10Sstevel@tonic-gate /* crypto/rsa/rsa_sign.c */ 20Sstevel@tonic-gate /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 30Sstevel@tonic-gate * All rights reserved. 40Sstevel@tonic-gate * 50Sstevel@tonic-gate * This package is an SSL implementation written 60Sstevel@tonic-gate * by Eric Young (eay@cryptsoft.com). 70Sstevel@tonic-gate * The implementation was written so as to conform with Netscapes SSL. 80Sstevel@tonic-gate * 90Sstevel@tonic-gate * This library is free for commercial and non-commercial use as long as 100Sstevel@tonic-gate * the following conditions are aheared to. The following conditions 110Sstevel@tonic-gate * apply to all code found in this distribution, be it the RC4, RSA, 120Sstevel@tonic-gate * lhash, DES, etc., code; not just the SSL code. The SSL documentation 130Sstevel@tonic-gate * included with this distribution is covered by the same copyright terms 140Sstevel@tonic-gate * except that the holder is Tim Hudson (tjh@cryptsoft.com). 150Sstevel@tonic-gate * 160Sstevel@tonic-gate * Copyright remains Eric Young's, and as such any Copyright notices in 170Sstevel@tonic-gate * the code are not to be removed. 180Sstevel@tonic-gate * If this package is used in a product, Eric Young should be given attribution 190Sstevel@tonic-gate * as the author of the parts of the library used. 200Sstevel@tonic-gate * This can be in the form of a textual message at program startup or 210Sstevel@tonic-gate * in documentation (online or textual) provided with the package. 220Sstevel@tonic-gate * 230Sstevel@tonic-gate * Redistribution and use in source and binary forms, with or without 240Sstevel@tonic-gate * modification, are permitted provided that the following conditions 250Sstevel@tonic-gate * are met: 260Sstevel@tonic-gate * 1. Redistributions of source code must retain the copyright 270Sstevel@tonic-gate * notice, this list of conditions and the following disclaimer. 280Sstevel@tonic-gate * 2. Redistributions in binary form must reproduce the above copyright 290Sstevel@tonic-gate * notice, this list of conditions and the following disclaimer in the 300Sstevel@tonic-gate * documentation and/or other materials provided with the distribution. 310Sstevel@tonic-gate * 3. All advertising materials mentioning features or use of this software 320Sstevel@tonic-gate * must display the following acknowledgement: 330Sstevel@tonic-gate * "This product includes cryptographic software written by 340Sstevel@tonic-gate * Eric Young (eay@cryptsoft.com)" 350Sstevel@tonic-gate * The word 'cryptographic' can be left out if the rouines from the library 360Sstevel@tonic-gate * being used are not cryptographic related :-). 370Sstevel@tonic-gate * 4. If you include any Windows specific code (or a derivative thereof) from 380Sstevel@tonic-gate * the apps directory (application code) you must include an acknowledgement: 390Sstevel@tonic-gate * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 400Sstevel@tonic-gate * 410Sstevel@tonic-gate * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 420Sstevel@tonic-gate * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 430Sstevel@tonic-gate * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 440Sstevel@tonic-gate * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 450Sstevel@tonic-gate * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 460Sstevel@tonic-gate * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 470Sstevel@tonic-gate * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 480Sstevel@tonic-gate * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 490Sstevel@tonic-gate * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 500Sstevel@tonic-gate * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 510Sstevel@tonic-gate * SUCH DAMAGE. 520Sstevel@tonic-gate * 530Sstevel@tonic-gate * The licence and distribution terms for any publically available version or 540Sstevel@tonic-gate * derivative of this code cannot be changed. i.e. this code cannot simply be 550Sstevel@tonic-gate * copied and put under another distribution licence 560Sstevel@tonic-gate * [including the GNU Public Licence.] 570Sstevel@tonic-gate */ 580Sstevel@tonic-gate 590Sstevel@tonic-gate #include <stdio.h> 600Sstevel@tonic-gate #include "cryptlib.h" 610Sstevel@tonic-gate #include <openssl/bn.h> 620Sstevel@tonic-gate #include <openssl/rsa.h> 630Sstevel@tonic-gate #include <openssl/objects.h> 640Sstevel@tonic-gate #include <openssl/x509.h> 650Sstevel@tonic-gate 660Sstevel@tonic-gate /* Size of an SSL signature: MD5+SHA1 */ 670Sstevel@tonic-gate #define SSL_SIG_LENGTH 36 680Sstevel@tonic-gate 690Sstevel@tonic-gate int RSA_sign(int type, const unsigned char *m, unsigned int m_len, 700Sstevel@tonic-gate unsigned char *sigret, unsigned int *siglen, RSA *rsa) 710Sstevel@tonic-gate { 720Sstevel@tonic-gate X509_SIG sig; 730Sstevel@tonic-gate ASN1_TYPE parameter; 740Sstevel@tonic-gate int i,j,ret=1; 750Sstevel@tonic-gate unsigned char *p, *tmps = NULL; 760Sstevel@tonic-gate const unsigned char *s = NULL; 770Sstevel@tonic-gate X509_ALGOR algor; 780Sstevel@tonic-gate ASN1_OCTET_STRING digest; 790Sstevel@tonic-gate if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) 800Sstevel@tonic-gate { 810Sstevel@tonic-gate return rsa->meth->rsa_sign(type, m, m_len, 820Sstevel@tonic-gate sigret, siglen, rsa); 830Sstevel@tonic-gate } 840Sstevel@tonic-gate /* Special case: SSL signature, just check the length */ 850Sstevel@tonic-gate if(type == NID_md5_sha1) { 860Sstevel@tonic-gate if(m_len != SSL_SIG_LENGTH) { 870Sstevel@tonic-gate RSAerr(RSA_F_RSA_SIGN,RSA_R_INVALID_MESSAGE_LENGTH); 880Sstevel@tonic-gate return(0); 890Sstevel@tonic-gate } 900Sstevel@tonic-gate i = SSL_SIG_LENGTH; 910Sstevel@tonic-gate s = m; 920Sstevel@tonic-gate } else { 930Sstevel@tonic-gate sig.algor= &algor; 940Sstevel@tonic-gate sig.algor->algorithm=OBJ_nid2obj(type); 950Sstevel@tonic-gate if (sig.algor->algorithm == NULL) 960Sstevel@tonic-gate { 970Sstevel@tonic-gate RSAerr(RSA_F_RSA_SIGN,RSA_R_UNKNOWN_ALGORITHM_TYPE); 980Sstevel@tonic-gate return(0); 990Sstevel@tonic-gate } 1000Sstevel@tonic-gate if (sig.algor->algorithm->length == 0) 1010Sstevel@tonic-gate { 1020Sstevel@tonic-gate RSAerr(RSA_F_RSA_SIGN,RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD); 1030Sstevel@tonic-gate return(0); 1040Sstevel@tonic-gate } 1050Sstevel@tonic-gate parameter.type=V_ASN1_NULL; 1060Sstevel@tonic-gate parameter.value.ptr=NULL; 1070Sstevel@tonic-gate sig.algor->parameter= ¶meter; 1080Sstevel@tonic-gate 1090Sstevel@tonic-gate sig.digest= &digest; 1100Sstevel@tonic-gate sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 1110Sstevel@tonic-gate sig.digest->length=m_len; 1120Sstevel@tonic-gate 1130Sstevel@tonic-gate i=i2d_X509_SIG(&sig,NULL); 1140Sstevel@tonic-gate } 1150Sstevel@tonic-gate j=RSA_size(rsa); 1160Sstevel@tonic-gate if (i > (j-RSA_PKCS1_PADDING_SIZE)) 1170Sstevel@tonic-gate { 1180Sstevel@tonic-gate RSAerr(RSA_F_RSA_SIGN,RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); 1190Sstevel@tonic-gate return(0); 1200Sstevel@tonic-gate } 1210Sstevel@tonic-gate if(type != NID_md5_sha1) { 1220Sstevel@tonic-gate tmps=(unsigned char *)OPENSSL_malloc((unsigned int)j+1); 1230Sstevel@tonic-gate if (tmps == NULL) 1240Sstevel@tonic-gate { 1250Sstevel@tonic-gate RSAerr(RSA_F_RSA_SIGN,ERR_R_MALLOC_FAILURE); 1260Sstevel@tonic-gate return(0); 1270Sstevel@tonic-gate } 1280Sstevel@tonic-gate p=tmps; 1290Sstevel@tonic-gate i2d_X509_SIG(&sig,&p); 1300Sstevel@tonic-gate s=tmps; 1310Sstevel@tonic-gate } 1320Sstevel@tonic-gate i=RSA_private_encrypt(i,s,sigret,rsa,RSA_PKCS1_PADDING); 1330Sstevel@tonic-gate if (i <= 0) 1340Sstevel@tonic-gate ret=0; 1350Sstevel@tonic-gate else 1360Sstevel@tonic-gate *siglen=i; 1370Sstevel@tonic-gate 1380Sstevel@tonic-gate if(type != NID_md5_sha1) { 1390Sstevel@tonic-gate OPENSSL_cleanse(tmps,(unsigned int)j+1); 1400Sstevel@tonic-gate OPENSSL_free(tmps); 1410Sstevel@tonic-gate } 1420Sstevel@tonic-gate return(ret); 1430Sstevel@tonic-gate } 1440Sstevel@tonic-gate 1450Sstevel@tonic-gate int RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, 1460Sstevel@tonic-gate unsigned char *sigbuf, unsigned int siglen, RSA *rsa) 1470Sstevel@tonic-gate { 1480Sstevel@tonic-gate int i,ret=0,sigtype; 149*2139Sjp161948 unsigned char *s; 1500Sstevel@tonic-gate X509_SIG *sig=NULL; 1510Sstevel@tonic-gate 1520Sstevel@tonic-gate if (siglen != (unsigned int)RSA_size(rsa)) 1530Sstevel@tonic-gate { 1540Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY,RSA_R_WRONG_SIGNATURE_LENGTH); 1550Sstevel@tonic-gate return(0); 1560Sstevel@tonic-gate } 1570Sstevel@tonic-gate 1580Sstevel@tonic-gate if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_verify) 1590Sstevel@tonic-gate { 1600Sstevel@tonic-gate return rsa->meth->rsa_verify(dtype, m, m_len, 1610Sstevel@tonic-gate sigbuf, siglen, rsa); 1620Sstevel@tonic-gate } 1630Sstevel@tonic-gate 1640Sstevel@tonic-gate s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 1650Sstevel@tonic-gate if (s == NULL) 1660Sstevel@tonic-gate { 1670Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY,ERR_R_MALLOC_FAILURE); 1680Sstevel@tonic-gate goto err; 1690Sstevel@tonic-gate } 1700Sstevel@tonic-gate if((dtype == NID_md5_sha1) && (m_len != SSL_SIG_LENGTH) ) { 1710Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY,RSA_R_INVALID_MESSAGE_LENGTH); 172*2139Sjp161948 goto err; 1730Sstevel@tonic-gate } 1740Sstevel@tonic-gate i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 1750Sstevel@tonic-gate 1760Sstevel@tonic-gate if (i <= 0) goto err; 1770Sstevel@tonic-gate 1780Sstevel@tonic-gate /* Special case: SSL signature */ 1790Sstevel@tonic-gate if(dtype == NID_md5_sha1) { 1800Sstevel@tonic-gate if((i != SSL_SIG_LENGTH) || memcmp(s, m, SSL_SIG_LENGTH)) 1810Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY,RSA_R_BAD_SIGNATURE); 1820Sstevel@tonic-gate else ret = 1; 1830Sstevel@tonic-gate } else { 184*2139Sjp161948 const unsigned char *p=s; 1850Sstevel@tonic-gate sig=d2i_X509_SIG(NULL,&p,(long)i); 1860Sstevel@tonic-gate 1870Sstevel@tonic-gate if (sig == NULL) goto err; 1880Sstevel@tonic-gate sigtype=OBJ_obj2nid(sig->algor->algorithm); 1890Sstevel@tonic-gate 1900Sstevel@tonic-gate 1910Sstevel@tonic-gate #ifdef RSA_DEBUG 1920Sstevel@tonic-gate /* put a backward compatibility flag in EAY */ 1930Sstevel@tonic-gate fprintf(stderr,"in(%s) expect(%s)\n",OBJ_nid2ln(sigtype), 1940Sstevel@tonic-gate OBJ_nid2ln(dtype)); 1950Sstevel@tonic-gate #endif 1960Sstevel@tonic-gate if (sigtype != dtype) 1970Sstevel@tonic-gate { 1980Sstevel@tonic-gate if (((dtype == NID_md5) && 1990Sstevel@tonic-gate (sigtype == NID_md5WithRSAEncryption)) || 2000Sstevel@tonic-gate ((dtype == NID_md2) && 2010Sstevel@tonic-gate (sigtype == NID_md2WithRSAEncryption))) 2020Sstevel@tonic-gate { 2030Sstevel@tonic-gate /* ok, we will let it through */ 2040Sstevel@tonic-gate #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) 2050Sstevel@tonic-gate fprintf(stderr,"signature has problems, re-make with post SSLeay045\n"); 2060Sstevel@tonic-gate #endif 2070Sstevel@tonic-gate } 2080Sstevel@tonic-gate else 2090Sstevel@tonic-gate { 2100Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY, 2110Sstevel@tonic-gate RSA_R_ALGORITHM_MISMATCH); 2120Sstevel@tonic-gate goto err; 2130Sstevel@tonic-gate } 2140Sstevel@tonic-gate } 2150Sstevel@tonic-gate if ( ((unsigned int)sig->digest->length != m_len) || 2160Sstevel@tonic-gate (memcmp(m,sig->digest->data,m_len) != 0)) 2170Sstevel@tonic-gate { 2180Sstevel@tonic-gate RSAerr(RSA_F_RSA_VERIFY,RSA_R_BAD_SIGNATURE); 2190Sstevel@tonic-gate } 2200Sstevel@tonic-gate else 2210Sstevel@tonic-gate ret=1; 2220Sstevel@tonic-gate } 2230Sstevel@tonic-gate err: 2240Sstevel@tonic-gate if (sig != NULL) X509_SIG_free(sig); 225*2139Sjp161948 if (s != NULL) 226*2139Sjp161948 { 227*2139Sjp161948 OPENSSL_cleanse(s,(unsigned int)siglen); 228*2139Sjp161948 OPENSSL_free(s); 229*2139Sjp161948 } 2300Sstevel@tonic-gate return(ret); 2310Sstevel@tonic-gate } 2320Sstevel@tonic-gate 233