/src/openssl30/crypto/asn1_dsa.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | /* | 
| 11 |  |  * A simple ASN.1 DER encoder/decoder for DSA-Sig-Value and ECDSA-Sig-Value. | 
| 12 |  |  * | 
| 13 |  |  * DSA-Sig-Value ::= SEQUENCE { | 
| 14 |  |  *  r  INTEGER, | 
| 15 |  |  *  s  INTEGER | 
| 16 |  |  * } | 
| 17 |  |  * | 
| 18 |  |  * ECDSA-Sig-Value ::= SEQUENCE { | 
| 19 |  |  *  r  INTEGER, | 
| 20 |  |  *  s  INTEGER | 
| 21 |  |  * } | 
| 22 |  |  */ | 
| 23 |  |  | 
| 24 |  | #include <openssl/crypto.h> | 
| 25 |  | #include <openssl/bn.h> | 
| 26 |  | #include "crypto/asn1_dsa.h" | 
| 27 |  | #include "internal/packet.h" | 
| 28 |  |  | 
| 29 | 0 | #define ID_SEQUENCE 0x30 | 
| 30 | 0 | #define ID_INTEGER 0x02 | 
| 31 |  |  | 
| 32 |  | /* | 
| 33 |  |  * Outputs the encoding of the length octets for a DER value with a content | 
| 34 |  |  * length of cont_len bytes to pkt. The maximum supported content length is | 
| 35 |  |  * 65535 (0xffff) bytes. | 
| 36 |  |  * | 
| 37 |  |  * Returns 1 on success or 0 on error. | 
| 38 |  |  */ | 
| 39 |  | int ossl_encode_der_length(WPACKET *pkt, size_t cont_len) | 
| 40 | 0 | { | 
| 41 | 0 |     if (cont_len > 0xffff) | 
| 42 | 0 |         return 0; /* Too large for supported length encodings */ | 
| 43 |  |  | 
| 44 | 0 |     if (cont_len > 0xff) { | 
| 45 | 0 |         if (!WPACKET_put_bytes_u8(pkt, 0x82) | 
| 46 | 0 |                 || !WPACKET_put_bytes_u16(pkt, cont_len)) | 
| 47 | 0 |             return 0; | 
| 48 | 0 |     } else { | 
| 49 | 0 |         if (cont_len > 0x7f | 
| 50 | 0 |                 && !WPACKET_put_bytes_u8(pkt, 0x81)) | 
| 51 | 0 |             return 0; | 
| 52 | 0 |         if (!WPACKET_put_bytes_u8(pkt, cont_len)) | 
| 53 | 0 |             return 0; | 
| 54 | 0 |     } | 
| 55 |  |  | 
| 56 | 0 |     return 1; | 
| 57 | 0 | } | 
| 58 |  |  | 
| 59 |  | /* | 
| 60 |  |  * Outputs the DER encoding of a positive ASN.1 INTEGER to pkt. | 
| 61 |  |  * | 
| 62 |  |  * Results in an error if n is negative or too large. | 
| 63 |  |  * | 
| 64 |  |  * Returns 1 on success or 0 on error. | 
| 65 |  |  */ | 
| 66 |  | int ossl_encode_der_integer(WPACKET *pkt, const BIGNUM *n) | 
| 67 | 0 | { | 
| 68 | 0 |     unsigned char *bnbytes; | 
| 69 | 0 |     size_t cont_len; | 
| 70 |  | 
 | 
| 71 | 0 |     if (BN_is_negative(n)) | 
| 72 | 0 |         return 0; | 
| 73 |  |  | 
| 74 |  |     /* | 
| 75 |  |      * Calculate the ASN.1 INTEGER DER content length for n. | 
| 76 |  |      * This is the number of whole bytes required to represent n (i.e. rounded | 
| 77 |  |      * down), plus one. | 
| 78 |  |      * If n is zero then the content is a single zero byte (length = 1). | 
| 79 |  |      * If the number of bits of n is a multiple of 8 then an extra zero padding | 
| 80 |  |      * byte is included to ensure that the value is still treated as positive | 
| 81 |  |      * in the INTEGER two's complement representation. | 
| 82 |  |      */ | 
| 83 | 0 |     cont_len = BN_num_bits(n) / 8 + 1; | 
| 84 |  | 
 | 
| 85 | 0 |     if (!WPACKET_start_sub_packet(pkt) | 
| 86 | 0 |             || !WPACKET_put_bytes_u8(pkt, ID_INTEGER) | 
| 87 | 0 |             || !ossl_encode_der_length(pkt, cont_len) | 
| 88 | 0 |             || !WPACKET_allocate_bytes(pkt, cont_len, &bnbytes) | 
| 89 | 0 |             || !WPACKET_close(pkt)) | 
| 90 | 0 |         return 0; | 
| 91 |  |  | 
| 92 | 0 |     if (bnbytes != NULL | 
| 93 | 0 |             && BN_bn2binpad(n, bnbytes, (int)cont_len) != (int)cont_len) | 
| 94 | 0 |         return 0; | 
| 95 |  |  | 
| 96 | 0 |     return 1; | 
| 97 | 0 | } | 
| 98 |  |  | 
| 99 |  | /* | 
| 100 |  |  * Outputs the DER encoding of a DSA-Sig-Value or ECDSA-Sig-Value to pkt. pkt | 
| 101 |  |  * may be initialised with a NULL buffer which enables pkt to be used to | 
| 102 |  |  * calculate how many bytes would be needed. | 
| 103 |  |  * | 
| 104 |  |  * Returns 1 on success or 0 on error. | 
| 105 |  |  */ | 
| 106 |  | int ossl_encode_der_dsa_sig(WPACKET *pkt, const BIGNUM *r, const BIGNUM *s) | 
| 107 | 0 | { | 
| 108 | 0 |     WPACKET tmppkt, *dummypkt; | 
| 109 | 0 |     size_t cont_len; | 
| 110 | 0 |     int isnull = WPACKET_is_null_buf(pkt); | 
| 111 |  | 
 | 
| 112 | 0 |     if (!WPACKET_start_sub_packet(pkt)) | 
| 113 | 0 |         return 0; | 
| 114 |  |  | 
| 115 | 0 |     if (!isnull) { | 
| 116 | 0 |         if (!WPACKET_init_null(&tmppkt, 0)) | 
| 117 | 0 |             return 0; | 
| 118 | 0 |         dummypkt = &tmppkt; | 
| 119 | 0 |     } else { | 
| 120 |  |         /* If the input packet has a NULL buffer, we don't need a dummy packet */ | 
| 121 | 0 |         dummypkt = pkt; | 
| 122 | 0 |     } | 
| 123 |  |  | 
| 124 |  |     /* Calculate the content length */ | 
| 125 | 0 |     if (!ossl_encode_der_integer(dummypkt, r) | 
| 126 | 0 |             || !ossl_encode_der_integer(dummypkt, s) | 
| 127 | 0 |             || !WPACKET_get_length(dummypkt, &cont_len) | 
| 128 | 0 |             || (!isnull && !WPACKET_finish(dummypkt))) { | 
| 129 | 0 |         if (!isnull) | 
| 130 | 0 |             WPACKET_cleanup(dummypkt); | 
| 131 | 0 |         return 0; | 
| 132 | 0 |     } | 
| 133 |  |  | 
| 134 |  |     /* Add the tag and length bytes */ | 
| 135 | 0 |     if (!WPACKET_put_bytes_u8(pkt, ID_SEQUENCE) | 
| 136 | 0 |             || !ossl_encode_der_length(pkt, cont_len) | 
| 137 |  |                /* | 
| 138 |  |                 * Really encode the integers. We already wrote to the main pkt | 
| 139 |  |                 * if it had a NULL buffer, so don't do it again | 
| 140 |  |                 */ | 
| 141 | 0 |             || (!isnull && !ossl_encode_der_integer(pkt, r)) | 
| 142 | 0 |             || (!isnull && !ossl_encode_der_integer(pkt, s)) | 
| 143 | 0 |             || !WPACKET_close(pkt)) | 
| 144 | 0 |         return 0; | 
| 145 |  |  | 
| 146 | 0 |     return 1; | 
| 147 | 0 | } | 
| 148 |  |  | 
| 149 |  | /* | 
| 150 |  |  * Decodes the DER length octets in pkt and initialises subpkt with the | 
| 151 |  |  * following bytes of that length. | 
| 152 |  |  * | 
| 153 |  |  * Returns 1 on success or 0 on failure. | 
| 154 |  |  */ | 
| 155 |  | int ossl_decode_der_length(PACKET *pkt, PACKET *subpkt) | 
| 156 | 0 | { | 
| 157 | 0 |     unsigned int byte; | 
| 158 |  | 
 | 
| 159 | 0 |     if (!PACKET_get_1(pkt, &byte)) | 
| 160 | 0 |         return 0; | 
| 161 |  |  | 
| 162 | 0 |     if (byte < 0x80) | 
| 163 | 0 |         return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); | 
| 164 | 0 |     if (byte == 0x81) | 
| 165 | 0 |         return PACKET_get_length_prefixed_1(pkt, subpkt); | 
| 166 | 0 |     if (byte == 0x82) | 
| 167 | 0 |         return PACKET_get_length_prefixed_2(pkt, subpkt); | 
| 168 |  |  | 
| 169 |  |     /* Too large, invalid, or not DER. */ | 
| 170 | 0 |     return 0; | 
| 171 | 0 | } | 
| 172 |  |  | 
| 173 |  | /* | 
| 174 |  |  * Decodes a single ASN.1 INTEGER value from pkt, which must be DER encoded, | 
| 175 |  |  * and updates n with the decoded value. | 
| 176 |  |  * | 
| 177 |  |  * The BIGNUM, n, must have already been allocated by calling BN_new(). | 
| 178 |  |  * pkt must not be NULL. | 
| 179 |  |  * | 
| 180 |  |  * An attempt to consume more than len bytes results in an error. | 
| 181 |  |  * Returns 1 on success or 0 on error. | 
| 182 |  |  * | 
| 183 |  |  * If the PACKET is supposed to only contain a single INTEGER value with no | 
| 184 |  |  * trailing garbage then it is up to the caller to verify that all bytes | 
| 185 |  |  * were consumed. | 
| 186 |  |  */ | 
| 187 |  | int ossl_decode_der_integer(PACKET *pkt, BIGNUM *n) | 
| 188 | 0 | { | 
| 189 | 0 |     PACKET contpkt, tmppkt; | 
| 190 | 0 |     unsigned int tag, tmp; | 
| 191 |  |  | 
| 192 |  |     /* Check we have an integer and get the content bytes */ | 
| 193 | 0 |     if (!PACKET_get_1(pkt, &tag) | 
| 194 | 0 |             || tag != ID_INTEGER | 
| 195 | 0 |             || !ossl_decode_der_length(pkt, &contpkt)) | 
| 196 | 0 |         return 0; | 
| 197 |  |  | 
| 198 |  |     /* Peek ahead at the first bytes to check for proper encoding */ | 
| 199 | 0 |     tmppkt = contpkt; | 
| 200 |  |     /* The INTEGER must be positive */ | 
| 201 | 0 |     if (!PACKET_get_1(&tmppkt, &tmp) | 
| 202 | 0 |             || (tmp & 0x80) != 0) | 
| 203 | 0 |         return 0; | 
| 204 |  |     /* If there a zero padding byte the next byte must have the msb set */ | 
| 205 | 0 |     if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) { | 
| 206 | 0 |         if (!PACKET_get_1(&tmppkt, &tmp) | 
| 207 | 0 |                 || (tmp & 0x80) == 0) | 
| 208 | 0 |             return 0; | 
| 209 | 0 |     } | 
| 210 |  |  | 
| 211 | 0 |     if (BN_bin2bn(PACKET_data(&contpkt), | 
| 212 | 0 |                   (int)PACKET_remaining(&contpkt), n) == NULL) | 
| 213 | 0 |         return 0; | 
| 214 |  |  | 
| 215 | 0 |     return 1; | 
| 216 | 0 | } | 
| 217 |  |  | 
| 218 |  | /* | 
| 219 |  |  * Decodes a single DSA-Sig-Value or ECDSA-Sig-Value from *ppin, which must be | 
| 220 |  |  * DER encoded, updates r and s with the decoded values, and increments *ppin | 
| 221 |  |  * past the data that was consumed. | 
| 222 |  |  * | 
| 223 |  |  * The BIGNUMs, r and s, must have already been allocated by calls to BN_new(). | 
| 224 |  |  * ppin and *ppin must not be NULL. | 
| 225 |  |  * | 
| 226 |  |  * An attempt to consume more than len bytes results in an error. | 
| 227 |  |  * Returns the number of bytes of input consumed or 0 if an error occurs. | 
| 228 |  |  * | 
| 229 |  |  * If the buffer is supposed to only contain a single [EC]DSA-Sig-Value with no | 
| 230 |  |  * trailing garbage then it is up to the caller to verify that all bytes | 
| 231 |  |  * were consumed. | 
| 232 |  |  */ | 
| 233 |  | size_t ossl_decode_der_dsa_sig(BIGNUM *r, BIGNUM *s, | 
| 234 |  |                                const unsigned char **ppin, size_t len) | 
| 235 | 0 | { | 
| 236 | 0 |     size_t consumed; | 
| 237 | 0 |     PACKET pkt, contpkt; | 
| 238 | 0 |     unsigned int tag; | 
| 239 |  | 
 | 
| 240 | 0 |     if (!PACKET_buf_init(&pkt, *ppin, len) | 
| 241 | 0 |             || !PACKET_get_1(&pkt, &tag) | 
| 242 | 0 |             || tag != ID_SEQUENCE | 
| 243 | 0 |             || !ossl_decode_der_length(&pkt, &contpkt) | 
| 244 | 0 |             || !ossl_decode_der_integer(&contpkt, r) | 
| 245 | 0 |             || !ossl_decode_der_integer(&contpkt, s) | 
| 246 | 0 |             || PACKET_remaining(&contpkt) != 0) | 
| 247 | 0 |         return 0; | 
| 248 |  |  | 
| 249 | 0 |     consumed = PACKET_data(&pkt) - *ppin; | 
| 250 | 0 |     *ppin += consumed; | 
| 251 | 0 |     return consumed; | 
| 252 | 0 | } |