ecs_lib.c revision 325337
1/* crypto/ecdsa/ecs_lib.c */ 2/* ==================================================================== 3 * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the 15 * distribution. 16 * 17 * 3. All advertising materials mentioning features or use of this 18 * software must display the following acknowledgment: 19 * "This product includes software developed by the OpenSSL Project 20 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 21 * 22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 23 * endorse or promote products derived from this software without 24 * prior written permission. For written permission, please contact 25 * openssl-core@OpenSSL.org. 26 * 27 * 5. Products derived from this software may not be called "OpenSSL" 28 * nor may "OpenSSL" appear in their names without prior written 29 * permission of the OpenSSL Project. 30 * 31 * 6. Redistributions of any form whatsoever must retain the following 32 * acknowledgment: 33 * "This product includes software developed by the OpenSSL Project 34 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 35 * 36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 47 * OF THE POSSIBILITY OF SUCH DAMAGE. 48 * ==================================================================== 49 * 50 * This product includes cryptographic software written by Eric Young 51 * (eay@cryptsoft.com). This product includes software written by Tim 52 * Hudson (tjh@cryptsoft.com). 53 * 54 */ 55 56#include <string.h> 57#include "ecs_locl.h" 58#ifndef OPENSSL_NO_ENGINE 59# include <openssl/engine.h> 60#endif 61#include <openssl/err.h> 62#include <openssl/bn.h> 63#ifdef OPENSSL_FIPS 64# include <openssl/fips.h> 65#endif 66 67const char ECDSA_version[] = "ECDSA" OPENSSL_VERSION_PTEXT; 68 69static const ECDSA_METHOD *default_ECDSA_method = NULL; 70 71static void *ecdsa_data_new(void); 72static void *ecdsa_data_dup(void *); 73static void ecdsa_data_free(void *); 74 75void ECDSA_set_default_method(const ECDSA_METHOD *meth) 76{ 77 default_ECDSA_method = meth; 78} 79 80const ECDSA_METHOD *ECDSA_get_default_method(void) 81{ 82 if (!default_ECDSA_method) { 83#ifdef OPENSSL_FIPS 84 if (FIPS_mode()) 85 return FIPS_ecdsa_openssl(); 86 else 87 return ECDSA_OpenSSL(); 88#else 89 default_ECDSA_method = ECDSA_OpenSSL(); 90#endif 91 } 92 return default_ECDSA_method; 93} 94 95int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth) 96{ 97 ECDSA_DATA *ecdsa; 98 99 ecdsa = ecdsa_check(eckey); 100 101 if (ecdsa == NULL) 102 return 0; 103 104#ifndef OPENSSL_NO_ENGINE 105 if (ecdsa->engine) { 106 ENGINE_finish(ecdsa->engine); 107 ecdsa->engine = NULL; 108 } 109#endif 110 ecdsa->meth = meth; 111 112 return 1; 113} 114 115static ECDSA_DATA *ECDSA_DATA_new_method(ENGINE *engine) 116{ 117 ECDSA_DATA *ret; 118 119 ret = (ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA)); 120 if (ret == NULL) { 121 ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE); 122 return (NULL); 123 } 124 125 ret->init = NULL; 126 127 ret->meth = ECDSA_get_default_method(); 128 ret->engine = engine; 129#ifndef OPENSSL_NO_ENGINE 130 if (!ret->engine) 131 ret->engine = ENGINE_get_default_ECDSA(); 132 if (ret->engine) { 133 ret->meth = ENGINE_get_ECDSA(ret->engine); 134 if (!ret->meth) { 135 ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_ENGINE_LIB); 136 ENGINE_finish(ret->engine); 137 OPENSSL_free(ret); 138 return NULL; 139 } 140 } 141#endif 142 143 ret->flags = ret->meth->flags; 144 CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); 145#if 0 146 if ((ret->meth->init != NULL) && !ret->meth->init(ret)) { 147 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); 148 OPENSSL_free(ret); 149 ret = NULL; 150 } 151#endif 152 return (ret); 153} 154 155static void *ecdsa_data_new(void) 156{ 157 return (void *)ECDSA_DATA_new_method(NULL); 158} 159 160static void *ecdsa_data_dup(void *data) 161{ 162 ECDSA_DATA *r = (ECDSA_DATA *)data; 163 164 /* XXX: dummy operation */ 165 if (r == NULL) 166 return NULL; 167 168 return ecdsa_data_new(); 169} 170 171static void ecdsa_data_free(void *data) 172{ 173 ECDSA_DATA *r = (ECDSA_DATA *)data; 174 175#ifndef OPENSSL_NO_ENGINE 176 if (r->engine) 177 ENGINE_finish(r->engine); 178#endif 179 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, r, &r->ex_data); 180 181 OPENSSL_cleanse((void *)r, sizeof(ECDSA_DATA)); 182 183 OPENSSL_free(r); 184} 185 186ECDSA_DATA *ecdsa_check(EC_KEY *key) 187{ 188 ECDSA_DATA *ecdsa_data; 189 190 void *data = EC_KEY_get_key_method_data(key, ecdsa_data_dup, 191 ecdsa_data_free, ecdsa_data_free); 192 if (data == NULL) { 193 ecdsa_data = (ECDSA_DATA *)ecdsa_data_new(); 194 if (ecdsa_data == NULL) 195 return NULL; 196 data = EC_KEY_insert_key_method_data(key, (void *)ecdsa_data, 197 ecdsa_data_dup, ecdsa_data_free, 198 ecdsa_data_free); 199 if (data != NULL) { 200 /* 201 * Another thread raced us to install the key_method data and 202 * won. 203 */ 204 ecdsa_data_free(ecdsa_data); 205 ecdsa_data = (ECDSA_DATA *)data; 206 } else if (EC_KEY_get_key_method_data(key, ecdsa_data_dup, 207 ecdsa_data_free, 208 ecdsa_data_free) != ecdsa_data) { 209 /* Or an out of memory error in EC_KEY_insert_key_method_data. */ 210 ecdsa_data_free(ecdsa_data); 211 return NULL; 212 } 213 } else { 214 ecdsa_data = (ECDSA_DATA *)data; 215 } 216#ifdef OPENSSL_FIPS 217 if (FIPS_mode() && !(ecdsa_data->flags & ECDSA_FLAG_FIPS_METHOD) 218 && !(EC_KEY_get_flags(key) & EC_FLAG_NON_FIPS_ALLOW)) { 219 ECDSAerr(ECDSA_F_ECDSA_CHECK, ECDSA_R_NON_FIPS_METHOD); 220 return NULL; 221 } 222#endif 223 224 return ecdsa_data; 225} 226 227int ECDSA_size(const EC_KEY *r) 228{ 229 int ret, i; 230 ASN1_INTEGER bs; 231 BIGNUM *order = NULL; 232 unsigned char buf[4]; 233 const EC_GROUP *group; 234 235 if (r == NULL) 236 return 0; 237 group = EC_KEY_get0_group(r); 238 if (group == NULL) 239 return 0; 240 241 if ((order = BN_new()) == NULL) 242 return 0; 243 if (!EC_GROUP_get_order(group, order, NULL)) { 244 BN_clear_free(order); 245 return 0; 246 } 247 i = BN_num_bits(order); 248 bs.length = (i + 7) / 8; 249 bs.data = buf; 250 bs.type = V_ASN1_INTEGER; 251 /* If the top bit is set the asn1 encoding is 1 larger. */ 252 buf[0] = 0xff; 253 254 i = i2d_ASN1_INTEGER(&bs, NULL); 255 i += i; /* r and s */ 256 ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE); 257 BN_clear_free(order); 258 return (ret); 259} 260 261int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, 262 CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) 263{ 264 return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDSA, argl, argp, 265 new_func, dup_func, free_func); 266} 267 268int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg) 269{ 270 ECDSA_DATA *ecdsa; 271 ecdsa = ecdsa_check(d); 272 if (ecdsa == NULL) 273 return 0; 274 return (CRYPTO_set_ex_data(&ecdsa->ex_data, idx, arg)); 275} 276 277void *ECDSA_get_ex_data(EC_KEY *d, int idx) 278{ 279 ECDSA_DATA *ecdsa; 280 ecdsa = ecdsa_check(d); 281 if (ecdsa == NULL) 282 return NULL; 283 return (CRYPTO_get_ex_data(&ecdsa->ex_data, idx)); 284} 285 286ECDSA_METHOD *ECDSA_METHOD_new(const ECDSA_METHOD *ecdsa_meth) 287{ 288 ECDSA_METHOD *ret; 289 290 ret = OPENSSL_malloc(sizeof(ECDSA_METHOD)); 291 if (ret == NULL) { 292 ECDSAerr(ECDSA_F_ECDSA_METHOD_NEW, ERR_R_MALLOC_FAILURE); 293 return NULL; 294 } 295 296 if (ecdsa_meth) 297 *ret = *ecdsa_meth; 298 else { 299 ret->ecdsa_sign_setup = 0; 300 ret->ecdsa_do_sign = 0; 301 ret->ecdsa_do_verify = 0; 302 ret->name = NULL; 303 ret->flags = 0; 304 } 305 ret->flags |= ECDSA_METHOD_FLAG_ALLOCATED; 306 return ret; 307} 308 309void ECDSA_METHOD_set_sign(ECDSA_METHOD *ecdsa_method, 310 ECDSA_SIG *(*ecdsa_do_sign) (const unsigned char 311 *dgst, int dgst_len, 312 const BIGNUM *inv, 313 const BIGNUM *rp, 314 EC_KEY *eckey)) 315{ 316 ecdsa_method->ecdsa_do_sign = ecdsa_do_sign; 317} 318 319void ECDSA_METHOD_set_sign_setup(ECDSA_METHOD *ecdsa_method, 320 int (*ecdsa_sign_setup) (EC_KEY *eckey, 321 BN_CTX *ctx, 322 BIGNUM **kinv, 323 BIGNUM **r)) 324{ 325 ecdsa_method->ecdsa_sign_setup = ecdsa_sign_setup; 326} 327 328void ECDSA_METHOD_set_verify(ECDSA_METHOD *ecdsa_method, 329 int (*ecdsa_do_verify) (const unsigned char 330 *dgst, int dgst_len, 331 const ECDSA_SIG *sig, 332 EC_KEY *eckey)) 333{ 334 ecdsa_method->ecdsa_do_verify = ecdsa_do_verify; 335} 336 337void ECDSA_METHOD_set_flags(ECDSA_METHOD *ecdsa_method, int flags) 338{ 339 ecdsa_method->flags = flags | ECDSA_METHOD_FLAG_ALLOCATED; 340} 341 342void ECDSA_METHOD_set_name(ECDSA_METHOD *ecdsa_method, char *name) 343{ 344 ecdsa_method->name = name; 345} 346 347void ECDSA_METHOD_free(ECDSA_METHOD *ecdsa_method) 348{ 349 if (ecdsa_method->flags & ECDSA_METHOD_FLAG_ALLOCATED) 350 OPENSSL_free(ecdsa_method); 351} 352 353void ECDSA_METHOD_set_app_data(ECDSA_METHOD *ecdsa_method, void *app) 354{ 355 ecdsa_method->app_data = app; 356} 357 358void *ECDSA_METHOD_get_app_data(ECDSA_METHOD *ecdsa_method) 359{ 360 return ecdsa_method->app_data; 361} 362