1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi * Public Key layer for parsing key files and structures
3*62c56f98SSadaf Ebrahimi *
4*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
5*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6*62c56f98SSadaf Ebrahimi */
7*62c56f98SSadaf Ebrahimi
8*62c56f98SSadaf Ebrahimi #include "common.h"
9*62c56f98SSadaf Ebrahimi
10*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_C)
11*62c56f98SSadaf Ebrahimi
12*62c56f98SSadaf Ebrahimi #include "mbedtls/pk.h"
13*62c56f98SSadaf Ebrahimi #include "mbedtls/asn1.h"
14*62c56f98SSadaf Ebrahimi #include "mbedtls/oid.h"
15*62c56f98SSadaf Ebrahimi #include "mbedtls/platform_util.h"
16*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
17*62c56f98SSadaf Ebrahimi #include "pk_internal.h"
18*62c56f98SSadaf Ebrahimi
19*62c56f98SSadaf Ebrahimi #include <string.h>
20*62c56f98SSadaf Ebrahimi
21*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
22*62c56f98SSadaf Ebrahimi #include "mbedtls/rsa.h"
23*62c56f98SSadaf Ebrahimi #endif
24*62c56f98SSadaf Ebrahimi #include "mbedtls/ecp.h"
25*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
26*62c56f98SSadaf Ebrahimi #include "pk_internal.h"
27*62c56f98SSadaf Ebrahimi #endif
28*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_ECDSA_C)
29*62c56f98SSadaf Ebrahimi #include "mbedtls/ecdsa.h"
30*62c56f98SSadaf Ebrahimi #endif
31*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
32*62c56f98SSadaf Ebrahimi #include "mbedtls/pem.h"
33*62c56f98SSadaf Ebrahimi #endif
34*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS5_C)
35*62c56f98SSadaf Ebrahimi #include "mbedtls/pkcs5.h"
36*62c56f98SSadaf Ebrahimi #endif
37*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
38*62c56f98SSadaf Ebrahimi #include "mbedtls/pkcs12.h"
39*62c56f98SSadaf Ebrahimi #endif
40*62c56f98SSadaf Ebrahimi
41*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_CRYPTO_C)
42*62c56f98SSadaf Ebrahimi #include "psa_util_internal.h"
43*62c56f98SSadaf Ebrahimi #endif
44*62c56f98SSadaf Ebrahimi
45*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
46*62c56f98SSadaf Ebrahimi #include "psa/crypto.h"
47*62c56f98SSadaf Ebrahimi #endif
48*62c56f98SSadaf Ebrahimi
49*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
50*62c56f98SSadaf Ebrahimi
51*62c56f98SSadaf Ebrahimi /* Helper for Montgomery curves */
52*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) && defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
53*62c56f98SSadaf Ebrahimi #define MBEDTLS_PK_IS_RFC8410_GROUP_ID(id) \
54*62c56f98SSadaf Ebrahimi ((id == MBEDTLS_ECP_DP_CURVE25519) || (id == MBEDTLS_ECP_DP_CURVE448))
55*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS && MBEDTLS_PK_HAVE_RFC8410_CURVES */
56*62c56f98SSadaf Ebrahimi
57*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_FS_IO)
58*62c56f98SSadaf Ebrahimi /*
59*62c56f98SSadaf Ebrahimi * Load all data from a file into a given buffer.
60*62c56f98SSadaf Ebrahimi *
61*62c56f98SSadaf Ebrahimi * The file is expected to contain either PEM or DER encoded data.
62*62c56f98SSadaf Ebrahimi * A terminating null byte is always appended. It is included in the announced
63*62c56f98SSadaf Ebrahimi * length only if the data looks like it is PEM encoded.
64*62c56f98SSadaf Ebrahimi */
mbedtls_pk_load_file(const char * path,unsigned char ** buf,size_t * n)65*62c56f98SSadaf Ebrahimi int mbedtls_pk_load_file(const char *path, unsigned char **buf, size_t *n)
66*62c56f98SSadaf Ebrahimi {
67*62c56f98SSadaf Ebrahimi FILE *f;
68*62c56f98SSadaf Ebrahimi long size;
69*62c56f98SSadaf Ebrahimi
70*62c56f98SSadaf Ebrahimi if ((f = fopen(path, "rb")) == NULL) {
71*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FILE_IO_ERROR;
72*62c56f98SSadaf Ebrahimi }
73*62c56f98SSadaf Ebrahimi
74*62c56f98SSadaf Ebrahimi /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
75*62c56f98SSadaf Ebrahimi mbedtls_setbuf(f, NULL);
76*62c56f98SSadaf Ebrahimi
77*62c56f98SSadaf Ebrahimi fseek(f, 0, SEEK_END);
78*62c56f98SSadaf Ebrahimi if ((size = ftell(f)) == -1) {
79*62c56f98SSadaf Ebrahimi fclose(f);
80*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FILE_IO_ERROR;
81*62c56f98SSadaf Ebrahimi }
82*62c56f98SSadaf Ebrahimi fseek(f, 0, SEEK_SET);
83*62c56f98SSadaf Ebrahimi
84*62c56f98SSadaf Ebrahimi *n = (size_t) size;
85*62c56f98SSadaf Ebrahimi
86*62c56f98SSadaf Ebrahimi if (*n + 1 == 0 ||
87*62c56f98SSadaf Ebrahimi (*buf = mbedtls_calloc(1, *n + 1)) == NULL) {
88*62c56f98SSadaf Ebrahimi fclose(f);
89*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_ALLOC_FAILED;
90*62c56f98SSadaf Ebrahimi }
91*62c56f98SSadaf Ebrahimi
92*62c56f98SSadaf Ebrahimi if (fread(*buf, 1, *n, f) != *n) {
93*62c56f98SSadaf Ebrahimi fclose(f);
94*62c56f98SSadaf Ebrahimi
95*62c56f98SSadaf Ebrahimi mbedtls_zeroize_and_free(*buf, *n);
96*62c56f98SSadaf Ebrahimi
97*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FILE_IO_ERROR;
98*62c56f98SSadaf Ebrahimi }
99*62c56f98SSadaf Ebrahimi
100*62c56f98SSadaf Ebrahimi fclose(f);
101*62c56f98SSadaf Ebrahimi
102*62c56f98SSadaf Ebrahimi (*buf)[*n] = '\0';
103*62c56f98SSadaf Ebrahimi
104*62c56f98SSadaf Ebrahimi if (strstr((const char *) *buf, "-----BEGIN ") != NULL) {
105*62c56f98SSadaf Ebrahimi ++*n;
106*62c56f98SSadaf Ebrahimi }
107*62c56f98SSadaf Ebrahimi
108*62c56f98SSadaf Ebrahimi return 0;
109*62c56f98SSadaf Ebrahimi }
110*62c56f98SSadaf Ebrahimi
111*62c56f98SSadaf Ebrahimi /*
112*62c56f98SSadaf Ebrahimi * Load and parse a private key
113*62c56f98SSadaf Ebrahimi */
mbedtls_pk_parse_keyfile(mbedtls_pk_context * ctx,const char * path,const char * pwd,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)114*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_keyfile(mbedtls_pk_context *ctx,
115*62c56f98SSadaf Ebrahimi const char *path, const char *pwd,
116*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
117*62c56f98SSadaf Ebrahimi {
118*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
119*62c56f98SSadaf Ebrahimi size_t n;
120*62c56f98SSadaf Ebrahimi unsigned char *buf;
121*62c56f98SSadaf Ebrahimi
122*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
123*62c56f98SSadaf Ebrahimi return ret;
124*62c56f98SSadaf Ebrahimi }
125*62c56f98SSadaf Ebrahimi
126*62c56f98SSadaf Ebrahimi if (pwd == NULL) {
127*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng);
128*62c56f98SSadaf Ebrahimi } else {
129*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_key(ctx, buf, n,
130*62c56f98SSadaf Ebrahimi (const unsigned char *) pwd, strlen(pwd), f_rng, p_rng);
131*62c56f98SSadaf Ebrahimi }
132*62c56f98SSadaf Ebrahimi
133*62c56f98SSadaf Ebrahimi mbedtls_zeroize_and_free(buf, n);
134*62c56f98SSadaf Ebrahimi
135*62c56f98SSadaf Ebrahimi return ret;
136*62c56f98SSadaf Ebrahimi }
137*62c56f98SSadaf Ebrahimi
138*62c56f98SSadaf Ebrahimi /*
139*62c56f98SSadaf Ebrahimi * Load and parse a public key
140*62c56f98SSadaf Ebrahimi */
mbedtls_pk_parse_public_keyfile(mbedtls_pk_context * ctx,const char * path)141*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_public_keyfile(mbedtls_pk_context *ctx, const char *path)
142*62c56f98SSadaf Ebrahimi {
143*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
144*62c56f98SSadaf Ebrahimi size_t n;
145*62c56f98SSadaf Ebrahimi unsigned char *buf;
146*62c56f98SSadaf Ebrahimi
147*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
148*62c56f98SSadaf Ebrahimi return ret;
149*62c56f98SSadaf Ebrahimi }
150*62c56f98SSadaf Ebrahimi
151*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_public_key(ctx, buf, n);
152*62c56f98SSadaf Ebrahimi
153*62c56f98SSadaf Ebrahimi mbedtls_zeroize_and_free(buf, n);
154*62c56f98SSadaf Ebrahimi
155*62c56f98SSadaf Ebrahimi return ret;
156*62c56f98SSadaf Ebrahimi }
157*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_FS_IO */
158*62c56f98SSadaf Ebrahimi
159*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
160*62c56f98SSadaf Ebrahimi /* Minimally parse an ECParameters buffer to and mbedtls_asn1_buf
161*62c56f98SSadaf Ebrahimi *
162*62c56f98SSadaf Ebrahimi * ECParameters ::= CHOICE {
163*62c56f98SSadaf Ebrahimi * namedCurve OBJECT IDENTIFIER
164*62c56f98SSadaf Ebrahimi * specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
165*62c56f98SSadaf Ebrahimi * -- implicitCurve NULL
166*62c56f98SSadaf Ebrahimi * }
167*62c56f98SSadaf Ebrahimi */
pk_get_ecparams(unsigned char ** p,const unsigned char * end,mbedtls_asn1_buf * params)168*62c56f98SSadaf Ebrahimi static int pk_get_ecparams(unsigned char **p, const unsigned char *end,
169*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf *params)
170*62c56f98SSadaf Ebrahimi {
171*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
172*62c56f98SSadaf Ebrahimi
173*62c56f98SSadaf Ebrahimi if (end - *p < 1) {
174*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
175*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_OUT_OF_DATA);
176*62c56f98SSadaf Ebrahimi }
177*62c56f98SSadaf Ebrahimi
178*62c56f98SSadaf Ebrahimi /* Tag may be either OID or SEQUENCE */
179*62c56f98SSadaf Ebrahimi params->tag = **p;
180*62c56f98SSadaf Ebrahimi if (params->tag != MBEDTLS_ASN1_OID
181*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
182*62c56f98SSadaf Ebrahimi && params->tag != (MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)
183*62c56f98SSadaf Ebrahimi #endif
184*62c56f98SSadaf Ebrahimi ) {
185*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
186*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_UNEXPECTED_TAG);
187*62c56f98SSadaf Ebrahimi }
188*62c56f98SSadaf Ebrahimi
189*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(p, end, ¶ms->len, params->tag)) != 0) {
190*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
191*62c56f98SSadaf Ebrahimi }
192*62c56f98SSadaf Ebrahimi
193*62c56f98SSadaf Ebrahimi params->p = *p;
194*62c56f98SSadaf Ebrahimi *p += params->len;
195*62c56f98SSadaf Ebrahimi
196*62c56f98SSadaf Ebrahimi if (*p != end) {
197*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
198*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
199*62c56f98SSadaf Ebrahimi }
200*62c56f98SSadaf Ebrahimi
201*62c56f98SSadaf Ebrahimi return 0;
202*62c56f98SSadaf Ebrahimi }
203*62c56f98SSadaf Ebrahimi
204*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
205*62c56f98SSadaf Ebrahimi /*
206*62c56f98SSadaf Ebrahimi * Parse a SpecifiedECDomain (SEC 1 C.2) and (mostly) fill the group with it.
207*62c56f98SSadaf Ebrahimi * WARNING: the resulting group should only be used with
208*62c56f98SSadaf Ebrahimi * pk_group_id_from_specified(), since its base point may not be set correctly
209*62c56f98SSadaf Ebrahimi * if it was encoded compressed.
210*62c56f98SSadaf Ebrahimi *
211*62c56f98SSadaf Ebrahimi * SpecifiedECDomain ::= SEQUENCE {
212*62c56f98SSadaf Ebrahimi * version SpecifiedECDomainVersion(ecdpVer1 | ecdpVer2 | ecdpVer3, ...),
213*62c56f98SSadaf Ebrahimi * fieldID FieldID {{FieldTypes}},
214*62c56f98SSadaf Ebrahimi * curve Curve,
215*62c56f98SSadaf Ebrahimi * base ECPoint,
216*62c56f98SSadaf Ebrahimi * order INTEGER,
217*62c56f98SSadaf Ebrahimi * cofactor INTEGER OPTIONAL,
218*62c56f98SSadaf Ebrahimi * hash HashAlgorithm OPTIONAL,
219*62c56f98SSadaf Ebrahimi * ...
220*62c56f98SSadaf Ebrahimi * }
221*62c56f98SSadaf Ebrahimi *
222*62c56f98SSadaf Ebrahimi * We only support prime-field as field type, and ignore hash and cofactor.
223*62c56f98SSadaf Ebrahimi */
pk_group_from_specified(const mbedtls_asn1_buf * params,mbedtls_ecp_group * grp)224*62c56f98SSadaf Ebrahimi static int pk_group_from_specified(const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp)
225*62c56f98SSadaf Ebrahimi {
226*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
227*62c56f98SSadaf Ebrahimi unsigned char *p = params->p;
228*62c56f98SSadaf Ebrahimi const unsigned char *const end = params->p + params->len;
229*62c56f98SSadaf Ebrahimi const unsigned char *end_field, *end_curve;
230*62c56f98SSadaf Ebrahimi size_t len;
231*62c56f98SSadaf Ebrahimi int ver;
232*62c56f98SSadaf Ebrahimi
233*62c56f98SSadaf Ebrahimi /* SpecifiedECDomainVersion ::= INTEGER { 1, 2, 3 } */
234*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_int(&p, end, &ver)) != 0) {
235*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
236*62c56f98SSadaf Ebrahimi }
237*62c56f98SSadaf Ebrahimi
238*62c56f98SSadaf Ebrahimi if (ver < 1 || ver > 3) {
239*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
240*62c56f98SSadaf Ebrahimi }
241*62c56f98SSadaf Ebrahimi
242*62c56f98SSadaf Ebrahimi /*
243*62c56f98SSadaf Ebrahimi * FieldID { FIELD-ID:IOSet } ::= SEQUENCE { -- Finite field
244*62c56f98SSadaf Ebrahimi * fieldType FIELD-ID.&id({IOSet}),
245*62c56f98SSadaf Ebrahimi * parameters FIELD-ID.&Type({IOSet}{@fieldType})
246*62c56f98SSadaf Ebrahimi * }
247*62c56f98SSadaf Ebrahimi */
248*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
249*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
250*62c56f98SSadaf Ebrahimi return ret;
251*62c56f98SSadaf Ebrahimi }
252*62c56f98SSadaf Ebrahimi
253*62c56f98SSadaf Ebrahimi end_field = p + len;
254*62c56f98SSadaf Ebrahimi
255*62c56f98SSadaf Ebrahimi /*
256*62c56f98SSadaf Ebrahimi * FIELD-ID ::= TYPE-IDENTIFIER
257*62c56f98SSadaf Ebrahimi * FieldTypes FIELD-ID ::= {
258*62c56f98SSadaf Ebrahimi * { Prime-p IDENTIFIED BY prime-field } |
259*62c56f98SSadaf Ebrahimi * { Characteristic-two IDENTIFIED BY characteristic-two-field }
260*62c56f98SSadaf Ebrahimi * }
261*62c56f98SSadaf Ebrahimi * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
262*62c56f98SSadaf Ebrahimi */
263*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end_field, &len, MBEDTLS_ASN1_OID)) != 0) {
264*62c56f98SSadaf Ebrahimi return ret;
265*62c56f98SSadaf Ebrahimi }
266*62c56f98SSadaf Ebrahimi
267*62c56f98SSadaf Ebrahimi if (len != MBEDTLS_OID_SIZE(MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD) ||
268*62c56f98SSadaf Ebrahimi memcmp(p, MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD, len) != 0) {
269*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
270*62c56f98SSadaf Ebrahimi }
271*62c56f98SSadaf Ebrahimi
272*62c56f98SSadaf Ebrahimi p += len;
273*62c56f98SSadaf Ebrahimi
274*62c56f98SSadaf Ebrahimi /* Prime-p ::= INTEGER -- Field of size p. */
275*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_mpi(&p, end_field, &grp->P)) != 0) {
276*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
277*62c56f98SSadaf Ebrahimi }
278*62c56f98SSadaf Ebrahimi
279*62c56f98SSadaf Ebrahimi grp->pbits = mbedtls_mpi_bitlen(&grp->P);
280*62c56f98SSadaf Ebrahimi
281*62c56f98SSadaf Ebrahimi if (p != end_field) {
282*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
283*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
284*62c56f98SSadaf Ebrahimi }
285*62c56f98SSadaf Ebrahimi
286*62c56f98SSadaf Ebrahimi /*
287*62c56f98SSadaf Ebrahimi * Curve ::= SEQUENCE {
288*62c56f98SSadaf Ebrahimi * a FieldElement,
289*62c56f98SSadaf Ebrahimi * b FieldElement,
290*62c56f98SSadaf Ebrahimi * seed BIT STRING OPTIONAL
291*62c56f98SSadaf Ebrahimi * -- Shall be present if used in SpecifiedECDomain
292*62c56f98SSadaf Ebrahimi * -- with version equal to ecdpVer2 or ecdpVer3
293*62c56f98SSadaf Ebrahimi * }
294*62c56f98SSadaf Ebrahimi */
295*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
296*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
297*62c56f98SSadaf Ebrahimi return ret;
298*62c56f98SSadaf Ebrahimi }
299*62c56f98SSadaf Ebrahimi
300*62c56f98SSadaf Ebrahimi end_curve = p + len;
301*62c56f98SSadaf Ebrahimi
302*62c56f98SSadaf Ebrahimi /*
303*62c56f98SSadaf Ebrahimi * FieldElement ::= OCTET STRING
304*62c56f98SSadaf Ebrahimi * containing an integer in the case of a prime field
305*62c56f98SSadaf Ebrahimi */
306*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
307*62c56f98SSadaf Ebrahimi (ret = mbedtls_mpi_read_binary(&grp->A, p, len)) != 0) {
308*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
309*62c56f98SSadaf Ebrahimi }
310*62c56f98SSadaf Ebrahimi
311*62c56f98SSadaf Ebrahimi p += len;
312*62c56f98SSadaf Ebrahimi
313*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
314*62c56f98SSadaf Ebrahimi (ret = mbedtls_mpi_read_binary(&grp->B, p, len)) != 0) {
315*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
316*62c56f98SSadaf Ebrahimi }
317*62c56f98SSadaf Ebrahimi
318*62c56f98SSadaf Ebrahimi p += len;
319*62c56f98SSadaf Ebrahimi
320*62c56f98SSadaf Ebrahimi /* Ignore seed BIT STRING OPTIONAL */
321*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_BIT_STRING)) == 0) {
322*62c56f98SSadaf Ebrahimi p += len;
323*62c56f98SSadaf Ebrahimi }
324*62c56f98SSadaf Ebrahimi
325*62c56f98SSadaf Ebrahimi if (p != end_curve) {
326*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
327*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
328*62c56f98SSadaf Ebrahimi }
329*62c56f98SSadaf Ebrahimi
330*62c56f98SSadaf Ebrahimi /*
331*62c56f98SSadaf Ebrahimi * ECPoint ::= OCTET STRING
332*62c56f98SSadaf Ebrahimi */
333*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
334*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
335*62c56f98SSadaf Ebrahimi }
336*62c56f98SSadaf Ebrahimi
337*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ecp_point_read_binary(grp, &grp->G,
338*62c56f98SSadaf Ebrahimi (const unsigned char *) p, len)) != 0) {
339*62c56f98SSadaf Ebrahimi /*
340*62c56f98SSadaf Ebrahimi * If we can't read the point because it's compressed, cheat by
341*62c56f98SSadaf Ebrahimi * reading only the X coordinate and the parity bit of Y.
342*62c56f98SSadaf Ebrahimi */
343*62c56f98SSadaf Ebrahimi if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ||
344*62c56f98SSadaf Ebrahimi (p[0] != 0x02 && p[0] != 0x03) ||
345*62c56f98SSadaf Ebrahimi len != mbedtls_mpi_size(&grp->P) + 1 ||
346*62c56f98SSadaf Ebrahimi mbedtls_mpi_read_binary(&grp->G.X, p + 1, len - 1) != 0 ||
347*62c56f98SSadaf Ebrahimi mbedtls_mpi_lset(&grp->G.Y, p[0] - 2) != 0 ||
348*62c56f98SSadaf Ebrahimi mbedtls_mpi_lset(&grp->G.Z, 1) != 0) {
349*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
350*62c56f98SSadaf Ebrahimi }
351*62c56f98SSadaf Ebrahimi }
352*62c56f98SSadaf Ebrahimi
353*62c56f98SSadaf Ebrahimi p += len;
354*62c56f98SSadaf Ebrahimi
355*62c56f98SSadaf Ebrahimi /*
356*62c56f98SSadaf Ebrahimi * order INTEGER
357*62c56f98SSadaf Ebrahimi */
358*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_mpi(&p, end, &grp->N)) != 0) {
359*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
360*62c56f98SSadaf Ebrahimi }
361*62c56f98SSadaf Ebrahimi
362*62c56f98SSadaf Ebrahimi grp->nbits = mbedtls_mpi_bitlen(&grp->N);
363*62c56f98SSadaf Ebrahimi
364*62c56f98SSadaf Ebrahimi /*
365*62c56f98SSadaf Ebrahimi * Allow optional elements by purposefully not enforcing p == end here.
366*62c56f98SSadaf Ebrahimi */
367*62c56f98SSadaf Ebrahimi
368*62c56f98SSadaf Ebrahimi return 0;
369*62c56f98SSadaf Ebrahimi }
370*62c56f98SSadaf Ebrahimi
371*62c56f98SSadaf Ebrahimi /*
372*62c56f98SSadaf Ebrahimi * Find the group id associated with an (almost filled) group as generated by
373*62c56f98SSadaf Ebrahimi * pk_group_from_specified(), or return an error if unknown.
374*62c56f98SSadaf Ebrahimi */
pk_group_id_from_group(const mbedtls_ecp_group * grp,mbedtls_ecp_group_id * grp_id)375*62c56f98SSadaf Ebrahimi static int pk_group_id_from_group(const mbedtls_ecp_group *grp, mbedtls_ecp_group_id *grp_id)
376*62c56f98SSadaf Ebrahimi {
377*62c56f98SSadaf Ebrahimi int ret = 0;
378*62c56f98SSadaf Ebrahimi mbedtls_ecp_group ref;
379*62c56f98SSadaf Ebrahimi const mbedtls_ecp_group_id *id;
380*62c56f98SSadaf Ebrahimi
381*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_init(&ref);
382*62c56f98SSadaf Ebrahimi
383*62c56f98SSadaf Ebrahimi for (id = mbedtls_ecp_grp_id_list(); *id != MBEDTLS_ECP_DP_NONE; id++) {
384*62c56f98SSadaf Ebrahimi /* Load the group associated to that id */
385*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_free(&ref);
386*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_ecp_group_load(&ref, *id));
387*62c56f98SSadaf Ebrahimi
388*62c56f98SSadaf Ebrahimi /* Compare to the group we were given, starting with easy tests */
389*62c56f98SSadaf Ebrahimi if (grp->pbits == ref.pbits && grp->nbits == ref.nbits &&
390*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->P, &ref.P) == 0 &&
391*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->A, &ref.A) == 0 &&
392*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->B, &ref.B) == 0 &&
393*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->N, &ref.N) == 0 &&
394*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->G.X, &ref.G.X) == 0 &&
395*62c56f98SSadaf Ebrahimi mbedtls_mpi_cmp_mpi(&grp->G.Z, &ref.G.Z) == 0 &&
396*62c56f98SSadaf Ebrahimi /* For Y we may only know the parity bit, so compare only that */
397*62c56f98SSadaf Ebrahimi mbedtls_mpi_get_bit(&grp->G.Y, 0) == mbedtls_mpi_get_bit(&ref.G.Y, 0)) {
398*62c56f98SSadaf Ebrahimi break;
399*62c56f98SSadaf Ebrahimi }
400*62c56f98SSadaf Ebrahimi }
401*62c56f98SSadaf Ebrahimi
402*62c56f98SSadaf Ebrahimi cleanup:
403*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_free(&ref);
404*62c56f98SSadaf Ebrahimi
405*62c56f98SSadaf Ebrahimi *grp_id = *id;
406*62c56f98SSadaf Ebrahimi
407*62c56f98SSadaf Ebrahimi if (ret == 0 && *id == MBEDTLS_ECP_DP_NONE) {
408*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
409*62c56f98SSadaf Ebrahimi }
410*62c56f98SSadaf Ebrahimi
411*62c56f98SSadaf Ebrahimi return ret;
412*62c56f98SSadaf Ebrahimi }
413*62c56f98SSadaf Ebrahimi
414*62c56f98SSadaf Ebrahimi /*
415*62c56f98SSadaf Ebrahimi * Parse a SpecifiedECDomain (SEC 1 C.2) and find the associated group ID
416*62c56f98SSadaf Ebrahimi */
pk_group_id_from_specified(const mbedtls_asn1_buf * params,mbedtls_ecp_group_id * grp_id)417*62c56f98SSadaf Ebrahimi static int pk_group_id_from_specified(const mbedtls_asn1_buf *params,
418*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id *grp_id)
419*62c56f98SSadaf Ebrahimi {
420*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
421*62c56f98SSadaf Ebrahimi mbedtls_ecp_group grp;
422*62c56f98SSadaf Ebrahimi
423*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_init(&grp);
424*62c56f98SSadaf Ebrahimi
425*62c56f98SSadaf Ebrahimi if ((ret = pk_group_from_specified(params, &grp)) != 0) {
426*62c56f98SSadaf Ebrahimi goto cleanup;
427*62c56f98SSadaf Ebrahimi }
428*62c56f98SSadaf Ebrahimi
429*62c56f98SSadaf Ebrahimi ret = pk_group_id_from_group(&grp, grp_id);
430*62c56f98SSadaf Ebrahimi
431*62c56f98SSadaf Ebrahimi cleanup:
432*62c56f98SSadaf Ebrahimi /* The API respecting lifecycle for mbedtls_ecp_group struct is
433*62c56f98SSadaf Ebrahimi * _init(), _load() and _free(). In pk_group_id_from_specified() the
434*62c56f98SSadaf Ebrahimi * temporary grp breaks that flow and it's members are populated
435*62c56f98SSadaf Ebrahimi * by pk_group_id_from_group(). As such mbedtls_ecp_group_free()
436*62c56f98SSadaf Ebrahimi * which is assuming a group populated by _setup() may not clean-up
437*62c56f98SSadaf Ebrahimi * properly -> Manually free it's members.
438*62c56f98SSadaf Ebrahimi */
439*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&grp.N);
440*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&grp.P);
441*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&grp.A);
442*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&grp.B);
443*62c56f98SSadaf Ebrahimi mbedtls_ecp_point_free(&grp.G);
444*62c56f98SSadaf Ebrahimi
445*62c56f98SSadaf Ebrahimi return ret;
446*62c56f98SSadaf Ebrahimi }
447*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_EC_EXTENDED */
448*62c56f98SSadaf Ebrahimi
449*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
450*62c56f98SSadaf Ebrahimi /* Functions pk_use_ecparams() and pk_use_ecparams_rfc8410() update the
451*62c56f98SSadaf Ebrahimi * ecp_keypair structure with proper group ID. The purpose of this helper
452*62c56f98SSadaf Ebrahimi * function is to update ec_family and ec_bits accordingly. */
pk_update_psa_ecparams(mbedtls_pk_context * pk,mbedtls_ecp_group_id grp_id)453*62c56f98SSadaf Ebrahimi static int pk_update_psa_ecparams(mbedtls_pk_context *pk,
454*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id grp_id)
455*62c56f98SSadaf Ebrahimi {
456*62c56f98SSadaf Ebrahimi psa_ecc_family_t ec_family;
457*62c56f98SSadaf Ebrahimi size_t bits;
458*62c56f98SSadaf Ebrahimi
459*62c56f98SSadaf Ebrahimi ec_family = mbedtls_ecc_group_to_psa(grp_id, &bits);
460*62c56f98SSadaf Ebrahimi
461*62c56f98SSadaf Ebrahimi if ((pk->ec_family != 0) && (pk->ec_family != ec_family)) {
462*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
463*62c56f98SSadaf Ebrahimi }
464*62c56f98SSadaf Ebrahimi
465*62c56f98SSadaf Ebrahimi pk->ec_family = ec_family;
466*62c56f98SSadaf Ebrahimi pk->ec_bits = bits;
467*62c56f98SSadaf Ebrahimi
468*62c56f98SSadaf Ebrahimi return 0;
469*62c56f98SSadaf Ebrahimi }
470*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
471*62c56f98SSadaf Ebrahimi
472*62c56f98SSadaf Ebrahimi /*
473*62c56f98SSadaf Ebrahimi * Use EC parameters to initialise an EC group
474*62c56f98SSadaf Ebrahimi *
475*62c56f98SSadaf Ebrahimi * ECParameters ::= CHOICE {
476*62c56f98SSadaf Ebrahimi * namedCurve OBJECT IDENTIFIER
477*62c56f98SSadaf Ebrahimi * specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
478*62c56f98SSadaf Ebrahimi * -- implicitCurve NULL
479*62c56f98SSadaf Ebrahimi */
pk_use_ecparams(const mbedtls_asn1_buf * params,mbedtls_pk_context * pk)480*62c56f98SSadaf Ebrahimi static int pk_use_ecparams(const mbedtls_asn1_buf *params, mbedtls_pk_context *pk)
481*62c56f98SSadaf Ebrahimi {
482*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
483*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id grp_id;
484*62c56f98SSadaf Ebrahimi
485*62c56f98SSadaf Ebrahimi if (params->tag == MBEDTLS_ASN1_OID) {
486*62c56f98SSadaf Ebrahimi if (mbedtls_oid_get_ec_grp(params, &grp_id) != 0) {
487*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE;
488*62c56f98SSadaf Ebrahimi }
489*62c56f98SSadaf Ebrahimi } else {
490*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
491*62c56f98SSadaf Ebrahimi if ((ret = pk_group_id_from_specified(params, &grp_id)) != 0) {
492*62c56f98SSadaf Ebrahimi return ret;
493*62c56f98SSadaf Ebrahimi }
494*62c56f98SSadaf Ebrahimi #else
495*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
496*62c56f98SSadaf Ebrahimi #endif
497*62c56f98SSadaf Ebrahimi }
498*62c56f98SSadaf Ebrahimi
499*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
500*62c56f98SSadaf Ebrahimi ret = pk_update_psa_ecparams(pk, grp_id);
501*62c56f98SSadaf Ebrahimi #else
502*62c56f98SSadaf Ebrahimi /* grp may already be initialized; if so, make sure IDs match */
503*62c56f98SSadaf Ebrahimi if (mbedtls_pk_ec_ro(*pk)->grp.id != MBEDTLS_ECP_DP_NONE &&
504*62c56f98SSadaf Ebrahimi mbedtls_pk_ec_ro(*pk)->grp.id != grp_id) {
505*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
506*62c56f98SSadaf Ebrahimi }
507*62c56f98SSadaf Ebrahimi
508*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ecp_group_load(&(mbedtls_pk_ec_rw(*pk)->grp),
509*62c56f98SSadaf Ebrahimi grp_id)) != 0) {
510*62c56f98SSadaf Ebrahimi return ret;
511*62c56f98SSadaf Ebrahimi }
512*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
513*62c56f98SSadaf Ebrahimi
514*62c56f98SSadaf Ebrahimi return ret;
515*62c56f98SSadaf Ebrahimi }
516*62c56f98SSadaf Ebrahimi
517*62c56f98SSadaf Ebrahimi /*
518*62c56f98SSadaf Ebrahimi * Helper function for deriving a public key from its private counterpart.
519*62c56f98SSadaf Ebrahimi */
pk_derive_public_key(mbedtls_pk_context * pk,const unsigned char * d,size_t d_len,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)520*62c56f98SSadaf Ebrahimi static int pk_derive_public_key(mbedtls_pk_context *pk,
521*62c56f98SSadaf Ebrahimi const unsigned char *d, size_t d_len,
522*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
523*62c56f98SSadaf Ebrahimi {
524*62c56f98SSadaf Ebrahimi int ret;
525*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
526*62c56f98SSadaf Ebrahimi psa_status_t status;
527*62c56f98SSadaf Ebrahimi (void) f_rng;
528*62c56f98SSadaf Ebrahimi (void) p_rng;
529*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
530*62c56f98SSadaf Ebrahimi (void) d;
531*62c56f98SSadaf Ebrahimi (void) d_len;
532*62c56f98SSadaf Ebrahimi
533*62c56f98SSadaf Ebrahimi status = psa_export_public_key(pk->priv_id, pk->pub_raw, sizeof(pk->pub_raw),
534*62c56f98SSadaf Ebrahimi &pk->pub_raw_len);
535*62c56f98SSadaf Ebrahimi ret = psa_pk_status_to_mbedtls(status);
536*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
537*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
538*62c56f98SSadaf Ebrahimi unsigned char key_buf[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
539*62c56f98SSadaf Ebrahimi size_t key_len;
540*62c56f98SSadaf Ebrahimi mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT;
541*62c56f98SSadaf Ebrahimi psa_key_attributes_t key_attr = PSA_KEY_ATTRIBUTES_INIT;
542*62c56f98SSadaf Ebrahimi size_t curve_bits;
543*62c56f98SSadaf Ebrahimi psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits);
544*62c56f98SSadaf Ebrahimi psa_status_t destruction_status;
545*62c56f98SSadaf Ebrahimi
546*62c56f98SSadaf Ebrahimi psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve));
547*62c56f98SSadaf Ebrahimi psa_set_key_usage_flags(&key_attr, PSA_KEY_USAGE_EXPORT);
548*62c56f98SSadaf Ebrahimi
549*62c56f98SSadaf Ebrahimi status = psa_import_key(&key_attr, d, d_len, &key_id);
550*62c56f98SSadaf Ebrahimi ret = psa_pk_status_to_mbedtls(status);
551*62c56f98SSadaf Ebrahimi if (ret != 0) {
552*62c56f98SSadaf Ebrahimi return ret;
553*62c56f98SSadaf Ebrahimi }
554*62c56f98SSadaf Ebrahimi
555*62c56f98SSadaf Ebrahimi status = psa_export_public_key(key_id, key_buf, sizeof(key_buf), &key_len);
556*62c56f98SSadaf Ebrahimi ret = psa_pk_status_to_mbedtls(status);
557*62c56f98SSadaf Ebrahimi destruction_status = psa_destroy_key(key_id);
558*62c56f98SSadaf Ebrahimi if (ret != 0) {
559*62c56f98SSadaf Ebrahimi return ret;
560*62c56f98SSadaf Ebrahimi } else if (destruction_status != PSA_SUCCESS) {
561*62c56f98SSadaf Ebrahimi return psa_pk_status_to_mbedtls(destruction_status);
562*62c56f98SSadaf Ebrahimi }
563*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_point_read_binary(&eck->grp, &eck->Q, key_buf, key_len);
564*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
565*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_USE_PSA_CRYPTO */
566*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
567*62c56f98SSadaf Ebrahimi (void) d;
568*62c56f98SSadaf Ebrahimi (void) d_len;
569*62c56f98SSadaf Ebrahimi
570*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_mul(&eck->grp, &eck->Q, &eck->d, &eck->grp.G, f_rng, p_rng);
571*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_USE_PSA_CRYPTO */
572*62c56f98SSadaf Ebrahimi return ret;
573*62c56f98SSadaf Ebrahimi }
574*62c56f98SSadaf Ebrahimi
575*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
576*62c56f98SSadaf Ebrahimi
577*62c56f98SSadaf Ebrahimi /*
578*62c56f98SSadaf Ebrahimi * Load an RFC8410 EC key, which doesn't have any parameters
579*62c56f98SSadaf Ebrahimi */
pk_use_ecparams_rfc8410(const mbedtls_asn1_buf * params,mbedtls_ecp_group_id grp_id,mbedtls_pk_context * pk)580*62c56f98SSadaf Ebrahimi static int pk_use_ecparams_rfc8410(const mbedtls_asn1_buf *params,
581*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id grp_id,
582*62c56f98SSadaf Ebrahimi mbedtls_pk_context *pk)
583*62c56f98SSadaf Ebrahimi {
584*62c56f98SSadaf Ebrahimi int ret;
585*62c56f98SSadaf Ebrahimi
586*62c56f98SSadaf Ebrahimi if (params->tag != 0 || params->len != 0) {
587*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
588*62c56f98SSadaf Ebrahimi }
589*62c56f98SSadaf Ebrahimi
590*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
591*62c56f98SSadaf Ebrahimi ret = pk_update_psa_ecparams(pk, grp_id);
592*62c56f98SSadaf Ebrahimi #else
593*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *ecp = mbedtls_pk_ec_rw(*pk);
594*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_group_load(&(ecp->grp), grp_id);
595*62c56f98SSadaf Ebrahimi if (ret != 0) {
596*62c56f98SSadaf Ebrahimi return ret;
597*62c56f98SSadaf Ebrahimi }
598*62c56f98SSadaf Ebrahimi #endif
599*62c56f98SSadaf Ebrahimi return ret;
600*62c56f98SSadaf Ebrahimi }
601*62c56f98SSadaf Ebrahimi
602*62c56f98SSadaf Ebrahimi /*
603*62c56f98SSadaf Ebrahimi * Parse an RFC 8410 encoded private EC key
604*62c56f98SSadaf Ebrahimi *
605*62c56f98SSadaf Ebrahimi * CurvePrivateKey ::= OCTET STRING
606*62c56f98SSadaf Ebrahimi */
pk_parse_key_rfc8410_der(mbedtls_pk_context * pk,unsigned char * key,size_t keylen,const unsigned char * end,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)607*62c56f98SSadaf Ebrahimi static int pk_parse_key_rfc8410_der(mbedtls_pk_context *pk,
608*62c56f98SSadaf Ebrahimi unsigned char *key, size_t keylen, const unsigned char *end,
609*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
610*62c56f98SSadaf Ebrahimi {
611*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
612*62c56f98SSadaf Ebrahimi size_t len;
613*62c56f98SSadaf Ebrahimi
614*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
615*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
616*62c56f98SSadaf Ebrahimi }
617*62c56f98SSadaf Ebrahimi
618*62c56f98SSadaf Ebrahimi if (key + len != end) {
619*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
620*62c56f98SSadaf Ebrahimi }
621*62c56f98SSadaf Ebrahimi
622*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
623*62c56f98SSadaf Ebrahimi psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
624*62c56f98SSadaf Ebrahimi psa_status_t status;
625*62c56f98SSadaf Ebrahimi
626*62c56f98SSadaf Ebrahimi psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
627*62c56f98SSadaf Ebrahimi psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_EXPORT |
628*62c56f98SSadaf Ebrahimi PSA_KEY_USAGE_DERIVE);
629*62c56f98SSadaf Ebrahimi psa_set_key_algorithm(&attributes, PSA_ALG_ECDH);
630*62c56f98SSadaf Ebrahimi
631*62c56f98SSadaf Ebrahimi status = psa_import_key(&attributes, key, len, &pk->priv_id);
632*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
633*62c56f98SSadaf Ebrahimi ret = psa_pk_status_to_mbedtls(status);
634*62c56f98SSadaf Ebrahimi return ret;
635*62c56f98SSadaf Ebrahimi }
636*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
637*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
638*62c56f98SSadaf Ebrahimi
639*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, len)) != 0) {
640*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
641*62c56f98SSadaf Ebrahimi }
642*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
643*62c56f98SSadaf Ebrahimi
644*62c56f98SSadaf Ebrahimi /* pk_parse_key_pkcs8_unencrypted_der() only supports version 1 PKCS8 keys,
645*62c56f98SSadaf Ebrahimi * which never contain a public key. As such, derive the public key
646*62c56f98SSadaf Ebrahimi * unconditionally. */
647*62c56f98SSadaf Ebrahimi if ((ret = pk_derive_public_key(pk, key, len, f_rng, p_rng)) != 0) {
648*62c56f98SSadaf Ebrahimi return ret;
649*62c56f98SSadaf Ebrahimi }
650*62c56f98SSadaf Ebrahimi
651*62c56f98SSadaf Ebrahimi return 0;
652*62c56f98SSadaf Ebrahimi }
653*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_RFC8410_CURVES */
654*62c56f98SSadaf Ebrahimi
655*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) && defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
656*62c56f98SSadaf Ebrahimi /*
657*62c56f98SSadaf Ebrahimi * Create a temporary ecp_keypair for converting an EC point in compressed
658*62c56f98SSadaf Ebrahimi * format to an uncompressed one
659*62c56f98SSadaf Ebrahimi */
pk_convert_compressed_ec(mbedtls_pk_context * pk,const unsigned char * in_start,size_t in_len,size_t * out_buf_len,unsigned char * out_buf,size_t out_buf_size)660*62c56f98SSadaf Ebrahimi static int pk_convert_compressed_ec(mbedtls_pk_context *pk,
661*62c56f98SSadaf Ebrahimi const unsigned char *in_start, size_t in_len,
662*62c56f98SSadaf Ebrahimi size_t *out_buf_len, unsigned char *out_buf,
663*62c56f98SSadaf Ebrahimi size_t out_buf_size)
664*62c56f98SSadaf Ebrahimi {
665*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair ecp_key;
666*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id ecp_group_id;
667*62c56f98SSadaf Ebrahimi int ret;
668*62c56f98SSadaf Ebrahimi
669*62c56f98SSadaf Ebrahimi ecp_group_id = mbedtls_ecc_group_of_psa(pk->ec_family, pk->ec_bits, 0);
670*62c56f98SSadaf Ebrahimi
671*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair_init(&ecp_key);
672*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_group_load(&(ecp_key.grp), ecp_group_id);
673*62c56f98SSadaf Ebrahimi if (ret != 0) {
674*62c56f98SSadaf Ebrahimi return ret;
675*62c56f98SSadaf Ebrahimi }
676*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_point_read_binary(&(ecp_key.grp), &ecp_key.Q,
677*62c56f98SSadaf Ebrahimi in_start, in_len);
678*62c56f98SSadaf Ebrahimi if (ret != 0) {
679*62c56f98SSadaf Ebrahimi goto exit;
680*62c56f98SSadaf Ebrahimi }
681*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_point_write_binary(&(ecp_key.grp), &ecp_key.Q,
682*62c56f98SSadaf Ebrahimi MBEDTLS_ECP_PF_UNCOMPRESSED,
683*62c56f98SSadaf Ebrahimi out_buf_len, out_buf, out_buf_size);
684*62c56f98SSadaf Ebrahimi
685*62c56f98SSadaf Ebrahimi exit:
686*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair_free(&ecp_key);
687*62c56f98SSadaf Ebrahimi return ret;
688*62c56f98SSadaf Ebrahimi }
689*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA && MBEDTLS_PK_PARSE_EC_COMPRESSED */
690*62c56f98SSadaf Ebrahimi
691*62c56f98SSadaf Ebrahimi /*
692*62c56f98SSadaf Ebrahimi * EC public key is an EC point
693*62c56f98SSadaf Ebrahimi *
694*62c56f98SSadaf Ebrahimi * The caller is responsible for clearing the structure upon failure if
695*62c56f98SSadaf Ebrahimi * desired. Take care to pass along the possible ECP_FEATURE_UNAVAILABLE
696*62c56f98SSadaf Ebrahimi * return code of mbedtls_ecp_point_read_binary() and leave p in a usable state.
697*62c56f98SSadaf Ebrahimi */
pk_get_ecpubkey(unsigned char ** p,const unsigned char * end,mbedtls_pk_context * pk)698*62c56f98SSadaf Ebrahimi static int pk_get_ecpubkey(unsigned char **p, const unsigned char *end,
699*62c56f98SSadaf Ebrahimi mbedtls_pk_context *pk)
700*62c56f98SSadaf Ebrahimi {
701*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
702*62c56f98SSadaf Ebrahimi
703*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
704*62c56f98SSadaf Ebrahimi mbedtls_svc_key_id_t key;
705*62c56f98SSadaf Ebrahimi psa_key_attributes_t key_attrs = PSA_KEY_ATTRIBUTES_INIT;
706*62c56f98SSadaf Ebrahimi size_t len = (end - *p);
707*62c56f98SSadaf Ebrahimi
708*62c56f98SSadaf Ebrahimi if (len > PSA_EXPORT_PUBLIC_KEY_MAX_SIZE) {
709*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
710*62c56f98SSadaf Ebrahimi }
711*62c56f98SSadaf Ebrahimi
712*62c56f98SSadaf Ebrahimi /* Compressed point format are not supported yet by PSA crypto. As a
713*62c56f98SSadaf Ebrahimi * consequence ecp functions are used to "convert" the point to
714*62c56f98SSadaf Ebrahimi * uncompressed format */
715*62c56f98SSadaf Ebrahimi if ((**p == 0x02) || (**p == 0x03)) {
716*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
717*62c56f98SSadaf Ebrahimi ret = pk_convert_compressed_ec(pk, *p, len,
718*62c56f98SSadaf Ebrahimi &(pk->pub_raw_len), pk->pub_raw,
719*62c56f98SSadaf Ebrahimi PSA_EXPORT_PUBLIC_KEY_MAX_SIZE);
720*62c56f98SSadaf Ebrahimi if (ret != 0) {
721*62c56f98SSadaf Ebrahimi return ret;
722*62c56f98SSadaf Ebrahimi }
723*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
724*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
725*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
726*62c56f98SSadaf Ebrahimi } else {
727*62c56f98SSadaf Ebrahimi /* Uncompressed format */
728*62c56f98SSadaf Ebrahimi if ((size_t) (end - *p) > MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN) {
729*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_BUFFER_TOO_SMALL;
730*62c56f98SSadaf Ebrahimi }
731*62c56f98SSadaf Ebrahimi memcpy(pk->pub_raw, *p, (end - *p));
732*62c56f98SSadaf Ebrahimi pk->pub_raw_len = end - *p;
733*62c56f98SSadaf Ebrahimi }
734*62c56f98SSadaf Ebrahimi
735*62c56f98SSadaf Ebrahimi /* Validate the key by trying to importing it */
736*62c56f98SSadaf Ebrahimi psa_set_key_usage_flags(&key_attrs, 0);
737*62c56f98SSadaf Ebrahimi psa_set_key_algorithm(&key_attrs, PSA_ALG_ECDSA_ANY);
738*62c56f98SSadaf Ebrahimi psa_set_key_type(&key_attrs, PSA_KEY_TYPE_ECC_PUBLIC_KEY(pk->ec_family));
739*62c56f98SSadaf Ebrahimi psa_set_key_bits(&key_attrs, pk->ec_bits);
740*62c56f98SSadaf Ebrahimi
741*62c56f98SSadaf Ebrahimi if ((psa_import_key(&key_attrs, pk->pub_raw, pk->pub_raw_len,
742*62c56f98SSadaf Ebrahimi &key) != PSA_SUCCESS) ||
743*62c56f98SSadaf Ebrahimi (psa_destroy_key(key) != PSA_SUCCESS)) {
744*62c56f98SSadaf Ebrahimi mbedtls_platform_zeroize(pk->pub_raw, MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN);
745*62c56f98SSadaf Ebrahimi pk->pub_raw_len = 0;
746*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
747*62c56f98SSadaf Ebrahimi }
748*62c56f98SSadaf Ebrahimi ret = 0;
749*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
750*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *ec_key = (mbedtls_ecp_keypair *) pk->pk_ctx;
751*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ecp_point_read_binary(&ec_key->grp, &ec_key->Q,
752*62c56f98SSadaf Ebrahimi (const unsigned char *) *p,
753*62c56f98SSadaf Ebrahimi end - *p)) == 0) {
754*62c56f98SSadaf Ebrahimi ret = mbedtls_ecp_check_pubkey(&ec_key->grp, &ec_key->Q);
755*62c56f98SSadaf Ebrahimi }
756*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
757*62c56f98SSadaf Ebrahimi
758*62c56f98SSadaf Ebrahimi /*
759*62c56f98SSadaf Ebrahimi * We know mbedtls_ecp_point_read_binary consumed all bytes or failed
760*62c56f98SSadaf Ebrahimi */
761*62c56f98SSadaf Ebrahimi *p = (unsigned char *) end;
762*62c56f98SSadaf Ebrahimi
763*62c56f98SSadaf Ebrahimi return ret;
764*62c56f98SSadaf Ebrahimi }
765*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
766*62c56f98SSadaf Ebrahimi
767*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
768*62c56f98SSadaf Ebrahimi /*
769*62c56f98SSadaf Ebrahimi * RSAPublicKey ::= SEQUENCE {
770*62c56f98SSadaf Ebrahimi * modulus INTEGER, -- n
771*62c56f98SSadaf Ebrahimi * publicExponent INTEGER -- e
772*62c56f98SSadaf Ebrahimi * }
773*62c56f98SSadaf Ebrahimi */
pk_get_rsapubkey(unsigned char ** p,const unsigned char * end,mbedtls_rsa_context * rsa)774*62c56f98SSadaf Ebrahimi static int pk_get_rsapubkey(unsigned char **p,
775*62c56f98SSadaf Ebrahimi const unsigned char *end,
776*62c56f98SSadaf Ebrahimi mbedtls_rsa_context *rsa)
777*62c56f98SSadaf Ebrahimi {
778*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
779*62c56f98SSadaf Ebrahimi size_t len;
780*62c56f98SSadaf Ebrahimi
781*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(p, end, &len,
782*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
783*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
784*62c56f98SSadaf Ebrahimi }
785*62c56f98SSadaf Ebrahimi
786*62c56f98SSadaf Ebrahimi if (*p + len != end) {
787*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
788*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
789*62c56f98SSadaf Ebrahimi }
790*62c56f98SSadaf Ebrahimi
791*62c56f98SSadaf Ebrahimi /* Import N */
792*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
793*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
794*62c56f98SSadaf Ebrahimi }
795*62c56f98SSadaf Ebrahimi
796*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_rsa_import_raw(rsa, *p, len, NULL, 0, NULL, 0,
797*62c56f98SSadaf Ebrahimi NULL, 0, NULL, 0)) != 0) {
798*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_INVALID_PUBKEY;
799*62c56f98SSadaf Ebrahimi }
800*62c56f98SSadaf Ebrahimi
801*62c56f98SSadaf Ebrahimi *p += len;
802*62c56f98SSadaf Ebrahimi
803*62c56f98SSadaf Ebrahimi /* Import E */
804*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
805*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
806*62c56f98SSadaf Ebrahimi }
807*62c56f98SSadaf Ebrahimi
808*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_rsa_import_raw(rsa, NULL, 0, NULL, 0, NULL, 0,
809*62c56f98SSadaf Ebrahimi NULL, 0, *p, len)) != 0) {
810*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_INVALID_PUBKEY;
811*62c56f98SSadaf Ebrahimi }
812*62c56f98SSadaf Ebrahimi
813*62c56f98SSadaf Ebrahimi *p += len;
814*62c56f98SSadaf Ebrahimi
815*62c56f98SSadaf Ebrahimi if (mbedtls_rsa_complete(rsa) != 0 ||
816*62c56f98SSadaf Ebrahimi mbedtls_rsa_check_pubkey(rsa) != 0) {
817*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_INVALID_PUBKEY;
818*62c56f98SSadaf Ebrahimi }
819*62c56f98SSadaf Ebrahimi
820*62c56f98SSadaf Ebrahimi if (*p != end) {
821*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
822*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
823*62c56f98SSadaf Ebrahimi }
824*62c56f98SSadaf Ebrahimi
825*62c56f98SSadaf Ebrahimi return 0;
826*62c56f98SSadaf Ebrahimi }
827*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
828*62c56f98SSadaf Ebrahimi
829*62c56f98SSadaf Ebrahimi /* Get a PK algorithm identifier
830*62c56f98SSadaf Ebrahimi *
831*62c56f98SSadaf Ebrahimi * AlgorithmIdentifier ::= SEQUENCE {
832*62c56f98SSadaf Ebrahimi * algorithm OBJECT IDENTIFIER,
833*62c56f98SSadaf Ebrahimi * parameters ANY DEFINED BY algorithm OPTIONAL }
834*62c56f98SSadaf Ebrahimi */
pk_get_pk_alg(unsigned char ** p,const unsigned char * end,mbedtls_pk_type_t * pk_alg,mbedtls_asn1_buf * params,mbedtls_ecp_group_id * ec_grp_id)835*62c56f98SSadaf Ebrahimi static int pk_get_pk_alg(unsigned char **p,
836*62c56f98SSadaf Ebrahimi const unsigned char *end,
837*62c56f98SSadaf Ebrahimi mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params,
838*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id *ec_grp_id)
839*62c56f98SSadaf Ebrahimi {
840*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
841*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf alg_oid;
842*62c56f98SSadaf Ebrahimi
843*62c56f98SSadaf Ebrahimi memset(params, 0, sizeof(mbedtls_asn1_buf));
844*62c56f98SSadaf Ebrahimi
845*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_alg(p, end, &alg_oid, params)) != 0) {
846*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_ALG, ret);
847*62c56f98SSadaf Ebrahimi }
848*62c56f98SSadaf Ebrahimi
849*62c56f98SSadaf Ebrahimi ret = mbedtls_oid_get_pk_alg(&alg_oid, pk_alg);
850*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
851*62c56f98SSadaf Ebrahimi if (ret == MBEDTLS_ERR_OID_NOT_FOUND) {
852*62c56f98SSadaf Ebrahimi ret = mbedtls_oid_get_ec_grp_algid(&alg_oid, ec_grp_id);
853*62c56f98SSadaf Ebrahimi if (ret == 0) {
854*62c56f98SSadaf Ebrahimi *pk_alg = MBEDTLS_PK_ECKEY;
855*62c56f98SSadaf Ebrahimi }
856*62c56f98SSadaf Ebrahimi }
857*62c56f98SSadaf Ebrahimi #else
858*62c56f98SSadaf Ebrahimi (void) ec_grp_id;
859*62c56f98SSadaf Ebrahimi #endif
860*62c56f98SSadaf Ebrahimi if (ret != 0) {
861*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
862*62c56f98SSadaf Ebrahimi }
863*62c56f98SSadaf Ebrahimi
864*62c56f98SSadaf Ebrahimi /*
865*62c56f98SSadaf Ebrahimi * No parameters with RSA (only for EC)
866*62c56f98SSadaf Ebrahimi */
867*62c56f98SSadaf Ebrahimi if (*pk_alg == MBEDTLS_PK_RSA &&
868*62c56f98SSadaf Ebrahimi ((params->tag != MBEDTLS_ASN1_NULL && params->tag != 0) ||
869*62c56f98SSadaf Ebrahimi params->len != 0)) {
870*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_INVALID_ALG;
871*62c56f98SSadaf Ebrahimi }
872*62c56f98SSadaf Ebrahimi
873*62c56f98SSadaf Ebrahimi return 0;
874*62c56f98SSadaf Ebrahimi }
875*62c56f98SSadaf Ebrahimi
876*62c56f98SSadaf Ebrahimi /*
877*62c56f98SSadaf Ebrahimi * SubjectPublicKeyInfo ::= SEQUENCE {
878*62c56f98SSadaf Ebrahimi * algorithm AlgorithmIdentifier,
879*62c56f98SSadaf Ebrahimi * subjectPublicKey BIT STRING }
880*62c56f98SSadaf Ebrahimi */
mbedtls_pk_parse_subpubkey(unsigned char ** p,const unsigned char * end,mbedtls_pk_context * pk)881*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_subpubkey(unsigned char **p, const unsigned char *end,
882*62c56f98SSadaf Ebrahimi mbedtls_pk_context *pk)
883*62c56f98SSadaf Ebrahimi {
884*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
885*62c56f98SSadaf Ebrahimi size_t len;
886*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf alg_params;
887*62c56f98SSadaf Ebrahimi mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
888*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
889*62c56f98SSadaf Ebrahimi const mbedtls_pk_info_t *pk_info;
890*62c56f98SSadaf Ebrahimi
891*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(p, end, &len,
892*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
893*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
894*62c56f98SSadaf Ebrahimi }
895*62c56f98SSadaf Ebrahimi
896*62c56f98SSadaf Ebrahimi end = *p + len;
897*62c56f98SSadaf Ebrahimi
898*62c56f98SSadaf Ebrahimi if ((ret = pk_get_pk_alg(p, end, &pk_alg, &alg_params, &ec_grp_id)) != 0) {
899*62c56f98SSadaf Ebrahimi return ret;
900*62c56f98SSadaf Ebrahimi }
901*62c56f98SSadaf Ebrahimi
902*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_bitstring_null(p, end, &len)) != 0) {
903*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
904*62c56f98SSadaf Ebrahimi }
905*62c56f98SSadaf Ebrahimi
906*62c56f98SSadaf Ebrahimi if (*p + len != end) {
907*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
908*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
909*62c56f98SSadaf Ebrahimi }
910*62c56f98SSadaf Ebrahimi
911*62c56f98SSadaf Ebrahimi if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
912*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
913*62c56f98SSadaf Ebrahimi }
914*62c56f98SSadaf Ebrahimi
915*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
916*62c56f98SSadaf Ebrahimi return ret;
917*62c56f98SSadaf Ebrahimi }
918*62c56f98SSadaf Ebrahimi
919*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
920*62c56f98SSadaf Ebrahimi if (pk_alg == MBEDTLS_PK_RSA) {
921*62c56f98SSadaf Ebrahimi ret = pk_get_rsapubkey(p, end, mbedtls_pk_rsa(*pk));
922*62c56f98SSadaf Ebrahimi } else
923*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
924*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
925*62c56f98SSadaf Ebrahimi if (pk_alg == MBEDTLS_PK_ECKEY_DH || pk_alg == MBEDTLS_PK_ECKEY) {
926*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
927*62c56f98SSadaf Ebrahimi if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
928*62c56f98SSadaf Ebrahimi ret = pk_use_ecparams_rfc8410(&alg_params, ec_grp_id, pk);
929*62c56f98SSadaf Ebrahimi } else
930*62c56f98SSadaf Ebrahimi #endif
931*62c56f98SSadaf Ebrahimi {
932*62c56f98SSadaf Ebrahimi ret = pk_use_ecparams(&alg_params, pk);
933*62c56f98SSadaf Ebrahimi }
934*62c56f98SSadaf Ebrahimi if (ret == 0) {
935*62c56f98SSadaf Ebrahimi ret = pk_get_ecpubkey(p, end, pk);
936*62c56f98SSadaf Ebrahimi }
937*62c56f98SSadaf Ebrahimi } else
938*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
939*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
940*62c56f98SSadaf Ebrahimi
941*62c56f98SSadaf Ebrahimi if (ret == 0 && *p != end) {
942*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
943*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
944*62c56f98SSadaf Ebrahimi }
945*62c56f98SSadaf Ebrahimi
946*62c56f98SSadaf Ebrahimi if (ret != 0) {
947*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
948*62c56f98SSadaf Ebrahimi }
949*62c56f98SSadaf Ebrahimi
950*62c56f98SSadaf Ebrahimi return ret;
951*62c56f98SSadaf Ebrahimi }
952*62c56f98SSadaf Ebrahimi
953*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
954*62c56f98SSadaf Ebrahimi /*
955*62c56f98SSadaf Ebrahimi * Wrapper around mbedtls_asn1_get_mpi() that rejects zero.
956*62c56f98SSadaf Ebrahimi *
957*62c56f98SSadaf Ebrahimi * The value zero is:
958*62c56f98SSadaf Ebrahimi * - never a valid value for an RSA parameter
959*62c56f98SSadaf Ebrahimi * - interpreted as "omitted, please reconstruct" by mbedtls_rsa_complete().
960*62c56f98SSadaf Ebrahimi *
961*62c56f98SSadaf Ebrahimi * Since values can't be omitted in PKCS#1, passing a zero value to
962*62c56f98SSadaf Ebrahimi * rsa_complete() would be incorrect, so reject zero values early.
963*62c56f98SSadaf Ebrahimi */
asn1_get_nonzero_mpi(unsigned char ** p,const unsigned char * end,mbedtls_mpi * X)964*62c56f98SSadaf Ebrahimi static int asn1_get_nonzero_mpi(unsigned char **p,
965*62c56f98SSadaf Ebrahimi const unsigned char *end,
966*62c56f98SSadaf Ebrahimi mbedtls_mpi *X)
967*62c56f98SSadaf Ebrahimi {
968*62c56f98SSadaf Ebrahimi int ret;
969*62c56f98SSadaf Ebrahimi
970*62c56f98SSadaf Ebrahimi ret = mbedtls_asn1_get_mpi(p, end, X);
971*62c56f98SSadaf Ebrahimi if (ret != 0) {
972*62c56f98SSadaf Ebrahimi return ret;
973*62c56f98SSadaf Ebrahimi }
974*62c56f98SSadaf Ebrahimi
975*62c56f98SSadaf Ebrahimi if (mbedtls_mpi_cmp_int(X, 0) == 0) {
976*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
977*62c56f98SSadaf Ebrahimi }
978*62c56f98SSadaf Ebrahimi
979*62c56f98SSadaf Ebrahimi return 0;
980*62c56f98SSadaf Ebrahimi }
981*62c56f98SSadaf Ebrahimi
982*62c56f98SSadaf Ebrahimi /*
983*62c56f98SSadaf Ebrahimi * Parse a PKCS#1 encoded private RSA key
984*62c56f98SSadaf Ebrahimi */
pk_parse_key_pkcs1_der(mbedtls_rsa_context * rsa,const unsigned char * key,size_t keylen)985*62c56f98SSadaf Ebrahimi static int pk_parse_key_pkcs1_der(mbedtls_rsa_context *rsa,
986*62c56f98SSadaf Ebrahimi const unsigned char *key,
987*62c56f98SSadaf Ebrahimi size_t keylen)
988*62c56f98SSadaf Ebrahimi {
989*62c56f98SSadaf Ebrahimi int ret, version;
990*62c56f98SSadaf Ebrahimi size_t len;
991*62c56f98SSadaf Ebrahimi unsigned char *p, *end;
992*62c56f98SSadaf Ebrahimi
993*62c56f98SSadaf Ebrahimi mbedtls_mpi T;
994*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&T);
995*62c56f98SSadaf Ebrahimi
996*62c56f98SSadaf Ebrahimi p = (unsigned char *) key;
997*62c56f98SSadaf Ebrahimi end = p + keylen;
998*62c56f98SSadaf Ebrahimi
999*62c56f98SSadaf Ebrahimi /*
1000*62c56f98SSadaf Ebrahimi * This function parses the RSAPrivateKey (PKCS#1)
1001*62c56f98SSadaf Ebrahimi *
1002*62c56f98SSadaf Ebrahimi * RSAPrivateKey ::= SEQUENCE {
1003*62c56f98SSadaf Ebrahimi * version Version,
1004*62c56f98SSadaf Ebrahimi * modulus INTEGER, -- n
1005*62c56f98SSadaf Ebrahimi * publicExponent INTEGER, -- e
1006*62c56f98SSadaf Ebrahimi * privateExponent INTEGER, -- d
1007*62c56f98SSadaf Ebrahimi * prime1 INTEGER, -- p
1008*62c56f98SSadaf Ebrahimi * prime2 INTEGER, -- q
1009*62c56f98SSadaf Ebrahimi * exponent1 INTEGER, -- d mod (p-1)
1010*62c56f98SSadaf Ebrahimi * exponent2 INTEGER, -- d mod (q-1)
1011*62c56f98SSadaf Ebrahimi * coefficient INTEGER, -- (inverse of q) mod p
1012*62c56f98SSadaf Ebrahimi * otherPrimeInfos OtherPrimeInfos OPTIONAL
1013*62c56f98SSadaf Ebrahimi * }
1014*62c56f98SSadaf Ebrahimi */
1015*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1016*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1017*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1018*62c56f98SSadaf Ebrahimi }
1019*62c56f98SSadaf Ebrahimi
1020*62c56f98SSadaf Ebrahimi end = p + len;
1021*62c56f98SSadaf Ebrahimi
1022*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1023*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1024*62c56f98SSadaf Ebrahimi }
1025*62c56f98SSadaf Ebrahimi
1026*62c56f98SSadaf Ebrahimi if (version != 0) {
1027*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
1028*62c56f98SSadaf Ebrahimi }
1029*62c56f98SSadaf Ebrahimi
1030*62c56f98SSadaf Ebrahimi /* Import N */
1031*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1032*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL,
1033*62c56f98SSadaf Ebrahimi NULL, NULL)) != 0) {
1034*62c56f98SSadaf Ebrahimi goto cleanup;
1035*62c56f98SSadaf Ebrahimi }
1036*62c56f98SSadaf Ebrahimi
1037*62c56f98SSadaf Ebrahimi /* Import E */
1038*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1039*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
1040*62c56f98SSadaf Ebrahimi NULL, &T)) != 0) {
1041*62c56f98SSadaf Ebrahimi goto cleanup;
1042*62c56f98SSadaf Ebrahimi }
1043*62c56f98SSadaf Ebrahimi
1044*62c56f98SSadaf Ebrahimi /* Import D */
1045*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1046*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
1047*62c56f98SSadaf Ebrahimi &T, NULL)) != 0) {
1048*62c56f98SSadaf Ebrahimi goto cleanup;
1049*62c56f98SSadaf Ebrahimi }
1050*62c56f98SSadaf Ebrahimi
1051*62c56f98SSadaf Ebrahimi /* Import P */
1052*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1053*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_import(rsa, NULL, &T, NULL,
1054*62c56f98SSadaf Ebrahimi NULL, NULL)) != 0) {
1055*62c56f98SSadaf Ebrahimi goto cleanup;
1056*62c56f98SSadaf Ebrahimi }
1057*62c56f98SSadaf Ebrahimi
1058*62c56f98SSadaf Ebrahimi /* Import Q */
1059*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1060*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_import(rsa, NULL, NULL, &T,
1061*62c56f98SSadaf Ebrahimi NULL, NULL)) != 0) {
1062*62c56f98SSadaf Ebrahimi goto cleanup;
1063*62c56f98SSadaf Ebrahimi }
1064*62c56f98SSadaf Ebrahimi
1065*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_RSA_NO_CRT) && !defined(MBEDTLS_RSA_ALT)
1066*62c56f98SSadaf Ebrahimi /*
1067*62c56f98SSadaf Ebrahimi * The RSA CRT parameters DP, DQ and QP are nominally redundant, in
1068*62c56f98SSadaf Ebrahimi * that they can be easily recomputed from D, P and Q. However by
1069*62c56f98SSadaf Ebrahimi * parsing them from the PKCS1 structure it is possible to avoid
1070*62c56f98SSadaf Ebrahimi * recalculating them which both reduces the overhead of loading
1071*62c56f98SSadaf Ebrahimi * RSA private keys into memory and also avoids side channels which
1072*62c56f98SSadaf Ebrahimi * can arise when computing those values, since all of D, P, and Q
1073*62c56f98SSadaf Ebrahimi * are secret. See https://eprint.iacr.org/2020/055 for a
1074*62c56f98SSadaf Ebrahimi * description of one such attack.
1075*62c56f98SSadaf Ebrahimi */
1076*62c56f98SSadaf Ebrahimi
1077*62c56f98SSadaf Ebrahimi /* Import DP */
1078*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1079*62c56f98SSadaf Ebrahimi (ret = mbedtls_mpi_copy(&rsa->DP, &T)) != 0) {
1080*62c56f98SSadaf Ebrahimi goto cleanup;
1081*62c56f98SSadaf Ebrahimi }
1082*62c56f98SSadaf Ebrahimi
1083*62c56f98SSadaf Ebrahimi /* Import DQ */
1084*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1085*62c56f98SSadaf Ebrahimi (ret = mbedtls_mpi_copy(&rsa->DQ, &T)) != 0) {
1086*62c56f98SSadaf Ebrahimi goto cleanup;
1087*62c56f98SSadaf Ebrahimi }
1088*62c56f98SSadaf Ebrahimi
1089*62c56f98SSadaf Ebrahimi /* Import QP */
1090*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1091*62c56f98SSadaf Ebrahimi (ret = mbedtls_mpi_copy(&rsa->QP, &T)) != 0) {
1092*62c56f98SSadaf Ebrahimi goto cleanup;
1093*62c56f98SSadaf Ebrahimi }
1094*62c56f98SSadaf Ebrahimi
1095*62c56f98SSadaf Ebrahimi #else
1096*62c56f98SSadaf Ebrahimi /* Verify existence of the CRT params */
1097*62c56f98SSadaf Ebrahimi if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1098*62c56f98SSadaf Ebrahimi (ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1099*62c56f98SSadaf Ebrahimi (ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0) {
1100*62c56f98SSadaf Ebrahimi goto cleanup;
1101*62c56f98SSadaf Ebrahimi }
1102*62c56f98SSadaf Ebrahimi #endif
1103*62c56f98SSadaf Ebrahimi
1104*62c56f98SSadaf Ebrahimi /* rsa_complete() doesn't complete anything with the default
1105*62c56f98SSadaf Ebrahimi * implementation but is still called:
1106*62c56f98SSadaf Ebrahimi * - for the benefit of alternative implementation that may want to
1107*62c56f98SSadaf Ebrahimi * pre-compute stuff beyond what's provided (eg Montgomery factors)
1108*62c56f98SSadaf Ebrahimi * - as is also sanity-checks the key
1109*62c56f98SSadaf Ebrahimi *
1110*62c56f98SSadaf Ebrahimi * Furthermore, we also check the public part for consistency with
1111*62c56f98SSadaf Ebrahimi * mbedtls_pk_parse_pubkey(), as it includes size minima for example.
1112*62c56f98SSadaf Ebrahimi */
1113*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_rsa_complete(rsa)) != 0 ||
1114*62c56f98SSadaf Ebrahimi (ret = mbedtls_rsa_check_pubkey(rsa)) != 0) {
1115*62c56f98SSadaf Ebrahimi goto cleanup;
1116*62c56f98SSadaf Ebrahimi }
1117*62c56f98SSadaf Ebrahimi
1118*62c56f98SSadaf Ebrahimi if (p != end) {
1119*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1120*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1121*62c56f98SSadaf Ebrahimi }
1122*62c56f98SSadaf Ebrahimi
1123*62c56f98SSadaf Ebrahimi cleanup:
1124*62c56f98SSadaf Ebrahimi
1125*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&T);
1126*62c56f98SSadaf Ebrahimi
1127*62c56f98SSadaf Ebrahimi if (ret != 0) {
1128*62c56f98SSadaf Ebrahimi /* Wrap error code if it's coming from a lower level */
1129*62c56f98SSadaf Ebrahimi if ((ret & 0xff80) == 0) {
1130*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1131*62c56f98SSadaf Ebrahimi } else {
1132*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1133*62c56f98SSadaf Ebrahimi }
1134*62c56f98SSadaf Ebrahimi
1135*62c56f98SSadaf Ebrahimi mbedtls_rsa_free(rsa);
1136*62c56f98SSadaf Ebrahimi }
1137*62c56f98SSadaf Ebrahimi
1138*62c56f98SSadaf Ebrahimi return ret;
1139*62c56f98SSadaf Ebrahimi }
1140*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1141*62c56f98SSadaf Ebrahimi
1142*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1143*62c56f98SSadaf Ebrahimi /*
1144*62c56f98SSadaf Ebrahimi * Parse a SEC1 encoded private EC key
1145*62c56f98SSadaf Ebrahimi */
pk_parse_key_sec1_der(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1146*62c56f98SSadaf Ebrahimi static int pk_parse_key_sec1_der(mbedtls_pk_context *pk,
1147*62c56f98SSadaf Ebrahimi const unsigned char *key, size_t keylen,
1148*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1149*62c56f98SSadaf Ebrahimi {
1150*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1151*62c56f98SSadaf Ebrahimi int version, pubkey_done;
1152*62c56f98SSadaf Ebrahimi size_t len, d_len;
1153*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf params = { 0, 0, NULL };
1154*62c56f98SSadaf Ebrahimi unsigned char *p = (unsigned char *) key;
1155*62c56f98SSadaf Ebrahimi unsigned char *d;
1156*62c56f98SSadaf Ebrahimi unsigned char *end = p + keylen;
1157*62c56f98SSadaf Ebrahimi unsigned char *end2;
1158*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1159*62c56f98SSadaf Ebrahimi psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
1160*62c56f98SSadaf Ebrahimi psa_status_t status;
1161*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
1162*62c56f98SSadaf Ebrahimi mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
1163*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
1164*62c56f98SSadaf Ebrahimi
1165*62c56f98SSadaf Ebrahimi /*
1166*62c56f98SSadaf Ebrahimi * RFC 5915, or SEC1 Appendix C.4
1167*62c56f98SSadaf Ebrahimi *
1168*62c56f98SSadaf Ebrahimi * ECPrivateKey ::= SEQUENCE {
1169*62c56f98SSadaf Ebrahimi * version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
1170*62c56f98SSadaf Ebrahimi * privateKey OCTET STRING,
1171*62c56f98SSadaf Ebrahimi * parameters [0] ECParameters {{ NamedCurve }} OPTIONAL,
1172*62c56f98SSadaf Ebrahimi * publicKey [1] BIT STRING OPTIONAL
1173*62c56f98SSadaf Ebrahimi * }
1174*62c56f98SSadaf Ebrahimi */
1175*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1176*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1177*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1178*62c56f98SSadaf Ebrahimi }
1179*62c56f98SSadaf Ebrahimi
1180*62c56f98SSadaf Ebrahimi end = p + len;
1181*62c56f98SSadaf Ebrahimi
1182*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1183*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1184*62c56f98SSadaf Ebrahimi }
1185*62c56f98SSadaf Ebrahimi
1186*62c56f98SSadaf Ebrahimi if (version != 1) {
1187*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
1188*62c56f98SSadaf Ebrahimi }
1189*62c56f98SSadaf Ebrahimi
1190*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1191*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1192*62c56f98SSadaf Ebrahimi }
1193*62c56f98SSadaf Ebrahimi
1194*62c56f98SSadaf Ebrahimi /* Keep a reference to the position fo the private key. It will be used
1195*62c56f98SSadaf Ebrahimi * later in this function. */
1196*62c56f98SSadaf Ebrahimi d = p;
1197*62c56f98SSadaf Ebrahimi d_len = len;
1198*62c56f98SSadaf Ebrahimi
1199*62c56f98SSadaf Ebrahimi p += len;
1200*62c56f98SSadaf Ebrahimi
1201*62c56f98SSadaf Ebrahimi pubkey_done = 0;
1202*62c56f98SSadaf Ebrahimi if (p != end) {
1203*62c56f98SSadaf Ebrahimi /*
1204*62c56f98SSadaf Ebrahimi * Is 'parameters' present?
1205*62c56f98SSadaf Ebrahimi */
1206*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1207*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
1208*62c56f98SSadaf Ebrahimi 0)) == 0) {
1209*62c56f98SSadaf Ebrahimi if ((ret = pk_get_ecparams(&p, p + len, ¶ms)) != 0 ||
1210*62c56f98SSadaf Ebrahimi (ret = pk_use_ecparams(¶ms, pk)) != 0) {
1211*62c56f98SSadaf Ebrahimi return ret;
1212*62c56f98SSadaf Ebrahimi }
1213*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
1214*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1215*62c56f98SSadaf Ebrahimi }
1216*62c56f98SSadaf Ebrahimi }
1217*62c56f98SSadaf Ebrahimi
1218*62c56f98SSadaf Ebrahimi
1219*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1220*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, d, d_len)) != 0) {
1221*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1222*62c56f98SSadaf Ebrahimi }
1223*62c56f98SSadaf Ebrahimi #endif
1224*62c56f98SSadaf Ebrahimi
1225*62c56f98SSadaf Ebrahimi if (p != end) {
1226*62c56f98SSadaf Ebrahimi /*
1227*62c56f98SSadaf Ebrahimi * Is 'publickey' present? If not, or if we can't read it (eg because it
1228*62c56f98SSadaf Ebrahimi * is compressed), create it from the private key.
1229*62c56f98SSadaf Ebrahimi */
1230*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1231*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
1232*62c56f98SSadaf Ebrahimi 1)) == 0) {
1233*62c56f98SSadaf Ebrahimi end2 = p + len;
1234*62c56f98SSadaf Ebrahimi
1235*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_bitstring_null(&p, end2, &len)) != 0) {
1236*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1237*62c56f98SSadaf Ebrahimi }
1238*62c56f98SSadaf Ebrahimi
1239*62c56f98SSadaf Ebrahimi if (p + len != end2) {
1240*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1241*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1242*62c56f98SSadaf Ebrahimi }
1243*62c56f98SSadaf Ebrahimi
1244*62c56f98SSadaf Ebrahimi if ((ret = pk_get_ecpubkey(&p, end2, pk)) == 0) {
1245*62c56f98SSadaf Ebrahimi pubkey_done = 1;
1246*62c56f98SSadaf Ebrahimi } else {
1247*62c56f98SSadaf Ebrahimi /*
1248*62c56f98SSadaf Ebrahimi * The only acceptable failure mode of pk_get_ecpubkey() above
1249*62c56f98SSadaf Ebrahimi * is if the point format is not recognized.
1250*62c56f98SSadaf Ebrahimi */
1251*62c56f98SSadaf Ebrahimi if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE) {
1252*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1253*62c56f98SSadaf Ebrahimi }
1254*62c56f98SSadaf Ebrahimi }
1255*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
1256*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1257*62c56f98SSadaf Ebrahimi }
1258*62c56f98SSadaf Ebrahimi }
1259*62c56f98SSadaf Ebrahimi
1260*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1261*62c56f98SSadaf Ebrahimi psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
1262*62c56f98SSadaf Ebrahimi /* Setting largest masks for usage and key algorithms */
1263*62c56f98SSadaf Ebrahimi psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH |
1264*62c56f98SSadaf Ebrahimi PSA_KEY_USAGE_SIGN_MESSAGE |
1265*62c56f98SSadaf Ebrahimi PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_DERIVE);
1266*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
1267*62c56f98SSadaf Ebrahimi psa_set_key_algorithm(&attributes,
1268*62c56f98SSadaf Ebrahimi PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_ANY_HASH));
1269*62c56f98SSadaf Ebrahimi #else
1270*62c56f98SSadaf Ebrahimi psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_ANY_HASH));
1271*62c56f98SSadaf Ebrahimi #endif
1272*62c56f98SSadaf Ebrahimi psa_set_key_enrollment_algorithm(&attributes, PSA_ALG_ECDH);
1273*62c56f98SSadaf Ebrahimi
1274*62c56f98SSadaf Ebrahimi status = psa_import_key(&attributes, d, d_len, &pk->priv_id);
1275*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
1276*62c56f98SSadaf Ebrahimi ret = psa_pk_status_to_mbedtls(status);
1277*62c56f98SSadaf Ebrahimi return ret;
1278*62c56f98SSadaf Ebrahimi }
1279*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
1280*62c56f98SSadaf Ebrahimi
1281*62c56f98SSadaf Ebrahimi if (!pubkey_done) {
1282*62c56f98SSadaf Ebrahimi if ((ret = pk_derive_public_key(pk, d, d_len, f_rng, p_rng)) != 0) {
1283*62c56f98SSadaf Ebrahimi return ret;
1284*62c56f98SSadaf Ebrahimi }
1285*62c56f98SSadaf Ebrahimi }
1286*62c56f98SSadaf Ebrahimi
1287*62c56f98SSadaf Ebrahimi return 0;
1288*62c56f98SSadaf Ebrahimi }
1289*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1290*62c56f98SSadaf Ebrahimi
1291*62c56f98SSadaf Ebrahimi /*
1292*62c56f98SSadaf Ebrahimi * Parse an unencrypted PKCS#8 encoded private key
1293*62c56f98SSadaf Ebrahimi *
1294*62c56f98SSadaf Ebrahimi * Notes:
1295*62c56f98SSadaf Ebrahimi *
1296*62c56f98SSadaf Ebrahimi * - This function does not own the key buffer. It is the
1297*62c56f98SSadaf Ebrahimi * responsibility of the caller to take care of zeroizing
1298*62c56f98SSadaf Ebrahimi * and freeing it after use.
1299*62c56f98SSadaf Ebrahimi *
1300*62c56f98SSadaf Ebrahimi * - The function is responsible for freeing the provided
1301*62c56f98SSadaf Ebrahimi * PK context on failure.
1302*62c56f98SSadaf Ebrahimi *
1303*62c56f98SSadaf Ebrahimi */
pk_parse_key_pkcs8_unencrypted_der(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1304*62c56f98SSadaf Ebrahimi static int pk_parse_key_pkcs8_unencrypted_der(
1305*62c56f98SSadaf Ebrahimi mbedtls_pk_context *pk,
1306*62c56f98SSadaf Ebrahimi const unsigned char *key, size_t keylen,
1307*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1308*62c56f98SSadaf Ebrahimi {
1309*62c56f98SSadaf Ebrahimi int ret, version;
1310*62c56f98SSadaf Ebrahimi size_t len;
1311*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf params;
1312*62c56f98SSadaf Ebrahimi unsigned char *p = (unsigned char *) key;
1313*62c56f98SSadaf Ebrahimi unsigned char *end = p + keylen;
1314*62c56f98SSadaf Ebrahimi mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
1315*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
1316*62c56f98SSadaf Ebrahimi const mbedtls_pk_info_t *pk_info;
1317*62c56f98SSadaf Ebrahimi
1318*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1319*62c56f98SSadaf Ebrahimi (void) f_rng;
1320*62c56f98SSadaf Ebrahimi (void) p_rng;
1321*62c56f98SSadaf Ebrahimi #endif
1322*62c56f98SSadaf Ebrahimi
1323*62c56f98SSadaf Ebrahimi /*
1324*62c56f98SSadaf Ebrahimi * This function parses the PrivateKeyInfo object (PKCS#8 v1.2 = RFC 5208)
1325*62c56f98SSadaf Ebrahimi *
1326*62c56f98SSadaf Ebrahimi * PrivateKeyInfo ::= SEQUENCE {
1327*62c56f98SSadaf Ebrahimi * version Version,
1328*62c56f98SSadaf Ebrahimi * privateKeyAlgorithm PrivateKeyAlgorithmIdentifier,
1329*62c56f98SSadaf Ebrahimi * privateKey PrivateKey,
1330*62c56f98SSadaf Ebrahimi * attributes [0] IMPLICIT Attributes OPTIONAL }
1331*62c56f98SSadaf Ebrahimi *
1332*62c56f98SSadaf Ebrahimi * Version ::= INTEGER
1333*62c56f98SSadaf Ebrahimi * PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
1334*62c56f98SSadaf Ebrahimi * PrivateKey ::= OCTET STRING
1335*62c56f98SSadaf Ebrahimi *
1336*62c56f98SSadaf Ebrahimi * The PrivateKey OCTET STRING is a SEC1 ECPrivateKey
1337*62c56f98SSadaf Ebrahimi */
1338*62c56f98SSadaf Ebrahimi
1339*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1340*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1341*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1342*62c56f98SSadaf Ebrahimi }
1343*62c56f98SSadaf Ebrahimi
1344*62c56f98SSadaf Ebrahimi end = p + len;
1345*62c56f98SSadaf Ebrahimi
1346*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1347*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1348*62c56f98SSadaf Ebrahimi }
1349*62c56f98SSadaf Ebrahimi
1350*62c56f98SSadaf Ebrahimi if (version != 0) {
1351*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_VERSION, ret);
1352*62c56f98SSadaf Ebrahimi }
1353*62c56f98SSadaf Ebrahimi
1354*62c56f98SSadaf Ebrahimi if ((ret = pk_get_pk_alg(&p, end, &pk_alg, ¶ms, &ec_grp_id)) != 0) {
1355*62c56f98SSadaf Ebrahimi return ret;
1356*62c56f98SSadaf Ebrahimi }
1357*62c56f98SSadaf Ebrahimi
1358*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1359*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1360*62c56f98SSadaf Ebrahimi }
1361*62c56f98SSadaf Ebrahimi
1362*62c56f98SSadaf Ebrahimi if (len < 1) {
1363*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1364*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_OUT_OF_DATA);
1365*62c56f98SSadaf Ebrahimi }
1366*62c56f98SSadaf Ebrahimi
1367*62c56f98SSadaf Ebrahimi if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
1368*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1369*62c56f98SSadaf Ebrahimi }
1370*62c56f98SSadaf Ebrahimi
1371*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
1372*62c56f98SSadaf Ebrahimi return ret;
1373*62c56f98SSadaf Ebrahimi }
1374*62c56f98SSadaf Ebrahimi
1375*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1376*62c56f98SSadaf Ebrahimi if (pk_alg == MBEDTLS_PK_RSA) {
1377*62c56f98SSadaf Ebrahimi if ((ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), p, len)) != 0) {
1378*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1379*62c56f98SSadaf Ebrahimi return ret;
1380*62c56f98SSadaf Ebrahimi }
1381*62c56f98SSadaf Ebrahimi } else
1382*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1383*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1384*62c56f98SSadaf Ebrahimi if (pk_alg == MBEDTLS_PK_ECKEY || pk_alg == MBEDTLS_PK_ECKEY_DH) {
1385*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
1386*62c56f98SSadaf Ebrahimi if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
1387*62c56f98SSadaf Ebrahimi if ((ret =
1388*62c56f98SSadaf Ebrahimi pk_use_ecparams_rfc8410(¶ms, ec_grp_id, pk)) != 0 ||
1389*62c56f98SSadaf Ebrahimi (ret =
1390*62c56f98SSadaf Ebrahimi pk_parse_key_rfc8410_der(pk, p, len, end, f_rng,
1391*62c56f98SSadaf Ebrahimi p_rng)) != 0) {
1392*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1393*62c56f98SSadaf Ebrahimi return ret;
1394*62c56f98SSadaf Ebrahimi }
1395*62c56f98SSadaf Ebrahimi } else
1396*62c56f98SSadaf Ebrahimi #endif
1397*62c56f98SSadaf Ebrahimi {
1398*62c56f98SSadaf Ebrahimi if ((ret = pk_use_ecparams(¶ms, pk)) != 0 ||
1399*62c56f98SSadaf Ebrahimi (ret = pk_parse_key_sec1_der(pk, p, len, f_rng, p_rng)) != 0) {
1400*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1401*62c56f98SSadaf Ebrahimi return ret;
1402*62c56f98SSadaf Ebrahimi }
1403*62c56f98SSadaf Ebrahimi }
1404*62c56f98SSadaf Ebrahimi } else
1405*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1406*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1407*62c56f98SSadaf Ebrahimi
1408*62c56f98SSadaf Ebrahimi end = p + len;
1409*62c56f98SSadaf Ebrahimi if (end != (key + keylen)) {
1410*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1411*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1412*62c56f98SSadaf Ebrahimi }
1413*62c56f98SSadaf Ebrahimi
1414*62c56f98SSadaf Ebrahimi return 0;
1415*62c56f98SSadaf Ebrahimi }
1416*62c56f98SSadaf Ebrahimi
1417*62c56f98SSadaf Ebrahimi /*
1418*62c56f98SSadaf Ebrahimi * Parse an encrypted PKCS#8 encoded private key
1419*62c56f98SSadaf Ebrahimi *
1420*62c56f98SSadaf Ebrahimi * To save space, the decryption happens in-place on the given key buffer.
1421*62c56f98SSadaf Ebrahimi * Also, while this function may modify the keybuffer, it doesn't own it,
1422*62c56f98SSadaf Ebrahimi * and instead it is the responsibility of the caller to zeroize and properly
1423*62c56f98SSadaf Ebrahimi * free it after use.
1424*62c56f98SSadaf Ebrahimi *
1425*62c56f98SSadaf Ebrahimi */
1426*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
mbedtls_pk_parse_key_pkcs8_encrypted_der(mbedtls_pk_context * pk,unsigned char * key,size_t keylen,const unsigned char * pwd,size_t pwdlen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1427*62c56f98SSadaf Ebrahimi MBEDTLS_STATIC_TESTABLE int mbedtls_pk_parse_key_pkcs8_encrypted_der(
1428*62c56f98SSadaf Ebrahimi mbedtls_pk_context *pk,
1429*62c56f98SSadaf Ebrahimi unsigned char *key, size_t keylen,
1430*62c56f98SSadaf Ebrahimi const unsigned char *pwd, size_t pwdlen,
1431*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1432*62c56f98SSadaf Ebrahimi {
1433*62c56f98SSadaf Ebrahimi int ret, decrypted = 0;
1434*62c56f98SSadaf Ebrahimi size_t len;
1435*62c56f98SSadaf Ebrahimi unsigned char *buf;
1436*62c56f98SSadaf Ebrahimi unsigned char *p, *end;
1437*62c56f98SSadaf Ebrahimi mbedtls_asn1_buf pbe_alg_oid, pbe_params;
1438*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
1439*62c56f98SSadaf Ebrahimi mbedtls_cipher_type_t cipher_alg;
1440*62c56f98SSadaf Ebrahimi mbedtls_md_type_t md_alg;
1441*62c56f98SSadaf Ebrahimi #endif
1442*62c56f98SSadaf Ebrahimi size_t outlen = 0;
1443*62c56f98SSadaf Ebrahimi
1444*62c56f98SSadaf Ebrahimi p = key;
1445*62c56f98SSadaf Ebrahimi end = p + keylen;
1446*62c56f98SSadaf Ebrahimi
1447*62c56f98SSadaf Ebrahimi if (pwdlen == 0) {
1448*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1449*62c56f98SSadaf Ebrahimi }
1450*62c56f98SSadaf Ebrahimi
1451*62c56f98SSadaf Ebrahimi /*
1452*62c56f98SSadaf Ebrahimi * This function parses the EncryptedPrivateKeyInfo object (PKCS#8)
1453*62c56f98SSadaf Ebrahimi *
1454*62c56f98SSadaf Ebrahimi * EncryptedPrivateKeyInfo ::= SEQUENCE {
1455*62c56f98SSadaf Ebrahimi * encryptionAlgorithm EncryptionAlgorithmIdentifier,
1456*62c56f98SSadaf Ebrahimi * encryptedData EncryptedData
1457*62c56f98SSadaf Ebrahimi * }
1458*62c56f98SSadaf Ebrahimi *
1459*62c56f98SSadaf Ebrahimi * EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
1460*62c56f98SSadaf Ebrahimi *
1461*62c56f98SSadaf Ebrahimi * EncryptedData ::= OCTET STRING
1462*62c56f98SSadaf Ebrahimi *
1463*62c56f98SSadaf Ebrahimi * The EncryptedData OCTET STRING is a PKCS#8 PrivateKeyInfo
1464*62c56f98SSadaf Ebrahimi *
1465*62c56f98SSadaf Ebrahimi */
1466*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1467*62c56f98SSadaf Ebrahimi MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1468*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1469*62c56f98SSadaf Ebrahimi }
1470*62c56f98SSadaf Ebrahimi
1471*62c56f98SSadaf Ebrahimi end = p + len;
1472*62c56f98SSadaf Ebrahimi
1473*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_alg(&p, end, &pbe_alg_oid, &pbe_params)) != 0) {
1474*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1475*62c56f98SSadaf Ebrahimi }
1476*62c56f98SSadaf Ebrahimi
1477*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1478*62c56f98SSadaf Ebrahimi return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1479*62c56f98SSadaf Ebrahimi }
1480*62c56f98SSadaf Ebrahimi
1481*62c56f98SSadaf Ebrahimi buf = p;
1482*62c56f98SSadaf Ebrahimi
1483*62c56f98SSadaf Ebrahimi /*
1484*62c56f98SSadaf Ebrahimi * Decrypt EncryptedData with appropriate PBE
1485*62c56f98SSadaf Ebrahimi */
1486*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
1487*62c56f98SSadaf Ebrahimi if (mbedtls_oid_get_pkcs12_pbe_alg(&pbe_alg_oid, &md_alg, &cipher_alg) == 0) {
1488*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pkcs12_pbe_ext(&pbe_params, MBEDTLS_PKCS12_PBE_DECRYPT,
1489*62c56f98SSadaf Ebrahimi cipher_alg, md_alg,
1490*62c56f98SSadaf Ebrahimi pwd, pwdlen, p, len, buf, len, &outlen)) != 0) {
1491*62c56f98SSadaf Ebrahimi if (ret == MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH) {
1492*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1493*62c56f98SSadaf Ebrahimi }
1494*62c56f98SSadaf Ebrahimi
1495*62c56f98SSadaf Ebrahimi return ret;
1496*62c56f98SSadaf Ebrahimi }
1497*62c56f98SSadaf Ebrahimi
1498*62c56f98SSadaf Ebrahimi decrypted = 1;
1499*62c56f98SSadaf Ebrahimi } else
1500*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C */
1501*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS5_C)
1502*62c56f98SSadaf Ebrahimi if (MBEDTLS_OID_CMP(MBEDTLS_OID_PKCS5_PBES2, &pbe_alg_oid) == 0) {
1503*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen,
1504*62c56f98SSadaf Ebrahimi p, len, buf, len, &outlen)) != 0) {
1505*62c56f98SSadaf Ebrahimi if (ret == MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH) {
1506*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1507*62c56f98SSadaf Ebrahimi }
1508*62c56f98SSadaf Ebrahimi
1509*62c56f98SSadaf Ebrahimi return ret;
1510*62c56f98SSadaf Ebrahimi }
1511*62c56f98SSadaf Ebrahimi
1512*62c56f98SSadaf Ebrahimi decrypted = 1;
1513*62c56f98SSadaf Ebrahimi } else
1514*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS5_C */
1515*62c56f98SSadaf Ebrahimi {
1516*62c56f98SSadaf Ebrahimi ((void) pwd);
1517*62c56f98SSadaf Ebrahimi }
1518*62c56f98SSadaf Ebrahimi
1519*62c56f98SSadaf Ebrahimi if (decrypted == 0) {
1520*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
1521*62c56f98SSadaf Ebrahimi }
1522*62c56f98SSadaf Ebrahimi return pk_parse_key_pkcs8_unencrypted_der(pk, buf, outlen, f_rng, p_rng);
1523*62c56f98SSadaf Ebrahimi }
1524*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1525*62c56f98SSadaf Ebrahimi
1526*62c56f98SSadaf Ebrahimi /*
1527*62c56f98SSadaf Ebrahimi * Parse a private key
1528*62c56f98SSadaf Ebrahimi */
mbedtls_pk_parse_key(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,const unsigned char * pwd,size_t pwdlen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1529*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_key(mbedtls_pk_context *pk,
1530*62c56f98SSadaf Ebrahimi const unsigned char *key, size_t keylen,
1531*62c56f98SSadaf Ebrahimi const unsigned char *pwd, size_t pwdlen,
1532*62c56f98SSadaf Ebrahimi int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1533*62c56f98SSadaf Ebrahimi {
1534*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1535*62c56f98SSadaf Ebrahimi const mbedtls_pk_info_t *pk_info;
1536*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1537*62c56f98SSadaf Ebrahimi size_t len;
1538*62c56f98SSadaf Ebrahimi mbedtls_pem_context pem;
1539*62c56f98SSadaf Ebrahimi #endif
1540*62c56f98SSadaf Ebrahimi
1541*62c56f98SSadaf Ebrahimi if (keylen == 0) {
1542*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1543*62c56f98SSadaf Ebrahimi }
1544*62c56f98SSadaf Ebrahimi
1545*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1546*62c56f98SSadaf Ebrahimi mbedtls_pem_init(&pem);
1547*62c56f98SSadaf Ebrahimi
1548*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1549*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1550*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1551*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1552*62c56f98SSadaf Ebrahimi } else {
1553*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1554*62c56f98SSadaf Ebrahimi "-----BEGIN RSA PRIVATE KEY-----",
1555*62c56f98SSadaf Ebrahimi "-----END RSA PRIVATE KEY-----",
1556*62c56f98SSadaf Ebrahimi key, pwd, pwdlen, &len);
1557*62c56f98SSadaf Ebrahimi }
1558*62c56f98SSadaf Ebrahimi
1559*62c56f98SSadaf Ebrahimi if (ret == 0) {
1560*62c56f98SSadaf Ebrahimi pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
1561*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
1562*62c56f98SSadaf Ebrahimi (ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk),
1563*62c56f98SSadaf Ebrahimi pem.buf, pem.buflen)) != 0) {
1564*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1565*62c56f98SSadaf Ebrahimi }
1566*62c56f98SSadaf Ebrahimi
1567*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1568*62c56f98SSadaf Ebrahimi return ret;
1569*62c56f98SSadaf Ebrahimi } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
1570*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1571*62c56f98SSadaf Ebrahimi } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
1572*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1573*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1574*62c56f98SSadaf Ebrahimi return ret;
1575*62c56f98SSadaf Ebrahimi }
1576*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1577*62c56f98SSadaf Ebrahimi
1578*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1579*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1580*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1581*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1582*62c56f98SSadaf Ebrahimi } else {
1583*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1584*62c56f98SSadaf Ebrahimi "-----BEGIN EC PRIVATE KEY-----",
1585*62c56f98SSadaf Ebrahimi "-----END EC PRIVATE KEY-----",
1586*62c56f98SSadaf Ebrahimi key, pwd, pwdlen, &len);
1587*62c56f98SSadaf Ebrahimi }
1588*62c56f98SSadaf Ebrahimi if (ret == 0) {
1589*62c56f98SSadaf Ebrahimi pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
1590*62c56f98SSadaf Ebrahimi
1591*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
1592*62c56f98SSadaf Ebrahimi (ret = pk_parse_key_sec1_der(pk,
1593*62c56f98SSadaf Ebrahimi pem.buf, pem.buflen,
1594*62c56f98SSadaf Ebrahimi f_rng, p_rng)) != 0) {
1595*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1596*62c56f98SSadaf Ebrahimi }
1597*62c56f98SSadaf Ebrahimi
1598*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1599*62c56f98SSadaf Ebrahimi return ret;
1600*62c56f98SSadaf Ebrahimi } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
1601*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1602*62c56f98SSadaf Ebrahimi } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
1603*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1604*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1605*62c56f98SSadaf Ebrahimi return ret;
1606*62c56f98SSadaf Ebrahimi }
1607*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1608*62c56f98SSadaf Ebrahimi
1609*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1610*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1611*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1612*62c56f98SSadaf Ebrahimi } else {
1613*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1614*62c56f98SSadaf Ebrahimi "-----BEGIN PRIVATE KEY-----",
1615*62c56f98SSadaf Ebrahimi "-----END PRIVATE KEY-----",
1616*62c56f98SSadaf Ebrahimi key, NULL, 0, &len);
1617*62c56f98SSadaf Ebrahimi }
1618*62c56f98SSadaf Ebrahimi if (ret == 0) {
1619*62c56f98SSadaf Ebrahimi if ((ret = pk_parse_key_pkcs8_unencrypted_der(pk,
1620*62c56f98SSadaf Ebrahimi pem.buf, pem.buflen, f_rng, p_rng)) != 0) {
1621*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1622*62c56f98SSadaf Ebrahimi }
1623*62c56f98SSadaf Ebrahimi
1624*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1625*62c56f98SSadaf Ebrahimi return ret;
1626*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1627*62c56f98SSadaf Ebrahimi return ret;
1628*62c56f98SSadaf Ebrahimi }
1629*62c56f98SSadaf Ebrahimi
1630*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
1631*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1632*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1633*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1634*62c56f98SSadaf Ebrahimi } else {
1635*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1636*62c56f98SSadaf Ebrahimi "-----BEGIN ENCRYPTED PRIVATE KEY-----",
1637*62c56f98SSadaf Ebrahimi "-----END ENCRYPTED PRIVATE KEY-----",
1638*62c56f98SSadaf Ebrahimi key, NULL, 0, &len);
1639*62c56f98SSadaf Ebrahimi }
1640*62c56f98SSadaf Ebrahimi if (ret == 0) {
1641*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, pem.buf, pem.buflen,
1642*62c56f98SSadaf Ebrahimi pwd, pwdlen, f_rng, p_rng)) != 0) {
1643*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1644*62c56f98SSadaf Ebrahimi }
1645*62c56f98SSadaf Ebrahimi
1646*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1647*62c56f98SSadaf Ebrahimi return ret;
1648*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1649*62c56f98SSadaf Ebrahimi return ret;
1650*62c56f98SSadaf Ebrahimi }
1651*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1652*62c56f98SSadaf Ebrahimi #else
1653*62c56f98SSadaf Ebrahimi ((void) pwd);
1654*62c56f98SSadaf Ebrahimi ((void) pwdlen);
1655*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PEM_PARSE_C */
1656*62c56f98SSadaf Ebrahimi
1657*62c56f98SSadaf Ebrahimi /*
1658*62c56f98SSadaf Ebrahimi * At this point we only know it's not a PEM formatted key. Could be any
1659*62c56f98SSadaf Ebrahimi * of the known DER encoded private key formats
1660*62c56f98SSadaf Ebrahimi *
1661*62c56f98SSadaf Ebrahimi * We try the different DER format parsers to see if one passes without
1662*62c56f98SSadaf Ebrahimi * error
1663*62c56f98SSadaf Ebrahimi */
1664*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
1665*62c56f98SSadaf Ebrahimi if (pwdlen != 0) {
1666*62c56f98SSadaf Ebrahimi unsigned char *key_copy;
1667*62c56f98SSadaf Ebrahimi
1668*62c56f98SSadaf Ebrahimi if ((key_copy = mbedtls_calloc(1, keylen)) == NULL) {
1669*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_ALLOC_FAILED;
1670*62c56f98SSadaf Ebrahimi }
1671*62c56f98SSadaf Ebrahimi
1672*62c56f98SSadaf Ebrahimi memcpy(key_copy, key, keylen);
1673*62c56f98SSadaf Ebrahimi
1674*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, key_copy, keylen,
1675*62c56f98SSadaf Ebrahimi pwd, pwdlen, f_rng, p_rng);
1676*62c56f98SSadaf Ebrahimi
1677*62c56f98SSadaf Ebrahimi mbedtls_zeroize_and_free(key_copy, keylen);
1678*62c56f98SSadaf Ebrahimi }
1679*62c56f98SSadaf Ebrahimi
1680*62c56f98SSadaf Ebrahimi if (ret == 0) {
1681*62c56f98SSadaf Ebrahimi return 0;
1682*62c56f98SSadaf Ebrahimi }
1683*62c56f98SSadaf Ebrahimi
1684*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1685*62c56f98SSadaf Ebrahimi mbedtls_pk_init(pk);
1686*62c56f98SSadaf Ebrahimi
1687*62c56f98SSadaf Ebrahimi if (ret == MBEDTLS_ERR_PK_PASSWORD_MISMATCH) {
1688*62c56f98SSadaf Ebrahimi return ret;
1689*62c56f98SSadaf Ebrahimi }
1690*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1691*62c56f98SSadaf Ebrahimi
1692*62c56f98SSadaf Ebrahimi ret = pk_parse_key_pkcs8_unencrypted_der(pk, key, keylen, f_rng, p_rng);
1693*62c56f98SSadaf Ebrahimi if (ret == 0) {
1694*62c56f98SSadaf Ebrahimi return 0;
1695*62c56f98SSadaf Ebrahimi }
1696*62c56f98SSadaf Ebrahimi
1697*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1698*62c56f98SSadaf Ebrahimi mbedtls_pk_init(pk);
1699*62c56f98SSadaf Ebrahimi
1700*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1701*62c56f98SSadaf Ebrahimi
1702*62c56f98SSadaf Ebrahimi pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
1703*62c56f98SSadaf Ebrahimi if (mbedtls_pk_setup(pk, pk_info) == 0 &&
1704*62c56f98SSadaf Ebrahimi pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), key, keylen) == 0) {
1705*62c56f98SSadaf Ebrahimi return 0;
1706*62c56f98SSadaf Ebrahimi }
1707*62c56f98SSadaf Ebrahimi
1708*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1709*62c56f98SSadaf Ebrahimi mbedtls_pk_init(pk);
1710*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1711*62c56f98SSadaf Ebrahimi
1712*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1713*62c56f98SSadaf Ebrahimi pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
1714*62c56f98SSadaf Ebrahimi if (mbedtls_pk_setup(pk, pk_info) == 0 &&
1715*62c56f98SSadaf Ebrahimi pk_parse_key_sec1_der(pk,
1716*62c56f98SSadaf Ebrahimi key, keylen, f_rng, p_rng) == 0) {
1717*62c56f98SSadaf Ebrahimi return 0;
1718*62c56f98SSadaf Ebrahimi }
1719*62c56f98SSadaf Ebrahimi mbedtls_pk_free(pk);
1720*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1721*62c56f98SSadaf Ebrahimi
1722*62c56f98SSadaf Ebrahimi /* If MBEDTLS_RSA_C is defined but MBEDTLS_PK_HAVE_ECC_KEYS isn't,
1723*62c56f98SSadaf Ebrahimi * it is ok to leave the PK context initialized but not
1724*62c56f98SSadaf Ebrahimi * freed: It is the caller's responsibility to call pk_init()
1725*62c56f98SSadaf Ebrahimi * before calling this function, and to call pk_free()
1726*62c56f98SSadaf Ebrahimi * when it fails. If MBEDTLS_PK_HAVE_ECC_KEYS is defined but MBEDTLS_RSA_C
1727*62c56f98SSadaf Ebrahimi * isn't, this leads to mbedtls_pk_free() being called
1728*62c56f98SSadaf Ebrahimi * twice, once here and once by the caller, but this is
1729*62c56f98SSadaf Ebrahimi * also ok and in line with the mbedtls_pk_free() calls
1730*62c56f98SSadaf Ebrahimi * on failed PEM parsing attempts. */
1731*62c56f98SSadaf Ebrahimi
1732*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1733*62c56f98SSadaf Ebrahimi }
1734*62c56f98SSadaf Ebrahimi
1735*62c56f98SSadaf Ebrahimi /*
1736*62c56f98SSadaf Ebrahimi * Parse a public key
1737*62c56f98SSadaf Ebrahimi */
mbedtls_pk_parse_public_key(mbedtls_pk_context * ctx,const unsigned char * key,size_t keylen)1738*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_public_key(mbedtls_pk_context *ctx,
1739*62c56f98SSadaf Ebrahimi const unsigned char *key, size_t keylen)
1740*62c56f98SSadaf Ebrahimi {
1741*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1742*62c56f98SSadaf Ebrahimi unsigned char *p;
1743*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1744*62c56f98SSadaf Ebrahimi const mbedtls_pk_info_t *pk_info;
1745*62c56f98SSadaf Ebrahimi #endif
1746*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1747*62c56f98SSadaf Ebrahimi size_t len;
1748*62c56f98SSadaf Ebrahimi mbedtls_pem_context pem;
1749*62c56f98SSadaf Ebrahimi #endif
1750*62c56f98SSadaf Ebrahimi
1751*62c56f98SSadaf Ebrahimi if (keylen == 0) {
1752*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1753*62c56f98SSadaf Ebrahimi }
1754*62c56f98SSadaf Ebrahimi
1755*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1756*62c56f98SSadaf Ebrahimi mbedtls_pem_init(&pem);
1757*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1758*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1759*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1760*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1761*62c56f98SSadaf Ebrahimi } else {
1762*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1763*62c56f98SSadaf Ebrahimi "-----BEGIN RSA PUBLIC KEY-----",
1764*62c56f98SSadaf Ebrahimi "-----END RSA PUBLIC KEY-----",
1765*62c56f98SSadaf Ebrahimi key, NULL, 0, &len);
1766*62c56f98SSadaf Ebrahimi }
1767*62c56f98SSadaf Ebrahimi
1768*62c56f98SSadaf Ebrahimi if (ret == 0) {
1769*62c56f98SSadaf Ebrahimi p = pem.buf;
1770*62c56f98SSadaf Ebrahimi if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
1771*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1772*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1773*62c56f98SSadaf Ebrahimi }
1774*62c56f98SSadaf Ebrahimi
1775*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
1776*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1777*62c56f98SSadaf Ebrahimi return ret;
1778*62c56f98SSadaf Ebrahimi }
1779*62c56f98SSadaf Ebrahimi
1780*62c56f98SSadaf Ebrahimi if ((ret = pk_get_rsapubkey(&p, p + pem.buflen, mbedtls_pk_rsa(*ctx))) != 0) {
1781*62c56f98SSadaf Ebrahimi mbedtls_pk_free(ctx);
1782*62c56f98SSadaf Ebrahimi }
1783*62c56f98SSadaf Ebrahimi
1784*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1785*62c56f98SSadaf Ebrahimi return ret;
1786*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1787*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1788*62c56f98SSadaf Ebrahimi return ret;
1789*62c56f98SSadaf Ebrahimi }
1790*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1791*62c56f98SSadaf Ebrahimi
1792*62c56f98SSadaf Ebrahimi /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1793*62c56f98SSadaf Ebrahimi if (key[keylen - 1] != '\0') {
1794*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1795*62c56f98SSadaf Ebrahimi } else {
1796*62c56f98SSadaf Ebrahimi ret = mbedtls_pem_read_buffer(&pem,
1797*62c56f98SSadaf Ebrahimi "-----BEGIN PUBLIC KEY-----",
1798*62c56f98SSadaf Ebrahimi "-----END PUBLIC KEY-----",
1799*62c56f98SSadaf Ebrahimi key, NULL, 0, &len);
1800*62c56f98SSadaf Ebrahimi }
1801*62c56f98SSadaf Ebrahimi
1802*62c56f98SSadaf Ebrahimi if (ret == 0) {
1803*62c56f98SSadaf Ebrahimi /*
1804*62c56f98SSadaf Ebrahimi * Was PEM encoded
1805*62c56f98SSadaf Ebrahimi */
1806*62c56f98SSadaf Ebrahimi p = pem.buf;
1807*62c56f98SSadaf Ebrahimi
1808*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_subpubkey(&p, p + pem.buflen, ctx);
1809*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1810*62c56f98SSadaf Ebrahimi return ret;
1811*62c56f98SSadaf Ebrahimi } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1812*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1813*62c56f98SSadaf Ebrahimi return ret;
1814*62c56f98SSadaf Ebrahimi }
1815*62c56f98SSadaf Ebrahimi mbedtls_pem_free(&pem);
1816*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PEM_PARSE_C */
1817*62c56f98SSadaf Ebrahimi
1818*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1819*62c56f98SSadaf Ebrahimi if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
1820*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1821*62c56f98SSadaf Ebrahimi }
1822*62c56f98SSadaf Ebrahimi
1823*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
1824*62c56f98SSadaf Ebrahimi return ret;
1825*62c56f98SSadaf Ebrahimi }
1826*62c56f98SSadaf Ebrahimi
1827*62c56f98SSadaf Ebrahimi p = (unsigned char *) key;
1828*62c56f98SSadaf Ebrahimi ret = pk_get_rsapubkey(&p, p + keylen, mbedtls_pk_rsa(*ctx));
1829*62c56f98SSadaf Ebrahimi if (ret == 0) {
1830*62c56f98SSadaf Ebrahimi return ret;
1831*62c56f98SSadaf Ebrahimi }
1832*62c56f98SSadaf Ebrahimi mbedtls_pk_free(ctx);
1833*62c56f98SSadaf Ebrahimi if (ret != (MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
1834*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_ASN1_UNEXPECTED_TAG))) {
1835*62c56f98SSadaf Ebrahimi return ret;
1836*62c56f98SSadaf Ebrahimi }
1837*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1838*62c56f98SSadaf Ebrahimi p = (unsigned char *) key;
1839*62c56f98SSadaf Ebrahimi
1840*62c56f98SSadaf Ebrahimi ret = mbedtls_pk_parse_subpubkey(&p, p + keylen, ctx);
1841*62c56f98SSadaf Ebrahimi
1842*62c56f98SSadaf Ebrahimi return ret;
1843*62c56f98SSadaf Ebrahimi }
1844*62c56f98SSadaf Ebrahimi
1845*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_C */
1846