Mercurial > trustbridge > nss-cmake-static
comparison nss/lib/pk11wrap/pk11sdr.c @ 0:1e5118fa0cb1
This is NSS with a Cmake Buildsyste
To compile a static NSS library for Windows we've used the
Chromium-NSS fork and added a Cmake buildsystem to compile
it statically for Windows. See README.chromium for chromium
changes and README.trustbridge for our modifications.
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Mon, 28 Jul 2014 10:47:06 +0200 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:1e5118fa0cb1 |
---|---|
1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
4 | |
5 #include "seccomon.h" | |
6 #include "secoid.h" | |
7 #include "secasn1.h" | |
8 #include "pkcs11.h" | |
9 #include "pk11func.h" | |
10 #include "pk11sdr.h" | |
11 | |
12 /* | |
13 * Data structure and template for encoding the result of an SDR operation | |
14 * This is temporary. It should include the algorithm ID of the encryption mechanism | |
15 */ | |
16 struct SDRResult | |
17 { | |
18 SECItem keyid; | |
19 SECAlgorithmID alg; | |
20 SECItem data; | |
21 }; | |
22 typedef struct SDRResult SDRResult; | |
23 | |
24 SEC_ASN1_MKSUB(SECOID_AlgorithmIDTemplate) | |
25 | |
26 static SEC_ASN1Template template[] = { | |
27 { SEC_ASN1_SEQUENCE, 0, NULL, sizeof (SDRResult) }, | |
28 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, keyid) }, | |
29 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg), | |
30 SEC_ASN1_SUB(SECOID_AlgorithmIDTemplate) }, | |
31 { SEC_ASN1_OCTET_STRING, offsetof(SDRResult, data) }, | |
32 { 0 } | |
33 }; | |
34 | |
35 static unsigned char keyID[] = { | |
36 0xF8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | |
37 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 | |
38 }; | |
39 | |
40 static SECItem keyIDItem = { | |
41 0, | |
42 keyID, | |
43 sizeof keyID | |
44 }; | |
45 | |
46 /* local utility function for padding an incoming data block | |
47 * to the mechanism block size. | |
48 */ | |
49 static SECStatus | |
50 padBlock(SECItem *data, int blockSize, SECItem *result) | |
51 { | |
52 SECStatus rv = SECSuccess; | |
53 int padLength; | |
54 unsigned int i; | |
55 | |
56 result->data = 0; | |
57 result->len = 0; | |
58 | |
59 /* This algorithm always adds to the block (to indicate the number | |
60 * of pad bytes). So allocate a block large enough. | |
61 */ | |
62 padLength = blockSize - (data->len % blockSize); | |
63 result->len = data->len + padLength; | |
64 result->data = (unsigned char *)PORT_Alloc(result->len); | |
65 | |
66 /* Copy the data */ | |
67 PORT_Memcpy(result->data, data->data, data->len); | |
68 | |
69 /* Add the pad values */ | |
70 for(i = data->len; i < result->len; i++) | |
71 result->data[i] = (unsigned char)padLength; | |
72 | |
73 return rv; | |
74 } | |
75 | |
76 static SECStatus | |
77 unpadBlock(SECItem *data, int blockSize, SECItem *result) | |
78 { | |
79 SECStatus rv = SECSuccess; | |
80 int padLength; | |
81 unsigned int i; | |
82 | |
83 result->data = 0; | |
84 result->len = 0; | |
85 | |
86 /* Remove the padding from the end if the input data */ | |
87 if (data->len == 0 || data->len % blockSize != 0) { rv = SECFailure; goto loser; } | |
88 | |
89 padLength = data->data[data->len-1]; | |
90 if (padLength > blockSize) { rv = SECFailure; goto loser; } | |
91 | |
92 /* verify padding */ | |
93 for (i=data->len - padLength; i < data->len; i++) { | |
94 if (data->data[i] != padLength) { | |
95 rv = SECFailure; | |
96 goto loser; | |
97 } | |
98 } | |
99 | |
100 result->len = data->len - padLength; | |
101 result->data = (unsigned char *)PORT_Alloc(result->len); | |
102 if (!result->data) { rv = SECFailure; goto loser; } | |
103 | |
104 PORT_Memcpy(result->data, data->data, result->len); | |
105 | |
106 if (padLength < 2) { | |
107 return SECWouldBlock; | |
108 } | |
109 | |
110 loser: | |
111 return rv; | |
112 } | |
113 | |
114 static PRLock *pk11sdrLock = NULL; | |
115 | |
116 void | |
117 pk11sdr_Init (void) | |
118 { | |
119 pk11sdrLock = PR_NewLock(); | |
120 } | |
121 | |
122 void | |
123 pk11sdr_Shutdown(void) | |
124 { | |
125 if (pk11sdrLock) { | |
126 PR_DestroyLock(pk11sdrLock); | |
127 pk11sdrLock = NULL; | |
128 } | |
129 } | |
130 | |
131 /* | |
132 * PK11SDR_Encrypt | |
133 * Encrypt a block of data using the symmetric key identified. The result | |
134 * is an ASN.1 (DER) encoded block of keyid, params and data. | |
135 */ | |
136 SECStatus | |
137 PK11SDR_Encrypt(SECItem *keyid, SECItem *data, SECItem *result, void *cx) | |
138 { | |
139 SECStatus rv = SECSuccess; | |
140 PK11SlotInfo *slot = 0; | |
141 PK11SymKey *key = 0; | |
142 SECItem *params = 0; | |
143 PK11Context *ctx = 0; | |
144 CK_MECHANISM_TYPE type; | |
145 SDRResult sdrResult; | |
146 SECItem paddedData; | |
147 SECItem *pKeyID; | |
148 PLArenaPool *arena = 0; | |
149 | |
150 /* Initialize */ | |
151 paddedData.len = 0; | |
152 paddedData.data = 0; | |
153 | |
154 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE); | |
155 if (!arena) { rv = SECFailure; goto loser; } | |
156 | |
157 /* 1. Locate the requested keyid, or the default key (which has a keyid) | |
158 * 2. Create an encryption context | |
159 * 3. Encrypt | |
160 * 4. Encode the results (using ASN.1) | |
161 */ | |
162 | |
163 slot = PK11_GetInternalKeySlot(); | |
164 if (!slot) { rv = SECFailure; goto loser; } | |
165 | |
166 /* Use triple-DES */ | |
167 type = CKM_DES3_CBC; | |
168 | |
169 /* | |
170 * Login to the internal token before we look for the key, otherwise we | |
171 * won't find it. | |
172 */ | |
173 rv = PK11_Authenticate(slot, PR_TRUE, cx); | |
174 if (rv != SECSuccess) goto loser; | |
175 | |
176 /* Find the key to use */ | |
177 pKeyID = keyid; | |
178 if (pKeyID->len == 0) { | |
179 pKeyID = &keyIDItem; /* Use default value */ | |
180 | |
181 /* put in a course lock to prevent a race between not finding the | |
182 * key and creating one. | |
183 */ | |
184 | |
185 if (pk11sdrLock) PR_Lock(pk11sdrLock); | |
186 | |
187 /* Try to find the key */ | |
188 key = PK11_FindFixedKey(slot, type, pKeyID, cx); | |
189 | |
190 /* If the default key doesn't exist yet, try to create it */ | |
191 if (!key) key = PK11_GenDES3TokenKey(slot, pKeyID, cx); | |
192 if (pk11sdrLock) PR_Unlock(pk11sdrLock); | |
193 } else { | |
194 key = PK11_FindFixedKey(slot, type, pKeyID, cx); | |
195 } | |
196 | |
197 if (!key) { rv = SECFailure; goto loser; } | |
198 | |
199 params = PK11_GenerateNewParam(type, key); | |
200 if (!params) { rv = SECFailure; goto loser; } | |
201 | |
202 ctx = PK11_CreateContextBySymKey(type, CKA_ENCRYPT, key, params); | |
203 if (!ctx) { rv = SECFailure; goto loser; } | |
204 | |
205 rv = padBlock(data, PK11_GetBlockSize(type, 0), &paddedData); | |
206 if (rv != SECSuccess) goto loser; | |
207 | |
208 sdrResult.data.len = paddedData.len; | |
209 sdrResult.data.data = (unsigned char *)PORT_ArenaAlloc(arena, sdrResult.data.len); | |
210 | |
211 rv = PK11_CipherOp(ctx, sdrResult.data.data, (int*)&sdrResult.data.len, sdrResult.data.len, | |
212 paddedData.data, paddedData.len); | |
213 if (rv != SECSuccess) goto loser; | |
214 | |
215 PK11_Finalize(ctx); | |
216 | |
217 sdrResult.keyid = *pKeyID; | |
218 | |
219 rv = PK11_ParamToAlgid(SEC_OID_DES_EDE3_CBC, params, arena, &sdrResult.alg); | |
220 if (rv != SECSuccess) goto loser; | |
221 | |
222 if (!SEC_ASN1EncodeItem(0, result, &sdrResult, template)) { rv = SECFailure; goto loser; } | |
223 | |
224 loser: | |
225 SECITEM_ZfreeItem(&paddedData, PR_FALSE); | |
226 if (arena) PORT_FreeArena(arena, PR_TRUE); | |
227 if (ctx) PK11_DestroyContext(ctx, PR_TRUE); | |
228 if (params) SECITEM_ZfreeItem(params, PR_TRUE); | |
229 if (key) PK11_FreeSymKey(key); | |
230 if (slot) PK11_FreeSlot(slot); | |
231 | |
232 return rv; | |
233 } | |
234 | |
235 /* decrypt a block */ | |
236 static SECStatus | |
237 pk11Decrypt(PK11SlotInfo *slot, PLArenaPool *arena, | |
238 CK_MECHANISM_TYPE type, PK11SymKey *key, | |
239 SECItem *params, SECItem *in, SECItem *result) | |
240 { | |
241 PK11Context *ctx = 0; | |
242 SECItem paddedResult; | |
243 SECStatus rv; | |
244 | |
245 paddedResult.len = 0; | |
246 paddedResult.data = 0; | |
247 | |
248 ctx = PK11_CreateContextBySymKey(type, CKA_DECRYPT, key, params); | |
249 if (!ctx) { rv = SECFailure; goto loser; } | |
250 | |
251 paddedResult.len = in->len; | |
252 paddedResult.data = PORT_ArenaAlloc(arena, paddedResult.len); | |
253 | |
254 rv = PK11_CipherOp(ctx, paddedResult.data, | |
255 (int*)&paddedResult.len, paddedResult.len, | |
256 in->data, in->len); | |
257 if (rv != SECSuccess) goto loser; | |
258 | |
259 PK11_Finalize(ctx); | |
260 | |
261 /* Remove the padding */ | |
262 rv = unpadBlock(&paddedResult, PK11_GetBlockSize(type, 0), result); | |
263 if (rv) goto loser; | |
264 | |
265 loser: | |
266 if (ctx) PK11_DestroyContext(ctx, PR_TRUE); | |
267 return rv; | |
268 } | |
269 | |
270 /* | |
271 * PK11SDR_Decrypt | |
272 * Decrypt a block of data produced by PK11SDR_Encrypt. The key used is identified | |
273 * by the keyid field within the input. | |
274 */ | |
275 SECStatus | |
276 PK11SDR_Decrypt(SECItem *data, SECItem *result, void *cx) | |
277 { | |
278 SECStatus rv = SECSuccess; | |
279 PK11SlotInfo *slot = 0; | |
280 PK11SymKey *key = 0; | |
281 CK_MECHANISM_TYPE type; | |
282 SDRResult sdrResult; | |
283 SECItem *params = 0; | |
284 SECItem possibleResult = { 0, NULL, 0 }; | |
285 PLArenaPool *arena = 0; | |
286 | |
287 arena = PORT_NewArena(SEC_ASN1_DEFAULT_ARENA_SIZE); | |
288 if (!arena) { rv = SECFailure; goto loser; } | |
289 | |
290 /* Decode the incoming data */ | |
291 memset(&sdrResult, 0, sizeof sdrResult); | |
292 rv = SEC_QuickDERDecodeItem(arena, &sdrResult, template, data); | |
293 if (rv != SECSuccess) goto loser; /* Invalid format */ | |
294 | |
295 /* Find the slot and key for the given keyid */ | |
296 slot = PK11_GetInternalKeySlot(); | |
297 if (!slot) { rv = SECFailure; goto loser; } | |
298 | |
299 rv = PK11_Authenticate(slot, PR_TRUE, cx); | |
300 if (rv != SECSuccess) goto loser; | |
301 | |
302 /* Get the parameter values from the data */ | |
303 params = PK11_ParamFromAlgid(&sdrResult.alg); | |
304 if (!params) { rv = SECFailure; goto loser; } | |
305 | |
306 /* Use triple-DES (Should look up the algorithm) */ | |
307 type = CKM_DES3_CBC; | |
308 key = PK11_FindFixedKey(slot, type, &sdrResult.keyid, cx); | |
309 if (!key) { | |
310 rv = SECFailure; | |
311 } else { | |
312 rv = pk11Decrypt(slot, arena, type, key, params, | |
313 &sdrResult.data, result); | |
314 } | |
315 | |
316 /* | |
317 * if the pad value was too small (1 or 2), then it's statistically | |
318 * 'likely' that (1 in 256) that we may not have the correct key. | |
319 * Check the other keys for a better match. If we find none, use | |
320 * this result. | |
321 */ | |
322 if (rv == SECWouldBlock) { | |
323 possibleResult = *result; | |
324 } | |
325 | |
326 /* | |
327 * handle the case where your key indicies may have been broken | |
328 */ | |
329 if (rv != SECSuccess) { | |
330 PK11SymKey *keyList = PK11_ListFixedKeysInSlot(slot, NULL, cx); | |
331 PK11SymKey *testKey = NULL; | |
332 PK11SymKey *nextKey = NULL; | |
333 | |
334 for (testKey = keyList; testKey; | |
335 testKey = PK11_GetNextSymKey(testKey)) { | |
336 rv = pk11Decrypt(slot, arena, type, testKey, params, | |
337 &sdrResult.data, result); | |
338 if (rv == SECSuccess) { | |
339 break; | |
340 } | |
341 /* found a close match. If it's our first remember it */ | |
342 if (rv == SECWouldBlock) { | |
343 if (possibleResult.data) { | |
344 /* this is unlikely but possible. If we hit this condition, | |
345 * we have no way of knowing which possibility to prefer. | |
346 * in this case we just match the key the application | |
347 * thought was the right one */ | |
348 SECITEM_ZfreeItem(result, PR_FALSE); | |
349 } else { | |
350 possibleResult = *result; | |
351 } | |
352 } | |
353 } | |
354 | |
355 /* free the list */ | |
356 for (testKey = keyList; testKey; testKey = nextKey) { | |
357 nextKey = PK11_GetNextSymKey(testKey); | |
358 PK11_FreeSymKey(testKey); | |
359 } | |
360 } | |
361 | |
362 /* we didn't find a better key, use the one with a small pad value */ | |
363 if ((rv != SECSuccess) && (possibleResult.data)) { | |
364 *result = possibleResult; | |
365 possibleResult.data = NULL; | |
366 rv = SECSuccess; | |
367 } | |
368 | |
369 loser: | |
370 if (arena) PORT_FreeArena(arena, PR_TRUE); | |
371 if (key) PK11_FreeSymKey(key); | |
372 if (params) SECITEM_ZfreeItem(params, PR_TRUE); | |
373 if (slot) PK11_FreeSlot(slot); | |
374 if (possibleResult.data) SECITEM_ZfreeItem(&possibleResult, PR_FALSE); | |
375 | |
376 return rv; | |
377 } |