mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-02-04 08:20:28 +01:00
libnm/crypto: clean crypto implementations for gnutls/nss
- refactor to use cleanup attribute and return-early - reorder some code
This commit is contained in:
parent
08c80dd2e3
commit
116ee7a4bf
2 changed files with 171 additions and 181 deletions
|
|
@ -60,16 +60,16 @@ _get_cipher_info (NMCryptoCipherType cipher,
|
|||
|
||||
/*****************************************************************************/
|
||||
|
||||
static gboolean initialized = FALSE;
|
||||
|
||||
gboolean
|
||||
_nm_crypto_init (GError **error)
|
||||
{
|
||||
static gboolean initialized = FALSE;
|
||||
|
||||
if (initialized)
|
||||
return TRUE;
|
||||
|
||||
if (gnutls_global_init() != 0) {
|
||||
gnutls_global_deinit();
|
||||
if (gnutls_global_init () != 0) {
|
||||
gnutls_global_deinit ();
|
||||
g_set_error_literal (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_FAILED,
|
||||
_("Failed to initialize the crypto engine."));
|
||||
|
|
@ -80,6 +80,8 @@ _nm_crypto_init (GError **error)
|
|||
return TRUE;
|
||||
}
|
||||
|
||||
/*****************************************************************************/
|
||||
|
||||
guint8 *
|
||||
_nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
||||
const guint8 *data,
|
||||
|
|
@ -94,10 +96,9 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
gnutls_cipher_hd_t ctx;
|
||||
gnutls_datum_t key_dt, iv_dt;
|
||||
int err;
|
||||
int cipher_mech, i;
|
||||
char *output = NULL;
|
||||
gboolean success = FALSE;
|
||||
gsize pad_len;
|
||||
int cipher_mech;
|
||||
nm_auto_clear_secret_ptr NMSecretPtr output = { 0 };
|
||||
guint8 pad_i, pad_len;
|
||||
guint8 real_iv_len;
|
||||
|
||||
if (!_get_cipher_info (cipher, &cipher_mech, &real_iv_len)) {
|
||||
|
|
@ -118,7 +119,8 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
return NULL;
|
||||
}
|
||||
|
||||
output = g_malloc0 (data_len);
|
||||
output.len = data_len;
|
||||
output.bin = g_malloc (data_len);
|
||||
|
||||
key_dt.data = (unsigned char *) key;
|
||||
key_dt.size = key_len;
|
||||
|
|
@ -131,52 +133,48 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Failed to initialize the decryption cipher context: %s (%s)"),
|
||||
gnutls_strerror_name (err), gnutls_strerror (err));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
err = gnutls_cipher_decrypt2 (ctx, data, data_len, output, data_len);
|
||||
err = gnutls_cipher_decrypt2 (ctx, data, data_len, output.bin, output.len);
|
||||
|
||||
gnutls_cipher_deinit (ctx);
|
||||
|
||||
if (err < 0) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Failed to decrypt the private key: %s (%s)"),
|
||||
gnutls_strerror_name (err), gnutls_strerror (err));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
pad_len = output[data_len - 1];
|
||||
|
||||
pad_len = output.len > 0
|
||||
? output.bin[output.len - 1]
|
||||
: 0;
|
||||
|
||||
/* Check if the padding at the end of the decrypted data is valid */
|
||||
if (pad_len == 0 || pad_len > real_iv_len) {
|
||||
if ( pad_len == 0
|
||||
|| pad_len > real_iv_len) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Failed to decrypt the private key: unexpected padding length."));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* Validate tail padding; last byte is the padding size, and all pad bytes
|
||||
* should contain the padding size.
|
||||
*/
|
||||
for (i = 1; i <= pad_len; ++i) {
|
||||
if (output[data_len - i] != pad_len) {
|
||||
for (pad_i = 1; pad_i <= pad_len; ++pad_i) {
|
||||
if (output.bin[data_len - pad_i] != pad_len) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Failed to decrypt the private key."));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
}
|
||||
|
||||
*out_len = data_len - pad_len;
|
||||
success = TRUE;
|
||||
|
||||
out:
|
||||
if (!success) {
|
||||
if (output) {
|
||||
nm_explicit_bzero (output, data_len);
|
||||
g_free (output);
|
||||
output = NULL;
|
||||
}
|
||||
}
|
||||
gnutls_cipher_deinit (ctx);
|
||||
return (guint8 *) output;
|
||||
*out_len = output.len - pad_len;
|
||||
return g_steal_pointer (&output.bin);
|
||||
}
|
||||
|
||||
guint8 *
|
||||
|
|
@ -194,11 +192,11 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
gnutls_datum_t key_dt, iv_dt;
|
||||
int err;
|
||||
int cipher_mech;
|
||||
char *output = NULL;
|
||||
gboolean success = FALSE;
|
||||
gsize padded_buf_len, pad_len, output_len;
|
||||
char *padded_buf = NULL;
|
||||
guint32 i;
|
||||
nm_auto_clear_secret_ptr NMSecretPtr output = { 0 };
|
||||
nm_auto_clear_secret_ptr NMSecretPtr padded_buf = { 0 };
|
||||
gsize i, pad_len;
|
||||
|
||||
nm_assert (iv_len);
|
||||
|
||||
if ( cipher == NM_CRYPTO_CIPHER_DES_CBC
|
||||
|| !_get_cipher_info (cipher, &cipher_mech, NULL)) {
|
||||
|
|
@ -211,19 +209,6 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
if (!_nm_crypto_init (error))
|
||||
return NULL;
|
||||
|
||||
/* If data_len % ivlen == 0, then we add another complete block
|
||||
* onto the end so that the decrypter knows there's padding.
|
||||
*/
|
||||
pad_len = iv_len - (data_len % iv_len);
|
||||
output_len = padded_buf_len = data_len + pad_len;
|
||||
padded_buf = g_malloc0 (padded_buf_len);
|
||||
|
||||
memcpy (padded_buf, data, data_len);
|
||||
for (i = 0; i < pad_len; i++)
|
||||
padded_buf[data_len + i] = (guint8) (pad_len & 0xFF);
|
||||
|
||||
output = g_malloc0 (output_len);
|
||||
|
||||
key_dt.data = (unsigned char *) key;
|
||||
key_dt.size = key_len;
|
||||
iv_dt.data = (unsigned char *) iv;
|
||||
|
|
@ -235,37 +220,37 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
NM_CRYPTO_ERROR_ENCRYPTION_FAILED,
|
||||
_("Failed to initialize the encryption cipher context: %s (%s)"),
|
||||
gnutls_strerror_name (err), gnutls_strerror (err));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
err = gnutls_cipher_encrypt2 (ctx, padded_buf, padded_buf_len, output, output_len);
|
||||
/* If data_len % ivlen == 0, then we add another complete block
|
||||
* onto the end so that the decrypter knows there's padding.
|
||||
*/
|
||||
pad_len = iv_len - (data_len % iv_len);
|
||||
|
||||
padded_buf.len = data_len + pad_len;
|
||||
padded_buf.bin = g_malloc (padded_buf.len);
|
||||
memcpy (padded_buf.bin, data, data_len);
|
||||
for (i = 0; i < pad_len; i++)
|
||||
padded_buf.bin[data_len + i] = (guint8) (pad_len & 0xFF);
|
||||
|
||||
output.len = padded_buf.len;
|
||||
output.bin = g_malloc (output.len);
|
||||
|
||||
err = gnutls_cipher_encrypt2 (ctx, padded_buf.bin, padded_buf.len, output.bin, output.len);
|
||||
|
||||
gnutls_cipher_deinit (ctx);
|
||||
|
||||
if (err < 0) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_ENCRYPTION_FAILED,
|
||||
_("Failed to encrypt the data: %s (%s)"),
|
||||
gnutls_strerror_name (err), gnutls_strerror (err));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
*out_len = output_len;
|
||||
success = TRUE;
|
||||
|
||||
out:
|
||||
if (padded_buf) {
|
||||
nm_explicit_bzero (padded_buf, padded_buf_len);
|
||||
g_free (padded_buf);
|
||||
padded_buf = NULL;
|
||||
}
|
||||
|
||||
if (!success) {
|
||||
if (output) {
|
||||
nm_explicit_bzero (output, output_len);
|
||||
g_free (output);
|
||||
output = NULL;
|
||||
}
|
||||
}
|
||||
gnutls_cipher_deinit (ctx);
|
||||
return (guint8 *) output;
|
||||
*out_len = output.len;
|
||||
return g_steal_pointer (&output.bin);
|
||||
}
|
||||
|
||||
gboolean
|
||||
|
|
@ -319,7 +304,6 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
{
|
||||
gnutls_pkcs12_t p12;
|
||||
gnutls_datum_t dt;
|
||||
gboolean success = FALSE;
|
||||
int err;
|
||||
|
||||
g_return_val_if_fail (data != NULL, FALSE);
|
||||
|
|
@ -349,23 +333,24 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
NM_CRYPTO_ERROR_INVALID_DATA,
|
||||
_("Couldn't decode PKCS#12 file: %s"),
|
||||
gnutls_strerror (err));
|
||||
goto out;
|
||||
gnutls_pkcs12_deinit (p12);
|
||||
return FALSE;
|
||||
}
|
||||
}
|
||||
|
||||
err = gnutls_pkcs12_verify_mac (p12, password);
|
||||
if (err == GNUTLS_E_SUCCESS)
|
||||
success = TRUE;
|
||||
else {
|
||||
|
||||
gnutls_pkcs12_deinit (p12);
|
||||
|
||||
if (err != GNUTLS_E_SUCCESS) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Couldn't verify PKCS#12 file: %s"),
|
||||
gnutls_strerror (err));
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
out:
|
||||
gnutls_pkcs12_deinit (p12);
|
||||
return success;
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
gboolean
|
||||
|
|
@ -384,9 +369,6 @@ _nm_crypto_verify_pkcs8 (const guint8 *data,
|
|||
if (!_nm_crypto_init (error))
|
||||
return FALSE;
|
||||
|
||||
dt.data = (unsigned char *) data;
|
||||
dt.size = data_len;
|
||||
|
||||
err = gnutls_x509_privkey_init (&p8);
|
||||
if (err < 0) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
|
|
@ -396,11 +378,15 @@ _nm_crypto_verify_pkcs8 (const guint8 *data,
|
|||
return FALSE;
|
||||
}
|
||||
|
||||
dt.data = (unsigned char *) data;
|
||||
dt.size = data_len;
|
||||
|
||||
err = gnutls_x509_privkey_import_pkcs8 (p8,
|
||||
&dt,
|
||||
GNUTLS_X509_FMT_DER,
|
||||
is_encrypted ? password : NULL,
|
||||
is_encrypted ? 0 : GNUTLS_PKCS_PLAIN);
|
||||
|
||||
gnutls_x509_privkey_deinit (p8);
|
||||
|
||||
if (err < 0) {
|
||||
|
|
|
|||
|
|
@ -65,17 +65,16 @@ _get_cipher_info (NMCryptoCipherType cipher,
|
|||
|
||||
/*****************************************************************************/
|
||||
|
||||
static gboolean initialized = FALSE;
|
||||
|
||||
gboolean
|
||||
_nm_crypto_init (GError **error)
|
||||
{
|
||||
static gboolean initialized = FALSE;
|
||||
SECStatus ret;
|
||||
|
||||
if (initialized)
|
||||
return TRUE;
|
||||
|
||||
PR_Init(PR_USER_THREAD, PR_PRIORITY_NORMAL, 1);
|
||||
PR_Init (PR_USER_THREAD, PR_PRIORITY_NORMAL, 1);
|
||||
ret = NSS_NoDB_Init (NULL);
|
||||
if (ret != SECSuccess) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
|
|
@ -86,13 +85,13 @@ _nm_crypto_init (GError **error)
|
|||
return FALSE;
|
||||
}
|
||||
|
||||
SEC_PKCS12EnableCipher(PKCS12_RC4_40, 1);
|
||||
SEC_PKCS12EnableCipher(PKCS12_RC4_128, 1);
|
||||
SEC_PKCS12EnableCipher(PKCS12_RC2_CBC_40, 1);
|
||||
SEC_PKCS12EnableCipher(PKCS12_RC2_CBC_128, 1);
|
||||
SEC_PKCS12EnableCipher(PKCS12_DES_56, 1);
|
||||
SEC_PKCS12EnableCipher(PKCS12_DES_EDE3_168, 1);
|
||||
SEC_PKCS12SetPreferredCipher(PKCS12_DES_EDE3_168, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_RC4_40, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_RC4_128, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_RC2_CBC_40, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_RC2_CBC_128, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_DES_56, 1);
|
||||
SEC_PKCS12EnableCipher (PKCS12_DES_EDE3_168, 1);
|
||||
SEC_PKCS12SetPreferredCipher (PKCS12_DES_EDE3_168, 1);
|
||||
|
||||
initialized = TRUE;
|
||||
return TRUE;
|
||||
|
|
@ -109,17 +108,18 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
gsize *out_len,
|
||||
GError **error)
|
||||
{
|
||||
char *output = NULL;
|
||||
int decrypted_len = 0;
|
||||
CK_MECHANISM_TYPE cipher_mech;
|
||||
PK11SlotInfo *slot = NULL;
|
||||
SECItem key_item;
|
||||
PK11SymKey *sym_key = NULL;
|
||||
SECItem *sec_param = NULL;
|
||||
PK11Context *ctx = NULL;
|
||||
nm_auto_clear_secret_ptr NMSecretPtr output = { 0 };
|
||||
SECStatus s;
|
||||
gboolean success = FALSE;
|
||||
unsigned pad_len = 0, extra = 0;
|
||||
int decrypted_len = 0;
|
||||
unsigned extra = 0;
|
||||
unsigned pad_len = 0;
|
||||
guint32 i;
|
||||
guint8 real_iv_len;
|
||||
|
||||
|
|
@ -130,9 +130,6 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
return NULL;
|
||||
}
|
||||
|
||||
if (!_nm_crypto_init (error))
|
||||
return NULL;
|
||||
|
||||
if (iv_len < real_iv_len) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_INVALID_DATA,
|
||||
|
|
@ -141,7 +138,8 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
return NULL;
|
||||
}
|
||||
|
||||
output = g_malloc0 (data_len);
|
||||
if (!_nm_crypto_init (error))
|
||||
return NULL;
|
||||
|
||||
slot = PK11_GetBestSlot (cipher_mech, NULL);
|
||||
if (!slot) {
|
||||
|
|
@ -179,10 +177,13 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
goto out;
|
||||
}
|
||||
|
||||
output.len = data_len;
|
||||
output.bin = g_malloc (data_len);
|
||||
|
||||
s = PK11_CipherOp (ctx,
|
||||
(unsigned char *) output,
|
||||
(unsigned char *) output.bin,
|
||||
&decrypted_len,
|
||||
data_len,
|
||||
output.len,
|
||||
data,
|
||||
data_len);
|
||||
if (s != SECSuccess) {
|
||||
|
|
@ -201,7 +202,7 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
}
|
||||
|
||||
s = PK11_DigestFinal (ctx,
|
||||
(unsigned char *) (output + decrypted_len),
|
||||
(unsigned char *) &output.bin[decrypted_len],
|
||||
&extra,
|
||||
data_len - decrypted_len);
|
||||
if (s != SECSuccess) {
|
||||
|
|
@ -211,6 +212,7 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
PORT_GetError ());
|
||||
goto out;
|
||||
}
|
||||
|
||||
decrypted_len += extra;
|
||||
pad_len = data_len - decrypted_len;
|
||||
|
||||
|
|
@ -226,7 +228,7 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
* should contain the padding size.
|
||||
*/
|
||||
for (i = pad_len; i > 0; i--) {
|
||||
if (output[data_len - i] != pad_len) {
|
||||
if (output.bin[data_len - i] != pad_len) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Failed to decrypt the private key."));
|
||||
|
|
@ -234,7 +236,6 @@ _nmtst_crypto_decrypt (NMCryptoCipherType cipher,
|
|||
}
|
||||
}
|
||||
|
||||
*out_len = decrypted_len;
|
||||
success = TRUE;
|
||||
|
||||
out:
|
||||
|
|
@ -247,14 +248,13 @@ out:
|
|||
if (slot)
|
||||
PK11_FreeSlot (slot);
|
||||
|
||||
if (!success) {
|
||||
if (output) {
|
||||
nm_explicit_bzero (output, data_len);
|
||||
g_free (output);
|
||||
output = NULL;
|
||||
}
|
||||
}
|
||||
return (guint8 *) output;
|
||||
if (!success)
|
||||
return NULL;
|
||||
|
||||
if (decrypted_len < output.len)
|
||||
nm_explicit_bzero (&output.bin[decrypted_len], output.len - decrypted_len);
|
||||
*out_len = decrypted_len;
|
||||
return g_steal_pointer (&output.bin);
|
||||
}
|
||||
|
||||
guint8 *
|
||||
|
|
@ -276,14 +276,11 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
PK11SymKey *sym_key = NULL;
|
||||
SECItem *sec_param = NULL;
|
||||
PK11Context *ctx = NULL;
|
||||
unsigned char *output, *padded_buf;
|
||||
gsize output_len;
|
||||
nm_auto_clear_secret_ptr NMSecretPtr padded_buf = { 0 };
|
||||
nm_auto_clear_secret_ptr NMSecretPtr output = { 0 };
|
||||
int encrypted_len = 0, i;
|
||||
gboolean success = FALSE;
|
||||
gsize padded_buf_len, pad_len;
|
||||
|
||||
if (!_nm_crypto_init (error))
|
||||
return NULL;
|
||||
gsize pad_len;
|
||||
|
||||
if ( cipher == NM_CRYPTO_CIPHER_DES_CBC
|
||||
|| !_get_cipher_info (cipher, &cipher_mech, NULL)) {
|
||||
|
|
@ -293,25 +290,15 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
return NULL;
|
||||
}
|
||||
|
||||
/* If data->len % ivlen == 0, then we add another complete block
|
||||
* onto the end so that the decrypter knows there's padding.
|
||||
*/
|
||||
pad_len = iv_len - (data_len % iv_len);
|
||||
output_len = padded_buf_len = data_len + pad_len;
|
||||
padded_buf = g_malloc0 (padded_buf_len);
|
||||
|
||||
memcpy (padded_buf, data, data_len);
|
||||
for (i = 0; i < pad_len; i++)
|
||||
padded_buf[data_len + i] = (guint8) (pad_len & 0xFF);
|
||||
|
||||
output = g_malloc0 (output_len);
|
||||
if (!_nm_crypto_init (error))
|
||||
return NULL;
|
||||
|
||||
slot = PK11_GetBestSlot (cipher_mech, NULL);
|
||||
if (!slot) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_FAILED,
|
||||
_("Failed to initialize the encryption cipher slot."));
|
||||
goto out;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
sym_key = PK11_ImportSymKey (slot, cipher_mech, PK11_OriginUnwrap, CKA_ENCRYPT, &key_item, NULL);
|
||||
|
|
@ -338,7 +325,22 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
goto out;
|
||||
}
|
||||
|
||||
ret = PK11_CipherOp (ctx, output, &encrypted_len, output_len, padded_buf, padded_buf_len);
|
||||
/* If data->len % ivlen == 0, then we add another complete block
|
||||
* onto the end so that the decrypter knows there's padding.
|
||||
*/
|
||||
pad_len = iv_len - (data_len % iv_len);
|
||||
|
||||
padded_buf.len = data_len + pad_len;
|
||||
padded_buf.bin = g_malloc (padded_buf.len);
|
||||
|
||||
memcpy (padded_buf.bin, data, data_len);
|
||||
for (i = 0; i < pad_len; i++)
|
||||
padded_buf.bin[data_len + i] = (guint8) (pad_len & 0xFF);
|
||||
|
||||
output.len = padded_buf.len;
|
||||
output.bin = g_malloc (output.len);
|
||||
|
||||
ret = PK11_CipherOp (ctx, output.bin, &encrypted_len, output.len, padded_buf.bin, padded_buf.len);
|
||||
if (ret != SECSuccess) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_ENCRYPTION_FAILED,
|
||||
|
|
@ -347,35 +349,30 @@ _nmtst_crypto_encrypt (NMCryptoCipherType cipher,
|
|||
goto out;
|
||||
}
|
||||
|
||||
if (encrypted_len != output_len) {
|
||||
if (encrypted_len != output.len) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_ENCRYPTION_FAILED,
|
||||
_("Unexpected amount of data after encrypting."));
|
||||
goto out;
|
||||
}
|
||||
|
||||
*out_len = encrypted_len;
|
||||
success = TRUE;
|
||||
|
||||
out:
|
||||
if (ctx)
|
||||
PK11_DestroyContext (ctx, PR_TRUE);
|
||||
if (sym_key)
|
||||
PK11_FreeSymKey (sym_key);
|
||||
if (sec_param)
|
||||
SECITEM_FreeItem (sec_param, PR_TRUE);
|
||||
if (sym_key)
|
||||
PK11_FreeSymKey (sym_key);
|
||||
if (slot)
|
||||
PK11_FreeSlot (slot);
|
||||
|
||||
nm_explicit_bzero (padded_buf, padded_buf_len);
|
||||
g_free (padded_buf);
|
||||
if (!success)
|
||||
return NULL;
|
||||
|
||||
if (!success) {
|
||||
nm_explicit_bzero (output, output_len);
|
||||
g_free (output);
|
||||
output = NULL;
|
||||
}
|
||||
return (guint8 *) output;
|
||||
*out_len = output.len;
|
||||
return g_steal_pointer (&output.bin);
|
||||
}
|
||||
|
||||
gboolean
|
||||
|
|
@ -394,7 +391,7 @@ _nm_crypto_verify_x509 (const guint8 *data,
|
|||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_INVALID_DATA,
|
||||
_("Couldn't decode certificate: %d"),
|
||||
PORT_GetError());
|
||||
PORT_GetError ());
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
|
@ -412,11 +409,9 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
SECItem pw = { 0 };
|
||||
PK11SlotInfo *slot = NULL;
|
||||
SECStatus s;
|
||||
gunichar2 *ucs2_password;
|
||||
long ucs2_chars = 0;
|
||||
gboolean success = FALSE;
|
||||
|
||||
if (error)
|
||||
g_return_val_if_fail (*error == NULL, FALSE);
|
||||
g_return_val_if_fail (!error || !*error, FALSE);
|
||||
|
||||
if (!_nm_crypto_init (error))
|
||||
return FALSE;
|
||||
|
|
@ -425,46 +420,56 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
* any conversions for us.
|
||||
*/
|
||||
if (password && *password) {
|
||||
if (!g_utf8_validate (password, -1, NULL)) {
|
||||
nm_auto_clear_secret_ptr NMSecretPtr ucs2_password = { 0 };
|
||||
|
||||
if (g_utf8_validate (password, -1, NULL)) {
|
||||
long ucs2_chars;
|
||||
|
||||
ucs2_password.bin = (guint8 *) g_utf8_to_utf16 (password, strlen (password), NULL, &ucs2_chars, NULL);
|
||||
|
||||
/* cannot fail, because password is valid UTF-8*/
|
||||
nm_assert (ucs2_password.bin && ucs2_chars > 0);
|
||||
|
||||
ucs2_password.len = ucs2_chars * 2;
|
||||
}
|
||||
|
||||
if (!ucs2_password.bin || ucs2_password.len == 0) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_INVALID_PASSWORD,
|
||||
_("Password must be UTF-8"));
|
||||
return FALSE;
|
||||
}
|
||||
ucs2_password = g_utf8_to_utf16 (password, strlen (password), NULL, &ucs2_chars, NULL);
|
||||
/* Can't fail if g_utf8_validate() succeeded */
|
||||
g_return_val_if_fail (ucs2_password != NULL && ucs2_chars != 0, FALSE);
|
||||
|
||||
ucs2_chars *= 2; /* convert # UCS2 characters -> bytes */
|
||||
pw.data = PORT_ZAlloc(ucs2_chars + 2);
|
||||
memcpy (pw.data, ucs2_password, ucs2_chars);
|
||||
pw.len = ucs2_chars + 2; /* include terminating NULL */
|
||||
|
||||
nm_explicit_bzero (ucs2_password, ucs2_chars);
|
||||
g_free (ucs2_password);
|
||||
pw.data = PORT_ZAlloc (ucs2_password.len + 2);
|
||||
memcpy (pw.data, ucs2_password.bin, ucs2_password.len);
|
||||
pw.len = ucs2_password.len + 2;
|
||||
|
||||
#if __BYTE_ORDER == __LITTLE_ENDIAN
|
||||
{
|
||||
guint16 *p;
|
||||
guint16 *p, *p_end;
|
||||
|
||||
for (p = (guint16 *) pw.data; p < (guint16 *) (pw.data + pw.len); p++)
|
||||
p_end = (guint16 *) &(((guint8 *) pw.data)[ucs2_password.len]);
|
||||
for (p = (guint16 *) pw.data; p < p_end; p++)
|
||||
*p = GUINT16_SWAP_LE_BE (*p);
|
||||
}
|
||||
#endif
|
||||
} else {
|
||||
/* NULL password */
|
||||
pw.data = NULL;
|
||||
pw.len = 0;
|
||||
}
|
||||
|
||||
slot = PK11_GetInternalKeySlot();
|
||||
slot = PK11_GetInternalKeySlot ();
|
||||
if (!slot) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_FAILED,
|
||||
_("Couldn't initialize slot"));
|
||||
goto out;
|
||||
}
|
||||
|
||||
p12ctx = SEC_PKCS12DecoderStart (&pw, slot, NULL, NULL, NULL, NULL, NULL, NULL);
|
||||
if (!p12ctx) {
|
||||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_FAILED,
|
||||
_("Couldn't initialize PKCS#12 decoder: %d"),
|
||||
PORT_GetError());
|
||||
goto error;
|
||||
PORT_GetError ());
|
||||
goto out;
|
||||
}
|
||||
|
||||
s = SEC_PKCS12DecoderUpdate (p12ctx, (guint8 *)data, data_len);
|
||||
|
|
@ -472,8 +477,8 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_INVALID_DATA,
|
||||
_("Couldn't decode PKCS#12 file: %d"),
|
||||
PORT_GetError());
|
||||
goto error;
|
||||
PORT_GetError ());
|
||||
goto out;
|
||||
}
|
||||
|
||||
s = SEC_PKCS12DecoderVerify (p12ctx);
|
||||
|
|
@ -481,23 +486,22 @@ _nm_crypto_verify_pkcs12 (const guint8 *data,
|
|||
g_set_error (error, NM_CRYPTO_ERROR,
|
||||
NM_CRYPTO_ERROR_DECRYPTION_FAILED,
|
||||
_("Couldn't verify PKCS#12 file: %d"),
|
||||
PORT_GetError());
|
||||
goto error;
|
||||
PORT_GetError ());
|
||||
goto out;
|
||||
}
|
||||
|
||||
SEC_PKCS12DecoderFinish (p12ctx);
|
||||
SECITEM_ZfreeItem (&pw, PR_FALSE);
|
||||
return TRUE;
|
||||
success = TRUE;
|
||||
|
||||
error:
|
||||
out:
|
||||
if (p12ctx)
|
||||
SEC_PKCS12DecoderFinish (p12ctx);
|
||||
|
||||
if (slot)
|
||||
PK11_FreeSlot(slot);
|
||||
PK11_FreeSlot (slot);
|
||||
|
||||
SECITEM_ZfreeItem (&pw, PR_FALSE);
|
||||
return FALSE;
|
||||
if (pw.data)
|
||||
SECITEM_ZfreeItem (&pw, PR_FALSE);
|
||||
|
||||
return success;
|
||||
}
|
||||
|
||||
gboolean
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue