rsa_sig.c 50 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492
  1. /*
  2. * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. /*
  10. * RSA low level APIs are deprecated for public use, but still ok for
  11. * internal use.
  12. */
  13. #include "internal/deprecated.h"
  14. #include <string.h>
  15. #include <openssl/crypto.h>
  16. #include <openssl/core_dispatch.h>
  17. #include <openssl/core_names.h>
  18. #include <openssl/err.h>
  19. #include <openssl/rsa.h>
  20. #include <openssl/params.h>
  21. #include <openssl/evp.h>
  22. #include <openssl/proverr.h>
  23. #include "internal/cryptlib.h"
  24. #include "internal/nelem.h"
  25. #include "internal/sizes.h"
  26. #include "crypto/rsa.h"
  27. #include "prov/providercommon.h"
  28. #include "prov/implementations.h"
  29. #include "prov/provider_ctx.h"
  30. #include "prov/der_rsa.h"
  31. #include "prov/securitycheck.h"
  32. #define RSA_DEFAULT_DIGEST_NAME OSSL_DIGEST_NAME_SHA1
  33. static OSSL_FUNC_signature_newctx_fn rsa_newctx;
  34. static OSSL_FUNC_signature_sign_init_fn rsa_sign_init;
  35. static OSSL_FUNC_signature_verify_init_fn rsa_verify_init;
  36. static OSSL_FUNC_signature_verify_recover_init_fn rsa_verify_recover_init;
  37. static OSSL_FUNC_signature_sign_fn rsa_sign;
  38. static OSSL_FUNC_signature_verify_fn rsa_verify;
  39. static OSSL_FUNC_signature_verify_recover_fn rsa_verify_recover;
  40. static OSSL_FUNC_signature_digest_sign_init_fn rsa_digest_sign_init;
  41. static OSSL_FUNC_signature_digest_sign_update_fn rsa_digest_signverify_update;
  42. static OSSL_FUNC_signature_digest_sign_final_fn rsa_digest_sign_final;
  43. static OSSL_FUNC_signature_digest_verify_init_fn rsa_digest_verify_init;
  44. static OSSL_FUNC_signature_digest_verify_update_fn rsa_digest_signverify_update;
  45. static OSSL_FUNC_signature_digest_verify_final_fn rsa_digest_verify_final;
  46. static OSSL_FUNC_signature_freectx_fn rsa_freectx;
  47. static OSSL_FUNC_signature_dupctx_fn rsa_dupctx;
  48. static OSSL_FUNC_signature_get_ctx_params_fn rsa_get_ctx_params;
  49. static OSSL_FUNC_signature_gettable_ctx_params_fn rsa_gettable_ctx_params;
  50. static OSSL_FUNC_signature_set_ctx_params_fn rsa_set_ctx_params;
  51. static OSSL_FUNC_signature_settable_ctx_params_fn rsa_settable_ctx_params;
  52. static OSSL_FUNC_signature_get_ctx_md_params_fn rsa_get_ctx_md_params;
  53. static OSSL_FUNC_signature_gettable_ctx_md_params_fn rsa_gettable_ctx_md_params;
  54. static OSSL_FUNC_signature_set_ctx_md_params_fn rsa_set_ctx_md_params;
  55. static OSSL_FUNC_signature_settable_ctx_md_params_fn rsa_settable_ctx_md_params;
  56. static OSSL_ITEM padding_item[] = {
  57. { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 },
  58. { RSA_NO_PADDING, OSSL_PKEY_RSA_PAD_MODE_NONE },
  59. { RSA_X931_PADDING, OSSL_PKEY_RSA_PAD_MODE_X931 },
  60. { RSA_PKCS1_PSS_PADDING, OSSL_PKEY_RSA_PAD_MODE_PSS },
  61. { 0, NULL }
  62. };
  63. /*
  64. * What's passed as an actual key is defined by the KEYMGMT interface.
  65. * We happen to know that our KEYMGMT simply passes RSA structures, so
  66. * we use that here too.
  67. */
  68. typedef struct {
  69. OSSL_LIB_CTX *libctx;
  70. char *propq;
  71. RSA *rsa;
  72. int operation;
  73. /*
  74. * Flag to determine if the hash function can be changed (1) or not (0)
  75. * Because it's dangerous to change during a DigestSign or DigestVerify
  76. * operation, this flag is cleared by their Init function, and set again
  77. * by their Final function.
  78. */
  79. unsigned int flag_allow_md : 1;
  80. unsigned int mgf1_md_set : 1;
  81. /* main digest */
  82. EVP_MD *md;
  83. EVP_MD_CTX *mdctx;
  84. int mdnid;
  85. char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */
  86. /* RSA padding mode */
  87. int pad_mode;
  88. /* message digest for MGF1 */
  89. EVP_MD *mgf1_md;
  90. int mgf1_mdnid;
  91. char mgf1_mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */
  92. /* PSS salt length */
  93. int saltlen;
  94. /* Minimum salt length or -1 if no PSS parameter restriction */
  95. int min_saltlen;
  96. /* Temp buffer */
  97. unsigned char *tbuf;
  98. } PROV_RSA_CTX;
  99. /* True if PSS parameters are restricted */
  100. #define rsa_pss_restricted(prsactx) (prsactx->min_saltlen != -1)
  101. static size_t rsa_get_md_size(const PROV_RSA_CTX *prsactx)
  102. {
  103. if (prsactx->md != NULL)
  104. return EVP_MD_get_size(prsactx->md);
  105. return 0;
  106. }
  107. static int rsa_check_padding(const PROV_RSA_CTX *prsactx,
  108. const char *mdname, const char *mgf1_mdname,
  109. int mdnid)
  110. {
  111. switch (prsactx->pad_mode) {
  112. case RSA_NO_PADDING:
  113. if (mdname != NULL || mdnid != NID_undef) {
  114. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE);
  115. return 0;
  116. }
  117. break;
  118. case RSA_X931_PADDING:
  119. if (RSA_X931_hash_id(mdnid) == -1) {
  120. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_X931_DIGEST);
  121. return 0;
  122. }
  123. break;
  124. case RSA_PKCS1_PSS_PADDING:
  125. if (rsa_pss_restricted(prsactx))
  126. if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
  127. || (mgf1_mdname != NULL
  128. && !EVP_MD_is_a(prsactx->mgf1_md, mgf1_mdname))) {
  129. ERR_raise(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED);
  130. return 0;
  131. }
  132. break;
  133. default:
  134. break;
  135. }
  136. return 1;
  137. }
  138. static int rsa_check_parameters(PROV_RSA_CTX *prsactx, int min_saltlen)
  139. {
  140. if (prsactx->pad_mode == RSA_PKCS1_PSS_PADDING) {
  141. int max_saltlen;
  142. /* See if minimum salt length exceeds maximum possible */
  143. max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md);
  144. if ((RSA_bits(prsactx->rsa) & 0x7) == 1)
  145. max_saltlen--;
  146. if (min_saltlen < 0 || min_saltlen > max_saltlen) {
  147. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
  148. return 0;
  149. }
  150. prsactx->min_saltlen = min_saltlen;
  151. }
  152. return 1;
  153. }
  154. static void *rsa_newctx(void *provctx, const char *propq)
  155. {
  156. PROV_RSA_CTX *prsactx = NULL;
  157. char *propq_copy = NULL;
  158. if (!ossl_prov_is_running())
  159. return NULL;
  160. if ((prsactx = OPENSSL_zalloc(sizeof(PROV_RSA_CTX))) == NULL
  161. || (propq != NULL
  162. && (propq_copy = OPENSSL_strdup(propq)) == NULL)) {
  163. OPENSSL_free(prsactx);
  164. return NULL;
  165. }
  166. prsactx->libctx = PROV_LIBCTX_OF(provctx);
  167. prsactx->flag_allow_md = 1;
  168. prsactx->propq = propq_copy;
  169. /* Maximum up to digest length for sign, auto for verify */
  170. prsactx->saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  171. prsactx->min_saltlen = -1;
  172. return prsactx;
  173. }
  174. static int rsa_pss_compute_saltlen(PROV_RSA_CTX *ctx)
  175. {
  176. int saltlen = ctx->saltlen;
  177. int saltlenMax = -1;
  178. /* FIPS 186-4 section 5 "The RSA Digital Signature Algorithm", subsection
  179. * 5.5 "PKCS #1" says: "For RSASSA-PSS […] the length (in bytes) of the
  180. * salt (sLen) shall satisfy 0 <= sLen <= hLen, where hLen is the length of
  181. * the hash function output block (in bytes)."
  182. *
  183. * Provide a way to use at most the digest length, so that the default does
  184. * not violate FIPS 186-4. */
  185. if (saltlen == RSA_PSS_SALTLEN_DIGEST) {
  186. saltlen = EVP_MD_get_size(ctx->md);
  187. } else if (saltlen == RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) {
  188. saltlen = RSA_PSS_SALTLEN_MAX;
  189. saltlenMax = EVP_MD_get_size(ctx->md);
  190. }
  191. if (saltlen == RSA_PSS_SALTLEN_MAX || saltlen == RSA_PSS_SALTLEN_AUTO) {
  192. saltlen = RSA_size(ctx->rsa) - EVP_MD_get_size(ctx->md) - 2;
  193. if ((RSA_bits(ctx->rsa) & 0x7) == 1)
  194. saltlen--;
  195. if (saltlenMax >= 0 && saltlen > saltlenMax)
  196. saltlen = saltlenMax;
  197. }
  198. if (saltlen < 0) {
  199. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  200. return -1;
  201. } else if (saltlen < ctx->min_saltlen) {
  202. ERR_raise_data(ERR_LIB_PROV, PROV_R_PSS_SALTLEN_TOO_SMALL,
  203. "minimum salt length: %d, actual salt length: %d",
  204. ctx->min_saltlen, saltlen);
  205. return -1;
  206. }
  207. return saltlen;
  208. }
  209. static unsigned char *rsa_generate_signature_aid(PROV_RSA_CTX *ctx,
  210. unsigned char *aid_buf,
  211. size_t buf_len,
  212. size_t *aid_len)
  213. {
  214. WPACKET pkt;
  215. unsigned char *aid = NULL;
  216. int saltlen;
  217. RSA_PSS_PARAMS_30 pss_params;
  218. int ret;
  219. if (!WPACKET_init_der(&pkt, aid_buf, buf_len)) {
  220. ERR_raise(ERR_LIB_PROV, ERR_R_CRYPTO_LIB);
  221. return NULL;
  222. }
  223. switch (ctx->pad_mode) {
  224. case RSA_PKCS1_PADDING:
  225. ret = ossl_DER_w_algorithmIdentifier_MDWithRSAEncryption(&pkt, -1,
  226. ctx->mdnid);
  227. if (ret > 0) {
  228. break;
  229. } else if (ret == 0) {
  230. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  231. goto cleanup;
  232. }
  233. ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
  234. "Algorithm ID generation - md NID: %d",
  235. ctx->mdnid);
  236. goto cleanup;
  237. case RSA_PKCS1_PSS_PADDING:
  238. saltlen = rsa_pss_compute_saltlen(ctx);
  239. if (saltlen < 0)
  240. goto cleanup;
  241. if (!ossl_rsa_pss_params_30_set_defaults(&pss_params)
  242. || !ossl_rsa_pss_params_30_set_hashalg(&pss_params, ctx->mdnid)
  243. || !ossl_rsa_pss_params_30_set_maskgenhashalg(&pss_params,
  244. ctx->mgf1_mdnid)
  245. || !ossl_rsa_pss_params_30_set_saltlen(&pss_params, saltlen)
  246. || !ossl_DER_w_algorithmIdentifier_RSA_PSS(&pkt, -1,
  247. RSA_FLAG_TYPE_RSASSAPSS,
  248. &pss_params)) {
  249. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  250. goto cleanup;
  251. }
  252. break;
  253. default:
  254. ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
  255. "Algorithm ID generation - pad mode: %d",
  256. ctx->pad_mode);
  257. goto cleanup;
  258. }
  259. if (WPACKET_finish(&pkt)) {
  260. WPACKET_get_total_written(&pkt, aid_len);
  261. aid = WPACKET_get_curr(&pkt);
  262. }
  263. cleanup:
  264. WPACKET_cleanup(&pkt);
  265. return aid;
  266. }
  267. static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname,
  268. const char *mdprops)
  269. {
  270. if (mdprops == NULL)
  271. mdprops = ctx->propq;
  272. if (mdname != NULL) {
  273. EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
  274. int sha1_allowed = (ctx->operation != EVP_PKEY_OP_SIGN);
  275. int md_nid = ossl_digest_rsa_sign_get_md_nid(ctx->libctx, md,
  276. sha1_allowed);
  277. size_t mdname_len = strlen(mdname);
  278. if (md == NULL
  279. || md_nid <= 0
  280. || !rsa_check_padding(ctx, mdname, NULL, md_nid)
  281. || mdname_len >= sizeof(ctx->mdname)) {
  282. if (md == NULL)
  283. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  284. "%s could not be fetched", mdname);
  285. if (md_nid <= 0)
  286. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  287. "digest=%s", mdname);
  288. if (mdname_len >= sizeof(ctx->mdname))
  289. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  290. "%s exceeds name buffer length", mdname);
  291. EVP_MD_free(md);
  292. return 0;
  293. }
  294. if (!ctx->flag_allow_md) {
  295. if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) {
  296. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  297. "digest %s != %s", mdname, ctx->mdname);
  298. EVP_MD_free(md);
  299. return 0;
  300. }
  301. EVP_MD_free(md);
  302. return 1;
  303. }
  304. if (!ctx->mgf1_md_set) {
  305. if (!EVP_MD_up_ref(md)) {
  306. EVP_MD_free(md);
  307. return 0;
  308. }
  309. EVP_MD_free(ctx->mgf1_md);
  310. ctx->mgf1_md = md;
  311. ctx->mgf1_mdnid = md_nid;
  312. OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
  313. }
  314. EVP_MD_CTX_free(ctx->mdctx);
  315. EVP_MD_free(ctx->md);
  316. ctx->mdctx = NULL;
  317. ctx->md = md;
  318. ctx->mdnid = md_nid;
  319. OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname));
  320. }
  321. return 1;
  322. }
  323. static int rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname,
  324. const char *mdprops)
  325. {
  326. size_t len;
  327. EVP_MD *md = NULL;
  328. int mdnid;
  329. if (mdprops == NULL)
  330. mdprops = ctx->propq;
  331. if ((md = EVP_MD_fetch(ctx->libctx, mdname, mdprops)) == NULL) {
  332. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  333. "%s could not be fetched", mdname);
  334. return 0;
  335. }
  336. /* The default for mgf1 is SHA1 - so allow SHA1 */
  337. if ((mdnid = ossl_digest_rsa_sign_get_md_nid(ctx->libctx, md, 1)) <= 0
  338. || !rsa_check_padding(ctx, NULL, mdname, mdnid)) {
  339. if (mdnid <= 0)
  340. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  341. "digest=%s", mdname);
  342. EVP_MD_free(md);
  343. return 0;
  344. }
  345. len = OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
  346. if (len >= sizeof(ctx->mgf1_mdname)) {
  347. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  348. "%s exceeds name buffer length", mdname);
  349. EVP_MD_free(md);
  350. return 0;
  351. }
  352. EVP_MD_free(ctx->mgf1_md);
  353. ctx->mgf1_md = md;
  354. ctx->mgf1_mdnid = mdnid;
  355. ctx->mgf1_md_set = 1;
  356. return 1;
  357. }
  358. static int rsa_signverify_init(void *vprsactx, void *vrsa,
  359. const OSSL_PARAM params[], int operation)
  360. {
  361. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  362. if (!ossl_prov_is_running() || prsactx == NULL)
  363. return 0;
  364. if (vrsa == NULL && prsactx->rsa == NULL) {
  365. ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
  366. return 0;
  367. }
  368. if (vrsa != NULL) {
  369. if (!ossl_rsa_check_key(prsactx->libctx, vrsa, operation))
  370. return 0;
  371. if (!RSA_up_ref(vrsa))
  372. return 0;
  373. RSA_free(prsactx->rsa);
  374. prsactx->rsa = vrsa;
  375. }
  376. prsactx->operation = operation;
  377. /* Maximize up to digest length for sign, auto for verify */
  378. prsactx->saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  379. prsactx->min_saltlen = -1;
  380. switch (RSA_test_flags(prsactx->rsa, RSA_FLAG_TYPE_MASK)) {
  381. case RSA_FLAG_TYPE_RSA:
  382. prsactx->pad_mode = RSA_PKCS1_PADDING;
  383. break;
  384. case RSA_FLAG_TYPE_RSASSAPSS:
  385. prsactx->pad_mode = RSA_PKCS1_PSS_PADDING;
  386. {
  387. const RSA_PSS_PARAMS_30 *pss =
  388. ossl_rsa_get0_pss_params_30(prsactx->rsa);
  389. if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) {
  390. int md_nid = ossl_rsa_pss_params_30_hashalg(pss);
  391. int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss);
  392. int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss);
  393. const char *mdname, *mgf1mdname;
  394. size_t len;
  395. mdname = ossl_rsa_oaeppss_nid2name(md_nid);
  396. mgf1mdname = ossl_rsa_oaeppss_nid2name(mgf1md_nid);
  397. if (mdname == NULL) {
  398. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  399. "PSS restrictions lack hash algorithm");
  400. return 0;
  401. }
  402. if (mgf1mdname == NULL) {
  403. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  404. "PSS restrictions lack MGF1 hash algorithm");
  405. return 0;
  406. }
  407. len = OPENSSL_strlcpy(prsactx->mdname, mdname,
  408. sizeof(prsactx->mdname));
  409. if (len >= sizeof(prsactx->mdname)) {
  410. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  411. "hash algorithm name too long");
  412. return 0;
  413. }
  414. len = OPENSSL_strlcpy(prsactx->mgf1_mdname, mgf1mdname,
  415. sizeof(prsactx->mgf1_mdname));
  416. if (len >= sizeof(prsactx->mgf1_mdname)) {
  417. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  418. "MGF1 hash algorithm name too long");
  419. return 0;
  420. }
  421. prsactx->saltlen = min_saltlen;
  422. /* call rsa_setup_mgf1_md before rsa_setup_md to avoid duplication */
  423. if (!rsa_setup_mgf1_md(prsactx, mgf1mdname, prsactx->propq)
  424. || !rsa_setup_md(prsactx, mdname, prsactx->propq)
  425. || !rsa_check_parameters(prsactx, min_saltlen))
  426. return 0;
  427. }
  428. }
  429. break;
  430. default:
  431. ERR_raise(ERR_LIB_RSA, PROV_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  432. return 0;
  433. }
  434. if (!rsa_set_ctx_params(prsactx, params))
  435. return 0;
  436. return 1;
  437. }
  438. static int setup_tbuf(PROV_RSA_CTX *ctx)
  439. {
  440. if (ctx->tbuf != NULL)
  441. return 1;
  442. if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL)
  443. return 0;
  444. return 1;
  445. }
  446. static void clean_tbuf(PROV_RSA_CTX *ctx)
  447. {
  448. if (ctx->tbuf != NULL)
  449. OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa));
  450. }
  451. static void free_tbuf(PROV_RSA_CTX *ctx)
  452. {
  453. clean_tbuf(ctx);
  454. OPENSSL_free(ctx->tbuf);
  455. ctx->tbuf = NULL;
  456. }
  457. static int rsa_sign_init(void *vprsactx, void *vrsa, const OSSL_PARAM params[])
  458. {
  459. if (!ossl_prov_is_running())
  460. return 0;
  461. return rsa_signverify_init(vprsactx, vrsa, params, EVP_PKEY_OP_SIGN);
  462. }
  463. static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen,
  464. size_t sigsize, const unsigned char *tbs, size_t tbslen)
  465. {
  466. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  467. int ret;
  468. size_t rsasize = RSA_size(prsactx->rsa);
  469. size_t mdsize = rsa_get_md_size(prsactx);
  470. if (!ossl_prov_is_running())
  471. return 0;
  472. if (sig == NULL) {
  473. *siglen = rsasize;
  474. return 1;
  475. }
  476. if (sigsize < rsasize) {
  477. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SIGNATURE_SIZE,
  478. "is %zu, should be at least %zu", sigsize, rsasize);
  479. return 0;
  480. }
  481. if (mdsize != 0) {
  482. if (tbslen != mdsize) {
  483. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH);
  484. return 0;
  485. }
  486. #ifndef FIPS_MODULE
  487. if (EVP_MD_is_a(prsactx->md, OSSL_DIGEST_NAME_MDC2)) {
  488. unsigned int sltmp;
  489. if (prsactx->pad_mode != RSA_PKCS1_PADDING) {
  490. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  491. "only PKCS#1 padding supported with MDC2");
  492. return 0;
  493. }
  494. ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp,
  495. prsactx->rsa);
  496. if (ret <= 0) {
  497. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  498. return 0;
  499. }
  500. ret = sltmp;
  501. goto end;
  502. }
  503. #endif
  504. switch (prsactx->pad_mode) {
  505. case RSA_X931_PADDING:
  506. if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) {
  507. ERR_raise_data(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL,
  508. "RSA key size = %d, expected minimum = %d",
  509. RSA_size(prsactx->rsa), tbslen + 1);
  510. return 0;
  511. }
  512. if (!setup_tbuf(prsactx)) {
  513. ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB);
  514. return 0;
  515. }
  516. memcpy(prsactx->tbuf, tbs, tbslen);
  517. prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid);
  518. ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf,
  519. sig, prsactx->rsa, RSA_X931_PADDING);
  520. clean_tbuf(prsactx);
  521. break;
  522. case RSA_PKCS1_PADDING:
  523. {
  524. unsigned int sltmp;
  525. ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp,
  526. prsactx->rsa);
  527. if (ret <= 0) {
  528. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  529. return 0;
  530. }
  531. ret = sltmp;
  532. }
  533. break;
  534. case RSA_PKCS1_PSS_PADDING:
  535. /* Check PSS restrictions */
  536. if (rsa_pss_restricted(prsactx)) {
  537. switch (prsactx->saltlen) {
  538. case RSA_PSS_SALTLEN_DIGEST:
  539. if (prsactx->min_saltlen > EVP_MD_get_size(prsactx->md)) {
  540. ERR_raise_data(ERR_LIB_PROV,
  541. PROV_R_PSS_SALTLEN_TOO_SMALL,
  542. "minimum salt length set to %d, "
  543. "but the digest only gives %d",
  544. prsactx->min_saltlen,
  545. EVP_MD_get_size(prsactx->md));
  546. return 0;
  547. }
  548. /* FALLTHRU */
  549. default:
  550. if (prsactx->saltlen >= 0
  551. && prsactx->saltlen < prsactx->min_saltlen) {
  552. ERR_raise_data(ERR_LIB_PROV,
  553. PROV_R_PSS_SALTLEN_TOO_SMALL,
  554. "minimum salt length set to %d, but the"
  555. "actual salt length is only set to %d",
  556. prsactx->min_saltlen,
  557. prsactx->saltlen);
  558. return 0;
  559. }
  560. break;
  561. }
  562. }
  563. if (!setup_tbuf(prsactx))
  564. return 0;
  565. if (!RSA_padding_add_PKCS1_PSS_mgf1(prsactx->rsa,
  566. prsactx->tbuf, tbs,
  567. prsactx->md, prsactx->mgf1_md,
  568. prsactx->saltlen)) {
  569. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  570. return 0;
  571. }
  572. ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf,
  573. sig, prsactx->rsa, RSA_NO_PADDING);
  574. clean_tbuf(prsactx);
  575. break;
  576. default:
  577. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  578. "Only X.931, PKCS#1 v1.5 or PSS padding allowed");
  579. return 0;
  580. }
  581. } else {
  582. ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa,
  583. prsactx->pad_mode);
  584. }
  585. #ifndef FIPS_MODULE
  586. end:
  587. #endif
  588. if (ret <= 0) {
  589. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  590. return 0;
  591. }
  592. *siglen = ret;
  593. return 1;
  594. }
  595. static int rsa_verify_recover_init(void *vprsactx, void *vrsa,
  596. const OSSL_PARAM params[])
  597. {
  598. if (!ossl_prov_is_running())
  599. return 0;
  600. return rsa_signverify_init(vprsactx, vrsa, params,
  601. EVP_PKEY_OP_VERIFYRECOVER);
  602. }
  603. static int rsa_verify_recover(void *vprsactx,
  604. unsigned char *rout,
  605. size_t *routlen,
  606. size_t routsize,
  607. const unsigned char *sig,
  608. size_t siglen)
  609. {
  610. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  611. int ret;
  612. if (!ossl_prov_is_running())
  613. return 0;
  614. if (rout == NULL) {
  615. *routlen = RSA_size(prsactx->rsa);
  616. return 1;
  617. }
  618. if (prsactx->md != NULL) {
  619. switch (prsactx->pad_mode) {
  620. case RSA_X931_PADDING:
  621. if (!setup_tbuf(prsactx))
  622. return 0;
  623. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf, prsactx->rsa,
  624. RSA_X931_PADDING);
  625. if (ret < 1) {
  626. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  627. return 0;
  628. }
  629. ret--;
  630. if (prsactx->tbuf[ret] != RSA_X931_hash_id(prsactx->mdnid)) {
  631. ERR_raise(ERR_LIB_PROV, PROV_R_ALGORITHM_MISMATCH);
  632. return 0;
  633. }
  634. if (ret != EVP_MD_get_size(prsactx->md)) {
  635. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH,
  636. "Should be %d, but got %d",
  637. EVP_MD_get_size(prsactx->md), ret);
  638. return 0;
  639. }
  640. *routlen = ret;
  641. if (rout != prsactx->tbuf) {
  642. if (routsize < (size_t)ret) {
  643. ERR_raise_data(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL,
  644. "buffer size is %d, should be %d",
  645. routsize, ret);
  646. return 0;
  647. }
  648. memcpy(rout, prsactx->tbuf, ret);
  649. }
  650. break;
  651. case RSA_PKCS1_PADDING:
  652. {
  653. size_t sltmp;
  654. ret = ossl_rsa_verify(prsactx->mdnid, NULL, 0, rout, &sltmp,
  655. sig, siglen, prsactx->rsa);
  656. if (ret <= 0) {
  657. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  658. return 0;
  659. }
  660. ret = sltmp;
  661. }
  662. break;
  663. default:
  664. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  665. "Only X.931 or PKCS#1 v1.5 padding allowed");
  666. return 0;
  667. }
  668. } else {
  669. ret = RSA_public_decrypt(siglen, sig, rout, prsactx->rsa,
  670. prsactx->pad_mode);
  671. if (ret < 0) {
  672. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  673. return 0;
  674. }
  675. }
  676. *routlen = ret;
  677. return 1;
  678. }
  679. static int rsa_verify_init(void *vprsactx, void *vrsa,
  680. const OSSL_PARAM params[])
  681. {
  682. if (!ossl_prov_is_running())
  683. return 0;
  684. return rsa_signverify_init(vprsactx, vrsa, params, EVP_PKEY_OP_VERIFY);
  685. }
  686. static int rsa_verify(void *vprsactx, const unsigned char *sig, size_t siglen,
  687. const unsigned char *tbs, size_t tbslen)
  688. {
  689. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  690. size_t rslen;
  691. if (!ossl_prov_is_running())
  692. return 0;
  693. if (prsactx->md != NULL) {
  694. switch (prsactx->pad_mode) {
  695. case RSA_PKCS1_PADDING:
  696. if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen,
  697. prsactx->rsa)) {
  698. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  699. return 0;
  700. }
  701. return 1;
  702. case RSA_X931_PADDING:
  703. if (!setup_tbuf(prsactx))
  704. return 0;
  705. if (rsa_verify_recover(prsactx, prsactx->tbuf, &rslen, 0,
  706. sig, siglen) <= 0)
  707. return 0;
  708. break;
  709. case RSA_PKCS1_PSS_PADDING:
  710. {
  711. int ret;
  712. size_t mdsize;
  713. /*
  714. * We need to check this for the RSA_verify_PKCS1_PSS_mgf1()
  715. * call
  716. */
  717. mdsize = rsa_get_md_size(prsactx);
  718. if (tbslen != mdsize) {
  719. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH,
  720. "Should be %d, but got %d",
  721. mdsize, tbslen);
  722. return 0;
  723. }
  724. if (!setup_tbuf(prsactx))
  725. return 0;
  726. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf,
  727. prsactx->rsa, RSA_NO_PADDING);
  728. if (ret <= 0) {
  729. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  730. return 0;
  731. }
  732. ret = RSA_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs,
  733. prsactx->md, prsactx->mgf1_md,
  734. prsactx->tbuf,
  735. prsactx->saltlen);
  736. if (ret <= 0) {
  737. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  738. return 0;
  739. }
  740. return 1;
  741. }
  742. default:
  743. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  744. "Only X.931, PKCS#1 v1.5 or PSS padding allowed");
  745. return 0;
  746. }
  747. } else {
  748. int ret;
  749. if (!setup_tbuf(prsactx))
  750. return 0;
  751. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf, prsactx->rsa,
  752. prsactx->pad_mode);
  753. if (ret <= 0) {
  754. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  755. return 0;
  756. }
  757. rslen = (size_t)ret;
  758. }
  759. if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen))
  760. return 0;
  761. return 1;
  762. }
  763. static int rsa_digest_signverify_init(void *vprsactx, const char *mdname,
  764. void *vrsa, const OSSL_PARAM params[],
  765. int operation)
  766. {
  767. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  768. if (!ossl_prov_is_running())
  769. return 0;
  770. if (!rsa_signverify_init(vprsactx, vrsa, params, operation))
  771. return 0;
  772. if (mdname != NULL
  773. /* was rsa_setup_md already called in rsa_signverify_init()? */
  774. && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0)
  775. && !rsa_setup_md(prsactx, mdname, prsactx->propq))
  776. return 0;
  777. prsactx->flag_allow_md = 0;
  778. if (prsactx->mdctx == NULL) {
  779. prsactx->mdctx = EVP_MD_CTX_new();
  780. if (prsactx->mdctx == NULL)
  781. goto error;
  782. }
  783. if (!EVP_DigestInit_ex2(prsactx->mdctx, prsactx->md, params))
  784. goto error;
  785. return 1;
  786. error:
  787. EVP_MD_CTX_free(prsactx->mdctx);
  788. prsactx->mdctx = NULL;
  789. return 0;
  790. }
  791. static int rsa_digest_signverify_update(void *vprsactx,
  792. const unsigned char *data,
  793. size_t datalen)
  794. {
  795. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  796. if (prsactx == NULL || prsactx->mdctx == NULL)
  797. return 0;
  798. return EVP_DigestUpdate(prsactx->mdctx, data, datalen);
  799. }
  800. static int rsa_digest_sign_init(void *vprsactx, const char *mdname,
  801. void *vrsa, const OSSL_PARAM params[])
  802. {
  803. if (!ossl_prov_is_running())
  804. return 0;
  805. return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
  806. params, EVP_PKEY_OP_SIGN);
  807. }
  808. static int rsa_digest_sign_final(void *vprsactx, unsigned char *sig,
  809. size_t *siglen, size_t sigsize)
  810. {
  811. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  812. unsigned char digest[EVP_MAX_MD_SIZE];
  813. unsigned int dlen = 0;
  814. if (!ossl_prov_is_running() || prsactx == NULL)
  815. return 0;
  816. prsactx->flag_allow_md = 1;
  817. if (prsactx->mdctx == NULL)
  818. return 0;
  819. /*
  820. * If sig is NULL then we're just finding out the sig size. Other fields
  821. * are ignored. Defer to rsa_sign.
  822. */
  823. if (sig != NULL) {
  824. /*
  825. * The digests used here are all known (see rsa_get_md_nid()), so they
  826. * should not exceed the internal buffer size of EVP_MAX_MD_SIZE.
  827. */
  828. if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen))
  829. return 0;
  830. }
  831. return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen);
  832. }
  833. static int rsa_digest_verify_init(void *vprsactx, const char *mdname,
  834. void *vrsa, const OSSL_PARAM params[])
  835. {
  836. if (!ossl_prov_is_running())
  837. return 0;
  838. return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
  839. params, EVP_PKEY_OP_VERIFY);
  840. }
  841. int rsa_digest_verify_final(void *vprsactx, const unsigned char *sig,
  842. size_t siglen)
  843. {
  844. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  845. unsigned char digest[EVP_MAX_MD_SIZE];
  846. unsigned int dlen = 0;
  847. if (!ossl_prov_is_running())
  848. return 0;
  849. if (prsactx == NULL)
  850. return 0;
  851. prsactx->flag_allow_md = 1;
  852. if (prsactx->mdctx == NULL)
  853. return 0;
  854. /*
  855. * The digests used here are all known (see rsa_get_md_nid()), so they
  856. * should not exceed the internal buffer size of EVP_MAX_MD_SIZE.
  857. */
  858. if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen))
  859. return 0;
  860. return rsa_verify(vprsactx, sig, siglen, digest, (size_t)dlen);
  861. }
  862. static void rsa_freectx(void *vprsactx)
  863. {
  864. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  865. if (prsactx == NULL)
  866. return;
  867. EVP_MD_CTX_free(prsactx->mdctx);
  868. EVP_MD_free(prsactx->md);
  869. EVP_MD_free(prsactx->mgf1_md);
  870. OPENSSL_free(prsactx->propq);
  871. free_tbuf(prsactx);
  872. RSA_free(prsactx->rsa);
  873. OPENSSL_clear_free(prsactx, sizeof(*prsactx));
  874. }
  875. static void *rsa_dupctx(void *vprsactx)
  876. {
  877. PROV_RSA_CTX *srcctx = (PROV_RSA_CTX *)vprsactx;
  878. PROV_RSA_CTX *dstctx;
  879. if (!ossl_prov_is_running())
  880. return NULL;
  881. dstctx = OPENSSL_zalloc(sizeof(*srcctx));
  882. if (dstctx == NULL)
  883. return NULL;
  884. *dstctx = *srcctx;
  885. dstctx->rsa = NULL;
  886. dstctx->md = NULL;
  887. dstctx->mdctx = NULL;
  888. dstctx->tbuf = NULL;
  889. dstctx->propq = NULL;
  890. if (srcctx->rsa != NULL && !RSA_up_ref(srcctx->rsa))
  891. goto err;
  892. dstctx->rsa = srcctx->rsa;
  893. if (srcctx->md != NULL && !EVP_MD_up_ref(srcctx->md))
  894. goto err;
  895. dstctx->md = srcctx->md;
  896. if (srcctx->mgf1_md != NULL && !EVP_MD_up_ref(srcctx->mgf1_md))
  897. goto err;
  898. dstctx->mgf1_md = srcctx->mgf1_md;
  899. if (srcctx->mdctx != NULL) {
  900. dstctx->mdctx = EVP_MD_CTX_new();
  901. if (dstctx->mdctx == NULL
  902. || !EVP_MD_CTX_copy_ex(dstctx->mdctx, srcctx->mdctx))
  903. goto err;
  904. }
  905. if (srcctx->propq != NULL) {
  906. dstctx->propq = OPENSSL_strdup(srcctx->propq);
  907. if (dstctx->propq == NULL)
  908. goto err;
  909. }
  910. return dstctx;
  911. err:
  912. rsa_freectx(dstctx);
  913. return NULL;
  914. }
  915. static int rsa_get_ctx_params(void *vprsactx, OSSL_PARAM *params)
  916. {
  917. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  918. OSSL_PARAM *p;
  919. if (prsactx == NULL)
  920. return 0;
  921. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_ALGORITHM_ID);
  922. if (p != NULL) {
  923. /* The Algorithm Identifier of the combined signature algorithm */
  924. unsigned char aid_buf[128];
  925. unsigned char *aid;
  926. size_t aid_len;
  927. aid = rsa_generate_signature_aid(prsactx, aid_buf,
  928. sizeof(aid_buf), &aid_len);
  929. if (aid == NULL || !OSSL_PARAM_set_octet_string(p, aid, aid_len))
  930. return 0;
  931. }
  932. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_PAD_MODE);
  933. if (p != NULL)
  934. switch (p->data_type) {
  935. case OSSL_PARAM_INTEGER:
  936. if (!OSSL_PARAM_set_int(p, prsactx->pad_mode))
  937. return 0;
  938. break;
  939. case OSSL_PARAM_UTF8_STRING:
  940. {
  941. int i;
  942. const char *word = NULL;
  943. for (i = 0; padding_item[i].id != 0; i++) {
  944. if (prsactx->pad_mode == (int)padding_item[i].id) {
  945. word = padding_item[i].ptr;
  946. break;
  947. }
  948. }
  949. if (word != NULL) {
  950. if (!OSSL_PARAM_set_utf8_string(p, word))
  951. return 0;
  952. } else {
  953. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  954. }
  955. }
  956. break;
  957. default:
  958. return 0;
  959. }
  960. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_DIGEST);
  961. if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mdname))
  962. return 0;
  963. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_MGF1_DIGEST);
  964. if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mgf1_mdname))
  965. return 0;
  966. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_PSS_SALTLEN);
  967. if (p != NULL) {
  968. if (p->data_type == OSSL_PARAM_INTEGER) {
  969. if (!OSSL_PARAM_set_int(p, prsactx->saltlen))
  970. return 0;
  971. } else if (p->data_type == OSSL_PARAM_UTF8_STRING) {
  972. const char *value = NULL;
  973. switch (prsactx->saltlen) {
  974. case RSA_PSS_SALTLEN_DIGEST:
  975. value = OSSL_PKEY_RSA_PSS_SALT_LEN_DIGEST;
  976. break;
  977. case RSA_PSS_SALTLEN_MAX:
  978. value = OSSL_PKEY_RSA_PSS_SALT_LEN_MAX;
  979. break;
  980. case RSA_PSS_SALTLEN_AUTO:
  981. value = OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO;
  982. break;
  983. case RSA_PSS_SALTLEN_AUTO_DIGEST_MAX:
  984. value = OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX;
  985. break;
  986. default:
  987. {
  988. int len = BIO_snprintf(p->data, p->data_size, "%d",
  989. prsactx->saltlen);
  990. if (len <= 0)
  991. return 0;
  992. p->return_size = len;
  993. break;
  994. }
  995. }
  996. if (value != NULL
  997. && !OSSL_PARAM_set_utf8_string(p, value))
  998. return 0;
  999. }
  1000. }
  1001. return 1;
  1002. }
  1003. static const OSSL_PARAM known_gettable_ctx_params[] = {
  1004. OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0),
  1005. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1006. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
  1007. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1008. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1009. OSSL_PARAM_END
  1010. };
  1011. static const OSSL_PARAM *rsa_gettable_ctx_params(ossl_unused void *vprsactx,
  1012. ossl_unused void *provctx)
  1013. {
  1014. return known_gettable_ctx_params;
  1015. }
  1016. static int rsa_set_ctx_params(void *vprsactx, const OSSL_PARAM params[])
  1017. {
  1018. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1019. const OSSL_PARAM *p;
  1020. int pad_mode;
  1021. int saltlen;
  1022. char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL;
  1023. char mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmdprops = NULL;
  1024. char mgf1mdname[OSSL_MAX_NAME_SIZE] = "", *pmgf1mdname = NULL;
  1025. char mgf1mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmgf1mdprops = NULL;
  1026. if (prsactx == NULL)
  1027. return 0;
  1028. if (params == NULL)
  1029. return 1;
  1030. pad_mode = prsactx->pad_mode;
  1031. saltlen = prsactx->saltlen;
  1032. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_DIGEST);
  1033. if (p != NULL) {
  1034. const OSSL_PARAM *propsp =
  1035. OSSL_PARAM_locate_const(params,
  1036. OSSL_SIGNATURE_PARAM_PROPERTIES);
  1037. pmdname = mdname;
  1038. if (!OSSL_PARAM_get_utf8_string(p, &pmdname, sizeof(mdname)))
  1039. return 0;
  1040. if (propsp != NULL) {
  1041. pmdprops = mdprops;
  1042. if (!OSSL_PARAM_get_utf8_string(propsp,
  1043. &pmdprops, sizeof(mdprops)))
  1044. return 0;
  1045. }
  1046. }
  1047. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_PAD_MODE);
  1048. if (p != NULL) {
  1049. const char *err_extra_text = NULL;
  1050. switch (p->data_type) {
  1051. case OSSL_PARAM_INTEGER: /* Support for legacy pad mode number */
  1052. if (!OSSL_PARAM_get_int(p, &pad_mode))
  1053. return 0;
  1054. break;
  1055. case OSSL_PARAM_UTF8_STRING:
  1056. {
  1057. int i;
  1058. if (p->data == NULL)
  1059. return 0;
  1060. for (i = 0; padding_item[i].id != 0; i++) {
  1061. if (strcmp(p->data, padding_item[i].ptr) == 0) {
  1062. pad_mode = padding_item[i].id;
  1063. break;
  1064. }
  1065. }
  1066. }
  1067. break;
  1068. default:
  1069. return 0;
  1070. }
  1071. switch (pad_mode) {
  1072. case RSA_PKCS1_OAEP_PADDING:
  1073. /*
  1074. * OAEP padding is for asymmetric cipher only so is not compatible
  1075. * with signature use.
  1076. */
  1077. err_extra_text = "OAEP padding not allowed for signing / verifying";
  1078. goto bad_pad;
  1079. case RSA_PKCS1_PSS_PADDING:
  1080. if ((prsactx->operation
  1081. & (EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY)) == 0) {
  1082. err_extra_text =
  1083. "PSS padding only allowed for sign and verify operations";
  1084. goto bad_pad;
  1085. }
  1086. break;
  1087. case RSA_PKCS1_PADDING:
  1088. err_extra_text = "PKCS#1 padding not allowed with RSA-PSS";
  1089. goto cont;
  1090. case RSA_NO_PADDING:
  1091. err_extra_text = "No padding not allowed with RSA-PSS";
  1092. goto cont;
  1093. case RSA_X931_PADDING:
  1094. err_extra_text = "X.931 padding not allowed with RSA-PSS";
  1095. cont:
  1096. if (RSA_test_flags(prsactx->rsa,
  1097. RSA_FLAG_TYPE_MASK) == RSA_FLAG_TYPE_RSA)
  1098. break;
  1099. /* FALLTHRU */
  1100. default:
  1101. bad_pad:
  1102. if (err_extra_text == NULL)
  1103. ERR_raise(ERR_LIB_PROV,
  1104. PROV_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE);
  1105. else
  1106. ERR_raise_data(ERR_LIB_PROV,
  1107. PROV_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE,
  1108. err_extra_text);
  1109. return 0;
  1110. }
  1111. }
  1112. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_PSS_SALTLEN);
  1113. if (p != NULL) {
  1114. if (pad_mode != RSA_PKCS1_PSS_PADDING) {
  1115. ERR_raise_data(ERR_LIB_PROV, PROV_R_NOT_SUPPORTED,
  1116. "PSS saltlen can only be specified if "
  1117. "PSS padding has been specified first");
  1118. return 0;
  1119. }
  1120. switch (p->data_type) {
  1121. case OSSL_PARAM_INTEGER: /* Support for legacy pad mode number */
  1122. if (!OSSL_PARAM_get_int(p, &saltlen))
  1123. return 0;
  1124. break;
  1125. case OSSL_PARAM_UTF8_STRING:
  1126. if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_DIGEST) == 0)
  1127. saltlen = RSA_PSS_SALTLEN_DIGEST;
  1128. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_MAX) == 0)
  1129. saltlen = RSA_PSS_SALTLEN_MAX;
  1130. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO) == 0)
  1131. saltlen = RSA_PSS_SALTLEN_AUTO;
  1132. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX) == 0)
  1133. saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  1134. else
  1135. saltlen = atoi(p->data);
  1136. break;
  1137. default:
  1138. return 0;
  1139. }
  1140. /*
  1141. * RSA_PSS_SALTLEN_AUTO_DIGEST_MAX seems curiously named in this check.
  1142. * Contrary to what it's name suggests, it's the currently lowest
  1143. * saltlen number possible.
  1144. */
  1145. if (saltlen < RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) {
  1146. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
  1147. return 0;
  1148. }
  1149. if (rsa_pss_restricted(prsactx)) {
  1150. switch (saltlen) {
  1151. case RSA_PSS_SALTLEN_AUTO:
  1152. case RSA_PSS_SALTLEN_AUTO_DIGEST_MAX:
  1153. if (prsactx->operation == EVP_PKEY_OP_VERIFY) {
  1154. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH,
  1155. "Cannot use autodetected salt length");
  1156. return 0;
  1157. }
  1158. break;
  1159. case RSA_PSS_SALTLEN_DIGEST:
  1160. if (prsactx->min_saltlen > EVP_MD_get_size(prsactx->md)) {
  1161. ERR_raise_data(ERR_LIB_PROV,
  1162. PROV_R_PSS_SALTLEN_TOO_SMALL,
  1163. "Should be more than %d, but would be "
  1164. "set to match digest size (%d)",
  1165. prsactx->min_saltlen,
  1166. EVP_MD_get_size(prsactx->md));
  1167. return 0;
  1168. }
  1169. break;
  1170. default:
  1171. if (saltlen >= 0 && saltlen < prsactx->min_saltlen) {
  1172. ERR_raise_data(ERR_LIB_PROV,
  1173. PROV_R_PSS_SALTLEN_TOO_SMALL,
  1174. "Should be more than %d, "
  1175. "but would be set to %d",
  1176. prsactx->min_saltlen, saltlen);
  1177. return 0;
  1178. }
  1179. }
  1180. }
  1181. }
  1182. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_MGF1_DIGEST);
  1183. if (p != NULL) {
  1184. const OSSL_PARAM *propsp =
  1185. OSSL_PARAM_locate_const(params,
  1186. OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES);
  1187. pmgf1mdname = mgf1mdname;
  1188. if (!OSSL_PARAM_get_utf8_string(p, &pmgf1mdname, sizeof(mgf1mdname)))
  1189. return 0;
  1190. if (propsp != NULL) {
  1191. pmgf1mdprops = mgf1mdprops;
  1192. if (!OSSL_PARAM_get_utf8_string(propsp,
  1193. &pmgf1mdprops, sizeof(mgf1mdprops)))
  1194. return 0;
  1195. }
  1196. if (pad_mode != RSA_PKCS1_PSS_PADDING) {
  1197. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MGF1_MD);
  1198. return 0;
  1199. }
  1200. }
  1201. prsactx->saltlen = saltlen;
  1202. prsactx->pad_mode = pad_mode;
  1203. if (prsactx->md == NULL && pmdname == NULL
  1204. && pad_mode == RSA_PKCS1_PSS_PADDING)
  1205. pmdname = RSA_DEFAULT_DIGEST_NAME;
  1206. if (pmgf1mdname != NULL
  1207. && !rsa_setup_mgf1_md(prsactx, pmgf1mdname, pmgf1mdprops))
  1208. return 0;
  1209. if (pmdname != NULL) {
  1210. if (!rsa_setup_md(prsactx, pmdname, pmdprops))
  1211. return 0;
  1212. } else {
  1213. if (!rsa_check_padding(prsactx, NULL, NULL, prsactx->mdnid))
  1214. return 0;
  1215. }
  1216. return 1;
  1217. }
  1218. static const OSSL_PARAM settable_ctx_params[] = {
  1219. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
  1220. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PROPERTIES, NULL, 0),
  1221. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1222. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1223. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES, NULL, 0),
  1224. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1225. OSSL_PARAM_END
  1226. };
  1227. static const OSSL_PARAM settable_ctx_params_no_digest[] = {
  1228. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1229. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1230. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES, NULL, 0),
  1231. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1232. OSSL_PARAM_END
  1233. };
  1234. static const OSSL_PARAM *rsa_settable_ctx_params(void *vprsactx,
  1235. ossl_unused void *provctx)
  1236. {
  1237. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1238. if (prsactx != NULL && !prsactx->flag_allow_md)
  1239. return settable_ctx_params_no_digest;
  1240. return settable_ctx_params;
  1241. }
  1242. static int rsa_get_ctx_md_params(void *vprsactx, OSSL_PARAM *params)
  1243. {
  1244. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1245. if (prsactx->mdctx == NULL)
  1246. return 0;
  1247. return EVP_MD_CTX_get_params(prsactx->mdctx, params);
  1248. }
  1249. static const OSSL_PARAM *rsa_gettable_ctx_md_params(void *vprsactx)
  1250. {
  1251. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1252. if (prsactx->md == NULL)
  1253. return 0;
  1254. return EVP_MD_gettable_ctx_params(prsactx->md);
  1255. }
  1256. static int rsa_set_ctx_md_params(void *vprsactx, const OSSL_PARAM params[])
  1257. {
  1258. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1259. if (prsactx->mdctx == NULL)
  1260. return 0;
  1261. return EVP_MD_CTX_set_params(prsactx->mdctx, params);
  1262. }
  1263. static const OSSL_PARAM *rsa_settable_ctx_md_params(void *vprsactx)
  1264. {
  1265. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1266. if (prsactx->md == NULL)
  1267. return 0;
  1268. return EVP_MD_settable_ctx_params(prsactx->md);
  1269. }
  1270. const OSSL_DISPATCH ossl_rsa_signature_functions[] = {
  1271. { OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))rsa_newctx },
  1272. { OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))rsa_sign_init },
  1273. { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign },
  1274. { OSSL_FUNC_SIGNATURE_VERIFY_INIT, (void (*)(void))rsa_verify_init },
  1275. { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))rsa_verify },
  1276. { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER_INIT,
  1277. (void (*)(void))rsa_verify_recover_init },
  1278. { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER,
  1279. (void (*)(void))rsa_verify_recover },
  1280. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,
  1281. (void (*)(void))rsa_digest_sign_init },
  1282. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE,
  1283. (void (*)(void))rsa_digest_signverify_update },
  1284. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL,
  1285. (void (*)(void))rsa_digest_sign_final },
  1286. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,
  1287. (void (*)(void))rsa_digest_verify_init },
  1288. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE,
  1289. (void (*)(void))rsa_digest_signverify_update },
  1290. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL,
  1291. (void (*)(void))rsa_digest_verify_final },
  1292. { OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))rsa_freectx },
  1293. { OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))rsa_dupctx },
  1294. { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS, (void (*)(void))rsa_get_ctx_params },
  1295. { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS,
  1296. (void (*)(void))rsa_gettable_ctx_params },
  1297. { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, (void (*)(void))rsa_set_ctx_params },
  1298. { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS,
  1299. (void (*)(void))rsa_settable_ctx_params },
  1300. { OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS,
  1301. (void (*)(void))rsa_get_ctx_md_params },
  1302. { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS,
  1303. (void (*)(void))rsa_gettable_ctx_md_params },
  1304. { OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS,
  1305. (void (*)(void))rsa_set_ctx_md_params },
  1306. { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS,
  1307. (void (*)(void))rsa_settable_ctx_md_params },
  1308. OSSL_DISPATCH_END
  1309. };