/src/openssl111/crypto/ec/ecx_meth.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the OpenSSL license (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <stdio.h> |
11 | | #include "internal/cryptlib.h" |
12 | | #include <openssl/x509.h> |
13 | | #include <openssl/ec.h> |
14 | | #include <openssl/rand.h> |
15 | | #include "crypto/asn1.h" |
16 | | #include "crypto/evp.h" |
17 | | #include "ec_local.h" |
18 | | #include "curve448/curve448_local.h" |
19 | | |
20 | 0 | #define X25519_BITS 253 |
21 | 0 | #define X25519_SECURITY_BITS 128 |
22 | | |
23 | 0 | #define ED25519_SIGSIZE 64 |
24 | | |
25 | 0 | #define X448_BITS 448 |
26 | 0 | #define ED448_BITS 456 |
27 | 0 | #define X448_SECURITY_BITS 224 |
28 | | |
29 | 0 | #define ED448_SIGSIZE 114 |
30 | | |
31 | 0 | #define ISX448(id) ((id) == EVP_PKEY_X448) |
32 | 24 | #define IS25519(id) ((id) == EVP_PKEY_X25519 || (id) == EVP_PKEY_ED25519) |
33 | 24 | #define KEYLENID(id) (IS25519(id) ? X25519_KEYLEN \ |
34 | 24 | : ((id) == EVP_PKEY_X448 ? X448_KEYLEN \ |
35 | 9 | : ED448_KEYLEN)) |
36 | 3 | #define KEYLEN(p) KEYLENID((p)->ameth->pkey_id) |
37 | | |
38 | | |
39 | | typedef enum { |
40 | | KEY_OP_PUBLIC, |
41 | | KEY_OP_PRIVATE, |
42 | | KEY_OP_KEYGEN |
43 | | } ecx_key_op_t; |
44 | | |
45 | | /* Setup EVP_PKEY using public, private or generation */ |
46 | | static int ecx_key_op(EVP_PKEY *pkey, int id, const X509_ALGOR *palg, |
47 | | const unsigned char *p, int plen, ecx_key_op_t op) |
48 | 58 | { |
49 | 58 | ECX_KEY *key = NULL; |
50 | 58 | unsigned char *privkey, *pubkey; |
51 | | |
52 | 58 | if (op != KEY_OP_KEYGEN) { |
53 | 58 | if (palg != NULL) { |
54 | 58 | int ptype; |
55 | | |
56 | | /* Algorithm parameters must be absent */ |
57 | 58 | X509_ALGOR_get0(NULL, &ptype, NULL, palg); |
58 | 58 | if (ptype != V_ASN1_UNDEF) { |
59 | 31 | ECerr(EC_F_ECX_KEY_OP, EC_R_INVALID_ENCODING); |
60 | 31 | return 0; |
61 | 31 | } |
62 | 58 | } |
63 | | |
64 | 27 | if (p == NULL || plen != KEYLENID(id)) { |
65 | 21 | ECerr(EC_F_ECX_KEY_OP, EC_R_INVALID_ENCODING); |
66 | 21 | return 0; |
67 | 21 | } |
68 | 27 | } |
69 | | |
70 | 6 | key = OPENSSL_zalloc(sizeof(*key)); |
71 | 6 | if (key == NULL) { |
72 | 0 | ECerr(EC_F_ECX_KEY_OP, ERR_R_MALLOC_FAILURE); |
73 | 0 | return 0; |
74 | 0 | } |
75 | 6 | pubkey = key->pubkey; |
76 | | |
77 | 6 | if (op == KEY_OP_PUBLIC) { |
78 | 6 | memcpy(pubkey, p, plen); |
79 | 6 | } else { |
80 | 0 | privkey = key->privkey = OPENSSL_secure_malloc(KEYLENID(id)); |
81 | 0 | if (privkey == NULL) { |
82 | 0 | ECerr(EC_F_ECX_KEY_OP, ERR_R_MALLOC_FAILURE); |
83 | 0 | goto err; |
84 | 0 | } |
85 | 0 | if (op == KEY_OP_KEYGEN) { |
86 | 0 | if (RAND_priv_bytes(privkey, KEYLENID(id)) <= 0) { |
87 | 0 | OPENSSL_secure_free(privkey); |
88 | 0 | key->privkey = NULL; |
89 | 0 | goto err; |
90 | 0 | } |
91 | 0 | if (id == EVP_PKEY_X25519) { |
92 | 0 | privkey[0] &= 248; |
93 | 0 | privkey[X25519_KEYLEN - 1] &= 127; |
94 | 0 | privkey[X25519_KEYLEN - 1] |= 64; |
95 | 0 | } else if (id == EVP_PKEY_X448) { |
96 | 0 | privkey[0] &= 252; |
97 | 0 | privkey[X448_KEYLEN - 1] |= 128; |
98 | 0 | } |
99 | 0 | } else { |
100 | 0 | memcpy(privkey, p, KEYLENID(id)); |
101 | 0 | } |
102 | 0 | switch (id) { |
103 | 0 | case EVP_PKEY_X25519: |
104 | 0 | X25519_public_from_private(pubkey, privkey); |
105 | 0 | break; |
106 | 0 | case EVP_PKEY_ED25519: |
107 | 0 | ED25519_public_from_private(pubkey, privkey); |
108 | 0 | break; |
109 | 0 | case EVP_PKEY_X448: |
110 | 0 | X448_public_from_private(pubkey, privkey); |
111 | 0 | break; |
112 | 0 | case EVP_PKEY_ED448: |
113 | 0 | ED448_public_from_private(pubkey, privkey); |
114 | 0 | break; |
115 | 0 | } |
116 | 0 | } |
117 | | |
118 | 6 | EVP_PKEY_assign(pkey, id, key); |
119 | 6 | return 1; |
120 | 0 | err: |
121 | 0 | OPENSSL_free(key); |
122 | 0 | return 0; |
123 | 6 | } |
124 | | |
125 | | static int ecx_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) |
126 | 0 | { |
127 | 0 | const ECX_KEY *ecxkey = pkey->pkey.ecx; |
128 | 0 | unsigned char *penc; |
129 | |
|
130 | 0 | if (ecxkey == NULL) { |
131 | 0 | ECerr(EC_F_ECX_PUB_ENCODE, EC_R_INVALID_KEY); |
132 | 0 | return 0; |
133 | 0 | } |
134 | | |
135 | 0 | penc = OPENSSL_memdup(ecxkey->pubkey, KEYLEN(pkey)); |
136 | 0 | if (penc == NULL) { |
137 | 0 | ECerr(EC_F_ECX_PUB_ENCODE, ERR_R_MALLOC_FAILURE); |
138 | 0 | return 0; |
139 | 0 | } |
140 | | |
141 | 0 | if (!X509_PUBKEY_set0_param(pk, OBJ_nid2obj(pkey->ameth->pkey_id), |
142 | 0 | V_ASN1_UNDEF, NULL, penc, KEYLEN(pkey))) { |
143 | 0 | OPENSSL_free(penc); |
144 | 0 | ECerr(EC_F_ECX_PUB_ENCODE, ERR_R_MALLOC_FAILURE); |
145 | 0 | return 0; |
146 | 0 | } |
147 | 0 | return 1; |
148 | 0 | } |
149 | | |
150 | | static int ecx_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) |
151 | 58 | { |
152 | 58 | const unsigned char *p; |
153 | 58 | int pklen; |
154 | 58 | X509_ALGOR *palg; |
155 | | |
156 | 58 | if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) |
157 | 0 | return 0; |
158 | 58 | return ecx_key_op(pkey, pkey->ameth->pkey_id, palg, p, pklen, |
159 | 58 | KEY_OP_PUBLIC); |
160 | 58 | } |
161 | | |
162 | | static int ecx_pub_cmp(const EVP_PKEY *a, const EVP_PKEY *b) |
163 | 0 | { |
164 | 0 | const ECX_KEY *akey = a->pkey.ecx; |
165 | 0 | const ECX_KEY *bkey = b->pkey.ecx; |
166 | |
|
167 | 0 | if (akey == NULL || bkey == NULL) |
168 | 0 | return -2; |
169 | | |
170 | 0 | return CRYPTO_memcmp(akey->pubkey, bkey->pubkey, KEYLEN(a)) == 0; |
171 | 0 | } |
172 | | |
173 | | static int ecx_priv_decode(EVP_PKEY *pkey, const PKCS8_PRIV_KEY_INFO *p8) |
174 | 0 | { |
175 | 0 | const unsigned char *p; |
176 | 0 | int plen; |
177 | 0 | ASN1_OCTET_STRING *oct = NULL; |
178 | 0 | const X509_ALGOR *palg; |
179 | 0 | int rv; |
180 | |
|
181 | 0 | if (!PKCS8_pkey_get0(NULL, &p, &plen, &palg, p8)) |
182 | 0 | return 0; |
183 | | |
184 | 0 | oct = d2i_ASN1_OCTET_STRING(NULL, &p, plen); |
185 | 0 | if (oct == NULL) { |
186 | 0 | p = NULL; |
187 | 0 | plen = 0; |
188 | 0 | } else { |
189 | 0 | p = ASN1_STRING_get0_data(oct); |
190 | 0 | plen = ASN1_STRING_length(oct); |
191 | 0 | } |
192 | |
|
193 | 0 | rv = ecx_key_op(pkey, pkey->ameth->pkey_id, palg, p, plen, KEY_OP_PRIVATE); |
194 | 0 | ASN1_STRING_clear_free(oct); |
195 | 0 | return rv; |
196 | 0 | } |
197 | | |
198 | | static int ecx_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) |
199 | 0 | { |
200 | 0 | const ECX_KEY *ecxkey = pkey->pkey.ecx; |
201 | 0 | ASN1_OCTET_STRING oct; |
202 | 0 | unsigned char *penc = NULL; |
203 | 0 | int penclen; |
204 | |
|
205 | 0 | if (ecxkey == NULL || ecxkey->privkey == NULL) { |
206 | 0 | ECerr(EC_F_ECX_PRIV_ENCODE, EC_R_INVALID_PRIVATE_KEY); |
207 | 0 | return 0; |
208 | 0 | } |
209 | | |
210 | 0 | oct.data = ecxkey->privkey; |
211 | 0 | oct.length = KEYLEN(pkey); |
212 | 0 | oct.flags = 0; |
213 | |
|
214 | 0 | penclen = i2d_ASN1_OCTET_STRING(&oct, &penc); |
215 | 0 | if (penclen < 0) { |
216 | 0 | ECerr(EC_F_ECX_PRIV_ENCODE, ERR_R_MALLOC_FAILURE); |
217 | 0 | return 0; |
218 | 0 | } |
219 | | |
220 | 0 | if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(pkey->ameth->pkey_id), 0, |
221 | 0 | V_ASN1_UNDEF, NULL, penc, penclen)) { |
222 | 0 | OPENSSL_clear_free(penc, penclen); |
223 | 0 | ECerr(EC_F_ECX_PRIV_ENCODE, ERR_R_MALLOC_FAILURE); |
224 | 0 | return 0; |
225 | 0 | } |
226 | | |
227 | 0 | return 1; |
228 | 0 | } |
229 | | |
230 | | static int ecx_size(const EVP_PKEY *pkey) |
231 | 0 | { |
232 | 0 | return KEYLEN(pkey); |
233 | 0 | } |
234 | | |
235 | | static int ecx_bits(const EVP_PKEY *pkey) |
236 | 0 | { |
237 | 0 | if (IS25519(pkey->ameth->pkey_id)) { |
238 | 0 | return X25519_BITS; |
239 | 0 | } else if(ISX448(pkey->ameth->pkey_id)) { |
240 | 0 | return X448_BITS; |
241 | 0 | } else { |
242 | 0 | return ED448_BITS; |
243 | 0 | } |
244 | 0 | } |
245 | | |
246 | | static int ecx_security_bits(const EVP_PKEY *pkey) |
247 | 0 | { |
248 | 0 | if (IS25519(pkey->ameth->pkey_id)) { |
249 | 0 | return X25519_SECURITY_BITS; |
250 | 0 | } else { |
251 | 0 | return X448_SECURITY_BITS; |
252 | 0 | } |
253 | 0 | } |
254 | | |
255 | | static void ecx_free(EVP_PKEY *pkey) |
256 | 58 | { |
257 | 58 | if (pkey->pkey.ecx != NULL) |
258 | 6 | OPENSSL_secure_clear_free(pkey->pkey.ecx->privkey, KEYLEN(pkey)); |
259 | 58 | OPENSSL_free(pkey->pkey.ecx); |
260 | 58 | } |
261 | | |
262 | | /* "parameters" are always equal */ |
263 | | static int ecx_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b) |
264 | 0 | { |
265 | 0 | return 1; |
266 | 0 | } |
267 | | |
268 | | static int ecx_key_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
269 | | ASN1_PCTX *ctx, ecx_key_op_t op) |
270 | 3 | { |
271 | 3 | const ECX_KEY *ecxkey = pkey->pkey.ecx; |
272 | 3 | const char *nm = OBJ_nid2ln(pkey->ameth->pkey_id); |
273 | | |
274 | 3 | if (op == KEY_OP_PRIVATE) { |
275 | 0 | if (ecxkey == NULL || ecxkey->privkey == NULL) { |
276 | 0 | if (BIO_printf(bp, "%*s<INVALID PRIVATE KEY>\n", indent, "") <= 0) |
277 | 0 | return 0; |
278 | 0 | return 1; |
279 | 0 | } |
280 | 0 | if (BIO_printf(bp, "%*s%s Private-Key:\n", indent, "", nm) <= 0) |
281 | 0 | return 0; |
282 | 0 | if (BIO_printf(bp, "%*spriv:\n", indent, "") <= 0) |
283 | 0 | return 0; |
284 | 0 | if (ASN1_buf_print(bp, ecxkey->privkey, KEYLEN(pkey), |
285 | 0 | indent + 4) == 0) |
286 | 0 | return 0; |
287 | 3 | } else { |
288 | 3 | if (ecxkey == NULL) { |
289 | 0 | if (BIO_printf(bp, "%*s<INVALID PUBLIC KEY>\n", indent, "") <= 0) |
290 | 0 | return 0; |
291 | 0 | return 1; |
292 | 0 | } |
293 | 3 | if (BIO_printf(bp, "%*s%s Public-Key:\n", indent, "", nm) <= 0) |
294 | 0 | return 0; |
295 | 3 | } |
296 | 3 | if (BIO_printf(bp, "%*spub:\n", indent, "") <= 0) |
297 | 0 | return 0; |
298 | | |
299 | 3 | if (ASN1_buf_print(bp, ecxkey->pubkey, KEYLEN(pkey), |
300 | 3 | indent + 4) == 0) |
301 | 0 | return 0; |
302 | 3 | return 1; |
303 | 3 | } |
304 | | |
305 | | static int ecx_priv_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
306 | | ASN1_PCTX *ctx) |
307 | 0 | { |
308 | 0 | return ecx_key_print(bp, pkey, indent, ctx, KEY_OP_PRIVATE); |
309 | 0 | } |
310 | | |
311 | | static int ecx_pub_print(BIO *bp, const EVP_PKEY *pkey, int indent, |
312 | | ASN1_PCTX *ctx) |
313 | 3 | { |
314 | 3 | return ecx_key_print(bp, pkey, indent, ctx, KEY_OP_PUBLIC); |
315 | 3 | } |
316 | | |
317 | | static int ecx_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) |
318 | 0 | { |
319 | 0 | switch (op) { |
320 | | |
321 | 0 | case ASN1_PKEY_CTRL_SET1_TLS_ENCPT: |
322 | 0 | return ecx_key_op(pkey, pkey->ameth->pkey_id, NULL, arg2, arg1, |
323 | 0 | KEY_OP_PUBLIC); |
324 | | |
325 | 0 | case ASN1_PKEY_CTRL_GET1_TLS_ENCPT: |
326 | 0 | if (pkey->pkey.ecx != NULL) { |
327 | 0 | unsigned char **ppt = arg2; |
328 | |
|
329 | 0 | *ppt = OPENSSL_memdup(pkey->pkey.ecx->pubkey, KEYLEN(pkey)); |
330 | 0 | if (*ppt != NULL) |
331 | 0 | return KEYLEN(pkey); |
332 | 0 | } |
333 | 0 | return 0; |
334 | | |
335 | 0 | default: |
336 | 0 | return -2; |
337 | |
|
338 | 0 | } |
339 | 0 | } |
340 | | |
341 | | static int ecd_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) |
342 | 0 | { |
343 | 0 | switch (op) { |
344 | 0 | case ASN1_PKEY_CTRL_DEFAULT_MD_NID: |
345 | | /* We currently only support Pure EdDSA which takes no digest */ |
346 | 0 | *(int *)arg2 = NID_undef; |
347 | 0 | return 2; |
348 | | |
349 | 0 | default: |
350 | 0 | return -2; |
351 | |
|
352 | 0 | } |
353 | 0 | } |
354 | | |
355 | | static int ecx_set_priv_key(EVP_PKEY *pkey, const unsigned char *priv, |
356 | | size_t len) |
357 | 0 | { |
358 | 0 | return ecx_key_op(pkey, pkey->ameth->pkey_id, NULL, priv, len, |
359 | 0 | KEY_OP_PRIVATE); |
360 | 0 | } |
361 | | |
362 | | static int ecx_set_pub_key(EVP_PKEY *pkey, const unsigned char *pub, size_t len) |
363 | 0 | { |
364 | 0 | return ecx_key_op(pkey, pkey->ameth->pkey_id, NULL, pub, len, |
365 | 0 | KEY_OP_PUBLIC); |
366 | 0 | } |
367 | | |
368 | | static int ecx_get_priv_key(const EVP_PKEY *pkey, unsigned char *priv, |
369 | | size_t *len) |
370 | 0 | { |
371 | 0 | const ECX_KEY *key = pkey->pkey.ecx; |
372 | |
|
373 | 0 | if (priv == NULL) { |
374 | 0 | *len = KEYLENID(pkey->ameth->pkey_id); |
375 | 0 | return 1; |
376 | 0 | } |
377 | | |
378 | 0 | if (key == NULL |
379 | 0 | || key->privkey == NULL |
380 | 0 | || *len < (size_t)KEYLENID(pkey->ameth->pkey_id)) |
381 | 0 | return 0; |
382 | | |
383 | 0 | *len = KEYLENID(pkey->ameth->pkey_id); |
384 | 0 | memcpy(priv, key->privkey, *len); |
385 | |
|
386 | 0 | return 1; |
387 | 0 | } |
388 | | |
389 | | static int ecx_get_pub_key(const EVP_PKEY *pkey, unsigned char *pub, |
390 | | size_t *len) |
391 | 0 | { |
392 | 0 | const ECX_KEY *key = pkey->pkey.ecx; |
393 | |
|
394 | 0 | if (pub == NULL) { |
395 | 0 | *len = KEYLENID(pkey->ameth->pkey_id); |
396 | 0 | return 1; |
397 | 0 | } |
398 | | |
399 | 0 | if (key == NULL |
400 | 0 | || *len < (size_t)KEYLENID(pkey->ameth->pkey_id)) |
401 | 0 | return 0; |
402 | | |
403 | 0 | *len = KEYLENID(pkey->ameth->pkey_id); |
404 | 0 | memcpy(pub, key->pubkey, *len); |
405 | |
|
406 | 0 | return 1; |
407 | 0 | } |
408 | | |
409 | | const EVP_PKEY_ASN1_METHOD ecx25519_asn1_meth = { |
410 | | EVP_PKEY_X25519, |
411 | | EVP_PKEY_X25519, |
412 | | 0, |
413 | | "X25519", |
414 | | "OpenSSL X25519 algorithm", |
415 | | |
416 | | ecx_pub_decode, |
417 | | ecx_pub_encode, |
418 | | ecx_pub_cmp, |
419 | | ecx_pub_print, |
420 | | |
421 | | ecx_priv_decode, |
422 | | ecx_priv_encode, |
423 | | ecx_priv_print, |
424 | | |
425 | | ecx_size, |
426 | | ecx_bits, |
427 | | ecx_security_bits, |
428 | | |
429 | | 0, 0, 0, 0, |
430 | | ecx_cmp_parameters, |
431 | | 0, 0, |
432 | | |
433 | | ecx_free, |
434 | | ecx_ctrl, |
435 | | NULL, |
436 | | NULL, |
437 | | |
438 | | NULL, |
439 | | NULL, |
440 | | NULL, |
441 | | |
442 | | NULL, |
443 | | NULL, |
444 | | NULL, |
445 | | |
446 | | ecx_set_priv_key, |
447 | | ecx_set_pub_key, |
448 | | ecx_get_priv_key, |
449 | | ecx_get_pub_key, |
450 | | }; |
451 | | |
452 | | const EVP_PKEY_ASN1_METHOD ecx448_asn1_meth = { |
453 | | EVP_PKEY_X448, |
454 | | EVP_PKEY_X448, |
455 | | 0, |
456 | | "X448", |
457 | | "OpenSSL X448 algorithm", |
458 | | |
459 | | ecx_pub_decode, |
460 | | ecx_pub_encode, |
461 | | ecx_pub_cmp, |
462 | | ecx_pub_print, |
463 | | |
464 | | ecx_priv_decode, |
465 | | ecx_priv_encode, |
466 | | ecx_priv_print, |
467 | | |
468 | | ecx_size, |
469 | | ecx_bits, |
470 | | ecx_security_bits, |
471 | | |
472 | | 0, 0, 0, 0, |
473 | | ecx_cmp_parameters, |
474 | | 0, 0, |
475 | | |
476 | | ecx_free, |
477 | | ecx_ctrl, |
478 | | NULL, |
479 | | NULL, |
480 | | |
481 | | NULL, |
482 | | NULL, |
483 | | NULL, |
484 | | |
485 | | NULL, |
486 | | NULL, |
487 | | NULL, |
488 | | |
489 | | ecx_set_priv_key, |
490 | | ecx_set_pub_key, |
491 | | ecx_get_priv_key, |
492 | | ecx_get_pub_key, |
493 | | }; |
494 | | |
495 | | static int ecd_size25519(const EVP_PKEY *pkey) |
496 | 0 | { |
497 | 0 | return ED25519_SIGSIZE; |
498 | 0 | } |
499 | | |
500 | | static int ecd_size448(const EVP_PKEY *pkey) |
501 | 0 | { |
502 | 0 | return ED448_SIGSIZE; |
503 | 0 | } |
504 | | |
505 | | static int ecd_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, |
506 | | X509_ALGOR *sigalg, ASN1_BIT_STRING *str, |
507 | | EVP_PKEY *pkey) |
508 | 0 | { |
509 | 0 | const ASN1_OBJECT *obj; |
510 | 0 | int ptype; |
511 | 0 | int nid; |
512 | | |
513 | | /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ |
514 | 0 | X509_ALGOR_get0(&obj, &ptype, NULL, sigalg); |
515 | 0 | nid = OBJ_obj2nid(obj); |
516 | 0 | if ((nid != NID_ED25519 && nid != NID_ED448) || ptype != V_ASN1_UNDEF) { |
517 | 0 | ECerr(EC_F_ECD_ITEM_VERIFY, EC_R_INVALID_ENCODING); |
518 | 0 | return 0; |
519 | 0 | } |
520 | | |
521 | 0 | if (!EVP_DigestVerifyInit(ctx, NULL, NULL, NULL, pkey)) |
522 | 0 | return 0; |
523 | | |
524 | 0 | return 2; |
525 | 0 | } |
526 | | |
527 | | static int ecd_item_sign25519(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, |
528 | | X509_ALGOR *alg1, X509_ALGOR *alg2, |
529 | | ASN1_BIT_STRING *str) |
530 | 0 | { |
531 | | /* Set algorithms identifiers */ |
532 | 0 | X509_ALGOR_set0(alg1, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL); |
533 | 0 | if (alg2) |
534 | 0 | X509_ALGOR_set0(alg2, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL); |
535 | | /* Algorithm identifiers set: carry on as normal */ |
536 | 0 | return 3; |
537 | 0 | } |
538 | | |
539 | | static int ecd_sig_info_set25519(X509_SIG_INFO *siginf, const X509_ALGOR *alg, |
540 | | const ASN1_STRING *sig) |
541 | 0 | { |
542 | 0 | X509_SIG_INFO_set(siginf, NID_undef, NID_ED25519, X25519_SECURITY_BITS, |
543 | 0 | X509_SIG_INFO_TLS); |
544 | 0 | return 1; |
545 | 0 | } |
546 | | |
547 | | static int ecd_item_sign448(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, |
548 | | X509_ALGOR *alg1, X509_ALGOR *alg2, |
549 | | ASN1_BIT_STRING *str) |
550 | 0 | { |
551 | | /* Set algorithm identifier */ |
552 | 0 | X509_ALGOR_set0(alg1, OBJ_nid2obj(NID_ED448), V_ASN1_UNDEF, NULL); |
553 | 0 | if (alg2 != NULL) |
554 | 0 | X509_ALGOR_set0(alg2, OBJ_nid2obj(NID_ED448), V_ASN1_UNDEF, NULL); |
555 | | /* Algorithm identifier set: carry on as normal */ |
556 | 0 | return 3; |
557 | 0 | } |
558 | | |
559 | | static int ecd_sig_info_set448(X509_SIG_INFO *siginf, const X509_ALGOR *alg, |
560 | | const ASN1_STRING *sig) |
561 | 0 | { |
562 | 0 | X509_SIG_INFO_set(siginf, NID_undef, NID_ED448, X448_SECURITY_BITS, |
563 | 0 | X509_SIG_INFO_TLS); |
564 | 0 | return 1; |
565 | 0 | } |
566 | | |
567 | | |
568 | | const EVP_PKEY_ASN1_METHOD ed25519_asn1_meth = { |
569 | | EVP_PKEY_ED25519, |
570 | | EVP_PKEY_ED25519, |
571 | | 0, |
572 | | "ED25519", |
573 | | "OpenSSL ED25519 algorithm", |
574 | | |
575 | | ecx_pub_decode, |
576 | | ecx_pub_encode, |
577 | | ecx_pub_cmp, |
578 | | ecx_pub_print, |
579 | | |
580 | | ecx_priv_decode, |
581 | | ecx_priv_encode, |
582 | | ecx_priv_print, |
583 | | |
584 | | ecd_size25519, |
585 | | ecx_bits, |
586 | | ecx_security_bits, |
587 | | |
588 | | 0, 0, 0, 0, |
589 | | ecx_cmp_parameters, |
590 | | 0, 0, |
591 | | |
592 | | ecx_free, |
593 | | ecd_ctrl, |
594 | | NULL, |
595 | | NULL, |
596 | | ecd_item_verify, |
597 | | ecd_item_sign25519, |
598 | | ecd_sig_info_set25519, |
599 | | |
600 | | NULL, |
601 | | NULL, |
602 | | NULL, |
603 | | |
604 | | ecx_set_priv_key, |
605 | | ecx_set_pub_key, |
606 | | ecx_get_priv_key, |
607 | | ecx_get_pub_key, |
608 | | }; |
609 | | |
610 | | const EVP_PKEY_ASN1_METHOD ed448_asn1_meth = { |
611 | | EVP_PKEY_ED448, |
612 | | EVP_PKEY_ED448, |
613 | | 0, |
614 | | "ED448", |
615 | | "OpenSSL ED448 algorithm", |
616 | | |
617 | | ecx_pub_decode, |
618 | | ecx_pub_encode, |
619 | | ecx_pub_cmp, |
620 | | ecx_pub_print, |
621 | | |
622 | | ecx_priv_decode, |
623 | | ecx_priv_encode, |
624 | | ecx_priv_print, |
625 | | |
626 | | ecd_size448, |
627 | | ecx_bits, |
628 | | ecx_security_bits, |
629 | | |
630 | | 0, 0, 0, 0, |
631 | | ecx_cmp_parameters, |
632 | | 0, 0, |
633 | | |
634 | | ecx_free, |
635 | | ecd_ctrl, |
636 | | NULL, |
637 | | NULL, |
638 | | ecd_item_verify, |
639 | | ecd_item_sign448, |
640 | | ecd_sig_info_set448, |
641 | | |
642 | | NULL, |
643 | | NULL, |
644 | | NULL, |
645 | | |
646 | | ecx_set_priv_key, |
647 | | ecx_set_pub_key, |
648 | | ecx_get_priv_key, |
649 | | ecx_get_pub_key, |
650 | | }; |
651 | | |
652 | | static int pkey_ecx_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) |
653 | 0 | { |
654 | 0 | return ecx_key_op(pkey, ctx->pmeth->pkey_id, NULL, NULL, 0, KEY_OP_KEYGEN); |
655 | 0 | } |
656 | | |
657 | | static int validate_ecx_derive(EVP_PKEY_CTX *ctx, unsigned char *key, |
658 | | size_t *keylen, |
659 | | const unsigned char **privkey, |
660 | | const unsigned char **pubkey) |
661 | 0 | { |
662 | 0 | const ECX_KEY *ecxkey, *peerkey; |
663 | |
|
664 | 0 | if (ctx->pkey == NULL || ctx->peerkey == NULL) { |
665 | 0 | ECerr(EC_F_VALIDATE_ECX_DERIVE, EC_R_KEYS_NOT_SET); |
666 | 0 | return 0; |
667 | 0 | } |
668 | 0 | ecxkey = ctx->pkey->pkey.ecx; |
669 | 0 | peerkey = ctx->peerkey->pkey.ecx; |
670 | 0 | if (ecxkey == NULL || ecxkey->privkey == NULL) { |
671 | 0 | ECerr(EC_F_VALIDATE_ECX_DERIVE, EC_R_INVALID_PRIVATE_KEY); |
672 | 0 | return 0; |
673 | 0 | } |
674 | 0 | if (peerkey == NULL) { |
675 | 0 | ECerr(EC_F_VALIDATE_ECX_DERIVE, EC_R_INVALID_PEER_KEY); |
676 | 0 | return 0; |
677 | 0 | } |
678 | 0 | *privkey = ecxkey->privkey; |
679 | 0 | *pubkey = peerkey->pubkey; |
680 | |
|
681 | 0 | return 1; |
682 | 0 | } |
683 | | |
684 | | static int pkey_ecx_derive25519(EVP_PKEY_CTX *ctx, unsigned char *key, |
685 | | size_t *keylen) |
686 | 0 | { |
687 | 0 | const unsigned char *privkey, *pubkey; |
688 | |
|
689 | 0 | if (!validate_ecx_derive(ctx, key, keylen, &privkey, &pubkey) |
690 | 0 | || (key != NULL |
691 | 0 | && X25519(key, privkey, pubkey) == 0)) |
692 | 0 | return 0; |
693 | 0 | *keylen = X25519_KEYLEN; |
694 | 0 | return 1; |
695 | 0 | } |
696 | | |
697 | | static int pkey_ecx_derive448(EVP_PKEY_CTX *ctx, unsigned char *key, |
698 | | size_t *keylen) |
699 | 0 | { |
700 | 0 | const unsigned char *privkey, *pubkey; |
701 | |
|
702 | 0 | if (!validate_ecx_derive(ctx, key, keylen, &privkey, &pubkey) |
703 | 0 | || (key != NULL |
704 | 0 | && X448(key, privkey, pubkey) == 0)) |
705 | 0 | return 0; |
706 | 0 | *keylen = X448_KEYLEN; |
707 | 0 | return 1; |
708 | 0 | } |
709 | | |
710 | | static int pkey_ecx_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) |
711 | 0 | { |
712 | | /* Only need to handle peer key for derivation */ |
713 | 0 | if (type == EVP_PKEY_CTRL_PEER_KEY) |
714 | 0 | return 1; |
715 | 0 | return -2; |
716 | 0 | } |
717 | | |
718 | | const EVP_PKEY_METHOD ecx25519_pkey_meth = { |
719 | | EVP_PKEY_X25519, |
720 | | 0, 0, 0, 0, 0, 0, 0, |
721 | | pkey_ecx_keygen, |
722 | | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
723 | | pkey_ecx_derive25519, |
724 | | pkey_ecx_ctrl, |
725 | | 0 |
726 | | }; |
727 | | |
728 | | const EVP_PKEY_METHOD ecx448_pkey_meth = { |
729 | | EVP_PKEY_X448, |
730 | | 0, 0, 0, 0, 0, 0, 0, |
731 | | pkey_ecx_keygen, |
732 | | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
733 | | pkey_ecx_derive448, |
734 | | pkey_ecx_ctrl, |
735 | | 0 |
736 | | }; |
737 | | |
738 | | static int pkey_ecd_digestsign25519(EVP_MD_CTX *ctx, unsigned char *sig, |
739 | | size_t *siglen, const unsigned char *tbs, |
740 | | size_t tbslen) |
741 | 0 | { |
742 | 0 | const ECX_KEY *edkey = EVP_MD_CTX_pkey_ctx(ctx)->pkey->pkey.ecx; |
743 | |
|
744 | 0 | if (sig == NULL) { |
745 | 0 | *siglen = ED25519_SIGSIZE; |
746 | 0 | return 1; |
747 | 0 | } |
748 | 0 | if (*siglen < ED25519_SIGSIZE) { |
749 | 0 | ECerr(EC_F_PKEY_ECD_DIGESTSIGN25519, EC_R_BUFFER_TOO_SMALL); |
750 | 0 | return 0; |
751 | 0 | } |
752 | | |
753 | 0 | if (ED25519_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey) == 0) |
754 | 0 | return 0; |
755 | 0 | *siglen = ED25519_SIGSIZE; |
756 | 0 | return 1; |
757 | 0 | } |
758 | | |
759 | | static int pkey_ecd_digestsign448(EVP_MD_CTX *ctx, unsigned char *sig, |
760 | | size_t *siglen, const unsigned char *tbs, |
761 | | size_t tbslen) |
762 | 0 | { |
763 | 0 | const ECX_KEY *edkey = EVP_MD_CTX_pkey_ctx(ctx)->pkey->pkey.ecx; |
764 | |
|
765 | 0 | if (sig == NULL) { |
766 | 0 | *siglen = ED448_SIGSIZE; |
767 | 0 | return 1; |
768 | 0 | } |
769 | 0 | if (*siglen < ED448_SIGSIZE) { |
770 | 0 | ECerr(EC_F_PKEY_ECD_DIGESTSIGN448, EC_R_BUFFER_TOO_SMALL); |
771 | 0 | return 0; |
772 | 0 | } |
773 | | |
774 | 0 | if (ED448_sign(sig, tbs, tbslen, edkey->pubkey, edkey->privkey, NULL, |
775 | 0 | 0) == 0) |
776 | 0 | return 0; |
777 | 0 | *siglen = ED448_SIGSIZE; |
778 | 0 | return 1; |
779 | 0 | } |
780 | | |
781 | | static int pkey_ecd_digestverify25519(EVP_MD_CTX *ctx, const unsigned char *sig, |
782 | | size_t siglen, const unsigned char *tbs, |
783 | | size_t tbslen) |
784 | 0 | { |
785 | 0 | const ECX_KEY *edkey = EVP_MD_CTX_pkey_ctx(ctx)->pkey->pkey.ecx; |
786 | |
|
787 | 0 | if (siglen != ED25519_SIGSIZE) |
788 | 0 | return 0; |
789 | | |
790 | 0 | return ED25519_verify(tbs, tbslen, sig, edkey->pubkey); |
791 | 0 | } |
792 | | |
793 | | static int pkey_ecd_digestverify448(EVP_MD_CTX *ctx, const unsigned char *sig, |
794 | | size_t siglen, const unsigned char *tbs, |
795 | | size_t tbslen) |
796 | 0 | { |
797 | 0 | const ECX_KEY *edkey = EVP_MD_CTX_pkey_ctx(ctx)->pkey->pkey.ecx; |
798 | |
|
799 | 0 | if (siglen != ED448_SIGSIZE) |
800 | 0 | return 0; |
801 | | |
802 | 0 | return ED448_verify(tbs, tbslen, sig, edkey->pubkey, NULL, 0); |
803 | 0 | } |
804 | | |
805 | | static int pkey_ecd_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) |
806 | 0 | { |
807 | 0 | switch (type) { |
808 | 0 | case EVP_PKEY_CTRL_MD: |
809 | | /* Only NULL allowed as digest */ |
810 | 0 | if (p2 == NULL || (const EVP_MD *)p2 == EVP_md_null()) |
811 | 0 | return 1; |
812 | 0 | ECerr(EC_F_PKEY_ECD_CTRL, EC_R_INVALID_DIGEST_TYPE); |
813 | 0 | return 0; |
814 | | |
815 | 0 | case EVP_PKEY_CTRL_DIGESTINIT: |
816 | 0 | return 1; |
817 | 0 | } |
818 | 0 | return -2; |
819 | 0 | } |
820 | | |
821 | | const EVP_PKEY_METHOD ed25519_pkey_meth = { |
822 | | EVP_PKEY_ED25519, EVP_PKEY_FLAG_SIGCTX_CUSTOM, |
823 | | 0, 0, 0, 0, 0, 0, |
824 | | pkey_ecx_keygen, |
825 | | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
826 | | pkey_ecd_ctrl, |
827 | | 0, |
828 | | pkey_ecd_digestsign25519, |
829 | | pkey_ecd_digestverify25519 |
830 | | }; |
831 | | |
832 | | const EVP_PKEY_METHOD ed448_pkey_meth = { |
833 | | EVP_PKEY_ED448, EVP_PKEY_FLAG_SIGCTX_CUSTOM, |
834 | | 0, 0, 0, 0, 0, 0, |
835 | | pkey_ecx_keygen, |
836 | | 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, |
837 | | pkey_ecd_ctrl, |
838 | | 0, |
839 | | pkey_ecd_digestsign448, |
840 | | pkey_ecd_digestverify448 |
841 | | }; |