2003-08-05 19:11:04 +02:00
|
|
|
|
/* minip12.c - A minimal pkcs-12 implementation.
|
2011-03-10 15:27:10 +01:00
|
|
|
|
* Copyright (C) 2002, 2003, 2004, 2006, 2011 Free Software Foundation, Inc.
|
2014-06-03 18:57:33 +02:00
|
|
|
|
* Copyright (C) 2014 Werner Koch
|
2023-06-28 17:33:24 +02:00
|
|
|
|
* Copyright (C) 2022, 2023 g10 Code GmbH
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*
|
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-08-05 19:11:04 +02:00
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2022-06-20 16:45:42 +02:00
|
|
|
|
* SPDX-License-Identifier: GPL-3.0-or-later
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*/
|
|
|
|
|
|
2020-04-27 16:53:30 +02:00
|
|
|
|
/* References:
|
|
|
|
|
* RFC-7292 - PKCS #12: Personal Information Exchange Syntax v1.1
|
|
|
|
|
* RFC-8351 - The PKCS #8 EncryptedPrivateKeyInfo Media Type
|
|
|
|
|
* RFC-5958 - Asymmetric Key Packages
|
|
|
|
|
* RFC-3447 - PKCS #1: RSA Cryptography Specifications Version 2.1
|
|
|
|
|
* RFC-5915 - Elliptic Curve Private Key Structure
|
|
|
|
|
*/
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#endif
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <gcrypt.h>
|
2007-03-20 11:00:55 +01:00
|
|
|
|
#include <errno.h>
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2020-04-21 20:59:52 +02:00
|
|
|
|
#include <ksba.h>
|
|
|
|
|
|
2020-04-27 16:53:30 +02:00
|
|
|
|
#include "../common/util.h"
|
2010-03-10 13:24:58 +01:00
|
|
|
|
#include "../common/logging.h"
|
|
|
|
|
#include "../common/utf8conv.h"
|
2020-04-27 16:53:30 +02:00
|
|
|
|
#include "../common/tlv.h"
|
|
|
|
|
#include "../common/openpgpdefs.h" /* Only for openpgp_curve_to_oid. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
#include "minip12.h"
|
|
|
|
|
|
|
|
|
|
#ifndef DIM
|
|
|
|
|
#define DIM(v) (sizeof(v)/sizeof((v)[0]))
|
|
|
|
|
#endif
|
|
|
|
|
|
2007-03-19 19:54:34 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
static unsigned char const oid_data[9] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01 };
|
|
|
|
|
static unsigned char const oid_encryptedData[9] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06 };
|
2006-07-21 11:41:11 +02:00
|
|
|
|
static unsigned char const oid_pkcs_12_keyBag[11] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x01 };
|
2003-08-05 19:11:04 +02:00
|
|
|
|
static unsigned char const oid_pkcs_12_pkcs_8ShroudedKeyBag[11] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x02 };
|
2004-02-04 20:13:16 +01:00
|
|
|
|
static unsigned char const oid_pkcs_12_CertBag[11] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x03 };
|
2004-02-12 10:27:36 +01:00
|
|
|
|
static unsigned char const oid_pkcs_12_CrlBag[11] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x0A, 0x01, 0x04 };
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
static unsigned char const oid_pbeWithSHAAnd3_KeyTripleDES_CBC[10] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03 };
|
2004-02-04 20:13:16 +01:00
|
|
|
|
static unsigned char const oid_pbeWithSHAAnd40BitRC2_CBC[10] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06 };
|
2004-02-10 20:26:55 +01:00
|
|
|
|
static unsigned char const oid_x509Certificate_for_pkcs_12[10] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x16, 0x01 };
|
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
static unsigned char const oid_pkcs5PBKDF2[9] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C };
|
|
|
|
|
static unsigned char const oid_pkcs5PBES2[9] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0D };
|
|
|
|
|
static unsigned char const oid_aes128_CBC[9] = {
|
|
|
|
|
0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x02 };
|
2023-06-28 17:33:24 +02:00
|
|
|
|
static unsigned char const oid_aes256_CBC[9] = {
|
|
|
|
|
0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x01, 0x2A };
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
static unsigned char const oid_rsaEncryption[9] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01 };
|
2020-04-21 20:59:52 +02:00
|
|
|
|
static unsigned char const oid_pcPublicKey[7] = {
|
|
|
|
|
0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 };
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
static unsigned char const data_3desiter2048[30] = {
|
2003-08-05 19:11:04 +02:00
|
|
|
|
0x30, 0x1C, 0x06, 0x0A, 0x2A, 0x86, 0x48, 0x86,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x03, 0x30, 0x0E,
|
2003-08-05 19:11:04 +02:00
|
|
|
|
0x04, 0x08, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
2004-02-19 17:26:32 +01:00
|
|
|
|
0xFF, 0xFF, 0x02, 0x02, 0x08, 0x00 };
|
|
|
|
|
#define DATA_3DESITER2048_SALT_OFF 18
|
|
|
|
|
|
|
|
|
|
static unsigned char const data_rc2iter2048[30] = {
|
|
|
|
|
0x30, 0x1C, 0x06, 0x0A, 0x2A, 0x86, 0x48, 0x86,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
0xF7, 0x0D, 0x01, 0x0C, 0x01, 0x06, 0x30, 0x0E,
|
2004-02-19 17:26:32 +01:00
|
|
|
|
0x04, 0x08, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
|
|
|
0xFF, 0xFF, 0x02, 0x02, 0x08, 0x00 };
|
|
|
|
|
#define DATA_RC2ITER2048_SALT_OFF 18
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2006-06-20 17:48:09 +02:00
|
|
|
|
static unsigned char const data_mactemplate[51] = {
|
|
|
|
|
0x30, 0x31, 0x30, 0x21, 0x30, 0x09, 0x06, 0x05,
|
|
|
|
|
0x2b, 0x0e, 0x03, 0x02, 0x1a, 0x05, 0x00, 0x04,
|
|
|
|
|
0x14, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
|
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
|
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0x04, 0x08, 0xff,
|
|
|
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
0x02, 0x08, 0x00 };
|
2006-06-20 17:48:09 +02:00
|
|
|
|
#define DATA_MACTEMPLATE_MAC_OFF 17
|
|
|
|
|
#define DATA_MACTEMPLATE_SALT_OFF 39
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
static unsigned char const data_attrtemplate[106] = {
|
|
|
|
|
0x31, 0x7c, 0x30, 0x55, 0x06, 0x09, 0x2a, 0x86,
|
|
|
|
|
0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x14, 0x31,
|
|
|
|
|
0x48, 0x1e, 0x46, 0x00, 0x47, 0x00, 0x6e, 0x00,
|
|
|
|
|
0x75, 0x00, 0x50, 0x00, 0x47, 0x00, 0x20, 0x00,
|
|
|
|
|
0x65, 0x00, 0x78, 0x00, 0x70, 0x00, 0x6f, 0x00,
|
|
|
|
|
0x72, 0x00, 0x74, 0x00, 0x65, 0x00, 0x64, 0x00,
|
|
|
|
|
0x20, 0x00, 0x63, 0x00, 0x65, 0x00, 0x72, 0x00,
|
|
|
|
|
0x74, 0x00, 0x69, 0x00, 0x66, 0x00, 0x69, 0x00,
|
|
|
|
|
0x63, 0x00, 0x61, 0x00, 0x74, 0x00, 0x65, 0x00,
|
|
|
|
|
0x20, 0x00, 0x66, 0x00, 0x66, 0x00, 0x66, 0x00,
|
|
|
|
|
0x66, 0x00, 0x66, 0x00, 0x66, 0x00, 0x66, 0x00,
|
|
|
|
|
0x66, 0x30, 0x23, 0x06, 0x09, 0x2a, 0x86, 0x48,
|
|
|
|
|
0x86, 0xf7, 0x0d, 0x01, 0x09, 0x15, 0x31, 0x16,
|
|
|
|
|
0x04, 0x14 }; /* Need to append SHA-1 digest. */
|
|
|
|
|
#define DATA_ATTRTEMPLATE_KEYID_OFF 73
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
struct buffer_s
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
unsigned char *buffer;
|
|
|
|
|
size_t length;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
};
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
struct tag_info
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
int class;
|
|
|
|
|
int is_constructed;
|
|
|
|
|
unsigned long tag;
|
2023-06-22 18:42:55 +02:00
|
|
|
|
size_t length; /* length part of the TLV */
|
|
|
|
|
size_t nhdr;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
int ndef; /* It is an indefinite length */
|
|
|
|
|
};
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
#define TLV_MAX_DEPTH 20
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
|
|
|
|
|
struct bufferlist_s
|
|
|
|
|
{
|
|
|
|
|
struct bufferlist_s *next;
|
|
|
|
|
char *buffer;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* An object to control the ASN.1 parsing. */
|
|
|
|
|
struct tlv_ctx_s
|
|
|
|
|
{
|
|
|
|
|
/* The current buffer we are working on and its length. */
|
|
|
|
|
const unsigned char *buffer;
|
|
|
|
|
size_t bufsize;
|
|
|
|
|
|
|
|
|
|
size_t offset; /* The current offset into this buffer. */
|
|
|
|
|
int in_ndef; /* Flag indicating that we are in a NDEF. */
|
|
|
|
|
int pending; /* The last tlv_next has not yet been processed. */
|
|
|
|
|
|
|
|
|
|
struct tag_info ti; /* The current tag. */
|
|
|
|
|
gpg_error_t lasterr; /* Last error from tlv function. */
|
|
|
|
|
const char *lastfunc;/* Name of last called function. */
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
struct bufferlist_s *bufferlist; /* To keep track of amlloced buffers. */
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
unsigned int pop_count;/* Number of pops by tlv_next. */
|
|
|
|
|
unsigned int stacklen; /* Used size of the stack. */
|
|
|
|
|
struct {
|
|
|
|
|
const unsigned char *buffer; /* Saved value of BUFFER. */
|
|
|
|
|
size_t bufsize; /* Saved value of BUFSIZE. */
|
|
|
|
|
size_t offset; /* Saved value of OFFSET. */
|
|
|
|
|
int in_ndef; /* Saved IN_NDEF flag. */
|
|
|
|
|
} stack[TLV_MAX_DEPTH];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
/* Parser communication object. */
|
|
|
|
|
struct p12_parse_ctx_s
|
|
|
|
|
{
|
|
|
|
|
/* The callback for parsed certificates and its arg. */
|
|
|
|
|
void (*certcb)(void*, const unsigned char*, size_t);
|
|
|
|
|
void *certcbarg;
|
|
|
|
|
|
|
|
|
|
/* The supplied parseword. */
|
|
|
|
|
const char *password;
|
|
|
|
|
|
|
|
|
|
/* Set to true if the password was wrong. */
|
|
|
|
|
int badpass;
|
|
|
|
|
|
|
|
|
|
/* Malloced name of the curve. */
|
|
|
|
|
char *curve;
|
|
|
|
|
|
|
|
|
|
/* The private key as an MPI array. */
|
|
|
|
|
gcry_mpi_t *privatekey;
|
|
|
|
|
};
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2021-02-24 08:40:06 +01:00
|
|
|
|
static int opt_verbose;
|
|
|
|
|
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
static unsigned char *cram_octet_string (const unsigned char *input,
|
|
|
|
|
size_t length, size_t *r_newlength);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2021-02-24 08:40:06 +01:00
|
|
|
|
void
|
2023-06-28 17:33:24 +02:00
|
|
|
|
p12_set_verbosity (int verbose, int debug)
|
2021-02-24 08:40:06 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
opt_verbose = !!verbose;
|
|
|
|
|
if (debug)
|
|
|
|
|
opt_verbose = 2;
|
2021-02-24 08:40:06 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-22 18:42:55 +02:00
|
|
|
|
static void
|
|
|
|
|
dump_tag_info (const char *text, struct tag_info *ti)
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("p12_parse(%s): ti.class=%d tag=%lu len=%zu nhdr=%zu %s%s\n",
|
|
|
|
|
text,
|
|
|
|
|
ti->class, ti->tag, ti->length, ti->nhdr,
|
|
|
|
|
ti->is_constructed?" cons":"",
|
|
|
|
|
ti->ndef?" ndef":"");
|
2023-06-22 18:42:55 +02:00
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
|
2020-04-27 16:53:30 +02:00
|
|
|
|
/* Wrapper around tlv_builder_add_ptr to add an OID. When we
|
|
|
|
|
* eventually put the whole tlv_builder stuff into Libksba, we can add
|
|
|
|
|
* such a function there. Right now we don't do this to avoid a
|
|
|
|
|
* dependency on Libksba. Function return 1 on error. */
|
|
|
|
|
static int
|
|
|
|
|
builder_add_oid (tlv_builder_t tb, int class, const char *oid)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
unsigned char *der;
|
|
|
|
|
size_t derlen;
|
|
|
|
|
|
|
|
|
|
err = ksba_oid_from_str (oid, &der, &derlen);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
log_error ("%s: error converting '%s' to DER: %s\n",
|
|
|
|
|
__func__, oid, gpg_strerror (err));
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
tlv_builder_add_val (tb, class, TAG_OBJECT_ID, der, derlen);
|
|
|
|
|
ksba_free (der);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2020-05-04 14:55:34 +02:00
|
|
|
|
/* Wrapper around tlv_builder_add_ptr to add an MPI. TAG may either
|
2020-04-27 16:53:30 +02:00
|
|
|
|
* be OCTET_STRING or BIT_STRING. When we eventually put the whole
|
|
|
|
|
* tlv_builder stuff into Libksba, we can add such a function there.
|
|
|
|
|
* Right now we don't do this to avoid a dependency on Libksba.
|
|
|
|
|
* Function return 1 on error. STRIP is a hack to remove the first
|
|
|
|
|
* octet from the value. */
|
|
|
|
|
static int
|
|
|
|
|
builder_add_mpi (tlv_builder_t tb, int class, int tag, gcry_mpi_t mpi,
|
|
|
|
|
int strip)
|
|
|
|
|
{
|
|
|
|
|
int returncode;
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
const unsigned char *s;
|
|
|
|
|
unsigned char *freethis = NULL;
|
|
|
|
|
unsigned char *freethis2 = NULL;
|
|
|
|
|
unsigned int nbits;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
if (gcry_mpi_get_flag (mpi, GCRYMPI_FLAG_OPAQUE))
|
|
|
|
|
{
|
|
|
|
|
s = gcry_mpi_get_opaque (mpi, &nbits);
|
|
|
|
|
n = (nbits+7)/8;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
err = gcry_mpi_aprint (GCRYMPI_FMT_USG, &freethis, &n, mpi);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
log_error ("%s: error converting MPI: %s\n",
|
|
|
|
|
__func__, gpg_strerror (err));
|
|
|
|
|
returncode = 1;
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
s = freethis;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tag == TAG_BIT_STRING)
|
|
|
|
|
{
|
|
|
|
|
freethis2 = xtrymalloc_secure (n + 1);
|
|
|
|
|
if (!freethis2)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
log_error ("%s: error converting MPI: %s\n",
|
|
|
|
|
__func__, gpg_strerror (err));
|
|
|
|
|
returncode = 1;
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
freethis2[0] = 0;
|
|
|
|
|
memcpy (freethis2+1, s, n);
|
|
|
|
|
s = freethis2;
|
|
|
|
|
n++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
strip = !!strip;
|
|
|
|
|
if (strip && n < 2)
|
|
|
|
|
strip = 0;
|
|
|
|
|
|
|
|
|
|
tlv_builder_add_val (tb, class, tag, s+strip, n-strip);
|
|
|
|
|
returncode = 0;
|
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
xfree (freethis);
|
|
|
|
|
xfree (freethis2);
|
|
|
|
|
return returncode;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Parse the buffer at the address BUFFER which is of SIZE and return
|
2023-06-22 18:42:55 +02:00
|
|
|
|
* the tag and the length part from the TLV triplet. Update BUFFER
|
|
|
|
|
* and SIZE on success. Checks that the encoded length does not
|
|
|
|
|
* exhaust the length of the provided buffer. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
static int
|
2003-08-05 19:11:04 +02:00
|
|
|
|
parse_tag (unsigned char const **buffer, size_t *size, struct tag_info *ti)
|
|
|
|
|
{
|
2023-06-22 18:42:55 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
int tag;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2023-06-22 18:42:55 +02:00
|
|
|
|
err = parse_ber_header (buffer, size,
|
|
|
|
|
&ti->class, &tag,
|
|
|
|
|
&ti->is_constructed, &ti->ndef,
|
|
|
|
|
&ti->length, &ti->nhdr);
|
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
if (tag < 0)
|
|
|
|
|
return gpg_error (GPG_ERR_EOVERFLOW);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
ti->tag = tag;
|
|
|
|
|
|
2023-06-22 18:42:55 +02:00
|
|
|
|
if (ti->length > *size)
|
|
|
|
|
return gpg_error (GPG_ERR_BUFFER_TOO_SHORT); /* data larger than buffer. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* Create a new TLV object. */
|
|
|
|
|
static struct tlv_ctx_s *
|
|
|
|
|
tlv_new (const unsigned char *buffer, size_t bufsize)
|
|
|
|
|
{
|
|
|
|
|
struct tlv_ctx_s *tlv;
|
|
|
|
|
tlv = xtrycalloc (1, sizeof *tlv);
|
|
|
|
|
if (tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->buffer = buffer;
|
|
|
|
|
tlv->bufsize = bufsize;
|
|
|
|
|
}
|
|
|
|
|
return tlv;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
/* This function can be used to store a malloced buffer into the TLV
|
|
|
|
|
* object. Ownership of BUFFER is thus transferred to TLV. This
|
|
|
|
|
* buffer will then only be released by tlv_release. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_register_buffer (struct tlv_ctx_s *tlv, char *buffer)
|
|
|
|
|
{
|
|
|
|
|
struct bufferlist_s *item;
|
|
|
|
|
|
|
|
|
|
item = xtrycalloc (1, sizeof *item);
|
|
|
|
|
if (!item)
|
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
item->buffer = buffer;
|
|
|
|
|
item->next = tlv->bufferlist;
|
|
|
|
|
tlv->bufferlist = item;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
static void
|
|
|
|
|
tlv_release (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (!tlv)
|
|
|
|
|
return;
|
|
|
|
|
while (tlv->bufferlist)
|
|
|
|
|
{
|
|
|
|
|
struct bufferlist_s *save = tlv->bufferlist->next;
|
|
|
|
|
xfree (tlv->bufferlist->buffer);
|
|
|
|
|
xfree (tlv->bufferlist);
|
|
|
|
|
tlv->bufferlist = save;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
xfree (tlv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Helper for tlv_next and tlv_peek. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
_tlv_peek (struct tlv_ctx_s *tlv, size_t *r_n)
|
|
|
|
|
{
|
|
|
|
|
const unsigned char *p;
|
|
|
|
|
|
|
|
|
|
if (tlv->offset > tlv->bufsize)
|
|
|
|
|
return gpg_error (GPG_ERR_BUG);
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
*r_n = tlv->bufsize - tlv->offset;
|
|
|
|
|
return parse_tag (&p, r_n, &tlv->ti);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Helper for tlv_expect_sequence and tlv_expect_context_tag. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
_tlv_push (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
if (tlv->stacklen >= TLV_MAX_DEPTH)
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_MANY));
|
|
|
|
|
tlv->stack[tlv->stacklen].buffer = tlv->buffer;
|
|
|
|
|
tlv->stack[tlv->stacklen].bufsize = tlv->bufsize;
|
|
|
|
|
tlv->stack[tlv->stacklen].offset = tlv->offset;
|
|
|
|
|
tlv->stack[tlv->stacklen].in_ndef = tlv->in_ndef;
|
|
|
|
|
tlv->stacklen++;
|
|
|
|
|
tlv->buffer += tlv->offset;
|
|
|
|
|
tlv->bufsize = tlv->ti.length;
|
|
|
|
|
tlv->offset = 0;
|
|
|
|
|
tlv->in_ndef = tlv->ti.ndef;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Helper for tlv_next. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
_tlv_pop (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
size_t saveoff;
|
|
|
|
|
|
|
|
|
|
if (!tlv->stacklen)
|
|
|
|
|
return gpg_error (GPG_ERR_EOF);
|
|
|
|
|
|
|
|
|
|
saveoff = tlv->offset;
|
|
|
|
|
|
|
|
|
|
tlv->stacklen--;
|
|
|
|
|
tlv->buffer = tlv->stack[tlv->stacklen].buffer;
|
|
|
|
|
tlv->bufsize = tlv->stack[tlv->stacklen].bufsize;
|
|
|
|
|
tlv->offset = tlv->stack[tlv->stacklen].offset;
|
|
|
|
|
tlv->in_ndef = tlv->stack[tlv->stacklen].in_ndef;
|
|
|
|
|
|
|
|
|
|
/* Move offset of the container to the end of the container. */
|
|
|
|
|
tlv->offset += saveoff;
|
|
|
|
|
if (tlv->offset > tlv->bufsize)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_BER);
|
|
|
|
|
|
|
|
|
|
tlv->pop_count++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Parse the next tag and value. Also detect the end of a container;
|
|
|
|
|
* tlv_popped() can be used to detect this. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_next (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
tlv->pop_count = 0;
|
|
|
|
|
tlv->lasterr = 0;
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (tlv->pending)
|
|
|
|
|
{
|
|
|
|
|
tlv->pending = 0;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!tlv->in_ndef && tlv->offset == tlv->bufsize)
|
|
|
|
|
{
|
|
|
|
|
/* We are at the end of a container. Pop the stack. */
|
|
|
|
|
do
|
|
|
|
|
err = _tlv_pop (tlv);
|
|
|
|
|
while (!err && !tlv->in_ndef && tlv->offset == tlv->bufsize);
|
|
|
|
|
if (err)
|
|
|
|
|
return (tlv->lasterr = err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = _tlv_peek (tlv, &n);
|
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
if (tlv->in_ndef && (tlv->ti.class == CLASS_UNIVERSAL
|
|
|
|
|
&& !tlv->ti.tag && !tlv->ti.is_constructed))
|
|
|
|
|
{
|
|
|
|
|
/* End tag while in ndef container. Skip the tag, and pop. */
|
|
|
|
|
tlv->offset += n - (tlv->bufsize - tlv->offset);
|
|
|
|
|
err = _tlv_pop (tlv);
|
2023-06-29 16:33:03 +02:00
|
|
|
|
/* FIXME: We need to peek whether there is another end tag and
|
|
|
|
|
* pop again. We can't modify the TLV object, though. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return (tlv->lasterr = err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set offset to the value of the TLV. */
|
|
|
|
|
tlv->offset += tlv->bufsize - tlv->offset - n;
|
|
|
|
|
dump_tag_info ("tlv_next", &tlv->ti);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Return the current neting level of the TLV object. */
|
|
|
|
|
static unsigned int
|
|
|
|
|
tlv_level (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
return tlv->stacklen;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* If called right after tlv_next the number of container levels
|
|
|
|
|
* popped are returned. */
|
|
|
|
|
static unsigned int
|
|
|
|
|
tlv_popped (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
return tlv->pop_count;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Set a flag to indicate that the last tlv_next has not yet been
|
|
|
|
|
* consumed. */
|
|
|
|
|
static void
|
|
|
|
|
tlv_set_pending (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->pending = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Skip over the value of the current tag. */
|
|
|
|
|
static void
|
|
|
|
|
tlv_skip (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is a sequence and setup the context for
|
|
|
|
|
* processing. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_sequence (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_SEQUENCE
|
|
|
|
|
&& tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
return _tlv_push (tlv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Variant of tlv_expect_sequence to be used for the ouyter sequence
|
|
|
|
|
* of an object which might have padding after the ASN.1 data. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_top_sequence (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_SEQUENCE
|
|
|
|
|
&& tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
tlv->bufsize = tlv->ti.nhdr + tlv->ti.length;
|
|
|
|
|
return _tlv_push (tlv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is a context tag and setup the context
|
|
|
|
|
* for processing. The tag of the context is returned at R_TAG. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_context_tag (struct tlv_ctx_s *tlv, int *r_tag)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_CONTEXT && tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
*r_tag = tlv->ti.tag;
|
|
|
|
|
return _tlv_push (tlv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is a SET and setup the context for
|
|
|
|
|
* processing. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_set (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_SET
|
|
|
|
|
&& tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
return _tlv_push (tlv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect an object of CLASS with TAG and store its value at
|
|
|
|
|
* (R_DATA,R_DATALEN). Then skip over its value to the next tag.
|
2023-06-29 16:33:03 +02:00
|
|
|
|
* Note that the stored value is not allocated but points into
|
2023-06-28 17:33:24 +02:00
|
|
|
|
* TLV. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_object (struct tlv_ctx_s *tlv, int class, int tag,
|
|
|
|
|
unsigned char const **r_data, size_t *r_datalen)
|
|
|
|
|
{
|
2023-06-29 16:33:03 +02:00
|
|
|
|
gpg_error_t err;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
const unsigned char *p;
|
|
|
|
|
|
|
|
|
|
tlv->lastfunc = __func__;
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (!(tlv->ti.class == class && tlv->ti.tag == tag))
|
2023-06-28 17:33:24 +02:00
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
if (!tlv->ti.length)
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (class == CLASS_CONTEXT && tag == 0 && tlv->ti.is_constructed)
|
|
|
|
|
{
|
|
|
|
|
char *newbuffer;
|
|
|
|
|
|
|
|
|
|
newbuffer = cram_octet_string (p, tlv->ti.length, r_datalen);
|
|
|
|
|
if (!newbuffer)
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_BAD_BER));
|
|
|
|
|
err = tlv_register_buffer (tlv, newbuffer);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
xfree (newbuffer);
|
|
|
|
|
return (tlv->lasterr = err);
|
|
|
|
|
}
|
|
|
|
|
*r_data = newbuffer;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
*r_data = p;
|
|
|
|
|
*r_datalen = tlv->ti.length;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is an object string and store its value
|
|
|
|
|
* at (R_DATA,R_DATALEN). Then skip over its value to the next tag.
|
|
|
|
|
* Note that the stored value are not allocated but point into TLV.
|
|
|
|
|
* If ENCAPSULATES is set the octet string is used as a new
|
|
|
|
|
* container. R_DATA and R_DATALEN are optional. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_octet_string (struct tlv_ctx_s *tlv, int encapsulates,
|
|
|
|
|
unsigned char const **r_data, size_t *r_datalen)
|
|
|
|
|
{
|
2023-06-29 16:33:03 +02:00
|
|
|
|
gpg_error_t err;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
const unsigned char *p;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OCTET_STRING
|
2023-06-29 16:33:03 +02:00
|
|
|
|
&& (!tlv->ti.is_constructed || encapsulates)))
|
2023-06-28 17:33:24 +02:00
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
if (!(n=tlv->ti.length))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (encapsulates && tlv->ti.is_constructed)
|
|
|
|
|
{
|
|
|
|
|
char *newbuffer;
|
|
|
|
|
|
|
|
|
|
newbuffer = cram_octet_string (p, n, r_datalen);
|
|
|
|
|
if (!newbuffer)
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_BAD_BER));
|
|
|
|
|
err = tlv_register_buffer (tlv, newbuffer);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
xfree (newbuffer);
|
|
|
|
|
return (tlv->lasterr = err);
|
|
|
|
|
}
|
|
|
|
|
*r_data = newbuffer;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (r_data)
|
|
|
|
|
*r_data = p;
|
|
|
|
|
if (r_datalen)
|
|
|
|
|
*r_datalen = tlv->ti.length;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (encapsulates)
|
|
|
|
|
return _tlv_push (tlv);
|
|
|
|
|
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect a NULL tag. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_null (struct tlv_ctx_s *tlv)
|
|
|
|
|
{
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_NULL
|
|
|
|
|
&& !tlv->ti.is_constructed && !tlv->ti.length))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is an integer and return its value at
|
|
|
|
|
* R_VALUE. Then skip over its value to the next tag. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_integer (struct tlv_ctx_s *tlv, int *r_value)
|
|
|
|
|
{
|
|
|
|
|
const unsigned char *p;
|
|
|
|
|
size_t n;
|
|
|
|
|
int value;
|
|
|
|
|
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER
|
|
|
|
|
&& !tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
if (!(n=tlv->ti.length))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
|
|
|
|
|
|
|
|
|
|
/* We currently support only positive values. */
|
|
|
|
|
if ((*p & 0x80))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_ERANGE));
|
|
|
|
|
|
|
|
|
|
for (value = 0; n; n--)
|
|
|
|
|
{
|
|
|
|
|
value <<= 8;
|
|
|
|
|
value |= (*p++) & 0xff;
|
|
|
|
|
if (value < 0)
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_EOVERFLOW));
|
|
|
|
|
}
|
|
|
|
|
*r_value = value;
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Variant of tlv_expect_integer which returns an MPI. If IGNORE_ZERO
|
|
|
|
|
* is set a value of 0 is ignored and R_VALUE not changed and the
|
|
|
|
|
* function returns GPG_ERR_FALSE. No check for negative encoded
|
|
|
|
|
* integers is doe because the old code here worked the same and we
|
|
|
|
|
* can't foreclose invalid encoded PKCS#12 stuff - after all it is
|
|
|
|
|
* PKCS#12 see https://www.cs.auckland.ac.nz/~pgut001/pubs/pfx.html */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_mpinteger (struct tlv_ctx_s *tlv, int ignore_zero,
|
|
|
|
|
gcry_mpi_t *r_value)
|
|
|
|
|
{
|
|
|
|
|
const unsigned char *p;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER
|
|
|
|
|
&& !tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
if (!(n=tlv->ti.length))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
|
|
|
|
|
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
if (ignore_zero && n == 1 && !*p)
|
|
|
|
|
return gpg_error (GPG_ERR_FALSE);
|
|
|
|
|
|
|
|
|
|
return gcry_mpi_scan (r_value, GCRYMPI_FMT_USG, p, n, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect that the current tag is an object id and store its value at
|
|
|
|
|
* (R_OID,R_OIDLEN). Then skip over its value to the next tag. Note
|
|
|
|
|
* that the stored value is not allocated but points into TLV. */
|
|
|
|
|
static gpg_error_t
|
|
|
|
|
tlv_expect_object_id (struct tlv_ctx_s *tlv,
|
|
|
|
|
unsigned char const **r_oid, size_t *r_oidlen)
|
|
|
|
|
{
|
|
|
|
|
const unsigned char *p;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
tlv->lastfunc = __func__;
|
|
|
|
|
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OBJECT_ID
|
|
|
|
|
&& !tlv->ti.is_constructed))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
|
|
|
|
|
p = tlv->buffer + tlv->offset;
|
|
|
|
|
if (!(n=tlv->ti.length))
|
|
|
|
|
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
|
|
|
|
|
|
|
|
|
|
*r_oid = p;
|
|
|
|
|
*r_oidlen = tlv->ti.length;
|
|
|
|
|
tlv->offset += tlv->ti.length;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2005-12-16 16:52:48 +01:00
|
|
|
|
/* Given an ASN.1 chunk of a structure like:
|
2023-06-29 16:33:03 +02:00
|
|
|
|
*
|
|
|
|
|
* 24 NDEF: OCTET STRING -- This is not passed to us
|
|
|
|
|
* 04 1: OCTET STRING -- INPUT point s to here
|
|
|
|
|
* : 30
|
|
|
|
|
* 04 1: OCTET STRING
|
|
|
|
|
* : 80
|
|
|
|
|
* [...]
|
|
|
|
|
* 04 2: OCTET STRING
|
|
|
|
|
* : 00 00
|
|
|
|
|
* : } -- This denotes a Null tag and are the last
|
|
|
|
|
* -- two bytes in INPUT.
|
|
|
|
|
*
|
|
|
|
|
* The example is from Mozilla Firefox 1.0.4 which actually exports
|
|
|
|
|
* certs as single byte chunks of octet strings.
|
|
|
|
|
*
|
|
|
|
|
* Create a new buffer with the content of that octet string. INPUT
|
|
|
|
|
* is the original buffer with a LENGTH. Returns
|
|
|
|
|
* NULL on error or a new malloced buffer with its actual used length
|
|
|
|
|
* stored at R_NEWLENGTH. */
|
2005-12-16 16:52:48 +01:00
|
|
|
|
static unsigned char *
|
2023-06-29 16:33:03 +02:00
|
|
|
|
cram_octet_string (const unsigned char *input, size_t length,
|
|
|
|
|
size_t *r_newlength)
|
2005-12-16 16:52:48 +01:00
|
|
|
|
{
|
|
|
|
|
const unsigned char *s = input;
|
2023-06-29 16:33:03 +02:00
|
|
|
|
size_t n = length;
|
2005-12-16 16:52:48 +01:00
|
|
|
|
unsigned char *output, *d;
|
|
|
|
|
struct tag_info ti;
|
|
|
|
|
|
|
|
|
|
/* Allocate output buf. We know that it won't be longer than the
|
|
|
|
|
input buffer. */
|
2023-06-29 16:33:03 +02:00
|
|
|
|
d = output = gcry_malloc (length);
|
2005-12-16 16:52:48 +01:00
|
|
|
|
if (!output)
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
2022-03-09 02:48:20 +01:00
|
|
|
|
while (n)
|
2005-12-16 16:52:48 +01:00
|
|
|
|
{
|
|
|
|
|
if (parse_tag (&s, &n, &ti))
|
|
|
|
|
goto bailout;
|
2020-04-27 16:53:30 +02:00
|
|
|
|
if (ti.class == CLASS_UNIVERSAL && ti.tag == TAG_OCTET_STRING
|
2005-12-16 16:52:48 +01:00
|
|
|
|
&& !ti.ndef && !ti.is_constructed)
|
|
|
|
|
{
|
|
|
|
|
memcpy (d, s, ti.length);
|
|
|
|
|
s += ti.length;
|
|
|
|
|
d += ti.length;
|
|
|
|
|
n -= ti.length;
|
|
|
|
|
}
|
2020-04-27 16:53:30 +02:00
|
|
|
|
else if (ti.class == CLASS_UNIVERSAL && !ti.tag && !ti.is_constructed)
|
2011-02-04 12:57:53 +01:00
|
|
|
|
break; /* Ready */
|
2005-12-16 16:52:48 +01:00
|
|
|
|
else
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
*r_newlength = d - output;
|
2005-12-16 16:52:48 +01:00
|
|
|
|
return output;
|
|
|
|
|
|
|
|
|
|
bailout:
|
|
|
|
|
gcry_free (output);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
static int
|
2005-12-16 16:52:48 +01:00
|
|
|
|
string_to_key (int id, char *salt, size_t saltlen, int iter, const char *pw,
|
2003-08-05 19:11:04 +02:00
|
|
|
|
int req_keylen, unsigned char *keybuf)
|
|
|
|
|
{
|
|
|
|
|
int rc, i, j;
|
|
|
|
|
gcry_md_hd_t md;
|
|
|
|
|
gcry_mpi_t num_b1 = NULL;
|
|
|
|
|
int pwlen;
|
|
|
|
|
unsigned char hash[20], buf_b[64], buf_i[128], *p;
|
|
|
|
|
size_t cur_keylen;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
|
|
cur_keylen = 0;
|
|
|
|
|
pwlen = strlen (pw);
|
|
|
|
|
if (pwlen > 63/2)
|
|
|
|
|
{
|
|
|
|
|
log_error ("password too long\n");
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2005-12-16 16:52:48 +01:00
|
|
|
|
if (saltlen < 8)
|
|
|
|
|
{
|
|
|
|
|
log_error ("salt too short\n");
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Store salt and password in BUF_I */
|
|
|
|
|
p = buf_i;
|
|
|
|
|
for(i=0; i < 64; i++)
|
2005-12-16 16:52:48 +01:00
|
|
|
|
*p++ = salt [i%saltlen];
|
2003-08-05 19:11:04 +02:00
|
|
|
|
for(i=j=0; i < 64; i += 2)
|
|
|
|
|
{
|
|
|
|
|
*p++ = 0;
|
|
|
|
|
*p++ = pw[j];
|
|
|
|
|
if (++j > pwlen) /* Note, that we include the trailing zero */
|
|
|
|
|
j = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (;;)
|
|
|
|
|
{
|
|
|
|
|
rc = gcry_md_open (&md, GCRY_MD_SHA1, 0);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ( "gcry_md_open failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
for(i=0; i < 64; i++)
|
|
|
|
|
gcry_md_putc (md, id);
|
|
|
|
|
gcry_md_write (md, buf_i, 128);
|
|
|
|
|
memcpy (hash, gcry_md_read (md, 0), 20);
|
|
|
|
|
gcry_md_close (md);
|
|
|
|
|
for (i=1; i < iter; i++)
|
|
|
|
|
gcry_md_hash_buffer (GCRY_MD_SHA1, hash, hash, 20);
|
|
|
|
|
|
|
|
|
|
for (i=0; i < 20 && cur_keylen < req_keylen; i++)
|
|
|
|
|
keybuf[cur_keylen++] = hash[i];
|
|
|
|
|
if (cur_keylen == req_keylen)
|
|
|
|
|
{
|
|
|
|
|
gcry_mpi_release (num_b1);
|
|
|
|
|
return 0; /* ready */
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* need more bytes. */
|
|
|
|
|
for(i=0; i < 64; i++)
|
|
|
|
|
buf_b[i] = hash[i % 20];
|
|
|
|
|
rc = gcry_mpi_scan (&num_b1, GCRYMPI_FMT_USG, buf_b, 64, &n);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ( "gcry_mpi_scan failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
gcry_mpi_add_ui (num_b1, num_b1, 1);
|
|
|
|
|
for (i=0; i < 128; i += 64)
|
|
|
|
|
{
|
|
|
|
|
gcry_mpi_t num_ij;
|
|
|
|
|
|
|
|
|
|
rc = gcry_mpi_scan (&num_ij, GCRYMPI_FMT_USG, buf_i + i, 64, &n);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ( "gcry_mpi_scan failed: %s\n",
|
|
|
|
|
gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
gcry_mpi_add (num_ij, num_ij, num_b1);
|
|
|
|
|
gcry_mpi_clear_highbit (num_ij, 64*8);
|
|
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_USG, buf_i + i, 64, &n, num_ij);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ( "gcry_mpi_print failed: %s\n",
|
|
|
|
|
gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
gcry_mpi_release (num_ij);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
static int
|
2005-12-16 16:52:48 +01:00
|
|
|
|
set_key_iv (gcry_cipher_hd_t chd, char *salt, size_t saltlen, int iter,
|
|
|
|
|
const char *pw, int keybytes)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
unsigned char keybuf[24];
|
|
|
|
|
int rc;
|
|
|
|
|
|
2020-07-08 14:40:34 +02:00
|
|
|
|
log_assert (keybytes == 5 || keybytes == 24);
|
2005-12-16 16:52:48 +01:00
|
|
|
|
if (string_to_key (1, salt, saltlen, iter, pw, keybytes, keybuf))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return -1;
|
2004-02-10 20:26:55 +01:00
|
|
|
|
rc = gcry_cipher_setkey (chd, keybuf, keybytes);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ( "gcry_cipher_setkey failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2005-12-16 16:52:48 +01:00
|
|
|
|
if (string_to_key (2, salt, saltlen, iter, pw, 8, keybuf))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return -1;
|
|
|
|
|
rc = gcry_cipher_setiv (chd, keybuf, 8);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_cipher_setiv failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
static int
|
|
|
|
|
set_key_iv_pbes2 (gcry_cipher_hd_t chd, char *salt, size_t saltlen, int iter,
|
|
|
|
|
const void *iv, size_t ivlen, const char *pw, int algo)
|
|
|
|
|
{
|
|
|
|
|
unsigned char *keybuf;
|
|
|
|
|
size_t keylen;
|
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
keylen = gcry_cipher_get_algo_keylen (algo);
|
|
|
|
|
if (!keylen)
|
|
|
|
|
return -1;
|
|
|
|
|
keybuf = gcry_malloc_secure (keylen);
|
|
|
|
|
if (!keybuf)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
rc = gcry_kdf_derive (pw, strlen (pw),
|
|
|
|
|
GCRY_KDF_PBKDF2, GCRY_MD_SHA1,
|
|
|
|
|
salt, saltlen, iter, keylen, keybuf);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_kdf_derive failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
gcry_free (keybuf);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rc = gcry_cipher_setkey (chd, keybuf, keylen);
|
|
|
|
|
gcry_free (keybuf);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_cipher_setkey failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
rc = gcry_cipher_setiv (chd, iv, ivlen);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_cipher_setiv failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
static void
|
2005-12-16 16:52:48 +01:00
|
|
|
|
crypt_block (unsigned char *buffer, size_t length, char *salt, size_t saltlen,
|
2011-03-10 15:27:10 +01:00
|
|
|
|
int iter, const void *iv, size_t ivlen,
|
|
|
|
|
const char *pw, int cipher_algo, int encrypt)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
gcry_cipher_hd_t chd;
|
|
|
|
|
int rc;
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
rc = gcry_cipher_open (&chd, cipher_algo, GCRY_CIPHER_MODE_CBC, 0);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2004-02-10 20:26:55 +01:00
|
|
|
|
log_error ( "gcry_cipher_open failed: %s\n", gpg_strerror(rc));
|
2004-02-19 17:26:32 +01:00
|
|
|
|
wipememory (buffer, length);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return;
|
|
|
|
|
}
|
2011-03-10 15:27:10 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((cipher_algo == GCRY_CIPHER_AES128 || cipher_algo == GCRY_CIPHER_AES256)
|
2011-03-10 15:27:10 +01:00
|
|
|
|
? set_key_iv_pbes2 (chd, salt, saltlen, iter, iv, ivlen, pw, cipher_algo)
|
|
|
|
|
: set_key_iv (chd, salt, saltlen, iter, pw,
|
|
|
|
|
cipher_algo == GCRY_CIPHER_RFC2268_40? 5:24))
|
2004-02-19 17:26:32 +01:00
|
|
|
|
{
|
|
|
|
|
wipememory (buffer, length);
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
rc = encrypt? gcry_cipher_encrypt (chd, buffer, length, NULL, 0)
|
|
|
|
|
: gcry_cipher_decrypt (chd, buffer, length, NULL, 0);
|
|
|
|
|
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2004-02-19 17:26:32 +01:00
|
|
|
|
wipememory (buffer, length);
|
2020-04-27 16:53:30 +02:00
|
|
|
|
log_error ("%scrytion failed (%zu bytes): %s\n",
|
|
|
|
|
encrypt?"en":"de", length, gpg_strerror (rc));
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
gcry_cipher_close (chd);
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2007-03-19 19:54:34 +01:00
|
|
|
|
/* Decrypt a block of data and try several encodings of the key.
|
|
|
|
|
CIPHERTEXT is the encrypted data of size LENGTH bytes; PLAINTEXT is
|
|
|
|
|
a buffer of the same size to receive the decryption result. SALT,
|
|
|
|
|
SALTLEN, ITER and PW are the information required for decryption
|
|
|
|
|
and CIPHER_ALGO is the algorithm id to use. CHECK_FNC is a
|
|
|
|
|
function called with the plaintext and used to check whether the
|
|
|
|
|
decryption succeeded; i.e. that a correct passphrase has been
|
|
|
|
|
given. That function shall return true if the decryption has likely
|
|
|
|
|
succeeded. */
|
|
|
|
|
static void
|
|
|
|
|
decrypt_block (const void *ciphertext, unsigned char *plaintext, size_t length,
|
|
|
|
|
char *salt, size_t saltlen,
|
2011-03-10 15:27:10 +01:00
|
|
|
|
int iter, const void *iv, size_t ivlen,
|
|
|
|
|
const char *pw, int cipher_algo,
|
2007-03-19 19:54:34 +01:00
|
|
|
|
int (*check_fnc) (const void *, size_t))
|
|
|
|
|
{
|
2008-12-05 13:01:01 +01:00
|
|
|
|
static const char * const charsets[] = {
|
2007-03-19 19:54:34 +01:00
|
|
|
|
"", /* No conversion - use the UTF-8 passphrase direct. */
|
|
|
|
|
"ISO-8859-1",
|
|
|
|
|
"ISO-8859-15",
|
|
|
|
|
"ISO-8859-2",
|
|
|
|
|
"ISO-8859-3",
|
|
|
|
|
"ISO-8859-4",
|
|
|
|
|
"ISO-8859-5",
|
|
|
|
|
"ISO-8859-6",
|
|
|
|
|
"ISO-8859-7",
|
|
|
|
|
"ISO-8859-8",
|
|
|
|
|
"ISO-8859-9",
|
|
|
|
|
"KOI8-R",
|
2007-03-20 11:00:55 +01:00
|
|
|
|
"IBM437",
|
|
|
|
|
"IBM850",
|
|
|
|
|
"EUC-JP",
|
|
|
|
|
"BIG5",
|
2007-03-19 19:54:34 +01:00
|
|
|
|
NULL
|
|
|
|
|
};
|
|
|
|
|
int charsetidx = 0;
|
|
|
|
|
char *convertedpw = NULL; /* Malloced and converted password or NULL. */
|
|
|
|
|
size_t convertedpwsize = 0; /* Allocated length. */
|
|
|
|
|
|
|
|
|
|
for (charsetidx=0; charsets[charsetidx]; charsetidx++)
|
|
|
|
|
{
|
|
|
|
|
if (*charsets[charsetidx])
|
|
|
|
|
{
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_t cd;
|
2007-03-19 19:54:34 +01:00
|
|
|
|
const char *inptr;
|
|
|
|
|
char *outptr;
|
|
|
|
|
size_t inbytes, outbytes;
|
|
|
|
|
|
|
|
|
|
if (!convertedpw)
|
|
|
|
|
{
|
|
|
|
|
/* We assume one byte encodings. Thus we can allocate
|
|
|
|
|
the buffer of the same size as the original
|
|
|
|
|
passphrase; the result will actually be shorter
|
|
|
|
|
then. */
|
|
|
|
|
convertedpwsize = strlen (pw) + 1;
|
|
|
|
|
convertedpw = gcry_malloc_secure (convertedpwsize);
|
|
|
|
|
if (!convertedpw)
|
|
|
|
|
{
|
|
|
|
|
log_info ("out of secure memory while"
|
|
|
|
|
" converting passphrase\n");
|
|
|
|
|
break; /* Give up. */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2007-06-14 19:05:07 +02:00
|
|
|
|
cd = jnlib_iconv_open (charsets[charsetidx], "utf-8");
|
|
|
|
|
if (cd == (jnlib_iconv_t)(-1))
|
2007-03-19 19:54:34 +01:00
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
inptr = pw;
|
|
|
|
|
inbytes = strlen (pw);
|
|
|
|
|
outptr = convertedpw;
|
|
|
|
|
outbytes = convertedpwsize - 1;
|
2007-06-14 19:05:07 +02:00
|
|
|
|
if ( jnlib_iconv (cd, (const char **)&inptr, &inbytes,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
&outptr, &outbytes) == (size_t)-1)
|
2007-03-19 19:54:34 +01:00
|
|
|
|
{
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_close (cd);
|
2007-03-19 19:54:34 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
*outptr = 0;
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_close (cd);
|
2012-06-05 19:29:22 +02:00
|
|
|
|
log_info ("decryption failed; trying charset '%s'\n",
|
2007-03-19 19:54:34 +01:00
|
|
|
|
charsets[charsetidx]);
|
|
|
|
|
}
|
|
|
|
|
memcpy (plaintext, ciphertext, length);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
crypt_block (plaintext, length, salt, saltlen, iter, iv, ivlen,
|
2007-03-19 19:54:34 +01:00
|
|
|
|
convertedpw? convertedpw:pw, cipher_algo, 0);
|
|
|
|
|
if (check_fnc (plaintext, length))
|
|
|
|
|
break; /* Decryption succeeded. */
|
|
|
|
|
}
|
|
|
|
|
gcry_free (convertedpw);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Return true if the decryption of an bag_encrypted_data object has
|
|
|
|
|
likely succeeded. */
|
|
|
|
|
static int
|
|
|
|
|
bag_decrypted_data_p (const void *plaintext, size_t length)
|
|
|
|
|
{
|
|
|
|
|
struct tag_info ti;
|
|
|
|
|
const unsigned char *p = plaintext;
|
|
|
|
|
size_t n = length;
|
|
|
|
|
|
|
|
|
|
/* { */
|
|
|
|
|
/* # warning debug code is enabled */
|
2020-04-27 16:53:30 +02:00
|
|
|
|
/* FILE *fp = fopen ("tmp-minip12-plain-data.der", "wb"); */
|
2007-03-19 19:54:34 +01:00
|
|
|
|
/* if (!fp || fwrite (p, n, 1, fp) != 1) */
|
|
|
|
|
/* exit (2); */
|
|
|
|
|
/* fclose (fp); */
|
|
|
|
|
/* } */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2007-03-19 19:54:34 +01:00
|
|
|
|
if (parse_tag (&p, &n, &ti))
|
|
|
|
|
return 0;
|
|
|
|
|
if (ti.class || ti.tag != TAG_SEQUENCE)
|
|
|
|
|
return 0;
|
|
|
|
|
if (parse_tag (&p, &n, &ti))
|
|
|
|
|
return 0;
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
return 1;
|
2007-03-19 19:54:34 +01:00
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
static int
|
2023-06-28 17:33:24 +02:00
|
|
|
|
parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
gpg_error_t err = 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
const char *where;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
const unsigned char *oid;
|
|
|
|
|
size_t oidlen;
|
|
|
|
|
const unsigned char *data;
|
|
|
|
|
size_t datalen;
|
|
|
|
|
int intval;
|
2006-10-23 12:52:23 +02:00
|
|
|
|
char salt[20];
|
2005-12-16 16:52:48 +01:00
|
|
|
|
size_t saltlen;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
char iv[16];
|
2004-02-10 20:26:55 +01:00
|
|
|
|
unsigned int iter;
|
|
|
|
|
unsigned char *plain = NULL;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
int is_3des = 0;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
int is_pbes2 = 0;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int is_aes256 = 0;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
int keyelem_count;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int renewed_tlv = 0;
|
|
|
|
|
int loopcount;
|
|
|
|
|
unsigned int startlevel;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
where = "bag.encryptedData";
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing %s\n", where);
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
where = "bag.encryptedData.version";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (intval)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
where = "bag.encryptedData.data";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen != DIM(oid_data) || memcmp (oid, oid_data, DIM(oid_data)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2004-02-10 20:26:55 +01:00
|
|
|
|
where = "bag.encryptedData.keyinfo";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2004-02-04 20:13:16 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2004-02-04 20:13:16 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2004-02-04 20:13:16 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (oidlen == DIM(oid_pbeWithSHAAnd40BitRC2_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_pbeWithSHAAnd40BitRC2_CBC,
|
2004-02-10 20:26:55 +01:00
|
|
|
|
DIM(oid_pbeWithSHAAnd40BitRC2_CBC)))
|
2023-06-28 17:33:24 +02:00
|
|
|
|
;
|
|
|
|
|
else if (oidlen == DIM(oid_pbeWithSHAAnd3_KeyTripleDES_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_pbeWithSHAAnd3_KeyTripleDES_CBC,
|
|
|
|
|
DIM(oid_pbeWithSHAAnd3_KeyTripleDES_CBC)))
|
|
|
|
|
is_3des = 1;
|
|
|
|
|
else if (oidlen == DIM(oid_pkcs5PBES2)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs5PBES2, oidlen))
|
|
|
|
|
is_pbes2 = 1;
|
|
|
|
|
else
|
2004-02-04 20:13:16 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_UNKNOWN_ALGORITHM);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2004-02-04 20:13:16 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/*FIXME: This code is duplicated in parse_shrouded_key_bag. */
|
2011-03-10 15:27:10 +01:00
|
|
|
|
if (is_pbes2)
|
|
|
|
|
{
|
|
|
|
|
where = "pkcs5PBES2-params";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (oidlen != DIM(oid_pkcs5PBKDF2)
|
|
|
|
|
|| memcmp (oid, oid_pkcs5PBKDF2, oidlen))
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_BER); /* Not PBKDF2. */
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (datalen < 8 || datalen > sizeof salt)
|
|
|
|
|
{
|
|
|
|
|
log_info ("bad length of salt (%zu)\n", datalen);
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_LENGTH);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
saltlen = datalen;
|
|
|
|
|
memcpy (salt, data, saltlen);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (!intval) /* Not a valid iteration count. */
|
2011-03-10 15:27:10 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
iter = intval;
|
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
/* Note: We don't support the optional parameters but assume
|
|
|
|
|
that the algorithmIdentifier follows. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (oidlen == DIM(oid_aes128_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_aes128_CBC, oidlen))
|
|
|
|
|
;
|
|
|
|
|
else if (oidlen == DIM(oid_aes256_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_aes256_CBC, oidlen))
|
|
|
|
|
is_aes256 = 1;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
gpgrt_log_printhex (oid, oidlen, "cipher algo:");
|
|
|
|
|
err = gpg_error (GPG_ERR_CIPHER_ALGO);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (datalen != sizeof iv)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_LENGTH);
|
|
|
|
|
goto bailout; /* Bad IV. */
|
|
|
|
|
}
|
|
|
|
|
memcpy (iv, data, datalen);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
2004-02-04 20:13:16 +01:00
|
|
|
|
{
|
2011-03-10 15:27:10 +01:00
|
|
|
|
where = "rc2or3des-params";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (datalen < 8 || datalen > 20)
|
|
|
|
|
{
|
|
|
|
|
log_info ("bad length of salt (%zu) for 3DES\n", datalen);
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_LENGTH);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
saltlen = datalen;
|
|
|
|
|
memcpy (salt, data, saltlen);
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (!intval)
|
2011-03-10 15:27:10 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
iter = intval;
|
2004-02-04 20:13:16 +01:00
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
where = "rc2or3desoraes-ciphertext";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2004-02-04 20:13:16 +01:00
|
|
|
|
goto bailout;
|
2005-12-16 16:52:48 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object (tlv, CLASS_CONTEXT, 0, &data, &datalen))
|
2004-02-04 20:13:16 +01:00
|
|
|
|
goto bailout;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2021-02-24 08:40:06 +01:00
|
|
|
|
if (opt_verbose)
|
2023-06-28 17:33:24 +02:00
|
|
|
|
log_info ("%zu bytes of %s encrypted text\n", datalen,
|
|
|
|
|
is_pbes2?(is_aes256?"AES256":"AES128"):is_3des?"3DES":"RC2");
|
2004-02-04 20:13:16 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
plain = gcry_malloc_secure (datalen);
|
2004-02-10 20:26:55 +01:00
|
|
|
|
if (!plain)
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2004-02-10 20:26:55 +01:00
|
|
|
|
log_error ("error allocating decryption buffer\n");
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
decrypt_block (data, plain, datalen, salt, saltlen, iter,
|
2022-06-20 16:45:42 +02:00
|
|
|
|
iv, is_pbes2?16:0, ctx->password,
|
2023-06-28 17:33:24 +02:00
|
|
|
|
is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128) :
|
2011-03-10 15:27:10 +01:00
|
|
|
|
is_3des ? GCRY_CIPHER_3DES : GCRY_CIPHER_RFC2268_40,
|
2007-03-19 19:54:34 +01:00
|
|
|
|
bag_decrypted_data_p);
|
2004-02-10 20:26:55 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* We do not need the TLV anymore and allocated a new one. */
|
|
|
|
|
where = "bag.encryptedData.decrypted-text";
|
|
|
|
|
tlv = tlv_new (plain, datalen);
|
|
|
|
|
if (!tlv)
|
2004-09-29 15:50:31 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2004-09-29 15:50:31 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
renewed_tlv = 1;
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2004-09-29 15:50:31 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
ctx->badpass = 1;
|
2004-09-29 15:50:31 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_top_sequence (tlv))
|
2004-09-29 15:50:31 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
ctx->badpass = 1;
|
2004-09-29 15:50:31 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2004-02-10 20:26:55 +01:00
|
|
|
|
|
2005-11-28 12:52:25 +01:00
|
|
|
|
/* Loop over all certificates inside the bag. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
loopcount = 0;
|
|
|
|
|
startlevel = tlv_level (tlv);
|
|
|
|
|
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
|
2004-02-10 20:26:55 +01:00
|
|
|
|
{
|
2006-07-21 11:41:11 +02:00
|
|
|
|
int iscrlbag = 0;
|
|
|
|
|
int iskeybag = 0;
|
2004-02-12 10:27:36 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
loopcount++;
|
2004-02-10 20:26:55 +01:00
|
|
|
|
where = "certbag.nextcert";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2004-02-10 20:26:55 +01:00
|
|
|
|
goto bailout;
|
2004-02-04 20:13:16 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
where = "certbag.oid";
|
|
|
|
|
if (tlv_next (tlv))
|
2004-02-10 20:26:55 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2004-02-10 20:26:55 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen == DIM(oid_pkcs_12_CertBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_CertBag, DIM(oid_pkcs_12_CertBag)))
|
|
|
|
|
;
|
|
|
|
|
else if (oidlen == DIM(oid_pkcs_12_CrlBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_CrlBag, DIM(oid_pkcs_12_CrlBag)))
|
|
|
|
|
iscrlbag = 1;
|
|
|
|
|
else if (oidlen == DIM(oid_pkcs_12_keyBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_keyBag, DIM(oid_pkcs_12_keyBag)))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
|
|
|
|
/* The TrustedMIME plugin for MS Outlook started to create
|
|
|
|
|
files with just one outer 3DES encrypted container and
|
|
|
|
|
inside the certificates as well as the key. */
|
|
|
|
|
iskeybag = 1;
|
2004-02-12 10:27:36 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
2023-06-28 17:33:24 +02:00
|
|
|
|
{
|
|
|
|
|
gpgrt_log_printhex (oid, oidlen, "cert bag type OID:");
|
|
|
|
|
err = gpg_error (GPG_ERR_NOT_IMPLEMENTED);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2004-02-10 20:26:55 +01:00
|
|
|
|
|
2004-02-12 10:27:36 +01:00
|
|
|
|
where = "certbag.before.certheader";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2004-02-10 20:26:55 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2004-02-10 20:26:55 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
2006-07-21 11:41:11 +02:00
|
|
|
|
if (iscrlbag)
|
2004-02-12 10:27:36 +01:00
|
|
|
|
{
|
|
|
|
|
log_info ("skipping unsupported crlBag\n");
|
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
else if (iskeybag && ctx->privatekey)
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
|
|
|
|
log_info ("one keyBag already processed; skipping this one\n");
|
|
|
|
|
}
|
|
|
|
|
else if (iskeybag)
|
|
|
|
|
{
|
2021-02-24 08:40:06 +01:00
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing simple keyBag\n");
|
2006-07-21 11:41:11 +02:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (intval)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen != DIM(oid_rsaEncryption)
|
|
|
|
|
|| memcmp (oid, oid_rsaEncryption, oidlen))
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_PUBKEY_ALGO);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We ignore the next octet string. */
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_sequence (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
if (ctx->privatekey)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_DUP_VALUE);
|
|
|
|
|
log_error ("a private key has already been received\n");
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
ctx->privatekey = gcry_calloc (10, sizeof *ctx->privatekey);
|
|
|
|
|
if (!ctx->privatekey)
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_error ("error allocating private key element array\n");
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
where = "reading.keybag.key-parameters";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
keyelem_count = 0;
|
|
|
|
|
while (!(err = tlv_next (tlv)) && !tlv_popped (tlv))
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (keyelem_count >= 9)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_TOO_MANY);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = tlv_expect_mpinteger (tlv, !keyelem_count,
|
|
|
|
|
ctx->privatekey+keyelem_count);
|
|
|
|
|
if (!keyelem_count && gpg_err_code (err) == GPG_ERR_FALSE)
|
|
|
|
|
; /* Ignore the first value iff it is zero. */
|
|
|
|
|
else if (err)
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
log_error ("error parsing RSA key parameter %d: %s\n",
|
|
|
|
|
keyelem_count, gpg_strerror (err));
|
|
|
|
|
goto bailout;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
}
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("RSA key parameter %d found\n", keyelem_count);
|
2023-06-28 17:33:24 +02:00
|
|
|
|
keyelem_count++;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err && gpg_err_code (err) != GPG_ERR_EOF)
|
2006-07-21 11:41:11 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = 0;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
}
|
2004-02-12 10:27:36 +01:00
|
|
|
|
else
|
|
|
|
|
{
|
2021-02-24 08:40:06 +01:00
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing certBag\n");
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen != DIM(oid_x509Certificate_for_pkcs_12)
|
|
|
|
|
|| memcmp (oid, oid_x509Certificate_for_pkcs_12,
|
|
|
|
|
DIM(oid_x509Certificate_for_pkcs_12)))
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_UNSUPPORTED_CERT);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-12 10:27:36 +01:00
|
|
|
|
where = "certbag.before.octetstring";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (intval)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_BAD_BER);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2004-02-12 10:27:36 +01:00
|
|
|
|
goto bailout;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-12 10:27:36 +01:00
|
|
|
|
/* Return the certificate. */
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (ctx->certcb)
|
2023-06-28 17:33:24 +02:00
|
|
|
|
ctx->certcb (ctx->certcbarg, data, datalen);
|
2004-02-12 10:27:36 +01:00
|
|
|
|
}
|
2004-02-10 20:26:55 +01:00
|
|
|
|
|
|
|
|
|
/* Skip the optional SET with the pkcs12 cert attributes. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
where = "bag.attribute_set";
|
|
|
|
|
err = tlv_next (tlv);
|
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_EOF)
|
|
|
|
|
break;
|
|
|
|
|
if (err)
|
|
|
|
|
goto bailout;
|
|
|
|
|
err = tlv_expect_set (tlv);
|
|
|
|
|
if (!err)
|
|
|
|
|
{ /* This is the optional set of attributes. Skip it. */
|
|
|
|
|
tlv_skip (tlv);
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("skipping bag.attribute_set\n");
|
2004-02-10 20:26:55 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
|
|
|
|
|
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
|
|
|
|
|
else
|
|
|
|
|
goto bailout;
|
2004-02-10 20:26:55 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err && gpg_err_code (err) != GPG_ERR_EOF)
|
|
|
|
|
{
|
|
|
|
|
if (!loopcount) /* The first while(tlv_next) failed. */
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
err = 0;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
leave:
|
|
|
|
|
if (renewed_tlv)
|
|
|
|
|
tlv_release (tlv);
|
2004-02-10 20:26:55 +01:00
|
|
|
|
gcry_free (plain);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (ctx->badpass)
|
2004-09-29 15:50:31 +02:00
|
|
|
|
{
|
|
|
|
|
/* Note, that the following string might be used by other programs
|
|
|
|
|
to check for a bad passphrase; it should therefore not be
|
|
|
|
|
translated or changed. */
|
|
|
|
|
log_error ("possibly bad passphrase given\n");
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
bailout:
|
|
|
|
|
if (!err)
|
|
|
|
|
err = gpg_error (GPG_ERR_GENERAL);
|
|
|
|
|
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n",
|
|
|
|
|
__func__, where,
|
|
|
|
|
tlv? tlv->stacklen : 0,
|
|
|
|
|
tlv? tlv->offset : 0,
|
|
|
|
|
tlv? tlv->lastfunc : "",
|
|
|
|
|
tlv ? gpg_strerror (tlv->lasterr) : "init failed",
|
|
|
|
|
gpg_strerror (err));
|
|
|
|
|
goto leave;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
2007-03-19 19:54:34 +01:00
|
|
|
|
|
|
|
|
|
/* Return true if the decryption of a bag_data object has likely
|
|
|
|
|
succeeded. */
|
|
|
|
|
static int
|
|
|
|
|
bag_data_p (const void *plaintext, size_t length)
|
|
|
|
|
{
|
|
|
|
|
struct tag_info ti;
|
|
|
|
|
const unsigned char *p = plaintext;
|
|
|
|
|
size_t n = length;
|
|
|
|
|
|
|
|
|
|
/* { */
|
|
|
|
|
/* # warning debug code is enabled */
|
2020-04-21 20:59:52 +02:00
|
|
|
|
/* FILE *fp = fopen ("tmp-minip12-plain-key.der", "wb"); */
|
2007-03-19 19:54:34 +01:00
|
|
|
|
/* if (!fp || fwrite (p, n, 1, fp) != 1) */
|
|
|
|
|
/* exit (2); */
|
|
|
|
|
/* fclose (fp); */
|
|
|
|
|
/* } */
|
|
|
|
|
|
|
|
|
|
if (parse_tag (&p, &n, &ti) || ti.class || ti.tag != TAG_SEQUENCE)
|
|
|
|
|
return 0;
|
|
|
|
|
if (parse_tag (&p, &n, &ti) || ti.class || ti.tag != TAG_INTEGER
|
|
|
|
|
|| ti.length != 1 || *p)
|
|
|
|
|
return 0;
|
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
return 1;
|
2007-03-19 19:54:34 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
static gpg_error_t
|
2023-06-28 17:33:24 +02:00
|
|
|
|
parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
gpg_error_t err = 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
const char *where;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
const unsigned char *oid;
|
|
|
|
|
size_t oidlen;
|
|
|
|
|
const unsigned char *data;
|
|
|
|
|
size_t datalen;
|
|
|
|
|
int intval;
|
2006-10-23 12:52:23 +02:00
|
|
|
|
char salt[20];
|
2005-12-16 16:52:48 +01:00
|
|
|
|
size_t saltlen;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
char iv[16];
|
2003-08-05 19:11:04 +02:00
|
|
|
|
unsigned int iter;
|
2023-06-29 16:33:03 +02:00
|
|
|
|
struct tlv_ctx_s *saved_tlv = NULL;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int renewed_tlv = 0; /* True if the TLV must be released. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
unsigned char *plain = NULL;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
int is_pbes2 = 0;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int is_aes256 = 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "shrouded_key_bag";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing %s\n", where);
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
where = "shrouded_key_bag.cipherinfo";
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
if (oidlen == DIM(oid_pbeWithSHAAnd3_KeyTripleDES_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_pbeWithSHAAnd3_KeyTripleDES_CBC,
|
2011-03-10 15:27:10 +01:00
|
|
|
|
DIM(oid_pbeWithSHAAnd3_KeyTripleDES_CBC)))
|
2023-06-28 17:33:24 +02:00
|
|
|
|
; /* Standard cipher. */
|
|
|
|
|
else if (oidlen == DIM(oid_pkcs5PBES2)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs5PBES2, DIM(oid_pkcs5PBES2)))
|
|
|
|
|
is_pbes2 = 1;
|
|
|
|
|
else
|
2011-03-10 15:27:10 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_UNKNOWN_ALGORITHM);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
if (is_pbes2)
|
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "shrouded_key_bag.pkcs5PBES2-params";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (!(oidlen == DIM(oid_pkcs5PBKDF2)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs5PBKDF2, oidlen)))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout; /* Not PBKDF2. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (datalen < 8 || datalen > sizeof salt)
|
|
|
|
|
{
|
|
|
|
|
log_info ("bad length of salt (%zu) for AES\n", datalen);
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_LENGTH);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
saltlen = datalen;
|
|
|
|
|
memcpy (salt, data, saltlen);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (!intval) /* Not a valid iteration count. */
|
2011-03-10 15:27:10 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
iter = intval;
|
|
|
|
|
|
2011-03-10 15:27:10 +01:00
|
|
|
|
/* Note: We don't support the optional parameters but assume
|
|
|
|
|
that the algorithmIdentifier follows. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (oidlen == DIM(oid_aes128_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_aes128_CBC, oidlen))
|
|
|
|
|
;
|
|
|
|
|
else if (oidlen == DIM(oid_aes256_CBC)
|
|
|
|
|
&& !memcmp (oid, oid_aes256_CBC, oidlen))
|
|
|
|
|
is_aes256 = 1;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
gpgrt_log_printhex (oid, oidlen, "cipher is:");
|
|
|
|
|
err = gpg_error (GPG_ERR_CIPHER_ALGO);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (datalen != sizeof iv)
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout; /* Bad IV. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
memcpy (iv, data, datalen);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "shrouded_key_bag.3des-params";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (datalen < 8 || datalen > 20)
|
|
|
|
|
{
|
|
|
|
|
log_info ("bad length of salt (%zu) for 3DES\n", datalen);
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_LENGTH);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
saltlen = datalen;
|
|
|
|
|
memcpy (salt, data, saltlen);
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
2011-03-10 15:27:10 +01:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (!intval)
|
2011-03-10 15:27:10 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
2011-03-10 15:27:10 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
iter = intval;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "shrouded_key_bag.3desoraes-ciphertext";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2021-02-25 09:16:18 +01:00
|
|
|
|
if (opt_verbose)
|
2023-06-28 17:33:24 +02:00
|
|
|
|
log_info ("%zu bytes of %s encrypted text\n",
|
|
|
|
|
datalen, is_pbes2? (is_aes256?"AES256":"AES128"):"3DES");
|
|
|
|
|
|
|
|
|
|
plain = gcry_malloc_secure (datalen);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (!plain)
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2003-08-05 19:11:04 +02:00
|
|
|
|
log_error ("error allocating decryption buffer\n");
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
decrypt_block (data, plain, datalen, salt, saltlen, iter,
|
2022-06-20 16:45:42 +02:00
|
|
|
|
iv, is_pbes2? 16:0, ctx->password,
|
2023-06-28 17:33:24 +02:00
|
|
|
|
is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128)
|
|
|
|
|
: GCRY_CIPHER_3DES,
|
2007-03-19 19:54:34 +01:00
|
|
|
|
bag_data_p);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* We do not need the TLV anymore and allocated a new one. */
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "shrouded_key_bag.decrypted-text";
|
2023-06-29 16:33:03 +02:00
|
|
|
|
saved_tlv = tlv;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
tlv = tlv_new (plain, datalen);
|
|
|
|
|
if (!tlv)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
renewed_tlv = 1;
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("new parser context\n");
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
{
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
if (tlv_expect_top_sequence (tlv))
|
|
|
|
|
{
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
{
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
|
|
|
|
{
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
if (intval)
|
|
|
|
|
{
|
|
|
|
|
ctx->badpass = 1;
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen == DIM(oid_rsaEncryption)
|
|
|
|
|
&& !memcmp (oid, oid_rsaEncryption, oidlen))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("RSA parameters\n");
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_null (tlv))
|
|
|
|
|
tlv_set_pending (tlv); /* NULL tag missing - ignore this. */
|
2020-04-21 20:59:52 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else if (oidlen == DIM(oid_pcPublicKey)
|
|
|
|
|
&& !memcmp (oid, oid_pcPublicKey, oidlen))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
{
|
|
|
|
|
/* See RFC-5915 for the format. */
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
ksba_free (ctx->curve);
|
2023-06-28 17:33:24 +02:00
|
|
|
|
ctx->curve = ksba_oid_to_str (oid, oidlen);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (!ctx->curve)
|
2023-06-28 17:33:24 +02:00
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_OID_STRING);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("OID of curve is: %s\n", ctx->curve);
|
2020-04-21 20:59:52 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else /* Unknown key format */
|
|
|
|
|
{
|
|
|
|
|
gpgrt_log_printhex (oid, oidlen, "key format OID:");
|
|
|
|
|
err = gpg_error (GPG_ERR_NOT_IMPLEMENTED);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* An octet string to encapsulate the key elements. */
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 1, &data, &datalen))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (ctx->privatekey)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_DUP_VALUE);
|
|
|
|
|
log_error ("a private key has already been received\n");
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
ctx->privatekey = gcry_calloc (10, sizeof *ctx->privatekey);
|
|
|
|
|
if (!ctx->privatekey)
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_error ("error allocating privatekey element array\n");
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
where = "shrouded_key_bag.reading.key-parameters";
|
|
|
|
|
if (ctx->curve) /* ECC case. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err = tlv_expect_integer (tlv, &intval)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (intval != 1)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
2020-04-21 20:59:52 +02:00
|
|
|
|
log_error ("error parsing private ecPublicKey parameter: %s\n",
|
|
|
|
|
"bad version");
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_printhex (data, datalen, "ecc q=");
|
2022-06-20 16:45:42 +02:00
|
|
|
|
err = gcry_mpi_scan (ctx->privatekey, GCRYMPI_FMT_USG,
|
2023-06-28 17:33:24 +02:00
|
|
|
|
data, datalen, NULL);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (err)
|
2020-04-21 20:59:52 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_error ("error parsing key parameter: %s\n", gpg_strerror (err));
|
2020-04-21 20:59:52 +02:00
|
|
|
|
goto bailout;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2020-04-21 20:59:52 +02:00
|
|
|
|
}
|
|
|
|
|
else /* RSA case */
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int keyelem_count = 0;
|
|
|
|
|
int firstparam = 1;
|
|
|
|
|
|
|
|
|
|
while (!(err = tlv_next (tlv)) && !tlv_popped (tlv))
|
2020-04-21 20:59:52 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (keyelem_count >= 9)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_TOO_MANY);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = tlv_expect_mpinteger (tlv, firstparam,
|
|
|
|
|
ctx->privatekey+keyelem_count);
|
|
|
|
|
if (firstparam && gpg_err_code (err) == GPG_ERR_FALSE)
|
|
|
|
|
; /* Ignore the first value iff it is zero. */
|
|
|
|
|
else if (err)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error parsing RSA key parameter %d: %s\n",
|
|
|
|
|
keyelem_count, gpg_strerror (err));
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2020-04-21 20:59:52 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("RSA key parameter %d found\n", keyelem_count);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
keyelem_count++;
|
2020-04-21 20:59:52 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
firstparam = 0;
|
2020-04-21 20:59:52 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err && gpg_err_code (err) != GPG_ERR_EOF)
|
|
|
|
|
goto bailout;
|
|
|
|
|
err = 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
2023-06-29 16:33:03 +02:00
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("restoring parser context\n");
|
|
|
|
|
tlv_release (tlv);
|
|
|
|
|
renewed_tlv = 0;
|
|
|
|
|
tlv = saved_tlv;
|
|
|
|
|
|
|
|
|
|
where = "shrouded_key_bag.attribute_set";
|
|
|
|
|
err = tlv_next (tlv);
|
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_EOF)
|
|
|
|
|
goto leave;
|
|
|
|
|
if (err)
|
|
|
|
|
goto bailout;
|
|
|
|
|
err = tlv_expect_set (tlv);
|
|
|
|
|
if (!err)
|
|
|
|
|
{ /* This is the optional set of attributes. Skip it. */
|
|
|
|
|
tlv_skip (tlv);
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("skipping %s\n", where);
|
|
|
|
|
}
|
|
|
|
|
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
|
|
|
|
|
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
|
|
|
|
|
else /* Other error. */
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
leave:
|
|
|
|
|
gcry_free (plain);
|
|
|
|
|
if (renewed_tlv)
|
2023-06-29 16:33:03 +02:00
|
|
|
|
{
|
|
|
|
|
tlv_release (tlv);
|
|
|
|
|
if (opt_verbose > 1)
|
|
|
|
|
log_debug ("parser context released\n");
|
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
bailout:
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (!err)
|
|
|
|
|
err = gpg_error (GPG_ERR_GENERAL);
|
2023-06-28 17:33:24 +02:00
|
|
|
|
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n",
|
|
|
|
|
__func__, where,
|
|
|
|
|
tlv? tlv->stacklen : 0,
|
|
|
|
|
tlv? tlv->offset : 0,
|
|
|
|
|
tlv? tlv->lastfunc : "",
|
|
|
|
|
tlv ? gpg_strerror (tlv->lasterr) : "init failed",
|
|
|
|
|
gpg_strerror (err));
|
|
|
|
|
goto leave;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static gpg_error_t
|
2023-06-28 17:33:24 +02:00
|
|
|
|
parse_cert_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
{
|
|
|
|
|
gpg_error_t err = 0;
|
|
|
|
|
const char *where;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int intval;
|
|
|
|
|
const unsigned char *oid;
|
|
|
|
|
size_t oidlen;
|
|
|
|
|
const unsigned char *data;
|
|
|
|
|
size_t datalen;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing certBag\n");
|
|
|
|
|
|
|
|
|
|
/* Expect:
|
|
|
|
|
* [0]
|
|
|
|
|
* SEQUENCE
|
|
|
|
|
* OBJECT IDENTIFIER pkcs-12-certBag
|
|
|
|
|
*/
|
|
|
|
|
where = "certbag.before.certheader";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (intval)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen != DIM(oid_x509Certificate_for_pkcs_12)
|
|
|
|
|
|| memcmp (oid, oid_x509Certificate_for_pkcs_12, oidlen))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
/* Expect:
|
|
|
|
|
* [0]
|
|
|
|
|
* OCTET STRING encapsulates -- the certificates
|
|
|
|
|
*/
|
|
|
|
|
where = "certbag.before.octetstring";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 0, &data, &datalen))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
/* Return the certificate from the octet string. */
|
|
|
|
|
if (ctx->certcb)
|
2023-06-28 17:33:24 +02:00
|
|
|
|
ctx->certcb (ctx->certcbarg, data, datalen);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* Expect optional:
|
2022-06-20 16:45:42 +02:00
|
|
|
|
* SET
|
|
|
|
|
* SEQUENCE -- we actually ignore this.
|
|
|
|
|
*/
|
|
|
|
|
where = "certbag.attribute_set";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = tlv_expect_set (tlv);
|
|
|
|
|
if (!err)
|
|
|
|
|
{ /* This is the optional set of attributes. Skip it. */
|
|
|
|
|
tlv_skip (tlv);
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("skipping certbag.attribute_set\n");
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
|
|
|
|
|
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
|
|
|
|
|
else
|
|
|
|
|
goto bailout;
|
2020-04-21 20:59:52 +02:00
|
|
|
|
|
|
|
|
|
leave:
|
2022-06-20 16:45:42 +02:00
|
|
|
|
return err;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
bailout:
|
|
|
|
|
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n",
|
|
|
|
|
__func__, where,
|
|
|
|
|
tlv? tlv->stacklen : 0,
|
|
|
|
|
tlv? tlv->offset : 0,
|
|
|
|
|
tlv? tlv->lastfunc : "",
|
|
|
|
|
tlv ? gpg_strerror (tlv->lasterr) : "init failed",
|
|
|
|
|
gpg_strerror (err));
|
|
|
|
|
if (!err)
|
|
|
|
|
err = gpg_error (GPG_ERR_GENERAL);
|
|
|
|
|
goto leave;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static gpg_error_t
|
2023-06-28 17:33:24 +02:00
|
|
|
|
parse_bag_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
{
|
|
|
|
|
gpg_error_t err = 0;
|
|
|
|
|
const char *where;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
int intval;
|
|
|
|
|
const unsigned char *oid;
|
|
|
|
|
size_t oidlen;
|
|
|
|
|
unsigned int startlevel;
|
|
|
|
|
|
|
|
|
|
if (opt_verbose)
|
|
|
|
|
log_info ("processing bag data\n");
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
/* Expect:
|
|
|
|
|
* [0]
|
|
|
|
|
* OCTET STRING, encapsulates
|
|
|
|
|
*/
|
|
|
|
|
where = "data";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_octet_string (tlv, 1, NULL, NULL))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Expect:
|
|
|
|
|
* SEQUENCE
|
|
|
|
|
*/
|
2023-06-28 17:33:24 +02:00
|
|
|
|
where = "data.outerseqs";
|
|
|
|
|
if (tlv_next (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
startlevel = tlv_level (tlv);
|
|
|
|
|
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* Expect:
|
|
|
|
|
* SEQUENCE
|
|
|
|
|
*/
|
|
|
|
|
where = "data.innerseqs";
|
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
/* Expect:
|
|
|
|
|
* OBJECT IDENTIFIER
|
|
|
|
|
*/
|
|
|
|
|
where = "data.oid";
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
/* Divert to the actual parser. */
|
|
|
|
|
if (oidlen == DIM(oid_pkcs_12_pkcs_8ShroudedKeyBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_pkcs_8ShroudedKeyBag,
|
|
|
|
|
DIM(oid_pkcs_12_pkcs_8ShroudedKeyBag)))
|
|
|
|
|
{
|
|
|
|
|
if ((err = parse_shrouded_key_bag (ctx, tlv)))
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
else if (oidlen == DIM(oid_pkcs_12_CertBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_CertBag, DIM(oid_pkcs_12_CertBag)))
|
|
|
|
|
{
|
|
|
|
|
if ((err = parse_cert_bag (ctx, tlv)))
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
tlv_skip (tlv);
|
|
|
|
|
log_info ("unknown inner data type - skipped\n");
|
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err && gpg_err_code (err) != GPG_ERR_EOF)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
err = 0;
|
|
|
|
|
if (tlv_popped (tlv))
|
|
|
|
|
tlv_set_pending (tlv);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
return err;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
bailout:
|
|
|
|
|
if (!err)
|
|
|
|
|
err = gpg_error (GPG_ERR_GENERAL);
|
|
|
|
|
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n",
|
|
|
|
|
__func__, where,
|
|
|
|
|
tlv? tlv->stacklen : 0,
|
|
|
|
|
tlv? tlv->offset : 0,
|
|
|
|
|
tlv? tlv->lastfunc : "",
|
|
|
|
|
tlv ? gpg_strerror (tlv->lasterr) : "init failed",
|
|
|
|
|
gpg_strerror (err));
|
|
|
|
|
goto leave;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Parse a PKCS12 object and return an array of MPI representing the
|
2004-02-04 20:13:16 +01:00
|
|
|
|
secret key parameters. This is a very limited implementation in
|
|
|
|
|
that it is only able to look for 3DES encoded encryptedData and
|
2003-08-05 19:11:04 +02:00
|
|
|
|
tries to extract the first private key object it finds. In case of
|
2023-06-28 17:33:24 +02:00
|
|
|
|
an error NULL is returned. CERTCB and CERTCBARG are used to pass
|
2022-06-20 16:45:42 +02:00
|
|
|
|
X.509 certificates back to the caller. If R_CURVE is not NULL and
|
|
|
|
|
an ECC key was found the OID of the curve is stored there. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
gcry_mpi_t *
|
2004-02-10 20:26:55 +01:00
|
|
|
|
p12_parse (const unsigned char *buffer, size_t length, const char *pw,
|
|
|
|
|
void (*certcb)(void*, const unsigned char*, size_t),
|
2020-04-21 20:59:52 +02:00
|
|
|
|
void *certcbarg, int *r_badpass, char **r_curve)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
gpg_error_t err;
|
2023-07-04 09:26:10 +02:00
|
|
|
|
const char *where = "";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
struct tlv_ctx_s *tlv;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
struct p12_parse_ctx_s ctx = { NULL };
|
2023-06-28 17:33:24 +02:00
|
|
|
|
const unsigned char *oid;
|
|
|
|
|
size_t oidlen;
|
|
|
|
|
int intval;
|
|
|
|
|
unsigned int startlevel;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2010-06-17 17:44:44 +02:00
|
|
|
|
*r_badpass = 0;
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
|
|
|
|
ctx.certcb = certcb;
|
|
|
|
|
ctx.certcbarg = certcbarg;
|
|
|
|
|
ctx.password = pw;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
tlv = tlv_new (buffer, length);
|
|
|
|
|
if (!tlv)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
goto bailout;
|
|
|
|
|
}
|
2022-06-20 16:45:42 +02:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
where = "pfx";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
|
|
|
|
where = "pfxVersion";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_integer (tlv, &intval) || intval != 3)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
where = "authSave";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen != DIM(oid_data) || memcmp (oid, oid_data, DIM(oid_data)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_context_tag (tlv, &intval) || intval != 0 )
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_octet_string (tlv, 1, NULL, NULL))
|
|
|
|
|
goto bailout;
|
|
|
|
|
|
2005-12-16 16:52:48 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
where = "bags";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2023-06-28 17:33:24 +02:00
|
|
|
|
|
|
|
|
|
startlevel = tlv_level (tlv);
|
|
|
|
|
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
where = "bag-sequence";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_expect_sequence (tlv))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (tlv_next (tlv))
|
|
|
|
|
goto bailout;
|
|
|
|
|
if (tlv_expect_object_id (tlv, &oid, &oidlen))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
goto bailout;
|
2005-12-16 16:52:48 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (oidlen == DIM(oid_encryptedData)
|
|
|
|
|
&& !memcmp (oid, oid_encryptedData, DIM(oid_encryptedData)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
where = "bag.encryptedData";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err=parse_bag_encrypted_data (&ctx, tlv)))
|
|
|
|
|
goto bailout;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else if (oidlen == DIM(oid_data)
|
|
|
|
|
&& !memcmp (oid, oid_data, DIM(oid_data)))
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2022-06-20 16:45:42 +02:00
|
|
|
|
where = "bag.data";
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if ((err=parse_bag_data (&ctx, tlv)))
|
2022-06-20 16:45:42 +02:00
|
|
|
|
goto bailout;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else if (oidlen == DIM(oid_pkcs_12_pkcs_8ShroudedKeyBag)
|
|
|
|
|
&& !memcmp (oid, oid_pkcs_12_pkcs_8ShroudedKeyBag,
|
|
|
|
|
DIM(oid_pkcs_12_pkcs_8ShroudedKeyBag)))
|
2005-12-16 16:52:48 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
where = "bag.shroudedkeybag";
|
|
|
|
|
if ((err = parse_shrouded_key_bag (&ctx, tlv)))
|
|
|
|
|
goto bailout;
|
2005-12-16 16:52:48 +01:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
else
|
2005-12-16 16:52:48 +01:00
|
|
|
|
{
|
2023-06-28 17:33:24 +02:00
|
|
|
|
tlv_skip (tlv);
|
|
|
|
|
log_info ("unknown outer bag type - skipped\n");
|
2005-12-16 16:52:48 +01:00
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
if (err && gpg_err_code (err) != GPG_ERR_EOF)
|
|
|
|
|
goto bailout;
|
|
|
|
|
err = 0;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2023-06-28 17:33:24 +02:00
|
|
|
|
tlv_release (tlv);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (r_curve)
|
|
|
|
|
*r_curve = ctx.curve;
|
|
|
|
|
else
|
|
|
|
|
gcry_free (ctx.curve);
|
|
|
|
|
|
|
|
|
|
return ctx.privatekey;
|
2020-04-21 20:59:52 +02:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
bailout:
|
2023-06-28 17:33:24 +02:00
|
|
|
|
*r_badpass = ctx.badpass;
|
|
|
|
|
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n",
|
|
|
|
|
__func__, where,
|
|
|
|
|
tlv? tlv->stacklen : 0,
|
|
|
|
|
tlv? tlv->offset : 0,
|
|
|
|
|
tlv? tlv->lastfunc : "",
|
|
|
|
|
tlv ? gpg_strerror (tlv->lasterr) : "init failed",
|
|
|
|
|
gpg_strerror (err));
|
2022-06-20 16:45:42 +02:00
|
|
|
|
if (ctx.privatekey)
|
2006-07-21 11:41:11 +02:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
for (i=0; ctx.privatekey[i]; i++)
|
|
|
|
|
gcry_mpi_release (ctx.privatekey[i]);
|
|
|
|
|
gcry_free (ctx.privatekey);
|
|
|
|
|
ctx.privatekey = NULL;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
}
|
2023-06-28 17:33:24 +02:00
|
|
|
|
tlv_release (tlv);
|
2022-06-20 16:45:42 +02:00
|
|
|
|
gcry_free (ctx.curve);
|
|
|
|
|
if (r_curve)
|
|
|
|
|
*r_curve = NULL;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static size_t
|
|
|
|
|
compute_tag_length (size_t n)
|
2011-02-04 12:57:53 +01:00
|
|
|
|
{
|
2003-08-05 19:11:04 +02:00
|
|
|
|
int needed = 0;
|
|
|
|
|
|
|
|
|
|
if (n < 128)
|
|
|
|
|
needed += 2; /* tag and one length byte */
|
|
|
|
|
else if (n < 256)
|
|
|
|
|
needed += 3; /* tag, number of length bytes, 1 length byte */
|
|
|
|
|
else if (n < 65536)
|
|
|
|
|
needed += 4; /* tag, number of length bytes, 2 length bytes */
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
log_error ("object too larger to encode\n");
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
return needed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static unsigned char *
|
|
|
|
|
store_tag_length (unsigned char *p, int tag, size_t n)
|
2011-02-04 12:57:53 +01:00
|
|
|
|
{
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (tag == TAG_SEQUENCE)
|
|
|
|
|
tag |= 0x20; /* constructed */
|
|
|
|
|
|
|
|
|
|
*p++ = tag;
|
|
|
|
|
if (n < 128)
|
|
|
|
|
*p++ = n;
|
|
|
|
|
else if (n < 256)
|
|
|
|
|
{
|
|
|
|
|
*p++ = 0x81;
|
|
|
|
|
*p++ = n;
|
|
|
|
|
}
|
|
|
|
|
else if (n < 65536)
|
|
|
|
|
{
|
|
|
|
|
*p++ = 0x82;
|
|
|
|
|
*p++ = n >> 8;
|
|
|
|
|
*p++ = n;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return p;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Create the final PKCS-12 object from the sequences contained in
|
2006-06-20 17:48:09 +02:00
|
|
|
|
SEQLIST. PW is the password. That array is terminated with an NULL
|
|
|
|
|
object. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
static unsigned char *
|
2006-06-20 17:48:09 +02:00
|
|
|
|
create_final (struct buffer_s *sequences, const char *pw, size_t *r_length)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
size_t needed = 0;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
size_t len[8], n;
|
2006-06-20 17:48:09 +02:00
|
|
|
|
unsigned char *macstart;
|
|
|
|
|
size_t maclen;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
unsigned char *result, *p;
|
|
|
|
|
size_t resultlen;
|
2006-06-20 17:48:09 +02:00
|
|
|
|
char salt[8];
|
|
|
|
|
unsigned char keybuf[20];
|
|
|
|
|
gcry_md_hd_t md;
|
|
|
|
|
int rc;
|
2006-07-21 11:41:11 +02:00
|
|
|
|
int with_mac = 1;
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2006-06-20 17:48:09 +02:00
|
|
|
|
/* 9 steps to create the pkcs#12 Krampf. */
|
|
|
|
|
|
|
|
|
|
/* 8. The MAC. */
|
|
|
|
|
/* We add this at step 0. */
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 7. All the buffers. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
for (i=0; sequences[i].buffer; i++)
|
|
|
|
|
needed += sequences[i].length;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 6. This goes into a sequences. */
|
|
|
|
|
len[6] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
needed += n;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 5. Encapsulate all in an octet string. */
|
|
|
|
|
len[5] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
needed += n;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 4. And tag it with [0]. */
|
|
|
|
|
len[4] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
needed += n;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 3. Prepend an data OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += 2 + DIM (oid_data);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 2. Put all into a sequences. */
|
|
|
|
|
len[2] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
needed += n;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 1. Prepend the version integer 3. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += 3;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 0. And the final outer sequence. */
|
2006-07-21 11:41:11 +02:00
|
|
|
|
if (with_mac)
|
|
|
|
|
needed += DIM (data_mactemplate);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
len[0] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
needed += n;
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Allocate a buffer. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
result = gcry_malloc (needed);
|
|
|
|
|
if (!result)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error allocating buffer\n");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
p = result;
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 0. Store the very outer sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[0]);
|
|
|
|
|
|
|
|
|
|
/* 1. Store the version integer 3. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*p++ = TAG_INTEGER;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
*p++ = 1;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*p++ = 3;
|
2006-06-20 17:48:09 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 2. Store another sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[2]);
|
|
|
|
|
|
|
|
|
|
/* 3. Store the data OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_data));
|
2011-02-04 12:57:53 +01:00
|
|
|
|
memcpy (p, oid_data, DIM (oid_data));
|
|
|
|
|
p += DIM (oid_data);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 4. Next comes a context tag. */
|
|
|
|
|
p = store_tag_length (p, 0xa0, len[4]);
|
|
|
|
|
|
|
|
|
|
/* 5. And an octet string. */
|
|
|
|
|
p = store_tag_length (p, TAG_OCTET_STRING, len[5]);
|
|
|
|
|
|
|
|
|
|
/* 6. And the inner sequence. */
|
2006-06-20 17:48:09 +02:00
|
|
|
|
macstart = p;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[6]);
|
|
|
|
|
|
|
|
|
|
/* 7. Append all the buffers. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
for (i=0; sequences[i].buffer; i++)
|
|
|
|
|
{
|
|
|
|
|
memcpy (p, sequences[i].buffer, sequences[i].length);
|
|
|
|
|
p += sequences[i].length;
|
|
|
|
|
}
|
|
|
|
|
|
2006-07-21 11:41:11 +02:00
|
|
|
|
if (with_mac)
|
2006-06-20 17:48:09 +02:00
|
|
|
|
{
|
2006-07-21 11:41:11 +02:00
|
|
|
|
/* Intermezzo to compute the MAC. */
|
|
|
|
|
maclen = p - macstart;
|
|
|
|
|
gcry_randomize (salt, 8, GCRY_STRONG_RANDOM);
|
|
|
|
|
if (string_to_key (3, salt, 8, 2048, pw, 20, keybuf))
|
|
|
|
|
{
|
|
|
|
|
gcry_free (result);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
rc = gcry_md_open (&md, GCRY_MD_SHA1, GCRY_MD_FLAG_HMAC);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_md_open failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
gcry_free (result);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
rc = gcry_md_setkey (md, keybuf, 20);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("gcry_md_setkey failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
gcry_md_close (md);
|
|
|
|
|
gcry_free (result);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
gcry_md_write (md, macstart, maclen);
|
|
|
|
|
|
|
|
|
|
/* 8. Append the MAC template and fix it up. */
|
|
|
|
|
memcpy (p, data_mactemplate, DIM (data_mactemplate));
|
|
|
|
|
memcpy (p + DATA_MACTEMPLATE_SALT_OFF, salt, 8);
|
|
|
|
|
memcpy (p + DATA_MACTEMPLATE_MAC_OFF, gcry_md_read (md, 0), 20);
|
|
|
|
|
p += DIM (data_mactemplate);
|
2006-06-20 17:48:09 +02:00
|
|
|
|
gcry_md_close (md);
|
|
|
|
|
}
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Ready. */
|
|
|
|
|
resultlen = p - result;
|
|
|
|
|
if (needed != resultlen)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_debug ("p12_parse: warning: length mismatch: %lu, %lu\n",
|
2005-06-29 16:12:18 +02:00
|
|
|
|
(unsigned long)needed, (unsigned long)resultlen);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
*r_length = resultlen;
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Build a DER encoded SEQUENCE with the key:
|
2020-04-27 16:53:30 +02:00
|
|
|
|
*
|
|
|
|
|
* SEQUENCE { -- OneAsymmetricKey (RFC-5958)
|
|
|
|
|
* INTEGER 0
|
|
|
|
|
* SEQUENCE {
|
|
|
|
|
* OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
|
|
|
|
|
* NULL
|
|
|
|
|
* }
|
|
|
|
|
* OCTET STRING, encapsulates {
|
|
|
|
|
* SEQUENCE { -- RSAPrivateKey (RFC-3447)
|
|
|
|
|
* INTEGER 0 -- Version
|
|
|
|
|
* INTEGER -- n
|
|
|
|
|
* INTEGER -- e
|
|
|
|
|
* INTEGER -- d
|
|
|
|
|
* INTEGER -- p
|
|
|
|
|
* INTEGER -- q
|
|
|
|
|
* INTEGER -- d mod (p-1)
|
|
|
|
|
* INTEGER -- d mod (q-1)
|
|
|
|
|
* INTEGER -- q^-1 mod p
|
|
|
|
|
* }
|
|
|
|
|
* }
|
|
|
|
|
* }
|
|
|
|
|
*
|
|
|
|
|
* MODE controls what is being generated:
|
|
|
|
|
* 0 - As described above
|
|
|
|
|
* 1 - Ditto but without the padding
|
|
|
|
|
* 2 - Only the inner part (pkcs#1)
|
|
|
|
|
*/
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
|
|
|
|
static unsigned char *
|
2020-04-27 16:53:30 +02:00
|
|
|
|
build_rsa_key_sequence (gcry_mpi_t *kparms, int mode, size_t *r_length)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
int rc, i;
|
|
|
|
|
size_t needed, n;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
unsigned char *plain, *p;
|
|
|
|
|
size_t plainlen;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
size_t outseqlen, oidseqlen, octstrlen, inseqlen;
|
|
|
|
|
|
2014-06-03 18:57:33 +02:00
|
|
|
|
needed = 3; /* The version integer with value 0. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
for (i=0; kparms[i]; i++)
|
|
|
|
|
{
|
|
|
|
|
n = 0;
|
|
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_STD, NULL, 0, &n, kparms[i]);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error formatting parameter: %s\n", gpg_strerror (rc));
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
needed += n;
|
|
|
|
|
n = compute_tag_length (n);
|
|
|
|
|
if (!n)
|
|
|
|
|
return NULL;
|
|
|
|
|
needed += n;
|
|
|
|
|
}
|
|
|
|
|
if (i != 8)
|
|
|
|
|
{
|
2010-01-08 20:18:49 +01:00
|
|
|
|
log_error ("invalid parameters for p12_build\n");
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
/* Now this all goes into a sequence. */
|
|
|
|
|
inseqlen = needed;
|
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
if (!n)
|
|
|
|
|
return NULL;
|
|
|
|
|
needed += n;
|
2014-06-03 18:57:33 +02:00
|
|
|
|
|
|
|
|
|
if (mode != 2)
|
|
|
|
|
{
|
|
|
|
|
/* Encapsulate all into an octet string. */
|
|
|
|
|
octstrlen = needed;
|
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
if (!n)
|
|
|
|
|
return NULL;
|
|
|
|
|
needed += n;
|
|
|
|
|
/* Prepend the object identifier sequence. */
|
|
|
|
|
oidseqlen = 2 + DIM (oid_rsaEncryption) + 2;
|
|
|
|
|
needed += 2 + oidseqlen;
|
|
|
|
|
/* The version number. */
|
|
|
|
|
needed += 3;
|
|
|
|
|
/* And finally put the whole thing into a sequence. */
|
|
|
|
|
outseqlen = needed;
|
|
|
|
|
n = compute_tag_length (needed);
|
|
|
|
|
if (!n)
|
|
|
|
|
return NULL;
|
|
|
|
|
needed += n;
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* allocate 8 extra bytes for padding */
|
|
|
|
|
plain = gcry_malloc_secure (needed+8);
|
|
|
|
|
if (!plain)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error allocating encryption buffer\n");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* And now fill the plaintext buffer. */
|
|
|
|
|
p = plain;
|
2014-06-03 18:57:33 +02:00
|
|
|
|
if (mode != 2)
|
|
|
|
|
{
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, outseqlen);
|
|
|
|
|
/* Store version. */
|
|
|
|
|
*p++ = TAG_INTEGER;
|
|
|
|
|
*p++ = 1;
|
|
|
|
|
*p++ = 0;
|
|
|
|
|
/* Store object identifier sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, oidseqlen);
|
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_rsaEncryption));
|
|
|
|
|
memcpy (p, oid_rsaEncryption, DIM (oid_rsaEncryption));
|
|
|
|
|
p += DIM (oid_rsaEncryption);
|
|
|
|
|
*p++ = TAG_NULL;
|
|
|
|
|
*p++ = 0;
|
|
|
|
|
/* Start with the octet string. */
|
|
|
|
|
p = store_tag_length (p, TAG_OCTET_STRING, octstrlen);
|
|
|
|
|
}
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, inseqlen);
|
|
|
|
|
/* Store the key parameters. */
|
|
|
|
|
*p++ = TAG_INTEGER;
|
|
|
|
|
*p++ = 1;
|
|
|
|
|
*p++ = 0;
|
|
|
|
|
for (i=0; kparms[i]; i++)
|
|
|
|
|
{
|
|
|
|
|
n = 0;
|
|
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_STD, NULL, 0, &n, kparms[i]);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("oops: error formatting parameter: %s\n",
|
|
|
|
|
gpg_strerror (rc));
|
|
|
|
|
gcry_free (plain);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
p = store_tag_length (p, TAG_INTEGER, n);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
n = plain + needed - p;
|
|
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_STD, p, n, &n, kparms[i]);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("oops: error storing parameter: %s\n",
|
|
|
|
|
gpg_strerror (rc));
|
|
|
|
|
gcry_free (plain);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
p += n;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
plainlen = p - plain;
|
2020-07-08 14:40:34 +02:00
|
|
|
|
log_assert (needed == plainlen);
|
2014-06-03 18:57:33 +02:00
|
|
|
|
|
|
|
|
|
if (!mode)
|
|
|
|
|
{
|
|
|
|
|
/* Append some pad characters; we already allocated extra space. */
|
|
|
|
|
n = 8 - plainlen % 8;
|
|
|
|
|
for (i=0; i < n; i++, plainlen++)
|
|
|
|
|
*p++ = n;
|
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*r_length = plainlen;
|
|
|
|
|
return plain;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2020-04-27 16:53:30 +02:00
|
|
|
|
/* Build a DER encoded SEQUENCE for an ECC key:
|
|
|
|
|
*
|
|
|
|
|
* SEQUENCE { -- OneAsymmetricKey (RFC-5958)
|
|
|
|
|
* INTEGER 0
|
|
|
|
|
* SEQUENCE {
|
|
|
|
|
* OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
|
|
|
|
|
* OBJECT IDENTIFIER -- curvename
|
|
|
|
|
* }
|
|
|
|
|
* OCTET STRING, encapsulates {
|
|
|
|
|
* SEQUENCE { -- ECPrivateKey
|
|
|
|
|
* INTEGER 1 -- version
|
|
|
|
|
* OCTET STRING -- privateKey
|
|
|
|
|
* [1] {
|
|
|
|
|
* BIT STRING - publicKey
|
|
|
|
|
* }
|
|
|
|
|
* }
|
|
|
|
|
* }
|
|
|
|
|
* }
|
|
|
|
|
*
|
|
|
|
|
* For details see RFC-5480 and RFC-5915 (ECparameters are not created).
|
|
|
|
|
*
|
|
|
|
|
* KPARMS[0] := Opaque MPI with the curve name as dotted-decimal string.
|
2022-04-08 16:07:22 +02:00
|
|
|
|
* KPARMS[1] := Opaque MPI with the public key (q)
|
2020-04-27 16:53:30 +02:00
|
|
|
|
* KPARMS[2] := Opaque MPI with the private key (d)
|
|
|
|
|
* MODE controls what is being generated:
|
|
|
|
|
* 0 - As described above
|
|
|
|
|
* 1 - Ditto but without the extra padding needed for pcsk#12
|
|
|
|
|
* 2 - Only the octet string (ECPrivateKey)
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
static unsigned char *
|
|
|
|
|
build_ecc_key_sequence (gcry_mpi_t *kparms, int mode, size_t *r_length)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
unsigned int nbits, n;
|
|
|
|
|
const unsigned char *s;
|
|
|
|
|
char *p;
|
|
|
|
|
tlv_builder_t tb;
|
|
|
|
|
void *result;
|
|
|
|
|
size_t resultlen;
|
|
|
|
|
const char *curve;
|
|
|
|
|
unsigned int curvebits;
|
|
|
|
|
int e;
|
|
|
|
|
int i;
|
|
|
|
|
int strip_one;
|
|
|
|
|
|
|
|
|
|
for (i=0; kparms[i]; i++)
|
|
|
|
|
;
|
|
|
|
|
if (i != 3)
|
|
|
|
|
{
|
|
|
|
|
log_error ("%s: invalid number of parameters\n", __func__);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s = gcry_mpi_get_opaque (kparms[0], &nbits);
|
|
|
|
|
n = (nbits+7)/8;
|
|
|
|
|
p = xtrymalloc (n + 1);
|
|
|
|
|
if (!p)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
log_error ("%s:%d: error getting parameter: %s\n",
|
|
|
|
|
__func__, __LINE__, gpg_strerror (err));
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
memcpy (p, s, n);
|
|
|
|
|
p[n] = 0;
|
|
|
|
|
/* We need to use our OpenPGP mapping to turn a curve name into its
|
|
|
|
|
* canonical numerical OID. We should have a Libgcrypt function to
|
|
|
|
|
* do this; see bug report #4926. */
|
|
|
|
|
curve = openpgp_curve_to_oid (p, &curvebits, NULL);
|
|
|
|
|
xfree (p);
|
|
|
|
|
if (!curve)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error (GPG_ERR_UNKNOWN_CURVE);
|
|
|
|
|
log_error ("%s:%d: error getting parameter: %s\n",
|
|
|
|
|
__func__, __LINE__, gpg_strerror (err));
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Unfortunately the private key D may come with a single leading
|
|
|
|
|
* zero byte. This is becuase at some point it was treated as
|
|
|
|
|
* signed MPI and the code made sure that it is always interpreted
|
|
|
|
|
* as unsigned. Fortunately we got the size of the curve and can
|
|
|
|
|
* detect such a case reliable. */
|
|
|
|
|
s = gcry_mpi_get_opaque (kparms[2], &nbits);
|
|
|
|
|
n = (nbits+7)/8;
|
|
|
|
|
strip_one = (n == (curvebits+7)/8 + 1 && !*s);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tb = tlv_builder_new (1);
|
|
|
|
|
if (!tb)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
log_error ("%s:%d: error creating new TLV builder: %s\n",
|
|
|
|
|
__func__, __LINE__, gpg_strerror (err));
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
e = 0;
|
|
|
|
|
tlv_builder_add_tag (tb, 0, TAG_SEQUENCE);
|
|
|
|
|
tlv_builder_add_ptr (tb, 0, TAG_INTEGER, "\0", 1);
|
|
|
|
|
tlv_builder_add_tag (tb, 0, TAG_SEQUENCE);
|
|
|
|
|
e|= builder_add_oid (tb, 0, "1.2.840.10045.2.1");
|
|
|
|
|
e|= builder_add_oid (tb, 0, curve);
|
|
|
|
|
tlv_builder_add_end (tb);
|
|
|
|
|
tlv_builder_add_tag (tb, 0, TAG_OCTET_STRING);
|
|
|
|
|
tlv_builder_add_tag (tb, 0, TAG_SEQUENCE);
|
|
|
|
|
tlv_builder_add_ptr (tb, 0, TAG_INTEGER, "\x01", 1);
|
|
|
|
|
e|= builder_add_mpi (tb, 0, TAG_OCTET_STRING, kparms[2], strip_one);
|
|
|
|
|
tlv_builder_add_tag (tb, CLASS_CONTEXT, 1);
|
|
|
|
|
e|= builder_add_mpi (tb, 0, TAG_BIT_STRING, kparms[1], 0);
|
|
|
|
|
tlv_builder_add_end (tb);
|
|
|
|
|
tlv_builder_add_end (tb);
|
|
|
|
|
tlv_builder_add_end (tb);
|
|
|
|
|
tlv_builder_add_end (tb);
|
|
|
|
|
|
|
|
|
|
err = tlv_builder_finalize (tb, &result, &resultlen);
|
|
|
|
|
if (err || e)
|
|
|
|
|
{
|
|
|
|
|
if (!err)
|
|
|
|
|
err = gpg_error (GPG_ERR_GENERAL);
|
|
|
|
|
log_error ("%s:%d: tlv building failed: %s\n",
|
|
|
|
|
__func__, __LINE__, gpg_strerror (err));
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Append some pad characters if needed. */
|
|
|
|
|
if (!mode && (n = 8 - resultlen % 8))
|
|
|
|
|
{
|
|
|
|
|
p = xtrymalloc_secure (resultlen + n);
|
|
|
|
|
if (!p)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
log_error ("%s:%d: error allocating buffer: %s\n",
|
|
|
|
|
__func__, __LINE__, gpg_strerror (err));
|
|
|
|
|
xfree (result);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
memcpy (p, result, resultlen);
|
|
|
|
|
xfree (result);
|
|
|
|
|
result = p;
|
|
|
|
|
p = (unsigned char*)result + resultlen;
|
|
|
|
|
for (i=0; i < n; i++, resultlen++)
|
|
|
|
|
*p++ = n;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
*r_length = resultlen;
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
static unsigned char *
|
|
|
|
|
build_key_bag (unsigned char *buffer, size_t buflen, char *salt,
|
2006-07-24 13:20:33 +02:00
|
|
|
|
const unsigned char *sha1hash, const char *keyidstr,
|
2004-02-19 17:26:32 +01:00
|
|
|
|
size_t *r_length)
|
|
|
|
|
{
|
|
|
|
|
size_t len[11], needed;
|
|
|
|
|
unsigned char *p, *keybag;
|
|
|
|
|
size_t keybaglen;
|
|
|
|
|
|
|
|
|
|
/* Walk 11 steps down to collect the info: */
|
|
|
|
|
|
|
|
|
|
/* 10. The data goes into an octet string. */
|
|
|
|
|
needed = compute_tag_length (buflen);
|
|
|
|
|
needed += buflen;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 9. Prepend the algorithm identifier. */
|
|
|
|
|
needed += DIM (data_3desiter2048);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 8. Put a sequence around. */
|
|
|
|
|
len[8] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 7. Prepend a [0] tag. */
|
|
|
|
|
len[7] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* 6b. The attributes which are appended at the end. */
|
|
|
|
|
if (sha1hash)
|
|
|
|
|
needed += DIM (data_attrtemplate) + 20;
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 6. Prepend the shroudedKeyBag OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += 2 + DIM (oid_pkcs_12_pkcs_8ShroudedKeyBag);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 5+4. Put all into two sequences. */
|
|
|
|
|
len[5] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length ( needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
len[4] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 3. This all goes into an octet string. */
|
|
|
|
|
len[3] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 2. Prepend another [0] tag. */
|
|
|
|
|
len[2] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 1. Prepend the data OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += 2 + DIM (oid_data);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 0. Prepend another sequence. */
|
|
|
|
|
len[0] = needed;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Now that we have all length information, allocate a buffer. */
|
|
|
|
|
p = keybag = gcry_malloc (needed);
|
|
|
|
|
if (!keybag)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
|
|
|
|
log_error ("error allocating buffer\n");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* Walk 11 steps up to store the data. */
|
|
|
|
|
|
|
|
|
|
/* 0. Store the first sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[0]);
|
|
|
|
|
|
|
|
|
|
/* 1. Store the data OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_data));
|
2011-02-04 12:57:53 +01:00
|
|
|
|
memcpy (p, oid_data, DIM (oid_data));
|
|
|
|
|
p += DIM (oid_data);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 2. Store a [0] tag. */
|
|
|
|
|
p = store_tag_length (p, 0xa0, len[2]);
|
|
|
|
|
|
|
|
|
|
/* 3. And an octet string. */
|
|
|
|
|
p = store_tag_length (p, TAG_OCTET_STRING, len[3]);
|
|
|
|
|
|
|
|
|
|
/* 4+5. Two sequences. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[4]);
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[5]);
|
|
|
|
|
|
|
|
|
|
/* 6. Store the shroudedKeyBag OID. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID,
|
|
|
|
|
DIM (oid_pkcs_12_pkcs_8ShroudedKeyBag));
|
|
|
|
|
memcpy (p, oid_pkcs_12_pkcs_8ShroudedKeyBag,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
DIM (oid_pkcs_12_pkcs_8ShroudedKeyBag));
|
|
|
|
|
p += DIM (oid_pkcs_12_pkcs_8ShroudedKeyBag);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 7. Store a [0] tag. */
|
|
|
|
|
p = store_tag_length (p, 0xa0, len[7]);
|
|
|
|
|
|
|
|
|
|
/* 8. Store a sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[8]);
|
|
|
|
|
|
|
|
|
|
/* 9. Now for the pre-encoded algorithm identifier and the salt. */
|
|
|
|
|
memcpy (p, data_3desiter2048, DIM (data_3desiter2048));
|
|
|
|
|
memcpy (p + DATA_3DESITER2048_SALT_OFF, salt, 8);
|
|
|
|
|
p += DIM (data_3desiter2048);
|
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* 10. And the octet string with the encrypted data. */
|
2004-02-19 17:26:32 +01:00
|
|
|
|
p = store_tag_length (p, TAG_OCTET_STRING, buflen);
|
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
|
p += buflen;
|
2006-07-24 13:20:33 +02:00
|
|
|
|
|
|
|
|
|
/* Append the attributes whose length we calculated at step 2b. */
|
|
|
|
|
if (sha1hash)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
memcpy (p, data_attrtemplate, DIM (data_attrtemplate));
|
|
|
|
|
for (i=0; i < 8; i++)
|
|
|
|
|
p[DATA_ATTRTEMPLATE_KEYID_OFF+2*i+1] = keyidstr[i];
|
|
|
|
|
p += DIM (data_attrtemplate);
|
|
|
|
|
memcpy (p, sha1hash, 20);
|
|
|
|
|
p += 20;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
keybaglen = p - keybag;
|
|
|
|
|
if (needed != keybaglen)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_debug ("p12_parse: warning: length mismatch: %lu, %lu\n",
|
2005-06-29 16:12:18 +02:00
|
|
|
|
(unsigned long)needed, (unsigned long)keybaglen);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*r_length = keybaglen;
|
|
|
|
|
return keybag;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static unsigned char *
|
|
|
|
|
build_cert_bag (unsigned char *buffer, size_t buflen, char *salt,
|
|
|
|
|
size_t *r_length)
|
|
|
|
|
{
|
|
|
|
|
size_t len[9], needed;
|
|
|
|
|
unsigned char *p, *certbag;
|
|
|
|
|
size_t certbaglen;
|
|
|
|
|
|
|
|
|
|
/* Walk 9 steps down to collect the info: */
|
|
|
|
|
|
|
|
|
|
/* 8. The data goes into an octet string. */
|
|
|
|
|
needed = compute_tag_length (buflen);
|
|
|
|
|
needed += buflen;
|
|
|
|
|
|
|
|
|
|
/* 7. The algorithm identifier. */
|
|
|
|
|
needed += DIM (data_rc2iter2048);
|
|
|
|
|
|
|
|
|
|
/* 6. The data OID. */
|
|
|
|
|
needed += 2 + DIM (oid_data);
|
|
|
|
|
|
|
|
|
|
/* 5. A sequence. */
|
|
|
|
|
len[5] = needed;
|
|
|
|
|
needed += compute_tag_length ( needed);
|
|
|
|
|
|
|
|
|
|
/* 4. An integer. */
|
|
|
|
|
needed += 3;
|
|
|
|
|
|
|
|
|
|
/* 3. A sequence. */
|
|
|
|
|
len[3] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* 2. A [0] tag. */
|
|
|
|
|
len[2] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* 1. The encryptedData OID. */
|
|
|
|
|
needed += 2 + DIM (oid_encryptedData);
|
|
|
|
|
|
|
|
|
|
/* 0. The first sequence. */
|
|
|
|
|
len[0] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* Now that we have all length information, allocate a buffer. */
|
|
|
|
|
p = certbag = gcry_malloc (needed);
|
|
|
|
|
if (!certbag)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error allocating buffer\n");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Walk 9 steps up to store the data. */
|
|
|
|
|
|
|
|
|
|
/* 0. Store the first sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[0]);
|
|
|
|
|
|
|
|
|
|
/* 1. Store the encryptedData OID. */
|
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_encryptedData));
|
2011-02-04 12:57:53 +01:00
|
|
|
|
memcpy (p, oid_encryptedData, DIM (oid_encryptedData));
|
|
|
|
|
p += DIM (oid_encryptedData);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 2. Store a [0] tag. */
|
2005-09-09 15:48:48 +02:00
|
|
|
|
p = store_tag_length (p, 0xa0, len[2]);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 3. Store a sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[3]);
|
|
|
|
|
|
|
|
|
|
/* 4. Store the integer 0. */
|
|
|
|
|
*p++ = TAG_INTEGER;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
*p++ = 1;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*p++ = 0;
|
|
|
|
|
|
|
|
|
|
/* 5. Store a sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[5]);
|
|
|
|
|
|
|
|
|
|
/* 6. Store the data OID. */
|
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_data));
|
2011-02-04 12:57:53 +01:00
|
|
|
|
memcpy (p, oid_data, DIM (oid_data));
|
|
|
|
|
p += DIM (oid_data);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 7. Now for the pre-encoded algorithm identifier and the salt. */
|
|
|
|
|
memcpy (p, data_rc2iter2048, DIM (data_rc2iter2048));
|
|
|
|
|
memcpy (p + DATA_RC2ITER2048_SALT_OFF, salt, 8);
|
|
|
|
|
p += DIM (data_rc2iter2048);
|
|
|
|
|
|
|
|
|
|
/* 8. And finally the [0] tag with the encrypted data. */
|
2005-09-09 15:48:48 +02:00
|
|
|
|
p = store_tag_length (p, 0x80, buflen);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
|
p += buflen;
|
|
|
|
|
certbaglen = p - certbag;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (needed != certbaglen)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_debug ("p12_parse: warning: length mismatch: %lu, %lu\n",
|
2005-06-29 16:12:18 +02:00
|
|
|
|
(unsigned long)needed, (unsigned long)certbaglen);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
*r_length = certbaglen;
|
|
|
|
|
return certbag;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static unsigned char *
|
2011-02-04 12:57:53 +01:00
|
|
|
|
build_cert_sequence (const unsigned char *buffer, size_t buflen,
|
2006-07-24 13:20:33 +02:00
|
|
|
|
const unsigned char *sha1hash, const char *keyidstr,
|
|
|
|
|
size_t *r_length)
|
2004-02-19 17:26:32 +01:00
|
|
|
|
{
|
|
|
|
|
size_t len[8], needed, n;
|
|
|
|
|
unsigned char *p, *certseq;
|
|
|
|
|
size_t certseqlen;
|
2005-09-16 14:49:53 +02:00
|
|
|
|
int i;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
2020-07-08 14:40:34 +02:00
|
|
|
|
log_assert (strlen (keyidstr) == 8);
|
2006-07-24 13:20:33 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Walk 8 steps down to collect the info: */
|
|
|
|
|
|
|
|
|
|
/* 7. The data goes into an octet string. */
|
|
|
|
|
needed = compute_tag_length (buflen);
|
|
|
|
|
needed += buflen;
|
|
|
|
|
|
|
|
|
|
/* 6. A [0] tag. */
|
|
|
|
|
len[6] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* 5. An OID. */
|
|
|
|
|
needed += 2 + DIM (oid_x509Certificate_for_pkcs_12);
|
|
|
|
|
|
|
|
|
|
/* 4. A sequence. */
|
|
|
|
|
len[4] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* 3. A [0] tag. */
|
|
|
|
|
len[3] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* 2b. The attributes which are appended at the end. */
|
|
|
|
|
if (sha1hash)
|
|
|
|
|
needed += DIM (data_attrtemplate) + 20;
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* 2. An OID. */
|
|
|
|
|
needed += 2 + DIM (oid_pkcs_12_CertBag);
|
|
|
|
|
|
|
|
|
|
/* 1. A sequence. */
|
|
|
|
|
len[1] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* 0. The first sequence. */
|
|
|
|
|
len[0] = needed;
|
|
|
|
|
needed += compute_tag_length (needed);
|
|
|
|
|
|
|
|
|
|
/* Now that we have all length information, allocate a buffer. */
|
|
|
|
|
p = certseq = gcry_malloc (needed + 8 /*(for padding)*/);
|
|
|
|
|
if (!certseq)
|
|
|
|
|
{
|
|
|
|
|
log_error ("error allocating buffer\n");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Walk 8 steps up to store the data. */
|
|
|
|
|
|
|
|
|
|
/* 0. Store the first sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[0]);
|
|
|
|
|
|
|
|
|
|
/* 1. Store the second sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[1]);
|
|
|
|
|
|
|
|
|
|
/* 2. Store the pkcs12-cert-bag OID. */
|
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID, DIM (oid_pkcs_12_CertBag));
|
2011-02-04 12:57:53 +01:00
|
|
|
|
memcpy (p, oid_pkcs_12_CertBag, DIM (oid_pkcs_12_CertBag));
|
|
|
|
|
p += DIM (oid_pkcs_12_CertBag);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 3. Store a [0] tag. */
|
|
|
|
|
p = store_tag_length (p, 0xa0, len[3]);
|
|
|
|
|
|
|
|
|
|
/* 4. Store a sequence. */
|
|
|
|
|
p = store_tag_length (p, TAG_SEQUENCE, len[4]);
|
|
|
|
|
|
|
|
|
|
/* 5. Store the x509Certificate OID. */
|
|
|
|
|
p = store_tag_length (p, TAG_OBJECT_ID,
|
|
|
|
|
DIM (oid_x509Certificate_for_pkcs_12));
|
|
|
|
|
memcpy (p, oid_x509Certificate_for_pkcs_12,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
DIM (oid_x509Certificate_for_pkcs_12));
|
|
|
|
|
p += DIM (oid_x509Certificate_for_pkcs_12);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* 6. Store a [0] tag. */
|
|
|
|
|
p = store_tag_length (p, 0xa0, len[6]);
|
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* 7. And the octet string with the actual certificate. */
|
2004-02-19 17:26:32 +01:00
|
|
|
|
p = store_tag_length (p, TAG_OCTET_STRING, buflen);
|
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
|
p += buflen;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* Append the attributes whose length we calculated at step 2b. */
|
|
|
|
|
if (sha1hash)
|
|
|
|
|
{
|
|
|
|
|
memcpy (p, data_attrtemplate, DIM (data_attrtemplate));
|
|
|
|
|
for (i=0; i < 8; i++)
|
|
|
|
|
p[DATA_ATTRTEMPLATE_KEYID_OFF+2*i+1] = keyidstr[i];
|
|
|
|
|
p += DIM (data_attrtemplate);
|
|
|
|
|
memcpy (p, sha1hash, 20);
|
|
|
|
|
p += 20;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
certseqlen = p - certseq;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (needed != certseqlen)
|
2022-06-20 16:45:42 +02:00
|
|
|
|
log_debug ("p12_parse: warning: length mismatch: %lu, %lu\n",
|
2005-06-29 16:12:18 +02:00
|
|
|
|
(unsigned long)needed, (unsigned long)certseqlen);
|
2006-07-24 13:20:33 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Append some pad characters; we already allocated extra space. */
|
|
|
|
|
n = 8 - certseqlen % 8;
|
2005-09-16 14:49:53 +02:00
|
|
|
|
for (i=0; i < n; i++, certseqlen++)
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*p++ = n;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*r_length = certseqlen;
|
|
|
|
|
return certseq;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-03-20 11:00:55 +01:00
|
|
|
|
/* Expect the RSA key parameters in KPARMS and a password in PW.
|
|
|
|
|
Create a PKCS structure from it and return it as well as the length
|
|
|
|
|
in R_LENGTH; return NULL in case of an error. If CHARSET is not
|
|
|
|
|
NULL, re-encode PW to that character set. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
unsigned char *
|
2010-06-21 12:01:24 +02:00
|
|
|
|
p12_build (gcry_mpi_t *kparms, const void *cert, size_t certlen,
|
2007-03-20 11:00:55 +01:00
|
|
|
|
const char *pw, const char *charset, size_t *r_length)
|
2004-02-19 17:26:32 +01:00
|
|
|
|
{
|
2007-03-20 11:00:55 +01:00
|
|
|
|
unsigned char *buffer = NULL;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
size_t n, buflen;
|
|
|
|
|
char salt[8];
|
2005-09-09 13:18:08 +02:00
|
|
|
|
struct buffer_s seqlist[3];
|
2004-02-19 17:26:32 +01:00
|
|
|
|
int seqlistidx = 0;
|
2006-07-24 13:20:33 +02:00
|
|
|
|
unsigned char sha1hash[20];
|
|
|
|
|
char keyidstr[8+1];
|
2007-03-20 11:00:55 +01:00
|
|
|
|
char *pwbuf = NULL;
|
|
|
|
|
size_t pwbufsize = 0;
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
2005-06-16 10:12:03 +02:00
|
|
|
|
n = buflen = 0; /* (avoid compiler warning). */
|
2006-07-24 13:20:33 +02:00
|
|
|
|
memset (sha1hash, 0, 20);
|
|
|
|
|
*keyidstr = 0;
|
2005-06-16 10:12:03 +02:00
|
|
|
|
|
2007-03-20 11:00:55 +01:00
|
|
|
|
if (charset && pw && *pw)
|
|
|
|
|
{
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_t cd;
|
2007-03-20 11:00:55 +01:00
|
|
|
|
const char *inptr;
|
|
|
|
|
char *outptr;
|
|
|
|
|
size_t inbytes, outbytes;
|
|
|
|
|
|
|
|
|
|
/* We assume that the converted passphrase is at max 2 times
|
|
|
|
|
longer than its utf-8 encoding. */
|
|
|
|
|
pwbufsize = strlen (pw)*2 + 1;
|
|
|
|
|
pwbuf = gcry_malloc_secure (pwbufsize);
|
|
|
|
|
if (!pwbuf)
|
|
|
|
|
{
|
|
|
|
|
log_error ("out of secure memory while converting passphrase\n");
|
|
|
|
|
goto failure;
|
|
|
|
|
}
|
|
|
|
|
|
2007-06-14 19:05:07 +02:00
|
|
|
|
cd = jnlib_iconv_open (charset, "utf-8");
|
|
|
|
|
if (cd == (jnlib_iconv_t)(-1))
|
2007-03-20 11:00:55 +01:00
|
|
|
|
{
|
|
|
|
|
log_error ("can't convert passphrase to"
|
2012-06-05 19:29:22 +02:00
|
|
|
|
" requested charset '%s': %s\n",
|
2007-03-20 11:00:55 +01:00
|
|
|
|
charset, strerror (errno));
|
|
|
|
|
goto failure;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
inptr = pw;
|
|
|
|
|
inbytes = strlen (pw);
|
|
|
|
|
outptr = pwbuf;
|
|
|
|
|
outbytes = pwbufsize - 1;
|
2007-06-14 19:05:07 +02:00
|
|
|
|
if ( jnlib_iconv (cd, (const char **)&inptr, &inbytes,
|
2011-02-04 12:57:53 +01:00
|
|
|
|
&outptr, &outbytes) == (size_t)-1)
|
2007-03-20 11:00:55 +01:00
|
|
|
|
{
|
|
|
|
|
log_error ("error converting passphrase to"
|
2012-06-05 19:29:22 +02:00
|
|
|
|
" requested charset '%s': %s\n",
|
2007-03-20 11:00:55 +01:00
|
|
|
|
charset, strerror (errno));
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_close (cd);
|
2007-03-20 11:00:55 +01:00
|
|
|
|
goto failure;
|
|
|
|
|
}
|
|
|
|
|
*outptr = 0;
|
2007-06-14 19:05:07 +02:00
|
|
|
|
jnlib_iconv_close (cd);
|
2007-03-20 11:00:55 +01:00
|
|
|
|
pw = pwbuf;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (cert && certlen)
|
|
|
|
|
{
|
2006-07-24 13:20:33 +02:00
|
|
|
|
/* Calculate the hash value we need for the bag attributes. */
|
|
|
|
|
gcry_md_hash_buffer (GCRY_MD_SHA1, sha1hash, cert, certlen);
|
|
|
|
|
sprintf (keyidstr, "%02x%02x%02x%02x",
|
|
|
|
|
sha1hash[16], sha1hash[17], sha1hash[18], sha1hash[19]);
|
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Encode the certificate. */
|
2006-07-24 13:20:33 +02:00
|
|
|
|
buffer = build_cert_sequence (cert, certlen, sha1hash, keyidstr,
|
|
|
|
|
&buflen);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (!buffer)
|
|
|
|
|
goto failure;
|
|
|
|
|
|
|
|
|
|
/* Encrypt it. */
|
|
|
|
|
gcry_randomize (salt, 8, GCRY_STRONG_RANDOM);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
crypt_block (buffer, buflen, salt, 8, 2048, NULL, 0, pw,
|
2005-12-16 16:52:48 +01:00
|
|
|
|
GCRY_CIPHER_RFC2268_40, 1);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Encode the encrypted stuff into a bag. */
|
|
|
|
|
seqlist[seqlistidx].buffer = build_cert_bag (buffer, buflen, salt, &n);
|
|
|
|
|
seqlist[seqlistidx].length = n;
|
|
|
|
|
gcry_free (buffer);
|
|
|
|
|
buffer = NULL;
|
|
|
|
|
if (!seqlist[seqlistidx].buffer)
|
|
|
|
|
goto failure;
|
|
|
|
|
seqlistidx++;
|
|
|
|
|
}
|
|
|
|
|
|
2006-07-24 13:20:33 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (kparms)
|
|
|
|
|
{
|
|
|
|
|
/* Encode the key. */
|
2020-04-27 16:53:30 +02:00
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
/* Right, that is a stupid way to distinguish ECC from RSA. */
|
|
|
|
|
for (i=0; kparms[i]; i++)
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
if (i == 3 && gcry_mpi_get_flag (kparms[0], GCRYMPI_FLAG_OPAQUE))
|
|
|
|
|
buffer = build_ecc_key_sequence (kparms, 0, &buflen);
|
|
|
|
|
else
|
|
|
|
|
buffer = build_rsa_key_sequence (kparms, 0, &buflen);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
if (!buffer)
|
|
|
|
|
goto failure;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
/* Encrypt it. */
|
|
|
|
|
gcry_randomize (salt, 8, GCRY_STRONG_RANDOM);
|
2011-03-10 15:27:10 +01:00
|
|
|
|
crypt_block (buffer, buflen, salt, 8, 2048, NULL, 0,
|
|
|
|
|
pw, GCRY_CIPHER_3DES, 1);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
|
|
|
|
|
/* Encode the encrypted stuff into a bag. */
|
2006-07-24 13:20:33 +02:00
|
|
|
|
if (cert && certlen)
|
2011-02-04 12:57:53 +01:00
|
|
|
|
seqlist[seqlistidx].buffer = build_key_bag (buffer, buflen, salt,
|
2006-07-24 13:20:33 +02:00
|
|
|
|
sha1hash, keyidstr, &n);
|
|
|
|
|
else
|
|
|
|
|
seqlist[seqlistidx].buffer = build_key_bag (buffer, buflen, salt,
|
|
|
|
|
NULL, NULL, &n);
|
2004-02-19 17:26:32 +01:00
|
|
|
|
seqlist[seqlistidx].length = n;
|
|
|
|
|
gcry_free (buffer);
|
|
|
|
|
buffer = NULL;
|
|
|
|
|
if (!seqlist[seqlistidx].buffer)
|
|
|
|
|
goto failure;
|
|
|
|
|
seqlistidx++;
|
|
|
|
|
}
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
seqlist[seqlistidx].buffer = NULL;
|
|
|
|
|
seqlist[seqlistidx].length = 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2006-06-20 17:48:09 +02:00
|
|
|
|
buffer = create_final (seqlist, pw, &buflen);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
failure:
|
2007-03-20 11:00:55 +01:00
|
|
|
|
if (pwbuf)
|
|
|
|
|
{
|
2015-01-26 17:56:52 +01:00
|
|
|
|
/* Note that wipememory is not really needed due to the use of
|
|
|
|
|
gcry_malloc_secure. */
|
2007-03-20 11:00:55 +01:00
|
|
|
|
wipememory (pwbuf, pwbufsize);
|
|
|
|
|
gcry_free (pwbuf);
|
|
|
|
|
}
|
2004-02-19 17:26:32 +01:00
|
|
|
|
for ( ; seqlistidx; seqlistidx--)
|
|
|
|
|
gcry_free (seqlist[seqlistidx].buffer);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-02-19 17:26:32 +01:00
|
|
|
|
*r_length = buffer? buflen : 0;
|
|
|
|
|
return buffer;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-06-20 16:45:42 +02:00
|
|
|
|
/* This is actually not a PKCS#12 function but one which creates an
|
|
|
|
|
* unencrypted PKCS#1 private key. */
|
2014-06-03 18:57:33 +02:00
|
|
|
|
unsigned char *
|
|
|
|
|
p12_raw_build (gcry_mpi_t *kparms, int rawmode, size_t *r_length)
|
|
|
|
|
{
|
|
|
|
|
unsigned char *buffer;
|
|
|
|
|
size_t buflen;
|
2020-04-27 16:53:30 +02:00
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
log_assert (rawmode == 1 || rawmode == 2);
|
|
|
|
|
|
|
|
|
|
/* Right, that is a stupid way to distinguish ECC from RSA. */
|
|
|
|
|
for (i=0; kparms[i]; i++)
|
|
|
|
|
;
|
2014-06-03 18:57:33 +02:00
|
|
|
|
|
2020-04-27 16:53:30 +02:00
|
|
|
|
if (gcry_mpi_get_flag (kparms[0], GCRYMPI_FLAG_OPAQUE))
|
|
|
|
|
buffer = build_ecc_key_sequence (kparms, rawmode, &buflen);
|
|
|
|
|
else
|
|
|
|
|
buffer = build_rsa_key_sequence (kparms, rawmode, &buflen);
|
2014-06-03 18:57:33 +02:00
|
|
|
|
if (!buffer)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
*r_length = buflen;
|
|
|
|
|
return buffer;
|
|
|
|
|
}
|