RetroZilla/security/nss/lib/crmf/challcli.c
2018-05-19 22:01:21 +08:00

243 lines
7.0 KiB
C

/* -*- Mode: C; tab-width: 8 -*-*/
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "cmmf.h"
#include "cmmfi.h"
#include "secitem.h"
#include "pk11func.h"
#include "secder.h"
#include "sechash.h"
CMMFPOPODecKeyChallContent*
CMMF_CreatePOPODecKeyChallContentFromDER(const char *buf, long len)
{
PLArenaPool *poolp;
CMMFPOPODecKeyChallContent *challContent;
SECStatus rv;
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
if (poolp == NULL) {
return NULL;
}
challContent = PORT_ArenaZNew(poolp, CMMFPOPODecKeyChallContent);
if (challContent == NULL) {
goto loser;
}
challContent->poolp = poolp;
rv = SEC_ASN1Decode(poolp, challContent,
CMMFPOPODecKeyChallContentTemplate, buf, len);
if (rv != SECSuccess) {
goto loser;
}
if (challContent->challenges) {
while (challContent->challenges[challContent->numChallenges] != NULL) {
challContent->numChallenges++;
}
challContent->numAllocated = challContent->numChallenges;
}
return challContent;
loser:
if (poolp != NULL) {
PORT_FreeArena(poolp, PR_FALSE);
}
return NULL;
}
int
CMMF_POPODecKeyChallContentGetNumChallenges
(CMMFPOPODecKeyChallContent *inKeyChallCont)
{
PORT_Assert(inKeyChallCont != NULL);
if (inKeyChallCont == NULL) {
return 0;
}
return inKeyChallCont->numChallenges;
}
SECItem*
CMMF_POPODecKeyChallContentGetPublicValue
(CMMFPOPODecKeyChallContent *inKeyChallCont,
int inIndex)
{
PORT_Assert(inKeyChallCont != NULL);
if (inKeyChallCont == NULL || (inIndex > inKeyChallCont->numChallenges-1)||
inIndex < 0) {
return NULL;
}
return SECITEM_DupItem(&inKeyChallCont->challenges[inIndex]->key);
}
static SECAlgorithmID*
cmmf_get_owf(CMMFPOPODecKeyChallContent *inChalCont,
int inIndex)
{
int i;
for (i=inIndex; i >= 0; i--) {
if (inChalCont->challenges[i]->owf != NULL) {
return inChalCont->challenges[i]->owf;
}
}
return NULL;
}
SECStatus
CMMF_POPODecKeyChallContDecryptChallenge(CMMFPOPODecKeyChallContent *inChalCont,
int inIndex,
SECKEYPrivateKey *inPrivKey)
{
CMMFChallenge *challenge;
SECItem *decryptedRand=NULL;
PLArenaPool *poolp = NULL;
SECAlgorithmID *owf;
SECStatus rv = SECFailure;
SECOidTag tag;
CMMFRand randStr;
SECItem hashItem;
unsigned char hash[HASH_LENGTH_MAX];
PORT_Assert(inChalCont != NULL && inPrivKey != NULL);
if (inChalCont == NULL || inIndex <0 || inIndex > inChalCont->numChallenges
|| inPrivKey == NULL){
return SECFailure;
}
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
if (poolp == NULL) {
goto loser;
}
challenge = inChalCont->challenges[inIndex];
decryptedRand = SECITEM_AllocItem(poolp, NULL, challenge->challenge.len);
if (decryptedRand == NULL) {
goto loser;
}
rv = PK11_PrivDecryptPKCS1(inPrivKey, decryptedRand->data,
&decryptedRand->len, decryptedRand->len,
challenge->challenge.data, challenge->challenge.len);
if (rv != SECSuccess) {
goto loser;
}
rv = SEC_ASN1DecodeItem(poolp, &randStr, CMMFRandTemplate,
decryptedRand);
if (rv != SECSuccess) {
goto loser;
}
rv = SECFailure; /* Just so that when we do go to loser,
* I won't have to set it again.
*/
owf = cmmf_get_owf(inChalCont, inIndex);
if (owf == NULL) {
/* No hashing algorithm came with the challenges. Can't verify */
goto loser;
}
/* Verify the hashes in the challenge */
tag = SECOID_FindOIDTag(&owf->algorithm);
hashItem.len = HASH_ResultLenByOidTag(tag);
if (!hashItem.len)
goto loser; /* error code has been set */
rv = PK11_HashBuf(tag, hash, randStr.integer.data, randStr.integer.len);
if (rv != SECSuccess) {
goto loser;
}
hashItem.data = hash;
if (SECITEM_CompareItem(&hashItem, &challenge->witness) != SECEqual) {
/* The hash for the data we decrypted doesn't match the hash provided
* in the challenge. Bail out.
*/
PORT_SetError(SEC_ERROR_BAD_DATA);
rv = SECFailure;
goto loser;
}
rv = PK11_HashBuf(tag, hash, challenge->senderDER.data,
challenge->senderDER.len);
if (rv != SECSuccess) {
goto loser;
}
if (SECITEM_CompareItem(&hashItem, &randStr.senderHash) != SECEqual) {
/* The hash for the data we decrypted doesn't match the hash provided
* in the challenge. Bail out.
*/
PORT_SetError(SEC_ERROR_BAD_DATA);
rv = SECFailure;
goto loser;
}
/* All of the hashes have verified, so we can now store the integer away.*/
rv = SECITEM_CopyItem(inChalCont->poolp, &challenge->randomNumber,
&randStr.integer);
loser:
if (poolp) {
PORT_FreeArena(poolp, PR_FALSE);
}
return rv;
}
SECStatus
CMMF_POPODecKeyChallContentGetRandomNumber
(CMMFPOPODecKeyChallContent *inKeyChallCont,
int inIndex,
long *inDest)
{
CMMFChallenge *challenge;
PORT_Assert(inKeyChallCont != NULL);
if (inKeyChallCont == NULL || inIndex > 0 || inIndex >=
inKeyChallCont->numChallenges) {
return SECFailure;
}
challenge = inKeyChallCont->challenges[inIndex];
if (challenge->randomNumber.data == NULL) {
/* There is no random number here, nothing to see. */
return SECFailure;
}
*inDest = DER_GetInteger(&challenge->randomNumber);
return (*inDest == -1) ? SECFailure : SECSuccess;
}
SECStatus
CMMF_EncodePOPODecKeyRespContent(long *inDecodedRand,
int inNumRand,
CRMFEncoderOutputCallback inCallback,
void *inArg)
{
PLArenaPool *poolp;
CMMFPOPODecKeyRespContent *response;
SECItem *currItem;
SECStatus rv=SECFailure;
int i;
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
if (poolp == NULL) {
return SECFailure;
}
response = PORT_ArenaZNew(poolp, CMMFPOPODecKeyRespContent);
if (response == NULL) {
goto loser;
}
response->responses = PORT_ArenaZNewArray(poolp, SECItem*, inNumRand+1);
if (response->responses == NULL) {
goto loser;
}
for (i=0; i<inNumRand; i++) {
currItem = response->responses[i] = PORT_ArenaZNew(poolp,SECItem);
if (currItem == NULL) {
goto loser;
}
currItem = SEC_ASN1EncodeInteger(poolp, currItem, inDecodedRand[i]);
if (currItem == NULL) {
goto loser;
}
}
rv = cmmf_user_encode(response, inCallback, inArg,
CMMFPOPODecKeyRespContentTemplate);
loser:
if (poolp != NULL) {
PORT_FreeArena(poolp, PR_FALSE);
}
return rv;
}