;
125                         if (eqstr(name, "RSA PRIVATE KEY")
126                                 || eqstr(name, "EC PRIVATE KEY")
127                                 || eqstr(name, "PRIVATE KEY"))
128                         {
129                                 sk = decode_key(pos[u].data, pos[u].data_len);
130                                 goto deckey_exit;
131                         }
132                 }
133                 fprintf(stderr, "ERROR: no private key in file '%s'\n", fname);
134                 goto deckey_exit;
135         }
136
137 deckey_exit:
138         if (buf != NULL) {
139                 xfree(buf);
140         }
141         if (pos != NULL) {
142                 for (u = 0; pos[u].name; u ++) {
143                         free_pem_object_contents(&pos[u]);
144                 }
145                 xfree(pos);
146         }
147         return sk;
148 }
149
150 /* see brssl.h */
151 void
152 free_private_key(private_key *sk)
153 {
154         if (sk == NULL) {
155                 return;
156         }
157         switch (sk->key_type) {
158         case BR_KEYTYPE_RSA:
159                 xfree(sk->key.rsa.p);
160                 xfree(sk->key.rsa.q);
161                 xfree(sk->key.rsa.dp);
162                 xfree(sk->key.rsa.dq);
163                 xfree(sk->key.rsa.iq);
164                 break;
165         case BR_KEYTYPE_EC:
166                 xfree(sk->key.ec.x);
167                 break;
168         }
169         xfree(sk);
170 }
171
172 /*
173  * OID for hash functions in RSA signatures.
174  */
175 static const unsigned char HASH_OID_SHA1[] = {
176         0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A
177 };
178
179 static const unsigned char HASH_OID_SHA224[] = {
180         0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04
181 };
182
183 static const unsigned char HASH_OID_SHA256[] = {
184         0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01
185 };
186
187 static const unsigned char HASH_OID_SHA384[] = {
188         0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02
189 };
190
191 static const unsigned char HASH_OID_SHA512[] = {
192         0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03
193 };
194
195 static const unsigned char *HASH_OID[] = {
196         HASH_OID_SHA1,
197         HASH_OID_SHA224,
198         HASH_OID_SHA256,
199         HASH_OID_SHA384,
200         HASH_OID_SHA512
201 };
202
203 /* see brssl.h */
204 const unsigned char *
205 get_hash_oid(int id)
206 {
207         if (id >= 2 && id <= 6) {
208                 return HASH_OID[id - 2];
209         } else {
210                 return NULL;
211         }
212 }
213
214 /* see brssl.h */
215 const br_hash_class *
216 get_hash_impl(int hash_id)
217 {
218         size_t u;
219
220         if (hash_id == 0) {
221                 return &br_md5sha1_vtable;
222         }
223         for (u = 0; hash_functions[u].name; u ++) {
224                 const br_hash_class *hc;
225                 int id;
226
227                 hc = hash_functions[u].hclass;
228                 id = (hc->desc >> BR_HASHDESC_ID_OFF) & BR_HASHDESC_ID_MASK;
229                 if (id == hash_id) {
230                         return hc;
231                 }
232         }
233         return NULL;
234 }