| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 1 | /* | 
|  | 2 | *  Public Key layer for writing key files and structures | 
|  | 3 | * | 
| Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 4 | *  Copyright The Mbed TLS Contributors | 
| Dave Rodgman | 16799db | 2023-11-02 19:47:20 +0000 | [diff] [blame] | 5 | *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 6 | */ | 
|  | 7 |  | 
| Gilles Peskine | db09ef6 | 2020-06-03 01:43:33 +0200 | [diff] [blame] | 8 | #include "common.h" | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 9 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 10 | #if defined(MBEDTLS_PK_WRITE_C) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 11 |  | 
| Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 12 | #include "mbedtls/pk.h" | 
|  | 13 | #include "mbedtls/asn1write.h" | 
|  | 14 | #include "mbedtls/oid.h" | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 15 | #include "mbedtls/platform_util.h" | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 16 | #include "mbedtls/error.h" | 
| Valerio Setti | 77a7568 | 2023-05-15 11:18:46 +0200 | [diff] [blame] | 17 | #include "pk_internal.h" | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 18 |  | 
| Rich Evans | 00ab470 | 2015-02-06 13:43:58 +0000 | [diff] [blame] | 19 | #include <string.h> | 
|  | 20 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 21 | #if defined(MBEDTLS_ECP_C) | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 22 | #include "mbedtls/bignum.h" | 
| Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 23 | #include "mbedtls/ecp.h" | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 24 | #include "mbedtls/platform_util.h" | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 25 | #endif | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 26 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Valerio Setti | 4064dbb | 2023-05-17 15:33:07 +0200 | [diff] [blame] | 27 | #include "pk_internal.h" | 
|  | 28 | #endif | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 29 | #if defined(MBEDTLS_RSA_C) || defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Neil Armstrong | e0326a6 | 2022-02-25 08:57:19 +0100 | [diff] [blame] | 30 | #include "pkwrite.h" | 
|  | 31 | #endif | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 32 | #if defined(MBEDTLS_PEM_WRITE_C) | 
| Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 33 | #include "mbedtls/pem.h" | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 34 | #endif | 
|  | 35 |  | 
| Andrzej Kurek | 5fec086 | 2018-11-19 10:07:36 -0500 | [diff] [blame] | 36 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 37 | #include "psa/crypto.h" | 
| Manuel Pégourié-Gonnard | 2be8c63 | 2023-06-07 13:07:21 +0200 | [diff] [blame] | 38 | #include "psa_util_internal.h" | 
| Andrzej Kurek | 5fec086 | 2018-11-19 10:07:36 -0500 | [diff] [blame] | 39 | #endif | 
| Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 40 | #include "mbedtls/platform.h" | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 41 |  | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 42 | /* Helpers for properly sizing buffers aimed at holding public keys or | 
|  | 43 | * key-pairs based on build symbols. */ | 
|  | 44 | #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) | 
|  | 45 | #define PK_MAX_EC_PUBLIC_KEY_SIZE       PSA_EXPORT_PUBLIC_KEY_MAX_SIZE | 
|  | 46 | #define PK_MAX_EC_KEY_PAIR_SIZE         MBEDTLS_PSA_MAX_EC_KEY_PAIR_LENGTH | 
| Valerio Setti | 8aec84f | 2023-12-04 16:04:21 +0100 | [diff] [blame] | 47 | #elif defined(MBEDTLS_USE_PSA_CRYPTO) | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 48 | #define PK_MAX_EC_PUBLIC_KEY_SIZE       PSA_EXPORT_PUBLIC_KEY_MAX_SIZE | 
|  | 49 | #define PK_MAX_EC_KEY_PAIR_SIZE         MBEDTLS_PSA_MAX_EC_KEY_PAIR_LENGTH | 
|  | 50 | #else | 
|  | 51 | #define PK_MAX_EC_PUBLIC_KEY_SIZE       MBEDTLS_ECP_MAX_PT_LEN | 
|  | 52 | #define PK_MAX_EC_KEY_PAIR_SIZE         MBEDTLS_ECP_MAX_BYTES | 
|  | 53 | #endif | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 54 |  | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 55 | /****************************************************************************** | 
|  | 56 | * Internal functions for RSA keys. | 
|  | 57 | ******************************************************************************/ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 58 | #if defined(MBEDTLS_RSA_C) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 59 | /* | 
|  | 60 | *  RSAPublicKey ::= SEQUENCE { | 
|  | 61 | *      modulus           INTEGER,  -- n | 
|  | 62 | *      publicExponent    INTEGER   -- e | 
|  | 63 | *  } | 
|  | 64 | */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 65 | static int pk_write_rsa_pubkey(unsigned char **p, unsigned char *start, | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 66 | const mbedtls_pk_context *pk) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 67 | { | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 68 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 69 | size_t len = 0; | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 70 | mbedtls_mpi T; | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 71 | mbedtls_rsa_context *rsa = mbedtls_pk_rsa(*pk); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 72 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 73 | mbedtls_mpi_init(&T); | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 74 |  | 
|  | 75 | /* Export E */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 76 | if ((ret = mbedtls_rsa_export(rsa, NULL, NULL, NULL, NULL, &T)) != 0 || | 
|  | 77 | (ret = mbedtls_asn1_write_mpi(p, start, &T)) < 0) { | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 78 | goto end_of_export; | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 79 | } | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 80 | len += ret; | 
|  | 81 |  | 
|  | 82 | /* Export N */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 83 | if ((ret = mbedtls_rsa_export(rsa, &T, NULL, NULL, NULL, NULL)) != 0 || | 
|  | 84 | (ret = mbedtls_asn1_write_mpi(p, start, &T)) < 0) { | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 85 | goto end_of_export; | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 86 | } | 
| Hanno Becker | 15f81fa | 2017-08-23 12:38:27 +0100 | [diff] [blame] | 87 | len += ret; | 
|  | 88 |  | 
|  | 89 | end_of_export: | 
|  | 90 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 91 | mbedtls_mpi_free(&T); | 
|  | 92 | if (ret < 0) { | 
|  | 93 | return ret; | 
|  | 94 | } | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 95 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 96 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, start, len)); | 
|  | 97 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(p, start, MBEDTLS_ASN1_CONSTRUCTED | | 
|  | 98 | MBEDTLS_ASN1_SEQUENCE)); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 99 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 100 | return (int) len; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 101 | } | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 102 |  | 
|  | 103 | static int pk_write_rsa_der(unsigned char **p, unsigned char *buf, | 
|  | 104 | const mbedtls_pk_context *pk) | 
|  | 105 | { | 
|  | 106 | size_t len = 0; | 
|  | 107 | int ret; | 
|  | 108 |  | 
|  | 109 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 110 | if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_OPAQUE) { | 
|  | 111 | uint8_t tmp[PSA_EXPORT_KEY_PAIR_MAX_SIZE]; | 
|  | 112 | size_t tmp_len = 0; | 
|  | 113 |  | 
|  | 114 | if (psa_export_key(pk->priv_id, tmp, sizeof(tmp), &tmp_len) != PSA_SUCCESS) { | 
|  | 115 | return MBEDTLS_ERR_PK_BAD_INPUT_DATA; | 
|  | 116 | } | 
|  | 117 | *p -= tmp_len; | 
|  | 118 | memcpy(*p, tmp, tmp_len); | 
|  | 119 | len += tmp_len; | 
|  | 120 | mbedtls_platform_zeroize(tmp, sizeof(tmp)); | 
|  | 121 | } else | 
|  | 122 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 123 | { | 
|  | 124 | mbedtls_mpi T; /* Temporary holding the exported parameters */ | 
|  | 125 | mbedtls_rsa_context *rsa = mbedtls_pk_rsa(*pk); | 
|  | 126 |  | 
|  | 127 | /* | 
|  | 128 | * Export the parameters one after another to avoid simultaneous copies. | 
|  | 129 | */ | 
|  | 130 |  | 
|  | 131 | mbedtls_mpi_init(&T); | 
|  | 132 |  | 
|  | 133 | /* Export QP */ | 
|  | 134 | if ((ret = mbedtls_rsa_export_crt(rsa, NULL, NULL, &T)) != 0 || | 
|  | 135 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 136 | goto end_of_export; | 
|  | 137 | } | 
|  | 138 | len += ret; | 
|  | 139 |  | 
|  | 140 | /* Export DQ */ | 
|  | 141 | if ((ret = mbedtls_rsa_export_crt(rsa, NULL, &T, NULL)) != 0 || | 
|  | 142 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 143 | goto end_of_export; | 
|  | 144 | } | 
|  | 145 | len += ret; | 
|  | 146 |  | 
|  | 147 | /* Export DP */ | 
|  | 148 | if ((ret = mbedtls_rsa_export_crt(rsa, &T, NULL, NULL)) != 0 || | 
|  | 149 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 150 | goto end_of_export; | 
|  | 151 | } | 
|  | 152 | len += ret; | 
|  | 153 |  | 
|  | 154 | /* Export Q */ | 
|  | 155 | if ((ret = mbedtls_rsa_export(rsa, NULL, NULL, | 
|  | 156 | &T, NULL, NULL)) != 0 || | 
|  | 157 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 158 | goto end_of_export; | 
|  | 159 | } | 
|  | 160 | len += ret; | 
|  | 161 |  | 
|  | 162 | /* Export P */ | 
|  | 163 | if ((ret = mbedtls_rsa_export(rsa, NULL, &T, | 
|  | 164 | NULL, NULL, NULL)) != 0 || | 
|  | 165 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 166 | goto end_of_export; | 
|  | 167 | } | 
|  | 168 | len += ret; | 
|  | 169 |  | 
|  | 170 | /* Export D */ | 
|  | 171 | if ((ret = mbedtls_rsa_export(rsa, NULL, NULL, | 
|  | 172 | NULL, &T, NULL)) != 0 || | 
|  | 173 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 174 | goto end_of_export; | 
|  | 175 | } | 
|  | 176 | len += ret; | 
|  | 177 |  | 
|  | 178 | /* Export E */ | 
|  | 179 | if ((ret = mbedtls_rsa_export(rsa, NULL, NULL, | 
|  | 180 | NULL, NULL, &T)) != 0 || | 
|  | 181 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 182 | goto end_of_export; | 
|  | 183 | } | 
|  | 184 | len += ret; | 
|  | 185 |  | 
|  | 186 | /* Export N */ | 
|  | 187 | if ((ret = mbedtls_rsa_export(rsa, &T, NULL, | 
|  | 188 | NULL, NULL, NULL)) != 0 || | 
|  | 189 | (ret = mbedtls_asn1_write_mpi(p, buf, &T)) < 0) { | 
|  | 190 | goto end_of_export; | 
|  | 191 | } | 
|  | 192 | len += ret; | 
|  | 193 |  | 
|  | 194 | end_of_export: | 
|  | 195 |  | 
|  | 196 | mbedtls_mpi_free(&T); | 
|  | 197 | if (ret < 0) { | 
|  | 198 | return ret; | 
|  | 199 | } | 
|  | 200 |  | 
|  | 201 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_int(p, buf, 0)); | 
|  | 202 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, buf, len)); | 
|  | 203 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(p, | 
|  | 204 | buf, MBEDTLS_ASN1_CONSTRUCTED | | 
|  | 205 | MBEDTLS_ASN1_SEQUENCE)); | 
|  | 206 | } | 
|  | 207 |  | 
|  | 208 | return (int) len; | 
|  | 209 | } | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 210 | #endif /* MBEDTLS_RSA_C */ | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 211 |  | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 212 | /****************************************************************************** | 
|  | 213 | * Internal functions for EC keys. | 
|  | 214 | ******************************************************************************/ | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 215 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 216 | #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 217 | static int pk_write_ec_pubkey(unsigned char **p, unsigned char *start, | 
| Valerio Setti | 4064dbb | 2023-05-17 15:33:07 +0200 | [diff] [blame] | 218 | const mbedtls_pk_context *pk) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 219 | { | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 220 | size_t len = 0; | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 221 | uint8_t buf[PK_MAX_EC_PUBLIC_KEY_SIZE]; | 
| Valerio Setti | 4064dbb | 2023-05-17 15:33:07 +0200 | [diff] [blame] | 222 |  | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 223 | if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_OPAQUE) { | 
|  | 224 | if (psa_export_public_key(pk->priv_id, buf, sizeof(buf), &len) != PSA_SUCCESS) { | 
|  | 225 | return MBEDTLS_ERR_PK_BAD_INPUT_DATA; | 
|  | 226 | } | 
|  | 227 | } else { | 
|  | 228 | len = pk->pub_raw_len; | 
| valerio | f9139e5 | 2023-05-31 18:01:33 +0200 | [diff] [blame] | 229 | memcpy(buf, pk->pub_raw, len); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 230 | } | 
|  | 231 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 232 | if (*p < start || (size_t) (*p - start) < len) { | 
|  | 233 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 234 | } | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 235 |  | 
|  | 236 | *p -= len; | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 237 | memcpy(*p, buf, len); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 238 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 239 | return (int) len; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 240 | } | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 241 | #else /* MBEDTLS_PK_USE_PSA_EC_DATA */ | 
|  | 242 | static int pk_write_ec_pubkey(unsigned char **p, unsigned char *start, | 
|  | 243 | const mbedtls_pk_context *pk) | 
|  | 244 | { | 
|  | 245 | size_t len = 0; | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 246 | unsigned char buf[PK_MAX_EC_PUBLIC_KEY_SIZE]; | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 247 | mbedtls_ecp_keypair *ec = mbedtls_pk_ec(*pk); | 
|  | 248 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 249 |  | 
|  | 250 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 251 | if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_OPAQUE) { | 
|  | 252 | if (psa_export_public_key(pk->priv_id, buf, sizeof(buf), &len) != PSA_SUCCESS) { | 
|  | 253 | return MBEDTLS_ERR_PK_BAD_INPUT_DATA; | 
|  | 254 | } | 
|  | 255 | *p -= len; | 
|  | 256 | memcpy(*p, buf, len); | 
|  | 257 | return (int) len; | 
|  | 258 | } else | 
|  | 259 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 260 | { | 
|  | 261 | if ((ret = mbedtls_ecp_point_write_binary(&ec->grp, &ec->Q, | 
|  | 262 | MBEDTLS_ECP_PF_UNCOMPRESSED, | 
|  | 263 | &len, buf, sizeof(buf))) != 0) { | 
|  | 264 | return ret; | 
|  | 265 | } | 
|  | 266 | } | 
|  | 267 |  | 
|  | 268 | if (*p < start || (size_t) (*p - start) < len) { | 
|  | 269 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 270 | } | 
|  | 271 |  | 
|  | 272 | *p -= len; | 
|  | 273 | memcpy(*p, buf, len); | 
|  | 274 |  | 
|  | 275 | return (int) len; | 
|  | 276 | } | 
|  | 277 | #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */ | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 278 |  | 
|  | 279 | /* | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 280 | * privateKey  OCTET STRING -- always of length ceil(log2(n)/8) | 
|  | 281 | */ | 
| valerio | 52b675f | 2023-05-31 12:14:37 +0200 | [diff] [blame] | 282 | #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 283 | static int pk_write_ec_private(unsigned char **p, unsigned char *start, | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 284 | const mbedtls_pk_context *pk) | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 285 | { | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 286 | size_t byte_length; | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 287 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 288 | unsigned char tmp[PK_MAX_EC_KEY_PAIR_SIZE]; | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 289 | psa_status_t status; | 
|  | 290 |  | 
| valerio | 52b675f | 2023-05-31 12:14:37 +0200 | [diff] [blame] | 291 | if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_OPAQUE) { | 
|  | 292 | status = psa_export_key(pk->priv_id, tmp, sizeof(tmp), &byte_length); | 
|  | 293 | if (status != PSA_SUCCESS) { | 
|  | 294 | ret = PSA_PK_ECDSA_TO_MBEDTLS_ERR(status); | 
|  | 295 | return ret; | 
|  | 296 | } | 
|  | 297 | } else { | 
|  | 298 | status = psa_export_key(pk->priv_id, tmp, sizeof(tmp), &byte_length); | 
|  | 299 | if (status != PSA_SUCCESS) { | 
|  | 300 | ret = PSA_PK_ECDSA_TO_MBEDTLS_ERR(status); | 
|  | 301 | goto exit; | 
|  | 302 | } | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 303 | } | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 304 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 305 | ret = mbedtls_asn1_write_octet_string(p, start, tmp, byte_length); | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 306 | exit: | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 307 | mbedtls_platform_zeroize(tmp, sizeof(tmp)); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 308 | return ret; | 
| Gilles Peskine | 2700cfb | 2018-08-11 00:48:44 +0200 | [diff] [blame] | 309 | } | 
| valerio | 52b675f | 2023-05-31 12:14:37 +0200 | [diff] [blame] | 310 | #else /* MBEDTLS_PK_USE_PSA_EC_DATA */ | 
|  | 311 | static int pk_write_ec_private(unsigned char **p, unsigned char *start, | 
|  | 312 | const mbedtls_pk_context *pk) | 
|  | 313 | { | 
|  | 314 | size_t byte_length; | 
|  | 315 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 316 | unsigned char tmp[PK_MAX_EC_KEY_PAIR_SIZE]; | 
| valerio | 52b675f | 2023-05-31 12:14:37 +0200 | [diff] [blame] | 317 |  | 
|  | 318 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
| Valerio Setti | d5604ba | 2023-11-28 14:10:43 +0100 | [diff] [blame] | 319 | psa_status_t status; | 
| valerio | 52b675f | 2023-05-31 12:14:37 +0200 | [diff] [blame] | 320 | if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_OPAQUE) { | 
|  | 321 | status = psa_export_key(pk->priv_id, tmp, sizeof(tmp), &byte_length); | 
|  | 322 | if (status != PSA_SUCCESS) { | 
|  | 323 | ret = PSA_PK_ECDSA_TO_MBEDTLS_ERR(status); | 
|  | 324 | return ret; | 
|  | 325 | } | 
|  | 326 | } else | 
|  | 327 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 328 | { | 
|  | 329 | mbedtls_ecp_keypair *ec = mbedtls_pk_ec_rw(*pk); | 
|  | 330 | byte_length = (ec->grp.pbits + 7) / 8; | 
|  | 331 |  | 
|  | 332 | ret = mbedtls_ecp_write_key(ec, tmp, byte_length); | 
|  | 333 | if (ret != 0) { | 
|  | 334 | goto exit; | 
|  | 335 | } | 
|  | 336 | } | 
|  | 337 | ret = mbedtls_asn1_write_octet_string(p, start, tmp, byte_length); | 
|  | 338 | exit: | 
|  | 339 | mbedtls_platform_zeroize(tmp, sizeof(tmp)); | 
|  | 340 | return ret; | 
|  | 341 | } | 
|  | 342 | #endif /* MBEDTLS_PK_USE_PSA_EC_DATA */ | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 343 |  | 
|  | 344 | /* | 
|  | 345 | * ECParameters ::= CHOICE { | 
|  | 346 | *   namedCurve         OBJECT IDENTIFIER | 
|  | 347 | * } | 
|  | 348 | */ | 
|  | 349 | static int pk_write_ec_param(unsigned char **p, unsigned char *start, | 
|  | 350 | mbedtls_ecp_group_id grp_id) | 
|  | 351 | { | 
|  | 352 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 353 | size_t len = 0; | 
|  | 354 | const char *oid; | 
|  | 355 | size_t oid_len; | 
|  | 356 |  | 
|  | 357 | if ((ret = mbedtls_oid_get_oid_by_ec_grp(grp_id, &oid, &oid_len)) != 0) { | 
|  | 358 | return ret; | 
|  | 359 | } | 
|  | 360 |  | 
|  | 361 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_oid(p, start, oid, oid_len)); | 
|  | 362 |  | 
|  | 363 | return (int) len; | 
|  | 364 | } | 
|  | 365 |  | 
|  | 366 | #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES) | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 367 | /* | 
|  | 368 | * RFC8410 section 7 | 
|  | 369 | * | 
|  | 370 | * OneAsymmetricKey ::= SEQUENCE { | 
|  | 371 | *    version Version, | 
|  | 372 | *    privateKeyAlgorithm PrivateKeyAlgorithmIdentifier, | 
|  | 373 | *    privateKey PrivateKey, | 
|  | 374 | *    attributes [0] IMPLICIT Attributes OPTIONAL, | 
|  | 375 | *    ..., | 
|  | 376 | *    [[2: publicKey [1] IMPLICIT PublicKey OPTIONAL ]], | 
|  | 377 | *    ... | 
|  | 378 | * } | 
|  | 379 | * ... | 
|  | 380 | * CurvePrivateKey ::= OCTET STRING | 
|  | 381 | */ | 
|  | 382 | static int pk_write_ec_rfc8410_der(unsigned char **p, unsigned char *buf, | 
|  | 383 | const mbedtls_pk_context *pk) | 
|  | 384 | { | 
|  | 385 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 386 | size_t len = 0; | 
|  | 387 | size_t oid_len = 0; | 
|  | 388 | const char *oid; | 
|  | 389 | mbedtls_ecp_group_id grp_id; | 
|  | 390 |  | 
|  | 391 | /* privateKey */ | 
|  | 392 | MBEDTLS_ASN1_CHK_ADD(len, pk_write_ec_private(p, buf, pk)); | 
|  | 393 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, buf, len)); | 
|  | 394 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(p, buf, MBEDTLS_ASN1_OCTET_STRING)); | 
|  | 395 |  | 
| Valerio Setti | f9362b7 | 2023-11-29 08:42:27 +0100 | [diff] [blame] | 396 | grp_id = mbedtls_pk_get_ec_group_id(pk); | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 397 | /* privateKeyAlgorithm */ | 
|  | 398 | if ((ret = mbedtls_oid_get_oid_by_ec_grp_algid(grp_id, &oid, &oid_len)) != 0) { | 
|  | 399 | return ret; | 
|  | 400 | } | 
|  | 401 | MBEDTLS_ASN1_CHK_ADD(len, | 
|  | 402 | mbedtls_asn1_write_algorithm_identifier_ext(p, buf, oid, oid_len, 0, 0)); | 
|  | 403 |  | 
|  | 404 | /* version */ | 
|  | 405 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_int(p, buf, 0)); | 
|  | 406 |  | 
|  | 407 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, buf, len)); | 
|  | 408 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(p, buf, MBEDTLS_ASN1_CONSTRUCTED | | 
|  | 409 | MBEDTLS_ASN1_SEQUENCE)); | 
|  | 410 |  | 
|  | 411 | return (int) len; | 
|  | 412 | } | 
|  | 413 | #endif /* MBEDTLS_PK_HAVE_RFC8410_CURVES */ | 
|  | 414 |  | 
|  | 415 | /* | 
|  | 416 | * RFC 5915, or SEC1 Appendix C.4 | 
|  | 417 | * | 
|  | 418 | * ECPrivateKey ::= SEQUENCE { | 
|  | 419 | *      version        INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1), | 
|  | 420 | *      privateKey     OCTET STRING, | 
|  | 421 | *      parameters [0] ECParameters {{ NamedCurve }} OPTIONAL, | 
|  | 422 | *      publicKey  [1] BIT STRING OPTIONAL | 
|  | 423 | *    } | 
|  | 424 | */ | 
|  | 425 | static int pk_write_ec_der(unsigned char **p, unsigned char *buf, | 
|  | 426 | const mbedtls_pk_context *pk) | 
|  | 427 | { | 
|  | 428 | size_t len = 0; | 
|  | 429 | int ret; | 
|  | 430 | size_t pub_len = 0, par_len = 0; | 
|  | 431 | mbedtls_ecp_group_id grp_id; | 
|  | 432 |  | 
|  | 433 | /* publicKey */ | 
|  | 434 | MBEDTLS_ASN1_CHK_ADD(pub_len, pk_write_ec_pubkey(p, buf, pk)); | 
|  | 435 |  | 
|  | 436 | if (*p - buf < 1) { | 
|  | 437 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 438 | } | 
|  | 439 | (*p)--; | 
|  | 440 | **p = 0; | 
|  | 441 | pub_len += 1; | 
|  | 442 |  | 
|  | 443 | MBEDTLS_ASN1_CHK_ADD(pub_len, mbedtls_asn1_write_len(p, buf, pub_len)); | 
|  | 444 | MBEDTLS_ASN1_CHK_ADD(pub_len, mbedtls_asn1_write_tag(p, buf, MBEDTLS_ASN1_BIT_STRING)); | 
|  | 445 |  | 
|  | 446 | MBEDTLS_ASN1_CHK_ADD(pub_len, mbedtls_asn1_write_len(p, buf, pub_len)); | 
|  | 447 | MBEDTLS_ASN1_CHK_ADD(pub_len, mbedtls_asn1_write_tag(p, buf, | 
|  | 448 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | | 
|  | 449 | MBEDTLS_ASN1_CONSTRUCTED | 1)); | 
|  | 450 | len += pub_len; | 
|  | 451 |  | 
|  | 452 | /* parameters */ | 
| Valerio Setti | f9362b7 | 2023-11-29 08:42:27 +0100 | [diff] [blame] | 453 | grp_id = mbedtls_pk_get_ec_group_id(pk); | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 454 | MBEDTLS_ASN1_CHK_ADD(par_len, pk_write_ec_param(p, buf, grp_id)); | 
|  | 455 | MBEDTLS_ASN1_CHK_ADD(par_len, mbedtls_asn1_write_len(p, buf, par_len)); | 
|  | 456 | MBEDTLS_ASN1_CHK_ADD(par_len, mbedtls_asn1_write_tag(p, buf, | 
|  | 457 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | | 
|  | 458 | MBEDTLS_ASN1_CONSTRUCTED | 0)); | 
|  | 459 | len += par_len; | 
|  | 460 |  | 
|  | 461 | /* privateKey */ | 
|  | 462 | MBEDTLS_ASN1_CHK_ADD(len, pk_write_ec_private(p, buf, pk)); | 
|  | 463 |  | 
|  | 464 | /* version */ | 
|  | 465 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_int(p, buf, 1)); | 
|  | 466 |  | 
|  | 467 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, buf, len)); | 
|  | 468 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(p, buf, MBEDTLS_ASN1_CONSTRUCTED | | 
|  | 469 | MBEDTLS_ASN1_SEQUENCE)); | 
|  | 470 |  | 
|  | 471 | return (int) len; | 
|  | 472 | } | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 473 | #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */ | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 474 |  | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 475 | /****************************************************************************** | 
|  | 476 | * Internal functions for Opaque keys. | 
|  | 477 | ******************************************************************************/ | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 478 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 479 | static int pk_write_opaque_pubkey(unsigned char **p, unsigned char *start, | 
|  | 480 | const mbedtls_pk_context *pk) | 
|  | 481 | { | 
|  | 482 | size_t buffer_size; | 
|  | 483 | size_t len = 0; | 
|  | 484 |  | 
|  | 485 | if (*p < start) { | 
|  | 486 | return MBEDTLS_ERR_PK_BAD_INPUT_DATA; | 
|  | 487 | } | 
|  | 488 |  | 
|  | 489 | buffer_size = (size_t) (*p - start); | 
|  | 490 | if (psa_export_public_key(pk->priv_id, start, buffer_size, | 
|  | 491 | &len) != PSA_SUCCESS) { | 
|  | 492 | return MBEDTLS_ERR_PK_BAD_INPUT_DATA; | 
|  | 493 | } | 
|  | 494 |  | 
|  | 495 | *p -= len; | 
|  | 496 | memmove(*p, start, len); | 
|  | 497 |  | 
|  | 498 | return (int) len; | 
|  | 499 | } | 
|  | 500 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
|  | 501 |  | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 502 | /****************************************************************************** | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 503 | * Generic helpers | 
|  | 504 | ******************************************************************************/ | 
|  | 505 |  | 
|  | 506 | /* Extend the public mbedtls_pk_get_type() by getting key type also in case of | 
|  | 507 | * opaque keys. */ | 
|  | 508 | static mbedtls_pk_type_t pk_get_type_ext(const mbedtls_pk_context *pk) | 
|  | 509 | { | 
|  | 510 | mbedtls_pk_type_t pk_type = mbedtls_pk_get_type(pk); | 
|  | 511 |  | 
|  | 512 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
|  | 513 | if (pk_type == MBEDTLS_PK_OPAQUE) { | 
|  | 514 | psa_key_attributes_t opaque_attrs = PSA_KEY_ATTRIBUTES_INIT; | 
|  | 515 | psa_key_type_t opaque_key_type; | 
|  | 516 |  | 
|  | 517 | if (psa_get_key_attributes(pk->priv_id, &opaque_attrs) != PSA_SUCCESS) { | 
|  | 518 | return MBEDTLS_PK_NONE; | 
|  | 519 | } | 
|  | 520 | opaque_key_type = psa_get_key_type(&opaque_attrs); | 
|  | 521 | psa_reset_key_attributes(&opaque_attrs); | 
|  | 522 |  | 
|  | 523 | if (PSA_KEY_TYPE_IS_ECC(opaque_key_type)) { | 
|  | 524 | return MBEDTLS_PK_ECKEY; | 
|  | 525 | } else if (PSA_KEY_TYPE_IS_RSA(opaque_key_type)) { | 
|  | 526 | return MBEDTLS_PK_RSA; | 
|  | 527 | } else { | 
| Valerio Setti | ad6d016 | 2023-11-30 08:10:36 +0100 | [diff] [blame] | 528 | return MBEDTLS_PK_NONE; | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 529 | } | 
|  | 530 | } else | 
|  | 531 | #endif | 
|  | 532 | return pk_type; | 
|  | 533 | } | 
|  | 534 |  | 
|  | 535 | /****************************************************************************** | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 536 | * Public functions for writing private/public DER keys. | 
|  | 537 | ******************************************************************************/ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 538 | int mbedtls_pk_write_pubkey(unsigned char **p, unsigned char *start, | 
|  | 539 | const mbedtls_pk_context *key) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 540 | { | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 541 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 542 | size_t len = 0; | 
|  | 543 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 544 | #if defined(MBEDTLS_RSA_C) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 545 | if (mbedtls_pk_get_type(key) == MBEDTLS_PK_RSA) { | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 546 | MBEDTLS_ASN1_CHK_ADD(len, pk_write_rsa_pubkey(p, start, key)); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 547 | } else | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 548 | #endif | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 549 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 550 | if (mbedtls_pk_get_type(key) == MBEDTLS_PK_ECKEY) { | 
| Valerio Setti | 4064dbb | 2023-05-17 15:33:07 +0200 | [diff] [blame] | 551 | MBEDTLS_ASN1_CHK_ADD(len, pk_write_ec_pubkey(p, start, key)); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 552 | } else | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 553 | #endif | 
| Andrzej Kurek | 5fec086 | 2018-11-19 10:07:36 -0500 | [diff] [blame] | 554 | #if defined(MBEDTLS_USE_PSA_CRYPTO) | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 555 | if (mbedtls_pk_get_type(key) == MBEDTLS_PK_OPAQUE) { | 
| valerio | 9ea2617 | 2023-05-31 12:10:23 +0200 | [diff] [blame] | 556 | MBEDTLS_ASN1_CHK_ADD(len, pk_write_opaque_pubkey(p, start, key)); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 557 | } else | 
| Andrzej Kurek | 5fec086 | 2018-11-19 10:07:36 -0500 | [diff] [blame] | 558 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 559 | return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 560 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 561 | return (int) len; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 562 | } | 
|  | 563 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 564 | int mbedtls_pk_write_pubkey_der(const mbedtls_pk_context *key, unsigned char *buf, size_t size) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 565 | { | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 566 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 567 | unsigned char *c; | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 568 | int has_par = 1; | 
|  | 569 | size_t len = 0, par_len = 0, oid_len = 0; | 
| Hanno Becker | 493c171 | 2019-02-01 10:07:07 +0000 | [diff] [blame] | 570 | mbedtls_pk_type_t pk_type; | 
| correy | a15b485 | 2023-09-21 16:19:11 +0800 | [diff] [blame] | 571 | const char *oid = NULL; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 572 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 573 | if (size == 0) { | 
|  | 574 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 575 | } | 
| Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 576 |  | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 577 | c = buf + size; | 
|  | 578 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 579 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_pk_write_pubkey(&c, buf, key)); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 580 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 581 | if (c - buf < 1) { | 
|  | 582 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 583 | } | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 584 |  | 
|  | 585 | /* | 
|  | 586 | *  SubjectPublicKeyInfo  ::=  SEQUENCE  { | 
|  | 587 | *       algorithm            AlgorithmIdentifier, | 
|  | 588 | *       subjectPublicKey     BIT STRING } | 
|  | 589 | */ | 
|  | 590 | *--c = 0; | 
|  | 591 | len += 1; | 
|  | 592 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 593 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, len)); | 
|  | 594 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(&c, buf, MBEDTLS_ASN1_BIT_STRING)); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 595 |  | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 596 | pk_type = pk_get_type_ext(key); | 
| Hanno Becker | 493c171 | 2019-02-01 10:07:07 +0000 | [diff] [blame] | 597 |  | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 598 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Valerio Setti | bcc004b | 2023-11-29 17:16:55 +0100 | [diff] [blame] | 599 | if (pk_get_type_ext(key) == MBEDTLS_PK_ECKEY) { | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 600 | mbedtls_ecp_group_id ec_grp_id = mbedtls_pk_get_ec_group_id(key); | 
| Valerio Setti | bcc004b | 2023-11-29 17:16:55 +0100 | [diff] [blame] | 601 | if (MBEDTLS_PK_IS_RFC8410_GROUP_ID(ec_grp_id)) { | 
|  | 602 | ret = mbedtls_oid_get_oid_by_ec_grp_algid(ec_grp_id, &oid, &oid_len); | 
|  | 603 | if (ret != 0) { | 
|  | 604 | return ret; | 
|  | 605 | } | 
| Jethro Beekman | 8e59ebb | 2023-05-03 13:05:33 +0200 | [diff] [blame] | 606 | has_par = 0; | 
| Jethro Beekman | 8e59ebb | 2023-05-03 13:05:33 +0200 | [diff] [blame] | 607 | } else { | 
| Valerio Setti | bcc004b | 2023-11-29 17:16:55 +0100 | [diff] [blame] | 608 | MBEDTLS_ASN1_CHK_ADD(par_len, pk_write_ec_param(&c, buf, ec_grp_id)); | 
| Jethro Beekman | 8e59ebb | 2023-05-03 13:05:33 +0200 | [diff] [blame] | 609 | } | 
|  | 610 | } | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 611 | #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */ | 
| Jethro Beekman | 8e59ebb | 2023-05-03 13:05:33 +0200 | [diff] [blame] | 612 |  | 
| Valerio Setti | bcc004b | 2023-11-29 17:16:55 +0100 | [diff] [blame] | 613 | /* At this point oid_len is not null only for EC Montgomery keys. */ | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 614 | if (oid_len == 0) { | 
| Valerio Setti | bcc004b | 2023-11-29 17:16:55 +0100 | [diff] [blame] | 615 | ret = mbedtls_oid_get_oid_by_pk_alg(pk_type, &oid, &oid_len); | 
|  | 616 | if (ret != 0) { | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 617 | return ret; | 
|  | 618 | } | 
| Hanno Becker | 493c171 | 2019-02-01 10:07:07 +0000 | [diff] [blame] | 619 | } | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 620 |  | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 621 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_algorithm_identifier_ext(&c, buf, oid, oid_len, | 
|  | 622 | par_len, has_par)); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 623 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 624 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, len)); | 
|  | 625 | MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(&c, buf, MBEDTLS_ASN1_CONSTRUCTED | | 
|  | 626 | MBEDTLS_ASN1_SEQUENCE)); | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 627 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 628 | return (int) len; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 629 | } | 
|  | 630 |  | 
| valerio | c0bac57 | 2023-05-31 12:15:41 +0200 | [diff] [blame] | 631 | int mbedtls_pk_write_key_der(const mbedtls_pk_context *key, unsigned char *buf, size_t size) | 
|  | 632 | { | 
|  | 633 | unsigned char *c; | 
| valerio | c0bac57 | 2023-05-31 12:15:41 +0200 | [diff] [blame] | 634 |  | 
|  | 635 | if (size == 0) { | 
|  | 636 | return MBEDTLS_ERR_ASN1_BUF_TOO_SMALL; | 
|  | 637 | } | 
|  | 638 |  | 
|  | 639 | c = buf + size; | 
|  | 640 |  | 
| valerio | c0bac57 | 2023-05-31 12:15:41 +0200 | [diff] [blame] | 641 | #if defined(MBEDTLS_RSA_C) | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 642 | if (pk_get_type_ext(key) == MBEDTLS_PK_RSA) { | 
| valerio | c0bac57 | 2023-05-31 12:15:41 +0200 | [diff] [blame] | 643 | return pk_write_rsa_der(&c, buf, key); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 644 | } else | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 645 | #endif /* MBEDTLS_RSA_C */ | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 646 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 647 | if (pk_get_type_ext(key) == MBEDTLS_PK_ECKEY) { | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 648 | #if defined(MBEDTLS_PK_HAVE_RFC8410_CURVES) | 
| Valerio Setti | 00e8dd1 | 2023-05-18 18:56:59 +0200 | [diff] [blame] | 649 | if (mbedtls_pk_is_rfc8410(key)) { | 
|  | 650 | return pk_write_ec_rfc8410_der(&c, buf, key); | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 651 | } | 
| valerio | c0bac57 | 2023-05-31 12:15:41 +0200 | [diff] [blame] | 652 | #endif /* MBEDTLS_PK_HAVE_RFC8410_CURVES */ | 
|  | 653 | return pk_write_ec_der(&c, buf, key); | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 654 | } else | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 655 | #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 656 | return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 657 | } | 
|  | 658 |  | 
| Valerio Setti | 605f03c | 2023-11-28 12:46:39 +0100 | [diff] [blame] | 659 | /****************************************************************************** | 
|  | 660 | * Public functions for wrinting private/public PEM keys. | 
|  | 661 | ******************************************************************************/ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 662 | #if defined(MBEDTLS_PEM_WRITE_C) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 663 |  | 
| Neil Armstrong | e9ecd27 | 2022-03-01 10:03:21 +0100 | [diff] [blame] | 664 | #define PUB_DER_MAX_BYTES                                                   \ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 665 | (MBEDTLS_PK_RSA_PUB_DER_MAX_BYTES > MBEDTLS_PK_ECP_PUB_DER_MAX_BYTES ? \ | 
|  | 666 | MBEDTLS_PK_RSA_PUB_DER_MAX_BYTES : MBEDTLS_PK_ECP_PUB_DER_MAX_BYTES) | 
| Neil Armstrong | e9ecd27 | 2022-03-01 10:03:21 +0100 | [diff] [blame] | 667 | #define PRV_DER_MAX_BYTES                                                   \ | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 668 | (MBEDTLS_PK_RSA_PRV_DER_MAX_BYTES > MBEDTLS_PK_ECP_PRV_DER_MAX_BYTES ? \ | 
|  | 669 | MBEDTLS_PK_RSA_PRV_DER_MAX_BYTES : MBEDTLS_PK_ECP_PRV_DER_MAX_BYTES) | 
| Manuel Pégourié-Gonnard | 192253a | 2014-07-21 16:37:15 +0200 | [diff] [blame] | 670 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 671 | int mbedtls_pk_write_pubkey_pem(const mbedtls_pk_context *key, unsigned char *buf, size_t size) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 672 | { | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 673 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Yanray Wang | 45ad306 | 2023-08-11 15:03:51 +0800 | [diff] [blame] | 674 | unsigned char *output_buf = NULL; | 
| Yanray Wang | 08d5f46 | 2023-08-21 15:15:19 +0800 | [diff] [blame] | 675 | output_buf = mbedtls_calloc(1, PUB_DER_MAX_BYTES); | 
| Yanray Wang | 45ad306 | 2023-08-11 15:03:51 +0800 | [diff] [blame] | 676 | if (output_buf == NULL) { | 
|  | 677 | return MBEDTLS_ERR_PK_ALLOC_FAILED; | 
|  | 678 | } | 
| Paul Bakker | 77e23fb | 2013-09-15 20:03:26 +0200 | [diff] [blame] | 679 | size_t olen = 0; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 680 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 681 | if ((ret = mbedtls_pk_write_pubkey_der(key, output_buf, | 
| Yanray Wang | 45ad306 | 2023-08-11 15:03:51 +0800 | [diff] [blame] | 682 | PUB_DER_MAX_BYTES)) < 0) { | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 683 | goto cleanup; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 684 | } | 
|  | 685 |  | 
| Valerio Setti | 7f062a5 | 2023-12-04 16:29:56 +0100 | [diff] [blame] | 686 | if ((ret = mbedtls_pem_write_buffer(PEM_BEGIN_PUBLIC_KEY "\n", PEM_END_PUBLIC_KEY "\n", | 
| Yanray Wang | 45ad306 | 2023-08-11 15:03:51 +0800 | [diff] [blame] | 687 | output_buf + PUB_DER_MAX_BYTES - ret, | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 688 | ret, buf, size, &olen)) != 0) { | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 689 | goto cleanup; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 690 | } | 
|  | 691 |  | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 692 | ret = 0; | 
|  | 693 | cleanup: | 
| Yanray Wang | 08d5f46 | 2023-08-21 15:15:19 +0800 | [diff] [blame] | 694 | mbedtls_free(output_buf); | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 695 | return ret; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 696 | } | 
|  | 697 |  | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 698 | int mbedtls_pk_write_key_pem(const mbedtls_pk_context *key, unsigned char *buf, size_t size) | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 699 | { | 
| Janos Follath | 24eed8d | 2019-11-22 13:21:35 +0000 | [diff] [blame] | 700 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
| Yanray Wang | c84086e | 2023-08-11 15:33:07 +0800 | [diff] [blame] | 701 | unsigned char *output_buf = NULL; | 
| Yanray Wang | 08d5f46 | 2023-08-21 15:15:19 +0800 | [diff] [blame] | 702 | output_buf = mbedtls_calloc(1, PRV_DER_MAX_BYTES); | 
| Yanray Wang | c84086e | 2023-08-11 15:33:07 +0800 | [diff] [blame] | 703 | if (output_buf == NULL) { | 
|  | 704 | return MBEDTLS_ERR_PK_ALLOC_FAILED; | 
|  | 705 | } | 
| Paul Bakker | fcc1721 | 2013-10-11 09:36:52 +0200 | [diff] [blame] | 706 | const char *begin, *end; | 
| Paul Bakker | 77e23fb | 2013-09-15 20:03:26 +0200 | [diff] [blame] | 707 | size_t olen = 0; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 708 |  | 
| Yanray Wang | c84086e | 2023-08-11 15:33:07 +0800 | [diff] [blame] | 709 | if ((ret = mbedtls_pk_write_key_der(key, output_buf, PRV_DER_MAX_BYTES)) < 0) { | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 710 | goto cleanup; | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 711 | } | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 712 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 713 | #if defined(MBEDTLS_RSA_C) | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 714 | if (pk_get_type_ext(key) == MBEDTLS_PK_RSA) { | 
| Valerio Setti | 7f062a5 | 2023-12-04 16:29:56 +0100 | [diff] [blame] | 715 | begin = PEM_BEGIN_PRIVATE_KEY_RSA "\n"; | 
|  | 716 | end = PEM_END_PRIVATE_KEY_RSA "\n"; | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 717 | } else | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 718 | #endif | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 719 | #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 720 | if (pk_get_type_ext(key) == MBEDTLS_PK_ECKEY) { | 
|  | 721 | if (mbedtls_pk_is_rfc8410(key)) { | 
| Valerio Setti | 7f062a5 | 2023-12-04 16:29:56 +0100 | [diff] [blame] | 722 | begin = PEM_BEGIN_PRIVATE_KEY_PKCS8 "\n"; | 
|  | 723 | end = PEM_END_PRIVATE_KEY_PKCS8 "\n"; | 
| Valerio Setti | a4f70fe | 2023-11-29 15:05:47 +0100 | [diff] [blame] | 724 | } else { | 
| Valerio Setti | 7f062a5 | 2023-12-04 16:29:56 +0100 | [diff] [blame] | 725 | begin = PEM_BEGIN_PRIVATE_KEY_EC "\n"; | 
|  | 726 | end = PEM_END_PRIVATE_KEY_EC "\n"; | 
| Jethro Beekman | 0167244 | 2023-04-19 14:08:14 +0200 | [diff] [blame] | 727 | } | 
| Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 728 | } else | 
| Valerio Setti | 81d7512 | 2023-06-14 14:49:33 +0200 | [diff] [blame] | 729 | #endif /* MBEDTLS_PK_HAVE_ECC_KEYS */ | 
| Yanray Wang | c84086e | 2023-08-11 15:33:07 +0800 | [diff] [blame] | 730 | { | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 731 | ret = MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE; | 
|  | 732 | goto cleanup; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 733 | } | 
|  | 734 |  | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 735 | if ((ret = mbedtls_pem_write_buffer(begin, end, | 
| Yanray Wang | c84086e | 2023-08-11 15:33:07 +0800 | [diff] [blame] | 736 | output_buf + PRV_DER_MAX_BYTES - ret, | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 737 | ret, buf, size, &olen)) != 0) { | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 738 | goto cleanup; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 739 | } | 
|  | 740 |  | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 741 | ret = 0; | 
|  | 742 | cleanup: | 
| Yanray Wang | 044eb16 | 2023-08-28 10:35:39 +0800 | [diff] [blame] | 743 | mbedtls_zeroize_and_free(output_buf, PRV_DER_MAX_BYTES); | 
| Yanray Wang | 7226df0 | 2023-08-11 15:52:09 +0800 | [diff] [blame] | 744 | return ret; | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 745 | } | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 746 | #endif /* MBEDTLS_PEM_WRITE_C */ | 
| Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 747 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 748 | #endif /* MBEDTLS_PK_WRITE_C */ |