7#include <botan/pubkey.h>
9#include <botan/ber_dec.h>
10#include <botan/bigint.h>
11#include <botan/der_enc.h>
12#include <botan/pk_ops.h>
14#include <botan/internal/buffer_slicer.h>
15#include <botan/internal/ct_utils.h>
16#include <botan/internal/fmt.h>
17#include <botan/internal/mem_utils.h>
22 uint8_t valid_mask = 0;
27 throw Decoding_Error(
"Invalid public key ciphertext, cannot decrypt");
35 size_t expected_pt_len,
37 const uint8_t required_content_bytes[],
38 const uint8_t required_content_offsets[],
39 size_t required_contents_length)
const {
43 for(
size_t i = 0; i != required_contents_length; ++i) {
44 const uint8_t exp = required_content_bytes[i];
52 const uint8_t off = required_content_offsets[i];
53 BOTAN_ASSERT(off < expected_pt_len,
"Offset in range of plaintext");
60 uint8_t decrypt_valid = 0;
66 decoded.resize(expected_pt_len);
68 for(
size_t i = 0; i != required_contents_length; ++i) {
69 const uint8_t exp = required_content_bytes[i];
72 const uint8_t off = required_content_offsets[i];
80 valid_mask.select_n(decoded.data(), decoded.data(), fake_pms.data(), expected_pt_len);
87 size_t expected_pt_len,
94 std::string_view padding,
95 std::string_view provider) {
108 return m_op->ciphertext_length(ptext_len);
111std::vector<uint8_t> PK_Encryptor_EME::enc(
const uint8_t ptext[],
size_t len,
RandomNumberGenerator& rng)
const {
112 return m_op->encrypt(std::span{ptext, len}, rng);
116 return m_op->max_input_bits() / 8;
121 std::string_view padding,
122 std::string_view provider) {
135 return m_op->plaintext_length(ctext_len);
138secure_vector<uint8_t> PK_Decryptor_EME::do_decrypt(uint8_t& valid_mask,
const uint8_t in[],
size_t in_len)
const {
139 return m_op->decrypt(valid_mask, {in, in_len});
151 std::string_view kem_param,
152 std::string_view provider) :
163 return m_op->shared_key_length(desired_shared_key_len);
167 return m_op->encapsulated_key_length();
171 std::span<uint8_t> out_shared_key,
173 size_t desired_shared_key_len,
174 std::span<const uint8_t> salt) {
177 "not enough space for shared key");
178 m_op->kem_encrypt(out_encapsulated_key, out_shared_key, rng, desired_shared_key_len, salt);
182 return m_op->shared_key_length(desired_shared_key_len);
186 return m_op->encapsulated_key_length();
191 std::string_view param,
192 std::string_view provider) {
205 std::span<const uint8_t> encap_key,
206 size_t desired_shared_key_len,
207 std::span<const uint8_t> salt) {
209 "inconsistent size of shared key output buffer");
210 m_op->kem_decrypt(out_shared_key, encap_key, desired_shared_key_len, salt);
215 std::string_view kdf,
216 std::string_view provider) {
229 return m_op->agreed_value_size();
233 const uint8_t peer_key[],
235 std::string_view salt)
const {
240 const std::span<const uint8_t> peer_key,
241 std::string_view salt)
const {
246 std::span<const uint8_t> peer_key,
247 std::span<const uint8_t> salt)
const {
248 return SymmetricKey(m_op->agree(key_len, peer_key, salt));
253 std::string_view padding,
255 std::string_view provider) :
256 m_sig_format(format), m_sig_element_size(key._signature_element_size_for_DER_encoding()) {
258 BOTAN_ARG_CHECK(m_sig_element_size.has_value(),
"This key does not support DER signatures");
268 return m_op->algorithm_identifier();
272 return m_op->hash_function();
285 m_op->update({in, length});
290std::vector<uint8_t> der_encode_signature(std::span<const uint8_t> sig,
size_t parts,
size_t part_size) {
291 if(sig.size() % parts != 0 || sig.size() != parts * part_size) {
295 BufferSlicer bs_sig(sig);
296 std::vector<BigInt> sig_parts;
297 sig_parts.reserve(parts);
298 for(
size_t i = 0; i != parts; ++i) {
302 std::vector<uint8_t> output;
311 return m_op->signature_length();
313 const size_t sig_len = m_op->signature_length();
315 const size_t der_overhead = [sig_len]() {
334 }
else if(sig_len <= 248) {
347 return sig_len + der_overhead;
354 std::vector<uint8_t> sig = m_op->sign(rng);
360 return der_encode_signature(sig, 2, m_sig_element_size.value());
367 std::string_view padding,
369 std::string_view provider) {
375 m_sig_format = format;
379 BOTAN_ARG_CHECK(m_sig_element_size.has_value(),
"This key does not support DER signatures");
385 std::string_view provider) {
401 return m_op->hash_function();
406 BOTAN_ARG_CHECK(m_sig_element_size.has_value(),
"This key does not support DER signatures");
408 m_sig_format = format;
421 m_op->update({in, length});
426std::vector<uint8_t> decode_der_signature(
const uint8_t sig[],
size_t length,
size_t sig_parts,
size_t sig_part_size) {
427 std::vector<uint8_t> real_sig;
438 real_sig += sig_part.
serialize(sig_part_size);
442 if(count != sig_parts) {
443 throw Decoding_Error(
"PK_Verifier: signature size invalid");
446 const std::vector<uint8_t> reencoded = der_encode_signature(real_sig, sig_parts, sig_part_size);
449 throw Decoding_Error(
"PK_Verifier: signature is not the canonical DER encoding");
459 return m_op->is_valid_signature({sig, length});
461 bool decoding_success =
false;
462 std::vector<uint8_t> real_sig;
467 real_sig = decode_der_signature(sig, length, 2, m_sig_element_size.value());
468 decoding_success =
true;
471 const bool accept = m_op->is_valid_signature(real_sig);
473 return accept && decoding_success;
475 throw Internal_Error(
"PK_Verifier: Invalid signature format enum");
#define BOTAN_ASSERT_NOMSG(expr)
#define BOTAN_ARG_CHECK(expr, msg)
#define BOTAN_ASSERT(expr, assertion_made)
virtual std::string algo_name() const =0
virtual std::optional< size_t > _signature_element_size_for_DER_encoding() const
virtual Signature_Format _default_x509_signature_format() const
BER_Decoder & decode(bool &out)
BER_Decoder start_sequence()
static BigInt from_bytes(std::span< const uint8_t > bytes)
T serialize(size_t len) const
static constexpr Mask< T > is_equal(T x, T y)
DER_Encoder & encode_list(const std::vector< T > &values)
DER_Encoder & start_sequence()
~PK_Decryptor_EME() override
size_t plaintext_length(size_t ptext_len) const override
PK_Decryptor_EME(const Private_Key &key, RandomNumberGenerator &rng, std::string_view padding, std::string_view provider="")
secure_vector< uint8_t > decrypt_or_random(const uint8_t in[], size_t length, size_t expected_pt_len, RandomNumberGenerator &rng) const
secure_vector< uint8_t > decrypt(const uint8_t in[], size_t length) const
~PK_Encryptor_EME() override
PK_Encryptor_EME(const Public_Key &key, RandomNumberGenerator &rng, std::string_view padding, std::string_view provider="")
size_t maximum_input_size() const override
size_t ciphertext_length(size_t ptext_len) const override
size_t encapsulated_key_length() const
PK_KEM_Decryptor(const Private_Key &key, RandomNumberGenerator &rng, std::string_view kem_param="", std::string_view provider="")
size_t shared_key_length(size_t desired_shared_key_len) const
void decrypt(std::span< uint8_t > out_shared_key, std::span< const uint8_t > encap_key, size_t desired_shared_key_len=32, std::span< const uint8_t > salt={})
BOTAN_FUTURE_EXPLICIT PK_KEM_Encryptor(const Public_Key &key, std::string_view kem_param="", std::string_view provider="")
KEM_Encapsulation encrypt(RandomNumberGenerator &rng, size_t desired_shared_key_len=32, std::span< const uint8_t > salt={})
size_t shared_key_length(size_t desired_shared_key_len) const
size_t encapsulated_key_length() const
SymmetricKey derive_key(size_t key_len, std::span< const uint8_t > peer_key, std::span< const uint8_t > salt) const
size_t agreed_value_size() const
PK_Key_Agreement(const Private_Key &key, RandomNumberGenerator &rng, std::string_view kdf, std::string_view provider="")
PK_Signer(const Private_Key &key, RandomNumberGenerator &rng, std::string_view padding, Signature_Format format=Signature_Format::Standard, std::string_view provider="")
size_t signature_length() const
std::vector< uint8_t > signature(RandomNumberGenerator &rng)
std::string hash_function() const
AlgorithmIdentifier algorithm_identifier() const
void set_input_format(Signature_Format format)
bool verify_message(const uint8_t msg[], size_t msg_length, const uint8_t sig[], size_t sig_length)
std::string hash_function() const
PK_Verifier(const Public_Key &pub_key, std::string_view padding, Signature_Format format=Signature_Format::Standard, std::string_view provider="")
bool check_signature(const uint8_t sig[], size_t length)
virtual std::unique_ptr< PK_Ops::Signature > create_signature_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::Decryption > create_decryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::Key_Agreement > create_key_agreement_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::KEM_Decryption > create_kem_decryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::Encryption > create_encryption_op(RandomNumberGenerator &rng, std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::Verification > create_verification_op(std::string_view params, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::Verification > create_x509_verification_op(const AlgorithmIdentifier &signature_algorithm, std::string_view provider) const
virtual std::unique_ptr< PK_Ops::KEM_Encryption > create_kem_encryption_op(std::string_view params, std::string_view provider) const
void random_vec(std::span< uint8_t > v)
constexpr CT::Mask< T > is_equal(const T x[], const T y[], size_t len)
std::span< const uint8_t > as_span_of_bytes(const char *s, size_t len)
std::string fmt(std::string_view format, const T &... args)
std::vector< T, secure_allocator< T > > secure_vector