1817466cbSJens Wiklander /* 2817466cbSJens Wiklander * Public Key abstraction layer 3817466cbSJens Wiklander * 4*7901324dSJerome Forissier * Copyright The Mbed TLS Contributors 5*7901324dSJerome Forissier * SPDX-License-Identifier: Apache-2.0 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander */ 19817466cbSJens Wiklander 20*7901324dSJerome Forissier #include "common.h" 21817466cbSJens Wiklander 22817466cbSJens Wiklander #if defined(MBEDTLS_PK_C) 23817466cbSJens Wiklander #include "mbedtls/pk.h" 24817466cbSJens Wiklander #include "mbedtls/pk_internal.h" 25817466cbSJens Wiklander 263d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 2711fa71b9SJerome Forissier #include "mbedtls/error.h" 28817466cbSJens Wiklander 29817466cbSJens Wiklander #if defined(MBEDTLS_RSA_C) 30817466cbSJens Wiklander #include "mbedtls/rsa.h" 31817466cbSJens Wiklander #endif 32817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 33817466cbSJens Wiklander #include "mbedtls/ecp.h" 34817466cbSJens Wiklander #endif 35817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_C) 36817466cbSJens Wiklander #include "mbedtls/ecdsa.h" 37817466cbSJens Wiklander #endif 38817466cbSJens Wiklander 3911fa71b9SJerome Forissier #if defined(MBEDTLS_USE_PSA_CRYPTO) 4011fa71b9SJerome Forissier #include "mbedtls/psa_util.h" 4111fa71b9SJerome Forissier #endif 4211fa71b9SJerome Forissier 43817466cbSJens Wiklander #include <limits.h> 443d3b0591SJens Wiklander #include <stdint.h> 45817466cbSJens Wiklander 463d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 473d3b0591SJens Wiklander #define PK_VALIDATE_RET( cond ) \ 483d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_PK_BAD_INPUT_DATA ) 493d3b0591SJens Wiklander #define PK_VALIDATE( cond ) \ 503d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 51817466cbSJens Wiklander 52817466cbSJens Wiklander /* 53817466cbSJens Wiklander * Initialise a mbedtls_pk_context 54817466cbSJens Wiklander */ 55817466cbSJens Wiklander void mbedtls_pk_init( mbedtls_pk_context *ctx ) 56817466cbSJens Wiklander { 573d3b0591SJens Wiklander PK_VALIDATE( ctx != NULL ); 58817466cbSJens Wiklander 59817466cbSJens Wiklander ctx->pk_info = NULL; 60817466cbSJens Wiklander ctx->pk_ctx = NULL; 61817466cbSJens Wiklander } 62817466cbSJens Wiklander 63817466cbSJens Wiklander /* 64817466cbSJens Wiklander * Free (the components of) a mbedtls_pk_context 65817466cbSJens Wiklander */ 66817466cbSJens Wiklander void mbedtls_pk_free( mbedtls_pk_context *ctx ) 67817466cbSJens Wiklander { 683d3b0591SJens Wiklander if( ctx == NULL ) 69817466cbSJens Wiklander return; 70817466cbSJens Wiklander 713d3b0591SJens Wiklander if ( ctx->pk_info != NULL ) 72817466cbSJens Wiklander ctx->pk_info->ctx_free_func( ctx->pk_ctx ); 73817466cbSJens Wiklander 743d3b0591SJens Wiklander mbedtls_platform_zeroize( ctx, sizeof( mbedtls_pk_context ) ); 75817466cbSJens Wiklander } 76817466cbSJens Wiklander 773d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE) 783d3b0591SJens Wiklander /* 793d3b0591SJens Wiklander * Initialize a restart context 803d3b0591SJens Wiklander */ 813d3b0591SJens Wiklander void mbedtls_pk_restart_init( mbedtls_pk_restart_ctx *ctx ) 823d3b0591SJens Wiklander { 833d3b0591SJens Wiklander PK_VALIDATE( ctx != NULL ); 843d3b0591SJens Wiklander ctx->pk_info = NULL; 853d3b0591SJens Wiklander ctx->rs_ctx = NULL; 863d3b0591SJens Wiklander } 873d3b0591SJens Wiklander 883d3b0591SJens Wiklander /* 893d3b0591SJens Wiklander * Free the components of a restart context 903d3b0591SJens Wiklander */ 913d3b0591SJens Wiklander void mbedtls_pk_restart_free( mbedtls_pk_restart_ctx *ctx ) 923d3b0591SJens Wiklander { 933d3b0591SJens Wiklander if( ctx == NULL || ctx->pk_info == NULL || 943d3b0591SJens Wiklander ctx->pk_info->rs_free_func == NULL ) 953d3b0591SJens Wiklander { 963d3b0591SJens Wiklander return; 973d3b0591SJens Wiklander } 983d3b0591SJens Wiklander 993d3b0591SJens Wiklander ctx->pk_info->rs_free_func( ctx->rs_ctx ); 1003d3b0591SJens Wiklander 1013d3b0591SJens Wiklander ctx->pk_info = NULL; 1023d3b0591SJens Wiklander ctx->rs_ctx = NULL; 1033d3b0591SJens Wiklander } 1043d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 1053d3b0591SJens Wiklander 106817466cbSJens Wiklander /* 107817466cbSJens Wiklander * Get pk_info structure from type 108817466cbSJens Wiklander */ 109817466cbSJens Wiklander const mbedtls_pk_info_t * mbedtls_pk_info_from_type( mbedtls_pk_type_t pk_type ) 110817466cbSJens Wiklander { 111817466cbSJens Wiklander switch( pk_type ) { 112817466cbSJens Wiklander #if defined(MBEDTLS_RSA_C) 113817466cbSJens Wiklander case MBEDTLS_PK_RSA: 114817466cbSJens Wiklander return( &mbedtls_rsa_info ); 115817466cbSJens Wiklander #endif 116817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 117817466cbSJens Wiklander case MBEDTLS_PK_ECKEY: 118817466cbSJens Wiklander return( &mbedtls_eckey_info ); 119817466cbSJens Wiklander case MBEDTLS_PK_ECKEY_DH: 120817466cbSJens Wiklander return( &mbedtls_eckeydh_info ); 121817466cbSJens Wiklander #endif 122817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_C) 123817466cbSJens Wiklander case MBEDTLS_PK_ECDSA: 124817466cbSJens Wiklander return( &mbedtls_ecdsa_info ); 125817466cbSJens Wiklander #endif 126817466cbSJens Wiklander /* MBEDTLS_PK_RSA_ALT omitted on purpose */ 127817466cbSJens Wiklander default: 128817466cbSJens Wiklander return( NULL ); 129817466cbSJens Wiklander } 130817466cbSJens Wiklander } 131817466cbSJens Wiklander 132817466cbSJens Wiklander /* 133817466cbSJens Wiklander * Initialise context 134817466cbSJens Wiklander */ 135817466cbSJens Wiklander int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info ) 136817466cbSJens Wiklander { 1373d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 1383d3b0591SJens Wiklander if( info == NULL || ctx->pk_info != NULL ) 139817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 140817466cbSJens Wiklander 141817466cbSJens Wiklander if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) 142817466cbSJens Wiklander return( MBEDTLS_ERR_PK_ALLOC_FAILED ); 143817466cbSJens Wiklander 144817466cbSJens Wiklander ctx->pk_info = info; 145817466cbSJens Wiklander 146817466cbSJens Wiklander return( 0 ); 147817466cbSJens Wiklander } 148817466cbSJens Wiklander 14911fa71b9SJerome Forissier #if defined(MBEDTLS_USE_PSA_CRYPTO) 15011fa71b9SJerome Forissier /* 15111fa71b9SJerome Forissier * Initialise a PSA-wrapping context 15211fa71b9SJerome Forissier */ 153*7901324dSJerome Forissier int mbedtls_pk_setup_opaque( mbedtls_pk_context *ctx, 154*7901324dSJerome Forissier const psa_key_id_t key ) 15511fa71b9SJerome Forissier { 15611fa71b9SJerome Forissier const mbedtls_pk_info_t * const info = &mbedtls_pk_opaque_info; 15711fa71b9SJerome Forissier psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT; 158*7901324dSJerome Forissier psa_key_id_t *pk_ctx; 15911fa71b9SJerome Forissier psa_key_type_t type; 16011fa71b9SJerome Forissier 16111fa71b9SJerome Forissier if( ctx == NULL || ctx->pk_info != NULL ) 16211fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 16311fa71b9SJerome Forissier 16411fa71b9SJerome Forissier if( PSA_SUCCESS != psa_get_key_attributes( key, &attributes ) ) 16511fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 16611fa71b9SJerome Forissier type = psa_get_key_type( &attributes ); 16711fa71b9SJerome Forissier psa_reset_key_attributes( &attributes ); 16811fa71b9SJerome Forissier 16911fa71b9SJerome Forissier /* Current implementation of can_do() relies on this. */ 17011fa71b9SJerome Forissier if( ! PSA_KEY_TYPE_IS_ECC_KEY_PAIR( type ) ) 17111fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE) ; 17211fa71b9SJerome Forissier 17311fa71b9SJerome Forissier if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) 17411fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_ALLOC_FAILED ); 17511fa71b9SJerome Forissier 17611fa71b9SJerome Forissier ctx->pk_info = info; 17711fa71b9SJerome Forissier 178*7901324dSJerome Forissier pk_ctx = (psa_key_id_t *) ctx->pk_ctx; 17911fa71b9SJerome Forissier *pk_ctx = key; 18011fa71b9SJerome Forissier 18111fa71b9SJerome Forissier return( 0 ); 18211fa71b9SJerome Forissier } 18311fa71b9SJerome Forissier #endif /* MBEDTLS_USE_PSA_CRYPTO */ 18411fa71b9SJerome Forissier 185817466cbSJens Wiklander #if defined(MBEDTLS_PK_RSA_ALT_SUPPORT) 186817466cbSJens Wiklander /* 187817466cbSJens Wiklander * Initialize an RSA-alt context 188817466cbSJens Wiklander */ 189817466cbSJens Wiklander int mbedtls_pk_setup_rsa_alt( mbedtls_pk_context *ctx, void * key, 190817466cbSJens Wiklander mbedtls_pk_rsa_alt_decrypt_func decrypt_func, 191817466cbSJens Wiklander mbedtls_pk_rsa_alt_sign_func sign_func, 192817466cbSJens Wiklander mbedtls_pk_rsa_alt_key_len_func key_len_func ) 193817466cbSJens Wiklander { 194817466cbSJens Wiklander mbedtls_rsa_alt_context *rsa_alt; 195817466cbSJens Wiklander const mbedtls_pk_info_t *info = &mbedtls_rsa_alt_info; 196817466cbSJens Wiklander 1973d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 1983d3b0591SJens Wiklander if( ctx->pk_info != NULL ) 199817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 200817466cbSJens Wiklander 201817466cbSJens Wiklander if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) 202817466cbSJens Wiklander return( MBEDTLS_ERR_PK_ALLOC_FAILED ); 203817466cbSJens Wiklander 204817466cbSJens Wiklander ctx->pk_info = info; 205817466cbSJens Wiklander 206817466cbSJens Wiklander rsa_alt = (mbedtls_rsa_alt_context *) ctx->pk_ctx; 207817466cbSJens Wiklander 208817466cbSJens Wiklander rsa_alt->key = key; 209817466cbSJens Wiklander rsa_alt->decrypt_func = decrypt_func; 210817466cbSJens Wiklander rsa_alt->sign_func = sign_func; 211817466cbSJens Wiklander rsa_alt->key_len_func = key_len_func; 212817466cbSJens Wiklander 213817466cbSJens Wiklander return( 0 ); 214817466cbSJens Wiklander } 215817466cbSJens Wiklander #endif /* MBEDTLS_PK_RSA_ALT_SUPPORT */ 216817466cbSJens Wiklander 217817466cbSJens Wiklander /* 218817466cbSJens Wiklander * Tell if a PK can do the operations of the given type 219817466cbSJens Wiklander */ 220817466cbSJens Wiklander int mbedtls_pk_can_do( const mbedtls_pk_context *ctx, mbedtls_pk_type_t type ) 221817466cbSJens Wiklander { 2223d3b0591SJens Wiklander /* A context with null pk_info is not set up yet and can't do anything. 2233d3b0591SJens Wiklander * For backward compatibility, also accept NULL instead of a context 2243d3b0591SJens Wiklander * pointer. */ 225817466cbSJens Wiklander if( ctx == NULL || ctx->pk_info == NULL ) 226817466cbSJens Wiklander return( 0 ); 227817466cbSJens Wiklander 228817466cbSJens Wiklander return( ctx->pk_info->can_do( type ) ); 229817466cbSJens Wiklander } 230817466cbSJens Wiklander 231817466cbSJens Wiklander /* 232817466cbSJens Wiklander * Helper for mbedtls_pk_sign and mbedtls_pk_verify 233817466cbSJens Wiklander */ 234817466cbSJens Wiklander static inline int pk_hashlen_helper( mbedtls_md_type_t md_alg, size_t *hash_len ) 235817466cbSJens Wiklander { 236817466cbSJens Wiklander const mbedtls_md_info_t *md_info; 237817466cbSJens Wiklander 238*7901324dSJerome Forissier if( *hash_len != 0 && md_alg == MBEDTLS_MD_NONE ) 239817466cbSJens Wiklander return( 0 ); 240817466cbSJens Wiklander 241817466cbSJens Wiklander if( ( md_info = mbedtls_md_info_from_type( md_alg ) ) == NULL ) 242817466cbSJens Wiklander return( -1 ); 243817466cbSJens Wiklander 244*7901324dSJerome Forissier if ( *hash_len != 0 && *hash_len != mbedtls_md_get_size( md_info ) ) 245*7901324dSJerome Forissier return ( -1 ); 246*7901324dSJerome Forissier 247817466cbSJens Wiklander *hash_len = mbedtls_md_get_size( md_info ); 248817466cbSJens Wiklander return( 0 ); 249817466cbSJens Wiklander } 250817466cbSJens Wiklander 2513d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE) 2523d3b0591SJens Wiklander /* 2533d3b0591SJens Wiklander * Helper to set up a restart context if needed 2543d3b0591SJens Wiklander */ 2553d3b0591SJens Wiklander static int pk_restart_setup( mbedtls_pk_restart_ctx *ctx, 2563d3b0591SJens Wiklander const mbedtls_pk_info_t *info ) 2573d3b0591SJens Wiklander { 2583d3b0591SJens Wiklander /* Don't do anything if already set up or invalid */ 2593d3b0591SJens Wiklander if( ctx == NULL || ctx->pk_info != NULL ) 2603d3b0591SJens Wiklander return( 0 ); 2613d3b0591SJens Wiklander 2623d3b0591SJens Wiklander /* Should never happen when we're called */ 2633d3b0591SJens Wiklander if( info->rs_alloc_func == NULL || info->rs_free_func == NULL ) 2643d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 2653d3b0591SJens Wiklander 2663d3b0591SJens Wiklander if( ( ctx->rs_ctx = info->rs_alloc_func() ) == NULL ) 2673d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_ALLOC_FAILED ); 2683d3b0591SJens Wiklander 2693d3b0591SJens Wiklander ctx->pk_info = info; 2703d3b0591SJens Wiklander 2713d3b0591SJens Wiklander return( 0 ); 2723d3b0591SJens Wiklander } 2733d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 2743d3b0591SJens Wiklander 2753d3b0591SJens Wiklander /* 2763d3b0591SJens Wiklander * Verify a signature (restartable) 2773d3b0591SJens Wiklander */ 2783d3b0591SJens Wiklander int mbedtls_pk_verify_restartable( mbedtls_pk_context *ctx, 2793d3b0591SJens Wiklander mbedtls_md_type_t md_alg, 2803d3b0591SJens Wiklander const unsigned char *hash, size_t hash_len, 2813d3b0591SJens Wiklander const unsigned char *sig, size_t sig_len, 2823d3b0591SJens Wiklander mbedtls_pk_restart_ctx *rs_ctx ) 2833d3b0591SJens Wiklander { 2843d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 2853d3b0591SJens Wiklander PK_VALIDATE_RET( ( md_alg == MBEDTLS_MD_NONE && hash_len == 0 ) || 2863d3b0591SJens Wiklander hash != NULL ); 2873d3b0591SJens Wiklander PK_VALIDATE_RET( sig != NULL ); 2883d3b0591SJens Wiklander 2893d3b0591SJens Wiklander if( ctx->pk_info == NULL || 2903d3b0591SJens Wiklander pk_hashlen_helper( md_alg, &hash_len ) != 0 ) 2913d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 2923d3b0591SJens Wiklander 2933d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE) 2943d3b0591SJens Wiklander /* optimization: use non-restartable version if restart disabled */ 2953d3b0591SJens Wiklander if( rs_ctx != NULL && 2963d3b0591SJens Wiklander mbedtls_ecp_restart_is_enabled() && 2973d3b0591SJens Wiklander ctx->pk_info->verify_rs_func != NULL ) 2983d3b0591SJens Wiklander { 29911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3003d3b0591SJens Wiklander 3013d3b0591SJens Wiklander if( ( ret = pk_restart_setup( rs_ctx, ctx->pk_info ) ) != 0 ) 3023d3b0591SJens Wiklander return( ret ); 3033d3b0591SJens Wiklander 3043d3b0591SJens Wiklander ret = ctx->pk_info->verify_rs_func( ctx->pk_ctx, 3053d3b0591SJens Wiklander md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx ); 3063d3b0591SJens Wiklander 3073d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 3083d3b0591SJens Wiklander mbedtls_pk_restart_free( rs_ctx ); 3093d3b0591SJens Wiklander 3103d3b0591SJens Wiklander return( ret ); 3113d3b0591SJens Wiklander } 3123d3b0591SJens Wiklander #else /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 3133d3b0591SJens Wiklander (void) rs_ctx; 3143d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 3153d3b0591SJens Wiklander 3163d3b0591SJens Wiklander if( ctx->pk_info->verify_func == NULL ) 3173d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 3183d3b0591SJens Wiklander 3193d3b0591SJens Wiklander return( ctx->pk_info->verify_func( ctx->pk_ctx, md_alg, hash, hash_len, 3203d3b0591SJens Wiklander sig, sig_len ) ); 3213d3b0591SJens Wiklander } 3223d3b0591SJens Wiklander 323817466cbSJens Wiklander /* 324817466cbSJens Wiklander * Verify a signature 325817466cbSJens Wiklander */ 326817466cbSJens Wiklander int mbedtls_pk_verify( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, 327817466cbSJens Wiklander const unsigned char *hash, size_t hash_len, 328817466cbSJens Wiklander const unsigned char *sig, size_t sig_len ) 329817466cbSJens Wiklander { 3303d3b0591SJens Wiklander return( mbedtls_pk_verify_restartable( ctx, md_alg, hash, hash_len, 3313d3b0591SJens Wiklander sig, sig_len, NULL ) ); 332817466cbSJens Wiklander } 333817466cbSJens Wiklander 334817466cbSJens Wiklander /* 335817466cbSJens Wiklander * Verify a signature with options 336817466cbSJens Wiklander */ 337817466cbSJens Wiklander int mbedtls_pk_verify_ext( mbedtls_pk_type_t type, const void *options, 338817466cbSJens Wiklander mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, 339817466cbSJens Wiklander const unsigned char *hash, size_t hash_len, 340817466cbSJens Wiklander const unsigned char *sig, size_t sig_len ) 341817466cbSJens Wiklander { 3423d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 3433d3b0591SJens Wiklander PK_VALIDATE_RET( ( md_alg == MBEDTLS_MD_NONE && hash_len == 0 ) || 3443d3b0591SJens Wiklander hash != NULL ); 3453d3b0591SJens Wiklander PK_VALIDATE_RET( sig != NULL ); 3463d3b0591SJens Wiklander 3473d3b0591SJens Wiklander if( ctx->pk_info == NULL ) 348817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 349817466cbSJens Wiklander 350817466cbSJens Wiklander if( ! mbedtls_pk_can_do( ctx, type ) ) 351817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 352817466cbSJens Wiklander 353817466cbSJens Wiklander if( type == MBEDTLS_PK_RSASSA_PSS ) 354817466cbSJens Wiklander { 355817466cbSJens Wiklander #if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_PKCS1_V21) 35611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 357817466cbSJens Wiklander const mbedtls_pk_rsassa_pss_options *pss_opts; 358817466cbSJens Wiklander 3593d3b0591SJens Wiklander #if SIZE_MAX > UINT_MAX 360817466cbSJens Wiklander if( md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len ) 361817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 3623d3b0591SJens Wiklander #endif /* SIZE_MAX > UINT_MAX */ 363817466cbSJens Wiklander 364817466cbSJens Wiklander if( options == NULL ) 365817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 366817466cbSJens Wiklander 367817466cbSJens Wiklander pss_opts = (const mbedtls_pk_rsassa_pss_options *) options; 368817466cbSJens Wiklander 369817466cbSJens Wiklander if( sig_len < mbedtls_pk_get_len( ctx ) ) 370817466cbSJens Wiklander return( MBEDTLS_ERR_RSA_VERIFY_FAILED ); 371817466cbSJens Wiklander 372817466cbSJens Wiklander ret = mbedtls_rsa_rsassa_pss_verify_ext( mbedtls_pk_rsa( *ctx ), 373817466cbSJens Wiklander NULL, NULL, MBEDTLS_RSA_PUBLIC, 374817466cbSJens Wiklander md_alg, (unsigned int) hash_len, hash, 375817466cbSJens Wiklander pss_opts->mgf1_hash_id, 376817466cbSJens Wiklander pss_opts->expected_salt_len, 377817466cbSJens Wiklander sig ); 378817466cbSJens Wiklander if( ret != 0 ) 379817466cbSJens Wiklander return( ret ); 380817466cbSJens Wiklander 381817466cbSJens Wiklander if( sig_len > mbedtls_pk_get_len( ctx ) ) 382817466cbSJens Wiklander return( MBEDTLS_ERR_PK_SIG_LEN_MISMATCH ); 383817466cbSJens Wiklander 384817466cbSJens Wiklander return( 0 ); 385817466cbSJens Wiklander #else 386817466cbSJens Wiklander return( MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE ); 387817466cbSJens Wiklander #endif /* MBEDTLS_RSA_C && MBEDTLS_PKCS1_V21 */ 388817466cbSJens Wiklander } 389817466cbSJens Wiklander 390817466cbSJens Wiklander /* General case: no options */ 391817466cbSJens Wiklander if( options != NULL ) 392817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 393817466cbSJens Wiklander 394817466cbSJens Wiklander return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); 395817466cbSJens Wiklander } 396817466cbSJens Wiklander 397817466cbSJens Wiklander /* 3983d3b0591SJens Wiklander * Make a signature (restartable) 3993d3b0591SJens Wiklander */ 4003d3b0591SJens Wiklander int mbedtls_pk_sign_restartable( mbedtls_pk_context *ctx, 4013d3b0591SJens Wiklander mbedtls_md_type_t md_alg, 4023d3b0591SJens Wiklander const unsigned char *hash, size_t hash_len, 4033d3b0591SJens Wiklander unsigned char *sig, size_t *sig_len, 4043d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, 4053d3b0591SJens Wiklander mbedtls_pk_restart_ctx *rs_ctx ) 4063d3b0591SJens Wiklander { 4073d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 4083d3b0591SJens Wiklander PK_VALIDATE_RET( ( md_alg == MBEDTLS_MD_NONE && hash_len == 0 ) || 4093d3b0591SJens Wiklander hash != NULL ); 4103d3b0591SJens Wiklander PK_VALIDATE_RET( sig != NULL ); 4113d3b0591SJens Wiklander 4123d3b0591SJens Wiklander if( ctx->pk_info == NULL || 4133d3b0591SJens Wiklander pk_hashlen_helper( md_alg, &hash_len ) != 0 ) 4143d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 4153d3b0591SJens Wiklander 4163d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE) 4173d3b0591SJens Wiklander /* optimization: use non-restartable version if restart disabled */ 4183d3b0591SJens Wiklander if( rs_ctx != NULL && 4193d3b0591SJens Wiklander mbedtls_ecp_restart_is_enabled() && 4203d3b0591SJens Wiklander ctx->pk_info->sign_rs_func != NULL ) 4213d3b0591SJens Wiklander { 42211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 4233d3b0591SJens Wiklander 4243d3b0591SJens Wiklander if( ( ret = pk_restart_setup( rs_ctx, ctx->pk_info ) ) != 0 ) 4253d3b0591SJens Wiklander return( ret ); 4263d3b0591SJens Wiklander 4273d3b0591SJens Wiklander ret = ctx->pk_info->sign_rs_func( ctx->pk_ctx, md_alg, 4283d3b0591SJens Wiklander hash, hash_len, sig, sig_len, f_rng, p_rng, rs_ctx->rs_ctx ); 4293d3b0591SJens Wiklander 4303d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 4313d3b0591SJens Wiklander mbedtls_pk_restart_free( rs_ctx ); 4323d3b0591SJens Wiklander 4333d3b0591SJens Wiklander return( ret ); 4343d3b0591SJens Wiklander } 4353d3b0591SJens Wiklander #else /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 4363d3b0591SJens Wiklander (void) rs_ctx; 4373d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */ 4383d3b0591SJens Wiklander 4393d3b0591SJens Wiklander if( ctx->pk_info->sign_func == NULL ) 4403d3b0591SJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 4413d3b0591SJens Wiklander 4423d3b0591SJens Wiklander return( ctx->pk_info->sign_func( ctx->pk_ctx, md_alg, hash, hash_len, 4433d3b0591SJens Wiklander sig, sig_len, f_rng, p_rng ) ); 4443d3b0591SJens Wiklander } 4453d3b0591SJens Wiklander 4463d3b0591SJens Wiklander /* 447817466cbSJens Wiklander * Make a signature 448817466cbSJens Wiklander */ 449817466cbSJens Wiklander int mbedtls_pk_sign( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, 450817466cbSJens Wiklander const unsigned char *hash, size_t hash_len, 451817466cbSJens Wiklander unsigned char *sig, size_t *sig_len, 452817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 453817466cbSJens Wiklander { 4543d3b0591SJens Wiklander return( mbedtls_pk_sign_restartable( ctx, md_alg, hash, hash_len, 4553d3b0591SJens Wiklander sig, sig_len, f_rng, p_rng, NULL ) ); 456817466cbSJens Wiklander } 457817466cbSJens Wiklander 458817466cbSJens Wiklander /* 459817466cbSJens Wiklander * Decrypt message 460817466cbSJens Wiklander */ 461817466cbSJens Wiklander int mbedtls_pk_decrypt( mbedtls_pk_context *ctx, 462817466cbSJens Wiklander const unsigned char *input, size_t ilen, 463817466cbSJens Wiklander unsigned char *output, size_t *olen, size_t osize, 464817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 465817466cbSJens Wiklander { 4663d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 4673d3b0591SJens Wiklander PK_VALIDATE_RET( input != NULL || ilen == 0 ); 4683d3b0591SJens Wiklander PK_VALIDATE_RET( output != NULL || osize == 0 ); 4693d3b0591SJens Wiklander PK_VALIDATE_RET( olen != NULL ); 4703d3b0591SJens Wiklander 4713d3b0591SJens Wiklander if( ctx->pk_info == NULL ) 472817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 473817466cbSJens Wiklander 474817466cbSJens Wiklander if( ctx->pk_info->decrypt_func == NULL ) 475817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 476817466cbSJens Wiklander 477817466cbSJens Wiklander return( ctx->pk_info->decrypt_func( ctx->pk_ctx, input, ilen, 478817466cbSJens Wiklander output, olen, osize, f_rng, p_rng ) ); 479817466cbSJens Wiklander } 480817466cbSJens Wiklander 481817466cbSJens Wiklander /* 482817466cbSJens Wiklander * Encrypt message 483817466cbSJens Wiklander */ 484817466cbSJens Wiklander int mbedtls_pk_encrypt( mbedtls_pk_context *ctx, 485817466cbSJens Wiklander const unsigned char *input, size_t ilen, 486817466cbSJens Wiklander unsigned char *output, size_t *olen, size_t osize, 487817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 488817466cbSJens Wiklander { 4893d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 4903d3b0591SJens Wiklander PK_VALIDATE_RET( input != NULL || ilen == 0 ); 4913d3b0591SJens Wiklander PK_VALIDATE_RET( output != NULL || osize == 0 ); 4923d3b0591SJens Wiklander PK_VALIDATE_RET( olen != NULL ); 4933d3b0591SJens Wiklander 4943d3b0591SJens Wiklander if( ctx->pk_info == NULL ) 495817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 496817466cbSJens Wiklander 497817466cbSJens Wiklander if( ctx->pk_info->encrypt_func == NULL ) 498817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 499817466cbSJens Wiklander 500817466cbSJens Wiklander return( ctx->pk_info->encrypt_func( ctx->pk_ctx, input, ilen, 501817466cbSJens Wiklander output, olen, osize, f_rng, p_rng ) ); 502817466cbSJens Wiklander } 503817466cbSJens Wiklander 504817466cbSJens Wiklander /* 505817466cbSJens Wiklander * Check public-private key pair 506817466cbSJens Wiklander */ 507817466cbSJens Wiklander int mbedtls_pk_check_pair( const mbedtls_pk_context *pub, const mbedtls_pk_context *prv ) 508817466cbSJens Wiklander { 5093d3b0591SJens Wiklander PK_VALIDATE_RET( pub != NULL ); 5103d3b0591SJens Wiklander PK_VALIDATE_RET( prv != NULL ); 5113d3b0591SJens Wiklander 5123d3b0591SJens Wiklander if( pub->pk_info == NULL || 51311fa71b9SJerome Forissier prv->pk_info == NULL ) 514817466cbSJens Wiklander { 515817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 516817466cbSJens Wiklander } 517817466cbSJens Wiklander 51811fa71b9SJerome Forissier if( prv->pk_info->check_pair_func == NULL ) 51911fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE ); 52011fa71b9SJerome Forissier 521817466cbSJens Wiklander if( prv->pk_info->type == MBEDTLS_PK_RSA_ALT ) 522817466cbSJens Wiklander { 523817466cbSJens Wiklander if( pub->pk_info->type != MBEDTLS_PK_RSA ) 524817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 525817466cbSJens Wiklander } 526817466cbSJens Wiklander else 527817466cbSJens Wiklander { 528817466cbSJens Wiklander if( pub->pk_info != prv->pk_info ) 529817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 530817466cbSJens Wiklander } 531817466cbSJens Wiklander 532817466cbSJens Wiklander return( prv->pk_info->check_pair_func( pub->pk_ctx, prv->pk_ctx ) ); 533817466cbSJens Wiklander } 534817466cbSJens Wiklander 535817466cbSJens Wiklander /* 536817466cbSJens Wiklander * Get key size in bits 537817466cbSJens Wiklander */ 538817466cbSJens Wiklander size_t mbedtls_pk_get_bitlen( const mbedtls_pk_context *ctx ) 539817466cbSJens Wiklander { 5403d3b0591SJens Wiklander /* For backward compatibility, accept NULL or a context that 5413d3b0591SJens Wiklander * isn't set up yet, and return a fake value that should be safe. */ 542817466cbSJens Wiklander if( ctx == NULL || ctx->pk_info == NULL ) 543817466cbSJens Wiklander return( 0 ); 544817466cbSJens Wiklander 545817466cbSJens Wiklander return( ctx->pk_info->get_bitlen( ctx->pk_ctx ) ); 546817466cbSJens Wiklander } 547817466cbSJens Wiklander 548817466cbSJens Wiklander /* 549817466cbSJens Wiklander * Export debug information 550817466cbSJens Wiklander */ 551817466cbSJens Wiklander int mbedtls_pk_debug( const mbedtls_pk_context *ctx, mbedtls_pk_debug_item *items ) 552817466cbSJens Wiklander { 5533d3b0591SJens Wiklander PK_VALIDATE_RET( ctx != NULL ); 5543d3b0591SJens Wiklander if( ctx->pk_info == NULL ) 555817466cbSJens Wiklander return( MBEDTLS_ERR_PK_BAD_INPUT_DATA ); 556817466cbSJens Wiklander 557817466cbSJens Wiklander if( ctx->pk_info->debug_func == NULL ) 558817466cbSJens Wiklander return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 559817466cbSJens Wiklander 560817466cbSJens Wiklander ctx->pk_info->debug_func( ctx->pk_ctx, items ); 561817466cbSJens Wiklander return( 0 ); 562817466cbSJens Wiklander } 563817466cbSJens Wiklander 564817466cbSJens Wiklander /* 565817466cbSJens Wiklander * Access the PK type name 566817466cbSJens Wiklander */ 567817466cbSJens Wiklander const char *mbedtls_pk_get_name( const mbedtls_pk_context *ctx ) 568817466cbSJens Wiklander { 569817466cbSJens Wiklander if( ctx == NULL || ctx->pk_info == NULL ) 570817466cbSJens Wiklander return( "invalid PK" ); 571817466cbSJens Wiklander 572817466cbSJens Wiklander return( ctx->pk_info->name ); 573817466cbSJens Wiklander } 574817466cbSJens Wiklander 575817466cbSJens Wiklander /* 576817466cbSJens Wiklander * Access the PK type 577817466cbSJens Wiklander */ 578817466cbSJens Wiklander mbedtls_pk_type_t mbedtls_pk_get_type( const mbedtls_pk_context *ctx ) 579817466cbSJens Wiklander { 580817466cbSJens Wiklander if( ctx == NULL || ctx->pk_info == NULL ) 581817466cbSJens Wiklander return( MBEDTLS_PK_NONE ); 582817466cbSJens Wiklander 583817466cbSJens Wiklander return( ctx->pk_info->type ); 584817466cbSJens Wiklander } 585817466cbSJens Wiklander 58611fa71b9SJerome Forissier #if defined(MBEDTLS_USE_PSA_CRYPTO) 58711fa71b9SJerome Forissier /* 58811fa71b9SJerome Forissier * Load the key to a PSA key slot, 58911fa71b9SJerome Forissier * then turn the PK context into a wrapper for that key slot. 59011fa71b9SJerome Forissier * 59111fa71b9SJerome Forissier * Currently only works for EC private keys. 59211fa71b9SJerome Forissier */ 59311fa71b9SJerome Forissier int mbedtls_pk_wrap_as_opaque( mbedtls_pk_context *pk, 594*7901324dSJerome Forissier psa_key_id_t *key, 59511fa71b9SJerome Forissier psa_algorithm_t hash_alg ) 59611fa71b9SJerome Forissier { 59711fa71b9SJerome Forissier #if !defined(MBEDTLS_ECP_C) 598*7901324dSJerome Forissier ((void) pk); 599*7901324dSJerome Forissier ((void) key); 600*7901324dSJerome Forissier ((void) hash_alg); 60111fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 60211fa71b9SJerome Forissier #else 60311fa71b9SJerome Forissier const mbedtls_ecp_keypair *ec; 60411fa71b9SJerome Forissier unsigned char d[MBEDTLS_ECP_MAX_BYTES]; 60511fa71b9SJerome Forissier size_t d_len; 606*7901324dSJerome Forissier psa_ecc_family_t curve_id; 60711fa71b9SJerome Forissier psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT; 60811fa71b9SJerome Forissier psa_key_type_t key_type; 60911fa71b9SJerome Forissier size_t bits; 61011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 61111fa71b9SJerome Forissier 61211fa71b9SJerome Forissier /* export the private key material in the format PSA wants */ 61311fa71b9SJerome Forissier if( mbedtls_pk_get_type( pk ) != MBEDTLS_PK_ECKEY ) 61411fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_TYPE_MISMATCH ); 61511fa71b9SJerome Forissier 61611fa71b9SJerome Forissier ec = mbedtls_pk_ec( *pk ); 61711fa71b9SJerome Forissier d_len = ( ec->grp.nbits + 7 ) / 8; 61811fa71b9SJerome Forissier if( ( ret = mbedtls_mpi_write_binary( &ec->d, d, d_len ) ) != 0 ) 61911fa71b9SJerome Forissier return( ret ); 62011fa71b9SJerome Forissier 62111fa71b9SJerome Forissier curve_id = mbedtls_ecc_group_to_psa( ec->grp.id, &bits ); 62211fa71b9SJerome Forissier key_type = PSA_KEY_TYPE_ECC_KEY_PAIR( curve_id ); 62311fa71b9SJerome Forissier 62411fa71b9SJerome Forissier /* prepare the key attributes */ 62511fa71b9SJerome Forissier psa_set_key_type( &attributes, key_type ); 62611fa71b9SJerome Forissier psa_set_key_bits( &attributes, bits ); 62711fa71b9SJerome Forissier psa_set_key_usage_flags( &attributes, PSA_KEY_USAGE_SIGN_HASH ); 62811fa71b9SJerome Forissier psa_set_key_algorithm( &attributes, PSA_ALG_ECDSA(hash_alg) ); 62911fa71b9SJerome Forissier 63011fa71b9SJerome Forissier /* import private key into PSA */ 631*7901324dSJerome Forissier if( PSA_SUCCESS != psa_import_key( &attributes, d, d_len, key ) ) 63211fa71b9SJerome Forissier return( MBEDTLS_ERR_PK_HW_ACCEL_FAILED ); 63311fa71b9SJerome Forissier 63411fa71b9SJerome Forissier /* make PK context wrap the key slot */ 63511fa71b9SJerome Forissier mbedtls_pk_free( pk ); 63611fa71b9SJerome Forissier mbedtls_pk_init( pk ); 63711fa71b9SJerome Forissier 638*7901324dSJerome Forissier return( mbedtls_pk_setup_opaque( pk, *key ) ); 63911fa71b9SJerome Forissier #endif /* MBEDTLS_ECP_C */ 64011fa71b9SJerome Forissier } 64111fa71b9SJerome Forissier #endif /* MBEDTLS_USE_PSA_CRYPTO */ 642817466cbSJens Wiklander #endif /* MBEDTLS_PK_C */ 643