Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
mbedtls/programs/pkey/rsa_verify_pss.c
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
136 lines (109 sloc)
3.77 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* RSASSA-PSS/SHA-256 signature verification program | |
* | |
* Copyright The Mbed TLS Contributors | |
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later | |
*/ | |
#include "mbedtls/build_info.h" | |
#include "mbedtls/platform.h" | |
/* md.h is included this early since MD_CAN_XXX macros are defined there. */ | |
#include "mbedtls/md.h" | |
#if !defined(MBEDTLS_MD_C) || !defined(MBEDTLS_ENTROPY_C) || \ | |
!defined(MBEDTLS_RSA_C) || !defined(MBEDTLS_MD_CAN_SHA256) || \ | |
!defined(MBEDTLS_PK_PARSE_C) || !defined(MBEDTLS_FS_IO) || \ | |
!defined(MBEDTLS_CTR_DRBG_C) | |
int main(void) | |
{ | |
mbedtls_printf("MBEDTLS_MD_C and/or MBEDTLS_ENTROPY_C and/or " | |
"MBEDTLS_RSA_C and/or MBEDTLS_MD_CAN_SHA256 and/or " | |
"MBEDTLS_PK_PARSE_C and/or MBEDTLS_FS_IO and/or " | |
"MBEDTLS_CTR_DRBG_C not defined.\n"); | |
mbedtls_exit(0); | |
} | |
#else | |
#include "mbedtls/md.h" | |
#include "mbedtls/pem.h" | |
#include "mbedtls/pk.h" | |
#include <stdio.h> | |
#include <string.h> | |
int main(int argc, char *argv[]) | |
{ | |
FILE *f; | |
int ret = 1; | |
int exit_code = MBEDTLS_EXIT_FAILURE; | |
size_t i; | |
mbedtls_pk_context pk; | |
unsigned char hash[32]; | |
unsigned char buf[MBEDTLS_MPI_MAX_SIZE]; | |
char filename[512]; | |
mbedtls_pk_init(&pk); | |
#if defined(MBEDTLS_USE_PSA_CRYPTO) | |
psa_status_t status = psa_crypto_init(); | |
if (status != PSA_SUCCESS) { | |
mbedtls_fprintf(stderr, "Failed to initialize PSA Crypto implementation: %d\n", | |
(int) status); | |
goto exit; | |
} | |
#endif /* MBEDTLS_USE_PSA_CRYPTO */ | |
if (argc != 3) { | |
mbedtls_printf("usage: rsa_verify_pss <key_file> <filename>\n"); | |
#if defined(_WIN32) | |
mbedtls_printf("\n"); | |
#endif | |
goto exit; | |
} | |
mbedtls_printf("\n . Reading public key from '%s'", argv[1]); | |
fflush(stdout); | |
if ((ret = mbedtls_pk_parse_public_keyfile(&pk, argv[1])) != 0) { | |
mbedtls_printf(" failed\n ! Could not read key from '%s'\n", argv[1]); | |
mbedtls_printf(" ! mbedtls_pk_parse_public_keyfile returned %d\n\n", ret); | |
goto exit; | |
} | |
if (!mbedtls_pk_can_do(&pk, MBEDTLS_PK_RSA)) { | |
mbedtls_printf(" failed\n ! Key is not an RSA key\n"); | |
goto exit; | |
} | |
if ((ret = mbedtls_rsa_set_padding(mbedtls_pk_rsa(pk), | |
MBEDTLS_RSA_PKCS_V21, | |
MBEDTLS_MD_SHA256)) != 0) { | |
mbedtls_printf(" failed\n ! Invalid padding\n"); | |
goto exit; | |
} | |
/* | |
* Extract the RSA signature from the file | |
*/ | |
mbedtls_snprintf(filename, 512, "%s.sig", argv[2]); | |
if ((f = fopen(filename, "rb")) == NULL) { | |
mbedtls_printf("\n ! Could not open %s\n\n", filename); | |
goto exit; | |
} | |
i = fread(buf, 1, MBEDTLS_MPI_MAX_SIZE, f); | |
fclose(f); | |
/* | |
* Compute the SHA-256 hash of the input file and | |
* verify the signature | |
*/ | |
mbedtls_printf("\n . Verifying the RSA/SHA-256 signature"); | |
fflush(stdout); | |
if ((ret = mbedtls_md_file( | |
mbedtls_md_info_from_type(MBEDTLS_MD_SHA256), | |
argv[2], hash)) != 0) { | |
mbedtls_printf(" failed\n ! Could not open or read %s\n\n", argv[2]); | |
goto exit; | |
} | |
if ((ret = mbedtls_pk_verify(&pk, MBEDTLS_MD_SHA256, hash, 0, | |
buf, i)) != 0) { | |
mbedtls_printf(" failed\n ! mbedtls_pk_verify returned %d\n\n", ret); | |
goto exit; | |
} | |
mbedtls_printf("\n . OK (the signature is valid)\n\n"); | |
exit_code = MBEDTLS_EXIT_SUCCESS; | |
exit: | |
mbedtls_pk_free(&pk); | |
#if defined(MBEDTLS_USE_PSA_CRYPTO) | |
mbedtls_psa_crypto_free(); | |
#endif /* MBEDTLS_USE_PSA_CRYPTO */ | |
mbedtls_exit(exit_code); | |
} | |
#endif /* MBEDTLS_BIGNUM_C && MBEDTLS_RSA_C && MBEDTLS_MD_CAN_SHA256 && | |
MBEDTLS_PK_PARSE_C && MBEDTLS_FS_IO */ |