Coverage Report

Created: 2025-10-12 06:56

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
Line
Count
Source
1
/*
2
 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
#include <openssl/core_dispatch.h>
12
#include <openssl/core_names.h>
13
#include <openssl/param_build.h>
14
#include <openssl/proverr.h>
15
#include <openssl/self_test.h>
16
#include <openssl/proverr.h>
17
#include "crypto/slh_dsa.h"
18
#include "internal/fips.h"
19
#include "internal/param_build_set.h"
20
#include "prov/implementations.h"
21
#include "prov/providercommon.h"
22
#include "prov/provider_ctx.h"
23
24
#ifdef FIPS_MODULE
25
static int slh_dsa_fips140_pairwise_test(const SLH_DSA_KEY *key,
26
                                         SLH_DSA_HASH_CTX *ctx);
27
#endif  /* FIPS_MODULE */
28
29
static OSSL_FUNC_keymgmt_free_fn slh_dsa_free_key;
30
static OSSL_FUNC_keymgmt_has_fn slh_dsa_has;
31
static OSSL_FUNC_keymgmt_match_fn slh_dsa_match;
32
static OSSL_FUNC_keymgmt_import_fn slh_dsa_import;
33
static OSSL_FUNC_keymgmt_export_fn slh_dsa_export;
34
static OSSL_FUNC_keymgmt_import_types_fn slh_dsa_imexport_types;
35
static OSSL_FUNC_keymgmt_export_types_fn slh_dsa_imexport_types;
36
static OSSL_FUNC_keymgmt_load_fn slh_dsa_load;
37
static OSSL_FUNC_keymgmt_get_params_fn slh_dsa_get_params;
38
static OSSL_FUNC_keymgmt_gettable_params_fn slh_dsa_gettable_params;
39
static OSSL_FUNC_keymgmt_validate_fn slh_dsa_validate;
40
static OSSL_FUNC_keymgmt_gen_init_fn slh_dsa_gen_init;
41
static OSSL_FUNC_keymgmt_gen_cleanup_fn slh_dsa_gen_cleanup;
42
static OSSL_FUNC_keymgmt_gen_set_params_fn slh_dsa_gen_set_params;
43
static OSSL_FUNC_keymgmt_gen_settable_params_fn slh_dsa_gen_settable_params;
44
static OSSL_FUNC_keymgmt_dup_fn slh_dsa_dup_key;
45
46
0
#define SLH_DSA_POSSIBLE_SELECTIONS (OSSL_KEYMGMT_SELECT_KEYPAIR)
47
48
struct slh_dsa_gen_ctx {
49
    SLH_DSA_HASH_CTX *ctx;
50
    OSSL_LIB_CTX *libctx;
51
    char *propq;
52
    uint8_t entropy[SLH_DSA_MAX_N * 3];
53
    size_t entropy_len;
54
};
55
56
static void *slh_dsa_new_key(void *provctx, const char *alg)
57
0
{
58
0
    if (!ossl_prov_is_running())
59
0
        return 0;
60
61
0
    return ossl_slh_dsa_key_new(PROV_LIBCTX_OF(provctx), NULL, alg);
62
0
}
63
64
static void slh_dsa_free_key(void *keydata)
65
0
{
66
0
    ossl_slh_dsa_key_free((SLH_DSA_KEY *)keydata);
67
0
}
68
69
static void *slh_dsa_dup_key(const void *keydata_from, int selection)
70
0
{
71
0
    if (ossl_prov_is_running())
72
0
        return ossl_slh_dsa_key_dup(keydata_from, selection);
73
0
    return NULL;
74
0
}
75
76
static int slh_dsa_has(const void *keydata, int selection)
77
0
{
78
0
    const SLH_DSA_KEY *key = keydata;
79
80
0
    if (!ossl_prov_is_running() || key == NULL)
81
0
        return 0;
82
0
    if ((selection & SLH_DSA_POSSIBLE_SELECTIONS) == 0)
83
0
        return 1; /* the selection is not missing */
84
85
0
    return ossl_slh_dsa_key_has(key, selection);
86
0
}
87
88
static int slh_dsa_match(const void *keydata1, const void *keydata2, int selection)
89
0
{
90
0
    const SLH_DSA_KEY *key1 = keydata1;
91
0
    const SLH_DSA_KEY *key2 = keydata2;
92
93
0
    if (!ossl_prov_is_running())
94
0
        return 0;
95
0
    if (key1 == NULL || key2 == NULL)
96
0
        return 0;
97
0
    return ossl_slh_dsa_key_equal(key1, key2, selection);
98
0
}
99
100
static int slh_dsa_validate(const void *key_data, int selection, int check_type)
101
0
{
102
0
    const SLH_DSA_KEY *key = key_data;
103
104
0
    if (!slh_dsa_has(key, selection))
105
0
        return 0;
106
107
0
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == OSSL_KEYMGMT_SELECT_KEYPAIR)
108
0
        return ossl_slh_dsa_key_pairwise_check(key);
109
0
    return 1;
110
0
}
111
112
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
113
#ifndef slh_dsa_import_list
114
static const OSSL_PARAM slh_dsa_import_list[] = {
115
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0),
116
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0),
117
    OSSL_PARAM_END
118
};
119
#endif
120
121
#ifndef slh_dsa_import_st
122
struct slh_dsa_import_st {
123
    OSSL_PARAM *priv;
124
    OSSL_PARAM *pub;
125
};
126
#endif
127
128
#ifndef slh_dsa_import_decoder
129
static int slh_dsa_import_decoder
130
    (const OSSL_PARAM *p, struct slh_dsa_import_st *r)
131
0
{
132
0
    const char *s;
133
134
0
    memset(r, 0, sizeof(*r));
135
0
    if (p != NULL)
136
0
        for (; (s = p->key) != NULL; p++)
137
0
            switch(s[0]) {
138
0
            default:
139
0
                break;
140
0
            case 'p':
141
0
                switch(s[1]) {
142
0
                default:
143
0
                    break;
144
0
                case 'r':
145
0
                    if (ossl_likely(strcmp("iv", s + 2) == 0)) {
146
                        /* OSSL_PKEY_PARAM_PRIV_KEY */
147
0
                        if (ossl_unlikely(r->priv != NULL)) {
148
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
149
0
                                           "param %s is repeated", s);
150
0
                            return 0;
151
0
                        }
152
0
                        r->priv = (OSSL_PARAM *)p;
153
0
                    }
154
0
                    break;
155
0
                case 'u':
156
0
                    if (ossl_likely(strcmp("b", s + 2) == 0)) {
157
                        /* OSSL_PKEY_PARAM_PUB_KEY */
158
0
                        if (ossl_unlikely(r->pub != NULL)) {
159
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
160
0
                                           "param %s is repeated", s);
161
0
                            return 0;
162
0
                        }
163
0
                        r->pub = (OSSL_PARAM *)p;
164
0
                    }
165
0
                }
166
0
            }
167
0
    return 1;
168
0
}
169
#endif
170
/* End of machine generated */
171
172
static int slh_dsa_import(void *keydata, int selection, const OSSL_PARAM params[])
173
0
{
174
0
    SLH_DSA_KEY *key = keydata;
175
0
    int include_priv;
176
0
    struct slh_dsa_import_st p;
177
178
0
    if (!ossl_prov_is_running()
179
0
            || key == NULL
180
0
            || !slh_dsa_import_decoder(params, &p))
181
0
        return 0;
182
183
0
    if ((selection & SLH_DSA_POSSIBLE_SELECTIONS) == 0)
184
0
        return 0;
185
186
0
    include_priv = ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0);
187
0
    return ossl_slh_dsa_key_fromdata(key, p.pub, p.priv, include_priv);
188
0
}
189
190
static const OSSL_PARAM *slh_dsa_imexport_types(int selection)
191
0
{
192
0
    if ((selection & SLH_DSA_POSSIBLE_SELECTIONS) == 0)
193
0
        return NULL;
194
0
    return slh_dsa_import_list;
195
0
}
196
197
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
198
#ifndef slh_dsa_get_params_list
199
static const OSSL_PARAM slh_dsa_get_params_list[] = {
200
    OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL),
201
    OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL),
202
    OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL),
203
    OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_CATEGORY, NULL),
204
    OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_MANDATORY_DIGEST, NULL, 0),
205
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0),
206
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0),
207
    OSSL_PARAM_END
208
};
209
#endif
210
211
#ifndef slh_dsa_get_params_st
212
struct slh_dsa_get_params_st {
213
    OSSL_PARAM *bits;
214
    OSSL_PARAM *mandgst;
215
    OSSL_PARAM *maxsize;
216
    OSSL_PARAM *priv;
217
    OSSL_PARAM *pub;
218
    OSSL_PARAM *secbits;
219
    OSSL_PARAM *seccat;
220
};
221
#endif
222
223
#ifndef slh_dsa_get_params_decoder
224
static int slh_dsa_get_params_decoder
225
    (const OSSL_PARAM *p, struct slh_dsa_get_params_st *r)
226
0
{
227
0
    const char *s;
228
229
0
    memset(r, 0, sizeof(*r));
230
0
    if (p != NULL)
231
0
        for (; (s = p->key) != NULL; p++)
232
0
            switch(s[0]) {
233
0
            default:
234
0
                break;
235
0
            case 'b':
236
0
                if (ossl_likely(strcmp("its", s + 1) == 0)) {
237
                    /* OSSL_PKEY_PARAM_BITS */
238
0
                    if (ossl_unlikely(r->bits != NULL)) {
239
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
240
0
                                       "param %s is repeated", s);
241
0
                        return 0;
242
0
                    }
243
0
                    r->bits = (OSSL_PARAM *)p;
244
0
                }
245
0
                break;
246
0
            case 'm':
247
0
                switch(s[1]) {
248
0
                default:
249
0
                    break;
250
0
                case 'a':
251
0
                    switch(s[2]) {
252
0
                    default:
253
0
                        break;
254
0
                    case 'n':
255
0
                        if (ossl_likely(strcmp("datory-digest", s + 3) == 0)) {
256
                            /* OSSL_PKEY_PARAM_MANDATORY_DIGEST */
257
0
                            if (ossl_unlikely(r->mandgst != NULL)) {
258
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
259
0
                                               "param %s is repeated", s);
260
0
                                return 0;
261
0
                            }
262
0
                            r->mandgst = (OSSL_PARAM *)p;
263
0
                        }
264
0
                        break;
265
0
                    case 'x':
266
0
                        if (ossl_likely(strcmp("-size", s + 3) == 0)) {
267
                            /* OSSL_PKEY_PARAM_MAX_SIZE */
268
0
                            if (ossl_unlikely(r->maxsize != NULL)) {
269
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
270
0
                                               "param %s is repeated", s);
271
0
                                return 0;
272
0
                            }
273
0
                            r->maxsize = (OSSL_PARAM *)p;
274
0
                        }
275
0
                    }
276
0
                }
277
0
                break;
278
0
            case 'p':
279
0
                switch(s[1]) {
280
0
                default:
281
0
                    break;
282
0
                case 'r':
283
0
                    if (ossl_likely(strcmp("iv", s + 2) == 0)) {
284
                        /* OSSL_PKEY_PARAM_PRIV_KEY */
285
0
                        if (ossl_unlikely(r->priv != NULL)) {
286
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
287
0
                                           "param %s is repeated", s);
288
0
                            return 0;
289
0
                        }
290
0
                        r->priv = (OSSL_PARAM *)p;
291
0
                    }
292
0
                    break;
293
0
                case 'u':
294
0
                    if (ossl_likely(strcmp("b", s + 2) == 0)) {
295
                        /* OSSL_PKEY_PARAM_PUB_KEY */
296
0
                        if (ossl_unlikely(r->pub != NULL)) {
297
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
298
0
                                           "param %s is repeated", s);
299
0
                            return 0;
300
0
                        }
301
0
                        r->pub = (OSSL_PARAM *)p;
302
0
                    }
303
0
                }
304
0
                break;
305
0
            case 's':
306
0
                switch(s[1]) {
307
0
                default:
308
0
                    break;
309
0
                case 'e':
310
0
                    switch(s[2]) {
311
0
                    default:
312
0
                        break;
313
0
                    case 'c':
314
0
                        switch(s[3]) {
315
0
                        default:
316
0
                            break;
317
0
                        case 'u':
318
0
                            switch(s[4]) {
319
0
                            default:
320
0
                                break;
321
0
                            case 'r':
322
0
                                switch(s[5]) {
323
0
                                default:
324
0
                                    break;
325
0
                                case 'i':
326
0
                                    switch(s[6]) {
327
0
                                    default:
328
0
                                        break;
329
0
                                    case 't':
330
0
                                        switch(s[7]) {
331
0
                                        default:
332
0
                                            break;
333
0
                                        case 'y':
334
0
                                            switch(s[8]) {
335
0
                                            default:
336
0
                                                break;
337
0
                                            case '-':
338
0
                                                switch(s[9]) {
339
0
                                                default:
340
0
                                                    break;
341
0
                                                case 'b':
342
0
                                                    if (ossl_likely(strcmp("its", s + 10) == 0)) {
343
                                                        /* OSSL_PKEY_PARAM_SECURITY_BITS */
344
0
                                                        if (ossl_unlikely(r->secbits != NULL)) {
345
0
                                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
346
0
                                                                           "param %s is repeated", s);
347
0
                                                            return 0;
348
0
                                                        }
349
0
                                                        r->secbits = (OSSL_PARAM *)p;
350
0
                                                    }
351
0
                                                    break;
352
0
                                                case 'c':
353
0
                                                    if (ossl_likely(strcmp("ategory", s + 10) == 0)) {
354
                                                        /* OSSL_PKEY_PARAM_SECURITY_CATEGORY */
355
0
                                                        if (ossl_unlikely(r->seccat != NULL)) {
356
0
                                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
357
0
                                                                           "param %s is repeated", s);
358
0
                                                            return 0;
359
0
                                                        }
360
0
                                                        r->seccat = (OSSL_PARAM *)p;
361
0
                                                    }
362
0
                                                }
363
0
                                            }
364
0
                                        }
365
0
                                    }
366
0
                                }
367
0
                            }
368
0
                        }
369
0
                    }
370
0
                }
371
0
            }
372
0
    return 1;
373
0
}
374
#endif
375
/* End of machine generated */
376
377
static const OSSL_PARAM *slh_dsa_gettable_params(void *provctx)
378
0
{
379
0
    return slh_dsa_get_params_list;
380
0
}
381
382
static int key_to_params(SLH_DSA_KEY *key, OSSL_PARAM_BLD *tmpl,
383
                         int selection)
384
0
{
385
    /* Error if there is no key or public key */
386
0
    if (key == NULL || ossl_slh_dsa_key_get_pub(key) == NULL)
387
0
        return 0;
388
389
0
    if (((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
390
0
        && ossl_slh_dsa_key_get_priv(key) != NULL)
391
0
        if (ossl_param_build_set_octet_string(tmpl, NULL,
392
0
                                              OSSL_PKEY_PARAM_PRIV_KEY,
393
0
                                              ossl_slh_dsa_key_get_priv(key),
394
0
                                              ossl_slh_dsa_key_get_priv_len(key)) != 1)
395
0
            return 0;
396
397
0
    if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) == 0)
398
0
        return 1;
399
400
0
    return ossl_param_build_set_octet_string(tmpl, NULL,
401
0
                                             OSSL_PKEY_PARAM_PUB_KEY,
402
0
                                             ossl_slh_dsa_key_get_pub(key),
403
0
                                             ossl_slh_dsa_key_get_pub_len(key));
404
0
}
405
406
static int slh_dsa_get_params(void *keydata, OSSL_PARAM params[])
407
0
{
408
0
    SLH_DSA_KEY *key = keydata;
409
0
    struct slh_dsa_get_params_st p;
410
0
    const uint8_t *pub, *priv;
411
412
0
    if (key == NULL || !slh_dsa_get_params_decoder(params, &p))
413
0
        return 0;
414
415
0
    if (p.bits != NULL
416
0
            && !OSSL_PARAM_set_size_t(p.bits, 8 * ossl_slh_dsa_key_get_pub_len(key)))
417
0
        return 0;
418
0
    if (p.secbits != NULL
419
0
            && !OSSL_PARAM_set_size_t(p.secbits, 8 * ossl_slh_dsa_key_get_n(key)))
420
0
        return 0;
421
0
    if (p.maxsize != NULL
422
0
            && !OSSL_PARAM_set_size_t(p.maxsize, ossl_slh_dsa_key_get_sig_len(key)))
423
0
        return 0;
424
0
    if (p.seccat != NULL
425
0
            && !OSSL_PARAM_set_int(p.seccat, ossl_slh_dsa_key_get_security_category(key)))
426
0
        return 0;
427
428
0
    priv = ossl_slh_dsa_key_get_priv(key);
429
0
    if (priv != NULL) {
430
        /* Note: ossl_slh_dsa_key_get_priv_len() includes the public key */
431
0
        if (p.priv != NULL
432
0
            && !OSSL_PARAM_set_octet_string(p.priv, priv,
433
0
                                            ossl_slh_dsa_key_get_priv_len(key)))
434
0
            return 0;
435
0
    }
436
0
    pub = ossl_slh_dsa_key_get_pub(key);
437
0
    if (pub != NULL) {
438
0
        if (p.pub != NULL
439
0
            && !OSSL_PARAM_set_octet_string(p.pub, pub,
440
0
                                            ossl_slh_dsa_key_get_pub_len(key)))
441
0
            return 0;
442
0
    }
443
    /*
444
     * This allows apps to use an empty digest, so that the old API
445
     * for digest signing can be used.
446
     */
447
0
    if (p.mandgst != NULL && !OSSL_PARAM_set_utf8_string(p.mandgst, ""))
448
0
        return 0;
449
0
    return 1;
450
0
}
451
452
static int slh_dsa_export(void *keydata, int selection, OSSL_CALLBACK *param_cb,
453
                          void *cbarg)
454
0
{
455
0
    SLH_DSA_KEY *key = keydata;
456
0
    OSSL_PARAM_BLD *tmpl;
457
0
    OSSL_PARAM *params = NULL;
458
0
    int ret = 0;
459
460
0
    if (!ossl_prov_is_running() || key == NULL)
461
0
        return 0;
462
463
0
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) == 0)
464
0
        return 0;
465
466
0
    tmpl = OSSL_PARAM_BLD_new();
467
0
    if (tmpl == NULL)
468
0
        return 0;
469
470
0
    if (!key_to_params(key, tmpl, selection))
471
0
        goto err;
472
473
0
    params = OSSL_PARAM_BLD_to_param(tmpl);
474
0
    if (params == NULL)
475
0
        goto err;
476
477
0
    ret = param_cb(params, cbarg);
478
0
    OSSL_PARAM_free(params);
479
0
err:
480
0
    OSSL_PARAM_BLD_free(tmpl);
481
0
    return ret;
482
0
}
483
484
static void *slh_dsa_load(const void *reference, size_t reference_sz)
485
0
{
486
0
    SLH_DSA_KEY *key = NULL;
487
488
0
    if (ossl_prov_is_running() && reference_sz == sizeof(key)) {
489
        /* The contents of the reference is the address to our object */
490
0
        key = *(SLH_DSA_KEY **)reference;
491
        /* We grabbed, so we detach it */
492
0
        *(SLH_DSA_KEY **)reference = NULL;
493
0
        return key;
494
0
    }
495
0
    return NULL;
496
0
}
497
498
static void *slh_dsa_gen_init(void *provctx, int selection,
499
                              const OSSL_PARAM params[])
500
0
{
501
0
    OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(provctx);
502
0
    struct slh_dsa_gen_ctx *gctx = NULL;
503
504
0
    if (!ossl_prov_is_running())
505
0
        return NULL;
506
507
0
    if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) {
508
0
        gctx->libctx = libctx;
509
0
        if (!slh_dsa_gen_set_params(gctx, params)) {
510
0
            OPENSSL_free(gctx);
511
0
            gctx = NULL;
512
0
        }
513
0
    }
514
0
    return gctx;
515
0
}
516
517
#ifdef FIPS_MODULE
518
/*
519
 * Refer to FIPS 140-3 IG 10.3.A Additional Comment 1
520
 * Perform a pairwise test for SLH_DSA by signing and verifying a signature.
521
 */
522
static int slh_dsa_fips140_pairwise_test(const SLH_DSA_KEY *key,
523
                                         SLH_DSA_HASH_CTX *ctx)
524
{
525
    int ret = 0;
526
    OSSL_SELF_TEST *st = NULL;
527
    OSSL_CALLBACK *cb = NULL;
528
    void *cb_arg = NULL;
529
    uint8_t msg[16] = {0};
530
    size_t msg_len = sizeof(msg);
531
    uint8_t *sig = NULL;
532
    size_t sig_len;
533
    OSSL_LIB_CTX *lib_ctx;
534
    int alloc_ctx = 0;
535
536
    /* During self test, it is a waste to do this test */
537
    if (ossl_fips_self_testing())
538
        return 1;
539
540
    if (ctx == NULL) {
541
        ctx = ossl_slh_dsa_hash_ctx_new(key);
542
        if (ctx == NULL)
543
            return 0;
544
        alloc_ctx = 1;
545
    }
546
    lib_ctx = ossl_slh_dsa_key_get0_libctx(key);
547
548
    OSSL_SELF_TEST_get_callback(lib_ctx, &cb, &cb_arg);
549
    st = OSSL_SELF_TEST_new(cb, cb_arg);
550
    if (st == NULL)
551
        goto err;
552
553
    OSSL_SELF_TEST_onbegin(st, OSSL_SELF_TEST_TYPE_PCT,
554
                           OSSL_SELF_TEST_DESC_PCT_SLH_DSA);
555
556
    sig_len = ossl_slh_dsa_key_get_sig_len(key);
557
    sig = OPENSSL_malloc(sig_len);
558
    if (sig == NULL)
559
        goto err;
560
561
    if (ossl_slh_dsa_sign(ctx, msg, msg_len, NULL, 0, NULL, 0,
562
                          sig, &sig_len, sig_len) != 1)
563
        goto err;
564
565
    OSSL_SELF_TEST_oncorrupt_byte(st, sig);
566
567
    if (ossl_slh_dsa_verify(ctx, msg, msg_len, NULL, 0, 0, sig, sig_len) != 1)
568
        goto err;
569
570
    ret = 1;
571
err:
572
    if (alloc_ctx)
573
        ossl_slh_dsa_hash_ctx_free(ctx);
574
    OPENSSL_free(sig);
575
    OSSL_SELF_TEST_onend(st, ret);
576
    OSSL_SELF_TEST_free(st);
577
    return ret;
578
}
579
#endif /* FIPS_MODULE */
580
581
static void *slh_dsa_gen(void *genctx, const char *alg)
582
0
{
583
0
    struct slh_dsa_gen_ctx *gctx = genctx;
584
0
    SLH_DSA_KEY *key = NULL;
585
0
    SLH_DSA_HASH_CTX *ctx = NULL;
586
587
0
    if (!ossl_prov_is_running())
588
0
        return NULL;
589
0
    key = ossl_slh_dsa_key_new(gctx->libctx, gctx->propq, alg);
590
0
    if (key == NULL)
591
0
        return NULL;
592
0
    ctx = ossl_slh_dsa_hash_ctx_new(key);
593
0
    if (ctx == NULL)
594
0
        goto err;
595
0
    if (!ossl_slh_dsa_generate_key(ctx, key, gctx->libctx,
596
0
                                   gctx->entropy, gctx->entropy_len))
597
0
        goto err;
598
#ifdef FIPS_MODULE
599
    if (!slh_dsa_fips140_pairwise_test(key, ctx)) {
600
        ossl_set_error_state(OSSL_SELF_TEST_TYPE_PCT);
601
        goto err;
602
    }
603
#endif /* FIPS_MODULE */
604
0
    ossl_slh_dsa_hash_ctx_free(ctx);
605
0
    return key;
606
0
 err:
607
0
    ossl_slh_dsa_hash_ctx_free(ctx);
608
0
    ossl_slh_dsa_key_free(key);
609
0
    return NULL;
610
0
}
611
612
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
613
#ifndef slh_dsa_gen_set_params_list
614
static const OSSL_PARAM slh_dsa_gen_set_params_list[] = {
615
    OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0),
616
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_SLH_DSA_SEED, NULL, 0),
617
    OSSL_PARAM_END
618
};
619
#endif
620
621
#ifndef slh_dsa_gen_set_params_st
622
struct slh_dsa_gen_set_params_st {
623
    OSSL_PARAM *propq;
624
    OSSL_PARAM *seed;
625
};
626
#endif
627
628
#ifndef slh_dsa_gen_set_params_decoder
629
static int slh_dsa_gen_set_params_decoder
630
    (const OSSL_PARAM *p, struct slh_dsa_gen_set_params_st *r)
631
0
{
632
0
    const char *s;
633
634
0
    memset(r, 0, sizeof(*r));
635
0
    if (p != NULL)
636
0
        for (; (s = p->key) != NULL; p++)
637
0
            switch(s[0]) {
638
0
            default:
639
0
                break;
640
0
            case 'p':
641
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
642
                    /* OSSL_PKEY_PARAM_PROPERTIES */
643
0
                    if (ossl_unlikely(r->propq != NULL)) {
644
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
645
0
                                       "param %s is repeated", s);
646
0
                        return 0;
647
0
                    }
648
0
                    r->propq = (OSSL_PARAM *)p;
649
0
                }
650
0
                break;
651
0
            case 's':
652
0
                if (ossl_likely(strcmp("eed", s + 1) == 0)) {
653
                    /* OSSL_PKEY_PARAM_SLH_DSA_SEED */
654
0
                    if (ossl_unlikely(r->seed != NULL)) {
655
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
656
0
                                       "param %s is repeated", s);
657
0
                        return 0;
658
0
                    }
659
0
                    r->seed = (OSSL_PARAM *)p;
660
0
                }
661
0
            }
662
0
    return 1;
663
0
}
664
#endif
665
/* End of machine generated */
666
667
static int slh_dsa_gen_set_params(void *genctx, const OSSL_PARAM params[])
668
0
{
669
0
    struct slh_dsa_gen_ctx *gctx = genctx;
670
0
    struct slh_dsa_gen_set_params_st p;
671
672
0
    if (gctx == NULL || !slh_dsa_gen_set_params_decoder(params, &p))
673
0
        return 0;
674
675
0
    if (p.seed != NULL) {
676
0
        void *vp = gctx->entropy;
677
0
        size_t len = sizeof(gctx->entropy);
678
679
0
        if (!OSSL_PARAM_get_octet_string(p.seed, &vp, len, &(gctx->entropy_len))) {
680
0
            gctx->entropy_len = 0;
681
0
            return 0;
682
0
        }
683
0
    }
684
685
0
    if (p.propq != NULL) {
686
0
        if (p.propq->data_type != OSSL_PARAM_UTF8_STRING)
687
0
            return 0;
688
0
        OPENSSL_free(gctx->propq);
689
0
        gctx->propq = OPENSSL_strdup(p.propq->data);
690
0
        if (gctx->propq == NULL)
691
0
            return 0;
692
0
    }
693
0
    return 1;
694
0
}
695
696
static const OSSL_PARAM *slh_dsa_gen_settable_params(ossl_unused void *genctx,
697
                                                     ossl_unused void *provctx)
698
0
{
699
0
    return slh_dsa_gen_set_params_list;
700
0
}
701
702
static void slh_dsa_gen_cleanup(void *genctx)
703
0
{
704
0
    struct slh_dsa_gen_ctx *gctx = genctx;
705
706
0
    if (gctx == NULL)
707
0
        return;
708
709
0
    OPENSSL_cleanse(gctx->entropy, gctx->entropy_len);
710
0
    OPENSSL_free(gctx->propq);
711
0
    OPENSSL_free(gctx);
712
0
}
713
714
#define MAKE_KEYMGMT_FUNCTIONS(alg, fn)                                        \
715
    static OSSL_FUNC_keymgmt_new_fn slh_dsa_##fn##_new_key;                    \
716
    static OSSL_FUNC_keymgmt_gen_fn slh_dsa_##fn##_gen;                        \
717
    static void *slh_dsa_##fn##_new_key(void *provctx)                         \
718
0
    {                                                                          \
719
0
        return slh_dsa_new_key(provctx, alg);                                  \
720
0
    }                                                                          \
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_128s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_128f_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_192s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_192f_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_256s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_256f_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_128s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_128f_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_192s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_192f_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_256s_new_key
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_256f_new_key
721
    static void *slh_dsa_##fn##_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg)\
722
0
    {                                                                          \
723
0
        return slh_dsa_gen(genctx, alg);                                       \
724
0
    }                                                                          \
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_128s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_128f_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_192s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_192f_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_256s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_sha2_256f_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_128s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_128f_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_192s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_192f_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_256s_gen
Unexecuted instantiation: slh_dsa_kmgmt.c:slh_dsa_shake_256f_gen
725
    const OSSL_DISPATCH ossl_slh_dsa_##fn##_keymgmt_functions[] = {            \
726
        { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))slh_dsa_##fn##_new_key },     \
727
        { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))slh_dsa_free_key },          \
728
        { OSSL_FUNC_KEYMGMT_DUP, (void (*)(void))slh_dsa_dup_key },            \
729
        { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))slh_dsa_has },                \
730
        { OSSL_FUNC_KEYMGMT_MATCH, (void (*)(void))slh_dsa_match },            \
731
        { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))slh_dsa_import },          \
732
        { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, (void (*)(void))slh_dsa_imexport_types },\
733
        { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))slh_dsa_export },          \
734
        { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, (void (*)(void))slh_dsa_imexport_types },\
735
        { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))slh_dsa_load },              \
736
        { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))slh_dsa_get_params }, \
737
        { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))slh_dsa_gettable_params },\
738
        { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))slh_dsa_validate },      \
739
        { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))slh_dsa_gen_init },      \
740
        { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))slh_dsa_##fn##_gen },         \
741
        { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))slh_dsa_gen_cleanup },\
742
        { OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS,                                    \
743
          (void (*)(void))slh_dsa_gen_set_params },                            \
744
        { OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS,                               \
745
          (void (*)(void))slh_dsa_gen_settable_params },                       \
746
        OSSL_DISPATCH_END                                                      \
747
    }
748
749
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-128s", sha2_128s);
750
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-128f", sha2_128f);
751
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-192s", sha2_192s);
752
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-192f", sha2_192f);
753
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-256s", sha2_256s);
754
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHA2-256f", sha2_256f);
755
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-128s", shake_128s);
756
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-128f", shake_128f);
757
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-192s", shake_192s);
758
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-192f", shake_192f);
759
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-256s", shake_256s);
760
MAKE_KEYMGMT_FUNCTIONS("SLH-DSA-SHAKE-256f", shake_256f);