ec_asn1.c 38.4 KB
Newer Older
B
Bodo Möller 已提交
1
/*
M
Matt Caswell 已提交
2
 * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9
 */

10
#include <string.h>
11
#include "ec_local.h"
12
#include <openssl/err.h>
13 14
#include <openssl/asn1t.h>
#include <openssl/objects.h>
15
#include "internal/nelem.h"
16

17
int EC_GROUP_get_basis_type(const EC_GROUP *group)
18
{
19
    int i;
20 21 22 23 24 25

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field)
        /* everything else is currently not supported */
        return 0;

26 27
    /* Find the last non-zero element of group->poly[] */
    for (i = 0;
28
         i < (int)OSSL_NELEM(group->poly) && group->poly[i] != 0;
29 30
         i++)
        continue;
31 32 33 34 35 36 37 38 39 40

    if (i == 4)
        return NID_X9_62_ppBasis;
    else if (i == 2)
        return NID_X9_62_tpBasis;
    else
        /* everything else is currently not supported */
        return 0;
}

41
#ifndef OPENSSL_NO_EC2M
42
int EC_GROUP_get_trinomial_basis(const EC_GROUP *group, unsigned int *k)
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
{
    if (group == NULL)
        return 0;

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field
        || !((group->poly[0] != 0) && (group->poly[1] != 0)
             && (group->poly[2] == 0))) {
        ECerr(EC_F_EC_GROUP_GET_TRINOMIAL_BASIS,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }

    if (k)
        *k = group->poly[1];

    return 1;
}

62
int EC_GROUP_get_pentanomial_basis(const EC_GROUP *group, unsigned int *k1,
63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
                                   unsigned int *k2, unsigned int *k3)
{
    if (group == NULL)
        return 0;

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field
        || !((group->poly[0] != 0) && (group->poly[1] != 0)
             && (group->poly[2] != 0) && (group->poly[3] != 0)
             && (group->poly[4] == 0))) {
        ECerr(EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }

    if (k1)
        *k1 = group->poly[3];
    if (k2)
        *k2 = group->poly[2];
    if (k3)
        *k3 = group->poly[1];

    return 1;
}
87
#endif
88

89 90
/* some structures needed for the asn1 encoding */
typedef struct x9_62_pentanomial_st {
91 92 93
    int32_t k1;
    int32_t k2;
    int32_t k3;
94
} X9_62_PENTANOMIAL;
95

96
typedef struct x9_62_characteristic_two_st {
97
    int32_t m;
98 99 100 101 102 103 104 105 106 107 108 109 110
    ASN1_OBJECT *type;
    union {
        char *ptr;
        /* NID_X9_62_onBasis */
        ASN1_NULL *onBasis;
        /* NID_X9_62_tpBasis */
        ASN1_INTEGER *tpBasis;
        /* NID_X9_62_ppBasis */
        X9_62_PENTANOMIAL *ppBasis;
        /* anything else */
        ASN1_TYPE *other;
    } p;
} X9_62_CHARACTERISTIC_TWO;
111 112

typedef struct x9_62_fieldid_st {
113 114 115 116 117 118 119 120 121 122 123
    ASN1_OBJECT *fieldType;
    union {
        char *ptr;
        /* NID_X9_62_prime_field */
        ASN1_INTEGER *prime;
        /* NID_X9_62_characteristic_two_field */
        X9_62_CHARACTERISTIC_TWO *char_two;
        /* anything else */
        ASN1_TYPE *other;
    } p;
} X9_62_FIELDID;
124

125
typedef struct x9_62_curve_st {
126 127 128 129
    ASN1_OCTET_STRING *a;
    ASN1_OCTET_STRING *b;
    ASN1_BIT_STRING *seed;
} X9_62_CURVE;
130

131
struct ec_parameters_st {
132
    int32_t version;
133 134 135 136 137
    X9_62_FIELDID *fieldID;
    X9_62_CURVE *curve;
    ASN1_OCTET_STRING *base;
    ASN1_INTEGER *order;
    ASN1_INTEGER *cofactor;
138
} /* ECPARAMETERS */ ;
139 140

struct ecpk_parameters_st {
141 142 143 144 145 146 147
    int type;
    union {
        ASN1_OBJECT *named_curve;
        ECPARAMETERS *parameters;
        ASN1_NULL *implicitlyCA;
    } value;
} /* ECPKPARAMETERS */ ;
148

149 150
/* SEC1 ECPrivateKey */
typedef struct ec_privatekey_st {
151
    int32_t version;
152 153 154 155
    ASN1_OCTET_STRING *privateKey;
    ECPKPARAMETERS *parameters;
    ASN1_BIT_STRING *publicKey;
} EC_PRIVATEKEY;
156

157 158
/* the OpenSSL ASN.1 definitions */
ASN1_SEQUENCE(X9_62_PENTANOMIAL) = {
159 160 161
        ASN1_EMBED(X9_62_PENTANOMIAL, k1, INT32),
        ASN1_EMBED(X9_62_PENTANOMIAL, k2, INT32),
        ASN1_EMBED(X9_62_PENTANOMIAL, k3, INT32)
162
} static_ASN1_SEQUENCE_END(X9_62_PENTANOMIAL)
163

164 165 166 167
DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL)

ASN1_ADB_TEMPLATE(char_two_def) = ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.other, ASN1_ANY);
168

169
ASN1_ADB(X9_62_CHARACTERISTIC_TWO) = {
170 171 172
        ADB_ENTRY(NID_X9_62_onBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.onBasis, ASN1_NULL)),
        ADB_ENTRY(NID_X9_62_tpBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.tpBasis, ASN1_INTEGER)),
        ADB_ENTRY(NID_X9_62_ppBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.ppBasis, X9_62_PENTANOMIAL))
173
} ASN1_ADB_END(X9_62_CHARACTERISTIC_TWO, 0, type, 0, &char_two_def_tt, NULL);
174 175

ASN1_SEQUENCE(X9_62_CHARACTERISTIC_TWO) = {
176
        ASN1_EMBED(X9_62_CHARACTERISTIC_TWO, m, INT32),
177 178
        ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, type, ASN1_OBJECT),
        ASN1_ADB_OBJECT(X9_62_CHARACTERISTIC_TWO)
179
} static_ASN1_SEQUENCE_END(X9_62_CHARACTERISTIC_TWO)
180

181 182
DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO)
183

184 185 186
ASN1_ADB_TEMPLATE(fieldID_def) = ASN1_SIMPLE(X9_62_FIELDID, p.other, ASN1_ANY);

ASN1_ADB(X9_62_FIELDID) = {
187 188
        ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)),
        ADB_ENTRY(NID_X9_62_characteristic_two_field, ASN1_SIMPLE(X9_62_FIELDID, p.char_two, X9_62_CHARACTERISTIC_TWO))
189
} ASN1_ADB_END(X9_62_FIELDID, 0, fieldType, 0, &fieldID_def_tt, NULL);
190

191
ASN1_SEQUENCE(X9_62_FIELDID) = {
192 193
        ASN1_SIMPLE(X9_62_FIELDID, fieldType, ASN1_OBJECT),
        ASN1_ADB_OBJECT(X9_62_FIELDID)
194
} static_ASN1_SEQUENCE_END(X9_62_FIELDID)
195 196

ASN1_SEQUENCE(X9_62_CURVE) = {
197 198 199
        ASN1_SIMPLE(X9_62_CURVE, a, ASN1_OCTET_STRING),
        ASN1_SIMPLE(X9_62_CURVE, b, ASN1_OCTET_STRING),
        ASN1_OPT(X9_62_CURVE, seed, ASN1_BIT_STRING)
200
} static_ASN1_SEQUENCE_END(X9_62_CURVE)
201 202

ASN1_SEQUENCE(ECPARAMETERS) = {
203
        ASN1_EMBED(ECPARAMETERS, version, INT32),
204 205 206 207 208
        ASN1_SIMPLE(ECPARAMETERS, fieldID, X9_62_FIELDID),
        ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
        ASN1_SIMPLE(ECPARAMETERS, base, ASN1_OCTET_STRING),
        ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER),
        ASN1_OPT(ECPARAMETERS, cofactor, ASN1_INTEGER)
R
Rich Salz 已提交
209
} ASN1_SEQUENCE_END(ECPARAMETERS)
210

211 212
DECLARE_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS)
213 214

ASN1_CHOICE(ECPKPARAMETERS) = {
215 216 217
        ASN1_SIMPLE(ECPKPARAMETERS, value.named_curve, ASN1_OBJECT),
        ASN1_SIMPLE(ECPKPARAMETERS, value.parameters, ECPARAMETERS),
        ASN1_SIMPLE(ECPKPARAMETERS, value.implicitlyCA, ASN1_NULL)
R
Rich Salz 已提交
218
} ASN1_CHOICE_END(ECPKPARAMETERS)
219 220

DECLARE_ASN1_FUNCTIONS_const(ECPKPARAMETERS)
221
DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECPKPARAMETERS, ECPKPARAMETERS)
222 223
IMPLEMENT_ASN1_FUNCTIONS_const(ECPKPARAMETERS)

224
ASN1_SEQUENCE(EC_PRIVATEKEY) = {
225
        ASN1_EMBED(EC_PRIVATEKEY, version, INT32),
226 227 228
        ASN1_SIMPLE(EC_PRIVATEKEY, privateKey, ASN1_OCTET_STRING),
        ASN1_EXP_OPT(EC_PRIVATEKEY, parameters, ECPKPARAMETERS, 0),
        ASN1_EXP_OPT(EC_PRIVATEKEY, publicKey, ASN1_BIT_STRING, 1)
229
} static_ASN1_SEQUENCE_END(EC_PRIVATEKEY)
230

231 232
DECLARE_ASN1_FUNCTIONS_const(EC_PRIVATEKEY)
DECLARE_ASN1_ENCODE_FUNCTIONS_const(EC_PRIVATEKEY, EC_PRIVATEKEY)
233 234
IMPLEMENT_ASN1_FUNCTIONS_const(EC_PRIVATEKEY)

B
Bodo Möller 已提交
235
/* some declarations of internal function */
236

237
/* ec_asn1_group2field() sets the values in a X9_62_FIELDID object */
238
static int ec_asn1_group2fieldid(const EC_GROUP *, X9_62_FIELDID *);
239
/* ec_asn1_group2curve() sets the values in a X9_62_CURVE object */
240
static int ec_asn1_group2curve(const EC_GROUP *, X9_62_CURVE *);
B
Bodo Möller 已提交
241 242

/* the function definitions */
243

244
static int ec_asn1_group2fieldid(const EC_GROUP *group, X9_62_FIELDID *field)
245 246 247 248 249 250 251 252
{
    int ok = 0, nid;
    BIGNUM *tmp = NULL;

    if (group == NULL || field == NULL)
        return 0;

    /* clear the old values (if necessary) */
R
Rich Salz 已提交
253
    ASN1_OBJECT_free(field->fieldType);
R
Rich Salz 已提交
254
    ASN1_TYPE_free(field->p.other);
255 256 257 258 259 260 261 262 263 264 265 266 267 268

    nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group));
    /* set OID for the field */
    if ((field->fieldType = OBJ_nid2obj(nid)) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
        goto err;
    }

    if (nid == NID_X9_62_prime_field) {
        if ((tmp = BN_new()) == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
            goto err;
        }
        /* the parameters are specified by the prime number p */
269
        if (!EC_GROUP_get_curve(group, tmp, NULL, NULL, NULL)) {
270 271 272 273 274 275 276 277 278
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
            goto err;
        }
        /* set the prime number */
        field->p.prime = BN_to_ASN1_INTEGER(tmp, NULL);
        if (field->p.prime == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB);
            goto err;
        }
279
    } else if (nid == NID_X9_62_characteristic_two_field)
280
#ifdef OPENSSL_NO_EC2M
281 282 283 284
    {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, EC_R_GF2M_NOT_SUPPORTED);
        goto err;
    }
285
#else
286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318
    {
        int field_type;
        X9_62_CHARACTERISTIC_TWO *char_two;

        field->p.char_two = X9_62_CHARACTERISTIC_TWO_new();
        char_two = field->p.char_two;

        if (char_two == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
            goto err;
        }

        char_two->m = (long)EC_GROUP_get_degree(group);

        field_type = EC_GROUP_get_basis_type(group);

        if (field_type == 0) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
            goto err;
        }
        /* set base type OID */
        if ((char_two->type = OBJ_nid2obj(field_type)) == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
            goto err;
        }

        if (field_type == NID_X9_62_tpBasis) {
            unsigned int k;

            if (!EC_GROUP_get_trinomial_basis(group, &k))
                goto err;

            char_two->p.tpBasis = ASN1_INTEGER_new();
319
            if (char_two->p.tpBasis == NULL) {
320 321 322 323 324 325 326 327 328 329 330 331 332 333
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }
            if (!ASN1_INTEGER_set(char_two->p.tpBasis, (long)k)) {
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB);
                goto err;
            }
        } else if (field_type == NID_X9_62_ppBasis) {
            unsigned int k1, k2, k3;

            if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3))
                goto err;

            char_two->p.ppBasis = X9_62_PENTANOMIAL_new();
334
            if (char_two->p.ppBasis == NULL) {
335 336 337 338 339 340 341 342 343 344 345 346
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }

            /* set k? values */
            char_two->p.ppBasis->k1 = (long)k1;
            char_two->p.ppBasis->k2 = (long)k2;
            char_two->p.ppBasis->k3 = (long)k3;
        } else {                /* field_type == NID_X9_62_onBasis */

            /* for ONB the parameters are (asn1) NULL */
            char_two->p.onBasis = ASN1_NULL_new();
347
            if (char_two->p.onBasis == NULL) {
348 349 350 351 352
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }
        }
    }
353
#endif
354 355 356 357
    else {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, EC_R_UNSUPPORTED_FIELD);
        goto err;
    }
358

359
    ok = 1;
360

R
Rich Salz 已提交
361 362
 err:
    BN_free(tmp);
K
KaoruToda 已提交
363
    return ok;
364 365
}

366
static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve)
367
{
368
    int ok = 0;
369
    BIGNUM *tmp_1 = NULL, *tmp_2 = NULL;
D
David Benjamin 已提交
370 371
    unsigned char *a_buf = NULL, *b_buf = NULL;
    size_t len;
372 373 374 375 376 377 378 379 380 381

    if (!group || !curve || !curve->a || !curve->b)
        return 0;

    if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    /* get a and b */
382 383 384
    if (!EC_GROUP_get_curve(group, NULL, tmp_1, tmp_2, NULL)) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB);
        goto err;
385 386
    }

D
David Benjamin 已提交
387 388 389 390 391 392 393 394 395 396
    /*
     * Per SEC 1, the curve coefficients must be padded up to size. See C.2's
     * definition of Curve, C.1's definition of FieldElement, and 2.3.5's
     * definition of how to encode the field elements.
     */
    len = ((size_t)EC_GROUP_get_degree(group) + 7) / 8;
    if ((a_buf = OPENSSL_malloc(len)) == NULL
        || (b_buf = OPENSSL_malloc(len)) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
        goto err;
397
    }
D
David Benjamin 已提交
398 399 400 401
    if (BN_bn2binpad(tmp_1, a_buf, len) < 0
        || BN_bn2binpad(tmp_2, b_buf, len) < 0) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB);
        goto err;
402 403 404
    }

    /* set a and b */
D
David Benjamin 已提交
405 406
    if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len)
        || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) {
407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
        goto err;
    }

    /* set the seed (optional) */
    if (group->seed) {
        if (!curve->seed)
            if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) {
                ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
                goto err;
            }
        curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
        curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT;
        if (!ASN1_BIT_STRING_set(curve->seed, group->seed,
                                 (int)group->seed_len)) {
            ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
            goto err;
        }
    } else {
R
Rich Salz 已提交
426 427
        ASN1_BIT_STRING_free(curve->seed);
        curve->seed = NULL;
428 429 430 431
    }

    ok = 1;

R
Rich Salz 已提交
432
 err:
D
David Benjamin 已提交
433 434
    OPENSSL_free(a_buf);
    OPENSSL_free(b_buf);
R
Rich Salz 已提交
435 436
    BN_free(tmp_1);
    BN_free(tmp_2);
K
KaoruToda 已提交
437
    return ok;
438
}
439

R
Rich Salz 已提交
440 441
ECPARAMETERS *EC_GROUP_get_ecparameters(const EC_GROUP *group,
                                               ECPARAMETERS *params)
442 443 444
{
    size_t len = 0;
    ECPARAMETERS *ret = NULL;
445
    const BIGNUM *tmp;
446 447 448
    unsigned char *buffer = NULL;
    const EC_POINT *point = NULL;
    point_conversion_form_t form;
449
    ASN1_INTEGER *orig;
450

R
Rich Salz 已提交
451
    if (params == NULL) {
452
        if ((ret = ECPARAMETERS_new()) == NULL) {
R
Rich Salz 已提交
453
            ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
454 455 456
            goto err;
        }
    } else
R
Rich Salz 已提交
457
        ret = params;
458 459 460 461 462 463

    /* set the version (always one) */
    ret->version = (long)0x1;

    /* set the fieldID */
    if (!ec_asn1_group2fieldid(group, ret->fieldID)) {
R
Rich Salz 已提交
464
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
465 466 467 468 469
        goto err;
    }

    /* set the curve */
    if (!ec_asn1_group2curve(group, ret->curve)) {
R
Rich Salz 已提交
470
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
471 472 473 474 475
        goto err;
    }

    /* set the base point */
    if ((point = EC_GROUP_get0_generator(group)) == NULL) {
R
Rich Salz 已提交
476
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, EC_R_UNDEFINED_GENERATOR);
477 478 479 480 481
        goto err;
    }

    form = EC_GROUP_get_point_conversion_form(group);

D
Dr. Stephen Henson 已提交
482
    len = EC_POINT_point2buf(group, point, form, &buffer, NULL);
483
    if (len == 0) {
R
Rich Salz 已提交
484
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
485 486 487
        goto err;
    }
    if (ret->base == NULL && (ret->base = ASN1_OCTET_STRING_new()) == NULL) {
488
        OPENSSL_free(buffer);
R
Rich Salz 已提交
489
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
490 491
        goto err;
    }
492
    ASN1_STRING_set0(ret->base, buffer, len);
493 494

    /* set the order */
495 496
    tmp = EC_GROUP_get0_order(group);
    if (tmp == NULL) {
R
Rich Salz 已提交
497
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
498 499
        goto err;
    }
500
    ret->order = BN_to_ASN1_INTEGER(tmp, orig = ret->order);
501
    if (ret->order == NULL) {
502
        ret->order = orig;
R
Rich Salz 已提交
503
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_ASN1_LIB);
504 505 506 507
        goto err;
    }

    /* set the cofactor (optional) */
508 509
    tmp = EC_GROUP_get0_cofactor(group);
    if (tmp != NULL) {
510
        ret->cofactor = BN_to_ASN1_INTEGER(tmp, orig = ret->cofactor);
511
        if (ret->cofactor == NULL) {
512
            ret->cofactor = orig;
R
Rich Salz 已提交
513
            ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_ASN1_LIB);
514 515 516 517
            goto err;
        }
    }

R
Rich Salz 已提交
518
    return ret;
519

R
Rich Salz 已提交
520
 err:
R
Rich Salz 已提交
521
    if (params == NULL)
R
Rich Salz 已提交
522 523
        ECPARAMETERS_free(ret);
    return NULL;
524 525
}

R
Rich Salz 已提交
526 527
ECPKPARAMETERS *EC_GROUP_get_ecpkparameters(const EC_GROUP *group,
                                            ECPKPARAMETERS *params)
528 529 530 531 532 533
{
    int ok = 1, tmp;
    ECPKPARAMETERS *ret = params;

    if (ret == NULL) {
        if ((ret = ECPKPARAMETERS_new()) == NULL) {
R
Rich Salz 已提交
534
            ECerr(EC_F_EC_GROUP_GET_ECPKPARAMETERS, ERR_R_MALLOC_FAILURE);
535 536 537
            return NULL;
        }
    } else {
R
Rich Salz 已提交
538
        if (ret->type == 0)
539 540 541 542 543 544 545
            ASN1_OBJECT_free(ret->value.named_curve);
        else if (ret->type == 1 && ret->value.parameters)
            ECPARAMETERS_free(ret->value.parameters);
    }

    if (EC_GROUP_get_asn1_flag(group)) {
        /*
D
Daniel Bevenius 已提交
546
         * use the asn1 OID to describe the elliptic curve parameters
547 548 549 550 551 552 553
         */
        tmp = EC_GROUP_get_curve_name(group);
        if (tmp) {
            ret->type = 0;
            if ((ret->value.named_curve = OBJ_nid2obj(tmp)) == NULL)
                ok = 0;
        } else
F
FdaSilvaYY 已提交
554
            /* we don't know the nid => ERROR */
555 556 557 558 559
            ok = 0;
    } else {
        /* use the ECPARAMETERS structure */
        ret->type = 1;
        if ((ret->value.parameters =
R
Rich Salz 已提交
560
             EC_GROUP_get_ecparameters(group, NULL)) == NULL)
561 562 563 564 565 566 567 568 569
            ok = 0;
    }

    if (!ok) {
        ECPKPARAMETERS_free(ret);
        return NULL;
    }
    return ret;
}
570

R
Rich Salz 已提交
571
EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
572 573
{
    int ok = 0, tmp;
574
    EC_GROUP *ret = NULL, *dup = NULL;
575 576 577
    BIGNUM *p = NULL, *a = NULL, *b = NULL;
    EC_POINT *point = NULL;
    long field_bits;
578 579
    int curve_name = NID_undef;
    BN_CTX *ctx = NULL;
580 581 582

    if (!params->fieldID || !params->fieldID->fieldType ||
        !params->fieldID->p.ptr) {
R
Rich Salz 已提交
583
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
584 585 586
        goto err;
    }

D
David Benjamin 已提交
587 588 589 590 591 592
    /*
     * Now extract the curve parameters a and b. Note that, although SEC 1
     * specifies the length of their encodings, historical versions of OpenSSL
     * encoded them incorrectly, so we must accept any length for backwards
     * compatibility.
     */
593 594 595
    if (!params->curve || !params->curve->a ||
        !params->curve->a->data || !params->curve->b ||
        !params->curve->b->data) {
R
Rich Salz 已提交
596
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
597 598 599 600
        goto err;
    }
    a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL);
    if (a == NULL) {
R
Rich Salz 已提交
601
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
602 603 604 605
        goto err;
    }
    b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL);
    if (b == NULL) {
R
Rich Salz 已提交
606
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
607 608 609 610 611 612
        goto err;
    }

    /* get the field parameters */
    tmp = OBJ_obj2nid(params->fieldID->fieldType);
    if (tmp == NID_X9_62_characteristic_two_field)
613
#ifdef OPENSSL_NO_EC2M
614
    {
R
Rich Salz 已提交
615
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_GF2M_NOT_SUPPORTED);
616 617
        goto err;
    }
618
#else
619 620 621 622 623 624 625
    {
        X9_62_CHARACTERISTIC_TWO *char_two;

        char_two = params->fieldID->p.char_two;

        field_bits = char_two->m;
        if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
R
Rich Salz 已提交
626
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_FIELD_TOO_LARGE);
627 628 629 630
            goto err;
        }

        if ((p = BN_new()) == NULL) {
R
Rich Salz 已提交
631
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
632 633 634 635 636 637 638 639 640 641
            goto err;
        }

        /* get the base type */
        tmp = OBJ_obj2nid(char_two->type);

        if (tmp == NID_X9_62_tpBasis) {
            long tmp_long;

            if (!char_two->p.tpBasis) {
R
Rich Salz 已提交
642
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
643 644 645 646 647 648
                goto err;
            }

            tmp_long = ASN1_INTEGER_get(char_two->p.tpBasis);

            if (!(char_two->m > tmp_long && tmp_long > 0)) {
R
Rich Salz 已提交
649
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS,
650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665
                      EC_R_INVALID_TRINOMIAL_BASIS);
                goto err;
            }

            /* create the polynomial */
            if (!BN_set_bit(p, (int)char_two->m))
                goto err;
            if (!BN_set_bit(p, (int)tmp_long))
                goto err;
            if (!BN_set_bit(p, 0))
                goto err;
        } else if (tmp == NID_X9_62_ppBasis) {
            X9_62_PENTANOMIAL *penta;

            penta = char_two->p.ppBasis;
            if (!penta) {
R
Rich Salz 已提交
666
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
667 668 669 670 671 672
                goto err;
            }

            if (!
                (char_two->m > penta->k3 && penta->k3 > penta->k2
                 && penta->k2 > penta->k1 && penta->k1 > 0)) {
R
Rich Salz 已提交
673
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS,
674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689
                      EC_R_INVALID_PENTANOMIAL_BASIS);
                goto err;
            }

            /* create the polynomial */
            if (!BN_set_bit(p, (int)char_two->m))
                goto err;
            if (!BN_set_bit(p, (int)penta->k1))
                goto err;
            if (!BN_set_bit(p, (int)penta->k2))
                goto err;
            if (!BN_set_bit(p, (int)penta->k3))
                goto err;
            if (!BN_set_bit(p, 0))
                goto err;
        } else if (tmp == NID_X9_62_onBasis) {
R
Rich Salz 已提交
690
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_NOT_IMPLEMENTED);
691 692 693
            goto err;
        } else {                /* error */

R
Rich Salz 已提交
694
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
695 696 697 698 699 700
            goto err;
        }

        /* create the EC_GROUP structure */
        ret = EC_GROUP_new_curve_GF2m(p, a, b, NULL);
    }
701
#endif
702 703 704 705
    else if (tmp == NID_X9_62_prime_field) {
        /* we have a curve over a prime field */
        /* extract the prime number */
        if (!params->fieldID->p.prime) {
R
Rich Salz 已提交
706
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
707 708 709 710
            goto err;
        }
        p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL);
        if (p == NULL) {
R
Rich Salz 已提交
711
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
712 713 714 715
            goto err;
        }

        if (BN_is_negative(p) || BN_is_zero(p)) {
R
Rich Salz 已提交
716
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_FIELD);
717 718 719 720 721
            goto err;
        }

        field_bits = BN_num_bits(p);
        if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
R
Rich Salz 已提交
722
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_FIELD_TOO_LARGE);
723 724 725 726 727 728
            goto err;
        }

        /* create the EC_GROUP structure */
        ret = EC_GROUP_new_curve_GFp(p, a, b, NULL);
    } else {
R
Rich Salz 已提交
729
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_FIELD);
730 731 732 733
        goto err;
    }

    if (ret == NULL) {
R
Rich Salz 已提交
734
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
735 736 737 738 739
        goto err;
    }

    /* extract seed (optional) */
    if (params->curve->seed != NULL) {
R
Rich Salz 已提交
740
        OPENSSL_free(ret->seed);
741
        if ((ret->seed = OPENSSL_malloc(params->curve->seed->length)) == NULL) {
R
Rich Salz 已提交
742
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
743 744 745 746 747 748 749 750
            goto err;
        }
        memcpy(ret->seed, params->curve->seed->data,
               params->curve->seed->length);
        ret->seed_len = params->curve->seed->length;
    }

    if (!params->order || !params->base || !params->base->data) {
R
Rich Salz 已提交
751
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
752 753 754 755 756 757 758 759 760 761 762 763 764
        goto err;
    }

    if ((point = EC_POINT_new(ret)) == NULL)
        goto err;

    /* set the point conversion form */
    EC_GROUP_set_point_conversion_form(ret, (point_conversion_form_t)
                                       (params->base->data[0] & ~0x01));

    /* extract the ec point */
    if (!EC_POINT_oct2point(ret, point, params->base->data,
                            params->base->length, NULL)) {
R
Rich Salz 已提交
765
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
766 767 768 769 770
        goto err;
    }

    /* extract the order */
    if ((a = ASN1_INTEGER_to_BN(params->order, a)) == NULL) {
R
Rich Salz 已提交
771
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
772 773 774
        goto err;
    }
    if (BN_is_negative(a) || BN_is_zero(a)) {
R
Rich Salz 已提交
775
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_GROUP_ORDER);
776 777 778
        goto err;
    }
    if (BN_num_bits(a) > (int)field_bits + 1) { /* Hasse bound */
R
Rich Salz 已提交
779
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_GROUP_ORDER);
780 781 782 783 784
        goto err;
    }

    /* extract the cofactor (optional) */
    if (params->cofactor == NULL) {
R
Rich Salz 已提交
785 786
        BN_free(b);
        b = NULL;
787
    } else if ((b = ASN1_INTEGER_to_BN(params->cofactor, b)) == NULL) {
R
Rich Salz 已提交
788
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
789 790 791 792
        goto err;
    }
    /* set the generator, order and cofactor (if present) */
    if (!EC_GROUP_set_generator(ret, point, a, b)) {
R
Rich Salz 已提交
793
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
794 795 796
        goto err;
    }

797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851
    /*
     * Check if the explicit parameters group just created matches one of the
     * built-in curves.
     *
     * We create a copy of the group just built, so that we can remove optional
     * fields for the lookup: we do this to avoid the possibility that one of
     * the optional parameters is used to force the library into using a less
     * performant and less secure EC_METHOD instead of the specialized one.
     * In any case, `seed` is not really used in any computation, while a
     * cofactor different from the one in the built-in table is just
     * mathematically wrong anyway and should not be used.
     */
    if ((ctx = BN_CTX_new()) == NULL) {
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
        goto err;
    }
    if ((dup = EC_GROUP_dup(ret)) == NULL
            || EC_GROUP_set_seed(dup, NULL, 0) != 1
            || !EC_GROUP_set_generator(dup, point, a, NULL)) {
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
        goto err;
    }
    if ((curve_name = ec_curve_nid_from_params(dup, ctx)) != NID_undef) {
        /*
         * The input explicit parameters successfully matched one of the
         * built-in curves: often for built-in curves we have specialized
         * methods with better performance and hardening.
         *
         * In this case we replace the `EC_GROUP` created through explicit
         * parameters with one created from a named group.
         */
        EC_GROUP *named_group = NULL;

#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
        /*
         * NID_wap_wsg_idm_ecid_wtls12 and NID_secp224r1 are both aliases for
         * the same curve, we prefer the SECP nid when matching explicit
         * parameters as that is associated with a specialized EC_METHOD.
         */
        if (curve_name == NID_wap_wsg_idm_ecid_wtls12)
            curve_name = NID_secp224r1;
#endif /* !def(OPENSSL_NO_EC_NISTP_64_GCC_128) */

        if ((named_group = EC_GROUP_new_by_curve_name(curve_name)) == NULL) {
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
            goto err;
        }
        EC_GROUP_free(ret);
        ret = named_group;

        /*
         * Set the flag so that EC_GROUPs created from explicit parameters are
         * serialized using explicit parameters by default.
         */
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
852 853 854 855 856 857 858 859 860 861 862 863 864 865

        /*
         * If the input params do not contain the optional seed field we make
         * sure it is not added to the returned group.
         *
         * The seed field is not really used inside libcrypto anyway, and
         * adding it to parsed explicit parameter keys would alter their DER
         * encoding output (because of the extra field) which could impact
         * applications fingerprinting keys by their DER encoding.
         */
        if (params->curve->seed == NULL) {
            if (EC_GROUP_set_seed(ret, NULL, 0) != 1)
                goto err;
        }
866 867
    }

868 869
    ok = 1;

R
Rich Salz 已提交
870 871
 err:
    if (!ok) {
872
        EC_GROUP_free(ret);
873 874
        ret = NULL;
    }
875
    EC_GROUP_free(dup);
876

R
Rich Salz 已提交
877 878 879
    BN_free(p);
    BN_free(a);
    BN_free(b);
R
Rich Salz 已提交
880
    EC_POINT_free(point);
881 882 883

    BN_CTX_free(ctx);

K
KaoruToda 已提交
884
    return ret;
885 886
}

R
Rich Salz 已提交
887
EC_GROUP *EC_GROUP_new_from_ecpkparameters(const ECPKPARAMETERS *params)
888 889 890 891 892
{
    EC_GROUP *ret = NULL;
    int tmp = 0;

    if (params == NULL) {
R
Rich Salz 已提交
893
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, EC_R_MISSING_PARAMETERS);
894 895 896 897 898 899
        return NULL;
    }

    if (params->type == 0) {    /* the curve is given by an OID */
        tmp = OBJ_obj2nid(params->value.named_curve);
        if ((ret = EC_GROUP_new_by_curve_name(tmp)) == NULL) {
R
Rich Salz 已提交
900
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS,
901 902 903 904 905 906
                  EC_R_EC_GROUP_NEW_BY_NAME_FAILURE);
            return NULL;
        }
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_NAMED_CURVE);
    } else if (params->type == 1) { /* the parameters are given by a
                                     * ECPARAMETERS structure */
R
Rich Salz 已提交
907
        ret = EC_GROUP_new_from_ecparameters(params->value.parameters);
908
        if (!ret) {
R
Rich Salz 已提交
909
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, ERR_R_EC_LIB);
910 911
            return NULL;
        }
912
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
913 914 915
    } else if (params->type == 2) { /* implicitlyCA */
        return NULL;
    } else {
R
Rich Salz 已提交
916
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, EC_R_ASN1_ERROR);
917 918 919 920 921
        return NULL;
    }

    return ret;
}
922

923
/* EC_GROUP <-> DER encoding of ECPKPARAMETERS */
924

925
EC_GROUP *d2i_ECPKParameters(EC_GROUP **a, const unsigned char **in, long len)
926 927 928
{
    EC_GROUP *group = NULL;
    ECPKPARAMETERS *params = NULL;
929
    const unsigned char *p = *in;
930

931
    if ((params = d2i_ECPKPARAMETERS(NULL, &p, len)) == NULL) {
932 933 934 935 936
        ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_D2I_ECPKPARAMETERS_FAILURE);
        ECPKPARAMETERS_free(params);
        return NULL;
    }

R
Rich Salz 已提交
937
    if ((group = EC_GROUP_new_from_ecpkparameters(params)) == NULL) {
938 939 940 941 942
        ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_PKPARAMETERS2GROUP_FAILURE);
        ECPKPARAMETERS_free(params);
        return NULL;
    }

R
Rich Salz 已提交
943
    if (a) {
944
        EC_GROUP_free(*a);
945
        *a = group;
R
Rich Salz 已提交
946
    }
947 948

    ECPKPARAMETERS_free(params);
949
    *in = p;
K
KaoruToda 已提交
950
    return group;
951
}
952

953
int i2d_ECPKParameters(const EC_GROUP *a, unsigned char **out)
954 955
{
    int ret = 0;
R
Rich Salz 已提交
956
    ECPKPARAMETERS *tmp = EC_GROUP_get_ecpkparameters(a, NULL);
957 958 959 960 961 962 963 964 965 966
    if (tmp == NULL) {
        ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_GROUP2PKPARAMETERS_FAILURE);
        return 0;
    }
    if ((ret = i2d_ECPKPARAMETERS(tmp, out)) == 0) {
        ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_I2D_ECPKPARAMETERS_FAILURE);
        ECPKPARAMETERS_free(tmp);
        return 0;
    }
    ECPKPARAMETERS_free(tmp);
K
KaoruToda 已提交
967
    return ret;
968
}
969

970 971
/* some EC_KEY functions */

972
EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
973 974 975
{
    EC_KEY *ret = NULL;
    EC_PRIVATEKEY *priv_key = NULL;
976
    const unsigned char *p = *in;
977

978
    if ((priv_key = d2i_EC_PRIVATEKEY(NULL, &p, len)) == NULL) {
979 980 981 982 983 984 985 986 987 988 989 990 991
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        return NULL;
    }

    if (a == NULL || *a == NULL) {
        if ((ret = EC_KEY_new()) == NULL) {
            ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
            goto err;
        }
    } else
        ret = *a;

    if (priv_key->parameters) {
992
        EC_GROUP_free(ret->group);
R
Rich Salz 已提交
993
        ret->group = EC_GROUP_new_from_ecpkparameters(priv_key->parameters);
994 995 996 997 998 999 1000 1001 1002 1003
    }

    if (ret->group == NULL) {
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }

    ret->version = priv_key->version;

    if (priv_key->privateKey) {
1004
        ASN1_OCTET_STRING *pkey = priv_key->privateKey;
1005
        if (EC_KEY_oct2priv(ret, ASN1_STRING_get0_data(pkey),
1006
                            ASN1_STRING_length(pkey)) == 0)
1007 1008 1009 1010 1011 1012
            goto err;
    } else {
        ECerr(EC_F_D2I_ECPRIVATEKEY, EC_R_MISSING_PRIVATE_KEY);
        goto err;
    }

R
Rich Salz 已提交
1013
    EC_POINT_clear_free(ret->pub_key);
1014 1015 1016 1017 1018 1019 1020 1021 1022 1023
    ret->pub_key = EC_POINT_new(ret->group);
    if (ret->pub_key == NULL) {
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }

    if (priv_key->publicKey) {
        const unsigned char *pub_oct;
        int pub_oct_len;

1024
        pub_oct = ASN1_STRING_get0_data(priv_key->publicKey);
D
Dr. Stephen Henson 已提交
1025
        pub_oct_len = ASN1_STRING_length(priv_key->publicKey);
1026
        if (!EC_KEY_oct2key(ret, pub_oct, pub_oct_len, NULL)) {
1027 1028 1029 1030
            ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }
    } else {
D
Dr. Stephen Henson 已提交
1031 1032
        if (ret->group->meth->keygenpub == NULL
            || ret->group->meth->keygenpub(ret) == 0)
1033
                goto err;
1034 1035 1036 1037
        /* Remember the original private-key-only encoding. */
        ret->enc_flag |= EC_PKEY_NO_PUBKEY;
    }

1038 1039
    if (a)
        *a = ret;
R
Rich Salz 已提交
1040
    EC_PRIVATEKEY_free(priv_key);
1041
    *in = p;
K
KaoruToda 已提交
1042
    return ret;
R
Rich Salz 已提交
1043 1044 1045 1046 1047 1048

 err:
    if (a == NULL || *a != ret)
        EC_KEY_free(ret);
    EC_PRIVATEKEY_free(priv_key);
    return NULL;
1049 1050 1051 1052 1053
}

int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
{
    int ret = 0, ok = 0;
D
Dr. Stephen Henson 已提交
1054
    unsigned char *priv= NULL, *pub= NULL;
R
Richard Levitte 已提交
1055
    size_t privlen = 0, publen = 0;
D
Dr. Stephen Henson 已提交
1056

1057 1058
    EC_PRIVATEKEY *priv_key = NULL;

1059
    if (a == NULL || a->group == NULL ||
1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071
        (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key == NULL)) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_PASSED_NULL_PARAMETER);
        goto err;
    }

    if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    priv_key->version = a->version;

D
Dr. Stephen Henson 已提交
1072
    privlen = EC_KEY_priv2buf(a, &priv);
1073

D
Dr. Stephen Henson 已提交
1074
    if (privlen == 0) {
1075
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
1076 1077 1078
        goto err;
    }

D
Dr. Stephen Henson 已提交
1079 1080
    ASN1_STRING_set0(priv_key->privateKey, priv, privlen);
    priv = NULL;
1081 1082 1083

    if (!(a->enc_flag & EC_PKEY_NO_PARAMETERS)) {
        if ((priv_key->parameters =
R
Rich Salz 已提交
1084
             EC_GROUP_get_ecpkparameters(a->group,
1085 1086 1087 1088 1089 1090 1091
                                        priv_key->parameters)) == NULL) {
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }
    }

    if (!(a->enc_flag & EC_PKEY_NO_PUBKEY)) {
D
Dr. Stephen Henson 已提交
1092
        priv_key->publicKey = ASN1_BIT_STRING_new();
1093 1094 1095 1096 1097
        if (priv_key->publicKey == NULL) {
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
            goto err;
        }

D
Dr. Stephen Henson 已提交
1098
        publen = EC_KEY_key2buf(a, a->conv_form, &pub, NULL);
1099

D
Dr. Stephen Henson 已提交
1100
        if (publen == 0) {
1101 1102 1103 1104 1105 1106
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }

        priv_key->publicKey->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
        priv_key->publicKey->flags |= ASN1_STRING_FLAG_BITS_LEFT;
D
Dr. Stephen Henson 已提交
1107 1108
        ASN1_STRING_set0(priv_key->publicKey, pub, publen);
        pub = NULL;
1109 1110 1111 1112 1113 1114 1115 1116
    }

    if ((ret = i2d_EC_PRIVATEKEY(priv_key, out)) == 0) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }
    ok = 1;
 err:
D
Dr. Stephen Henson 已提交
1117 1118
    OPENSSL_clear_free(priv, privlen);
    OPENSSL_free(pub);
R
Rich Salz 已提交
1119
    EC_PRIVATEKEY_free(priv_key);
1120 1121
    return (ok ? ret : 0);
}
1122 1123

int i2d_ECParameters(EC_KEY *a, unsigned char **out)
1124 1125 1126 1127 1128 1129 1130
{
    if (a == NULL) {
        ECerr(EC_F_I2D_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }
    return i2d_ECPKParameters(a->group, out);
}
1131 1132

EC_KEY *d2i_ECParameters(EC_KEY **a, const unsigned char **in, long len)
1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150
{
    EC_KEY *ret;

    if (in == NULL || *in == NULL) {
        ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
        return NULL;
    }

    if (a == NULL || *a == NULL) {
        if ((ret = EC_KEY_new()) == NULL) {
            ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
            return NULL;
        }
    } else
        ret = *a;

    if (!d2i_ECPKParameters(&ret->group, in, len)) {
        ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_EC_LIB);
1151 1152
        if (a == NULL || *a != ret)
             EC_KEY_free(ret);
1153 1154 1155
        return NULL;
    }

1156 1157 1158
    if (a)
        *a = ret;

1159 1160
    return ret;
}
1161

1162
EC_KEY *o2i_ECPublicKey(EC_KEY **a, const unsigned char **in, long len)
1163 1164 1165 1166 1167
{
    EC_KEY *ret = NULL;

    if (a == NULL || (*a) == NULL || (*a)->group == NULL) {
        /*
F
FdaSilvaYY 已提交
1168
         * sorry, but a EC_GROUP-structure is necessary to set the public key
1169 1170 1171 1172 1173
         */
        ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }
    ret = *a;
1174
    if (!EC_KEY_oct2key(ret, *in, len, NULL)) {
1175 1176 1177 1178 1179 1180
        ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_EC_LIB);
        return 0;
    }
    *in += len;
    return ret;
}
1181

D
Dr. Stephen Henson 已提交
1182
int i2o_ECPublicKey(const EC_KEY *a, unsigned char **out)
1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218
{
    size_t buf_len = 0;
    int new_buffer = 0;

    if (a == NULL) {
        ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }

    buf_len = EC_POINT_point2oct(a->group, a->pub_key,
                                 a->conv_form, NULL, 0, NULL);

    if (out == NULL || buf_len == 0)
        /* out == NULL => just return the length of the octet string */
        return buf_len;

    if (*out == NULL) {
        if ((*out = OPENSSL_malloc(buf_len)) == NULL) {
            ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE);
            return 0;
        }
        new_buffer = 1;
    }
    if (!EC_POINT_point2oct(a->group, a->pub_key, a->conv_form,
                            *out, buf_len, NULL)) {
        ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB);
        if (new_buffer) {
            OPENSSL_free(*out);
            *out = NULL;
        }
        return 0;
    }
    if (!new_buffer)
        *out += buf_len;
    return buf_len;
}
1219 1220 1221 1222 1223 1224 1225 1226

ASN1_SEQUENCE(ECDSA_SIG) = {
        ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM),
        ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM)
} static_ASN1_SEQUENCE_END(ECDSA_SIG)

DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG)
DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG)
1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(ECDSA_SIG, ECDSA_SIG, ECDSA_SIG)

ECDSA_SIG *ECDSA_SIG_new(void)
{
    ECDSA_SIG *sig = OPENSSL_zalloc(sizeof(*sig));
    if (sig == NULL)
        ECerr(EC_F_ECDSA_SIG_NEW, ERR_R_MALLOC_FAILURE);
    return sig;
}

void ECDSA_SIG_free(ECDSA_SIG *sig)
{
    if (sig == NULL)
        return;
    BN_clear_free(sig->r);
    BN_clear_free(sig->s);
    OPENSSL_free(sig);
}
D
Dr. Stephen Henson 已提交
1245

1246
void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps)
D
Dr. Stephen Henson 已提交
1247
{
D
Dr. Stephen Henson 已提交
1248
    if (pr != NULL)
D
Dr. Stephen Henson 已提交
1249
        *pr = sig->r;
D
Dr. Stephen Henson 已提交
1250
    if (ps != NULL)
D
Dr. Stephen Henson 已提交
1251 1252
        *ps = sig->s;
}
D
Dr. Stephen Henson 已提交
1253

1254 1255 1256 1257 1258 1259 1260 1261 1262 1263
const BIGNUM *ECDSA_SIG_get0_r(const ECDSA_SIG *sig)
{
    return sig->r;
}

const BIGNUM *ECDSA_SIG_get0_s(const ECDSA_SIG *sig)
{
    return sig->s;
}

1264
int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s)
1265
{
1266 1267
    if (r == NULL || s == NULL)
        return 0;
1268 1269 1270 1271 1272 1273 1274
    BN_clear_free(sig->r);
    BN_clear_free(sig->s);
    sig->r = r;
    sig->s = s;
    return 1;
}

D
Dr. Stephen Henson 已提交
1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287
int ECDSA_size(const EC_KEY *r)
{
    int ret, i;
    ASN1_INTEGER bs;
    unsigned char buf[4];
    const EC_GROUP *group;

    if (r == NULL)
        return 0;
    group = EC_KEY_get0_group(r);
    if (group == NULL)
        return 0;

1288 1289
    i = EC_GROUP_order_bits(group);
    if (i == 0)
D
Dr. Stephen Henson 已提交
1290 1291 1292 1293 1294 1295 1296 1297 1298 1299
        return 0;
    bs.length = (i + 7) / 8;
    bs.data = buf;
    bs.type = V_ASN1_INTEGER;
    /* If the top bit is set the asn1 encoding is 1 larger. */
    buf[0] = 0xff;

    i = i2d_ASN1_INTEGER(&bs, NULL);
    i += i;                     /* r and s */
    ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE);
K
KaoruToda 已提交
1300
    return ret;
D
Dr. Stephen Henson 已提交
1301
}