| /* |
| * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| /* |
| * A simple ASN.1 DER encoder/decoder for DSA-Sig-Value and ECDSA-Sig-Value. |
| * |
| * DSA-Sig-Value ::= SEQUENCE { |
| * r INTEGER, |
| * s INTEGER |
| * } |
| * |
| * ECDSA-Sig-Value ::= SEQUENCE { |
| * r INTEGER, |
| * s INTEGER |
| * } |
| */ |
| |
| #include <openssl/crypto.h> |
| #include <openssl/bn.h> |
| #include "crypto/asn1_dsa.h" |
| #include "internal/packet.h" |
| |
| #define ID_SEQUENCE 0x30 |
| #define ID_INTEGER 0x02 |
| |
| /* |
| * Outputs the encoding of the length octets for a DER value with a content |
| * length of cont_len bytes to pkt. The maximum supported content length is |
| * 65535 (0xffff) bytes. |
| * |
| * Returns 1 on success or 0 on error. |
| */ |
| int ossl_encode_der_length(WPACKET *pkt, size_t cont_len) |
| { |
| if (cont_len > 0xffff) |
| return 0; /* Too large for supported length encodings */ |
| |
| if (cont_len > 0xff) { |
| if (!WPACKET_put_bytes_u8(pkt, 0x82) |
| || !WPACKET_put_bytes_u16(pkt, cont_len)) |
| return 0; |
| } else { |
| if (cont_len > 0x7f |
| && !WPACKET_put_bytes_u8(pkt, 0x81)) |
| return 0; |
| if (!WPACKET_put_bytes_u8(pkt, cont_len)) |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| /* |
| * Outputs the DER encoding of a positive ASN.1 INTEGER to pkt. |
| * |
| * Results in an error if n is negative or too large. |
| * |
| * Returns 1 on success or 0 on error. |
| */ |
| int ossl_encode_der_integer(WPACKET *pkt, const BIGNUM *n) |
| { |
| unsigned char *bnbytes; |
| size_t cont_len; |
| |
| if (BN_is_negative(n)) |
| return 0; |
| |
| /* |
| * Calculate the ASN.1 INTEGER DER content length for n. |
| * This is the number of whole bytes required to represent n (i.e. rounded |
| * down), plus one. |
| * If n is zero then the content is a single zero byte (length = 1). |
| * If the number of bits of n is a multiple of 8 then an extra zero padding |
| * byte is included to ensure that the value is still treated as positive |
| * in the INTEGER two's complement representation. |
| */ |
| cont_len = BN_num_bits(n) / 8 + 1; |
| |
| if (!WPACKET_start_sub_packet(pkt) |
| || !WPACKET_put_bytes_u8(pkt, ID_INTEGER) |
| || !ossl_encode_der_length(pkt, cont_len) |
| || !WPACKET_allocate_bytes(pkt, cont_len, &bnbytes) |
| || !WPACKET_close(pkt)) |
| return 0; |
| |
| if (bnbytes != NULL |
| && BN_bn2binpad(n, bnbytes, (int)cont_len) != (int)cont_len) |
| return 0; |
| |
| return 1; |
| } |
| |
| /* |
| * Outputs the DER encoding of a DSA-Sig-Value or ECDSA-Sig-Value to pkt. pkt |
| * may be initialised with a NULL buffer which enables pkt to be used to |
| * calculate how many bytes would be needed. |
| * |
| * Returns 1 on success or 0 on error. |
| */ |
| int ossl_encode_der_dsa_sig(WPACKET *pkt, const BIGNUM *r, const BIGNUM *s) |
| { |
| WPACKET tmppkt, *dummypkt; |
| size_t cont_len; |
| int isnull = WPACKET_is_null_buf(pkt); |
| |
| if (!WPACKET_start_sub_packet(pkt)) |
| return 0; |
| |
| if (!isnull) { |
| if (!WPACKET_init_null(&tmppkt, 0)) |
| return 0; |
| dummypkt = &tmppkt; |
| } else { |
| /* If the input packet has a NULL buffer, we don't need a dummy packet */ |
| dummypkt = pkt; |
| } |
| |
| /* Calculate the content length */ |
| if (!ossl_encode_der_integer(dummypkt, r) |
| || !ossl_encode_der_integer(dummypkt, s) |
| || !WPACKET_get_length(dummypkt, &cont_len) |
| || (!isnull && !WPACKET_finish(dummypkt))) { |
| if (!isnull) |
| WPACKET_cleanup(dummypkt); |
| return 0; |
| } |
| |
| /* Add the tag and length bytes */ |
| if (!WPACKET_put_bytes_u8(pkt, ID_SEQUENCE) |
| || !ossl_encode_der_length(pkt, cont_len) |
| /* |
| * Really encode the integers. We already wrote to the main pkt |
| * if it had a NULL buffer, so don't do it again |
| */ |
| || (!isnull && !ossl_encode_der_integer(pkt, r)) |
| || (!isnull && !ossl_encode_der_integer(pkt, s)) |
| || !WPACKET_close(pkt)) |
| return 0; |
| |
| return 1; |
| } |
| |
| /* |
| * Decodes the DER length octets in pkt and initialises subpkt with the |
| * following bytes of that length. |
| * |
| * Returns 1 on success or 0 on failure. |
| */ |
| int ossl_decode_der_length(PACKET *pkt, PACKET *subpkt) |
| { |
| unsigned int byte; |
| |
| if (!PACKET_get_1(pkt, &byte)) |
| return 0; |
| |
| if (byte < 0x80) |
| return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); |
| if (byte == 0x81) |
| return PACKET_get_length_prefixed_1(pkt, subpkt); |
| if (byte == 0x82) |
| return PACKET_get_length_prefixed_2(pkt, subpkt); |
| |
| /* Too large, invalid, or not DER. */ |
| return 0; |
| } |
| |
| /* |
| * Decodes a single ASN.1 INTEGER value from pkt, which must be DER encoded, |
| * and updates n with the decoded value. |
| * |
| * The BIGNUM, n, must have already been allocated by calling BN_new(). |
| * pkt must not be NULL. |
| * |
| * An attempt to consume more than len bytes results in an error. |
| * Returns 1 on success or 0 on error. |
| * |
| * If the PACKET is supposed to only contain a single INTEGER value with no |
| * trailing garbage then it is up to the caller to verify that all bytes |
| * were consumed. |
| */ |
| int ossl_decode_der_integer(PACKET *pkt, BIGNUM *n) |
| { |
| PACKET contpkt, tmppkt; |
| unsigned int tag, tmp; |
| |
| /* Check we have an integer and get the content bytes */ |
| if (!PACKET_get_1(pkt, &tag) |
| || tag != ID_INTEGER |
| || !ossl_decode_der_length(pkt, &contpkt)) |
| return 0; |
| |
| /* Peek ahead at the first bytes to check for proper encoding */ |
| tmppkt = contpkt; |
| /* The INTEGER must be positive */ |
| if (!PACKET_get_1(&tmppkt, &tmp) |
| || (tmp & 0x80) != 0) |
| return 0; |
| /* If there a zero padding byte the next byte must have the msb set */ |
| if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) { |
| if (!PACKET_get_1(&tmppkt, &tmp) |
| || (tmp & 0x80) == 0) |
| return 0; |
| } |
| |
| if (BN_bin2bn(PACKET_data(&contpkt), |
| (int)PACKET_remaining(&contpkt), n) == NULL) |
| return 0; |
| |
| return 1; |
| } |
| |
| /* |
| * Decodes a single DSA-Sig-Value or ECDSA-Sig-Value from *ppin, which must be |
| * DER encoded, updates r and s with the decoded values, and increments *ppin |
| * past the data that was consumed. |
| * |
| * The BIGNUMs, r and s, must have already been allocated by calls to BN_new(). |
| * ppin and *ppin must not be NULL. |
| * |
| * An attempt to consume more than len bytes results in an error. |
| * Returns the number of bytes of input consumed or 0 if an error occurs. |
| * |
| * If the buffer is supposed to only contain a single [EC]DSA-Sig-Value with no |
| * trailing garbage then it is up to the caller to verify that all bytes |
| * were consumed. |
| */ |
| size_t ossl_decode_der_dsa_sig(BIGNUM *r, BIGNUM *s, |
| const unsigned char **ppin, size_t len) |
| { |
| size_t consumed; |
| PACKET pkt, contpkt; |
| unsigned int tag; |
| |
| if (!PACKET_buf_init(&pkt, *ppin, len) |
| || !PACKET_get_1(&pkt, &tag) |
| || tag != ID_SEQUENCE |
| || !ossl_decode_der_length(&pkt, &contpkt) |
| || !ossl_decode_der_integer(&contpkt, r) |
| || !ossl_decode_der_integer(&contpkt, s) |
| || PACKET_remaining(&contpkt) != 0) |
| return 0; |
| |
| consumed = PACKET_data(&pkt) - *ppin; |
| *ppin += consumed; |
| return consumed; |
| } |