Coverage Report

Created: 2023-06-08 06:41

/src/openssl111/crypto/dsa/dsa_lib.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <stdio.h>
11
#include "internal/cryptlib.h"
12
#include "internal/refcount.h"
13
#include <openssl/bn.h>
14
#include "dsa_local.h"
15
#include <openssl/asn1.h>
16
#include <openssl/engine.h>
17
#include <openssl/dh.h>
18
19
DSA *DSA_new(void)
20
33.8k
{
21
33.8k
    return DSA_new_method(NULL);
22
33.8k
}
23
24
int DSA_set_method(DSA *dsa, const DSA_METHOD *meth)
25
0
{
26
    /*
27
     * NB: The caller is specifically setting a method, so it's not up to us
28
     * to deal with which ENGINE it comes from.
29
     */
30
0
    const DSA_METHOD *mtmp;
31
0
    mtmp = dsa->meth;
32
0
    if (mtmp->finish)
33
0
        mtmp->finish(dsa);
34
0
#ifndef OPENSSL_NO_ENGINE
35
0
    ENGINE_finish(dsa->engine);
36
0
    dsa->engine = NULL;
37
0
#endif
38
0
    dsa->meth = meth;
39
0
    if (meth->init)
40
0
        meth->init(dsa);
41
0
    return 1;
42
0
}
43
44
const DSA_METHOD *DSA_get_method(DSA *d)
45
0
{
46
0
    return d->meth;
47
0
}
48
49
DSA *DSA_new_method(ENGINE *engine)
50
33.8k
{
51
33.8k
    DSA *ret = OPENSSL_zalloc(sizeof(*ret));
52
53
33.8k
    if (ret == NULL) {
54
0
        DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
55
0
        return NULL;
56
0
    }
57
58
33.8k
    ret->references = 1;
59
33.8k
    ret->lock = CRYPTO_THREAD_lock_new();
60
33.8k
    if (ret->lock == NULL) {
61
0
        DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
62
0
        OPENSSL_free(ret);
63
0
        return NULL;
64
0
    }
65
66
33.8k
    ret->meth = DSA_get_default_method();
67
33.8k
#ifndef OPENSSL_NO_ENGINE
68
33.8k
    ret->flags = ret->meth->flags & ~DSA_FLAG_NON_FIPS_ALLOW; /* early default init */
69
33.8k
    if (engine) {
70
0
        if (!ENGINE_init(engine)) {
71
0
            DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_ENGINE_LIB);
72
0
            goto err;
73
0
        }
74
0
        ret->engine = engine;
75
0
    } else
76
33.8k
        ret->engine = ENGINE_get_default_DSA();
77
33.8k
    if (ret->engine) {
78
0
        ret->meth = ENGINE_get_DSA(ret->engine);
79
0
        if (ret->meth == NULL) {
80
0
            DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_ENGINE_LIB);
81
0
            goto err;
82
0
        }
83
0
    }
84
33.8k
#endif
85
86
33.8k
    ret->flags = ret->meth->flags & ~DSA_FLAG_NON_FIPS_ALLOW;
87
88
33.8k
    if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_DSA, ret, &ret->ex_data))
89
0
        goto err;
90
91
33.8k
    if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
92
0
        DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_INIT_FAIL);
93
0
        goto err;
94
0
    }
95
96
33.8k
    return ret;
97
98
0
 err:
99
0
    DSA_free(ret);
100
0
    return NULL;
101
33.8k
}
102
103
void DSA_free(DSA *r)
104
40.2k
{
105
40.2k
    int i;
106
107
40.2k
    if (r == NULL)
108
6.27k
        return;
109
110
33.9k
    CRYPTO_DOWN_REF(&r->references, &i, r->lock);
111
33.9k
    REF_PRINT_COUNT("DSA", r);
112
33.9k
    if (i > 0)
113
103
        return;
114
33.8k
    REF_ASSERT_ISNT(i < 0);
115
116
33.8k
    if (r->meth != NULL && r->meth->finish != NULL)
117
33.8k
        r->meth->finish(r);
118
33.8k
#ifndef OPENSSL_NO_ENGINE
119
33.8k
    ENGINE_finish(r->engine);
120
33.8k
#endif
121
122
33.8k
    CRYPTO_free_ex_data(CRYPTO_EX_INDEX_DSA, r, &r->ex_data);
123
124
33.8k
    CRYPTO_THREAD_lock_free(r->lock);
125
126
33.8k
    BN_clear_free(r->p);
127
33.8k
    BN_clear_free(r->q);
128
33.8k
    BN_clear_free(r->g);
129
33.8k
    BN_clear_free(r->pub_key);
130
33.8k
    BN_clear_free(r->priv_key);
131
33.8k
    OPENSSL_free(r);
132
33.8k
}
133
134
int DSA_up_ref(DSA *r)
135
103
{
136
103
    int i;
137
138
103
    if (CRYPTO_UP_REF(&r->references, &i, r->lock) <= 0)
139
0
        return 0;
140
141
103
    REF_PRINT_COUNT("DSA", r);
142
103
    REF_ASSERT_ISNT(i < 2);
143
103
    return ((i > 1) ? 1 : 0);
144
103
}
145
146
int DSA_size(const DSA *r)
147
0
{
148
0
    int ret, i;
149
0
    ASN1_INTEGER bs;
150
0
    unsigned char buf[4];       /* 4 bytes looks really small. However,
151
                                 * i2d_ASN1_INTEGER() will not look beyond
152
                                 * the first byte, as long as the second
153
                                 * parameter is NULL. */
154
155
0
    i = BN_num_bits(r->q);
156
0
    bs.length = (i + 7) / 8;
157
0
    bs.data = buf;
158
0
    bs.type = V_ASN1_INTEGER;
159
    /* If the top bit is set the asn1 encoding is 1 larger. */
160
0
    buf[0] = 0xff;
161
162
0
    i = i2d_ASN1_INTEGER(&bs, NULL);
163
0
    i += i;                     /* r and s */
164
0
    ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE);
165
0
    return ret;
166
0
}
167
168
int DSA_set_ex_data(DSA *d, int idx, void *arg)
169
0
{
170
0
    return CRYPTO_set_ex_data(&d->ex_data, idx, arg);
171
0
}
172
173
void *DSA_get_ex_data(DSA *d, int idx)
174
0
{
175
0
    return CRYPTO_get_ex_data(&d->ex_data, idx);
176
0
}
177
178
int DSA_security_bits(const DSA *d)
179
0
{
180
0
    if (d->p && d->q)
181
0
        return BN_security_bits(BN_num_bits(d->p), BN_num_bits(d->q));
182
0
    return -1;
183
0
}
184
185
#ifndef OPENSSL_NO_DH
186
DH *DSA_dup_DH(const DSA *r)
187
0
{
188
    /*
189
     * DSA has p, q, g, optional pub_key, optional priv_key. DH has p,
190
     * optional length, g, optional pub_key, optional priv_key, optional q.
191
     */
192
193
0
    DH *ret = NULL;
194
0
    BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub_key = NULL, *priv_key = NULL;
195
196
0
    if (r == NULL)
197
0
        goto err;
198
0
    ret = DH_new();
199
0
    if (ret == NULL)
200
0
        goto err;
201
0
    if (r->p != NULL || r->g != NULL || r->q != NULL) {
202
0
        if (r->p == NULL || r->g == NULL || r->q == NULL) {
203
            /* Shouldn't happen */
204
0
            goto err;
205
0
        }
206
0
        p = BN_dup(r->p);
207
0
        g = BN_dup(r->g);
208
0
        q = BN_dup(r->q);
209
0
        if (p == NULL || g == NULL || q == NULL || !DH_set0_pqg(ret, p, q, g))
210
0
            goto err;
211
0
        p = g = q = NULL;
212
0
    }
213
214
0
    if (r->pub_key != NULL) {
215
0
        pub_key = BN_dup(r->pub_key);
216
0
        if (pub_key == NULL)
217
0
            goto err;
218
0
        if (r->priv_key != NULL) {
219
0
            priv_key = BN_dup(r->priv_key);
220
0
            if (priv_key == NULL)
221
0
                goto err;
222
0
        }
223
0
        if (!DH_set0_key(ret, pub_key, priv_key))
224
0
            goto err;
225
0
    } else if (r->priv_key != NULL) {
226
        /* Shouldn't happen */
227
0
        goto err;
228
0
    }
229
230
0
    return ret;
231
232
0
 err:
233
0
    BN_free(p);
234
0
    BN_free(g);
235
0
    BN_free(q);
236
0
    BN_free(pub_key);
237
0
    BN_free(priv_key);
238
0
    DH_free(ret);
239
0
    return NULL;
240
0
}
241
#endif
242
243
void DSA_get0_pqg(const DSA *d,
244
                  const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
245
0
{
246
0
    if (p != NULL)
247
0
        *p = d->p;
248
0
    if (q != NULL)
249
0
        *q = d->q;
250
0
    if (g != NULL)
251
0
        *g = d->g;
252
0
}
253
254
int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g)
255
0
{
256
    /* If the fields p, q and g in d are NULL, the corresponding input
257
     * parameters MUST be non-NULL.
258
     */
259
0
    if ((d->p == NULL && p == NULL)
260
0
        || (d->q == NULL && q == NULL)
261
0
        || (d->g == NULL && g == NULL))
262
0
        return 0;
263
264
0
    if (p != NULL) {
265
0
        BN_free(d->p);
266
0
        d->p = p;
267
0
    }
268
0
    if (q != NULL) {
269
0
        BN_free(d->q);
270
0
        d->q = q;
271
0
    }
272
0
    if (g != NULL) {
273
0
        BN_free(d->g);
274
0
        d->g = g;
275
0
    }
276
277
0
    return 1;
278
0
}
279
280
void DSA_get0_key(const DSA *d,
281
                  const BIGNUM **pub_key, const BIGNUM **priv_key)
282
0
{
283
0
    if (pub_key != NULL)
284
0
        *pub_key = d->pub_key;
285
0
    if (priv_key != NULL)
286
0
        *priv_key = d->priv_key;
287
0
}
288
289
int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key)
290
0
{
291
    /* If the field pub_key in d is NULL, the corresponding input
292
     * parameters MUST be non-NULL.  The priv_key field may
293
     * be left NULL.
294
     */
295
0
    if (d->pub_key == NULL && pub_key == NULL)
296
0
        return 0;
297
298
0
    if (pub_key != NULL) {
299
0
        BN_free(d->pub_key);
300
0
        d->pub_key = pub_key;
301
0
    }
302
0
    if (priv_key != NULL) {
303
0
        BN_free(d->priv_key);
304
0
        d->priv_key = priv_key;
305
0
    }
306
307
0
    return 1;
308
0
}
309
310
const BIGNUM *DSA_get0_p(const DSA *d)
311
0
{
312
0
    return d->p;
313
0
}
314
315
const BIGNUM *DSA_get0_q(const DSA *d)
316
0
{
317
0
    return d->q;
318
0
}
319
320
const BIGNUM *DSA_get0_g(const DSA *d)
321
0
{
322
0
    return d->g;
323
0
}
324
325
const BIGNUM *DSA_get0_pub_key(const DSA *d)
326
0
{
327
0
    return d->pub_key;
328
0
}
329
330
const BIGNUM *DSA_get0_priv_key(const DSA *d)
331
0
{
332
0
    return d->priv_key;
333
0
}
334
335
void DSA_clear_flags(DSA *d, int flags)
336
0
{
337
0
    d->flags &= ~flags;
338
0
}
339
340
int DSA_test_flags(const DSA *d, int flags)
341
0
{
342
0
    return d->flags & flags;
343
0
}
344
345
void DSA_set_flags(DSA *d, int flags)
346
0
{
347
0
    d->flags |= flags;
348
0
}
349
350
ENGINE *DSA_get0_engine(DSA *d)
351
0
{
352
0
    return d->engine;
353
0
}
354
355
int DSA_bits(const DSA *dsa)
356
0
{
357
0
    return BN_num_bits(dsa->p);
358
0
}