Coverage Report

Created: 2025-12-04 06:33

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl36/crypto/slh_dsa/slh_dsa_key.c
Line
Count
Source
1
/*
2
 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <string.h>
11
#include <openssl/err.h>
12
#include <openssl/core_dispatch.h>
13
#include <openssl/core_names.h>
14
#include <openssl/params.h>
15
#include <openssl/rand.h>
16
#include <openssl/proverr.h>
17
#include "slh_dsa_local.h"
18
#include "slh_dsa_key.h"
19
#include "internal/encoder.h"
20
21
static int slh_dsa_compute_pk_root(SLH_DSA_HASH_CTX *ctx, SLH_DSA_KEY *out, int verify);
22
23
static void slh_dsa_key_hash_cleanup(SLH_DSA_KEY *key)
24
200k
{
25
200k
    OPENSSL_free(key->propq);
26
200k
    if (key->md_big != key->md)
27
168k
        EVP_MD_free(key->md_big);
28
200k
    key->md_big = NULL;
29
200k
    EVP_MD_free(key->md);
30
200k
    EVP_MAC_free(key->hmac);
31
200k
    key->md = NULL;
32
200k
}
33
34
static int slh_dsa_key_hash_init(SLH_DSA_KEY *key)
35
200k
{
36
200k
    int is_shake = key->params->is_shake;
37
200k
    int security_category = key->params->security_category;
38
200k
    const char *digest_alg = is_shake ? "SHAKE-256" : "SHA2-256";
39
40
200k
    key->md = EVP_MD_fetch(key->libctx, digest_alg, key->propq);
41
200k
    if (key->md == NULL)
42
0
        return 0;
43
    /*
44
     * SHA2 algorithm(s) require SHA256 + HMAC_SHA(X) & MGF1(SHAX)
45
     * SHAKE algorithm(s) use SHAKE for all functions.
46
     */
47
200k
    if (is_shake == 0) {
48
100k
        if (security_category == 1) {
49
            /* For category 1 SHA2-256 is used for all hash operations */
50
32.8k
            key->md_big = key->md;
51
67.4k
        } else {
52
            /* Security categories 3 & 5 also need SHA-512 */
53
67.4k
            key->md_big = EVP_MD_fetch(key->libctx, "SHA2-512", key->propq);
54
67.4k
            if (key->md_big == NULL)
55
0
                goto err;
56
67.4k
        }
57
100k
        key->hmac = EVP_MAC_fetch(key->libctx, "HMAC", key->propq);
58
100k
        if (key->hmac == NULL)
59
0
            goto err;
60
100k
    }
61
200k
    key->adrs_func = ossl_slh_get_adrs_fn(is_shake == 0);
62
200k
    key->hash_func = ossl_slh_get_hash_fn(is_shake);
63
200k
    return 1;
64
0
 err:
65
0
    slh_dsa_key_hash_cleanup(key);
66
0
    return 0;
67
200k
}
68
69
static void slh_dsa_key_hash_dup(SLH_DSA_KEY *dst, const SLH_DSA_KEY *src)
70
0
{
71
0
    if (src->md_big != NULL && src->md_big != src->md)
72
0
        EVP_MD_up_ref(src->md_big);
73
0
    if (src->md != NULL)
74
0
        EVP_MD_up_ref(src->md);
75
0
    if (src->hmac != NULL)
76
0
        EVP_MAC_up_ref(src->hmac);
77
0
}
78
79
/**
80
 * @brief Return the libctx associated with a SLH_DSA_KEY object
81
 *
82
 * @param key A SLH_DSA_KEY to extract the libctx from.
83
 * @returns The new OSSL_LIB_CTX object on success, or NULL failure
84
 */
85
OSSL_LIB_CTX *ossl_slh_dsa_key_get0_libctx(const SLH_DSA_KEY *key)
86
0
{
87
0
    return key != NULL ? key->libctx : NULL;
88
0
}
89
90
/**
91
 * @brief Create a new SLH_DSA_KEY object
92
 *
93
 * @param libctx A OSSL_LIB_CTX object used for fetching algorithms.
94
 * @param propq The property query used for fetching algorithms
95
 * @param alg The algorithm name associated with the key type
96
 * @returns The new SLH_DSA_KEY object on success, or NULL on malloc failure
97
 */
98
SLH_DSA_KEY *ossl_slh_dsa_key_new(OSSL_LIB_CTX *libctx, const char *propq,
99
                                  const char *alg)
100
200k
{
101
200k
    SLH_DSA_KEY *ret;
102
200k
    const SLH_DSA_PARAMS *params = ossl_slh_dsa_params_get(alg);
103
104
200k
    if (params == NULL)
105
0
        return NULL;
106
107
200k
    ret = OPENSSL_zalloc(sizeof(*ret));
108
200k
    if (ret != NULL) {
109
200k
        ret->libctx = libctx;
110
200k
        ret->params = params;
111
200k
        if (propq != NULL) {
112
199k
            ret->propq = OPENSSL_strdup(propq);
113
199k
            if (ret->propq == NULL)
114
0
                goto err;
115
199k
        }
116
200k
        if (!slh_dsa_key_hash_init(ret))
117
0
            goto err;
118
200k
    }
119
200k
    return ret;
120
0
 err:
121
0
    ossl_slh_dsa_key_free(ret);
122
0
    return NULL;
123
200k
}
124
125
/**
126
 * @brief Destroy a SLH_DSA_KEY object
127
 */
128
void ossl_slh_dsa_key_free(SLH_DSA_KEY *key)
129
1.38M
{
130
1.38M
    if (key == NULL)
131
1.18M
        return;
132
133
200k
    slh_dsa_key_hash_cleanup(key);
134
200k
    OPENSSL_cleanse(&key->priv, sizeof(key->priv) >> 1);
135
200k
    OPENSSL_free(key);
136
200k
}
137
138
/**
139
 * @brief Duplicate a key
140
 *
141
 * @param src A SLH_DSA_KEY object to copy
142
 * @param selection to select public and/or private components. Selecting the
143
 *                  private key will also select the public key
144
 * @returns The duplicated key, or NULL on failure.
145
 */
146
SLH_DSA_KEY *ossl_slh_dsa_key_dup(const SLH_DSA_KEY *src, int selection)
147
0
{
148
0
    SLH_DSA_KEY *ret = NULL;
149
150
0
    if (src == NULL)
151
0
        return NULL;
152
153
0
    ret = OPENSSL_zalloc(sizeof(*ret));
154
0
    if (ret != NULL) {
155
0
        *ret = *src; /* this copies everything including the keydata in priv[] */
156
0
        ret->propq = NULL;
157
0
        ret->pub = NULL;
158
0
        ret->has_priv = 0;
159
0
        slh_dsa_key_hash_dup(ret, src);
160
0
        if (src->propq != NULL) {
161
0
            ret->propq = OPENSSL_strdup(src->propq);
162
0
            if (ret->propq == NULL)
163
0
                goto err;
164
0
        }
165
0
        if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
166
            /* The public components are present if the private key is present */
167
0
            if (src->pub != NULL)
168
0
                ret->pub = SLH_DSA_PUB(ret);
169
0
            if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
170
0
                ret->has_priv = src->has_priv;
171
0
        }
172
0
    }
173
0
    return ret;
174
0
 err:
175
0
    ossl_slh_dsa_key_free(ret);
176
0
    return NULL;
177
0
}
178
179
/**
180
 * @brief Are 2 keys equal?
181
 *
182
 * To be equal the keys must have the same key data and algorithm name.
183
 *
184
 * @param key1 A SLH_DSA_KEY object
185
 * @param key2 A SLH_DSA_KEY object
186
 * @param selection to select public and/or private component comparison.
187
 * @returns 1 if the keys are equal otherwise it returns 0.
188
 */
189
int ossl_slh_dsa_key_equal(const SLH_DSA_KEY *key1, const SLH_DSA_KEY *key2,
190
                           int selection)
191
406
{
192
406
    int key_checked = 0;
193
194
    /* The parameter sets must match - i.e. The same algorithm name */
195
406
    if (key1->params != key2->params)
196
0
        return 0;
197
198
406
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
199
406
        if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
200
406
            if (key1->pub != NULL && key2->pub != NULL) {
201
406
                if (memcmp(key1->pub, key2->pub, key1->params->pk_len) != 0)
202
90
                    return 0;
203
316
                key_checked = 1;
204
316
            }
205
406
        }
206
316
        if (!key_checked
207
0
                && (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
208
0
            if (key1->has_priv && key2->has_priv) {
209
0
                if (memcmp(key1->priv, key2->priv,
210
0
                           key1->params->pk_len) != 0)
211
0
                    return 0;
212
0
                key_checked = 1;
213
0
            }
214
0
        }
215
316
        return key_checked;
216
316
    }
217
0
    return 1;
218
406
}
219
220
int ossl_slh_dsa_key_has(const SLH_DSA_KEY *key, int selection)
221
961
{
222
961
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
223
961
        if (key->pub == NULL)
224
0
            return 0; /* No public key */
225
961
        if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0
226
13
                && key->has_priv == 0)
227
0
            return 0; /* No private key */
228
961
        return 1;
229
961
    }
230
0
    return 0;
231
961
}
232
233
int ossl_slh_dsa_key_pairwise_check(const SLH_DSA_KEY *key)
234
0
{
235
0
    int ret;
236
0
    SLH_DSA_HASH_CTX *ctx = NULL;
237
238
0
    if (key->pub == NULL || key->has_priv == 0)
239
0
        return 0;
240
241
0
    ctx = ossl_slh_dsa_hash_ctx_new(key);
242
0
    if (ctx == NULL)
243
0
        return 0;
244
0
    ret = slh_dsa_compute_pk_root(ctx, (SLH_DSA_KEY *)key, 1);
245
0
    ossl_slh_dsa_hash_ctx_free(ctx);
246
0
    return ret;
247
0
}
248
249
void ossl_slh_dsa_key_reset(SLH_DSA_KEY *key)
250
51
{
251
51
    key->pub = NULL;
252
51
    if (key->has_priv) {
253
30
        key->has_priv = 0;
254
30
        OPENSSL_cleanse(key->priv, sizeof(key->priv));
255
30
    }
256
51
}
257
258
/**
259
 * @brief Load a SLH_DSA key from raw data.
260
 *
261
 * @param key An SLH_DSA key to load into
262
 * @param params An array of parameters containing key data.
263
 * @param include_private Set to 1 to optionally include the private key data
264
 *                        if it exists.
265
 * @returns 1 on success, or 0 on failure.
266
 */
267
int ossl_slh_dsa_key_fromdata(SLH_DSA_KEY *key, const OSSL_PARAM *param_pub,
268
                              const OSSL_PARAM *param_priv,
269
                              int include_private)
270
409
{
271
409
    size_t priv_len, key_len, data_len = 0;
272
409
    void *p;
273
274
409
    if (key == NULL)
275
0
        return 0;
276
277
    /* The private key consists of 4 elements SK_SEED, SK_PRF, PK_SEED and PK_ROOT */
278
409
    priv_len = ossl_slh_dsa_key_get_priv_len(key);
279
    /* The size of either SK_SEED + SK_PRF OR PK_SEED + PK_ROOT */
280
409
    key_len = priv_len >> 1;
281
282
    /* Private key is optional */
283
409
    if (include_private) {
284
409
        if (param_priv != NULL) {
285
409
            p = key->priv;
286
409
            if (!OSSL_PARAM_get_octet_string(param_priv, &p, priv_len, &data_len))
287
19
                return 0;
288
            /* If the data read includes all 4 elements then we are finished */
289
390
            if (data_len == priv_len) {
290
316
                key->has_priv = 1;
291
316
                key->pub = SLH_DSA_PUB(key);
292
316
                return 1;
293
316
            }
294
            /* Otherwise it must be just SK_SEED + SK_PRF */
295
74
            if (data_len != key_len)
296
21
                goto err;
297
53
            key->has_priv = 1;
298
53
        }
299
409
    }
300
    /*
301
     * In the case where the passed in private key does not contain the public key
302
     * there MUST be a separate public key, since the private key cannot exist
303
     * without the public key elements. NOTE that this does not accept half of
304
     * the public key, (Keygen must be used for this case currently).
305
     */
306
53
    p = SLH_DSA_PUB(key);
307
53
    if (param_pub == NULL
308
53
            || !OSSL_PARAM_get_octet_string(param_pub, &p, key_len, &data_len)
309
34
            || data_len != key_len)
310
30
        goto err;
311
23
    key->pub = p;
312
23
    return 1;
313
51
 err:
314
51
    ossl_slh_dsa_key_reset(key);
315
51
    return 0;
316
53
}
317
318
/**
319
 * Generate the public key root from private key (seed and prf) and public key seed.
320
 * See FIPS 205 Section 9.1 Algorithm 18
321
 *
322
 * @param ctx Contains SLH_DSA algorithm functions and constants.
323
 * @param out An SLH_DSA key containing the private key (seed and prf) and public key seed.
324
 *            The public root key is written to this key.
325
 * @param validate If set to 1 the computed public key is not written to the key,
326
 *                 but will be compared to the existing value.
327
 * @returns 1 if the root key is generated or compared successfully, or 0 on error.
328
 */
329
static int slh_dsa_compute_pk_root(SLH_DSA_HASH_CTX *ctx, SLH_DSA_KEY *out,
330
                                   int validate)
331
1.46k
{
332
1.46k
    const SLH_DSA_KEY *key = ctx->key;
333
1.46k
    SLH_ADRS_FUNC_DECLARE(key, adrsf);
334
1.46k
    SLH_ADRS_DECLARE(adrs);
335
1.46k
    const SLH_DSA_PARAMS *params = key->params;
336
1.46k
    size_t n = params->n;
337
1.46k
    uint8_t pk_root[SLH_DSA_MAX_N], *dst;
338
339
1.46k
    adrsf->zero(adrs);
340
1.46k
    adrsf->set_layer_address(adrs, params->d - 1);
341
342
1.46k
    dst = validate ? pk_root : SLH_DSA_PK_ROOT(out);
343
344
    /* Generate the ROOT public key */
345
1.46k
    return ossl_slh_xmss_node(ctx, SLH_DSA_SK_SEED(key), 0, params->hm,
346
1.46k
                              SLH_DSA_PK_SEED(key), adrs, dst, n)
347
1.46k
        && (validate == 0 || memcmp(dst, SLH_DSA_PK_ROOT(out), n) == 0);
348
1.46k
}
349
350
/**
351
 * @brief Generate a SLH_DSA keypair. The private key seed and prf as well as the
352
 * public key seed are generated using an approved DRBG's. The public key root is
353
 * calculated using these generated values.
354
 * See FIPS 205 Section 10.1 Algorithm 21
355
 *
356
 * @param ctx Contains SLH_DSA algorithm functions and constants
357
 * @param out An SLH_DSA key to write key pair data to.
358
 * @param lib_ctx A library context for fetching RAND algorithms
359
 * @param entropy Optional entropy to use instead of using a DRBG.
360
 *        Required for ACVP testing. It may be NULL.
361
 * @param entropy_len the size of |entropy|. If set it must be at least 3 * |n|.
362
 * @returns 1 if the key is generated or 0 otherwise.
363
 */
364
int ossl_slh_dsa_generate_key(SLH_DSA_HASH_CTX *ctx, SLH_DSA_KEY *out,
365
                              OSSL_LIB_CTX *lib_ctx,
366
                              const uint8_t *entropy, size_t entropy_len)
367
1.46k
{
368
1.46k
    size_t n = out->params->n;
369
1.46k
    size_t secret_key_len = 2 * n; /* The length of SK_SEED + SK_PRF */
370
1.46k
    size_t pk_seed_len = n;        /* The length of PK_SEED */
371
1.46k
    size_t entropy_len_expected = secret_key_len + pk_seed_len;
372
1.46k
    uint8_t *priv = SLH_DSA_PRIV(out);
373
1.46k
    uint8_t *pub = SLH_DSA_PUB(out);
374
375
1.46k
    if (entropy != NULL && entropy_len != 0) {
376
0
        if (entropy_len != entropy_len_expected)
377
0
            goto err;
378
0
        memcpy(priv, entropy, entropy_len_expected);
379
1.46k
    } else {
380
1.46k
        if (RAND_priv_bytes_ex(lib_ctx, priv, secret_key_len, 0) <= 0
381
1.46k
                || RAND_bytes_ex(lib_ctx, pub, pk_seed_len, 0) <= 0)
382
0
            goto err;
383
1.46k
    }
384
1.46k
    if (!slh_dsa_compute_pk_root(ctx, out, 0))
385
0
        goto err;
386
1.46k
    out->pub = pub;
387
1.46k
    out->has_priv = 1;
388
1.46k
    return 1;
389
0
err:
390
0
    out->pub = NULL;
391
0
    out->has_priv = 0;
392
0
    OPENSSL_cleanse(priv, secret_key_len);
393
0
    return 0;
394
1.46k
}
395
396
/**
397
 * @brief This is used when a SLH key is used for an operation.
398
 * This checks that the algorithm is the same (i.e. uses the same parameters)
399
 *
400
 * @param ctx Contains SLH_DSA algorithm functions and constants to be used for
401
 *            an operation.
402
 * @param key A SLH_DSA key to use for an operation.
403
 *
404
 * @returns 1 if the algorithm matches, or 0 otherwise.
405
 */
406
int ossl_slh_dsa_key_type_matches(const SLH_DSA_KEY *key, const char *alg)
407
1.85k
{
408
1.85k
    return (OPENSSL_strcasecmp(key->params->alg, alg) == 0);
409
1.85k
}
410
411
/* Returns the public key data or NULL if there is no public key */
412
const uint8_t *ossl_slh_dsa_key_get_pub(const SLH_DSA_KEY *key)
413
2.47k
{
414
2.47k
    return key->pub;
415
2.47k
}
416
417
/* Returns the constant 2 * |n| which is the size of PK_SEED + PK_ROOT */
418
size_t ossl_slh_dsa_key_get_pub_len(const SLH_DSA_KEY *key)
419
201k
{
420
201k
    return 2 * key->params->n;
421
201k
}
422
423
/* Returns the private key data or NULL if there is no private key */
424
const uint8_t *ossl_slh_dsa_key_get_priv(const SLH_DSA_KEY *key)
425
2.49k
{
426
2.49k
    return key->has_priv ? key->priv : NULL;
427
2.49k
}
428
429
/*
430
 * Returns the constant 4 * |n| which is the size of both
431
 * the private and public key components.
432
 * SK_SEED + SK_ROOT + PK_SEED + PK_ROOT
433
 */
434
size_t ossl_slh_dsa_key_get_priv_len(const SLH_DSA_KEY *key)
435
777
{
436
777
    return 4 * key->params->n;
437
777
}
438
439
size_t ossl_slh_dsa_key_get_n(const SLH_DSA_KEY *key)
440
2.57k
{
441
2.57k
    return key->params->n;
442
2.57k
}
443
444
int ossl_slh_dsa_key_get_security_category(const SLH_DSA_KEY *key)
445
1.17k
{
446
1.17k
    return key->params->security_category;
447
1.17k
}
448
449
size_t ossl_slh_dsa_key_get_sig_len(const SLH_DSA_KEY *key)
450
1.81k
{
451
1.81k
    return key->params->sig_len;
452
1.81k
}
453
const char *ossl_slh_dsa_key_get_name(const SLH_DSA_KEY *key)
454
2.72k
{
455
2.72k
    return key->params->alg;
456
2.72k
}
457
int ossl_slh_dsa_key_get_type(const SLH_DSA_KEY *key)
458
1.85k
{
459
1.85k
    return key->params->type;
460
1.85k
}
461
462
int ossl_slh_dsa_set_priv(SLH_DSA_KEY *key, const uint8_t *priv, size_t priv_len)
463
26
{
464
26
    if (ossl_slh_dsa_key_get_priv_len(key) != priv_len)
465
13
        return 0;
466
13
    memcpy(key->priv, priv, priv_len);
467
13
    key->has_priv = 1;
468
13
    key->pub = SLH_DSA_PUB(key);
469
13
    return 1;
470
26
}
471
472
int ossl_slh_dsa_set_pub(SLH_DSA_KEY *key, const uint8_t *pub, size_t pub_len)
473
0
{
474
0
    if (ossl_slh_dsa_key_get_pub_len(key) != pub_len)
475
0
        return 0;
476
0
    key->pub = SLH_DSA_PUB(key);
477
0
    memcpy(key->pub, pub, pub_len);
478
0
    key->has_priv = 0;
479
0
    return 1;
480
0
}
481
482
#ifndef FIPS_MODULE
483
int ossl_slh_dsa_key_to_text(BIO *out, const SLH_DSA_KEY *key, int selection)
484
13
{
485
13
    const char *name;
486
487
13
    if (out == NULL || key == NULL) {
488
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
489
0
        return 0;
490
0
    }
491
13
    name = ossl_slh_dsa_key_get_name(key);
492
13
    if (ossl_slh_dsa_key_get_pub(key) == NULL) {
493
        /* Regardless of the |selection|, there must be a public key */
494
0
        ERR_raise_data(ERR_LIB_PROV, PROV_R_MISSING_KEY,
495
0
                       "no %s key material available", name);
496
0
        return 0;
497
0
    }
498
499
13
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
500
13
        if (ossl_slh_dsa_key_get_priv(key) == NULL) {
501
0
            ERR_raise_data(ERR_LIB_PROV, PROV_R_MISSING_KEY,
502
0
                           "no %s key material available", name);
503
0
            return 0;
504
0
        }
505
13
        if (BIO_printf(out, "%s Private-Key:\n", name) <= 0)
506
0
            return 0;
507
13
        if (!ossl_bio_print_labeled_buf(out, "priv:", ossl_slh_dsa_key_get_priv(key),
508
13
                                        ossl_slh_dsa_key_get_priv_len(key)))
509
0
            return 0;
510
13
    } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
511
0
        if (BIO_printf(out, "%s Public-Key:\n", name) <= 0)
512
0
            return 0;
513
0
    }
514
515
13
    if (!ossl_bio_print_labeled_buf(out, "pub:", ossl_slh_dsa_key_get_pub(key),
516
13
                                    ossl_slh_dsa_key_get_pub_len(key)))
517
0
        return 0;
518
519
13
    return 1;
520
13
}
521
#endif /* FIPS_MODULE */