123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252 |
- /*
- * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- /*
- * A simple ASN.1 DER encoder/decoder for DSA-Sig-Value and ECDSA-Sig-Value.
- *
- * DSA-Sig-Value ::= SEQUENCE {
- * r INTEGER,
- * s INTEGER
- * }
- *
- * ECDSA-Sig-Value ::= SEQUENCE {
- * r INTEGER,
- * s INTEGER
- * }
- */
- #include <openssl/crypto.h>
- #include <openssl/bn.h>
- #include "crypto/asn1_dsa.h"
- #include "internal/packet.h"
- #define ID_SEQUENCE 0x30
- #define ID_INTEGER 0x02
- /*
- * Outputs the encoding of the length octets for a DER value with a content
- * length of cont_len bytes to pkt. The maximum supported content length is
- * 65535 (0xffff) bytes.
- *
- * Returns 1 on success or 0 on error.
- */
- int ossl_encode_der_length(WPACKET *pkt, size_t cont_len)
- {
- if (cont_len > 0xffff)
- return 0; /* Too large for supported length encodings */
- if (cont_len > 0xff) {
- if (!WPACKET_put_bytes_u8(pkt, 0x82)
- || !WPACKET_put_bytes_u16(pkt, cont_len))
- return 0;
- } else {
- if (cont_len > 0x7f
- && !WPACKET_put_bytes_u8(pkt, 0x81))
- return 0;
- if (!WPACKET_put_bytes_u8(pkt, cont_len))
- return 0;
- }
- return 1;
- }
- /*
- * Outputs the DER encoding of a positive ASN.1 INTEGER to pkt.
- *
- * Results in an error if n is negative or too large.
- *
- * Returns 1 on success or 0 on error.
- */
- int ossl_encode_der_integer(WPACKET *pkt, const BIGNUM *n)
- {
- unsigned char *bnbytes;
- size_t cont_len;
- if (BN_is_negative(n))
- return 0;
- /*
- * Calculate the ASN.1 INTEGER DER content length for n.
- * This is the number of whole bytes required to represent n (i.e. rounded
- * down), plus one.
- * If n is zero then the content is a single zero byte (length = 1).
- * If the number of bits of n is a multiple of 8 then an extra zero padding
- * byte is included to ensure that the value is still treated as positive
- * in the INTEGER two's complement representation.
- */
- cont_len = BN_num_bits(n) / 8 + 1;
- if (!WPACKET_start_sub_packet(pkt)
- || !WPACKET_put_bytes_u8(pkt, ID_INTEGER)
- || !ossl_encode_der_length(pkt, cont_len)
- || !WPACKET_allocate_bytes(pkt, cont_len, &bnbytes)
- || !WPACKET_close(pkt))
- return 0;
- if (bnbytes != NULL
- && BN_bn2binpad(n, bnbytes, (int)cont_len) != (int)cont_len)
- return 0;
- return 1;
- }
- /*
- * Outputs the DER encoding of a DSA-Sig-Value or ECDSA-Sig-Value to pkt. pkt
- * may be initialised with a NULL buffer which enables pkt to be used to
- * calculate how many bytes would be needed.
- *
- * Returns 1 on success or 0 on error.
- */
- int ossl_encode_der_dsa_sig(WPACKET *pkt, const BIGNUM *r, const BIGNUM *s)
- {
- WPACKET tmppkt, *dummypkt;
- size_t cont_len;
- int isnull = WPACKET_is_null_buf(pkt);
- if (!WPACKET_start_sub_packet(pkt))
- return 0;
- if (!isnull) {
- if (!WPACKET_init_null(&tmppkt, 0))
- return 0;
- dummypkt = &tmppkt;
- } else {
- /* If the input packet has a NULL buffer, we don't need a dummy packet */
- dummypkt = pkt;
- }
- /* Calculate the content length */
- if (!ossl_encode_der_integer(dummypkt, r)
- || !ossl_encode_der_integer(dummypkt, s)
- || !WPACKET_get_length(dummypkt, &cont_len)
- || (!isnull && !WPACKET_finish(dummypkt))) {
- if (!isnull)
- WPACKET_cleanup(dummypkt);
- return 0;
- }
- /* Add the tag and length bytes */
- if (!WPACKET_put_bytes_u8(pkt, ID_SEQUENCE)
- || !ossl_encode_der_length(pkt, cont_len)
- /*
- * Really encode the integers. We already wrote to the main pkt
- * if it had a NULL buffer, so don't do it again
- */
- || (!isnull && !ossl_encode_der_integer(pkt, r))
- || (!isnull && !ossl_encode_der_integer(pkt, s))
- || !WPACKET_close(pkt))
- return 0;
- return 1;
- }
- /*
- * Decodes the DER length octets in pkt and initialises subpkt with the
- * following bytes of that length.
- *
- * Returns 1 on success or 0 on failure.
- */
- int ossl_decode_der_length(PACKET *pkt, PACKET *subpkt)
- {
- unsigned int byte;
- if (!PACKET_get_1(pkt, &byte))
- return 0;
- if (byte < 0x80)
- return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte);
- if (byte == 0x81)
- return PACKET_get_length_prefixed_1(pkt, subpkt);
- if (byte == 0x82)
- return PACKET_get_length_prefixed_2(pkt, subpkt);
- /* Too large, invalid, or not DER. */
- return 0;
- }
- /*
- * Decodes a single ASN.1 INTEGER value from pkt, which must be DER encoded,
- * and updates n with the decoded value.
- *
- * The BIGNUM, n, must have already been allocated by calling BN_new().
- * pkt must not be NULL.
- *
- * An attempt to consume more than len bytes results in an error.
- * Returns 1 on success or 0 on error.
- *
- * If the PACKET is supposed to only contain a single INTEGER value with no
- * trailing garbage then it is up to the caller to verify that all bytes
- * were consumed.
- */
- int ossl_decode_der_integer(PACKET *pkt, BIGNUM *n)
- {
- PACKET contpkt, tmppkt;
- unsigned int tag, tmp;
- /* Check we have an integer and get the content bytes */
- if (!PACKET_get_1(pkt, &tag)
- || tag != ID_INTEGER
- || !ossl_decode_der_length(pkt, &contpkt))
- return 0;
- /* Peek ahead at the first bytes to check for proper encoding */
- tmppkt = contpkt;
- /* The INTEGER must be positive */
- if (!PACKET_get_1(&tmppkt, &tmp)
- || (tmp & 0x80) != 0)
- return 0;
- /* If there a zero padding byte the next byte must have the msb set */
- if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) {
- if (!PACKET_get_1(&tmppkt, &tmp)
- || (tmp & 0x80) == 0)
- return 0;
- }
- if (BN_bin2bn(PACKET_data(&contpkt),
- (int)PACKET_remaining(&contpkt), n) == NULL)
- return 0;
- return 1;
- }
- /*
- * Decodes a single DSA-Sig-Value or ECDSA-Sig-Value from *ppin, which must be
- * DER encoded, updates r and s with the decoded values, and increments *ppin
- * past the data that was consumed.
- *
- * The BIGNUMs, r and s, must have already been allocated by calls to BN_new().
- * ppin and *ppin must not be NULL.
- *
- * An attempt to consume more than len bytes results in an error.
- * Returns the number of bytes of input consumed or 0 if an error occurs.
- *
- * If the buffer is supposed to only contain a single [EC]DSA-Sig-Value with no
- * trailing garbage then it is up to the caller to verify that all bytes
- * were consumed.
- */
- size_t ossl_decode_der_dsa_sig(BIGNUM *r, BIGNUM *s,
- const unsigned char **ppin, size_t len)
- {
- size_t consumed;
- PACKET pkt, contpkt;
- unsigned int tag;
- if (!PACKET_buf_init(&pkt, *ppin, len)
- || !PACKET_get_1(&pkt, &tag)
- || tag != ID_SEQUENCE
- || !ossl_decode_der_length(&pkt, &contpkt)
- || !ossl_decode_der_integer(&contpkt, r)
- || !ossl_decode_der_integer(&contpkt, s)
- || PACKET_remaining(&contpkt) != 0)
- return 0;
- consumed = PACKET_data(&pkt) - *ppin;
- *ppin += consumed;
- return consumed;
- }
|