| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252 | 
							- /*
 
-  * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
 
-  *
 
-  * Licensed under the Apache License 2.0 (the "License").  You may not use
 
-  * this file except in compliance with the License.  You can obtain a copy
 
-  * in the file LICENSE in the source distribution or at
 
-  * https://www.openssl.org/source/license.html
 
-  */
 
- /*
 
-  * A simple ASN.1 DER encoder/decoder for DSA-Sig-Value and ECDSA-Sig-Value.
 
-  *
 
-  * DSA-Sig-Value ::= SEQUENCE {
 
-  *  r  INTEGER,
 
-  *  s  INTEGER
 
-  * }
 
-  *
 
-  * ECDSA-Sig-Value ::= SEQUENCE {
 
-  *  r  INTEGER,
 
-  *  s  INTEGER
 
-  * }
 
-  */
 
- #include <openssl/crypto.h>
 
- #include <openssl/bn.h>
 
- #include "crypto/asn1_dsa.h"
 
- #include "internal/packet.h"
 
- #define ID_SEQUENCE 0x30
 
- #define ID_INTEGER 0x02
 
- /*
 
-  * Outputs the encoding of the length octets for a DER value with a content
 
-  * length of cont_len bytes to pkt. The maximum supported content length is
 
-  * 65535 (0xffff) bytes.
 
-  *
 
-  * Returns 1 on success or 0 on error.
 
-  */
 
- int ossl_encode_der_length(WPACKET *pkt, size_t cont_len)
 
- {
 
-     if (cont_len > 0xffff)
 
-         return 0; /* Too large for supported length encodings */
 
-     if (cont_len > 0xff) {
 
-         if (!WPACKET_put_bytes_u8(pkt, 0x82)
 
-                 || !WPACKET_put_bytes_u16(pkt, cont_len))
 
-             return 0;
 
-     } else {
 
-         if (cont_len > 0x7f
 
-                 && !WPACKET_put_bytes_u8(pkt, 0x81))
 
-             return 0;
 
-         if (!WPACKET_put_bytes_u8(pkt, cont_len))
 
-             return 0;
 
-     }
 
-     return 1;
 
- }
 
- /*
 
-  * Outputs the DER encoding of a positive ASN.1 INTEGER to pkt.
 
-  *
 
-  * Results in an error if n is negative or too large.
 
-  *
 
-  * Returns 1 on success or 0 on error.
 
-  */
 
- int ossl_encode_der_integer(WPACKET *pkt, const BIGNUM *n)
 
- {
 
-     unsigned char *bnbytes;
 
-     size_t cont_len;
 
-     if (BN_is_negative(n))
 
-         return 0;
 
-     /*
 
-      * Calculate the ASN.1 INTEGER DER content length for n.
 
-      * This is the number of whole bytes required to represent n (i.e. rounded
 
-      * down), plus one.
 
-      * If n is zero then the content is a single zero byte (length = 1).
 
-      * If the number of bits of n is a multiple of 8 then an extra zero padding
 
-      * byte is included to ensure that the value is still treated as positive
 
-      * in the INTEGER two's complement representation.
 
-      */
 
-     cont_len = BN_num_bits(n) / 8 + 1;
 
-     if (!WPACKET_start_sub_packet(pkt)
 
-             || !WPACKET_put_bytes_u8(pkt, ID_INTEGER)
 
-             || !ossl_encode_der_length(pkt, cont_len)
 
-             || !WPACKET_allocate_bytes(pkt, cont_len, &bnbytes)
 
-             || !WPACKET_close(pkt))
 
-         return 0;
 
-     if (bnbytes != NULL
 
-             && BN_bn2binpad(n, bnbytes, (int)cont_len) != (int)cont_len)
 
-         return 0;
 
-     return 1;
 
- }
 
- /*
 
-  * Outputs the DER encoding of a DSA-Sig-Value or ECDSA-Sig-Value to pkt. pkt
 
-  * may be initialised with a NULL buffer which enables pkt to be used to
 
-  * calculate how many bytes would be needed.
 
-  *
 
-  * Returns 1 on success or 0 on error.
 
-  */
 
- int ossl_encode_der_dsa_sig(WPACKET *pkt, const BIGNUM *r, const BIGNUM *s)
 
- {
 
-     WPACKET tmppkt, *dummypkt;
 
-     size_t cont_len;
 
-     int isnull = WPACKET_is_null_buf(pkt);
 
-     if (!WPACKET_start_sub_packet(pkt))
 
-         return 0;
 
-     if (!isnull) {
 
-         if (!WPACKET_init_null(&tmppkt, 0))
 
-             return 0;
 
-         dummypkt = &tmppkt;
 
-     } else {
 
-         /* If the input packet has a NULL buffer, we don't need a dummy packet */
 
-         dummypkt = pkt;
 
-     }
 
-     /* Calculate the content length */
 
-     if (!ossl_encode_der_integer(dummypkt, r)
 
-             || !ossl_encode_der_integer(dummypkt, s)
 
-             || !WPACKET_get_length(dummypkt, &cont_len)
 
-             || (!isnull && !WPACKET_finish(dummypkt))) {
 
-         if (!isnull)
 
-             WPACKET_cleanup(dummypkt);
 
-         return 0;
 
-     }
 
-     /* Add the tag and length bytes */
 
-     if (!WPACKET_put_bytes_u8(pkt, ID_SEQUENCE)
 
-             || !ossl_encode_der_length(pkt, cont_len)
 
-                /*
 
-                 * Really encode the integers. We already wrote to the main pkt
 
-                 * if it had a NULL buffer, so don't do it again
 
-                 */
 
-             || (!isnull && !ossl_encode_der_integer(pkt, r))
 
-             || (!isnull && !ossl_encode_der_integer(pkt, s))
 
-             || !WPACKET_close(pkt))
 
-         return 0;
 
-     return 1;
 
- }
 
- /*
 
-  * Decodes the DER length octets in pkt and initialises subpkt with the
 
-  * following bytes of that length.
 
-  *
 
-  * Returns 1 on success or 0 on failure.
 
-  */
 
- int ossl_decode_der_length(PACKET *pkt, PACKET *subpkt)
 
- {
 
-     unsigned int byte;
 
-     if (!PACKET_get_1(pkt, &byte))
 
-         return 0;
 
-     if (byte < 0x80)
 
-         return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte);
 
-     if (byte == 0x81)
 
-         return PACKET_get_length_prefixed_1(pkt, subpkt);
 
-     if (byte == 0x82)
 
-         return PACKET_get_length_prefixed_2(pkt, subpkt);
 
-     /* Too large, invalid, or not DER. */
 
-     return 0;
 
- }
 
- /*
 
-  * Decodes a single ASN.1 INTEGER value from pkt, which must be DER encoded,
 
-  * and updates n with the decoded value.
 
-  *
 
-  * The BIGNUM, n, must have already been allocated by calling BN_new().
 
-  * pkt must not be NULL.
 
-  *
 
-  * An attempt to consume more than len bytes results in an error.
 
-  * Returns 1 on success or 0 on error.
 
-  *
 
-  * If the PACKET is supposed to only contain a single INTEGER value with no
 
-  * trailing garbage then it is up to the caller to verify that all bytes
 
-  * were consumed.
 
-  */
 
- int ossl_decode_der_integer(PACKET *pkt, BIGNUM *n)
 
- {
 
-     PACKET contpkt, tmppkt;
 
-     unsigned int tag, tmp;
 
-     /* Check we have an integer and get the content bytes */
 
-     if (!PACKET_get_1(pkt, &tag)
 
-             || tag != ID_INTEGER
 
-             || !ossl_decode_der_length(pkt, &contpkt))
 
-         return 0;
 
-     /* Peek ahead at the first bytes to check for proper encoding */
 
-     tmppkt = contpkt;
 
-     /* The INTEGER must be positive */
 
-     if (!PACKET_get_1(&tmppkt, &tmp)
 
-             || (tmp & 0x80) != 0)
 
-         return 0;
 
-     /* If there a zero padding byte the next byte must have the msb set */
 
-     if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) {
 
-         if (!PACKET_get_1(&tmppkt, &tmp)
 
-                 || (tmp & 0x80) == 0)
 
-             return 0;
 
-     }
 
-     if (BN_bin2bn(PACKET_data(&contpkt),
 
-                   (int)PACKET_remaining(&contpkt), n) == NULL)
 
-         return 0;
 
-     return 1;
 
- }
 
- /*
 
-  * Decodes a single DSA-Sig-Value or ECDSA-Sig-Value from *ppin, which must be
 
-  * DER encoded, updates r and s with the decoded values, and increments *ppin
 
-  * past the data that was consumed.
 
-  *
 
-  * The BIGNUMs, r and s, must have already been allocated by calls to BN_new().
 
-  * ppin and *ppin must not be NULL.
 
-  *
 
-  * An attempt to consume more than len bytes results in an error.
 
-  * Returns the number of bytes of input consumed or 0 if an error occurs.
 
-  *
 
-  * If the buffer is supposed to only contain a single [EC]DSA-Sig-Value with no
 
-  * trailing garbage then it is up to the caller to verify that all bytes
 
-  * were consumed.
 
-  */
 
- size_t ossl_decode_der_dsa_sig(BIGNUM *r, BIGNUM *s,
 
-                                const unsigned char **ppin, size_t len)
 
- {
 
-     size_t consumed;
 
-     PACKET pkt, contpkt;
 
-     unsigned int tag;
 
-     if (!PACKET_buf_init(&pkt, *ppin, len)
 
-             || !PACKET_get_1(&pkt, &tag)
 
-             || tag != ID_SEQUENCE
 
-             || !ossl_decode_der_length(&pkt, &contpkt)
 
-             || !ossl_decode_der_integer(&contpkt, r)
 
-             || !ossl_decode_der_integer(&contpkt, s)
 
-             || PACKET_remaining(&contpkt) != 0)
 
-         return 0;
 
-     consumed = PACKET_data(&pkt) - *ppin;
 
-     *ppin += consumed;
 
-     return consumed;
 
- }
 
 
  |