2 * Copyright (C) 2009 Martin Willi
3 * Copyright (C) 2008 Tobias Brunner
4 * Hochschule fuer Technik Rapperswil
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 #include "openssl_rsa_private_key.h"
18 #include "openssl_rsa_public_key.h"
22 #include <openssl/evp.h>
23 #include <openssl/rsa.h>
24 #include <openssl/engine.h>
27 * Public exponent to use for key generation.
29 #define PUBLIC_EXPONENT 0x10001
31 typedef struct private_openssl_rsa_private_key_t private_openssl_rsa_private_key_t
;
34 * Private data of a openssl_rsa_private_key_t object.
36 struct private_openssl_rsa_private_key_t
{
38 * Public interface for this signer.
40 openssl_rsa_private_key_t
public;
43 * RSA object from OpenSSL
48 * TRUE if the key is from an OpenSSL ENGINE and might not be readable
58 /* implemented in rsa public key */
59 bool openssl_rsa_fingerprint(RSA
*rsa
, key_encoding_type_t type
, chunk_t
*fp
);
62 * Build an EMPSA PKCS1 signature described in PKCS#1
64 static bool build_emsa_pkcs1_signature(private_openssl_rsa_private_key_t
*this,
65 int type
, chunk_t data
, chunk_t
*sig
)
69 *sig
= chunk_alloc(RSA_size(this->rsa
));
71 if (type
== NID_undef
)
73 if (RSA_private_encrypt(data
.len
, data
.ptr
, sig
->ptr
, this->rsa
,
74 RSA_PKCS1_PADDING
) == sig
->len
)
86 hasher
= EVP_get_digestbynid(type
);
92 ctx
= EVP_MD_CTX_create();
98 if (!EVP_PKEY_set1_RSA(key
, this->rsa
))
102 if (!EVP_SignInit_ex(ctx
, hasher
, NULL
))
106 if (!EVP_SignUpdate(ctx
, data
.ptr
, data
.len
))
110 if (EVP_SignFinal(ctx
, sig
->ptr
, &len
, key
))
122 EVP_MD_CTX_destroy(ctx
);
133 * Implementation of openssl_rsa_private_key.get_type.
135 static key_type_t
get_type(private_openssl_rsa_private_key_t
*this)
141 * Implementation of openssl_rsa_private_key.sign.
143 static bool sign(private_openssl_rsa_private_key_t
*this, signature_scheme_t scheme
,
144 chunk_t data
, chunk_t
*signature
)
148 case SIGN_RSA_EMSA_PKCS1_NULL
:
149 return build_emsa_pkcs1_signature(this, NID_undef
, data
, signature
);
150 case SIGN_RSA_EMSA_PKCS1_SHA1
:
151 return build_emsa_pkcs1_signature(this, NID_sha1
, data
, signature
);
152 case SIGN_RSA_EMSA_PKCS1_SHA224
:
153 return build_emsa_pkcs1_signature(this, NID_sha224
, data
, signature
);
154 case SIGN_RSA_EMSA_PKCS1_SHA256
:
155 return build_emsa_pkcs1_signature(this, NID_sha256
, data
, signature
);
156 case SIGN_RSA_EMSA_PKCS1_SHA384
:
157 return build_emsa_pkcs1_signature(this, NID_sha384
, data
, signature
);
158 case SIGN_RSA_EMSA_PKCS1_SHA512
:
159 return build_emsa_pkcs1_signature(this, NID_sha512
, data
, signature
);
160 case SIGN_RSA_EMSA_PKCS1_MD5
:
161 return build_emsa_pkcs1_signature(this, NID_md5
, data
, signature
);
163 DBG1(DBG_LIB
, "signature scheme %N not supported in RSA",
164 signature_scheme_names
, scheme
);
170 * Implementation of openssl_rsa_private_key.decrypt.
172 static bool decrypt(private_openssl_rsa_private_key_t
*this,
173 chunk_t crypto
, chunk_t
*plain
)
175 DBG1(DBG_LIB
, "RSA private key decryption not implemented");
180 * Implementation of openssl_rsa_private_key.get_keysize.
182 static size_t get_keysize(private_openssl_rsa_private_key_t
*this)
184 return RSA_size(this->rsa
);
188 * Implementation of openssl_rsa_private_key.get_public_key.
190 static public_key_t
* get_public_key(private_openssl_rsa_private_key_t
*this)
196 enc
= chunk_alloc(i2d_RSAPublicKey(this->rsa
, NULL
));
198 i2d_RSAPublicKey(this->rsa
, &p
);
199 key
= lib
->creds
->create(lib
->creds
, CRED_PUBLIC_KEY
, KEY_RSA
,
200 BUILD_BLOB_ASN1_DER
, enc
, BUILD_END
);
206 * Implementation of public_key_t.get_fingerprint.
208 static bool get_fingerprint(private_openssl_rsa_private_key_t
*this,
209 key_encoding_type_t type
, chunk_t
*fingerprint
)
211 return openssl_rsa_fingerprint(this->rsa
, type
, fingerprint
);
215 * Implementation of public_key_t.get_encoding.
217 static bool get_encoding(private_openssl_rsa_private_key_t
*this,
218 key_encoding_type_t type
, chunk_t
*encoding
)
228 case KEY_PRIV_ASN1_DER
:
233 *encoding
= chunk_alloc(i2d_RSAPrivateKey(this->rsa
, NULL
));
235 i2d_RSAPrivateKey(this->rsa
, &p
);
237 if (type
== KEY_PRIV_PEM
)
239 chunk_t asn1_encoding
= *encoding
;
241 success
= lib
->encoding
->encode(lib
->encoding
, KEY_PRIV_PEM
,
242 NULL
, encoding
, KEY_PART_RSA_PRIV_ASN1_DER
,
243 asn1_encoding
, KEY_PART_END
);
244 chunk_clear(&asn1_encoding
);
254 * Implementation of openssl_rsa_private_key.get_ref.
256 static private_openssl_rsa_private_key_t
* get_ref(private_openssl_rsa_private_key_t
*this)
263 * Implementation of openssl_rsa_private_key.destroy.
265 static void destroy(private_openssl_rsa_private_key_t
*this)
267 if (ref_put(&this->ref
))
271 lib
->encoding
->clear_cache(lib
->encoding
, this->rsa
);
279 * Internal generic constructor
281 static private_openssl_rsa_private_key_t
*create_empty(void)
283 private_openssl_rsa_private_key_t
*this = malloc_thing(private_openssl_rsa_private_key_t
);
285 this->public.interface
.get_type
= (key_type_t (*) (private_key_t
*))get_type
;
286 this->public.interface
.sign
= (bool (*) (private_key_t
*, signature_scheme_t
, chunk_t
, chunk_t
*))sign
;
287 this->public.interface
.decrypt
= (bool (*) (private_key_t
*, chunk_t
, chunk_t
*))decrypt
;
288 this->public.interface
.get_keysize
= (size_t (*) (private_key_t
*))get_keysize
;
289 this->public.interface
.get_public_key
= (public_key_t
* (*) (private_key_t
*))get_public_key
;
290 this->public.interface
.equals
= private_key_equals
;
291 this->public.interface
.belongs_to
= private_key_belongs_to
;
292 this->public.interface
.get_fingerprint
= (bool(*)(private_key_t
*, key_encoding_type_t type
, chunk_t
*fp
))get_fingerprint
;
293 this->public.interface
.has_fingerprint
= (bool(*)(private_key_t
*, chunk_t fp
))private_key_has_fingerprint
;
294 this->public.interface
.get_encoding
= (bool(*)(private_key_t
*, key_encoding_type_t type
, chunk_t
*encoding
))get_encoding
;
295 this->public.interface
.get_ref
= (private_key_t
* (*) (private_key_t
*))get_ref
;
296 this->public.interface
.destroy
= (void (*) (private_key_t
*))destroy
;
298 this->engine
= FALSE
;
307 openssl_rsa_private_key_t
*openssl_rsa_private_key_gen(key_type_t type
,
310 private_openssl_rsa_private_key_t
*this;
317 switch (va_arg(args
, builder_part_t
))
320 key_size
= va_arg(args
, u_int
);
334 if (!e
|| !BN_set_word(e
, PUBLIC_EXPONENT
))
339 if (!rsa
|| !RSA_generate_key_ex(rsa
, key_size
, e
, NULL
))
343 this = create_empty();
346 return &this->public;
363 openssl_rsa_private_key_t
*openssl_rsa_private_key_load(key_type_t type
,
366 private_openssl_rsa_private_key_t
*this;
367 chunk_t blob
, n
, e
, d
, p
, q
, exp1
, exp2
, coeff
;
369 blob
= n
= e
= d
= p
= q
= exp1
= exp2
= coeff
= chunk_empty
;
372 switch (va_arg(args
, builder_part_t
))
374 case BUILD_BLOB_ASN1_DER
:
375 blob
= va_arg(args
, chunk_t
);
377 case BUILD_RSA_MODULUS
:
378 n
= va_arg(args
, chunk_t
);
380 case BUILD_RSA_PUB_EXP
:
381 e
= va_arg(args
, chunk_t
);
383 case BUILD_RSA_PRIV_EXP
:
384 d
= va_arg(args
, chunk_t
);
386 case BUILD_RSA_PRIME1
:
387 p
= va_arg(args
, chunk_t
);
389 case BUILD_RSA_PRIME2
:
390 q
= va_arg(args
, chunk_t
);
393 exp1
= va_arg(args
, chunk_t
);
396 exp2
= va_arg(args
, chunk_t
);
398 case BUILD_RSA_COEFF
:
399 coeff
= va_arg(args
, chunk_t
);
409 this = create_empty();
412 this->rsa
= d2i_RSAPrivateKey(NULL
, (const u_char
**)&blob
.ptr
, blob
.len
);
413 if (this->rsa
&& RSA_check_key(this->rsa
))
415 return &this->public;
418 else if (n
.ptr
&& e
.ptr
&& d
.ptr
&& p
.ptr
&& q
.ptr
&& coeff
.ptr
)
420 this->rsa
= RSA_new();
421 this->rsa
->n
= BN_bin2bn((const u_char
*)n
.ptr
, n
.len
, NULL
);
422 this->rsa
->e
= BN_bin2bn((const u_char
*)e
.ptr
, e
.len
, NULL
);
423 this->rsa
->d
= BN_bin2bn((const u_char
*)d
.ptr
, d
.len
, NULL
);
424 this->rsa
->p
= BN_bin2bn((const u_char
*)p
.ptr
, p
.len
, NULL
);
425 this->rsa
->q
= BN_bin2bn((const u_char
*)q
.ptr
, q
.len
, NULL
);
428 this->rsa
->dmp1
= BN_bin2bn((const u_char
*)exp1
.ptr
, exp1
.len
, NULL
);
432 this->rsa
->dmq1
= BN_bin2bn((const u_char
*)exp2
.ptr
, exp2
.len
, NULL
);
434 this->rsa
->iqmp
= BN_bin2bn((const u_char
*)coeff
.ptr
, coeff
.len
, NULL
);
435 if (RSA_check_key(this->rsa
))
437 return &this->public;
447 openssl_rsa_private_key_t
*openssl_rsa_private_key_connect(key_type_t type
,
450 private_openssl_rsa_private_key_t
*this;
451 char *keyid
= NULL
, *pin
= NULL
;
458 switch (va_arg(args
, builder_part_t
))
460 case BUILD_SMARTCARD_KEYID
:
461 keyid
= va_arg(args
, char*);
463 case BUILD_SMARTCARD_PIN
:
464 pin
= va_arg(args
, char*);
478 engine_id
= lib
->settings
->get_str(lib
->settings
,
479 "library.plugins.openssl.engine_id", "pkcs11");
480 engine
= ENGINE_by_id(engine_id
);
483 DBG1(DBG_LIB
, "engine '%s' is not available", engine_id
);
486 if (!ENGINE_init(engine
))
488 DBG1(DBG_LIB
, "failed to initialize engine '%s'", engine_id
);
492 if (!ENGINE_ctrl_cmd_string(engine
, "PIN", pin
, 0))
494 DBG1(DBG_LIB
, "failed to set PIN on engine '%s'", engine_id
);
499 key
= ENGINE_load_private_key(engine
, keyid
, NULL
, NULL
);
502 DBG1(DBG_LIB
, "failed to load private key with ID '%s' from "
503 "engine '%s'", keyid
, engine_id
);
509 this = create_empty();
510 this->rsa
= EVP_PKEY_get1_RSA(key
);
513 return &this->public;