OpenSSL
1.0.1c
Main Page
Classes
Files
File List
File Members
All
Classes
Files
Functions
Variables
Typedefs
Enumerations
Enumerator
Macros
crypto
rsa
rsa_pk1.c
Go to the documentation of this file.
1
/* crypto/rsa/rsa_pk1.c */
2
/* Copyright (C) 1995-1998 Eric Young (
[email protected]
)
3
* All rights reserved.
4
*
5
* This package is an SSL implementation written
6
* by Eric Young (
[email protected]
).
7
* The implementation was written so as to conform with Netscapes SSL.
8
*
9
* This library is free for commercial and non-commercial use as long as
10
* the following conditions are aheared to. The following conditions
11
* apply to all code found in this distribution, be it the RC4, RSA,
12
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
13
* included with this distribution is covered by the same copyright terms
14
* except that the holder is Tim Hudson (
[email protected]
).
15
*
16
* Copyright remains Eric Young's, and as such any Copyright notices in
17
* the code are not to be removed.
18
* If this package is used in a product, Eric Young should be given attribution
19
* as the author of the parts of the library used.
20
* This can be in the form of a textual message at program startup or
21
* in documentation (online or textual) provided with the package.
22
*
23
* Redistribution and use in source and binary forms, with or without
24
* modification, are permitted provided that the following conditions
25
* are met:
26
* 1. Redistributions of source code must retain the copyright
27
* notice, this list of conditions and the following disclaimer.
28
* 2. Redistributions in binary form must reproduce the above copyright
29
* notice, this list of conditions and the following disclaimer in the
30
* documentation and/or other materials provided with the distribution.
31
* 3. All advertising materials mentioning features or use of this software
32
* must display the following acknowledgement:
33
* "This product includes cryptographic software written by
34
* Eric Young (
[email protected]
)"
35
* The word 'cryptographic' can be left out if the rouines from the library
36
* being used are not cryptographic related :-).
37
* 4. If you include any Windows specific code (or a derivative thereof) from
38
* the apps directory (application code) you must include an acknowledgement:
39
* "This product includes software written by Tim Hudson (
[email protected]
)"
40
*
41
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
* SUCH DAMAGE.
52
*
53
* The licence and distribution terms for any publically available version or
54
* derivative of this code cannot be changed. i.e. this code cannot simply be
55
* copied and put under another distribution licence
56
* [including the GNU Public Licence.]
57
*/
58
59
#include <stdio.h>
60
#include "
cryptlib.h
"
61
#include <
openssl/bn.h
>
62
#include <
openssl/rsa.h
>
63
#include <
openssl/rand.h
>
64
65
int
RSA_padding_add_PKCS1_type_1
(
unsigned
char
*to,
int
tlen,
66
const
unsigned
char
*from,
int
flen)
67
{
68
int
j;
69
unsigned
char
*
p
;
70
71
if
(flen > (tlen-
RSA_PKCS1_PADDING_SIZE
))
72
{
73
RSAerr
(
RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1
,
RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE
);
74
return
(0);
75
}
76
77
p=(
unsigned
char
*)to;
78
79
*(p++)=0;
80
*(p++)=1;
/* Private Key BT (Block Type) */
81
82
/* pad out with 0xff data */
83
j=tlen-3-flen;
84
memset(p,0xff,j);
85
p+=j;
86
*(p++)=
'\0'
;
87
memcpy(p,from,(
unsigned
int
)flen);
88
return
(1);
89
}
90
91
int
RSA_padding_check_PKCS1_type_1
(
unsigned
char
*to,
int
tlen,
92
const
unsigned
char
*from,
int
flen,
int
num
)
93
{
94
int
i,j;
95
const
unsigned
char
*
p
;
96
97
p=from;
98
if
((num != (flen+1)) || (*(p++) != 01))
99
{
100
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1
,
RSA_R_BLOCK_TYPE_IS_NOT_01
);
101
return
(-1);
102
}
103
104
/* scan over padding data */
105
j=flen-1;
/* one for type. */
106
for
(i=0; i<j; i++)
107
{
108
if
(*p != 0xff)
/* should decrypt to 0xff */
109
{
110
if
(*p == 0)
111
{ p++;
break
; }
112
else
{
113
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1
,
RSA_R_BAD_FIXED_HEADER_DECRYPT
);
114
return
(-1);
115
}
116
}
117
p++;
118
}
119
120
if
(i == j)
121
{
122
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1
,
RSA_R_NULL_BEFORE_BLOCK_MISSING
);
123
return
(-1);
124
}
125
126
if
(i < 8)
127
{
128
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1
,
RSA_R_BAD_PAD_BYTE_COUNT
);
129
return
(-1);
130
}
131
i++;
/* Skip over the '\0' */
132
j-=i;
133
if
(j > tlen)
134
{
135
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1
,
RSA_R_DATA_TOO_LARGE
);
136
return
(-1);
137
}
138
memcpy(to,p,(
unsigned
int
)j);
139
140
return
(j);
141
}
142
143
int
RSA_padding_add_PKCS1_type_2
(
unsigned
char
*to,
int
tlen,
144
const
unsigned
char
*from,
int
flen)
145
{
146
int
i,j;
147
unsigned
char
*
p
;
148
149
if
(flen > (tlen-11))
150
{
151
RSAerr
(
RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2
,
RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE
);
152
return
(0);
153
}
154
155
p=(
unsigned
char
*)to;
156
157
*(p++)=0;
158
*(p++)=2;
/* Public Key BT (Block Type) */
159
160
/* pad out with non-zero random data */
161
j=tlen-3-flen;
162
163
if
(
RAND_bytes
(p,j) <= 0)
164
return
(0);
165
for
(i=0; i<j; i++)
166
{
167
if
(*p ==
'\0'
)
168
do
{
169
if
(
RAND_bytes
(p,1) <= 0)
170
return
(0);
171
}
while
(*p ==
'\0'
);
172
p++;
173
}
174
175
*(p++)=
'\0'
;
176
177
memcpy(p,from,(
unsigned
int
)flen);
178
return
(1);
179
}
180
181
int
RSA_padding_check_PKCS1_type_2
(
unsigned
char
*to,
int
tlen,
182
const
unsigned
char
*from,
int
flen,
int
num
)
183
{
184
int
i,j;
185
const
unsigned
char
*
p
;
186
187
p=from;
188
if
((num != (flen+1)) || (*(p++) != 02))
189
{
190
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2
,
RSA_R_BLOCK_TYPE_IS_NOT_02
);
191
return
(-1);
192
}
193
#ifdef PKCS1_CHECK
194
return
(num-11);
195
#endif
196
197
/* scan over padding data */
198
j=flen-1;
/* one for type. */
199
for
(i=0; i<j; i++)
200
if
(*(p++) == 0)
break
;
201
202
if
(i == j)
203
{
204
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2
,
RSA_R_NULL_BEFORE_BLOCK_MISSING
);
205
return
(-1);
206
}
207
208
if
(i < 8)
209
{
210
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2
,
RSA_R_BAD_PAD_BYTE_COUNT
);
211
return
(-1);
212
}
213
i++;
/* Skip over the '\0' */
214
j-=i;
215
if
(j > tlen)
216
{
217
RSAerr
(
RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2
,
RSA_R_DATA_TOO_LARGE
);
218
return
(-1);
219
}
220
memcpy(to,p,(
unsigned
int
)j);
221
222
return
(j);
223
}
224
Generated on Thu Jan 10 2013 09:53:39 for OpenSSL by
1.8.2