pkparse.c 37 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279
  1. /*
  2. * Copyright (C) 2015-2018 Alibaba Group Holding Limited
  3. */
  4. #if !defined(MBEDTLS_CONFIG_FILE)
  5. #include "mbedtls/config.h"
  6. #else
  7. #include MBEDTLS_CONFIG_FILE
  8. #endif
  9. #if defined(MBEDTLS_PK_PARSE_C)
  10. #include "mbedtls/pk.h"
  11. #include "mbedtls/asn1.h"
  12. #include "mbedtls/oid.h"
  13. #include <string.h>
  14. #if defined(MBEDTLS_RSA_C)
  15. #include "mbedtls/rsa.h"
  16. #endif
  17. #if defined(MBEDTLS_ECP_C)
  18. #include "mbedtls/ecp.h"
  19. #endif
  20. #if defined(MBEDTLS_ECDSA_C)
  21. #include "mbedtls/ecdsa.h"
  22. #endif
  23. #if defined(MBEDTLS_PEM_PARSE_C)
  24. #include "mbedtls/pem.h"
  25. #endif
  26. #if defined(MBEDTLS_PKCS5_C)
  27. #include "mbedtls/pkcs5.h"
  28. #endif
  29. #if defined(MBEDTLS_PKCS12_C)
  30. #include "mbedtls/pkcs12.h"
  31. #endif
  32. #if defined(MBEDTLS_PLATFORM_C)
  33. #include "mbedtls/platform.h"
  34. #else
  35. #include <stdlib.h>
  36. #define mbedtls_calloc calloc
  37. #define mbedtls_free free
  38. #endif
  39. #if defined(MBEDTLS_FS_IO)
  40. /* Implementation that should never be optimized out by the compiler */
  41. static void mbedtls_zeroize( void *v, size_t n ) {
  42. volatile unsigned char *p = v; while( n-- ) *p++ = 0;
  43. }
  44. /*
  45. * Load all data from a file into a given buffer.
  46. *
  47. * The file is expected to contain either PEM or DER encoded data.
  48. * A terminating null byte is always appended. It is included in the announced
  49. * length only if the data looks like it is PEM encoded.
  50. */
  51. int mbedtls_pk_load_file( const char *path, unsigned char **buf, size_t *n )
  52. {
  53. FILE *f;
  54. long size;
  55. if( ( f = fopen( path, "rb" ) ) == NULL )
  56. return( MBEDTLS_ERR_PK_FILE_IO_ERROR );
  57. fseek( f, 0, SEEK_END );
  58. if( ( size = ftell( f ) ) == -1 )
  59. {
  60. fclose( f );
  61. return( MBEDTLS_ERR_PK_FILE_IO_ERROR );
  62. }
  63. fseek( f, 0, SEEK_SET );
  64. *n = (size_t) size;
  65. if( *n + 1 == 0 ||
  66. ( *buf = mbedtls_calloc( 1, *n + 1 ) ) == NULL )
  67. {
  68. fclose( f );
  69. return( MBEDTLS_ERR_PK_ALLOC_FAILED );
  70. }
  71. if( fread( *buf, 1, *n, f ) != *n )
  72. {
  73. fclose( f );
  74. mbedtls_free( *buf );
  75. return( MBEDTLS_ERR_PK_FILE_IO_ERROR );
  76. }
  77. fclose( f );
  78. (*buf)[*n] = '\0';
  79. if( strstr( (const char *) *buf, "-----BEGIN " ) != NULL )
  80. ++*n;
  81. return( 0 );
  82. }
  83. /*
  84. * Load and parse a private key
  85. */
  86. int mbedtls_pk_parse_keyfile( mbedtls_pk_context *ctx,
  87. const char *path, const char *pwd )
  88. {
  89. int ret;
  90. size_t n;
  91. unsigned char *buf;
  92. if( ( ret = mbedtls_pk_load_file( path, &buf, &n ) ) != 0 )
  93. return( ret );
  94. if( pwd == NULL )
  95. ret = mbedtls_pk_parse_key( ctx, buf, n, NULL, 0 );
  96. else
  97. ret = mbedtls_pk_parse_key( ctx, buf, n,
  98. (const unsigned char *) pwd, strlen( pwd ) );
  99. mbedtls_zeroize( buf, n );
  100. mbedtls_free( buf );
  101. return( ret );
  102. }
  103. /*
  104. * Load and parse a public key
  105. */
  106. int mbedtls_pk_parse_public_keyfile( mbedtls_pk_context *ctx, const char *path )
  107. {
  108. int ret;
  109. size_t n;
  110. unsigned char *buf;
  111. if( ( ret = mbedtls_pk_load_file( path, &buf, &n ) ) != 0 )
  112. return( ret );
  113. ret = mbedtls_pk_parse_public_key( ctx, buf, n );
  114. mbedtls_zeroize( buf, n );
  115. mbedtls_free( buf );
  116. return( ret );
  117. }
  118. #endif /* MBEDTLS_FS_IO */
  119. #if defined(MBEDTLS_ECP_C)
  120. /* Minimally parse an ECParameters buffer to and mbedtls_asn1_buf
  121. *
  122. * ECParameters ::= CHOICE {
  123. * namedCurve OBJECT IDENTIFIER
  124. * specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
  125. * -- implicitCurve NULL
  126. * }
  127. */
  128. static int pk_get_ecparams( unsigned char **p, const unsigned char *end,
  129. mbedtls_asn1_buf *params )
  130. {
  131. int ret;
  132. /* Tag may be either OID or SEQUENCE */
  133. params->tag = **p;
  134. if( params->tag != MBEDTLS_ASN1_OID
  135. #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
  136. && params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE )
  137. #endif
  138. )
  139. {
  140. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  141. MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
  142. }
  143. if( ( ret = mbedtls_asn1_get_tag( p, end, &params->len, params->tag ) ) != 0 )
  144. {
  145. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  146. }
  147. params->p = *p;
  148. *p += params->len;
  149. if( *p != end )
  150. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  151. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  152. return( 0 );
  153. }
  154. #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
  155. /*
  156. * Parse a SpecifiedECDomain (SEC 1 C.2) and (mostly) fill the group with it.
  157. * WARNING: the resulting group should only be used with
  158. * pk_group_id_from_specified(), since its base point may not be set correctly
  159. * if it was encoded compressed.
  160. *
  161. * SpecifiedECDomain ::= SEQUENCE {
  162. * version SpecifiedECDomainVersion(ecdpVer1 | ecdpVer2 | ecdpVer3, ...),
  163. * fieldID FieldID {{FieldTypes}},
  164. * curve Curve,
  165. * base ECPoint,
  166. * order INTEGER,
  167. * cofactor INTEGER OPTIONAL,
  168. * hash HashAlgorithm OPTIONAL,
  169. * ...
  170. * }
  171. *
  172. * We only support prime-field as field type, and ignore hash and cofactor.
  173. */
  174. static int pk_group_from_specified( const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp )
  175. {
  176. int ret;
  177. unsigned char *p = params->p;
  178. const unsigned char * const end = params->p + params->len;
  179. const unsigned char *end_field, *end_curve;
  180. size_t len;
  181. int ver;
  182. /* SpecifiedECDomainVersion ::= INTEGER { 1, 2, 3 } */
  183. if( ( ret = mbedtls_asn1_get_int( &p, end, &ver ) ) != 0 )
  184. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  185. if( ver < 1 || ver > 3 )
  186. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  187. /*
  188. * FieldID { FIELD-ID:IOSet } ::= SEQUENCE { -- Finite field
  189. * fieldType FIELD-ID.&id({IOSet}),
  190. * parameters FIELD-ID.&Type({IOSet}{@fieldType})
  191. * }
  192. */
  193. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  194. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  195. return( ret );
  196. end_field = p + len;
  197. /*
  198. * FIELD-ID ::= TYPE-IDENTIFIER
  199. * FieldTypes FIELD-ID ::= {
  200. * { Prime-p IDENTIFIED BY prime-field } |
  201. * { Characteristic-two IDENTIFIED BY characteristic-two-field }
  202. * }
  203. * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
  204. */
  205. if( ( ret = mbedtls_asn1_get_tag( &p, end_field, &len, MBEDTLS_ASN1_OID ) ) != 0 )
  206. return( ret );
  207. if( len != MBEDTLS_OID_SIZE( MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD ) ||
  208. memcmp( p, MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD, len ) != 0 )
  209. {
  210. return( MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE );
  211. }
  212. p += len;
  213. /* Prime-p ::= INTEGER -- Field of size p. */
  214. if( ( ret = mbedtls_asn1_get_mpi( &p, end_field, &grp->P ) ) != 0 )
  215. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  216. grp->pbits = mbedtls_mpi_bitlen( &grp->P );
  217. if( p != end_field )
  218. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  219. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  220. /*
  221. * Curve ::= SEQUENCE {
  222. * a FieldElement,
  223. * b FieldElement,
  224. * seed BIT STRING OPTIONAL
  225. * -- Shall be present if used in SpecifiedECDomain
  226. * -- with version equal to ecdpVer2 or ecdpVer3
  227. * }
  228. */
  229. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  230. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  231. return( ret );
  232. end_curve = p + len;
  233. /*
  234. * FieldElement ::= OCTET STRING
  235. * containing an integer in the case of a prime field
  236. */
  237. if( ( ret = mbedtls_asn1_get_tag( &p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ||
  238. ( ret = mbedtls_mpi_read_binary( &grp->A, p, len ) ) != 0 )
  239. {
  240. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  241. }
  242. p += len;
  243. if( ( ret = mbedtls_asn1_get_tag( &p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ||
  244. ( ret = mbedtls_mpi_read_binary( &grp->B, p, len ) ) != 0 )
  245. {
  246. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  247. }
  248. p += len;
  249. /* Ignore seed BIT STRING OPTIONAL */
  250. if( ( ret = mbedtls_asn1_get_tag( &p, end_curve, &len, MBEDTLS_ASN1_BIT_STRING ) ) == 0 )
  251. p += len;
  252. if( p != end_curve )
  253. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  254. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  255. /*
  256. * ECPoint ::= OCTET STRING
  257. */
  258. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
  259. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  260. if( ( ret = mbedtls_ecp_point_read_binary( grp, &grp->G,
  261. ( const unsigned char *) p, len ) ) != 0 )
  262. {
  263. /*
  264. * If we can't read the point because it's compressed, cheat by
  265. * reading only the X coordinate and the parity bit of Y.
  266. */
  267. if( ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ||
  268. ( p[0] != 0x02 && p[0] != 0x03 ) ||
  269. len != mbedtls_mpi_size( &grp->P ) + 1 ||
  270. mbedtls_mpi_read_binary( &grp->G.X, p + 1, len - 1 ) != 0 ||
  271. mbedtls_mpi_lset( &grp->G.Y, p[0] - 2 ) != 0 ||
  272. mbedtls_mpi_lset( &grp->G.Z, 1 ) != 0 )
  273. {
  274. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  275. }
  276. }
  277. p += len;
  278. /*
  279. * order INTEGER
  280. */
  281. if( ( ret = mbedtls_asn1_get_mpi( &p, end, &grp->N ) ) != 0 )
  282. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  283. grp->nbits = mbedtls_mpi_bitlen( &grp->N );
  284. /*
  285. * Allow optional elements by purposefully not enforcing p == end here.
  286. */
  287. return( 0 );
  288. }
  289. /*
  290. * Find the group id associated with an (almost filled) group as generated by
  291. * pk_group_from_specified(), or return an error if unknown.
  292. */
  293. static int pk_group_id_from_group( const mbedtls_ecp_group *grp, mbedtls_ecp_group_id *grp_id )
  294. {
  295. int ret = 0;
  296. mbedtls_ecp_group ref;
  297. const mbedtls_ecp_group_id *id;
  298. mbedtls_ecp_group_init( &ref );
  299. for( id = mbedtls_ecp_grp_id_list(); *id != MBEDTLS_ECP_DP_NONE; id++ )
  300. {
  301. /* Load the group associated to that id */
  302. mbedtls_ecp_group_free( &ref );
  303. MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ref, *id ) );
  304. /* Compare to the group we were given, starting with easy tests */
  305. if( grp->pbits == ref.pbits && grp->nbits == ref.nbits &&
  306. mbedtls_mpi_cmp_mpi( &grp->P, &ref.P ) == 0 &&
  307. mbedtls_mpi_cmp_mpi( &grp->A, &ref.A ) == 0 &&
  308. mbedtls_mpi_cmp_mpi( &grp->B, &ref.B ) == 0 &&
  309. mbedtls_mpi_cmp_mpi( &grp->N, &ref.N ) == 0 &&
  310. mbedtls_mpi_cmp_mpi( &grp->G.X, &ref.G.X ) == 0 &&
  311. mbedtls_mpi_cmp_mpi( &grp->G.Z, &ref.G.Z ) == 0 &&
  312. /* For Y we may only know the parity bit, so compare only that */
  313. mbedtls_mpi_get_bit( &grp->G.Y, 0 ) == mbedtls_mpi_get_bit( &ref.G.Y, 0 ) )
  314. {
  315. break;
  316. }
  317. }
  318. cleanup:
  319. mbedtls_ecp_group_free( &ref );
  320. *grp_id = *id;
  321. if( ret == 0 && *id == MBEDTLS_ECP_DP_NONE )
  322. ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
  323. return( ret );
  324. }
  325. /*
  326. * Parse a SpecifiedECDomain (SEC 1 C.2) and find the associated group ID
  327. */
  328. static int pk_group_id_from_specified( const mbedtls_asn1_buf *params,
  329. mbedtls_ecp_group_id *grp_id )
  330. {
  331. int ret;
  332. mbedtls_ecp_group grp;
  333. mbedtls_ecp_group_init( &grp );
  334. if( ( ret = pk_group_from_specified( params, &grp ) ) != 0 )
  335. goto cleanup;
  336. ret = pk_group_id_from_group( &grp, grp_id );
  337. cleanup:
  338. mbedtls_ecp_group_free( &grp );
  339. return( ret );
  340. }
  341. #endif /* MBEDTLS_PK_PARSE_EC_EXTENDED */
  342. /*
  343. * Use EC parameters to initialise an EC group
  344. *
  345. * ECParameters ::= CHOICE {
  346. * namedCurve OBJECT IDENTIFIER
  347. * specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
  348. * -- implicitCurve NULL
  349. */
  350. static int pk_use_ecparams( const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp )
  351. {
  352. int ret;
  353. mbedtls_ecp_group_id grp_id;
  354. if( params->tag == MBEDTLS_ASN1_OID )
  355. {
  356. if( mbedtls_oid_get_ec_grp( params, &grp_id ) != 0 )
  357. return( MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE );
  358. }
  359. else
  360. {
  361. #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
  362. if( ( ret = pk_group_id_from_specified( params, &grp_id ) ) != 0 )
  363. return( ret );
  364. #else
  365. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  366. #endif
  367. }
  368. /*
  369. * grp may already be initilialized; if so, make sure IDs match
  370. */
  371. if( grp->id != MBEDTLS_ECP_DP_NONE && grp->id != grp_id )
  372. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  373. if( ( ret = mbedtls_ecp_group_load( grp, grp_id ) ) != 0 )
  374. return( ret );
  375. return( 0 );
  376. }
  377. /*
  378. * EC public key is an EC point
  379. *
  380. * The caller is responsible for clearing the structure upon failure if
  381. * desired. Take care to pass along the possible ECP_FEATURE_UNAVAILABLE
  382. * return code of mbedtls_ecp_point_read_binary() and leave p in a usable state.
  383. */
  384. static int pk_get_ecpubkey( unsigned char **p, const unsigned char *end,
  385. mbedtls_ecp_keypair *key )
  386. {
  387. int ret;
  388. if( ( ret = mbedtls_ecp_point_read_binary( &key->grp, &key->Q,
  389. (const unsigned char *) *p, end - *p ) ) == 0 )
  390. {
  391. ret = mbedtls_ecp_check_pubkey( &key->grp, &key->Q );
  392. }
  393. /*
  394. * We know mbedtls_ecp_point_read_binary consumed all bytes or failed
  395. */
  396. *p = (unsigned char *) end;
  397. return( ret );
  398. }
  399. #endif /* MBEDTLS_ECP_C */
  400. #if defined(MBEDTLS_RSA_C)
  401. /*
  402. * RSAPublicKey ::= SEQUENCE {
  403. * modulus INTEGER, -- n
  404. * publicExponent INTEGER -- e
  405. * }
  406. */
  407. static int pk_get_rsapubkey( unsigned char **p,
  408. const unsigned char *end,
  409. mbedtls_rsa_context *rsa )
  410. {
  411. int ret;
  412. size_t len;
  413. if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
  414. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  415. return( MBEDTLS_ERR_PK_INVALID_PUBKEY + ret );
  416. if( *p + len != end )
  417. return( MBEDTLS_ERR_PK_INVALID_PUBKEY +
  418. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  419. if( ( ret = mbedtls_asn1_get_mpi( p, end, &rsa->N ) ) != 0 ||
  420. ( ret = mbedtls_asn1_get_mpi( p, end, &rsa->E ) ) != 0 )
  421. return( MBEDTLS_ERR_PK_INVALID_PUBKEY + ret );
  422. if( *p != end )
  423. return( MBEDTLS_ERR_PK_INVALID_PUBKEY +
  424. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  425. if( ( ret = mbedtls_rsa_check_pubkey( rsa ) ) != 0 )
  426. return( MBEDTLS_ERR_PK_INVALID_PUBKEY );
  427. rsa->len = mbedtls_mpi_size( &rsa->N );
  428. return( 0 );
  429. }
  430. #endif /* MBEDTLS_RSA_C */
  431. /* Get a PK algorithm identifier
  432. *
  433. * AlgorithmIdentifier ::= SEQUENCE {
  434. * algorithm OBJECT IDENTIFIER,
  435. * parameters ANY DEFINED BY algorithm OPTIONAL }
  436. */
  437. static int pk_get_pk_alg( unsigned char **p,
  438. const unsigned char *end,
  439. mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params )
  440. {
  441. int ret;
  442. mbedtls_asn1_buf alg_oid;
  443. memset( params, 0, sizeof(mbedtls_asn1_buf) );
  444. if( ( ret = mbedtls_asn1_get_alg( p, end, &alg_oid, params ) ) != 0 )
  445. return( MBEDTLS_ERR_PK_INVALID_ALG + ret );
  446. if( mbedtls_oid_get_pk_alg( &alg_oid, pk_alg ) != 0 )
  447. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  448. /*
  449. * No parameters with RSA (only for EC)
  450. */
  451. if( *pk_alg == MBEDTLS_PK_RSA &&
  452. ( ( params->tag != MBEDTLS_ASN1_NULL && params->tag != 0 ) ||
  453. params->len != 0 ) )
  454. {
  455. return( MBEDTLS_ERR_PK_INVALID_ALG );
  456. }
  457. return( 0 );
  458. }
  459. /*
  460. * SubjectPublicKeyInfo ::= SEQUENCE {
  461. * algorithm AlgorithmIdentifier,
  462. * subjectPublicKey BIT STRING }
  463. */
  464. int mbedtls_pk_parse_subpubkey( unsigned char **p, const unsigned char *end,
  465. mbedtls_pk_context *pk )
  466. {
  467. int ret;
  468. size_t len;
  469. mbedtls_asn1_buf alg_params;
  470. mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
  471. const mbedtls_pk_info_t *pk_info;
  472. if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
  473. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  474. {
  475. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  476. }
  477. end = *p + len;
  478. if( ( ret = pk_get_pk_alg( p, end, &pk_alg, &alg_params ) ) != 0 )
  479. return( ret );
  480. if( ( ret = mbedtls_asn1_get_bitstring_null( p, end, &len ) ) != 0 )
  481. return( MBEDTLS_ERR_PK_INVALID_PUBKEY + ret );
  482. if( *p + len != end )
  483. return( MBEDTLS_ERR_PK_INVALID_PUBKEY +
  484. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  485. if( ( pk_info = mbedtls_pk_info_from_type( pk_alg ) ) == NULL )
  486. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  487. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 )
  488. return( ret );
  489. #if defined(MBEDTLS_RSA_C)
  490. if( pk_alg == MBEDTLS_PK_RSA )
  491. {
  492. ret = pk_get_rsapubkey( p, end, mbedtls_pk_rsa( *pk ) );
  493. } else
  494. #endif /* MBEDTLS_RSA_C */
  495. #if defined(MBEDTLS_ECP_C)
  496. if( pk_alg == MBEDTLS_PK_ECKEY_DH || pk_alg == MBEDTLS_PK_ECKEY )
  497. {
  498. ret = pk_use_ecparams( &alg_params, &mbedtls_pk_ec( *pk )->grp );
  499. if( ret == 0 )
  500. ret = pk_get_ecpubkey( p, end, mbedtls_pk_ec( *pk ) );
  501. } else
  502. #endif /* MBEDTLS_ECP_C */
  503. ret = MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
  504. if( ret == 0 && *p != end )
  505. ret = MBEDTLS_ERR_PK_INVALID_PUBKEY
  506. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
  507. if( ret != 0 )
  508. mbedtls_pk_free( pk );
  509. return( ret );
  510. }
  511. #if defined(MBEDTLS_RSA_C)
  512. /*
  513. * Parse a PKCS#1 encoded private RSA key
  514. */
  515. static int pk_parse_key_pkcs1_der( mbedtls_rsa_context *rsa,
  516. const unsigned char *key,
  517. size_t keylen )
  518. {
  519. int ret;
  520. size_t len;
  521. unsigned char *p, *end;
  522. p = (unsigned char *) key;
  523. end = p + keylen;
  524. /*
  525. * This function parses the RSAPrivateKey (PKCS#1)
  526. *
  527. * RSAPrivateKey ::= SEQUENCE {
  528. * version Version,
  529. * modulus INTEGER, -- n
  530. * publicExponent INTEGER, -- e
  531. * privateExponent INTEGER, -- d
  532. * prime1 INTEGER, -- p
  533. * prime2 INTEGER, -- q
  534. * exponent1 INTEGER, -- d mod (p-1)
  535. * exponent2 INTEGER, -- d mod (q-1)
  536. * coefficient INTEGER, -- (inverse of q) mod p
  537. * otherPrimeInfos OtherPrimeInfos OPTIONAL
  538. * }
  539. */
  540. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  541. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  542. {
  543. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  544. }
  545. end = p + len;
  546. if( ( ret = mbedtls_asn1_get_int( &p, end, &rsa->ver ) ) != 0 )
  547. {
  548. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  549. }
  550. if( rsa->ver != 0 )
  551. {
  552. return( MBEDTLS_ERR_PK_KEY_INVALID_VERSION );
  553. }
  554. if( ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->N ) ) != 0 ||
  555. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->E ) ) != 0 ||
  556. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->D ) ) != 0 ||
  557. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->P ) ) != 0 ||
  558. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->Q ) ) != 0 ||
  559. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->DP ) ) != 0 ||
  560. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->DQ ) ) != 0 ||
  561. ( ret = mbedtls_asn1_get_mpi( &p, end, &rsa->QP ) ) != 0 )
  562. {
  563. mbedtls_rsa_free( rsa );
  564. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  565. }
  566. rsa->len = mbedtls_mpi_size( &rsa->N );
  567. if( p != end )
  568. {
  569. mbedtls_rsa_free( rsa );
  570. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  571. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  572. }
  573. if( ( ret = mbedtls_rsa_check_privkey( rsa ) ) != 0 )
  574. {
  575. mbedtls_rsa_free( rsa );
  576. return( ret );
  577. }
  578. return( 0 );
  579. }
  580. #endif /* MBEDTLS_RSA_C */
  581. #if defined(MBEDTLS_ECP_C)
  582. /*
  583. * Parse a SEC1 encoded private EC key
  584. */
  585. static int pk_parse_key_sec1_der( mbedtls_ecp_keypair *eck,
  586. const unsigned char *key,
  587. size_t keylen )
  588. {
  589. int ret;
  590. int version, pubkey_done;
  591. size_t len;
  592. mbedtls_asn1_buf params;
  593. unsigned char *p = (unsigned char *) key;
  594. unsigned char *end = p + keylen;
  595. unsigned char *end2;
  596. /*
  597. * RFC 5915, or SEC1 Appendix C.4
  598. *
  599. * ECPrivateKey ::= SEQUENCE {
  600. * version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
  601. * privateKey OCTET STRING,
  602. * parameters [0] ECParameters {{ NamedCurve }} OPTIONAL,
  603. * publicKey [1] BIT STRING OPTIONAL
  604. * }
  605. */
  606. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  607. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  608. {
  609. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  610. }
  611. end = p + len;
  612. if( ( ret = mbedtls_asn1_get_int( &p, end, &version ) ) != 0 )
  613. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  614. if( version != 1 )
  615. return( MBEDTLS_ERR_PK_KEY_INVALID_VERSION );
  616. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
  617. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  618. if( ( ret = mbedtls_mpi_read_binary( &eck->d, p, len ) ) != 0 )
  619. {
  620. mbedtls_ecp_keypair_free( eck );
  621. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  622. }
  623. p += len;
  624. pubkey_done = 0;
  625. if( p != end )
  626. {
  627. /*
  628. * Is 'parameters' present?
  629. */
  630. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  631. MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 0 ) ) == 0 )
  632. {
  633. if( ( ret = pk_get_ecparams( &p, p + len, &params) ) != 0 ||
  634. ( ret = pk_use_ecparams( &params, &eck->grp ) ) != 0 )
  635. {
  636. mbedtls_ecp_keypair_free( eck );
  637. return( ret );
  638. }
  639. }
  640. else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG )
  641. {
  642. mbedtls_ecp_keypair_free( eck );
  643. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  644. }
  645. /*
  646. * Is 'publickey' present? If not, or if we can't read it (eg because it
  647. * is compressed), create it from the private key.
  648. */
  649. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  650. MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 1 ) ) == 0 )
  651. {
  652. end2 = p + len;
  653. if( ( ret = mbedtls_asn1_get_bitstring_null( &p, end2, &len ) ) != 0 )
  654. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  655. if( p + len != end2 )
  656. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  657. MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
  658. if( ( ret = pk_get_ecpubkey( &p, end2, eck ) ) == 0 )
  659. pubkey_done = 1;
  660. else
  661. {
  662. /*
  663. * The only acceptable failure mode of pk_get_ecpubkey() above
  664. * is if the point format is not recognized.
  665. */
  666. if( ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE )
  667. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  668. }
  669. }
  670. else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG )
  671. {
  672. mbedtls_ecp_keypair_free( eck );
  673. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  674. }
  675. }
  676. if( ! pubkey_done &&
  677. ( ret = mbedtls_ecp_mul( &eck->grp, &eck->Q, &eck->d, &eck->grp.G,
  678. NULL, NULL ) ) != 0 )
  679. {
  680. mbedtls_ecp_keypair_free( eck );
  681. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  682. }
  683. if( ( ret = mbedtls_ecp_check_privkey( &eck->grp, &eck->d ) ) != 0 )
  684. {
  685. mbedtls_ecp_keypair_free( eck );
  686. return( ret );
  687. }
  688. return( 0 );
  689. }
  690. #endif /* MBEDTLS_ECP_C */
  691. /*
  692. * Parse an unencrypted PKCS#8 encoded private key
  693. */
  694. static int pk_parse_key_pkcs8_unencrypted_der(
  695. mbedtls_pk_context *pk,
  696. const unsigned char* key,
  697. size_t keylen )
  698. {
  699. int ret, version;
  700. size_t len;
  701. mbedtls_asn1_buf params;
  702. unsigned char *p = (unsigned char *) key;
  703. unsigned char *end = p + keylen;
  704. mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
  705. const mbedtls_pk_info_t *pk_info;
  706. /*
  707. * This function parses the PrivatKeyInfo object (PKCS#8 v1.2 = RFC 5208)
  708. *
  709. * PrivateKeyInfo ::= SEQUENCE {
  710. * version Version,
  711. * privateKeyAlgorithm PrivateKeyAlgorithmIdentifier,
  712. * privateKey PrivateKey,
  713. * attributes [0] IMPLICIT Attributes OPTIONAL }
  714. *
  715. * Version ::= INTEGER
  716. * PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
  717. * PrivateKey ::= OCTET STRING
  718. *
  719. * The PrivateKey OCTET STRING is a SEC1 ECPrivateKey
  720. */
  721. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  722. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  723. {
  724. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  725. }
  726. end = p + len;
  727. if( ( ret = mbedtls_asn1_get_int( &p, end, &version ) ) != 0 )
  728. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  729. if( version != 0 )
  730. return( MBEDTLS_ERR_PK_KEY_INVALID_VERSION + ret );
  731. if( ( ret = pk_get_pk_alg( &p, end, &pk_alg, &params ) ) != 0 )
  732. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  733. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
  734. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  735. if( len < 1 )
  736. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +
  737. MBEDTLS_ERR_ASN1_OUT_OF_DATA );
  738. if( ( pk_info = mbedtls_pk_info_from_type( pk_alg ) ) == NULL )
  739. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  740. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 )
  741. return( ret );
  742. #if defined(MBEDTLS_RSA_C)
  743. if( pk_alg == MBEDTLS_PK_RSA )
  744. {
  745. if( ( ret = pk_parse_key_pkcs1_der( mbedtls_pk_rsa( *pk ), p, len ) ) != 0 )
  746. {
  747. mbedtls_pk_free( pk );
  748. return( ret );
  749. }
  750. } else
  751. #endif /* MBEDTLS_RSA_C */
  752. #if defined(MBEDTLS_ECP_C)
  753. if( pk_alg == MBEDTLS_PK_ECKEY || pk_alg == MBEDTLS_PK_ECKEY_DH )
  754. {
  755. if( ( ret = pk_use_ecparams( &params, &mbedtls_pk_ec( *pk )->grp ) ) != 0 ||
  756. ( ret = pk_parse_key_sec1_der( mbedtls_pk_ec( *pk ), p, len ) ) != 0 )
  757. {
  758. mbedtls_pk_free( pk );
  759. return( ret );
  760. }
  761. } else
  762. #endif /* MBEDTLS_ECP_C */
  763. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  764. return( 0 );
  765. }
  766. /*
  767. * Parse an encrypted PKCS#8 encoded private key
  768. */
  769. #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
  770. static int pk_parse_key_pkcs8_encrypted_der(
  771. mbedtls_pk_context *pk,
  772. const unsigned char *key, size_t keylen,
  773. const unsigned char *pwd, size_t pwdlen )
  774. {
  775. int ret, decrypted = 0;
  776. size_t len;
  777. unsigned char buf[2048];
  778. unsigned char *p, *end;
  779. mbedtls_asn1_buf pbe_alg_oid, pbe_params;
  780. #if defined(MBEDTLS_PKCS12_C)
  781. mbedtls_cipher_type_t cipher_alg;
  782. mbedtls_md_type_t md_alg;
  783. #endif
  784. memset( buf, 0, sizeof( buf ) );
  785. p = (unsigned char *) key;
  786. end = p + keylen;
  787. if( pwdlen == 0 )
  788. return( MBEDTLS_ERR_PK_PASSWORD_REQUIRED );
  789. /*
  790. * This function parses the EncryptedPrivatKeyInfo object (PKCS#8)
  791. *
  792. * EncryptedPrivateKeyInfo ::= SEQUENCE {
  793. * encryptionAlgorithm EncryptionAlgorithmIdentifier,
  794. * encryptedData EncryptedData
  795. * }
  796. *
  797. * EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  798. *
  799. * EncryptedData ::= OCTET STRING
  800. *
  801. * The EncryptedData OCTET STRING is a PKCS#8 PrivateKeyInfo
  802. */
  803. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
  804. MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
  805. {
  806. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  807. }
  808. end = p + len;
  809. if( ( ret = mbedtls_asn1_get_alg( &p, end, &pbe_alg_oid, &pbe_params ) ) != 0 )
  810. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  811. if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 )
  812. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + ret );
  813. if( len > sizeof( buf ) )
  814. return( MBEDTLS_ERR_PK_BAD_INPUT_DATA );
  815. /*
  816. * Decrypt EncryptedData with appropriate PDE
  817. */
  818. #if defined(MBEDTLS_PKCS12_C)
  819. if( mbedtls_oid_get_pkcs12_pbe_alg( &pbe_alg_oid, &md_alg, &cipher_alg ) == 0 )
  820. {
  821. if( ( ret = mbedtls_pkcs12_pbe( &pbe_params, MBEDTLS_PKCS12_PBE_DECRYPT,
  822. cipher_alg, md_alg,
  823. pwd, pwdlen, p, len, buf ) ) != 0 )
  824. {
  825. if( ret == MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH )
  826. return( MBEDTLS_ERR_PK_PASSWORD_MISMATCH );
  827. return( ret );
  828. }
  829. decrypted = 1;
  830. }
  831. else if( MBEDTLS_OID_CMP( MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_128, &pbe_alg_oid ) == 0 )
  832. {
  833. if( ( ret = mbedtls_pkcs12_pbe_sha1_rc4_128( &pbe_params,
  834. MBEDTLS_PKCS12_PBE_DECRYPT,
  835. pwd, pwdlen,
  836. p, len, buf ) ) != 0 )
  837. {
  838. return( ret );
  839. }
  840. // Best guess for password mismatch when using RC4. If first tag is
  841. // not MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE
  842. //
  843. if( *buf != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) )
  844. return( MBEDTLS_ERR_PK_PASSWORD_MISMATCH );
  845. decrypted = 1;
  846. }
  847. else
  848. #endif /* MBEDTLS_PKCS12_C */
  849. #if defined(MBEDTLS_PKCS5_C)
  850. if( MBEDTLS_OID_CMP( MBEDTLS_OID_PKCS5_PBES2, &pbe_alg_oid ) == 0 )
  851. {
  852. if( ( ret = mbedtls_pkcs5_pbes2( &pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen,
  853. p, len, buf ) ) != 0 )
  854. {
  855. if( ret == MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH )
  856. return( MBEDTLS_ERR_PK_PASSWORD_MISMATCH );
  857. return( ret );
  858. }
  859. decrypted = 1;
  860. }
  861. else
  862. #endif /* MBEDTLS_PKCS5_C */
  863. {
  864. ((void) pwd);
  865. }
  866. if( decrypted == 0 )
  867. return( MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE );
  868. return( pk_parse_key_pkcs8_unencrypted_der( pk, buf, len ) );
  869. }
  870. #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
  871. /*
  872. * Parse a private key
  873. */
  874. int mbedtls_pk_parse_key( mbedtls_pk_context *pk,
  875. const unsigned char *key, size_t keylen,
  876. const unsigned char *pwd, size_t pwdlen )
  877. {
  878. int ret;
  879. const mbedtls_pk_info_t *pk_info;
  880. #if defined(MBEDTLS_PEM_PARSE_C)
  881. size_t len;
  882. mbedtls_pem_context pem;
  883. mbedtls_pem_init( &pem );
  884. #if defined(MBEDTLS_RSA_C)
  885. /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
  886. if( keylen == 0 || key[keylen - 1] != '\0' )
  887. ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
  888. else
  889. ret = mbedtls_pem_read_buffer( &pem,
  890. "-----BEGIN RSA PRIVATE KEY-----",
  891. "-----END RSA PRIVATE KEY-----",
  892. key, pwd, pwdlen, &len );
  893. if( ret == 0 )
  894. {
  895. if( ( pk_info = mbedtls_pk_info_from_type( MBEDTLS_PK_RSA ) ) == NULL )
  896. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  897. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 ||
  898. ( ret = pk_parse_key_pkcs1_der( mbedtls_pk_rsa( *pk ),
  899. pem.buf, pem.buflen ) ) != 0 )
  900. {
  901. mbedtls_pk_free( pk );
  902. }
  903. mbedtls_pem_free( &pem );
  904. return( ret );
  905. }
  906. else if( ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH )
  907. return( MBEDTLS_ERR_PK_PASSWORD_MISMATCH );
  908. else if( ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED )
  909. return( MBEDTLS_ERR_PK_PASSWORD_REQUIRED );
  910. else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT )
  911. return( ret );
  912. #endif /* MBEDTLS_RSA_C */
  913. #if defined(MBEDTLS_ECP_C)
  914. /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
  915. if( keylen == 0 || key[keylen - 1] != '\0' )
  916. ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
  917. else
  918. ret = mbedtls_pem_read_buffer( &pem,
  919. "-----BEGIN EC PRIVATE KEY-----",
  920. "-----END EC PRIVATE KEY-----",
  921. key, pwd, pwdlen, &len );
  922. if( ret == 0 )
  923. {
  924. if( ( pk_info = mbedtls_pk_info_from_type( MBEDTLS_PK_ECKEY ) ) == NULL )
  925. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  926. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 ||
  927. ( ret = pk_parse_key_sec1_der( mbedtls_pk_ec( *pk ),
  928. pem.buf, pem.buflen ) ) != 0 )
  929. {
  930. mbedtls_pk_free( pk );
  931. }
  932. mbedtls_pem_free( &pem );
  933. return( ret );
  934. }
  935. else if( ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH )
  936. return( MBEDTLS_ERR_PK_PASSWORD_MISMATCH );
  937. else if( ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED )
  938. return( MBEDTLS_ERR_PK_PASSWORD_REQUIRED );
  939. else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT )
  940. return( ret );
  941. #endif /* MBEDTLS_ECP_C */
  942. /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
  943. if( keylen == 0 || key[keylen - 1] != '\0' )
  944. ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
  945. else
  946. ret = mbedtls_pem_read_buffer( &pem,
  947. "-----BEGIN PRIVATE KEY-----",
  948. "-----END PRIVATE KEY-----",
  949. key, NULL, 0, &len );
  950. if( ret == 0 )
  951. {
  952. if( ( ret = pk_parse_key_pkcs8_unencrypted_der( pk,
  953. pem.buf, pem.buflen ) ) != 0 )
  954. {
  955. mbedtls_pk_free( pk );
  956. }
  957. mbedtls_pem_free( &pem );
  958. return( ret );
  959. }
  960. else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT )
  961. return( ret );
  962. #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
  963. /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
  964. if( keylen == 0 || key[keylen - 1] != '\0' )
  965. ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
  966. else
  967. ret = mbedtls_pem_read_buffer( &pem,
  968. "-----BEGIN ENCRYPTED PRIVATE KEY-----",
  969. "-----END ENCRYPTED PRIVATE KEY-----",
  970. key, NULL, 0, &len );
  971. if( ret == 0 )
  972. {
  973. if( ( ret = pk_parse_key_pkcs8_encrypted_der( pk,
  974. pem.buf, pem.buflen,
  975. pwd, pwdlen ) ) != 0 )
  976. {
  977. mbedtls_pk_free( pk );
  978. }
  979. mbedtls_pem_free( &pem );
  980. return( ret );
  981. }
  982. else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT )
  983. return( ret );
  984. #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
  985. #else
  986. ((void) ret);
  987. ((void) pwd);
  988. ((void) pwdlen);
  989. #endif /* MBEDTLS_PEM_PARSE_C */
  990. /*
  991. * At this point we only know it's not a PEM formatted key. Could be any
  992. * of the known DER encoded private key formats
  993. *
  994. * We try the different DER format parsers to see if one passes without
  995. * error
  996. */
  997. #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
  998. if( ( ret = pk_parse_key_pkcs8_encrypted_der( pk, key, keylen,
  999. pwd, pwdlen ) ) == 0 )
  1000. {
  1001. return( 0 );
  1002. }
  1003. mbedtls_pk_free( pk );
  1004. if( ret == MBEDTLS_ERR_PK_PASSWORD_MISMATCH )
  1005. {
  1006. return( ret );
  1007. }
  1008. #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
  1009. if( ( ret = pk_parse_key_pkcs8_unencrypted_der( pk, key, keylen ) ) == 0 )
  1010. return( 0 );
  1011. mbedtls_pk_free( pk );
  1012. #if defined(MBEDTLS_RSA_C)
  1013. if( ( pk_info = mbedtls_pk_info_from_type( MBEDTLS_PK_RSA ) ) == NULL )
  1014. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  1015. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 ||
  1016. ( ret = pk_parse_key_pkcs1_der( mbedtls_pk_rsa( *pk ), key, keylen ) ) == 0 )
  1017. {
  1018. return( 0 );
  1019. }
  1020. mbedtls_pk_free( pk );
  1021. #endif /* MBEDTLS_RSA_C */
  1022. #if defined(MBEDTLS_ECP_C)
  1023. if( ( pk_info = mbedtls_pk_info_from_type( MBEDTLS_PK_ECKEY ) ) == NULL )
  1024. return( MBEDTLS_ERR_PK_UNKNOWN_PK_ALG );
  1025. if( ( ret = mbedtls_pk_setup( pk, pk_info ) ) != 0 ||
  1026. ( ret = pk_parse_key_sec1_der( mbedtls_pk_ec( *pk ), key, keylen ) ) == 0 )
  1027. {
  1028. return( 0 );
  1029. }
  1030. mbedtls_pk_free( pk );
  1031. #endif /* MBEDTLS_ECP_C */
  1032. return( MBEDTLS_ERR_PK_KEY_INVALID_FORMAT );
  1033. }
  1034. /*
  1035. * Parse a public key
  1036. */
  1037. int mbedtls_pk_parse_public_key( mbedtls_pk_context *ctx,
  1038. const unsigned char *key, size_t keylen )
  1039. {
  1040. int ret;
  1041. unsigned char *p;
  1042. #if defined(MBEDTLS_PEM_PARSE_C)
  1043. size_t len;
  1044. mbedtls_pem_context pem;
  1045. mbedtls_pem_init( &pem );
  1046. /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
  1047. if( keylen == 0 || key[keylen - 1] != '\0' )
  1048. ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
  1049. else
  1050. ret = mbedtls_pem_read_buffer( &pem,
  1051. "-----BEGIN PUBLIC KEY-----",
  1052. "-----END PUBLIC KEY-----",
  1053. key, NULL, 0, &len );
  1054. if( ret == 0 )
  1055. {
  1056. /*
  1057. * Was PEM encoded
  1058. */
  1059. key = pem.buf;
  1060. keylen = pem.buflen;
  1061. }
  1062. else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT )
  1063. {
  1064. mbedtls_pem_free( &pem );
  1065. return( ret );
  1066. }
  1067. #endif /* MBEDTLS_PEM_PARSE_C */
  1068. p = (unsigned char *) key;
  1069. ret = mbedtls_pk_parse_subpubkey( &p, p + keylen, ctx );
  1070. #if defined(MBEDTLS_PEM_PARSE_C)
  1071. mbedtls_pem_free( &pem );
  1072. #endif
  1073. return( ret );
  1074. }
  1075. #endif /* MBEDTLS_PK_PARSE_C */