github.com/lovishpuri/go-40569/src@v0.0.0-20230519171745-f8623e7c56cf/crypto/x509/pkcs1.go (about) 1 // Copyright 2011 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package x509 6 7 import ( 8 "crypto/rsa" 9 "encoding/asn1" 10 "errors" 11 "math/big" 12 ) 13 14 // pkcs1PrivateKey is a structure which mirrors the PKCS #1 ASN.1 for an RSA private key. 15 type pkcs1PrivateKey struct { 16 Version int 17 N *big.Int 18 E int 19 D *big.Int 20 P *big.Int 21 Q *big.Int 22 // We ignore these values, if present, because rsa will calculate them. 23 Dp *big.Int `asn1:"optional"` 24 Dq *big.Int `asn1:"optional"` 25 Qinv *big.Int `asn1:"optional"` 26 27 AdditionalPrimes []pkcs1AdditionalRSAPrime `asn1:"optional,omitempty"` 28 } 29 30 type pkcs1AdditionalRSAPrime struct { 31 Prime *big.Int 32 33 // We ignore these values because rsa will calculate them. 34 Exp *big.Int 35 Coeff *big.Int 36 } 37 38 // pkcs1PublicKey reflects the ASN.1 structure of a PKCS #1 public key. 39 type pkcs1PublicKey struct { 40 N *big.Int 41 E int 42 } 43 44 // ParsePKCS1PrivateKey parses an RSA private key in PKCS #1, ASN.1 DER form. 45 // 46 // This kind of key is commonly encoded in PEM blocks of type "RSA PRIVATE KEY". 47 func ParsePKCS1PrivateKey(der []byte) (*rsa.PrivateKey, error) { 48 var priv pkcs1PrivateKey 49 rest, err := asn1.Unmarshal(der, &priv) 50 if len(rest) > 0 { 51 return nil, asn1.SyntaxError{Msg: "trailing data"} 52 } 53 if err != nil { 54 if _, err := asn1.Unmarshal(der, &ecPrivateKey{}); err == nil { 55 return nil, errors.New("x509: failed to parse private key (use ParseECPrivateKey instead for this key format)") 56 } 57 if _, err := asn1.Unmarshal(der, &pkcs8{}); err == nil { 58 return nil, errors.New("x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)") 59 } 60 return nil, err 61 } 62 63 if priv.Version > 1 { 64 return nil, errors.New("x509: unsupported private key version") 65 } 66 67 if priv.N.Sign() <= 0 || priv.D.Sign() <= 0 || priv.P.Sign() <= 0 || priv.Q.Sign() <= 0 { 68 return nil, errors.New("x509: private key contains zero or negative value") 69 } 70 71 key := new(rsa.PrivateKey) 72 key.PublicKey = rsa.PublicKey{ 73 E: priv.E, 74 N: priv.N, 75 } 76 77 key.D = priv.D 78 key.Primes = make([]*big.Int, 2+len(priv.AdditionalPrimes)) 79 key.Primes[0] = priv.P 80 key.Primes[1] = priv.Q 81 for i, a := range priv.AdditionalPrimes { 82 if a.Prime.Sign() <= 0 { 83 return nil, errors.New("x509: private key contains zero or negative prime") 84 } 85 key.Primes[i+2] = a.Prime 86 // We ignore the other two values because rsa will calculate 87 // them as needed. 88 } 89 90 err = key.Validate() 91 if err != nil { 92 return nil, err 93 } 94 key.Precompute() 95 96 return key, nil 97 } 98 99 // MarshalPKCS1PrivateKey converts an RSA private key to PKCS #1, ASN.1 DER form. 100 // 101 // This kind of key is commonly encoded in PEM blocks of type "RSA PRIVATE KEY". 102 // For a more flexible key format which is not RSA specific, use 103 // MarshalPKCS8PrivateKey. 104 func MarshalPKCS1PrivateKey(key *rsa.PrivateKey) []byte { 105 key.Precompute() 106 107 version := 0 108 if len(key.Primes) > 2 { 109 version = 1 110 } 111 112 priv := pkcs1PrivateKey{ 113 Version: version, 114 N: key.N, 115 E: key.PublicKey.E, 116 D: key.D, 117 P: key.Primes[0], 118 Q: key.Primes[1], 119 Dp: key.Precomputed.Dp, 120 Dq: key.Precomputed.Dq, 121 Qinv: key.Precomputed.Qinv, 122 } 123 124 priv.AdditionalPrimes = make([]pkcs1AdditionalRSAPrime, len(key.Precomputed.CRTValues)) 125 for i, values := range key.Precomputed.CRTValues { 126 priv.AdditionalPrimes[i].Prime = key.Primes[2+i] 127 priv.AdditionalPrimes[i].Exp = values.Exp 128 priv.AdditionalPrimes[i].Coeff = values.Coeff 129 } 130 131 b, _ := asn1.Marshal(priv) 132 return b 133 } 134 135 // ParsePKCS1PublicKey parses an RSA public key in PKCS #1, ASN.1 DER form. 136 // 137 // This kind of key is commonly encoded in PEM blocks of type "RSA PUBLIC KEY". 138 func ParsePKCS1PublicKey(der []byte) (*rsa.PublicKey, error) { 139 var pub pkcs1PublicKey 140 rest, err := asn1.Unmarshal(der, &pub) 141 if err != nil { 142 if _, err := asn1.Unmarshal(der, &publicKeyInfo{}); err == nil { 143 return nil, errors.New("x509: failed to parse public key (use ParsePKIXPublicKey instead for this key format)") 144 } 145 return nil, err 146 } 147 if len(rest) > 0 { 148 return nil, asn1.SyntaxError{Msg: "trailing data"} 149 } 150 151 if pub.N.Sign() <= 0 || pub.E <= 0 { 152 return nil, errors.New("x509: public key contains zero or negative value") 153 } 154 if pub.E > 1<<31-1 { 155 return nil, errors.New("x509: public key contains large public exponent") 156 } 157 158 return &rsa.PublicKey{ 159 E: pub.E, 160 N: pub.N, 161 }, nil 162 } 163 164 // MarshalPKCS1PublicKey converts an RSA public key to PKCS #1, ASN.1 DER form. 165 // 166 // This kind of key is commonly encoded in PEM blocks of type "RSA PUBLIC KEY". 167 func MarshalPKCS1PublicKey(key *rsa.PublicKey) []byte { 168 derBytes, _ := asn1.Marshal(pkcs1PublicKey{ 169 N: key.N, 170 E: key.E, 171 }) 172 return derBytes 173 }