/* * Copyright (C) 2009 Martin Willi * Copyright (C) 2002-2009 Andreas Steffen * HSR Hochschule fuer Technik Rapperswil * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "pgp_builder.h" #include "pgp_utils.h" #include #include #include /** * Load a generic public key from a PGP packet */ static public_key_t *parse_public_key(chunk_t blob) { uint32_t alg; public_key_t *key; if (!pgp_read_scalar(&blob, 1, &alg)) { return NULL; } switch (alg) { case PGP_PUBKEY_ALG_RSA: case PGP_PUBKEY_ALG_RSA_SIGN_ONLY: key = lib->creds->create(lib->creds, CRED_PUBLIC_KEY, KEY_RSA, BUILD_BLOB_PGP, blob, BUILD_END); break; default: DBG1(DBG_LIB, "PGP public key algorithm %N not supported", pgp_pubkey_alg_names, alg); return NULL; } return key; } /** * Load a RSA public key from a PGP packet */ static public_key_t *parse_rsa_public_key(chunk_t blob) { chunk_t mpi[2]; int i; for (i = 0; i < 2; i++) { if (!pgp_read_mpi(&blob, &mpi[i])) { return NULL; } } return lib->creds->create(lib->creds, CRED_PUBLIC_KEY, KEY_RSA, BUILD_RSA_MODULUS, mpi[0], BUILD_RSA_PUB_EXP, mpi[1], BUILD_END); } /** * Load a RSA private key from a PGP packet */ static private_key_t *parse_rsa_private_key(chunk_t blob) { chunk_t mpi[6]; uint32_t s2k; int i; for (i = 0; i < 2; i++) { if (!pgp_read_mpi(&blob, &mpi[i])) { return NULL; } } if (!pgp_read_scalar(&blob, 1, &s2k)) { return NULL; } if (s2k == 255 || s2k == 254) { DBG1(DBG_LIB, "string-to-key specifiers not supported"); return NULL; } if (s2k != PGP_SYM_ALG_PLAIN) { DBG1(DBG_LIB, "%N private key encryption not supported", pgp_sym_alg_names, s2k); return NULL; } for (i = 2; i < 6; i++) { if (!pgp_read_mpi(&blob, &mpi[i])) { return NULL; } } /* PGP has uses p < q, but we use p > q */ return lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA, BUILD_RSA_MODULUS, mpi[0], BUILD_RSA_PUB_EXP, mpi[1], BUILD_RSA_PRIV_EXP, mpi[2], BUILD_RSA_PRIME2, mpi[3], BUILD_RSA_PRIME1, mpi[4], BUILD_RSA_COEFF, mpi[5], BUILD_END); } METHOD(private_key_t, sign_not_allowed, bool, private_key_t *this, signature_scheme_t scheme, void *params, chunk_t data, chunk_t *signature) { DBG1(DBG_LIB, "signing failed - decryption only key"); return FALSE; } METHOD(private_key_t, decrypt_not_allowed, bool, private_key_t *this, encryption_scheme_t scheme, chunk_t crypto, chunk_t *plain) { DBG1(DBG_LIB, "decryption failed - signature only key"); return FALSE; } /** * Load a generic private key from a PGP packet */ static private_key_t *parse_private_key(chunk_t blob) { chunk_t packet; pgp_packet_tag_t tag; uint32_t version, created, days, alg; private_key_t *key; if (!pgp_read_packet(&blob, &packet, &tag)) { return NULL; } if (!pgp_read_scalar(&packet, 1, &version)) { return NULL; } switch (version) { case 3: if (!pgp_read_scalar(&packet, 2, &days)) { return NULL; } break; case 4: break; default: DBG1(DBG_LIB, "PGP packet version V%d not supported", version); return NULL; } if (!pgp_read_scalar(&packet, 4, &created)) { return NULL; } if (!pgp_read_scalar(&packet, 1, &alg)) { return NULL; } switch (alg) { case PGP_PUBKEY_ALG_RSA: return lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA, BUILD_BLOB_PGP, packet, BUILD_END); case PGP_PUBKEY_ALG_RSA_ENC_ONLY: key = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA, BUILD_BLOB_PGP, packet, BUILD_END); if (key) { key->sign = _sign_not_allowed; } return key; case PGP_PUBKEY_ALG_RSA_SIGN_ONLY: key = lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_RSA, BUILD_BLOB_PGP, packet, BUILD_END); if (key) { key->decrypt = _decrypt_not_allowed; } return key; case PGP_PUBKEY_ALG_ECDSA: return lib->creds->create(lib->creds, CRED_PRIVATE_KEY, KEY_ECDSA, BUILD_BLOB_PGP, packet, BUILD_END); case PGP_PUBKEY_ALG_ELGAMAL_ENC_ONLY: case PGP_PUBKEY_ALG_DSA: case PGP_PUBKEY_ALG_ECC: case PGP_PUBKEY_ALG_ELGAMAL: case PGP_PUBKEY_ALG_DIFFIE_HELLMAN: default: return NULL; } } /** * See header. */ public_key_t *pgp_public_key_load(key_type_t type, va_list args) { chunk_t blob = chunk_empty; while (TRUE) { switch (va_arg(args, builder_part_t)) { case BUILD_BLOB_PGP: blob = va_arg(args, chunk_t); continue; case BUILD_END: break; default: return NULL; } break; } switch (type) { case KEY_ANY: return parse_public_key(blob); case KEY_RSA: return parse_rsa_public_key(blob); default: return NULL; } } /** * See header. */ private_key_t *pgp_private_key_load(key_type_t type, va_list args) { chunk_t blob = chunk_empty; while (TRUE) { switch (va_arg(args, builder_part_t)) { case BUILD_BLOB_PGP: blob = va_arg(args, chunk_t); continue; case BUILD_END: break; default: return NULL; } break; } switch (type) { case KEY_ANY: return parse_private_key(blob); case KEY_RSA: return parse_rsa_private_key(blob); default: return NULL; } }