Mercurial > trustbridge > nss-cmake-static
comparison nss/lib/pk11wrap/pk11pk12.c @ 0:1e5118fa0cb1
This is NSS with a Cmake Buildsyste
To compile a static NSS library for Windows we've used the
Chromium-NSS fork and added a Cmake buildsystem to compile
it statically for Windows. See README.chromium for chromium
changes and README.trustbridge for our modifications.
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Mon, 28 Jul 2014 10:47:06 +0200 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:1e5118fa0cb1 |
---|---|
1 | |
2 /* This Source Code Form is subject to the terms of the Mozilla Public | |
3 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
5 /* | |
6 * This file PKCS #12 fuctions that should really be moved to the | |
7 * PKCS #12 directory, however we can't do that in a point release | |
8 * because that will break binary compatibility, so we keep them here for now. | |
9 */ | |
10 | |
11 #include "seccomon.h" | |
12 #include "secmod.h" | |
13 #include "secmodi.h" | |
14 #include "pkcs11.h" | |
15 #include "pk11func.h" | |
16 #include "secitem.h" | |
17 #include "key.h" | |
18 #include "secoid.h" | |
19 #include "secasn1.h" | |
20 #include "secerr.h" | |
21 #include "prerror.h" | |
22 | |
23 | |
24 | |
25 /* These data structures should move to a common .h file shared between the | |
26 * wrappers and the pkcs 12 code. */ | |
27 | |
28 /* | |
29 ** RSA Raw Private Key structures | |
30 */ | |
31 | |
32 /* member names from PKCS#1, section 7.2 */ | |
33 struct SECKEYRSAPrivateKeyStr { | |
34 PLArenaPool * arena; | |
35 SECItem version; | |
36 SECItem modulus; | |
37 SECItem publicExponent; | |
38 SECItem privateExponent; | |
39 SECItem prime1; | |
40 SECItem prime2; | |
41 SECItem exponent1; | |
42 SECItem exponent2; | |
43 SECItem coefficient; | |
44 }; | |
45 typedef struct SECKEYRSAPrivateKeyStr SECKEYRSAPrivateKey; | |
46 | |
47 | |
48 /* | |
49 ** DSA Raw Private Key structures | |
50 */ | |
51 | |
52 struct SECKEYDSAPrivateKeyStr { | |
53 SECKEYPQGParams params; | |
54 SECItem privateValue; | |
55 }; | |
56 typedef struct SECKEYDSAPrivateKeyStr SECKEYDSAPrivateKey; | |
57 | |
58 /* | |
59 ** Diffie-Hellman Raw Private Key structures | |
60 ** Structure member names suggested by PKCS#3. | |
61 */ | |
62 struct SECKEYDHPrivateKeyStr { | |
63 PLArenaPool * arena; | |
64 SECItem prime; | |
65 SECItem base; | |
66 SECItem privateValue; | |
67 }; | |
68 typedef struct SECKEYDHPrivateKeyStr SECKEYDHPrivateKey; | |
69 | |
70 /* | |
71 ** raw private key object | |
72 */ | |
73 struct SECKEYRawPrivateKeyStr { | |
74 PLArenaPool *arena; | |
75 KeyType keyType; | |
76 union { | |
77 SECKEYRSAPrivateKey rsa; | |
78 SECKEYDSAPrivateKey dsa; | |
79 SECKEYDHPrivateKey dh; | |
80 } u; | |
81 }; | |
82 typedef struct SECKEYRawPrivateKeyStr SECKEYRawPrivateKey; | |
83 | |
84 SEC_ASN1_MKSUB(SEC_AnyTemplate) | |
85 SEC_ASN1_MKSUB(SECOID_AlgorithmIDTemplate) | |
86 | |
87 /* ASN1 Templates for new decoder/encoder */ | |
88 /* | |
89 * Attribute value for PKCS8 entries (static?) | |
90 */ | |
91 const SEC_ASN1Template SECKEY_AttributeTemplate[] = { | |
92 { SEC_ASN1_SEQUENCE, | |
93 0, NULL, sizeof(SECKEYAttribute) }, | |
94 { SEC_ASN1_OBJECT_ID, offsetof(SECKEYAttribute, attrType) }, | |
95 { SEC_ASN1_SET_OF | SEC_ASN1_XTRN, offsetof(SECKEYAttribute, attrValue), | |
96 SEC_ASN1_SUB(SEC_AnyTemplate) }, | |
97 { 0 } | |
98 }; | |
99 | |
100 const SEC_ASN1Template SECKEY_SetOfAttributeTemplate[] = { | |
101 { SEC_ASN1_SET_OF, 0, SECKEY_AttributeTemplate }, | |
102 }; | |
103 | |
104 const SEC_ASN1Template SECKEY_PrivateKeyInfoTemplate[] = { | |
105 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYPrivateKeyInfo) }, | |
106 { SEC_ASN1_INTEGER, offsetof(SECKEYPrivateKeyInfo,version) }, | |
107 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, | |
108 offsetof(SECKEYPrivateKeyInfo,algorithm), | |
109 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) }, | |
110 { SEC_ASN1_OCTET_STRING, offsetof(SECKEYPrivateKeyInfo,privateKey) }, | |
111 { SEC_ASN1_OPTIONAL | SEC_ASN1_CONSTRUCTED | SEC_ASN1_CONTEXT_SPECIFIC | 0, | |
112 offsetof(SECKEYPrivateKeyInfo,attributes), | |
113 SECKEY_SetOfAttributeTemplate }, | |
114 { 0 } | |
115 }; | |
116 | |
117 const SEC_ASN1Template SECKEY_PointerToPrivateKeyInfoTemplate[] = { | |
118 { SEC_ASN1_POINTER, 0, SECKEY_PrivateKeyInfoTemplate } | |
119 }; | |
120 | |
121 const SEC_ASN1Template SECKEY_RSAPrivateKeyExportTemplate[] = { | |
122 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof(SECKEYRawPrivateKey) }, | |
123 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.version) }, | |
124 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.modulus) }, | |
125 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.publicExponent) }, | |
126 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.privateExponent) }, | |
127 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.prime1) }, | |
128 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.prime2) }, | |
129 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.exponent1) }, | |
130 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.exponent2) }, | |
131 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.rsa.coefficient) }, | |
132 { 0 } | |
133 }; | |
134 | |
135 const SEC_ASN1Template SECKEY_DSAPrivateKeyExportTemplate[] = { | |
136 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.dsa.privateValue) }, | |
137 }; | |
138 | |
139 const SEC_ASN1Template SECKEY_DHPrivateKeyExportTemplate[] = { | |
140 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.dh.privateValue) }, | |
141 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.dh.base) }, | |
142 { SEC_ASN1_INTEGER, offsetof(SECKEYRawPrivateKey,u.dh.prime) }, | |
143 }; | |
144 | |
145 const SEC_ASN1Template SECKEY_EncryptedPrivateKeyInfoTemplate[] = { | |
146 { SEC_ASN1_SEQUENCE, | |
147 0, NULL, sizeof(SECKEYEncryptedPrivateKeyInfo) }, | |
148 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, | |
149 offsetof(SECKEYEncryptedPrivateKeyInfo,algorithm), | |
150 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) }, | |
151 { SEC_ASN1_OCTET_STRING, | |
152 offsetof(SECKEYEncryptedPrivateKeyInfo,encryptedData) }, | |
153 { 0 } | |
154 }; | |
155 | |
156 const SEC_ASN1Template SECKEY_PointerToEncryptedPrivateKeyInfoTemplate[] = { | |
157 { SEC_ASN1_POINTER, 0, SECKEY_EncryptedPrivateKeyInfoTemplate } | |
158 }; | |
159 | |
160 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_EncryptedPrivateKeyInfoTemplate) | |
161 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_PointerToEncryptedPrivateKeyInfoTemplate) | |
162 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_PrivateKeyInfoTemplate) | |
163 SEC_ASN1_CHOOSER_IMPLEMENT(SECKEY_PointerToPrivateKeyInfoTemplate) | |
164 | |
165 /* | |
166 * See bugzilla bug 125359 | |
167 * Since NSS (via PKCS#11) wants to handle big integers as unsigned ints, | |
168 * all of the templates above that en/decode into integers must be converted | |
169 * from ASN.1's signed integer type. This is done by marking either the | |
170 * source or destination (encoding or decoding, respectively) type as | |
171 * siUnsignedInteger. | |
172 */ | |
173 | |
174 static void | |
175 prepare_rsa_priv_key_export_for_asn1(SECKEYRawPrivateKey *key) | |
176 { | |
177 key->u.rsa.modulus.type = siUnsignedInteger; | |
178 key->u.rsa.publicExponent.type = siUnsignedInteger; | |
179 key->u.rsa.privateExponent.type = siUnsignedInteger; | |
180 key->u.rsa.prime1.type = siUnsignedInteger; | |
181 key->u.rsa.prime2.type = siUnsignedInteger; | |
182 key->u.rsa.exponent1.type = siUnsignedInteger; | |
183 key->u.rsa.exponent2.type = siUnsignedInteger; | |
184 key->u.rsa.coefficient.type = siUnsignedInteger; | |
185 } | |
186 | |
187 static void | |
188 prepare_dsa_priv_key_export_for_asn1(SECKEYRawPrivateKey *key) | |
189 { | |
190 key->u.dsa.privateValue.type = siUnsignedInteger; | |
191 key->u.dsa.params.prime.type = siUnsignedInteger; | |
192 key->u.dsa.params.subPrime.type = siUnsignedInteger; | |
193 key->u.dsa.params.base.type = siUnsignedInteger; | |
194 } | |
195 | |
196 static void | |
197 prepare_dh_priv_key_export_for_asn1(SECKEYRawPrivateKey *key) | |
198 { | |
199 key->u.dh.privateValue.type = siUnsignedInteger; | |
200 key->u.dh.prime.type = siUnsignedInteger; | |
201 key->u.dh.base.type = siUnsignedInteger; | |
202 } | |
203 | |
204 | |
205 SECStatus | |
206 PK11_ImportDERPrivateKeyInfo(PK11SlotInfo *slot, SECItem *derPKI, | |
207 SECItem *nickname, SECItem *publicValue, PRBool isPerm, | |
208 PRBool isPrivate, unsigned int keyUsage, void *wincx) | |
209 { | |
210 return PK11_ImportDERPrivateKeyInfoAndReturnKey(slot, derPKI, | |
211 nickname, publicValue, isPerm, isPrivate, keyUsage, NULL, wincx); | |
212 } | |
213 | |
214 SECStatus | |
215 PK11_ImportDERPrivateKeyInfoAndReturnKey(PK11SlotInfo *slot, SECItem *derPKI, | |
216 SECItem *nickname, SECItem *publicValue, PRBool isPerm, | |
217 PRBool isPrivate, unsigned int keyUsage, SECKEYPrivateKey** privk, | |
218 void *wincx) | |
219 { | |
220 SECKEYPrivateKeyInfo *pki = NULL; | |
221 PLArenaPool *temparena = NULL; | |
222 SECStatus rv = SECFailure; | |
223 | |
224 temparena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
225 if (!temparena) | |
226 return rv; | |
227 pki = PORT_ArenaZNew(temparena, SECKEYPrivateKeyInfo); | |
228 if (!pki) { | |
229 PORT_FreeArena(temparena, PR_FALSE); | |
230 return rv; | |
231 } | |
232 pki->arena = temparena; | |
233 | |
234 rv = SEC_ASN1DecodeItem(pki->arena, pki, SECKEY_PrivateKeyInfoTemplate, | |
235 derPKI); | |
236 if( rv != SECSuccess ) { | |
237 goto finish; | |
238 } | |
239 | |
240 rv = PK11_ImportPrivateKeyInfoAndReturnKey(slot, pki, nickname, | |
241 publicValue, isPerm, isPrivate, keyUsage, privk, wincx); | |
242 | |
243 finish: | |
244 /* this zeroes the key and frees the arena */ | |
245 SECKEY_DestroyPrivateKeyInfo(pki, PR_TRUE /*freeit*/); | |
246 return rv; | |
247 } | |
248 | |
249 SECStatus | |
250 PK11_ImportAndReturnPrivateKey(PK11SlotInfo *slot, SECKEYRawPrivateKey *lpk, | |
251 SECItem *nickname, SECItem *publicValue, PRBool isPerm, | |
252 PRBool isPrivate, unsigned int keyUsage, SECKEYPrivateKey **privk, | |
253 void *wincx) | |
254 { | |
255 CK_BBOOL cktrue = CK_TRUE; | |
256 CK_BBOOL ckfalse = CK_FALSE; | |
257 CK_OBJECT_CLASS keyClass = CKO_PRIVATE_KEY; | |
258 CK_KEY_TYPE keyType = CKK_RSA; | |
259 CK_OBJECT_HANDLE objectID; | |
260 CK_ATTRIBUTE theTemplate[20]; | |
261 int templateCount = 0; | |
262 SECStatus rv = SECFailure; | |
263 CK_ATTRIBUTE *attrs; | |
264 CK_ATTRIBUTE *signedattr = NULL; | |
265 int signedcount = 0; | |
266 CK_ATTRIBUTE *ap; | |
267 SECItem *ck_id = NULL; | |
268 | |
269 attrs = theTemplate; | |
270 | |
271 | |
272 PK11_SETATTRS(attrs, CKA_CLASS, &keyClass, sizeof(keyClass) ); attrs++; | |
273 PK11_SETATTRS(attrs, CKA_KEY_TYPE, &keyType, sizeof(keyType) ); attrs++; | |
274 PK11_SETATTRS(attrs, CKA_TOKEN, isPerm ? &cktrue : &ckfalse, | |
275 sizeof(CK_BBOOL) ); attrs++; | |
276 PK11_SETATTRS(attrs, CKA_SENSITIVE, isPrivate ? &cktrue : &ckfalse, | |
277 sizeof(CK_BBOOL) ); attrs++; | |
278 PK11_SETATTRS(attrs, CKA_PRIVATE, isPrivate ? &cktrue : &ckfalse, | |
279 sizeof(CK_BBOOL) ); attrs++; | |
280 | |
281 switch (lpk->keyType) { | |
282 case rsaKey: | |
283 keyType = CKK_RSA; | |
284 PK11_SETATTRS(attrs, CKA_UNWRAP, (keyUsage & KU_KEY_ENCIPHERMENT) ? | |
285 &cktrue : &ckfalse, sizeof(CK_BBOOL) ); attrs++; | |
286 PK11_SETATTRS(attrs, CKA_DECRYPT, (keyUsage & KU_DATA_ENCIPHERMENT) ? | |
287 &cktrue : &ckfalse, sizeof(CK_BBOOL) ); attrs++; | |
288 PK11_SETATTRS(attrs, CKA_SIGN, (keyUsage & KU_DIGITAL_SIGNATURE) ? | |
289 &cktrue : &ckfalse, sizeof(CK_BBOOL) ); attrs++; | |
290 PK11_SETATTRS(attrs, CKA_SIGN_RECOVER, | |
291 (keyUsage & KU_DIGITAL_SIGNATURE) ? | |
292 &cktrue : &ckfalse, sizeof(CK_BBOOL) ); attrs++; | |
293 ck_id = PK11_MakeIDFromPubKey(&lpk->u.rsa.modulus); | |
294 if (ck_id == NULL) { | |
295 goto loser; | |
296 } | |
297 PK11_SETATTRS(attrs, CKA_ID, ck_id->data,ck_id->len); attrs++; | |
298 if (nickname) { | |
299 PK11_SETATTRS(attrs, CKA_LABEL, nickname->data, nickname->len); attrs++; | |
300 } | |
301 signedattr = attrs; | |
302 PK11_SETATTRS(attrs, CKA_MODULUS, lpk->u.rsa.modulus.data, | |
303 lpk->u.rsa.modulus.len); attrs++; | |
304 PK11_SETATTRS(attrs, CKA_PUBLIC_EXPONENT, | |
305 lpk->u.rsa.publicExponent.data, | |
306 lpk->u.rsa.publicExponent.len); attrs++; | |
307 PK11_SETATTRS(attrs, CKA_PRIVATE_EXPONENT, | |
308 lpk->u.rsa.privateExponent.data, | |
309 lpk->u.rsa.privateExponent.len); attrs++; | |
310 PK11_SETATTRS(attrs, CKA_PRIME_1, | |
311 lpk->u.rsa.prime1.data, | |
312 lpk->u.rsa.prime1.len); attrs++; | |
313 PK11_SETATTRS(attrs, CKA_PRIME_2, | |
314 lpk->u.rsa.prime2.data, | |
315 lpk->u.rsa.prime2.len); attrs++; | |
316 PK11_SETATTRS(attrs, CKA_EXPONENT_1, | |
317 lpk->u.rsa.exponent1.data, | |
318 lpk->u.rsa.exponent1.len); attrs++; | |
319 PK11_SETATTRS(attrs, CKA_EXPONENT_2, | |
320 lpk->u.rsa.exponent2.data, | |
321 lpk->u.rsa.exponent2.len); attrs++; | |
322 PK11_SETATTRS(attrs, CKA_COEFFICIENT, | |
323 lpk->u.rsa.coefficient.data, | |
324 lpk->u.rsa.coefficient.len); attrs++; | |
325 break; | |
326 case dsaKey: | |
327 keyType = CKK_DSA; | |
328 /* To make our intenal PKCS #11 module work correctly with | |
329 * our database, we need to pass in the public key value for | |
330 * this dsa key. We have a netscape only CKA_ value to do this. | |
331 * Only send it to internal slots */ | |
332 if( publicValue == NULL ) { | |
333 goto loser; | |
334 } | |
335 if (PK11_IsInternal(slot)) { | |
336 PK11_SETATTRS(attrs, CKA_NETSCAPE_DB, | |
337 publicValue->data, publicValue->len); attrs++; | |
338 } | |
339 PK11_SETATTRS(attrs, CKA_SIGN, &cktrue, sizeof(CK_BBOOL)); attrs++; | |
340 PK11_SETATTRS(attrs, CKA_SIGN_RECOVER, &cktrue, sizeof(CK_BBOOL)); attrs++; | |
341 if(nickname) { | |
342 PK11_SETATTRS(attrs, CKA_LABEL, nickname->data, nickname->len); | |
343 attrs++; | |
344 } | |
345 ck_id = PK11_MakeIDFromPubKey(publicValue); | |
346 if (ck_id == NULL) { | |
347 goto loser; | |
348 } | |
349 PK11_SETATTRS(attrs, CKA_ID, ck_id->data,ck_id->len); attrs++; | |
350 signedattr = attrs; | |
351 PK11_SETATTRS(attrs, CKA_PRIME, lpk->u.dsa.params.prime.data, | |
352 lpk->u.dsa.params.prime.len); attrs++; | |
353 PK11_SETATTRS(attrs,CKA_SUBPRIME,lpk->u.dsa.params.subPrime.data, | |
354 lpk->u.dsa.params.subPrime.len); attrs++; | |
355 PK11_SETATTRS(attrs, CKA_BASE, lpk->u.dsa.params.base.data, | |
356 lpk->u.dsa.params.base.len); attrs++; | |
357 PK11_SETATTRS(attrs, CKA_VALUE, lpk->u.dsa.privateValue.data, | |
358 lpk->u.dsa.privateValue.len); attrs++; | |
359 break; | |
360 case dhKey: | |
361 keyType = CKK_DH; | |
362 /* To make our intenal PKCS #11 module work correctly with | |
363 * our database, we need to pass in the public key value for | |
364 * this dh key. We have a netscape only CKA_ value to do this. | |
365 * Only send it to internal slots */ | |
366 if (PK11_IsInternal(slot)) { | |
367 PK11_SETATTRS(attrs, CKA_NETSCAPE_DB, | |
368 publicValue->data, publicValue->len); attrs++; | |
369 } | |
370 PK11_SETATTRS(attrs, CKA_DERIVE, &cktrue, sizeof(CK_BBOOL)); attrs++; | |
371 if(nickname) { | |
372 PK11_SETATTRS(attrs, CKA_LABEL, nickname->data, nickname->len); | |
373 attrs++; | |
374 } | |
375 ck_id = PK11_MakeIDFromPubKey(publicValue); | |
376 if (ck_id == NULL) { | |
377 goto loser; | |
378 } | |
379 PK11_SETATTRS(attrs, CKA_ID, ck_id->data,ck_id->len); attrs++; | |
380 signedattr = attrs; | |
381 PK11_SETATTRS(attrs, CKA_PRIME, lpk->u.dh.prime.data, | |
382 lpk->u.dh.prime.len); attrs++; | |
383 PK11_SETATTRS(attrs, CKA_BASE, lpk->u.dh.base.data, | |
384 lpk->u.dh.base.len); attrs++; | |
385 PK11_SETATTRS(attrs, CKA_VALUE, lpk->u.dh.privateValue.data, | |
386 lpk->u.dh.privateValue.len); attrs++; | |
387 break; | |
388 /* what about fortezza??? */ | |
389 default: | |
390 PORT_SetError(SEC_ERROR_BAD_KEY); | |
391 goto loser; | |
392 } | |
393 templateCount = attrs - theTemplate; | |
394 PORT_Assert(templateCount <= sizeof(theTemplate)/sizeof(CK_ATTRIBUTE)); | |
395 PORT_Assert(signedattr != NULL); | |
396 signedcount = attrs - signedattr; | |
397 | |
398 for (ap=signedattr; signedcount; ap++, signedcount--) { | |
399 pk11_SignedToUnsigned(ap); | |
400 } | |
401 | |
402 rv = PK11_CreateNewObject(slot, CK_INVALID_SESSION, | |
403 theTemplate, templateCount, isPerm, &objectID); | |
404 | |
405 /* create and return a SECKEYPrivateKey */ | |
406 if( rv == SECSuccess && privk != NULL) { | |
407 *privk = PK11_MakePrivKey(slot, lpk->keyType, !isPerm, objectID, wincx); | |
408 if( *privk == NULL ) { | |
409 rv = SECFailure; | |
410 } | |
411 } | |
412 loser: | |
413 if (ck_id) { | |
414 SECITEM_ZfreeItem(ck_id, PR_TRUE); | |
415 } | |
416 return rv; | |
417 } | |
418 | |
419 SECStatus | |
420 PK11_ImportPrivateKeyInfoAndReturnKey(PK11SlotInfo *slot, | |
421 SECKEYPrivateKeyInfo *pki, SECItem *nickname, SECItem *publicValue, | |
422 PRBool isPerm, PRBool isPrivate, unsigned int keyUsage, | |
423 SECKEYPrivateKey **privk, void *wincx) | |
424 { | |
425 CK_KEY_TYPE keyType = CKK_RSA; | |
426 SECStatus rv = SECFailure; | |
427 SECKEYRawPrivateKey *lpk = NULL; | |
428 const SEC_ASN1Template *keyTemplate, *paramTemplate; | |
429 void *paramDest = NULL; | |
430 PLArenaPool *arena = NULL; | |
431 | |
432 arena = PORT_NewArena(2048); | |
433 if(!arena) { | |
434 return SECFailure; | |
435 } | |
436 | |
437 /* need to change this to use RSA/DSA keys */ | |
438 lpk = (SECKEYRawPrivateKey *)PORT_ArenaZAlloc(arena, | |
439 sizeof(SECKEYRawPrivateKey)); | |
440 if(lpk == NULL) { | |
441 goto loser; | |
442 } | |
443 lpk->arena = arena; | |
444 | |
445 switch(SECOID_GetAlgorithmTag(&pki->algorithm)) { | |
446 case SEC_OID_PKCS1_RSA_ENCRYPTION: | |
447 prepare_rsa_priv_key_export_for_asn1(lpk); | |
448 keyTemplate = SECKEY_RSAPrivateKeyExportTemplate; | |
449 paramTemplate = NULL; | |
450 paramDest = NULL; | |
451 lpk->keyType = rsaKey; | |
452 keyType = CKK_RSA; | |
453 break; | |
454 case SEC_OID_ANSIX9_DSA_SIGNATURE: | |
455 prepare_dsa_priv_key_export_for_asn1(lpk); | |
456 keyTemplate = SECKEY_DSAPrivateKeyExportTemplate; | |
457 paramTemplate = SECKEY_PQGParamsTemplate; | |
458 paramDest = &(lpk->u.dsa.params); | |
459 lpk->keyType = dsaKey; | |
460 keyType = CKK_DSA; | |
461 break; | |
462 case SEC_OID_X942_DIFFIE_HELMAN_KEY: | |
463 if(!publicValue) { | |
464 goto loser; | |
465 } | |
466 prepare_dh_priv_key_export_for_asn1(lpk); | |
467 keyTemplate = SECKEY_DHPrivateKeyExportTemplate; | |
468 paramTemplate = NULL; | |
469 paramDest = NULL; | |
470 lpk->keyType = dhKey; | |
471 keyType = CKK_DH; | |
472 break; | |
473 | |
474 default: | |
475 keyTemplate = NULL; | |
476 paramTemplate = NULL; | |
477 paramDest = NULL; | |
478 break; | |
479 } | |
480 | |
481 if(!keyTemplate) { | |
482 goto loser; | |
483 } | |
484 | |
485 /* decode the private key and any algorithm parameters */ | |
486 rv = SEC_ASN1DecodeItem(arena, lpk, keyTemplate, &pki->privateKey); | |
487 if(rv != SECSuccess) { | |
488 goto loser; | |
489 } | |
490 if(paramDest && paramTemplate) { | |
491 rv = SEC_ASN1DecodeItem(arena, paramDest, paramTemplate, | |
492 &(pki->algorithm.parameters)); | |
493 if(rv != SECSuccess) { | |
494 goto loser; | |
495 } | |
496 } | |
497 | |
498 rv = PK11_ImportAndReturnPrivateKey(slot,lpk,nickname,publicValue, isPerm, | |
499 isPrivate, keyUsage, privk, wincx); | |
500 | |
501 | |
502 loser: | |
503 if (arena != NULL) { | |
504 PORT_FreeArena(arena, PR_TRUE); | |
505 } | |
506 | |
507 return rv; | |
508 } | |
509 | |
510 SECStatus | |
511 PK11_ImportPrivateKeyInfo(PK11SlotInfo *slot, SECKEYPrivateKeyInfo *pki, | |
512 SECItem *nickname, SECItem *publicValue, PRBool isPerm, | |
513 PRBool isPrivate, unsigned int keyUsage, void *wincx) | |
514 { | |
515 return PK11_ImportPrivateKeyInfoAndReturnKey(slot, pki, nickname, | |
516 publicValue, isPerm, isPrivate, keyUsage, NULL, wincx); | |
517 | |
518 } | |
519 | |
520 SECItem * | |
521 PK11_ExportDERPrivateKeyInfo(SECKEYPrivateKey *pk, void *wincx) | |
522 { | |
523 SECKEYPrivateKeyInfo *pki = PK11_ExportPrivKeyInfo(pk, wincx); | |
524 SECItem *derPKI; | |
525 | |
526 if (!pki) { | |
527 return NULL; | |
528 } | |
529 derPKI = SEC_ASN1EncodeItem(NULL, NULL, pki, | |
530 SECKEY_PrivateKeyInfoTemplate); | |
531 SECKEY_DestroyPrivateKeyInfo(pki, PR_TRUE); | |
532 return derPKI; | |
533 } | |
534 | |
535 static PRBool | |
536 ReadAttribute(SECKEYPrivateKey *key, CK_ATTRIBUTE_TYPE type, | |
537 PLArenaPool *arena, SECItem *output) | |
538 { | |
539 SECStatus rv = PK11_ReadAttribute(key->pkcs11Slot, key->pkcs11ID, type, | |
540 arena, output); | |
541 return rv == SECSuccess; | |
542 } | |
543 | |
544 /* | |
545 * The caller is responsible for freeing the return value by passing it to | |
546 * SECKEY_DestroyPrivateKeyInfo(..., PR_TRUE). | |
547 */ | |
548 SECKEYPrivateKeyInfo * | |
549 PK11_ExportPrivKeyInfo(SECKEYPrivateKey *pk, void *wincx) | |
550 { | |
551 /* PrivateKeyInfo version (always zero) */ | |
552 const unsigned char pkiVersion = 0; | |
553 /* RSAPrivateKey version (always zero) */ | |
554 const unsigned char rsaVersion = 0; | |
555 PLArenaPool *arena = NULL; | |
556 SECKEYRawPrivateKey rawKey; | |
557 SECKEYPrivateKeyInfo *pki; | |
558 SECItem *encoded; | |
559 SECStatus rv; | |
560 | |
561 if (pk->keyType != rsaKey) { | |
562 PORT_SetError(PR_NOT_IMPLEMENTED_ERROR); | |
563 goto loser; | |
564 } | |
565 | |
566 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
567 if (!arena) { | |
568 goto loser; | |
569 } | |
570 memset(&rawKey, 0, sizeof(rawKey)); | |
571 rawKey.keyType = pk->keyType; | |
572 rawKey.u.rsa.version.type = siUnsignedInteger; | |
573 rawKey.u.rsa.version.data = (unsigned char *)PORT_ArenaAlloc(arena, 1); | |
574 if (!rawKey.u.rsa.version.data) { | |
575 goto loser; | |
576 } | |
577 rawKey.u.rsa.version.data[0] = rsaVersion; | |
578 rawKey.u.rsa.version.len = 1; | |
579 | |
580 /* Read the component attributes of the private key */ | |
581 prepare_rsa_priv_key_export_for_asn1(&rawKey); | |
582 if (!ReadAttribute(pk, CKA_MODULUS, arena, &rawKey.u.rsa.modulus) || | |
583 !ReadAttribute(pk, CKA_PUBLIC_EXPONENT, arena, | |
584 &rawKey.u.rsa.publicExponent) || | |
585 !ReadAttribute(pk, CKA_PRIVATE_EXPONENT, arena, | |
586 &rawKey.u.rsa.privateExponent) || | |
587 !ReadAttribute(pk, CKA_PRIME_1, arena, &rawKey.u.rsa.prime1) || | |
588 !ReadAttribute(pk, CKA_PRIME_2, arena, &rawKey.u.rsa.prime2) || | |
589 !ReadAttribute(pk, CKA_EXPONENT_1, arena, | |
590 &rawKey.u.rsa.exponent1) || | |
591 !ReadAttribute(pk, CKA_EXPONENT_2, arena, | |
592 &rawKey.u.rsa.exponent2) || | |
593 !ReadAttribute(pk, CKA_COEFFICIENT, arena, | |
594 &rawKey.u.rsa.coefficient)) { | |
595 goto loser; | |
596 } | |
597 | |
598 pki = PORT_ArenaZNew(arena, SECKEYPrivateKeyInfo); | |
599 if (!pki) { | |
600 goto loser; | |
601 } | |
602 encoded = SEC_ASN1EncodeItem(arena, &pki->privateKey, &rawKey, | |
603 SECKEY_RSAPrivateKeyExportTemplate); | |
604 if (!encoded) { | |
605 goto loser; | |
606 } | |
607 rv = SECOID_SetAlgorithmID(arena, &pki->algorithm, | |
608 SEC_OID_PKCS1_RSA_ENCRYPTION, NULL); | |
609 if (rv != SECSuccess) { | |
610 goto loser; | |
611 } | |
612 pki->version.type = siUnsignedInteger; | |
613 pki->version.data = (unsigned char *)PORT_ArenaAlloc(arena, 1); | |
614 if (!pki->version.data) { | |
615 goto loser; | |
616 } | |
617 pki->version.data[0] = pkiVersion; | |
618 pki->version.len = 1; | |
619 pki->arena = arena; | |
620 | |
621 return pki; | |
622 | |
623 loser: | |
624 if (arena) { | |
625 PORT_FreeArena(arena, PR_TRUE); | |
626 } | |
627 return NULL; | |
628 } |