challcli.c

来自「支持SSL v2/v3, TLS, PKCS #5, PKCS #7, PKCS」· C语言 代码 · 共 285 行

C
285
字号
/* -*- Mode: C; tab-width: 8 -*-*//* * The contents of this file are subject to the Mozilla Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/MPL/ *  * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. *  * The Original Code is the Netscape security libraries. *  * The Initial Developer of the Original Code is Netscape * Communications Corporation.  Portions created by Netscape are  * Copyright (C) 1994-2000 Netscape Communications Corporation.  All * Rights Reserved. *  * Contributor(s): *  * Alternatively, the contents of this file may be used under the * terms of the GNU General Public License Version 2 or later (the * "GPL"), in which case the provisions of the GPL are applicable  * instead of those above.  If you wish to allow use of your  * version of this file only under the terms of the GPL and not to * allow others to use your version of this file under the MPL, * indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by * the GPL.  If you do not delete the provisions above, a recipient * may use your version of this file under either the MPL or the * GPL. */#include "cmmf.h"#include "cmmfi.h"#include "secitem.h"#include "pk11func.h"CMMFPOPODecKeyChallContent*CMMF_CreatePOPODecKeyChallContentFromDER(const char *buf, long len){    PRArenaPool                *poolp;    CMMFPOPODecKeyChallContent *challContent;    SECStatus                   rv;    poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);    if (poolp == NULL) {        return NULL;    }    challContent = PORT_ArenaZNew(poolp, CMMFPOPODecKeyChallContent);    if (challContent == NULL) {        goto loser;    }    challContent->poolp = poolp;    rv = SEC_ASN1Decode(poolp, challContent, 			CMMFPOPODecKeyChallContentTemplate, buf, len);    if (rv != SECSuccess) {        goto loser;    }    if (challContent->challenges) {      while (challContent->challenges[challContent->numChallenges] != NULL) {	  challContent->numChallenges++;      }      challContent->numAllocated = challContent->numChallenges;    }    return challContent; loser:    if (poolp != NULL) {        PORT_FreeArena(poolp, PR_FALSE);    }    return NULL;}intCMMF_POPODecKeyChallContentGetNumChallenges                               (CMMFPOPODecKeyChallContent *inKeyChallCont){    PORT_Assert(inKeyChallCont != NULL);    if (inKeyChallCont == NULL) {        return 0;    }    return inKeyChallCont->numChallenges;}SECItem* CMMF_POPODecKeyChallContentGetPublicValue                                   (CMMFPOPODecKeyChallContent *inKeyChallCont,				    int                         inIndex){    PORT_Assert(inKeyChallCont != NULL);    if (inKeyChallCont == NULL || (inIndex > inKeyChallCont->numChallenges-1)||	inIndex < 0) {        return NULL;    }    return SECITEM_DupItem(&inKeyChallCont->challenges[inIndex]->key);}static SECAlgorithmID*cmmf_get_owf(CMMFPOPODecKeyChallContent *inChalCont, 	     int                         inIndex){   int i;      for (i=inIndex; i >= 0; i--) {       if (inChalCont->challenges[i]->owf != NULL) {	   return inChalCont->challenges[i]->owf;       }   }   return NULL;}SECStatus CMMF_POPODecKeyChallContDecryptChallenge(CMMFPOPODecKeyChallContent *inChalCont,					 int                         inIndex,					 SECKEYPrivateKey           *inPrivKey){    CMMFChallenge  *challenge;    SECItem        *decryptedRand=NULL;    SECStatus       rv = SECFailure;    PK11SlotInfo   *slot;    PK11SymKey     *symKey = NULL;    CMMFRand        randStr;    SECAlgorithmID *owf;    unsigned char   hash[SHA1_LENGTH]; /*SHA1 is the longest, so we'll use					*it's length.					*/    SECItem         hashItem;    SECOidTag       tag;    PORT_Assert(inChalCont != NULL && inPrivKey != NULL);    if (inChalCont == NULL || inIndex <0 || inIndex > inChalCont->numChallenges	|| inPrivKey == NULL){        return SECFailure;    }    challenge = inChalCont->challenges[inIndex];    decryptedRand = PORT_ZNew(SECItem);    if (decryptedRand == NULL) {        goto loser;    }    decryptedRand->data =         PORT_NewArray(unsigned char, challenge->challenge.len);    if (decryptedRand->data == NULL) {        goto loser;    }    slot = inPrivKey->pkcs11Slot;    symKey = PK11_PubUnwrapSymKey(inPrivKey, &challenge->challenge, 				  CKM_RSA_PKCS, CKA_VALUE, 0);    if (symKey == NULL) {      rv = SECFailure;      goto loser;    }    rv = PK11_ExtractKeyValue(symKey);    if (rv != SECSuccess) {      goto loser;    }    decryptedRand = PK11_GetKeyData(symKey);    rv = SEC_ASN1DecodeItem(NULL, &randStr, CMMFRandTemplate,			    decryptedRand);     /* The decryptedRand returned points to a member within the symKey structure,     * so we don't want to free it. Let the symKey destruction function deal with     * freeing that memory.     */    if (rv != SECSuccess) {        goto loser;    }    rv = SECFailure; /* Just so that when we do go to loser,		      * I won't have to set it again.		      */    owf = cmmf_get_owf(inChalCont, inIndex);    if (owf == NULL) {        /* No hashing algorithm came with the challenges.  Can't verify */        goto loser;    }    /* Verify the hashes in the challenge */    tag = SECOID_FindOIDTag(&owf->algorithm);    switch (tag) {    case SEC_OID_MD2:        hashItem.len = MD2_LENGTH;	break;    case SEC_OID_MD5:        hashItem.len = MD5_LENGTH;	break;    case SEC_OID_SHA1:        hashItem.len = SHA1_LENGTH;	break;    default:        goto loser;    }    rv = PK11_HashBuf(tag, hash, randStr.integer.data, randStr.integer.len);    if (rv != SECSuccess) {        goto loser;    }    hashItem.data = hash;    if (SECITEM_CompareItem(&hashItem, &challenge->witness) != SECEqual) {        /* The hash for the data we decrypted doesn't match the hash provided	 * in the challenge.  Bail out.	 */        rv = SECFailure;	goto loser;    }    rv = PK11_HashBuf(tag, hash, challenge->senderDER.data, 		      challenge->senderDER.len);    if (rv != SECSuccess) {        goto loser;    }    if (SECITEM_CompareItem(&hashItem, &randStr.senderHash) != SECEqual) {        /* The hash for the data we decrypted doesn't match the hash provided	 * in the challenge.  Bail out.	 */        rv = SECFailure;	goto loser;    }    /* All of the hashes have verified, so we can now store the integer away.*/    rv = SECITEM_CopyItem(inChalCont->poolp, &challenge->randomNumber,			  &randStr.integer); loser:    if (symKey != NULL) {        PK11_FreeSymKey(symKey);    }    return rv;}SECStatusCMMF_POPODecKeyChallContentGetRandomNumber                                   (CMMFPOPODecKeyChallContent *inKeyChallCont,				    int                          inIndex,				    long                        *inDest){    CMMFChallenge *challenge;        PORT_Assert(inKeyChallCont != NULL);    if (inKeyChallCont == NULL || inIndex > 0 || inIndex >= 	inKeyChallCont->numChallenges) {        return SECFailure;    }    challenge = inKeyChallCont->challenges[inIndex];    if (challenge->randomNumber.data == NULL) {        /* There is no random number here, nothing to see. */        return SECFailure;    }    *inDest = DER_GetInteger(&challenge->randomNumber);    return (*inDest == -1) ? SECFailure : SECSuccess;}SECStatus CMMF_EncodePOPODecKeyRespContent(long                     *inDecodedRand,				 int                       inNumRand,				 CRMFEncoderOutputCallback inCallback,				 void                     *inArg){    PRArenaPool *poolp;    CMMFPOPODecKeyRespContent *response;    SECItem *currItem;    SECStatus rv=SECFailure;    int i;    poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);    if (poolp == NULL) {        return SECFailure;    }    response = PORT_ArenaZNew(poolp, CMMFPOPODecKeyRespContent);    if (response == NULL) {        goto loser;    }    response->responses = PORT_ArenaZNewArray(poolp, SECItem*, inNumRand+1);    if (response->responses == NULL) {        goto loser;    }    for (i=0; i<inNumRand; i++) {        currItem = response->responses[i] = PORT_ArenaZNew(poolp,SECItem);	if (currItem == NULL) {	    goto loser;	}	SEC_ASN1EncodeInteger(poolp, currItem,inDecodedRand[i]);    }    rv = cmmf_user_encode(response, inCallback, inArg,			  CMMFPOPODecKeyRespContentTemplate); loser:    if (poolp != NULL) {        PORT_FreeArena(poolp, PR_FALSE);    }    return rv;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?