diff options
author | tb <> | 2022-01-14 08:38:06 +0000 |
---|---|---|
committer | tb <> | 2022-01-14 08:38:06 +0000 |
commit | 2a284011fbab2624ef09302d0c806c76dd42b2c9 (patch) | |
tree | c82726f940ee4796d12475c7295f11404867aae9 /src/lib/libcrypto/evp/p_sign.c | |
parent | 385790bbe258a0de5b6842a60a07a834e590fe1a (diff) | |
download | openbsd-2a284011fbab2624ef09302d0c806c76dd42b2c9.tar.gz openbsd-2a284011fbab2624ef09302d0c806c76dd42b2c9.tar.bz2 openbsd-2a284011fbab2624ef09302d0c806c76dd42b2c9.zip |
Remove legacy sign/verify from EVP_MD.
This removes m_dss.c, m_dss1.c, and m_ecdsa.c and the corresponding
public API EVP_{dss,dss1,ecdsa}().
This is basically the following OpenSSL commit. The mentioned change in
RSA is already present in rsa/rsa_pmeth.c.
ok inoguchi jsing
commit 7f572e958b13041056f377a62d3219633cfb1e8a
Author: Dr. Stephen Henson <steve@openssl.org>
Date: Wed Dec 2 13:57:04 2015 +0000
Remove legacy sign/verify from EVP_MD.
Remove sign/verify and required_pkey_type fields of EVP_MD: these are a
legacy from when digests were linked to public key types. All signing is
now handled by the corresponding EVP_PKEY_METHOD.
Only allow supported digest types in RSA EVP_PKEY_METHOD: other algorithms
already block unsupported types.
Remove now obsolete EVP_dss1() and EVP_ecdsa().
Reviewed-by: Richard Levitte <levitte@openssl.org>
Plus OpenSSL commit 625a9baf11c1dd94f17e5876b6ee8d6271b3921d for m_dss.c
Diffstat (limited to 'src/lib/libcrypto/evp/p_sign.c')
-rw-r--r-- | src/lib/libcrypto/evp/p_sign.c | 57 |
1 files changed, 18 insertions, 39 deletions
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index 34dafd87fe..1e33cfbe7f 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p_sign.c,v 1.15 2021/12/12 21:30:13 tb Exp $ */ | 1 | /* $OpenBSD: p_sign.c,v 1.16 2022/01/14 08:38:06 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -71,9 +71,10 @@ EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
71 | { | 71 | { |
72 | unsigned char m[EVP_MAX_MD_SIZE]; | 72 | unsigned char m[EVP_MAX_MD_SIZE]; |
73 | unsigned int m_len; | 73 | unsigned int m_len; |
74 | int i = 0, ok = 0, v; | ||
75 | EVP_MD_CTX tmp_ctx; | 74 | EVP_MD_CTX tmp_ctx; |
76 | EVP_PKEY_CTX *pkctx = NULL; | 75 | EVP_PKEY_CTX *pkctx = NULL; |
76 | size_t sltmp; | ||
77 | int ret = 0; | ||
77 | 78 | ||
78 | *siglen = 0; | 79 | *siglen = 0; |
79 | EVP_MD_CTX_init(&tmp_ctx); | 80 | EVP_MD_CTX_init(&tmp_ctx); |
@@ -83,43 +84,21 @@ EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
83 | goto err; | 84 | goto err; |
84 | EVP_MD_CTX_cleanup(&tmp_ctx); | 85 | EVP_MD_CTX_cleanup(&tmp_ctx); |
85 | 86 | ||
86 | if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) { | 87 | sltmp = (size_t)EVP_PKEY_size(pkey); |
87 | size_t sltmp = (size_t)EVP_PKEY_size(pkey); | ||
88 | i = 0; | ||
89 | pkctx = EVP_PKEY_CTX_new(pkey, NULL); | ||
90 | if (!pkctx) | ||
91 | goto err; | ||
92 | if (EVP_PKEY_sign_init(pkctx) <= 0) | ||
93 | goto err; | ||
94 | if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) | ||
95 | goto err; | ||
96 | if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) | ||
97 | goto err; | ||
98 | *siglen = sltmp; | ||
99 | i = 1; | ||
100 | err: | ||
101 | EVP_PKEY_CTX_free(pkctx); | ||
102 | return i; | ||
103 | } | ||
104 | 88 | ||
105 | for (i = 0; i < 4; i++) { | 89 | if ((pkctx = EVP_PKEY_CTX_new(pkey, NULL)) == NULL) |
106 | v = ctx->digest->required_pkey_type[i]; | 90 | goto err; |
107 | if (v == 0) | 91 | if (EVP_PKEY_sign_init(pkctx) <= 0) |
108 | break; | 92 | goto err; |
109 | if (pkey->type == v) { | 93 | if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) |
110 | ok = 1; | 94 | goto err; |
111 | break; | 95 | if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) |
112 | } | 96 | goto err; |
113 | } | 97 | *siglen = sltmp; |
114 | if (!ok) { | 98 | |
115 | EVPerror(EVP_R_WRONG_PUBLIC_KEY_TYPE); | 99 | ret = 1; |
116 | return (0); | ||
117 | } | ||
118 | 100 | ||
119 | if (ctx->digest->sign == NULL) { | 101 | err: |
120 | EVPerror(EVP_R_NO_SIGN_FUNCTION_CONFIGURED); | 102 | EVP_PKEY_CTX_free(pkctx); |
121 | return (0); | 103 | return ret; |
122 | } | ||
123 | return(ctx->digest->sign(ctx->digest->type, m, m_len, sigret, siglen, | ||
124 | pkey->pkey.ptr)); | ||
125 | } | 104 | } |