mirror of
https://github.com/bjc/prosody.git
synced 2025-04-04 21:57:45 +03:00
util.crypto: Add support for RSA signatures (PKCS1-v1.5 + PSS)
These are used by the RS*** and PS*** family of JOSE algorithms (e.g. in JWTs)
This commit is contained in:
parent
ae16ddcac7
commit
ba282f1070
1 changed files with 31 additions and 3 deletions
|
@ -47,11 +47,13 @@ MANAGED_POINTER_ALLOCATOR(new_managed_EVP_CIPHER_CTX, EVP_CIPHER_CTX*, EVP_CIPHE
|
||||||
|
|
||||||
static EVP_PKEY* pkey_from_arg(lua_State *L, int idx, const int type, const int require_private) {
|
static EVP_PKEY* pkey_from_arg(lua_State *L, int idx, const int type, const int require_private) {
|
||||||
EVP_PKEY *pkey = *(EVP_PKEY**)luaL_checkudata(L, idx, PKEY_MT_TAG);
|
EVP_PKEY *pkey = *(EVP_PKEY**)luaL_checkudata(L, idx, PKEY_MT_TAG);
|
||||||
|
int got_type;
|
||||||
if(type || require_private) {
|
if(type || require_private) {
|
||||||
lua_getuservalue(L, idx);
|
lua_getuservalue(L, idx);
|
||||||
if(type != 0) {
|
if(type != 0) {
|
||||||
lua_getfield(L, -1, "type");
|
lua_getfield(L, -1, "type");
|
||||||
if(lua_tointeger(L, -1) != type) {
|
got_type = lua_tointeger(L, -1);
|
||||||
|
if(got_type != type) {
|
||||||
luaL_argerror(L, idx, "unexpected key type");
|
luaL_argerror(L, idx, "unexpected key type");
|
||||||
}
|
}
|
||||||
lua_pop(L, 1);
|
lua_pop(L, 1);
|
||||||
|
@ -83,7 +85,7 @@ static int Lpkey_meth_get_type(lua_State *L) {
|
||||||
}
|
}
|
||||||
|
|
||||||
static int base_evp_sign(lua_State *L, const int key_type, const EVP_MD *digest_type) {
|
static int base_evp_sign(lua_State *L, const int key_type, const EVP_MD *digest_type) {
|
||||||
EVP_PKEY *pkey = pkey_from_arg(L, 1, key_type, 1);
|
EVP_PKEY *pkey = pkey_from_arg(L, 1, (key_type!=NID_rsassaPss)?key_type:NID_rsaEncryption, 1);
|
||||||
luaL_Buffer sigbuf;
|
luaL_Buffer sigbuf;
|
||||||
|
|
||||||
size_t msg_len;
|
size_t msg_len;
|
||||||
|
@ -97,6 +99,9 @@ static int base_evp_sign(lua_State *L, const int key_type, const EVP_MD *digest_
|
||||||
lua_pushnil(L);
|
lua_pushnil(L);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
if(key_type == NID_rsassaPss) {
|
||||||
|
EVP_PKEY_CTX_set_rsa_padding(EVP_MD_CTX_pkey_ctx(md_ctx), RSA_PKCS1_PSS_PADDING);
|
||||||
|
}
|
||||||
if(EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len) != 1) {
|
if(EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len) != 1) {
|
||||||
lua_pushnil(L);
|
lua_pushnil(L);
|
||||||
return 1;
|
return 1;
|
||||||
|
@ -119,7 +124,7 @@ static int base_evp_sign(lua_State *L, const int key_type, const EVP_MD *digest_
|
||||||
}
|
}
|
||||||
|
|
||||||
static int base_evp_verify(lua_State *L, const int key_type, const EVP_MD *digest_type) {
|
static int base_evp_verify(lua_State *L, const int key_type, const EVP_MD *digest_type) {
|
||||||
EVP_PKEY *pkey = pkey_from_arg(L, 1, key_type, 0);
|
EVP_PKEY *pkey = pkey_from_arg(L, 1, (key_type!=NID_rsassaPss)?key_type:NID_rsaEncryption, 0);
|
||||||
|
|
||||||
size_t msg_len;
|
size_t msg_len;
|
||||||
const unsigned char *msg = (unsigned char*)luaL_checklstring(L, 2, &msg_len);
|
const unsigned char *msg = (unsigned char*)luaL_checklstring(L, 2, &msg_len);
|
||||||
|
@ -133,6 +138,9 @@ static int base_evp_verify(lua_State *L, const int key_type, const EVP_MD *diges
|
||||||
lua_pushnil(L);
|
lua_pushnil(L);
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
if(key_type == NID_rsassaPss) {
|
||||||
|
EVP_PKEY_CTX_set_rsa_padding(EVP_MD_CTX_pkey_ctx(md_ctx), RSA_PKCS1_PSS_PADDING);
|
||||||
|
}
|
||||||
int result = EVP_DigestVerify(md_ctx, sig, sig_len, msg, msg_len);
|
int result = EVP_DigestVerify(md_ctx, sig, sig_len, msg, msg_len);
|
||||||
if(result == 0) {
|
if(result == 0) {
|
||||||
lua_pushboolean(L, 0);
|
lua_pushboolean(L, 0);
|
||||||
|
@ -279,6 +287,22 @@ static int Led25519_verify(lua_State *L) {
|
||||||
return base_evp_verify(L, NID_ED25519, NULL);
|
return base_evp_verify(L, NID_ED25519, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int Lrsassa_pkcs1_256_sign(lua_State *L) {
|
||||||
|
return base_evp_sign(L, NID_rsaEncryption, EVP_sha256());
|
||||||
|
}
|
||||||
|
|
||||||
|
static int Lrsassa_pkcs1_256_verify(lua_State *L) {
|
||||||
|
return base_evp_verify(L, NID_rsaEncryption, EVP_sha256());
|
||||||
|
}
|
||||||
|
|
||||||
|
static int Lrsassa_pss_256_sign(lua_State *L) {
|
||||||
|
return base_evp_sign(L, NID_rsassaPss, EVP_sha256());
|
||||||
|
}
|
||||||
|
|
||||||
|
static int Lrsassa_pss_256_verify(lua_State *L) {
|
||||||
|
return base_evp_verify(L, NID_rsassaPss, EVP_sha256());
|
||||||
|
}
|
||||||
|
|
||||||
/* gcm_encrypt(key, iv, plaintext) */
|
/* gcm_encrypt(key, iv, plaintext) */
|
||||||
static int Laes_gcm_encrypt(lua_State *L, const EVP_CIPHER *cipher, const unsigned char expected_key_len) {
|
static int Laes_gcm_encrypt(lua_State *L, const EVP_CIPHER *cipher, const unsigned char expected_key_len) {
|
||||||
EVP_CIPHER_CTX *ctx;
|
EVP_CIPHER_CTX *ctx;
|
||||||
|
@ -503,6 +527,10 @@ static int Lbuild_ecdsa_signature(lua_State *L) {
|
||||||
static const luaL_Reg Reg[] = {
|
static const luaL_Reg Reg[] = {
|
||||||
{ "ed25519_sign", Led25519_sign },
|
{ "ed25519_sign", Led25519_sign },
|
||||||
{ "ed25519_verify", Led25519_verify },
|
{ "ed25519_verify", Led25519_verify },
|
||||||
|
{ "rsassa_pkcs1_256_sign", Lrsassa_pkcs1_256_sign },
|
||||||
|
{ "rsassa_pkcs1_256_verify", Lrsassa_pkcs1_256_verify },
|
||||||
|
{ "rsassa_pss_256_sign", Lrsassa_pss_256_sign },
|
||||||
|
{ "rsassa_pss_256_verify", Lrsassa_pss_256_verify },
|
||||||
{ "aes_128_gcm_encrypt", Laes_128_gcm_encrypt },
|
{ "aes_128_gcm_encrypt", Laes_128_gcm_encrypt },
|
||||||
{ "aes_128_gcm_decrypt", Laes_128_gcm_decrypt },
|
{ "aes_128_gcm_decrypt", Laes_128_gcm_decrypt },
|
||||||
{ "aes_256_gcm_encrypt", Laes_256_gcm_encrypt },
|
{ "aes_256_gcm_encrypt", Laes_256_gcm_encrypt },
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue