xref: /aosp_15_r20/external/mbedtls/library/pkparse.c (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi  *  Public Key layer for parsing key files and structures
3*62c56f98SSadaf Ebrahimi  *
4*62c56f98SSadaf Ebrahimi  *  Copyright The Mbed TLS Contributors
5*62c56f98SSadaf Ebrahimi  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6*62c56f98SSadaf Ebrahimi  */
7*62c56f98SSadaf Ebrahimi 
8*62c56f98SSadaf Ebrahimi #include "common.h"
9*62c56f98SSadaf Ebrahimi 
10*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_C)
11*62c56f98SSadaf Ebrahimi 
12*62c56f98SSadaf Ebrahimi #include "mbedtls/pk.h"
13*62c56f98SSadaf Ebrahimi #include "mbedtls/asn1.h"
14*62c56f98SSadaf Ebrahimi #include "mbedtls/oid.h"
15*62c56f98SSadaf Ebrahimi #include "mbedtls/platform_util.h"
16*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
17*62c56f98SSadaf Ebrahimi #include "pk_internal.h"
18*62c56f98SSadaf Ebrahimi 
19*62c56f98SSadaf Ebrahimi #include <string.h>
20*62c56f98SSadaf Ebrahimi 
21*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
22*62c56f98SSadaf Ebrahimi #include "mbedtls/rsa.h"
23*62c56f98SSadaf Ebrahimi #endif
24*62c56f98SSadaf Ebrahimi #include "mbedtls/ecp.h"
25*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
26*62c56f98SSadaf Ebrahimi #include "pk_internal.h"
27*62c56f98SSadaf Ebrahimi #endif
28*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_ECDSA_C)
29*62c56f98SSadaf Ebrahimi #include "mbedtls/ecdsa.h"
30*62c56f98SSadaf Ebrahimi #endif
31*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
32*62c56f98SSadaf Ebrahimi #include "mbedtls/pem.h"
33*62c56f98SSadaf Ebrahimi #endif
34*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS5_C)
35*62c56f98SSadaf Ebrahimi #include "mbedtls/pkcs5.h"
36*62c56f98SSadaf Ebrahimi #endif
37*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
38*62c56f98SSadaf Ebrahimi #include "mbedtls/pkcs12.h"
39*62c56f98SSadaf Ebrahimi #endif
40*62c56f98SSadaf Ebrahimi 
41*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_CRYPTO_C)
42*62c56f98SSadaf Ebrahimi #include "psa_util_internal.h"
43*62c56f98SSadaf Ebrahimi #endif
44*62c56f98SSadaf Ebrahimi 
45*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
46*62c56f98SSadaf Ebrahimi #include "psa/crypto.h"
47*62c56f98SSadaf Ebrahimi #endif
48*62c56f98SSadaf Ebrahimi 
49*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
50*62c56f98SSadaf Ebrahimi 
51*62c56f98SSadaf Ebrahimi /* Helper for Montgomery curves */
52*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) && defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
53*62c56f98SSadaf Ebrahimi #define MBEDTLS_PK_IS_RFC8410_GROUP_ID(id)  \
54*62c56f98SSadaf Ebrahimi     ((id == MBEDTLS_ECP_DP_CURVE25519) || (id == MBEDTLS_ECP_DP_CURVE448))
55*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS && MBEDTLS_PK_HAVE_RFC8410_CURVES */
56*62c56f98SSadaf Ebrahimi 
57*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_FS_IO)
58*62c56f98SSadaf Ebrahimi /*
59*62c56f98SSadaf Ebrahimi  * Load all data from a file into a given buffer.
60*62c56f98SSadaf Ebrahimi  *
61*62c56f98SSadaf Ebrahimi  * The file is expected to contain either PEM or DER encoded data.
62*62c56f98SSadaf Ebrahimi  * A terminating null byte is always appended. It is included in the announced
63*62c56f98SSadaf Ebrahimi  * length only if the data looks like it is PEM encoded.
64*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_load_file(const char * path,unsigned char ** buf,size_t * n)65*62c56f98SSadaf Ebrahimi int mbedtls_pk_load_file(const char *path, unsigned char **buf, size_t *n)
66*62c56f98SSadaf Ebrahimi {
67*62c56f98SSadaf Ebrahimi     FILE *f;
68*62c56f98SSadaf Ebrahimi     long size;
69*62c56f98SSadaf Ebrahimi 
70*62c56f98SSadaf Ebrahimi     if ((f = fopen(path, "rb")) == NULL) {
71*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FILE_IO_ERROR;
72*62c56f98SSadaf Ebrahimi     }
73*62c56f98SSadaf Ebrahimi 
74*62c56f98SSadaf Ebrahimi     /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
75*62c56f98SSadaf Ebrahimi     mbedtls_setbuf(f, NULL);
76*62c56f98SSadaf Ebrahimi 
77*62c56f98SSadaf Ebrahimi     fseek(f, 0, SEEK_END);
78*62c56f98SSadaf Ebrahimi     if ((size = ftell(f)) == -1) {
79*62c56f98SSadaf Ebrahimi         fclose(f);
80*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FILE_IO_ERROR;
81*62c56f98SSadaf Ebrahimi     }
82*62c56f98SSadaf Ebrahimi     fseek(f, 0, SEEK_SET);
83*62c56f98SSadaf Ebrahimi 
84*62c56f98SSadaf Ebrahimi     *n = (size_t) size;
85*62c56f98SSadaf Ebrahimi 
86*62c56f98SSadaf Ebrahimi     if (*n + 1 == 0 ||
87*62c56f98SSadaf Ebrahimi         (*buf = mbedtls_calloc(1, *n + 1)) == NULL) {
88*62c56f98SSadaf Ebrahimi         fclose(f);
89*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_ALLOC_FAILED;
90*62c56f98SSadaf Ebrahimi     }
91*62c56f98SSadaf Ebrahimi 
92*62c56f98SSadaf Ebrahimi     if (fread(*buf, 1, *n, f) != *n) {
93*62c56f98SSadaf Ebrahimi         fclose(f);
94*62c56f98SSadaf Ebrahimi 
95*62c56f98SSadaf Ebrahimi         mbedtls_zeroize_and_free(*buf, *n);
96*62c56f98SSadaf Ebrahimi 
97*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FILE_IO_ERROR;
98*62c56f98SSadaf Ebrahimi     }
99*62c56f98SSadaf Ebrahimi 
100*62c56f98SSadaf Ebrahimi     fclose(f);
101*62c56f98SSadaf Ebrahimi 
102*62c56f98SSadaf Ebrahimi     (*buf)[*n] = '\0';
103*62c56f98SSadaf Ebrahimi 
104*62c56f98SSadaf Ebrahimi     if (strstr((const char *) *buf, "-----BEGIN ") != NULL) {
105*62c56f98SSadaf Ebrahimi         ++*n;
106*62c56f98SSadaf Ebrahimi     }
107*62c56f98SSadaf Ebrahimi 
108*62c56f98SSadaf Ebrahimi     return 0;
109*62c56f98SSadaf Ebrahimi }
110*62c56f98SSadaf Ebrahimi 
111*62c56f98SSadaf Ebrahimi /*
112*62c56f98SSadaf Ebrahimi  * Load and parse a private key
113*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_parse_keyfile(mbedtls_pk_context * ctx,const char * path,const char * pwd,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)114*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_keyfile(mbedtls_pk_context *ctx,
115*62c56f98SSadaf Ebrahimi                              const char *path, const char *pwd,
116*62c56f98SSadaf Ebrahimi                              int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
117*62c56f98SSadaf Ebrahimi {
118*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
119*62c56f98SSadaf Ebrahimi     size_t n;
120*62c56f98SSadaf Ebrahimi     unsigned char *buf;
121*62c56f98SSadaf Ebrahimi 
122*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
123*62c56f98SSadaf Ebrahimi         return ret;
124*62c56f98SSadaf Ebrahimi     }
125*62c56f98SSadaf Ebrahimi 
126*62c56f98SSadaf Ebrahimi     if (pwd == NULL) {
127*62c56f98SSadaf Ebrahimi         ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng);
128*62c56f98SSadaf Ebrahimi     } else {
129*62c56f98SSadaf Ebrahimi         ret = mbedtls_pk_parse_key(ctx, buf, n,
130*62c56f98SSadaf Ebrahimi                                    (const unsigned char *) pwd, strlen(pwd), f_rng, p_rng);
131*62c56f98SSadaf Ebrahimi     }
132*62c56f98SSadaf Ebrahimi 
133*62c56f98SSadaf Ebrahimi     mbedtls_zeroize_and_free(buf, n);
134*62c56f98SSadaf Ebrahimi 
135*62c56f98SSadaf Ebrahimi     return ret;
136*62c56f98SSadaf Ebrahimi }
137*62c56f98SSadaf Ebrahimi 
138*62c56f98SSadaf Ebrahimi /*
139*62c56f98SSadaf Ebrahimi  * Load and parse a public key
140*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_parse_public_keyfile(mbedtls_pk_context * ctx,const char * path)141*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_public_keyfile(mbedtls_pk_context *ctx, const char *path)
142*62c56f98SSadaf Ebrahimi {
143*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
144*62c56f98SSadaf Ebrahimi     size_t n;
145*62c56f98SSadaf Ebrahimi     unsigned char *buf;
146*62c56f98SSadaf Ebrahimi 
147*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
148*62c56f98SSadaf Ebrahimi         return ret;
149*62c56f98SSadaf Ebrahimi     }
150*62c56f98SSadaf Ebrahimi 
151*62c56f98SSadaf Ebrahimi     ret = mbedtls_pk_parse_public_key(ctx, buf, n);
152*62c56f98SSadaf Ebrahimi 
153*62c56f98SSadaf Ebrahimi     mbedtls_zeroize_and_free(buf, n);
154*62c56f98SSadaf Ebrahimi 
155*62c56f98SSadaf Ebrahimi     return ret;
156*62c56f98SSadaf Ebrahimi }
157*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_FS_IO */
158*62c56f98SSadaf Ebrahimi 
159*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
160*62c56f98SSadaf Ebrahimi /* Minimally parse an ECParameters buffer to and mbedtls_asn1_buf
161*62c56f98SSadaf Ebrahimi  *
162*62c56f98SSadaf Ebrahimi  * ECParameters ::= CHOICE {
163*62c56f98SSadaf Ebrahimi  *   namedCurve         OBJECT IDENTIFIER
164*62c56f98SSadaf Ebrahimi  *   specifiedCurve     SpecifiedECDomain -- = SEQUENCE { ... }
165*62c56f98SSadaf Ebrahimi  *   -- implicitCurve   NULL
166*62c56f98SSadaf Ebrahimi  * }
167*62c56f98SSadaf Ebrahimi  */
pk_get_ecparams(unsigned char ** p,const unsigned char * end,mbedtls_asn1_buf * params)168*62c56f98SSadaf Ebrahimi static int pk_get_ecparams(unsigned char **p, const unsigned char *end,
169*62c56f98SSadaf Ebrahimi                            mbedtls_asn1_buf *params)
170*62c56f98SSadaf Ebrahimi {
171*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
172*62c56f98SSadaf Ebrahimi 
173*62c56f98SSadaf Ebrahimi     if (end - *p < 1) {
174*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
175*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_OUT_OF_DATA);
176*62c56f98SSadaf Ebrahimi     }
177*62c56f98SSadaf Ebrahimi 
178*62c56f98SSadaf Ebrahimi     /* Tag may be either OID or SEQUENCE */
179*62c56f98SSadaf Ebrahimi     params->tag = **p;
180*62c56f98SSadaf Ebrahimi     if (params->tag != MBEDTLS_ASN1_OID
181*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
182*62c56f98SSadaf Ebrahimi         && params->tag != (MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)
183*62c56f98SSadaf Ebrahimi #endif
184*62c56f98SSadaf Ebrahimi         ) {
185*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
186*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_UNEXPECTED_TAG);
187*62c56f98SSadaf Ebrahimi     }
188*62c56f98SSadaf Ebrahimi 
189*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(p, end, &params->len, params->tag)) != 0) {
190*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
191*62c56f98SSadaf Ebrahimi     }
192*62c56f98SSadaf Ebrahimi 
193*62c56f98SSadaf Ebrahimi     params->p = *p;
194*62c56f98SSadaf Ebrahimi     *p += params->len;
195*62c56f98SSadaf Ebrahimi 
196*62c56f98SSadaf Ebrahimi     if (*p != end) {
197*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
198*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
199*62c56f98SSadaf Ebrahimi     }
200*62c56f98SSadaf Ebrahimi 
201*62c56f98SSadaf Ebrahimi     return 0;
202*62c56f98SSadaf Ebrahimi }
203*62c56f98SSadaf Ebrahimi 
204*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
205*62c56f98SSadaf Ebrahimi /*
206*62c56f98SSadaf Ebrahimi  * Parse a SpecifiedECDomain (SEC 1 C.2) and (mostly) fill the group with it.
207*62c56f98SSadaf Ebrahimi  * WARNING: the resulting group should only be used with
208*62c56f98SSadaf Ebrahimi  * pk_group_id_from_specified(), since its base point may not be set correctly
209*62c56f98SSadaf Ebrahimi  * if it was encoded compressed.
210*62c56f98SSadaf Ebrahimi  *
211*62c56f98SSadaf Ebrahimi  *  SpecifiedECDomain ::= SEQUENCE {
212*62c56f98SSadaf Ebrahimi  *      version SpecifiedECDomainVersion(ecdpVer1 | ecdpVer2 | ecdpVer3, ...),
213*62c56f98SSadaf Ebrahimi  *      fieldID FieldID {{FieldTypes}},
214*62c56f98SSadaf Ebrahimi  *      curve Curve,
215*62c56f98SSadaf Ebrahimi  *      base ECPoint,
216*62c56f98SSadaf Ebrahimi  *      order INTEGER,
217*62c56f98SSadaf Ebrahimi  *      cofactor INTEGER OPTIONAL,
218*62c56f98SSadaf Ebrahimi  *      hash HashAlgorithm OPTIONAL,
219*62c56f98SSadaf Ebrahimi  *      ...
220*62c56f98SSadaf Ebrahimi  *  }
221*62c56f98SSadaf Ebrahimi  *
222*62c56f98SSadaf Ebrahimi  * We only support prime-field as field type, and ignore hash and cofactor.
223*62c56f98SSadaf Ebrahimi  */
pk_group_from_specified(const mbedtls_asn1_buf * params,mbedtls_ecp_group * grp)224*62c56f98SSadaf Ebrahimi static int pk_group_from_specified(const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp)
225*62c56f98SSadaf Ebrahimi {
226*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
227*62c56f98SSadaf Ebrahimi     unsigned char *p = params->p;
228*62c56f98SSadaf Ebrahimi     const unsigned char *const end = params->p + params->len;
229*62c56f98SSadaf Ebrahimi     const unsigned char *end_field, *end_curve;
230*62c56f98SSadaf Ebrahimi     size_t len;
231*62c56f98SSadaf Ebrahimi     int ver;
232*62c56f98SSadaf Ebrahimi 
233*62c56f98SSadaf Ebrahimi     /* SpecifiedECDomainVersion ::= INTEGER { 1, 2, 3 } */
234*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_int(&p, end, &ver)) != 0) {
235*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
236*62c56f98SSadaf Ebrahimi     }
237*62c56f98SSadaf Ebrahimi 
238*62c56f98SSadaf Ebrahimi     if (ver < 1 || ver > 3) {
239*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
240*62c56f98SSadaf Ebrahimi     }
241*62c56f98SSadaf Ebrahimi 
242*62c56f98SSadaf Ebrahimi     /*
243*62c56f98SSadaf Ebrahimi      * FieldID { FIELD-ID:IOSet } ::= SEQUENCE { -- Finite field
244*62c56f98SSadaf Ebrahimi      *       fieldType FIELD-ID.&id({IOSet}),
245*62c56f98SSadaf Ebrahimi      *       parameters FIELD-ID.&Type({IOSet}{@fieldType})
246*62c56f98SSadaf Ebrahimi      * }
247*62c56f98SSadaf Ebrahimi      */
248*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
249*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
250*62c56f98SSadaf Ebrahimi         return ret;
251*62c56f98SSadaf Ebrahimi     }
252*62c56f98SSadaf Ebrahimi 
253*62c56f98SSadaf Ebrahimi     end_field = p + len;
254*62c56f98SSadaf Ebrahimi 
255*62c56f98SSadaf Ebrahimi     /*
256*62c56f98SSadaf Ebrahimi      * FIELD-ID ::= TYPE-IDENTIFIER
257*62c56f98SSadaf Ebrahimi      * FieldTypes FIELD-ID ::= {
258*62c56f98SSadaf Ebrahimi      *       { Prime-p IDENTIFIED BY prime-field } |
259*62c56f98SSadaf Ebrahimi      *       { Characteristic-two IDENTIFIED BY characteristic-two-field }
260*62c56f98SSadaf Ebrahimi      * }
261*62c56f98SSadaf Ebrahimi      * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
262*62c56f98SSadaf Ebrahimi      */
263*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end_field, &len, MBEDTLS_ASN1_OID)) != 0) {
264*62c56f98SSadaf Ebrahimi         return ret;
265*62c56f98SSadaf Ebrahimi     }
266*62c56f98SSadaf Ebrahimi 
267*62c56f98SSadaf Ebrahimi     if (len != MBEDTLS_OID_SIZE(MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD) ||
268*62c56f98SSadaf Ebrahimi         memcmp(p, MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD, len) != 0) {
269*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
270*62c56f98SSadaf Ebrahimi     }
271*62c56f98SSadaf Ebrahimi 
272*62c56f98SSadaf Ebrahimi     p += len;
273*62c56f98SSadaf Ebrahimi 
274*62c56f98SSadaf Ebrahimi     /* Prime-p ::= INTEGER -- Field of size p. */
275*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_mpi(&p, end_field, &grp->P)) != 0) {
276*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
277*62c56f98SSadaf Ebrahimi     }
278*62c56f98SSadaf Ebrahimi 
279*62c56f98SSadaf Ebrahimi     grp->pbits = mbedtls_mpi_bitlen(&grp->P);
280*62c56f98SSadaf Ebrahimi 
281*62c56f98SSadaf Ebrahimi     if (p != end_field) {
282*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
283*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
284*62c56f98SSadaf Ebrahimi     }
285*62c56f98SSadaf Ebrahimi 
286*62c56f98SSadaf Ebrahimi     /*
287*62c56f98SSadaf Ebrahimi      * Curve ::= SEQUENCE {
288*62c56f98SSadaf Ebrahimi      *       a FieldElement,
289*62c56f98SSadaf Ebrahimi      *       b FieldElement,
290*62c56f98SSadaf Ebrahimi      *       seed BIT STRING OPTIONAL
291*62c56f98SSadaf Ebrahimi      *       -- Shall be present if used in SpecifiedECDomain
292*62c56f98SSadaf Ebrahimi      *       -- with version equal to ecdpVer2 or ecdpVer3
293*62c56f98SSadaf Ebrahimi      * }
294*62c56f98SSadaf Ebrahimi      */
295*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
296*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
297*62c56f98SSadaf Ebrahimi         return ret;
298*62c56f98SSadaf Ebrahimi     }
299*62c56f98SSadaf Ebrahimi 
300*62c56f98SSadaf Ebrahimi     end_curve = p + len;
301*62c56f98SSadaf Ebrahimi 
302*62c56f98SSadaf Ebrahimi     /*
303*62c56f98SSadaf Ebrahimi      * FieldElement ::= OCTET STRING
304*62c56f98SSadaf Ebrahimi      * containing an integer in the case of a prime field
305*62c56f98SSadaf Ebrahimi      */
306*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
307*62c56f98SSadaf Ebrahimi         (ret = mbedtls_mpi_read_binary(&grp->A, p, len)) != 0) {
308*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
309*62c56f98SSadaf Ebrahimi     }
310*62c56f98SSadaf Ebrahimi 
311*62c56f98SSadaf Ebrahimi     p += len;
312*62c56f98SSadaf Ebrahimi 
313*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
314*62c56f98SSadaf Ebrahimi         (ret = mbedtls_mpi_read_binary(&grp->B, p, len)) != 0) {
315*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
316*62c56f98SSadaf Ebrahimi     }
317*62c56f98SSadaf Ebrahimi 
318*62c56f98SSadaf Ebrahimi     p += len;
319*62c56f98SSadaf Ebrahimi 
320*62c56f98SSadaf Ebrahimi     /* Ignore seed BIT STRING OPTIONAL */
321*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_BIT_STRING)) == 0) {
322*62c56f98SSadaf Ebrahimi         p += len;
323*62c56f98SSadaf Ebrahimi     }
324*62c56f98SSadaf Ebrahimi 
325*62c56f98SSadaf Ebrahimi     if (p != end_curve) {
326*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
327*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
328*62c56f98SSadaf Ebrahimi     }
329*62c56f98SSadaf Ebrahimi 
330*62c56f98SSadaf Ebrahimi     /*
331*62c56f98SSadaf Ebrahimi      * ECPoint ::= OCTET STRING
332*62c56f98SSadaf Ebrahimi      */
333*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
334*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
335*62c56f98SSadaf Ebrahimi     }
336*62c56f98SSadaf Ebrahimi 
337*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_ecp_point_read_binary(grp, &grp->G,
338*62c56f98SSadaf Ebrahimi                                              (const unsigned char *) p, len)) != 0) {
339*62c56f98SSadaf Ebrahimi         /*
340*62c56f98SSadaf Ebrahimi          * If we can't read the point because it's compressed, cheat by
341*62c56f98SSadaf Ebrahimi          * reading only the X coordinate and the parity bit of Y.
342*62c56f98SSadaf Ebrahimi          */
343*62c56f98SSadaf Ebrahimi         if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ||
344*62c56f98SSadaf Ebrahimi             (p[0] != 0x02 && p[0] != 0x03) ||
345*62c56f98SSadaf Ebrahimi             len != mbedtls_mpi_size(&grp->P) + 1 ||
346*62c56f98SSadaf Ebrahimi             mbedtls_mpi_read_binary(&grp->G.X, p + 1, len - 1) != 0 ||
347*62c56f98SSadaf Ebrahimi             mbedtls_mpi_lset(&grp->G.Y, p[0] - 2) != 0 ||
348*62c56f98SSadaf Ebrahimi             mbedtls_mpi_lset(&grp->G.Z, 1) != 0) {
349*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
350*62c56f98SSadaf Ebrahimi         }
351*62c56f98SSadaf Ebrahimi     }
352*62c56f98SSadaf Ebrahimi 
353*62c56f98SSadaf Ebrahimi     p += len;
354*62c56f98SSadaf Ebrahimi 
355*62c56f98SSadaf Ebrahimi     /*
356*62c56f98SSadaf Ebrahimi      * order INTEGER
357*62c56f98SSadaf Ebrahimi      */
358*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_mpi(&p, end, &grp->N)) != 0) {
359*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
360*62c56f98SSadaf Ebrahimi     }
361*62c56f98SSadaf Ebrahimi 
362*62c56f98SSadaf Ebrahimi     grp->nbits = mbedtls_mpi_bitlen(&grp->N);
363*62c56f98SSadaf Ebrahimi 
364*62c56f98SSadaf Ebrahimi     /*
365*62c56f98SSadaf Ebrahimi      * Allow optional elements by purposefully not enforcing p == end here.
366*62c56f98SSadaf Ebrahimi      */
367*62c56f98SSadaf Ebrahimi 
368*62c56f98SSadaf Ebrahimi     return 0;
369*62c56f98SSadaf Ebrahimi }
370*62c56f98SSadaf Ebrahimi 
371*62c56f98SSadaf Ebrahimi /*
372*62c56f98SSadaf Ebrahimi  * Find the group id associated with an (almost filled) group as generated by
373*62c56f98SSadaf Ebrahimi  * pk_group_from_specified(), or return an error if unknown.
374*62c56f98SSadaf Ebrahimi  */
pk_group_id_from_group(const mbedtls_ecp_group * grp,mbedtls_ecp_group_id * grp_id)375*62c56f98SSadaf Ebrahimi static int pk_group_id_from_group(const mbedtls_ecp_group *grp, mbedtls_ecp_group_id *grp_id)
376*62c56f98SSadaf Ebrahimi {
377*62c56f98SSadaf Ebrahimi     int ret = 0;
378*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group ref;
379*62c56f98SSadaf Ebrahimi     const mbedtls_ecp_group_id *id;
380*62c56f98SSadaf Ebrahimi 
381*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_init(&ref);
382*62c56f98SSadaf Ebrahimi 
383*62c56f98SSadaf Ebrahimi     for (id = mbedtls_ecp_grp_id_list(); *id != MBEDTLS_ECP_DP_NONE; id++) {
384*62c56f98SSadaf Ebrahimi         /* Load the group associated to that id */
385*62c56f98SSadaf Ebrahimi         mbedtls_ecp_group_free(&ref);
386*62c56f98SSadaf Ebrahimi         MBEDTLS_MPI_CHK(mbedtls_ecp_group_load(&ref, *id));
387*62c56f98SSadaf Ebrahimi 
388*62c56f98SSadaf Ebrahimi         /* Compare to the group we were given, starting with easy tests */
389*62c56f98SSadaf Ebrahimi         if (grp->pbits == ref.pbits && grp->nbits == ref.nbits &&
390*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->P, &ref.P) == 0 &&
391*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->A, &ref.A) == 0 &&
392*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->B, &ref.B) == 0 &&
393*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->N, &ref.N) == 0 &&
394*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->G.X, &ref.G.X) == 0 &&
395*62c56f98SSadaf Ebrahimi             mbedtls_mpi_cmp_mpi(&grp->G.Z, &ref.G.Z) == 0 &&
396*62c56f98SSadaf Ebrahimi             /* For Y we may only know the parity bit, so compare only that */
397*62c56f98SSadaf Ebrahimi             mbedtls_mpi_get_bit(&grp->G.Y, 0) == mbedtls_mpi_get_bit(&ref.G.Y, 0)) {
398*62c56f98SSadaf Ebrahimi             break;
399*62c56f98SSadaf Ebrahimi         }
400*62c56f98SSadaf Ebrahimi     }
401*62c56f98SSadaf Ebrahimi 
402*62c56f98SSadaf Ebrahimi cleanup:
403*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_free(&ref);
404*62c56f98SSadaf Ebrahimi 
405*62c56f98SSadaf Ebrahimi     *grp_id = *id;
406*62c56f98SSadaf Ebrahimi 
407*62c56f98SSadaf Ebrahimi     if (ret == 0 && *id == MBEDTLS_ECP_DP_NONE) {
408*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
409*62c56f98SSadaf Ebrahimi     }
410*62c56f98SSadaf Ebrahimi 
411*62c56f98SSadaf Ebrahimi     return ret;
412*62c56f98SSadaf Ebrahimi }
413*62c56f98SSadaf Ebrahimi 
414*62c56f98SSadaf Ebrahimi /*
415*62c56f98SSadaf Ebrahimi  * Parse a SpecifiedECDomain (SEC 1 C.2) and find the associated group ID
416*62c56f98SSadaf Ebrahimi  */
pk_group_id_from_specified(const mbedtls_asn1_buf * params,mbedtls_ecp_group_id * grp_id)417*62c56f98SSadaf Ebrahimi static int pk_group_id_from_specified(const mbedtls_asn1_buf *params,
418*62c56f98SSadaf Ebrahimi                                       mbedtls_ecp_group_id *grp_id)
419*62c56f98SSadaf Ebrahimi {
420*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
421*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group grp;
422*62c56f98SSadaf Ebrahimi 
423*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_init(&grp);
424*62c56f98SSadaf Ebrahimi 
425*62c56f98SSadaf Ebrahimi     if ((ret = pk_group_from_specified(params, &grp)) != 0) {
426*62c56f98SSadaf Ebrahimi         goto cleanup;
427*62c56f98SSadaf Ebrahimi     }
428*62c56f98SSadaf Ebrahimi 
429*62c56f98SSadaf Ebrahimi     ret = pk_group_id_from_group(&grp, grp_id);
430*62c56f98SSadaf Ebrahimi 
431*62c56f98SSadaf Ebrahimi cleanup:
432*62c56f98SSadaf Ebrahimi     /* The API respecting lifecycle for mbedtls_ecp_group struct is
433*62c56f98SSadaf Ebrahimi      * _init(), _load() and _free(). In pk_group_id_from_specified() the
434*62c56f98SSadaf Ebrahimi      * temporary grp breaks that flow and it's members are populated
435*62c56f98SSadaf Ebrahimi      * by pk_group_id_from_group(). As such mbedtls_ecp_group_free()
436*62c56f98SSadaf Ebrahimi      * which is assuming a group populated by _setup() may not clean-up
437*62c56f98SSadaf Ebrahimi      * properly -> Manually free it's members.
438*62c56f98SSadaf Ebrahimi      */
439*62c56f98SSadaf Ebrahimi     mbedtls_mpi_free(&grp.N);
440*62c56f98SSadaf Ebrahimi     mbedtls_mpi_free(&grp.P);
441*62c56f98SSadaf Ebrahimi     mbedtls_mpi_free(&grp.A);
442*62c56f98SSadaf Ebrahimi     mbedtls_mpi_free(&grp.B);
443*62c56f98SSadaf Ebrahimi     mbedtls_ecp_point_free(&grp.G);
444*62c56f98SSadaf Ebrahimi 
445*62c56f98SSadaf Ebrahimi     return ret;
446*62c56f98SSadaf Ebrahimi }
447*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_EC_EXTENDED */
448*62c56f98SSadaf Ebrahimi 
449*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
450*62c56f98SSadaf Ebrahimi /* Functions pk_use_ecparams() and pk_use_ecparams_rfc8410() update the
451*62c56f98SSadaf Ebrahimi  * ecp_keypair structure with proper group ID. The purpose of this helper
452*62c56f98SSadaf Ebrahimi  * function is to update ec_family and ec_bits accordingly. */
pk_update_psa_ecparams(mbedtls_pk_context * pk,mbedtls_ecp_group_id grp_id)453*62c56f98SSadaf Ebrahimi static int pk_update_psa_ecparams(mbedtls_pk_context *pk,
454*62c56f98SSadaf Ebrahimi                                   mbedtls_ecp_group_id grp_id)
455*62c56f98SSadaf Ebrahimi {
456*62c56f98SSadaf Ebrahimi     psa_ecc_family_t ec_family;
457*62c56f98SSadaf Ebrahimi     size_t bits;
458*62c56f98SSadaf Ebrahimi 
459*62c56f98SSadaf Ebrahimi     ec_family = mbedtls_ecc_group_to_psa(grp_id, &bits);
460*62c56f98SSadaf Ebrahimi 
461*62c56f98SSadaf Ebrahimi     if ((pk->ec_family != 0) && (pk->ec_family != ec_family)) {
462*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
463*62c56f98SSadaf Ebrahimi     }
464*62c56f98SSadaf Ebrahimi 
465*62c56f98SSadaf Ebrahimi     pk->ec_family = ec_family;
466*62c56f98SSadaf Ebrahimi     pk->ec_bits = bits;
467*62c56f98SSadaf Ebrahimi 
468*62c56f98SSadaf Ebrahimi     return 0;
469*62c56f98SSadaf Ebrahimi }
470*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
471*62c56f98SSadaf Ebrahimi 
472*62c56f98SSadaf Ebrahimi /*
473*62c56f98SSadaf Ebrahimi  * Use EC parameters to initialise an EC group
474*62c56f98SSadaf Ebrahimi  *
475*62c56f98SSadaf Ebrahimi  * ECParameters ::= CHOICE {
476*62c56f98SSadaf Ebrahimi  *   namedCurve         OBJECT IDENTIFIER
477*62c56f98SSadaf Ebrahimi  *   specifiedCurve     SpecifiedECDomain -- = SEQUENCE { ... }
478*62c56f98SSadaf Ebrahimi  *   -- implicitCurve   NULL
479*62c56f98SSadaf Ebrahimi  */
pk_use_ecparams(const mbedtls_asn1_buf * params,mbedtls_pk_context * pk)480*62c56f98SSadaf Ebrahimi static int pk_use_ecparams(const mbedtls_asn1_buf *params, mbedtls_pk_context *pk)
481*62c56f98SSadaf Ebrahimi {
482*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
483*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_id grp_id;
484*62c56f98SSadaf Ebrahimi 
485*62c56f98SSadaf Ebrahimi     if (params->tag == MBEDTLS_ASN1_OID) {
486*62c56f98SSadaf Ebrahimi         if (mbedtls_oid_get_ec_grp(params, &grp_id) != 0) {
487*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE;
488*62c56f98SSadaf Ebrahimi         }
489*62c56f98SSadaf Ebrahimi     } else {
490*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
491*62c56f98SSadaf Ebrahimi         if ((ret = pk_group_id_from_specified(params, &grp_id)) != 0) {
492*62c56f98SSadaf Ebrahimi             return ret;
493*62c56f98SSadaf Ebrahimi         }
494*62c56f98SSadaf Ebrahimi #else
495*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
496*62c56f98SSadaf Ebrahimi #endif
497*62c56f98SSadaf Ebrahimi     }
498*62c56f98SSadaf Ebrahimi 
499*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
500*62c56f98SSadaf Ebrahimi     ret = pk_update_psa_ecparams(pk, grp_id);
501*62c56f98SSadaf Ebrahimi #else
502*62c56f98SSadaf Ebrahimi     /* grp may already be initialized; if so, make sure IDs match */
503*62c56f98SSadaf Ebrahimi     if (mbedtls_pk_ec_ro(*pk)->grp.id != MBEDTLS_ECP_DP_NONE &&
504*62c56f98SSadaf Ebrahimi         mbedtls_pk_ec_ro(*pk)->grp.id != grp_id) {
505*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
506*62c56f98SSadaf Ebrahimi     }
507*62c56f98SSadaf Ebrahimi 
508*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_ecp_group_load(&(mbedtls_pk_ec_rw(*pk)->grp),
509*62c56f98SSadaf Ebrahimi                                       grp_id)) != 0) {
510*62c56f98SSadaf Ebrahimi         return ret;
511*62c56f98SSadaf Ebrahimi     }
512*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
513*62c56f98SSadaf Ebrahimi 
514*62c56f98SSadaf Ebrahimi     return ret;
515*62c56f98SSadaf Ebrahimi }
516*62c56f98SSadaf Ebrahimi 
517*62c56f98SSadaf Ebrahimi /*
518*62c56f98SSadaf Ebrahimi  * Helper function for deriving a public key from its private counterpart.
519*62c56f98SSadaf Ebrahimi  */
pk_derive_public_key(mbedtls_pk_context * pk,const unsigned char * d,size_t d_len,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)520*62c56f98SSadaf Ebrahimi static int pk_derive_public_key(mbedtls_pk_context *pk,
521*62c56f98SSadaf Ebrahimi                                 const unsigned char *d, size_t d_len,
522*62c56f98SSadaf Ebrahimi                                 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
523*62c56f98SSadaf Ebrahimi {
524*62c56f98SSadaf Ebrahimi     int ret;
525*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
526*62c56f98SSadaf Ebrahimi     psa_status_t status;
527*62c56f98SSadaf Ebrahimi     (void) f_rng;
528*62c56f98SSadaf Ebrahimi     (void) p_rng;
529*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
530*62c56f98SSadaf Ebrahimi     (void) d;
531*62c56f98SSadaf Ebrahimi     (void) d_len;
532*62c56f98SSadaf Ebrahimi 
533*62c56f98SSadaf Ebrahimi     status = psa_export_public_key(pk->priv_id, pk->pub_raw, sizeof(pk->pub_raw),
534*62c56f98SSadaf Ebrahimi                                    &pk->pub_raw_len);
535*62c56f98SSadaf Ebrahimi     ret = psa_pk_status_to_mbedtls(status);
536*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
537*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
538*62c56f98SSadaf Ebrahimi     unsigned char key_buf[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
539*62c56f98SSadaf Ebrahimi     size_t key_len;
540*62c56f98SSadaf Ebrahimi     mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT;
541*62c56f98SSadaf Ebrahimi     psa_key_attributes_t key_attr = PSA_KEY_ATTRIBUTES_INIT;
542*62c56f98SSadaf Ebrahimi     size_t curve_bits;
543*62c56f98SSadaf Ebrahimi     psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits);
544*62c56f98SSadaf Ebrahimi     psa_status_t destruction_status;
545*62c56f98SSadaf Ebrahimi 
546*62c56f98SSadaf Ebrahimi     psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve));
547*62c56f98SSadaf Ebrahimi     psa_set_key_usage_flags(&key_attr, PSA_KEY_USAGE_EXPORT);
548*62c56f98SSadaf Ebrahimi 
549*62c56f98SSadaf Ebrahimi     status = psa_import_key(&key_attr, d, d_len, &key_id);
550*62c56f98SSadaf Ebrahimi     ret = psa_pk_status_to_mbedtls(status);
551*62c56f98SSadaf Ebrahimi     if (ret != 0) {
552*62c56f98SSadaf Ebrahimi         return ret;
553*62c56f98SSadaf Ebrahimi     }
554*62c56f98SSadaf Ebrahimi 
555*62c56f98SSadaf Ebrahimi     status = psa_export_public_key(key_id, key_buf, sizeof(key_buf), &key_len);
556*62c56f98SSadaf Ebrahimi     ret = psa_pk_status_to_mbedtls(status);
557*62c56f98SSadaf Ebrahimi     destruction_status = psa_destroy_key(key_id);
558*62c56f98SSadaf Ebrahimi     if (ret != 0) {
559*62c56f98SSadaf Ebrahimi         return ret;
560*62c56f98SSadaf Ebrahimi     } else if (destruction_status != PSA_SUCCESS) {
561*62c56f98SSadaf Ebrahimi         return psa_pk_status_to_mbedtls(destruction_status);
562*62c56f98SSadaf Ebrahimi     }
563*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_point_read_binary(&eck->grp, &eck->Q, key_buf, key_len);
564*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
565*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_USE_PSA_CRYPTO */
566*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
567*62c56f98SSadaf Ebrahimi     (void) d;
568*62c56f98SSadaf Ebrahimi     (void) d_len;
569*62c56f98SSadaf Ebrahimi 
570*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_mul(&eck->grp, &eck->Q, &eck->d, &eck->grp.G, f_rng, p_rng);
571*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_USE_PSA_CRYPTO */
572*62c56f98SSadaf Ebrahimi     return ret;
573*62c56f98SSadaf Ebrahimi }
574*62c56f98SSadaf Ebrahimi 
575*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
576*62c56f98SSadaf Ebrahimi 
577*62c56f98SSadaf Ebrahimi /*
578*62c56f98SSadaf Ebrahimi  * Load an RFC8410 EC key, which doesn't have any parameters
579*62c56f98SSadaf Ebrahimi  */
pk_use_ecparams_rfc8410(const mbedtls_asn1_buf * params,mbedtls_ecp_group_id grp_id,mbedtls_pk_context * pk)580*62c56f98SSadaf Ebrahimi static int pk_use_ecparams_rfc8410(const mbedtls_asn1_buf *params,
581*62c56f98SSadaf Ebrahimi                                    mbedtls_ecp_group_id grp_id,
582*62c56f98SSadaf Ebrahimi                                    mbedtls_pk_context *pk)
583*62c56f98SSadaf Ebrahimi {
584*62c56f98SSadaf Ebrahimi     int ret;
585*62c56f98SSadaf Ebrahimi 
586*62c56f98SSadaf Ebrahimi     if (params->tag != 0 || params->len != 0) {
587*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
588*62c56f98SSadaf Ebrahimi     }
589*62c56f98SSadaf Ebrahimi 
590*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
591*62c56f98SSadaf Ebrahimi     ret = pk_update_psa_ecparams(pk, grp_id);
592*62c56f98SSadaf Ebrahimi #else
593*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *ecp = mbedtls_pk_ec_rw(*pk);
594*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_group_load(&(ecp->grp), grp_id);
595*62c56f98SSadaf Ebrahimi     if (ret != 0) {
596*62c56f98SSadaf Ebrahimi         return ret;
597*62c56f98SSadaf Ebrahimi     }
598*62c56f98SSadaf Ebrahimi #endif
599*62c56f98SSadaf Ebrahimi     return ret;
600*62c56f98SSadaf Ebrahimi }
601*62c56f98SSadaf Ebrahimi 
602*62c56f98SSadaf Ebrahimi /*
603*62c56f98SSadaf Ebrahimi  * Parse an RFC 8410 encoded private EC key
604*62c56f98SSadaf Ebrahimi  *
605*62c56f98SSadaf Ebrahimi  * CurvePrivateKey ::= OCTET STRING
606*62c56f98SSadaf Ebrahimi  */
pk_parse_key_rfc8410_der(mbedtls_pk_context * pk,unsigned char * key,size_t keylen,const unsigned char * end,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)607*62c56f98SSadaf Ebrahimi static int pk_parse_key_rfc8410_der(mbedtls_pk_context *pk,
608*62c56f98SSadaf Ebrahimi                                     unsigned char *key, size_t keylen, const unsigned char *end,
609*62c56f98SSadaf Ebrahimi                                     int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
610*62c56f98SSadaf Ebrahimi {
611*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
612*62c56f98SSadaf Ebrahimi     size_t len;
613*62c56f98SSadaf Ebrahimi 
614*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
615*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
616*62c56f98SSadaf Ebrahimi     }
617*62c56f98SSadaf Ebrahimi 
618*62c56f98SSadaf Ebrahimi     if (key + len != end) {
619*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
620*62c56f98SSadaf Ebrahimi     }
621*62c56f98SSadaf Ebrahimi 
622*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
623*62c56f98SSadaf Ebrahimi     psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
624*62c56f98SSadaf Ebrahimi     psa_status_t status;
625*62c56f98SSadaf Ebrahimi 
626*62c56f98SSadaf Ebrahimi     psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
627*62c56f98SSadaf Ebrahimi     psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_EXPORT |
628*62c56f98SSadaf Ebrahimi                             PSA_KEY_USAGE_DERIVE);
629*62c56f98SSadaf Ebrahimi     psa_set_key_algorithm(&attributes, PSA_ALG_ECDH);
630*62c56f98SSadaf Ebrahimi 
631*62c56f98SSadaf Ebrahimi     status = psa_import_key(&attributes, key, len, &pk->priv_id);
632*62c56f98SSadaf Ebrahimi     if (status != PSA_SUCCESS) {
633*62c56f98SSadaf Ebrahimi         ret = psa_pk_status_to_mbedtls(status);
634*62c56f98SSadaf Ebrahimi         return ret;
635*62c56f98SSadaf Ebrahimi     }
636*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
637*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
638*62c56f98SSadaf Ebrahimi 
639*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, len)) != 0) {
640*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
641*62c56f98SSadaf Ebrahimi     }
642*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
643*62c56f98SSadaf Ebrahimi 
644*62c56f98SSadaf Ebrahimi     /* pk_parse_key_pkcs8_unencrypted_der() only supports version 1 PKCS8 keys,
645*62c56f98SSadaf Ebrahimi      * which never contain a public key. As such, derive the public key
646*62c56f98SSadaf Ebrahimi      * unconditionally. */
647*62c56f98SSadaf Ebrahimi     if ((ret = pk_derive_public_key(pk, key, len, f_rng, p_rng)) != 0) {
648*62c56f98SSadaf Ebrahimi         return ret;
649*62c56f98SSadaf Ebrahimi     }
650*62c56f98SSadaf Ebrahimi 
651*62c56f98SSadaf Ebrahimi     return 0;
652*62c56f98SSadaf Ebrahimi }
653*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_RFC8410_CURVES */
654*62c56f98SSadaf Ebrahimi 
655*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) && defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
656*62c56f98SSadaf Ebrahimi /*
657*62c56f98SSadaf Ebrahimi  * Create a temporary ecp_keypair for converting an EC point in compressed
658*62c56f98SSadaf Ebrahimi  * format to an uncompressed one
659*62c56f98SSadaf Ebrahimi  */
pk_convert_compressed_ec(mbedtls_pk_context * pk,const unsigned char * in_start,size_t in_len,size_t * out_buf_len,unsigned char * out_buf,size_t out_buf_size)660*62c56f98SSadaf Ebrahimi static int pk_convert_compressed_ec(mbedtls_pk_context *pk,
661*62c56f98SSadaf Ebrahimi                                     const unsigned char *in_start, size_t in_len,
662*62c56f98SSadaf Ebrahimi                                     size_t *out_buf_len, unsigned char *out_buf,
663*62c56f98SSadaf Ebrahimi                                     size_t out_buf_size)
664*62c56f98SSadaf Ebrahimi {
665*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair ecp_key;
666*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_id ecp_group_id;
667*62c56f98SSadaf Ebrahimi     int ret;
668*62c56f98SSadaf Ebrahimi 
669*62c56f98SSadaf Ebrahimi     ecp_group_id = mbedtls_ecc_group_of_psa(pk->ec_family, pk->ec_bits, 0);
670*62c56f98SSadaf Ebrahimi 
671*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair_init(&ecp_key);
672*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_group_load(&(ecp_key.grp), ecp_group_id);
673*62c56f98SSadaf Ebrahimi     if (ret != 0) {
674*62c56f98SSadaf Ebrahimi         return ret;
675*62c56f98SSadaf Ebrahimi     }
676*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_point_read_binary(&(ecp_key.grp), &ecp_key.Q,
677*62c56f98SSadaf Ebrahimi                                         in_start, in_len);
678*62c56f98SSadaf Ebrahimi     if (ret != 0) {
679*62c56f98SSadaf Ebrahimi         goto exit;
680*62c56f98SSadaf Ebrahimi     }
681*62c56f98SSadaf Ebrahimi     ret = mbedtls_ecp_point_write_binary(&(ecp_key.grp), &ecp_key.Q,
682*62c56f98SSadaf Ebrahimi                                          MBEDTLS_ECP_PF_UNCOMPRESSED,
683*62c56f98SSadaf Ebrahimi                                          out_buf_len, out_buf, out_buf_size);
684*62c56f98SSadaf Ebrahimi 
685*62c56f98SSadaf Ebrahimi exit:
686*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair_free(&ecp_key);
687*62c56f98SSadaf Ebrahimi     return ret;
688*62c56f98SSadaf Ebrahimi }
689*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA && MBEDTLS_PK_PARSE_EC_COMPRESSED */
690*62c56f98SSadaf Ebrahimi 
691*62c56f98SSadaf Ebrahimi /*
692*62c56f98SSadaf Ebrahimi  * EC public key is an EC point
693*62c56f98SSadaf Ebrahimi  *
694*62c56f98SSadaf Ebrahimi  * The caller is responsible for clearing the structure upon failure if
695*62c56f98SSadaf Ebrahimi  * desired. Take care to pass along the possible ECP_FEATURE_UNAVAILABLE
696*62c56f98SSadaf Ebrahimi  * return code of mbedtls_ecp_point_read_binary() and leave p in a usable state.
697*62c56f98SSadaf Ebrahimi  */
pk_get_ecpubkey(unsigned char ** p,const unsigned char * end,mbedtls_pk_context * pk)698*62c56f98SSadaf Ebrahimi static int pk_get_ecpubkey(unsigned char **p, const unsigned char *end,
699*62c56f98SSadaf Ebrahimi                            mbedtls_pk_context *pk)
700*62c56f98SSadaf Ebrahimi {
701*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
702*62c56f98SSadaf Ebrahimi 
703*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
704*62c56f98SSadaf Ebrahimi     mbedtls_svc_key_id_t key;
705*62c56f98SSadaf Ebrahimi     psa_key_attributes_t key_attrs = PSA_KEY_ATTRIBUTES_INIT;
706*62c56f98SSadaf Ebrahimi     size_t len = (end - *p);
707*62c56f98SSadaf Ebrahimi 
708*62c56f98SSadaf Ebrahimi     if (len > PSA_EXPORT_PUBLIC_KEY_MAX_SIZE) {
709*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
710*62c56f98SSadaf Ebrahimi     }
711*62c56f98SSadaf Ebrahimi 
712*62c56f98SSadaf Ebrahimi     /* Compressed point format are not supported yet by PSA crypto. As a
713*62c56f98SSadaf Ebrahimi      * consequence ecp functions are used to "convert" the point to
714*62c56f98SSadaf Ebrahimi      * uncompressed format */
715*62c56f98SSadaf Ebrahimi     if ((**p == 0x02) || (**p == 0x03)) {
716*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
717*62c56f98SSadaf Ebrahimi         ret = pk_convert_compressed_ec(pk, *p, len,
718*62c56f98SSadaf Ebrahimi                                        &(pk->pub_raw_len), pk->pub_raw,
719*62c56f98SSadaf Ebrahimi                                        PSA_EXPORT_PUBLIC_KEY_MAX_SIZE);
720*62c56f98SSadaf Ebrahimi         if (ret != 0) {
721*62c56f98SSadaf Ebrahimi             return ret;
722*62c56f98SSadaf Ebrahimi         }
723*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
724*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
725*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
726*62c56f98SSadaf Ebrahimi     } else {
727*62c56f98SSadaf Ebrahimi         /* Uncompressed format */
728*62c56f98SSadaf Ebrahimi         if ((size_t) (end - *p) > MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN) {
729*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERR_PK_BUFFER_TOO_SMALL;
730*62c56f98SSadaf Ebrahimi         }
731*62c56f98SSadaf Ebrahimi         memcpy(pk->pub_raw, *p, (end - *p));
732*62c56f98SSadaf Ebrahimi         pk->pub_raw_len = end - *p;
733*62c56f98SSadaf Ebrahimi     }
734*62c56f98SSadaf Ebrahimi 
735*62c56f98SSadaf Ebrahimi     /* Validate the key by trying to importing it */
736*62c56f98SSadaf Ebrahimi     psa_set_key_usage_flags(&key_attrs, 0);
737*62c56f98SSadaf Ebrahimi     psa_set_key_algorithm(&key_attrs, PSA_ALG_ECDSA_ANY);
738*62c56f98SSadaf Ebrahimi     psa_set_key_type(&key_attrs, PSA_KEY_TYPE_ECC_PUBLIC_KEY(pk->ec_family));
739*62c56f98SSadaf Ebrahimi     psa_set_key_bits(&key_attrs, pk->ec_bits);
740*62c56f98SSadaf Ebrahimi 
741*62c56f98SSadaf Ebrahimi     if ((psa_import_key(&key_attrs, pk->pub_raw, pk->pub_raw_len,
742*62c56f98SSadaf Ebrahimi                         &key) != PSA_SUCCESS) ||
743*62c56f98SSadaf Ebrahimi         (psa_destroy_key(key) != PSA_SUCCESS)) {
744*62c56f98SSadaf Ebrahimi         mbedtls_platform_zeroize(pk->pub_raw, MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN);
745*62c56f98SSadaf Ebrahimi         pk->pub_raw_len = 0;
746*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
747*62c56f98SSadaf Ebrahimi     }
748*62c56f98SSadaf Ebrahimi     ret = 0;
749*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
750*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *ec_key = (mbedtls_ecp_keypair *) pk->pk_ctx;
751*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_ecp_point_read_binary(&ec_key->grp, &ec_key->Q,
752*62c56f98SSadaf Ebrahimi                                              (const unsigned char *) *p,
753*62c56f98SSadaf Ebrahimi                                              end - *p)) == 0) {
754*62c56f98SSadaf Ebrahimi         ret = mbedtls_ecp_check_pubkey(&ec_key->grp, &ec_key->Q);
755*62c56f98SSadaf Ebrahimi     }
756*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
757*62c56f98SSadaf Ebrahimi 
758*62c56f98SSadaf Ebrahimi     /*
759*62c56f98SSadaf Ebrahimi      * We know mbedtls_ecp_point_read_binary consumed all bytes or failed
760*62c56f98SSadaf Ebrahimi      */
761*62c56f98SSadaf Ebrahimi     *p = (unsigned char *) end;
762*62c56f98SSadaf Ebrahimi 
763*62c56f98SSadaf Ebrahimi     return ret;
764*62c56f98SSadaf Ebrahimi }
765*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
766*62c56f98SSadaf Ebrahimi 
767*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
768*62c56f98SSadaf Ebrahimi /*
769*62c56f98SSadaf Ebrahimi  *  RSAPublicKey ::= SEQUENCE {
770*62c56f98SSadaf Ebrahimi  *      modulus           INTEGER,  -- n
771*62c56f98SSadaf Ebrahimi  *      publicExponent    INTEGER   -- e
772*62c56f98SSadaf Ebrahimi  *  }
773*62c56f98SSadaf Ebrahimi  */
pk_get_rsapubkey(unsigned char ** p,const unsigned char * end,mbedtls_rsa_context * rsa)774*62c56f98SSadaf Ebrahimi static int pk_get_rsapubkey(unsigned char **p,
775*62c56f98SSadaf Ebrahimi                             const unsigned char *end,
776*62c56f98SSadaf Ebrahimi                             mbedtls_rsa_context *rsa)
777*62c56f98SSadaf Ebrahimi {
778*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
779*62c56f98SSadaf Ebrahimi     size_t len;
780*62c56f98SSadaf Ebrahimi 
781*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(p, end, &len,
782*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
783*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
784*62c56f98SSadaf Ebrahimi     }
785*62c56f98SSadaf Ebrahimi 
786*62c56f98SSadaf Ebrahimi     if (*p + len != end) {
787*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
788*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
789*62c56f98SSadaf Ebrahimi     }
790*62c56f98SSadaf Ebrahimi 
791*62c56f98SSadaf Ebrahimi     /* Import N */
792*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
793*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
794*62c56f98SSadaf Ebrahimi     }
795*62c56f98SSadaf Ebrahimi 
796*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_rsa_import_raw(rsa, *p, len, NULL, 0, NULL, 0,
797*62c56f98SSadaf Ebrahimi                                       NULL, 0, NULL, 0)) != 0) {
798*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_INVALID_PUBKEY;
799*62c56f98SSadaf Ebrahimi     }
800*62c56f98SSadaf Ebrahimi 
801*62c56f98SSadaf Ebrahimi     *p += len;
802*62c56f98SSadaf Ebrahimi 
803*62c56f98SSadaf Ebrahimi     /* Import E */
804*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
805*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
806*62c56f98SSadaf Ebrahimi     }
807*62c56f98SSadaf Ebrahimi 
808*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_rsa_import_raw(rsa, NULL, 0, NULL, 0, NULL, 0,
809*62c56f98SSadaf Ebrahimi                                       NULL, 0, *p, len)) != 0) {
810*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_INVALID_PUBKEY;
811*62c56f98SSadaf Ebrahimi     }
812*62c56f98SSadaf Ebrahimi 
813*62c56f98SSadaf Ebrahimi     *p += len;
814*62c56f98SSadaf Ebrahimi 
815*62c56f98SSadaf Ebrahimi     if (mbedtls_rsa_complete(rsa) != 0 ||
816*62c56f98SSadaf Ebrahimi         mbedtls_rsa_check_pubkey(rsa) != 0) {
817*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_INVALID_PUBKEY;
818*62c56f98SSadaf Ebrahimi     }
819*62c56f98SSadaf Ebrahimi 
820*62c56f98SSadaf Ebrahimi     if (*p != end) {
821*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
822*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
823*62c56f98SSadaf Ebrahimi     }
824*62c56f98SSadaf Ebrahimi 
825*62c56f98SSadaf Ebrahimi     return 0;
826*62c56f98SSadaf Ebrahimi }
827*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
828*62c56f98SSadaf Ebrahimi 
829*62c56f98SSadaf Ebrahimi /* Get a PK algorithm identifier
830*62c56f98SSadaf Ebrahimi  *
831*62c56f98SSadaf Ebrahimi  *  AlgorithmIdentifier  ::=  SEQUENCE  {
832*62c56f98SSadaf Ebrahimi  *       algorithm               OBJECT IDENTIFIER,
833*62c56f98SSadaf Ebrahimi  *       parameters              ANY DEFINED BY algorithm OPTIONAL  }
834*62c56f98SSadaf Ebrahimi  */
pk_get_pk_alg(unsigned char ** p,const unsigned char * end,mbedtls_pk_type_t * pk_alg,mbedtls_asn1_buf * params,mbedtls_ecp_group_id * ec_grp_id)835*62c56f98SSadaf Ebrahimi static int pk_get_pk_alg(unsigned char **p,
836*62c56f98SSadaf Ebrahimi                          const unsigned char *end,
837*62c56f98SSadaf Ebrahimi                          mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params,
838*62c56f98SSadaf Ebrahimi                          mbedtls_ecp_group_id *ec_grp_id)
839*62c56f98SSadaf Ebrahimi {
840*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
841*62c56f98SSadaf Ebrahimi     mbedtls_asn1_buf alg_oid;
842*62c56f98SSadaf Ebrahimi 
843*62c56f98SSadaf Ebrahimi     memset(params, 0, sizeof(mbedtls_asn1_buf));
844*62c56f98SSadaf Ebrahimi 
845*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_alg(p, end, &alg_oid, params)) != 0) {
846*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_ALG, ret);
847*62c56f98SSadaf Ebrahimi     }
848*62c56f98SSadaf Ebrahimi 
849*62c56f98SSadaf Ebrahimi     ret = mbedtls_oid_get_pk_alg(&alg_oid, pk_alg);
850*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
851*62c56f98SSadaf Ebrahimi     if (ret == MBEDTLS_ERR_OID_NOT_FOUND) {
852*62c56f98SSadaf Ebrahimi         ret = mbedtls_oid_get_ec_grp_algid(&alg_oid, ec_grp_id);
853*62c56f98SSadaf Ebrahimi         if (ret == 0) {
854*62c56f98SSadaf Ebrahimi             *pk_alg = MBEDTLS_PK_ECKEY;
855*62c56f98SSadaf Ebrahimi         }
856*62c56f98SSadaf Ebrahimi     }
857*62c56f98SSadaf Ebrahimi #else
858*62c56f98SSadaf Ebrahimi     (void) ec_grp_id;
859*62c56f98SSadaf Ebrahimi #endif
860*62c56f98SSadaf Ebrahimi     if (ret != 0) {
861*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
862*62c56f98SSadaf Ebrahimi     }
863*62c56f98SSadaf Ebrahimi 
864*62c56f98SSadaf Ebrahimi     /*
865*62c56f98SSadaf Ebrahimi      * No parameters with RSA (only for EC)
866*62c56f98SSadaf Ebrahimi      */
867*62c56f98SSadaf Ebrahimi     if (*pk_alg == MBEDTLS_PK_RSA &&
868*62c56f98SSadaf Ebrahimi         ((params->tag != MBEDTLS_ASN1_NULL && params->tag != 0) ||
869*62c56f98SSadaf Ebrahimi          params->len != 0)) {
870*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_INVALID_ALG;
871*62c56f98SSadaf Ebrahimi     }
872*62c56f98SSadaf Ebrahimi 
873*62c56f98SSadaf Ebrahimi     return 0;
874*62c56f98SSadaf Ebrahimi }
875*62c56f98SSadaf Ebrahimi 
876*62c56f98SSadaf Ebrahimi /*
877*62c56f98SSadaf Ebrahimi  *  SubjectPublicKeyInfo  ::=  SEQUENCE  {
878*62c56f98SSadaf Ebrahimi  *       algorithm            AlgorithmIdentifier,
879*62c56f98SSadaf Ebrahimi  *       subjectPublicKey     BIT STRING }
880*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_parse_subpubkey(unsigned char ** p,const unsigned char * end,mbedtls_pk_context * pk)881*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_subpubkey(unsigned char **p, const unsigned char *end,
882*62c56f98SSadaf Ebrahimi                                mbedtls_pk_context *pk)
883*62c56f98SSadaf Ebrahimi {
884*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
885*62c56f98SSadaf Ebrahimi     size_t len;
886*62c56f98SSadaf Ebrahimi     mbedtls_asn1_buf alg_params;
887*62c56f98SSadaf Ebrahimi     mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
888*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
889*62c56f98SSadaf Ebrahimi     const mbedtls_pk_info_t *pk_info;
890*62c56f98SSadaf Ebrahimi 
891*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(p, end, &len,
892*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
893*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
894*62c56f98SSadaf Ebrahimi     }
895*62c56f98SSadaf Ebrahimi 
896*62c56f98SSadaf Ebrahimi     end = *p + len;
897*62c56f98SSadaf Ebrahimi 
898*62c56f98SSadaf Ebrahimi     if ((ret = pk_get_pk_alg(p, end, &pk_alg, &alg_params, &ec_grp_id)) != 0) {
899*62c56f98SSadaf Ebrahimi         return ret;
900*62c56f98SSadaf Ebrahimi     }
901*62c56f98SSadaf Ebrahimi 
902*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_bitstring_null(p, end, &len)) != 0) {
903*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
904*62c56f98SSadaf Ebrahimi     }
905*62c56f98SSadaf Ebrahimi 
906*62c56f98SSadaf Ebrahimi     if (*p + len != end) {
907*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
908*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
909*62c56f98SSadaf Ebrahimi     }
910*62c56f98SSadaf Ebrahimi 
911*62c56f98SSadaf Ebrahimi     if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
912*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
913*62c56f98SSadaf Ebrahimi     }
914*62c56f98SSadaf Ebrahimi 
915*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
916*62c56f98SSadaf Ebrahimi         return ret;
917*62c56f98SSadaf Ebrahimi     }
918*62c56f98SSadaf Ebrahimi 
919*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
920*62c56f98SSadaf Ebrahimi     if (pk_alg == MBEDTLS_PK_RSA) {
921*62c56f98SSadaf Ebrahimi         ret = pk_get_rsapubkey(p, end, mbedtls_pk_rsa(*pk));
922*62c56f98SSadaf Ebrahimi     } else
923*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
924*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
925*62c56f98SSadaf Ebrahimi     if (pk_alg == MBEDTLS_PK_ECKEY_DH || pk_alg == MBEDTLS_PK_ECKEY) {
926*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
927*62c56f98SSadaf Ebrahimi         if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
928*62c56f98SSadaf Ebrahimi             ret = pk_use_ecparams_rfc8410(&alg_params, ec_grp_id, pk);
929*62c56f98SSadaf Ebrahimi         } else
930*62c56f98SSadaf Ebrahimi #endif
931*62c56f98SSadaf Ebrahimi         {
932*62c56f98SSadaf Ebrahimi             ret = pk_use_ecparams(&alg_params, pk);
933*62c56f98SSadaf Ebrahimi         }
934*62c56f98SSadaf Ebrahimi         if (ret == 0) {
935*62c56f98SSadaf Ebrahimi             ret = pk_get_ecpubkey(p, end, pk);
936*62c56f98SSadaf Ebrahimi         }
937*62c56f98SSadaf Ebrahimi     } else
938*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
939*62c56f98SSadaf Ebrahimi     ret = MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
940*62c56f98SSadaf Ebrahimi 
941*62c56f98SSadaf Ebrahimi     if (ret == 0 && *p != end) {
942*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
943*62c56f98SSadaf Ebrahimi                                 MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
944*62c56f98SSadaf Ebrahimi     }
945*62c56f98SSadaf Ebrahimi 
946*62c56f98SSadaf Ebrahimi     if (ret != 0) {
947*62c56f98SSadaf Ebrahimi         mbedtls_pk_free(pk);
948*62c56f98SSadaf Ebrahimi     }
949*62c56f98SSadaf Ebrahimi 
950*62c56f98SSadaf Ebrahimi     return ret;
951*62c56f98SSadaf Ebrahimi }
952*62c56f98SSadaf Ebrahimi 
953*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
954*62c56f98SSadaf Ebrahimi /*
955*62c56f98SSadaf Ebrahimi  * Wrapper around mbedtls_asn1_get_mpi() that rejects zero.
956*62c56f98SSadaf Ebrahimi  *
957*62c56f98SSadaf Ebrahimi  * The value zero is:
958*62c56f98SSadaf Ebrahimi  * - never a valid value for an RSA parameter
959*62c56f98SSadaf Ebrahimi  * - interpreted as "omitted, please reconstruct" by mbedtls_rsa_complete().
960*62c56f98SSadaf Ebrahimi  *
961*62c56f98SSadaf Ebrahimi  * Since values can't be omitted in PKCS#1, passing a zero value to
962*62c56f98SSadaf Ebrahimi  * rsa_complete() would be incorrect, so reject zero values early.
963*62c56f98SSadaf Ebrahimi  */
asn1_get_nonzero_mpi(unsigned char ** p,const unsigned char * end,mbedtls_mpi * X)964*62c56f98SSadaf Ebrahimi static int asn1_get_nonzero_mpi(unsigned char **p,
965*62c56f98SSadaf Ebrahimi                                 const unsigned char *end,
966*62c56f98SSadaf Ebrahimi                                 mbedtls_mpi *X)
967*62c56f98SSadaf Ebrahimi {
968*62c56f98SSadaf Ebrahimi     int ret;
969*62c56f98SSadaf Ebrahimi 
970*62c56f98SSadaf Ebrahimi     ret = mbedtls_asn1_get_mpi(p, end, X);
971*62c56f98SSadaf Ebrahimi     if (ret != 0) {
972*62c56f98SSadaf Ebrahimi         return ret;
973*62c56f98SSadaf Ebrahimi     }
974*62c56f98SSadaf Ebrahimi 
975*62c56f98SSadaf Ebrahimi     if (mbedtls_mpi_cmp_int(X, 0) == 0) {
976*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
977*62c56f98SSadaf Ebrahimi     }
978*62c56f98SSadaf Ebrahimi 
979*62c56f98SSadaf Ebrahimi     return 0;
980*62c56f98SSadaf Ebrahimi }
981*62c56f98SSadaf Ebrahimi 
982*62c56f98SSadaf Ebrahimi /*
983*62c56f98SSadaf Ebrahimi  * Parse a PKCS#1 encoded private RSA key
984*62c56f98SSadaf Ebrahimi  */
pk_parse_key_pkcs1_der(mbedtls_rsa_context * rsa,const unsigned char * key,size_t keylen)985*62c56f98SSadaf Ebrahimi static int pk_parse_key_pkcs1_der(mbedtls_rsa_context *rsa,
986*62c56f98SSadaf Ebrahimi                                   const unsigned char *key,
987*62c56f98SSadaf Ebrahimi                                   size_t keylen)
988*62c56f98SSadaf Ebrahimi {
989*62c56f98SSadaf Ebrahimi     int ret, version;
990*62c56f98SSadaf Ebrahimi     size_t len;
991*62c56f98SSadaf Ebrahimi     unsigned char *p, *end;
992*62c56f98SSadaf Ebrahimi 
993*62c56f98SSadaf Ebrahimi     mbedtls_mpi T;
994*62c56f98SSadaf Ebrahimi     mbedtls_mpi_init(&T);
995*62c56f98SSadaf Ebrahimi 
996*62c56f98SSadaf Ebrahimi     p = (unsigned char *) key;
997*62c56f98SSadaf Ebrahimi     end = p + keylen;
998*62c56f98SSadaf Ebrahimi 
999*62c56f98SSadaf Ebrahimi     /*
1000*62c56f98SSadaf Ebrahimi      * This function parses the RSAPrivateKey (PKCS#1)
1001*62c56f98SSadaf Ebrahimi      *
1002*62c56f98SSadaf Ebrahimi      *  RSAPrivateKey ::= SEQUENCE {
1003*62c56f98SSadaf Ebrahimi      *      version           Version,
1004*62c56f98SSadaf Ebrahimi      *      modulus           INTEGER,  -- n
1005*62c56f98SSadaf Ebrahimi      *      publicExponent    INTEGER,  -- e
1006*62c56f98SSadaf Ebrahimi      *      privateExponent   INTEGER,  -- d
1007*62c56f98SSadaf Ebrahimi      *      prime1            INTEGER,  -- p
1008*62c56f98SSadaf Ebrahimi      *      prime2            INTEGER,  -- q
1009*62c56f98SSadaf Ebrahimi      *      exponent1         INTEGER,  -- d mod (p-1)
1010*62c56f98SSadaf Ebrahimi      *      exponent2         INTEGER,  -- d mod (q-1)
1011*62c56f98SSadaf Ebrahimi      *      coefficient       INTEGER,  -- (inverse of q) mod p
1012*62c56f98SSadaf Ebrahimi      *      otherPrimeInfos   OtherPrimeInfos OPTIONAL
1013*62c56f98SSadaf Ebrahimi      *  }
1014*62c56f98SSadaf Ebrahimi      */
1015*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1016*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1017*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1018*62c56f98SSadaf Ebrahimi     }
1019*62c56f98SSadaf Ebrahimi 
1020*62c56f98SSadaf Ebrahimi     end = p + len;
1021*62c56f98SSadaf Ebrahimi 
1022*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1023*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1024*62c56f98SSadaf Ebrahimi     }
1025*62c56f98SSadaf Ebrahimi 
1026*62c56f98SSadaf Ebrahimi     if (version != 0) {
1027*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
1028*62c56f98SSadaf Ebrahimi     }
1029*62c56f98SSadaf Ebrahimi 
1030*62c56f98SSadaf Ebrahimi     /* Import N */
1031*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1032*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL,
1033*62c56f98SSadaf Ebrahimi                                   NULL, NULL)) != 0) {
1034*62c56f98SSadaf Ebrahimi         goto cleanup;
1035*62c56f98SSadaf Ebrahimi     }
1036*62c56f98SSadaf Ebrahimi 
1037*62c56f98SSadaf Ebrahimi     /* Import E */
1038*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1039*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
1040*62c56f98SSadaf Ebrahimi                                   NULL, &T)) != 0) {
1041*62c56f98SSadaf Ebrahimi         goto cleanup;
1042*62c56f98SSadaf Ebrahimi     }
1043*62c56f98SSadaf Ebrahimi 
1044*62c56f98SSadaf Ebrahimi     /* Import D */
1045*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1046*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
1047*62c56f98SSadaf Ebrahimi                                   &T, NULL)) != 0) {
1048*62c56f98SSadaf Ebrahimi         goto cleanup;
1049*62c56f98SSadaf Ebrahimi     }
1050*62c56f98SSadaf Ebrahimi 
1051*62c56f98SSadaf Ebrahimi     /* Import P */
1052*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1053*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_import(rsa, NULL, &T, NULL,
1054*62c56f98SSadaf Ebrahimi                                   NULL, NULL)) != 0) {
1055*62c56f98SSadaf Ebrahimi         goto cleanup;
1056*62c56f98SSadaf Ebrahimi     }
1057*62c56f98SSadaf Ebrahimi 
1058*62c56f98SSadaf Ebrahimi     /* Import Q */
1059*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1060*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_import(rsa, NULL, NULL, &T,
1061*62c56f98SSadaf Ebrahimi                                   NULL, NULL)) != 0) {
1062*62c56f98SSadaf Ebrahimi         goto cleanup;
1063*62c56f98SSadaf Ebrahimi     }
1064*62c56f98SSadaf Ebrahimi 
1065*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_RSA_NO_CRT) && !defined(MBEDTLS_RSA_ALT)
1066*62c56f98SSadaf Ebrahimi     /*
1067*62c56f98SSadaf Ebrahimi      * The RSA CRT parameters DP, DQ and QP are nominally redundant, in
1068*62c56f98SSadaf Ebrahimi      * that they can be easily recomputed from D, P and Q. However by
1069*62c56f98SSadaf Ebrahimi      * parsing them from the PKCS1 structure it is possible to avoid
1070*62c56f98SSadaf Ebrahimi      * recalculating them which both reduces the overhead of loading
1071*62c56f98SSadaf Ebrahimi      * RSA private keys into memory and also avoids side channels which
1072*62c56f98SSadaf Ebrahimi      * can arise when computing those values, since all of D, P, and Q
1073*62c56f98SSadaf Ebrahimi      * are secret. See https://eprint.iacr.org/2020/055 for a
1074*62c56f98SSadaf Ebrahimi      * description of one such attack.
1075*62c56f98SSadaf Ebrahimi      */
1076*62c56f98SSadaf Ebrahimi 
1077*62c56f98SSadaf Ebrahimi     /* Import DP */
1078*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1079*62c56f98SSadaf Ebrahimi         (ret = mbedtls_mpi_copy(&rsa->DP, &T)) != 0) {
1080*62c56f98SSadaf Ebrahimi         goto cleanup;
1081*62c56f98SSadaf Ebrahimi     }
1082*62c56f98SSadaf Ebrahimi 
1083*62c56f98SSadaf Ebrahimi     /* Import DQ */
1084*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1085*62c56f98SSadaf Ebrahimi         (ret = mbedtls_mpi_copy(&rsa->DQ, &T)) != 0) {
1086*62c56f98SSadaf Ebrahimi         goto cleanup;
1087*62c56f98SSadaf Ebrahimi     }
1088*62c56f98SSadaf Ebrahimi 
1089*62c56f98SSadaf Ebrahimi     /* Import QP */
1090*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1091*62c56f98SSadaf Ebrahimi         (ret = mbedtls_mpi_copy(&rsa->QP, &T)) != 0) {
1092*62c56f98SSadaf Ebrahimi         goto cleanup;
1093*62c56f98SSadaf Ebrahimi     }
1094*62c56f98SSadaf Ebrahimi 
1095*62c56f98SSadaf Ebrahimi #else
1096*62c56f98SSadaf Ebrahimi     /* Verify existence of the CRT params */
1097*62c56f98SSadaf Ebrahimi     if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1098*62c56f98SSadaf Ebrahimi         (ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
1099*62c56f98SSadaf Ebrahimi         (ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0) {
1100*62c56f98SSadaf Ebrahimi         goto cleanup;
1101*62c56f98SSadaf Ebrahimi     }
1102*62c56f98SSadaf Ebrahimi #endif
1103*62c56f98SSadaf Ebrahimi 
1104*62c56f98SSadaf Ebrahimi     /* rsa_complete() doesn't complete anything with the default
1105*62c56f98SSadaf Ebrahimi      * implementation but is still called:
1106*62c56f98SSadaf Ebrahimi      * - for the benefit of alternative implementation that may want to
1107*62c56f98SSadaf Ebrahimi      *   pre-compute stuff beyond what's provided (eg Montgomery factors)
1108*62c56f98SSadaf Ebrahimi      * - as is also sanity-checks the key
1109*62c56f98SSadaf Ebrahimi      *
1110*62c56f98SSadaf Ebrahimi      * Furthermore, we also check the public part for consistency with
1111*62c56f98SSadaf Ebrahimi      * mbedtls_pk_parse_pubkey(), as it includes size minima for example.
1112*62c56f98SSadaf Ebrahimi      */
1113*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_rsa_complete(rsa)) != 0 ||
1114*62c56f98SSadaf Ebrahimi         (ret = mbedtls_rsa_check_pubkey(rsa)) != 0) {
1115*62c56f98SSadaf Ebrahimi         goto cleanup;
1116*62c56f98SSadaf Ebrahimi     }
1117*62c56f98SSadaf Ebrahimi 
1118*62c56f98SSadaf Ebrahimi     if (p != end) {
1119*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1120*62c56f98SSadaf Ebrahimi                                 MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1121*62c56f98SSadaf Ebrahimi     }
1122*62c56f98SSadaf Ebrahimi 
1123*62c56f98SSadaf Ebrahimi cleanup:
1124*62c56f98SSadaf Ebrahimi 
1125*62c56f98SSadaf Ebrahimi     mbedtls_mpi_free(&T);
1126*62c56f98SSadaf Ebrahimi 
1127*62c56f98SSadaf Ebrahimi     if (ret != 0) {
1128*62c56f98SSadaf Ebrahimi         /* Wrap error code if it's coming from a lower level */
1129*62c56f98SSadaf Ebrahimi         if ((ret & 0xff80) == 0) {
1130*62c56f98SSadaf Ebrahimi             ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1131*62c56f98SSadaf Ebrahimi         } else {
1132*62c56f98SSadaf Ebrahimi             ret = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1133*62c56f98SSadaf Ebrahimi         }
1134*62c56f98SSadaf Ebrahimi 
1135*62c56f98SSadaf Ebrahimi         mbedtls_rsa_free(rsa);
1136*62c56f98SSadaf Ebrahimi     }
1137*62c56f98SSadaf Ebrahimi 
1138*62c56f98SSadaf Ebrahimi     return ret;
1139*62c56f98SSadaf Ebrahimi }
1140*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1141*62c56f98SSadaf Ebrahimi 
1142*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1143*62c56f98SSadaf Ebrahimi /*
1144*62c56f98SSadaf Ebrahimi  * Parse a SEC1 encoded private EC key
1145*62c56f98SSadaf Ebrahimi  */
pk_parse_key_sec1_der(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1146*62c56f98SSadaf Ebrahimi static int pk_parse_key_sec1_der(mbedtls_pk_context *pk,
1147*62c56f98SSadaf Ebrahimi                                  const unsigned char *key, size_t keylen,
1148*62c56f98SSadaf Ebrahimi                                  int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1149*62c56f98SSadaf Ebrahimi {
1150*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1151*62c56f98SSadaf Ebrahimi     int version, pubkey_done;
1152*62c56f98SSadaf Ebrahimi     size_t len, d_len;
1153*62c56f98SSadaf Ebrahimi     mbedtls_asn1_buf params = { 0, 0, NULL };
1154*62c56f98SSadaf Ebrahimi     unsigned char *p = (unsigned char *) key;
1155*62c56f98SSadaf Ebrahimi     unsigned char *d;
1156*62c56f98SSadaf Ebrahimi     unsigned char *end = p + keylen;
1157*62c56f98SSadaf Ebrahimi     unsigned char *end2;
1158*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1159*62c56f98SSadaf Ebrahimi     psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
1160*62c56f98SSadaf Ebrahimi     psa_status_t status;
1161*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PK_USE_PSA_EC_DATA */
1162*62c56f98SSadaf Ebrahimi     mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
1163*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
1164*62c56f98SSadaf Ebrahimi 
1165*62c56f98SSadaf Ebrahimi     /*
1166*62c56f98SSadaf Ebrahimi      * RFC 5915, or SEC1 Appendix C.4
1167*62c56f98SSadaf Ebrahimi      *
1168*62c56f98SSadaf Ebrahimi      * ECPrivateKey ::= SEQUENCE {
1169*62c56f98SSadaf Ebrahimi      *      version        INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
1170*62c56f98SSadaf Ebrahimi      *      privateKey     OCTET STRING,
1171*62c56f98SSadaf Ebrahimi      *      parameters [0] ECParameters {{ NamedCurve }} OPTIONAL,
1172*62c56f98SSadaf Ebrahimi      *      publicKey  [1] BIT STRING OPTIONAL
1173*62c56f98SSadaf Ebrahimi      *    }
1174*62c56f98SSadaf Ebrahimi      */
1175*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1176*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1177*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1178*62c56f98SSadaf Ebrahimi     }
1179*62c56f98SSadaf Ebrahimi 
1180*62c56f98SSadaf Ebrahimi     end = p + len;
1181*62c56f98SSadaf Ebrahimi 
1182*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1183*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1184*62c56f98SSadaf Ebrahimi     }
1185*62c56f98SSadaf Ebrahimi 
1186*62c56f98SSadaf Ebrahimi     if (version != 1) {
1187*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
1188*62c56f98SSadaf Ebrahimi     }
1189*62c56f98SSadaf Ebrahimi 
1190*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1191*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1192*62c56f98SSadaf Ebrahimi     }
1193*62c56f98SSadaf Ebrahimi 
1194*62c56f98SSadaf Ebrahimi     /* Keep a reference to the position fo the private key. It will be used
1195*62c56f98SSadaf Ebrahimi      * later in this function. */
1196*62c56f98SSadaf Ebrahimi     d = p;
1197*62c56f98SSadaf Ebrahimi     d_len = len;
1198*62c56f98SSadaf Ebrahimi 
1199*62c56f98SSadaf Ebrahimi     p += len;
1200*62c56f98SSadaf Ebrahimi 
1201*62c56f98SSadaf Ebrahimi     pubkey_done = 0;
1202*62c56f98SSadaf Ebrahimi     if (p != end) {
1203*62c56f98SSadaf Ebrahimi         /*
1204*62c56f98SSadaf Ebrahimi          * Is 'parameters' present?
1205*62c56f98SSadaf Ebrahimi          */
1206*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1207*62c56f98SSadaf Ebrahimi                                         MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
1208*62c56f98SSadaf Ebrahimi                                         0)) == 0) {
1209*62c56f98SSadaf Ebrahimi             if ((ret = pk_get_ecparams(&p, p + len, &params)) != 0 ||
1210*62c56f98SSadaf Ebrahimi                 (ret = pk_use_ecparams(&params, pk)) != 0) {
1211*62c56f98SSadaf Ebrahimi                 return ret;
1212*62c56f98SSadaf Ebrahimi             }
1213*62c56f98SSadaf Ebrahimi         } else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
1214*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1215*62c56f98SSadaf Ebrahimi         }
1216*62c56f98SSadaf Ebrahimi     }
1217*62c56f98SSadaf Ebrahimi 
1218*62c56f98SSadaf Ebrahimi 
1219*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1220*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, d, d_len)) != 0) {
1221*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1222*62c56f98SSadaf Ebrahimi     }
1223*62c56f98SSadaf Ebrahimi #endif
1224*62c56f98SSadaf Ebrahimi 
1225*62c56f98SSadaf Ebrahimi     if (p != end) {
1226*62c56f98SSadaf Ebrahimi         /*
1227*62c56f98SSadaf Ebrahimi          * Is 'publickey' present? If not, or if we can't read it (eg because it
1228*62c56f98SSadaf Ebrahimi          * is compressed), create it from the private key.
1229*62c56f98SSadaf Ebrahimi          */
1230*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1231*62c56f98SSadaf Ebrahimi                                         MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
1232*62c56f98SSadaf Ebrahimi                                         1)) == 0) {
1233*62c56f98SSadaf Ebrahimi             end2 = p + len;
1234*62c56f98SSadaf Ebrahimi 
1235*62c56f98SSadaf Ebrahimi             if ((ret = mbedtls_asn1_get_bitstring_null(&p, end2, &len)) != 0) {
1236*62c56f98SSadaf Ebrahimi                 return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1237*62c56f98SSadaf Ebrahimi             }
1238*62c56f98SSadaf Ebrahimi 
1239*62c56f98SSadaf Ebrahimi             if (p + len != end2) {
1240*62c56f98SSadaf Ebrahimi                 return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1241*62c56f98SSadaf Ebrahimi                                          MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1242*62c56f98SSadaf Ebrahimi             }
1243*62c56f98SSadaf Ebrahimi 
1244*62c56f98SSadaf Ebrahimi             if ((ret = pk_get_ecpubkey(&p, end2, pk)) == 0) {
1245*62c56f98SSadaf Ebrahimi                 pubkey_done = 1;
1246*62c56f98SSadaf Ebrahimi             } else {
1247*62c56f98SSadaf Ebrahimi                 /*
1248*62c56f98SSadaf Ebrahimi                  * The only acceptable failure mode of pk_get_ecpubkey() above
1249*62c56f98SSadaf Ebrahimi                  * is if the point format is not recognized.
1250*62c56f98SSadaf Ebrahimi                  */
1251*62c56f98SSadaf Ebrahimi                 if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE) {
1252*62c56f98SSadaf Ebrahimi                     return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1253*62c56f98SSadaf Ebrahimi                 }
1254*62c56f98SSadaf Ebrahimi             }
1255*62c56f98SSadaf Ebrahimi         } else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
1256*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1257*62c56f98SSadaf Ebrahimi         }
1258*62c56f98SSadaf Ebrahimi     }
1259*62c56f98SSadaf Ebrahimi 
1260*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
1261*62c56f98SSadaf Ebrahimi     psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
1262*62c56f98SSadaf Ebrahimi     /* Setting largest masks for usage and key algorithms */
1263*62c56f98SSadaf Ebrahimi     psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH |
1264*62c56f98SSadaf Ebrahimi                             PSA_KEY_USAGE_SIGN_MESSAGE |
1265*62c56f98SSadaf Ebrahimi                             PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_DERIVE);
1266*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
1267*62c56f98SSadaf Ebrahimi     psa_set_key_algorithm(&attributes,
1268*62c56f98SSadaf Ebrahimi                           PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_ANY_HASH));
1269*62c56f98SSadaf Ebrahimi #else
1270*62c56f98SSadaf Ebrahimi     psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_ANY_HASH));
1271*62c56f98SSadaf Ebrahimi #endif
1272*62c56f98SSadaf Ebrahimi     psa_set_key_enrollment_algorithm(&attributes, PSA_ALG_ECDH);
1273*62c56f98SSadaf Ebrahimi 
1274*62c56f98SSadaf Ebrahimi     status = psa_import_key(&attributes, d, d_len, &pk->priv_id);
1275*62c56f98SSadaf Ebrahimi     if (status != PSA_SUCCESS) {
1276*62c56f98SSadaf Ebrahimi         ret = psa_pk_status_to_mbedtls(status);
1277*62c56f98SSadaf Ebrahimi         return ret;
1278*62c56f98SSadaf Ebrahimi     }
1279*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
1280*62c56f98SSadaf Ebrahimi 
1281*62c56f98SSadaf Ebrahimi     if (!pubkey_done) {
1282*62c56f98SSadaf Ebrahimi         if ((ret = pk_derive_public_key(pk, d, d_len, f_rng, p_rng)) != 0) {
1283*62c56f98SSadaf Ebrahimi             return ret;
1284*62c56f98SSadaf Ebrahimi         }
1285*62c56f98SSadaf Ebrahimi     }
1286*62c56f98SSadaf Ebrahimi 
1287*62c56f98SSadaf Ebrahimi     return 0;
1288*62c56f98SSadaf Ebrahimi }
1289*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1290*62c56f98SSadaf Ebrahimi 
1291*62c56f98SSadaf Ebrahimi /*
1292*62c56f98SSadaf Ebrahimi  * Parse an unencrypted PKCS#8 encoded private key
1293*62c56f98SSadaf Ebrahimi  *
1294*62c56f98SSadaf Ebrahimi  * Notes:
1295*62c56f98SSadaf Ebrahimi  *
1296*62c56f98SSadaf Ebrahimi  * - This function does not own the key buffer. It is the
1297*62c56f98SSadaf Ebrahimi  *   responsibility of the caller to take care of zeroizing
1298*62c56f98SSadaf Ebrahimi  *   and freeing it after use.
1299*62c56f98SSadaf Ebrahimi  *
1300*62c56f98SSadaf Ebrahimi  * - The function is responsible for freeing the provided
1301*62c56f98SSadaf Ebrahimi  *   PK context on failure.
1302*62c56f98SSadaf Ebrahimi  *
1303*62c56f98SSadaf Ebrahimi  */
pk_parse_key_pkcs8_unencrypted_der(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1304*62c56f98SSadaf Ebrahimi static int pk_parse_key_pkcs8_unencrypted_der(
1305*62c56f98SSadaf Ebrahimi     mbedtls_pk_context *pk,
1306*62c56f98SSadaf Ebrahimi     const unsigned char *key, size_t keylen,
1307*62c56f98SSadaf Ebrahimi     int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1308*62c56f98SSadaf Ebrahimi {
1309*62c56f98SSadaf Ebrahimi     int ret, version;
1310*62c56f98SSadaf Ebrahimi     size_t len;
1311*62c56f98SSadaf Ebrahimi     mbedtls_asn1_buf params;
1312*62c56f98SSadaf Ebrahimi     unsigned char *p = (unsigned char *) key;
1313*62c56f98SSadaf Ebrahimi     unsigned char *end = p + keylen;
1314*62c56f98SSadaf Ebrahimi     mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
1315*62c56f98SSadaf Ebrahimi     mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
1316*62c56f98SSadaf Ebrahimi     const mbedtls_pk_info_t *pk_info;
1317*62c56f98SSadaf Ebrahimi 
1318*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1319*62c56f98SSadaf Ebrahimi     (void) f_rng;
1320*62c56f98SSadaf Ebrahimi     (void) p_rng;
1321*62c56f98SSadaf Ebrahimi #endif
1322*62c56f98SSadaf Ebrahimi 
1323*62c56f98SSadaf Ebrahimi     /*
1324*62c56f98SSadaf Ebrahimi      * This function parses the PrivateKeyInfo object (PKCS#8 v1.2 = RFC 5208)
1325*62c56f98SSadaf Ebrahimi      *
1326*62c56f98SSadaf Ebrahimi      *    PrivateKeyInfo ::= SEQUENCE {
1327*62c56f98SSadaf Ebrahimi      *      version                   Version,
1328*62c56f98SSadaf Ebrahimi      *      privateKeyAlgorithm       PrivateKeyAlgorithmIdentifier,
1329*62c56f98SSadaf Ebrahimi      *      privateKey                PrivateKey,
1330*62c56f98SSadaf Ebrahimi      *      attributes           [0]  IMPLICIT Attributes OPTIONAL }
1331*62c56f98SSadaf Ebrahimi      *
1332*62c56f98SSadaf Ebrahimi      *    Version ::= INTEGER
1333*62c56f98SSadaf Ebrahimi      *    PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
1334*62c56f98SSadaf Ebrahimi      *    PrivateKey ::= OCTET STRING
1335*62c56f98SSadaf Ebrahimi      *
1336*62c56f98SSadaf Ebrahimi      *  The PrivateKey OCTET STRING is a SEC1 ECPrivateKey
1337*62c56f98SSadaf Ebrahimi      */
1338*62c56f98SSadaf Ebrahimi 
1339*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1340*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1341*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1342*62c56f98SSadaf Ebrahimi     }
1343*62c56f98SSadaf Ebrahimi 
1344*62c56f98SSadaf Ebrahimi     end = p + len;
1345*62c56f98SSadaf Ebrahimi 
1346*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
1347*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1348*62c56f98SSadaf Ebrahimi     }
1349*62c56f98SSadaf Ebrahimi 
1350*62c56f98SSadaf Ebrahimi     if (version != 0) {
1351*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_VERSION, ret);
1352*62c56f98SSadaf Ebrahimi     }
1353*62c56f98SSadaf Ebrahimi 
1354*62c56f98SSadaf Ebrahimi     if ((ret = pk_get_pk_alg(&p, end, &pk_alg, &params, &ec_grp_id)) != 0) {
1355*62c56f98SSadaf Ebrahimi         return ret;
1356*62c56f98SSadaf Ebrahimi     }
1357*62c56f98SSadaf Ebrahimi 
1358*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1359*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1360*62c56f98SSadaf Ebrahimi     }
1361*62c56f98SSadaf Ebrahimi 
1362*62c56f98SSadaf Ebrahimi     if (len < 1) {
1363*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1364*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_OUT_OF_DATA);
1365*62c56f98SSadaf Ebrahimi     }
1366*62c56f98SSadaf Ebrahimi 
1367*62c56f98SSadaf Ebrahimi     if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
1368*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1369*62c56f98SSadaf Ebrahimi     }
1370*62c56f98SSadaf Ebrahimi 
1371*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
1372*62c56f98SSadaf Ebrahimi         return ret;
1373*62c56f98SSadaf Ebrahimi     }
1374*62c56f98SSadaf Ebrahimi 
1375*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1376*62c56f98SSadaf Ebrahimi     if (pk_alg == MBEDTLS_PK_RSA) {
1377*62c56f98SSadaf Ebrahimi         if ((ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), p, len)) != 0) {
1378*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(pk);
1379*62c56f98SSadaf Ebrahimi             return ret;
1380*62c56f98SSadaf Ebrahimi         }
1381*62c56f98SSadaf Ebrahimi     } else
1382*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1383*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1384*62c56f98SSadaf Ebrahimi     if (pk_alg == MBEDTLS_PK_ECKEY || pk_alg == MBEDTLS_PK_ECKEY_DH) {
1385*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
1386*62c56f98SSadaf Ebrahimi         if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
1387*62c56f98SSadaf Ebrahimi             if ((ret =
1388*62c56f98SSadaf Ebrahimi                      pk_use_ecparams_rfc8410(&params, ec_grp_id, pk)) != 0 ||
1389*62c56f98SSadaf Ebrahimi                 (ret =
1390*62c56f98SSadaf Ebrahimi                      pk_parse_key_rfc8410_der(pk, p, len, end, f_rng,
1391*62c56f98SSadaf Ebrahimi                                               p_rng)) != 0) {
1392*62c56f98SSadaf Ebrahimi                 mbedtls_pk_free(pk);
1393*62c56f98SSadaf Ebrahimi                 return ret;
1394*62c56f98SSadaf Ebrahimi             }
1395*62c56f98SSadaf Ebrahimi         } else
1396*62c56f98SSadaf Ebrahimi #endif
1397*62c56f98SSadaf Ebrahimi         {
1398*62c56f98SSadaf Ebrahimi             if ((ret = pk_use_ecparams(&params, pk)) != 0 ||
1399*62c56f98SSadaf Ebrahimi                 (ret = pk_parse_key_sec1_der(pk, p, len, f_rng, p_rng)) != 0) {
1400*62c56f98SSadaf Ebrahimi                 mbedtls_pk_free(pk);
1401*62c56f98SSadaf Ebrahimi                 return ret;
1402*62c56f98SSadaf Ebrahimi             }
1403*62c56f98SSadaf Ebrahimi         }
1404*62c56f98SSadaf Ebrahimi     } else
1405*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1406*62c56f98SSadaf Ebrahimi     return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1407*62c56f98SSadaf Ebrahimi 
1408*62c56f98SSadaf Ebrahimi     end = p + len;
1409*62c56f98SSadaf Ebrahimi     if (end != (key + keylen)) {
1410*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
1411*62c56f98SSadaf Ebrahimi                                  MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
1412*62c56f98SSadaf Ebrahimi     }
1413*62c56f98SSadaf Ebrahimi 
1414*62c56f98SSadaf Ebrahimi     return 0;
1415*62c56f98SSadaf Ebrahimi }
1416*62c56f98SSadaf Ebrahimi 
1417*62c56f98SSadaf Ebrahimi /*
1418*62c56f98SSadaf Ebrahimi  * Parse an encrypted PKCS#8 encoded private key
1419*62c56f98SSadaf Ebrahimi  *
1420*62c56f98SSadaf Ebrahimi  * To save space, the decryption happens in-place on the given key buffer.
1421*62c56f98SSadaf Ebrahimi  * Also, while this function may modify the keybuffer, it doesn't own it,
1422*62c56f98SSadaf Ebrahimi  * and instead it is the responsibility of the caller to zeroize and properly
1423*62c56f98SSadaf Ebrahimi  * free it after use.
1424*62c56f98SSadaf Ebrahimi  *
1425*62c56f98SSadaf Ebrahimi  */
1426*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
mbedtls_pk_parse_key_pkcs8_encrypted_der(mbedtls_pk_context * pk,unsigned char * key,size_t keylen,const unsigned char * pwd,size_t pwdlen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1427*62c56f98SSadaf Ebrahimi MBEDTLS_STATIC_TESTABLE int mbedtls_pk_parse_key_pkcs8_encrypted_der(
1428*62c56f98SSadaf Ebrahimi     mbedtls_pk_context *pk,
1429*62c56f98SSadaf Ebrahimi     unsigned char *key, size_t keylen,
1430*62c56f98SSadaf Ebrahimi     const unsigned char *pwd, size_t pwdlen,
1431*62c56f98SSadaf Ebrahimi     int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1432*62c56f98SSadaf Ebrahimi {
1433*62c56f98SSadaf Ebrahimi     int ret, decrypted = 0;
1434*62c56f98SSadaf Ebrahimi     size_t len;
1435*62c56f98SSadaf Ebrahimi     unsigned char *buf;
1436*62c56f98SSadaf Ebrahimi     unsigned char *p, *end;
1437*62c56f98SSadaf Ebrahimi     mbedtls_asn1_buf pbe_alg_oid, pbe_params;
1438*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
1439*62c56f98SSadaf Ebrahimi     mbedtls_cipher_type_t cipher_alg;
1440*62c56f98SSadaf Ebrahimi     mbedtls_md_type_t md_alg;
1441*62c56f98SSadaf Ebrahimi #endif
1442*62c56f98SSadaf Ebrahimi     size_t outlen = 0;
1443*62c56f98SSadaf Ebrahimi 
1444*62c56f98SSadaf Ebrahimi     p = key;
1445*62c56f98SSadaf Ebrahimi     end = p + keylen;
1446*62c56f98SSadaf Ebrahimi 
1447*62c56f98SSadaf Ebrahimi     if (pwdlen == 0) {
1448*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1449*62c56f98SSadaf Ebrahimi     }
1450*62c56f98SSadaf Ebrahimi 
1451*62c56f98SSadaf Ebrahimi     /*
1452*62c56f98SSadaf Ebrahimi      * This function parses the EncryptedPrivateKeyInfo object (PKCS#8)
1453*62c56f98SSadaf Ebrahimi      *
1454*62c56f98SSadaf Ebrahimi      *  EncryptedPrivateKeyInfo ::= SEQUENCE {
1455*62c56f98SSadaf Ebrahimi      *    encryptionAlgorithm  EncryptionAlgorithmIdentifier,
1456*62c56f98SSadaf Ebrahimi      *    encryptedData        EncryptedData
1457*62c56f98SSadaf Ebrahimi      *  }
1458*62c56f98SSadaf Ebrahimi      *
1459*62c56f98SSadaf Ebrahimi      *  EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
1460*62c56f98SSadaf Ebrahimi      *
1461*62c56f98SSadaf Ebrahimi      *  EncryptedData ::= OCTET STRING
1462*62c56f98SSadaf Ebrahimi      *
1463*62c56f98SSadaf Ebrahimi      *  The EncryptedData OCTET STRING is a PKCS#8 PrivateKeyInfo
1464*62c56f98SSadaf Ebrahimi      *
1465*62c56f98SSadaf Ebrahimi      */
1466*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
1467*62c56f98SSadaf Ebrahimi                                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
1468*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1469*62c56f98SSadaf Ebrahimi     }
1470*62c56f98SSadaf Ebrahimi 
1471*62c56f98SSadaf Ebrahimi     end = p + len;
1472*62c56f98SSadaf Ebrahimi 
1473*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_alg(&p, end, &pbe_alg_oid, &pbe_params)) != 0) {
1474*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1475*62c56f98SSadaf Ebrahimi     }
1476*62c56f98SSadaf Ebrahimi 
1477*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
1478*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
1479*62c56f98SSadaf Ebrahimi     }
1480*62c56f98SSadaf Ebrahimi 
1481*62c56f98SSadaf Ebrahimi     buf = p;
1482*62c56f98SSadaf Ebrahimi 
1483*62c56f98SSadaf Ebrahimi     /*
1484*62c56f98SSadaf Ebrahimi      * Decrypt EncryptedData with appropriate PBE
1485*62c56f98SSadaf Ebrahimi      */
1486*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C)
1487*62c56f98SSadaf Ebrahimi     if (mbedtls_oid_get_pkcs12_pbe_alg(&pbe_alg_oid, &md_alg, &cipher_alg) == 0) {
1488*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pkcs12_pbe_ext(&pbe_params, MBEDTLS_PKCS12_PBE_DECRYPT,
1489*62c56f98SSadaf Ebrahimi                                           cipher_alg, md_alg,
1490*62c56f98SSadaf Ebrahimi                                           pwd, pwdlen, p, len, buf, len, &outlen)) != 0) {
1491*62c56f98SSadaf Ebrahimi             if (ret == MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH) {
1492*62c56f98SSadaf Ebrahimi                 return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1493*62c56f98SSadaf Ebrahimi             }
1494*62c56f98SSadaf Ebrahimi 
1495*62c56f98SSadaf Ebrahimi             return ret;
1496*62c56f98SSadaf Ebrahimi         }
1497*62c56f98SSadaf Ebrahimi 
1498*62c56f98SSadaf Ebrahimi         decrypted = 1;
1499*62c56f98SSadaf Ebrahimi     } else
1500*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C */
1501*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS5_C)
1502*62c56f98SSadaf Ebrahimi     if (MBEDTLS_OID_CMP(MBEDTLS_OID_PKCS5_PBES2, &pbe_alg_oid) == 0) {
1503*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen,
1504*62c56f98SSadaf Ebrahimi                                            p, len, buf, len, &outlen)) != 0) {
1505*62c56f98SSadaf Ebrahimi             if (ret == MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH) {
1506*62c56f98SSadaf Ebrahimi                 return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1507*62c56f98SSadaf Ebrahimi             }
1508*62c56f98SSadaf Ebrahimi 
1509*62c56f98SSadaf Ebrahimi             return ret;
1510*62c56f98SSadaf Ebrahimi         }
1511*62c56f98SSadaf Ebrahimi 
1512*62c56f98SSadaf Ebrahimi         decrypted = 1;
1513*62c56f98SSadaf Ebrahimi     } else
1514*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS5_C */
1515*62c56f98SSadaf Ebrahimi     {
1516*62c56f98SSadaf Ebrahimi         ((void) pwd);
1517*62c56f98SSadaf Ebrahimi     }
1518*62c56f98SSadaf Ebrahimi 
1519*62c56f98SSadaf Ebrahimi     if (decrypted == 0) {
1520*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
1521*62c56f98SSadaf Ebrahimi     }
1522*62c56f98SSadaf Ebrahimi     return pk_parse_key_pkcs8_unencrypted_der(pk, buf, outlen, f_rng, p_rng);
1523*62c56f98SSadaf Ebrahimi }
1524*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1525*62c56f98SSadaf Ebrahimi 
1526*62c56f98SSadaf Ebrahimi /*
1527*62c56f98SSadaf Ebrahimi  * Parse a private key
1528*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_parse_key(mbedtls_pk_context * pk,const unsigned char * key,size_t keylen,const unsigned char * pwd,size_t pwdlen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)1529*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_key(mbedtls_pk_context *pk,
1530*62c56f98SSadaf Ebrahimi                          const unsigned char *key, size_t keylen,
1531*62c56f98SSadaf Ebrahimi                          const unsigned char *pwd, size_t pwdlen,
1532*62c56f98SSadaf Ebrahimi                          int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
1533*62c56f98SSadaf Ebrahimi {
1534*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1535*62c56f98SSadaf Ebrahimi     const mbedtls_pk_info_t *pk_info;
1536*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1537*62c56f98SSadaf Ebrahimi     size_t len;
1538*62c56f98SSadaf Ebrahimi     mbedtls_pem_context pem;
1539*62c56f98SSadaf Ebrahimi #endif
1540*62c56f98SSadaf Ebrahimi 
1541*62c56f98SSadaf Ebrahimi     if (keylen == 0) {
1542*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1543*62c56f98SSadaf Ebrahimi     }
1544*62c56f98SSadaf Ebrahimi 
1545*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1546*62c56f98SSadaf Ebrahimi     mbedtls_pem_init(&pem);
1547*62c56f98SSadaf Ebrahimi 
1548*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1549*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1550*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1551*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1552*62c56f98SSadaf Ebrahimi     } else {
1553*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1554*62c56f98SSadaf Ebrahimi                                       "-----BEGIN RSA PRIVATE KEY-----",
1555*62c56f98SSadaf Ebrahimi                                       "-----END RSA PRIVATE KEY-----",
1556*62c56f98SSadaf Ebrahimi                                       key, pwd, pwdlen, &len);
1557*62c56f98SSadaf Ebrahimi     }
1558*62c56f98SSadaf Ebrahimi 
1559*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1560*62c56f98SSadaf Ebrahimi         pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
1561*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
1562*62c56f98SSadaf Ebrahimi             (ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk),
1563*62c56f98SSadaf Ebrahimi                                           pem.buf, pem.buflen)) != 0) {
1564*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(pk);
1565*62c56f98SSadaf Ebrahimi         }
1566*62c56f98SSadaf Ebrahimi 
1567*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1568*62c56f98SSadaf Ebrahimi         return ret;
1569*62c56f98SSadaf Ebrahimi     } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
1570*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1571*62c56f98SSadaf Ebrahimi     } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
1572*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1573*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1574*62c56f98SSadaf Ebrahimi         return ret;
1575*62c56f98SSadaf Ebrahimi     }
1576*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1577*62c56f98SSadaf Ebrahimi 
1578*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1579*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1580*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1581*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1582*62c56f98SSadaf Ebrahimi     } else {
1583*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1584*62c56f98SSadaf Ebrahimi                                       "-----BEGIN EC PRIVATE KEY-----",
1585*62c56f98SSadaf Ebrahimi                                       "-----END EC PRIVATE KEY-----",
1586*62c56f98SSadaf Ebrahimi                                       key, pwd, pwdlen, &len);
1587*62c56f98SSadaf Ebrahimi     }
1588*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1589*62c56f98SSadaf Ebrahimi         pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
1590*62c56f98SSadaf Ebrahimi 
1591*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
1592*62c56f98SSadaf Ebrahimi             (ret = pk_parse_key_sec1_der(pk,
1593*62c56f98SSadaf Ebrahimi                                          pem.buf, pem.buflen,
1594*62c56f98SSadaf Ebrahimi                                          f_rng, p_rng)) != 0) {
1595*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(pk);
1596*62c56f98SSadaf Ebrahimi         }
1597*62c56f98SSadaf Ebrahimi 
1598*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1599*62c56f98SSadaf Ebrahimi         return ret;
1600*62c56f98SSadaf Ebrahimi     } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
1601*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
1602*62c56f98SSadaf Ebrahimi     } else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
1603*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
1604*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1605*62c56f98SSadaf Ebrahimi         return ret;
1606*62c56f98SSadaf Ebrahimi     }
1607*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1608*62c56f98SSadaf Ebrahimi 
1609*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1610*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1611*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1612*62c56f98SSadaf Ebrahimi     } else {
1613*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1614*62c56f98SSadaf Ebrahimi                                       "-----BEGIN PRIVATE KEY-----",
1615*62c56f98SSadaf Ebrahimi                                       "-----END PRIVATE KEY-----",
1616*62c56f98SSadaf Ebrahimi                                       key, NULL, 0, &len);
1617*62c56f98SSadaf Ebrahimi     }
1618*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1619*62c56f98SSadaf Ebrahimi         if ((ret = pk_parse_key_pkcs8_unencrypted_der(pk,
1620*62c56f98SSadaf Ebrahimi                                                       pem.buf, pem.buflen, f_rng, p_rng)) != 0) {
1621*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(pk);
1622*62c56f98SSadaf Ebrahimi         }
1623*62c56f98SSadaf Ebrahimi 
1624*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1625*62c56f98SSadaf Ebrahimi         return ret;
1626*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1627*62c56f98SSadaf Ebrahimi         return ret;
1628*62c56f98SSadaf Ebrahimi     }
1629*62c56f98SSadaf Ebrahimi 
1630*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
1631*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1632*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1633*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1634*62c56f98SSadaf Ebrahimi     } else {
1635*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1636*62c56f98SSadaf Ebrahimi                                       "-----BEGIN ENCRYPTED PRIVATE KEY-----",
1637*62c56f98SSadaf Ebrahimi                                       "-----END ENCRYPTED PRIVATE KEY-----",
1638*62c56f98SSadaf Ebrahimi                                       key, NULL, 0, &len);
1639*62c56f98SSadaf Ebrahimi     }
1640*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1641*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, pem.buf, pem.buflen,
1642*62c56f98SSadaf Ebrahimi                                                             pwd, pwdlen, f_rng, p_rng)) != 0) {
1643*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(pk);
1644*62c56f98SSadaf Ebrahimi         }
1645*62c56f98SSadaf Ebrahimi 
1646*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1647*62c56f98SSadaf Ebrahimi         return ret;
1648*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1649*62c56f98SSadaf Ebrahimi         return ret;
1650*62c56f98SSadaf Ebrahimi     }
1651*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1652*62c56f98SSadaf Ebrahimi #else
1653*62c56f98SSadaf Ebrahimi     ((void) pwd);
1654*62c56f98SSadaf Ebrahimi     ((void) pwdlen);
1655*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PEM_PARSE_C */
1656*62c56f98SSadaf Ebrahimi 
1657*62c56f98SSadaf Ebrahimi     /*
1658*62c56f98SSadaf Ebrahimi      * At this point we only know it's not a PEM formatted key. Could be any
1659*62c56f98SSadaf Ebrahimi      * of the known DER encoded private key formats
1660*62c56f98SSadaf Ebrahimi      *
1661*62c56f98SSadaf Ebrahimi      * We try the different DER format parsers to see if one passes without
1662*62c56f98SSadaf Ebrahimi      * error
1663*62c56f98SSadaf Ebrahimi      */
1664*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
1665*62c56f98SSadaf Ebrahimi     if (pwdlen != 0) {
1666*62c56f98SSadaf Ebrahimi         unsigned char *key_copy;
1667*62c56f98SSadaf Ebrahimi 
1668*62c56f98SSadaf Ebrahimi         if ((key_copy = mbedtls_calloc(1, keylen)) == NULL) {
1669*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERR_PK_ALLOC_FAILED;
1670*62c56f98SSadaf Ebrahimi         }
1671*62c56f98SSadaf Ebrahimi 
1672*62c56f98SSadaf Ebrahimi         memcpy(key_copy, key, keylen);
1673*62c56f98SSadaf Ebrahimi 
1674*62c56f98SSadaf Ebrahimi         ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, key_copy, keylen,
1675*62c56f98SSadaf Ebrahimi                                                        pwd, pwdlen, f_rng, p_rng);
1676*62c56f98SSadaf Ebrahimi 
1677*62c56f98SSadaf Ebrahimi         mbedtls_zeroize_and_free(key_copy, keylen);
1678*62c56f98SSadaf Ebrahimi     }
1679*62c56f98SSadaf Ebrahimi 
1680*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1681*62c56f98SSadaf Ebrahimi         return 0;
1682*62c56f98SSadaf Ebrahimi     }
1683*62c56f98SSadaf Ebrahimi 
1684*62c56f98SSadaf Ebrahimi     mbedtls_pk_free(pk);
1685*62c56f98SSadaf Ebrahimi     mbedtls_pk_init(pk);
1686*62c56f98SSadaf Ebrahimi 
1687*62c56f98SSadaf Ebrahimi     if (ret == MBEDTLS_ERR_PK_PASSWORD_MISMATCH) {
1688*62c56f98SSadaf Ebrahimi         return ret;
1689*62c56f98SSadaf Ebrahimi     }
1690*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
1691*62c56f98SSadaf Ebrahimi 
1692*62c56f98SSadaf Ebrahimi     ret = pk_parse_key_pkcs8_unencrypted_der(pk, key, keylen, f_rng, p_rng);
1693*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1694*62c56f98SSadaf Ebrahimi         return 0;
1695*62c56f98SSadaf Ebrahimi     }
1696*62c56f98SSadaf Ebrahimi 
1697*62c56f98SSadaf Ebrahimi     mbedtls_pk_free(pk);
1698*62c56f98SSadaf Ebrahimi     mbedtls_pk_init(pk);
1699*62c56f98SSadaf Ebrahimi 
1700*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1701*62c56f98SSadaf Ebrahimi 
1702*62c56f98SSadaf Ebrahimi     pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
1703*62c56f98SSadaf Ebrahimi     if (mbedtls_pk_setup(pk, pk_info) == 0 &&
1704*62c56f98SSadaf Ebrahimi         pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), key, keylen) == 0) {
1705*62c56f98SSadaf Ebrahimi         return 0;
1706*62c56f98SSadaf Ebrahimi     }
1707*62c56f98SSadaf Ebrahimi 
1708*62c56f98SSadaf Ebrahimi     mbedtls_pk_free(pk);
1709*62c56f98SSadaf Ebrahimi     mbedtls_pk_init(pk);
1710*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1711*62c56f98SSadaf Ebrahimi 
1712*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
1713*62c56f98SSadaf Ebrahimi     pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
1714*62c56f98SSadaf Ebrahimi     if (mbedtls_pk_setup(pk, pk_info) == 0 &&
1715*62c56f98SSadaf Ebrahimi         pk_parse_key_sec1_der(pk,
1716*62c56f98SSadaf Ebrahimi                               key, keylen, f_rng, p_rng) == 0) {
1717*62c56f98SSadaf Ebrahimi         return 0;
1718*62c56f98SSadaf Ebrahimi     }
1719*62c56f98SSadaf Ebrahimi     mbedtls_pk_free(pk);
1720*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
1721*62c56f98SSadaf Ebrahimi 
1722*62c56f98SSadaf Ebrahimi     /* If MBEDTLS_RSA_C is defined but MBEDTLS_PK_HAVE_ECC_KEYS isn't,
1723*62c56f98SSadaf Ebrahimi      * it is ok to leave the PK context initialized but not
1724*62c56f98SSadaf Ebrahimi      * freed: It is the caller's responsibility to call pk_init()
1725*62c56f98SSadaf Ebrahimi      * before calling this function, and to call pk_free()
1726*62c56f98SSadaf Ebrahimi      * when it fails. If MBEDTLS_PK_HAVE_ECC_KEYS is defined but MBEDTLS_RSA_C
1727*62c56f98SSadaf Ebrahimi      * isn't, this leads to mbedtls_pk_free() being called
1728*62c56f98SSadaf Ebrahimi      * twice, once here and once by the caller, but this is
1729*62c56f98SSadaf Ebrahimi      * also ok and in line with the mbedtls_pk_free() calls
1730*62c56f98SSadaf Ebrahimi      * on failed PEM parsing attempts. */
1731*62c56f98SSadaf Ebrahimi 
1732*62c56f98SSadaf Ebrahimi     return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1733*62c56f98SSadaf Ebrahimi }
1734*62c56f98SSadaf Ebrahimi 
1735*62c56f98SSadaf Ebrahimi /*
1736*62c56f98SSadaf Ebrahimi  * Parse a public key
1737*62c56f98SSadaf Ebrahimi  */
mbedtls_pk_parse_public_key(mbedtls_pk_context * ctx,const unsigned char * key,size_t keylen)1738*62c56f98SSadaf Ebrahimi int mbedtls_pk_parse_public_key(mbedtls_pk_context *ctx,
1739*62c56f98SSadaf Ebrahimi                                 const unsigned char *key, size_t keylen)
1740*62c56f98SSadaf Ebrahimi {
1741*62c56f98SSadaf Ebrahimi     int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
1742*62c56f98SSadaf Ebrahimi     unsigned char *p;
1743*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1744*62c56f98SSadaf Ebrahimi     const mbedtls_pk_info_t *pk_info;
1745*62c56f98SSadaf Ebrahimi #endif
1746*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1747*62c56f98SSadaf Ebrahimi     size_t len;
1748*62c56f98SSadaf Ebrahimi     mbedtls_pem_context pem;
1749*62c56f98SSadaf Ebrahimi #endif
1750*62c56f98SSadaf Ebrahimi 
1751*62c56f98SSadaf Ebrahimi     if (keylen == 0) {
1752*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
1753*62c56f98SSadaf Ebrahimi     }
1754*62c56f98SSadaf Ebrahimi 
1755*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PEM_PARSE_C)
1756*62c56f98SSadaf Ebrahimi     mbedtls_pem_init(&pem);
1757*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1758*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1759*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1760*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1761*62c56f98SSadaf Ebrahimi     } else {
1762*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1763*62c56f98SSadaf Ebrahimi                                       "-----BEGIN RSA PUBLIC KEY-----",
1764*62c56f98SSadaf Ebrahimi                                       "-----END RSA PUBLIC KEY-----",
1765*62c56f98SSadaf Ebrahimi                                       key, NULL, 0, &len);
1766*62c56f98SSadaf Ebrahimi     }
1767*62c56f98SSadaf Ebrahimi 
1768*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1769*62c56f98SSadaf Ebrahimi         p = pem.buf;
1770*62c56f98SSadaf Ebrahimi         if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
1771*62c56f98SSadaf Ebrahimi             mbedtls_pem_free(&pem);
1772*62c56f98SSadaf Ebrahimi             return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1773*62c56f98SSadaf Ebrahimi         }
1774*62c56f98SSadaf Ebrahimi 
1775*62c56f98SSadaf Ebrahimi         if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
1776*62c56f98SSadaf Ebrahimi             mbedtls_pem_free(&pem);
1777*62c56f98SSadaf Ebrahimi             return ret;
1778*62c56f98SSadaf Ebrahimi         }
1779*62c56f98SSadaf Ebrahimi 
1780*62c56f98SSadaf Ebrahimi         if ((ret = pk_get_rsapubkey(&p, p + pem.buflen, mbedtls_pk_rsa(*ctx))) != 0) {
1781*62c56f98SSadaf Ebrahimi             mbedtls_pk_free(ctx);
1782*62c56f98SSadaf Ebrahimi         }
1783*62c56f98SSadaf Ebrahimi 
1784*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1785*62c56f98SSadaf Ebrahimi         return ret;
1786*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1787*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1788*62c56f98SSadaf Ebrahimi         return ret;
1789*62c56f98SSadaf Ebrahimi     }
1790*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1791*62c56f98SSadaf Ebrahimi 
1792*62c56f98SSadaf Ebrahimi     /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
1793*62c56f98SSadaf Ebrahimi     if (key[keylen - 1] != '\0') {
1794*62c56f98SSadaf Ebrahimi         ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
1795*62c56f98SSadaf Ebrahimi     } else {
1796*62c56f98SSadaf Ebrahimi         ret = mbedtls_pem_read_buffer(&pem,
1797*62c56f98SSadaf Ebrahimi                                       "-----BEGIN PUBLIC KEY-----",
1798*62c56f98SSadaf Ebrahimi                                       "-----END PUBLIC KEY-----",
1799*62c56f98SSadaf Ebrahimi                                       key, NULL, 0, &len);
1800*62c56f98SSadaf Ebrahimi     }
1801*62c56f98SSadaf Ebrahimi 
1802*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1803*62c56f98SSadaf Ebrahimi         /*
1804*62c56f98SSadaf Ebrahimi          * Was PEM encoded
1805*62c56f98SSadaf Ebrahimi          */
1806*62c56f98SSadaf Ebrahimi         p = pem.buf;
1807*62c56f98SSadaf Ebrahimi 
1808*62c56f98SSadaf Ebrahimi         ret = mbedtls_pk_parse_subpubkey(&p, p + pem.buflen, ctx);
1809*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1810*62c56f98SSadaf Ebrahimi         return ret;
1811*62c56f98SSadaf Ebrahimi     } else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
1812*62c56f98SSadaf Ebrahimi         mbedtls_pem_free(&pem);
1813*62c56f98SSadaf Ebrahimi         return ret;
1814*62c56f98SSadaf Ebrahimi     }
1815*62c56f98SSadaf Ebrahimi     mbedtls_pem_free(&pem);
1816*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PEM_PARSE_C */
1817*62c56f98SSadaf Ebrahimi 
1818*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_RSA_C)
1819*62c56f98SSadaf Ebrahimi     if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
1820*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
1821*62c56f98SSadaf Ebrahimi     }
1822*62c56f98SSadaf Ebrahimi 
1823*62c56f98SSadaf Ebrahimi     if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
1824*62c56f98SSadaf Ebrahimi         return ret;
1825*62c56f98SSadaf Ebrahimi     }
1826*62c56f98SSadaf Ebrahimi 
1827*62c56f98SSadaf Ebrahimi     p = (unsigned char *) key;
1828*62c56f98SSadaf Ebrahimi     ret = pk_get_rsapubkey(&p, p + keylen, mbedtls_pk_rsa(*ctx));
1829*62c56f98SSadaf Ebrahimi     if (ret == 0) {
1830*62c56f98SSadaf Ebrahimi         return ret;
1831*62c56f98SSadaf Ebrahimi     }
1832*62c56f98SSadaf Ebrahimi     mbedtls_pk_free(ctx);
1833*62c56f98SSadaf Ebrahimi     if (ret != (MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
1834*62c56f98SSadaf Ebrahimi                                   MBEDTLS_ERR_ASN1_UNEXPECTED_TAG))) {
1835*62c56f98SSadaf Ebrahimi         return ret;
1836*62c56f98SSadaf Ebrahimi     }
1837*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_RSA_C */
1838*62c56f98SSadaf Ebrahimi     p = (unsigned char *) key;
1839*62c56f98SSadaf Ebrahimi 
1840*62c56f98SSadaf Ebrahimi     ret = mbedtls_pk_parse_subpubkey(&p, p + keylen, ctx);
1841*62c56f98SSadaf Ebrahimi 
1842*62c56f98SSadaf Ebrahimi     return ret;
1843*62c56f98SSadaf Ebrahimi }
1844*62c56f98SSadaf Ebrahimi 
1845*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PK_PARSE_C */
1846