aboutsummaryrefslogtreecommitdiffstats
path: root/cryptography
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2014-02-27 07:35:43 -0800
committerAlex Gaynor <alex.gaynor@gmail.com>2014-02-27 07:35:43 -0800
commit4ef63b64a9517cb4b1e3f4c5b8068e3467378862 (patch)
tree167a3d2ddfe1512177c954afc3a8f4a530ae9dca /cryptography
parentbd08799bcce99b94250ad3b3313826651c8c0181 (diff)
parentbb97691d33c3ebb0764f1d97bbbda387c9eaa665 (diff)
downloadcryptography-4ef63b64a9517cb4b1e3f4c5b8068e3467378862.tar.gz
cryptography-4ef63b64a9517cb4b1e3f4c5b8068e3467378862.tar.bz2
cryptography-4ef63b64a9517cb4b1e3f4c5b8068e3467378862.zip
Merge pull request #675 from reaperhulk/rsa-verification
RSA Verification Support
Diffstat (limited to 'cryptography')
-rw-r--r--cryptography/hazmat/backends/multibackend.py7
-rw-r--r--cryptography/hazmat/backends/openssl/backend.py110
-rw-r--r--cryptography/hazmat/primitives/asymmetric/rsa.py4
3 files changed, 120 insertions, 1 deletions
diff --git a/cryptography/hazmat/backends/multibackend.py b/cryptography/hazmat/backends/multibackend.py
index f0017191..de1fff7c 100644
--- a/cryptography/hazmat/backends/multibackend.py
+++ b/cryptography/hazmat/backends/multibackend.py
@@ -112,3 +112,10 @@ class MultiBackend(object):
for b in self._filtered_backends(RSABackend):
return b.create_rsa_signature_ctx(private_key, padding, algorithm)
raise UnsupportedAlgorithm
+
+ def create_rsa_verification_ctx(self, public_key, signature, padding,
+ algorithm):
+ for b in self._filtered_backends(RSABackend):
+ return b.create_rsa_verification_ctx(public_key, signature,
+ padding, algorithm)
+ raise UnsupportedAlgorithm
diff --git a/cryptography/hazmat/backends/openssl/backend.py b/cryptography/hazmat/backends/openssl/backend.py
index 00fdc266..c7ae9141 100644
--- a/cryptography/hazmat/backends/openssl/backend.py
+++ b/cryptography/hazmat/backends/openssl/backend.py
@@ -18,7 +18,7 @@ import itertools
from cryptography import utils
from cryptography.exceptions import (
UnsupportedAlgorithm, InvalidTag, InternalError, AlreadyFinalized,
- UnsupportedPadding
+ UnsupportedPadding, InvalidSignature
)
from cryptography.hazmat.backends.interfaces import (
CipherBackend, HashBackend, HMACBackend, PBKDF2HMACBackend, RSABackend
@@ -336,9 +336,22 @@ class Backend(object):
ctx.iqmp = self._int_to_bn(private_key.iqmp)
return ctx
+ def _rsa_cdata_from_public_key(self, public_key):
+ ctx = self._lib.RSA_new()
+ assert ctx != self._ffi.NULL
+ ctx = self._ffi.gc(ctx, self._lib.RSA_free)
+ ctx.e = self._int_to_bn(public_key.e)
+ ctx.n = self._int_to_bn(public_key.n)
+ return ctx
+
def create_rsa_signature_ctx(self, private_key, padding, algorithm):
return _RSASignatureContext(self, private_key, padding, algorithm)
+ def create_rsa_verification_ctx(self, public_key, signature, padding,
+ algorithm):
+ return _RSAVerificationContext(self, public_key, signature, padding,
+ algorithm)
+
class GetCipherByName(object):
def __init__(self, fmt):
@@ -686,4 +699,99 @@ class _RSASignatureContext(object):
return self._backend._ffi.buffer(sig_buf)[:sig_len[0]]
+@utils.register_interface(interfaces.AsymmetricVerificationContext)
+class _RSAVerificationContext(object):
+ def __init__(self, backend, public_key, signature, padding, algorithm):
+ self._backend = backend
+ self._public_key = public_key
+ self._signature = signature
+ if not isinstance(padding, interfaces.AsymmetricPadding):
+ raise TypeError(
+ "Expected provider of interfaces.AsymmetricPadding")
+
+ if padding.name == "EMSA-PKCS1-v1_5":
+ if self._backend._lib.Cryptography_HAS_PKEY_CTX:
+ self._verify_method = self._verify_pkey_ctx
+ self._padding_enum = self._backend._lib.RSA_PKCS1_PADDING
+ else:
+ self._verify_method = self._verify_pkcs1
+ else:
+ raise UnsupportedPadding
+
+ self._padding = padding
+ self._algorithm = algorithm
+ self._hash_ctx = _HashContext(backend, self._algorithm)
+
+ def update(self, data):
+ if self._hash_ctx is None:
+ raise AlreadyFinalized("Context has already been finalized")
+
+ self._hash_ctx.update(data)
+
+ def verify(self):
+ if self._hash_ctx is None:
+ raise AlreadyFinalized("Context has already been finalized")
+
+ evp_pkey = self._backend._lib.EVP_PKEY_new()
+ assert evp_pkey != self._backend._ffi.NULL
+ evp_pkey = backend._ffi.gc(evp_pkey, backend._lib.EVP_PKEY_free)
+ rsa_cdata = backend._rsa_cdata_from_public_key(self._public_key)
+ res = self._backend._lib.RSA_blinding_on(
+ rsa_cdata, self._backend._ffi.NULL)
+ assert res == 1
+ res = self._backend._lib.EVP_PKEY_set1_RSA(evp_pkey, rsa_cdata)
+ assert res == 1
+ evp_md = self._backend._lib.EVP_get_digestbyname(
+ self._algorithm.name.encode("ascii"))
+ assert evp_md != self._backend._ffi.NULL
+
+ self._verify_method(rsa_cdata, evp_pkey, evp_md)
+
+ def _verify_pkey_ctx(self, rsa_cdata, evp_pkey, evp_md):
+ pkey_ctx = self._backend._lib.EVP_PKEY_CTX_new(
+ evp_pkey, self._backend._ffi.NULL
+ )
+ assert pkey_ctx != self._backend._ffi.NULL
+ res = self._backend._lib.EVP_PKEY_verify_init(pkey_ctx)
+ assert res == 1
+ res = self._backend._lib.EVP_PKEY_CTX_set_signature_md(
+ pkey_ctx, evp_md)
+ assert res > 0
+
+ res = self._backend._lib.EVP_PKEY_CTX_set_rsa_padding(
+ pkey_ctx, self._padding_enum)
+ assert res > 0
+ data_to_verify = self._hash_ctx.finalize()
+ self._hash_ctx = None
+ res = self._backend._lib.EVP_PKEY_verify(
+ pkey_ctx,
+ self._signature,
+ len(self._signature),
+ data_to_verify,
+ len(data_to_verify)
+ )
+ # The previous call can return negative numbers in the event of an
+ # error. This is not a signature failure but we need to fail if it
+ # occurs.
+ assert res >= 0
+ if res == 0:
+ raise InvalidSignature
+
+ def _verify_pkcs1(self, rsa_cdata, evp_pkey, evp_md):
+ res = self._backend._lib.EVP_VerifyFinal(
+ self._hash_ctx._ctx,
+ self._signature,
+ len(self._signature),
+ evp_pkey
+ )
+ self._hash_ctx.finalize()
+ self._hash_ctx = None
+ # The previous call can return negative numbers in the event of an
+ # error. This is not a signature failure but we need to fail if it
+ # occurs.
+ assert res >= 0
+ if res == 0:
+ raise InvalidSignature
+
+
backend = Backend()
diff --git a/cryptography/hazmat/primitives/asymmetric/rsa.py b/cryptography/hazmat/primitives/asymmetric/rsa.py
index 2f9e4247..d8254046 100644
--- a/cryptography/hazmat/primitives/asymmetric/rsa.py
+++ b/cryptography/hazmat/primitives/asymmetric/rsa.py
@@ -49,6 +49,10 @@ class RSAPublicKey(object):
self._public_exponent = public_exponent
self._modulus = modulus
+ def verifier(self, signature, padding, algorithm, backend):
+ return backend.create_rsa_verification_ctx(self, signature, padding,
+ algorithm)
+
@property
def key_size(self):
return _bit_length(self.modulus)