Coverage Report

Created: 2026-03-19 06:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/boringssl/crypto/fipsmodule/digestsign/digestsign.cc.inc
Line
Count
Source
1
// Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
2
//
3
// Licensed under the Apache License, Version 2.0 (the "License");
4
// you may not use this file except in compliance with the License.
5
// You may obtain a copy of the License at
6
//
7
//     https://www.apache.org/licenses/LICENSE-2.0
8
//
9
// Unless required by applicable law or agreed to in writing, software
10
// distributed under the License is distributed on an "AS IS" BASIS,
11
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
// See the License for the specific language governing permissions and
13
// limitations under the License.
14
15
#include <openssl/evp.h>
16
17
#include <openssl/err.h>
18
19
#include "../../evp/internal.h"
20
#include "../delocate.h"
21
#include "../digest/internal.h"
22
#include "../service_indicator/internal.h"
23
24
25
using namespace bssl;
26
27
enum evp_sign_verify_t {
28
  evp_sign,
29
  evp_verify,
30
};
31
32
6
DEFINE_LOCAL_DATA(struct evp_md_pctx_ops, md_pctx_ops) {
33
6
  out->free = EVP_PKEY_CTX_free;
34
6
  out->dup = EVP_PKEY_CTX_dup;
35
6
}
36
37
225k
static int uses_prehash(EVP_MD_CTX *ctx, enum evp_sign_verify_t op) {
38
225k
  return (op == evp_sign) ? (FromOpaque(ctx->pctx)->pmeth->sign != nullptr)
39
225k
                          : (FromOpaque(ctx->pctx)->pmeth->verify != nullptr);
40
225k
}
41
42
static int do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
43
                          const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey,
44
56.3k
                          enum evp_sign_verify_t op) {
45
56.3k
  if (ctx->pctx == nullptr) {
46
56.3k
    ctx->pctx = EVP_PKEY_CTX_new(pkey, e);
47
56.3k
  }
48
56.3k
  if (ctx->pctx == nullptr) {
49
0
    return 0;
50
0
  }
51
56.3k
  ctx->pctx_ops = md_pctx_ops();
52
53
56.3k
  if (op == evp_verify) {
54
36.2k
    if (!EVP_PKEY_verify_init(ctx->pctx)) {
55
0
      return 0;
56
0
    }
57
36.2k
  } else {
58
20.1k
    if (!EVP_PKEY_sign_init(ctx->pctx)) {
59
0
      return 0;
60
0
    }
61
20.1k
  }
62
63
56.3k
  if (type != nullptr && !EVP_PKEY_CTX_set_signature_md(ctx->pctx, type)) {
64
0
    return 0;
65
0
  }
66
67
56.3k
  if (uses_prehash(ctx, op)) {
68
56.3k
    if (type == nullptr) {
69
0
      OPENSSL_PUT_ERROR(EVP, EVP_R_NO_DEFAULT_DIGEST);
70
0
      return 0;
71
0
    }
72
56.3k
    if (!EVP_DigestInit_ex(ctx, type, e)) {
73
0
      return 0;
74
0
    }
75
56.3k
  }
76
77
56.3k
  if (pctx) {
78
56.3k
    *pctx = ctx->pctx;
79
56.3k
  }
80
56.3k
  return 1;
81
56.3k
}
82
83
int EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type,
84
20.1k
                       ENGINE *e, EVP_PKEY *pkey) {
85
20.1k
  return do_sigver_init(ctx, pctx, type, e, pkey, evp_sign);
86
20.1k
}
87
88
int EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
89
36.2k
                         const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) {
90
36.2k
  return do_sigver_init(ctx, pctx, type, e, pkey, evp_verify);
91
36.2k
}
92
93
20.1k
int EVP_DigestSignUpdate(EVP_MD_CTX *ctx, const void *data, size_t len) {
94
20.1k
  if (!uses_prehash(ctx, evp_sign)) {
95
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
96
0
    return 0;
97
0
  }
98
99
20.1k
  return EVP_DigestUpdate(ctx, data, len);
100
20.1k
}
101
102
36.2k
int EVP_DigestVerifyUpdate(EVP_MD_CTX *ctx, const void *data, size_t len) {
103
36.2k
  if (!uses_prehash(ctx, evp_verify)) {
104
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
105
0
    return 0;
106
0
  }
107
108
36.2k
  return EVP_DigestUpdate(ctx, data, len);
109
36.2k
}
110
111
int EVP_DigestSignFinal(EVP_MD_CTX *ctx, uint8_t *out_sig,
112
20.1k
                        size_t *out_sig_len) {
113
20.1k
  if (!uses_prehash(ctx, evp_sign)) {
114
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
115
0
    return 0;
116
0
  }
117
118
20.1k
  if (out_sig) {
119
20.1k
    EVP_MD_CTX tmp_ctx;
120
20.1k
    int ret;
121
20.1k
    uint8_t md[EVP_MAX_MD_SIZE];
122
20.1k
    unsigned int mdlen;
123
124
20.1k
    FIPS_service_indicator_lock_state();
125
20.1k
    EVP_MD_CTX_init(&tmp_ctx);
126
20.1k
    ret = EVP_MD_CTX_copy_ex(&tmp_ctx, ctx) &&
127
20.1k
          EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) &&
128
20.1k
          EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen);
129
20.1k
    EVP_MD_CTX_cleanup(&tmp_ctx);
130
20.1k
    FIPS_service_indicator_unlock_state();
131
132
20.1k
    if (ret) {
133
20.1k
      EVP_DigestSign_verify_service_indicator(ctx);
134
20.1k
    }
135
136
20.1k
    return ret;
137
20.1k
  } else {
138
0
    size_t s = EVP_MD_size(ctx->digest);
139
0
    return EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, nullptr, s);
140
0
  }
141
20.1k
}
142
143
int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig,
144
36.2k
                          size_t sig_len) {
145
36.2k
  if (!uses_prehash(ctx, evp_verify)) {
146
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
147
0
    return 0;
148
0
  }
149
150
36.2k
  EVP_MD_CTX tmp_ctx;
151
36.2k
  int ret;
152
36.2k
  uint8_t md[EVP_MAX_MD_SIZE];
153
36.2k
  unsigned int mdlen;
154
155
36.2k
  FIPS_service_indicator_lock_state();
156
36.2k
  EVP_MD_CTX_init(&tmp_ctx);
157
36.2k
  ret = EVP_MD_CTX_copy_ex(&tmp_ctx, ctx) &&
158
36.2k
        EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) &&
159
36.2k
        EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
160
36.2k
  FIPS_service_indicator_unlock_state();
161
36.2k
  EVP_MD_CTX_cleanup(&tmp_ctx);
162
163
36.2k
  if (ret) {
164
0
    EVP_DigestVerify_verify_service_indicator(ctx);
165
0
  }
166
167
36.2k
  return ret;
168
36.2k
}
169
170
int EVP_DigestSign(EVP_MD_CTX *ctx, uint8_t *out_sig, size_t *out_sig_len,
171
20.1k
                   const uint8_t *data, size_t data_len) {
172
20.1k
  FIPS_service_indicator_lock_state();
173
20.1k
  int ret = 0;
174
175
20.1k
  if (uses_prehash(ctx, evp_sign)) {
176
    // If |out_sig| is NULL, the caller is only querying the maximum output
177
    // length. |data| should only be incorporated in the final call.
178
20.1k
    if (out_sig != nullptr && !EVP_DigestSignUpdate(ctx, data, data_len)) {
179
0
      goto end;
180
0
    }
181
182
20.1k
    ret = EVP_DigestSignFinal(ctx, out_sig, out_sig_len);
183
20.1k
    goto end;
184
20.1k
  }
185
186
0
  if (FromOpaque(ctx->pctx)->pmeth->sign_message == nullptr) {
187
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
188
0
    goto end;
189
0
  }
190
191
0
  ret = FromOpaque(ctx->pctx)->pmeth->sign_message(
192
0
      FromOpaque(ctx->pctx), out_sig, out_sig_len, data, data_len);
193
194
20.1k
end:
195
20.1k
  FIPS_service_indicator_unlock_state();
196
20.1k
  if (ret) {
197
20.1k
    EVP_DigestSign_verify_service_indicator(ctx);
198
20.1k
  }
199
20.1k
  return ret;
200
0
}
201
202
int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len,
203
36.2k
                     const uint8_t *data, size_t len) {
204
36.2k
  FIPS_service_indicator_lock_state();
205
36.2k
  int ret = 0;
206
207
36.2k
  if (uses_prehash(ctx, evp_verify)) {
208
36.2k
    ret = EVP_DigestVerifyUpdate(ctx, data, len) &&
209
36.2k
          EVP_DigestVerifyFinal(ctx, sig, sig_len);
210
36.2k
    goto end;
211
36.2k
  }
212
213
0
  if (FromOpaque(ctx->pctx)->pmeth->verify_message == nullptr) {
214
0
    OPENSSL_PUT_ERROR(EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
215
0
    goto end;
216
0
  }
217
218
0
  ret = FromOpaque(ctx->pctx)->pmeth->verify_message(FromOpaque(ctx->pctx), sig,
219
0
                                                     sig_len, data, len);
220
221
36.2k
end:
222
36.2k
  FIPS_service_indicator_unlock_state();
223
36.2k
  if (ret) {
224
0
    EVP_DigestVerify_verify_service_indicator(ctx);
225
0
  }
226
36.2k
  return ret;
227
0
}