1/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay@cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay@cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57#include <openssl/asn1.h> 58#include <openssl/digest.h> 59#include <openssl/err.h> 60#include <openssl/evp.h> 61#include <openssl/mem.h> 62#include <openssl/obj.h> 63#include <openssl/x509.h> 64 65#include "../evp/internal.h" 66 67 68/* TODO(fork): this code appears to be dead. */ 69#if 0 70#ifndef NO_ASN1_OLD 71 72int ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, 73 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 74 const EVP_MD *type) 75 { 76 EVP_MD_CTX ctx; 77 unsigned char *p,*buf_in=NULL,*buf_out=NULL; 78 int i,inl=0,outl=0,outll=0; 79 X509_ALGOR *a; 80 81 EVP_MD_CTX_init(&ctx); 82 for (i=0; i<2; i++) 83 { 84 if (i == 0) 85 a=algor1; 86 else 87 a=algor2; 88 if (a == NULL) continue; 89 if (type->pkey_type == NID_dsaWithSHA1) 90 { 91 /* special case: RFC 2459 tells us to omit 'parameters' 92 * with id-dsa-with-sha1 */ 93 ASN1_TYPE_free(a->parameter); 94 a->parameter = NULL; 95 } 96 else if ((a->parameter == NULL) || 97 (a->parameter->type != V_ASN1_NULL)) 98 { 99 ASN1_TYPE_free(a->parameter); 100 if ((a->parameter=ASN1_TYPE_new()) == NULL) goto err; 101 a->parameter->type=V_ASN1_NULL; 102 } 103 ASN1_OBJECT_free(a->algorithm); 104 a->algorithm=OBJ_nid2obj(type->pkey_type); 105 if (a->algorithm == NULL) 106 { 107 OPENSSL_PUT_ERROR(ASN1, XXX, ASN1_R_UNKNOWN_OBJECT_TYPE); 108 goto err; 109 } 110 if (a->algorithm->length == 0) 111 { 112 OPENSSL_PUT_ERROR(ASN1, XXX, ASN1_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD); 113 goto err; 114 } 115 } 116 inl=i2d(data,NULL); 117 buf_in=(unsigned char *)OPENSSL_malloc((unsigned int)inl); 118 outll=outl=EVP_PKEY_size(pkey); 119 buf_out=(unsigned char *)OPENSSL_malloc((unsigned int)outl); 120 if ((buf_in == NULL) || (buf_out == NULL)) 121 { 122 outl=0; 123 OPENSSL_PUT_ERROR(ASN1, XXX, ERR_R_MALLOC_FAILURE); 124 goto err; 125 } 126 p=buf_in; 127 128 i2d(data,&p); 129 if (!EVP_SignInit_ex(&ctx,type, NULL) 130 || !EVP_SignUpdate(&ctx,(unsigned char *)buf_in,inl) 131 || !EVP_SignFinal(&ctx,(unsigned char *)buf_out, 132 (unsigned int *)&outl,pkey)) 133 { 134 outl=0; 135 OPENSSL_PUT_ERROR(ASN1, XXX, ERR_R_EVP_LIB); 136 goto err; 137 } 138 if (signature->data != NULL) OPENSSL_free(signature->data); 139 signature->data=buf_out; 140 buf_out=NULL; 141 signature->length=outl; 142 /* In the interests of compatibility, I'll make sure that 143 * the bit string has a 'not-used bits' value of 0 144 */ 145 signature->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 146 signature->flags|=ASN1_STRING_FLAG_BITS_LEFT; 147err: 148 EVP_MD_CTX_cleanup(&ctx); 149 if (buf_in != NULL) 150 { OPENSSL_cleanse((char *)buf_in,(unsigned int)inl); OPENSSL_free(buf_in); } 151 if (buf_out != NULL) 152 { OPENSSL_cleanse((char *)buf_out,outll); OPENSSL_free(buf_out); } 153 return(outl); 154 } 155 156#endif 157#endif 158 159int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, 160 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, 161 const EVP_MD *type) 162 { 163 EVP_MD_CTX ctx; 164 EVP_MD_CTX_init(&ctx); 165 if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) 166 { 167 EVP_MD_CTX_cleanup(&ctx); 168 return 0; 169 } 170 return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx); 171 } 172 173 174int ASN1_item_sign_ctx(const ASN1_ITEM *it, 175 X509_ALGOR *algor1, X509_ALGOR *algor2, 176 ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx) 177 { 178 const EVP_MD *type; 179 EVP_PKEY *pkey; 180 unsigned char *buf_in=NULL,*buf_out=NULL; 181 size_t inl=0,outl=0,outll=0; 182 int signid, paramtype; 183 int rv; 184 185 type = EVP_MD_CTX_md(ctx); 186 pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); 187 188 if (!type || !pkey) 189 { 190 OPENSSL_PUT_ERROR(X509, ASN1_item_sign_ctx, X509_R_CONTEXT_NOT_INITIALISED); 191 return 0; 192 } 193 194 if (pkey->ameth->item_sign) 195 { 196 rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2, 197 signature); 198 if (rv == 1) 199 outl = signature->length; 200 /* Return value meanings: 201 * <=0: error. 202 * 1: method does everything. 203 * 2: carry on as normal. 204 * 3: ASN1 method sets algorithm identifiers: just sign. 205 */ 206 if (rv <= 0) 207 OPENSSL_PUT_ERROR(X509, ASN1_item_sign_ctx, ERR_R_EVP_LIB); 208 if (rv <= 1) 209 goto err; 210 } 211 else 212 rv = 2; 213 214 if (rv == 2) 215 { 216 /* TODO(fork): EVP_MD_FLAG_PKEY_METHOD_SIGNATURE seems to mean 217 * "is SHA". */ 218 if (!pkey->ameth || 219 !OBJ_find_sigid_by_algs(&signid, 220 EVP_MD_type(type), 221 pkey->ameth->pkey_id)) 222 { 223 OPENSSL_PUT_ERROR(X509, ASN1_item_sign_ctx, X509_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED); 224 return 0; 225 } 226 227 if (pkey->ameth->pkey_flags & ASN1_PKEY_SIGPARAM_NULL) 228 paramtype = V_ASN1_NULL; 229 else 230 paramtype = V_ASN1_UNDEF; 231 232 if (algor1) 233 X509_ALGOR_set0(algor1, OBJ_nid2obj(signid), paramtype, NULL); 234 if (algor2) 235 X509_ALGOR_set0(algor2, OBJ_nid2obj(signid), paramtype, NULL); 236 237 } 238 239 inl=ASN1_item_i2d(asn,&buf_in, it); 240 outll=outl=EVP_PKEY_size(pkey); 241 buf_out=OPENSSL_malloc((unsigned int)outl); 242 if ((buf_in == NULL) || (buf_out == NULL)) 243 { 244 outl=0; 245 OPENSSL_PUT_ERROR(X509, ASN1_item_sign_ctx, ERR_R_MALLOC_FAILURE); 246 goto err; 247 } 248 249 if (!EVP_DigestSignUpdate(ctx, buf_in, inl) 250 || !EVP_DigestSignFinal(ctx, buf_out, &outl)) 251 { 252 outl=0; 253 OPENSSL_PUT_ERROR(X509, ASN1_item_sign_ctx, ERR_R_EVP_LIB); 254 goto err; 255 } 256 if (signature->data != NULL) OPENSSL_free(signature->data); 257 signature->data=buf_out; 258 buf_out=NULL; 259 signature->length=outl; 260 /* In the interests of compatibility, I'll make sure that 261 * the bit string has a 'not-used bits' value of 0 262 */ 263 signature->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 264 signature->flags|=ASN1_STRING_FLAG_BITS_LEFT; 265err: 266 EVP_MD_CTX_cleanup(ctx); 267 if (buf_in != NULL) 268 { OPENSSL_cleanse((char *)buf_in,(unsigned int)inl); OPENSSL_free(buf_in); } 269 if (buf_out != NULL) 270 { OPENSSL_cleanse((char *)buf_out,outll); OPENSSL_free(buf_out); } 271 return(outl); 272 } 273