diff options
Diffstat (limited to 'src/lib/libcrypto/ecdsa')
-rw-r--r-- | src/lib/libcrypto/ecdsa/Makefile | 142 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecdsa.h | 271 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecdsatest.c | 500 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_asn1.c | 67 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_err.c | 104 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_lib.c | 261 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_locl.h | 107 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_ossl.c | 478 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_sign.c | 104 | ||||
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_vrf.c | 96 |
10 files changed, 2130 insertions, 0 deletions
diff --git a/src/lib/libcrypto/ecdsa/Makefile b/src/lib/libcrypto/ecdsa/Makefile new file mode 100644 index 0000000000..4865f3c8d6 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/Makefile | |||
@@ -0,0 +1,142 @@ | |||
1 | # | ||
2 | # crypto/ecdsa/Makefile | ||
3 | # | ||
4 | |||
5 | DIR= ecdsa | ||
6 | TOP= ../.. | ||
7 | CC= cc | ||
8 | INCLUDES= -I.. -I$(TOP) -I../../include | ||
9 | CFLAG=-g -Wall | ||
10 | MAKEFILE= Makefile | ||
11 | AR= ar r | ||
12 | |||
13 | CFLAGS= $(INCLUDES) $(CFLAG) | ||
14 | |||
15 | GENERAL=Makefile | ||
16 | TEST=ecdsatest.c | ||
17 | APPS= | ||
18 | |||
19 | LIB=$(TOP)/libcrypto.a | ||
20 | LIBSRC= ecs_lib.c ecs_asn1.c ecs_ossl.c ecs_sign.c ecs_vrf.c ecs_err.c | ||
21 | |||
22 | LIBOBJ= ecs_lib.o ecs_asn1.o ecs_ossl.o ecs_sign.o ecs_vrf.o ecs_err.o | ||
23 | |||
24 | SRC= $(LIBSRC) | ||
25 | |||
26 | EXHEADER= ecdsa.h | ||
27 | HEADER= ecs_locl.h $(EXHEADER) | ||
28 | |||
29 | ALL= $(GENERAL) $(SRC) $(HEADER) | ||
30 | |||
31 | top: | ||
32 | (cd ../..; $(MAKE) DIRS=crypto SDIRS=$(DIR) sub_all) | ||
33 | |||
34 | all: lib | ||
35 | |||
36 | lib: $(LIBOBJ) | ||
37 | $(ARX) $(LIB) $(LIBOBJ) | ||
38 | $(RANLIB) $(LIB) || echo Never mind. | ||
39 | @touch lib | ||
40 | |||
41 | files: | ||
42 | $(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO | ||
43 | |||
44 | links: | ||
45 | @$(PERL) $(TOP)/util/mklink.pl ../../include/openssl $(EXHEADER) | ||
46 | @$(PERL) $(TOP)/util/mklink.pl ../../test $(TEST) | ||
47 | @$(PERL) $(TOP)/util/mklink.pl ../../apps $(APPS) | ||
48 | |||
49 | install: | ||
50 | @[ -n "$(INSTALLTOP)" ] # should be set by top Makefile... | ||
51 | @headerlist="$(EXHEADER)"; for i in $$headerlist; \ | ||
52 | do \ | ||
53 | (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ | ||
54 | chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ | ||
55 | done; | ||
56 | |||
57 | tags: | ||
58 | ctags $(SRC) | ||
59 | |||
60 | tests: | ||
61 | |||
62 | lint: | ||
63 | lint -DLINT $(INCLUDES) $(SRC)>fluff | ||
64 | |||
65 | depend: | ||
66 | @[ -n "$(MAKEDEPEND)" ] # should be set by upper Makefile... | ||
67 | $(MAKEDEPEND) -- $(CFLAG) $(INCLUDES) $(DEPFLAG) -- $(PROGS) $(LIBSRC) | ||
68 | |||
69 | dclean: | ||
70 | $(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new | ||
71 | mv -f Makefile.new $(MAKEFILE) | ||
72 | |||
73 | clean: | ||
74 | rm -f *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff | ||
75 | |||
76 | # DO NOT DELETE THIS LINE -- make depend depends on it. | ||
77 | |||
78 | ecs_asn1.o: ../../include/openssl/asn1.h ../../include/openssl/asn1t.h | ||
79 | ecs_asn1.o: ../../include/openssl/bio.h ../../include/openssl/crypto.h | ||
80 | ecs_asn1.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | ||
81 | ecs_asn1.o: ../../include/openssl/ecdsa.h ../../include/openssl/err.h | ||
82 | ecs_asn1.o: ../../include/openssl/lhash.h ../../include/openssl/opensslconf.h | ||
83 | ecs_asn1.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | ||
84 | ecs_asn1.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | ||
85 | ecs_asn1.o: ../../include/openssl/symhacks.h ecs_asn1.c ecs_locl.h | ||
86 | ecs_err.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
87 | ecs_err.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | ||
88 | ecs_err.o: ../../include/openssl/ec.h ../../include/openssl/ecdsa.h | ||
89 | ecs_err.o: ../../include/openssl/err.h ../../include/openssl/lhash.h | ||
90 | ecs_err.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | ||
91 | ecs_err.o: ../../include/openssl/ossl_typ.h ../../include/openssl/safestack.h | ||
92 | ecs_err.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | ||
93 | ecs_err.o: ecs_err.c | ||
94 | ecs_lib.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
95 | ecs_lib.o: ../../include/openssl/bn.h ../../include/openssl/buffer.h | ||
96 | ecs_lib.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h | ||
97 | ecs_lib.o: ../../include/openssl/ec.h ../../include/openssl/ecdh.h | ||
98 | ecs_lib.o: ../../include/openssl/ecdsa.h ../../include/openssl/engine.h | ||
99 | ecs_lib.o: ../../include/openssl/err.h ../../include/openssl/evp.h | ||
100 | ecs_lib.o: ../../include/openssl/fips.h ../../include/openssl/lhash.h | ||
101 | ecs_lib.o: ../../include/openssl/obj_mac.h ../../include/openssl/objects.h | ||
102 | ecs_lib.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | ||
103 | ecs_lib.o: ../../include/openssl/ossl_typ.h ../../include/openssl/pkcs7.h | ||
104 | ecs_lib.o: ../../include/openssl/safestack.h ../../include/openssl/sha.h | ||
105 | ecs_lib.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | ||
106 | ecs_lib.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h | ||
107 | ecs_lib.o: ecs_lib.c ecs_locl.h | ||
108 | ecs_ossl.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
109 | ecs_ossl.o: ../../include/openssl/bn.h ../../include/openssl/crypto.h | ||
110 | ecs_ossl.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | ||
111 | ecs_ossl.o: ../../include/openssl/ecdsa.h ../../include/openssl/err.h | ||
112 | ecs_ossl.o: ../../include/openssl/lhash.h ../../include/openssl/obj_mac.h | ||
113 | ecs_ossl.o: ../../include/openssl/opensslconf.h | ||
114 | ecs_ossl.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | ||
115 | ecs_ossl.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h | ||
116 | ecs_ossl.o: ../../include/openssl/symhacks.h ecs_locl.h ecs_ossl.c | ||
117 | ecs_sign.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
118 | ecs_sign.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | ||
119 | ecs_sign.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | ||
120 | ecs_sign.o: ../../include/openssl/ecdh.h ../../include/openssl/ecdsa.h | ||
121 | ecs_sign.o: ../../include/openssl/engine.h ../../include/openssl/evp.h | ||
122 | ecs_sign.o: ../../include/openssl/fips.h ../../include/openssl/lhash.h | ||
123 | ecs_sign.o: ../../include/openssl/obj_mac.h ../../include/openssl/objects.h | ||
124 | ecs_sign.o: ../../include/openssl/opensslconf.h | ||
125 | ecs_sign.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h | ||
126 | ecs_sign.o: ../../include/openssl/pkcs7.h ../../include/openssl/safestack.h | ||
127 | ecs_sign.o: ../../include/openssl/sha.h ../../include/openssl/stack.h | ||
128 | ecs_sign.o: ../../include/openssl/symhacks.h ../../include/openssl/x509.h | ||
129 | ecs_sign.o: ../../include/openssl/x509_vfy.h ecs_locl.h ecs_sign.c | ||
130 | ecs_vrf.o: ../../include/openssl/asn1.h ../../include/openssl/bio.h | ||
131 | ecs_vrf.o: ../../include/openssl/buffer.h ../../include/openssl/crypto.h | ||
132 | ecs_vrf.o: ../../include/openssl/e_os2.h ../../include/openssl/ec.h | ||
133 | ecs_vrf.o: ../../include/openssl/ecdh.h ../../include/openssl/ecdsa.h | ||
134 | ecs_vrf.o: ../../include/openssl/engine.h ../../include/openssl/evp.h | ||
135 | ecs_vrf.o: ../../include/openssl/fips.h ../../include/openssl/lhash.h | ||
136 | ecs_vrf.o: ../../include/openssl/obj_mac.h ../../include/openssl/objects.h | ||
137 | ecs_vrf.o: ../../include/openssl/opensslconf.h ../../include/openssl/opensslv.h | ||
138 | ecs_vrf.o: ../../include/openssl/ossl_typ.h ../../include/openssl/pkcs7.h | ||
139 | ecs_vrf.o: ../../include/openssl/safestack.h ../../include/openssl/sha.h | ||
140 | ecs_vrf.o: ../../include/openssl/stack.h ../../include/openssl/symhacks.h | ||
141 | ecs_vrf.o: ../../include/openssl/x509.h ../../include/openssl/x509_vfy.h | ||
142 | ecs_vrf.o: ecs_locl.h ecs_vrf.c | ||
diff --git a/src/lib/libcrypto/ecdsa/ecdsa.h b/src/lib/libcrypto/ecdsa/ecdsa.h new file mode 100644 index 0000000000..f20c8ee738 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecdsa.h | |||
@@ -0,0 +1,271 @@ | |||
1 | /* crypto/ecdsa/ecdsa.h */ | ||
2 | /** | ||
3 | * \file crypto/ecdsa/ecdsa.h Include file for the OpenSSL ECDSA functions | ||
4 | * \author Written by Nils Larsch for the OpenSSL project | ||
5 | */ | ||
6 | /* ==================================================================== | ||
7 | * Copyright (c) 2000-2003 The OpenSSL Project. All rights reserved. | ||
8 | * | ||
9 | * Redistribution and use in source and binary forms, with or without | ||
10 | * modification, are permitted provided that the following conditions | ||
11 | * are met: | ||
12 | * | ||
13 | * 1. Redistributions of source code must retain the above copyright | ||
14 | * notice, this list of conditions and the following disclaimer. | ||
15 | * | ||
16 | * 2. Redistributions in binary form must reproduce the above copyright | ||
17 | * notice, this list of conditions and the following disclaimer in | ||
18 | * the documentation and/or other materials provided with the | ||
19 | * distribution. | ||
20 | * | ||
21 | * 3. All advertising materials mentioning features or use of this | ||
22 | * software must display the following acknowledgment: | ||
23 | * "This product includes software developed by the OpenSSL Project | ||
24 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
25 | * | ||
26 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
27 | * endorse or promote products derived from this software without | ||
28 | * prior written permission. For written permission, please contact | ||
29 | * licensing@OpenSSL.org. | ||
30 | * | ||
31 | * 5. Products derived from this software may not be called "OpenSSL" | ||
32 | * nor may "OpenSSL" appear in their names without prior written | ||
33 | * permission of the OpenSSL Project. | ||
34 | * | ||
35 | * 6. Redistributions of any form whatsoever must retain the following | ||
36 | * acknowledgment: | ||
37 | * "This product includes software developed by the OpenSSL Project | ||
38 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
39 | * | ||
40 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
41 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
43 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
44 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
45 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
46 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
47 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
49 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
50 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
51 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
52 | * ==================================================================== | ||
53 | * | ||
54 | * This product includes cryptographic software written by Eric Young | ||
55 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
56 | * Hudson (tjh@cryptsoft.com). | ||
57 | * | ||
58 | */ | ||
59 | #ifndef HEADER_ECDSA_H | ||
60 | #define HEADER_ECDSA_H | ||
61 | |||
62 | #include <openssl/opensslconf.h> | ||
63 | |||
64 | #ifdef OPENSSL_NO_ECDSA | ||
65 | #error ECDSA is disabled. | ||
66 | #endif | ||
67 | |||
68 | #include <openssl/ec.h> | ||
69 | #include <openssl/ossl_typ.h> | ||
70 | #ifndef OPENSSL_NO_DEPRECATED | ||
71 | #include <openssl/bn.h> | ||
72 | #endif | ||
73 | |||
74 | #ifdef __cplusplus | ||
75 | extern "C" { | ||
76 | #endif | ||
77 | |||
78 | typedef struct ECDSA_SIG_st | ||
79 | { | ||
80 | BIGNUM *r; | ||
81 | BIGNUM *s; | ||
82 | } ECDSA_SIG; | ||
83 | |||
84 | /** ECDSA_SIG *ECDSA_SIG_new(void) | ||
85 | * allocates and initialize a ECDSA_SIG structure | ||
86 | * \return pointer to a ECDSA_SIG structure or NULL if an error occurred | ||
87 | */ | ||
88 | ECDSA_SIG *ECDSA_SIG_new(void); | ||
89 | |||
90 | /** ECDSA_SIG_free | ||
91 | * frees a ECDSA_SIG structure | ||
92 | * \param a pointer to the ECDSA_SIG structure | ||
93 | */ | ||
94 | void ECDSA_SIG_free(ECDSA_SIG *a); | ||
95 | |||
96 | /** i2d_ECDSA_SIG | ||
97 | * DER encode content of ECDSA_SIG object (note: this function modifies *pp | ||
98 | * (*pp += length of the DER encoded signature)). | ||
99 | * \param a pointer to the ECDSA_SIG object | ||
100 | * \param pp pointer to a unsigned char pointer for the output or NULL | ||
101 | * \return the length of the DER encoded ECDSA_SIG object or 0 | ||
102 | */ | ||
103 | int i2d_ECDSA_SIG(const ECDSA_SIG *a, unsigned char **pp); | ||
104 | |||
105 | /** d2i_ECDSA_SIG | ||
106 | * decodes a DER encoded ECDSA signature (note: this function changes *pp | ||
107 | * (*pp += len)). | ||
108 | * \param v pointer to ECDSA_SIG pointer (may be NULL) | ||
109 | * \param pp buffer with the DER encoded signature | ||
110 | * \param len bufferlength | ||
111 | * \return pointer to the decoded ECDSA_SIG structure (or NULL) | ||
112 | */ | ||
113 | ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **v, const unsigned char **pp, long len); | ||
114 | |||
115 | /** ECDSA_do_sign | ||
116 | * computes the ECDSA signature of the given hash value using | ||
117 | * the supplied private key and returns the created signature. | ||
118 | * \param dgst pointer to the hash value | ||
119 | * \param dgst_len length of the hash value | ||
120 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
121 | * \return pointer to a ECDSA_SIG structure or NULL | ||
122 | */ | ||
123 | ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst,int dgst_len,EC_KEY *eckey); | ||
124 | |||
125 | /** ECDSA_do_sign_ex | ||
126 | * computes ECDSA signature of a given hash value using the supplied | ||
127 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
128 | * \param dgst pointer to the hash value to sign | ||
129 | * \param dgstlen length of the hash value | ||
130 | * \param kinv optional pointer to a pre-computed inverse k | ||
131 | * \param rp optional pointer to the pre-computed rp value (see | ||
132 | * ECDSA_sign_setup | ||
133 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
134 | * \return pointer to a ECDSA_SIG structure or NULL | ||
135 | */ | ||
136 | ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen, | ||
137 | const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); | ||
138 | |||
139 | /** ECDSA_do_verify | ||
140 | * verifies that the supplied signature is a valid ECDSA | ||
141 | * signature of the supplied hash value using the supplied public key. | ||
142 | * \param dgst pointer to the hash value | ||
143 | * \param dgst_len length of the hash value | ||
144 | * \param sig pointer to the ECDSA_SIG structure | ||
145 | * \param eckey pointer to the EC_KEY object containing a public EC key | ||
146 | * \return 1 if the signature is valid, 0 if the signature is invalid and -1 on error | ||
147 | */ | ||
148 | int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ||
149 | const ECDSA_SIG *sig, EC_KEY* eckey); | ||
150 | |||
151 | const ECDSA_METHOD *ECDSA_OpenSSL(void); | ||
152 | |||
153 | /** ECDSA_set_default_method | ||
154 | * sets the default ECDSA method | ||
155 | * \param meth the new default ECDSA_METHOD | ||
156 | */ | ||
157 | void ECDSA_set_default_method(const ECDSA_METHOD *meth); | ||
158 | |||
159 | /** ECDSA_get_default_method | ||
160 | * returns the default ECDSA method | ||
161 | * \return pointer to ECDSA_METHOD structure containing the default method | ||
162 | */ | ||
163 | const ECDSA_METHOD *ECDSA_get_default_method(void); | ||
164 | |||
165 | /** ECDSA_set_method | ||
166 | * sets method to be used for the ECDSA operations | ||
167 | * \param eckey pointer to the EC_KEY object | ||
168 | * \param meth pointer to the new method | ||
169 | * \return 1 on success and 0 otherwise | ||
170 | */ | ||
171 | int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth); | ||
172 | |||
173 | /** ECDSA_size | ||
174 | * returns the maximum length of the DER encoded signature | ||
175 | * \param eckey pointer to a EC_KEY object | ||
176 | * \return numbers of bytes required for the DER encoded signature | ||
177 | */ | ||
178 | int ECDSA_size(const EC_KEY *eckey); | ||
179 | |||
180 | /** ECDSA_sign_setup | ||
181 | * precompute parts of the signing operation. | ||
182 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
183 | * \param ctx pointer to a BN_CTX object (may be NULL) | ||
184 | * \param kinv pointer to a BIGNUM pointer for the inverse of k | ||
185 | * \param rp pointer to a BIGNUM pointer for x coordinate of k * generator | ||
186 | * \return 1 on success and 0 otherwise | ||
187 | */ | ||
188 | int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, | ||
189 | BIGNUM **rp); | ||
190 | |||
191 | /** ECDSA_sign | ||
192 | * computes ECDSA signature of a given hash value using the supplied | ||
193 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
194 | * \param type this parameter is ignored | ||
195 | * \param dgst pointer to the hash value to sign | ||
196 | * \param dgstlen length of the hash value | ||
197 | * \param sig buffer to hold the DER encoded signature | ||
198 | * \param siglen pointer to the length of the returned signature | ||
199 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
200 | * \return 1 on success and 0 otherwise | ||
201 | */ | ||
202 | int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, | ||
203 | unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); | ||
204 | |||
205 | |||
206 | /** ECDSA_sign_ex | ||
207 | * computes ECDSA signature of a given hash value using the supplied | ||
208 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
209 | * \param type this parameter is ignored | ||
210 | * \param dgst pointer to the hash value to sign | ||
211 | * \param dgstlen length of the hash value | ||
212 | * \param sig buffer to hold the DER encoded signature | ||
213 | * \param siglen pointer to the length of the returned signature | ||
214 | * \param kinv optional pointer to a pre-computed inverse k | ||
215 | * \param rp optional pointer to the pre-computed rp value (see | ||
216 | * ECDSA_sign_setup | ||
217 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
218 | * \return 1 on success and 0 otherwise | ||
219 | */ | ||
220 | int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen, | ||
221 | unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, | ||
222 | const BIGNUM *rp, EC_KEY *eckey); | ||
223 | |||
224 | /** ECDSA_verify | ||
225 | * verifies that the given signature is valid ECDSA signature | ||
226 | * of the supplied hash value using the specified public key. | ||
227 | * \param type this parameter is ignored | ||
228 | * \param dgst pointer to the hash value | ||
229 | * \param dgstlen length of the hash value | ||
230 | * \param sig pointer to the DER encoded signature | ||
231 | * \param siglen length of the DER encoded signature | ||
232 | * \param eckey pointer to the EC_KEY object containing a public EC key | ||
233 | * \return 1 if the signature is valid, 0 if the signature is invalid and -1 on error | ||
234 | */ | ||
235 | int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen, | ||
236 | const unsigned char *sig, int siglen, EC_KEY *eckey); | ||
237 | |||
238 | /* the standard ex_data functions */ | ||
239 | int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new | ||
240 | *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | ||
241 | int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg); | ||
242 | void *ECDSA_get_ex_data(EC_KEY *d, int idx); | ||
243 | |||
244 | |||
245 | /* BEGIN ERROR CODES */ | ||
246 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
247 | * made after this point may be overwritten when the script is next run. | ||
248 | */ | ||
249 | void ERR_load_ECDSA_strings(void); | ||
250 | |||
251 | /* Error codes for the ECDSA functions. */ | ||
252 | |||
253 | /* Function codes. */ | ||
254 | #define ECDSA_F_ECDSA_DATA_NEW_METHOD 100 | ||
255 | #define ECDSA_F_ECDSA_DO_SIGN 101 | ||
256 | #define ECDSA_F_ECDSA_DO_VERIFY 102 | ||
257 | #define ECDSA_F_ECDSA_SIGN_SETUP 103 | ||
258 | |||
259 | /* Reason codes. */ | ||
260 | #define ECDSA_R_BAD_SIGNATURE 100 | ||
261 | #define ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 101 | ||
262 | #define ECDSA_R_ERR_EC_LIB 102 | ||
263 | #define ECDSA_R_MISSING_PARAMETERS 103 | ||
264 | #define ECDSA_R_NEED_NEW_SETUP_VALUES 106 | ||
265 | #define ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED 104 | ||
266 | #define ECDSA_R_SIGNATURE_MALLOC_FAILED 105 | ||
267 | |||
268 | #ifdef __cplusplus | ||
269 | } | ||
270 | #endif | ||
271 | #endif | ||
diff --git a/src/lib/libcrypto/ecdsa/ecdsatest.c b/src/lib/libcrypto/ecdsa/ecdsatest.c new file mode 100644 index 0000000000..aa4e1481a8 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecdsatest.c | |||
@@ -0,0 +1,500 @@ | |||
1 | /* crypto/ecdsa/ecdsatest.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * | ||
61 | * Portions of the attached software ("Contribution") are developed by | ||
62 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. | ||
63 | * | ||
64 | * The Contribution is licensed pursuant to the OpenSSL open source | ||
65 | * license provided above. | ||
66 | * | ||
67 | * The elliptic curve binary polynomial software is originally written by | ||
68 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. | ||
69 | * | ||
70 | */ | ||
71 | |||
72 | #include <stdio.h> | ||
73 | #include <stdlib.h> | ||
74 | #include <string.h> | ||
75 | |||
76 | #include <openssl/opensslconf.h> /* To see if OPENSSL_NO_ECDSA is defined */ | ||
77 | |||
78 | #ifdef OPENSSL_NO_ECDSA | ||
79 | int main(int argc, char * argv[]) | ||
80 | { | ||
81 | puts("Elliptic curves are disabled."); | ||
82 | return 0; | ||
83 | } | ||
84 | #else | ||
85 | |||
86 | #include <openssl/crypto.h> | ||
87 | #include <openssl/bio.h> | ||
88 | #include <openssl/evp.h> | ||
89 | #include <openssl/bn.h> | ||
90 | #include <openssl/ecdsa.h> | ||
91 | #ifndef OPENSSL_NO_ENGINE | ||
92 | #include <openssl/engine.h> | ||
93 | #endif | ||
94 | #include <openssl/err.h> | ||
95 | #include <openssl/rand.h> | ||
96 | |||
97 | static const char rnd_seed[] = "string to make the random number generator " | ||
98 | "think it has entropy"; | ||
99 | |||
100 | /* declaration of the test functions */ | ||
101 | int x9_62_tests(BIO *); | ||
102 | int x9_62_test_internal(BIO *out, int nid, const char *r, const char *s); | ||
103 | int test_builtin(BIO *); | ||
104 | |||
105 | /* functions to change the RAND_METHOD */ | ||
106 | int change_rand(void); | ||
107 | int restore_rand(void); | ||
108 | int fbytes(unsigned char *buf, int num); | ||
109 | |||
110 | RAND_METHOD fake_rand; | ||
111 | const RAND_METHOD *old_rand; | ||
112 | |||
113 | int change_rand(void) | ||
114 | { | ||
115 | /* save old rand method */ | ||
116 | if ((old_rand = RAND_get_rand_method()) == NULL) | ||
117 | return 0; | ||
118 | |||
119 | fake_rand.seed = old_rand->seed; | ||
120 | fake_rand.cleanup = old_rand->cleanup; | ||
121 | fake_rand.add = old_rand->add; | ||
122 | fake_rand.status = old_rand->status; | ||
123 | /* use own random function */ | ||
124 | fake_rand.bytes = fbytes; | ||
125 | fake_rand.pseudorand = old_rand->bytes; | ||
126 | /* set new RAND_METHOD */ | ||
127 | if (!RAND_set_rand_method(&fake_rand)) | ||
128 | return 0; | ||
129 | return 1; | ||
130 | } | ||
131 | |||
132 | int restore_rand(void) | ||
133 | { | ||
134 | if (!RAND_set_rand_method(old_rand)) | ||
135 | return 0; | ||
136 | else | ||
137 | return 1; | ||
138 | } | ||
139 | |||
140 | static int fbytes_counter = 0; | ||
141 | static const char *numbers[8] = { | ||
142 | "651056770906015076056810763456358567190100156695615665659", | ||
143 | "6140507067065001063065065565667405560006161556565665656654", | ||
144 | "8763001015071075675010661307616710783570106710677817767166" | ||
145 | "71676178726717", | ||
146 | "7000000175690566466555057817571571075705015757757057795755" | ||
147 | "55657156756655", | ||
148 | "1275552191113212300012030439187146164646146646466749494799", | ||
149 | "1542725565216523985789236956265265265235675811949404040041", | ||
150 | "1456427555219115346513212300075341203043918714616464614664" | ||
151 | "64667494947990", | ||
152 | "1712787255652165239672857892369562652652652356758119494040" | ||
153 | "40041670216363"}; | ||
154 | |||
155 | int fbytes(unsigned char *buf, int num) | ||
156 | { | ||
157 | int ret; | ||
158 | BIGNUM *tmp = NULL; | ||
159 | |||
160 | if (fbytes_counter >= 8) | ||
161 | return 0; | ||
162 | tmp = BN_new(); | ||
163 | if (!tmp) | ||
164 | return 0; | ||
165 | if (!BN_dec2bn(&tmp, numbers[fbytes_counter])) | ||
166 | { | ||
167 | BN_free(tmp); | ||
168 | return 0; | ||
169 | } | ||
170 | fbytes_counter ++; | ||
171 | ret = BN_bn2bin(tmp, buf); | ||
172 | if (ret == 0 || ret != num) | ||
173 | ret = 0; | ||
174 | else | ||
175 | ret = 1; | ||
176 | if (tmp) | ||
177 | BN_free(tmp); | ||
178 | return ret; | ||
179 | } | ||
180 | |||
181 | /* some tests from the X9.62 draft */ | ||
182 | int x9_62_test_internal(BIO *out, int nid, const char *r_in, const char *s_in) | ||
183 | { | ||
184 | int ret = 0; | ||
185 | const char message[] = "abc"; | ||
186 | unsigned char digest[20]; | ||
187 | unsigned int dgst_len = 0; | ||
188 | EVP_MD_CTX md_ctx; | ||
189 | EC_KEY *key = NULL; | ||
190 | ECDSA_SIG *signature = NULL; | ||
191 | BIGNUM *r = NULL, *s = NULL; | ||
192 | |||
193 | EVP_MD_CTX_init(&md_ctx); | ||
194 | /* get the message digest */ | ||
195 | EVP_DigestInit(&md_ctx, EVP_ecdsa()); | ||
196 | EVP_DigestUpdate(&md_ctx, (const void*)message, 3); | ||
197 | EVP_DigestFinal(&md_ctx, digest, &dgst_len); | ||
198 | |||
199 | BIO_printf(out, "testing %s: ", OBJ_nid2sn(nid)); | ||
200 | /* create the key */ | ||
201 | if ((key = EC_KEY_new_by_curve_name(nid)) == NULL) | ||
202 | goto x962_int_err; | ||
203 | if (!EC_KEY_generate_key(key)) | ||
204 | goto x962_int_err; | ||
205 | BIO_printf(out, "."); | ||
206 | (void)BIO_flush(out); | ||
207 | /* create the signature */ | ||
208 | signature = ECDSA_do_sign(digest, 20, key); | ||
209 | if (signature == NULL) | ||
210 | goto x962_int_err; | ||
211 | BIO_printf(out, "."); | ||
212 | (void)BIO_flush(out); | ||
213 | /* compare the created signature with the expected signature */ | ||
214 | if ((r = BN_new()) == NULL || (s = BN_new()) == NULL) | ||
215 | goto x962_int_err; | ||
216 | if (!BN_dec2bn(&r, r_in) || | ||
217 | !BN_dec2bn(&s, s_in)) | ||
218 | goto x962_int_err; | ||
219 | if (BN_cmp(signature->r ,r) || BN_cmp(signature->s, s)) | ||
220 | goto x962_int_err; | ||
221 | BIO_printf(out, "."); | ||
222 | (void)BIO_flush(out); | ||
223 | /* verify the signature */ | ||
224 | if (ECDSA_do_verify(digest, 20, signature, key) != 1) | ||
225 | goto x962_int_err; | ||
226 | BIO_printf(out, "."); | ||
227 | (void)BIO_flush(out); | ||
228 | |||
229 | BIO_printf(out, " ok\n"); | ||
230 | ret = 1; | ||
231 | x962_int_err: | ||
232 | if (!ret) | ||
233 | BIO_printf(out, " failed\n"); | ||
234 | if (key) | ||
235 | EC_KEY_free(key); | ||
236 | if (signature) | ||
237 | ECDSA_SIG_free(signature); | ||
238 | if (r) | ||
239 | BN_free(r); | ||
240 | if (s) | ||
241 | BN_free(s); | ||
242 | EVP_MD_CTX_cleanup(&md_ctx); | ||
243 | return ret; | ||
244 | } | ||
245 | |||
246 | int x9_62_tests(BIO *out) | ||
247 | { | ||
248 | int ret = 0; | ||
249 | |||
250 | BIO_printf(out, "some tests from X9.62:\n"); | ||
251 | |||
252 | /* set own rand method */ | ||
253 | if (!change_rand()) | ||
254 | goto x962_err; | ||
255 | |||
256 | if (!x9_62_test_internal(out, NID_X9_62_prime192v1, | ||
257 | "3342403536405981729393488334694600415596881826869351677613", | ||
258 | "5735822328888155254683894997897571951568553642892029982342")) | ||
259 | goto x962_err; | ||
260 | if (!x9_62_test_internal(out, NID_X9_62_prime239v1, | ||
261 | "3086361431751678114926225473006680188549593787585317781474" | ||
262 | "62058306432176", | ||
263 | "3238135532097973577080787768312505059318910517550078427819" | ||
264 | "78505179448783")) | ||
265 | goto x962_err; | ||
266 | if (!x9_62_test_internal(out, NID_X9_62_c2tnb191v1, | ||
267 | "87194383164871543355722284926904419997237591535066528048", | ||
268 | "308992691965804947361541664549085895292153777025772063598")) | ||
269 | goto x962_err; | ||
270 | if (!x9_62_test_internal(out, NID_X9_62_c2tnb239v1, | ||
271 | "2159633321041961198501834003903461262881815148684178964245" | ||
272 | "5876922391552", | ||
273 | "1970303740007316867383349976549972270528498040721988191026" | ||
274 | "49413465737174")) | ||
275 | goto x962_err; | ||
276 | |||
277 | ret = 1; | ||
278 | x962_err: | ||
279 | if (!restore_rand()) | ||
280 | ret = 0; | ||
281 | return ret; | ||
282 | } | ||
283 | |||
284 | int test_builtin(BIO *out) | ||
285 | { | ||
286 | EC_builtin_curve *curves = NULL; | ||
287 | size_t crv_len = 0, n = 0; | ||
288 | EC_KEY *eckey = NULL, *wrong_eckey = NULL; | ||
289 | EC_GROUP *group; | ||
290 | unsigned char digest[20], wrong_digest[20]; | ||
291 | unsigned char *signature = NULL; | ||
292 | unsigned int sig_len; | ||
293 | int nid, ret = 0; | ||
294 | |||
295 | /* fill digest values with some random data */ | ||
296 | if (!RAND_pseudo_bytes(digest, 20) || | ||
297 | !RAND_pseudo_bytes(wrong_digest, 20)) | ||
298 | { | ||
299 | BIO_printf(out, "ERROR: unable to get random data\n"); | ||
300 | goto builtin_err; | ||
301 | } | ||
302 | |||
303 | /* create and verify a ecdsa signature with every availble curve | ||
304 | * (with ) */ | ||
305 | BIO_printf(out, "\ntesting ECDSA_sign() and ECDSA_verify() " | ||
306 | "with some internal curves:\n"); | ||
307 | |||
308 | /* get a list of all internal curves */ | ||
309 | crv_len = EC_get_builtin_curves(NULL, 0); | ||
310 | |||
311 | curves = OPENSSL_malloc(sizeof(EC_builtin_curve) * crv_len); | ||
312 | |||
313 | if (curves == NULL) | ||
314 | { | ||
315 | BIO_printf(out, "malloc error\n"); | ||
316 | goto builtin_err; | ||
317 | } | ||
318 | |||
319 | if (!EC_get_builtin_curves(curves, crv_len)) | ||
320 | { | ||
321 | BIO_printf(out, "unable to get internal curves\n"); | ||
322 | goto builtin_err; | ||
323 | } | ||
324 | |||
325 | /* now create and verify a signature for every curve */ | ||
326 | for (n = 0; n < crv_len; n++) | ||
327 | { | ||
328 | unsigned char dirt, offset; | ||
329 | |||
330 | nid = curves[n].nid; | ||
331 | if (nid == NID_ipsec4) | ||
332 | continue; | ||
333 | /* create new ecdsa key (== EC_KEY) */ | ||
334 | if ((eckey = EC_KEY_new()) == NULL) | ||
335 | goto builtin_err; | ||
336 | group = EC_GROUP_new_by_curve_name(nid); | ||
337 | if (group == NULL) | ||
338 | goto builtin_err; | ||
339 | if (EC_KEY_set_group(eckey, group) == 0) | ||
340 | goto builtin_err; | ||
341 | EC_GROUP_free(group); | ||
342 | if (EC_GROUP_get_degree(EC_KEY_get0_group(eckey)) < 160) | ||
343 | /* drop the curve */ | ||
344 | { | ||
345 | EC_KEY_free(eckey); | ||
346 | eckey = NULL; | ||
347 | continue; | ||
348 | } | ||
349 | BIO_printf(out, "%s: ", OBJ_nid2sn(nid)); | ||
350 | /* create key */ | ||
351 | if (!EC_KEY_generate_key(eckey)) | ||
352 | { | ||
353 | BIO_printf(out, " failed\n"); | ||
354 | goto builtin_err; | ||
355 | } | ||
356 | /* create second key */ | ||
357 | if ((wrong_eckey = EC_KEY_new()) == NULL) | ||
358 | goto builtin_err; | ||
359 | group = EC_GROUP_new_by_curve_name(nid); | ||
360 | if (group == NULL) | ||
361 | goto builtin_err; | ||
362 | if (EC_KEY_set_group(wrong_eckey, group) == 0) | ||
363 | goto builtin_err; | ||
364 | EC_GROUP_free(group); | ||
365 | if (!EC_KEY_generate_key(wrong_eckey)) | ||
366 | { | ||
367 | BIO_printf(out, " failed\n"); | ||
368 | goto builtin_err; | ||
369 | } | ||
370 | |||
371 | BIO_printf(out, "."); | ||
372 | (void)BIO_flush(out); | ||
373 | /* check key */ | ||
374 | if (!EC_KEY_check_key(eckey)) | ||
375 | { | ||
376 | BIO_printf(out, " failed\n"); | ||
377 | goto builtin_err; | ||
378 | } | ||
379 | BIO_printf(out, "."); | ||
380 | (void)BIO_flush(out); | ||
381 | /* create signature */ | ||
382 | sig_len = ECDSA_size(eckey); | ||
383 | if ((signature = OPENSSL_malloc(sig_len)) == NULL) | ||
384 | goto builtin_err; | ||
385 | if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) | ||
386 | { | ||
387 | BIO_printf(out, " failed\n"); | ||
388 | goto builtin_err; | ||
389 | } | ||
390 | BIO_printf(out, "."); | ||
391 | (void)BIO_flush(out); | ||
392 | /* verify signature */ | ||
393 | if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) | ||
394 | { | ||
395 | BIO_printf(out, " failed\n"); | ||
396 | goto builtin_err; | ||
397 | } | ||
398 | BIO_printf(out, "."); | ||
399 | (void)BIO_flush(out); | ||
400 | /* verify signature with the wrong key */ | ||
401 | if (ECDSA_verify(0, digest, 20, signature, sig_len, | ||
402 | wrong_eckey) == 1) | ||
403 | { | ||
404 | BIO_printf(out, " failed\n"); | ||
405 | goto builtin_err; | ||
406 | } | ||
407 | BIO_printf(out, "."); | ||
408 | (void)BIO_flush(out); | ||
409 | /* wrong digest */ | ||
410 | if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, | ||
411 | eckey) == 1) | ||
412 | { | ||
413 | BIO_printf(out, " failed\n"); | ||
414 | goto builtin_err; | ||
415 | } | ||
416 | BIO_printf(out, "."); | ||
417 | (void)BIO_flush(out); | ||
418 | /* modify a single byte of the signature */ | ||
419 | offset = signature[10] % sig_len; | ||
420 | dirt = signature[11]; | ||
421 | signature[offset] ^= dirt ? dirt : 1; | ||
422 | if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1) | ||
423 | { | ||
424 | BIO_printf(out, " failed\n"); | ||
425 | goto builtin_err; | ||
426 | } | ||
427 | BIO_printf(out, "."); | ||
428 | (void)BIO_flush(out); | ||
429 | |||
430 | BIO_printf(out, " ok\n"); | ||
431 | /* cleanup */ | ||
432 | OPENSSL_free(signature); | ||
433 | signature = NULL; | ||
434 | EC_KEY_free(eckey); | ||
435 | eckey = NULL; | ||
436 | EC_KEY_free(wrong_eckey); | ||
437 | wrong_eckey = NULL; | ||
438 | } | ||
439 | |||
440 | ret = 1; | ||
441 | builtin_err: | ||
442 | if (eckey) | ||
443 | EC_KEY_free(eckey); | ||
444 | if (wrong_eckey) | ||
445 | EC_KEY_free(wrong_eckey); | ||
446 | if (signature) | ||
447 | OPENSSL_free(signature); | ||
448 | if (curves) | ||
449 | OPENSSL_free(curves); | ||
450 | |||
451 | return ret; | ||
452 | } | ||
453 | |||
454 | int main(void) | ||
455 | { | ||
456 | int ret = 1; | ||
457 | BIO *out; | ||
458 | |||
459 | out = BIO_new_fp(stdout, BIO_NOCLOSE); | ||
460 | |||
461 | /* enable memory leak checking unless explicitly disabled */ | ||
462 | if (!((getenv("OPENSSL_DEBUG_MEMORY") != NULL) && | ||
463 | (0 == strcmp(getenv("OPENSSL_DEBUG_MEMORY"), "off")))) | ||
464 | { | ||
465 | CRYPTO_malloc_debug_init(); | ||
466 | CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL); | ||
467 | } | ||
468 | else | ||
469 | { | ||
470 | /* OPENSSL_DEBUG_MEMORY=off */ | ||
471 | CRYPTO_set_mem_debug_functions(0, 0, 0, 0, 0); | ||
472 | } | ||
473 | CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); | ||
474 | |||
475 | ERR_load_crypto_strings(); | ||
476 | |||
477 | /* initialize the prng */ | ||
478 | RAND_seed(rnd_seed, sizeof(rnd_seed)); | ||
479 | |||
480 | /* the tests */ | ||
481 | if (!x9_62_tests(out)) goto err; | ||
482 | if (!test_builtin(out)) goto err; | ||
483 | |||
484 | ret = 0; | ||
485 | err: | ||
486 | if (ret) | ||
487 | BIO_printf(out, "\nECDSA test failed\n"); | ||
488 | else | ||
489 | BIO_printf(out, "\nECDSA test passed\n"); | ||
490 | if (ret) | ||
491 | ERR_print_errors(out); | ||
492 | CRYPTO_cleanup_all_ex_data(); | ||
493 | ERR_remove_thread_state(NULL); | ||
494 | ERR_free_strings(); | ||
495 | CRYPTO_mem_leaks(out); | ||
496 | if (out != NULL) | ||
497 | BIO_free(out); | ||
498 | return ret; | ||
499 | } | ||
500 | #endif | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_asn1.c b/src/lib/libcrypto/ecdsa/ecs_asn1.c new file mode 100644 index 0000000000..b295489400 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_asn1.c | |||
@@ -0,0 +1,67 @@ | |||
1 | /* crypto/ecdsa/ecs_asn1.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * licensing@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include "ecs_locl.h" | ||
57 | #include <openssl/err.h> | ||
58 | #include <openssl/asn1t.h> | ||
59 | |||
60 | ASN1_SEQUENCE(ECDSA_SIG) = { | ||
61 | ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM), | ||
62 | ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM) | ||
63 | } ASN1_SEQUENCE_END(ECDSA_SIG) | ||
64 | |||
65 | DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG) | ||
66 | DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG) | ||
67 | IMPLEMENT_ASN1_FUNCTIONS_const(ECDSA_SIG) | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_err.c b/src/lib/libcrypto/ecdsa/ecs_err.c new file mode 100644 index 0000000000..d2a53730ea --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_err.c | |||
@@ -0,0 +1,104 @@ | |||
1 | /* crypto/ecdsa/ecs_err.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | /* NOTE: this file was auto generated by the mkerr.pl script: any changes | ||
57 | * made to it will be overwritten when the script next updates this file, | ||
58 | * only reason strings will be preserved. | ||
59 | */ | ||
60 | |||
61 | #include <stdio.h> | ||
62 | #include <openssl/err.h> | ||
63 | #include <openssl/ecdsa.h> | ||
64 | |||
65 | /* BEGIN ERROR CODES */ | ||
66 | #ifndef OPENSSL_NO_ERR | ||
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_ECDSA,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_ECDSA,0,reason) | ||
70 | |||
71 | static ERR_STRING_DATA ECDSA_str_functs[]= | ||
72 | { | ||
73 | {ERR_FUNC(ECDSA_F_ECDSA_DATA_NEW_METHOD), "ECDSA_DATA_NEW_METHOD"}, | ||
74 | {ERR_FUNC(ECDSA_F_ECDSA_DO_SIGN), "ECDSA_do_sign"}, | ||
75 | {ERR_FUNC(ECDSA_F_ECDSA_DO_VERIFY), "ECDSA_do_verify"}, | ||
76 | {ERR_FUNC(ECDSA_F_ECDSA_SIGN_SETUP), "ECDSA_sign_setup"}, | ||
77 | {0,NULL} | ||
78 | }; | ||
79 | |||
80 | static ERR_STRING_DATA ECDSA_str_reasons[]= | ||
81 | { | ||
82 | {ERR_REASON(ECDSA_R_BAD_SIGNATURE) ,"bad signature"}, | ||
83 | {ERR_REASON(ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, | ||
84 | {ERR_REASON(ECDSA_R_ERR_EC_LIB) ,"err ec lib"}, | ||
85 | {ERR_REASON(ECDSA_R_MISSING_PARAMETERS) ,"missing parameters"}, | ||
86 | {ERR_REASON(ECDSA_R_NEED_NEW_SETUP_VALUES),"need new setup values"}, | ||
87 | {ERR_REASON(ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED),"random number generation failed"}, | ||
88 | {ERR_REASON(ECDSA_R_SIGNATURE_MALLOC_FAILED),"signature malloc failed"}, | ||
89 | {0,NULL} | ||
90 | }; | ||
91 | |||
92 | #endif | ||
93 | |||
94 | void ERR_load_ECDSA_strings(void) | ||
95 | { | ||
96 | #ifndef OPENSSL_NO_ERR | ||
97 | |||
98 | if (ERR_func_error_string(ECDSA_str_functs[0].error) == NULL) | ||
99 | { | ||
100 | ERR_load_strings(0,ECDSA_str_functs); | ||
101 | ERR_load_strings(0,ECDSA_str_reasons); | ||
102 | } | ||
103 | #endif | ||
104 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_lib.c b/src/lib/libcrypto/ecdsa/ecs_lib.c new file mode 100644 index 0000000000..85e8a3a7ed --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_lib.c | |||
@@ -0,0 +1,261 @@ | |||
1 | /* crypto/ecdsa/ecs_lib.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include <string.h> | ||
57 | #include "ecs_locl.h" | ||
58 | #ifndef OPENSSL_NO_ENGINE | ||
59 | #include <openssl/engine.h> | ||
60 | #endif | ||
61 | #include <openssl/err.h> | ||
62 | #include <openssl/bn.h> | ||
63 | |||
64 | const char ECDSA_version[]="ECDSA" OPENSSL_VERSION_PTEXT; | ||
65 | |||
66 | static const ECDSA_METHOD *default_ECDSA_method = NULL; | ||
67 | |||
68 | static void *ecdsa_data_new(void); | ||
69 | static void *ecdsa_data_dup(void *); | ||
70 | static void ecdsa_data_free(void *); | ||
71 | |||
72 | void ECDSA_set_default_method(const ECDSA_METHOD *meth) | ||
73 | { | ||
74 | default_ECDSA_method = meth; | ||
75 | } | ||
76 | |||
77 | const ECDSA_METHOD *ECDSA_get_default_method(void) | ||
78 | { | ||
79 | if(!default_ECDSA_method) | ||
80 | default_ECDSA_method = ECDSA_OpenSSL(); | ||
81 | return default_ECDSA_method; | ||
82 | } | ||
83 | |||
84 | int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth) | ||
85 | { | ||
86 | const ECDSA_METHOD *mtmp; | ||
87 | ECDSA_DATA *ecdsa; | ||
88 | |||
89 | ecdsa = ecdsa_check(eckey); | ||
90 | |||
91 | if (ecdsa == NULL) | ||
92 | return 0; | ||
93 | |||
94 | mtmp = ecdsa->meth; | ||
95 | #ifndef OPENSSL_NO_ENGINE | ||
96 | if (ecdsa->engine) | ||
97 | { | ||
98 | ENGINE_finish(ecdsa->engine); | ||
99 | ecdsa->engine = NULL; | ||
100 | } | ||
101 | #endif | ||
102 | ecdsa->meth = meth; | ||
103 | |||
104 | return 1; | ||
105 | } | ||
106 | |||
107 | static ECDSA_DATA *ECDSA_DATA_new_method(ENGINE *engine) | ||
108 | { | ||
109 | ECDSA_DATA *ret; | ||
110 | |||
111 | ret=(ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA)); | ||
112 | if (ret == NULL) | ||
113 | { | ||
114 | ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE); | ||
115 | return(NULL); | ||
116 | } | ||
117 | |||
118 | ret->init = NULL; | ||
119 | |||
120 | ret->meth = ECDSA_get_default_method(); | ||
121 | ret->engine = engine; | ||
122 | #ifndef OPENSSL_NO_ENGINE | ||
123 | if (!ret->engine) | ||
124 | ret->engine = ENGINE_get_default_ECDSA(); | ||
125 | if (ret->engine) | ||
126 | { | ||
127 | ret->meth = ENGINE_get_ECDSA(ret->engine); | ||
128 | if (!ret->meth) | ||
129 | { | ||
130 | ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_ENGINE_LIB); | ||
131 | ENGINE_finish(ret->engine); | ||
132 | OPENSSL_free(ret); | ||
133 | return NULL; | ||
134 | } | ||
135 | } | ||
136 | #endif | ||
137 | |||
138 | ret->flags = ret->meth->flags; | ||
139 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); | ||
140 | #if 0 | ||
141 | if ((ret->meth->init != NULL) && !ret->meth->init(ret)) | ||
142 | { | ||
143 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); | ||
144 | OPENSSL_free(ret); | ||
145 | ret=NULL; | ||
146 | } | ||
147 | #endif | ||
148 | return(ret); | ||
149 | } | ||
150 | |||
151 | static void *ecdsa_data_new(void) | ||
152 | { | ||
153 | return (void *)ECDSA_DATA_new_method(NULL); | ||
154 | } | ||
155 | |||
156 | static void *ecdsa_data_dup(void *data) | ||
157 | { | ||
158 | ECDSA_DATA *r = (ECDSA_DATA *)data; | ||
159 | |||
160 | /* XXX: dummy operation */ | ||
161 | if (r == NULL) | ||
162 | return NULL; | ||
163 | |||
164 | return ecdsa_data_new(); | ||
165 | } | ||
166 | |||
167 | static void ecdsa_data_free(void *data) | ||
168 | { | ||
169 | ECDSA_DATA *r = (ECDSA_DATA *)data; | ||
170 | |||
171 | #ifndef OPENSSL_NO_ENGINE | ||
172 | if (r->engine) | ||
173 | ENGINE_finish(r->engine); | ||
174 | #endif | ||
175 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, r, &r->ex_data); | ||
176 | |||
177 | OPENSSL_cleanse((void *)r, sizeof(ECDSA_DATA)); | ||
178 | |||
179 | OPENSSL_free(r); | ||
180 | } | ||
181 | |||
182 | ECDSA_DATA *ecdsa_check(EC_KEY *key) | ||
183 | { | ||
184 | ECDSA_DATA *ecdsa_data; | ||
185 | |||
186 | void *data = EC_KEY_get_key_method_data(key, ecdsa_data_dup, | ||
187 | ecdsa_data_free, ecdsa_data_free); | ||
188 | if (data == NULL) | ||
189 | { | ||
190 | ecdsa_data = (ECDSA_DATA *)ecdsa_data_new(); | ||
191 | if (ecdsa_data == NULL) | ||
192 | return NULL; | ||
193 | EC_KEY_insert_key_method_data(key, (void *)ecdsa_data, | ||
194 | ecdsa_data_dup, ecdsa_data_free, ecdsa_data_free); | ||
195 | } | ||
196 | else | ||
197 | ecdsa_data = (ECDSA_DATA *)data; | ||
198 | |||
199 | |||
200 | return ecdsa_data; | ||
201 | } | ||
202 | |||
203 | int ECDSA_size(const EC_KEY *r) | ||
204 | { | ||
205 | int ret,i; | ||
206 | ASN1_INTEGER bs; | ||
207 | BIGNUM *order=NULL; | ||
208 | unsigned char buf[4]; | ||
209 | const EC_GROUP *group; | ||
210 | |||
211 | if (r == NULL) | ||
212 | return 0; | ||
213 | group = EC_KEY_get0_group(r); | ||
214 | if (group == NULL) | ||
215 | return 0; | ||
216 | |||
217 | if ((order = BN_new()) == NULL) return 0; | ||
218 | if (!EC_GROUP_get_order(group,order,NULL)) | ||
219 | { | ||
220 | BN_clear_free(order); | ||
221 | return 0; | ||
222 | } | ||
223 | i=BN_num_bits(order); | ||
224 | bs.length=(i+7)/8; | ||
225 | bs.data=buf; | ||
226 | bs.type=V_ASN1_INTEGER; | ||
227 | /* If the top bit is set the asn1 encoding is 1 larger. */ | ||
228 | buf[0]=0xff; | ||
229 | |||
230 | i=i2d_ASN1_INTEGER(&bs,NULL); | ||
231 | i+=i; /* r and s */ | ||
232 | ret=ASN1_object_size(1,i,V_ASN1_SEQUENCE); | ||
233 | BN_clear_free(order); | ||
234 | return(ret); | ||
235 | } | ||
236 | |||
237 | |||
238 | int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | ||
239 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | ||
240 | { | ||
241 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDSA, argl, argp, | ||
242 | new_func, dup_func, free_func); | ||
243 | } | ||
244 | |||
245 | int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg) | ||
246 | { | ||
247 | ECDSA_DATA *ecdsa; | ||
248 | ecdsa = ecdsa_check(d); | ||
249 | if (ecdsa == NULL) | ||
250 | return 0; | ||
251 | return(CRYPTO_set_ex_data(&ecdsa->ex_data,idx,arg)); | ||
252 | } | ||
253 | |||
254 | void *ECDSA_get_ex_data(EC_KEY *d, int idx) | ||
255 | { | ||
256 | ECDSA_DATA *ecdsa; | ||
257 | ecdsa = ecdsa_check(d); | ||
258 | if (ecdsa == NULL) | ||
259 | return NULL; | ||
260 | return(CRYPTO_get_ex_data(&ecdsa->ex_data,idx)); | ||
261 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_locl.h b/src/lib/libcrypto/ecdsa/ecs_locl.h new file mode 100644 index 0000000000..3a69a840e2 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_locl.h | |||
@@ -0,0 +1,107 @@ | |||
1 | /* crypto/ecdsa/ecs_locl.h */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #ifndef HEADER_ECS_LOCL_H | ||
60 | #define HEADER_ECS_LOCL_H | ||
61 | |||
62 | #include <openssl/ecdsa.h> | ||
63 | |||
64 | #ifdef __cplusplus | ||
65 | extern "C" { | ||
66 | #endif | ||
67 | |||
68 | struct ecdsa_method | ||
69 | { | ||
70 | const char *name; | ||
71 | ECDSA_SIG *(*ecdsa_do_sign)(const unsigned char *dgst, int dgst_len, | ||
72 | const BIGNUM *inv, const BIGNUM *rp, EC_KEY *eckey); | ||
73 | int (*ecdsa_sign_setup)(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, | ||
74 | BIGNUM **r); | ||
75 | int (*ecdsa_do_verify)(const unsigned char *dgst, int dgst_len, | ||
76 | const ECDSA_SIG *sig, EC_KEY *eckey); | ||
77 | #if 0 | ||
78 | int (*init)(EC_KEY *eckey); | ||
79 | int (*finish)(EC_KEY *eckey); | ||
80 | #endif | ||
81 | int flags; | ||
82 | char *app_data; | ||
83 | }; | ||
84 | |||
85 | typedef struct ecdsa_data_st { | ||
86 | /* EC_KEY_METH_DATA part */ | ||
87 | int (*init)(EC_KEY *); | ||
88 | /* method (ECDSA) specific part */ | ||
89 | ENGINE *engine; | ||
90 | int flags; | ||
91 | const ECDSA_METHOD *meth; | ||
92 | CRYPTO_EX_DATA ex_data; | ||
93 | } ECDSA_DATA; | ||
94 | |||
95 | /** ecdsa_check | ||
96 | * checks whether ECKEY->meth_data is a pointer to a ECDSA_DATA structure | ||
97 | * and if not it removes the old meth_data and creates a ECDSA_DATA structure. | ||
98 | * \param eckey pointer to a EC_KEY object | ||
99 | * \return pointer to a ECDSA_DATA structure | ||
100 | */ | ||
101 | ECDSA_DATA *ecdsa_check(EC_KEY *eckey); | ||
102 | |||
103 | #ifdef __cplusplus | ||
104 | } | ||
105 | #endif | ||
106 | |||
107 | #endif /* HEADER_ECS_LOCL_H */ | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_ossl.c b/src/lib/libcrypto/ecdsa/ecs_ossl.c new file mode 100644 index 0000000000..3ead1af94e --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_ossl.c | |||
@@ -0,0 +1,478 @@ | |||
1 | /* crypto/ecdsa/ecs_ossl.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include "ecs_locl.h" | ||
60 | #include <openssl/err.h> | ||
61 | #include <openssl/obj_mac.h> | ||
62 | #include <openssl/bn.h> | ||
63 | |||
64 | static ECDSA_SIG *ecdsa_do_sign(const unsigned char *dgst, int dlen, | ||
65 | const BIGNUM *, const BIGNUM *, EC_KEY *eckey); | ||
66 | static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
67 | BIGNUM **rp); | ||
68 | static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len, | ||
69 | const ECDSA_SIG *sig, EC_KEY *eckey); | ||
70 | |||
71 | static ECDSA_METHOD openssl_ecdsa_meth = { | ||
72 | "OpenSSL ECDSA method", | ||
73 | ecdsa_do_sign, | ||
74 | ecdsa_sign_setup, | ||
75 | ecdsa_do_verify, | ||
76 | #if 0 | ||
77 | NULL, /* init */ | ||
78 | NULL, /* finish */ | ||
79 | #endif | ||
80 | 0, /* flags */ | ||
81 | NULL /* app_data */ | ||
82 | }; | ||
83 | |||
84 | const ECDSA_METHOD *ECDSA_OpenSSL(void) | ||
85 | { | ||
86 | return &openssl_ecdsa_meth; | ||
87 | } | ||
88 | |||
89 | static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
90 | BIGNUM **rp) | ||
91 | { | ||
92 | BN_CTX *ctx = NULL; | ||
93 | BIGNUM *k = NULL, *r = NULL, *order = NULL, *X = NULL; | ||
94 | EC_POINT *tmp_point=NULL; | ||
95 | const EC_GROUP *group; | ||
96 | int ret = 0; | ||
97 | |||
98 | if (eckey == NULL || (group = EC_KEY_get0_group(eckey)) == NULL) | ||
99 | { | ||
100 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_PASSED_NULL_PARAMETER); | ||
101 | return 0; | ||
102 | } | ||
103 | |||
104 | if (ctx_in == NULL) | ||
105 | { | ||
106 | if ((ctx = BN_CTX_new()) == NULL) | ||
107 | { | ||
108 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_MALLOC_FAILURE); | ||
109 | return 0; | ||
110 | } | ||
111 | } | ||
112 | else | ||
113 | ctx = ctx_in; | ||
114 | |||
115 | k = BN_new(); /* this value is later returned in *kinvp */ | ||
116 | r = BN_new(); /* this value is later returned in *rp */ | ||
117 | order = BN_new(); | ||
118 | X = BN_new(); | ||
119 | if (!k || !r || !order || !X) | ||
120 | { | ||
121 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_MALLOC_FAILURE); | ||
122 | goto err; | ||
123 | } | ||
124 | if ((tmp_point = EC_POINT_new(group)) == NULL) | ||
125 | { | ||
126 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
127 | goto err; | ||
128 | } | ||
129 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
130 | { | ||
131 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
132 | goto err; | ||
133 | } | ||
134 | |||
135 | do | ||
136 | { | ||
137 | /* get random k */ | ||
138 | do | ||
139 | if (!BN_rand_range(k, order)) | ||
140 | { | ||
141 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, | ||
142 | ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED); | ||
143 | goto err; | ||
144 | } | ||
145 | while (BN_is_zero(k)); | ||
146 | |||
147 | /* compute r the x-coordinate of generator * k */ | ||
148 | if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) | ||
149 | { | ||
150 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
151 | goto err; | ||
152 | } | ||
153 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) | ||
154 | { | ||
155 | if (!EC_POINT_get_affine_coordinates_GFp(group, | ||
156 | tmp_point, X, NULL, ctx)) | ||
157 | { | ||
158 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_EC_LIB); | ||
159 | goto err; | ||
160 | } | ||
161 | } | ||
162 | else /* NID_X9_62_characteristic_two_field */ | ||
163 | { | ||
164 | if (!EC_POINT_get_affine_coordinates_GF2m(group, | ||
165 | tmp_point, X, NULL, ctx)) | ||
166 | { | ||
167 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_EC_LIB); | ||
168 | goto err; | ||
169 | } | ||
170 | } | ||
171 | if (!BN_nnmod(r, X, order, ctx)) | ||
172 | { | ||
173 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_BN_LIB); | ||
174 | goto err; | ||
175 | } | ||
176 | } | ||
177 | while (BN_is_zero(r)); | ||
178 | |||
179 | /* compute the inverse of k */ | ||
180 | if (!BN_mod_inverse(k, k, order, ctx)) | ||
181 | { | ||
182 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_BN_LIB); | ||
183 | goto err; | ||
184 | } | ||
185 | /* clear old values if necessary */ | ||
186 | if (*rp != NULL) | ||
187 | BN_clear_free(*rp); | ||
188 | if (*kinvp != NULL) | ||
189 | BN_clear_free(*kinvp); | ||
190 | /* save the pre-computed values */ | ||
191 | *rp = r; | ||
192 | *kinvp = k; | ||
193 | ret = 1; | ||
194 | err: | ||
195 | if (!ret) | ||
196 | { | ||
197 | if (k != NULL) BN_clear_free(k); | ||
198 | if (r != NULL) BN_clear_free(r); | ||
199 | } | ||
200 | if (ctx_in == NULL) | ||
201 | BN_CTX_free(ctx); | ||
202 | if (order != NULL) | ||
203 | BN_free(order); | ||
204 | if (tmp_point != NULL) | ||
205 | EC_POINT_free(tmp_point); | ||
206 | if (X) | ||
207 | BN_clear_free(X); | ||
208 | return(ret); | ||
209 | } | ||
210 | |||
211 | |||
212 | static ECDSA_SIG *ecdsa_do_sign(const unsigned char *dgst, int dgst_len, | ||
213 | const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) | ||
214 | { | ||
215 | int ok = 0; | ||
216 | BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; | ||
217 | const BIGNUM *ckinv; | ||
218 | BN_CTX *ctx = NULL; | ||
219 | const EC_GROUP *group; | ||
220 | ECDSA_SIG *ret; | ||
221 | ECDSA_DATA *ecdsa; | ||
222 | const BIGNUM *priv_key; | ||
223 | |||
224 | ecdsa = ecdsa_check(eckey); | ||
225 | group = EC_KEY_get0_group(eckey); | ||
226 | priv_key = EC_KEY_get0_private_key(eckey); | ||
227 | |||
228 | if (group == NULL || priv_key == NULL || ecdsa == NULL) | ||
229 | { | ||
230 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_PASSED_NULL_PARAMETER); | ||
231 | return NULL; | ||
232 | } | ||
233 | |||
234 | ret = ECDSA_SIG_new(); | ||
235 | if (!ret) | ||
236 | { | ||
237 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
238 | return NULL; | ||
239 | } | ||
240 | s = ret->s; | ||
241 | |||
242 | if ((ctx = BN_CTX_new()) == NULL || (order = BN_new()) == NULL || | ||
243 | (tmp = BN_new()) == NULL || (m = BN_new()) == NULL) | ||
244 | { | ||
245 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
246 | goto err; | ||
247 | } | ||
248 | |||
249 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
250 | { | ||
251 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_EC_LIB); | ||
252 | goto err; | ||
253 | } | ||
254 | if (8 * dgst_len > BN_num_bits(order)) | ||
255 | { | ||
256 | /* XXX | ||
257 | * | ||
258 | * Should provide for optional hash truncation: | ||
259 | * Keep the BN_num_bits(order) leftmost bits of dgst | ||
260 | * (see March 2006 FIPS 186-3 draft, which has a few | ||
261 | * confusing errors in this part though) | ||
262 | */ | ||
263 | |||
264 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, | ||
265 | ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
266 | goto err; | ||
267 | } | ||
268 | |||
269 | if (!BN_bin2bn(dgst, dgst_len, m)) | ||
270 | { | ||
271 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
272 | goto err; | ||
273 | } | ||
274 | do | ||
275 | { | ||
276 | if (in_kinv == NULL || in_r == NULL) | ||
277 | { | ||
278 | if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) | ||
279 | { | ||
280 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN,ERR_R_ECDSA_LIB); | ||
281 | goto err; | ||
282 | } | ||
283 | ckinv = kinv; | ||
284 | } | ||
285 | else | ||
286 | { | ||
287 | ckinv = in_kinv; | ||
288 | if (BN_copy(ret->r, in_r) == NULL) | ||
289 | { | ||
290 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
291 | goto err; | ||
292 | } | ||
293 | } | ||
294 | |||
295 | if (!BN_mod_mul(tmp, priv_key, ret->r, order, ctx)) | ||
296 | { | ||
297 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
298 | goto err; | ||
299 | } | ||
300 | if (!BN_mod_add_quick(s, tmp, m, order)) | ||
301 | { | ||
302 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
303 | goto err; | ||
304 | } | ||
305 | if (!BN_mod_mul(s, s, ckinv, order, ctx)) | ||
306 | { | ||
307 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
308 | goto err; | ||
309 | } | ||
310 | if (BN_is_zero(s)) | ||
311 | { | ||
312 | /* if kinv and r have been supplied by the caller | ||
313 | * don't to generate new kinv and r values */ | ||
314 | if (in_kinv != NULL && in_r != NULL) | ||
315 | { | ||
316 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ECDSA_R_NEED_NEW_SETUP_VALUES); | ||
317 | goto err; | ||
318 | } | ||
319 | } | ||
320 | else | ||
321 | /* s != 0 => we have a valid signature */ | ||
322 | break; | ||
323 | } | ||
324 | while (1); | ||
325 | |||
326 | ok = 1; | ||
327 | err: | ||
328 | if (!ok) | ||
329 | { | ||
330 | ECDSA_SIG_free(ret); | ||
331 | ret = NULL; | ||
332 | } | ||
333 | if (ctx) | ||
334 | BN_CTX_free(ctx); | ||
335 | if (m) | ||
336 | BN_clear_free(m); | ||
337 | if (tmp) | ||
338 | BN_clear_free(tmp); | ||
339 | if (order) | ||
340 | BN_free(order); | ||
341 | if (kinv) | ||
342 | BN_clear_free(kinv); | ||
343 | return ret; | ||
344 | } | ||
345 | |||
346 | static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len, | ||
347 | const ECDSA_SIG *sig, EC_KEY *eckey) | ||
348 | { | ||
349 | int ret = -1; | ||
350 | BN_CTX *ctx; | ||
351 | BIGNUM *order, *u1, *u2, *m, *X; | ||
352 | EC_POINT *point = NULL; | ||
353 | const EC_GROUP *group; | ||
354 | const EC_POINT *pub_key; | ||
355 | |||
356 | /* check input values */ | ||
357 | if (eckey == NULL || (group = EC_KEY_get0_group(eckey)) == NULL || | ||
358 | (pub_key = EC_KEY_get0_public_key(eckey)) == NULL || sig == NULL) | ||
359 | { | ||
360 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ECDSA_R_MISSING_PARAMETERS); | ||
361 | return -1; | ||
362 | } | ||
363 | |||
364 | ctx = BN_CTX_new(); | ||
365 | if (!ctx) | ||
366 | { | ||
367 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_MALLOC_FAILURE); | ||
368 | return -1; | ||
369 | } | ||
370 | BN_CTX_start(ctx); | ||
371 | order = BN_CTX_get(ctx); | ||
372 | u1 = BN_CTX_get(ctx); | ||
373 | u2 = BN_CTX_get(ctx); | ||
374 | m = BN_CTX_get(ctx); | ||
375 | X = BN_CTX_get(ctx); | ||
376 | if (!X) | ||
377 | { | ||
378 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
379 | goto err; | ||
380 | } | ||
381 | |||
382 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
383 | { | ||
384 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
385 | goto err; | ||
386 | } | ||
387 | if (8 * dgst_len > BN_num_bits(order)) | ||
388 | { | ||
389 | /* XXX | ||
390 | * | ||
391 | * Should provide for optional hash truncation: | ||
392 | * Keep the BN_num_bits(order) leftmost bits of dgst | ||
393 | * (see March 2006 FIPS 186-3 draft, which has a few | ||
394 | * confusing errors in this part though) | ||
395 | */ | ||
396 | |||
397 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, | ||
398 | ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
399 | ret = 0; | ||
400 | goto err; | ||
401 | } | ||
402 | |||
403 | if (BN_is_zero(sig->r) || BN_is_negative(sig->r) || | ||
404 | BN_ucmp(sig->r, order) >= 0 || BN_is_zero(sig->s) || | ||
405 | BN_is_negative(sig->s) || BN_ucmp(sig->s, order) >= 0) | ||
406 | { | ||
407 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ECDSA_R_BAD_SIGNATURE); | ||
408 | ret = 0; /* signature is invalid */ | ||
409 | goto err; | ||
410 | } | ||
411 | /* calculate tmp1 = inv(S) mod order */ | ||
412 | if (!BN_mod_inverse(u2, sig->s, order, ctx)) | ||
413 | { | ||
414 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
415 | goto err; | ||
416 | } | ||
417 | /* digest -> m */ | ||
418 | if (!BN_bin2bn(dgst, dgst_len, m)) | ||
419 | { | ||
420 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
421 | goto err; | ||
422 | } | ||
423 | /* u1 = m * tmp mod order */ | ||
424 | if (!BN_mod_mul(u1, m, u2, order, ctx)) | ||
425 | { | ||
426 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
427 | goto err; | ||
428 | } | ||
429 | /* u2 = r * w mod q */ | ||
430 | if (!BN_mod_mul(u2, sig->r, u2, order, ctx)) | ||
431 | { | ||
432 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
433 | goto err; | ||
434 | } | ||
435 | |||
436 | if ((point = EC_POINT_new(group)) == NULL) | ||
437 | { | ||
438 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_MALLOC_FAILURE); | ||
439 | goto err; | ||
440 | } | ||
441 | if (!EC_POINT_mul(group, point, u1, pub_key, u2, ctx)) | ||
442 | { | ||
443 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
444 | goto err; | ||
445 | } | ||
446 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) | ||
447 | { | ||
448 | if (!EC_POINT_get_affine_coordinates_GFp(group, | ||
449 | point, X, NULL, ctx)) | ||
450 | { | ||
451 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
452 | goto err; | ||
453 | } | ||
454 | } | ||
455 | else /* NID_X9_62_characteristic_two_field */ | ||
456 | { | ||
457 | if (!EC_POINT_get_affine_coordinates_GF2m(group, | ||
458 | point, X, NULL, ctx)) | ||
459 | { | ||
460 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
461 | goto err; | ||
462 | } | ||
463 | } | ||
464 | |||
465 | if (!BN_nnmod(u1, X, order, ctx)) | ||
466 | { | ||
467 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
468 | goto err; | ||
469 | } | ||
470 | /* if the signature is correct u1 is equal to sig->r */ | ||
471 | ret = (BN_ucmp(u1, sig->r) == 0); | ||
472 | err: | ||
473 | BN_CTX_end(ctx); | ||
474 | BN_CTX_free(ctx); | ||
475 | if (point) | ||
476 | EC_POINT_free(point); | ||
477 | return ret; | ||
478 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_sign.c b/src/lib/libcrypto/ecdsa/ecs_sign.c new file mode 100644 index 0000000000..74b1fe8caf --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_sign.c | |||
@@ -0,0 +1,104 @@ | |||
1 | /* crypto/ecdsa/ecdsa_sign.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include "ecs_locl.h" | ||
57 | #ifndef OPENSSL_NO_ENGINE | ||
58 | #include <openssl/engine.h> | ||
59 | #endif | ||
60 | |||
61 | ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) | ||
62 | { | ||
63 | return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); | ||
64 | } | ||
65 | |||
66 | ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, | ||
67 | const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) | ||
68 | { | ||
69 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
70 | if (ecdsa == NULL) | ||
71 | return NULL; | ||
72 | return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); | ||
73 | } | ||
74 | |||
75 | int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char | ||
76 | *sig, unsigned int *siglen, EC_KEY *eckey) | ||
77 | { | ||
78 | return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); | ||
79 | } | ||
80 | |||
81 | int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char | ||
82 | *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, | ||
83 | EC_KEY *eckey) | ||
84 | { | ||
85 | ECDSA_SIG *s; | ||
86 | s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); | ||
87 | if (s == NULL) | ||
88 | { | ||
89 | *siglen=0; | ||
90 | return 0; | ||
91 | } | ||
92 | *siglen = i2d_ECDSA_SIG(s, &sig); | ||
93 | ECDSA_SIG_free(s); | ||
94 | return 1; | ||
95 | } | ||
96 | |||
97 | int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
98 | BIGNUM **rp) | ||
99 | { | ||
100 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
101 | if (ecdsa == NULL) | ||
102 | return 0; | ||
103 | return ecdsa->meth->ecdsa_sign_setup(eckey, ctx_in, kinvp, rp); | ||
104 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_vrf.c b/src/lib/libcrypto/ecdsa/ecs_vrf.c new file mode 100644 index 0000000000..ef9acf7b61 --- /dev/null +++ b/src/lib/libcrypto/ecdsa/ecs_vrf.c | |||
@@ -0,0 +1,96 @@ | |||
1 | /* crypto/ecdsa/ecdsa_vrf.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include "ecs_locl.h" | ||
60 | #ifndef OPENSSL_NO_ENGINE | ||
61 | #include <openssl/engine.h> | ||
62 | #endif | ||
63 | |||
64 | /* returns | ||
65 | * 1: correct signature | ||
66 | * 0: incorrect signature | ||
67 | * -1: error | ||
68 | */ | ||
69 | int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ||
70 | const ECDSA_SIG *sig, EC_KEY *eckey) | ||
71 | { | ||
72 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
73 | if (ecdsa == NULL) | ||
74 | return 0; | ||
75 | return ecdsa->meth->ecdsa_do_verify(dgst, dgst_len, sig, eckey); | ||
76 | } | ||
77 | |||
78 | /* returns | ||
79 | * 1: correct signature | ||
80 | * 0: incorrect signature | ||
81 | * -1: error | ||
82 | */ | ||
83 | int ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, | ||
84 | const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) | ||
85 | { | ||
86 | ECDSA_SIG *s; | ||
87 | int ret=-1; | ||
88 | |||
89 | s = ECDSA_SIG_new(); | ||
90 | if (s == NULL) return(ret); | ||
91 | if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err; | ||
92 | ret=ECDSA_do_verify(dgst, dgst_len, s, eckey); | ||
93 | err: | ||
94 | ECDSA_SIG_free(s); | ||
95 | return(ret); | ||
96 | } | ||