edhoc 1.4.0 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.clang-format +79 -0
- package/README.md +6 -5
- package/dist/cbor-utils.d.ts +30 -0
- package/dist/cbor-utils.d.ts.map +1 -0
- package/dist/cbor-utils.js +179 -0
- package/dist/cipher-suites.d.ts +13 -0
- package/dist/cipher-suites.d.ts.map +1 -0
- package/dist/cipher-suites.js +22 -0
- package/dist/edhoc.d.ts +84 -283
- package/dist/edhoc.d.ts.map +1 -1
- package/dist/edhoc.js +562 -34
- package/package.json +5 -19
- package/.gitmodules +0 -3
- package/binding.gyp +0 -66
- package/dist/bindings.d.ts +0 -5
- package/dist/bindings.d.ts.map +0 -1
- package/dist/bindings.js +0 -10
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +0 -102
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +0 -37
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +0 -38
- package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +0 -180
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +0 -216
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +0 -217
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +0 -54
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +0 -54
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +0 -71
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +0 -40
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +0 -16
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +0 -17
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +0 -70
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +0 -42
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/unity_config.h +0 -251
- package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +0 -44
- package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +0 -129
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +0 -310
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +0 -95
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +0 -51
- package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +0 -20
- package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +0 -40
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +0 -246
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +0 -33
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +0 -203
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +0 -61
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +0 -326
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +0 -50
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +0 -57
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +0 -17
- package/external/libedhoc/externals/Unity/src/unity.c +0 -2501
- package/external/libedhoc/externals/Unity/src/unity.h +0 -698
- package/external/libedhoc/externals/Unity/src/unity_internals.h +0 -1183
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +0 -61
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +0 -57
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +0 -55
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +0 -15
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +0 -80
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +0 -76
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +0 -75
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +0 -13
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +0 -77
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +0 -90
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +0 -58
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +0 -71
- package/external/libedhoc/externals/Unity/test/testdata/CException.h +0 -18
- package/external/libedhoc/externals/Unity/test/testdata/Defs.h +0 -16
- package/external/libedhoc/externals/Unity/test/testdata/cmock.h +0 -21
- package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +0 -20
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +0 -204
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +0 -73
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +0 -200
- package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +0 -151
- package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +0 -2941
- package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +0 -375
- package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +0 -1285
- package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +0 -1395
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +0 -2863
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +0 -783
- package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +0 -82
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +0 -309
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +0 -28
- package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +0 -330
- package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +0 -21
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +0 -126
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +0 -49
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +0 -323
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +0 -84
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +0 -171
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +0 -53
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +0 -330
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +0 -98
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +0 -226
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +0 -81
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +0 -230
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +0 -54
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +0 -46
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +0 -110
- package/external/libedhoc/externals/compact25519/src/compact_wipe.c +0 -12
- package/external/libedhoc/externals/compact25519/src/compact_wipe.h +0 -14
- package/external/libedhoc/externals/compact25519/src/compact_x25519.c +0 -68
- package/external/libedhoc/externals/compact25519/src/compact_x25519.h +0 -101
- package/external/libedhoc/externals/compact25519/test/pcg_random.h +0 -25
- package/external/libedhoc/externals/compact25519/test/run-all.c +0 -178
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +0 -234
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +0 -124
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +0 -280
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +0 -29
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +0 -204
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +0 -16
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +0 -46
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +0 -34
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +0 -57
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +0 -61
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +0 -5
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +0 -36
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +0 -31
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +0 -190
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +0 -760
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +0 -50
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +0 -413
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +0 -100
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +0 -805
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +0 -186
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +0 -1514
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +0 -135
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +0 -312
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +0 -219
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +0 -92
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +0 -83
- package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +0 -73
- package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +0 -106
- package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +0 -77
- package/external/libedhoc/externals/mbedtls/configs/config-thread.h +0 -76
- package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +0 -25
- package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +0 -136
- package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +0 -609
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +0 -54
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +0 -30
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +0 -19
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +0 -27
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +0 -37
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +0 -32
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +0 -31
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +0 -627
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +0 -341
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +0 -641
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +0 -389
- package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +0 -82
- package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +0 -1084
- package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +0 -146
- package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +0 -303
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +0 -518
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +0 -202
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +0 -342
- package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +0 -1206
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +0 -1183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +0 -246
- package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +0 -46
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +0 -183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +0 -877
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +0 -334
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +0 -76
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +0 -25
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +0 -55
- package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +0 -36
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +0 -564
- package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +0 -308
- package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +0 -385
- package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +0 -972
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +0 -441
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +0 -671
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +0 -298
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +0 -1362
- package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +0 -273
- package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +0 -370
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +0 -124
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +0 -434
- package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +0 -440
- package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +0 -4116
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +0 -640
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +0 -190
- package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +0 -299
- package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +0 -166
- package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +0 -722
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +0 -160
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +0 -1091
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +0 -186
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +0 -197
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +0 -241
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +0 -485
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +0 -79
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +0 -168
- package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +0 -104
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +0 -136
- package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +0 -1143
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +0 -219
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +0 -198
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +0 -172
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +0 -208
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +0 -5369
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +0 -187
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +0 -616
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +0 -106
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +0 -181
- package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +0 -94
- package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +0 -78
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +0 -550
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +0 -184
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +0 -1196
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +0 -319
- package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +0 -4685
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +0 -21
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +0 -91
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +0 -45
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +0 -210
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +0 -118
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +0 -114
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +0 -44
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +0 -151
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +0 -52
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +0 -2064
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +0 -88
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +0 -92
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +0 -1383
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +0 -1282
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +0 -460
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +0 -453
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +0 -2756
- package/external/libedhoc/externals/mbedtls/library/aes.c +0 -2315
- package/external/libedhoc/externals/mbedtls/library/aesce.c +0 -503
- package/external/libedhoc/externals/mbedtls/library/aesce.h +0 -121
- package/external/libedhoc/externals/mbedtls/library/aesni.c +0 -802
- package/external/libedhoc/externals/mbedtls/library/aesni.h +0 -158
- package/external/libedhoc/externals/mbedtls/library/alignment.h +0 -509
- package/external/libedhoc/externals/mbedtls/library/aria.c +0 -991
- package/external/libedhoc/externals/mbedtls/library/asn1parse.c +0 -467
- package/external/libedhoc/externals/mbedtls/library/asn1write.c +0 -436
- package/external/libedhoc/externals/mbedtls/library/base64.c +0 -299
- package/external/libedhoc/externals/mbedtls/library/base64_internal.h +0 -45
- package/external/libedhoc/externals/mbedtls/library/bignum.c +0 -2806
- package/external/libedhoc/externals/mbedtls/library/bignum_core.c +0 -894
- package/external/libedhoc/externals/mbedtls/library/bignum_core.h +0 -763
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +0 -394
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +0 -452
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +0 -276
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +0 -416
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +0 -34
- package/external/libedhoc/externals/mbedtls/library/bn_mul.h +0 -1094
- package/external/libedhoc/externals/mbedtls/library/camellia.c +0 -1044
- package/external/libedhoc/externals/mbedtls/library/ccm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/chacha20.c +0 -497
- package/external/libedhoc/externals/mbedtls/library/chachapoly.c +0 -478
- package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +0 -141
- package/external/libedhoc/externals/mbedtls/library/cipher.c +0 -1664
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +0 -2422
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/cmac.c +0 -1067
- package/external/libedhoc/externals/mbedtls/library/common.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/constant_time.c +0 -261
- package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +0 -554
- package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +0 -579
- package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +0 -881
- package/external/libedhoc/externals/mbedtls/library/debug.c +0 -465
- package/external/libedhoc/externals/mbedtls/library/des.c +0 -1042
- package/external/libedhoc/externals/mbedtls/library/dhm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/ecdh.c +0 -685
- package/external/libedhoc/externals/mbedtls/library/ecdsa.c +0 -867
- package/external/libedhoc/externals/mbedtls/library/ecjpake.c +0 -1216
- package/external/libedhoc/externals/mbedtls/library/ecp.c +0 -3631
- package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +0 -5467
- package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +0 -6043
- package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +0 -287
- package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/entropy.c +0 -676
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +0 -229
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +0 -64
- package/external/libedhoc/externals/mbedtls/library/error.c +0 -878
- package/external/libedhoc/externals/mbedtls/library/gcm.c +0 -1168
- package/external/libedhoc/externals/mbedtls/library/hkdf.c +0 -161
- package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +0 -633
- package/external/libedhoc/externals/mbedtls/library/lmots.c +0 -821
- package/external/libedhoc/externals/mbedtls/library/lmots.h +0 -311
- package/external/libedhoc/externals/mbedtls/library/lms.c +0 -779
- package/external/libedhoc/externals/mbedtls/library/md.c +0 -1108
- package/external/libedhoc/externals/mbedtls/library/md5.c +0 -426
- package/external/libedhoc/externals/mbedtls/library/md_psa.h +0 -63
- package/external/libedhoc/externals/mbedtls/library/md_wrap.h +0 -46
- package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +0 -745
- package/external/libedhoc/externals/mbedtls/library/mps_common.h +0 -181
- package/external/libedhoc/externals/mbedtls/library/mps_error.h +0 -89
- package/external/libedhoc/externals/mbedtls/library/mps_reader.c +0 -538
- package/external/libedhoc/externals/mbedtls/library/mps_reader.h +0 -366
- package/external/libedhoc/externals/mbedtls/library/mps_trace.c +0 -112
- package/external/libedhoc/externals/mbedtls/library/mps_trace.h +0 -154
- package/external/libedhoc/externals/mbedtls/library/net_sockets.c +0 -696
- package/external/libedhoc/externals/mbedtls/library/nist_kw.c +0 -725
- package/external/libedhoc/externals/mbedtls/library/oid.c +0 -1154
- package/external/libedhoc/externals/mbedtls/library/padlock.c +0 -155
- package/external/libedhoc/externals/mbedtls/library/padlock.h +0 -111
- package/external/libedhoc/externals/mbedtls/library/pem.c +0 -520
- package/external/libedhoc/externals/mbedtls/library/pk.c +0 -970
- package/external/libedhoc/externals/mbedtls/library/pk_internal.h +0 -118
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +0 -1834
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +0 -156
- package/external/libedhoc/externals/mbedtls/library/pkcs12.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/pkcs5.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/pkcs7.c +0 -773
- package/external/libedhoc/externals/mbedtls/library/pkparse.c +0 -1845
- package/external/libedhoc/externals/mbedtls/library/pkwrite.c +0 -836
- package/external/libedhoc/externals/mbedtls/library/pkwrite.h +0 -112
- package/external/libedhoc/externals/mbedtls/library/platform.c +0 -402
- package/external/libedhoc/externals/mbedtls/library/platform_util.c +0 -285
- package/external/libedhoc/externals/mbedtls/library/poly1305.c +0 -492
- package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +0 -8432
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +0 -653
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +0 -499
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +0 -590
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +0 -293
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +0 -67
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +0 -838
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +0 -52
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +0 -2871
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +0 -256
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +0 -31
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +0 -561
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +0 -267
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +0 -295
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +0 -470
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +0 -211
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +0 -70
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +0 -131
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +0 -264
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +0 -571
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +0 -159
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +0 -192
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +0 -727
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +0 -317
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +0 -373
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +0 -185
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +0 -559
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +0 -213
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +0 -481
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +0 -384
- package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +0 -259
- package/external/libedhoc/externals/mbedtls/library/psa_util.c +0 -160
- package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +0 -96
- package/external/libedhoc/externals/mbedtls/library/ripemd160.c +0 -490
- package/external/libedhoc/externals/mbedtls/library/rsa.c +0 -2640
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +0 -208
- package/external/libedhoc/externals/mbedtls/library/sha1.c +0 -480
- package/external/libedhoc/externals/mbedtls/library/sha256.c +0 -946
- package/external/libedhoc/externals/mbedtls/library/sha3.c +0 -626
- package/external/libedhoc/externals/mbedtls/library/sha512.c +0 -1111
- package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +0 -410
- package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +0 -2050
- package/external/libedhoc/externals/mbedtls/library/ssl_client.c +0 -1017
- package/external/libedhoc/externals/mbedtls/library/ssl_client.h +0 -22
- package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +0 -380
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +0 -78
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +0 -234
- package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +0 -2847
- package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +0 -6155
- package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +0 -540
- package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +0 -9577
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +0 -3607
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +0 -4403
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +0 -3046
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +0 -1740
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +0 -23
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +0 -1897
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +0 -651
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +0 -3146
- package/external/libedhoc/externals/mbedtls/library/threading.c +0 -181
- package/external/libedhoc/externals/mbedtls/library/timing.c +0 -154
- package/external/libedhoc/externals/mbedtls/library/version.c +0 -32
- package/external/libedhoc/externals/mbedtls/library/version_features.c +0 -826
- package/external/libedhoc/externals/mbedtls/library/x509.c +0 -1776
- package/external/libedhoc/externals/mbedtls/library/x509_create.c +0 -557
- package/external/libedhoc/externals/mbedtls/library/x509_crl.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/x509_crt.c +0 -3292
- package/external/libedhoc/externals/mbedtls/library/x509_csr.c +0 -574
- package/external/libedhoc/externals/mbedtls/library/x509write.c +0 -174
- package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +0 -681
- package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +0 -331
- package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +0 -573
- package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +0 -259
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +0 -105
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +0 -25
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +0 -195
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +0 -138
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +0 -183
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +0 -20
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +0 -106
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +0 -86
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +0 -218
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +0 -69
- package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +0 -209
- package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +0 -45
- package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +0 -296
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +0 -189
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +0 -217
- package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +0 -419
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +0 -316
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +0 -435
- package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +0 -84
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +0 -153
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +0 -154
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +0 -128
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +0 -172
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +0 -149
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +0 -141
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +0 -131
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +0 -281
- package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +0 -321
- package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +0 -159
- package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +0 -691
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +0 -310
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +0 -474
- package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +0 -75
- package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +0 -107
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +0 -342
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +0 -408
- package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +0 -288
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +0 -3118
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +0 -1009
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +0 -381
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +0 -804
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +0 -489
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +0 -362
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +0 -4268
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +0 -375
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +0 -601
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +0 -306
- package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +0 -1284
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +0 -27
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +0 -92
- package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +0 -66
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +0 -5137
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +0 -34
- package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +0 -29
- package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +0 -583
- package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +0 -967
- package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +0 -72
- package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +0 -265
- package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +0 -61
- package/external/libedhoc/externals/mbedtls/programs/wince_main.c +0 -31
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +0 -456
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +0 -509
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +0 -1012
- package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +0 -165
- package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +0 -31
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +0 -89
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +0 -17
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +0 -23
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +0 -18
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +0 -14
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +0 -19
- package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +0 -7
- package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +0 -6
- package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +0 -131
- package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +0 -26
- package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +0 -38
- package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +0 -106
- package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +0 -234
- package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +0 -71
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +0 -121
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +0 -67
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +0 -130
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +0 -44
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +0 -430
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +0 -64
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +0 -62
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +0 -123
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +0 -125
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +0 -75
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +0 -112
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +0 -32
- package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +0 -40
- package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +0 -268
- package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +0 -250
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +0 -398
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +0 -223
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +0 -24
- package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +0 -91
- package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +0 -628
- package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +0 -62
- package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +0 -145
- package/external/libedhoc/externals/mbedtls/tests/src/certs.c +0 -480
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +0 -199
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +0 -78
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +0 -462
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +0 -151
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +0 -424
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +0 -147
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +0 -783
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +0 -422
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +0 -202
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +0 -405
- package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +0 -45
- package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +0 -353
- package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +0 -196
- package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +0 -989
- package/external/libedhoc/externals/mbedtls/tests/src/random.c +0 -136
- package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +0 -1226
- package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +0 -2292
- package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +0 -210
- package/external/libedhoc/externals/zcbor/include/zcbor_common.h +0 -509
- package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +0 -447
- package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +0 -240
- package/external/libedhoc/externals/zcbor/include/zcbor_print.h +0 -165
- package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +0 -94
- package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +0 -41
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +0 -47
- package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +0 -128
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +0 -60
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +0 -61
- package/external/libedhoc/externals/zcbor/src/zcbor_common.c +0 -430
- package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +0 -1567
- package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +0 -609
- package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +0 -367
- package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +0 -189
- package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +0 -528
- package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +0 -2154
- package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +0 -134
- package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -862
- package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +0 -363
- package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +0 -453
- package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +0 -122
- package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +0 -1554
- package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +0 -65
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +0 -136
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +0 -60
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +0 -5
- package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +0 -1437
- package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +0 -203
- package/external/libedhoc/include/edhoc.h +0 -687
- package/external/libedhoc/include/edhoc_common.h +0 -289
- package/external/libedhoc/include/edhoc_context.h +0 -343
- package/external/libedhoc/include/edhoc_credentials.h +0 -265
- package/external/libedhoc/include/edhoc_crypto.h +0 -331
- package/external/libedhoc/include/edhoc_ead.h +0 -102
- package/external/libedhoc/include/edhoc_macros.h +0 -60
- package/external/libedhoc/include/edhoc_values.h +0 -181
- package/external/libedhoc/library/edhoc.c +0 -253
- package/external/libedhoc/library/edhoc_common.c +0 -1314
- package/external/libedhoc/library/edhoc_exporter.c +0 -542
- package/external/libedhoc/library/edhoc_message_1.c +0 -474
- package/external/libedhoc/library/edhoc_message_2.c +0 -1697
- package/external/libedhoc/library/edhoc_message_3.c +0 -1467
- package/external/libedhoc/library/edhoc_message_4.c +0 -828
- package/external/libedhoc/library/edhoc_message_error.c +0 -238
- package/external/libedhoc/tests/include/cipher_suite_0.h +0 -131
- package/external/libedhoc/tests/include/cipher_suite_2.h +0 -139
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_2.h +0 -786
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_3.h +0 -529
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_0.h +0 -137
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_2.h +0 -168
- package/external/libedhoc/tests/include/test_vector_x5chain_static_dh_keys_suite_2.h +0 -162
- package/external/libedhoc/tests/include/test_vector_x5t_sign_keys_suite_2.h +0 -180
- package/external/libedhoc/tests/src/cipher_suite_0.c +0 -445
- package/external/libedhoc/tests/src/cipher_suite_2.c +0 -600
- package/external/libedhoc/tests/src/module_test_api.c +0 -430
- package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +0 -395
- package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +0 -392
- package/external/libedhoc/tests/src/module_test_error_message.c +0 -251
- package/external/libedhoc/tests/src/module_test_main.c +0 -49
- package/external/libedhoc/tests/src/module_test_rfc9528_suites_negotiation.c +0 -541
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +0 -2681
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +0 -1635
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +0 -1135
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +0 -1249
- package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +0 -798
- package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +0 -956
- package/include/Binding.h +0 -359
- package/include/EdhocComposeAsyncWorker.h +0 -49
- package/include/EdhocCredentialManager.h +0 -106
- package/include/EdhocCryptoManager.h +0 -495
- package/include/EdhocEadManager.h +0 -147
- package/include/EdhocExportOscoreAsyncWorker.h +0 -57
- package/include/EdhocKeyExporterAsyncWorker.h +0 -56
- package/include/EdhocKeyUpdateAsyncWorker.h +0 -55
- package/include/EdhocProcessAsyncWorker.h +0 -55
- package/include/RunningContext.h +0 -102
- package/include/Suites.h +0 -27
- package/include/Utils.h +0 -71
- package/patches/prebuildify-cross+5.1.0.dev.patch +0 -26
- package/patches/prebuildify-cross+5.1.1.dev.patch +0 -26
- package/prebuilds/android-arm/edhoc.armv7.node +0 -0
- package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/darwin-arm64/edhoc.node +0 -0
- package/prebuilds/darwin-x64/edhoc.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
- package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
- package/prebuilds/linux-x64/edhoc.musl.node +0 -0
- package/prebuilds/win32-ia32/edhoc.node +0 -0
- package/prebuilds/win32-x64/edhoc.node +0 -0
- package/src/Binding.cpp +0 -446
- package/src/EdhocComposeAsyncWorker.cpp +0 -60
- package/src/EdhocCredentialManager.cpp +0 -425
- package/src/EdhocCryptoManager.cpp +0 -593
- package/src/EdhocEadManager.cpp +0 -148
- package/src/EdhocExportOscoreAsyncWorker.cpp +0 -67
- package/src/EdhocKeyExporterAsyncWorker.cpp +0 -39
- package/src/EdhocKeyUpdateAsyncWorker.cpp +0 -31
- package/src/EdhocProcessAsyncWorker.cpp +0 -120
- package/src/RunningContext.cpp +0 -95
- package/src/Suites.cpp +0 -120
- package/src/Utils.cpp +0 -54
- package/test/basic.test.ts +0 -127
- package/test/vectors.test.ts +0 -111
|
@@ -1,1845 +0,0 @@
|
|
|
1
|
-
/*
|
|
2
|
-
* Public Key layer for parsing key files and structures
|
|
3
|
-
*
|
|
4
|
-
* Copyright The Mbed TLS Contributors
|
|
5
|
-
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
|
6
|
-
*/
|
|
7
|
-
|
|
8
|
-
#include "common.h"
|
|
9
|
-
|
|
10
|
-
#if defined(MBEDTLS_PK_PARSE_C)
|
|
11
|
-
|
|
12
|
-
#include "mbedtls/pk.h"
|
|
13
|
-
#include "mbedtls/asn1.h"
|
|
14
|
-
#include "mbedtls/oid.h"
|
|
15
|
-
#include "mbedtls/platform_util.h"
|
|
16
|
-
#include "mbedtls/error.h"
|
|
17
|
-
#include "pk_internal.h"
|
|
18
|
-
|
|
19
|
-
#include <string.h>
|
|
20
|
-
|
|
21
|
-
#if defined(MBEDTLS_RSA_C)
|
|
22
|
-
#include "mbedtls/rsa.h"
|
|
23
|
-
#endif
|
|
24
|
-
#include "mbedtls/ecp.h"
|
|
25
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
26
|
-
#include "pk_internal.h"
|
|
27
|
-
#endif
|
|
28
|
-
#if defined(MBEDTLS_ECDSA_C)
|
|
29
|
-
#include "mbedtls/ecdsa.h"
|
|
30
|
-
#endif
|
|
31
|
-
#if defined(MBEDTLS_PEM_PARSE_C)
|
|
32
|
-
#include "mbedtls/pem.h"
|
|
33
|
-
#endif
|
|
34
|
-
#if defined(MBEDTLS_PKCS5_C)
|
|
35
|
-
#include "mbedtls/pkcs5.h"
|
|
36
|
-
#endif
|
|
37
|
-
#if defined(MBEDTLS_PKCS12_C)
|
|
38
|
-
#include "mbedtls/pkcs12.h"
|
|
39
|
-
#endif
|
|
40
|
-
|
|
41
|
-
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
|
42
|
-
#include "psa_util_internal.h"
|
|
43
|
-
#endif
|
|
44
|
-
|
|
45
|
-
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
46
|
-
#include "psa/crypto.h"
|
|
47
|
-
#endif
|
|
48
|
-
|
|
49
|
-
#include "mbedtls/platform.h"
|
|
50
|
-
|
|
51
|
-
/* Helper for Montgomery curves */
|
|
52
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS) && defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
|
|
53
|
-
#define MBEDTLS_PK_IS_RFC8410_GROUP_ID(id) \
|
|
54
|
-
((id == MBEDTLS_ECP_DP_CURVE25519) || (id == MBEDTLS_ECP_DP_CURVE448))
|
|
55
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS && MBEDTLS_PK_HAVE_RFC8410_CURVES */
|
|
56
|
-
|
|
57
|
-
#if defined(MBEDTLS_FS_IO)
|
|
58
|
-
/*
|
|
59
|
-
* Load all data from a file into a given buffer.
|
|
60
|
-
*
|
|
61
|
-
* The file is expected to contain either PEM or DER encoded data.
|
|
62
|
-
* A terminating null byte is always appended. It is included in the announced
|
|
63
|
-
* length only if the data looks like it is PEM encoded.
|
|
64
|
-
*/
|
|
65
|
-
int mbedtls_pk_load_file(const char *path, unsigned char **buf, size_t *n)
|
|
66
|
-
{
|
|
67
|
-
FILE *f;
|
|
68
|
-
long size;
|
|
69
|
-
|
|
70
|
-
if ((f = fopen(path, "rb")) == NULL) {
|
|
71
|
-
return MBEDTLS_ERR_PK_FILE_IO_ERROR;
|
|
72
|
-
}
|
|
73
|
-
|
|
74
|
-
/* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
|
|
75
|
-
mbedtls_setbuf(f, NULL);
|
|
76
|
-
|
|
77
|
-
fseek(f, 0, SEEK_END);
|
|
78
|
-
if ((size = ftell(f)) == -1) {
|
|
79
|
-
fclose(f);
|
|
80
|
-
return MBEDTLS_ERR_PK_FILE_IO_ERROR;
|
|
81
|
-
}
|
|
82
|
-
fseek(f, 0, SEEK_SET);
|
|
83
|
-
|
|
84
|
-
*n = (size_t) size;
|
|
85
|
-
|
|
86
|
-
if (*n + 1 == 0 ||
|
|
87
|
-
(*buf = mbedtls_calloc(1, *n + 1)) == NULL) {
|
|
88
|
-
fclose(f);
|
|
89
|
-
return MBEDTLS_ERR_PK_ALLOC_FAILED;
|
|
90
|
-
}
|
|
91
|
-
|
|
92
|
-
if (fread(*buf, 1, *n, f) != *n) {
|
|
93
|
-
fclose(f);
|
|
94
|
-
|
|
95
|
-
mbedtls_zeroize_and_free(*buf, *n);
|
|
96
|
-
|
|
97
|
-
return MBEDTLS_ERR_PK_FILE_IO_ERROR;
|
|
98
|
-
}
|
|
99
|
-
|
|
100
|
-
fclose(f);
|
|
101
|
-
|
|
102
|
-
(*buf)[*n] = '\0';
|
|
103
|
-
|
|
104
|
-
if (strstr((const char *) *buf, "-----BEGIN ") != NULL) {
|
|
105
|
-
++*n;
|
|
106
|
-
}
|
|
107
|
-
|
|
108
|
-
return 0;
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
/*
|
|
112
|
-
* Load and parse a private key
|
|
113
|
-
*/
|
|
114
|
-
int mbedtls_pk_parse_keyfile(mbedtls_pk_context *ctx,
|
|
115
|
-
const char *path, const char *pwd,
|
|
116
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
117
|
-
{
|
|
118
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
119
|
-
size_t n;
|
|
120
|
-
unsigned char *buf;
|
|
121
|
-
|
|
122
|
-
if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
|
|
123
|
-
return ret;
|
|
124
|
-
}
|
|
125
|
-
|
|
126
|
-
if (pwd == NULL) {
|
|
127
|
-
ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng);
|
|
128
|
-
} else {
|
|
129
|
-
ret = mbedtls_pk_parse_key(ctx, buf, n,
|
|
130
|
-
(const unsigned char *) pwd, strlen(pwd), f_rng, p_rng);
|
|
131
|
-
}
|
|
132
|
-
|
|
133
|
-
mbedtls_zeroize_and_free(buf, n);
|
|
134
|
-
|
|
135
|
-
return ret;
|
|
136
|
-
}
|
|
137
|
-
|
|
138
|
-
/*
|
|
139
|
-
* Load and parse a public key
|
|
140
|
-
*/
|
|
141
|
-
int mbedtls_pk_parse_public_keyfile(mbedtls_pk_context *ctx, const char *path)
|
|
142
|
-
{
|
|
143
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
144
|
-
size_t n;
|
|
145
|
-
unsigned char *buf;
|
|
146
|
-
|
|
147
|
-
if ((ret = mbedtls_pk_load_file(path, &buf, &n)) != 0) {
|
|
148
|
-
return ret;
|
|
149
|
-
}
|
|
150
|
-
|
|
151
|
-
ret = mbedtls_pk_parse_public_key(ctx, buf, n);
|
|
152
|
-
|
|
153
|
-
mbedtls_zeroize_and_free(buf, n);
|
|
154
|
-
|
|
155
|
-
return ret;
|
|
156
|
-
}
|
|
157
|
-
#endif /* MBEDTLS_FS_IO */
|
|
158
|
-
|
|
159
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
160
|
-
/* Minimally parse an ECParameters buffer to and mbedtls_asn1_buf
|
|
161
|
-
*
|
|
162
|
-
* ECParameters ::= CHOICE {
|
|
163
|
-
* namedCurve OBJECT IDENTIFIER
|
|
164
|
-
* specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
|
|
165
|
-
* -- implicitCurve NULL
|
|
166
|
-
* }
|
|
167
|
-
*/
|
|
168
|
-
static int pk_get_ecparams(unsigned char **p, const unsigned char *end,
|
|
169
|
-
mbedtls_asn1_buf *params)
|
|
170
|
-
{
|
|
171
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
172
|
-
|
|
173
|
-
if (end - *p < 1) {
|
|
174
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
175
|
-
MBEDTLS_ERR_ASN1_OUT_OF_DATA);
|
|
176
|
-
}
|
|
177
|
-
|
|
178
|
-
/* Tag may be either OID or SEQUENCE */
|
|
179
|
-
params->tag = **p;
|
|
180
|
-
if (params->tag != MBEDTLS_ASN1_OID
|
|
181
|
-
#if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
|
|
182
|
-
&& params->tag != (MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)
|
|
183
|
-
#endif
|
|
184
|
-
) {
|
|
185
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
186
|
-
MBEDTLS_ERR_ASN1_UNEXPECTED_TAG);
|
|
187
|
-
}
|
|
188
|
-
|
|
189
|
-
if ((ret = mbedtls_asn1_get_tag(p, end, ¶ms->len, params->tag)) != 0) {
|
|
190
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
191
|
-
}
|
|
192
|
-
|
|
193
|
-
params->p = *p;
|
|
194
|
-
*p += params->len;
|
|
195
|
-
|
|
196
|
-
if (*p != end) {
|
|
197
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
198
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
199
|
-
}
|
|
200
|
-
|
|
201
|
-
return 0;
|
|
202
|
-
}
|
|
203
|
-
|
|
204
|
-
#if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
|
|
205
|
-
/*
|
|
206
|
-
* Parse a SpecifiedECDomain (SEC 1 C.2) and (mostly) fill the group with it.
|
|
207
|
-
* WARNING: the resulting group should only be used with
|
|
208
|
-
* pk_group_id_from_specified(), since its base point may not be set correctly
|
|
209
|
-
* if it was encoded compressed.
|
|
210
|
-
*
|
|
211
|
-
* SpecifiedECDomain ::= SEQUENCE {
|
|
212
|
-
* version SpecifiedECDomainVersion(ecdpVer1 | ecdpVer2 | ecdpVer3, ...),
|
|
213
|
-
* fieldID FieldID {{FieldTypes}},
|
|
214
|
-
* curve Curve,
|
|
215
|
-
* base ECPoint,
|
|
216
|
-
* order INTEGER,
|
|
217
|
-
* cofactor INTEGER OPTIONAL,
|
|
218
|
-
* hash HashAlgorithm OPTIONAL,
|
|
219
|
-
* ...
|
|
220
|
-
* }
|
|
221
|
-
*
|
|
222
|
-
* We only support prime-field as field type, and ignore hash and cofactor.
|
|
223
|
-
*/
|
|
224
|
-
static int pk_group_from_specified(const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp)
|
|
225
|
-
{
|
|
226
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
227
|
-
unsigned char *p = params->p;
|
|
228
|
-
const unsigned char *const end = params->p + params->len;
|
|
229
|
-
const unsigned char *end_field, *end_curve;
|
|
230
|
-
size_t len;
|
|
231
|
-
int ver;
|
|
232
|
-
|
|
233
|
-
/* SpecifiedECDomainVersion ::= INTEGER { 1, 2, 3 } */
|
|
234
|
-
if ((ret = mbedtls_asn1_get_int(&p, end, &ver)) != 0) {
|
|
235
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
236
|
-
}
|
|
237
|
-
|
|
238
|
-
if (ver < 1 || ver > 3) {
|
|
239
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
240
|
-
}
|
|
241
|
-
|
|
242
|
-
/*
|
|
243
|
-
* FieldID { FIELD-ID:IOSet } ::= SEQUENCE { -- Finite field
|
|
244
|
-
* fieldType FIELD-ID.&id({IOSet}),
|
|
245
|
-
* parameters FIELD-ID.&Type({IOSet}{@fieldType})
|
|
246
|
-
* }
|
|
247
|
-
*/
|
|
248
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
249
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
250
|
-
return ret;
|
|
251
|
-
}
|
|
252
|
-
|
|
253
|
-
end_field = p + len;
|
|
254
|
-
|
|
255
|
-
/*
|
|
256
|
-
* FIELD-ID ::= TYPE-IDENTIFIER
|
|
257
|
-
* FieldTypes FIELD-ID ::= {
|
|
258
|
-
* { Prime-p IDENTIFIED BY prime-field } |
|
|
259
|
-
* { Characteristic-two IDENTIFIED BY characteristic-two-field }
|
|
260
|
-
* }
|
|
261
|
-
* prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }
|
|
262
|
-
*/
|
|
263
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end_field, &len, MBEDTLS_ASN1_OID)) != 0) {
|
|
264
|
-
return ret;
|
|
265
|
-
}
|
|
266
|
-
|
|
267
|
-
if (len != MBEDTLS_OID_SIZE(MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD) ||
|
|
268
|
-
memcmp(p, MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD, len) != 0) {
|
|
269
|
-
return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
|
|
270
|
-
}
|
|
271
|
-
|
|
272
|
-
p += len;
|
|
273
|
-
|
|
274
|
-
/* Prime-p ::= INTEGER -- Field of size p. */
|
|
275
|
-
if ((ret = mbedtls_asn1_get_mpi(&p, end_field, &grp->P)) != 0) {
|
|
276
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
277
|
-
}
|
|
278
|
-
|
|
279
|
-
grp->pbits = mbedtls_mpi_bitlen(&grp->P);
|
|
280
|
-
|
|
281
|
-
if (p != end_field) {
|
|
282
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
283
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
284
|
-
}
|
|
285
|
-
|
|
286
|
-
/*
|
|
287
|
-
* Curve ::= SEQUENCE {
|
|
288
|
-
* a FieldElement,
|
|
289
|
-
* b FieldElement,
|
|
290
|
-
* seed BIT STRING OPTIONAL
|
|
291
|
-
* -- Shall be present if used in SpecifiedECDomain
|
|
292
|
-
* -- with version equal to ecdpVer2 or ecdpVer3
|
|
293
|
-
* }
|
|
294
|
-
*/
|
|
295
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
296
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
297
|
-
return ret;
|
|
298
|
-
}
|
|
299
|
-
|
|
300
|
-
end_curve = p + len;
|
|
301
|
-
|
|
302
|
-
/*
|
|
303
|
-
* FieldElement ::= OCTET STRING
|
|
304
|
-
* containing an integer in the case of a prime field
|
|
305
|
-
*/
|
|
306
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
|
|
307
|
-
(ret = mbedtls_mpi_read_binary(&grp->A, p, len)) != 0) {
|
|
308
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
309
|
-
}
|
|
310
|
-
|
|
311
|
-
p += len;
|
|
312
|
-
|
|
313
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0 ||
|
|
314
|
-
(ret = mbedtls_mpi_read_binary(&grp->B, p, len)) != 0) {
|
|
315
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
316
|
-
}
|
|
317
|
-
|
|
318
|
-
p += len;
|
|
319
|
-
|
|
320
|
-
/* Ignore seed BIT STRING OPTIONAL */
|
|
321
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end_curve, &len, MBEDTLS_ASN1_BIT_STRING)) == 0) {
|
|
322
|
-
p += len;
|
|
323
|
-
}
|
|
324
|
-
|
|
325
|
-
if (p != end_curve) {
|
|
326
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
327
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
328
|
-
}
|
|
329
|
-
|
|
330
|
-
/*
|
|
331
|
-
* ECPoint ::= OCTET STRING
|
|
332
|
-
*/
|
|
333
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
|
|
334
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
335
|
-
}
|
|
336
|
-
|
|
337
|
-
if ((ret = mbedtls_ecp_point_read_binary(grp, &grp->G,
|
|
338
|
-
(const unsigned char *) p, len)) != 0) {
|
|
339
|
-
/*
|
|
340
|
-
* If we can't read the point because it's compressed, cheat by
|
|
341
|
-
* reading only the X coordinate and the parity bit of Y.
|
|
342
|
-
*/
|
|
343
|
-
if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ||
|
|
344
|
-
(p[0] != 0x02 && p[0] != 0x03) ||
|
|
345
|
-
len != mbedtls_mpi_size(&grp->P) + 1 ||
|
|
346
|
-
mbedtls_mpi_read_binary(&grp->G.X, p + 1, len - 1) != 0 ||
|
|
347
|
-
mbedtls_mpi_lset(&grp->G.Y, p[0] - 2) != 0 ||
|
|
348
|
-
mbedtls_mpi_lset(&grp->G.Z, 1) != 0) {
|
|
349
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
350
|
-
}
|
|
351
|
-
}
|
|
352
|
-
|
|
353
|
-
p += len;
|
|
354
|
-
|
|
355
|
-
/*
|
|
356
|
-
* order INTEGER
|
|
357
|
-
*/
|
|
358
|
-
if ((ret = mbedtls_asn1_get_mpi(&p, end, &grp->N)) != 0) {
|
|
359
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
360
|
-
}
|
|
361
|
-
|
|
362
|
-
grp->nbits = mbedtls_mpi_bitlen(&grp->N);
|
|
363
|
-
|
|
364
|
-
/*
|
|
365
|
-
* Allow optional elements by purposefully not enforcing p == end here.
|
|
366
|
-
*/
|
|
367
|
-
|
|
368
|
-
return 0;
|
|
369
|
-
}
|
|
370
|
-
|
|
371
|
-
/*
|
|
372
|
-
* Find the group id associated with an (almost filled) group as generated by
|
|
373
|
-
* pk_group_from_specified(), or return an error if unknown.
|
|
374
|
-
*/
|
|
375
|
-
static int pk_group_id_from_group(const mbedtls_ecp_group *grp, mbedtls_ecp_group_id *grp_id)
|
|
376
|
-
{
|
|
377
|
-
int ret = 0;
|
|
378
|
-
mbedtls_ecp_group ref;
|
|
379
|
-
const mbedtls_ecp_group_id *id;
|
|
380
|
-
|
|
381
|
-
mbedtls_ecp_group_init(&ref);
|
|
382
|
-
|
|
383
|
-
for (id = mbedtls_ecp_grp_id_list(); *id != MBEDTLS_ECP_DP_NONE; id++) {
|
|
384
|
-
/* Load the group associated to that id */
|
|
385
|
-
mbedtls_ecp_group_free(&ref);
|
|
386
|
-
MBEDTLS_MPI_CHK(mbedtls_ecp_group_load(&ref, *id));
|
|
387
|
-
|
|
388
|
-
/* Compare to the group we were given, starting with easy tests */
|
|
389
|
-
if (grp->pbits == ref.pbits && grp->nbits == ref.nbits &&
|
|
390
|
-
mbedtls_mpi_cmp_mpi(&grp->P, &ref.P) == 0 &&
|
|
391
|
-
mbedtls_mpi_cmp_mpi(&grp->A, &ref.A) == 0 &&
|
|
392
|
-
mbedtls_mpi_cmp_mpi(&grp->B, &ref.B) == 0 &&
|
|
393
|
-
mbedtls_mpi_cmp_mpi(&grp->N, &ref.N) == 0 &&
|
|
394
|
-
mbedtls_mpi_cmp_mpi(&grp->G.X, &ref.G.X) == 0 &&
|
|
395
|
-
mbedtls_mpi_cmp_mpi(&grp->G.Z, &ref.G.Z) == 0 &&
|
|
396
|
-
/* For Y we may only know the parity bit, so compare only that */
|
|
397
|
-
mbedtls_mpi_get_bit(&grp->G.Y, 0) == mbedtls_mpi_get_bit(&ref.G.Y, 0)) {
|
|
398
|
-
break;
|
|
399
|
-
}
|
|
400
|
-
}
|
|
401
|
-
|
|
402
|
-
cleanup:
|
|
403
|
-
mbedtls_ecp_group_free(&ref);
|
|
404
|
-
|
|
405
|
-
*grp_id = *id;
|
|
406
|
-
|
|
407
|
-
if (ret == 0 && *id == MBEDTLS_ECP_DP_NONE) {
|
|
408
|
-
ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
|
|
409
|
-
}
|
|
410
|
-
|
|
411
|
-
return ret;
|
|
412
|
-
}
|
|
413
|
-
|
|
414
|
-
/*
|
|
415
|
-
* Parse a SpecifiedECDomain (SEC 1 C.2) and find the associated group ID
|
|
416
|
-
*/
|
|
417
|
-
static int pk_group_id_from_specified(const mbedtls_asn1_buf *params,
|
|
418
|
-
mbedtls_ecp_group_id *grp_id)
|
|
419
|
-
{
|
|
420
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
421
|
-
mbedtls_ecp_group grp;
|
|
422
|
-
|
|
423
|
-
mbedtls_ecp_group_init(&grp);
|
|
424
|
-
|
|
425
|
-
if ((ret = pk_group_from_specified(params, &grp)) != 0) {
|
|
426
|
-
goto cleanup;
|
|
427
|
-
}
|
|
428
|
-
|
|
429
|
-
ret = pk_group_id_from_group(&grp, grp_id);
|
|
430
|
-
|
|
431
|
-
cleanup:
|
|
432
|
-
/* The API respecting lifecycle for mbedtls_ecp_group struct is
|
|
433
|
-
* _init(), _load() and _free(). In pk_group_id_from_specified() the
|
|
434
|
-
* temporary grp breaks that flow and it's members are populated
|
|
435
|
-
* by pk_group_id_from_group(). As such mbedtls_ecp_group_free()
|
|
436
|
-
* which is assuming a group populated by _setup() may not clean-up
|
|
437
|
-
* properly -> Manually free it's members.
|
|
438
|
-
*/
|
|
439
|
-
mbedtls_mpi_free(&grp.N);
|
|
440
|
-
mbedtls_mpi_free(&grp.P);
|
|
441
|
-
mbedtls_mpi_free(&grp.A);
|
|
442
|
-
mbedtls_mpi_free(&grp.B);
|
|
443
|
-
mbedtls_ecp_point_free(&grp.G);
|
|
444
|
-
|
|
445
|
-
return ret;
|
|
446
|
-
}
|
|
447
|
-
#endif /* MBEDTLS_PK_PARSE_EC_EXTENDED */
|
|
448
|
-
|
|
449
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
450
|
-
/* Functions pk_use_ecparams() and pk_use_ecparams_rfc8410() update the
|
|
451
|
-
* ecp_keypair structure with proper group ID. The purpose of this helper
|
|
452
|
-
* function is to update ec_family and ec_bits accordingly. */
|
|
453
|
-
static int pk_update_psa_ecparams(mbedtls_pk_context *pk,
|
|
454
|
-
mbedtls_ecp_group_id grp_id)
|
|
455
|
-
{
|
|
456
|
-
psa_ecc_family_t ec_family;
|
|
457
|
-
size_t bits;
|
|
458
|
-
|
|
459
|
-
ec_family = mbedtls_ecc_group_to_psa(grp_id, &bits);
|
|
460
|
-
|
|
461
|
-
if ((pk->ec_family != 0) && (pk->ec_family != ec_family)) {
|
|
462
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
463
|
-
}
|
|
464
|
-
|
|
465
|
-
pk->ec_family = ec_family;
|
|
466
|
-
pk->ec_bits = bits;
|
|
467
|
-
|
|
468
|
-
return 0;
|
|
469
|
-
}
|
|
470
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
471
|
-
|
|
472
|
-
/*
|
|
473
|
-
* Use EC parameters to initialise an EC group
|
|
474
|
-
*
|
|
475
|
-
* ECParameters ::= CHOICE {
|
|
476
|
-
* namedCurve OBJECT IDENTIFIER
|
|
477
|
-
* specifiedCurve SpecifiedECDomain -- = SEQUENCE { ... }
|
|
478
|
-
* -- implicitCurve NULL
|
|
479
|
-
*/
|
|
480
|
-
static int pk_use_ecparams(const mbedtls_asn1_buf *params, mbedtls_pk_context *pk)
|
|
481
|
-
{
|
|
482
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
483
|
-
mbedtls_ecp_group_id grp_id;
|
|
484
|
-
|
|
485
|
-
if (params->tag == MBEDTLS_ASN1_OID) {
|
|
486
|
-
if (mbedtls_oid_get_ec_grp(params, &grp_id) != 0) {
|
|
487
|
-
return MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE;
|
|
488
|
-
}
|
|
489
|
-
} else {
|
|
490
|
-
#if defined(MBEDTLS_PK_PARSE_EC_EXTENDED)
|
|
491
|
-
if ((ret = pk_group_id_from_specified(params, &grp_id)) != 0) {
|
|
492
|
-
return ret;
|
|
493
|
-
}
|
|
494
|
-
#else
|
|
495
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
496
|
-
#endif
|
|
497
|
-
}
|
|
498
|
-
|
|
499
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
500
|
-
ret = pk_update_psa_ecparams(pk, grp_id);
|
|
501
|
-
#else
|
|
502
|
-
/* grp may already be initialized; if so, make sure IDs match */
|
|
503
|
-
if (mbedtls_pk_ec_ro(*pk)->grp.id != MBEDTLS_ECP_DP_NONE &&
|
|
504
|
-
mbedtls_pk_ec_ro(*pk)->grp.id != grp_id) {
|
|
505
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
506
|
-
}
|
|
507
|
-
|
|
508
|
-
if ((ret = mbedtls_ecp_group_load(&(mbedtls_pk_ec_rw(*pk)->grp),
|
|
509
|
-
grp_id)) != 0) {
|
|
510
|
-
return ret;
|
|
511
|
-
}
|
|
512
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
513
|
-
|
|
514
|
-
return ret;
|
|
515
|
-
}
|
|
516
|
-
|
|
517
|
-
/*
|
|
518
|
-
* Helper function for deriving a public key from its private counterpart.
|
|
519
|
-
*/
|
|
520
|
-
static int pk_derive_public_key(mbedtls_pk_context *pk,
|
|
521
|
-
const unsigned char *d, size_t d_len,
|
|
522
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
523
|
-
{
|
|
524
|
-
int ret;
|
|
525
|
-
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
526
|
-
psa_status_t status;
|
|
527
|
-
(void) f_rng;
|
|
528
|
-
(void) p_rng;
|
|
529
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
530
|
-
(void) d;
|
|
531
|
-
(void) d_len;
|
|
532
|
-
|
|
533
|
-
status = psa_export_public_key(pk->priv_id, pk->pub_raw, sizeof(pk->pub_raw),
|
|
534
|
-
&pk->pub_raw_len);
|
|
535
|
-
ret = psa_pk_status_to_mbedtls(status);
|
|
536
|
-
#else /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
537
|
-
mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
|
|
538
|
-
unsigned char key_buf[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
|
|
539
|
-
size_t key_len;
|
|
540
|
-
mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT;
|
|
541
|
-
psa_key_attributes_t key_attr = PSA_KEY_ATTRIBUTES_INIT;
|
|
542
|
-
size_t curve_bits;
|
|
543
|
-
psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits);
|
|
544
|
-
psa_status_t destruction_status;
|
|
545
|
-
|
|
546
|
-
psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve));
|
|
547
|
-
psa_set_key_usage_flags(&key_attr, PSA_KEY_USAGE_EXPORT);
|
|
548
|
-
|
|
549
|
-
status = psa_import_key(&key_attr, d, d_len, &key_id);
|
|
550
|
-
ret = psa_pk_status_to_mbedtls(status);
|
|
551
|
-
if (ret != 0) {
|
|
552
|
-
return ret;
|
|
553
|
-
}
|
|
554
|
-
|
|
555
|
-
status = psa_export_public_key(key_id, key_buf, sizeof(key_buf), &key_len);
|
|
556
|
-
ret = psa_pk_status_to_mbedtls(status);
|
|
557
|
-
destruction_status = psa_destroy_key(key_id);
|
|
558
|
-
if (ret != 0) {
|
|
559
|
-
return ret;
|
|
560
|
-
} else if (destruction_status != PSA_SUCCESS) {
|
|
561
|
-
return psa_pk_status_to_mbedtls(destruction_status);
|
|
562
|
-
}
|
|
563
|
-
ret = mbedtls_ecp_point_read_binary(&eck->grp, &eck->Q, key_buf, key_len);
|
|
564
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
565
|
-
#else /* MBEDTLS_USE_PSA_CRYPTO */
|
|
566
|
-
mbedtls_ecp_keypair *eck = (mbedtls_ecp_keypair *) pk->pk_ctx;
|
|
567
|
-
(void) d;
|
|
568
|
-
(void) d_len;
|
|
569
|
-
|
|
570
|
-
ret = mbedtls_ecp_mul(&eck->grp, &eck->Q, &eck->d, &eck->grp.G, f_rng, p_rng);
|
|
571
|
-
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
572
|
-
return ret;
|
|
573
|
-
}
|
|
574
|
-
|
|
575
|
-
#if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
|
|
576
|
-
|
|
577
|
-
/*
|
|
578
|
-
* Load an RFC8410 EC key, which doesn't have any parameters
|
|
579
|
-
*/
|
|
580
|
-
static int pk_use_ecparams_rfc8410(const mbedtls_asn1_buf *params,
|
|
581
|
-
mbedtls_ecp_group_id grp_id,
|
|
582
|
-
mbedtls_pk_context *pk)
|
|
583
|
-
{
|
|
584
|
-
int ret;
|
|
585
|
-
|
|
586
|
-
if (params->tag != 0 || params->len != 0) {
|
|
587
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
588
|
-
}
|
|
589
|
-
|
|
590
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
591
|
-
ret = pk_update_psa_ecparams(pk, grp_id);
|
|
592
|
-
#else
|
|
593
|
-
mbedtls_ecp_keypair *ecp = mbedtls_pk_ec_rw(*pk);
|
|
594
|
-
ret = mbedtls_ecp_group_load(&(ecp->grp), grp_id);
|
|
595
|
-
if (ret != 0) {
|
|
596
|
-
return ret;
|
|
597
|
-
}
|
|
598
|
-
#endif
|
|
599
|
-
return ret;
|
|
600
|
-
}
|
|
601
|
-
|
|
602
|
-
/*
|
|
603
|
-
* Parse an RFC 8410 encoded private EC key
|
|
604
|
-
*
|
|
605
|
-
* CurvePrivateKey ::= OCTET STRING
|
|
606
|
-
*/
|
|
607
|
-
static int pk_parse_key_rfc8410_der(mbedtls_pk_context *pk,
|
|
608
|
-
unsigned char *key, size_t keylen, const unsigned char *end,
|
|
609
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
610
|
-
{
|
|
611
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
612
|
-
size_t len;
|
|
613
|
-
|
|
614
|
-
if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
|
|
615
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
616
|
-
}
|
|
617
|
-
|
|
618
|
-
if (key + len != end) {
|
|
619
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
620
|
-
}
|
|
621
|
-
|
|
622
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
623
|
-
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
|
624
|
-
psa_status_t status;
|
|
625
|
-
|
|
626
|
-
psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
|
|
627
|
-
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_EXPORT |
|
|
628
|
-
PSA_KEY_USAGE_DERIVE);
|
|
629
|
-
psa_set_key_algorithm(&attributes, PSA_ALG_ECDH);
|
|
630
|
-
|
|
631
|
-
status = psa_import_key(&attributes, key, len, &pk->priv_id);
|
|
632
|
-
if (status != PSA_SUCCESS) {
|
|
633
|
-
ret = psa_pk_status_to_mbedtls(status);
|
|
634
|
-
return ret;
|
|
635
|
-
}
|
|
636
|
-
#else /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
637
|
-
mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
|
|
638
|
-
|
|
639
|
-
if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, len)) != 0) {
|
|
640
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
641
|
-
}
|
|
642
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
643
|
-
|
|
644
|
-
/* pk_parse_key_pkcs8_unencrypted_der() only supports version 1 PKCS8 keys,
|
|
645
|
-
* which never contain a public key. As such, derive the public key
|
|
646
|
-
* unconditionally. */
|
|
647
|
-
if ((ret = pk_derive_public_key(pk, key, len, f_rng, p_rng)) != 0) {
|
|
648
|
-
return ret;
|
|
649
|
-
}
|
|
650
|
-
|
|
651
|
-
return 0;
|
|
652
|
-
}
|
|
653
|
-
#endif /* MBEDTLS_PK_HAVE_RFC8410_CURVES */
|
|
654
|
-
|
|
655
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA) && defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
|
|
656
|
-
/*
|
|
657
|
-
* Create a temporary ecp_keypair for converting an EC point in compressed
|
|
658
|
-
* format to an uncompressed one
|
|
659
|
-
*/
|
|
660
|
-
static int pk_convert_compressed_ec(mbedtls_pk_context *pk,
|
|
661
|
-
const unsigned char *in_start, size_t in_len,
|
|
662
|
-
size_t *out_buf_len, unsigned char *out_buf,
|
|
663
|
-
size_t out_buf_size)
|
|
664
|
-
{
|
|
665
|
-
mbedtls_ecp_keypair ecp_key;
|
|
666
|
-
mbedtls_ecp_group_id ecp_group_id;
|
|
667
|
-
int ret;
|
|
668
|
-
|
|
669
|
-
ecp_group_id = mbedtls_ecc_group_of_psa(pk->ec_family, pk->ec_bits, 0);
|
|
670
|
-
|
|
671
|
-
mbedtls_ecp_keypair_init(&ecp_key);
|
|
672
|
-
ret = mbedtls_ecp_group_load(&(ecp_key.grp), ecp_group_id);
|
|
673
|
-
if (ret != 0) {
|
|
674
|
-
return ret;
|
|
675
|
-
}
|
|
676
|
-
ret = mbedtls_ecp_point_read_binary(&(ecp_key.grp), &ecp_key.Q,
|
|
677
|
-
in_start, in_len);
|
|
678
|
-
if (ret != 0) {
|
|
679
|
-
goto exit;
|
|
680
|
-
}
|
|
681
|
-
ret = mbedtls_ecp_point_write_binary(&(ecp_key.grp), &ecp_key.Q,
|
|
682
|
-
MBEDTLS_ECP_PF_UNCOMPRESSED,
|
|
683
|
-
out_buf_len, out_buf, out_buf_size);
|
|
684
|
-
|
|
685
|
-
exit:
|
|
686
|
-
mbedtls_ecp_keypair_free(&ecp_key);
|
|
687
|
-
return ret;
|
|
688
|
-
}
|
|
689
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA && MBEDTLS_PK_PARSE_EC_COMPRESSED */
|
|
690
|
-
|
|
691
|
-
/*
|
|
692
|
-
* EC public key is an EC point
|
|
693
|
-
*
|
|
694
|
-
* The caller is responsible for clearing the structure upon failure if
|
|
695
|
-
* desired. Take care to pass along the possible ECP_FEATURE_UNAVAILABLE
|
|
696
|
-
* return code of mbedtls_ecp_point_read_binary() and leave p in a usable state.
|
|
697
|
-
*/
|
|
698
|
-
static int pk_get_ecpubkey(unsigned char **p, const unsigned char *end,
|
|
699
|
-
mbedtls_pk_context *pk)
|
|
700
|
-
{
|
|
701
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
702
|
-
|
|
703
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
704
|
-
mbedtls_svc_key_id_t key;
|
|
705
|
-
psa_key_attributes_t key_attrs = PSA_KEY_ATTRIBUTES_INIT;
|
|
706
|
-
size_t len = (end - *p);
|
|
707
|
-
|
|
708
|
-
if (len > PSA_EXPORT_PUBLIC_KEY_MAX_SIZE) {
|
|
709
|
-
return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
|
|
710
|
-
}
|
|
711
|
-
|
|
712
|
-
/* Compressed point format are not supported yet by PSA crypto. As a
|
|
713
|
-
* consequence ecp functions are used to "convert" the point to
|
|
714
|
-
* uncompressed format */
|
|
715
|
-
if ((**p == 0x02) || (**p == 0x03)) {
|
|
716
|
-
#if defined(MBEDTLS_PK_PARSE_EC_COMPRESSED)
|
|
717
|
-
ret = pk_convert_compressed_ec(pk, *p, len,
|
|
718
|
-
&(pk->pub_raw_len), pk->pub_raw,
|
|
719
|
-
PSA_EXPORT_PUBLIC_KEY_MAX_SIZE);
|
|
720
|
-
if (ret != 0) {
|
|
721
|
-
return ret;
|
|
722
|
-
}
|
|
723
|
-
#else /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
|
|
724
|
-
return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
|
|
725
|
-
#endif /* MBEDTLS_PK_PARSE_EC_COMPRESSED */
|
|
726
|
-
} else {
|
|
727
|
-
/* Uncompressed format */
|
|
728
|
-
if ((size_t) (end - *p) > MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN) {
|
|
729
|
-
return MBEDTLS_ERR_PK_BUFFER_TOO_SMALL;
|
|
730
|
-
}
|
|
731
|
-
memcpy(pk->pub_raw, *p, (end - *p));
|
|
732
|
-
pk->pub_raw_len = end - *p;
|
|
733
|
-
}
|
|
734
|
-
|
|
735
|
-
/* Validate the key by trying to importing it */
|
|
736
|
-
psa_set_key_usage_flags(&key_attrs, 0);
|
|
737
|
-
psa_set_key_algorithm(&key_attrs, PSA_ALG_ECDSA_ANY);
|
|
738
|
-
psa_set_key_type(&key_attrs, PSA_KEY_TYPE_ECC_PUBLIC_KEY(pk->ec_family));
|
|
739
|
-
psa_set_key_bits(&key_attrs, pk->ec_bits);
|
|
740
|
-
|
|
741
|
-
if ((psa_import_key(&key_attrs, pk->pub_raw, pk->pub_raw_len,
|
|
742
|
-
&key) != PSA_SUCCESS) ||
|
|
743
|
-
(psa_destroy_key(key) != PSA_SUCCESS)) {
|
|
744
|
-
mbedtls_platform_zeroize(pk->pub_raw, MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN);
|
|
745
|
-
pk->pub_raw_len = 0;
|
|
746
|
-
return MBEDTLS_ERR_PK_BAD_INPUT_DATA;
|
|
747
|
-
}
|
|
748
|
-
ret = 0;
|
|
749
|
-
#else /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
750
|
-
mbedtls_ecp_keypair *ec_key = (mbedtls_ecp_keypair *) pk->pk_ctx;
|
|
751
|
-
if ((ret = mbedtls_ecp_point_read_binary(&ec_key->grp, &ec_key->Q,
|
|
752
|
-
(const unsigned char *) *p,
|
|
753
|
-
end - *p)) == 0) {
|
|
754
|
-
ret = mbedtls_ecp_check_pubkey(&ec_key->grp, &ec_key->Q);
|
|
755
|
-
}
|
|
756
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
757
|
-
|
|
758
|
-
/*
|
|
759
|
-
* We know mbedtls_ecp_point_read_binary consumed all bytes or failed
|
|
760
|
-
*/
|
|
761
|
-
*p = (unsigned char *) end;
|
|
762
|
-
|
|
763
|
-
return ret;
|
|
764
|
-
}
|
|
765
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
766
|
-
|
|
767
|
-
#if defined(MBEDTLS_RSA_C)
|
|
768
|
-
/*
|
|
769
|
-
* RSAPublicKey ::= SEQUENCE {
|
|
770
|
-
* modulus INTEGER, -- n
|
|
771
|
-
* publicExponent INTEGER -- e
|
|
772
|
-
* }
|
|
773
|
-
*/
|
|
774
|
-
static int pk_get_rsapubkey(unsigned char **p,
|
|
775
|
-
const unsigned char *end,
|
|
776
|
-
mbedtls_rsa_context *rsa)
|
|
777
|
-
{
|
|
778
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
779
|
-
size_t len;
|
|
780
|
-
|
|
781
|
-
if ((ret = mbedtls_asn1_get_tag(p, end, &len,
|
|
782
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
783
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
|
|
784
|
-
}
|
|
785
|
-
|
|
786
|
-
if (*p + len != end) {
|
|
787
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
|
|
788
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
789
|
-
}
|
|
790
|
-
|
|
791
|
-
/* Import N */
|
|
792
|
-
if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
|
|
793
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
|
|
794
|
-
}
|
|
795
|
-
|
|
796
|
-
if ((ret = mbedtls_rsa_import_raw(rsa, *p, len, NULL, 0, NULL, 0,
|
|
797
|
-
NULL, 0, NULL, 0)) != 0) {
|
|
798
|
-
return MBEDTLS_ERR_PK_INVALID_PUBKEY;
|
|
799
|
-
}
|
|
800
|
-
|
|
801
|
-
*p += len;
|
|
802
|
-
|
|
803
|
-
/* Import E */
|
|
804
|
-
if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0) {
|
|
805
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
|
|
806
|
-
}
|
|
807
|
-
|
|
808
|
-
if ((ret = mbedtls_rsa_import_raw(rsa, NULL, 0, NULL, 0, NULL, 0,
|
|
809
|
-
NULL, 0, *p, len)) != 0) {
|
|
810
|
-
return MBEDTLS_ERR_PK_INVALID_PUBKEY;
|
|
811
|
-
}
|
|
812
|
-
|
|
813
|
-
*p += len;
|
|
814
|
-
|
|
815
|
-
if (mbedtls_rsa_complete(rsa) != 0 ||
|
|
816
|
-
mbedtls_rsa_check_pubkey(rsa) != 0) {
|
|
817
|
-
return MBEDTLS_ERR_PK_INVALID_PUBKEY;
|
|
818
|
-
}
|
|
819
|
-
|
|
820
|
-
if (*p != end) {
|
|
821
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
|
|
822
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
823
|
-
}
|
|
824
|
-
|
|
825
|
-
return 0;
|
|
826
|
-
}
|
|
827
|
-
#endif /* MBEDTLS_RSA_C */
|
|
828
|
-
|
|
829
|
-
/* Get a PK algorithm identifier
|
|
830
|
-
*
|
|
831
|
-
* AlgorithmIdentifier ::= SEQUENCE {
|
|
832
|
-
* algorithm OBJECT IDENTIFIER,
|
|
833
|
-
* parameters ANY DEFINED BY algorithm OPTIONAL }
|
|
834
|
-
*/
|
|
835
|
-
static int pk_get_pk_alg(unsigned char **p,
|
|
836
|
-
const unsigned char *end,
|
|
837
|
-
mbedtls_pk_type_t *pk_alg, mbedtls_asn1_buf *params,
|
|
838
|
-
mbedtls_ecp_group_id *ec_grp_id)
|
|
839
|
-
{
|
|
840
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
841
|
-
mbedtls_asn1_buf alg_oid;
|
|
842
|
-
|
|
843
|
-
memset(params, 0, sizeof(mbedtls_asn1_buf));
|
|
844
|
-
|
|
845
|
-
if ((ret = mbedtls_asn1_get_alg(p, end, &alg_oid, params)) != 0) {
|
|
846
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_ALG, ret);
|
|
847
|
-
}
|
|
848
|
-
|
|
849
|
-
ret = mbedtls_oid_get_pk_alg(&alg_oid, pk_alg);
|
|
850
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
851
|
-
if (ret == MBEDTLS_ERR_OID_NOT_FOUND) {
|
|
852
|
-
ret = mbedtls_oid_get_ec_grp_algid(&alg_oid, ec_grp_id);
|
|
853
|
-
if (ret == 0) {
|
|
854
|
-
*pk_alg = MBEDTLS_PK_ECKEY;
|
|
855
|
-
}
|
|
856
|
-
}
|
|
857
|
-
#else
|
|
858
|
-
(void) ec_grp_id;
|
|
859
|
-
#endif
|
|
860
|
-
if (ret != 0) {
|
|
861
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
862
|
-
}
|
|
863
|
-
|
|
864
|
-
/*
|
|
865
|
-
* No parameters with RSA (only for EC)
|
|
866
|
-
*/
|
|
867
|
-
if (*pk_alg == MBEDTLS_PK_RSA &&
|
|
868
|
-
((params->tag != MBEDTLS_ASN1_NULL && params->tag != 0) ||
|
|
869
|
-
params->len != 0)) {
|
|
870
|
-
return MBEDTLS_ERR_PK_INVALID_ALG;
|
|
871
|
-
}
|
|
872
|
-
|
|
873
|
-
return 0;
|
|
874
|
-
}
|
|
875
|
-
|
|
876
|
-
/*
|
|
877
|
-
* SubjectPublicKeyInfo ::= SEQUENCE {
|
|
878
|
-
* algorithm AlgorithmIdentifier,
|
|
879
|
-
* subjectPublicKey BIT STRING }
|
|
880
|
-
*/
|
|
881
|
-
int mbedtls_pk_parse_subpubkey(unsigned char **p, const unsigned char *end,
|
|
882
|
-
mbedtls_pk_context *pk)
|
|
883
|
-
{
|
|
884
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
885
|
-
size_t len;
|
|
886
|
-
mbedtls_asn1_buf alg_params;
|
|
887
|
-
mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
|
|
888
|
-
mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
|
|
889
|
-
const mbedtls_pk_info_t *pk_info;
|
|
890
|
-
|
|
891
|
-
if ((ret = mbedtls_asn1_get_tag(p, end, &len,
|
|
892
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
893
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
894
|
-
}
|
|
895
|
-
|
|
896
|
-
end = *p + len;
|
|
897
|
-
|
|
898
|
-
if ((ret = pk_get_pk_alg(p, end, &pk_alg, &alg_params, &ec_grp_id)) != 0) {
|
|
899
|
-
return ret;
|
|
900
|
-
}
|
|
901
|
-
|
|
902
|
-
if ((ret = mbedtls_asn1_get_bitstring_null(p, end, &len)) != 0) {
|
|
903
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY, ret);
|
|
904
|
-
}
|
|
905
|
-
|
|
906
|
-
if (*p + len != end) {
|
|
907
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
|
|
908
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
909
|
-
}
|
|
910
|
-
|
|
911
|
-
if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
|
|
912
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
913
|
-
}
|
|
914
|
-
|
|
915
|
-
if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
|
|
916
|
-
return ret;
|
|
917
|
-
}
|
|
918
|
-
|
|
919
|
-
#if defined(MBEDTLS_RSA_C)
|
|
920
|
-
if (pk_alg == MBEDTLS_PK_RSA) {
|
|
921
|
-
ret = pk_get_rsapubkey(p, end, mbedtls_pk_rsa(*pk));
|
|
922
|
-
} else
|
|
923
|
-
#endif /* MBEDTLS_RSA_C */
|
|
924
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
925
|
-
if (pk_alg == MBEDTLS_PK_ECKEY_DH || pk_alg == MBEDTLS_PK_ECKEY) {
|
|
926
|
-
#if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
|
|
927
|
-
if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
|
|
928
|
-
ret = pk_use_ecparams_rfc8410(&alg_params, ec_grp_id, pk);
|
|
929
|
-
} else
|
|
930
|
-
#endif
|
|
931
|
-
{
|
|
932
|
-
ret = pk_use_ecparams(&alg_params, pk);
|
|
933
|
-
}
|
|
934
|
-
if (ret == 0) {
|
|
935
|
-
ret = pk_get_ecpubkey(p, end, pk);
|
|
936
|
-
}
|
|
937
|
-
} else
|
|
938
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
939
|
-
ret = MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
940
|
-
|
|
941
|
-
if (ret == 0 && *p != end) {
|
|
942
|
-
ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
|
|
943
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
944
|
-
}
|
|
945
|
-
|
|
946
|
-
if (ret != 0) {
|
|
947
|
-
mbedtls_pk_free(pk);
|
|
948
|
-
}
|
|
949
|
-
|
|
950
|
-
return ret;
|
|
951
|
-
}
|
|
952
|
-
|
|
953
|
-
#if defined(MBEDTLS_RSA_C)
|
|
954
|
-
/*
|
|
955
|
-
* Wrapper around mbedtls_asn1_get_mpi() that rejects zero.
|
|
956
|
-
*
|
|
957
|
-
* The value zero is:
|
|
958
|
-
* - never a valid value for an RSA parameter
|
|
959
|
-
* - interpreted as "omitted, please reconstruct" by mbedtls_rsa_complete().
|
|
960
|
-
*
|
|
961
|
-
* Since values can't be omitted in PKCS#1, passing a zero value to
|
|
962
|
-
* rsa_complete() would be incorrect, so reject zero values early.
|
|
963
|
-
*/
|
|
964
|
-
static int asn1_get_nonzero_mpi(unsigned char **p,
|
|
965
|
-
const unsigned char *end,
|
|
966
|
-
mbedtls_mpi *X)
|
|
967
|
-
{
|
|
968
|
-
int ret;
|
|
969
|
-
|
|
970
|
-
ret = mbedtls_asn1_get_mpi(p, end, X);
|
|
971
|
-
if (ret != 0) {
|
|
972
|
-
return ret;
|
|
973
|
-
}
|
|
974
|
-
|
|
975
|
-
if (mbedtls_mpi_cmp_int(X, 0) == 0) {
|
|
976
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
977
|
-
}
|
|
978
|
-
|
|
979
|
-
return 0;
|
|
980
|
-
}
|
|
981
|
-
|
|
982
|
-
/*
|
|
983
|
-
* Parse a PKCS#1 encoded private RSA key
|
|
984
|
-
*/
|
|
985
|
-
static int pk_parse_key_pkcs1_der(mbedtls_rsa_context *rsa,
|
|
986
|
-
const unsigned char *key,
|
|
987
|
-
size_t keylen)
|
|
988
|
-
{
|
|
989
|
-
int ret, version;
|
|
990
|
-
size_t len;
|
|
991
|
-
unsigned char *p, *end;
|
|
992
|
-
|
|
993
|
-
mbedtls_mpi T;
|
|
994
|
-
mbedtls_mpi_init(&T);
|
|
995
|
-
|
|
996
|
-
p = (unsigned char *) key;
|
|
997
|
-
end = p + keylen;
|
|
998
|
-
|
|
999
|
-
/*
|
|
1000
|
-
* This function parses the RSAPrivateKey (PKCS#1)
|
|
1001
|
-
*
|
|
1002
|
-
* RSAPrivateKey ::= SEQUENCE {
|
|
1003
|
-
* version Version,
|
|
1004
|
-
* modulus INTEGER, -- n
|
|
1005
|
-
* publicExponent INTEGER, -- e
|
|
1006
|
-
* privateExponent INTEGER, -- d
|
|
1007
|
-
* prime1 INTEGER, -- p
|
|
1008
|
-
* prime2 INTEGER, -- q
|
|
1009
|
-
* exponent1 INTEGER, -- d mod (p-1)
|
|
1010
|
-
* exponent2 INTEGER, -- d mod (q-1)
|
|
1011
|
-
* coefficient INTEGER, -- (inverse of q) mod p
|
|
1012
|
-
* otherPrimeInfos OtherPrimeInfos OPTIONAL
|
|
1013
|
-
* }
|
|
1014
|
-
*/
|
|
1015
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1016
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
1017
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1018
|
-
}
|
|
1019
|
-
|
|
1020
|
-
end = p + len;
|
|
1021
|
-
|
|
1022
|
-
if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
|
|
1023
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1024
|
-
}
|
|
1025
|
-
|
|
1026
|
-
if (version != 0) {
|
|
1027
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
|
|
1028
|
-
}
|
|
1029
|
-
|
|
1030
|
-
/* Import N */
|
|
1031
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1032
|
-
(ret = mbedtls_rsa_import(rsa, &T, NULL, NULL,
|
|
1033
|
-
NULL, NULL)) != 0) {
|
|
1034
|
-
goto cleanup;
|
|
1035
|
-
}
|
|
1036
|
-
|
|
1037
|
-
/* Import E */
|
|
1038
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1039
|
-
(ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
|
|
1040
|
-
NULL, &T)) != 0) {
|
|
1041
|
-
goto cleanup;
|
|
1042
|
-
}
|
|
1043
|
-
|
|
1044
|
-
/* Import D */
|
|
1045
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1046
|
-
(ret = mbedtls_rsa_import(rsa, NULL, NULL, NULL,
|
|
1047
|
-
&T, NULL)) != 0) {
|
|
1048
|
-
goto cleanup;
|
|
1049
|
-
}
|
|
1050
|
-
|
|
1051
|
-
/* Import P */
|
|
1052
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1053
|
-
(ret = mbedtls_rsa_import(rsa, NULL, &T, NULL,
|
|
1054
|
-
NULL, NULL)) != 0) {
|
|
1055
|
-
goto cleanup;
|
|
1056
|
-
}
|
|
1057
|
-
|
|
1058
|
-
/* Import Q */
|
|
1059
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1060
|
-
(ret = mbedtls_rsa_import(rsa, NULL, NULL, &T,
|
|
1061
|
-
NULL, NULL)) != 0) {
|
|
1062
|
-
goto cleanup;
|
|
1063
|
-
}
|
|
1064
|
-
|
|
1065
|
-
#if !defined(MBEDTLS_RSA_NO_CRT) && !defined(MBEDTLS_RSA_ALT)
|
|
1066
|
-
/*
|
|
1067
|
-
* The RSA CRT parameters DP, DQ and QP are nominally redundant, in
|
|
1068
|
-
* that they can be easily recomputed from D, P and Q. However by
|
|
1069
|
-
* parsing them from the PKCS1 structure it is possible to avoid
|
|
1070
|
-
* recalculating them which both reduces the overhead of loading
|
|
1071
|
-
* RSA private keys into memory and also avoids side channels which
|
|
1072
|
-
* can arise when computing those values, since all of D, P, and Q
|
|
1073
|
-
* are secret. See https://eprint.iacr.org/2020/055 for a
|
|
1074
|
-
* description of one such attack.
|
|
1075
|
-
*/
|
|
1076
|
-
|
|
1077
|
-
/* Import DP */
|
|
1078
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1079
|
-
(ret = mbedtls_mpi_copy(&rsa->DP, &T)) != 0) {
|
|
1080
|
-
goto cleanup;
|
|
1081
|
-
}
|
|
1082
|
-
|
|
1083
|
-
/* Import DQ */
|
|
1084
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1085
|
-
(ret = mbedtls_mpi_copy(&rsa->DQ, &T)) != 0) {
|
|
1086
|
-
goto cleanup;
|
|
1087
|
-
}
|
|
1088
|
-
|
|
1089
|
-
/* Import QP */
|
|
1090
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1091
|
-
(ret = mbedtls_mpi_copy(&rsa->QP, &T)) != 0) {
|
|
1092
|
-
goto cleanup;
|
|
1093
|
-
}
|
|
1094
|
-
|
|
1095
|
-
#else
|
|
1096
|
-
/* Verify existence of the CRT params */
|
|
1097
|
-
if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1098
|
-
(ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 ||
|
|
1099
|
-
(ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0) {
|
|
1100
|
-
goto cleanup;
|
|
1101
|
-
}
|
|
1102
|
-
#endif
|
|
1103
|
-
|
|
1104
|
-
/* rsa_complete() doesn't complete anything with the default
|
|
1105
|
-
* implementation but is still called:
|
|
1106
|
-
* - for the benefit of alternative implementation that may want to
|
|
1107
|
-
* pre-compute stuff beyond what's provided (eg Montgomery factors)
|
|
1108
|
-
* - as is also sanity-checks the key
|
|
1109
|
-
*
|
|
1110
|
-
* Furthermore, we also check the public part for consistency with
|
|
1111
|
-
* mbedtls_pk_parse_pubkey(), as it includes size minima for example.
|
|
1112
|
-
*/
|
|
1113
|
-
if ((ret = mbedtls_rsa_complete(rsa)) != 0 ||
|
|
1114
|
-
(ret = mbedtls_rsa_check_pubkey(rsa)) != 0) {
|
|
1115
|
-
goto cleanup;
|
|
1116
|
-
}
|
|
1117
|
-
|
|
1118
|
-
if (p != end) {
|
|
1119
|
-
ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
1120
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
1121
|
-
}
|
|
1122
|
-
|
|
1123
|
-
cleanup:
|
|
1124
|
-
|
|
1125
|
-
mbedtls_mpi_free(&T);
|
|
1126
|
-
|
|
1127
|
-
if (ret != 0) {
|
|
1128
|
-
/* Wrap error code if it's coming from a lower level */
|
|
1129
|
-
if ((ret & 0xff80) == 0) {
|
|
1130
|
-
ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1131
|
-
} else {
|
|
1132
|
-
ret = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
1133
|
-
}
|
|
1134
|
-
|
|
1135
|
-
mbedtls_rsa_free(rsa);
|
|
1136
|
-
}
|
|
1137
|
-
|
|
1138
|
-
return ret;
|
|
1139
|
-
}
|
|
1140
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1141
|
-
|
|
1142
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
1143
|
-
/*
|
|
1144
|
-
* Parse a SEC1 encoded private EC key
|
|
1145
|
-
*/
|
|
1146
|
-
static int pk_parse_key_sec1_der(mbedtls_pk_context *pk,
|
|
1147
|
-
const unsigned char *key, size_t keylen,
|
|
1148
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
1149
|
-
{
|
|
1150
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
1151
|
-
int version, pubkey_done;
|
|
1152
|
-
size_t len, d_len;
|
|
1153
|
-
mbedtls_asn1_buf params = { 0, 0, NULL };
|
|
1154
|
-
unsigned char *p = (unsigned char *) key;
|
|
1155
|
-
unsigned char *d;
|
|
1156
|
-
unsigned char *end = p + keylen;
|
|
1157
|
-
unsigned char *end2;
|
|
1158
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
1159
|
-
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
|
1160
|
-
psa_status_t status;
|
|
1161
|
-
#else /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
1162
|
-
mbedtls_ecp_keypair *eck = mbedtls_pk_ec_rw(*pk);
|
|
1163
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
1164
|
-
|
|
1165
|
-
/*
|
|
1166
|
-
* RFC 5915, or SEC1 Appendix C.4
|
|
1167
|
-
*
|
|
1168
|
-
* ECPrivateKey ::= SEQUENCE {
|
|
1169
|
-
* version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1),
|
|
1170
|
-
* privateKey OCTET STRING,
|
|
1171
|
-
* parameters [0] ECParameters {{ NamedCurve }} OPTIONAL,
|
|
1172
|
-
* publicKey [1] BIT STRING OPTIONAL
|
|
1173
|
-
* }
|
|
1174
|
-
*/
|
|
1175
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1176
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
1177
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1178
|
-
}
|
|
1179
|
-
|
|
1180
|
-
end = p + len;
|
|
1181
|
-
|
|
1182
|
-
if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
|
|
1183
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1184
|
-
}
|
|
1185
|
-
|
|
1186
|
-
if (version != 1) {
|
|
1187
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_VERSION;
|
|
1188
|
-
}
|
|
1189
|
-
|
|
1190
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
|
|
1191
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1192
|
-
}
|
|
1193
|
-
|
|
1194
|
-
/* Keep a reference to the position fo the private key. It will be used
|
|
1195
|
-
* later in this function. */
|
|
1196
|
-
d = p;
|
|
1197
|
-
d_len = len;
|
|
1198
|
-
|
|
1199
|
-
p += len;
|
|
1200
|
-
|
|
1201
|
-
pubkey_done = 0;
|
|
1202
|
-
if (p != end) {
|
|
1203
|
-
/*
|
|
1204
|
-
* Is 'parameters' present?
|
|
1205
|
-
*/
|
|
1206
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1207
|
-
MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
|
|
1208
|
-
0)) == 0) {
|
|
1209
|
-
if ((ret = pk_get_ecparams(&p, p + len, ¶ms)) != 0 ||
|
|
1210
|
-
(ret = pk_use_ecparams(¶ms, pk)) != 0) {
|
|
1211
|
-
return ret;
|
|
1212
|
-
}
|
|
1213
|
-
} else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
|
|
1214
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1215
|
-
}
|
|
1216
|
-
}
|
|
1217
|
-
|
|
1218
|
-
|
|
1219
|
-
#if !defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
1220
|
-
if ((ret = mbedtls_ecp_read_key(eck->grp.id, eck, d, d_len)) != 0) {
|
|
1221
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1222
|
-
}
|
|
1223
|
-
#endif
|
|
1224
|
-
|
|
1225
|
-
if (p != end) {
|
|
1226
|
-
/*
|
|
1227
|
-
* Is 'publickey' present? If not, or if we can't read it (eg because it
|
|
1228
|
-
* is compressed), create it from the private key.
|
|
1229
|
-
*/
|
|
1230
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1231
|
-
MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED |
|
|
1232
|
-
1)) == 0) {
|
|
1233
|
-
end2 = p + len;
|
|
1234
|
-
|
|
1235
|
-
if ((ret = mbedtls_asn1_get_bitstring_null(&p, end2, &len)) != 0) {
|
|
1236
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1237
|
-
}
|
|
1238
|
-
|
|
1239
|
-
if (p + len != end2) {
|
|
1240
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
1241
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
1242
|
-
}
|
|
1243
|
-
|
|
1244
|
-
if ((ret = pk_get_ecpubkey(&p, end2, pk)) == 0) {
|
|
1245
|
-
pubkey_done = 1;
|
|
1246
|
-
} else {
|
|
1247
|
-
/*
|
|
1248
|
-
* The only acceptable failure mode of pk_get_ecpubkey() above
|
|
1249
|
-
* is if the point format is not recognized.
|
|
1250
|
-
*/
|
|
1251
|
-
if (ret != MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE) {
|
|
1252
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
1253
|
-
}
|
|
1254
|
-
}
|
|
1255
|
-
} else if (ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG) {
|
|
1256
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1257
|
-
}
|
|
1258
|
-
}
|
|
1259
|
-
|
|
1260
|
-
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
1261
|
-
psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_KEY_PAIR(pk->ec_family));
|
|
1262
|
-
/* Setting largest masks for usage and key algorithms */
|
|
1263
|
-
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH |
|
|
1264
|
-
PSA_KEY_USAGE_SIGN_MESSAGE |
|
|
1265
|
-
PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_DERIVE);
|
|
1266
|
-
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
|
|
1267
|
-
psa_set_key_algorithm(&attributes,
|
|
1268
|
-
PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_ANY_HASH));
|
|
1269
|
-
#else
|
|
1270
|
-
psa_set_key_algorithm(&attributes, PSA_ALG_ECDSA(PSA_ALG_ANY_HASH));
|
|
1271
|
-
#endif
|
|
1272
|
-
psa_set_key_enrollment_algorithm(&attributes, PSA_ALG_ECDH);
|
|
1273
|
-
|
|
1274
|
-
status = psa_import_key(&attributes, d, d_len, &pk->priv_id);
|
|
1275
|
-
if (status != PSA_SUCCESS) {
|
|
1276
|
-
ret = psa_pk_status_to_mbedtls(status);
|
|
1277
|
-
return ret;
|
|
1278
|
-
}
|
|
1279
|
-
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
1280
|
-
|
|
1281
|
-
if (!pubkey_done) {
|
|
1282
|
-
if ((ret = pk_derive_public_key(pk, d, d_len, f_rng, p_rng)) != 0) {
|
|
1283
|
-
return ret;
|
|
1284
|
-
}
|
|
1285
|
-
}
|
|
1286
|
-
|
|
1287
|
-
return 0;
|
|
1288
|
-
}
|
|
1289
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
1290
|
-
|
|
1291
|
-
/*
|
|
1292
|
-
* Parse an unencrypted PKCS#8 encoded private key
|
|
1293
|
-
*
|
|
1294
|
-
* Notes:
|
|
1295
|
-
*
|
|
1296
|
-
* - This function does not own the key buffer. It is the
|
|
1297
|
-
* responsibility of the caller to take care of zeroizing
|
|
1298
|
-
* and freeing it after use.
|
|
1299
|
-
*
|
|
1300
|
-
* - The function is responsible for freeing the provided
|
|
1301
|
-
* PK context on failure.
|
|
1302
|
-
*
|
|
1303
|
-
*/
|
|
1304
|
-
static int pk_parse_key_pkcs8_unencrypted_der(
|
|
1305
|
-
mbedtls_pk_context *pk,
|
|
1306
|
-
const unsigned char *key, size_t keylen,
|
|
1307
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
1308
|
-
{
|
|
1309
|
-
int ret, version;
|
|
1310
|
-
size_t len;
|
|
1311
|
-
mbedtls_asn1_buf params;
|
|
1312
|
-
unsigned char *p = (unsigned char *) key;
|
|
1313
|
-
unsigned char *end = p + keylen;
|
|
1314
|
-
mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
|
|
1315
|
-
mbedtls_ecp_group_id ec_grp_id = MBEDTLS_ECP_DP_NONE;
|
|
1316
|
-
const mbedtls_pk_info_t *pk_info;
|
|
1317
|
-
|
|
1318
|
-
#if !defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
1319
|
-
(void) f_rng;
|
|
1320
|
-
(void) p_rng;
|
|
1321
|
-
#endif
|
|
1322
|
-
|
|
1323
|
-
/*
|
|
1324
|
-
* This function parses the PrivateKeyInfo object (PKCS#8 v1.2 = RFC 5208)
|
|
1325
|
-
*
|
|
1326
|
-
* PrivateKeyInfo ::= SEQUENCE {
|
|
1327
|
-
* version Version,
|
|
1328
|
-
* privateKeyAlgorithm PrivateKeyAlgorithmIdentifier,
|
|
1329
|
-
* privateKey PrivateKey,
|
|
1330
|
-
* attributes [0] IMPLICIT Attributes OPTIONAL }
|
|
1331
|
-
*
|
|
1332
|
-
* Version ::= INTEGER
|
|
1333
|
-
* PrivateKeyAlgorithmIdentifier ::= AlgorithmIdentifier
|
|
1334
|
-
* PrivateKey ::= OCTET STRING
|
|
1335
|
-
*
|
|
1336
|
-
* The PrivateKey OCTET STRING is a SEC1 ECPrivateKey
|
|
1337
|
-
*/
|
|
1338
|
-
|
|
1339
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1340
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
1341
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1342
|
-
}
|
|
1343
|
-
|
|
1344
|
-
end = p + len;
|
|
1345
|
-
|
|
1346
|
-
if ((ret = mbedtls_asn1_get_int(&p, end, &version)) != 0) {
|
|
1347
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1348
|
-
}
|
|
1349
|
-
|
|
1350
|
-
if (version != 0) {
|
|
1351
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_VERSION, ret);
|
|
1352
|
-
}
|
|
1353
|
-
|
|
1354
|
-
if ((ret = pk_get_pk_alg(&p, end, &pk_alg, ¶ms, &ec_grp_id)) != 0) {
|
|
1355
|
-
return ret;
|
|
1356
|
-
}
|
|
1357
|
-
|
|
1358
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
|
|
1359
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1360
|
-
}
|
|
1361
|
-
|
|
1362
|
-
if (len < 1) {
|
|
1363
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
1364
|
-
MBEDTLS_ERR_ASN1_OUT_OF_DATA);
|
|
1365
|
-
}
|
|
1366
|
-
|
|
1367
|
-
if ((pk_info = mbedtls_pk_info_from_type(pk_alg)) == NULL) {
|
|
1368
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
1369
|
-
}
|
|
1370
|
-
|
|
1371
|
-
if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0) {
|
|
1372
|
-
return ret;
|
|
1373
|
-
}
|
|
1374
|
-
|
|
1375
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1376
|
-
if (pk_alg == MBEDTLS_PK_RSA) {
|
|
1377
|
-
if ((ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), p, len)) != 0) {
|
|
1378
|
-
mbedtls_pk_free(pk);
|
|
1379
|
-
return ret;
|
|
1380
|
-
}
|
|
1381
|
-
} else
|
|
1382
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1383
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
1384
|
-
if (pk_alg == MBEDTLS_PK_ECKEY || pk_alg == MBEDTLS_PK_ECKEY_DH) {
|
|
1385
|
-
#if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES)
|
|
1386
|
-
if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) {
|
|
1387
|
-
if ((ret =
|
|
1388
|
-
pk_use_ecparams_rfc8410(¶ms, ec_grp_id, pk)) != 0 ||
|
|
1389
|
-
(ret =
|
|
1390
|
-
pk_parse_key_rfc8410_der(pk, p, len, end, f_rng,
|
|
1391
|
-
p_rng)) != 0) {
|
|
1392
|
-
mbedtls_pk_free(pk);
|
|
1393
|
-
return ret;
|
|
1394
|
-
}
|
|
1395
|
-
} else
|
|
1396
|
-
#endif
|
|
1397
|
-
{
|
|
1398
|
-
if ((ret = pk_use_ecparams(¶ms, pk)) != 0 ||
|
|
1399
|
-
(ret = pk_parse_key_sec1_der(pk, p, len, f_rng, p_rng)) != 0) {
|
|
1400
|
-
mbedtls_pk_free(pk);
|
|
1401
|
-
return ret;
|
|
1402
|
-
}
|
|
1403
|
-
}
|
|
1404
|
-
} else
|
|
1405
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
1406
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
1407
|
-
|
|
1408
|
-
end = p + len;
|
|
1409
|
-
if (end != (key + keylen)) {
|
|
1410
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT,
|
|
1411
|
-
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
|
|
1412
|
-
}
|
|
1413
|
-
|
|
1414
|
-
return 0;
|
|
1415
|
-
}
|
|
1416
|
-
|
|
1417
|
-
/*
|
|
1418
|
-
* Parse an encrypted PKCS#8 encoded private key
|
|
1419
|
-
*
|
|
1420
|
-
* To save space, the decryption happens in-place on the given key buffer.
|
|
1421
|
-
* Also, while this function may modify the keybuffer, it doesn't own it,
|
|
1422
|
-
* and instead it is the responsibility of the caller to zeroize and properly
|
|
1423
|
-
* free it after use.
|
|
1424
|
-
*
|
|
1425
|
-
*/
|
|
1426
|
-
#if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
|
|
1427
|
-
MBEDTLS_STATIC_TESTABLE int mbedtls_pk_parse_key_pkcs8_encrypted_der(
|
|
1428
|
-
mbedtls_pk_context *pk,
|
|
1429
|
-
unsigned char *key, size_t keylen,
|
|
1430
|
-
const unsigned char *pwd, size_t pwdlen,
|
|
1431
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
1432
|
-
{
|
|
1433
|
-
int ret, decrypted = 0;
|
|
1434
|
-
size_t len;
|
|
1435
|
-
unsigned char *buf;
|
|
1436
|
-
unsigned char *p, *end;
|
|
1437
|
-
mbedtls_asn1_buf pbe_alg_oid, pbe_params;
|
|
1438
|
-
#if defined(MBEDTLS_PKCS12_C)
|
|
1439
|
-
mbedtls_cipher_type_t cipher_alg;
|
|
1440
|
-
mbedtls_md_type_t md_alg;
|
|
1441
|
-
#endif
|
|
1442
|
-
size_t outlen = 0;
|
|
1443
|
-
|
|
1444
|
-
p = key;
|
|
1445
|
-
end = p + keylen;
|
|
1446
|
-
|
|
1447
|
-
if (pwdlen == 0) {
|
|
1448
|
-
return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
|
|
1449
|
-
}
|
|
1450
|
-
|
|
1451
|
-
/*
|
|
1452
|
-
* This function parses the EncryptedPrivateKeyInfo object (PKCS#8)
|
|
1453
|
-
*
|
|
1454
|
-
* EncryptedPrivateKeyInfo ::= SEQUENCE {
|
|
1455
|
-
* encryptionAlgorithm EncryptionAlgorithmIdentifier,
|
|
1456
|
-
* encryptedData EncryptedData
|
|
1457
|
-
* }
|
|
1458
|
-
*
|
|
1459
|
-
* EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
|
|
1460
|
-
*
|
|
1461
|
-
* EncryptedData ::= OCTET STRING
|
|
1462
|
-
*
|
|
1463
|
-
* The EncryptedData OCTET STRING is a PKCS#8 PrivateKeyInfo
|
|
1464
|
-
*
|
|
1465
|
-
*/
|
|
1466
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
|
|
1467
|
-
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
|
|
1468
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1469
|
-
}
|
|
1470
|
-
|
|
1471
|
-
end = p + len;
|
|
1472
|
-
|
|
1473
|
-
if ((ret = mbedtls_asn1_get_alg(&p, end, &pbe_alg_oid, &pbe_params)) != 0) {
|
|
1474
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1475
|
-
}
|
|
1476
|
-
|
|
1477
|
-
if ((ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) {
|
|
1478
|
-
return MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_KEY_INVALID_FORMAT, ret);
|
|
1479
|
-
}
|
|
1480
|
-
|
|
1481
|
-
buf = p;
|
|
1482
|
-
|
|
1483
|
-
/*
|
|
1484
|
-
* Decrypt EncryptedData with appropriate PBE
|
|
1485
|
-
*/
|
|
1486
|
-
#if defined(MBEDTLS_PKCS12_C)
|
|
1487
|
-
if (mbedtls_oid_get_pkcs12_pbe_alg(&pbe_alg_oid, &md_alg, &cipher_alg) == 0) {
|
|
1488
|
-
if ((ret = mbedtls_pkcs12_pbe_ext(&pbe_params, MBEDTLS_PKCS12_PBE_DECRYPT,
|
|
1489
|
-
cipher_alg, md_alg,
|
|
1490
|
-
pwd, pwdlen, p, len, buf, len, &outlen)) != 0) {
|
|
1491
|
-
if (ret == MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH) {
|
|
1492
|
-
return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
|
|
1493
|
-
}
|
|
1494
|
-
|
|
1495
|
-
return ret;
|
|
1496
|
-
}
|
|
1497
|
-
|
|
1498
|
-
decrypted = 1;
|
|
1499
|
-
} else
|
|
1500
|
-
#endif /* MBEDTLS_PKCS12_C */
|
|
1501
|
-
#if defined(MBEDTLS_PKCS5_C)
|
|
1502
|
-
if (MBEDTLS_OID_CMP(MBEDTLS_OID_PKCS5_PBES2, &pbe_alg_oid) == 0) {
|
|
1503
|
-
if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen,
|
|
1504
|
-
p, len, buf, len, &outlen)) != 0) {
|
|
1505
|
-
if (ret == MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH) {
|
|
1506
|
-
return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
|
|
1507
|
-
}
|
|
1508
|
-
|
|
1509
|
-
return ret;
|
|
1510
|
-
}
|
|
1511
|
-
|
|
1512
|
-
decrypted = 1;
|
|
1513
|
-
} else
|
|
1514
|
-
#endif /* MBEDTLS_PKCS5_C */
|
|
1515
|
-
{
|
|
1516
|
-
((void) pwd);
|
|
1517
|
-
}
|
|
1518
|
-
|
|
1519
|
-
if (decrypted == 0) {
|
|
1520
|
-
return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
|
|
1521
|
-
}
|
|
1522
|
-
return pk_parse_key_pkcs8_unencrypted_der(pk, buf, outlen, f_rng, p_rng);
|
|
1523
|
-
}
|
|
1524
|
-
#endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
|
|
1525
|
-
|
|
1526
|
-
/*
|
|
1527
|
-
* Parse a private key
|
|
1528
|
-
*/
|
|
1529
|
-
int mbedtls_pk_parse_key(mbedtls_pk_context *pk,
|
|
1530
|
-
const unsigned char *key, size_t keylen,
|
|
1531
|
-
const unsigned char *pwd, size_t pwdlen,
|
|
1532
|
-
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
|
|
1533
|
-
{
|
|
1534
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
1535
|
-
const mbedtls_pk_info_t *pk_info;
|
|
1536
|
-
#if defined(MBEDTLS_PEM_PARSE_C)
|
|
1537
|
-
size_t len;
|
|
1538
|
-
mbedtls_pem_context pem;
|
|
1539
|
-
#endif
|
|
1540
|
-
|
|
1541
|
-
if (keylen == 0) {
|
|
1542
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
1543
|
-
}
|
|
1544
|
-
|
|
1545
|
-
#if defined(MBEDTLS_PEM_PARSE_C)
|
|
1546
|
-
mbedtls_pem_init(&pem);
|
|
1547
|
-
|
|
1548
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1549
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1550
|
-
if (key[keylen - 1] != '\0') {
|
|
1551
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1552
|
-
} else {
|
|
1553
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1554
|
-
"-----BEGIN RSA PRIVATE KEY-----",
|
|
1555
|
-
"-----END RSA PRIVATE KEY-----",
|
|
1556
|
-
key, pwd, pwdlen, &len);
|
|
1557
|
-
}
|
|
1558
|
-
|
|
1559
|
-
if (ret == 0) {
|
|
1560
|
-
pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
|
|
1561
|
-
if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
|
|
1562
|
-
(ret = pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk),
|
|
1563
|
-
pem.buf, pem.buflen)) != 0) {
|
|
1564
|
-
mbedtls_pk_free(pk);
|
|
1565
|
-
}
|
|
1566
|
-
|
|
1567
|
-
mbedtls_pem_free(&pem);
|
|
1568
|
-
return ret;
|
|
1569
|
-
} else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
|
|
1570
|
-
return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
|
|
1571
|
-
} else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
|
|
1572
|
-
return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
|
|
1573
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1574
|
-
return ret;
|
|
1575
|
-
}
|
|
1576
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1577
|
-
|
|
1578
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
1579
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1580
|
-
if (key[keylen - 1] != '\0') {
|
|
1581
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1582
|
-
} else {
|
|
1583
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1584
|
-
"-----BEGIN EC PRIVATE KEY-----",
|
|
1585
|
-
"-----END EC PRIVATE KEY-----",
|
|
1586
|
-
key, pwd, pwdlen, &len);
|
|
1587
|
-
}
|
|
1588
|
-
if (ret == 0) {
|
|
1589
|
-
pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
|
|
1590
|
-
|
|
1591
|
-
if ((ret = mbedtls_pk_setup(pk, pk_info)) != 0 ||
|
|
1592
|
-
(ret = pk_parse_key_sec1_der(pk,
|
|
1593
|
-
pem.buf, pem.buflen,
|
|
1594
|
-
f_rng, p_rng)) != 0) {
|
|
1595
|
-
mbedtls_pk_free(pk);
|
|
1596
|
-
}
|
|
1597
|
-
|
|
1598
|
-
mbedtls_pem_free(&pem);
|
|
1599
|
-
return ret;
|
|
1600
|
-
} else if (ret == MBEDTLS_ERR_PEM_PASSWORD_MISMATCH) {
|
|
1601
|
-
return MBEDTLS_ERR_PK_PASSWORD_MISMATCH;
|
|
1602
|
-
} else if (ret == MBEDTLS_ERR_PEM_PASSWORD_REQUIRED) {
|
|
1603
|
-
return MBEDTLS_ERR_PK_PASSWORD_REQUIRED;
|
|
1604
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1605
|
-
return ret;
|
|
1606
|
-
}
|
|
1607
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
1608
|
-
|
|
1609
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1610
|
-
if (key[keylen - 1] != '\0') {
|
|
1611
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1612
|
-
} else {
|
|
1613
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1614
|
-
"-----BEGIN PRIVATE KEY-----",
|
|
1615
|
-
"-----END PRIVATE KEY-----",
|
|
1616
|
-
key, NULL, 0, &len);
|
|
1617
|
-
}
|
|
1618
|
-
if (ret == 0) {
|
|
1619
|
-
if ((ret = pk_parse_key_pkcs8_unencrypted_der(pk,
|
|
1620
|
-
pem.buf, pem.buflen, f_rng, p_rng)) != 0) {
|
|
1621
|
-
mbedtls_pk_free(pk);
|
|
1622
|
-
}
|
|
1623
|
-
|
|
1624
|
-
mbedtls_pem_free(&pem);
|
|
1625
|
-
return ret;
|
|
1626
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1627
|
-
return ret;
|
|
1628
|
-
}
|
|
1629
|
-
|
|
1630
|
-
#if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
|
|
1631
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1632
|
-
if (key[keylen - 1] != '\0') {
|
|
1633
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1634
|
-
} else {
|
|
1635
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1636
|
-
"-----BEGIN ENCRYPTED PRIVATE KEY-----",
|
|
1637
|
-
"-----END ENCRYPTED PRIVATE KEY-----",
|
|
1638
|
-
key, NULL, 0, &len);
|
|
1639
|
-
}
|
|
1640
|
-
if (ret == 0) {
|
|
1641
|
-
if ((ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, pem.buf, pem.buflen,
|
|
1642
|
-
pwd, pwdlen, f_rng, p_rng)) != 0) {
|
|
1643
|
-
mbedtls_pk_free(pk);
|
|
1644
|
-
}
|
|
1645
|
-
|
|
1646
|
-
mbedtls_pem_free(&pem);
|
|
1647
|
-
return ret;
|
|
1648
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1649
|
-
return ret;
|
|
1650
|
-
}
|
|
1651
|
-
#endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
|
|
1652
|
-
#else
|
|
1653
|
-
((void) pwd);
|
|
1654
|
-
((void) pwdlen);
|
|
1655
|
-
#endif /* MBEDTLS_PEM_PARSE_C */
|
|
1656
|
-
|
|
1657
|
-
/*
|
|
1658
|
-
* At this point we only know it's not a PEM formatted key. Could be any
|
|
1659
|
-
* of the known DER encoded private key formats
|
|
1660
|
-
*
|
|
1661
|
-
* We try the different DER format parsers to see if one passes without
|
|
1662
|
-
* error
|
|
1663
|
-
*/
|
|
1664
|
-
#if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
|
|
1665
|
-
if (pwdlen != 0) {
|
|
1666
|
-
unsigned char *key_copy;
|
|
1667
|
-
|
|
1668
|
-
if ((key_copy = mbedtls_calloc(1, keylen)) == NULL) {
|
|
1669
|
-
return MBEDTLS_ERR_PK_ALLOC_FAILED;
|
|
1670
|
-
}
|
|
1671
|
-
|
|
1672
|
-
memcpy(key_copy, key, keylen);
|
|
1673
|
-
|
|
1674
|
-
ret = mbedtls_pk_parse_key_pkcs8_encrypted_der(pk, key_copy, keylen,
|
|
1675
|
-
pwd, pwdlen, f_rng, p_rng);
|
|
1676
|
-
|
|
1677
|
-
mbedtls_zeroize_and_free(key_copy, keylen);
|
|
1678
|
-
}
|
|
1679
|
-
|
|
1680
|
-
if (ret == 0) {
|
|
1681
|
-
return 0;
|
|
1682
|
-
}
|
|
1683
|
-
|
|
1684
|
-
mbedtls_pk_free(pk);
|
|
1685
|
-
mbedtls_pk_init(pk);
|
|
1686
|
-
|
|
1687
|
-
if (ret == MBEDTLS_ERR_PK_PASSWORD_MISMATCH) {
|
|
1688
|
-
return ret;
|
|
1689
|
-
}
|
|
1690
|
-
#endif /* MBEDTLS_PKCS12_C || MBEDTLS_PKCS5_C */
|
|
1691
|
-
|
|
1692
|
-
ret = pk_parse_key_pkcs8_unencrypted_der(pk, key, keylen, f_rng, p_rng);
|
|
1693
|
-
if (ret == 0) {
|
|
1694
|
-
return 0;
|
|
1695
|
-
}
|
|
1696
|
-
|
|
1697
|
-
mbedtls_pk_free(pk);
|
|
1698
|
-
mbedtls_pk_init(pk);
|
|
1699
|
-
|
|
1700
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1701
|
-
|
|
1702
|
-
pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA);
|
|
1703
|
-
if (mbedtls_pk_setup(pk, pk_info) == 0 &&
|
|
1704
|
-
pk_parse_key_pkcs1_der(mbedtls_pk_rsa(*pk), key, keylen) == 0) {
|
|
1705
|
-
return 0;
|
|
1706
|
-
}
|
|
1707
|
-
|
|
1708
|
-
mbedtls_pk_free(pk);
|
|
1709
|
-
mbedtls_pk_init(pk);
|
|
1710
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1711
|
-
|
|
1712
|
-
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
|
1713
|
-
pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY);
|
|
1714
|
-
if (mbedtls_pk_setup(pk, pk_info) == 0 &&
|
|
1715
|
-
pk_parse_key_sec1_der(pk,
|
|
1716
|
-
key, keylen, f_rng, p_rng) == 0) {
|
|
1717
|
-
return 0;
|
|
1718
|
-
}
|
|
1719
|
-
mbedtls_pk_free(pk);
|
|
1720
|
-
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
|
1721
|
-
|
|
1722
|
-
/* If MBEDTLS_RSA_C is defined but MBEDTLS_PK_HAVE_ECC_KEYS isn't,
|
|
1723
|
-
* it is ok to leave the PK context initialized but not
|
|
1724
|
-
* freed: It is the caller's responsibility to call pk_init()
|
|
1725
|
-
* before calling this function, and to call pk_free()
|
|
1726
|
-
* when it fails. If MBEDTLS_PK_HAVE_ECC_KEYS is defined but MBEDTLS_RSA_C
|
|
1727
|
-
* isn't, this leads to mbedtls_pk_free() being called
|
|
1728
|
-
* twice, once here and once by the caller, but this is
|
|
1729
|
-
* also ok and in line with the mbedtls_pk_free() calls
|
|
1730
|
-
* on failed PEM parsing attempts. */
|
|
1731
|
-
|
|
1732
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
1733
|
-
}
|
|
1734
|
-
|
|
1735
|
-
/*
|
|
1736
|
-
* Parse a public key
|
|
1737
|
-
*/
|
|
1738
|
-
int mbedtls_pk_parse_public_key(mbedtls_pk_context *ctx,
|
|
1739
|
-
const unsigned char *key, size_t keylen)
|
|
1740
|
-
{
|
|
1741
|
-
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
1742
|
-
unsigned char *p;
|
|
1743
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1744
|
-
const mbedtls_pk_info_t *pk_info;
|
|
1745
|
-
#endif
|
|
1746
|
-
#if defined(MBEDTLS_PEM_PARSE_C)
|
|
1747
|
-
size_t len;
|
|
1748
|
-
mbedtls_pem_context pem;
|
|
1749
|
-
#endif
|
|
1750
|
-
|
|
1751
|
-
if (keylen == 0) {
|
|
1752
|
-
return MBEDTLS_ERR_PK_KEY_INVALID_FORMAT;
|
|
1753
|
-
}
|
|
1754
|
-
|
|
1755
|
-
#if defined(MBEDTLS_PEM_PARSE_C)
|
|
1756
|
-
mbedtls_pem_init(&pem);
|
|
1757
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1758
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1759
|
-
if (key[keylen - 1] != '\0') {
|
|
1760
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1761
|
-
} else {
|
|
1762
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1763
|
-
"-----BEGIN RSA PUBLIC KEY-----",
|
|
1764
|
-
"-----END RSA PUBLIC KEY-----",
|
|
1765
|
-
key, NULL, 0, &len);
|
|
1766
|
-
}
|
|
1767
|
-
|
|
1768
|
-
if (ret == 0) {
|
|
1769
|
-
p = pem.buf;
|
|
1770
|
-
if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
|
|
1771
|
-
mbedtls_pem_free(&pem);
|
|
1772
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
1773
|
-
}
|
|
1774
|
-
|
|
1775
|
-
if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
|
|
1776
|
-
mbedtls_pem_free(&pem);
|
|
1777
|
-
return ret;
|
|
1778
|
-
}
|
|
1779
|
-
|
|
1780
|
-
if ((ret = pk_get_rsapubkey(&p, p + pem.buflen, mbedtls_pk_rsa(*ctx))) != 0) {
|
|
1781
|
-
mbedtls_pk_free(ctx);
|
|
1782
|
-
}
|
|
1783
|
-
|
|
1784
|
-
mbedtls_pem_free(&pem);
|
|
1785
|
-
return ret;
|
|
1786
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1787
|
-
mbedtls_pem_free(&pem);
|
|
1788
|
-
return ret;
|
|
1789
|
-
}
|
|
1790
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1791
|
-
|
|
1792
|
-
/* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */
|
|
1793
|
-
if (key[keylen - 1] != '\0') {
|
|
1794
|
-
ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
|
|
1795
|
-
} else {
|
|
1796
|
-
ret = mbedtls_pem_read_buffer(&pem,
|
|
1797
|
-
"-----BEGIN PUBLIC KEY-----",
|
|
1798
|
-
"-----END PUBLIC KEY-----",
|
|
1799
|
-
key, NULL, 0, &len);
|
|
1800
|
-
}
|
|
1801
|
-
|
|
1802
|
-
if (ret == 0) {
|
|
1803
|
-
/*
|
|
1804
|
-
* Was PEM encoded
|
|
1805
|
-
*/
|
|
1806
|
-
p = pem.buf;
|
|
1807
|
-
|
|
1808
|
-
ret = mbedtls_pk_parse_subpubkey(&p, p + pem.buflen, ctx);
|
|
1809
|
-
mbedtls_pem_free(&pem);
|
|
1810
|
-
return ret;
|
|
1811
|
-
} else if (ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT) {
|
|
1812
|
-
mbedtls_pem_free(&pem);
|
|
1813
|
-
return ret;
|
|
1814
|
-
}
|
|
1815
|
-
mbedtls_pem_free(&pem);
|
|
1816
|
-
#endif /* MBEDTLS_PEM_PARSE_C */
|
|
1817
|
-
|
|
1818
|
-
#if defined(MBEDTLS_RSA_C)
|
|
1819
|
-
if ((pk_info = mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == NULL) {
|
|
1820
|
-
return MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
|
|
1821
|
-
}
|
|
1822
|
-
|
|
1823
|
-
if ((ret = mbedtls_pk_setup(ctx, pk_info)) != 0) {
|
|
1824
|
-
return ret;
|
|
1825
|
-
}
|
|
1826
|
-
|
|
1827
|
-
p = (unsigned char *) key;
|
|
1828
|
-
ret = pk_get_rsapubkey(&p, p + keylen, mbedtls_pk_rsa(*ctx));
|
|
1829
|
-
if (ret == 0) {
|
|
1830
|
-
return ret;
|
|
1831
|
-
}
|
|
1832
|
-
mbedtls_pk_free(ctx);
|
|
1833
|
-
if (ret != (MBEDTLS_ERROR_ADD(MBEDTLS_ERR_PK_INVALID_PUBKEY,
|
|
1834
|
-
MBEDTLS_ERR_ASN1_UNEXPECTED_TAG))) {
|
|
1835
|
-
return ret;
|
|
1836
|
-
}
|
|
1837
|
-
#endif /* MBEDTLS_RSA_C */
|
|
1838
|
-
p = (unsigned char *) key;
|
|
1839
|
-
|
|
1840
|
-
ret = mbedtls_pk_parse_subpubkey(&p, p + keylen, ctx);
|
|
1841
|
-
|
|
1842
|
-
return ret;
|
|
1843
|
-
}
|
|
1844
|
-
|
|
1845
|
-
#endif /* MBEDTLS_PK_PARSE_C */
|