Coverage Report

Created: 2026-04-01 06:39

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl36/providers/implementations/signature/sm2_sig.c
Line
Count
Source
1
/*
2
 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
/* clang-format off */
10
11
/* clang-format on */
12
13
/*
14
 * ECDSA low level APIs are deprecated for public use, but still ok for
15
 * internal use - SM2 implementation uses ECDSA_size() function.
16
 */
17
#include "internal/deprecated.h"
18
19
#include <string.h> /* memcpy */
20
#include <openssl/crypto.h>
21
#include <openssl/core_dispatch.h>
22
#include <openssl/core_names.h>
23
#include <openssl/dsa.h>
24
#include <openssl/params.h>
25
#include <openssl/evp.h>
26
#include <openssl/err.h>
27
#include <openssl/proverr.h>
28
#include "internal/nelem.h"
29
#include "internal/sizes.h"
30
#include "internal/cryptlib.h"
31
#include "internal/sm3.h"
32
#include "prov/implementations.h"
33
#include "prov/providercommon.h"
34
#include "prov/provider_ctx.h"
35
#include "crypto/ec.h"
36
#include "crypto/sm2.h"
37
#include "prov/der_sm2.h"
38
39
static OSSL_FUNC_signature_newctx_fn sm2sig_newctx;
40
static OSSL_FUNC_signature_sign_init_fn sm2sig_signature_init;
41
static OSSL_FUNC_signature_verify_init_fn sm2sig_signature_init;
42
static OSSL_FUNC_signature_sign_fn sm2sig_sign;
43
static OSSL_FUNC_signature_verify_fn sm2sig_verify;
44
static OSSL_FUNC_signature_digest_sign_init_fn sm2sig_digest_signverify_init;
45
static OSSL_FUNC_signature_digest_sign_update_fn sm2sig_digest_signverify_update;
46
static OSSL_FUNC_signature_digest_sign_final_fn sm2sig_digest_sign_final;
47
static OSSL_FUNC_signature_digest_verify_init_fn sm2sig_digest_signverify_init;
48
static OSSL_FUNC_signature_digest_verify_update_fn sm2sig_digest_signverify_update;
49
static OSSL_FUNC_signature_digest_verify_final_fn sm2sig_digest_verify_final;
50
static OSSL_FUNC_signature_freectx_fn sm2sig_freectx;
51
static OSSL_FUNC_signature_dupctx_fn sm2sig_dupctx;
52
static OSSL_FUNC_signature_get_ctx_params_fn sm2sig_get_ctx_params;
53
static OSSL_FUNC_signature_gettable_ctx_params_fn sm2sig_gettable_ctx_params;
54
static OSSL_FUNC_signature_set_ctx_params_fn sm2sig_set_ctx_params;
55
static OSSL_FUNC_signature_settable_ctx_params_fn sm2sig_settable_ctx_params;
56
static OSSL_FUNC_signature_get_ctx_md_params_fn sm2sig_get_ctx_md_params;
57
static OSSL_FUNC_signature_gettable_ctx_md_params_fn sm2sig_gettable_ctx_md_params;
58
static OSSL_FUNC_signature_set_ctx_md_params_fn sm2sig_set_ctx_md_params;
59
static OSSL_FUNC_signature_settable_ctx_md_params_fn sm2sig_settable_ctx_md_params;
60
61
/*
62
 * What's passed as an actual key is defined by the KEYMGMT interface.
63
 * We happen to know that our KEYMGMT simply passes EC structures, so
64
 * we use that here too.
65
 */
66
typedef struct {
67
    OSSL_LIB_CTX *libctx;
68
    char *propq;
69
    EC_KEY *ec;
70
71
    /*
72
     * Flag to determine if the 'z' digest needs to be computed and fed to the
73
     * hash function.
74
     * This flag should be set on initialization and the computation should
75
     * be performed only once, on first update.
76
     */
77
    unsigned int flag_compute_z_digest : 1;
78
79
    char mdname[OSSL_MAX_NAME_SIZE];
80
81
    /* The Algorithm Identifier of the combined signature algorithm */
82
    unsigned char aid_buf[OSSL_MAX_ALGORITHM_ID_SIZE];
83
    size_t aid_len;
84
85
    /* main digest */
86
    EVP_MD *md;
87
    EVP_MD_CTX *mdctx;
88
    size_t mdsize;
89
90
    /* SM2 ID used for calculating the Z value */
91
    unsigned char *id;
92
    size_t id_len;
93
} PROV_SM2_CTX;
94
95
static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname)
96
0
{
97
0
    if (psm2ctx->md == NULL) /* We need an SM3 md to compare with */
98
0
        psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname,
99
0
            psm2ctx->propq);
100
0
    if (psm2ctx->md == NULL)
101
0
        return 0;
102
103
    /* XOF digests don't work */
104
0
    if (EVP_MD_xof(psm2ctx->md)) {
105
0
        ERR_raise(ERR_LIB_PROV, PROV_R_XOF_DIGESTS_NOT_ALLOWED);
106
0
        return 0;
107
0
    }
108
109
0
    if (mdname == NULL)
110
0
        return 1;
111
112
0
    if (strlen(mdname) >= sizeof(psm2ctx->mdname)
113
0
        || !EVP_MD_is_a(psm2ctx->md, mdname)) {
114
0
        ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST, "digest=%s",
115
0
            mdname);
116
0
        return 0;
117
0
    }
118
119
0
    OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname));
120
0
    return 1;
121
0
}
122
123
static void *sm2sig_newctx(void *provctx, const char *propq)
124
0
{
125
0
    PROV_SM2_CTX *ctx = OPENSSL_zalloc(sizeof(PROV_SM2_CTX));
126
127
0
    if (ctx == NULL)
128
0
        return NULL;
129
130
0
    ctx->libctx = PROV_LIBCTX_OF(provctx);
131
0
    if (propq != NULL && (ctx->propq = OPENSSL_strdup(propq)) == NULL) {
132
0
        OPENSSL_free(ctx);
133
0
        return NULL;
134
0
    }
135
0
    ctx->mdsize = SM3_DIGEST_LENGTH;
136
0
    strcpy(ctx->mdname, OSSL_DIGEST_NAME_SM3);
137
0
    return ctx;
138
0
}
139
140
static int sm2sig_signature_init(void *vpsm2ctx, void *ec,
141
    const OSSL_PARAM params[])
142
0
{
143
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
144
145
0
    if (!ossl_prov_is_running()
146
0
        || psm2ctx == NULL)
147
0
        return 0;
148
149
0
    if (ec == NULL && psm2ctx->ec == NULL) {
150
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
151
0
        return 0;
152
0
    }
153
154
0
    if (ec != NULL) {
155
0
        if (!EC_KEY_up_ref(ec))
156
0
            return 0;
157
0
        EC_KEY_free(psm2ctx->ec);
158
0
        psm2ctx->ec = ec;
159
0
    }
160
161
0
    return sm2sig_set_ctx_params(psm2ctx, params);
162
0
}
163
164
static int sm2sig_sign(void *vpsm2ctx, unsigned char *sig, size_t *siglen,
165
    size_t sigsize, const unsigned char *tbs, size_t tbslen)
166
0
{
167
0
    PROV_SM2_CTX *ctx = (PROV_SM2_CTX *)vpsm2ctx;
168
0
    int ret;
169
0
    unsigned int sltmp;
170
    /* SM2 uses ECDSA_size as well */
171
0
    size_t ecsize = ECDSA_size(ctx->ec);
172
173
0
    if (sig == NULL) {
174
0
        *siglen = ecsize;
175
0
        return 1;
176
0
    }
177
178
0
    if (sigsize < (size_t)ecsize)
179
0
        return 0;
180
181
0
    if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
182
0
        return 0;
183
184
0
    ret = ossl_sm2_internal_sign(tbs, (int)tbslen, sig, &sltmp, ctx->ec);
185
0
    if (ret <= 0)
186
0
        return 0;
187
188
0
    *siglen = sltmp;
189
0
    return 1;
190
0
}
191
192
static int sm2sig_verify(void *vpsm2ctx, const unsigned char *sig, size_t siglen,
193
    const unsigned char *tbs, size_t tbslen)
194
0
{
195
0
    PROV_SM2_CTX *ctx = (PROV_SM2_CTX *)vpsm2ctx;
196
197
0
    if (ctx->mdsize != 0 && tbslen != ctx->mdsize)
198
0
        return 0;
199
200
0
    return ossl_sm2_internal_verify(tbs, (int)tbslen, sig, (int)siglen, ctx->ec);
201
0
}
202
203
static void free_md(PROV_SM2_CTX *ctx)
204
0
{
205
0
    EVP_MD_CTX_free(ctx->mdctx);
206
0
    EVP_MD_free(ctx->md);
207
0
    ctx->mdctx = NULL;
208
0
    ctx->md = NULL;
209
0
}
210
211
static int sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname,
212
    void *ec, const OSSL_PARAM params[])
213
0
{
214
0
    PROV_SM2_CTX *ctx = (PROV_SM2_CTX *)vpsm2ctx;
215
0
    int md_nid;
216
0
    WPACKET pkt;
217
0
    int ret = 0;
218
0
    unsigned char *aid = NULL;
219
220
    /*
221
     * Each EVP_Digest{Sign,Verify}Init_ex(3) starts with fresh content, that
222
     * needs to recompute the "Z" digest.
223
     */
224
0
    ctx->flag_compute_z_digest = 1;
225
226
0
    if (!sm2sig_signature_init(vpsm2ctx, ec, params)
227
0
        || !sm2sig_set_mdname(ctx, mdname))
228
0
        return ret;
229
230
0
    if (ctx->mdctx == NULL) {
231
0
        ctx->mdctx = EVP_MD_CTX_new();
232
0
        if (ctx->mdctx == NULL)
233
0
            goto error;
234
0
    }
235
236
0
    md_nid = EVP_MD_get_type(ctx->md);
237
238
    /*
239
     * We do not care about DER writing errors.
240
     * All it really means is that for some reason, there's no
241
     * AlgorithmIdentifier to be had, but the operation itself is
242
     * still valid, just as long as it's not used to construct
243
     * anything that needs an AlgorithmIdentifier.
244
     */
245
0
    ctx->aid_len = 0;
246
0
    if (WPACKET_init_der(&pkt, ctx->aid_buf, sizeof(ctx->aid_buf))
247
0
        && ossl_DER_w_algorithmIdentifier_SM2_with_MD(&pkt, -1, ctx->ec, md_nid)
248
0
        && WPACKET_finish(&pkt)) {
249
0
        WPACKET_get_total_written(&pkt, &ctx->aid_len);
250
0
        aid = WPACKET_get_curr(&pkt);
251
0
    }
252
0
    WPACKET_cleanup(&pkt);
253
0
    if (aid != NULL && ctx->aid_len != 0)
254
0
        memmove(ctx->aid_buf, aid, ctx->aid_len);
255
256
0
    if (!EVP_DigestInit_ex2(ctx->mdctx, ctx->md, params))
257
0
        goto error;
258
259
0
    ret = 1;
260
261
0
error:
262
0
    return ret;
263
0
}
264
265
static int sm2sig_compute_z_digest(PROV_SM2_CTX *ctx)
266
0
{
267
0
    uint8_t *z = NULL;
268
0
    int ret = 1;
269
270
0
    if (ctx->flag_compute_z_digest) {
271
        /* Only do this once */
272
0
        ctx->flag_compute_z_digest = 0;
273
274
0
        if ((z = OPENSSL_zalloc(ctx->mdsize)) == NULL
275
            /* get hashed prefix 'z' of tbs message */
276
0
            || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len,
277
0
                ctx->ec)
278
0
            || !EVP_DigestUpdate(ctx->mdctx, z, ctx->mdsize))
279
0
            ret = 0;
280
0
        OPENSSL_free(z);
281
0
    }
282
283
0
    return ret;
284
0
}
285
286
int sm2sig_digest_signverify_update(void *vpsm2ctx, const unsigned char *data,
287
    size_t datalen)
288
0
{
289
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
290
291
0
    if (psm2ctx == NULL || psm2ctx->mdctx == NULL)
292
0
        return 0;
293
294
0
    return sm2sig_compute_z_digest(psm2ctx)
295
0
        && EVP_DigestUpdate(psm2ctx->mdctx, data, datalen);
296
0
}
297
298
int sm2sig_digest_sign_final(void *vpsm2ctx, unsigned char *sig, size_t *siglen,
299
    size_t sigsize)
300
0
{
301
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
302
0
    unsigned char digest[EVP_MAX_MD_SIZE];
303
0
    unsigned int dlen = 0;
304
305
0
    if (psm2ctx == NULL || psm2ctx->mdctx == NULL)
306
0
        return 0;
307
308
    /*
309
     * If sig is NULL then we're just finding out the sig size. Other fields
310
     * are ignored. Defer to sm2sig_sign.
311
     */
312
0
    if (sig != NULL) {
313
0
        if (!(sm2sig_compute_z_digest(psm2ctx)
314
0
                && EVP_DigestFinal_ex(psm2ctx->mdctx, digest, &dlen)))
315
0
            return 0;
316
0
    }
317
318
0
    return sm2sig_sign(vpsm2ctx, sig, siglen, sigsize, digest, (size_t)dlen);
319
0
}
320
321
int sm2sig_digest_verify_final(void *vpsm2ctx, const unsigned char *sig,
322
    size_t siglen)
323
0
{
324
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
325
0
    unsigned char digest[EVP_MAX_MD_SIZE];
326
0
    unsigned int dlen = 0;
327
0
    int md_size;
328
329
0
    if (psm2ctx == NULL || psm2ctx->mdctx == NULL)
330
0
        return 0;
331
332
0
    md_size = EVP_MD_get_size(psm2ctx->md);
333
0
    if (md_size <= 0 || md_size > (int)sizeof(digest))
334
0
        return 0;
335
336
0
    if (!(sm2sig_compute_z_digest(psm2ctx)
337
0
            && EVP_DigestFinal_ex(psm2ctx->mdctx, digest, &dlen)))
338
0
        return 0;
339
340
0
    return sm2sig_verify(vpsm2ctx, sig, siglen, digest, (size_t)dlen);
341
0
}
342
343
static void sm2sig_freectx(void *vpsm2ctx)
344
0
{
345
0
    PROV_SM2_CTX *ctx = (PROV_SM2_CTX *)vpsm2ctx;
346
347
0
    free_md(ctx);
348
0
    EC_KEY_free(ctx->ec);
349
0
    OPENSSL_free(ctx->propq);
350
0
    OPENSSL_free(ctx->id);
351
0
    OPENSSL_free(ctx);
352
0
}
353
354
static void *sm2sig_dupctx(void *vpsm2ctx)
355
0
{
356
0
    PROV_SM2_CTX *srcctx = (PROV_SM2_CTX *)vpsm2ctx;
357
0
    PROV_SM2_CTX *dstctx;
358
359
0
    dstctx = OPENSSL_zalloc(sizeof(*srcctx));
360
0
    if (dstctx == NULL)
361
0
        return NULL;
362
363
0
    *dstctx = *srcctx;
364
0
    dstctx->ec = NULL;
365
0
    dstctx->propq = NULL;
366
0
    dstctx->md = NULL;
367
0
    dstctx->mdctx = NULL;
368
0
    dstctx->id = NULL;
369
370
0
    if (srcctx->ec != NULL && !EC_KEY_up_ref(srcctx->ec))
371
0
        goto err;
372
0
    dstctx->ec = srcctx->ec;
373
374
0
    if (srcctx->propq != NULL) {
375
0
        dstctx->propq = OPENSSL_strdup(srcctx->propq);
376
0
        if (dstctx->propq == NULL)
377
0
            goto err;
378
0
    }
379
380
0
    if (srcctx->md != NULL && !EVP_MD_up_ref(srcctx->md))
381
0
        goto err;
382
0
    dstctx->md = srcctx->md;
383
384
0
    if (srcctx->mdctx != NULL) {
385
0
        dstctx->mdctx = EVP_MD_CTX_new();
386
0
        if (dstctx->mdctx == NULL
387
0
            || !EVP_MD_CTX_copy_ex(dstctx->mdctx, srcctx->mdctx))
388
0
            goto err;
389
0
    }
390
391
0
    if (srcctx->id != NULL) {
392
0
        dstctx->id = OPENSSL_malloc(srcctx->id_len);
393
0
        if (dstctx->id == NULL)
394
0
            goto err;
395
0
        dstctx->id_len = srcctx->id_len;
396
0
        memcpy(dstctx->id, srcctx->id, srcctx->id_len);
397
0
    }
398
399
0
    return dstctx;
400
0
err:
401
0
    sm2sig_freectx(dstctx);
402
0
    return NULL;
403
0
}
404
405
/* clang-format off */
406
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
407
#ifndef sm2sig_get_ctx_params_list
408
static const OSSL_PARAM sm2sig_get_ctx_params_list[] = {
409
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0),
410
    OSSL_PARAM_size_t(OSSL_SIGNATURE_PARAM_DIGEST_SIZE, NULL),
411
    OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
412
    OSSL_PARAM_END
413
};
414
#endif
415
416
#ifndef sm2sig_get_ctx_params_st
417
struct sm2sig_get_ctx_params_st {
418
    OSSL_PARAM *algid;
419
    OSSL_PARAM *digest;
420
    OSSL_PARAM *size;
421
};
422
#endif
423
424
#ifndef sm2sig_get_ctx_params_decoder
425
static int sm2sig_get_ctx_params_decoder
426
    (const OSSL_PARAM *p, struct sm2sig_get_ctx_params_st *r)
427
0
{
428
0
    const char *s;
429
430
0
    memset(r, 0, sizeof(*r));
431
0
    if (p != NULL)
432
0
        for (; (s = p->key) != NULL; p++)
433
0
            switch(s[0]) {
434
0
            default:
435
0
                break;
436
0
            case 'a':
437
0
                if (ossl_likely(strcmp("lgorithm-id", s + 1) == 0)) {
438
                    /* OSSL_SIGNATURE_PARAM_ALGORITHM_ID */
439
0
                    if (ossl_unlikely(r->algid != NULL)) {
440
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
441
0
                                       "param %s is repeated", s);
442
0
                        return 0;
443
0
                    }
444
0
                    r->algid = (OSSL_PARAM *)p;
445
0
                }
446
0
                break;
447
0
            case 'd':
448
0
                switch(s[1]) {
449
0
                default:
450
0
                    break;
451
0
                case 'i':
452
0
                    switch(s[2]) {
453
0
                    default:
454
0
                        break;
455
0
                    case 'g':
456
0
                        switch(s[3]) {
457
0
                        default:
458
0
                            break;
459
0
                        case 'e':
460
0
                            switch(s[4]) {
461
0
                            default:
462
0
                                break;
463
0
                            case 's':
464
0
                                switch(s[5]) {
465
0
                                default:
466
0
                                    break;
467
0
                                case 't':
468
0
                                    switch(s[6]) {
469
0
                                    default:
470
0
                                        break;
471
0
                                    case '-':
472
0
                                        if (ossl_likely(strcmp("size", s + 7) == 0)) {
473
                                            /* OSSL_SIGNATURE_PARAM_DIGEST_SIZE */
474
0
                                            if (ossl_unlikely(r->size != NULL)) {
475
0
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
476
0
                                                               "param %s is repeated", s);
477
0
                                                return 0;
478
0
                                            }
479
0
                                            r->size = (OSSL_PARAM *)p;
480
0
                                        }
481
0
                                        break;
482
0
                                    case '\0':
483
0
                                        if (ossl_unlikely(r->digest != NULL)) {
484
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
485
0
                                                           "param %s is repeated", s);
486
0
                                            return 0;
487
0
                                        }
488
0
                                        r->digest = (OSSL_PARAM *)p;
489
0
                                    }
490
0
                                }
491
0
                            }
492
0
                        }
493
0
                    }
494
0
                }
495
0
            }
496
0
    return 1;
497
0
}
498
#endif
499
/* End of machine generated */
500
/* clang-format on */
501
502
static int sm2sig_get_ctx_params(void *vpsm2ctx, OSSL_PARAM *params)
503
0
{
504
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
505
0
    struct sm2sig_get_ctx_params_st p;
506
507
0
    if (psm2ctx == NULL || !sm2sig_get_ctx_params_decoder(params, &p))
508
0
        return 0;
509
510
0
    if (p.algid != NULL
511
0
        && !OSSL_PARAM_set_octet_string(p.algid,
512
0
            psm2ctx->aid_len == 0 ? NULL : psm2ctx->aid_buf,
513
0
            psm2ctx->aid_len))
514
0
        return 0;
515
516
0
    if (p.size != NULL && !OSSL_PARAM_set_size_t(p.size, psm2ctx->mdsize))
517
0
        return 0;
518
519
0
    if (p.digest != NULL
520
0
        && !OSSL_PARAM_set_utf8_string(p.digest, psm2ctx->md == NULL ? psm2ctx->mdname : EVP_MD_get0_name(psm2ctx->md)))
521
0
        return 0;
522
523
0
    return 1;
524
0
}
525
526
static const OSSL_PARAM *sm2sig_gettable_ctx_params(ossl_unused void *vpsm2ctx,
527
    ossl_unused void *provctx)
528
0
{
529
0
    return sm2sig_get_ctx_params_list;
530
0
}
531
532
/* clang-format off */
533
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
534
#ifndef sm2sig_set_ctx_params_list
535
static const OSSL_PARAM sm2sig_set_ctx_params_list[] = {
536
    OSSL_PARAM_size_t(OSSL_SIGNATURE_PARAM_DIGEST_SIZE, NULL),
537
    OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
538
    OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_DIST_ID, NULL, 0),
539
    OSSL_PARAM_END
540
};
541
#endif
542
543
#ifndef sm2sig_set_ctx_params_st
544
struct sm2sig_set_ctx_params_st {
545
    OSSL_PARAM *digest;
546
    OSSL_PARAM *distid;
547
    OSSL_PARAM *size;
548
};
549
#endif
550
551
#ifndef sm2sig_set_ctx_params_decoder
552
static int sm2sig_set_ctx_params_decoder
553
    (const OSSL_PARAM *p, struct sm2sig_set_ctx_params_st *r)
554
0
{
555
0
    const char *s;
556
557
0
    memset(r, 0, sizeof(*r));
558
0
    if (p != NULL)
559
0
        for (; (s = p->key) != NULL; p++)
560
0
            switch(s[0]) {
561
0
            default:
562
0
                break;
563
0
            case 'd':
564
0
                switch(s[1]) {
565
0
                default:
566
0
                    break;
567
0
                case 'i':
568
0
                    switch(s[2]) {
569
0
                    default:
570
0
                        break;
571
0
                    case 'g':
572
0
                        switch(s[3]) {
573
0
                        default:
574
0
                            break;
575
0
                        case 'e':
576
0
                            switch(s[4]) {
577
0
                            default:
578
0
                                break;
579
0
                            case 's':
580
0
                                switch(s[5]) {
581
0
                                default:
582
0
                                    break;
583
0
                                case 't':
584
0
                                    switch(s[6]) {
585
0
                                    default:
586
0
                                        break;
587
0
                                    case '-':
588
0
                                        if (ossl_likely(strcmp("size", s + 7) == 0)) {
589
                                            /* OSSL_SIGNATURE_PARAM_DIGEST_SIZE */
590
0
                                            if (ossl_unlikely(r->size != NULL)) {
591
0
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
592
0
                                                               "param %s is repeated", s);
593
0
                                                return 0;
594
0
                                            }
595
0
                                            r->size = (OSSL_PARAM *)p;
596
0
                                        }
597
0
                                        break;
598
0
                                    case '\0':
599
0
                                        if (ossl_unlikely(r->digest != NULL)) {
600
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
601
0
                                                           "param %s is repeated", s);
602
0
                                            return 0;
603
0
                                        }
604
0
                                        r->digest = (OSSL_PARAM *)p;
605
0
                                    }
606
0
                                }
607
0
                            }
608
0
                        }
609
0
                        break;
610
0
                    case 's':
611
0
                        if (ossl_likely(strcmp("tid", s + 3) == 0)) {
612
                            /* OSSL_PKEY_PARAM_DIST_ID */
613
0
                            if (ossl_unlikely(r->distid != NULL)) {
614
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
615
0
                                               "param %s is repeated", s);
616
0
                                return 0;
617
0
                            }
618
0
                            r->distid = (OSSL_PARAM *)p;
619
0
                        }
620
0
                    }
621
0
                }
622
0
            }
623
0
    return 1;
624
0
}
625
#endif
626
/* End of machine generated */
627
/* clang-format on */
628
629
static int sm2sig_set_ctx_params(void *vpsm2ctx, const OSSL_PARAM params[])
630
0
{
631
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
632
0
    struct sm2sig_set_ctx_params_st p;
633
0
    size_t mdsize;
634
635
0
    if (psm2ctx == NULL || !sm2sig_set_ctx_params_decoder(params, &p))
636
0
        return 0;
637
638
0
    if (p.distid != NULL) {
639
0
        void *tmp_id = NULL;
640
0
        size_t tmp_idlen = 0;
641
642
        /*
643
         * If the 'z' digest has already been computed, the ID is set too late
644
         */
645
0
        if (!psm2ctx->flag_compute_z_digest)
646
0
            return 0;
647
648
0
        if (p.distid->data_size != 0
649
0
            && !OSSL_PARAM_get_octet_string(p.distid, &tmp_id, 0, &tmp_idlen))
650
0
            return 0;
651
0
        OPENSSL_free(psm2ctx->id);
652
0
        psm2ctx->id = tmp_id;
653
0
        psm2ctx->id_len = tmp_idlen;
654
0
    }
655
656
    /*
657
     * The following code checks that the size is the same as the SM3 digest
658
     * size returning an error otherwise.
659
     * If there is ever any different digest algorithm allowed with SM2
660
     * this needs to be adjusted accordingly.
661
     */
662
0
    if (p.size != NULL && (!OSSL_PARAM_get_size_t(p.size, &mdsize) || mdsize != psm2ctx->mdsize))
663
0
        return 0;
664
665
0
    if (p.digest != NULL) {
666
0
        char *mdname = NULL;
667
668
0
        if (!OSSL_PARAM_get_utf8_string(p.digest, &mdname, 0))
669
0
            return 0;
670
0
        if (!sm2sig_set_mdname(psm2ctx, mdname)) {
671
0
            OPENSSL_free(mdname);
672
0
            return 0;
673
0
        }
674
0
        OPENSSL_free(mdname);
675
0
    }
676
677
0
    return 1;
678
0
}
679
680
static const OSSL_PARAM *sm2sig_settable_ctx_params(ossl_unused void *vpsm2ctx,
681
    ossl_unused void *provctx)
682
6
{
683
6
    return sm2sig_set_ctx_params_list;
684
6
}
685
686
static int sm2sig_get_ctx_md_params(void *vpsm2ctx, OSSL_PARAM *params)
687
0
{
688
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
689
690
0
    if (psm2ctx->mdctx == NULL)
691
0
        return 0;
692
693
0
    return EVP_MD_CTX_get_params(psm2ctx->mdctx, params);
694
0
}
695
696
static const OSSL_PARAM *sm2sig_gettable_ctx_md_params(void *vpsm2ctx)
697
0
{
698
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
699
700
0
    if (psm2ctx->md == NULL)
701
0
        return 0;
702
703
0
    return EVP_MD_gettable_ctx_params(psm2ctx->md);
704
0
}
705
706
static int sm2sig_set_ctx_md_params(void *vpsm2ctx, const OSSL_PARAM params[])
707
0
{
708
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
709
710
0
    if (psm2ctx->mdctx == NULL)
711
0
        return 0;
712
713
0
    return EVP_MD_CTX_set_params(psm2ctx->mdctx, params);
714
0
}
715
716
static const OSSL_PARAM *sm2sig_settable_ctx_md_params(void *vpsm2ctx)
717
0
{
718
0
    PROV_SM2_CTX *psm2ctx = (PROV_SM2_CTX *)vpsm2ctx;
719
720
0
    if (psm2ctx->md == NULL)
721
0
        return 0;
722
723
0
    return EVP_MD_settable_ctx_params(psm2ctx->md);
724
0
}
725
726
const OSSL_DISPATCH ossl_sm2_signature_functions[] = {
727
    { OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))sm2sig_newctx },
728
    { OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))sm2sig_signature_init },
729
    { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))sm2sig_sign },
730
    { OSSL_FUNC_SIGNATURE_VERIFY_INIT, (void (*)(void))sm2sig_signature_init },
731
    { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))sm2sig_verify },
732
    { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,
733
        (void (*)(void))sm2sig_digest_signverify_init },
734
    { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE,
735
        (void (*)(void))sm2sig_digest_signverify_update },
736
    { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL,
737
        (void (*)(void))sm2sig_digest_sign_final },
738
    { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,
739
        (void (*)(void))sm2sig_digest_signverify_init },
740
    { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE,
741
        (void (*)(void))sm2sig_digest_signverify_update },
742
    { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL,
743
        (void (*)(void))sm2sig_digest_verify_final },
744
    { OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))sm2sig_freectx },
745
    { OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))sm2sig_dupctx },
746
    { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS, (void (*)(void))sm2sig_get_ctx_params },
747
    { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS,
748
        (void (*)(void))sm2sig_gettable_ctx_params },
749
    { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, (void (*)(void))sm2sig_set_ctx_params },
750
    { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS,
751
        (void (*)(void))sm2sig_settable_ctx_params },
752
    { OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS,
753
        (void (*)(void))sm2sig_get_ctx_md_params },
754
    { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS,
755
        (void (*)(void))sm2sig_gettable_ctx_md_params },
756
    { OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS,
757
        (void (*)(void))sm2sig_set_ctx_md_params },
758
    { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS,
759
        (void (*)(void))sm2sig_settable_ctx_md_params },
760
    OSSL_DISPATCH_END
761
};