13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/* $Id$ */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** @file
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * IPRT - Crypto - Public Key Signature Schema Algorithm, Core API.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/*
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Copyright (C) 2006-2014 Oracle Corporation
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * This file is part of VirtualBox Open Source Edition (OSE), as
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * available from http://www.virtualbox.org. This file is free software;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * you can redistribute it and/or modify it under the terms of the GNU
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * General Public License (GPL) as published by the Free Software
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Foundation, in version 2 as it comes in the "COPYING" file of the
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * The contents of this file may alternatively be used under the terms
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * of the Common Development and Distribution License Version 1.0
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * (CDDL) only, as it comes in the "COPYING.CDDL" file of the
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * VirtualBox OSE distribution, in which case the provisions of the
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * CDDL are applicable instead of those of the GPL.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * You may elect to license modified versions of this file under the
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * terms and conditions of either the GPL or the CDDL or both.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/*******************************************************************************
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync* Header Files *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync*******************************************************************************/
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include "internal/iprt.h"
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/crypto/pkix.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/assert.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/asm.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/err.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/mem.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/string.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#include <iprt/crypto/digest.h>
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/*******************************************************************************
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync* Structures and Typedefs *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync*******************************************************************************/
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/**
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Generic public key signature scheme instance.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsynctypedef struct RTCRPKIXSIGNATUREINT
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** Magic value (RTCRPKIXSIGNATUREINT_MAGIC). */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t u32Magic;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** Reference counter. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t volatile cRefs;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** Pointer to the message digest descriptor. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PCRTCRPKIXSIGNATUREDESC pDesc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** The operation this instance is licensed for. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync bool fSigning;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** State. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t uState;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#if ARCH_BITS == 32
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t uPadding;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#endif
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /** Opaque data specific to the message digest algorithm, size given by
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * RTCRPKIXSIGNATUREDESC::cbState. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint8_t abState[1];
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync} RTCRPKIXSIGNATUREINT;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncAssertCompileMemberAlignment(RTCRPKIXSIGNATUREINT, abState, 8);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** Pointer to a public key algorithm instance. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsynctypedef RTCRPKIXSIGNATUREINT *PRTCRPKIXSIGNATUREINT;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** Magic value for RTCRPKIXSIGNATUREINT::u32Magic (Baley Withfield Diffie). */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#define RTCRPKIXSIGNATUREINT_MAGIC UINT32_C(0x19440605)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** @name RTCRPKIXSIGNATUREINT::uState values.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * @{ */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** Ready to go. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#define RTCRPKIXSIGNATURE_STATE_READY UINT32_C(1)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** Need reset. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#define RTCRPKIXSIGNATURE_STATE_DONE UINT32_C(2)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** Busted state, can happen after re-init. */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync#define RTCRPKIXSIGNATURE_STATE_BUSTED UINT32_C(3)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/** @} */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(int) RTCrPkixSignatureCreate(PRTCRPKIXSIGNATURE phSignature, PCRTCRPKIXSIGNATUREDESC pDesc, void *pvOpaque,
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync bool fSigning, PCRTASN1BITSTRING pKey, PCRTASN1DYNTYPE pParams)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /*
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Validate input.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(phSignature, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pDesc, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pKey, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(RTAsn1BitString_IsPresent(pKey), VERR_INVALID_PARAMETER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pParams)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pParams, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if ( pParams->enmType == RTASN1TYPE_NULL
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync || !RTASN1CORE_IS_PRESENT(&pParams->u.Core))
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pParams = NULL;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /*
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Instantiate the algorithm for the given operation.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync int rc = VINF_SUCCESS;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PRTCRPKIXSIGNATUREINT pThis = (PRTCRPKIXSIGNATUREINT)RTMemAllocZ(RT_OFFSETOF(RTCRPKIXSIGNATUREINT, abState[pDesc->cbState]));
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pThis)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->u32Magic = RTCRPKIXSIGNATUREINT_MAGIC;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->cRefs = 1;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->pDesc = pDesc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->fSigning = fSigning;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->uState = RTCRPKIXSIGNATURE_STATE_READY;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pDesc->pfnInit)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync rc = pDesc->pfnInit(pDesc, pThis->abState, pvOpaque, fSigning, pKey, pParams);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (RT_SUCCESS(rc))
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync *phSignature = pThis;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return VINF_SUCCESS;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->u32Magic = 0;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync RTMemFree(pThis);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync else
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync rc = VERR_NO_MEMORY;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return rc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(uint32_t) RTCrPkixSignatureRetain(RTCRPKIXSIGNATURE hSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PRTCRPKIXSIGNATUREINT pThis = hSignature;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pThis, UINT32_MAX);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->u32Magic == RTCRPKIXSIGNATUREINT_MAGIC, UINT32_MAX);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cRefs = ASMAtomicIncU32(&pThis->cRefs);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync Assert(cRefs < 64);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return cRefs;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(uint32_t) RTCrPkixSignatureRelease(RTCRPKIXSIGNATURE hSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PRTCRPKIXSIGNATUREINT pThis = hSignature;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pThis == NIL_RTCRPKIXSIGNATURE)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return 0;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pThis, UINT32_MAX);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->u32Magic == RTCRPKIXSIGNATUREINT_MAGIC, UINT32_MAX);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cRefs = ASMAtomicDecU32(&pThis->cRefs);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync Assert(cRefs < 64);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (!cRefs)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->u32Magic = ~RTCRPKIXSIGNATUREINT_MAGIC;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pThis->pDesc->pfnDelete)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->pDesc->pfnDelete(pThis->pDesc, pThis->abState, pThis->fSigning);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync size_t cbToWipe = RT_OFFSETOF(RTCRPKIXSIGNATUREINT, abState[pThis->pDesc->cbState]);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync RTMemWipeThoroughly(pThis, cbToWipe, 6);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync RTMemFree(pThis);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return cRefs;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync/**
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Resets the signature provider instance prior to a new signing or verification
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * opartion.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync *
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * @returns IPRT status code.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * @param pThis The instance to reset.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncstatic int rtCrPkxiSignatureReset(PRTCRPKIXSIGNATUREINT pThis)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pThis->uState == RTCRPKIXSIGNATURE_STATE_DONE)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (pThis->pDesc->pfnReset)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync int rc = pThis->pDesc->pfnReset(pThis->pDesc, pThis->abState, pThis->fSigning);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (RT_FAILURE(rc))
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->uState = RTCRPKIXSIGNATURE_STATE_BUSTED;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return rc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->uState = RTCRPKIXSIGNATURE_STATE_READY;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return VINF_SUCCESS;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(int) RTCrPkixSignatureVerify(RTCRPKIXSIGNATURE hSignature, RTCRDIGEST hDigest,
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync void const *pvSignature, size_t cbSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PRTCRPKIXSIGNATUREINT pThis = hSignature;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pThis, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->u32Magic == RTCRPKIXSIGNATUREINT_MAGIC, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(!pThis->fSigning, VERR_INVALID_FUNCTION);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->uState == RTCRPKIXSIGNATURE_STATE_READY || pThis->uState == RTCRPKIXSIGNATURE_STATE_DONE, VERR_INVALID_STATE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cRefs = RTCrDigestRetain(hDigest);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(cRefs != UINT32_MAX, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync int rc = rtCrPkxiSignatureReset(pThis);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (RT_SUCCESS(rc))
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync rc = pThis->pDesc->pfnVerify(pThis->pDesc, pThis->abState, hDigest, pvSignature, cbSignature);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->uState = RTCRPKIXSIGNATURE_STATE_DONE;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync RTCrDigestRelease(hDigest);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return rc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(int) RTCrPkixSignatureVerifyBitString(RTCRPKIXSIGNATURE hSignature, RTCRDIGEST hDigest, PCRTASN1BITSTRING pSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /*
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Just unpack it and pass it on to the lower level API.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pSignature, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(RTAsn1BitString_IsPresent(pSignature), VERR_INVALID_PARAMETER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cbData = RTASN1BITSTRING_GET_BYTE_SIZE(pSignature);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync void const *pvData = RTASN1BITSTRING_GET_BIT0_PTR(pSignature);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pvData, VERR_INVALID_PARAMETER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return RTCrPkixSignatureVerify(hSignature, hDigest, pvData, cbData);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(int) RTCrPkixSignatureVerifyOctetString(RTCRPKIXSIGNATURE hSignature, RTCRDIGEST hDigest, PCRTASN1OCTETSTRING pSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync /*
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync * Just unpack it and pass it on to the lower level API.
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync */
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pSignature, VERR_INVALID_POINTER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(RTAsn1OctetString_IsPresent(pSignature), VERR_INVALID_PARAMETER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cbData = pSignature->Asn1Core.cb;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync void const *pvData = pSignature->Asn1Core.uData.pv;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pvData, VERR_INVALID_PARAMETER);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return RTCrPkixSignatureVerify(hSignature, hDigest, pvData, cbData);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsyncRTDECL(int) RTCrPkixSignatureSign(RTCRPKIXSIGNATURE hSignature, RTCRDIGEST hDigest,
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync void *pvSignature, size_t *pcbSignature)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync{
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync PRTCRPKIXSIGNATUREINT pThis = hSignature;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertPtrReturn(pThis, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->u32Magic == RTCRPKIXSIGNATUREINT_MAGIC, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->fSigning, VERR_INVALID_FUNCTION);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(pThis->uState == RTCRPKIXSIGNATURE_STATE_READY || pThis->uState == RTCRPKIXSIGNATURE_STATE_DONE, VERR_INVALID_STATE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync uint32_t cRefs = RTCrDigestRetain(hDigest);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync AssertReturn(cRefs != UINT32_MAX, VERR_INVALID_HANDLE);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync int rc = rtCrPkxiSignatureReset(pThis);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (RT_SUCCESS(rc))
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync {
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync rc = pThis->pDesc->pfnSign(pThis->pDesc, pThis->abState, hDigest, pvSignature, pcbSignature);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync if (rc != VERR_BUFFER_OVERFLOW)
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync pThis->uState = RTCRPKIXSIGNATURE_STATE_DONE;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync }
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync RTCrDigestRelease(hDigest);
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync return rc;
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync}
13493ab7596e827b8d0caab2c89e635dd65f78f9vboxsync