ecs_lib.c revision 325337
1/* crypto/ecdsa/ecs_lib.c */
2/* ====================================================================
3 * Copyright (c) 1998-2005 The OpenSSL Project.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer.
11 *
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in
14 *    the documentation and/or other materials provided with the
15 *    distribution.
16 *
17 * 3. All advertising materials mentioning features or use of this
18 *    software must display the following acknowledgment:
19 *    "This product includes software developed by the OpenSSL Project
20 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
21 *
22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23 *    endorse or promote products derived from this software without
24 *    prior written permission. For written permission, please contact
25 *    openssl-core@OpenSSL.org.
26 *
27 * 5. Products derived from this software may not be called "OpenSSL"
28 *    nor may "OpenSSL" appear in their names without prior written
29 *    permission of the OpenSSL Project.
30 *
31 * 6. Redistributions of any form whatsoever must retain the following
32 *    acknowledgment:
33 *    "This product includes software developed by the OpenSSL Project
34 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
35 *
36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47 * OF THE POSSIBILITY OF SUCH DAMAGE.
48 * ====================================================================
49 *
50 * This product includes cryptographic software written by Eric Young
51 * (eay@cryptsoft.com).  This product includes software written by Tim
52 * Hudson (tjh@cryptsoft.com).
53 *
54 */
55
56#include <string.h>
57#include "ecs_locl.h"
58#ifndef OPENSSL_NO_ENGINE
59# include <openssl/engine.h>
60#endif
61#include <openssl/err.h>
62#include <openssl/bn.h>
63#ifdef OPENSSL_FIPS
64# include <openssl/fips.h>
65#endif
66
67const char ECDSA_version[] = "ECDSA" OPENSSL_VERSION_PTEXT;
68
69static const ECDSA_METHOD *default_ECDSA_method = NULL;
70
71static void *ecdsa_data_new(void);
72static void *ecdsa_data_dup(void *);
73static void ecdsa_data_free(void *);
74
75void ECDSA_set_default_method(const ECDSA_METHOD *meth)
76{
77    default_ECDSA_method = meth;
78}
79
80const ECDSA_METHOD *ECDSA_get_default_method(void)
81{
82    if (!default_ECDSA_method) {
83#ifdef OPENSSL_FIPS
84        if (FIPS_mode())
85            return FIPS_ecdsa_openssl();
86        else
87            return ECDSA_OpenSSL();
88#else
89        default_ECDSA_method = ECDSA_OpenSSL();
90#endif
91    }
92    return default_ECDSA_method;
93}
94
95int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth)
96{
97    ECDSA_DATA *ecdsa;
98
99    ecdsa = ecdsa_check(eckey);
100
101    if (ecdsa == NULL)
102        return 0;
103
104#ifndef OPENSSL_NO_ENGINE
105    if (ecdsa->engine) {
106        ENGINE_finish(ecdsa->engine);
107        ecdsa->engine = NULL;
108    }
109#endif
110    ecdsa->meth = meth;
111
112    return 1;
113}
114
115static ECDSA_DATA *ECDSA_DATA_new_method(ENGINE *engine)
116{
117    ECDSA_DATA *ret;
118
119    ret = (ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA));
120    if (ret == NULL) {
121        ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
122        return (NULL);
123    }
124
125    ret->init = NULL;
126
127    ret->meth = ECDSA_get_default_method();
128    ret->engine = engine;
129#ifndef OPENSSL_NO_ENGINE
130    if (!ret->engine)
131        ret->engine = ENGINE_get_default_ECDSA();
132    if (ret->engine) {
133        ret->meth = ENGINE_get_ECDSA(ret->engine);
134        if (!ret->meth) {
135            ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_ENGINE_LIB);
136            ENGINE_finish(ret->engine);
137            OPENSSL_free(ret);
138            return NULL;
139        }
140    }
141#endif
142
143    ret->flags = ret->meth->flags;
144    CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data);
145#if 0
146    if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
147        CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data);
148        OPENSSL_free(ret);
149        ret = NULL;
150    }
151#endif
152    return (ret);
153}
154
155static void *ecdsa_data_new(void)
156{
157    return (void *)ECDSA_DATA_new_method(NULL);
158}
159
160static void *ecdsa_data_dup(void *data)
161{
162    ECDSA_DATA *r = (ECDSA_DATA *)data;
163
164    /* XXX: dummy operation */
165    if (r == NULL)
166        return NULL;
167
168    return ecdsa_data_new();
169}
170
171static void ecdsa_data_free(void *data)
172{
173    ECDSA_DATA *r = (ECDSA_DATA *)data;
174
175#ifndef OPENSSL_NO_ENGINE
176    if (r->engine)
177        ENGINE_finish(r->engine);
178#endif
179    CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, r, &r->ex_data);
180
181    OPENSSL_cleanse((void *)r, sizeof(ECDSA_DATA));
182
183    OPENSSL_free(r);
184}
185
186ECDSA_DATA *ecdsa_check(EC_KEY *key)
187{
188    ECDSA_DATA *ecdsa_data;
189
190    void *data = EC_KEY_get_key_method_data(key, ecdsa_data_dup,
191                                            ecdsa_data_free, ecdsa_data_free);
192    if (data == NULL) {
193        ecdsa_data = (ECDSA_DATA *)ecdsa_data_new();
194        if (ecdsa_data == NULL)
195            return NULL;
196        data = EC_KEY_insert_key_method_data(key, (void *)ecdsa_data,
197                                             ecdsa_data_dup, ecdsa_data_free,
198                                             ecdsa_data_free);
199        if (data != NULL) {
200            /*
201             * Another thread raced us to install the key_method data and
202             * won.
203             */
204            ecdsa_data_free(ecdsa_data);
205            ecdsa_data = (ECDSA_DATA *)data;
206        } else if (EC_KEY_get_key_method_data(key, ecdsa_data_dup,
207                                              ecdsa_data_free,
208                                              ecdsa_data_free) != ecdsa_data) {
209            /* Or an out of memory error in EC_KEY_insert_key_method_data. */
210            ecdsa_data_free(ecdsa_data);
211            return NULL;
212        }
213    } else {
214        ecdsa_data = (ECDSA_DATA *)data;
215    }
216#ifdef OPENSSL_FIPS
217    if (FIPS_mode() && !(ecdsa_data->flags & ECDSA_FLAG_FIPS_METHOD)
218        && !(EC_KEY_get_flags(key) & EC_FLAG_NON_FIPS_ALLOW)) {
219        ECDSAerr(ECDSA_F_ECDSA_CHECK, ECDSA_R_NON_FIPS_METHOD);
220        return NULL;
221    }
222#endif
223
224    return ecdsa_data;
225}
226
227int ECDSA_size(const EC_KEY *r)
228{
229    int ret, i;
230    ASN1_INTEGER bs;
231    BIGNUM *order = NULL;
232    unsigned char buf[4];
233    const EC_GROUP *group;
234
235    if (r == NULL)
236        return 0;
237    group = EC_KEY_get0_group(r);
238    if (group == NULL)
239        return 0;
240
241    if ((order = BN_new()) == NULL)
242        return 0;
243    if (!EC_GROUP_get_order(group, order, NULL)) {
244        BN_clear_free(order);
245        return 0;
246    }
247    i = BN_num_bits(order);
248    bs.length = (i + 7) / 8;
249    bs.data = buf;
250    bs.type = V_ASN1_INTEGER;
251    /* If the top bit is set the asn1 encoding is 1 larger. */
252    buf[0] = 0xff;
253
254    i = i2d_ASN1_INTEGER(&bs, NULL);
255    i += i;                     /* r and s */
256    ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE);
257    BN_clear_free(order);
258    return (ret);
259}
260
261int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
262                           CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func)
263{
264    return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDSA, argl, argp,
265                                   new_func, dup_func, free_func);
266}
267
268int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg)
269{
270    ECDSA_DATA *ecdsa;
271    ecdsa = ecdsa_check(d);
272    if (ecdsa == NULL)
273        return 0;
274    return (CRYPTO_set_ex_data(&ecdsa->ex_data, idx, arg));
275}
276
277void *ECDSA_get_ex_data(EC_KEY *d, int idx)
278{
279    ECDSA_DATA *ecdsa;
280    ecdsa = ecdsa_check(d);
281    if (ecdsa == NULL)
282        return NULL;
283    return (CRYPTO_get_ex_data(&ecdsa->ex_data, idx));
284}
285
286ECDSA_METHOD *ECDSA_METHOD_new(const ECDSA_METHOD *ecdsa_meth)
287{
288    ECDSA_METHOD *ret;
289
290    ret = OPENSSL_malloc(sizeof(ECDSA_METHOD));
291    if (ret == NULL) {
292        ECDSAerr(ECDSA_F_ECDSA_METHOD_NEW, ERR_R_MALLOC_FAILURE);
293        return NULL;
294    }
295
296    if (ecdsa_meth)
297        *ret = *ecdsa_meth;
298    else {
299        ret->ecdsa_sign_setup = 0;
300        ret->ecdsa_do_sign = 0;
301        ret->ecdsa_do_verify = 0;
302        ret->name = NULL;
303        ret->flags = 0;
304    }
305    ret->flags |= ECDSA_METHOD_FLAG_ALLOCATED;
306    return ret;
307}
308
309void ECDSA_METHOD_set_sign(ECDSA_METHOD *ecdsa_method,
310                           ECDSA_SIG *(*ecdsa_do_sign) (const unsigned char
311                                                        *dgst, int dgst_len,
312                                                        const BIGNUM *inv,
313                                                        const BIGNUM *rp,
314                                                        EC_KEY *eckey))
315{
316    ecdsa_method->ecdsa_do_sign = ecdsa_do_sign;
317}
318
319void ECDSA_METHOD_set_sign_setup(ECDSA_METHOD *ecdsa_method,
320                                 int (*ecdsa_sign_setup) (EC_KEY *eckey,
321                                                          BN_CTX *ctx,
322                                                          BIGNUM **kinv,
323                                                          BIGNUM **r))
324{
325    ecdsa_method->ecdsa_sign_setup = ecdsa_sign_setup;
326}
327
328void ECDSA_METHOD_set_verify(ECDSA_METHOD *ecdsa_method,
329                             int (*ecdsa_do_verify) (const unsigned char
330                                                     *dgst, int dgst_len,
331                                                     const ECDSA_SIG *sig,
332                                                     EC_KEY *eckey))
333{
334    ecdsa_method->ecdsa_do_verify = ecdsa_do_verify;
335}
336
337void ECDSA_METHOD_set_flags(ECDSA_METHOD *ecdsa_method, int flags)
338{
339    ecdsa_method->flags = flags | ECDSA_METHOD_FLAG_ALLOCATED;
340}
341
342void ECDSA_METHOD_set_name(ECDSA_METHOD *ecdsa_method, char *name)
343{
344    ecdsa_method->name = name;
345}
346
347void ECDSA_METHOD_free(ECDSA_METHOD *ecdsa_method)
348{
349    if (ecdsa_method->flags & ECDSA_METHOD_FLAG_ALLOCATED)
350        OPENSSL_free(ecdsa_method);
351}
352
353void ECDSA_METHOD_set_app_data(ECDSA_METHOD *ecdsa_method, void *app)
354{
355    ecdsa_method->app_data = app;
356}
357
358void *ECDSA_METHOD_get_app_data(ECDSA_METHOD *ecdsa_method)
359{
360    return ecdsa_method->app_data;
361}
362