1 /* $OpenBSD: gost89imit_pmeth.c,v 1.4 2017/01/29 17:49:23 beck Exp $ */
2 /*
3  * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
4  * Copyright (c) 2005-2006 Cryptocom LTD
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in
15  *    the documentation and/or other materials provided with the
16  *    distribution.
17  *
18  * 3. All advertising materials mentioning features or use of this
19  *    software must display the following acknowledgment:
20  *    "This product includes software developed by the OpenSSL Project
21  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
22  *
23  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
24  *    endorse or promote products derived from this software without
25  *    prior written permission. For written permission, please contact
26  *    openssl-core@openssl.org.
27  *
28  * 5. Products derived from this software may not be called "OpenSSL"
29  *    nor may "OpenSSL" appear in their names without prior written
30  *    permission of the OpenSSL Project.
31  *
32  * 6. Redistributions of any form whatsoever must retain the following
33  *    acknowledgment:
34  *    "This product includes software developed by the OpenSSL Project
35  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
36  *
37  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
38  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
39  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
40  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
41  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
42  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
43  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
44  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
45  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
46  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
47  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
48  * OF THE POSSIBILITY OF SUCH DAMAGE.
49  * ====================================================================
50  */
51 
52 #include <string.h>
53 
54 #include <openssl/opensslconf.h>
55 
56 #ifndef OPENSSL_NO_GOST
57 #include <openssl/evp.h>
58 #include <openssl/err.h>
59 #include <openssl/gost.h>
60 #include <openssl/x509v3.h> /* For string_to_hex */
61 
62 #include "evp_locl.h"
63 #include "gost_locl.h"
64 
65 struct gost_mac_pmeth_data {
66 	EVP_MD *md;
67 	unsigned char key[32];
68 	unsigned key_set :1;
69 };
70 
71 static int
pkey_gost_mac_init(EVP_PKEY_CTX * ctx)72 pkey_gost_mac_init(EVP_PKEY_CTX *ctx)
73 {
74 	struct gost_mac_pmeth_data *data;
75 
76 	data = calloc(1, sizeof(struct gost_mac_pmeth_data));
77 	if (data == NULL)
78 		return 0;
79 	EVP_PKEY_CTX_set_data(ctx, data);
80 	return 1;
81 }
82 
83 static void
pkey_gost_mac_cleanup(EVP_PKEY_CTX * ctx)84 pkey_gost_mac_cleanup(EVP_PKEY_CTX *ctx)
85 {
86 	struct gost_mac_pmeth_data *data = EVP_PKEY_CTX_get_data(ctx);
87 	free(data);
88 }
89 
90 static int
pkey_gost_mac_copy(EVP_PKEY_CTX * dst,EVP_PKEY_CTX * src)91 pkey_gost_mac_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
92 {
93 	struct gost_mac_pmeth_data *dst_data, *src_data;
94 
95 	if (pkey_gost_mac_init(dst) == 0)
96 		return 0;
97 
98 	src_data = EVP_PKEY_CTX_get_data(src);
99 	dst_data = EVP_PKEY_CTX_get_data(dst);
100 
101 	*dst_data = *src_data;
102 
103 	return 1;
104 }
105 
106 static int
pkey_gost_mac_keygen(EVP_PKEY_CTX * ctx,EVP_PKEY * pkey)107 pkey_gost_mac_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
108 {
109 	struct gost_mac_pmeth_data *data = EVP_PKEY_CTX_get_data(ctx);
110 	unsigned char *keydata;
111 
112 	if (!data->key_set) {
113 		GOSTerror(GOST_R_MAC_KEY_NOT_SET);
114 		return 0;
115 	}
116 
117 	keydata = malloc(32);
118 	if (keydata == NULL) {
119 		GOSTerror(ERR_R_MALLOC_FAILURE);
120 		return 0;
121 	}
122 	memcpy(keydata, data->key, 32);
123 	EVP_PKEY_assign(pkey, NID_id_Gost28147_89_MAC, keydata);
124 
125 	return 1;
126 }
127 
128 static int
pkey_gost_mac_ctrl(EVP_PKEY_CTX * ctx,int type,int p1,void * p2)129 pkey_gost_mac_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
130 {
131 	struct gost_mac_pmeth_data *data = EVP_PKEY_CTX_get_data(ctx);
132 
133 	switch (type) {
134 	case EVP_PKEY_CTRL_MD:
135 		if (EVP_MD_type(p2) != NID_id_Gost28147_89_MAC) {
136 			GOSTerror(GOST_R_INVALID_DIGEST_TYPE);
137 			return 0;
138 		}
139 		data->md = p2;
140 		return 1;
141 
142 	case EVP_PKEY_CTRL_SET_MAC_KEY:
143 		if (p1 != 32) {
144 			GOSTerror(GOST_R_INVALID_MAC_KEY_LENGTH);
145 			return 0;
146 		}
147 
148 		memcpy(data->key, p2, 32);
149 		data->key_set = 1;
150 		return 1;
151 
152 	case EVP_PKEY_CTRL_DIGESTINIT:
153 	    {
154 		EVP_MD_CTX *mctx = p2;
155 		void *key;
156 
157 		if (!data->key_set) {
158 			EVP_PKEY *pkey = EVP_PKEY_CTX_get0_pkey(ctx);
159 			if (pkey == NULL) {
160 				GOSTerror(GOST_R_MAC_KEY_NOT_SET);
161 				return 0;
162 			}
163 			key = EVP_PKEY_get0(pkey);
164 			if (key == NULL) {
165 				GOSTerror(GOST_R_MAC_KEY_NOT_SET);
166 				return 0;
167 			}
168 		} else {
169 			key = &(data->key);
170 		}
171 		if (mctx->digest->md_ctrl == NULL)
172 			return 0;
173 		return mctx->digest->md_ctrl(mctx, EVP_MD_CTRL_SET_KEY, 32 * 8,
174 		    key);
175 	    }
176 
177 	}
178 
179 	return -2;
180 }
181 
182 static int
pkey_gost_mac_ctrl_str(EVP_PKEY_CTX * ctx,const char * type,const char * value)183 pkey_gost_mac_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value)
184 {
185 	if (value == NULL)
186 		return 0;
187 	if (strcmp(type, "key") == 0) {
188 		void *p = (void *)value;
189 		return pkey_gost_mac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY,
190 		    strlen(value), p);
191 	}
192 	if (strcmp(type, "hexkey") == 0) {
193 		unsigned char *key;
194 		int r;
195 		long keylen;
196 
197 		key = string_to_hex(value, &keylen);
198 		if (key == NULL)
199 			return 0;
200 		r = pkey_gost_mac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen,
201 		    key);
202 		free(key);
203 		return r;
204 	}
205 	return -2;
206 }
207 
208 static int
pkey_gost_mac_signctx_init(EVP_PKEY_CTX * ctx,EVP_MD_CTX * mctx)209 pkey_gost_mac_signctx_init(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx)
210 {
211 	return 1;
212 }
213 
214 static int
pkey_gost_mac_signctx(EVP_PKEY_CTX * ctx,unsigned char * sig,size_t * siglen,EVP_MD_CTX * mctx)215 pkey_gost_mac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
216     EVP_MD_CTX *mctx)
217 {
218 	/* for platforms where sizeof(int) != sizeof(size_t)*/
219 	unsigned int tmpsiglen = *siglen;
220 	int ret;
221 
222 	if (sig == NULL) {
223 		*siglen = 4;
224 		return 1;
225 	}
226 
227 	ret = EVP_DigestFinal_ex(mctx, sig, &tmpsiglen);
228 	*siglen = tmpsiglen;
229 	return ret;
230 }
231 
232 const EVP_PKEY_METHOD gostimit_pkey_meth = {
233 	.pkey_id = EVP_PKEY_GOSTIMIT,
234 
235 	.init = pkey_gost_mac_init,
236 	.cleanup = pkey_gost_mac_cleanup,
237 	.copy = pkey_gost_mac_copy,
238 
239 	.keygen = pkey_gost_mac_keygen,
240 
241 	.signctx_init = pkey_gost_mac_signctx_init,
242 	.signctx = pkey_gost_mac_signctx,
243 
244 	.ctrl = pkey_gost_mac_ctrl,
245 	.ctrl_str = pkey_gost_mac_ctrl_str,
246 };
247 
248 #endif
249