Implement ECDSA_SIG_{parse,marshal} with crypto/bytestring.
This is the first structure to be implemented with the new BIGNUM ASN.1 routines. Object reuse in the legacy d2i/i2d functions is implemented by releasing whatever was in *out before and setting it to the newly-allocated object. As with the new d2i_SSL_SESSION, this is a weaker form of object reuse, but should suffice for reasonable callers. As ECDSA_SIG is more likely to be parsed alone than as part of another structure (and using CBB is slightly tedious), add convenient functions which take byte arrays. For consistency with SSL_SESSION, they are named to/from_bytes. from_bytes, unlike the CBS variant, rejects trailing data. Note this changes some test expectations: BER signatures now push an error code. That they didn't do this was probably a mistake. BUG=499653 Change-Id: I9ec74db53e70d9a989412cc9e2b599be0454caec Reviewed-on: https://boringssl-review.googlesource.com/5269 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
6df1ac9092
commit
87897a8cea
@ -52,9 +52,11 @@
|
||||
|
||||
#include <openssl/ecdsa.h>
|
||||
|
||||
#include <assert.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/bytestring.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/mem.h>
|
||||
|
||||
@ -76,21 +78,24 @@ int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len,
|
||||
ECDSA_SIG *s;
|
||||
int ret = 0;
|
||||
uint8_t *der = NULL;
|
||||
size_t der_len;
|
||||
|
||||
if (eckey->ecdsa_meth && eckey->ecdsa_meth->verify) {
|
||||
return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
|
||||
}
|
||||
|
||||
s = ECDSA_SIG_new();
|
||||
const uint8_t *sigp = sig;
|
||||
if (s == NULL || d2i_ECDSA_SIG(&s, &sigp, sig_len) == NULL ||
|
||||
sigp != sig + sig_len) {
|
||||
/* Decode the ECDSA signature. */
|
||||
s = ECDSA_SIG_from_bytes(sig, sig_len);
|
||||
if (s == NULL) {
|
||||
goto err;
|
||||
}
|
||||
|
||||
/* Ensure that the signature uses DER and doesn't have trailing garbage. */
|
||||
const int der_len = i2d_ECDSA_SIG(s, &der);
|
||||
if (der_len < 0 || (size_t) der_len != sig_len || memcmp(sig, der, sig_len)) {
|
||||
/* Defend against potential laxness in the DER parser. */
|
||||
size_t der_len;
|
||||
if (!ECDSA_SIG_to_bytes(&der, &der_len, s) ||
|
||||
der_len != sig_len || memcmp(sig, der, sig_len) != 0) {
|
||||
/* This should never happen. crypto/bytestring is strictly DER. */
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_verify, ERR_R_INTERNAL_ERROR);
|
||||
goto err;
|
||||
}
|
||||
|
||||
@ -455,20 +460,36 @@ err:
|
||||
int ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len,
|
||||
uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv,
|
||||
const BIGNUM *r, EC_KEY *eckey) {
|
||||
int ret = 0;
|
||||
ECDSA_SIG *s = NULL;
|
||||
|
||||
if (eckey->ecdsa_meth && eckey->ecdsa_meth->sign) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_sign_ex, ECDSA_R_NOT_IMPLEMENTED);
|
||||
*sig_len = 0;
|
||||
return 0;
|
||||
goto err;
|
||||
}
|
||||
|
||||
s = ECDSA_do_sign_ex(digest, digest_len, kinv, r, eckey);
|
||||
if (s == NULL) {
|
||||
*sig_len = 0;
|
||||
return 0;
|
||||
goto err;
|
||||
}
|
||||
*sig_len = i2d_ECDSA_SIG(s, &sig);
|
||||
|
||||
CBB cbb;
|
||||
CBB_zero(&cbb);
|
||||
size_t len;
|
||||
if (!CBB_init_fixed(&cbb, sig, ECDSA_size(eckey)) ||
|
||||
!ECDSA_SIG_marshal(&cbb, s) ||
|
||||
!CBB_finish(&cbb, NULL, &len)) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_sign_ex, ECDSA_R_ENCODE_ERROR);
|
||||
CBB_cleanup(&cbb);
|
||||
*sig_len = 0;
|
||||
goto err;
|
||||
}
|
||||
*sig_len = (unsigned)len;
|
||||
ret = 1;
|
||||
|
||||
err:
|
||||
ECDSA_SIG_free(s);
|
||||
return 1;
|
||||
return ret;
|
||||
}
|
||||
|
@ -52,24 +52,18 @@
|
||||
|
||||
#include <openssl/ecdsa.h>
|
||||
|
||||
#include <openssl/asn1.h>
|
||||
#include <openssl/asn1t.h>
|
||||
#include <limits.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <openssl/bn.h>
|
||||
#include <openssl/bytestring.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/ec_key.h>
|
||||
#include <openssl/mem.h>
|
||||
|
||||
#include "../ec/internal.h"
|
||||
|
||||
|
||||
DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG);
|
||||
DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG);
|
||||
|
||||
ASN1_SEQUENCE(ECDSA_SIG) = {
|
||||
ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM),
|
||||
ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM),
|
||||
} ASN1_SEQUENCE_END(ECDSA_SIG);
|
||||
|
||||
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(ECDSA_SIG, ECDSA_SIG, ECDSA_SIG);
|
||||
|
||||
size_t ECDSA_size(const EC_KEY *key) {
|
||||
if (key == NULL) {
|
||||
return 0;
|
||||
@ -124,6 +118,61 @@ void ECDSA_SIG_free(ECDSA_SIG *sig) {
|
||||
OPENSSL_free(sig);
|
||||
}
|
||||
|
||||
ECDSA_SIG *ECDSA_SIG_parse(CBS *cbs) {
|
||||
ECDSA_SIG *ret = ECDSA_SIG_new();
|
||||
if (ret == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
CBS child;
|
||||
if (!CBS_get_asn1(cbs, &child, CBS_ASN1_SEQUENCE) ||
|
||||
!BN_cbs2unsigned(&child, ret->r) ||
|
||||
!BN_cbs2unsigned(&child, ret->s) ||
|
||||
CBS_len(&child) != 0) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_SIG_parse, ECDSA_R_BAD_SIGNATURE);
|
||||
ECDSA_SIG_free(ret);
|
||||
return NULL;
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
ECDSA_SIG *ECDSA_SIG_from_bytes(const uint8_t *in, size_t in_len) {
|
||||
CBS cbs;
|
||||
CBS_init(&cbs, in, in_len);
|
||||
ECDSA_SIG *ret = ECDSA_SIG_parse(&cbs);
|
||||
if (ret == NULL || CBS_len(&cbs) != 0) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_SIG_from_bytes, ECDSA_R_BAD_SIGNATURE);
|
||||
ECDSA_SIG_free(ret);
|
||||
return NULL;
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
int ECDSA_SIG_marshal(CBB *cbb, const ECDSA_SIG *sig) {
|
||||
CBB child;
|
||||
if (!CBB_add_asn1(cbb, &child, CBS_ASN1_SEQUENCE) ||
|
||||
!BN_bn2cbb(&child, sig->r) ||
|
||||
!BN_bn2cbb(&child, sig->s) ||
|
||||
!CBB_flush(cbb)) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_SIG_marshal, ECDSA_R_ENCODE_ERROR);
|
||||
return 0;
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
int ECDSA_SIG_to_bytes(uint8_t **out_bytes, size_t *out_len,
|
||||
const ECDSA_SIG *sig) {
|
||||
CBB cbb;
|
||||
CBB_zero(&cbb);
|
||||
if (!CBB_init(&cbb, 0) ||
|
||||
!ECDSA_SIG_marshal(&cbb, sig) ||
|
||||
!CBB_finish(&cbb, out_bytes, out_len)) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, ECDSA_SIG_to_bytes, ECDSA_R_ENCODE_ERROR);
|
||||
CBB_cleanup(&cbb);
|
||||
return 0;
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* der_len_len returns the number of bytes needed to represent a length of |len|
|
||||
* in DER. */
|
||||
static size_t der_len_len(size_t len) {
|
||||
@ -157,3 +206,45 @@ size_t ECDSA_SIG_max_len(size_t order_len) {
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **out, const uint8_t **inp, long len) {
|
||||
if (len < 0) {
|
||||
return NULL;
|
||||
}
|
||||
CBS cbs;
|
||||
CBS_init(&cbs, *inp, (size_t)len);
|
||||
ECDSA_SIG *ret = ECDSA_SIG_parse(&cbs);
|
||||
if (ret == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
if (out != NULL) {
|
||||
ECDSA_SIG_free(*out);
|
||||
*out = ret;
|
||||
}
|
||||
*inp += (size_t)len - CBS_len(&cbs);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int i2d_ECDSA_SIG(const ECDSA_SIG *sig, uint8_t **outp) {
|
||||
uint8_t *der;
|
||||
size_t der_len;
|
||||
if (!ECDSA_SIG_to_bytes(&der, &der_len, sig)) {
|
||||
return -1;
|
||||
}
|
||||
if (der_len > INT_MAX) {
|
||||
OPENSSL_PUT_ERROR(ECDSA, i2d_ECDSA_SIG, ERR_R_OVERFLOW);
|
||||
OPENSSL_free(der);
|
||||
return -1;
|
||||
}
|
||||
if (outp != NULL) {
|
||||
if (*outp == NULL) {
|
||||
*outp = der;
|
||||
der = NULL;
|
||||
} else {
|
||||
memcpy(*outp, der, der_len);
|
||||
*outp += der_len;
|
||||
}
|
||||
}
|
||||
OPENSSL_free(der);
|
||||
return (int)der_len;
|
||||
}
|
||||
|
@ -1,9 +1,17 @@
|
||||
ECDSA,function,106,ECDSA_SIG_from_bytes
|
||||
ECDSA,function,107,ECDSA_SIG_marshal
|
||||
ECDSA,function,108,ECDSA_SIG_parse
|
||||
ECDSA,function,109,ECDSA_SIG_to_bytes
|
||||
ECDSA,function,100,ECDSA_do_sign_ex
|
||||
ECDSA,function,101,ECDSA_do_verify
|
||||
ECDSA,function,102,ECDSA_sign_ex
|
||||
ECDSA,function,110,ECDSA_verify
|
||||
ECDSA,function,105,d2i_ECDSA_SIG
|
||||
ECDSA,function,103,digest_to_bn
|
||||
ECDSA,function,104,ecdsa_sign_setup
|
||||
ECDSA,function,112,i2d_ECDSA_SIG
|
||||
ECDSA,reason,100,BAD_SIGNATURE
|
||||
ECDSA,reason,105,ENCODE_ERROR
|
||||
ECDSA,reason,101,MISSING_PARAMETERS
|
||||
ECDSA,reason,102,NEED_NEW_SETUP_VALUES
|
||||
ECDSA,reason,103,NOT_IMPLEMENTED
|
||||
|
@ -163,12 +163,11 @@ Digest = SHA1
|
||||
Input = "0123456789ABCDEF1234"
|
||||
Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec800
|
||||
# This operation fails without an error code, so ERR_R_EVP_LIB is surfaced.
|
||||
Error = public key routines
|
||||
Error = BAD_SIGNATURE
|
||||
|
||||
# BER signature
|
||||
Verify = P-256
|
||||
Digest = SHA1
|
||||
Input = "0123456789ABCDEF1234"
|
||||
Output = 3080022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec80000
|
||||
# This operation fails without an error code, so ERR_R_EVP_LIB is surfaced.
|
||||
Error = public key routines
|
||||
Error = BAD_SIGNATURE
|
||||
|
@ -148,6 +148,34 @@ OPENSSL_EXPORT int ECDSA_sign_ex(int type, const uint8_t *digest,
|
||||
|
||||
/* ASN.1 functions. */
|
||||
|
||||
/* ECDSA_SIG_parse parses a DER-encoded ECDSA-Sig-Value structure from |cbs| and
|
||||
* advances |cbs|. It returns a newly-allocated |ECDSA_SIG| or NULL on error. */
|
||||
OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_parse(CBS *cbs);
|
||||
|
||||
/* ECDSA_SIG_from_bytes parses |in| as a DER-encoded ECDSA-Sig-Value structure.
|
||||
* It returns a newly-allocated |ECDSA_SIG| structure or NULL on error. */
|
||||
OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_from_bytes(const uint8_t *in,
|
||||
size_t in_len);
|
||||
|
||||
/* ECDSA_SIG_marshal marshals |sig| as a DER-encoded ECDSA-Sig-Value and appends
|
||||
* the result to |cbb|. It returns one on success and zero on error. */
|
||||
OPENSSL_EXPORT int ECDSA_SIG_marshal(CBB *cbb, const ECDSA_SIG *sig);
|
||||
|
||||
/* ECDSA_SIG_to_asn1 marshals |sig| as a DER-encoded ECDSA-Sig-Value and, on
|
||||
* success, sets |*out_bytes| to a newly allocated buffer containing the result
|
||||
* and returns one. Otherwise, it returns zero. The result should be freed with
|
||||
* |OPENSSL_free|. */
|
||||
OPENSSL_EXPORT int ECDSA_SIG_to_bytes(uint8_t **out_bytes, size_t *out_len,
|
||||
const ECDSA_SIG *sig);
|
||||
|
||||
/* ECDSA_SIG_max_len returns the maximum length of a DER-encoded ECDSA-Sig-Value
|
||||
* structure for a group whose order is represented in |order_len| bytes, or
|
||||
* zero on overflow. */
|
||||
OPENSSL_EXPORT size_t ECDSA_SIG_max_len(size_t order_len);
|
||||
|
||||
|
||||
/* Deprecated functions. */
|
||||
|
||||
/* d2i_ECDSA_SIG parses an ASN.1, DER-encoded, signature from |len| bytes at
|
||||
* |*inp|. If |out| is not NULL then, on exit, a pointer to the result is in
|
||||
* |*out|. If |*out| is already non-NULL on entry then the result is written
|
||||
@ -163,11 +191,6 @@ OPENSSL_EXPORT ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **out, const uint8_t **inp,
|
||||
* the result, whether written or not, or a negative value on error. */
|
||||
OPENSSL_EXPORT int i2d_ECDSA_SIG(const ECDSA_SIG *sig, uint8_t **outp);
|
||||
|
||||
/* ECDSA_SIG_max_len returns the maximum length of a DER-encoded ECDSA-Sig-Value
|
||||
* structure for a group whose order is represented in |order_len| bytes, or
|
||||
* zero on overflow. */
|
||||
OPENSSL_EXPORT size_t ECDSA_SIG_max_len(size_t order_len);
|
||||
|
||||
|
||||
#if defined(__cplusplus)
|
||||
} /* extern C */
|
||||
@ -178,10 +201,18 @@ OPENSSL_EXPORT size_t ECDSA_SIG_max_len(size_t order_len);
|
||||
#define ECDSA_F_ECDSA_sign_ex 102
|
||||
#define ECDSA_F_digest_to_bn 103
|
||||
#define ECDSA_F_ecdsa_sign_setup 104
|
||||
#define ECDSA_F_d2i_ECDSA_SIG 105
|
||||
#define ECDSA_F_ECDSA_SIG_from_bytes 106
|
||||
#define ECDSA_F_ECDSA_SIG_marshal 107
|
||||
#define ECDSA_F_ECDSA_SIG_parse 108
|
||||
#define ECDSA_F_ECDSA_SIG_to_bytes 109
|
||||
#define ECDSA_F_ECDSA_verify 110
|
||||
#define ECDSA_F_i2d_ECDSA_SIG 112
|
||||
#define ECDSA_R_BAD_SIGNATURE 100
|
||||
#define ECDSA_R_MISSING_PARAMETERS 101
|
||||
#define ECDSA_R_NEED_NEW_SETUP_VALUES 102
|
||||
#define ECDSA_R_NOT_IMPLEMENTED 103
|
||||
#define ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED 104
|
||||
#define ECDSA_R_ENCODE_ERROR 105
|
||||
|
||||
#endif /* OPENSSL_HEADER_ECDSA_H */
|
||||
|
Loading…
Reference in New Issue
Block a user