Annotation of embedaddon/libpdel/util/rsa_util.c, revision 1.1.1.1
1.1 misho 1:
2: /*
3: * Copyright (c) 2001-2002 Packet Design, LLC.
4: * All rights reserved.
5: *
6: * Subject to the following obligations and disclaimer of warranty,
7: * use and redistribution of this software, in source or object code
8: * forms, with or without modifications are expressly permitted by
9: * Packet Design; provided, however, that:
10: *
11: * (i) Any and all reproductions of the source or object code
12: * must include the copyright notice above and the following
13: * disclaimer of warranties; and
14: * (ii) No rights are granted, in any manner or form, to use
15: * Packet Design trademarks, including the mark "PACKET DESIGN"
16: * on advertising, endorsements, or otherwise except as such
17: * appears in the above copyright notice or in the software.
18: *
19: * THIS SOFTWARE IS BEING PROVIDED BY PACKET DESIGN "AS IS", AND
20: * TO THE MAXIMUM EXTENT PERMITTED BY LAW, PACKET DESIGN MAKES NO
21: * REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING
22: * THIS SOFTWARE, INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED
23: * WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
24: * OR NON-INFRINGEMENT. PACKET DESIGN DOES NOT WARRANT, GUARANTEE,
25: * OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS
26: * OF THE USE OF THIS SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY,
27: * RELIABILITY OR OTHERWISE. IN NO EVENT SHALL PACKET DESIGN BE
28: * LIABLE FOR ANY DAMAGES RESULTING FROM OR ARISING OUT OF ANY USE
29: * OF THIS SOFTWARE, INCLUDING WITHOUT LIMITATION, ANY DIRECT,
30: * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE, OR CONSEQUENTIAL
31: * DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOSS OF
32: * USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY THEORY OF
33: * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
35: * THE USE OF THIS SOFTWARE, EVEN IF PACKET DESIGN IS ADVISED OF
36: * THE POSSIBILITY OF SUCH DAMAGE.
37: *
38: * Author: Archie Cobbs <archie@freebsd.org>
39: */
40:
41: #include <sys/param.h>
42: #include <sys/syslog.h>
43:
44: #include <stdio.h>
45: #include <stdlib.h>
46: #include <stdarg.h>
47: #include <string.h>
48: #include <unistd.h>
49: #include <errno.h>
50:
51: #include <openssl/ssl.h>
52: #include <openssl/err.h>
53: #include <openssl/md5.h>
54:
55: #include "structs/structs.h"
56: #include "structs/type/array.h"
57:
58: #include "util/rsa_util.h"
59: #include "util/typed_mem.h"
60:
61: static int rsa_util_verify_rsa(RSA *rsa, const u_char *md5,
62: const u_char *sig, size_t siglen);
63:
64: /*
65: * Create an RSA signature given an RSA private key filename.
66: *
67: * We assume the thing to be signed is an MD5 hash.
68: *
69: * Returns the signature length, or -1 if error.
70: */
71: int
72: rsa_util_sign(const char *privkeyfile,
73: const u_char *md5, u_char *sig, size_t siglen)
74: {
75: u_char *vbuf = NULL; /* encrypted signature (md5) */
76: FILE *fp = NULL;
77: RSA *rsa = NULL;
78: int rtn = -1;
79: int vlen;
80:
81: /* Open file */
82: if ((fp = fopen(privkeyfile, "r")) == NULL) {
83: fprintf(stderr, "%s: %s\n", privkeyfile, strerror(errno));
84: goto done;
85: }
86:
87: /* Read private key */
88: if ((rsa = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL)) == NULL) {
89: ERR_print_errors_fp(stderr);
90: goto done;
91: }
92:
93: /* Check buffer length */
94: if (siglen < RSA_size(rsa)) {
95: errno = EINVAL;
96: goto done;
97: }
98:
99: /* Encrypt using private key */
100: if ((vlen = RSA_private_encrypt(MD5_DIGEST_LENGTH,
101: (u_char *)md5, sig, rsa, RSA_PKCS1_PADDING)) <= 0) {
102: ERR_print_errors_fp(stderr);
103: goto done;
104: }
105:
106: /* OK */
107: rtn = vlen;
108:
109: done:
110: /* Clean up */
111: FREE(TYPED_MEM_TEMP, vbuf);
112: RSA_free(rsa);
113: if (fp != NULL)
114: fclose(fp);
115:
116: /* Return result */
117: return (rtn);
118: }
119:
120: /*
121: * Verify an RSA signature given a public key filename.
122: *
123: * We assume the signature is a signature of an MD5 hash, and therefore
124: * the input to the signature had length MD5_DIGEST_LENGTH.
125: */
126: int
127: rsa_util_verify(const char *pubkeyfile, const u_char *md5,
128: const u_char *sig, size_t siglen)
129: {
130: EVP_PKEY *pkey = NULL;
131: RSA *rsa = NULL;
132: BIO *bio = NULL;
133: int match = 0;
134:
135: /* Read in public key */
136: if ((bio = BIO_new(BIO_s_file())) == NULL) {
137: ERR_print_errors_fp(stderr);
138: goto done;
139: }
140: if (BIO_read_filename(bio, pubkeyfile) <= 0)
141: goto done;
142: if ((pkey = PEM_read_bio_PUBKEY(bio, NULL, NULL, NULL)) == NULL) {
143: ERR_print_errors_fp(stderr);
144: goto done;
145: }
146:
147: /* Get RSA public key */
148: if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) {
149: ERR_print_errors_fp(stderr);
150: goto done;
151: }
152:
153: /* Verify */
154: match = rsa_util_verify_rsa(rsa, md5, sig, siglen);
155:
156: done:
157: /* Clean up */
158: RSA_free(rsa);
159: EVP_PKEY_free(pkey);
160: BIO_free(bio);
161:
162: /* Return result */
163: return (match);
164: }
165:
166: /*
167: * Verify an RSA signature given a private key filename.
168: *
169: * We assume the signature is a signature of an MD5 hash, and therefore
170: * the input to the signature had length MD5_DIGEST_LENGTH.
171: */
172: int
173: rsa_util_verify_priv(const char *privkeyfile, const u_char *md5,
174: const u_char *sig, size_t siglen)
175: {
176: FILE *fp = NULL;
177: RSA *rsa = NULL;
178: int match = 0;
179:
180: /* Open file */
181: if ((fp = fopen(privkeyfile, "r")) == NULL) {
182: fprintf(stderr, "%s: %s\n", privkeyfile, strerror(errno));
183: goto done;
184: }
185:
186: /* Read private key */
187: if ((rsa = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL)) == NULL) {
188: ERR_print_errors_fp(stderr);
189: goto done;
190: }
191: ERR_clear_error();
192:
193: /* Verify */
194: match = rsa_util_verify_rsa(rsa, md5, sig, siglen);
195:
196: done:
197: /* Clean up */
198: RSA_free(rsa);
199: if (fp != NULL)
200: fclose(fp);
201:
202: /* Return result */
203: return (match);
204: }
205:
206: /*
207: * Verify an RSA signature given an RSA public key.
208: *
209: * We assume the signature is a signature of an MD5 hash, and therefore
210: * the input to the signature had length MD5_DIGEST_LENGTH.
211: */
212: static int
213: rsa_util_verify_rsa(RSA *rsa, const u_char *md5,
214: const u_char *sig, size_t siglen)
215: {
216: u_char *vbuf = NULL; /* decrypted signature */
217: int match = 0;
218: int vlen;
219:
220: /* Decrypt using public key */
221: if ((vbuf = MALLOC(TYPED_MEM_TEMP, MAX(siglen, RSA_size(rsa)))) == NULL)
222: goto done;
223: if ((vlen = RSA_public_decrypt(siglen,
224: (u_char *)sig, vbuf, rsa, RSA_PKCS1_PADDING)) <= 0) {
225: ERR_clear_error();
226: goto done;
227: }
228:
229: /* Compare decrypted signature with original hash value */
230: if (vlen == MD5_DIGEST_LENGTH
231: && memcmp(md5, vbuf, MD5_DIGEST_LENGTH) == 0)
232: match = 1;
233:
234: done:
235: /* Clean up */
236: FREE(TYPED_MEM_TEMP, vbuf);
237:
238: /* Return result */
239: return (match);
240: }
241:
242:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>