/* * RSA operations provided by OpenSSL * (C) 2015 Jack Lloyd * (C) 2017 Alexander Bluhm * * Botan is released under the Simplified BSD License (see license.txt) */ #include #if defined(BOTAN_HAS_RSA) #include #include #include #include #include #include #include #include #include #include namespace Botan { namespace { std::pair get_openssl_enc_pad(const std::string& eme) { if(eme == "Raw") return std::make_pair(RSA_NO_PADDING, 0); else if(eme == "EME-PKCS1-v1_5") return std::make_pair(RSA_PKCS1_PADDING, 11); else if(eme == "OAEP(SHA-1)" || eme == "EME1(SHA-1)") return std::make_pair(RSA_PKCS1_OAEP_PADDING, 41); else throw Lookup_Error("OpenSSL RSA does not support EME " + eme); } class OpenSSL_RSA_Encryption_Operation : public PK_Ops::Encryption { public: OpenSSL_RSA_Encryption_Operation(const RSA_PublicKey& rsa, int pad, size_t pad_overhead) : m_openssl_rsa(nullptr, ::RSA_free), m_padding(pad) { const std::vector der = rsa.public_key_bits(); const uint8_t* der_ptr = der.data(); m_openssl_rsa.reset(::d2i_RSAPublicKey(nullptr, &der_ptr, der.size())); if(!m_openssl_rsa) throw OpenSSL_Error("d2i_RSAPublicKey"); m_bits = 8 * (n_size() - pad_overhead) - 1; } size_t max_input_bits() const override { return m_bits; }; secure_vector encrypt(const uint8_t msg[], size_t msg_len, RandomNumberGenerator&) override { const size_t mod_sz = n_size(); if(msg_len > mod_sz) throw Invalid_Argument("Input too large for RSA key"); secure_vector outbuf(mod_sz); secure_vector inbuf; if(m_padding == RSA_NO_PADDING) { inbuf.resize(mod_sz); copy_mem(&inbuf[mod_sz - msg_len], msg, msg_len); } else { inbuf.assign(msg, msg + msg_len); } int rc = ::RSA_public_encrypt(inbuf.size(), inbuf.data(), outbuf.data(), m_openssl_rsa.get(), m_padding); if(rc < 0) throw OpenSSL_Error("RSA_public_encrypt"); return outbuf; } private: size_t n_size() const { return ::RSA_size(m_openssl_rsa.get()); } std::unique_ptr> m_openssl_rsa; size_t m_bits = 0; int m_padding = 0; }; class OpenSSL_RSA_Decryption_Operation : public PK_Ops::Decryption { public: OpenSSL_RSA_Decryption_Operation(const RSA_PrivateKey& rsa, int pad) : m_openssl_rsa(nullptr, ::RSA_free), m_padding(pad) { const secure_vector der = rsa.private_key_bits(); const uint8_t* der_ptr = der.data(); m_openssl_rsa.reset(d2i_RSAPrivateKey(nullptr, &der_ptr, der.size())); if(!m_openssl_rsa) throw OpenSSL_Error("d2i_RSAPrivateKey"); } secure_vector decrypt(uint8_t& valid_mask, const uint8_t msg[], size_t msg_len) override { secure_vector buf(::RSA_size(m_openssl_rsa.get())); int rc = ::RSA_private_decrypt(msg_len, msg, buf.data(), m_openssl_rsa.get(), m_padding); if(rc < 0 || static_cast(rc) > buf.size()) { valid_mask = 0; buf.resize(0); } else { valid_mask = 0xFF; buf.resize(rc); } if(m_padding == RSA_NO_PADDING) { return CT::strip_leading_zeros(buf); } return buf; } private: std::unique_ptr> m_openssl_rsa; int m_padding = 0; }; class OpenSSL_RSA_Verification_Operation : public PK_Ops::Verification_with_EMSA { public: OpenSSL_RSA_Verification_Operation(const RSA_PublicKey& rsa, const std::string& emsa) : PK_Ops::Verification_with_EMSA(emsa), m_openssl_rsa(nullptr, ::RSA_free) { const std::vector der = rsa.public_key_bits(); const uint8_t* der_ptr = der.data(); m_openssl_rsa.reset(::d2i_RSAPublicKey(nullptr, &der_ptr, der.size())); if(!m_openssl_rsa) throw OpenSSL_Error("d2i_RSAPublicKey"); } size_t max_input_bits() const override { return ::BN_num_bits(m_openssl_rsa->n) - 1; } bool with_recovery() const override { return true; } secure_vector verify_mr(const uint8_t msg[], size_t msg_len) override { const size_t mod_sz = ::RSA_size(m_openssl_rsa.get()); if(msg_len > mod_sz) throw Invalid_Argument("OpenSSL RSA verify input too large"); secure_vector inbuf(mod_sz); copy_mem(&inbuf[mod_sz - msg_len], msg, msg_len); secure_vector outbuf(mod_sz); int rc = ::RSA_public_decrypt(inbuf.size(), inbuf.data(), outbuf.data(), m_openssl_rsa.get(), RSA_NO_PADDING); if(rc < 0) throw Invalid_Argument("RSA_public_decrypt"); return CT::strip_leading_zeros(outbuf); } private: std::unique_ptr> m_openssl_rsa; }; class OpenSSL_RSA_Signing_Operation : public PK_Ops::Signature_with_EMSA { public: OpenSSL_RSA_Signing_Operation(const RSA_PrivateKey& rsa, const std::string& emsa) : PK_Ops::Signature_with_EMSA(emsa), m_openssl_rsa(nullptr, ::RSA_free) { const secure_vector der = rsa.private_key_bits(); const uint8_t* der_ptr = der.data(); m_openssl_rsa.reset(d2i_RSAPrivateKey(nullptr, &der_ptr, der.size())); if(!m_openssl_rsa) throw OpenSSL_Error("d2i_RSAPrivateKey"); } secure_vector raw_sign(const uint8_t msg[], size_t msg_len, RandomNumberGenerator&) override { const size_t mod_sz = ::RSA_size(m_openssl_rsa.get()); if(msg_len > mod_sz) throw Invalid_Argument("OpenSSL RSA sign input too large"); secure_vector inbuf(mod_sz); copy_mem(&inbuf[mod_sz - msg_len], msg, msg_len); secure_vector outbuf(mod_sz); int rc = ::RSA_private_encrypt(inbuf.size(), inbuf.data(), outbuf.data(), m_openssl_rsa.get(), RSA_NO_PADDING); if(rc < 0) throw OpenSSL_Error("RSA_private_encrypt"); return outbuf; } size_t max_input_bits() const override { return ::BN_num_bits(m_openssl_rsa->n) - 1; } private: std::unique_ptr> m_openssl_rsa; }; } std::unique_ptr make_openssl_rsa_enc_op(const RSA_PublicKey& key, const std::string& params) { auto pad_info = get_openssl_enc_pad(params); return std::unique_ptr( new OpenSSL_RSA_Encryption_Operation(key, pad_info.first, pad_info.second)); } std::unique_ptr make_openssl_rsa_dec_op(const RSA_PrivateKey& key, const std::string& params) { auto pad_info = get_openssl_enc_pad(params); return std::unique_ptr(new OpenSSL_RSA_Decryption_Operation(key, pad_info.first)); } std::unique_ptr make_openssl_rsa_ver_op(const RSA_PublicKey& key, const std::string& params) { return std::unique_ptr(new OpenSSL_RSA_Verification_Operation(key, params)); } std::unique_ptr make_openssl_rsa_sig_op(const RSA_PrivateKey& key, const std::string& params) { return std::unique_ptr(new OpenSSL_RSA_Signing_Operation(key, params)); } std::unique_ptr make_openssl_rsa_private_key(RandomNumberGenerator& rng, size_t rsa_bits) { if (rsa_bits > INT_MAX) throw Internal_Error("rsa_bits overflow"); secure_vector seed(BOTAN_SYSTEM_RNG_POLL_REQUEST); rng.randomize(seed.data(), seed.size()); RAND_seed(seed.data(), seed.size()); std::unique_ptr> bn(BN_new(), BN_free); if(!bn) throw OpenSSL_Error("BN_new"); if(!BN_set_word(bn.get(), RSA_F4)) throw OpenSSL_Error("BN_set_word"); std::unique_ptr> rsa(RSA_new(), RSA_free); if(!rsa) throw OpenSSL_Error("RSA_new"); if(!RSA_generate_key_ex(rsa.get(), rsa_bits, bn.get(), NULL)) throw OpenSSL_Error("RSA_generate_key_ex"); uint8_t* der = NULL; int bytes = i2d_RSAPrivateKey(rsa.get(), &der); if(bytes < 0) throw OpenSSL_Error("i2d_RSAPrivateKey"); const secure_vector keydata(der, der + bytes); memset(der, 0, bytes); free(der); return std::unique_ptr (new RSA_PrivateKey(AlgorithmIdentifier(), keydata)); } } #endif // BOTAN_HAS_RSA