pkcs8.c 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. /*
  2. * PKCS #8 (Private-key information syntax)
  3. * Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "asn1.h"
  11. #include "bignum.h"
  12. #include "rsa.h"
  13. #include "pkcs5.h"
  14. #include "pkcs8.h"
  15. struct crypto_private_key * pkcs8_key_import(const u8 *buf, size_t len)
  16. {
  17. struct asn1_hdr hdr;
  18. const u8 *pos, *end;
  19. struct bignum *zero;
  20. struct asn1_oid oid;
  21. char obuf[80];
  22. /* PKCS #8, Chapter 6 */
  23. /* PrivateKeyInfo ::= SEQUENCE */
  24. if (asn1_get_next(buf, len, &hdr) < 0 ||
  25. hdr.class != ASN1_CLASS_UNIVERSAL ||
  26. hdr.tag != ASN1_TAG_SEQUENCE) {
  27. wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
  28. "header (SEQUENCE); assume PKCS #8 not used");
  29. return NULL;
  30. }
  31. pos = hdr.payload;
  32. end = pos + hdr.length;
  33. /* version Version (Version ::= INTEGER) */
  34. if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
  35. hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) {
  36. wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
  37. "class %d tag 0x%x; assume PKCS #8 not used",
  38. hdr.class, hdr.tag);
  39. return NULL;
  40. }
  41. zero = bignum_init();
  42. if (zero == NULL)
  43. return NULL;
  44. if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) {
  45. wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
  46. bignum_deinit(zero);
  47. return NULL;
  48. }
  49. pos = hdr.payload + hdr.length;
  50. if (bignum_cmp_d(zero, 0) != 0) {
  51. wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
  52. "beginning of private key; not found; assume "
  53. "PKCS #8 not used");
  54. bignum_deinit(zero);
  55. return NULL;
  56. }
  57. bignum_deinit(zero);
  58. /* privateKeyAlgorithm PrivateKeyAlgorithmIdentifier
  59. * (PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier) */
  60. if (asn1_get_next(pos, len, &hdr) < 0 ||
  61. hdr.class != ASN1_CLASS_UNIVERSAL ||
  62. hdr.tag != ASN1_TAG_SEQUENCE) {
  63. wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
  64. "(AlgorithmIdentifier) - found class %d tag 0x%x; "
  65. "assume PKCS #8 not used",
  66. hdr.class, hdr.tag);
  67. return NULL;
  68. }
  69. if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) {
  70. wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
  71. "(algorithm); assume PKCS #8 not used");
  72. return NULL;
  73. }
  74. asn1_oid_to_str(&oid, obuf, sizeof(obuf));
  75. wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
  76. if (oid.len != 7 ||
  77. oid.oid[0] != 1 /* iso */ ||
  78. oid.oid[1] != 2 /* member-body */ ||
  79. oid.oid[2] != 840 /* us */ ||
  80. oid.oid[3] != 113549 /* rsadsi */ ||
  81. oid.oid[4] != 1 /* pkcs */ ||
  82. oid.oid[5] != 1 /* pkcs-1 */ ||
  83. oid.oid[6] != 1 /* rsaEncryption */) {
  84. wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
  85. "algorithm %s", obuf);
  86. return NULL;
  87. }
  88. pos = hdr.payload + hdr.length;
  89. /* privateKey PrivateKey (PrivateKey ::= OCTET STRING) */
  90. if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
  91. hdr.class != ASN1_CLASS_UNIVERSAL ||
  92. hdr.tag != ASN1_TAG_OCTETSTRING) {
  93. wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
  94. "(privateKey) - found class %d tag 0x%x",
  95. hdr.class, hdr.tag);
  96. return NULL;
  97. }
  98. wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey");
  99. return (struct crypto_private_key *)
  100. crypto_rsa_import_private_key(hdr.payload, hdr.length);
  101. }
  102. struct crypto_private_key *
  103. pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd)
  104. {
  105. struct asn1_hdr hdr;
  106. const u8 *pos, *end, *enc_alg;
  107. size_t enc_alg_len;
  108. u8 *data;
  109. size_t data_len;
  110. if (passwd == NULL)
  111. return NULL;
  112. /*
  113. * PKCS #8, Chapter 7
  114. * EncryptedPrivateKeyInfo ::= SEQUENCE {
  115. * encryptionAlgorithm EncryptionAlgorithmIdentifier,
  116. * encryptedData EncryptedData }
  117. * EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
  118. * EncryptedData ::= OCTET STRING
  119. */
  120. if (asn1_get_next(buf, len, &hdr) < 0 ||
  121. hdr.class != ASN1_CLASS_UNIVERSAL ||
  122. hdr.tag != ASN1_TAG_SEQUENCE) {
  123. wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
  124. "header (SEQUENCE); assume encrypted PKCS #8 not "
  125. "used");
  126. return NULL;
  127. }
  128. pos = hdr.payload;
  129. end = pos + hdr.length;
  130. /* encryptionAlgorithm EncryptionAlgorithmIdentifier */
  131. if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
  132. hdr.class != ASN1_CLASS_UNIVERSAL ||
  133. hdr.tag != ASN1_TAG_SEQUENCE) {
  134. wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
  135. "(AlgorithmIdentifier) - found class %d tag 0x%x; "
  136. "assume encrypted PKCS #8 not used",
  137. hdr.class, hdr.tag);
  138. return NULL;
  139. }
  140. enc_alg = hdr.payload;
  141. enc_alg_len = hdr.length;
  142. pos = hdr.payload + hdr.length;
  143. /* encryptedData EncryptedData */
  144. if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
  145. hdr.class != ASN1_CLASS_UNIVERSAL ||
  146. hdr.tag != ASN1_TAG_OCTETSTRING) {
  147. wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
  148. "(encryptedData) - found class %d tag 0x%x",
  149. hdr.class, hdr.tag);
  150. return NULL;
  151. }
  152. data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length,
  153. passwd, &data_len);
  154. if (data) {
  155. struct crypto_private_key *key;
  156. key = pkcs8_key_import(data, data_len);
  157. os_free(data);
  158. return key;
  159. }
  160. return NULL;
  161. }