/*-
* Copyright (c) 2009 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Alistair Crooks (agc@NetBSD.org)
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
/*
* Copyright (c) 2005-2008 Nominet UK (www.nic.uk)
* All rights reserved.
* Contributors: Ben Laurie, Rachel Willmer. The Contributors have asserted
* their moral rights under the UK Copyright Design and Patents Act 1988 to
* be recorded as the authors of this copyright work.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License.
*
* You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/** \file
*/
#include "config.h"
#ifdef HAVE_SYS_CDEFS_H
#include <sys/cdefs.h>
#endif
#if defined(__NetBSD__)
__COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
__RCSID("$NetBSD: create.c,v 1.39 2022/08/26 19:18:38 jhigh Exp $");
#endif
#include <sys/types.h>
#include <sys/param.h>
#include <sys/stat.h>
#ifdef HAVE_FCNTL_H
#include <fcntl.h>
#endif
#include <string.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#ifdef HAVE_OPENSSL_CAST_H
#include <openssl/cast.h>
#endif
#include "create.h"
#include "keyring.h"
#include "packet.h"
#include "signature.h"
#include "writer.h"
#include "readerwriter.h"
#include "memory.h"
#include "netpgpdefs.h"
#include "netpgpdigest.h"
/**
* \ingroup Core_Create
* \param length
* \param type
* \param output
* \return 1 if OK, otherwise 0
*/
unsigned
pgp_write_ss_header(pgp_output_t *output,
unsigned length,
pgp_content_enum type)
{
return pgp_write_length(output, length) &&
pgp_write_scalar(output, (unsigned)(type -
(unsigned)PGP_PTAG_SIG_SUBPKT_BASE), 1);
}
/*
* XXX: the general idea of _fast_ is that it doesn't copy stuff the safe
* (i.e. non _fast_) version will, and so will also need to be freed.
*/
/**
* \ingroup Core_Create
*
* pgp_fast_create_userid() sets id->userid to the given userid.
* This is fast because it is only copying a char*. However, if userid
* is changed or freed in the future, this could have injurious results.
* \param id
* \param userid
*/
void
pgp_fast_create_userid(uint8_t **id, uint8_t *userid)
{
*id = userid;
}
/**
* \ingroup Core_WritePackets
* \brief Writes a User Id packet
* \param id
* \param output
* \return 1 if OK, otherwise 0
*/
unsigned
pgp_write_struct_userid(pgp_output_t *output, const uint8_t *id)
{
return pgp_write_ptag(output, PGP_PTAG_CT_USER_ID) &&
pgp_write_length(output, (unsigned)strlen((const char *) id)) &&
pgp_write(output, id, (unsigned)strlen((const char *) id));
}
/**
* \ingroup Core_WritePackets
* \brief Write a User Id packet.
* \param userid
* \param output
*
* \return return value from pgp_write_struct_userid()
*/
unsigned
pgp_write_userid(const uint8_t *userid, pgp_output_t *output)
{
return pgp_write_struct_userid(output, userid);
}
/**
\ingroup Core_MPI
*/
static unsigned
mpi_length(const BIGNUM *bn)
{
return (unsigned)(2 + (BN_num_bits(bn) + 7) / 8);
}
static unsigned
pubkey_length(const pgp_pubkey_t *key)
{
switch (key->alg) {
case PGP_PKA_DSA:
return mpi_length(key->key.dsa.p) + mpi_length(key->key.dsa.q) +
mpi_length(key->key.dsa.g) + mpi_length(key->key.dsa.y);
case PGP_PKA_RSA:
return mpi_length(key->key.rsa.n) + mpi_length(key->key.rsa.e);
default:
(void) fprintf(stderr,
"pubkey_length: unknown key algorithm\n");
}
return 0;
}
static unsigned
seckey_length(const pgp_seckey_t *key)
{
int len;
len = 0;
switch (key->pubkey.alg) {
case PGP_PKA_DSA:
return (unsigned)(mpi_length(key->key.dsa.x) + pubkey_length(&key->pubkey));
case PGP_PKA_RSA:
len = mpi_length(key->key.rsa.d) + mpi_length(key->key.rsa.p) +
mpi_length(key->key.rsa.q) + mpi_length(key->key.rsa.u);
return (unsigned)(len + pubkey_length(&key->pubkey));
default:
(void) fprintf(stderr,
"seckey_length: unknown key algorithm\n");
}
return 0;
}
/**
* \ingroup Core_Create
* \param key
* \param t
* \param n
* \param e
*/
void
pgp_fast_create_rsa_pubkey(pgp_pubkey_t *key, time_t t,
BIGNUM *n, BIGNUM *e)
{
key->version = PGP_V4;
key->birthtime = t;
key->alg = PGP_PKA_RSA;
key->key.rsa.n = n;
key->key.rsa.e = e;
}
/*
* Note that we support v3 keys here because they're needed for for
* verification - the writer doesn't allow them, though
*/
static unsigned
write_pubkey_body(const pgp_pubkey_t *key, pgp_output_t *output)
{
if (!(pgp_write_scalar(output, (unsigned)key->version, 1) &&
pgp_write_scalar(output, (unsigned)key->birthtime, 4))) {
return 0;
}
if (key->version != 4 &&
!pgp_write_scalar(output, key->days_valid, 2)) {
return 0;
}
if (!pgp_write_scalar(output, (unsigned)key->alg, 1)) {
return 0;
}
switch (key->alg) {
case PGP_PKA_DSA:
return pgp_write_mpi(output, key->key.dsa.p) &&
pgp_write_mpi(output, key->key.dsa.q) &&
pgp_write_mpi(output, key->key.dsa.g) &&
pgp_write_mpi(output, key->key.dsa.y);
case PGP_PKA_ECDSA:
return pgp_write(output, &key->key.ecdsa.len, 1) &&
pgp_write(output, key->key.ecdsa.oid, key->key.ecdsa.len) &&
pgp_write_mpi(output, key->key.ecdsa.p);
case PGP_PKA_RSA:
case PGP_PKA_RSA_ENCRYPT_ONLY:
case PGP_PKA_RSA_SIGN_ONLY:
return pgp_write_mpi(output, key->key.rsa.n) &&
pgp_write_mpi(output, key->key.rsa.e);
case PGP_PKA_ELGAMAL:
return pgp_write_mpi(output, key->key.elgamal.p) &&
pgp_write_mpi(output, key->key.elgamal.g) &&
pgp_write_mpi(output, key->key.elgamal.y);
default:
(void) fprintf(stderr,
"write_pubkey_body: bad algorithm\n");
break;
}
return 0;
}
/*
* Note that we support v3 keys here because they're needed for
* verification.
*/
static unsigned
write_seckey_body(const pgp_seckey_t *key,
const uint8_t *passphrase,
const size_t pplen,
pgp_output_t *output)
{
/* RFC4880 Section 5.5.3 Secret-Key Packet Formats */
pgp_crypt_t crypted;
pgp_hash_t hash;
unsigned done = 0;
unsigned i = 0;
uint8_t *hashed;
uint8_t sesskey[CAST_KEY_LENGTH];
if (!write_pubkey_body(&key->pubkey, output)) {
return 0;
}
if (key->s2k_usage != PGP_S2KU_ENCRYPTED_AND_HASHED) {
(void) fprintf(stderr, "write_seckey_body: s2k usage\n");
return 0;
}
if (!pgp_write_scalar(output, (unsigned)key->s2k_usage, 1)) {
return 0;
}
if (key->alg != PGP_SA_CAST5) {
(void) fprintf(stderr, "write_seckey_body: algorithm\n");
return 0;
}
if (!pgp_write_scalar(output, (unsigned)key->alg, 1)) {
return 0;
}
if (key->s2k_specifier != PGP_S2KS_SIMPLE &&
key->s2k_specifier != PGP_S2KS_SALTED) {
/* = 1 \todo could also be iterated-and-salted */
(void) fprintf(stderr, "write_seckey_body: s2k spec\n");
return 0;
}
if (!pgp_write_scalar(output, (unsigned)key->s2k_specifier, 1)) {
return 0;
}
if (!pgp_write_scalar(output, (unsigned)key->hash_alg, 1)) {
return 0;
}
switch (key->s2k_specifier) {
case PGP_S2KS_SIMPLE:
/* nothing more to do */
break;
case PGP_S2KS_SALTED:
/* 8-octet salt value */
pgp_random(__UNCONST(&key->salt[0]), PGP_SALT_SIZE);
if (!pgp_write(output, key->salt, PGP_SALT_SIZE)) {
return 0;
}
break;
/*
* \todo case PGP_S2KS_ITERATED_AND_SALTED: // 8-octet salt
* value // 1-octet count break;
*/
default:
(void) fprintf(stderr,
"invalid/unsupported s2k specifier %d\n",
key->s2k_specifier);
return 0;
}
if (!pgp_write(output, &key->iv[0], pgp_block_size(key->alg))) {
return 0;
}
/*
* create the session key for encrypting the algorithm-specific
* fields
*/
switch (key->s2k_specifier) {
case PGP_S2KS_SIMPLE:
case PGP_S2KS_SALTED:
/* RFC4880: section 3.7.1.1 and 3.7.1.2 */
for (done = 0, i = 0; done < CAST_KEY_LENGTH; i++) {
unsigned hashsize;
unsigned j;
unsigned needed;
unsigned size;
uint8_t zero = 0;
/* Hard-coded SHA1 for session key */
pgp_hash_any(&hash, PGP_HASH_SHA1);
hashsize = pgp_hash_size(key->hash_alg);
needed = CAST_KEY_LENGTH - done;
size = MIN(needed, hashsize);
if ((hashed = calloc(1, hashsize)) == NULL) {
(void) fprintf(stderr, "write_seckey_body: bad alloc\n");
return 0;
}
if (!hash.init(&hash)) {
(void) fprintf(stderr, "write_seckey_body: bad alloc\n");
return 0;
}
/* preload if iterating */
for (j = 0; j < i; j++) {
/*
* Coverity shows a DEADCODE error on this
* line. This is expected since the hardcoded
* use of SHA1 and CAST5 means that it will
* not used. This will change however when
* other algorithms are supported.
*/
hash.add(&hash, &zero, 1);
}
if (key->s2k_specifier == PGP_S2KS_SALTED) {
hash.add(&hash, key->salt, PGP_SALT_SIZE);
}
hash.add(&hash, passphrase, (unsigned)pplen);
hash.finish(&hash, hashed);
/*
* if more in hash than is needed by session key, use
* the leftmost octets
*/
(void) memcpy(&sesskey[i * hashsize],
hashed, (unsigned)size);
done += (unsigned)size;
if (done > CAST_KEY_LENGTH) {
(void) fprintf(stderr,
"write_seckey_body: short add\n");
return 0;
}
}
break;
/*
* \todo case PGP_S2KS_ITERATED_AND_SALTED: * 8-octet salt
* value * 1-octet count break;
*/
default:
(void) fprintf(stderr,
"invalid/unsupported s2k specifier %d\n",
key->s2k_specifier);
return 0;
}
/* use this session key to encrypt */
pgp_crypt_any(&crypted, key->alg);
crypted.set_iv(&crypted, key->iv);
crypted.set_crypt_key(&crypted, sesskey);
pgp_encrypt_init(&crypted);
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "writing: iv=", key->iv, pgp_block_size(key->alg));
hexdump(stderr, "key= ", sesskey, CAST_KEY_LENGTH);
(void) fprintf(stderr, "\nturning encryption on...\n");
}
pgp_push_enc_crypt(output, &crypted);
switch (key->pubkey.alg) {
case PGP_PKA_RSA:
case PGP_PKA_RSA_ENCRYPT_ONLY:
case PGP_PKA_RSA_SIGN_ONLY:
if (!pgp_write_mpi(output, key->key.rsa.d) ||
!pgp_write_mpi(output, key->key.rsa.p) ||
!pgp_write_mpi(output, key->key.rsa.q) ||
!pgp_write_mpi(output, key->key.rsa.u)) {
if (pgp_get_debug_level(__FILE__)) {
(void) fprintf(stderr,
"4 x mpi not written - problem\n");
}
return 0;
}
break;
case PGP_PKA_DSA:
return pgp_write_mpi(output, key->key.dsa.x);
case PGP_PKA_ELGAMAL:
return pgp_write_mpi(output, key->key.elgamal.x);
default:
return 0;
}
if (!pgp_write(output, key->checkhash, PGP_CHECKHASH_SIZE)) {
return 0;
}
pgp_writer_pop(output);
return 1;
}
/**
* \ingroup Core_WritePackets
* \brief Writes a Public Key packet
* \param key
* \param output
* \return 1 if OK, otherwise 0
*/
static unsigned
write_struct_pubkey(pgp_output_t *output, const pgp_pubkey_t *key)
{
return pgp_write_ptag(output, PGP_PTAG_CT_PUBLIC_KEY) &&
pgp_write_length(output, 1 + 4 + 1 + pubkey_length(key)) &&
write_pubkey_body(key, output);
}
/**
\ingroup HighLevel_KeyWrite
\brief Writes a transferable PGP public key to the given output stream.
\param keydata Key to be written
\param armoured Flag is set for armoured output
\param output Output stream
*/
unsigned
pgp_write_xfer_pubkey(pgp_output_t *output,
const pgp_key_t *key,
const unsigned armoured)
{
unsigned i, j;
if (armoured) {
pgp_writer_push_armoured(output, PGP_PGP_PUBLIC_KEY_BLOCK);
}
/* public key */
if (!write_struct_pubkey(output, &key->key.pubkey)) {
return 0;
}
/* TODO: revocation signatures go here */
/* user ids and corresponding signatures */
for (i = 0; i < key->uidc; i++) {
if (!pgp_write_struct_userid(output, key->uids[i])) {
return 0;
}
for (j = 0; j < key->packetc; j++) {
if (!pgp_write(output, key->packets[j].raw, (unsigned)key->packets[j].length)) {
return 0;
}
}
}
/* TODO: user attributes and corresponding signatures */
/*
* subkey packets and corresponding signatures and optional
* revocation
*/
if (armoured) {
pgp_writer_info_finalise(&output->errors, &output->writer);
pgp_writer_pop(output);
}
return 1;
}
/**
\ingroup HighLevel_KeyWrite
\brief Writes a transferable PGP secret key to the given output stream.
\param keydata Key to be written
\param passphrase
\param pplen
\param armoured Flag is set for armoured output
\param output Output stream
*/
unsigned
pgp_write_xfer_seckey(pgp_output_t *output,
const pgp_key_t *key,
const uint8_t *passphrase,
const size_t pplen,
unsigned armoured)
{
unsigned i, j;
if (armoured) {
pgp_writer_push_armoured(output, PGP_PGP_PRIVATE_KEY_BLOCK);
}
/* public key */
if (!pgp_write_struct_seckey(&key->key.seckey, passphrase,
pplen, output)) {
return 0;
}
/* TODO: revocation signatures go here */
/* user ids and corresponding signatures */
for (i = 0; i < key->uidc; i++) {
if (!pgp_write_struct_userid(output, key->uids[i])) {
return 0;
}
for (j = 0; j < key->packetc; j++) {
if (!pgp_write(output, key->packets[j].raw, (unsigned)key->packets[j].length)) {
return 0;
}
}
}
/* TODO: user attributes and corresponding signatures */
/*
* subkey packets and corresponding signatures and optional
* revocation
*/
if (armoured) {
pgp_writer_info_finalise(&output->errors, &output->writer);
pgp_writer_pop(output);
}
return 1;
}
/**
* \ingroup Core_WritePackets
* \brief Writes one RSA public key packet.
* \param t Creation time
* \param n RSA public modulus
* \param e RSA public encryption exponent
* \param output Writer settings
*
* \return 1 if OK, otherwise 0
*/
unsigned
pgp_write_rsa_pubkey(time_t t, const BIGNUM *n,
const BIGNUM *e,
pgp_output_t *output)
{
pgp_pubkey_t key;
pgp_fast_create_rsa_pubkey(&key, t, __UNCONST(n), __UNCONST(e));
return write_struct_pubkey(output, &key);
}
/**
* \ingroup Core_Create
* \param out
* \param key
* \param make_packet
*/
void
pgp_build_pubkey(pgp_memory_t *out, const pgp_pubkey_t *key,
unsigned make_packet)
{
pgp_output_t *output;
output = pgp_output_new();
pgp_memory_init(out, 128);
pgp_writer_set_memory(output, out);
write_pubkey_body(key, output);
if (make_packet) {
pgp_memory_make_packet(out, PGP_PTAG_CT_PUBLIC_KEY);
}
pgp_output_delete(output);
}
/**
* \ingroup Core_Create
*
* Create an RSA secret key structure. If a parameter is marked as
* [OPTIONAL], then it can be omitted and will be calculated from
* other params - or, in the case of e, will default to 0x10001.
*
* Parameters are _not_ copied, so will be freed if the structure is
* freed.
*
* \param key The key structure to be initialised.
* \param t
* \param d The RSA parameter d (=e^-1 mod (p-1)(q-1)) [OPTIONAL]
* \param p The RSA parameter p
* \param q The RSA parameter q (q > p)
* \param u The RSA parameter u (=p^-1 mod q) [OPTIONAL]
* \param n The RSA public parameter n (=p*q) [OPTIONAL]
* \param e The RSA public parameter e */
void
pgp_fast_create_rsa_seckey(pgp_seckey_t *key, time_t t,
BIGNUM *d, BIGNUM *p, BIGNUM *q, BIGNUM *u,
BIGNUM *n, BIGNUM *e)
{
pgp_fast_create_rsa_pubkey(&key->pubkey, t, n, e);
/* XXX: calculate optionals */
key->key.rsa.d = d;
key->key.rsa.p = p;
key->key.rsa.q = q;
key->key.rsa.u = u;
key->s2k_usage = PGP_S2KU_NONE;
/* XXX: sanity check and add errors... */
}
/**
* \ingroup Core_WritePackets
* \brief Writes a Secret Key packet.
* \param key The secret key
* \param passphrase The passphrase
* \param pplen Length of passphrase
* \param output
* \return 1 if OK; else 0
*/
unsigned
pgp_write_struct_seckey(const pgp_seckey_t *key,
const uint8_t *passphrase,
const size_t pplen,
pgp_output_t *output)
{
int length = 0;
if (key->pubkey.version != 4) {
(void) fprintf(stderr,
"pgp_write_struct_seckey: public key version\n");
return 0;
}
/* Ref: RFC4880 Section 5.5.3 */
/* pubkey, excluding MPIs */
length += 1 + 4 + 1 + 1;
/* s2k usage */
length += 1;
switch (key->s2k_usage) {
case PGP_S2KU_NONE:
/* nothing to add */
break;
case PGP_S2KU_ENCRYPTED_AND_HASHED: /* 254 */
case PGP_S2KU_ENCRYPTED: /* 255 */
/* Ref: RFC4880 Section 3.7 */
length += 1; /* s2k_specifier */
switch (key->s2k_specifier) {
case PGP_S2KS_SIMPLE:
length += 1; /* hash algorithm */
break;
case PGP_S2KS_SALTED:
length += 1 + 8; /* hash algorithm + salt */
break;
case PGP_S2KS_ITERATED_AND_SALTED:
length += 1 + 8 + 1; /* hash algorithm, salt +
* count */
break;
default:
(void) fprintf(stderr,
"pgp_write_struct_seckey: s2k spec\n");
return 0;
}
break;
default:
(void) fprintf(stderr,
"pgp_write_struct_seckey: s2k usage\n");
return 0;
}
/* IV */
if (key->s2k_usage) {
length += pgp_block_size(key->alg);
}
/* checksum or hash */
switch (key->s2k_usage) {
case PGP_S2KU_NONE:
case PGP_S2KU_ENCRYPTED:
length += 2;
break;
case PGP_S2KU_ENCRYPTED_AND_HASHED:
length += PGP_CHECKHASH_SIZE;
break;
default:
(void) fprintf(stderr,
"pgp_write_struct_seckey: s2k cksum usage\n");
return 0;
}
/* secret key and public key MPIs */
length += (unsigned)seckey_length(key);
return pgp_write_ptag(output, PGP_PTAG_CT_SECRET_KEY) &&
/* pgp_write_length(output,1+4+1+1+seckey_length(key)+2) && */
pgp_write_length(output, (unsigned)length) &&
write_seckey_body(key, passphrase, pplen, output);
}
/**
* \ingroup Core_Create
*
* \brief Create a new pgp_output_t structure.
*
* \return the new structure.
* \note It is the responsiblity of the caller to call pgp_output_delete().
* \sa pgp_output_delete()
*/
pgp_output_t *
pgp_output_new(void)
{
return calloc(1, sizeof(pgp_output_t));
}
/**
* \ingroup Core_Create
* \brief Delete an pgp_output_t strucut and associated resources.
*
* Delete an pgp_output_t structure. If a writer is active, then
* that is also deleted.
*
* \param info the structure to be deleted.
*/
void
pgp_output_delete(pgp_output_t *output)
{
pgp_writer_info_delete(&output->writer);
free(output);
}
/**
\ingroup Core_Create
\brief Calculate the checksum for a session key
\param sesskey Session Key to use
\param cs Checksum to be written
\return 1 if OK; else 0
*/
unsigned
pgp_calc_sesskey_checksum(pgp_pk_sesskey_t *sesskey, uint8_t cs[2])
{
uint32_t checksum = 0;
unsigned i;
if (!pgp_is_sa_supported(sesskey->symm_alg)) {
return 0;
}
for (i = 0; i < pgp_key_size(sesskey->symm_alg); i++) {
checksum += sesskey->key[i];
}
checksum = checksum % 65536;
cs[0] = (uint8_t)((checksum >> 8) & 0xff);
cs[1] = (uint8_t)(checksum & 0xff);
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "nm buf checksum:", cs, 2);
}
return 1;
}
static unsigned
create_unencoded_m_buf(pgp_pk_sesskey_t *sesskey, pgp_crypt_t *cipherinfo, uint8_t *m_buf)
{
unsigned i;
/* m_buf is the buffer which will be encoded in PKCS#1 block
* encoding to form the "m" value used in the Public Key
* Encrypted Session Key Packet as defined in RFC Section 5.1
* "Public-Key Encrypted Session Key Packet"
*/
m_buf[0] = sesskey->symm_alg;
for (i = 0; i < cipherinfo->keysize ; i++) {
/* XXX - Flexelint - Warning 679: Suspicious Truncation in arithmetic expression combining with pointer */
m_buf[1 + i] = sesskey->key[i];
}
return pgp_calc_sesskey_checksum(sesskey,
m_buf + 1 + cipherinfo->keysize);
}
/**
\ingroup Core_Create
\brief implementation of EME-PKCS1-v1_5-ENCODE, as defined in OpenPGP RFC
\param M
\param mLen
\param pubkey
\param EM
\return 1 if OK; else 0
*/
unsigned
encode_m_buf(const uint8_t *M, size_t mLen, const pgp_pubkey_t * pubkey,
uint8_t *EM)
{
unsigned k;
unsigned i;
/* implementation of EME-PKCS1-v1_5-ENCODE, as defined in OpenPGP RFC */
switch (pubkey->alg) {
case PGP_PKA_RSA:
k = (unsigned)BN_num_bytes(pubkey->key.rsa.n);
if (mLen > k - 11) {
(void) fprintf(stderr, "encode_m_buf: message too long\n");
return 0;
}
break;
case PGP_PKA_DSA:
case PGP_PKA_ELGAMAL:
k = (unsigned)BN_num_bytes(pubkey->key.elgamal.p);
if (mLen > k - 11) {
(void) fprintf(stderr, "encode_m_buf: message too long\n");
return 0;
}
break;
default:
(void) fprintf(stderr, "encode_m_buf: pubkey algorithm\n");
return 0;
}
/* these two bytes defined by RFC */
EM[0] = 0x00;
EM[1] = 0x02;
/* add non-zero random bytes of length k - mLen -3 */
for (i = 2; i < (k - mLen) - 1; ++i) {
do {
pgp_random(EM + i, 1);
} while (EM[i] == 0);
}
if (i < 8 + 2) {
(void) fprintf(stderr, "encode_m_buf: bad i len\n");
return 0;
}
EM[i++] = 0;
(void) memcpy(EM + i, M, mLen);
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "Encoded Message:", EM, mLen);
}
return 1;
}
/**
\ingroup Core_Create
\brief Creates an pgp_pk_sesskey_t struct from keydata
\param key Keydata to use
\return pgp_pk_sesskey_t struct
\note It is the caller's responsiblity to free the returned pointer
\note Currently hard-coded to use CAST5
\note Currently hard-coded to use RSA
*/
pgp_pk_sesskey_t *
pgp_create_pk_sesskey(const pgp_key_t *key, const char *ciphername)
{
/*
* Creates a random session key and encrypts it for the given key
*
* Encryption used is PK,
* can be any, we're hardcoding RSA for now
*/
const pgp_pubkey_t *pubkey;
pgp_pk_sesskey_t *sesskey;
pgp_symm_alg_t cipher;
const uint8_t *id;
pgp_crypt_t cipherinfo;
uint8_t *unencoded_m_buf;
uint8_t *encoded_m_buf;
size_t sz_encoded_m_buf;
if (memcmp(key->encid, "\0\0\0\0\0\0\0\0", 8) == 0) {
pubkey = pgp_get_pubkey(key);
id = key->sigid;
} else {
pubkey = &key->enckey;
id = key->encid;
}
/* allocate unencoded_m_buf here */
(void) memset(&cipherinfo, 0x0, sizeof(cipherinfo));
pgp_crypt_any(&cipherinfo,
cipher = pgp_str_to_cipher((ciphername) ? ciphername : "cast5"));
unencoded_m_buf = calloc(1, cipherinfo.keysize + 1 + 2);
if (unencoded_m_buf == NULL) {
(void) fprintf(stderr,
"pgp_create_pk_sesskey: can't allocate\n");
return NULL;
}
switch(pubkey->alg) {
case PGP_PKA_RSA:
sz_encoded_m_buf = BN_num_bytes(pubkey->key.rsa.n);
break;
case PGP_PKA_DSA:
case PGP_PKA_ELGAMAL:
sz_encoded_m_buf = BN_num_bytes(pubkey->key.elgamal.p);
break;
default:
sz_encoded_m_buf = 0;
break;
}
if ((encoded_m_buf = calloc(1, sz_encoded_m_buf)) == NULL) {
(void) fprintf(stderr,
"pgp_create_pk_sesskey: can't allocate\n");
free(unencoded_m_buf);
return NULL;
}
if ((sesskey = calloc(1, sizeof(*sesskey))) == NULL) {
(void) fprintf(stderr,
"pgp_create_pk_sesskey: can't allocate\n");
free(unencoded_m_buf);
free(encoded_m_buf);
return NULL;
}
if (key->type != PGP_PTAG_CT_PUBLIC_KEY) {
(void) fprintf(stderr,
"pgp_create_pk_sesskey: bad type\n");
free(unencoded_m_buf);
free(encoded_m_buf);
free(sesskey);
return NULL;
}
sesskey->version = PGP_PKSK_V3;
(void) memcpy(sesskey->key_id, id, sizeof(sesskey->key_id));
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "Encrypting for keyid", id, sizeof(sesskey->key_id));
}
switch (pubkey->alg) {
case PGP_PKA_RSA:
case PGP_PKA_DSA:
case PGP_PKA_ELGAMAL:
break;
default:
(void) fprintf(stderr,
"pgp_create_pk_sesskey: bad pubkey algorithm\n");
free(unencoded_m_buf);
free(encoded_m_buf);
free(sesskey);
return NULL;
}
sesskey->alg = pubkey->alg;
sesskey->symm_alg = cipher;
pgp_random(sesskey->key, cipherinfo.keysize);
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "sesskey created", sesskey->key,
cipherinfo.keysize + 1 + 2);
}
if (create_unencoded_m_buf(sesskey, &cipherinfo, &unencoded_m_buf[0]) == 0) {
free(unencoded_m_buf);
free(encoded_m_buf);
free(sesskey);
return NULL;
}
if (pgp_get_debug_level(__FILE__)) {
hexdump(stderr, "uuencoded m buf", unencoded_m_buf, cipherinfo.keysize + 1 + 2);
}
encode_m_buf(unencoded_m_buf, cipherinfo.keysize + 1 + 2, pubkey, encoded_m_buf);
/* and encrypt it */
switch (key->key.pubkey.alg) {
case PGP_PKA_RSA:
if (!pgp_rsa_encrypt_mpi(encoded_m_buf, sz_encoded_m_buf, pubkey,
&sesskey->params)) {
free(unencoded_m_buf);
free(encoded_m_buf);
free(sesskey);
return NULL;
}
break;
case PGP_PKA_DSA:
case PGP_PKA_ELGAMAL:
if (!pgp_elgamal_encrypt_mpi(encoded_m_buf, sz_encoded_m_buf, pubkey,
&sesskey->params)) {
free(unencoded_m_buf);
free(encoded_m_buf);
free(sesskey);
return NULL;
}
break;
default:
/* will not get here - for lint only */
break;
}
free(unencoded_m_buf);
free(encoded_m_buf);
return sesskey;
}
/**
\ingroup Core_WritePackets
\brief Writes Public Key Session Key packet
\param info Write settings
\param pksk Public Key Session Key to write out
\return 1 if OK; else 0
*/
unsigned
pgp_write_pk_sesskey(pgp_output_t *output, pgp_pk_sesskey_t *pksk)
{
/* XXX - Flexelint - Pointer parameter 'pksk' (line 1076) could be declared as pointing to const */
if (pksk == NULL) {
(void) fprintf(stderr,
"pgp_write_pk_sesskey: NULL pksk\n");
return 0;
}
switch (pksk->alg) {
case PGP_PKA_RSA:
return pgp_write_ptag(output, PGP_PTAG_CT_PK_SESSION_KEY) &&
pgp_write_length(output, (unsigned)(1 + 8 + 1 +
BN_num_bytes(pksk->params.rsa.encrypted_m) + 2)) &&
pgp_write_scalar(output, (unsigned)pksk->version, 1) &&
pgp_write(output, pksk->key_id, 8) &&
pgp_write_scalar(output, (unsigned)pksk->alg, 1) &&
pgp_write_mpi(output, pksk->params.rsa.encrypted_m)
/* ?? && pgp_write_scalar(output, 0, 2); */
;
case PGP_PKA_DSA:
case PGP_PKA_ELGAMAL:
return pgp_write_ptag(output, PGP_PTAG_CT_PK_SESSION_KEY) &&
pgp_write_length(output, (unsigned)(1 + 8 + 1 +
BN_num_bytes(pksk->params.elgamal.g_to_k) + 2 +
BN_num_bytes(pksk->params.elgamal.encrypted_m) + 2)) &&
pgp_write_scalar(output, (unsigned)pksk->version, 1) &&
pgp_write(output, pksk->key_id, 8) &&
pgp_write_scalar(output, (unsigned)pksk->alg, 1) &&
pgp_write_mpi(output, pksk->params.elgamal.g_to_k) &&
pgp_write_mpi(output, pksk->params.elgamal.encrypted_m)
/* ?? && pgp_write_scalar(output, 0, 2); */
;
default:
(void) fprintf(stderr,
"pgp_write_pk_sesskey: bad algorithm\n");
return 0;
}
}
/**
\ingroup Core_WritePackets
\brief Writes MDC packet
\param hashed Hash for MDC
\param output Write settings
\return 1 if OK; else 0
*/
unsigned
pgp_write_mdc(pgp_output_t *output, const uint8_t *hashed)
{
/* write it out */
return pgp_write_ptag(output, PGP_PTAG_CT_MDC) &&
pgp_write_length(output, PGP_SHA1_HASH_SIZE) &&
pgp_write(output, hashed, PGP_SHA1_HASH_SIZE);
}
/**
\ingroup Core_WritePackets
\brief Writes Literal Data packet from buffer
\param data Buffer to write out
\param maxlen Max length of buffer
\param type Literal Data Type
\param output Write settings
\return 1 if OK; else 0
*/
unsigned
pgp_write_litdata(pgp_output_t *output,
const uint8_t *data,
const int maxlen,
const pgp_litdata_enum type)
{
/*
* RFC4880 does not specify a meaning for filename or date.
* It is implementation-dependent.
* We will not implement them.
*/
/* \todo do we need to check text data for <cr><lf> line endings ? */
return pgp_write_ptag(output, PGP_PTAG_CT_LITDATA) &&
pgp_write_length(output, (unsigned)(1 + 1 + 4 + maxlen)) &&
pgp_write_scalar(output, (unsigned)type, 1) &&
pgp_write_scalar(output, 0, 1) &&
pgp_write_scalar(output, 0, 4) &&
pgp_write(output, data, (unsigned)maxlen);
}
/**
\ingroup Core_WritePackets
\brief Writes Literal Data packet from contents of file
\param filename Name of file to read from
\param type Literal Data Type
\param output Write settings
\return 1 if OK; else 0
*/
unsigned
pgp_fileread_litdata(const char *filename,
const pgp_litdata_enum type,
pgp_output_t *output)
{
pgp_memory_t *mem;
unsigned ret;
int len;
mem = pgp_memory_new();
if (!pgp_mem_readfile(mem, filename)) {
(void) fprintf(stderr, "pgp_mem_readfile of '%s' failed\n", filename);
return 0;
}
len = (int)pgp_mem_len(mem);
ret = pgp_write_litdata(output, pgp_mem_data(mem), len, type);
pgp_memory_free(mem);
return ret;
}
/**
\ingroup HighLevel_General
\brief Writes contents of buffer into file
\param filename Filename to write to
\param buf Buffer to write to file
\param len Size of buffer
\param overwrite Flag to set whether to overwrite an existing file
\return 1 if OK; 0 if error
*/
int
pgp_filewrite(const char *filename, const char *buf,
const size_t len, const unsigned overwrite)
{
int flags;
int fd;
flags = O_WRONLY | O_CREAT;
if (overwrite) {
flags |= O_TRUNC;
} else {
flags |= O_EXCL;
}
#ifdef O_BINARY
flags |= O_BINARY;
#endif
fd = open(filename, flags, 0600);
if (fd < 0) {
(void) fprintf(stderr, "can't open '%s'\n", filename);
return 0;
}
if (write(fd, buf, len) != (int)len) {
(void) close(fd);
return 0;
}
return (close(fd) == 0);
}
/**
\ingroup Core_WritePackets
\brief Write Symmetrically Encrypted packet
\param data Data to encrypt
\param len Length of data
\param output Write settings
\return 1 if OK; else 0
\note Hard-coded to use AES256
*/
unsigned
pgp_write_symm_enc_data(const uint8_t *data,
const int len,
pgp_output_t * output)
{
pgp_crypt_t crypt_info;
uint8_t *encrypted = (uint8_t *) NULL;
size_t encrypted_sz;
int done = 0;
/* \todo assume AES256 for now */
pgp_crypt_any(&crypt_info, PGP_SA_AES_256);
pgp_encrypt_init(&crypt_info);
encrypted_sz = (size_t)(len + crypt_info.blocksize + 2);
if ((encrypted = calloc(1, encrypted_sz)) == NULL) {
(void) fprintf(stderr, "can't allocate %" PRIsize "d\n",
encrypted_sz);
return 0;
}
done = (int)pgp_encrypt_se(&crypt_info, encrypted, data, (unsigned)len);
if (done != len) {
(void) fprintf(stderr,
"pgp_write_symm_enc_data: done != len\n");
return 0;
}
return pgp_write_ptag(output, PGP_PTAG_CT_SE_DATA) &&
pgp_write_length(output, (unsigned)(1 + encrypted_sz)) &&
pgp_write(output, data, (unsigned)len);
}
/**
\ingroup Core_WritePackets
\brief Write a One Pass Signature packet
\param seckey Secret Key to use
\param hash_alg Hash Algorithm to use
\param sig_type Signature type
\param output Write settings
\return 1 if OK; else 0
*/
unsigned
pgp_write_one_pass_sig(pgp_output_t *output,
const pgp_seckey_t *seckey,
const pgp_hash_alg_t hash_alg,
const pgp_sig_type_t sig_type)
{
uint8_t keyid[PGP_KEY_ID_SIZE];
pgp_keyid(keyid, PGP_KEY_ID_SIZE, &seckey->pubkey, PGP_HASH_SHA1); /* XXX - hardcoded */
return pgp_write_ptag(output, PGP_PTAG_CT_1_PASS_SIG) &&
pgp_write_length(output, 1 + 1 + 1 + 1 + 8 + 1) &&
pgp_write_scalar(output, 3, 1) /* version */ &&
pgp_write_scalar(output, (unsigned)sig_type, 1) &&
pgp_write_scalar(output, (unsigned)hash_alg, 1) &&
pgp_write_scalar(output, (unsigned)seckey->pubkey.alg, 1) &&
pgp_write(output, keyid, 8) &&
pgp_write_scalar(output, 1, 1);
}