libtommath: Fix possible integer overflow CVE-2023-36328
[heimdal.git] / lib / hx509 / crypto-ec.c
blobb7435c907b66eea6c88315088213cd7e8914ed88
1 /*
2 * Copyright (c) 2016 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include <config.h>
36 #ifdef HAVE_HCRYPTO_W_OPENSSL
37 #include <openssl/evp.h>
38 #include <openssl/ec.h>
39 #include <openssl/ecdsa.h>
40 #include <openssl/rsa.h>
41 #include <openssl/bn.h>
42 #include <openssl/objects.h>
43 #ifdef HAVE_OPENSSL_30
44 #include <openssl/asn1.h>
45 #include <openssl/core_names.h>
46 #endif
47 #define HEIM_NO_CRYPTO_HDRS
48 #endif /* HAVE_HCRYPTO_W_OPENSSL */
50 #include "hx_locl.h"
52 extern const AlgorithmIdentifier _hx509_signature_sha512_data;
53 extern const AlgorithmIdentifier _hx509_signature_sha384_data;
54 extern const AlgorithmIdentifier _hx509_signature_sha256_data;
55 extern const AlgorithmIdentifier _hx509_signature_sha1_data;
57 HX509_LIB_FUNCTION void HX509_LIB_CALL
58 _hx509_private_eckey_free(void *eckey)
60 #ifdef HAVE_HCRYPTO_W_OPENSSL
61 #ifdef HAVE_OPENSSL_30
62 EVP_PKEY_free(eckey);
63 #else
64 EC_KEY_free(eckey);
65 #endif
66 #endif
69 #ifdef HAVE_HCRYPTO_W_OPENSSL
70 static struct oid2nid_st {
71 const heim_oid *oid;
72 int nid;
73 } oid2nid[] = {
74 { ASN1_OID_ID_EC_GROUP_SECP256R1, NID_X9_62_prime256v1 },
75 #ifdef NID_secp521r1
76 { ASN1_OID_ID_EC_GROUP_SECP521R1, NID_secp521r1 },
77 #endif
78 #ifdef NID_secp384r1
79 { ASN1_OID_ID_EC_GROUP_SECP384R1, NID_secp384r1 },
80 #endif
81 #ifdef NID_secp160r1
82 { ASN1_OID_ID_EC_GROUP_SECP160R1, NID_secp160r1 },
83 #endif
84 #ifdef NID_secp160r2
85 { ASN1_OID_ID_EC_GROUP_SECP160R2, NID_secp160r2 },
86 #endif
87 /* XXX Add more! Add X25519! */
90 int
91 _hx509_ossl_oid2nid(heim_oid *oid)
93 size_t i;
95 for (i = 0; i < sizeof(oid2nid)/sizeof(oid2nid[0]); i++)
96 if (der_heim_oid_cmp(oid, oid2nid[i].oid) == 0)
97 return oid2nid[i].nid;
98 return NID_undef;
101 static int
102 ECParameters2nid(hx509_context context,
103 heim_octet_string *parameters,
104 int *nid)
106 ECParameters ecparam;
107 size_t size;
108 int ret;
110 if (parameters == NULL) {
111 ret = HX509_PARSING_KEY_FAILED;
112 hx509_set_error_string(context, 0, ret,
113 "EC parameters missing");
114 return ret;
117 ret = decode_ECParameters(parameters->data, parameters->length,
118 &ecparam, &size);
119 if (ret) {
120 hx509_set_error_string(context, 0, ret,
121 "Failed to decode EC parameters");
122 return ret;
125 if (ecparam.element != choice_ECParameters_namedCurve) {
126 free_ECParameters(&ecparam);
127 hx509_set_error_string(context, 0, ret,
128 "EC parameters is not a named curve");
129 return HX509_CRYPTO_SIG_INVALID_FORMAT;
132 *nid = _hx509_ossl_oid2nid(&ecparam.u.namedCurve);
133 free_ECParameters(&ecparam);
134 if (*nid == NID_undef) {
135 hx509_set_error_string(context, 0, ret,
136 "Failed to find matcing NID for EC curve");
137 return HX509_CRYPTO_SIG_INVALID_FORMAT;
139 return 0;
142 #ifdef HAVE_OPENSSL_30
143 static const EVP_MD *
144 signature_alg2digest_evp_md(hx509_context context,
145 const AlgorithmIdentifier *digest_alg)
147 if ((&digest_alg->algorithm == &asn1_oid_id_sha512 ||
148 der_heim_oid_cmp(&digest_alg->algorithm, &asn1_oid_id_sha512) == 0))
149 return EVP_sha512();
150 if ((&digest_alg->algorithm == &asn1_oid_id_sha384 ||
151 der_heim_oid_cmp(&digest_alg->algorithm, &asn1_oid_id_sha384) == 0))
152 return EVP_sha384();
153 if ((&digest_alg->algorithm == &asn1_oid_id_sha256 ||
154 der_heim_oid_cmp(&digest_alg->algorithm, &asn1_oid_id_sha256) == 0))
155 return EVP_sha256();
156 if ((&digest_alg->algorithm == &asn1_oid_id_secsig_sha_1 ||
157 der_heim_oid_cmp(&digest_alg->algorithm, &asn1_oid_id_secsig_sha_1) == 0))
158 return EVP_sha1();
159 if ((&digest_alg->algorithm == &asn1_oid_id_rsa_digest_md5 ||
160 der_heim_oid_cmp(&digest_alg->algorithm,
161 &asn1_oid_id_rsa_digest_md5) == 0))
162 return EVP_md5();
165 * XXX Decode the `digest_alg->algorithm' OID and include it in the error
166 * message.
168 hx509_set_error_string(context, 0, EINVAL,
169 "Digest algorithm not found");
170 return NULL;
172 #endif
180 static int
181 ecdsa_verify_signature(hx509_context context,
182 const struct signature_alg *sig_alg,
183 const Certificate *signer,
184 const AlgorithmIdentifier *alg,
185 const heim_octet_string *data,
186 const heim_octet_string *sig)
188 #ifdef HAVE_OPENSSL_30
189 const AlgorithmIdentifier *digest_alg = sig_alg->digest_alg;
190 const EVP_MD *md = signature_alg2digest_evp_md(context, digest_alg);
191 const SubjectPublicKeyInfo *spi;
192 const char *curve_sn = NULL; /* sn == short name in OpenSSL parlance */
193 OSSL_PARAM params[2];
194 EVP_PKEY_CTX *pctx = NULL;
195 EVP_MD_CTX *mdctx = NULL;
196 EVP_PKEY *template = NULL;
197 EVP_PKEY *public = NULL;
198 const unsigned char *p;
199 size_t len;
200 char *curve_sn_dup = NULL;
201 int groupnid;
202 int ret = 0;
204 spi = &signer->tbsCertificate.subjectPublicKeyInfo;
205 if (der_heim_oid_cmp(&spi->algorithm.algorithm,
206 ASN1_OID_ID_ECPUBLICKEY) != 0)
207 hx509_set_error_string(context, 0,
208 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
209 /* XXX Include the OID in the message */
210 "Unsupported subjectPublicKey algorithm");
211 if (ret == 0)
212 ret = ECParameters2nid(context, spi->algorithm.parameters, &groupnid);
213 if (ret == 0 && (curve_sn = OBJ_nid2sn(groupnid)) == NULL)
214 hx509_set_error_string(context, 0,
215 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
216 "Could not resolve curve NID %d to its short name",
217 groupnid);
218 if (ret == 0 && (curve_sn_dup = strdup(curve_sn)) == NULL)
219 ret = hx509_enomem(context);
220 if (ret == 0 && (mdctx = EVP_MD_CTX_new()) == NULL)
221 ret = hx509_enomem(context);
224 * In order for d2i_PublicKey() to work we need to create a template key
225 * that has the curve parameters for the subjectPublicKey.
227 * Or maybe we could learn to use the OSSL_DECODER(3) API. But this works,
228 * at least until OpenSSL deprecates d2i_PublicKey() and forces us to use
229 * OSSL_DECODER(3).
231 if (ret == 0) {
233 * Apparently there's no error checking to be done here? Why does
234 * OSSL_PARAM_construct_utf8_string() want a non-const for the value?
235 * Is that a bug in OpenSSL?
237 params[0] = OSSL_PARAM_construct_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME,
238 curve_sn_dup, 0);
239 params[1] = OSSL_PARAM_construct_end();
241 if ((pctx = EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL)) == NULL)
242 ret = hx509_enomem(context);
244 if (ret == 0 && EVP_PKEY_fromdata_init(pctx) != 1)
245 ret = hx509_enomem(context);
246 if (ret == 0 &&
247 EVP_PKEY_fromdata(pctx, &template,
248 OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, params) != 1)
249 hx509_set_error_string(context, 0,
250 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
251 "Could not set up to parse key for curve %s",
252 curve_sn);
254 /* Finally we can decode the subjectPublicKey */
255 p = spi->subjectPublicKey.data;
256 len = spi->subjectPublicKey.length / 8;
257 if (ret == 0 &&
258 (public = d2i_PublicKey(EVP_PKEY_EC, &template, &p, len)) == NULL)
259 ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
261 /* EVP_DigestVerifyInit() will allocate a new pctx */
262 EVP_PKEY_CTX_free(pctx);
263 pctx = NULL;
265 if (ret == 0 &&
266 EVP_DigestVerifyInit(mdctx, &pctx, md, NULL, public) != 1)
267 hx509_set_error_string(context, 0,
268 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
269 "Could not initialize "
270 "OpenSSL signature verification");
271 if (ret == 0 &&
272 EVP_DigestVerifyUpdate(mdctx, data->data, data->length) != 1)
273 hx509_set_error_string(context, 0,
274 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
275 "Could not initialize "
276 "OpenSSL signature verification");
277 if (ret == 0 &&
278 EVP_DigestVerifyFinal(mdctx, sig->data, sig->length) != 1)
279 hx509_set_error_string(context, 0,
280 ret = HX509_CRYPTO_SIG_INVALID_FORMAT,
281 "Signature verification failed");
283 EVP_MD_CTX_free(mdctx);
284 EVP_PKEY_free(template);
285 free(curve_sn_dup);
286 return ret;
287 #else
288 const AlgorithmIdentifier *digest_alg;
289 const SubjectPublicKeyInfo *spi;
290 heim_octet_string digest;
291 int ret;
292 EC_KEY *key = NULL;
293 int groupnid;
294 EC_GROUP *group;
295 const unsigned char *p;
296 long len;
298 digest_alg = sig_alg->digest_alg;
300 ret = _hx509_create_signature(context,
301 NULL,
302 digest_alg,
303 data,
304 NULL,
305 &digest);
306 if (ret)
307 return ret;
309 /* set up EC KEY */
310 spi = &signer->tbsCertificate.subjectPublicKeyInfo;
312 if (der_heim_oid_cmp(&spi->algorithm.algorithm, ASN1_OID_ID_ECPUBLICKEY) != 0)
313 return HX509_CRYPTO_SIG_INVALID_FORMAT;
316 * Find the group id
319 ret = ECParameters2nid(context, spi->algorithm.parameters, &groupnid);
320 if (ret) {
321 der_free_octet_string(&digest);
322 return ret;
326 * Create group, key, parse key
329 key = EC_KEY_new();
330 group = EC_GROUP_new_by_curve_name(groupnid);
331 EC_KEY_set_group(key, group);
332 EC_GROUP_free(group);
334 p = spi->subjectPublicKey.data;
335 len = spi->subjectPublicKey.length / 8;
337 if (o2i_ECPublicKey(&key, &p, len) == NULL) {
338 EC_KEY_free(key);
339 return HX509_CRYPTO_SIG_INVALID_FORMAT;
342 ret = ECDSA_verify(-1, digest.data, digest.length,
343 sig->data, sig->length, key);
344 der_free_octet_string(&digest);
345 EC_KEY_free(key);
346 if (ret != 1) {
347 ret = HX509_CRYPTO_SIG_INVALID_FORMAT;
348 return ret;
351 return 0;
352 #endif
355 static int
356 ecdsa_create_signature(hx509_context context,
357 const struct signature_alg *sig_alg,
358 const hx509_private_key signer,
359 const AlgorithmIdentifier *alg,
360 const heim_octet_string *data,
361 AlgorithmIdentifier *signatureAlgorithm,
362 heim_octet_string *sig)
364 #ifdef HAVE_OPENSSL_30
365 const AlgorithmIdentifier *digest_alg = sig_alg->digest_alg;
366 const EVP_MD *md = signature_alg2digest_evp_md(context, digest_alg);
367 EVP_MD_CTX *mdctx = NULL;
368 EVP_PKEY_CTX *pctx = NULL;
369 const heim_oid *sig_oid;
370 int ret = 0;
372 sig->data = NULL;
373 sig->length = 0;
374 if (signer->ops && der_heim_oid_cmp(signer->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) != 0)
375 _hx509_abort("internal error passing private key to wrong ops");
377 sig_oid = sig_alg->sig_oid;
378 digest_alg = sig_alg->digest_alg;
380 if (signatureAlgorithm)
381 ret = _hx509_set_digest_alg(signatureAlgorithm, sig_oid,
382 "\x05\x00", 2);
383 mdctx = EVP_MD_CTX_new();
384 if (mdctx == NULL)
385 ret = hx509_enomem(context);
386 if (ret == 0 && EVP_DigestSignInit(mdctx, &pctx, md, NULL,
387 signer->private_key.ecdsa) != 1)
388 ret = HX509_CMS_FAILED_CREATE_SIGATURE;
389 if (ret == 0 && EVP_DigestSignUpdate(mdctx, data->data, data->length) != 1)
390 ret = HX509_CMS_FAILED_CREATE_SIGATURE;
391 if (ret == 0 && EVP_DigestSignFinal(mdctx, NULL, &sig->length) != 1)
392 ret = HX509_CMS_FAILED_CREATE_SIGATURE;
393 if (ret == 0 && (sig->data = malloc(sig->length)) == NULL)
394 ret = hx509_enomem(context);
395 if (ret == 0 && EVP_DigestSignFinal(mdctx, sig->data, &sig->length) != 1)
396 ret = HX509_CMS_FAILED_CREATE_SIGATURE;
398 if (ret == HX509_CMS_FAILED_CREATE_SIGATURE) {
399 /* XXX Extract error detail from OpenSSL */
400 hx509_set_error_string(context, 0, ret,
401 "ECDSA sign failed");
404 if (ret) {
405 if (signatureAlgorithm)
406 free_AlgorithmIdentifier(signatureAlgorithm);
407 free(sig->data);
408 sig->data = NULL;
409 sig->length = 0;
411 EVP_MD_CTX_free(mdctx);
412 return ret;
413 #else
414 const AlgorithmIdentifier *digest_alg;
415 heim_octet_string indata;
416 const heim_oid *sig_oid;
417 unsigned int siglen;
418 int ret;
420 if (signer->ops && der_heim_oid_cmp(signer->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) != 0)
421 _hx509_abort("internal error passing private key to wrong ops");
423 sig_oid = sig_alg->sig_oid;
424 digest_alg = sig_alg->digest_alg;
426 if (signatureAlgorithm) {
427 ret = _hx509_set_digest_alg(signatureAlgorithm, sig_oid,
428 "\x05\x00", 2);
429 if (ret) {
430 hx509_clear_error_string(context);
431 return ret;
435 ret = _hx509_create_signature(context,
436 NULL,
437 digest_alg,
438 data,
439 NULL,
440 &indata);
441 if (ret)
442 goto error;
444 sig->length = ECDSA_size(signer->private_key.ecdsa);
445 sig->data = malloc(sig->length);
446 if (sig->data == NULL) {
447 der_free_octet_string(&indata);
448 ret = ENOMEM;
449 hx509_set_error_string(context, 0, ret, "out of memory");
450 goto error;
453 siglen = sig->length;
455 ret = ECDSA_sign(-1, indata.data, indata.length,
456 sig->data, &siglen, signer->private_key.ecdsa);
457 der_free_octet_string(&indata);
458 if (ret != 1) {
459 ret = HX509_CMS_FAILED_CREATE_SIGATURE;
460 hx509_set_error_string(context, 0, ret,
461 "ECDSA sign failed: %d", ret);
462 goto error;
464 if (siglen > sig->length)
465 _hx509_abort("ECDSA signature prelen longer than output len");
467 sig->length = siglen;
469 return 0;
470 error:
471 if (signatureAlgorithm)
472 free_AlgorithmIdentifier(signatureAlgorithm);
473 return ret;
474 #endif
477 static int
478 ecdsa_available(const hx509_private_key signer,
479 const AlgorithmIdentifier *sig_alg)
481 #ifdef HAVE_OPENSSL_30
482 const struct signature_alg *sig;
483 size_t group_name_len = 0;
484 char group_name_buf[96];
485 EC_GROUP *group = NULL;
486 BN_CTX *bnctx = NULL;
487 BIGNUM *order = NULL;
488 int ret = 0;
490 if (der_heim_oid_cmp(signer->ops->key_oid, &asn1_oid_id_ecPublicKey) != 0)
491 _hx509_abort("internal error passing private key to wrong ops");
493 sig = _hx509_find_sig_alg(&sig_alg->algorithm);
494 if (sig == NULL || sig->digest_size == 0)
495 return 0;
497 if (EVP_PKEY_get_group_name(signer->private_key.ecdsa, group_name_buf,
498 sizeof(group_name_buf),
499 &group_name_len) != 1 ||
500 group_name_len >= sizeof(group_name_buf)) {
501 return 0;
503 group = EC_GROUP_new_by_curve_name(OBJ_txt2nid(group_name_buf));
504 bnctx = BN_CTX_new();
505 order = BN_new();
506 if (group && bnctx && order &&
507 EC_GROUP_get_order(group, order, bnctx) == 1)
508 ret = 1;
510 #if 0
512 * If anything, require a digest at least as wide as the EC key size
514 * if (BN_num_bytes(order) > sig->digest_size)
515 * ret = 0;
517 #endif
519 BN_CTX_free(bnctx);
520 BN_clear_free(order);
521 EC_GROUP_free(group);
522 return ret;
523 #else
524 const struct signature_alg *sig;
525 const EC_GROUP *group;
526 BN_CTX *bnctx = NULL;
527 BIGNUM *order = NULL;
528 int ret = 0;
530 if (der_heim_oid_cmp(signer->ops->key_oid, &asn1_oid_id_ecPublicKey) != 0)
531 _hx509_abort("internal error passing private key to wrong ops");
533 sig = _hx509_find_sig_alg(&sig_alg->algorithm);
535 if (sig == NULL || sig->digest_size == 0)
536 return 0;
538 group = EC_KEY_get0_group(signer->private_key.ecdsa);
539 if (group == NULL)
540 return 0;
542 bnctx = BN_CTX_new();
543 order = BN_new();
544 if (order == NULL)
545 goto err;
547 if (EC_GROUP_get_order(group, order, bnctx) != 1)
548 goto err;
550 #if 0
551 /* If anything, require a digest at least as wide as the EC key size */
552 if (BN_num_bytes(order) > sig->digest_size)
553 #endif
554 ret = 1;
555 err:
556 if (bnctx)
557 BN_CTX_free(bnctx);
558 if (order)
559 BN_clear_free(order);
561 return ret;
562 #endif
565 static int
566 ecdsa_private_key2SPKI(hx509_context context,
567 hx509_private_key private_key,
568 SubjectPublicKeyInfo *spki)
570 memset(spki, 0, sizeof(*spki));
571 return ENOMEM;
574 static int
575 ecdsa_private_key_export(hx509_context context,
576 const hx509_private_key key,
577 hx509_key_format_t format,
578 heim_octet_string *data)
580 return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
583 static int
584 ecdsa_private_key_import(hx509_context context,
585 const AlgorithmIdentifier *keyai,
586 const void *data,
587 size_t len,
588 hx509_key_format_t format,
589 hx509_private_key private_key)
591 #ifdef HAVE_OPENSSL_30
592 const unsigned char *p = data;
593 EVP_PKEY *key = NULL;
594 int ret = 0;
596 switch (format) {
597 case HX509_KEY_FORMAT_PKCS8:
598 key = d2i_PrivateKey(EVP_PKEY_EC, NULL, &p, len);
599 if (key == NULL) {
600 hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
601 "Failed to parse EC private key");
602 return HX509_PARSING_KEY_FAILED;
604 break;
606 default:
607 return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
611 * We used to have to call EC_KEY_new(), then EC_KEY_set_group() the group
612 * (curve) on the resulting EC_KEY _before_ we could d2i_ECPrivateKey() the
613 * key, but that's all deprecated in OpenSSL 3.0.
615 * In fact, it's not clear how ever to assign a group to a private key,
616 * but that's what the documentation for d2i_PrivateKey() says: that
617 * its `EVP_PKEY **' argument must be non-NULL pointing to a key that
618 * has had the group set.
620 * However, from code inspection it's clear that when the ECParameters
621 * are present in the private key payload passed to d2i_PrivateKey(),
622 * the group will be taken from that.
624 * What we'll do is that if we have `keyai->parameters' we'll check if the
625 * key we got is for the same group.
627 if (keyai->parameters) {
628 size_t gname_len = 0;
629 char buf[96];
630 int got_group_nid = NID_undef;
631 int want_groupnid = NID_undef;
633 ret = ECParameters2nid(context, keyai->parameters, &want_groupnid);
634 if (ret == 0 &&
635 (EVP_PKEY_get_group_name(key, buf, sizeof(buf), &gname_len) != 1 ||
636 gname_len >= sizeof(buf)))
637 ret = HX509_ALG_NOT_SUPP;
638 if (ret == 0)
639 got_group_nid = OBJ_txt2nid(buf);
640 if (ret == 0 &&
641 (got_group_nid == NID_undef || want_groupnid != got_group_nid))
642 ret = HX509_ALG_NOT_SUPP;
645 if (ret == 0) {
646 private_key->private_key.ecdsa = key;
647 private_key->signature_alg = ASN1_OID_ID_ECDSA_WITH_SHA256;
648 key = NULL;
651 EVP_PKEY_free(key);
652 return ret;
653 #else
654 const unsigned char *p = data;
655 EC_KEY **pkey = NULL;
656 EC_KEY *key;
658 if (keyai->parameters) {
659 EC_GROUP *group;
660 int groupnid;
661 int ret;
663 ret = ECParameters2nid(context, keyai->parameters, &groupnid);
664 if (ret)
665 return ret;
667 key = EC_KEY_new();
668 if (key == NULL)
669 return ENOMEM;
671 group = EC_GROUP_new_by_curve_name(groupnid);
672 if (group == NULL) {
673 EC_KEY_free(key);
674 return ENOMEM;
676 EC_GROUP_set_asn1_flag(group, OPENSSL_EC_NAMED_CURVE);
677 if (EC_KEY_set_group(key, group) != 1) {
678 EC_KEY_free(key);
679 EC_GROUP_free(group);
680 return ENOMEM;
682 EC_GROUP_free(group);
683 pkey = &key;
686 switch (format) {
687 case HX509_KEY_FORMAT_DER:
689 private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len);
690 if (private_key->private_key.ecdsa == NULL) {
691 hx509_set_error_string(context, 0, HX509_PARSING_KEY_FAILED,
692 "Failed to parse EC private key");
693 return HX509_PARSING_KEY_FAILED;
695 private_key->signature_alg = ASN1_OID_ID_ECDSA_WITH_SHA256;
696 break;
698 default:
699 return HX509_CRYPTO_KEY_FORMAT_UNSUPPORTED;
702 return 0;
703 #endif
706 static int
707 ecdsa_generate_private_key(hx509_context context,
708 struct hx509_generate_private_context *ctx,
709 hx509_private_key private_key)
711 return ENOMEM;
714 static BIGNUM *
715 ecdsa_get_internal(hx509_context context,
716 hx509_private_key key,
717 const char *type)
719 return NULL;
722 static const unsigned ecPublicKey[] ={ 1, 2, 840, 10045, 2, 1 };
723 const AlgorithmIdentifier _hx509_signature_ecPublicKey = {
724 { 6, rk_UNCONST(ecPublicKey) }, NULL
727 static const unsigned ecdsa_with_sha256_oid[] ={ 1, 2, 840, 10045, 4, 3, 2 };
728 const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha256_data = {
729 { 7, rk_UNCONST(ecdsa_with_sha256_oid) }, NULL
732 static const unsigned ecdsa_with_sha384_oid[] ={ 1, 2, 840, 10045, 4, 3, 3 };
733 const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha384_data = {
734 { 7, rk_UNCONST(ecdsa_with_sha384_oid) }, NULL
737 static const unsigned ecdsa_with_sha512_oid[] ={ 1, 2, 840, 10045, 4, 3, 4 };
738 const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha512_data = {
739 { 7, rk_UNCONST(ecdsa_with_sha512_oid) }, NULL
742 static const unsigned ecdsa_with_sha1_oid[] ={ 1, 2, 840, 10045, 4, 1 };
743 const AlgorithmIdentifier _hx509_signature_ecdsa_with_sha1_data = {
744 { 6, rk_UNCONST(ecdsa_with_sha1_oid) }, NULL
747 hx509_private_key_ops ecdsa_private_key_ops = {
748 "EC PRIVATE KEY",
749 ASN1_OID_ID_ECPUBLICKEY,
750 ecdsa_available,
751 ecdsa_private_key2SPKI,
752 ecdsa_private_key_export,
753 ecdsa_private_key_import,
754 ecdsa_generate_private_key,
755 ecdsa_get_internal
758 const struct signature_alg ecdsa_with_sha512_alg = {
759 "ecdsa-with-sha512",
760 ASN1_OID_ID_ECDSA_WITH_SHA512,
761 &_hx509_signature_ecdsa_with_sha512_data,
762 ASN1_OID_ID_ECPUBLICKEY,
763 &_hx509_signature_sha512_data,
764 PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|
765 SIG_PUBLIC_SIG|SELF_SIGNED_OK,
767 NULL,
768 ecdsa_verify_signature,
769 ecdsa_create_signature,
773 const struct signature_alg ecdsa_with_sha384_alg = {
774 "ecdsa-with-sha384",
775 ASN1_OID_ID_ECDSA_WITH_SHA384,
776 &_hx509_signature_ecdsa_with_sha384_data,
777 ASN1_OID_ID_ECPUBLICKEY,
778 &_hx509_signature_sha384_data,
779 PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|
780 SIG_PUBLIC_SIG|SELF_SIGNED_OK,
782 NULL,
783 ecdsa_verify_signature,
784 ecdsa_create_signature,
788 const struct signature_alg ecdsa_with_sha256_alg = {
789 "ecdsa-with-sha256",
790 ASN1_OID_ID_ECDSA_WITH_SHA256,
791 &_hx509_signature_ecdsa_with_sha256_data,
792 ASN1_OID_ID_ECPUBLICKEY,
793 &_hx509_signature_sha256_data,
794 PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|
795 SIG_PUBLIC_SIG|SELF_SIGNED_OK,
797 NULL,
798 ecdsa_verify_signature,
799 ecdsa_create_signature,
803 const struct signature_alg ecdsa_with_sha1_alg = {
804 "ecdsa-with-sha1",
805 ASN1_OID_ID_ECDSA_WITH_SHA1,
806 &_hx509_signature_ecdsa_with_sha1_data,
807 ASN1_OID_ID_ECPUBLICKEY,
808 &_hx509_signature_sha1_data,
809 PROVIDE_CONF|REQUIRE_SIGNER|RA_RSA_USES_DIGEST_INFO|
810 SIG_PUBLIC_SIG|SELF_SIGNED_OK,
812 NULL,
813 ecdsa_verify_signature,
814 ecdsa_create_signature,
818 #endif /* HAVE_HCRYPTO_W_OPENSSL */
820 HX509_LIB_FUNCTION const AlgorithmIdentifier * HX509_LIB_CALL
821 hx509_signature_ecPublicKey(void)
823 #ifdef HAVE_HCRYPTO_W_OPENSSL
824 return &_hx509_signature_ecPublicKey;
825 #else
826 return NULL;
827 #endif /* HAVE_HCRYPTO_W_OPENSSL */
830 HX509_LIB_FUNCTION const AlgorithmIdentifier * HX509_LIB_CALL
831 hx509_signature_ecdsa_with_sha256(void)
833 #ifdef HAVE_HCRYPTO_W_OPENSSL
834 return &_hx509_signature_ecdsa_with_sha256_data;
835 #else
836 return NULL;
837 #endif /* HAVE_HCRYPTO_W_OPENSSL */