1 /* crypto/ecdsa/ecs_lib.c */
2 /* ====================================================================
3 * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 *
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the
15 * distribution.
16 *
17 * 3. All advertising materials mentioning features or use of this
18 * software must display the following acknowledgment:
19 * "This product includes software developed by the OpenSSL Project
20 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
21 *
22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23 * endorse or promote products derived from this software without
24 * prior written permission. For written permission, please contact
25 * openssl-core@OpenSSL.org.
26 *
27 * 5. Products derived from this software may not be called "OpenSSL"
28 * nor may "OpenSSL" appear in their names without prior written
29 * permission of the OpenSSL Project.
30 *
31 * 6. Redistributions of any form whatsoever must retain the following
32 * acknowledgment:
33 * "This product includes software developed by the OpenSSL Project
34 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
35 *
36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47 * OF THE POSSIBILITY OF SUCH DAMAGE.
48 * ====================================================================
49 *
50 * This product includes cryptographic software written by Eric Young
51 * (eay@cryptsoft.com). This product includes software written by Tim
52 * Hudson (tjh@cryptsoft.com).
53 *
54 */
55
56 #include <string.h>
57 #include "ecs_locl.h"
58 #ifndef OPENSSL_NO_ENGINE
59 # include <openssl/engine.h>
60 #endif
61 #include <openssl/err.h>
62 #include <openssl/bn.h>
63 #ifdef OPENSSL_FIPS
64 # include <openssl/fips.h>
65 #endif
66
67 const char ECDSA_version[] = "ECDSA" OPENSSL_VERSION_PTEXT;
68
69 static const ECDSA_METHOD *default_ECDSA_method = NULL;
70
71 static void *ecdsa_data_new(void);
72 static void *ecdsa_data_dup(void *);
73 static void ecdsa_data_free(void *);
74
ECDSA_set_default_method(const ECDSA_METHOD * meth)75 void ECDSA_set_default_method(const ECDSA_METHOD *meth)
76 {
77 default_ECDSA_method = meth;
78 }
79
ECDSA_get_default_method(void)80 const ECDSA_METHOD *ECDSA_get_default_method(void)
81 {
82 if (!default_ECDSA_method) {
83 #ifdef OPENSSL_FIPS
84 if (FIPS_mode())
85 return FIPS_ecdsa_openssl();
86 else
87 return ECDSA_OpenSSL();
88 #else
89 default_ECDSA_method = ECDSA_OpenSSL();
90 #endif
91 }
92 return default_ECDSA_method;
93 }
94
ECDSA_set_method(EC_KEY * eckey,const ECDSA_METHOD * meth)95 int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth)
96 {
97 ECDSA_DATA *ecdsa;
98
99 ecdsa = ecdsa_check(eckey);
100
101 if (ecdsa == NULL)
102 return 0;
103
104 #ifndef OPENSSL_NO_ENGINE
105 if (ecdsa->engine) {
106 ENGINE_finish(ecdsa->engine);
107 ecdsa->engine = NULL;
108 }
109 #endif
110 ecdsa->meth = meth;
111
112 return 1;
113 }
114
ECDSA_DATA_new_method(ENGINE * engine)115 static ECDSA_DATA *ECDSA_DATA_new_method(ENGINE *engine)
116 {
117 ECDSA_DATA *ret;
118
119 ret = (ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA));
120 if (ret == NULL) {
121 ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
122 return (NULL);
123 }
124
125 ret->init = NULL;
126
127 ret->meth = ECDSA_get_default_method();
128 ret->engine = engine;
129 #ifndef OPENSSL_NO_ENGINE
130 if (!ret->engine)
131 ret->engine = ENGINE_get_default_ECDSA();
132 if (ret->engine) {
133 ret->meth = ENGINE_get_ECDSA(ret->engine);
134 if (!ret->meth) {
135 ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_ENGINE_LIB);
136 ENGINE_finish(ret->engine);
137 OPENSSL_free(ret);
138 return NULL;
139 }
140 }
141 #endif
142
143 ret->flags = ret->meth->flags;
144 CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data);
145 #if 0
146 if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
147 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data);
148 OPENSSL_free(ret);
149 ret = NULL;
150 }
151 #endif
152 return (ret);
153 }
154
ecdsa_data_new(void)155 static void *ecdsa_data_new(void)
156 {
157 return (void *)ECDSA_DATA_new_method(NULL);
158 }
159
ecdsa_data_dup(void * data)160 static void *ecdsa_data_dup(void *data)
161 {
162 ECDSA_DATA *r = (ECDSA_DATA *)data;
163
164 /* XXX: dummy operation */
165 if (r == NULL)
166 return NULL;
167
168 return ecdsa_data_new();
169 }
170
ecdsa_data_free(void * data)171 static void ecdsa_data_free(void *data)
172 {
173 ECDSA_DATA *r = (ECDSA_DATA *)data;
174
175 #ifndef OPENSSL_NO_ENGINE
176 if (r->engine)
177 ENGINE_finish(r->engine);
178 #endif
179 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, r, &r->ex_data);
180
181 OPENSSL_cleanse((void *)r, sizeof(ECDSA_DATA));
182
183 OPENSSL_free(r);
184 }
185
ecdsa_check(EC_KEY * key)186 ECDSA_DATA *ecdsa_check(EC_KEY *key)
187 {
188 ECDSA_DATA *ecdsa_data;
189
190 void *data = EC_KEY_get_key_method_data(key, ecdsa_data_dup,
191 ecdsa_data_free, ecdsa_data_free);
192 if (data == NULL) {
193 ecdsa_data = (ECDSA_DATA *)ecdsa_data_new();
194 if (ecdsa_data == NULL)
195 return NULL;
196 data = EC_KEY_insert_key_method_data(key, (void *)ecdsa_data,
197 ecdsa_data_dup, ecdsa_data_free,
198 ecdsa_data_free);
199 if (data != NULL) {
200 /*
201 * Another thread raced us to install the key_method data and
202 * won.
203 */
204 ecdsa_data_free(ecdsa_data);
205 ecdsa_data = (ECDSA_DATA *)data;
206 } else if (EC_KEY_get_key_method_data(key, ecdsa_data_dup,
207 ecdsa_data_free,
208 ecdsa_data_free) != ecdsa_data) {
209 /* Or an out of memory error in EC_KEY_insert_key_method_data. */
210 ecdsa_data_free(ecdsa_data);
211 return NULL;
212 }
213 } else {
214 ecdsa_data = (ECDSA_DATA *)data;
215 }
216 #ifdef OPENSSL_FIPS
217 if (FIPS_mode() && !(ecdsa_data->flags & ECDSA_FLAG_FIPS_METHOD)
218 && !(EC_KEY_get_flags(key) & EC_FLAG_NON_FIPS_ALLOW)) {
219 ECDSAerr(ECDSA_F_ECDSA_CHECK, ECDSA_R_NON_FIPS_METHOD);
220 return NULL;
221 }
222 #endif
223
224 return ecdsa_data;
225 }
226
ECDSA_size(const EC_KEY * r)227 int ECDSA_size(const EC_KEY *r)
228 {
229 int ret, i;
230 ASN1_INTEGER bs;
231 BIGNUM *order = NULL;
232 unsigned char buf[4];
233 const EC_GROUP *group;
234
235 if (r == NULL)
236 return 0;
237 group = EC_KEY_get0_group(r);
238 if (group == NULL)
239 return 0;
240
241 if ((order = BN_new()) == NULL)
242 return 0;
243 if (!EC_GROUP_get_order(group, order, NULL)) {
244 BN_clear_free(order);
245 return 0;
246 }
247 i = BN_num_bits(order);
248 bs.length = (i + 7) / 8;
249 bs.data = buf;
250 bs.type = V_ASN1_INTEGER;
251 /* If the top bit is set the asn1 encoding is 1 larger. */
252 buf[0] = 0xff;
253
254 i = i2d_ASN1_INTEGER(&bs, NULL);
255 i += i; /* r and s */
256 ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE);
257 BN_clear_free(order);
258 return (ret);
259 }
260
ECDSA_get_ex_new_index(long argl,void * argp,CRYPTO_EX_new * new_func,CRYPTO_EX_dup * dup_func,CRYPTO_EX_free * free_func)261 int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
262 CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func)
263 {
264 return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDSA, argl, argp,
265 new_func, dup_func, free_func);
266 }
267
ECDSA_set_ex_data(EC_KEY * d,int idx,void * arg)268 int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg)
269 {
270 ECDSA_DATA *ecdsa;
271 ecdsa = ecdsa_check(d);
272 if (ecdsa == NULL)
273 return 0;
274 return (CRYPTO_set_ex_data(&ecdsa->ex_data, idx, arg));
275 }
276
ECDSA_get_ex_data(EC_KEY * d,int idx)277 void *ECDSA_get_ex_data(EC_KEY *d, int idx)
278 {
279 ECDSA_DATA *ecdsa;
280 ecdsa = ecdsa_check(d);
281 if (ecdsa == NULL)
282 return NULL;
283 return (CRYPTO_get_ex_data(&ecdsa->ex_data, idx));
284 }
285
ECDSA_METHOD_new(const ECDSA_METHOD * ecdsa_meth)286 ECDSA_METHOD *ECDSA_METHOD_new(const ECDSA_METHOD *ecdsa_meth)
287 {
288 ECDSA_METHOD *ret;
289
290 ret = OPENSSL_malloc(sizeof(ECDSA_METHOD));
291 if (ret == NULL) {
292 ECDSAerr(ECDSA_F_ECDSA_METHOD_NEW, ERR_R_MALLOC_FAILURE);
293 return NULL;
294 }
295
296 if (ecdsa_meth)
297 *ret = *ecdsa_meth;
298 else {
299 ret->ecdsa_sign_setup = 0;
300 ret->ecdsa_do_sign = 0;
301 ret->ecdsa_do_verify = 0;
302 ret->name = NULL;
303 ret->flags = 0;
304 }
305 ret->flags |= ECDSA_METHOD_FLAG_ALLOCATED;
306 return ret;
307 }
308
ECDSA_METHOD_set_sign(ECDSA_METHOD * ecdsa_method,ECDSA_SIG * (* ecdsa_do_sign)(const unsigned char * dgst,int dgst_len,const BIGNUM * inv,const BIGNUM * rp,EC_KEY * eckey))309 void ECDSA_METHOD_set_sign(ECDSA_METHOD *ecdsa_method,
310 ECDSA_SIG *(*ecdsa_do_sign) (const unsigned char
311 *dgst, int dgst_len,
312 const BIGNUM *inv,
313 const BIGNUM *rp,
314 EC_KEY *eckey))
315 {
316 ecdsa_method->ecdsa_do_sign = ecdsa_do_sign;
317 }
318
ECDSA_METHOD_set_sign_setup(ECDSA_METHOD * ecdsa_method,int (* ecdsa_sign_setup)(EC_KEY * eckey,BN_CTX * ctx,BIGNUM ** kinv,BIGNUM ** r))319 void ECDSA_METHOD_set_sign_setup(ECDSA_METHOD *ecdsa_method,
320 int (*ecdsa_sign_setup) (EC_KEY *eckey,
321 BN_CTX *ctx,
322 BIGNUM **kinv,
323 BIGNUM **r))
324 {
325 ecdsa_method->ecdsa_sign_setup = ecdsa_sign_setup;
326 }
327
ECDSA_METHOD_set_verify(ECDSA_METHOD * ecdsa_method,int (* ecdsa_do_verify)(const unsigned char * dgst,int dgst_len,const ECDSA_SIG * sig,EC_KEY * eckey))328 void ECDSA_METHOD_set_verify(ECDSA_METHOD *ecdsa_method,
329 int (*ecdsa_do_verify) (const unsigned char
330 *dgst, int dgst_len,
331 const ECDSA_SIG *sig,
332 EC_KEY *eckey))
333 {
334 ecdsa_method->ecdsa_do_verify = ecdsa_do_verify;
335 }
336
ECDSA_METHOD_set_flags(ECDSA_METHOD * ecdsa_method,int flags)337 void ECDSA_METHOD_set_flags(ECDSA_METHOD *ecdsa_method, int flags)
338 {
339 ecdsa_method->flags = flags | ECDSA_METHOD_FLAG_ALLOCATED;
340 }
341
ECDSA_METHOD_set_name(ECDSA_METHOD * ecdsa_method,char * name)342 void ECDSA_METHOD_set_name(ECDSA_METHOD *ecdsa_method, char *name)
343 {
344 ecdsa_method->name = name;
345 }
346
ECDSA_METHOD_free(ECDSA_METHOD * ecdsa_method)347 void ECDSA_METHOD_free(ECDSA_METHOD *ecdsa_method)
348 {
349 if (ecdsa_method->flags & ECDSA_METHOD_FLAG_ALLOCATED)
350 OPENSSL_free(ecdsa_method);
351 }
352
ECDSA_METHOD_set_app_data(ECDSA_METHOD * ecdsa_method,void * app)353 void ECDSA_METHOD_set_app_data(ECDSA_METHOD *ecdsa_method, void *app)
354 {
355 ecdsa_method->app_data = app;
356 }
357
ECDSA_METHOD_get_app_data(ECDSA_METHOD * ecdsa_method)358 void *ECDSA_METHOD_get_app_data(ECDSA_METHOD *ecdsa_method)
359 {
360 return ecdsa_method->app_data;
361 }
362