| /* crypto/ecdsa/ecs_asn1.c */ |
| /* ==================================================================== |
| * Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
| * |
| * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * licensing@OpenSSL.org. |
| * |
| * 5. Products derived from this software may not be called "OpenSSL" |
| * nor may "OpenSSL" appear in their names without prior written |
| * permission of the OpenSSL Project. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| * ==================================================================== |
| * |
| * This product includes cryptographic software written by Eric Young |
| * (eay@cryptsoft.com). This product includes software written by Tim |
| * Hudson (tjh@cryptsoft.com). |
| * |
| */ |
| |
| #include "ecdsa.h" |
| #include "cryptlib.h" |
| #include <openssl/asn1.h> |
| #include <openssl/asn1t.h> |
| |
| typedef struct ecdsa_priv_key_st { |
| int version; |
| ECPKPARAMETERS *parameters; |
| ASN1_OBJECT *named_curve; |
| ASN1_OCTET_STRING *pub_key; |
| BIGNUM *priv_key; |
| } ECDSAPrivateKey; |
| |
| ASN1_SEQUENCE(ECDSA_SIG) = { |
| ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM), |
| ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM) |
| } ASN1_SEQUENCE_END(ECDSA_SIG) |
| |
| DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG) |
| DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG) |
| IMPLEMENT_ASN1_FUNCTIONS_const(ECDSA_SIG) |
| |
| ASN1_SEQUENCE(ECDSAPrivateKey) = { |
| ASN1_SIMPLE(ECDSAPrivateKey, version, LONG), |
| ASN1_SIMPLE(ECDSAPrivateKey, parameters, ECPKPARAMETERS), |
| ASN1_SIMPLE(ECDSAPrivateKey, pub_key, ASN1_OCTET_STRING), |
| ASN1_SIMPLE(ECDSAPrivateKey, priv_key, BIGNUM) |
| } ASN1_SEQUENCE_END(ECDSAPrivateKey) |
| |
| DECLARE_ASN1_FUNCTIONS_const(ECDSAPrivateKey) |
| DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSAPrivateKey, ecdsaPrivateKey) |
| IMPLEMENT_ASN1_ALLOC_FUNCTIONS_fname(ECDSAPrivateKey, ECDSAPrivateKey, ECDSAPrivateKey) |
| IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(ECDSAPrivateKey, ECDSAPrivateKey, ecdsaPrivateKey) |
| |
| int i2d_ECDSAParameters(ECDSA *a, unsigned char **out) |
| { |
| if (a == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPARAMETERS, |
| ERR_R_PASSED_NULL_PARAMETER); |
| return 0; |
| } |
| return i2d_ECPKParameters(a->group, out); |
| } |
| |
| ECDSA *d2i_ECDSAParameters(ECDSA **a, const unsigned char **in, long len) |
| { |
| EC_GROUP *group; |
| ECDSA *ret; |
| |
| if (in == NULL || *in == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPARAMETERS, |
| ERR_R_PASSED_NULL_PARAMETER); |
| return NULL; |
| } |
| |
| group = d2i_ECPKParameters(NULL, in, len); |
| |
| if (group == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPARAMETERS, |
| ERR_R_EC_LIB); |
| return NULL; |
| } |
| |
| if (a == NULL || *a == NULL) |
| { |
| if ((ret = ECDSA_new()) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPARAMETERS, |
| ERR_R_MALLOC_FAILURE); |
| return NULL; |
| } |
| if (a) |
| *a = ret; |
| } |
| else |
| ret = *a; |
| |
| if (ret->group) |
| EC_GROUP_clear_free(ret->group); |
| |
| ret->group = group; |
| |
| return ret; |
| } |
| |
| ECDSA *d2i_ECDSAPrivateKey(ECDSA **a, const unsigned char **in, long len) |
| { |
| int ok=0; |
| ECDSA *ret=NULL; |
| ECDSAPrivateKey *priv_key=NULL; |
| |
| if ((priv_key = ECDSAPrivateKey_new()) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
| return NULL; |
| } |
| |
| if ((priv_key = d2i_ecdsaPrivateKey(&priv_key, in, len)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, |
| ECDSA_R_D2I_ECDSA_PRIVATEKEY_FAILURE); |
| ECDSAPrivateKey_free(priv_key); |
| return NULL; |
| } |
| |
| if (a == NULL || *a == NULL) |
| { |
| if ((ret = ECDSA_new()) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, |
| ERR_R_MALLOC_FAILURE); |
| goto err; |
| } |
| if (a) |
| *a = ret; |
| } |
| else |
| ret = *a; |
| |
| if (ret->group) |
| EC_GROUP_clear_free(ret->group); |
| |
| ret->group = EC_ASN1_pkparameters2group(priv_key->parameters); |
| if (ret->group == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| goto err; |
| } |
| |
| ret->version = priv_key->version; |
| if (priv_key->priv_key) |
| { |
| if ((ret->priv_key = BN_dup(priv_key->priv_key)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, |
| ERR_R_BN_LIB); |
| goto err; |
| } |
| } |
| else |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, |
| ECDSA_R_MISSING_PRIVATE_KEY); |
| goto err; |
| } |
| |
| if ((ret->pub_key = EC_POINT_new(ret->group)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| goto err; |
| } |
| |
| if (!EC_POINT_oct2point(ret->group, ret->pub_key, |
| priv_key->pub_key->data, priv_key->pub_key->length, NULL)) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| goto err; |
| } |
| |
| ok = 1; |
| |
| err : if (!ok) |
| { |
| if (ret) ECDSA_free(ret); |
| ret = NULL; |
| } |
| if (priv_key) |
| ECDSAPrivateKey_free(priv_key); |
| return(ret); |
| } |
| |
| int i2d_ECDSAPrivateKey(ECDSA *a, unsigned char **out) |
| { |
| int ret=0, ok=0; |
| unsigned char *buffer=NULL; |
| size_t buf_len=0; |
| ECDSAPrivateKey *priv_key=NULL; |
| |
| if (a == NULL || a->group == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, |
| ERR_R_PASSED_NULL_PARAMETER); |
| goto err; |
| } |
| |
| if ((priv_key = ECDSAPrivateKey_new()) == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, |
| ERR_R_MALLOC_FAILURE); |
| goto err; |
| } |
| |
| if ((priv_key->parameters = EC_ASN1_group2pkparameters(a->group, |
| priv_key->parameters)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| goto err; |
| } |
| |
| priv_key->version = a->version; |
| |
| if (BN_copy(priv_key->priv_key, a->priv_key) == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, ERR_R_BN_LIB); |
| goto err; |
| } |
| |
| buf_len = EC_POINT_point2oct(a->group, a->pub_key, |
| ECDSA_get_conversion_form(a), NULL, 0, NULL); |
| if ((buffer = OPENSSL_malloc(buf_len)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
| goto err; |
| } |
| if (!EC_POINT_point2oct(a->group, a->pub_key, |
| ECDSA_get_conversion_form(a), buffer, buf_len, NULL)) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| goto err; |
| } |
| if (!M_ASN1_OCTET_STRING_set(priv_key->pub_key, buffer, buf_len)) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, ERR_R_ASN1_LIB); |
| goto err; |
| } |
| if ((ret = i2d_ecdsaPrivateKey(priv_key, out)) == 0) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPRIVATEKEY, |
| ECDSA_R_I2D_ECDSA_PRIVATEKEY); |
| goto err; |
| } |
| ok=1; |
| |
| err: |
| if (buffer) |
| OPENSSL_free(buffer); |
| if (priv_key) |
| ECDSAPrivateKey_free(priv_key); |
| return(ok?ret:0); |
| } |
| |
| |
| ECDSA *ECDSAPublicKey_set_octet_string(ECDSA **a, const unsigned char **in, long len) |
| { |
| ECDSA *ret=NULL; |
| |
| if (a == NULL || (*a) == NULL || (*a)->group == NULL) |
| { |
| /* sorry, but a EC_GROUP-structur is necessary |
| * to set the public key */ |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ECDSA_R_MISSING_PARAMETERS); |
| return 0; |
| } |
| ret = *a; |
| if (ret->pub_key == NULL && (ret->pub_key = EC_POINT_new(ret->group)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
| return 0; |
| } |
| if (!EC_POINT_oct2point(ret->group, ret->pub_key, *in, len, NULL)) |
| { |
| ECDSAerr(ECDSA_F_D2I_ECDSAPRIVATEKEY, ERR_R_EC_LIB); |
| return 0; |
| } |
| ECDSA_set_conversion_form(ret, (point_conversion_form_t)(*in[0] & ~0x01)); |
| return ret; |
| } |
| |
| int ECDSAPublicKey_get_octet_string(ECDSA *a, unsigned char **out) |
| { |
| size_t buf_len=0; |
| |
| if (a == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPUBLICKEY, ECDSA_R_MISSING_PARAMETERS); |
| return 0; |
| } |
| buf_len = EC_POINT_point2oct(a->group, a->pub_key, |
| ECDSA_get_conversion_form(a), NULL, 0, NULL); |
| if (out == NULL || buf_len == 0) |
| /* out == NULL => just return the length of the octet string */ |
| return buf_len; |
| if (*out == NULL) |
| if ((*out = OPENSSL_malloc(buf_len)) == NULL) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPUBLICKEY, ERR_R_MALLOC_FAILURE); |
| return 0; |
| } |
| if (!EC_POINT_point2oct(a->group, a->pub_key, ECDSA_get_conversion_form(a), |
| *out, buf_len, NULL)) |
| { |
| ECDSAerr(ECDSA_F_I2D_ECDSAPUBLICKEY, ERR_R_EC_LIB); |
| OPENSSL_free(*out); |
| *out = NULL; |
| return 0; |
| } |
| return buf_len; |
| } |