#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
#include <wolfssl/internal.h>
#ifndef WC_NO_RNG
#include <wolfssl/wolfcrypt/random.h>
#endif
#if !defined(WOLFSSL_PK_INCLUDED)
#ifndef WOLFSSL_IGNORE_FILE_WARN
#warning pk.c does not need to be compiled separately from ssl.c
#endif
#else
#ifndef NO_RSA
#include <wolfssl/wolfcrypt/rsa.h>
#endif
#define ASN_LEN_SIZE(l) \
(((l) < 128) ? 1 : (((l) < 256) ? 2 : 3))
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
#ifndef NO_ASN
#if (!defined(NO_FILESYSTEM) && (defined(OPENSSL_EXTRA) || \
defined(OPENSSL_ALL))) || (!defined(NO_BIO) && defined(OPENSSL_EXTRA))
static int pem_mem_to_der(const char* pem, int pemSz, wc_pem_password_cb* cb,
void* pass, int keyType, int* keyFormat, DerBuffer** der)
{
WC_DECLARE_VAR(info, EncryptedInfo, 1, 0);
wc_pem_password_cb* localCb = NULL;
int ret = 0;
if (cb != NULL) {
localCb = cb;
}
else if (pass != NULL) {
localCb = wolfSSL_PEM_def_callback;
}
#ifdef WOLFSSL_SMALL_STACK
info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
DYNAMIC_TYPE_ENCRYPTEDINFO);
if (info == NULL) {
WOLFSSL_ERROR_MSG("Error getting memory for EncryptedInfo structure");
ret = MEMORY_E;
}
#endif
if (ret == 0) {
XMEMSET(info, 0, sizeof(EncryptedInfo));
info->passwd_cb = localCb;
info->passwd_userdata = pass;
ret = PemToDer((const unsigned char *)pem, pemSz, keyType, der, NULL,
info, keyFormat);
if (ret < 0) {
WOLFSSL_ERROR_MSG("Bad PEM To DER");
}
}
if (ret >= 0) {
ret = (int)info->consumed;
}
WC_FREE_VAR_EX(info, NULL, DYNAMIC_TYPE_ENCRYPTEDINFO);
return ret;
}
#endif
#if defined(OPENSSL_EXTRA) && (!defined(NO_RSA) || !defined(WOLFCRYPT_ONLY))
#ifndef NO_BIO
static int pem_read_bio_key(WOLFSSL_BIO* bio, wc_pem_password_cb* cb,
void* pass, int keyType, int* keyFormat, DerBuffer** der)
{
int ret;
char* mem = NULL;
int memSz;
int alloced = 0;
ret = wolfssl_read_bio(bio, &mem, &memSz, &alloced);
if (ret == 0) {
ret = pem_mem_to_der(mem, memSz, cb, pass, keyType, keyFormat, der);
if ((ret > 0) && ((memSz - ret) > 0) &&
(bio->type != WOLFSSL_BIO_FILE)) {
int res;
if (!alloced) {
char *mem_dup = (char *)XMALLOC((size_t)(memSz - ret),
NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (mem_dup != NULL) {
XMEMCPY(mem_dup, mem + ret, (size_t)(memSz - ret));
res = wolfSSL_BIO_write(bio, mem_dup, memSz - ret);
mem = mem_dup;
alloced = 1;
}
else
res = MEMORY_E;
}
else
res = wolfSSL_BIO_write(bio, mem + ret, memSz - ret);
if (res != memSz - ret) {
WOLFSSL_ERROR_MSG("Unable to write back excess data");
if (res < 0) {
ret = res;
}
else {
ret = MEMORY_E;
}
}
}
if (alloced) {
XFREE(mem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
}
}
return ret;
}
#endif
#if !defined(NO_FILESYSTEM)
static int pem_read_file_key(XFILE fp, wc_pem_password_cb* cb, void* pass,
int keyType, int* keyFormat, DerBuffer** der)
{
int ret;
char* mem = NULL;
int memSz;
ret = wolfssl_read_file(fp, &mem, &memSz);
if (ret == 0) {
ret = pem_mem_to_der(mem, memSz, cb, pass, keyType, keyFormat, der);
XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
}
return ret;
}
#endif
#endif
#if defined(OPENSSL_EXTRA) && ((!defined(NO_RSA) && defined(WOLFSSL_KEY_GEN)) \
|| !defined(WOLFCRYPT_ONLY))
static int der_to_pem_alloc(const unsigned char* der, int derSz, int type,
void* heap, byte** out, int* outSz)
{
int ret = 1;
int pemSz;
byte* pem = NULL;
(void)heap;
pemSz = wc_DerToPem(der, (word32)derSz, NULL, 0, type);
if (pemSz < 0) {
ret = 0;
}
if (ret == 1) {
pem = (byte*)XMALLOC((size_t)pemSz, heap, DYNAMIC_TYPE_TMP_BUFFER);
if (pem == NULL) {
ret = 0;
}
}
if ((ret == 1) && (wc_DerToPem(der, (word32)derSz, pem, (word32)pemSz,
type) < 0)) {
ret = 0;
XFREE(pem, heap, DYNAMIC_TYPE_TMP_BUFFER);
pem = NULL;
}
*out = pem;
*outSz = pemSz;
return ret;
}
#ifndef NO_BIO
static int der_write_to_bio_as_pem(const unsigned char* der, int derSz,
WOLFSSL_BIO* bio, int type)
{
int ret;
int pemSz;
byte* pem = NULL;
ret = der_to_pem_alloc(der, derSz, type, bio->heap, &pem, &pemSz);
if (ret == 1) {
int len = wolfSSL_BIO_write(bio, pem, pemSz);
if (len != pemSz) {
WOLFSSL_ERROR_MSG("Unable to write full PEM to BIO");
ret = 0;
}
}
XFREE(pem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
#endif
#endif
#if defined(OPENSSL_EXTRA) && \
((!defined(NO_RSA) && defined(WOLFSSL_KEY_GEN)) || \
(!defined(NO_DH) && defined(WOLFSSL_DH_EXTRA)) || \
(defined(HAVE_ECC) && defined(WOLFSSL_KEY_GEN)))
#if !defined(NO_FILESYSTEM)
static int der_write_to_file_as_pem(const unsigned char* der, int derSz,
XFILE fp, int type, void* heap)
{
int ret;
int pemSz;
byte* pem = NULL;
ret = der_to_pem_alloc(der, derSz, type, heap, &pem, &pemSz);
if (ret == 1) {
int len = (int)XFWRITE(pem, 1, (size_t)pemSz, fp);
if (len != pemSz) {
WOLFSSL_ERROR_MSG("Unable to write full PEM to BIO");
ret = 0;
}
}
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
#endif
#endif
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_KEY_GEN) && \
defined(WOLFSSL_PEM_TO_DER)
int EncryptDerKey(byte *der, int *derSz, const WOLFSSL_EVP_CIPHER* cipher,
unsigned char* passwd, int passwdSz, byte **cipherInfo, int maxDerSz,
int hashType)
{
int ret = 0;
int paddingSz = 0;
word32 idx;
word32 cipherInfoSz = 0;
WC_DECLARE_VAR(info, EncryptedInfo, 1, 0);
WOLFSSL_ENTER("EncryptDerKey");
if ((der == NULL) || (derSz == NULL) || (cipher == NULL) ||
(passwd == NULL) || (cipherInfo == NULL)) {
ret = BAD_FUNC_ARG;
}
#ifdef WOLFSSL_SMALL_STACK
if (ret == 0) {
info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
DYNAMIC_TYPE_ENCRYPTEDINFO);
if (info == NULL) {
WOLFSSL_MSG("malloc failed");
ret = MEMORY_E;
}
}
#endif
if (ret == 0) {
XMEMSET(info, 0, sizeof(EncryptedInfo));
XSTRNCPY(info->name, cipher, NAME_SZ - 1);
info->name[NAME_SZ - 1] = '\0';
ret = wc_EncryptedInfoGet(info, info->name);
if (ret != 0) {
WOLFSSL_MSG("unsupported cipher");
}
}
if (ret == 0) {
if (wolfSSL_RAND_bytes(info->iv, (int)info->ivSz) != 1) {
WOLFSSL_MSG("generate iv failed");
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 0) {
paddingSz = (int)info->ivSz - ((*derSz) % (int)info->ivSz);
if (maxDerSz < (*derSz) + paddingSz) {
WOLFSSL_MSG("not enough DER buffer allocated");
ret = BAD_FUNC_ARG;
}
}
if (ret == 0) {
XMEMSET(der + (*derSz), (byte)paddingSz, (size_t)paddingSz);
(*derSz) += (int)paddingSz;
ret = wc_BufferKeyEncrypt(info, der, (word32)*derSz, passwd, passwdSz,
hashType);
if (ret != 0) {
WOLFSSL_MSG("encrypt key failed");
}
}
if (ret == 0) {
cipherInfoSz = (word32)(2 * info->ivSz + XSTRLEN(info->name) + 2);
*cipherInfo = (byte*)XMALLOC(cipherInfoSz, NULL, DYNAMIC_TYPE_STRING);
if (*cipherInfo == NULL) {
WOLFSSL_MSG("malloc failed");
ret = MEMORY_E;
}
}
if (ret == 0) {
XSTRLCPY((char*)*cipherInfo, info->name, cipherInfoSz);
XSTRLCAT((char*)*cipherInfo, ",", cipherInfoSz);
idx = (word32)XSTRLEN((char*)*cipherInfo);
cipherInfoSz -= idx;
ret = Base16_Encode(info->iv, info->ivSz, *cipherInfo + idx,
&cipherInfoSz);
if (ret != 0) {
WOLFSSL_MSG("Base16_Encode failed");
XFREE(*cipherInfo, NULL, DYNAMIC_TYPE_STRING);
*cipherInfo = NULL;
}
}
WC_FREE_VAR_EX(info, NULL, DYNAMIC_TYPE_ENCRYPTEDINFO);
return ret == 0;
}
#endif
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_KEY_GEN) && \
(defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)) && \
(!defined(NO_RSA) || defined(HAVE_ECC))
static int der_to_enc_pem_alloc(unsigned char* der, int derSz,
const WOLFSSL_EVP_CIPHER *cipher, unsigned char *passwd, int passwdSz,
int type, void* heap, byte** out, int* outSz)
{
int ret = 1;
byte* tmp = NULL;
byte* cipherInfo = NULL;
int pemSz = 0;
int hashType = WC_HASH_TYPE_NONE;
#if !defined(NO_MD5)
hashType = WC_MD5;
#elif !defined(NO_SHA)
hashType = WC_SHA;
#endif
(void)heap;
if ((ret == 1) && (passwd != NULL) && (passwdSz > 0) && (cipher != NULL)) {
int blockSz = wolfSSL_EVP_CIPHER_block_size(cipher);
byte *tmpBuf;
#ifdef WOLFSSL_NO_REALLOC
tmpBuf = (byte*)XMALLOC((size_t)(derSz + blockSz), heap,
DYNAMIC_TYPE_TMP_BUFFER);
if (tmpBuf != NULL && der != NULL)
{
XMEMCPY(tmpBuf, der, (size_t)(derSz));
XFREE(der, heap, DYNAMIC_TYPE_TMP_BUFFER);
der = NULL;
}
#else
tmpBuf = (byte*)XREALLOC(der, (size_t)(derSz + blockSz), heap,
DYNAMIC_TYPE_TMP_BUFFER);
#endif
if (tmpBuf == NULL) {
WOLFSSL_ERROR_MSG("Extending DER buffer failed");
ret = 0;
}
else {
der = tmpBuf;
ret = EncryptDerKey(der, &derSz, cipher, passwd, passwdSz,
&cipherInfo, derSz + blockSz, hashType);
if (ret != 1) {
WOLFSSL_ERROR_MSG("EncryptDerKey failed");
}
}
}
if (ret == 1) {
pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, cipherInfo, type);
if (pemSz <= 0) {
WOLFSSL_ERROR_MSG("wc_DerToPemEx failed");
ret = 0;
}
}
if (ret == 1) {
tmp = (byte*)XMALLOC((size_t)(pemSz + 1), NULL, DYNAMIC_TYPE_KEY);
if (tmp == NULL) {
WOLFSSL_ERROR_MSG("malloc failed");
ret = 0;
}
}
if (ret == 1) {
pemSz = wc_DerToPemEx(der, (word32)derSz, tmp, (word32)pemSz,
cipherInfo, type);
if (pemSz <= 0) {
WOLFSSL_ERROR_MSG("wc_DerToPemEx failed");
ret = 0;
}
}
if (ret == 1) {
tmp[pemSz] = 0x00;
*out = tmp;
*outSz = pemSz;
tmp = NULL;
}
XFREE(tmp, NULL, DYNAMIC_TYPE_KEY);
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
XFREE(der, heap, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
#endif
#endif
#if !defined(NO_CERTS) && defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
!defined(NO_STDIO_FILESYSTEM) && (!defined(NO_RSA) || !defined(NO_DSA) || \
defined(HAVE_ECC)) && defined(OPENSSL_EXTRA)
static int pk_bn_field_print_fp(XFILE fp, int indent, const char* field,
const WOLFSSL_BIGNUM* bn)
{
static const int HEX_INDENT = 4;
static const int MAX_DIGITS_PER_LINE = 30;
int ret = 1;
int i = 0;
char* buf = NULL;
buf = wolfSSL_BN_bn2hex(bn);
if (buf == NULL) {
ret = 0;
}
if (ret == 1) {
if (indent > 0) {
if (XFPRINTF(fp, "%*s", indent, "") < 0)
ret = 0;
}
}
if (ret == 1) {
if (XFPRINTF(fp, "%s:\n", field) < 0)
ret = 0;
}
if (ret == 1) {
if (indent > 0) {
if (XFPRINTF(fp, "%*s", indent, "") < 0)
ret = 0;
}
}
if (ret == 1) {
if (XFPRINTF(fp, "%*s", HEX_INDENT, "") < 0)
ret = 0;
}
if (ret == 1) {
if ((buf[i] != '\0') && (buf[i+1] != '\0')) {
if (XFPRINTF(fp, "%c", buf[i++]) < 0)
ret = 0;
else if (XFPRINTF(fp, "%c", buf[i++]) < 0)
ret = 0;
}
}
if (ret == 1) {
while ((buf[i] != '\0') && (buf[i+1] != '\0')) {
if (XFPRINTF(fp, ":") < 0) {
ret = 0;
break;
}
if (i % MAX_DIGITS_PER_LINE == 0) {
if (XFPRINTF(fp, "\n") < 0) {
ret = 0;
break;
}
if (indent > 0) {
if (XFPRINTF(fp, "%*s", indent, "") < 0) {
ret = 0;
break;
}
}
if (XFPRINTF(fp, "%*s", HEX_INDENT, "") < 0) {
ret = 0;
break;
}
}
if (XFPRINTF(fp, "%c", buf[i++]) < 0) {
ret = 0;
break;
}
if (XFPRINTF(fp, "%c", buf[i++]) < 0) {
ret = 0;
break;
}
}
if (XFPRINTF(fp, "\n") < 0) {
ret = 0;
}
}
XFREE(buf, NULL, DYNAMIC_TYPE_OPENSSL);
return ret;
}
#endif
#if defined(OPENSSL_EXTRA) && defined(XSNPRINTF) && !defined(NO_BIO) && \
!defined(NO_RSA)
#define PRINT_NUM_MAX_INDENT 48
#define PRINT_NUM_MAX_VALUE_LINE PRINT_NUM_MAX_INDENT
#define PRINT_NUM_INDENT_CNT 4
#define PRINT_NUM_INDENT " "
#define PRINT_NUM_MAX_DIGIT_LINE (PRINT_NUM_INDENT_CNT + 3 * 15)
static int wolfssl_print_indent(WOLFSSL_BIO* bio, char* line, int lineLen,
int indent)
{
int ret = 1;
if (indent > 0) {
int len_wanted;
if (indent >= lineLen) {
indent = lineLen - 1;
}
len_wanted = XSNPRINTF(line, (size_t)lineLen, "%*s", indent, " ");
if ((len_wanted < 0) || (len_wanted >= lineLen)) {
WOLFSSL_ERROR_MSG("Buffer overflow formatting indentation");
ret = 0;
}
else {
if (wolfSSL_BIO_write(bio, line, len_wanted) <= 0) {
ret = 0;
}
}
}
return ret;
}
static int wolfssl_print_value(WOLFSSL_BIO* bio, mp_int* value,
const char* name, int indent)
{
int ret = 1;
int len;
char line[PRINT_NUM_MAX_VALUE_LINE + 1];
len = mp_unsigned_bin_size(value);
if ((len < 0) || (len > 4)) {
WOLFSSL_ERROR_MSG("Error getting exponent size");
ret = 0;
}
if (ret == 1) {
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
}
if (ret == 1) {
word32 v = (word32)value->dp[0];
len = (int)XSNPRINTF(line, sizeof(line), "%s %u (0x%x)\n", name, v,
v);
if (len >= (int)sizeof(line)) {
WOLFSSL_ERROR_MSG("Buffer overflow while formatting value");
ret = 0;
} else {
if (wolfSSL_BIO_write(bio, line, len) <= 0) {
ret = 0;
}
}
}
return ret;
}
static int wolfssl_print_number(WOLFSSL_BIO* bio, mp_int* num, const char* name,
int indent)
{
int ret = 1;
int rawLen = 0;
byte* rawKey = NULL;
char line[PRINT_NUM_MAX_DIGIT_LINE + 1];
int li = 0;
int i;
rawLen = mp_unsigned_bin_size(num);
if (rawLen == 0) {
WOLFSSL_ERROR_MSG("Invalid number");
ret = 0;
}
if (ret == 1) {
rawKey = (byte*)XMALLOC((size_t)rawLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (rawKey == NULL) {
WOLFSSL_ERROR_MSG("Memory allocation error");
ret = 0;
}
}
if ((ret == 1) && (mp_to_unsigned_bin(num, rawKey) < 0)) {
ret = 0;
}
if (ret == 1) {
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
}
if (ret == 1) {
li = XSNPRINTF(line, sizeof(line), "%s\n", name);
if (li >= (int)sizeof(line)) {
WOLFSSL_ERROR_MSG("Buffer overflow formatting name");
ret = 0;
}
else {
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
ret = 0;
}
}
}
if (ret == 1) {
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
}
if (ret == 1) {
li = XSNPRINTF(line, sizeof(line), PRINT_NUM_INDENT "%s",
mp_leading_bit(num) ? "00:" : "");
if (li >= (int)sizeof(line)) {
WOLFSSL_ERROR_MSG("Buffer overflow formatting spaces");
ret = 0;
}
}
for (i = 0; (ret == 1) && (i < rawLen); i++) {
int len_wanted = XSNPRINTF(line + li, sizeof(line) - (size_t)li,
"%02x:", rawKey[i]);
if (len_wanted >= (int)sizeof(line) - li) {
--i;
line[li++] = '\n';
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
ret = 0;
}
if (ret == 1) {
ret = wolfssl_print_indent(bio, line, sizeof(line), indent);
}
XSTRNCPY(line, PRINT_NUM_INDENT, PRINT_NUM_INDENT_CNT + 1);
li = PRINT_NUM_INDENT_CNT;
}
else {
li += len_wanted;
}
}
if (ret == 1) {
line[li-1] = '\n';
if (wolfSSL_BIO_write(bio, line, li) <= 0) {
ret = 0;
}
}
XFREE(rawKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
#endif
#endif
#if !defined(NO_CERTS) || (defined(OPENSSL_EXTRA) && (!defined(NO_RSA) || \
(!defined(NO_DH) && defined(HAVE_FIPS) && !FIPS_VERSION_GT(2,0)) || \
defined(HAVE_ECC)))
static int wolfssl_der_length(const unsigned char* seq, int len)
{
int ret = 0;
word32 i = 0;
if (GetSequence_ex(seq, &i, &ret, (word32)len, 0) >= 0) {
ret += (int)i;
}
return ret;
}
#endif
#define WOLFSSL_PK_RSA_INCLUDED
#include "src/pk_rsa.c"
#ifndef NO_DSA
#if defined(OPENSSL_EXTRA) && defined(XFPRINTF) && !defined(NO_FILESYSTEM) && \
!defined(NO_STDIO_FILESYSTEM)
int wolfSSL_DSA_print_fp(XFILE fp, WOLFSSL_DSA* dsa, int indent)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_DSA_print_fp");
if (fp == XBADFILE || dsa == NULL) {
ret = 0;
}
if (ret == 1 && dsa->p != NULL) {
int pBits = wolfSSL_BN_num_bits(dsa->p);
if (pBits == 0) {
ret = 0;
}
else {
if (XFPRINTF(fp, "%*s", indent, "") < 0)
ret = 0;
else if (XFPRINTF(fp, "Private-Key: (%d bit)\n", pBits) < 0)
ret = 0;
}
}
if (ret == 1 && dsa->priv_key != NULL) {
ret = pk_bn_field_print_fp(fp, indent, "priv", dsa->priv_key);
}
if (ret == 1 && dsa->pub_key != NULL) {
ret = pk_bn_field_print_fp(fp, indent, "pub", dsa->pub_key);
}
if (ret == 1 && dsa->p != NULL) {
ret = pk_bn_field_print_fp(fp, indent, "P", dsa->p);
}
if (ret == 1 && dsa->q != NULL) {
ret = pk_bn_field_print_fp(fp, indent, "Q", dsa->q);
}
if (ret == 1 && dsa->g != NULL) {
ret = pk_bn_field_print_fp(fp, indent, "G", dsa->g);
}
WOLFSSL_LEAVE("wolfSSL_DSA_print_fp", ret);
return ret;
}
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
static void InitwolfSSL_DSA(WOLFSSL_DSA* dsa)
{
if (dsa) {
dsa->p = NULL;
dsa->q = NULL;
dsa->g = NULL;
dsa->pub_key = NULL;
dsa->priv_key = NULL;
dsa->internal = NULL;
dsa->inSet = 0;
dsa->exSet = 0;
}
}
WOLFSSL_DSA* wolfSSL_DSA_new(void)
{
WOLFSSL_DSA* external;
DsaKey* key;
WOLFSSL_MSG("wolfSSL_DSA_new");
key = (DsaKey*) XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
if (key == NULL) {
WOLFSSL_MSG("wolfSSL_DSA_new malloc DsaKey failure");
return NULL;
}
external = (WOLFSSL_DSA*) XMALLOC(sizeof(WOLFSSL_DSA), NULL,
DYNAMIC_TYPE_DSA);
if (external == NULL) {
WOLFSSL_MSG("wolfSSL_DSA_new malloc WOLFSSL_DSA failure");
XFREE(key, NULL, DYNAMIC_TYPE_DSA);
return NULL;
}
InitwolfSSL_DSA(external);
if (wc_InitDsaKey(key) != 0) {
WOLFSSL_MSG("wolfSSL_DSA_new InitDsaKey failure");
XFREE(key, NULL, DYNAMIC_TYPE_DSA);
wolfSSL_DSA_free(external);
return NULL;
}
external->internal = key;
return external;
}
void wolfSSL_DSA_free(WOLFSSL_DSA* dsa)
{
WOLFSSL_MSG("wolfSSL_DSA_free");
if (dsa) {
if (dsa->internal) {
FreeDsaKey((DsaKey*)dsa->internal);
XFREE(dsa->internal, NULL, DYNAMIC_TYPE_DSA);
dsa->internal = NULL;
}
wolfSSL_BN_free(dsa->priv_key);
wolfSSL_BN_free(dsa->pub_key);
wolfSSL_BN_free(dsa->g);
wolfSSL_BN_free(dsa->q);
wolfSSL_BN_free(dsa->p);
InitwolfSSL_DSA(dsa);
XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
}
}
int SetDsaExternal(WOLFSSL_DSA* dsa)
{
DsaKey* key;
WOLFSSL_MSG("Entering SetDsaExternal");
if (dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("dsa key NULL error");
return WOLFSSL_FATAL_ERROR;
}
key = (DsaKey*)dsa->internal;
if (wolfssl_bn_set_value(&dsa->p, &key->p) != 1) {
WOLFSSL_MSG("dsa p key error");
return WOLFSSL_FATAL_ERROR;
}
if (wolfssl_bn_set_value(&dsa->q, &key->q) != 1) {
WOLFSSL_MSG("dsa q key error");
return WOLFSSL_FATAL_ERROR;
}
if (wolfssl_bn_set_value(&dsa->g, &key->g) != 1) {
WOLFSSL_MSG("dsa g key error");
return WOLFSSL_FATAL_ERROR;
}
if (wolfssl_bn_set_value(&dsa->pub_key, &key->y) != 1) {
WOLFSSL_MSG("dsa y key error");
return WOLFSSL_FATAL_ERROR;
}
if (wolfssl_bn_set_value(&dsa->priv_key, &key->x) != 1) {
WOLFSSL_MSG("dsa x key error");
return WOLFSSL_FATAL_ERROR;
}
dsa->exSet = 1;
return 1;
}
#endif
#ifdef OPENSSL_EXTRA
int SetDsaInternal(WOLFSSL_DSA* dsa)
{
DsaKey* key;
WOLFSSL_MSG("Entering SetDsaInternal");
if (dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("dsa key NULL error");
return WOLFSSL_FATAL_ERROR;
}
key = (DsaKey*)dsa->internal;
if (dsa->p != NULL &&
wolfssl_bn_get_value(dsa->p, &key->p) != 1) {
WOLFSSL_MSG("rsa p key error");
return WOLFSSL_FATAL_ERROR;
}
if (dsa->q != NULL &&
wolfssl_bn_get_value(dsa->q, &key->q) != 1) {
WOLFSSL_MSG("rsa q key error");
return WOLFSSL_FATAL_ERROR;
}
if (dsa->g != NULL &&
wolfssl_bn_get_value(dsa->g, &key->g) != 1) {
WOLFSSL_MSG("rsa g key error");
return WOLFSSL_FATAL_ERROR;
}
if (dsa->pub_key != NULL) {
if (wolfssl_bn_get_value(dsa->pub_key, &key->y) != 1) {
WOLFSSL_MSG("rsa pub_key error");
return WOLFSSL_FATAL_ERROR;
}
key->type = DSA_PUBLIC;
}
if (dsa->priv_key != NULL) {
if (wolfssl_bn_get_value(dsa->priv_key, &key->x) != 1) {
WOLFSSL_MSG("rsa priv_key error");
return WOLFSSL_FATAL_ERROR;
}
key->type = DSA_PRIVATE;
}
dsa->inSet = 1;
return 1;
}
int wolfSSL_DSA_generate_key(WOLFSSL_DSA* dsa)
{
int ret = 0;
WOLFSSL_ENTER("wolfSSL_DSA_generate_key");
if (dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("Bad arguments");
return 0;
}
if (dsa->inSet == 0) {
WOLFSSL_MSG("No DSA internal set, do it");
if (SetDsaInternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaInternal failed");
return ret;
}
}
#ifdef WOLFSSL_KEY_GEN
{
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
WC_ALLOC_VAR_EX(tmpRng, WC_RNG, 1, NULL, DYNAMIC_TYPE_RNG,
return WOLFSSL_FATAL_ERROR);
if (wc_InitRng(tmpRng) == 0) {
rng = tmpRng;
initTmpRng = 1;
}
else {
WOLFSSL_MSG("Bad RNG Init, trying global");
rng = wolfssl_get_global_rng();
}
if (rng) {
mp_clear(&((DsaKey*)dsa->internal)->x);
mp_clear(&((DsaKey*)dsa->internal)->y);
if (wc_MakeDsaKey(rng, (DsaKey*)dsa->internal) != MP_OKAY)
WOLFSSL_MSG("wc_MakeDsaKey failed");
else if (SetDsaExternal(dsa) != 1)
WOLFSSL_MSG("SetDsaExternal failed");
else
ret = 1;
}
if (initTmpRng)
wc_FreeRng(tmpRng);
WC_FREE_VAR_EX(tmpRng, NULL, DYNAMIC_TYPE_RNG);
}
#else
WOLFSSL_MSG("No Key Gen built in");
#endif
return ret;
}
WOLFSSL_DSA* wolfSSL_DSA_generate_parameters(int bits, unsigned char* seed,
int seedLen, int* counterRet, unsigned long* hRet,
WOLFSSL_BN_CB cb, void* CBArg)
{
WOLFSSL_DSA* dsa;
WOLFSSL_ENTER("wolfSSL_DSA_generate_parameters");
(void)cb;
(void)CBArg;
dsa = wolfSSL_DSA_new();
if (dsa == NULL) {
return NULL;
}
if (wolfSSL_DSA_generate_parameters_ex(dsa, bits, seed, seedLen,
counterRet, hRet, NULL) != 1) {
wolfSSL_DSA_free(dsa);
return NULL;
}
return dsa;
}
int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits,
unsigned char* seed, int seedLen,
int* counterRet,
unsigned long* hRet, void* cb)
{
int ret = 0;
(void)bits;
(void)seed;
(void)seedLen;
(void)counterRet;
(void)hRet;
(void)cb;
WOLFSSL_ENTER("wolfSSL_DSA_generate_parameters_ex");
if (dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("Bad arguments");
return 0;
}
#ifdef WOLFSSL_KEY_GEN
{
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
WC_ALLOC_VAR_EX(tmpRng, WC_RNG, 1, NULL, DYNAMIC_TYPE_RNG,
return WOLFSSL_FATAL_ERROR);
if (wc_InitRng(tmpRng) == 0) {
rng = tmpRng;
initTmpRng = 1;
}
else {
WOLFSSL_MSG("Bad RNG Init, trying global");
rng = wolfssl_get_global_rng();
}
if (rng) {
if (wc_MakeDsaParameters(rng, bits,
(DsaKey*)dsa->internal) != MP_OKAY)
WOLFSSL_MSG("wc_MakeDsaParameters failed");
else if (SetDsaExternal(dsa) != 1)
WOLFSSL_MSG("SetDsaExternal failed");
else
ret = 1;
}
if (initTmpRng)
wc_FreeRng(tmpRng);
WC_FREE_VAR_EX(tmpRng, NULL, DYNAMIC_TYPE_RNG);
}
#else
WOLFSSL_MSG("No Key Gen built in");
#endif
return ret;
}
void wolfSSL_DSA_get0_pqg(const WOLFSSL_DSA *d, const WOLFSSL_BIGNUM **p,
const WOLFSSL_BIGNUM **q, const WOLFSSL_BIGNUM **g)
{
WOLFSSL_ENTER("wolfSSL_DSA_get0_pqg");
if (d != NULL) {
if (p != NULL)
*p = d->p;
if (q != NULL)
*q = d->q;
if (g != NULL)
*g = d->g;
}
}
int wolfSSL_DSA_set0_pqg(WOLFSSL_DSA *d, WOLFSSL_BIGNUM *p,
WOLFSSL_BIGNUM *q, WOLFSSL_BIGNUM *g)
{
WOLFSSL_ENTER("wolfSSL_DSA_set0_pqg");
if (d == NULL || p == NULL || q == NULL || g == NULL) {
WOLFSSL_MSG("Bad parameter");
return 0;
}
wolfSSL_BN_free(d->p);
wolfSSL_BN_free(d->q);
wolfSSL_BN_free(d->g);
d->p = p;
d->q = q;
d->g = g;
return 1;
}
void wolfSSL_DSA_get0_key(const WOLFSSL_DSA *d,
const WOLFSSL_BIGNUM **pub_key, const WOLFSSL_BIGNUM **priv_key)
{
WOLFSSL_ENTER("wolfSSL_DSA_get0_key");
if (d != NULL) {
if (pub_key != NULL)
*pub_key = d->pub_key;
if (priv_key != NULL)
*priv_key = d->priv_key;
}
}
int wolfSSL_DSA_set0_key(WOLFSSL_DSA *d, WOLFSSL_BIGNUM *pub_key,
WOLFSSL_BIGNUM *priv_key)
{
WOLFSSL_ENTER("wolfSSL_DSA_set0_key");
if (d->pub_key == NULL && pub_key == NULL) {
WOLFSSL_MSG("Bad parameter");
return 0;
}
if (pub_key != NULL) {
wolfSSL_BN_free(d->pub_key);
d->pub_key = pub_key;
}
if (priv_key != NULL) {
wolfSSL_BN_free(d->priv_key);
d->priv_key = priv_key;
}
return 1;
}
WOLFSSL_DSA_SIG* wolfSSL_DSA_SIG_new(void)
{
WOLFSSL_DSA_SIG* sig;
WOLFSSL_ENTER("wolfSSL_DSA_SIG_new");
sig = (WOLFSSL_DSA_SIG*)XMALLOC(sizeof(WOLFSSL_DSA_SIG), NULL,
DYNAMIC_TYPE_OPENSSL);
if (sig)
XMEMSET(sig, 0, sizeof(WOLFSSL_DSA_SIG));
return sig;
}
void wolfSSL_DSA_SIG_free(WOLFSSL_DSA_SIG *sig)
{
WOLFSSL_ENTER("wolfSSL_DSA_SIG_free");
if (sig) {
if (sig->r) {
wolfSSL_BN_free(sig->r);
}
if (sig->s) {
wolfSSL_BN_free(sig->s);
}
XFREE(sig, NULL, DYNAMIC_TYPE_OPENSSL);
}
}
void wolfSSL_DSA_SIG_get0(const WOLFSSL_DSA_SIG *sig,
const WOLFSSL_BIGNUM **r, const WOLFSSL_BIGNUM **s)
{
WOLFSSL_ENTER("wolfSSL_DSA_SIG_get0");
if (sig != NULL) {
*r = sig->r;
*s = sig->s;
}
}
int wolfSSL_DSA_SIG_set0(WOLFSSL_DSA_SIG *sig, WOLFSSL_BIGNUM *r,
WOLFSSL_BIGNUM *s)
{
WOLFSSL_ENTER("wolfSSL_DSA_SIG_set0");
if (r == NULL || s == NULL) {
WOLFSSL_MSG("Bad parameter");
return 0;
}
wolfSSL_BN_clear_free(sig->r);
wolfSSL_BN_clear_free(sig->s);
sig->r = r;
sig->s = s;
return 1;
}
#ifndef HAVE_SELFTEST
int wolfSSL_i2d_DSA_SIG(const WOLFSSL_DSA_SIG *sig, byte **out)
{
byte buf[MAX_SEQ_SZ + 2*(ASN_TAG_SZ + MAX_LENGTH_SZ + DSA_MAX_HALF_SIZE)];
word32 bufLen = sizeof(buf);
WOLFSSL_ENTER("wolfSSL_i2d_DSA_SIG");
if (sig == NULL || sig->r == NULL || sig->s == NULL ||
out == NULL) {
WOLFSSL_MSG("Bad function arguments");
return WOLFSSL_FATAL_ERROR;
}
if (StoreECC_DSA_Sig(buf, &bufLen,
(mp_int*)sig->r->internal, (mp_int*)sig->s->internal) != 0) {
WOLFSSL_MSG("StoreECC_DSA_Sig error");
return WOLFSSL_FATAL_ERROR;
}
if (*out == NULL) {
byte* tmp = (byte*)XMALLOC(bufLen, NULL, DYNAMIC_TYPE_ASN1);
if (tmp == NULL) {
WOLFSSL_MSG("malloc error");
return WOLFSSL_FATAL_ERROR;
}
*out = tmp;
}
XMEMCPY(*out, buf, bufLen);
return (int)bufLen;
}
static WOLFSSL_DSA_SIG* wolfSSL_DSA_SIG_new_bn(void)
{
WOLFSSL_DSA_SIG* ret;
if ((ret = wolfSSL_DSA_SIG_new()) == NULL) {
WOLFSSL_MSG("wolfSSL_DSA_SIG_new error");
return NULL;
}
if ((ret->r = wolfSSL_BN_new()) == NULL) {
WOLFSSL_MSG("wolfSSL_BN_new error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
if ((ret->s = wolfSSL_BN_new()) == NULL) {
WOLFSSL_MSG("wolfSSL_BN_new error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
return ret;
}
WOLFSSL_DSA_SIG* wolfSSL_d2i_DSA_SIG(WOLFSSL_DSA_SIG **sig,
const unsigned char **pp, long length)
{
WOLFSSL_DSA_SIG* ret;
mp_int* r;
mp_int* s;
WOLFSSL_ENTER("wolfSSL_d2i_DSA_SIG");
if (pp == NULL || *pp == NULL || length < 0) {
WOLFSSL_MSG("Bad function arguments");
return NULL;
}
if ((ret = wolfSSL_DSA_SIG_new_bn()) == NULL) {
WOLFSSL_MSG("wolfSSL_DSA_SIG_new_bn error");
return NULL;
}
r = (mp_int*)ret->r->internal;
s = (mp_int*)ret->s->internal;
if (DecodeECC_DSA_Sig(*pp, (word32)length, r, s) != 0) {
if (length == DSA_160_SIG_SIZE || length == DSA_256_SIG_SIZE) {
if (mp_read_unsigned_bin(r, *pp, (word32)length/2) != 0) {
WOLFSSL_MSG("r mp_read_unsigned_bin error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
if (mp_read_unsigned_bin(s, *pp + (length/2), (word32)length/2) !=
0) {
WOLFSSL_MSG("s mp_read_unsigned_bin error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
*pp += length;
}
else {
WOLFSSL_MSG("DecodeECC_DSA_Sig error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
}
else {
#ifndef NO_STRICT_ECDSA_LEN
*pp += length;
#else
{
word32 idx = 0;
int len = 0;
if (GetSequence(*pp, &idx, &len, (word32)length) < 0) {
WOLFSSL_MSG("GetSequence error");
wolfSSL_DSA_SIG_free(ret);
return NULL;
}
*pp += len;
}
#endif
}
if (sig != NULL) {
if (*sig != NULL)
wolfSSL_DSA_SIG_free(*sig);
*sig = ret;
}
return ret;
}
#endif
static int dsa_do_sign(const unsigned char* d, int dLen, unsigned char* sigRet,
WOLFSSL_DSA* dsa)
{
int ret = WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR);
int initTmpRng = 0;
WC_RNG* rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
if (d == NULL || sigRet == NULL || dsa == NULL) {
WOLFSSL_MSG("Bad function arguments");
return WOLFSSL_FATAL_ERROR;
}
if (dsa->inSet == 0) {
WOLFSSL_MSG("No DSA internal set, do it");
if (SetDsaInternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaInternal failed");
return WOLFSSL_FATAL_ERROR;
}
}
WC_ALLOC_VAR_EX(tmpRng, WC_RNG, 1, NULL, DYNAMIC_TYPE_RNG,
return WOLFSSL_FATAL_ERROR);
if (wc_InitRng(tmpRng) == 0) {
rng = tmpRng;
initTmpRng = 1;
}
else {
WOLFSSL_MSG("Bad RNG Init, trying global");
#ifdef WOLFSSL_SMALL_STACK
XFREE(tmpRng, NULL, DYNAMIC_TYPE_RNG);
tmpRng = NULL;
#endif
rng = wolfssl_get_global_rng();
if (! rng)
return WOLFSSL_FATAL_ERROR;
}
if (rng) {
#ifdef HAVE_SELFTEST
if (dLen != WC_SHA_DIGEST_SIZE ||
wc_DsaSign(d, sigRet, (DsaKey*)dsa->internal, rng) < 0) {
WOLFSSL_MSG("wc_DsaSign failed or dLen wrong length");
ret = WOLFSSL_FATAL_ERROR;
}
#else
if (wc_DsaSign_ex(d, dLen, sigRet, (DsaKey*)dsa->internal, rng) < 0) {
WOLFSSL_MSG("wc_DsaSign_ex failed");
ret = WOLFSSL_FATAL_ERROR;
}
#endif
else
ret = WOLFSSL_SUCCESS;
}
if (initTmpRng)
wc_FreeRng(tmpRng);
WC_FREE_VAR_EX(tmpRng, NULL, DYNAMIC_TYPE_RNG);
return ret;
}
int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
WOLFSSL_DSA* dsa)
{
WOLFSSL_ENTER("wolfSSL_DSA_do_sign");
return dsa_do_sign(d, WC_SHA_DIGEST_SIZE, sigRet, dsa);
}
#ifndef HAVE_SELFTEST
WOLFSSL_DSA_SIG* wolfSSL_DSA_do_sign_ex(const unsigned char* digest,
int inLen, WOLFSSL_DSA* dsa)
{
byte sigBin[DSA_MAX_SIG_SIZE];
const byte *tmp = sigBin;
int sigLen;
WOLFSSL_ENTER("wolfSSL_DSA_do_sign_ex");
if (!digest || !dsa) {
WOLFSSL_MSG("Bad function arguments");
return NULL;
}
if (dsa_do_sign(digest, inLen, sigBin, dsa) != 1) {
WOLFSSL_MSG("wolfSSL_DSA_do_sign error");
return NULL;
}
if (dsa->internal == NULL) {
WOLFSSL_MSG("dsa->internal is null");
return NULL;
}
sigLen = mp_unsigned_bin_size(&((DsaKey*)dsa->internal)->q);
if (sigLen <= 0) {
WOLFSSL_MSG("mp_unsigned_bin_size error");
return NULL;
}
return wolfSSL_d2i_DSA_SIG(NULL, &tmp, 2 * sigLen);
}
#endif
static int dsa_do_verify(const unsigned char* d, int dLen, unsigned char* sig,
WOLFSSL_DSA* dsa, int *dsacheck)
{
int ret;
if (d == NULL || sig == NULL || dsa == NULL) {
WOLFSSL_MSG("Bad function arguments");
return WOLFSSL_FATAL_ERROR;
}
if (dsa->inSet == 0)
{
WOLFSSL_MSG("No DSA internal set, do it");
if (SetDsaInternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaInternal failed");
return WOLFSSL_FATAL_ERROR;
}
}
#ifdef HAVE_SELFTEST
ret = dLen == WC_SHA_DIGEST_SIZE ?
wc_DsaVerify(d, sig, (DsaKey*)dsa->internal, dsacheck) : BAD_FUNC_ARG;
#else
ret = wc_DsaVerify_ex(d, (word32)dLen, sig, (DsaKey*)dsa->internal,
dsacheck);
#endif
if (ret != 0) {
WOLFSSL_MSG("DsaVerify failed");
return WOLFSSL_FATAL_ERROR;
}
if (*dsacheck != 1) {
WOLFSSL_MSG("DsaVerify sig failed");
return WOLFSSL_FAILURE;
}
return WOLFSSL_SUCCESS;
}
int wolfSSL_DSA_do_verify(const unsigned char* d, unsigned char* sig,
WOLFSSL_DSA* dsa, int *dsacheck)
{
WOLFSSL_ENTER("wolfSSL_DSA_do_verify");
return dsa_do_verify(d, WC_SHA_DIGEST_SIZE, sig, dsa, dsacheck);
}
int wolfSSL_DSA_bits(const WOLFSSL_DSA *d)
{
if (!d)
return 0;
if (!d->exSet && SetDsaExternal((WOLFSSL_DSA*)d) != 1)
return 0;
return wolfSSL_BN_num_bits(d->p);
}
#ifndef HAVE_SELFTEST
int wolfSSL_DSA_do_verify_ex(const unsigned char* digest, int digest_len,
WOLFSSL_DSA_SIG* sig, WOLFSSL_DSA* dsa)
{
int dsacheck, sz;
byte sigBin[DSA_MAX_SIG_SIZE];
byte* sigBinPtr = sigBin;
DsaKey* key;
int qSz;
WOLFSSL_ENTER("wolfSSL_DSA_do_verify_ex");
if (!digest || !sig || !dsa) {
WOLFSSL_MSG("Bad function arguments");
return 0;
}
if (!sig->r || !sig->s) {
WOLFSSL_MSG("No signature found in DSA_SIG");
return 0;
}
if (dsa->inSet == 0) {
WOLFSSL_MSG("No DSA internal set, do it");
if (SetDsaInternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaInternal failed");
return 0;
}
}
key = (DsaKey*)dsa->internal;
if (key == NULL) {
WOLFSSL_MSG("dsa->internal is null");
return 0;
}
qSz = mp_unsigned_bin_size(&key->q);
if (qSz < 0 || qSz > DSA_MAX_HALF_SIZE) {
WOLFSSL_MSG("mp_unsigned_bin_size error");
return 0;
}
if ((sz = wolfSSL_BN_num_bytes(sig->r)) < 0 || sz > DSA_MAX_HALF_SIZE)
return 0;
while (sz++ < qSz)
*sigBinPtr++ = 0;
if (wolfSSL_BN_bn2bin(sig->r, sigBinPtr) == -1)
return 0;
sigBinPtr = sigBin + qSz;
if ((sz = wolfSSL_BN_num_bytes(sig->s)) < 0 || sz > DSA_MAX_HALF_SIZE)
return 0;
while (sz++ < qSz)
*sigBinPtr++ = 0;
if (wolfSSL_BN_bn2bin(sig->s, sigBinPtr) == -1)
return 0;
if ((dsa_do_verify(digest, digest_len, sigBin, dsa, &dsacheck)
!= 1) || dsacheck != 1) {
return 0;
}
return 1;
}
#endif
int wolfSSL_i2d_DSAparams(const WOLFSSL_DSA* dsa,
unsigned char** out)
{
int ret = 0;
word32 derLen = 0;
int preAllocated = 1;
DsaKey* key = NULL;
WOLFSSL_ENTER("wolfSSL_i2d_DSAparams");
if (dsa == NULL || dsa->internal == NULL || out == NULL) {
ret = BAD_FUNC_ARG;
}
if (ret == 0) {
key = (DsaKey*)dsa->internal;
ret = wc_DsaKeyToParamsDer_ex(key, NULL, &derLen);
if (ret == WC_NO_ERR_TRACE(LENGTH_ONLY_E)) {
ret = 0;
}
}
if (ret == 0 && *out == NULL) {
preAllocated = 0;
*out = (unsigned char*)XMALLOC(derLen, key->heap, DYNAMIC_TYPE_OPENSSL);
if (*out == NULL) {
ret = MEMORY_E;
}
}
if (ret == 0) {
ret = wc_DsaKeyToParamsDer_ex(key, *out, &derLen);
}
if (ret >= 0 && preAllocated == 1) {
*out += derLen;
}
if (ret < 0 && preAllocated == 0) {
XFREE(*out, key ? key->heap : NULL, DYNAMIC_TYPE_OPENSSL);
}
WOLFSSL_LEAVE("wolfSSL_i2d_DSAparams", ret);
return ret;
}
WOLFSSL_DSA* wolfSSL_d2i_DSAparams(WOLFSSL_DSA** dsa, const unsigned char** der,
long derLen)
{
WOLFSSL_DSA* ret = NULL;
int err = 0;
word32 idx = 0;
int asnLen;
DsaKey* internalKey = NULL;
WOLFSSL_ENTER("wolfSSL_d2i_DSAparams");
if (der == NULL || *der == NULL || derLen <= 0) {
err = 1;
}
if (err == 0) {
ret = wolfSSL_DSA_new();
err = ret == NULL;
}
if (err == 0) {
err = GetSequence(*der, &idx, &asnLen, (word32)derLen) <= 0;
}
if (err == 0) {
internalKey = (DsaKey*)ret->internal;
err = GetInt(&internalKey->p, *der, &idx, (word32)derLen) != 0;
}
if (err == 0) {
err = GetInt(&internalKey->q, *der, &idx, (word32)derLen) != 0;
}
if (err == 0) {
err = GetInt(&internalKey->g, *der, &idx, (word32)derLen) != 0;
}
if (err == 0) {
err = wolfssl_bn_set_value(&ret->p, &internalKey->p)
!= 1;
}
if (err == 0) {
err = wolfssl_bn_set_value(&ret->q, &internalKey->q)
!= 1;
}
if (err == 0) {
err = wolfssl_bn_set_value(&ret->g, &internalKey->g)
!= 1;
}
if (err == 0 && dsa != NULL) {
*dsa = ret;
}
if (err != 0 && ret != NULL) {
wolfSSL_DSA_free(ret);
ret = NULL;
}
return ret;
}
#if defined(WOLFSSL_KEY_GEN)
#ifndef NO_BIO
int wolfSSL_PEM_write_bio_DSAPrivateKey(WOLFSSL_BIO* bio, WOLFSSL_DSA* dsa,
const WOLFSSL_EVP_CIPHER* cipher, unsigned char* passwd, int passwdSz,
wc_pem_password_cb* cb, void* arg)
{
int ret = 1;
byte *pem = NULL;
int pLen = 0;
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_DSAPrivateKey");
(void)cb;
(void)arg;
if ((bio == NULL) || (dsa == NULL)) {
WOLFSSL_MSG("Bad Function Arguments");
ret = 0;
}
if (ret == 1) {
ret = wolfSSL_PEM_write_mem_DSAPrivateKey(dsa, cipher, passwd, passwdSz,
&pem, &pLen);
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, pem, pLen) != pLen)) {
WOLFSSL_ERROR_MSG("DSA private key BIO write failed");
ret = 0;
}
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
return ret;
}
#ifndef HAVE_SELFTEST
static int wolfssl_dsa_key_to_pubkey_der(WOLFSSL_DSA* key, unsigned char** der,
void* heap)
{
int sz;
unsigned char* buf = NULL;
sz = MAX_DSA_PUBKEY_SZ;
buf = (byte*)XMALLOC((size_t)sz, heap, DYNAMIC_TYPE_TMP_BUFFER);
if (buf == NULL) {
WOLFSSL_MSG("malloc failed");
sz = 0;
}
if (sz > 0) {
sz = wc_DsaKeyToPublicDer((DsaKey*)key->internal, buf, (word32)sz);
if (sz < 0) {
WOLFSSL_MSG("wc_DsaKeyToPublicDer failed");
sz = 0;
}
}
if (sz > 0) {
*der = buf;
}
else {
XFREE(buf, heap, DYNAMIC_TYPE_TMP_BUFFER);
}
return sz;
}
int wolfSSL_PEM_write_bio_DSA_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_DSA* dsa)
{
int ret = 1;
unsigned char* derBuf = NULL;
int derSz = 0;
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_DSA_PUBKEY");
if ((bio == NULL) || (dsa == NULL)) {
WOLFSSL_MSG("Bad Function Arguments");
return 0;
}
derSz = wolfssl_dsa_key_to_pubkey_der(dsa, &derBuf, bio->heap);
if (derSz == 0) {
ret = 0;
}
if ((ret == 1) && (der_write_to_bio_as_pem(derBuf, derSz, bio,
PUBLICKEY_TYPE) != 1)) {
ret = 0;
}
XFREE(derBuf, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
#endif
#endif
int wolfSSL_PEM_write_mem_DSAPrivateKey(WOLFSSL_DSA* dsa,
const WOLFSSL_EVP_CIPHER* cipher,
unsigned char* passwd, int passwdSz,
unsigned char **pem, int *pLen)
{
#if (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)) && \
!defined(NO_MD5)
byte *derBuf, *tmp, *cipherInfo = NULL;
int der_max_len = 0, derSz = 0;
const int type = DSA_PRIVATEKEY_TYPE;
const char* header = NULL;
const char* footer = NULL;
WOLFSSL_MSG("wolfSSL_PEM_write_mem_DSAPrivateKey");
if (pem == NULL || pLen == NULL || dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("Bad function arguments");
return 0;
}
if (wc_PemGetHeaderFooter(type, &header, &footer) != 0)
return 0;
if (dsa->inSet == 0) {
WOLFSSL_MSG("No DSA internal set, do it");
if (SetDsaInternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaInternal failed");
return 0;
}
}
der_max_len = MAX_DSA_PRIVKEY_SZ;
derBuf = (byte*)XMALLOC((size_t)der_max_len, NULL, DYNAMIC_TYPE_DER);
if (derBuf == NULL) {
WOLFSSL_MSG("malloc failed");
return 0;
}
derSz = wc_DsaKeyToDer((DsaKey*)dsa->internal, derBuf, (word32)der_max_len);
if (derSz < 0) {
WOLFSSL_MSG("wc_DsaKeyToDer failed");
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
return 0;
}
if (passwd != NULL && passwdSz > 0 && cipher != NULL) {
int ret;
ret = EncryptDerKey(derBuf, &derSz, cipher, passwd, passwdSz,
&cipherInfo, der_max_len, WC_MD5);
if (ret != 1) {
WOLFSSL_MSG("EncryptDerKey failed");
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
return ret;
}
*pLen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
(int)XSTRLEN(footer) + 1 + HEADER_ENCRYPTED_KEY_SIZE;
}
else {
*pLen = (derSz * 2) + (int)XSTRLEN(header) + 1 +
(int)XSTRLEN(footer) + 1;
}
tmp = (byte*)XMALLOC((size_t)*pLen, NULL, DYNAMIC_TYPE_PEM);
if (tmp == NULL) {
WOLFSSL_MSG("malloc failed");
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
return 0;
}
*pLen = wc_DerToPemEx(derBuf, (word32)derSz, tmp, (word32)*pLen, cipherInfo,
type);
if (*pLen <= 0) {
WOLFSSL_MSG("wc_DerToPemEx failed");
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
return 0;
}
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
XFREE(cipherInfo, NULL, DYNAMIC_TYPE_STRING);
*pem = (byte*)XMALLOC((size_t)((*pLen)+1), NULL, DYNAMIC_TYPE_KEY);
if (*pem == NULL) {
WOLFSSL_MSG("malloc failed");
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
return 0;
}
XMEMSET(*pem, 0, (size_t)((*pLen)+1));
if (XMEMCPY(*pem, tmp, (size_t)*pLen) == NULL) {
WOLFSSL_MSG("XMEMCPY failed");
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
return 0;
}
XFREE(tmp, NULL, DYNAMIC_TYPE_PEM);
return 1;
#else
(void)dsa;
(void)cipher;
(void)passwd;
(void)passwdSz;
(void)pem;
(void)pLen;
return 0;
#endif
}
#ifndef NO_FILESYSTEM
int wolfSSL_PEM_write_DSAPrivateKey(XFILE fp, WOLFSSL_DSA *dsa,
const WOLFSSL_EVP_CIPHER *enc,
unsigned char *kstr, int klen,
wc_pem_password_cb *cb, void *u)
{
byte *pem;
int pLen, ret;
(void)cb;
(void)u;
WOLFSSL_MSG("wolfSSL_PEM_write_DSAPrivateKey");
if (fp == XBADFILE || dsa == NULL || dsa->internal == NULL) {
WOLFSSL_MSG("Bad function arguments");
return 0;
}
ret = wolfSSL_PEM_write_mem_DSAPrivateKey(dsa, enc, kstr, klen, &pem,
&pLen);
if (ret != 1) {
WOLFSSL_MSG("wolfSSL_PEM_write_mem_DSAPrivateKey failed");
return 0;
}
ret = (int)XFWRITE(pem, (size_t)pLen, 1, fp);
if (ret != 1) {
WOLFSSL_MSG("DSA private key file write failed");
return 0;
}
XFREE(pem, NULL, DYNAMIC_TYPE_KEY);
return 1;
}
#endif
#endif
#ifndef NO_FILESYSTEM
#ifndef NO_WOLFSSL_STUB
int wolfSSL_PEM_write_DSA_PUBKEY(XFILE fp, WOLFSSL_DSA *x)
{
(void)fp;
(void)x;
WOLFSSL_STUB("PEM_write_DSA_PUBKEY");
WOLFSSL_MSG("wolfSSL_PEM_write_DSA_PUBKEY not implemented");
return 0;
}
#endif
#endif
#ifndef NO_BIO
#if (defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)) && (!defined(NO_CERTS) && \
!defined(NO_FILESYSTEM) && defined(WOLFSSL_KEY_GEN))
WOLFSSL_DSA* wolfSSL_PEM_read_bio_DSAPrivateKey(WOLFSSL_BIO* bio,
WOLFSSL_DSA** dsa,
wc_pem_password_cb* cb,
void* pass)
{
WOLFSSL_EVP_PKEY* pkey = NULL;
WOLFSSL_DSA* local;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSAPrivateKey");
pkey = wolfSSL_PEM_read_bio_PrivateKey(bio, NULL, cb, pass);
if (pkey == NULL) {
WOLFSSL_MSG("Error in PEM_read_bio_PrivateKey");
return NULL;
}
pkey->ownDsa = 0;
local = pkey->dsa;
if (dsa != NULL) {
*dsa = local;
}
wolfSSL_EVP_PKEY_free(pkey);
return local;
}
WOLFSSL_DSA *wolfSSL_PEM_read_bio_DSA_PUBKEY(WOLFSSL_BIO* bio,WOLFSSL_DSA** dsa,
wc_pem_password_cb* cb, void* pass)
{
WOLFSSL_EVP_PKEY* pkey;
WOLFSSL_DSA* local;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSA_PUBKEY");
pkey = wolfSSL_PEM_read_bio_PUBKEY(bio, NULL, cb, pass);
if (pkey == NULL) {
WOLFSSL_MSG("wolfSSL_PEM_read_bio_PUBKEY failed");
return NULL;
}
pkey->ownDsa = 0;
local = pkey->dsa;
if (dsa != NULL) {
*dsa = local;
}
wolfSSL_EVP_PKEY_free(pkey);
return local;
}
#endif
#endif
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
int wolfSSL_DSA_LoadDer(WOLFSSL_DSA* dsa, const unsigned char* derBuf,
int derSz)
{
word32 idx = 0;
int ret;
WOLFSSL_ENTER("wolfSSL_DSA_LoadDer");
if (dsa == NULL || dsa->internal == NULL || derBuf == NULL || derSz <= 0) {
WOLFSSL_MSG("Bad function arguments");
return WOLFSSL_FATAL_ERROR;
}
ret = DsaPrivateKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal,
(word32)derSz);
if (ret < 0) {
WOLFSSL_MSG("DsaPrivateKeyDecode failed");
return WOLFSSL_FATAL_ERROR;
}
if (SetDsaExternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaExternal failed");
return WOLFSSL_FATAL_ERROR;
}
dsa->inSet = 1;
return 1;
}
int wolfSSL_DSA_LoadDer_ex(WOLFSSL_DSA* dsa, const unsigned char* derBuf,
int derSz, int opt)
{
word32 idx = 0;
int ret;
WOLFSSL_ENTER("wolfSSL_DSA_LoadDer");
if (dsa == NULL || dsa->internal == NULL || derBuf == NULL || derSz <= 0) {
WOLFSSL_MSG("Bad function arguments");
return WOLFSSL_FATAL_ERROR;
}
if (opt == WOLFSSL_DSA_LOAD_PRIVATE) {
ret = DsaPrivateKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal,
(word32)derSz);
}
else {
ret = DsaPublicKeyDecode(derBuf, &idx, (DsaKey*)dsa->internal,
(word32)derSz);
}
if (ret < 0 && opt == WOLFSSL_DSA_LOAD_PRIVATE) {
WOLFSSL_ERROR_VERBOSE(ret);
WOLFSSL_MSG("DsaPrivateKeyDecode failed");
return WOLFSSL_FATAL_ERROR;
}
else if (ret < 0 && opt == WOLFSSL_DSA_LOAD_PUBLIC) {
WOLFSSL_ERROR_VERBOSE(ret);
WOLFSSL_MSG("DsaPublicKeyDecode failed");
return WOLFSSL_FATAL_ERROR;
}
if (SetDsaExternal(dsa) != 1) {
WOLFSSL_MSG("SetDsaExternal failed");
return WOLFSSL_FATAL_ERROR;
}
dsa->inSet = 1;
return 1;
}
#endif
#ifdef OPENSSL_EXTRA
#ifndef NO_BIO
WOLFSSL_DSA *wolfSSL_PEM_read_bio_DSAparams(WOLFSSL_BIO *bp, WOLFSSL_DSA **x,
wc_pem_password_cb *cb, void *u)
{
WOLFSSL_DSA* dsa;
DsaKey* key;
int length;
unsigned char* buf;
word32 bufSz;
int ret;
word32 idx = 0;
DerBuffer* pDer;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DSAparams");
ret = wolfSSL_BIO_get_mem_data(bp, &buf);
if (ret <= 0) {
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_DSAparams", ret);
return NULL;
}
bufSz = (word32)ret;
if (cb != NULL || u != NULL) {
WOLFSSL_MSG("Not supporting callback or password for encrypted PEM");
}
if (PemToDer(buf, (long)bufSz, DSA_PARAM_TYPE, &pDer, NULL, NULL,
NULL) < 0 ) {
WOLFSSL_MSG("Issue converting from PEM to DER");
return NULL;
}
if (GetSequence(pDer->buffer, &idx, &length, pDer->length) < 0) {
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_DSAparams", ret);
FreeDer(&pDer);
return NULL;
}
dsa = wolfSSL_DSA_new();
if (dsa == NULL) {
FreeDer(&pDer);
WOLFSSL_MSG("Error creating DSA struct");
return NULL;
}
key = (DsaKey*)dsa->internal;
if (key == NULL) {
FreeDer(&pDer);
wolfSSL_DSA_free(dsa);
WOLFSSL_MSG("Error finding DSA key struct");
return NULL;
}
if (GetInt(&key->p, pDer->buffer, &idx, pDer->length) < 0 ||
GetInt(&key->q, pDer->buffer, &idx, pDer->length) < 0 ||
GetInt(&key->g, pDer->buffer, &idx, pDer->length) < 0 ) {
WOLFSSL_MSG("dsa key error");
FreeDer(&pDer);
wolfSSL_DSA_free(dsa);
return NULL;
}
if (wolfssl_bn_set_value(&dsa->p, &key->p) != 1) {
WOLFSSL_MSG("dsa p key error");
FreeDer(&pDer);
wolfSSL_DSA_free(dsa);
return NULL;
}
if (wolfssl_bn_set_value(&dsa->q, &key->q) != 1) {
WOLFSSL_MSG("dsa q key error");
FreeDer(&pDer);
wolfSSL_DSA_free(dsa);
return NULL;
}
if (wolfssl_bn_set_value(&dsa->g, &key->g) != 1) {
WOLFSSL_MSG("dsa g key error");
FreeDer(&pDer);
wolfSSL_DSA_free(dsa);
return NULL;
}
if (x != NULL) {
*x = dsa;
}
FreeDer(&pDer);
return dsa;
}
#endif
#if !defined(NO_DH)
WOLFSSL_DH *wolfSSL_DSA_dup_DH(const WOLFSSL_DSA *dsa)
{
WOLFSSL_DH* dh;
DhKey* key;
WOLFSSL_ENTER("wolfSSL_DSA_dup_DH");
if (dsa == NULL) {
return NULL;
}
dh = wolfSSL_DH_new();
if (dh == NULL) {
return NULL;
}
key = (DhKey*)dh->internal;
if (dsa->p != NULL &&
wolfssl_bn_get_value(((WOLFSSL_DSA*)dsa)->p, &key->p)
!= 1) {
WOLFSSL_MSG("rsa p key error");
wolfSSL_DH_free(dh);
return NULL;
}
if (dsa->g != NULL &&
wolfssl_bn_get_value(((WOLFSSL_DSA*)dsa)->g, &key->g)
!= 1) {
WOLFSSL_MSG("rsa g key error");
wolfSSL_DH_free(dh);
return NULL;
}
if (wolfssl_bn_set_value(&dh->p, &key->p) != 1) {
WOLFSSL_MSG("dsa p key error");
wolfSSL_DH_free(dh);
return NULL;
}
if (wolfssl_bn_set_value(&dh->g, &key->g) != 1) {
WOLFSSL_MSG("dsa g key error");
wolfSSL_DH_free(dh);
return NULL;
}
return dh;
}
#endif
#endif
#endif
#ifndef NO_DH
#ifdef OPENSSL_EXTRA
WOLFSSL_DH* wolfSSL_DH_new(void)
{
int err = 0;
WOLFSSL_DH* dh = NULL;
DhKey* key = NULL;
WOLFSSL_ENTER("wolfSSL_DH_new");
dh = (WOLFSSL_DH*)XMALLOC(sizeof(WOLFSSL_DH), NULL, DYNAMIC_TYPE_DH);
if (dh == NULL) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new malloc WOLFSSL_DH failure");
err = 1;
}
if (!err) {
XMEMSET(dh, 0, sizeof(WOLFSSL_DH));
wolfSSL_RefInit(&dh->ref, &err);
#ifdef WOLFSSL_REFCNT_ERROR_RETURN
}
if (!err) {
#endif
key = (DhKey*)XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
if (key == NULL) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new malloc DhKey failure");
err = 1;
}
}
if (!err) {
dh->internal = key;
if (wc_InitDhKey(key) != 0) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new InitDhKey failure");
err = 1;
}
}
if (err && (dh != NULL)) {
XFREE(key, NULL, DYNAMIC_TYPE_DH);
wolfSSL_RefFree(&dh->ref);
XFREE(dh, NULL, DYNAMIC_TYPE_DH);
dh = NULL;
}
return dh;
}
#if defined(HAVE_PUBLIC_FFDHE) || (defined(HAVE_FIPS) && FIPS_VERSION_EQ(2,0))
static int wolfssl_dh_set_nid(WOLFSSL_DH* dh, int nid)
{
int err = 0;
const DhParams* params = NULL;
switch (nid) {
#ifdef HAVE_FFDHE_2048
case WC_NID_ffdhe2048:
params = wc_Dh_ffdhe2048_Get();
break;
#endif
#ifdef HAVE_FFDHE_3072
case WC_NID_ffdhe3072:
params = wc_Dh_ffdhe3072_Get();
break;
#endif
#ifdef HAVE_FFDHE_4096
case WC_NID_ffdhe4096:
params = wc_Dh_ffdhe4096_Get();
break;
#endif
default:
break;
}
if (params == NULL) {
WOLFSSL_ERROR_MSG("Unable to find DH params for nid.");
err = 1;
}
if (!err) {
dh->p = wolfSSL_BN_bin2bn(params->p, (int)params->p_len, NULL);
if (dh->p == NULL) {
WOLFSSL_ERROR_MSG("Error converting p hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
if (!err) {
dh->g = wolfSSL_BN_bin2bn(params->g, (int)params->g_len, NULL);
if (dh->g == NULL) {
WOLFSSL_ERROR_MSG("Error converting g hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
#ifdef HAVE_FFDHE_Q
if (!err) {
dh->q = wolfSSL_BN_bin2bn(params->q, params->q_len, NULL);
if (dh->q == NULL) {
WOLFSSL_ERROR_MSG("Error converting q hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
#endif
if ((!err) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Failed to set internal DH params.");
err = 1;
}
if (!err) {
dh->exSet = 1;
}
if (err == 1) {
#ifdef HAVE_FFDHE_Q
wolfSSL_BN_free(dh->q);
dh->q = NULL;
#endif
wolfSSL_BN_free(dh->p);
dh->p = NULL;
wolfSSL_BN_free(dh->g);
dh->g = NULL;
}
return err;
}
#elif !defined(HAVE_PUBLIC_FFDHE) && (!defined(HAVE_FIPS) || \
FIPS_VERSION_GT(2,0))
static int wolfssl_dh_set_nid(WOLFSSL_DH* dh, int nid)
{
int err = 0;
int name = 0;
#ifdef HAVE_FFDHE_Q
int elements = ELEMENT_P | ELEMENT_G | ELEMENT_Q;
#else
int elements = ELEMENT_P | ELEMENT_G;
#endif
switch (nid) {
#ifdef HAVE_FFDHE_2048
case WC_NID_ffdhe2048:
name = WC_FFDHE_2048;
break;
#endif
#ifdef HAVE_FFDHE_3072
case WC_NID_ffdhe3072:
name = WC_FFDHE_3072;
break;
#endif
#ifdef HAVE_FFDHE_4096
case WC_NID_ffdhe4096:
name = WC_FFDHE_4096;
break;
#endif
default:
err = 1;
WOLFSSL_ERROR_MSG("Unable to find DH params for nid.");
break;
}
if ((!err) && (wc_DhSetNamedKey((DhKey*)dh->internal, name) != 0)) {
WOLFSSL_ERROR_MSG("wc_DhSetNamedKey failed.");
err = 1;
}
if (!err && (SetDhExternal_ex(dh, elements) != 1)) {
WOLFSSL_ERROR_MSG("Failed to set external DH params.");
err = 1;
}
return err;
}
#else
static int wolfssl_dh_set_nid(WOLFSSL_DH* dh, int nid)
{
return 1;
}
#endif
WOLFSSL_DH* wolfSSL_DH_new_by_nid(int nid)
{
WOLFSSL_DH* dh = NULL;
int err = 0;
WOLFSSL_ENTER("wolfSSL_DH_new_by_nid");
dh = wolfSSL_DH_new();
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Failed to create WOLFSSL_DH.");
err = 1;
}
if (!err) {
err = wolfssl_dh_set_nid(dh, nid);
}
if (err && (dh != NULL)) {
wolfSSL_DH_free(dh);
dh = NULL;
}
WOLFSSL_LEAVE("wolfSSL_DH_new_by_nid", err);
return dh;
}
void wolfSSL_DH_free(WOLFSSL_DH* dh)
{
int doFree = 0;
WOLFSSL_ENTER("wolfSSL_DH_free");
if (dh != NULL) {
int err;
wolfSSL_RefDec(&dh->ref, &doFree, &err);
(void)err;
}
if (doFree) {
wolfSSL_RefFree(&dh->ref);
if (dh->internal) {
wc_FreeDhKey((DhKey*)dh->internal);
XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
dh->internal = NULL;
}
wolfSSL_BN_free(dh->priv_key);
wolfSSL_BN_free(dh->pub_key);
wolfSSL_BN_free(dh->g);
wolfSSL_BN_free(dh->p);
wolfSSL_BN_free(dh->q);
XMEMSET(dh, 0, sizeof(WOLFSSL_DH));
XFREE(dh, NULL, DYNAMIC_TYPE_DH);
}
}
int wolfSSL_DH_up_ref(WOLFSSL_DH* dh)
{
int err = 1;
WOLFSSL_ENTER("wolfSSL_DH_up_ref");
if (dh != NULL) {
wolfSSL_RefInc(&dh->ref, &err);
}
return !err;
}
#if defined(WOLFSSL_QT) || defined(OPENSSL_ALL) || defined(WOLFSSL_OPENSSH) || \
defined(OPENSSL_EXTRA)
#ifdef WOLFSSL_DH_EXTRA
WOLFSSL_DH* wolfSSL_DH_dup(WOLFSSL_DH* dh)
{
WOLFSSL_DH* ret = NULL;
int err = 0;
WOLFSSL_ENTER("wolfSSL_DH_dup");
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad parameter");
err = 1;
}
if ((!err) && (dh->inSet == 0) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Bad DH set internal");
err = 1;
}
if ((!err) && (!(ret = wolfSSL_DH_new()))) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new error");
err = 1;
}
if ((!err) && (wc_DhKeyCopy((DhKey*)dh->internal, (DhKey*)ret->internal) !=
MP_OKAY)) {
WOLFSSL_ERROR_MSG("wc_DhKeyCopy error");
err = 1;
}
if (!err) {
ret->inSet = 1;
if (SetDhExternal(ret) != 1) {
WOLFSSL_ERROR_MSG("SetDhExternal error");
err = 1;
}
}
if (err && (ret != NULL)) {
wolfSSL_DH_free(ret);
ret = NULL;
}
return ret;
}
#endif
#endif
WOLFSSL_DH* wolfSSL_DH_get_2048_256(void)
{
WOLFSSL_DH* dh;
int err = 0;
static const byte pHex[] = {
0x87, 0xA8, 0xE6, 0x1D, 0xB4, 0xB6, 0x66, 0x3C, 0xFF, 0xBB, 0xD1, 0x9C,
0x65, 0x19, 0x59, 0x99, 0x8C, 0xEE, 0xF6, 0x08, 0x66, 0x0D, 0xD0, 0xF2,
0x5D, 0x2C, 0xEE, 0xD4, 0x43, 0x5E, 0x3B, 0x00, 0xE0, 0x0D, 0xF8, 0xF1,
0xD6, 0x19, 0x57, 0xD4, 0xFA, 0xF7, 0xDF, 0x45, 0x61, 0xB2, 0xAA, 0x30,
0x16, 0xC3, 0xD9, 0x11, 0x34, 0x09, 0x6F, 0xAA, 0x3B, 0xF4, 0x29, 0x6D,
0x83, 0x0E, 0x9A, 0x7C, 0x20, 0x9E, 0x0C, 0x64, 0x97, 0x51, 0x7A, 0xBD,
0x5A, 0x8A, 0x9D, 0x30, 0x6B, 0xCF, 0x67, 0xED, 0x91, 0xF9, 0xE6, 0x72,
0x5B, 0x47, 0x58, 0xC0, 0x22, 0xE0, 0xB1, 0xEF, 0x42, 0x75, 0xBF, 0x7B,
0x6C, 0x5B, 0xFC, 0x11, 0xD4, 0x5F, 0x90, 0x88, 0xB9, 0x41, 0xF5, 0x4E,
0xB1, 0xE5, 0x9B, 0xB8, 0xBC, 0x39, 0xA0, 0xBF, 0x12, 0x30, 0x7F, 0x5C,
0x4F, 0xDB, 0x70, 0xC5, 0x81, 0xB2, 0x3F, 0x76, 0xB6, 0x3A, 0xCA, 0xE1,
0xCA, 0xA6, 0xB7, 0x90, 0x2D, 0x52, 0x52, 0x67, 0x35, 0x48, 0x8A, 0x0E,
0xF1, 0x3C, 0x6D, 0x9A, 0x51, 0xBF, 0xA4, 0xAB, 0x3A, 0xD8, 0x34, 0x77,
0x96, 0x52, 0x4D, 0x8E, 0xF6, 0xA1, 0x67, 0xB5, 0xA4, 0x18, 0x25, 0xD9,
0x67, 0xE1, 0x44, 0xE5, 0x14, 0x05, 0x64, 0x25, 0x1C, 0xCA, 0xCB, 0x83,
0xE6, 0xB4, 0x86, 0xF6, 0xB3, 0xCA, 0x3F, 0x79, 0x71, 0x50, 0x60, 0x26,
0xC0, 0xB8, 0x57, 0xF6, 0x89, 0x96, 0x28, 0x56, 0xDE, 0xD4, 0x01, 0x0A,
0xBD, 0x0B, 0xE6, 0x21, 0xC3, 0xA3, 0x96, 0x0A, 0x54, 0xE7, 0x10, 0xC3,
0x75, 0xF2, 0x63, 0x75, 0xD7, 0x01, 0x41, 0x03, 0xA4, 0xB5, 0x43, 0x30,
0xC1, 0x98, 0xAF, 0x12, 0x61, 0x16, 0xD2, 0x27, 0x6E, 0x11, 0x71, 0x5F,
0x69, 0x38, 0x77, 0xFA, 0xD7, 0xEF, 0x09, 0xCA, 0xDB, 0x09, 0x4A, 0xE9,
0x1E, 0x1A, 0x15, 0x97
};
static const byte gHex[] = {
0x3F, 0xB3, 0x2C, 0x9B, 0x73, 0x13, 0x4D, 0x0B, 0x2E, 0x77, 0x50, 0x66,
0x60, 0xED, 0xBD, 0x48, 0x4C, 0xA7, 0xB1, 0x8F, 0x21, 0xEF, 0x20, 0x54,
0x07, 0xF4, 0x79, 0x3A, 0x1A, 0x0B, 0xA1, 0x25, 0x10, 0xDB, 0xC1, 0x50,
0x77, 0xBE, 0x46, 0x3F, 0xFF, 0x4F, 0xED, 0x4A, 0xAC, 0x0B, 0xB5, 0x55,
0xBE, 0x3A, 0x6C, 0x1B, 0x0C, 0x6B, 0x47, 0xB1, 0xBC, 0x37, 0x73, 0xBF,
0x7E, 0x8C, 0x6F, 0x62, 0x90, 0x12, 0x28, 0xF8, 0xC2, 0x8C, 0xBB, 0x18,
0xA5, 0x5A, 0xE3, 0x13, 0x41, 0x00, 0x0A, 0x65, 0x01, 0x96, 0xF9, 0x31,
0xC7, 0x7A, 0x57, 0xF2, 0xDD, 0xF4, 0x63, 0xE5, 0xE9, 0xEC, 0x14, 0x4B,
0x77, 0x7D, 0xE6, 0x2A, 0xAA, 0xB8, 0xA8, 0x62, 0x8A, 0xC3, 0x76, 0xD2,
0x82, 0xD6, 0xED, 0x38, 0x64, 0xE6, 0x79, 0x82, 0x42, 0x8E, 0xBC, 0x83,
0x1D, 0x14, 0x34, 0x8F, 0x6F, 0x2F, 0x91, 0x93, 0xB5, 0x04, 0x5A, 0xF2,
0x76, 0x71, 0x64, 0xE1, 0xDF, 0xC9, 0x67, 0xC1, 0xFB, 0x3F, 0x2E, 0x55,
0xA4, 0xBD, 0x1B, 0xFF, 0xE8, 0x3B, 0x9C, 0x80, 0xD0, 0x52, 0xB9, 0x85,
0xD1, 0x82, 0xEA, 0x0A, 0xDB, 0x2A, 0x3B, 0x73, 0x13, 0xD3, 0xFE, 0x14,
0xC8, 0x48, 0x4B, 0x1E, 0x05, 0x25, 0x88, 0xB9, 0xB7, 0xD2, 0xBB, 0xD2,
0xDF, 0x01, 0x61, 0x99, 0xEC, 0xD0, 0x6E, 0x15, 0x57, 0xCD, 0x09, 0x15,
0xB3, 0x35, 0x3B, 0xBB, 0x64, 0xE0, 0xEC, 0x37, 0x7F, 0xD0, 0x28, 0x37,
0x0D, 0xF9, 0x2B, 0x52, 0xC7, 0x89, 0x14, 0x28, 0xCD, 0xC6, 0x7E, 0xB6,
0x18, 0x4B, 0x52, 0x3D, 0x1D, 0xB2, 0x46, 0xC3, 0x2F, 0x63, 0x07, 0x84,
0x90, 0xF0, 0x0E, 0xF8, 0xD6, 0x47, 0xD1, 0x48, 0xD4, 0x79, 0x54, 0x51,
0x5E, 0x23, 0x27, 0xCF, 0xEF, 0x98, 0xC5, 0x82, 0x66, 0x4B, 0x4C, 0x0F,
0x6C, 0xC4, 0x16, 0x59
};
static const byte qHex[] = {
0x8C, 0xF8, 0x36, 0x42, 0xA7, 0x09, 0xA0, 0x97, 0xB4, 0x47, 0x99, 0x76,
0x40, 0x12, 0x9D, 0xA2, 0x99, 0xB1, 0xA4, 0x7D, 0x1E, 0xB3, 0x75, 0x0B,
0xA3, 0x08, 0xB0, 0xFE, 0x64, 0xF5, 0xFB, 0xD3
};
dh = wolfSSL_DH_new();
if (dh == NULL) {
err = 1;
}
if (!err) {
dh->p = wolfSSL_BN_bin2bn(pHex, (int)sizeof(pHex), NULL);
if (dh->p == NULL) {
WOLFSSL_ERROR_MSG("Error converting p hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
if (!err) {
dh->g = wolfSSL_BN_bin2bn(gHex, (int)sizeof(gHex), NULL);
if (dh->g == NULL) {
WOLFSSL_ERROR_MSG("Error converting g hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
if (!err) {
dh->q = wolfSSL_BN_bin2bn(qHex, (int)sizeof(qHex), NULL);
if (dh->q == NULL) {
WOLFSSL_ERROR_MSG("Error converting q hex to WOLFSSL_BIGNUM.");
err = 1;
}
}
if ((!err) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Error setting DH parameters.");
err = 1;
}
if (!err) {
dh->exSet = 1;
}
if (err && (dh != NULL)) {
wolfSSL_DH_free(dh);
dh = NULL;
}
return dh;
}
WOLFSSL_BIGNUM* wolfSSL_DH_768_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 768
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A63A3620FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_768_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 768 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_1024_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 1024
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE65381FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_1024_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 1024 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_1536_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 1536
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA237327FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_1536_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 1536 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_2048_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 2048
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28F"
"B5C55DF06F4C52C9DE2BCBF695581718"
"3995497CEA956AE515D2261898FA0510"
"15728E5A8AACAA68FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_2048_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 2048 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_3072_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 3072
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28F"
"B5C55DF06F4C52C9DE2BCBF695581718"
"3995497CEA956AE515D2261898FA0510"
"15728E5A8AAAC42DAD33170D04507A33"
"A85521ABDF1CBA64ECFB850458DBEF0A"
"8AEA71575D060C7DB3970F85A6E1E4C7"
"ABF5AE8CDB0933D71E8C94E04A25619D"
"CEE3D2261AD2EE6BF12FFA06D98A0864"
"D87602733EC86A64521F2B18177B200C"
"BBE117577A615D6C770988C0BAD946E2"
"08E24FA074E5AB3143DB5BFCE0FD108E"
"4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_3072_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 3072 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_4096_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 4096
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28F"
"B5C55DF06F4C52C9DE2BCBF695581718"
"3995497CEA956AE515D2261898FA0510"
"15728E5A8AAAC42DAD33170D04507A33"
"A85521ABDF1CBA64ECFB850458DBEF0A"
"8AEA71575D060C7DB3970F85A6E1E4C7"
"ABF5AE8CDB0933D71E8C94E04A25619D"
"CEE3D2261AD2EE6BF12FFA06D98A0864"
"D87602733EC86A64521F2B18177B200C"
"BBE117577A615D6C770988C0BAD946E2"
"08E24FA074E5AB3143DB5BFCE0FD108E"
"4B82D120A92108011A723C12A787E6D7"
"88719A10BDBA5B2699C327186AF4E23C"
"1A946834B6150BDA2583E9CA2AD44CE8"
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
"287C59474E6BC05D99B2964FA090C3A2"
"233BA186515BE7ED1F612970CEE2D7AF"
"B81BDD762170481CD0069127D5B05AA9"
"93B4EA988D8FDDC186FFB7DC90A6C08F"
"4DF435C934063199FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_4096_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 4096 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_6144_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 6144
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28F"
"B5C55DF06F4C52C9DE2BCBF695581718"
"3995497CEA956AE515D2261898FA0510"
"15728E5A8AAAC42DAD33170D04507A33"
"A85521ABDF1CBA64ECFB850458DBEF0A"
"8AEA71575D060C7DB3970F85A6E1E4C7"
"ABF5AE8CDB0933D71E8C94E04A25619D"
"CEE3D2261AD2EE6BF12FFA06D98A0864"
"D87602733EC86A64521F2B18177B200C"
"BBE117577A615D6C770988C0BAD946E2"
"08E24FA074E5AB3143DB5BFCE0FD108E"
"4B82D120A92108011A723C12A787E6D7"
"88719A10BDBA5B2699C327186AF4E23C"
"1A946834B6150BDA2583E9CA2AD44CE8"
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
"287C59474E6BC05D99B2964FA090C3A2"
"233BA186515BE7ED1F612970CEE2D7AF"
"B81BDD762170481CD0069127D5B05AA9"
"93B4EA988D8FDDC186FFB7DC90A6C08F"
"4DF435C93402849236C3FAB4D27C7026"
"C1D4DCB2602646DEC9751E763DBA37BD"
"F8FF9406AD9E530EE5DB382F413001AE"
"B06A53ED9027D831179727B0865A8918"
"DA3EDBEBCF9B14ED44CE6CBACED4BB1B"
"DB7F1447E6CC254B332051512BD7AF42"
"6FB8F401378CD2BF5983CA01C64B92EC"
"F032EA15D1721D03F482D7CE6E74FEF6"
"D55E702F46980C82B5A84031900B1C9E"
"59E7C97FBEC7E8F323A97A7E36CC88BE"
"0F1D45B7FF585AC54BD407B22B4154AA"
"CC8F6D7EBF48E1D814CC5ED20F8037E0"
"A79715EEF29BE32806A1D58BB7C5DA76"
"F550AA3D8A1FBFF0EB19CCB1A313D55C"
"DA56C9EC2EF29632387FE8D76E3C0468"
"043E8F663F4860EE12BF2D5B0B7474D6"
"E694F91E6DCC4024FFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_6144_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 6144 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
WOLFSSL_BIGNUM* wolfSSL_DH_8192_prime(WOLFSSL_BIGNUM* bn)
{
#if WOLFSSL_MAX_BN_BITS >= 8192
static const char prm[] = {
"FFFFFFFFFFFFFFFFC90FDAA22168C234"
"C4C6628B80DC1CD129024E088A67CC74"
"020BBEA63B139B22514A08798E3404DD"
"EF9519B3CD3A431B302B0A6DF25F1437"
"4FE1356D6D51C245E485B576625E7EC6"
"F44C42E9A637ED6B0BFF5CB6F406B7ED"
"EE386BFB5A899FA5AE9F24117C4B1FE6"
"49286651ECE45B3DC2007CB8A163BF05"
"98DA48361C55D39A69163FA8FD24CF5F"
"83655D23DCA3AD961C62F356208552BB"
"9ED529077096966D670C354E4ABC9804"
"F1746C08CA18217C32905E462E36CE3B"
"E39E772C180E86039B2783A2EC07A28F"
"B5C55DF06F4C52C9DE2BCBF695581718"
"3995497CEA956AE515D2261898FA0510"
"15728E5A8AAAC42DAD33170D04507A33"
"A85521ABDF1CBA64ECFB850458DBEF0A"
"8AEA71575D060C7DB3970F85A6E1E4C7"
"ABF5AE8CDB0933D71E8C94E04A25619D"
"CEE3D2261AD2EE6BF12FFA06D98A0864"
"D87602733EC86A64521F2B18177B200C"
"BBE117577A615D6C770988C0BAD946E2"
"08E24FA074E5AB3143DB5BFCE0FD108E"
"4B82D120A92108011A723C12A787E6D7"
"88719A10BDBA5B2699C327186AF4E23C"
"1A946834B6150BDA2583E9CA2AD44CE8"
"DBBBC2DB04DE8EF92E8EFC141FBECAA6"
"287C59474E6BC05D99B2964FA090C3A2"
"233BA186515BE7ED1F612970CEE2D7AF"
"B81BDD762170481CD0069127D5B05AA9"
"93B4EA988D8FDDC186FFB7DC90A6C08F"
"4DF435C93402849236C3FAB4D27C7026"
"C1D4DCB2602646DEC9751E763DBA37BD"
"F8FF9406AD9E530EE5DB382F413001AE"
"B06A53ED9027D831179727B0865A8918"
"DA3EDBEBCF9B14ED44CE6CBACED4BB1B"
"DB7F1447E6CC254B332051512BD7AF42"
"6FB8F401378CD2BF5983CA01C64B92EC"
"F032EA15D1721D03F482D7CE6E74FEF6"
"D55E702F46980C82B5A84031900B1C9E"
"59E7C97FBEC7E8F323A97A7E36CC88BE"
"0F1D45B7FF585AC54BD407B22B4154AA"
"CC8F6D7EBF48E1D814CC5ED20F8037E0"
"A79715EEF29BE32806A1D58BB7C5DA76"
"F550AA3D8A1FBFF0EB19CCB1A313D55C"
"DA56C9EC2EF29632387FE8D76E3C0468"
"043E8F663F4860EE12BF2D5B0B7474D6"
"E694F91E6DBE115974A3926F12FEE5E4"
"38777CB6A932DF8CD8BEC4D073B931BA"
"3BC832B68D9DD300741FA7BF8AFC47ED"
"2576F6936BA424663AAB639C5AE4F568"
"3423B4742BF1C978238F16CBE39D652D"
"E3FDB8BEFC848AD922222E04A4037C07"
"13EB57A81A23F0C73473FC646CEA306B"
"4BCBC8862F8385DDFA9D4B7FA2C087E8"
"79683303ED5BDD3A062B3CF5B3A278A6"
"6D2A13F83F44F82DDF310EE074AB6A36"
"4597E899A0255DC164F31CC50846851D"
"F9AB48195DED7EA1B1D510BD7EE74D73"
"FAF36BC31ECFA268359046F4EB879F92"
"4009438B481C6CD7889A002ED5EE382B"
"C9190DA6FC026E479558E4475677E9AA"
"9E3050E2765694DFC81F56E880B96E71"
"60C980DD98EDD3DFFFFFFFFFFFFFFFFF"
};
WOLFSSL_ENTER("wolfSSL_DH_8192_prime");
if (wolfSSL_BN_hex2bn(&bn, prm) != 1) {
WOLFSSL_ERROR_MSG("Error converting DH 8192 prime to big number");
bn = NULL;
}
return bn;
#else
(void)bn;
return NULL;
#endif
}
#ifndef NO_CERTS
static int wolfssl_dh_load_params(WOLFSSL_DH* dh, const unsigned char* der,
word32* idx, word32 derSz)
{
int err = 0;
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
int ret;
ret = wc_DhKeyDecode(der, idx, (DhKey*)dh->internal, derSz);
if (ret != 0) {
WOLFSSL_ERROR_MSG("DhKeyDecode() failed");
err = 1;
}
if (!err) {
dh->inSet = 1;
if (SetDhExternal(dh) != 1) {
WOLFSSL_ERROR_MSG("SetDhExternal failed");
err = 1;
}
}
#else
byte* p;
byte* g;
word32 pSz = MAX_DH_SIZE;
word32 gSz = MAX_DH_SIZE;
p = (byte*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
g = (byte*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
if ((p == NULL) || (g == NULL)) {
err = 1;
}
if ((!err) && (wc_DhParamsLoad(der + *idx, derSz - *idx, p, &pSz, g,
&gSz) < 0)) {
err = 1;
}
if (!err) {
if (dh->p != NULL) {
wolfSSL_BN_free(dh->p);
dh->p = NULL;
}
if (dh->g != NULL) {
wolfSSL_BN_free(dh->g);
dh->g = NULL;
}
dh->p = wolfSSL_BN_bin2bn(p, (int)pSz, NULL);
dh->g = wolfSSL_BN_bin2bn(g, (int)gSz, NULL);
if (dh->p == NULL || dh->g == NULL) {
err = 1;
}
else {
dh->exSet = 1;
}
}
if ((!err) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Unable to set internal DH structure");
err = 1;
}
if (!err) {
*idx += wolfssl_der_length(der + *idx, derSz - *idx);
}
XFREE(p, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
XFREE(g, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
#endif
return err;
}
#ifdef OPENSSL_ALL
#if !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
WOLFSSL_DH *wolfSSL_d2i_DHparams(WOLFSSL_DH** dh, const unsigned char** pp,
long length)
{
WOLFSSL_DH *newDh = NULL;
word32 idx = 0;
int err = 0;
WOLFSSL_ENTER("wolfSSL_d2i_DHparams");
if ((pp == NULL) || (length <= 0)) {
WOLFSSL_ERROR_MSG("bad argument");
err = 1;
}
if ((!err) && ((newDh = wolfSSL_DH_new()) == NULL)) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new() failed");
err = 1;
}
if ((!err) && (wolfssl_dh_load_params(newDh, *pp, &idx,
(word32)length) != 0)) {
WOLFSSL_ERROR_MSG("Loading DH parameters failed");
err = 1;
}
if ((!err) && (dh != NULL)) {
*dh = newDh;
*pp += idx;
}
if (err && (newDh != NULL)) {
wolfSSL_DH_free(newDh);
newDh = NULL;
}
return newDh;
}
#endif
int wolfSSL_i2d_DHparams(const WOLFSSL_DH *dh, unsigned char **out)
{
#if (!defined(HAVE_FIPS) || FIPS_VERSION_GT(5,0)) && defined(WOLFSSL_DH_EXTRA)
word32 len = (word32)-1;
int err = 0;
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad parameters");
err = 1;
}
if ((!err) && (!dh->inSet) && (SetDhInternal((WOLFSSL_DH*)dh) != 1)) {
WOLFSSL_ERROR_MSG("Bad DH set internal");
err = 1;
}
if (!err) {
int ret;
unsigned char* der = NULL;
if (out != NULL) {
der = *out;
}
ret = wc_DhParamsToDer((DhKey*)dh->internal, der, &len);
if (ret > 0) {
*out += len;
}
else if (ret != WC_NO_ERR_TRACE(LENGTH_ONLY_E)) {
err = 1;
}
}
if (err) {
len = 0;
}
return (int)len;
#else
word32 len;
int ret = 0;
int pSz;
int gSz;
WOLFSSL_ENTER("wolfSSL_i2d_DHparams");
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad parameters");
len = 0;
}
else {
pSz = mp_unsigned_bin_size((mp_int*)dh->p->internal) +
mp_leading_bit((mp_int*)dh->p->internal);
gSz = mp_unsigned_bin_size((mp_int*)dh->g->internal) +
mp_leading_bit((mp_int*)dh->g->internal);
len = 1 + ASN_LEN_SIZE(pSz) + pSz +
1 + ASN_LEN_SIZE(gSz) + gSz;
len += 1 + ASN_LEN_SIZE(len);
if ((out != NULL) && (*out != NULL)) {
ret = StoreDHparams(*out, &len, (mp_int*)dh->p->internal,
(mp_int*)dh->g->internal);
if (ret != MP_OKAY) {
WOLFSSL_ERROR_MSG("StoreDHparams error");
len = 0;
}
else {
*out += len;
}
}
}
return (int)len;
#endif
}
#endif
#endif
#endif
#if defined(OPENSSL_EXTRA) || \
((!defined(NO_BIO) || !defined(NO_FILESYSTEM)) && \
defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) || \
defined(WOLFSSL_MYSQL_COMPATIBLE))
int wolfSSL_DH_LoadDer(WOLFSSL_DH* dh, const unsigned char* derBuf, int derSz)
{
int ret = 1;
word32 idx = 0;
if ((dh == NULL) || (dh->internal == NULL) || (derBuf == NULL) ||
(derSz <= 0)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = WOLFSSL_FATAL_ERROR;
}
if ((ret == 1) && (wolfssl_dh_load_params(dh, derBuf, &idx,
(word32)derSz) != 0)) {
WOLFSSL_ERROR_MSG("DH key decode failed");
ret = WOLFSSL_FATAL_ERROR;
}
return ret;
}
#endif
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
|| defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
#if !defined(NO_BIO) || !defined(NO_FILESYSTEM)
static WOLFSSL_DH *wolfssl_dhparams_read_pem(WOLFSSL_DH **dh,
unsigned char* pem, int pemSz, int memAlloced)
{
WOLFSSL_DH* localDh = NULL;
DerBuffer *der = NULL;
int err = 0;
if ((!err) && (PemToDer(pem, pemSz, DH_PARAM_TYPE, &der, NULL, NULL,
NULL) < 0)) {
if (PemToDer(pem, pemSz, X942_PARAM_TYPE, &der, NULL, NULL, NULL)
!= 0) {
err = 1;
}
else {
unsigned long error;
CLEAR_ASN_NO_PEM_HEADER_ERROR(error);
}
}
if (memAlloced) {
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
}
if (!err) {
if (dh != NULL) {
localDh = *dh;
}
if (localDh == NULL) {
localDh = wolfSSL_DH_new();
if (localDh == NULL) {
err = 1;
}
}
}
if ((!err) && (wolfSSL_DH_LoadDer(localDh, der->buffer, (int)der->length)
!= 1)) {
if ((dh == NULL) || (localDh != *dh)) {
wolfSSL_DH_free(localDh);
}
localDh = NULL;
err = 1;
}
if ((!err) && (dh != NULL)) {
*dh = localDh;
}
if (der != NULL) {
FreeDer(&der);
}
return localDh;
}
#endif
#ifndef NO_BIO
WOLFSSL_DH *wolfSSL_PEM_read_bio_DHparams(WOLFSSL_BIO *bio, WOLFSSL_DH **dh,
wc_pem_password_cb *cb, void *pass)
{
WOLFSSL_DH* localDh = NULL;
int err = 0;
unsigned char* mem = NULL;
int size = 0;
int memAlloced = 0;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_DHparams");
(void)cb;
(void)pass;
if (bio == NULL) {
WOLFSSL_ERROR_MSG("Bad Function Argument bio is NULL");
err = 1;
}
if ((!err) && (wolfssl_read_bio(bio, (char**)&mem, &size, &memAlloced)
!= 0)) {
err = 1;
}
if (!err) {
localDh = wolfssl_dhparams_read_pem(dh, mem, size, memAlloced);
}
return localDh;
}
#endif
#ifndef NO_FILESYSTEM
WOLFSSL_DH* wolfSSL_PEM_read_DHparams(XFILE fp, WOLFSSL_DH** dh,
wc_pem_password_cb* cb, void* pass)
{
WOLFSSL_DH* localDh = NULL;
int err = 0;
unsigned char* mem = NULL;
int size = 0;
(void)cb;
(void)pass;
if (wolfssl_read_file(fp, (char**)&mem, &size) != 0) {
err = 1;
}
if (!err) {
localDh = wolfssl_dhparams_read_pem(dh, mem, size, 1);
}
return localDh;
}
#endif
#if defined(WOLFSSL_DH_EXTRA) && !defined(NO_FILESYSTEM)
static int wolfssl_dhparams_to_der(WOLFSSL_DH* dh, unsigned char** out,
void* heap)
{
int ret = WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR);
int err = 0;
byte* der = NULL;
word32 derSz = 0;
DhKey* key = NULL;
(void)heap;
if ((dh->inSet == 0) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Unable to set internal DH structure");
err = 1;
}
if (!err) {
key = (DhKey*)dh->internal;
ret = wc_DhParamsToDer(key, NULL, &derSz);
if (ret != WC_NO_ERR_TRACE(LENGTH_ONLY_E)) {
WOLFSSL_ERROR_MSG("Failed to get size of DH params");
err = 1;
}
}
if (!err) {
der = (byte*)XMALLOC(derSz, heap, DYNAMIC_TYPE_TMP_BUFFER);
if (der == NULL) {
WOLFSSL_LEAVE("wolfssl_dhparams_to_der", MEMORY_E);
err = 1;
}
}
if (!err) {
ret = wc_DhParamsToDer(key, der, &derSz);
if (ret < 0) {
WOLFSSL_ERROR_MSG("Failed to export DH params");
err = 1;
}
}
if (!err) {
*out = der;
der = NULL;
}
XFREE(der, heap, DYNAMIC_TYPE_TMP_BUFFER);
return ret;
}
int wolfSSL_PEM_write_DHparams(XFILE fp, WOLFSSL_DH* dh)
{
int ret = 1;
int derSz = 0;
byte* derBuf = NULL;
void* heap = NULL;
WOLFSSL_ENTER("wolfSSL_PEM_write_DHparams");
if ((fp == XBADFILE) || (dh == NULL)) {
WOLFSSL_ERROR_MSG("Bad Function Arguments");
ret = 0;
}
if (ret == 1) {
DhKey* key = (DhKey*)dh->internal;
if (key)
heap = key->heap;
if ((derSz = wolfssl_dhparams_to_der(dh, &derBuf, heap)) < 0) {
WOLFSSL_ERROR_MSG("DER encoding failed");
ret = 0;
}
if (derBuf == NULL) {
WOLFSSL_ERROR_MSG("DER encoding failed to get buffer");
ret = 0;
}
}
if ((ret == 1) && (der_write_to_file_as_pem(derBuf, derSz, fp,
DH_PARAM_TYPE, NULL) != 1)) {
ret = 0;
}
XFREE(derBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
WOLFSSL_LEAVE("wolfSSL_PEM_write_DHparams", ret);
return ret;
}
#endif
#endif
#ifdef OPENSSL_EXTRA
#if defined(WOLFSSL_QT) || defined(OPENSSL_ALL) \
|| defined(WOLFSSL_OPENSSH) || defined(OPENSSL_EXTRA)
int SetDhExternal_ex(WOLFSSL_DH *dh, int elm)
{
int ret = 1;
DhKey *key = NULL;
WOLFSSL_ENTER("SetDhExternal_ex");
if ((dh == NULL) || (dh->internal == NULL)) {
WOLFSSL_ERROR_MSG("dh key NULL error");
ret = WOLFSSL_FATAL_ERROR;
}
if (ret == 1) {
key = (DhKey*)dh->internal;
}
if ((ret == 1) && (elm & ELEMENT_P)) {
if (wolfssl_bn_set_value(&dh->p, &key->p) != 1) {
WOLFSSL_ERROR_MSG("dh param p error");
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 1) && (elm & ELEMENT_G)) {
if (wolfssl_bn_set_value(&dh->g, &key->g) != 1) {
WOLFSSL_ERROR_MSG("dh param g error");
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 1) && (elm & ELEMENT_Q)) {
if (wolfssl_bn_set_value(&dh->q, &key->q) != 1) {
WOLFSSL_ERROR_MSG("dh param q error");
ret = WOLFSSL_FATAL_ERROR;
}
}
#ifdef WOLFSSL_DH_EXTRA
if ((ret == 1) && (elm & ELEMENT_PRV)) {
if (wolfssl_bn_set_value(&dh->priv_key, &key->priv) != 1) {
WOLFSSL_ERROR_MSG("No DH Private Key");
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 1) && (elm & ELEMENT_PUB)) {
if (wolfssl_bn_set_value(&dh->pub_key, &key->pub) != 1) {
WOLFSSL_ERROR_MSG("No DH Public Key");
ret = WOLFSSL_FATAL_ERROR;
}
}
#endif
if (ret == 1) {
dh->exSet = 1;
}
return ret;
}
int SetDhExternal(WOLFSSL_DH *dh)
{
int elements = ELEMENT_P | ELEMENT_G | ELEMENT_PUB | ELEMENT_PRV;
WOLFSSL_ENTER("SetDhExternal");
return SetDhExternal_ex(dh, elements);
}
#endif
int SetDhInternal(WOLFSSL_DH* dh)
{
int ret = 1;
DhKey *key = NULL;
WOLFSSL_ENTER("SetDhInternal");
if ((dh == NULL) || (dh->p == NULL) || (dh->g == NULL)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = WOLFSSL_FATAL_ERROR;
}
if (ret == 1) {
key = (DhKey*)dh->internal;
wc_FreeDhKey(key);
if (wc_InitDhKey(key) != 0) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 1) {
if (wolfssl_bn_get_value(dh->p, &key->p) != 1) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 1) {
if (wolfssl_bn_get_value(dh->g, &key->g) != 1) {
ret = WOLFSSL_FATAL_ERROR;
}
}
#ifdef HAVE_FFDHE_Q
if ((ret == 1) && (dh->q != NULL)) {
if (wolfssl_bn_get_value(dh->q, &key->q) != 1) {
ret = WOLFSSL_FATAL_ERROR;
}
}
#endif
#ifdef WOLFSSL_DH_EXTRA
if ((ret == 1) && (dh->priv_key != NULL) &&
(!wolfSSL_BN_is_zero(dh->priv_key))) {
if (wolfssl_bn_get_value(dh->priv_key, &key->priv) != 1) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 1) && (dh->pub_key != NULL) &&
(!wolfSSL_BN_is_zero(dh->pub_key))) {
if (wolfssl_bn_get_value(dh->pub_key, &key->pub) != 1) {
ret = WOLFSSL_FATAL_ERROR;
}
}
#endif
if (ret == 1) {
dh->inSet = 1;
}
return ret;
}
int wolfSSL_DH_size(WOLFSSL_DH* dh)
{
WOLFSSL_ENTER("wolfSSL_DH_size");
if (dh == NULL)
return WOLFSSL_FATAL_ERROR;
return wolfSSL_BN_num_bytes(dh->p);
}
void wolfSSL_DH_get0_pqg(const WOLFSSL_DH *dh, const WOLFSSL_BIGNUM **p,
const WOLFSSL_BIGNUM **q, const WOLFSSL_BIGNUM **g)
{
WOLFSSL_ENTER("wolfSSL_DH_get0_pqg");
if (dh != NULL) {
if (p != NULL) {
*p = dh->p;
}
if (q != NULL) {
*q = dh->q;
}
if (g != NULL) {
*g = dh->g;
}
}
}
#if !defined(HAVE_FIPS) || (defined(HAVE_FIPS) && !defined(WOLFSSL_DH_EXTRA)) \
|| (defined(HAVE_FIPS_VERSION) && FIPS_VERSION_GT(2,0))
#if defined(OPENSSL_ALL) || \
defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
int wolfSSL_DH_set0_pqg(WOLFSSL_DH *dh, WOLFSSL_BIGNUM *p,
WOLFSSL_BIGNUM *q, WOLFSSL_BIGNUM *g)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_DH_set0_pqg");
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = 0;
}
if ((ret == 1) && (p == NULL) && (dh->p == NULL)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = 0;
}
if ((ret == 1) && (g == NULL) && (dh->g == NULL)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = 0;
}
if (ret == 1) {
dh->inSet = 0;
if (p != NULL) {
wolfSSL_BN_free(dh->p);
dh->p = p;
}
if (q != NULL) {
wolfSSL_BN_free(dh->q);
dh->q = q;
}
if (g != NULL) {
wolfSSL_BN_free(dh->g);
dh->g = g;
}
dh->exSet = 1;
if (SetDhInternal(dh) != 1) {
WOLFSSL_ERROR_MSG("Unable to set internal DH key");
dh->p = NULL;
dh->q = NULL;
dh->g = NULL;
dh->inSet = 0;
dh->exSet = 0;
ret = 0;
}
}
return ret;
}
int wolfSSL_DH_set_length(WOLFSSL_DH *dh, long len)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_DH_set_length");
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = 0;
}
else {
dh->length = (int)len;
}
return ret;
}
#endif
#endif
void wolfSSL_DH_get0_key(const WOLFSSL_DH *dh, const WOLFSSL_BIGNUM **pub_key,
const WOLFSSL_BIGNUM **priv_key)
{
WOLFSSL_ENTER("wolfSSL_DH_get0_key");
if (dh != NULL) {
if ((pub_key != NULL) && (dh->pub_key != NULL)) {
*pub_key = dh->pub_key;
}
if ((priv_key != NULL) && (dh->priv_key != NULL)) {
*priv_key = dh->priv_key;
}
}
}
int wolfSSL_DH_set0_key(WOLFSSL_DH *dh, WOLFSSL_BIGNUM *pub_key,
WOLFSSL_BIGNUM *priv_key)
{
int ret = 1;
#ifdef WOLFSSL_DH_EXTRA
DhKey *key = NULL;
#endif
WOLFSSL_ENTER("wolfSSL_DH_set0_key");
if (dh == NULL) {
ret = 0;
}
#ifdef WOLFSSL_DH_EXTRA
else {
key = (DhKey*)dh->internal;
}
#endif
if ((ret == 1) && (pub_key != NULL)) {
wolfSSL_BN_free(dh->pub_key);
dh->pub_key = pub_key;
#ifdef WOLFSSL_DH_EXTRA
if (wolfssl_bn_get_value(dh->pub_key, &key->pub) != 1) {
ret = 0;
}
#endif
}
if ((ret == 1) && (priv_key != NULL)) {
wolfSSL_BN_clear_free(dh->priv_key);
dh->priv_key = priv_key;
#ifdef WOLFSSL_DH_EXTRA
if (wolfssl_bn_get_value(dh->priv_key, &key->priv) != 1) {
ret = 0;
}
#endif
}
return ret;
}
#endif
#ifdef OPENSSL_EXTRA
#ifndef NO_CERTS
#ifdef OPENSSL_ALL
static int wolfssl_dh_check_prime(WOLFSSL_BIGNUM* n, int* isPrime)
{
int ret = 1;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
WC_RNG* rng;
int localRng;
rng = wolfssl_make_rng(tmpRng, &localRng);
if (rng == NULL) {
ret = 0;
}
if (ret == 1) {
mp_int* prime = (mp_int*)n->internal;
if (mp_prime_is_prime_ex(prime, 8, isPrime, rng) != 0) {
ret = 0;
}
if (localRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
}
}
return ret;
}
int wolfSSL_DH_check(const WOLFSSL_DH *dh, int *codes)
{
int ret = 1;
int errors = 0;
WOLFSSL_ENTER("wolfSSL_DH_check");
if (dh == NULL) {
ret = 0;
}
if ((ret == 1) && ((dh->g == NULL) || (dh->g->internal == NULL))) {
errors |= DH_NOT_SUITABLE_GENERATOR;
}
if (ret == 1) {
if ((dh->p == NULL) || (dh->p->internal == NULL)) {
errors |= DH_CHECK_P_NOT_PRIME;
}
else {
int isPrime = MP_NO;
ret = wolfssl_dh_check_prime(dh->p, &isPrime);
if ((ret == 1) && (isPrime != MP_YES)) {
errors |= DH_CHECK_P_NOT_PRIME;
}
}
}
if (codes != NULL) {
*codes = errors;
}
else if (errors) {
ret = 0;
}
return ret;
}
#endif
#endif
#endif
#if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
(defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)))
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST)
WOLFSSL_DH *wolfSSL_DH_generate_parameters(int prime_len, int generator,
void (*callback) (int, int, void *), void *cb_arg)
{
WOLFSSL_DH* dh = NULL;
WOLFSSL_ENTER("wolfSSL_DH_generate_parameters");
(void)callback;
(void)cb_arg;
if ((dh = wolfSSL_DH_new()) == NULL) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_new error");
}
else if (wolfSSL_DH_generate_parameters_ex(dh, prime_len, generator, NULL)
!= 1) {
WOLFSSL_ERROR_MSG("wolfSSL_DH_generate_parameters_ex error");
wolfSSL_DH_free(dh);
dh = NULL;
}
return dh;
}
int wolfSSL_DH_generate_parameters_ex(WOLFSSL_DH* dh, int prime_len,
int generator, void (*callback) (int, int, void *))
{
int ret = 1;
DhKey* key = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
WC_RNG* rng = NULL;
int localRng = 0;
WOLFSSL_ENTER("wolfSSL_DH_generate_parameters_ex");
(void)callback;
(void)generator;
if (dh == NULL) {
WOLFSSL_ERROR_MSG("Bad parameter");
ret = 0;
}
if (ret == 1) {
rng = wolfssl_make_rng(tmpRng, &localRng);
if (rng == NULL) {
WOLFSSL_ERROR_MSG("No RNG to use");
ret = 0;
}
}
if (ret == 1) {
key = (DhKey*)dh->internal;
wc_FreeDhKey(key);
if (wc_InitDhKey(key) != 0) {
ret = 0;
}
}
if (ret == 1) {
if (wc_DhGenerateParams(rng, prime_len, key) != 0) {
WOLFSSL_ERROR_MSG("wc_DhGenerateParams error");
ret = 0;
}
}
if (localRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
}
if (ret == 1) {
dh->inSet = 1;
WOLFSSL_MSG("wolfSSL does not support using a custom generator.");
if (SetDhExternal(dh) != 1) {
WOLFSSL_ERROR_MSG("SetDhExternal error");
ret = 0;
}
}
return ret;
}
#endif
#endif
#ifdef OPENSSL_EXTRA
#if !defined(HAVE_FIPS) || (defined(HAVE_FIPS) && !defined(WOLFSSL_DH_EXTRA)) \
|| (defined(HAVE_FIPS_VERSION) && FIPS_VERSION_GT(2,0))
int wolfSSL_DH_generate_key(WOLFSSL_DH* dh)
{
int ret = 1;
word32 pubSz = 0;
word32 privSz = 0;
int localRng = 0;
WC_RNG* rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
unsigned char* pub = NULL;
unsigned char* priv = NULL;
WOLFSSL_ENTER("wolfSSL_DH_generate_key");
if ((dh == NULL) || (dh->p == NULL) || (dh->g == NULL)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = 0;
}
if ((ret == 1) && (dh->inSet == 0) && (SetDhInternal(dh) != 1)) {
WOLFSSL_ERROR_MSG("Bad DH set internal");
ret = 0;
}
if (ret == 1) {
rng = wolfssl_make_rng(tmpRng, &localRng);
if (rng == NULL) {
ret = 0;
}
}
if (ret == 1) {
pubSz = (word32)wolfSSL_BN_num_bytes(dh->p);
if (pubSz == 0) {
WOLFSSL_ERROR_MSG("Prime parameter invalid");
ret = 0;
}
}
if (ret == 1) {
if (dh->length) {
privSz = (word32)(dh->length / 8);
if (dh->length == 128)
privSz = 21;
}
else {
privSz = pubSz;
}
pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
if (pub == NULL || priv == NULL) {
WOLFSSL_ERROR_MSG("Unable to malloc memory");
ret = 0;
}
}
if (ret == 1) {
wolfSSL_BN_free(dh->pub_key);
wolfSSL_BN_free(dh->priv_key);
dh->pub_key = wolfSSL_BN_new();
dh->priv_key = wolfSSL_BN_new();
if (dh->pub_key == NULL) {
WOLFSSL_ERROR_MSG("Bad DH new pub");
ret = 0;
}
if (dh->priv_key == NULL) {
WOLFSSL_ERROR_MSG("Bad DH new priv");
ret = 0;
}
}
PRIVATE_KEY_UNLOCK();
if ((ret == 1) && (wc_DhGenerateKeyPair((DhKey*)dh->internal, rng, priv,
&privSz, pub, &pubSz) < 0)) {
WOLFSSL_ERROR_MSG("Bad wc_DhGenerateKeyPair");
ret = 0;
}
if ((ret == 1) && (wolfSSL_BN_bin2bn(pub, (int)pubSz, dh->pub_key) ==
NULL)) {
WOLFSSL_ERROR_MSG("Bad DH bn2bin error pub");
ret = 0;
}
if ((ret == 1) && (wolfSSL_BN_bin2bn(priv, (int)privSz, dh->priv_key) ==
NULL)) {
WOLFSSL_ERROR_MSG("Bad DH bn2bin error priv");
ret = 0;
}
PRIVATE_KEY_LOCK();
if (localRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_RNG);
}
XFREE(pub, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
XFREE(priv, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
return ret;
}
static int _DH_compute_key(unsigned char* key, const WOLFSSL_BIGNUM* otherPub,
WOLFSSL_DH* dh, int ct)
{
int ret = 0;
word32 keySz = 0;
int pubSz = MAX_DHKEY_SZ;
int privSz = MAX_DHKEY_SZ;
int sz = 0;
#ifdef WOLFSSL_SMALL_STACK
unsigned char* pub = NULL;
unsigned char* priv = NULL;
#else
unsigned char pub [MAX_DHKEY_SZ];
unsigned char priv[MAX_DHKEY_SZ];
#endif
WOLFSSL_ENTER("wolfSSL_DH_compute_key");
if ((dh == NULL) || (dh->priv_key == NULL) || (otherPub == NULL)) {
WOLFSSL_ERROR_MSG("Bad function arguments");
ret = WOLFSSL_FATAL_ERROR;
}
if ((ret == 0) && ((keySz = (word32)wolfSSL_DH_size(dh)) == 0)) {
WOLFSSL_ERROR_MSG("Bad DH_size");
ret = WOLFSSL_FATAL_ERROR;
}
if (ret == 0) {
sz = wolfSSL_BN_num_bytes(dh->priv_key);
if (sz > privSz) {
WOLFSSL_ERROR_MSG("Bad priv internal size");
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 0) {
#ifdef WOLFSSL_SMALL_STACK
privSz = sz;
#endif
sz = wolfSSL_BN_num_bytes(otherPub);
if (sz > pubSz) {
WOLFSSL_ERROR_MSG("Bad otherPub size");
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 0) {
#ifdef WOLFSSL_SMALL_STACK
pub = (unsigned char*)XMALLOC((size_t)sz, NULL,
DYNAMIC_TYPE_PUBLIC_KEY);
if (pub == NULL)
ret = WOLFSSL_FATAL_ERROR;
}
if (ret == 0) {
priv = (unsigned char*)XMALLOC((size_t)privSz, NULL,
DYNAMIC_TYPE_PRIVATE_KEY);
if (priv == NULL) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 0) {
#endif
privSz = wolfSSL_BN_bn2bin(dh->priv_key, priv);
if (privSz <= 0) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret == 0) {
pubSz = wolfSSL_BN_bn2bin(otherPub, pub);
if (pubSz <= 0) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 0) && ((dh->inSet == 0) && (SetDhInternal(dh) != 1))) {
WOLFSSL_ERROR_MSG("Bad DH set internal");
ret = WOLFSSL_FATAL_ERROR;
}
PRIVATE_KEY_UNLOCK();
if (ret == 0) {
word32 padded_keySz = keySz;
#if (!defined(HAVE_FIPS) || FIPS_VERSION_GE(7,0)) && !defined(HAVE_SELFTEST)
if (ct) {
if (wc_DhAgree_ct((DhKey*)dh->internal, key, &keySz, priv,
(word32)privSz, pub, (word32)pubSz) < 0) {
WOLFSSL_ERROR_MSG("wc_DhAgree_ct failed");
ret = WOLFSSL_FATAL_ERROR;
}
}
else
#endif
{
if (wc_DhAgree((DhKey*)dh->internal, key, &keySz, priv,
(word32)privSz, pub, (word32)pubSz) < 0) {
WOLFSSL_ERROR_MSG("wc_DhAgree failed");
ret = WOLFSSL_FATAL_ERROR;
}
}
if ((ret == 0) && ct) {
if (keySz < padded_keySz) {
XMEMMOVE(key, key + (padded_keySz - keySz),
padded_keySz - keySz);
XMEMSET(key, 0, padded_keySz - keySz);
keySz = padded_keySz;
}
}
}
if (ret == 0) {
ret = (int)keySz;
}
PRIVATE_KEY_LOCK();
if (privSz > 0) {
#ifdef WOLFSSL_SMALL_STACK
if (priv != NULL)
#endif
{
ForceZero(priv, (word32)privSz);
}
}
WC_FREE_VAR_EX(pub, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
WC_FREE_VAR_EX(priv, NULL, DYNAMIC_TYPE_PRIVATE_KEY);
WOLFSSL_LEAVE("wolfSSL_DH_compute_key", ret);
return ret;
}
int wolfSSL_DH_compute_key(unsigned char* key, const WOLFSSL_BIGNUM* otherPub,
WOLFSSL_DH* dh)
{
return _DH_compute_key(key, otherPub, dh, 0);
}
int wolfSSL_DH_compute_key_padded(unsigned char* key,
const WOLFSSL_BIGNUM* otherPub, WOLFSSL_DH* dh)
{
return _DH_compute_key(key, otherPub, dh, 1);
}
#endif
#endif
#endif
#define WOLFSSL_PK_EC_INCLUDED
#include "src/pk_ec.c"
#if defined(OPENSSL_EXTRA) && defined(HAVE_CURVE25519)
int wolfSSL_EC25519_generate_key(unsigned char *priv, unsigned int *privSz,
unsigned char *pub, unsigned int *pubSz)
{
#ifdef WOLFSSL_KEY_GEN
int res = 1;
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
curve25519_key key;
WOLFSSL_ENTER("wolfSSL_EC25519_generate_key");
if ((priv == NULL) || (privSz == NULL) || (*privSz < CURVE25519_KEYSIZE) ||
(pub == NULL) || (pubSz == NULL) || (*pubSz < CURVE25519_KEYSIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res) {
rng = wolfssl_make_rng(tmpRng, &initTmpRng);
if (rng == NULL) {
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key failed to make RNG");
res = 0;
}
}
if (res && (wc_curve25519_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve25519_init failed");
res = 0;
}
if (res) {
int ret = wc_curve25519_make_key(rng, CURVE25519_KEYSIZE, &key);
if (ret != MP_OKAY) {
WOLFSSL_MSG("wc_curve25519_make_key failed");
res = 0;
}
if (res) {
ret = wc_curve25519_export_key_raw_ex(&key, priv, privSz, pub,
pubSz, EC25519_LITTLE_ENDIAN);
if (ret != MP_OKAY) {
WOLFSSL_MSG("wc_curve25519_export_key_raw_ex failed");
res = 0;
}
}
wc_curve25519_free(&key);
}
if (initTmpRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_RNG);
}
return res;
#else
WOLFSSL_MSG("No Key Gen built in");
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
int wolfSSL_EC25519_shared_key(unsigned char *shared, unsigned int *sharedSz,
const unsigned char *priv, unsigned int privSz, const unsigned char *pub,
unsigned int pubSz)
{
#ifdef WOLFSSL_KEY_GEN
int res = 1;
curve25519_key privkey;
curve25519_key pubkey;
WOLFSSL_ENTER("wolfSSL_EC25519_shared_key");
if ((shared == NULL) || (sharedSz == NULL) ||
(*sharedSz < CURVE25519_KEYSIZE) || (priv == NULL) ||
(privSz < CURVE25519_KEYSIZE) || (pub == NULL) ||
(pubSz < CURVE25519_KEYSIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_curve25519_init(&privkey) != 0)) {
WOLFSSL_MSG("wc_curve25519_init privkey failed");
res = 0;
}
if (res) {
#ifdef WOLFSSL_CURVE25519_BLINDING
if (wc_curve25519_set_rng(&privkey, wolfssl_make_global_rng()) != 0) {
res = 0;
}
else
#endif
if (wc_curve25519_init(&pubkey) != MP_OKAY) {
WOLFSSL_MSG("wc_curve25519_init pubkey failed");
res = 0;
}
if (res) {
int ret = wc_curve25519_import_private_ex(priv, privSz, &privkey,
EC25519_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve25519_import_private_ex failed");
res = 0;
}
if (res) {
ret = wc_curve25519_import_public_ex(pub, pubSz, &pubkey,
EC25519_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve25519_import_public_ex failed");
res = 0;
}
}
if (res) {
ret = wc_curve25519_shared_secret_ex(&privkey, &pubkey, shared,
sharedSz, EC25519_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve25519_shared_secret_ex failed");
res = 0;
}
}
wc_curve25519_free(&pubkey);
}
wc_curve25519_free(&privkey);
}
return res;
#else
WOLFSSL_MSG("No Key Gen built in");
(void)shared;
(void)sharedSz;
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
#endif
#if defined(OPENSSL_EXTRA) && defined(HAVE_ED25519)
int wolfSSL_ED25519_generate_key(unsigned char *priv, unsigned int *privSz,
unsigned char *pub, unsigned int *pubSz)
{
#if defined(WOLFSSL_KEY_GEN) && defined(HAVE_ED25519_KEY_EXPORT)
int res = 1;
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
ed25519_key key;
WOLFSSL_ENTER("wolfSSL_ED25519_generate_key");
if ((priv == NULL) || (privSz == NULL) ||
(*privSz < ED25519_PRV_KEY_SIZE) || (pub == NULL) ||
(pubSz == NULL) || (*pubSz < ED25519_PUB_KEY_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res) {
rng = wolfssl_make_rng(tmpRng, &initTmpRng);
if (rng == NULL) {
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key failed to make RNG");
res = 0;
}
}
if (res && (wc_ed25519_init(&key) != 0)) {
WOLFSSL_MSG("wc_ed25519_init failed");
res = 0;
}
if (res) {
int ret = wc_ed25519_make_key(rng, ED25519_KEY_SIZE, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed25519_make_key failed");
res = 0;
}
if (res) {
ret = wc_ed25519_export_key(&key, priv, privSz, pub, pubSz);
if (ret != 0) {
WOLFSSL_MSG("wc_ed25519_export_key failed");
res = 0;
}
}
wc_ed25519_free(&key);
}
if (initTmpRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_RNG);
}
return res;
#else
#ifndef WOLFSSL_KEY_GEN
WOLFSSL_MSG("No Key Gen built in");
#else
WOLFSSL_MSG("No ED25519 key export built in");
#endif
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
int wolfSSL_ED25519_sign(const unsigned char *msg, unsigned int msgSz,
const unsigned char *priv, unsigned int privSz, unsigned char *sig,
unsigned int *sigSz)
{
#if defined(HAVE_ED25519_SIGN) && defined(WOLFSSL_KEY_GEN) && \
defined(HAVE_ED25519_KEY_IMPORT)
ed25519_key key;
int res = 1;
WOLFSSL_ENTER("wolfSSL_ED25519_sign");
if ((priv == NULL) || (privSz != ED25519_PRV_KEY_SIZE) ||
(msg == NULL) || (sig == NULL) || (sigSz == NULL) ||
(*sigSz < ED25519_SIG_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_ed25519_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve25519_init failed");
res = 0;
}
if (res) {
int ret = wc_ed25519_import_private_key(priv, privSz / 2,
priv + (privSz / 2), ED25519_PUB_KEY_SIZE, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed25519_import_private failed");
res = 0;
}
if (res) {
ret = wc_ed25519_sign_msg(msg, msgSz, sig, sigSz, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_curve25519_shared_secret_ex failed");
res = 0;
}
}
wc_ed25519_free(&key);
}
return res;
#else
#if !defined(HAVE_ED25519_SIGN)
WOLFSSL_MSG("No ED25519 sign built in");
#elif !defined(WOLFSSL_KEY_GEN)
WOLFSSL_MSG("No Key Gen built in");
#elif !defined(HAVE_ED25519_KEY_IMPORT)
WOLFSSL_MSG("No ED25519 Key import built in");
#endif
(void)msg;
(void)msgSz;
(void)priv;
(void)privSz;
(void)sig;
(void)sigSz;
return 0;
#endif
}
int wolfSSL_ED25519_verify(const unsigned char *msg, unsigned int msgSz,
const unsigned char *pub, unsigned int pubSz, const unsigned char *sig,
unsigned int sigSz)
{
#if defined(HAVE_ED25519_VERIFY) && defined(WOLFSSL_KEY_GEN) && \
defined(HAVE_ED25519_KEY_IMPORT)
ed25519_key key;
int res = 1;
WOLFSSL_ENTER("wolfSSL_ED25519_verify");
if ((pub == NULL) || (pubSz != ED25519_PUB_KEY_SIZE) || (msg == NULL) ||
(sig == NULL) || (sigSz != ED25519_SIG_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_ed25519_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve25519_init failed");
res = 0;
}
if (res) {
int ret = wc_ed25519_import_public(pub, pubSz, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed25519_import_public failed");
res = 0;
}
if (res) {
int check = 0;
ret = wc_ed25519_verify_msg((byte*)sig, sigSz, msg, msgSz, &check,
&key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed25519_verify_msg failed");
res = 0;
}
else if (!check) {
WOLFSSL_MSG("wc_ed25519_verify_msg failed (signature invalid)");
res = 0;
}
}
wc_ed25519_free(&key);
}
return res;
#else
#if !defined(HAVE_ED25519_VERIFY)
WOLFSSL_MSG("No ED25519 verify built in");
#elif !defined(WOLFSSL_KEY_GEN)
WOLFSSL_MSG("No Key Gen built in");
#elif !defined(HAVE_ED25519_KEY_IMPORT)
WOLFSSL_MSG("No ED25519 Key import built in");
#endif
(void)msg;
(void)msgSz;
(void)pub;
(void)pubSz;
(void)sig;
(void)sigSz;
return 0;
#endif
}
#endif
#if defined(OPENSSL_EXTRA) && defined(HAVE_CURVE448)
int wolfSSL_EC448_generate_key(unsigned char *priv, unsigned int *privSz,
unsigned char *pub, unsigned int *pubSz)
{
#ifdef WOLFSSL_KEY_GEN
int res = 1;
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
curve448_key key;
WOLFSSL_ENTER("wolfSSL_EC448_generate_key");
if ((priv == NULL) || (privSz == NULL) || (*privSz < CURVE448_KEY_SIZE) ||
(pub == NULL) || (pubSz == NULL) || (*pubSz < CURVE448_KEY_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res) {
rng = wolfssl_make_rng(tmpRng, &initTmpRng);
if (rng == NULL) {
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key failed to make RNG");
res = 0;
}
}
if (res && (wc_curve448_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve448_init failed");
res = 0;
}
if (res) {
int ret = wc_curve448_make_key(rng, CURVE448_KEY_SIZE, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_make_key failed");
res = 0;
}
if (res) {
ret = wc_curve448_export_key_raw_ex(&key, priv, privSz, pub, pubSz,
EC448_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_export_key_raw_ex failed");
res = 0;
}
}
wc_curve448_free(&key);
}
if (initTmpRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_RNG);
}
return res;
#else
WOLFSSL_MSG("No Key Gen built in");
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
int wolfSSL_EC448_shared_key(unsigned char *shared, unsigned int *sharedSz,
const unsigned char *priv, unsigned int privSz,
const unsigned char *pub, unsigned int pubSz)
{
#ifdef WOLFSSL_KEY_GEN
int res = 1;
curve448_key privkey;
curve448_key pubkey;
WOLFSSL_ENTER("wolfSSL_EC448_shared_key");
if ((shared == NULL) || (sharedSz == NULL) ||
(*sharedSz < CURVE448_KEY_SIZE) || (priv == NULL) ||
(privSz < CURVE448_KEY_SIZE) || (pub == NULL) ||
(pubSz < CURVE448_KEY_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_curve448_init(&privkey) != 0)) {
WOLFSSL_MSG("wc_curve448_init privkey failed");
res = 0;
}
if (res) {
if (wc_curve448_init(&pubkey) != MP_OKAY) {
WOLFSSL_MSG("wc_curve448_init pubkey failed");
res = 0;
}
if (res) {
int ret = wc_curve448_import_private_ex(priv, privSz, &privkey,
EC448_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_import_private_ex failed");
res = 0;
}
if (res) {
ret = wc_curve448_import_public_ex(pub, pubSz, &pubkey,
EC448_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_import_public_ex failed");
res = 0;
}
}
if (res) {
ret = wc_curve448_shared_secret_ex(&privkey, &pubkey, shared,
sharedSz, EC448_LITTLE_ENDIAN);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_shared_secret_ex failed");
res = 0;
}
}
wc_curve448_free(&pubkey);
}
wc_curve448_free(&privkey);
}
return res;
#else
WOLFSSL_MSG("No Key Gen built in");
(void)shared;
(void)sharedSz;
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
#endif
#if defined(OPENSSL_EXTRA) && defined(HAVE_ED448)
int wolfSSL_ED448_generate_key(unsigned char *priv, unsigned int *privSz,
unsigned char *pub, unsigned int *pubSz)
{
#if defined(WOLFSSL_KEY_GEN) && defined(HAVE_ED448_KEY_EXPORT)
int res = 1;
int initTmpRng = 0;
WC_RNG *rng = NULL;
WC_DECLARE_VAR(tmpRng, WC_RNG, 1, 0);
ed448_key key;
WOLFSSL_ENTER("wolfSSL_ED448_generate_key");
if ((priv == NULL) || (privSz == NULL) ||
(*privSz < ED448_PRV_KEY_SIZE) || (pub == NULL) ||
(pubSz == NULL) || (*pubSz < ED448_PUB_KEY_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res) {
rng = wolfssl_make_rng(tmpRng, &initTmpRng);
if (rng == NULL) {
WOLFSSL_MSG("wolfSSL_EC_KEY_generate_key failed to make RNG");
res = 0;
}
}
if (res && (wc_ed448_init(&key) != 0)) {
WOLFSSL_MSG("wc_ed448_init failed");
res = 0;
}
if (res) {
int ret = wc_ed448_make_key(rng, ED448_KEY_SIZE, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed448_make_key failed");
res = 0;
}
if (res) {
ret = wc_ed448_export_key(&key, priv, privSz, pub, pubSz);
if (ret != 0) {
WOLFSSL_MSG("wc_ed448_export_key failed");
res = 0;
}
}
wc_ed448_free(&key);
}
if (initTmpRng) {
wc_FreeRng(rng);
WC_FREE_VAR_EX(rng, NULL, DYNAMIC_TYPE_RNG);
}
return res;
#else
#ifndef WOLFSSL_KEY_GEN
WOLFSSL_MSG("No Key Gen built in");
#else
WOLFSSL_MSG("No ED448 key export built in");
#endif
(void)priv;
(void)privSz;
(void)pub;
(void)pubSz;
return 0;
#endif
}
int wolfSSL_ED448_sign(const unsigned char *msg, unsigned int msgSz,
const unsigned char *priv, unsigned int privSz, unsigned char *sig,
unsigned int *sigSz)
{
#if defined(HAVE_ED448_SIGN) && defined(WOLFSSL_KEY_GEN) && \
defined(HAVE_ED448_KEY_IMPORT)
ed448_key key;
int res = 1;
WOLFSSL_ENTER("wolfSSL_ED448_sign");
if ((priv == NULL) || (privSz != ED448_PRV_KEY_SIZE) ||
(msg == NULL) || (sig == NULL) || (sigSz == NULL) ||
(*sigSz < ED448_SIG_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_ed448_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve448_init failed");
res = 0;
}
if (res) {
int ret = wc_ed448_import_private_key(priv, privSz / 2,
priv + (privSz / 2), ED448_PUB_KEY_SIZE, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed448_import_private failed");
res = 0;
}
if (res) {
ret = wc_ed448_sign_msg(msg, msgSz, sig, sigSz, &key, NULL, 0);
if (ret != 0) {
WOLFSSL_MSG("wc_curve448_shared_secret_ex failed");
res = 0;
}
}
wc_ed448_free(&key);
}
return res;
#else
#if !defined(HAVE_ED448_SIGN)
WOLFSSL_MSG("No ED448 sign built in");
#elif !defined(WOLFSSL_KEY_GEN)
WOLFSSL_MSG("No Key Gen built in");
#elif !defined(HAVE_ED448_KEY_IMPORT)
WOLFSSL_MSG("No ED448 Key import built in");
#endif
(void)msg;
(void)msgSz;
(void)priv;
(void)privSz;
(void)sig;
(void)sigSz;
return 0;
#endif
}
int wolfSSL_ED448_verify(const unsigned char *msg, unsigned int msgSz,
const unsigned char *pub, unsigned int pubSz, const unsigned char *sig,
unsigned int sigSz)
{
#if defined(HAVE_ED448_VERIFY) && defined(WOLFSSL_KEY_GEN) && \
defined(HAVE_ED448_KEY_IMPORT)
ed448_key key;
int res = 1;
WOLFSSL_ENTER("wolfSSL_ED448_verify");
if ((pub == NULL) || (pubSz != ED448_PUB_KEY_SIZE) || (msg == NULL) ||
(sig == NULL) || (sigSz != ED448_SIG_SIZE)) {
WOLFSSL_MSG("Bad arguments");
res = 0;
}
if (res && (wc_ed448_init(&key) != 0)) {
WOLFSSL_MSG("wc_curve448_init failed");
res = 0;
}
if (res) {
int ret = wc_ed448_import_public(pub, pubSz, &key);
if (ret != 0) {
WOLFSSL_MSG("wc_ed448_import_public failed");
res = 0;
}
if (res) {
int check = 0;
ret = wc_ed448_verify_msg((byte*)sig, sigSz, msg, msgSz, &check,
&key, NULL, 0);
if (ret != 0) {
WOLFSSL_MSG("wc_ed448_verify_msg failed");
res = 0;
}
else if (!check) {
WOLFSSL_MSG("wc_ed448_verify_msg failed (signature invalid)");
res = 0;
}
}
wc_ed448_free(&key);
}
return res;
#else
#if !defined(HAVE_ED448_VERIFY)
WOLFSSL_MSG("No ED448 verify built in");
#elif !defined(WOLFSSL_KEY_GEN)
WOLFSSL_MSG("No Key Gen built in");
#elif !defined(HAVE_ED448_KEY_IMPORT)
WOLFSSL_MSG("No ED448 Key import built in");
#endif
(void)msg;
(void)msgSz;
(void)pub;
(void)pubSz;
(void)sig;
(void)sigSz;
return 0;
#endif
}
#endif
#ifdef OPENSSL_EXTRA
int wolfSSL_PEM_def_callback(char* buf, int num, int rwFlag, void* userData)
{
int sz = 0;
WOLFSSL_ENTER("wolfSSL_PEM_def_callback");
(void)rwFlag;
if ((buf != NULL) && (userData != NULL)) {
sz = (int)XSTRLEN((const char*)userData);
sz = (int)min((word32)sz, (word32)num);
XMEMCPY(buf, userData, (size_t)sz);
}
else {
WOLFSSL_MSG("Error, default password cannot be created.");
}
return sz;
}
#ifndef NO_BIO
int wolfSSL_PEM_write_bio_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key)
{
int ret = 0;
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_PUBKEY");
if ((bio != NULL) && (key != NULL)) {
switch (key->type) {
#if defined(WOLFSSL_KEY_GEN) && !defined(NO_RSA)
case WC_EVP_PKEY_RSA:
ret = wolfSSL_PEM_write_bio_RSA_PUBKEY(bio, key->rsa);
break;
#endif
#if !defined(NO_DSA) && !defined(HAVE_SELFTEST) && \
defined(WOLFSSL_KEY_GEN)
case WC_EVP_PKEY_DSA:
ret = wolfSSL_PEM_write_bio_DSA_PUBKEY(bio, key->dsa);
break;
#endif
#if defined(HAVE_ECC) && defined(HAVE_ECC_KEY_EXPORT) && \
defined(WOLFSSL_KEY_GEN)
case WC_EVP_PKEY_EC:
ret = wolfSSL_PEM_write_bio_EC_PUBKEY(bio, key->ecc);
break;
#endif
#if !defined(NO_DH) && (defined(WOLFSSL_QT) || defined(OPENSSL_ALL))
case WC_EVP_PKEY_DH:
WOLFSSL_MSG("Writing DH PUBKEY not supported!");
break;
#endif
default:
WOLFSSL_MSG("Unknown Key type!");
break;
}
}
return ret;
}
int wolfSSL_PEM_write_bio_PrivateKey(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key,
const WOLFSSL_EVP_CIPHER* cipher, unsigned char* passwd, int len,
wc_pem_password_cb* cb, void* arg)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_PEM_write_bio_PrivateKey");
(void)cipher;
(void)passwd;
(void)len;
(void)cb;
(void)arg;
if ((bio == NULL) || (key == NULL)) {
WOLFSSL_MSG("Bad Function Arguments");
ret = 0;
}
if (ret == 1) {
#ifdef WOLFSSL_KEY_GEN
switch (key->type) {
#ifndef NO_RSA
case WC_EVP_PKEY_RSA:
ret = wolfSSL_PEM_write_bio_RSAPrivateKey(bio, key->rsa,
cipher, passwd, len, cb, arg);
break;
#endif
#ifndef NO_DSA
case WC_EVP_PKEY_DSA:
ret = wolfSSL_PEM_write_bio_DSAPrivateKey(bio, key->dsa,
cipher, passwd, len, cb, arg);
break;
#endif
#ifdef HAVE_ECC
case WC_EVP_PKEY_EC:
#if defined(HAVE_ECC_KEY_EXPORT)
ret = wolfSSL_PEM_write_bio_ECPrivateKey(bio, key->ecc,
cipher, passwd, len, cb, arg);
#else
ret = der_write_to_bio_as_pem((byte*)key->pkey.ptr,
key->pkey_sz, bio, EC_PRIVATEKEY_TYPE);
#endif
break;
#endif
#ifndef NO_DH
case WC_EVP_PKEY_DH:
ret = der_write_to_bio_as_pem((byte*)key->pkey.ptr,
key->pkey_sz, bio, DH_PRIVATEKEY_TYPE);
break;
#endif
default:
WOLFSSL_MSG("Unknown Key type!");
ret = 0;
break;
}
#else
int type = 0;
switch (key->type) {
#ifndef NO_DSA
case WC_EVP_PKEY_DSA:
type = DSA_PRIVATEKEY_TYPE;
break;
#endif
#ifdef HAVE_ECC
case WC_EVP_PKEY_EC:
type = ECC_PRIVATEKEY_TYPE;
break;
#endif
#ifndef NO_DH
case WC_EVP_PKEY_DH:
type = DH_PRIVATEKEY_TYPE;
break;
#endif
#ifndef NO_RSA
case WC_EVP_PKEY_RSA:
type = PRIVATEKEY_TYPE;
break;
#endif
default:
ret = 0;
break;
}
if (ret == 1) {
ret = der_write_to_bio_as_pem((byte*)key->pkey.ptr, key->pkey_sz,
bio, type);
}
#endif
}
return ret;
}
#endif
#ifndef NO_BIO
WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PUBKEY(WOLFSSL_BIO* bio,
WOLFSSL_EVP_PKEY **key, wc_pem_password_cb *cb, void *arg)
{
int err = 0;
WOLFSSL_EVP_PKEY* pkey = NULL;
DerBuffer* der = NULL;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_PUBKEY");
if (bio == NULL) {
err = 1;
}
if ((!err) && (pem_read_bio_key(bio, cb, arg, PUBLICKEY_TYPE, NULL,
&der) < 0)) {
err = 1;
}
if (!err) {
const unsigned char* ptr = der->buffer;
if ((key != NULL) && (*key != NULL)) {
pkey = *key;
}
if (wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length) == NULL) {
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
pkey = NULL;
err = 1;
}
}
if ((!err) && (key != NULL) && (pkey != NULL)) {
*key = pkey;
}
FreeDer(&der);
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_PUBKEY", 0);
return pkey;
}
WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PrivateKey(WOLFSSL_BIO* bio,
WOLFSSL_EVP_PKEY** key, wc_pem_password_cb* cb, void* arg)
{
int err = 0;
WOLFSSL_EVP_PKEY* pkey = NULL;
DerBuffer* der = NULL;
int keyFormat = 0;
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_PrivateKey");
if (bio == NULL) {
err = 1;
}
if ((!err) && (pem_read_bio_key(bio, cb, arg, PRIVATEKEY_TYPE, &keyFormat,
&der) < 0)) {
err = 1;
}
if (!err) {
const unsigned char* ptr = der->buffer;
int type;
switch (keyFormat) {
case 0:
case RSAk:
type = WC_EVP_PKEY_RSA;
break;
case DSAk:
type = WC_EVP_PKEY_DSA;
break;
case ECDSAk:
type = WC_EVP_PKEY_EC;
break;
case DHk:
type = WC_EVP_PKEY_DH;
break;
default:
type = WOLFSSL_FATAL_ERROR;
break;
}
if ((key != NULL) && (*key != NULL)) {
pkey = *key;
}
if (wolfSSL_d2i_PrivateKey(type, &pkey, &ptr, der->length) == NULL) {
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
pkey = NULL;
err = 1;
}
}
if ((!err) && (key != NULL) && (pkey != NULL)) {
*key = pkey;
}
FreeDer(&der);
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_PrivateKey", err);
return pkey;
}
WOLFSSL_PKCS8_PRIV_KEY_INFO* wolfSSL_PEM_read_bio_PKCS8_PRIV_KEY_INFO(
WOLFSSL_BIO* bio, WOLFSSL_PKCS8_PRIV_KEY_INFO** key, wc_pem_password_cb* cb,
void* arg)
{
return wolfSSL_PEM_read_bio_PrivateKey(bio, key, cb, arg);
}
#endif
#if !defined(NO_FILESYSTEM)
WOLFSSL_EVP_PKEY *wolfSSL_PEM_read_PUBKEY(XFILE fp, WOLFSSL_EVP_PKEY **key,
wc_pem_password_cb *cb, void *arg)
{
int err = 0;
WOLFSSL_EVP_PKEY* pkey = NULL;
DerBuffer* der = NULL;
WOLFSSL_ENTER("wolfSSL_PEM_read_PUBKEY");
if (fp == XBADFILE) {
err = 1;
}
if ((!err) && ((pem_read_file_key(fp, cb, arg, PUBLICKEY_TYPE, NULL,
&der) < 0) || (der == NULL))) {
err = 1;
}
if (!err) {
const unsigned char* ptr = der->buffer;
if ((key != NULL) && (*key != NULL)) {
pkey = *key;
}
if (wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length) == NULL) {
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
pkey = NULL;
err = 1;
}
}
if ((!err) && (key != NULL) && (pkey != NULL)) {
*key = pkey;
}
FreeDer(&der);
WOLFSSL_LEAVE("wolfSSL_PEM_read_PUBKEY", 0);
return pkey;
}
#ifndef NO_CERTS
WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_PrivateKey(XFILE fp, WOLFSSL_EVP_PKEY **key,
wc_pem_password_cb *cb, void *arg)
{
int err = 0;
WOLFSSL_EVP_PKEY* pkey = NULL;
DerBuffer* der = NULL;
int keyFormat = 0;
WOLFSSL_ENTER("wolfSSL_PEM_read_PrivateKey");
if (fp == XBADFILE) {
err = 1;
}
if ((!err) && (pem_read_file_key(fp, cb, arg, PRIVATEKEY_TYPE, &keyFormat,
&der)) < 0) {
err = 1;
}
if (!err) {
const unsigned char* ptr = der->buffer;
int type;
switch (keyFormat) {
case 0:
case RSAk:
type = WC_EVP_PKEY_RSA;
break;
case DSAk:
type = WC_EVP_PKEY_DSA;
break;
case ECDSAk:
type = WC_EVP_PKEY_EC;
break;
case DHk:
type = WC_EVP_PKEY_DH;
break;
default:
type = WOLFSSL_FATAL_ERROR;
break;
}
if ((key != NULL) && (*key != NULL)) {
pkey = *key;
}
if (wolfSSL_d2i_PrivateKey(type, &pkey, &ptr, der->length) == NULL) {
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
pkey = NULL;
err = 1;
}
}
if ((!err) && (key != NULL) && (pkey != NULL)) {
*key = pkey;
}
FreeDer(&der);
WOLFSSL_LEAVE("wolfSSL_PEM_read_PrivateKey", 0);
return pkey;
}
#endif
#endif
#ifndef NO_CERTS
#if !defined(NO_BIO) || !defined(NO_FILESYSTEM)
#define PEM_BEGIN "-----BEGIN "
#define PEM_BEGIN_SZ 11
#define PEM_END "-----END "
#define PEM_END_SZ 9
#define PEM_HDR_FIN "-----"
#define PEM_HDR_FIN_SZ 5
#define PEM_HDR_FIN_EOL_NEWLINE "-----\n"
#define PEM_HDR_FIN_EOL_NULL_TERM "-----\0"
#define PEM_HDR_FIN_EOL_SZ 6
static void pem_find_pattern(char* pem, int pemLen, int idx, const char* prefix,
const char* postfix, int* start, int* len)
{
int prefixLen = (int)XSTRLEN(prefix);
int postfixLen = (int)XSTRLEN(postfix);
*start = *len = 0;
for (; idx < pemLen - prefixLen; idx++) {
if ((pem[idx] == prefix[0]) &&
(XMEMCMP(pem + idx, prefix, (size_t)prefixLen) == 0)) {
idx += prefixLen;
*start = idx;
break;
}
}
for (; idx < pemLen - postfixLen; idx++) {
if ((pem[idx] == postfix[0]) &&
(XMEMCMP(pem + idx, postfix, (size_t)postfixLen) == 0)) {
*len = idx - *start;
break;
}
}
}
static int pem_read_data(char* pem, int pemLen, char **name, char **header,
unsigned char **data, long *len)
{
int ret = 0;
int start;
int nameLen;
int startHdr = 0;
int hdrLen = 0;
int startEnd = 0;
int endLen;
*name = NULL;
*header = NULL;
pem_find_pattern(pem, pemLen, 0, PEM_BEGIN, PEM_HDR_FIN, &start, &nameLen);
*name = (char*)XMALLOC((size_t)nameLen + 1, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (*name == NULL) {
ret = MEMORY_E;
}
if (ret == 0) {
(*name)[nameLen] = '\0';
if (nameLen == 0) {
ret = ASN_NO_PEM_HEADER;
}
else {
XMEMCPY(*name, pem + start, (size_t)nameLen);
}
}
if (ret == 0) {
start += nameLen + PEM_HDR_FIN_SZ;
pem_find_pattern(pem, pemLen, start, "\n", "\n\n", &startHdr, &hdrLen);
if (hdrLen > 0) {
hdrLen++;
}
*header = (char*)XMALLOC((size_t)hdrLen + 1, NULL,
DYNAMIC_TYPE_TMP_BUFFER);
if (*header == NULL) {
ret = MEMORY_E;
}
}
if (ret == 0) {
(*header)[hdrLen] = '\0';
if (hdrLen > 0) {
XMEMCPY(*header, pem + startHdr, (size_t)hdrLen);
start = startHdr + hdrLen + 1;
}
pem_find_pattern(pem, pemLen, start, PEM_END, PEM_HDR_FIN, &startEnd,
&endLen);
if ((endLen != nameLen) ||
(XMEMCMP(*name, pem + startEnd, (size_t)nameLen) != 0)) {
ret = ASN_NO_PEM_HEADER;
}
}
if (ret == 0) {
unsigned char* der = (unsigned char*)pem;
word32 derLen;
derLen = (word32)(startEnd - PEM_END_SZ - start);
ret = Base64_Decode(der + start, derLen, der, &derLen);
if (ret == 0) {
*data = der;
*len = derLen;
}
}
return ret;
}
static int pem_write_data(const char *name, const char *header,
const unsigned char *data, long len, char** pemOut, word32* pemOutLen)
{
int ret = 0;
int nameLen;
int headerLen;
char* pem = NULL;
word32 pemLen;
word32 derLen = (word32)len;
byte* p;
nameLen = (int)XSTRLEN(name);
headerLen = (int)XSTRLEN(header);
pemLen = (derLen + 2) / 3 * 4;
pemLen += (pemLen + 63) / 64;
pemLen += (word32)(PEM_BEGIN_SZ + nameLen + PEM_HDR_FIN_EOL_SZ);
if (headerLen > 0) {
pemLen += (word32)headerLen + 1;
}
pemLen += (word32)(PEM_END_SZ + nameLen + PEM_HDR_FIN_EOL_SZ);
pem = (char*)XMALLOC(pemLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (pem == NULL) {
ret = MEMORY_E;
}
p = (byte*)pem;
if (ret == 0) {
XMEMCPY(p, PEM_BEGIN, PEM_BEGIN_SZ);
p += PEM_BEGIN_SZ;
XMEMCPY(p, name, (size_t)nameLen);
p += nameLen;
XMEMCPY(p, PEM_HDR_FIN_EOL_NEWLINE, PEM_HDR_FIN_EOL_SZ);
p += PEM_HDR_FIN_EOL_SZ;
if (headerLen > 0) {
XMEMCPY(p, header, (size_t)headerLen);
p += headerLen;
*(p++) = '\n';
}
pemLen -= (word32)((size_t)p - (size_t)pem);
ret = Base64_Encode(data, derLen, p, &pemLen);
}
if (ret == 0) {
p += pemLen;
XMEMCPY(p, PEM_END, PEM_END_SZ);
p += PEM_END_SZ;
XMEMCPY(p, name, (size_t)nameLen);
p += nameLen;
XMEMCPY(p, PEM_HDR_FIN_EOL_NEWLINE, PEM_HDR_FIN_EOL_SZ);
p += PEM_HDR_FIN_EOL_SZ;
*pemOut = pem;
*pemOutLen = (word32)((size_t)p - (size_t)pem);
}
else {
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
pem = NULL;
}
return ret;
}
#endif
#ifndef NO_BIO
int wolfSSL_PEM_read_bio(WOLFSSL_BIO* bio, char **name, char **header,
unsigned char **data, long *len)
{
int res = 1;
char* pem = NULL;
int pemLen = 0;
int memAlloced = 1;
if ((bio == NULL) || (name == NULL) || (header == NULL) || (data == NULL) ||
(len == NULL)) {
res = 0;
}
if ((res == 1) && (wolfssl_read_bio(bio, &pem, &pemLen, &memAlloced) !=
0)) {
res = 0;
}
if ((res == 1) && (!memAlloced)) {
char* p = (char*)XMALLOC((size_t)pemLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (p == NULL) {
res = 0;
}
else {
XMEMCPY(p, pem, (size_t)pemLen);
pem = p;
}
}
if ((res == 1) && (pem_read_data(pem, pemLen, name, header, data, len) !=
0)) {
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
XFREE(*name, NULL, DYNAMIC_TYPE_TMP_BUFFER);
XFREE(*header, NULL, DYNAMIC_TYPE_TMP_BUFFER);
*name = NULL;
*header = NULL;
res = 0;
}
return res;
}
int wolfSSL_PEM_write_bio(WOLFSSL_BIO* bio, const char *name,
const char *header, const unsigned char *data, long len)
{
int err = 0;
char* pem = NULL;
word32 pemLen = 0;
if ((bio == NULL) || (name == NULL) || (header == NULL) || (data == NULL)) {
err = BAD_FUNC_ARG;
}
if (!err) {
err = pem_write_data(name, header, data, len, &pem, &pemLen);
}
if ((!err) && (wolfSSL_BIO_write(bio, pem, (int)pemLen) != (int)pemLen)) {
err = IO_FAILED_E;
}
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return (!err) ? (int)pemLen : 0;
}
#endif
#if !defined(NO_FILESYSTEM)
int wolfSSL_PEM_read(XFILE fp, char **name, char **header, unsigned char **data,
long *len)
{
int res = 1;
char* pem = NULL;
int pemLen = 0;
if ((fp == XBADFILE) || (name == NULL) || (header == NULL) ||
(data == NULL) || (len == NULL)) {
res = 0;
}
if ((res == 1) && (wolfssl_read_file(fp, &pem, &pemLen) != 0)) {
res = 0;
}
if ((res == 1) && (pem_read_data(pem, pemLen, name, header, data, len) !=
0)) {
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
XFREE(*name, NULL, DYNAMIC_TYPE_TMP_BUFFER);
XFREE(*header, NULL, DYNAMIC_TYPE_TMP_BUFFER);
*name = NULL;
*header = NULL;
res = 0;
}
return res;
}
int wolfSSL_PEM_write(XFILE fp, const char *name, const char *header,
const unsigned char *data, long len)
{
int err = 0;
char* pem = NULL;
word32 pemLen = 0;
if ((fp == XBADFILE) || (name == NULL) || (header == NULL) ||
(data == NULL)) {
err = 1;
}
if ((!err) && (pem_write_data(name, header, data, len, &pem, &pemLen) !=
0)) {
pemLen = 0;
err = 1;
}
if ((!err) && (XFWRITE(pem, 1, pemLen, fp) != pemLen)) {
pemLen = 0;
}
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return (int)pemLen;
}
#endif
int wolfSSL_PEM_get_EVP_CIPHER_INFO(const char* header, EncryptedInfo* cipher)
{
int res = 1;
if ((header == NULL) || (cipher == NULL)) {
res = 0;
}
if (res == 1) {
XMEMSET(cipher, 0, sizeof(*cipher));
if (wc_EncryptedInfoParse(cipher, &header, XSTRLEN(header)) != 0) {
res = 0;
}
}
return res;
}
int wolfSSL_PEM_do_header(EncryptedInfo* cipher, unsigned char* data, long* len,
wc_pem_password_cb* cb, void* ctx)
{
int ret = 1;
char password[NAME_SZ];
int passwordSz = 0;
if ((cipher == NULL) || (data == NULL) || (len == NULL) || (cb == NULL)) {
ret = 0;
}
if (ret == 1) {
passwordSz = cb(password, sizeof(password), PEM_PASS_READ, ctx);
if (passwordSz < 0) {
ret = 0;
}
}
if (ret == 1) {
if (wc_BufferKeyDecrypt(cipher, data, (word32)*len, (byte*)password,
passwordSz, WC_MD5) != 0) {
ret = WOLFSSL_FAILURE;
}
}
if (passwordSz > 0) {
ForceZero(password, (word32)passwordSz);
}
return ret;
}
#endif
#endif
#ifdef OPENSSL_ALL
#if !defined(NO_PWDBASED) && defined(HAVE_PKCS8)
int pkcs8_encrypt(WOLFSSL_EVP_PKEY* pkey,
const WOLFSSL_EVP_CIPHER* enc, char* passwd, int passwdSz, byte* key,
word32* keySz)
{
int ret;
WC_RNG rng;
ret = wc_InitRng(&rng);
if (ret == 0) {
int encAlgId = 0;
#ifndef NO_DES3
if (enc == EVP_DES_CBC) {
encAlgId = DESb;
}
else if (enc == EVP_DES_EDE3_CBC) {
encAlgId = DES3b;
}
else
#endif
#if !defined(NO_AES) && defined(HAVE_AES_CBC)
#ifdef WOLFSSL_AES_128
if (enc == EVP_AES_128_CBC) {
encAlgId = AES128CBCb;
}
else
#endif
#ifdef WOLFSSL_AES_256
if (enc == EVP_AES_256_CBC) {
encAlgId = AES256CBCb;
}
else
#endif
#endif
{
ret = BAD_FUNC_ARG;
}
if (ret == 0) {
ret = TraditionalEnc((byte*)pkey->pkey.ptr + pkey->pkcs8HeaderSz,
(word32)pkey->pkey_sz - pkey->pkcs8HeaderSz,
key, keySz, passwd, passwdSz, PKCS5, PBES2, encAlgId,
NULL, 0, WC_PKCS12_ITT_DEFAULT, &rng, NULL);
if (ret > 0) {
*keySz = (word32)ret;
}
}
wc_FreeRng(&rng);
}
return ret;
}
int pkcs8_encode(WOLFSSL_EVP_PKEY* pkey, byte* key, word32* keySz)
{
int ret = 0;
int algId = 0;
const byte* curveOid = 0;
word32 oidSz = 0;
#ifdef HAVE_ECC
if (pkey->type == WC_EVP_PKEY_EC) {
algId = ECDSAk;
ret = wc_ecc_get_oid((word32)pkey->ecc->group->curve_oid, &curveOid,
&oidSz);
}
else
#endif
if (pkey->type == WC_EVP_PKEY_RSA) {
algId = RSAk;
curveOid = NULL;
oidSz = 0;
}
else if (pkey->type == WC_EVP_PKEY_DSA) {
algId = DSAk;
curveOid = NULL;
oidSz = 0;
}
#ifndef NO_DH
else if (pkey->type == WC_EVP_PKEY_DH) {
if (pkey->dh == NULL)
return BAD_FUNC_ARG;
if (pkey->dh->priv_key != NULL || pkey->dh->pub_key != NULL) {
if (keySz == NULL)
return BAD_FUNC_ARG;
*keySz = (word32)pkey->pkey_sz;
if (key == NULL)
return LENGTH_ONLY_E;
XMEMCPY(key, pkey->pkey.ptr, pkey->pkey_sz);
return pkey->pkey_sz;
}
algId = DHk;
curveOid = NULL;
oidSz = 0;
}
#endif
else {
ret = NOT_COMPILED_IN;
}
if (ret >= 0) {
ret = wc_CreatePKCS8Key(key, keySz, (byte*)pkey->pkey.ptr +
pkey->pkcs8HeaderSz, (word32)pkey->pkey_sz - pkey->pkcs8HeaderSz,
algId, curveOid, oidSz);
}
return ret;
}
#if !defined(NO_BIO) || (!defined(NO_FILESYSTEM) && \
!defined(NO_STDIO_FILESYSTEM))
static int pem_write_mem_pkcs8privatekey(byte** pem, int* pemSz,
WOLFSSL_EVP_PKEY* pkey, const WOLFSSL_EVP_CIPHER* enc, char* passwd,
int passwdSz, wc_pem_password_cb* cb, void* ctx)
{
int res = 1;
int ret = 0;
char password[NAME_SZ];
byte* key = NULL;
word32 keySz = 0;
int type = PKCS8_PRIVATEKEY_TYPE;
if (pkey == NULL) {
res = 0;
}
if (res == 1) {
if (pkcs8_encode(pkey, NULL, &keySz) !=
WC_NO_ERR_TRACE(LENGTH_ONLY_E)) {
res = 0;
}
}
if (res == 1) {
if (enc != NULL) {
keySz += 128;
}
*pemSz = (int)(keySz + 2) / 3 * 4;
*pemSz += (*pemSz + 63) / 64;
if (enc != NULL) {
*pemSz += 74;
}
else {
*pemSz += 54;
}
*pem = (byte*)XMALLOC((size_t)*pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (*pem == NULL) {
res = 0;
}
else {
key = *pem + *pemSz - keySz;
}
}
if ((res == 1) && (enc != NULL)) {
type = PKCS8_ENC_PRIVATEKEY_TYPE;
if (passwd == NULL) {
passwdSz = cb(password, sizeof(password), 1, ctx);
if (passwdSz < 0) {
res = 0;
}
passwd = password;
}
if (res == 1) {
ret = pkcs8_encrypt(pkey, enc, passwd, passwdSz, key, &keySz);
if (ret <= 0) {
res = 0;
}
}
if ((password == passwd) && (passwdSz > 0)) {
ForceZero(password, (word32)passwdSz);
}
}
else if ((res == 1) && (enc == NULL)) {
type = PKCS8_PRIVATEKEY_TYPE;
ret = pkcs8_encode(pkey, key, &keySz);
if (ret < 0) {
res = 0;
}
}
if (res == 1) {
ret = wc_DerToPemEx(key, keySz, *pem, (word32)*pemSz, NULL, type);
if (ret < 0) {
res = 0;
}
else {
*pemSz = ret;
}
}
return (res == 0) ? 0 : ret;
}
#endif
#ifndef NO_BIO
int wolfSSL_PEM_write_bio_PKCS8PrivateKey(WOLFSSL_BIO* bio,
WOLFSSL_EVP_PKEY* pkey, const WOLFSSL_EVP_CIPHER* enc, char* passwd,
int passwdSz, wc_pem_password_cb* cb, void* ctx)
{
byte* pem = NULL;
int pemSz = 0;
int res = 1;
if (bio == NULL) {
res = 0;
}
if (res == 1) {
res = pem_write_mem_pkcs8privatekey(&pem, &pemSz, pkey, enc, passwd,
passwdSz, cb, ctx);
}
if ((res >= 1) && (wolfSSL_BIO_write(bio, pem, pemSz) != pemSz)) {
res = 0;
}
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return res;
}
int wolfSSL_PEM_write_bio_PKCS8_PRIV_KEY_INFO(WOLFSSL_BIO* bio,
PKCS8_PRIV_KEY_INFO* keyInfo)
{
return wolfSSL_PEM_write_bio_PKCS8PrivateKey(bio, keyInfo, NULL, NULL, 0,
NULL, NULL);
}
#endif
#if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
int wolfSSL_PEM_write_PKCS8PrivateKey(XFILE f, WOLFSSL_EVP_PKEY* pkey,
const WOLFSSL_EVP_CIPHER* enc, char* passwd, int passwdSz,
wc_pem_password_cb* cb, void* ctx)
{
byte* pem = NULL;
int pemSz = 0;
int res = 1;
if (f == XBADFILE) {
res = 0;
}
if (res == 1) {
res = pem_write_mem_pkcs8privatekey(&pem, &pemSz, pkey, enc, passwd,
passwdSz, cb, ctx);
}
if ((res >= 1) && (XFWRITE(pem, 1, (size_t)pemSz, f) != (size_t)pemSz)) {
res = 0;
}
XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return res;
}
#endif
#endif
#endif
#endif