Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pkcs11-tool: add pure EdDSA support to sign/verify #2979

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
74 changes: 74 additions & 0 deletions src/tools/pkcs11-tool.c
Original file line number Diff line number Diff line change
Expand Up @@ -2085,6 +2085,27 @@ static int unlock_pin(CK_SLOT_ID slot, CK_SESSION_HANDLE sess, int login_type)
return 0;
}

/* return matching ec_curve_info or NULL based on ec_params */
static const struct ec_curve_info* match_ec_curve_by_params(const unsigned char *ec_params, CK_ULONG ec_params_size)
{
char ecpbuf[64];

if (ec_params_size > (sizeof(ecpbuf)/2)) {
util_fatal("Invalid EC params");
}

sc_bin_to_hex(ec_params, ec_params_size, ecpbuf, sizeof(ecpbuf), 0);

for (size_t i = 0; ec_curve_infos[i].name != NULL; ++i) {

if (strcmp(ec_curve_infos[i].ec_params, ecpbuf) == 0) {
return &ec_curve_infos[i];
}
}

return NULL;
}

/* return digest length in bytes */
static unsigned long hash_length(const unsigned long hash) {
unsigned long sLen = 0;
Expand Down Expand Up @@ -2268,6 +2289,9 @@ static void sign_data(CK_SLOT_ID slot, CK_SESSION_HANDLE session,
unsigned char in_buffer[1025], sig_buffer[512];
CK_MECHANISM mech;
CK_RSA_PKCS_PSS_PARAMS pss_params;
CK_EDDSA_PARAMS eddsa_params = {
.phFlag = CK_FALSE,
};
CK_RV rv;
CK_ULONG sig_len;
int fd;
Expand All @@ -2283,6 +2307,29 @@ static void sign_data(CK_SLOT_ID slot, CK_SESSION_HANDLE session,
mech.mechanism = opt_mechanism;
hashlen = parse_pss_params(session, key, &mech, &pss_params);

/* support pure EdDSA only */
if (opt_mechanism == CKM_EDDSA) {
const struct ec_curve_info *curve;
unsigned char *ec_params;
CK_ULONG ec_params_size = 0;

ec_params = getEC_PARAMS(session, key, &ec_params_size);
if (ec_params == NULL) {
util_fatal("Key has no EC_PARAMS attribute");
}

curve = match_ec_curve_by_params(ec_params, ec_params_size);
if (curve == NULL) {
util_fatal("Unknown or unsupported EC curve used in key");
}

/* Ed448: need the params defined but default to false */
if (curve->size == 448) {
mech.pParameter = &eddsa_params;
mech.ulParameterLen = (CK_ULONG)sizeof(eddsa_params);
}
}

if (opt_input == NULL)
fd = 0;
else if ((fd = open(opt_input, O_RDONLY|O_BINARY)) < 0)
Expand Down Expand Up @@ -2375,6 +2422,9 @@ static void verify_signature(CK_SLOT_ID slot, CK_SESSION_HANDLE session,
unsigned char in_buffer[1025], sig_buffer[512];
CK_MECHANISM mech;
CK_RSA_PKCS_PSS_PARAMS pss_params;
CK_EDDSA_PARAMS eddsa_params = {
.phFlag = CK_FALSE,
};
CK_RV rv;
CK_ULONG sig_len;
int fd, fd2;
Expand All @@ -2400,6 +2450,30 @@ static void verify_signature(CK_SLOT_ID slot, CK_SESSION_HANDLE session,
fprintf(stderr, "Warning, requesting salt length recovery from signature (supported only in in opensc pkcs11 module).\n");
}
}

/* support pure EdDSA only */
if (opt_mechanism == CKM_EDDSA) {
const struct ec_curve_info *curve;
unsigned char *ec_params;
CK_ULONG ec_params_size = 0;

ec_params = getEC_PARAMS(session, key, &ec_params_size);
if (ec_params == NULL) {
util_fatal("Key has no EC_PARAMS attribute");
}

curve = match_ec_curve_by_params(ec_params, ec_params_size);
if (curve == NULL) {
util_fatal("Unknown or unsupported EC curve used in key");
}

/* Ed448: need the params defined but default to false */
if (curve->size == 448) {
mech.pParameter = &eddsa_params;
mech.ulParameterLen = (CK_ULONG)sizeof(eddsa_params);
}
}

/* Open a signature file */
if (opt_signature_file == NULL)
util_fatal("No file with signature provided. Use --signature-file");
Expand Down