Null terminate pdkim string. Fixes: #985
[exim.git] / src / src / pdkim / rsa.h
CommitLineData
80a47a2c
TK
1/**
2 * \file rsa.h
3 *
67932e54
TK
4 * Copyright (C) 2006-2009, Paul Bakker <polarssl_maintainer at polarssl.org>
5 * All rights reserved.
80a47a2c 6 *
67932e54 7 * Joined copyright on original XySSL code with: Christophe Devine
80a47a2c
TK
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, write to the Free Software Foundation, Inc.,
21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
22 */
23
67932e54 24/* $Cambridge: exim/src/src/pdkim/rsa.h,v 1.3 2009/12/07 13:05:07 tom Exp $ */
80a47a2c
TK
25
26#ifndef POLARSSL_RSA_H
27#define POLARSSL_RSA_H
28
29#include "bignum.h"
30
67932e54
TK
31/*
32 * RSA Error codes
33 */
80a47a2c
TK
34#define POLARSSL_ERR_RSA_BAD_INPUT_DATA -0x0400
35#define POLARSSL_ERR_RSA_INVALID_PADDING -0x0410
36#define POLARSSL_ERR_RSA_KEY_GEN_FAILED -0x0420
37#define POLARSSL_ERR_RSA_KEY_CHECK_FAILED -0x0430
38#define POLARSSL_ERR_RSA_PUBLIC_FAILED -0x0440
39#define POLARSSL_ERR_RSA_PRIVATE_FAILED -0x0450
40#define POLARSSL_ERR_RSA_VERIFY_FAILED -0x0460
67932e54 41#define POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE -0x0470
80a47a2c 42
67932e54
TK
43/* *************** begin copy from x509.h ************************/
44/*
45 * ASN1 Error codes
46 *
47 * These error codes will be OR'ed to X509 error codes for
48 * higher error granularity.
49 */
50#define POLARSSL_ERR_ASN1_OUT_OF_DATA 0x0014
51#define POLARSSL_ERR_ASN1_UNEXPECTED_TAG 0x0016
52#define POLARSSL_ERR_ASN1_INVALID_LENGTH 0x0018
53#define POLARSSL_ERR_ASN1_LENGTH_MISMATCH 0x001A
54#define POLARSSL_ERR_ASN1_INVALID_DATA 0x001C
80a47a2c 55
67932e54
TK
56/*
57 * X509 Error codes
58 */
80a47a2c
TK
59#define POLARSSL_ERR_X509_FEATURE_UNAVAILABLE -0x0020
60#define POLARSSL_ERR_X509_CERT_INVALID_PEM -0x0040
61#define POLARSSL_ERR_X509_CERT_INVALID_FORMAT -0x0060
62#define POLARSSL_ERR_X509_CERT_INVALID_VERSION -0x0080
63#define POLARSSL_ERR_X509_CERT_INVALID_SERIAL -0x00A0
64#define POLARSSL_ERR_X509_CERT_INVALID_ALG -0x00C0
65#define POLARSSL_ERR_X509_CERT_INVALID_NAME -0x00E0
66#define POLARSSL_ERR_X509_CERT_INVALID_DATE -0x0100
67#define POLARSSL_ERR_X509_CERT_INVALID_PUBKEY -0x0120
68#define POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE -0x0140
69#define POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS -0x0160
70#define POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION -0x0180
71#define POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG -0x01A0
72#define POLARSSL_ERR_X509_CERT_UNKNOWN_PK_ALG -0x01C0
73#define POLARSSL_ERR_X509_CERT_SIG_MISMATCH -0x01E0
74#define POLARSSL_ERR_X509_CERT_VERIFY_FAILED -0x0200
75#define POLARSSL_ERR_X509_KEY_INVALID_PEM -0x0220
76#define POLARSSL_ERR_X509_KEY_INVALID_VERSION -0x0240
77#define POLARSSL_ERR_X509_KEY_INVALID_FORMAT -0x0260
78#define POLARSSL_ERR_X509_KEY_INVALID_ENC_IV -0x0280
79#define POLARSSL_ERR_X509_KEY_UNKNOWN_ENC_ALG -0x02A0
80#define POLARSSL_ERR_X509_KEY_PASSWORD_REQUIRED -0x02C0
81#define POLARSSL_ERR_X509_KEY_PASSWORD_MISMATCH -0x02E0
82#define POLARSSL_ERR_X509_POINT_ERROR -0x0300
83#define POLARSSL_ERR_X509_VALUE_TO_LENGTH -0x0320
84
85/*
86 * DER constants
87 */
88#define ASN1_BOOLEAN 0x01
89#define ASN1_INTEGER 0x02
90#define ASN1_BIT_STRING 0x03
91#define ASN1_OCTET_STRING 0x04
92#define ASN1_NULL 0x05
93#define ASN1_OID 0x06
94#define ASN1_UTF8_STRING 0x0C
95#define ASN1_SEQUENCE 0x10
96#define ASN1_SET 0x11
97#define ASN1_PRINTABLE_STRING 0x13
98#define ASN1_T61_STRING 0x14
99#define ASN1_IA5_STRING 0x16
100#define ASN1_UTC_TIME 0x17
101#define ASN1_UNIVERSAL_STRING 0x1C
102#define ASN1_BMP_STRING 0x1E
103#define ASN1_PRIMITIVE 0x00
104#define ASN1_CONSTRUCTED 0x20
105#define ASN1_CONTEXT_SPECIFIC 0x80
106
67932e54
TK
107/* *************** end copy from x509.h ************************/
108
80a47a2c
TK
109/*
110 * PKCS#1 constants
111 */
67932e54
TK
112#define SIG_RSA_RAW 0
113#define SIG_RSA_MD2 2
114#define SIG_RSA_MD4 3
115#define SIG_RSA_MD5 4
116#define SIG_RSA_SHA1 5
117#define SIG_RSA_SHA224 14
118#define SIG_RSA_SHA256 11
119#define SIG_RSA_SHA384 12
120#define SIG_RSA_SHA512 13
80a47a2c
TK
121
122#define RSA_PUBLIC 0
123#define RSA_PRIVATE 1
124
125#define RSA_PKCS_V15 0
126#define RSA_PKCS_V21 1
127
128#define RSA_SIGN 1
129#define RSA_CRYPT 2
130
67932e54
TK
131#define ASN1_STR_CONSTRUCTED_SEQUENCE "\x30"
132#define ASN1_STR_NULL "\x05"
133#define ASN1_STR_OID "\x06"
134#define ASN1_STR_OCTET_STRING "\x04"
135
136#define OID_DIGEST_ALG_MDX "\x2A\x86\x48\x86\xF7\x0D\x02\x00"
137#define OID_HASH_ALG_SHA1 "\x2b\x0e\x03\x02\x1a"
138#define OID_HASH_ALG_SHA2X "\x60\x86\x48\x01\x65\x03\x04\x02\x00"
139
140#define OID_ISO_MEMBER_BODIES "\x2a"
141#define OID_ISO_IDENTIFIED_ORG "\x2b"
142
143/*
144 * ISO Member bodies OID parts
145 */
146#define OID_COUNTRY_US "\x86\x48"
147#define OID_RSA_DATA_SECURITY "\x86\xf7\x0d"
148
149/*
150 * ISO Identified organization OID parts
151 */
152#define OID_OIW_SECSIG_SHA1 "\x0e\x03\x02\x1a"
153
80a47a2c
TK
154/*
155 * DigestInfo ::= SEQUENCE {
156 * digestAlgorithm DigestAlgorithmIdentifier,
157 * digest Digest }
158 *
159 * DigestAlgorithmIdentifier ::= AlgorithmIdentifier
160 *
161 * Digest ::= OCTET STRING
162 */
67932e54
TK
163#define ASN1_HASH_MDX \
164( \
165 ASN1_STR_CONSTRUCTED_SEQUENCE "\x20" \
166 ASN1_STR_CONSTRUCTED_SEQUENCE "\x0C" \
167 ASN1_STR_OID "\x08" \
168 OID_DIGEST_ALG_MDX \
169 ASN1_STR_NULL "\x00" \
170 ASN1_STR_OCTET_STRING "\x10" \
171)
172
173#define ASN1_HASH_SHA1 \
174 ASN1_STR_CONSTRUCTED_SEQUENCE "\x21" \
175 ASN1_STR_CONSTRUCTED_SEQUENCE "\x09" \
176 ASN1_STR_OID "\x05" \
177 OID_HASH_ALG_SHA1 \
178 ASN1_STR_NULL "\x00" \
179 ASN1_STR_OCTET_STRING "\x14"
180
181#define ASN1_HASH_SHA2X \
182 ASN1_STR_CONSTRUCTED_SEQUENCE "\x11" \
183 ASN1_STR_CONSTRUCTED_SEQUENCE "\x0d" \
184 ASN1_STR_OID "\x09" \
185 OID_HASH_ALG_SHA2X \
186 ASN1_STR_NULL "\x00" \
187 ASN1_STR_OCTET_STRING "\x00"
80a47a2c
TK
188
189/**
190 * \brief RSA context structure
191 */
192typedef struct
193{
194 int ver; /*!< always 0 */
195 int len; /*!< size(N) in chars */
196
197 mpi N; /*!< public modulus */
198 mpi E; /*!< public exponent */
199
200 mpi D; /*!< private exponent */
201 mpi P; /*!< 1st prime factor */
202 mpi Q; /*!< 2nd prime factor */
203 mpi DP; /*!< D % (P - 1) */
204 mpi DQ; /*!< D % (Q - 1) */
205 mpi QP; /*!< 1 / (Q % P) */
206
207 mpi RN; /*!< cached R^2 mod N */
208 mpi RP; /*!< cached R^2 mod P */
209 mpi RQ; /*!< cached R^2 mod Q */
210
211 int padding; /*!< 1.5 or OAEP/PSS */
212 int hash_id; /*!< hash identifier */
213 int (*f_rng)(void *); /*!< RNG function */
214 void *p_rng; /*!< RNG parameter */
215}
216rsa_context;
217
218#ifdef __cplusplus
219extern "C" {
220#endif
221
222/**
223 * \brief Initialize an RSA context
224 *
225 * \param ctx RSA context to be initialized
226 * \param padding RSA_PKCS_V15 or RSA_PKCS_V21
227 * \param hash_id RSA_PKCS_V21 hash identifier
228 * \param f_rng RNG function
229 * \param p_rng RNG parameter
230 *
231 * \note The hash_id parameter is actually ignored
232 * when using RSA_PKCS_V15 padding.
233 *
234 * \note Currently (xyssl-0.8), RSA_PKCS_V21 padding
235 * is not supported.
236 */
237void rsa_init( rsa_context *ctx,
238 int padding,
239 int hash_id,
240 int (*f_rng)(void *),
241 void *p_rng );
242
243/**
244 * \brief Generate an RSA keypair
245 *
246 * \param ctx RSA context that will hold the key
247 * \param nbits size of the public key in bits
248 * \param exponent public exponent (e.g., 65537)
249 *
250 * \note rsa_init() must be called beforehand to setup
251 * the RSA context (especially f_rng and p_rng).
252 *
253 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
254 */
255int rsa_gen_key( rsa_context *ctx, int nbits, int exponent );
256
257/**
258 * \brief Check a public RSA key
259 *
260 * \param ctx RSA context to be checked
261 *
262 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
263 */
264int rsa_check_pubkey( rsa_context *ctx );
265
266/**
267 * \brief Check a private RSA key
268 *
269 * \param ctx RSA context to be checked
270 *
271 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
272 */
273int rsa_check_privkey( rsa_context *ctx );
274
275/**
276 * \brief Do an RSA public key operation
277 *
278 * \param ctx RSA context
279 * \param input input buffer
280 * \param output output buffer
281 *
282 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
283 *
284 * \note This function does NOT take care of message
67932e54
TK
285 * padding. Also, be sure to set input[0] = 0 or assure that
286 * input is smaller than N.
80a47a2c
TK
287 *
288 * \note The input and output buffers must be large
289 * enough (eg. 128 bytes if RSA-1024 is used).
290 */
291int rsa_public( rsa_context *ctx,
292 unsigned char *input,
293 unsigned char *output );
294
295/**
296 * \brief Do an RSA private key operation
297 *
298 * \param ctx RSA context
299 * \param input input buffer
300 * \param output output buffer
301 *
302 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
303 *
304 * \note The input and output buffers must be large
305 * enough (eg. 128 bytes if RSA-1024 is used).
306 */
307int rsa_private( rsa_context *ctx,
308 unsigned char *input,
309 unsigned char *output );
310
311/**
312 * \brief Add the message padding, then do an RSA operation
313 *
314 * \param ctx RSA context
315 * \param mode RSA_PUBLIC or RSA_PRIVATE
67932e54 316 * \param ilen contains the plaintext length
80a47a2c
TK
317 * \param input buffer holding the data to be encrypted
318 * \param output buffer that will hold the ciphertext
319 *
320 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
321 *
322 * \note The output buffer must be as large as the size
323 * of ctx->N (eg. 128 bytes if RSA-1024 is used).
324 */
325int rsa_pkcs1_encrypt( rsa_context *ctx,
326 int mode, int ilen,
327 unsigned char *input,
328 unsigned char *output );
329
330/**
331 * \brief Do an RSA operation, then remove the message padding
332 *
333 * \param ctx RSA context
334 * \param mode RSA_PUBLIC or RSA_PRIVATE
335 * \param input buffer holding the encrypted data
336 * \param output buffer that will hold the plaintext
337 * \param olen will contain the plaintext length
67932e54 338 * \param output_max_len maximum length of the output buffer
80a47a2c
TK
339 *
340 * \return 0 if successful, or an POLARSSL_ERR_RSA_XXX error code
341 *
342 * \note The output buffer must be as large as the size
343 * of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise
344 * an error is thrown.
345 */
346int rsa_pkcs1_decrypt( rsa_context *ctx,
347 int mode, int *olen,
348 unsigned char *input,
349 unsigned char *output,
67932e54 350 int output_max_len );
80a47a2c
TK
351
352/**
353 * \brief Do a private RSA to sign a message digest
354 *
355 * \param ctx RSA context
356 * \param mode RSA_PUBLIC or RSA_PRIVATE
67932e54
TK
357 * \param hash_id SIG_RSA_RAW, SIG_RSA_MD{2,4,5} or SIG_RSA_SHA{1,224,256,384,512}
358 * \param hashlen message digest length (for SIG_RSA_RAW only)
80a47a2c
TK
359 * \param hash buffer holding the message digest
360 * \param sig buffer that will hold the ciphertext
361 *
362 * \return 0 if the signing operation was successful,
363 * or an POLARSSL_ERR_RSA_XXX error code
364 *
365 * \note The "sig" buffer must be as large as the size
366 * of ctx->N (eg. 128 bytes if RSA-1024 is used).
367 */
368int rsa_pkcs1_sign( rsa_context *ctx,
369 int mode,
370 int hash_id,
371 int hashlen,
372 unsigned char *hash,
373 unsigned char *sig );
374
375/**
376 * \brief Do a public RSA and check the message digest
377 *
378 * \param ctx points to an RSA public key
379 * \param mode RSA_PUBLIC or RSA_PRIVATE
67932e54
TK
380 * \param hash_id SIG_RSA_RAW, RSA_MD{2,4,5} or RSA_SHA{1,256}
381 * \param hashlen message digest length (for SIG_RSA_RAW only)
80a47a2c
TK
382 * \param hash buffer holding the message digest
383 * \param sig buffer holding the ciphertext
384 *
385 * \return 0 if the verify operation was successful,
386 * or an POLARSSL_ERR_RSA_XXX error code
387 *
388 * \note The "sig" buffer must be as large as the size
389 * of ctx->N (eg. 128 bytes if RSA-1024 is used).
390 */
391int rsa_pkcs1_verify( rsa_context *ctx,
392 int mode,
393 int hash_id,
394 int hashlen,
395 unsigned char *hash,
396 unsigned char *sig );
397
398/**
399 * \brief Free the components of an RSA key
67932e54
TK
400 *
401 * \param ctx RSA Context to free
80a47a2c
TK
402 */
403void rsa_free( rsa_context *ctx );
404
405int rsa_parse_public_key( rsa_context *rsa, unsigned char *buf, int buflen );
406
407int rsa_parse_key( rsa_context *rsa, unsigned char *buf, int buflen,
408 unsigned char *pwd, int pwdlen );
409
410#ifdef __cplusplus
411}
412#endif
413
414#endif /* rsa.h */