rsa_sig.c 50 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509
  1. /*
  2. * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. /*
  10. * RSA low level APIs are deprecated for public use, but still ok for
  11. * internal use.
  12. */
  13. #include "internal/deprecated.h"
  14. #include <string.h>
  15. #include <openssl/crypto.h>
  16. #include <openssl/core_dispatch.h>
  17. #include <openssl/core_names.h>
  18. #include <openssl/err.h>
  19. #include <openssl/rsa.h>
  20. #include <openssl/params.h>
  21. #include <openssl/evp.h>
  22. #include <openssl/proverr.h>
  23. #include "internal/cryptlib.h"
  24. #include "internal/nelem.h"
  25. #include "internal/sizes.h"
  26. #include "crypto/rsa.h"
  27. #include "prov/providercommon.h"
  28. #include "prov/implementations.h"
  29. #include "prov/provider_ctx.h"
  30. #include "prov/der_rsa.h"
  31. #include "prov/securitycheck.h"
  32. #define RSA_DEFAULT_DIGEST_NAME OSSL_DIGEST_NAME_SHA1
  33. static OSSL_FUNC_signature_newctx_fn rsa_newctx;
  34. static OSSL_FUNC_signature_sign_init_fn rsa_sign_init;
  35. static OSSL_FUNC_signature_verify_init_fn rsa_verify_init;
  36. static OSSL_FUNC_signature_verify_recover_init_fn rsa_verify_recover_init;
  37. static OSSL_FUNC_signature_sign_fn rsa_sign;
  38. static OSSL_FUNC_signature_verify_fn rsa_verify;
  39. static OSSL_FUNC_signature_verify_recover_fn rsa_verify_recover;
  40. static OSSL_FUNC_signature_digest_sign_init_fn rsa_digest_sign_init;
  41. static OSSL_FUNC_signature_digest_sign_update_fn rsa_digest_signverify_update;
  42. static OSSL_FUNC_signature_digest_sign_final_fn rsa_digest_sign_final;
  43. static OSSL_FUNC_signature_digest_verify_init_fn rsa_digest_verify_init;
  44. static OSSL_FUNC_signature_digest_verify_update_fn rsa_digest_signverify_update;
  45. static OSSL_FUNC_signature_digest_verify_final_fn rsa_digest_verify_final;
  46. static OSSL_FUNC_signature_freectx_fn rsa_freectx;
  47. static OSSL_FUNC_signature_dupctx_fn rsa_dupctx;
  48. static OSSL_FUNC_signature_get_ctx_params_fn rsa_get_ctx_params;
  49. static OSSL_FUNC_signature_gettable_ctx_params_fn rsa_gettable_ctx_params;
  50. static OSSL_FUNC_signature_set_ctx_params_fn rsa_set_ctx_params;
  51. static OSSL_FUNC_signature_settable_ctx_params_fn rsa_settable_ctx_params;
  52. static OSSL_FUNC_signature_get_ctx_md_params_fn rsa_get_ctx_md_params;
  53. static OSSL_FUNC_signature_gettable_ctx_md_params_fn rsa_gettable_ctx_md_params;
  54. static OSSL_FUNC_signature_set_ctx_md_params_fn rsa_set_ctx_md_params;
  55. static OSSL_FUNC_signature_settable_ctx_md_params_fn rsa_settable_ctx_md_params;
  56. static OSSL_ITEM padding_item[] = {
  57. { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 },
  58. { RSA_NO_PADDING, OSSL_PKEY_RSA_PAD_MODE_NONE },
  59. { RSA_X931_PADDING, OSSL_PKEY_RSA_PAD_MODE_X931 },
  60. { RSA_PKCS1_PSS_PADDING, OSSL_PKEY_RSA_PAD_MODE_PSS },
  61. { 0, NULL }
  62. };
  63. /*
  64. * What's passed as an actual key is defined by the KEYMGMT interface.
  65. * We happen to know that our KEYMGMT simply passes RSA structures, so
  66. * we use that here too.
  67. */
  68. typedef struct {
  69. OSSL_LIB_CTX *libctx;
  70. char *propq;
  71. RSA *rsa;
  72. int operation;
  73. /*
  74. * Flag to determine if the hash function can be changed (1) or not (0)
  75. * Because it's dangerous to change during a DigestSign or DigestVerify
  76. * operation, this flag is cleared by their Init function, and set again
  77. * by their Final function.
  78. */
  79. unsigned int flag_allow_md : 1;
  80. unsigned int mgf1_md_set : 1;
  81. /* main digest */
  82. EVP_MD *md;
  83. EVP_MD_CTX *mdctx;
  84. int mdnid;
  85. char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */
  86. /* RSA padding mode */
  87. int pad_mode;
  88. /* message digest for MGF1 */
  89. EVP_MD *mgf1_md;
  90. int mgf1_mdnid;
  91. char mgf1_mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */
  92. /* PSS salt length */
  93. int saltlen;
  94. /* Minimum salt length or -1 if no PSS parameter restriction */
  95. int min_saltlen;
  96. /* Temp buffer */
  97. unsigned char *tbuf;
  98. } PROV_RSA_CTX;
  99. /* True if PSS parameters are restricted */
  100. #define rsa_pss_restricted(prsactx) (prsactx->min_saltlen != -1)
  101. static size_t rsa_get_md_size(const PROV_RSA_CTX *prsactx)
  102. {
  103. if (prsactx->md != NULL)
  104. return EVP_MD_get_size(prsactx->md);
  105. return 0;
  106. }
  107. static int rsa_check_padding(const PROV_RSA_CTX *prsactx,
  108. const char *mdname, const char *mgf1_mdname,
  109. int mdnid)
  110. {
  111. switch (prsactx->pad_mode) {
  112. case RSA_NO_PADDING:
  113. if (mdname != NULL || mdnid != NID_undef) {
  114. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE);
  115. return 0;
  116. }
  117. break;
  118. case RSA_X931_PADDING:
  119. if (RSA_X931_hash_id(mdnid) == -1) {
  120. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_X931_DIGEST);
  121. return 0;
  122. }
  123. break;
  124. case RSA_PKCS1_PSS_PADDING:
  125. if (rsa_pss_restricted(prsactx))
  126. if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
  127. || (mgf1_mdname != NULL
  128. && !EVP_MD_is_a(prsactx->mgf1_md, mgf1_mdname))) {
  129. ERR_raise(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED);
  130. return 0;
  131. }
  132. break;
  133. default:
  134. break;
  135. }
  136. return 1;
  137. }
  138. static int rsa_check_parameters(PROV_RSA_CTX *prsactx, int min_saltlen)
  139. {
  140. if (prsactx->pad_mode == RSA_PKCS1_PSS_PADDING) {
  141. int max_saltlen;
  142. /* See if minimum salt length exceeds maximum possible */
  143. max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md);
  144. if ((RSA_bits(prsactx->rsa) & 0x7) == 1)
  145. max_saltlen--;
  146. if (min_saltlen < 0 || min_saltlen > max_saltlen) {
  147. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
  148. return 0;
  149. }
  150. prsactx->min_saltlen = min_saltlen;
  151. }
  152. return 1;
  153. }
  154. static void *rsa_newctx(void *provctx, const char *propq)
  155. {
  156. PROV_RSA_CTX *prsactx = NULL;
  157. char *propq_copy = NULL;
  158. if (!ossl_prov_is_running())
  159. return NULL;
  160. if ((prsactx = OPENSSL_zalloc(sizeof(PROV_RSA_CTX))) == NULL
  161. || (propq != NULL
  162. && (propq_copy = OPENSSL_strdup(propq)) == NULL)) {
  163. OPENSSL_free(prsactx);
  164. return NULL;
  165. }
  166. prsactx->libctx = PROV_LIBCTX_OF(provctx);
  167. prsactx->flag_allow_md = 1;
  168. prsactx->propq = propq_copy;
  169. /* Maximum up to digest length for sign, auto for verify */
  170. prsactx->saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  171. prsactx->min_saltlen = -1;
  172. return prsactx;
  173. }
  174. static int rsa_pss_compute_saltlen(PROV_RSA_CTX *ctx)
  175. {
  176. int saltlen = ctx->saltlen;
  177. int saltlenMax = -1;
  178. /* FIPS 186-4 section 5 "The RSA Digital Signature Algorithm", subsection
  179. * 5.5 "PKCS #1" says: "For RSASSA-PSS […] the length (in bytes) of the
  180. * salt (sLen) shall satisfy 0 <= sLen <= hLen, where hLen is the length of
  181. * the hash function output block (in bytes)."
  182. *
  183. * Provide a way to use at most the digest length, so that the default does
  184. * not violate FIPS 186-4. */
  185. if (saltlen == RSA_PSS_SALTLEN_DIGEST) {
  186. if ((saltlen = EVP_MD_get_size(ctx->md)) <= 0) {
  187. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST);
  188. return -1;
  189. }
  190. } else if (saltlen == RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) {
  191. saltlen = RSA_PSS_SALTLEN_MAX;
  192. if ((saltlenMax = EVP_MD_get_size(ctx->md)) <= 0) {
  193. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST);
  194. return -1;
  195. }
  196. }
  197. if (saltlen == RSA_PSS_SALTLEN_MAX || saltlen == RSA_PSS_SALTLEN_AUTO) {
  198. int mdsize, rsasize;
  199. if ((mdsize = EVP_MD_get_size(ctx->md)) <= 0) {
  200. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST);
  201. return -1;
  202. }
  203. if ((rsasize = RSA_size(ctx->rsa)) <= 2 || rsasize - 2 < mdsize) {
  204. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
  205. return -1;
  206. }
  207. saltlen = rsasize - mdsize - 2;
  208. if ((RSA_bits(ctx->rsa) & 0x7) == 1)
  209. saltlen--;
  210. if (saltlenMax >= 0 && saltlen > saltlenMax)
  211. saltlen = saltlenMax;
  212. }
  213. if (saltlen < 0) {
  214. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  215. return -1;
  216. } else if (saltlen < ctx->min_saltlen) {
  217. ERR_raise_data(ERR_LIB_PROV, PROV_R_PSS_SALTLEN_TOO_SMALL,
  218. "minimum salt length: %d, actual salt length: %d",
  219. ctx->min_saltlen, saltlen);
  220. return -1;
  221. }
  222. return saltlen;
  223. }
  224. static unsigned char *rsa_generate_signature_aid(PROV_RSA_CTX *ctx,
  225. unsigned char *aid_buf,
  226. size_t buf_len,
  227. size_t *aid_len)
  228. {
  229. WPACKET pkt;
  230. unsigned char *aid = NULL;
  231. int saltlen;
  232. RSA_PSS_PARAMS_30 pss_params;
  233. int ret;
  234. if (!WPACKET_init_der(&pkt, aid_buf, buf_len)) {
  235. ERR_raise(ERR_LIB_PROV, ERR_R_CRYPTO_LIB);
  236. return NULL;
  237. }
  238. switch (ctx->pad_mode) {
  239. case RSA_PKCS1_PADDING:
  240. ret = ossl_DER_w_algorithmIdentifier_MDWithRSAEncryption(&pkt, -1,
  241. ctx->mdnid);
  242. if (ret > 0) {
  243. break;
  244. } else if (ret == 0) {
  245. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  246. goto cleanup;
  247. }
  248. ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
  249. "Algorithm ID generation - md NID: %d",
  250. ctx->mdnid);
  251. goto cleanup;
  252. case RSA_PKCS1_PSS_PADDING:
  253. saltlen = rsa_pss_compute_saltlen(ctx);
  254. if (saltlen < 0)
  255. goto cleanup;
  256. if (!ossl_rsa_pss_params_30_set_defaults(&pss_params)
  257. || !ossl_rsa_pss_params_30_set_hashalg(&pss_params, ctx->mdnid)
  258. || !ossl_rsa_pss_params_30_set_maskgenhashalg(&pss_params,
  259. ctx->mgf1_mdnid)
  260. || !ossl_rsa_pss_params_30_set_saltlen(&pss_params, saltlen)
  261. || !ossl_DER_w_algorithmIdentifier_RSA_PSS(&pkt, -1,
  262. RSA_FLAG_TYPE_RSASSAPSS,
  263. &pss_params)) {
  264. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  265. goto cleanup;
  266. }
  267. break;
  268. default:
  269. ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
  270. "Algorithm ID generation - pad mode: %d",
  271. ctx->pad_mode);
  272. goto cleanup;
  273. }
  274. if (WPACKET_finish(&pkt)) {
  275. WPACKET_get_total_written(&pkt, aid_len);
  276. aid = WPACKET_get_curr(&pkt);
  277. }
  278. cleanup:
  279. WPACKET_cleanup(&pkt);
  280. return aid;
  281. }
  282. static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname,
  283. const char *mdprops)
  284. {
  285. if (mdprops == NULL)
  286. mdprops = ctx->propq;
  287. if (mdname != NULL) {
  288. EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
  289. int sha1_allowed = (ctx->operation != EVP_PKEY_OP_SIGN);
  290. int md_nid = ossl_digest_rsa_sign_get_md_nid(ctx->libctx, md,
  291. sha1_allowed);
  292. size_t mdname_len = strlen(mdname);
  293. if (md == NULL
  294. || md_nid <= 0
  295. || !rsa_check_padding(ctx, mdname, NULL, md_nid)
  296. || mdname_len >= sizeof(ctx->mdname)) {
  297. if (md == NULL)
  298. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  299. "%s could not be fetched", mdname);
  300. if (md_nid <= 0)
  301. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  302. "digest=%s", mdname);
  303. if (mdname_len >= sizeof(ctx->mdname))
  304. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  305. "%s exceeds name buffer length", mdname);
  306. EVP_MD_free(md);
  307. return 0;
  308. }
  309. if (!ctx->flag_allow_md) {
  310. if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) {
  311. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  312. "digest %s != %s", mdname, ctx->mdname);
  313. EVP_MD_free(md);
  314. return 0;
  315. }
  316. EVP_MD_free(md);
  317. return 1;
  318. }
  319. if (!ctx->mgf1_md_set) {
  320. if (!EVP_MD_up_ref(md)) {
  321. EVP_MD_free(md);
  322. return 0;
  323. }
  324. EVP_MD_free(ctx->mgf1_md);
  325. ctx->mgf1_md = md;
  326. ctx->mgf1_mdnid = md_nid;
  327. OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
  328. }
  329. EVP_MD_CTX_free(ctx->mdctx);
  330. EVP_MD_free(ctx->md);
  331. ctx->mdctx = NULL;
  332. ctx->md = md;
  333. ctx->mdnid = md_nid;
  334. OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname));
  335. }
  336. return 1;
  337. }
  338. static int rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname,
  339. const char *mdprops)
  340. {
  341. size_t len;
  342. EVP_MD *md = NULL;
  343. int mdnid;
  344. if (mdprops == NULL)
  345. mdprops = ctx->propq;
  346. if ((md = EVP_MD_fetch(ctx->libctx, mdname, mdprops)) == NULL) {
  347. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  348. "%s could not be fetched", mdname);
  349. return 0;
  350. }
  351. /* The default for mgf1 is SHA1 - so allow SHA1 */
  352. if ((mdnid = ossl_digest_rsa_sign_get_md_nid(ctx->libctx, md, 1)) <= 0
  353. || !rsa_check_padding(ctx, NULL, mdname, mdnid)) {
  354. if (mdnid <= 0)
  355. ERR_raise_data(ERR_LIB_PROV, PROV_R_DIGEST_NOT_ALLOWED,
  356. "digest=%s", mdname);
  357. EVP_MD_free(md);
  358. return 0;
  359. }
  360. len = OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
  361. if (len >= sizeof(ctx->mgf1_mdname)) {
  362. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  363. "%s exceeds name buffer length", mdname);
  364. EVP_MD_free(md);
  365. return 0;
  366. }
  367. EVP_MD_free(ctx->mgf1_md);
  368. ctx->mgf1_md = md;
  369. ctx->mgf1_mdnid = mdnid;
  370. ctx->mgf1_md_set = 1;
  371. return 1;
  372. }
  373. static int rsa_signverify_init(void *vprsactx, void *vrsa,
  374. const OSSL_PARAM params[], int operation)
  375. {
  376. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  377. if (!ossl_prov_is_running() || prsactx == NULL)
  378. return 0;
  379. if (vrsa == NULL && prsactx->rsa == NULL) {
  380. ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
  381. return 0;
  382. }
  383. if (vrsa != NULL) {
  384. if (!ossl_rsa_check_key(prsactx->libctx, vrsa, operation))
  385. return 0;
  386. if (!RSA_up_ref(vrsa))
  387. return 0;
  388. RSA_free(prsactx->rsa);
  389. prsactx->rsa = vrsa;
  390. }
  391. prsactx->operation = operation;
  392. /* Maximize up to digest length for sign, auto for verify */
  393. prsactx->saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  394. prsactx->min_saltlen = -1;
  395. switch (RSA_test_flags(prsactx->rsa, RSA_FLAG_TYPE_MASK)) {
  396. case RSA_FLAG_TYPE_RSA:
  397. prsactx->pad_mode = RSA_PKCS1_PADDING;
  398. break;
  399. case RSA_FLAG_TYPE_RSASSAPSS:
  400. prsactx->pad_mode = RSA_PKCS1_PSS_PADDING;
  401. {
  402. const RSA_PSS_PARAMS_30 *pss =
  403. ossl_rsa_get0_pss_params_30(prsactx->rsa);
  404. if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) {
  405. int md_nid = ossl_rsa_pss_params_30_hashalg(pss);
  406. int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss);
  407. int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss);
  408. const char *mdname, *mgf1mdname;
  409. size_t len;
  410. mdname = ossl_rsa_oaeppss_nid2name(md_nid);
  411. mgf1mdname = ossl_rsa_oaeppss_nid2name(mgf1md_nid);
  412. if (mdname == NULL) {
  413. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  414. "PSS restrictions lack hash algorithm");
  415. return 0;
  416. }
  417. if (mgf1mdname == NULL) {
  418. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  419. "PSS restrictions lack MGF1 hash algorithm");
  420. return 0;
  421. }
  422. len = OPENSSL_strlcpy(prsactx->mdname, mdname,
  423. sizeof(prsactx->mdname));
  424. if (len >= sizeof(prsactx->mdname)) {
  425. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  426. "hash algorithm name too long");
  427. return 0;
  428. }
  429. len = OPENSSL_strlcpy(prsactx->mgf1_mdname, mgf1mdname,
  430. sizeof(prsactx->mgf1_mdname));
  431. if (len >= sizeof(prsactx->mgf1_mdname)) {
  432. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
  433. "MGF1 hash algorithm name too long");
  434. return 0;
  435. }
  436. prsactx->saltlen = min_saltlen;
  437. /* call rsa_setup_mgf1_md before rsa_setup_md to avoid duplication */
  438. if (!rsa_setup_mgf1_md(prsactx, mgf1mdname, prsactx->propq)
  439. || !rsa_setup_md(prsactx, mdname, prsactx->propq)
  440. || !rsa_check_parameters(prsactx, min_saltlen))
  441. return 0;
  442. }
  443. }
  444. break;
  445. default:
  446. ERR_raise(ERR_LIB_RSA, PROV_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  447. return 0;
  448. }
  449. if (!rsa_set_ctx_params(prsactx, params))
  450. return 0;
  451. return 1;
  452. }
  453. static int setup_tbuf(PROV_RSA_CTX *ctx)
  454. {
  455. if (ctx->tbuf != NULL)
  456. return 1;
  457. if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL)
  458. return 0;
  459. return 1;
  460. }
  461. static void clean_tbuf(PROV_RSA_CTX *ctx)
  462. {
  463. if (ctx->tbuf != NULL)
  464. OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa));
  465. }
  466. static void free_tbuf(PROV_RSA_CTX *ctx)
  467. {
  468. clean_tbuf(ctx);
  469. OPENSSL_free(ctx->tbuf);
  470. ctx->tbuf = NULL;
  471. }
  472. static int rsa_sign_init(void *vprsactx, void *vrsa, const OSSL_PARAM params[])
  473. {
  474. if (!ossl_prov_is_running())
  475. return 0;
  476. return rsa_signverify_init(vprsactx, vrsa, params, EVP_PKEY_OP_SIGN);
  477. }
  478. static int rsa_sign(void *vprsactx, unsigned char *sig, size_t *siglen,
  479. size_t sigsize, const unsigned char *tbs, size_t tbslen)
  480. {
  481. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  482. int ret;
  483. size_t rsasize = RSA_size(prsactx->rsa);
  484. size_t mdsize = rsa_get_md_size(prsactx);
  485. if (!ossl_prov_is_running())
  486. return 0;
  487. if (sig == NULL) {
  488. *siglen = rsasize;
  489. return 1;
  490. }
  491. if (sigsize < rsasize) {
  492. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SIGNATURE_SIZE,
  493. "is %zu, should be at least %zu", sigsize, rsasize);
  494. return 0;
  495. }
  496. if (mdsize != 0) {
  497. if (tbslen != mdsize) {
  498. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH);
  499. return 0;
  500. }
  501. #ifndef FIPS_MODULE
  502. if (EVP_MD_is_a(prsactx->md, OSSL_DIGEST_NAME_MDC2)) {
  503. unsigned int sltmp;
  504. if (prsactx->pad_mode != RSA_PKCS1_PADDING) {
  505. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  506. "only PKCS#1 padding supported with MDC2");
  507. return 0;
  508. }
  509. ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp,
  510. prsactx->rsa);
  511. if (ret <= 0) {
  512. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  513. return 0;
  514. }
  515. ret = sltmp;
  516. goto end;
  517. }
  518. #endif
  519. switch (prsactx->pad_mode) {
  520. case RSA_X931_PADDING:
  521. if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) {
  522. ERR_raise_data(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL,
  523. "RSA key size = %d, expected minimum = %d",
  524. RSA_size(prsactx->rsa), tbslen + 1);
  525. return 0;
  526. }
  527. if (!setup_tbuf(prsactx)) {
  528. ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB);
  529. return 0;
  530. }
  531. memcpy(prsactx->tbuf, tbs, tbslen);
  532. prsactx->tbuf[tbslen] = RSA_X931_hash_id(prsactx->mdnid);
  533. ret = RSA_private_encrypt(tbslen + 1, prsactx->tbuf,
  534. sig, prsactx->rsa, RSA_X931_PADDING);
  535. clean_tbuf(prsactx);
  536. break;
  537. case RSA_PKCS1_PADDING:
  538. {
  539. unsigned int sltmp;
  540. ret = RSA_sign(prsactx->mdnid, tbs, tbslen, sig, &sltmp,
  541. prsactx->rsa);
  542. if (ret <= 0) {
  543. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  544. return 0;
  545. }
  546. ret = sltmp;
  547. }
  548. break;
  549. case RSA_PKCS1_PSS_PADDING:
  550. /* Check PSS restrictions */
  551. if (rsa_pss_restricted(prsactx)) {
  552. switch (prsactx->saltlen) {
  553. case RSA_PSS_SALTLEN_DIGEST:
  554. if (prsactx->min_saltlen > EVP_MD_get_size(prsactx->md)) {
  555. ERR_raise_data(ERR_LIB_PROV,
  556. PROV_R_PSS_SALTLEN_TOO_SMALL,
  557. "minimum salt length set to %d, "
  558. "but the digest only gives %d",
  559. prsactx->min_saltlen,
  560. EVP_MD_get_size(prsactx->md));
  561. return 0;
  562. }
  563. /* FALLTHRU */
  564. default:
  565. if (prsactx->saltlen >= 0
  566. && prsactx->saltlen < prsactx->min_saltlen) {
  567. ERR_raise_data(ERR_LIB_PROV,
  568. PROV_R_PSS_SALTLEN_TOO_SMALL,
  569. "minimum salt length set to %d, but the"
  570. "actual salt length is only set to %d",
  571. prsactx->min_saltlen,
  572. prsactx->saltlen);
  573. return 0;
  574. }
  575. break;
  576. }
  577. }
  578. if (!setup_tbuf(prsactx))
  579. return 0;
  580. if (!RSA_padding_add_PKCS1_PSS_mgf1(prsactx->rsa,
  581. prsactx->tbuf, tbs,
  582. prsactx->md, prsactx->mgf1_md,
  583. prsactx->saltlen)) {
  584. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  585. return 0;
  586. }
  587. ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf,
  588. sig, prsactx->rsa, RSA_NO_PADDING);
  589. clean_tbuf(prsactx);
  590. break;
  591. default:
  592. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  593. "Only X.931, PKCS#1 v1.5 or PSS padding allowed");
  594. return 0;
  595. }
  596. } else {
  597. ret = RSA_private_encrypt(tbslen, tbs, sig, prsactx->rsa,
  598. prsactx->pad_mode);
  599. }
  600. #ifndef FIPS_MODULE
  601. end:
  602. #endif
  603. if (ret <= 0) {
  604. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  605. return 0;
  606. }
  607. *siglen = ret;
  608. return 1;
  609. }
  610. static int rsa_verify_recover_init(void *vprsactx, void *vrsa,
  611. const OSSL_PARAM params[])
  612. {
  613. if (!ossl_prov_is_running())
  614. return 0;
  615. return rsa_signverify_init(vprsactx, vrsa, params,
  616. EVP_PKEY_OP_VERIFYRECOVER);
  617. }
  618. static int rsa_verify_recover(void *vprsactx,
  619. unsigned char *rout,
  620. size_t *routlen,
  621. size_t routsize,
  622. const unsigned char *sig,
  623. size_t siglen)
  624. {
  625. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  626. int ret;
  627. if (!ossl_prov_is_running())
  628. return 0;
  629. if (rout == NULL) {
  630. *routlen = RSA_size(prsactx->rsa);
  631. return 1;
  632. }
  633. if (prsactx->md != NULL) {
  634. switch (prsactx->pad_mode) {
  635. case RSA_X931_PADDING:
  636. if (!setup_tbuf(prsactx))
  637. return 0;
  638. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf, prsactx->rsa,
  639. RSA_X931_PADDING);
  640. if (ret <= 0) {
  641. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  642. return 0;
  643. }
  644. ret--;
  645. if (prsactx->tbuf[ret] != RSA_X931_hash_id(prsactx->mdnid)) {
  646. ERR_raise(ERR_LIB_PROV, PROV_R_ALGORITHM_MISMATCH);
  647. return 0;
  648. }
  649. if (ret != EVP_MD_get_size(prsactx->md)) {
  650. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH,
  651. "Should be %d, but got %d",
  652. EVP_MD_get_size(prsactx->md), ret);
  653. return 0;
  654. }
  655. *routlen = ret;
  656. if (rout != prsactx->tbuf) {
  657. if (routsize < (size_t)ret) {
  658. ERR_raise_data(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL,
  659. "buffer size is %d, should be %d",
  660. routsize, ret);
  661. return 0;
  662. }
  663. memcpy(rout, prsactx->tbuf, ret);
  664. }
  665. break;
  666. case RSA_PKCS1_PADDING:
  667. {
  668. size_t sltmp;
  669. ret = ossl_rsa_verify(prsactx->mdnid, NULL, 0, rout, &sltmp,
  670. sig, siglen, prsactx->rsa);
  671. if (ret <= 0) {
  672. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  673. return 0;
  674. }
  675. ret = sltmp;
  676. }
  677. break;
  678. default:
  679. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  680. "Only X.931 or PKCS#1 v1.5 padding allowed");
  681. return 0;
  682. }
  683. } else {
  684. ret = RSA_public_decrypt(siglen, sig, rout, prsactx->rsa,
  685. prsactx->pad_mode);
  686. if (ret <= 0) {
  687. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  688. return 0;
  689. }
  690. }
  691. *routlen = ret;
  692. return 1;
  693. }
  694. static int rsa_verify_init(void *vprsactx, void *vrsa,
  695. const OSSL_PARAM params[])
  696. {
  697. if (!ossl_prov_is_running())
  698. return 0;
  699. return rsa_signverify_init(vprsactx, vrsa, params, EVP_PKEY_OP_VERIFY);
  700. }
  701. static int rsa_verify(void *vprsactx, const unsigned char *sig, size_t siglen,
  702. const unsigned char *tbs, size_t tbslen)
  703. {
  704. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  705. size_t rslen;
  706. if (!ossl_prov_is_running())
  707. return 0;
  708. if (prsactx->md != NULL) {
  709. switch (prsactx->pad_mode) {
  710. case RSA_PKCS1_PADDING:
  711. if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen,
  712. prsactx->rsa)) {
  713. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  714. return 0;
  715. }
  716. return 1;
  717. case RSA_X931_PADDING:
  718. if (!setup_tbuf(prsactx))
  719. return 0;
  720. if (rsa_verify_recover(prsactx, prsactx->tbuf, &rslen, 0,
  721. sig, siglen) <= 0)
  722. return 0;
  723. break;
  724. case RSA_PKCS1_PSS_PADDING:
  725. {
  726. int ret;
  727. size_t mdsize;
  728. /*
  729. * We need to check this for the RSA_verify_PKCS1_PSS_mgf1()
  730. * call
  731. */
  732. mdsize = rsa_get_md_size(prsactx);
  733. if (tbslen != mdsize) {
  734. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH,
  735. "Should be %d, but got %d",
  736. mdsize, tbslen);
  737. return 0;
  738. }
  739. if (!setup_tbuf(prsactx))
  740. return 0;
  741. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf,
  742. prsactx->rsa, RSA_NO_PADDING);
  743. if (ret <= 0) {
  744. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  745. return 0;
  746. }
  747. ret = RSA_verify_PKCS1_PSS_mgf1(prsactx->rsa, tbs,
  748. prsactx->md, prsactx->mgf1_md,
  749. prsactx->tbuf,
  750. prsactx->saltlen);
  751. if (ret <= 0) {
  752. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  753. return 0;
  754. }
  755. return 1;
  756. }
  757. default:
  758. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_PADDING_MODE,
  759. "Only X.931, PKCS#1 v1.5 or PSS padding allowed");
  760. return 0;
  761. }
  762. } else {
  763. int ret;
  764. if (!setup_tbuf(prsactx))
  765. return 0;
  766. ret = RSA_public_decrypt(siglen, sig, prsactx->tbuf, prsactx->rsa,
  767. prsactx->pad_mode);
  768. if (ret <= 0) {
  769. ERR_raise(ERR_LIB_PROV, ERR_R_RSA_LIB);
  770. return 0;
  771. }
  772. rslen = (size_t)ret;
  773. }
  774. if ((rslen != tbslen) || memcmp(tbs, prsactx->tbuf, rslen))
  775. return 0;
  776. return 1;
  777. }
  778. static int rsa_digest_signverify_init(void *vprsactx, const char *mdname,
  779. void *vrsa, const OSSL_PARAM params[],
  780. int operation)
  781. {
  782. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  783. if (!ossl_prov_is_running())
  784. return 0;
  785. if (!rsa_signverify_init(vprsactx, vrsa, params, operation))
  786. return 0;
  787. if (mdname != NULL
  788. /* was rsa_setup_md already called in rsa_signverify_init()? */
  789. && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0)
  790. && !rsa_setup_md(prsactx, mdname, prsactx->propq))
  791. return 0;
  792. prsactx->flag_allow_md = 0;
  793. if (prsactx->mdctx == NULL) {
  794. prsactx->mdctx = EVP_MD_CTX_new();
  795. if (prsactx->mdctx == NULL)
  796. goto error;
  797. }
  798. if (!EVP_DigestInit_ex2(prsactx->mdctx, prsactx->md, params))
  799. goto error;
  800. return 1;
  801. error:
  802. EVP_MD_CTX_free(prsactx->mdctx);
  803. prsactx->mdctx = NULL;
  804. return 0;
  805. }
  806. static int rsa_digest_signverify_update(void *vprsactx,
  807. const unsigned char *data,
  808. size_t datalen)
  809. {
  810. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  811. if (prsactx == NULL || prsactx->mdctx == NULL)
  812. return 0;
  813. return EVP_DigestUpdate(prsactx->mdctx, data, datalen);
  814. }
  815. static int rsa_digest_sign_init(void *vprsactx, const char *mdname,
  816. void *vrsa, const OSSL_PARAM params[])
  817. {
  818. if (!ossl_prov_is_running())
  819. return 0;
  820. return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
  821. params, EVP_PKEY_OP_SIGN);
  822. }
  823. static int rsa_digest_sign_final(void *vprsactx, unsigned char *sig,
  824. size_t *siglen, size_t sigsize)
  825. {
  826. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  827. unsigned char digest[EVP_MAX_MD_SIZE];
  828. unsigned int dlen = 0;
  829. if (!ossl_prov_is_running() || prsactx == NULL)
  830. return 0;
  831. prsactx->flag_allow_md = 1;
  832. if (prsactx->mdctx == NULL)
  833. return 0;
  834. /*
  835. * If sig is NULL then we're just finding out the sig size. Other fields
  836. * are ignored. Defer to rsa_sign.
  837. */
  838. if (sig != NULL) {
  839. /*
  840. * The digests used here are all known (see rsa_get_md_nid()), so they
  841. * should not exceed the internal buffer size of EVP_MAX_MD_SIZE.
  842. */
  843. if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen))
  844. return 0;
  845. }
  846. return rsa_sign(vprsactx, sig, siglen, sigsize, digest, (size_t)dlen);
  847. }
  848. static int rsa_digest_verify_init(void *vprsactx, const char *mdname,
  849. void *vrsa, const OSSL_PARAM params[])
  850. {
  851. if (!ossl_prov_is_running())
  852. return 0;
  853. return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
  854. params, EVP_PKEY_OP_VERIFY);
  855. }
  856. int rsa_digest_verify_final(void *vprsactx, const unsigned char *sig,
  857. size_t siglen)
  858. {
  859. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  860. unsigned char digest[EVP_MAX_MD_SIZE];
  861. unsigned int dlen = 0;
  862. if (!ossl_prov_is_running())
  863. return 0;
  864. if (prsactx == NULL)
  865. return 0;
  866. prsactx->flag_allow_md = 1;
  867. if (prsactx->mdctx == NULL)
  868. return 0;
  869. /*
  870. * The digests used here are all known (see rsa_get_md_nid()), so they
  871. * should not exceed the internal buffer size of EVP_MAX_MD_SIZE.
  872. */
  873. if (!EVP_DigestFinal_ex(prsactx->mdctx, digest, &dlen))
  874. return 0;
  875. return rsa_verify(vprsactx, sig, siglen, digest, (size_t)dlen);
  876. }
  877. static void rsa_freectx(void *vprsactx)
  878. {
  879. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  880. if (prsactx == NULL)
  881. return;
  882. EVP_MD_CTX_free(prsactx->mdctx);
  883. EVP_MD_free(prsactx->md);
  884. EVP_MD_free(prsactx->mgf1_md);
  885. OPENSSL_free(prsactx->propq);
  886. free_tbuf(prsactx);
  887. RSA_free(prsactx->rsa);
  888. OPENSSL_clear_free(prsactx, sizeof(*prsactx));
  889. }
  890. static void *rsa_dupctx(void *vprsactx)
  891. {
  892. PROV_RSA_CTX *srcctx = (PROV_RSA_CTX *)vprsactx;
  893. PROV_RSA_CTX *dstctx;
  894. if (!ossl_prov_is_running())
  895. return NULL;
  896. dstctx = OPENSSL_zalloc(sizeof(*srcctx));
  897. if (dstctx == NULL)
  898. return NULL;
  899. *dstctx = *srcctx;
  900. dstctx->rsa = NULL;
  901. dstctx->md = NULL;
  902. dstctx->mgf1_md = NULL;
  903. dstctx->mdctx = NULL;
  904. dstctx->tbuf = NULL;
  905. dstctx->propq = NULL;
  906. if (srcctx->rsa != NULL && !RSA_up_ref(srcctx->rsa))
  907. goto err;
  908. dstctx->rsa = srcctx->rsa;
  909. if (srcctx->md != NULL && !EVP_MD_up_ref(srcctx->md))
  910. goto err;
  911. dstctx->md = srcctx->md;
  912. if (srcctx->mgf1_md != NULL && !EVP_MD_up_ref(srcctx->mgf1_md))
  913. goto err;
  914. dstctx->mgf1_md = srcctx->mgf1_md;
  915. if (srcctx->mdctx != NULL) {
  916. dstctx->mdctx = EVP_MD_CTX_new();
  917. if (dstctx->mdctx == NULL
  918. || !EVP_MD_CTX_copy_ex(dstctx->mdctx, srcctx->mdctx))
  919. goto err;
  920. }
  921. if (srcctx->propq != NULL) {
  922. dstctx->propq = OPENSSL_strdup(srcctx->propq);
  923. if (dstctx->propq == NULL)
  924. goto err;
  925. }
  926. return dstctx;
  927. err:
  928. rsa_freectx(dstctx);
  929. return NULL;
  930. }
  931. static int rsa_get_ctx_params(void *vprsactx, OSSL_PARAM *params)
  932. {
  933. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  934. OSSL_PARAM *p;
  935. if (prsactx == NULL)
  936. return 0;
  937. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_ALGORITHM_ID);
  938. if (p != NULL) {
  939. /* The Algorithm Identifier of the combined signature algorithm */
  940. unsigned char aid_buf[128];
  941. unsigned char *aid;
  942. size_t aid_len;
  943. aid = rsa_generate_signature_aid(prsactx, aid_buf,
  944. sizeof(aid_buf), &aid_len);
  945. if (aid == NULL || !OSSL_PARAM_set_octet_string(p, aid, aid_len))
  946. return 0;
  947. }
  948. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_PAD_MODE);
  949. if (p != NULL)
  950. switch (p->data_type) {
  951. case OSSL_PARAM_INTEGER:
  952. if (!OSSL_PARAM_set_int(p, prsactx->pad_mode))
  953. return 0;
  954. break;
  955. case OSSL_PARAM_UTF8_STRING:
  956. {
  957. int i;
  958. const char *word = NULL;
  959. for (i = 0; padding_item[i].id != 0; i++) {
  960. if (prsactx->pad_mode == (int)padding_item[i].id) {
  961. word = padding_item[i].ptr;
  962. break;
  963. }
  964. }
  965. if (word != NULL) {
  966. if (!OSSL_PARAM_set_utf8_string(p, word))
  967. return 0;
  968. } else {
  969. ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR);
  970. }
  971. }
  972. break;
  973. default:
  974. return 0;
  975. }
  976. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_DIGEST);
  977. if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mdname))
  978. return 0;
  979. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_MGF1_DIGEST);
  980. if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mgf1_mdname))
  981. return 0;
  982. p = OSSL_PARAM_locate(params, OSSL_SIGNATURE_PARAM_PSS_SALTLEN);
  983. if (p != NULL) {
  984. if (p->data_type == OSSL_PARAM_INTEGER) {
  985. if (!OSSL_PARAM_set_int(p, prsactx->saltlen))
  986. return 0;
  987. } else if (p->data_type == OSSL_PARAM_UTF8_STRING) {
  988. const char *value = NULL;
  989. switch (prsactx->saltlen) {
  990. case RSA_PSS_SALTLEN_DIGEST:
  991. value = OSSL_PKEY_RSA_PSS_SALT_LEN_DIGEST;
  992. break;
  993. case RSA_PSS_SALTLEN_MAX:
  994. value = OSSL_PKEY_RSA_PSS_SALT_LEN_MAX;
  995. break;
  996. case RSA_PSS_SALTLEN_AUTO:
  997. value = OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO;
  998. break;
  999. case RSA_PSS_SALTLEN_AUTO_DIGEST_MAX:
  1000. value = OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX;
  1001. break;
  1002. default:
  1003. {
  1004. int len = BIO_snprintf(p->data, p->data_size, "%d",
  1005. prsactx->saltlen);
  1006. if (len <= 0)
  1007. return 0;
  1008. p->return_size = len;
  1009. break;
  1010. }
  1011. }
  1012. if (value != NULL
  1013. && !OSSL_PARAM_set_utf8_string(p, value))
  1014. return 0;
  1015. }
  1016. }
  1017. return 1;
  1018. }
  1019. static const OSSL_PARAM known_gettable_ctx_params[] = {
  1020. OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0),
  1021. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1022. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
  1023. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1024. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1025. OSSL_PARAM_END
  1026. };
  1027. static const OSSL_PARAM *rsa_gettable_ctx_params(ossl_unused void *vprsactx,
  1028. ossl_unused void *provctx)
  1029. {
  1030. return known_gettable_ctx_params;
  1031. }
  1032. static int rsa_set_ctx_params(void *vprsactx, const OSSL_PARAM params[])
  1033. {
  1034. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1035. const OSSL_PARAM *p;
  1036. int pad_mode;
  1037. int saltlen;
  1038. char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL;
  1039. char mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmdprops = NULL;
  1040. char mgf1mdname[OSSL_MAX_NAME_SIZE] = "", *pmgf1mdname = NULL;
  1041. char mgf1mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmgf1mdprops = NULL;
  1042. if (prsactx == NULL)
  1043. return 0;
  1044. if (params == NULL)
  1045. return 1;
  1046. pad_mode = prsactx->pad_mode;
  1047. saltlen = prsactx->saltlen;
  1048. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_DIGEST);
  1049. if (p != NULL) {
  1050. const OSSL_PARAM *propsp =
  1051. OSSL_PARAM_locate_const(params,
  1052. OSSL_SIGNATURE_PARAM_PROPERTIES);
  1053. pmdname = mdname;
  1054. if (!OSSL_PARAM_get_utf8_string(p, &pmdname, sizeof(mdname)))
  1055. return 0;
  1056. if (propsp != NULL) {
  1057. pmdprops = mdprops;
  1058. if (!OSSL_PARAM_get_utf8_string(propsp,
  1059. &pmdprops, sizeof(mdprops)))
  1060. return 0;
  1061. }
  1062. }
  1063. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_PAD_MODE);
  1064. if (p != NULL) {
  1065. const char *err_extra_text = NULL;
  1066. switch (p->data_type) {
  1067. case OSSL_PARAM_INTEGER: /* Support for legacy pad mode number */
  1068. if (!OSSL_PARAM_get_int(p, &pad_mode))
  1069. return 0;
  1070. break;
  1071. case OSSL_PARAM_UTF8_STRING:
  1072. {
  1073. int i;
  1074. if (p->data == NULL)
  1075. return 0;
  1076. for (i = 0; padding_item[i].id != 0; i++) {
  1077. if (strcmp(p->data, padding_item[i].ptr) == 0) {
  1078. pad_mode = padding_item[i].id;
  1079. break;
  1080. }
  1081. }
  1082. }
  1083. break;
  1084. default:
  1085. return 0;
  1086. }
  1087. switch (pad_mode) {
  1088. case RSA_PKCS1_OAEP_PADDING:
  1089. /*
  1090. * OAEP padding is for asymmetric cipher only so is not compatible
  1091. * with signature use.
  1092. */
  1093. err_extra_text = "OAEP padding not allowed for signing / verifying";
  1094. goto bad_pad;
  1095. case RSA_PKCS1_PSS_PADDING:
  1096. if ((prsactx->operation
  1097. & (EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY)) == 0) {
  1098. err_extra_text =
  1099. "PSS padding only allowed for sign and verify operations";
  1100. goto bad_pad;
  1101. }
  1102. break;
  1103. case RSA_PKCS1_PADDING:
  1104. err_extra_text = "PKCS#1 padding not allowed with RSA-PSS";
  1105. goto cont;
  1106. case RSA_NO_PADDING:
  1107. err_extra_text = "No padding not allowed with RSA-PSS";
  1108. goto cont;
  1109. case RSA_X931_PADDING:
  1110. err_extra_text = "X.931 padding not allowed with RSA-PSS";
  1111. cont:
  1112. if (RSA_test_flags(prsactx->rsa,
  1113. RSA_FLAG_TYPE_MASK) == RSA_FLAG_TYPE_RSA)
  1114. break;
  1115. /* FALLTHRU */
  1116. default:
  1117. bad_pad:
  1118. if (err_extra_text == NULL)
  1119. ERR_raise(ERR_LIB_PROV,
  1120. PROV_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE);
  1121. else
  1122. ERR_raise_data(ERR_LIB_PROV,
  1123. PROV_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE,
  1124. err_extra_text);
  1125. return 0;
  1126. }
  1127. }
  1128. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_PSS_SALTLEN);
  1129. if (p != NULL) {
  1130. if (pad_mode != RSA_PKCS1_PSS_PADDING) {
  1131. ERR_raise_data(ERR_LIB_PROV, PROV_R_NOT_SUPPORTED,
  1132. "PSS saltlen can only be specified if "
  1133. "PSS padding has been specified first");
  1134. return 0;
  1135. }
  1136. switch (p->data_type) {
  1137. case OSSL_PARAM_INTEGER: /* Support for legacy pad mode number */
  1138. if (!OSSL_PARAM_get_int(p, &saltlen))
  1139. return 0;
  1140. break;
  1141. case OSSL_PARAM_UTF8_STRING:
  1142. if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_DIGEST) == 0)
  1143. saltlen = RSA_PSS_SALTLEN_DIGEST;
  1144. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_MAX) == 0)
  1145. saltlen = RSA_PSS_SALTLEN_MAX;
  1146. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO) == 0)
  1147. saltlen = RSA_PSS_SALTLEN_AUTO;
  1148. else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX) == 0)
  1149. saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
  1150. else
  1151. saltlen = atoi(p->data);
  1152. break;
  1153. default:
  1154. return 0;
  1155. }
  1156. /*
  1157. * RSA_PSS_SALTLEN_AUTO_DIGEST_MAX seems curiously named in this check.
  1158. * Contrary to what it's name suggests, it's the currently lowest
  1159. * saltlen number possible.
  1160. */
  1161. if (saltlen < RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) {
  1162. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
  1163. return 0;
  1164. }
  1165. if (rsa_pss_restricted(prsactx)) {
  1166. switch (saltlen) {
  1167. case RSA_PSS_SALTLEN_AUTO:
  1168. case RSA_PSS_SALTLEN_AUTO_DIGEST_MAX:
  1169. if (prsactx->operation == EVP_PKEY_OP_VERIFY) {
  1170. ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH,
  1171. "Cannot use autodetected salt length");
  1172. return 0;
  1173. }
  1174. break;
  1175. case RSA_PSS_SALTLEN_DIGEST:
  1176. if (prsactx->min_saltlen > EVP_MD_get_size(prsactx->md)) {
  1177. ERR_raise_data(ERR_LIB_PROV,
  1178. PROV_R_PSS_SALTLEN_TOO_SMALL,
  1179. "Should be more than %d, but would be "
  1180. "set to match digest size (%d)",
  1181. prsactx->min_saltlen,
  1182. EVP_MD_get_size(prsactx->md));
  1183. return 0;
  1184. }
  1185. break;
  1186. default:
  1187. if (saltlen >= 0 && saltlen < prsactx->min_saltlen) {
  1188. ERR_raise_data(ERR_LIB_PROV,
  1189. PROV_R_PSS_SALTLEN_TOO_SMALL,
  1190. "Should be more than %d, "
  1191. "but would be set to %d",
  1192. prsactx->min_saltlen, saltlen);
  1193. return 0;
  1194. }
  1195. }
  1196. }
  1197. }
  1198. p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_MGF1_DIGEST);
  1199. if (p != NULL) {
  1200. const OSSL_PARAM *propsp =
  1201. OSSL_PARAM_locate_const(params,
  1202. OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES);
  1203. pmgf1mdname = mgf1mdname;
  1204. if (!OSSL_PARAM_get_utf8_string(p, &pmgf1mdname, sizeof(mgf1mdname)))
  1205. return 0;
  1206. if (propsp != NULL) {
  1207. pmgf1mdprops = mgf1mdprops;
  1208. if (!OSSL_PARAM_get_utf8_string(propsp,
  1209. &pmgf1mdprops, sizeof(mgf1mdprops)))
  1210. return 0;
  1211. }
  1212. if (pad_mode != RSA_PKCS1_PSS_PADDING) {
  1213. ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MGF1_MD);
  1214. return 0;
  1215. }
  1216. }
  1217. prsactx->saltlen = saltlen;
  1218. prsactx->pad_mode = pad_mode;
  1219. if (prsactx->md == NULL && pmdname == NULL
  1220. && pad_mode == RSA_PKCS1_PSS_PADDING)
  1221. pmdname = RSA_DEFAULT_DIGEST_NAME;
  1222. if (pmgf1mdname != NULL
  1223. && !rsa_setup_mgf1_md(prsactx, pmgf1mdname, pmgf1mdprops))
  1224. return 0;
  1225. if (pmdname != NULL) {
  1226. if (!rsa_setup_md(prsactx, pmdname, pmdprops))
  1227. return 0;
  1228. } else {
  1229. if (!rsa_check_padding(prsactx, NULL, NULL, prsactx->mdnid))
  1230. return 0;
  1231. }
  1232. return 1;
  1233. }
  1234. static const OSSL_PARAM settable_ctx_params[] = {
  1235. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
  1236. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PROPERTIES, NULL, 0),
  1237. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1238. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1239. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES, NULL, 0),
  1240. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1241. OSSL_PARAM_END
  1242. };
  1243. static const OSSL_PARAM settable_ctx_params_no_digest[] = {
  1244. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
  1245. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, NULL, 0),
  1246. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_PROPERTIES, NULL, 0),
  1247. OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, NULL, 0),
  1248. OSSL_PARAM_END
  1249. };
  1250. static const OSSL_PARAM *rsa_settable_ctx_params(void *vprsactx,
  1251. ossl_unused void *provctx)
  1252. {
  1253. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1254. if (prsactx != NULL && !prsactx->flag_allow_md)
  1255. return settable_ctx_params_no_digest;
  1256. return settable_ctx_params;
  1257. }
  1258. static int rsa_get_ctx_md_params(void *vprsactx, OSSL_PARAM *params)
  1259. {
  1260. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1261. if (prsactx->mdctx == NULL)
  1262. return 0;
  1263. return EVP_MD_CTX_get_params(prsactx->mdctx, params);
  1264. }
  1265. static const OSSL_PARAM *rsa_gettable_ctx_md_params(void *vprsactx)
  1266. {
  1267. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1268. if (prsactx->md == NULL)
  1269. return 0;
  1270. return EVP_MD_gettable_ctx_params(prsactx->md);
  1271. }
  1272. static int rsa_set_ctx_md_params(void *vprsactx, const OSSL_PARAM params[])
  1273. {
  1274. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1275. if (prsactx->mdctx == NULL)
  1276. return 0;
  1277. return EVP_MD_CTX_set_params(prsactx->mdctx, params);
  1278. }
  1279. static const OSSL_PARAM *rsa_settable_ctx_md_params(void *vprsactx)
  1280. {
  1281. PROV_RSA_CTX *prsactx = (PROV_RSA_CTX *)vprsactx;
  1282. if (prsactx->md == NULL)
  1283. return 0;
  1284. return EVP_MD_settable_ctx_params(prsactx->md);
  1285. }
  1286. const OSSL_DISPATCH ossl_rsa_signature_functions[] = {
  1287. { OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))rsa_newctx },
  1288. { OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))rsa_sign_init },
  1289. { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))rsa_sign },
  1290. { OSSL_FUNC_SIGNATURE_VERIFY_INIT, (void (*)(void))rsa_verify_init },
  1291. { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))rsa_verify },
  1292. { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER_INIT,
  1293. (void (*)(void))rsa_verify_recover_init },
  1294. { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER,
  1295. (void (*)(void))rsa_verify_recover },
  1296. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,
  1297. (void (*)(void))rsa_digest_sign_init },
  1298. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE,
  1299. (void (*)(void))rsa_digest_signverify_update },
  1300. { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL,
  1301. (void (*)(void))rsa_digest_sign_final },
  1302. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,
  1303. (void (*)(void))rsa_digest_verify_init },
  1304. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE,
  1305. (void (*)(void))rsa_digest_signverify_update },
  1306. { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL,
  1307. (void (*)(void))rsa_digest_verify_final },
  1308. { OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))rsa_freectx },
  1309. { OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))rsa_dupctx },
  1310. { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS, (void (*)(void))rsa_get_ctx_params },
  1311. { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS,
  1312. (void (*)(void))rsa_gettable_ctx_params },
  1313. { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, (void (*)(void))rsa_set_ctx_params },
  1314. { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS,
  1315. (void (*)(void))rsa_settable_ctx_params },
  1316. { OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS,
  1317. (void (*)(void))rsa_get_ctx_md_params },
  1318. { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS,
  1319. (void (*)(void))rsa_gettable_ctx_md_params },
  1320. { OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS,
  1321. (void (*)(void))rsa_set_ctx_md_params },
  1322. { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS,
  1323. (void (*)(void))rsa_settable_ctx_md_params },
  1324. OSSL_DISPATCH_END
  1325. };