ec_asn1.c 38.5 KB
Newer Older
B
Bodo Möller 已提交
1
/*
M
Matt Caswell 已提交
2
 * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9
 */

10
#include <string.h>
11
#include "ec_local.h"
12
#include <openssl/err.h>
13 14
#include <openssl/asn1t.h>
#include <openssl/objects.h>
15
#include "internal/nelem.h"
16

17
int EC_GROUP_get_basis_type(const EC_GROUP *group)
18
{
19
    int i;
20 21 22 23 24 25

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field)
        /* everything else is currently not supported */
        return 0;

26 27
    /* Find the last non-zero element of group->poly[] */
    for (i = 0;
28
         i < (int)OSSL_NELEM(group->poly) && group->poly[i] != 0;
29 30
         i++)
        continue;
31 32 33 34 35 36 37 38 39 40

    if (i == 4)
        return NID_X9_62_ppBasis;
    else if (i == 2)
        return NID_X9_62_tpBasis;
    else
        /* everything else is currently not supported */
        return 0;
}

41
#ifndef OPENSSL_NO_EC2M
42
int EC_GROUP_get_trinomial_basis(const EC_GROUP *group, unsigned int *k)
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
{
    if (group == NULL)
        return 0;

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field
        || !((group->poly[0] != 0) && (group->poly[1] != 0)
             && (group->poly[2] == 0))) {
        ECerr(EC_F_EC_GROUP_GET_TRINOMIAL_BASIS,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }

    if (k)
        *k = group->poly[1];

    return 1;
}

62
int EC_GROUP_get_pentanomial_basis(const EC_GROUP *group, unsigned int *k1,
63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
                                   unsigned int *k2, unsigned int *k3)
{
    if (group == NULL)
        return 0;

    if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
        NID_X9_62_characteristic_two_field
        || !((group->poly[0] != 0) && (group->poly[1] != 0)
             && (group->poly[2] != 0) && (group->poly[3] != 0)
             && (group->poly[4] == 0))) {
        ECerr(EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS,
              ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
        return 0;
    }

    if (k1)
        *k1 = group->poly[3];
    if (k2)
        *k2 = group->poly[2];
    if (k3)
        *k3 = group->poly[1];

    return 1;
}
87
#endif
88

89 90
/* some structures needed for the asn1 encoding */
typedef struct x9_62_pentanomial_st {
91 92 93
    int32_t k1;
    int32_t k2;
    int32_t k3;
94
} X9_62_PENTANOMIAL;
95

96
typedef struct x9_62_characteristic_two_st {
97
    int32_t m;
98 99 100 101 102 103 104 105 106 107 108 109 110
    ASN1_OBJECT *type;
    union {
        char *ptr;
        /* NID_X9_62_onBasis */
        ASN1_NULL *onBasis;
        /* NID_X9_62_tpBasis */
        ASN1_INTEGER *tpBasis;
        /* NID_X9_62_ppBasis */
        X9_62_PENTANOMIAL *ppBasis;
        /* anything else */
        ASN1_TYPE *other;
    } p;
} X9_62_CHARACTERISTIC_TWO;
111 112

typedef struct x9_62_fieldid_st {
113 114 115 116 117 118 119 120 121 122 123
    ASN1_OBJECT *fieldType;
    union {
        char *ptr;
        /* NID_X9_62_prime_field */
        ASN1_INTEGER *prime;
        /* NID_X9_62_characteristic_two_field */
        X9_62_CHARACTERISTIC_TWO *char_two;
        /* anything else */
        ASN1_TYPE *other;
    } p;
} X9_62_FIELDID;
124

125
typedef struct x9_62_curve_st {
126 127 128 129
    ASN1_OCTET_STRING *a;
    ASN1_OCTET_STRING *b;
    ASN1_BIT_STRING *seed;
} X9_62_CURVE;
130

131
struct ec_parameters_st {
132
    int32_t version;
133 134 135 136 137
    X9_62_FIELDID *fieldID;
    X9_62_CURVE *curve;
    ASN1_OCTET_STRING *base;
    ASN1_INTEGER *order;
    ASN1_INTEGER *cofactor;
138
} /* ECPARAMETERS */ ;
139 140

struct ecpk_parameters_st {
141 142 143 144 145 146 147
    int type;
    union {
        ASN1_OBJECT *named_curve;
        ECPARAMETERS *parameters;
        ASN1_NULL *implicitlyCA;
    } value;
} /* ECPKPARAMETERS */ ;
148

149 150
/* SEC1 ECPrivateKey */
typedef struct ec_privatekey_st {
151
    int32_t version;
152 153 154 155
    ASN1_OCTET_STRING *privateKey;
    ECPKPARAMETERS *parameters;
    ASN1_BIT_STRING *publicKey;
} EC_PRIVATEKEY;
156

157 158
/* the OpenSSL ASN.1 definitions */
ASN1_SEQUENCE(X9_62_PENTANOMIAL) = {
159 160 161
        ASN1_EMBED(X9_62_PENTANOMIAL, k1, INT32),
        ASN1_EMBED(X9_62_PENTANOMIAL, k2, INT32),
        ASN1_EMBED(X9_62_PENTANOMIAL, k3, INT32)
162
} static_ASN1_SEQUENCE_END(X9_62_PENTANOMIAL)
163

164 165 166 167
DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL)

ASN1_ADB_TEMPLATE(char_two_def) = ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.other, ASN1_ANY);
168

169
ASN1_ADB(X9_62_CHARACTERISTIC_TWO) = {
170 171 172
        ADB_ENTRY(NID_X9_62_onBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.onBasis, ASN1_NULL)),
        ADB_ENTRY(NID_X9_62_tpBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.tpBasis, ASN1_INTEGER)),
        ADB_ENTRY(NID_X9_62_ppBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.ppBasis, X9_62_PENTANOMIAL))
173
} ASN1_ADB_END(X9_62_CHARACTERISTIC_TWO, 0, type, 0, &char_two_def_tt, NULL);
174 175

ASN1_SEQUENCE(X9_62_CHARACTERISTIC_TWO) = {
176
        ASN1_EMBED(X9_62_CHARACTERISTIC_TWO, m, INT32),
177 178
        ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, type, ASN1_OBJECT),
        ASN1_ADB_OBJECT(X9_62_CHARACTERISTIC_TWO)
179
} static_ASN1_SEQUENCE_END(X9_62_CHARACTERISTIC_TWO)
180

181 182
DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO)
183

184 185 186
ASN1_ADB_TEMPLATE(fieldID_def) = ASN1_SIMPLE(X9_62_FIELDID, p.other, ASN1_ANY);

ASN1_ADB(X9_62_FIELDID) = {
187 188
        ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)),
        ADB_ENTRY(NID_X9_62_characteristic_two_field, ASN1_SIMPLE(X9_62_FIELDID, p.char_two, X9_62_CHARACTERISTIC_TWO))
189
} ASN1_ADB_END(X9_62_FIELDID, 0, fieldType, 0, &fieldID_def_tt, NULL);
190

191
ASN1_SEQUENCE(X9_62_FIELDID) = {
192 193
        ASN1_SIMPLE(X9_62_FIELDID, fieldType, ASN1_OBJECT),
        ASN1_ADB_OBJECT(X9_62_FIELDID)
194
} static_ASN1_SEQUENCE_END(X9_62_FIELDID)
195 196

ASN1_SEQUENCE(X9_62_CURVE) = {
197 198 199
        ASN1_SIMPLE(X9_62_CURVE, a, ASN1_OCTET_STRING),
        ASN1_SIMPLE(X9_62_CURVE, b, ASN1_OCTET_STRING),
        ASN1_OPT(X9_62_CURVE, seed, ASN1_BIT_STRING)
200
} static_ASN1_SEQUENCE_END(X9_62_CURVE)
201 202

ASN1_SEQUENCE(ECPARAMETERS) = {
203
        ASN1_EMBED(ECPARAMETERS, version, INT32),
204 205 206 207 208
        ASN1_SIMPLE(ECPARAMETERS, fieldID, X9_62_FIELDID),
        ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
        ASN1_SIMPLE(ECPARAMETERS, base, ASN1_OCTET_STRING),
        ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER),
        ASN1_OPT(ECPARAMETERS, cofactor, ASN1_INTEGER)
R
Rich Salz 已提交
209
} ASN1_SEQUENCE_END(ECPARAMETERS)
210

211 212
DECLARE_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS)
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS)
213 214

ASN1_CHOICE(ECPKPARAMETERS) = {
215 216 217
        ASN1_SIMPLE(ECPKPARAMETERS, value.named_curve, ASN1_OBJECT),
        ASN1_SIMPLE(ECPKPARAMETERS, value.parameters, ECPARAMETERS),
        ASN1_SIMPLE(ECPKPARAMETERS, value.implicitlyCA, ASN1_NULL)
R
Rich Salz 已提交
218
} ASN1_CHOICE_END(ECPKPARAMETERS)
219 220

DECLARE_ASN1_FUNCTIONS_const(ECPKPARAMETERS)
221
DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECPKPARAMETERS, ECPKPARAMETERS)
222 223
IMPLEMENT_ASN1_FUNCTIONS_const(ECPKPARAMETERS)

224
ASN1_SEQUENCE(EC_PRIVATEKEY) = {
225
        ASN1_EMBED(EC_PRIVATEKEY, version, INT32),
226 227 228
        ASN1_SIMPLE(EC_PRIVATEKEY, privateKey, ASN1_OCTET_STRING),
        ASN1_EXP_OPT(EC_PRIVATEKEY, parameters, ECPKPARAMETERS, 0),
        ASN1_EXP_OPT(EC_PRIVATEKEY, publicKey, ASN1_BIT_STRING, 1)
229
} static_ASN1_SEQUENCE_END(EC_PRIVATEKEY)
230

231 232
DECLARE_ASN1_FUNCTIONS_const(EC_PRIVATEKEY)
DECLARE_ASN1_ENCODE_FUNCTIONS_const(EC_PRIVATEKEY, EC_PRIVATEKEY)
233 234
IMPLEMENT_ASN1_FUNCTIONS_const(EC_PRIVATEKEY)

B
Bodo Möller 已提交
235
/* some declarations of internal function */
236

237
/* ec_asn1_group2field() sets the values in a X9_62_FIELDID object */
238
static int ec_asn1_group2fieldid(const EC_GROUP *, X9_62_FIELDID *);
239
/* ec_asn1_group2curve() sets the values in a X9_62_CURVE object */
240
static int ec_asn1_group2curve(const EC_GROUP *, X9_62_CURVE *);
B
Bodo Möller 已提交
241 242

/* the function definitions */
243

244
static int ec_asn1_group2fieldid(const EC_GROUP *group, X9_62_FIELDID *field)
245 246 247 248 249 250 251 252
{
    int ok = 0, nid;
    BIGNUM *tmp = NULL;

    if (group == NULL || field == NULL)
        return 0;

    /* clear the old values (if necessary) */
R
Rich Salz 已提交
253
    ASN1_OBJECT_free(field->fieldType);
R
Rich Salz 已提交
254
    ASN1_TYPE_free(field->p.other);
255 256 257 258 259 260 261 262 263 264 265 266 267 268

    nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group));
    /* set OID for the field */
    if ((field->fieldType = OBJ_nid2obj(nid)) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
        goto err;
    }

    if (nid == NID_X9_62_prime_field) {
        if ((tmp = BN_new()) == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
            goto err;
        }
        /* the parameters are specified by the prime number p */
269
        if (!EC_GROUP_get_curve(group, tmp, NULL, NULL, NULL)) {
270 271 272 273 274 275 276 277 278
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
            goto err;
        }
        /* set the prime number */
        field->p.prime = BN_to_ASN1_INTEGER(tmp, NULL);
        if (field->p.prime == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB);
            goto err;
        }
279
    } else if (nid == NID_X9_62_characteristic_two_field)
280
#ifdef OPENSSL_NO_EC2M
281 282 283 284
    {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, EC_R_GF2M_NOT_SUPPORTED);
        goto err;
    }
285
#else
286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318
    {
        int field_type;
        X9_62_CHARACTERISTIC_TWO *char_two;

        field->p.char_two = X9_62_CHARACTERISTIC_TWO_new();
        char_two = field->p.char_two;

        if (char_two == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
            goto err;
        }

        char_two->m = (long)EC_GROUP_get_degree(group);

        field_type = EC_GROUP_get_basis_type(group);

        if (field_type == 0) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
            goto err;
        }
        /* set base type OID */
        if ((char_two->type = OBJ_nid2obj(field_type)) == NULL) {
            ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
            goto err;
        }

        if (field_type == NID_X9_62_tpBasis) {
            unsigned int k;

            if (!EC_GROUP_get_trinomial_basis(group, &k))
                goto err;

            char_two->p.tpBasis = ASN1_INTEGER_new();
319
            if (char_two->p.tpBasis == NULL) {
320 321 322 323 324 325 326 327 328 329 330 331 332 333
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }
            if (!ASN1_INTEGER_set(char_two->p.tpBasis, (long)k)) {
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB);
                goto err;
            }
        } else if (field_type == NID_X9_62_ppBasis) {
            unsigned int k1, k2, k3;

            if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3))
                goto err;

            char_two->p.ppBasis = X9_62_PENTANOMIAL_new();
334
            if (char_two->p.ppBasis == NULL) {
335 336 337 338 339 340 341 342 343 344 345 346
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }

            /* set k? values */
            char_two->p.ppBasis->k1 = (long)k1;
            char_two->p.ppBasis->k2 = (long)k2;
            char_two->p.ppBasis->k3 = (long)k3;
        } else {                /* field_type == NID_X9_62_onBasis */

            /* for ONB the parameters are (asn1) NULL */
            char_two->p.onBasis = ASN1_NULL_new();
347
            if (char_two->p.onBasis == NULL) {
348 349 350 351 352
                ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
                goto err;
            }
        }
    }
353
#endif
354 355 356 357
    else {
        ECerr(EC_F_EC_ASN1_GROUP2FIELDID, EC_R_UNSUPPORTED_FIELD);
        goto err;
    }
358

359
    ok = 1;
360

R
Rich Salz 已提交
361 362
 err:
    BN_free(tmp);
K
KaoruToda 已提交
363
    return ok;
364 365
}

366
static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve)
367
{
368
    int ok = 0;
369
    BIGNUM *tmp_1 = NULL, *tmp_2 = NULL;
D
David Benjamin 已提交
370 371
    unsigned char *a_buf = NULL, *b_buf = NULL;
    size_t len;
372 373 374 375 376 377 378 379 380 381

    if (!group || !curve || !curve->a || !curve->b)
        return 0;

    if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    /* get a and b */
382 383 384
    if (!EC_GROUP_get_curve(group, NULL, tmp_1, tmp_2, NULL)) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB);
        goto err;
385 386
    }

D
David Benjamin 已提交
387 388 389 390 391 392 393 394 395 396
    /*
     * Per SEC 1, the curve coefficients must be padded up to size. See C.2's
     * definition of Curve, C.1's definition of FieldElement, and 2.3.5's
     * definition of how to encode the field elements.
     */
    len = ((size_t)EC_GROUP_get_degree(group) + 7) / 8;
    if ((a_buf = OPENSSL_malloc(len)) == NULL
        || (b_buf = OPENSSL_malloc(len)) == NULL) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
        goto err;
397
    }
D
David Benjamin 已提交
398 399 400 401
    if (BN_bn2binpad(tmp_1, a_buf, len) < 0
        || BN_bn2binpad(tmp_2, b_buf, len) < 0) {
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB);
        goto err;
402 403 404
    }

    /* set a and b */
D
David Benjamin 已提交
405 406
    if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len)
        || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) {
407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
        ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
        goto err;
    }

    /* set the seed (optional) */
    if (group->seed) {
        if (!curve->seed)
            if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) {
                ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
                goto err;
            }
        curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
        curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT;
        if (!ASN1_BIT_STRING_set(curve->seed, group->seed,
                                 (int)group->seed_len)) {
            ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
            goto err;
        }
    } else {
R
Rich Salz 已提交
426 427
        ASN1_BIT_STRING_free(curve->seed);
        curve->seed = NULL;
428 429 430 431
    }

    ok = 1;

R
Rich Salz 已提交
432
 err:
D
David Benjamin 已提交
433 434
    OPENSSL_free(a_buf);
    OPENSSL_free(b_buf);
R
Rich Salz 已提交
435 436
    BN_free(tmp_1);
    BN_free(tmp_2);
K
KaoruToda 已提交
437
    return ok;
438
}
439

R
Rich Salz 已提交
440 441
ECPARAMETERS *EC_GROUP_get_ecparameters(const EC_GROUP *group,
                                               ECPARAMETERS *params)
442 443 444
{
    size_t len = 0;
    ECPARAMETERS *ret = NULL;
445
    const BIGNUM *tmp;
446 447 448
    unsigned char *buffer = NULL;
    const EC_POINT *point = NULL;
    point_conversion_form_t form;
449
    ASN1_INTEGER *orig;
450

R
Rich Salz 已提交
451
    if (params == NULL) {
452
        if ((ret = ECPARAMETERS_new()) == NULL) {
R
Rich Salz 已提交
453
            ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
454 455 456
            goto err;
        }
    } else
R
Rich Salz 已提交
457
        ret = params;
458 459 460 461 462 463

    /* set the version (always one) */
    ret->version = (long)0x1;

    /* set the fieldID */
    if (!ec_asn1_group2fieldid(group, ret->fieldID)) {
R
Rich Salz 已提交
464
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
465 466 467 468 469
        goto err;
    }

    /* set the curve */
    if (!ec_asn1_group2curve(group, ret->curve)) {
R
Rich Salz 已提交
470
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
471 472 473 474 475
        goto err;
    }

    /* set the base point */
    if ((point = EC_GROUP_get0_generator(group)) == NULL) {
R
Rich Salz 已提交
476
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, EC_R_UNDEFINED_GENERATOR);
477 478 479 480 481
        goto err;
    }

    form = EC_GROUP_get_point_conversion_form(group);

D
Dr. Stephen Henson 已提交
482
    len = EC_POINT_point2buf(group, point, form, &buffer, NULL);
483
    if (len == 0) {
R
Rich Salz 已提交
484
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
485 486 487
        goto err;
    }
    if (ret->base == NULL && (ret->base = ASN1_OCTET_STRING_new()) == NULL) {
488
        OPENSSL_free(buffer);
R
Rich Salz 已提交
489
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
490 491
        goto err;
    }
492
    ASN1_STRING_set0(ret->base, buffer, len);
493 494

    /* set the order */
495 496
    tmp = EC_GROUP_get0_order(group);
    if (tmp == NULL) {
R
Rich Salz 已提交
497
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_EC_LIB);
498 499
        goto err;
    }
500
    ret->order = BN_to_ASN1_INTEGER(tmp, orig = ret->order);
501
    if (ret->order == NULL) {
502
        ret->order = orig;
R
Rich Salz 已提交
503
        ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_ASN1_LIB);
504 505 506 507
        goto err;
    }

    /* set the cofactor (optional) */
508 509
    tmp = EC_GROUP_get0_cofactor(group);
    if (tmp != NULL) {
510
        ret->cofactor = BN_to_ASN1_INTEGER(tmp, orig = ret->cofactor);
511
        if (ret->cofactor == NULL) {
512
            ret->cofactor = orig;
R
Rich Salz 已提交
513
            ECerr(EC_F_EC_GROUP_GET_ECPARAMETERS, ERR_R_ASN1_LIB);
514 515 516 517
            goto err;
        }
    }

R
Rich Salz 已提交
518
    return ret;
519

R
Rich Salz 已提交
520
 err:
R
Rich Salz 已提交
521
    if (params == NULL)
R
Rich Salz 已提交
522 523
        ECPARAMETERS_free(ret);
    return NULL;
524 525
}

R
Rich Salz 已提交
526 527
ECPKPARAMETERS *EC_GROUP_get_ecpkparameters(const EC_GROUP *group,
                                            ECPKPARAMETERS *params)
528 529 530 531 532 533
{
    int ok = 1, tmp;
    ECPKPARAMETERS *ret = params;

    if (ret == NULL) {
        if ((ret = ECPKPARAMETERS_new()) == NULL) {
R
Rich Salz 已提交
534
            ECerr(EC_F_EC_GROUP_GET_ECPKPARAMETERS, ERR_R_MALLOC_FAILURE);
535 536 537
            return NULL;
        }
    } else {
R
Rich Salz 已提交
538
        if (ret->type == 0)
539 540 541 542 543 544 545
            ASN1_OBJECT_free(ret->value.named_curve);
        else if (ret->type == 1 && ret->value.parameters)
            ECPARAMETERS_free(ret->value.parameters);
    }

    if (EC_GROUP_get_asn1_flag(group)) {
        /*
D
Daniel Bevenius 已提交
546
         * use the asn1 OID to describe the elliptic curve parameters
547 548 549 550 551 552 553
         */
        tmp = EC_GROUP_get_curve_name(group);
        if (tmp) {
            ret->type = 0;
            if ((ret->value.named_curve = OBJ_nid2obj(tmp)) == NULL)
                ok = 0;
        } else
F
FdaSilvaYY 已提交
554
            /* we don't know the nid => ERROR */
555 556 557 558 559
            ok = 0;
    } else {
        /* use the ECPARAMETERS structure */
        ret->type = 1;
        if ((ret->value.parameters =
R
Rich Salz 已提交
560
             EC_GROUP_get_ecparameters(group, NULL)) == NULL)
561 562 563 564 565 566 567 568 569
            ok = 0;
    }

    if (!ok) {
        ECPKPARAMETERS_free(ret);
        return NULL;
    }
    return ret;
}
570

R
Rich Salz 已提交
571
EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
572 573
{
    int ok = 0, tmp;
574
    EC_GROUP *ret = NULL, *dup = NULL;
575 576 577
    BIGNUM *p = NULL, *a = NULL, *b = NULL;
    EC_POINT *point = NULL;
    long field_bits;
578 579
    int curve_name = NID_undef;
    BN_CTX *ctx = NULL;
580 581 582

    if (!params->fieldID || !params->fieldID->fieldType ||
        !params->fieldID->p.ptr) {
R
Rich Salz 已提交
583
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
584 585 586
        goto err;
    }

D
David Benjamin 已提交
587 588 589 590 591 592
    /*
     * Now extract the curve parameters a and b. Note that, although SEC 1
     * specifies the length of their encodings, historical versions of OpenSSL
     * encoded them incorrectly, so we must accept any length for backwards
     * compatibility.
     */
593 594 595
    if (!params->curve || !params->curve->a ||
        !params->curve->a->data || !params->curve->b ||
        !params->curve->b->data) {
R
Rich Salz 已提交
596
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
597 598 599 600
        goto err;
    }
    a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL);
    if (a == NULL) {
R
Rich Salz 已提交
601
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
602 603 604 605
        goto err;
    }
    b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL);
    if (b == NULL) {
R
Rich Salz 已提交
606
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
607 608 609 610 611 612
        goto err;
    }

    /* get the field parameters */
    tmp = OBJ_obj2nid(params->fieldID->fieldType);
    if (tmp == NID_X9_62_characteristic_two_field)
613
#ifdef OPENSSL_NO_EC2M
614
    {
R
Rich Salz 已提交
615
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_GF2M_NOT_SUPPORTED);
616 617
        goto err;
    }
618
#else
619 620 621 622 623 624 625
    {
        X9_62_CHARACTERISTIC_TWO *char_two;

        char_two = params->fieldID->p.char_two;

        field_bits = char_two->m;
        if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
R
Rich Salz 已提交
626
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_FIELD_TOO_LARGE);
627 628 629 630
            goto err;
        }

        if ((p = BN_new()) == NULL) {
R
Rich Salz 已提交
631
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
632 633 634 635 636 637 638 639 640 641
            goto err;
        }

        /* get the base type */
        tmp = OBJ_obj2nid(char_two->type);

        if (tmp == NID_X9_62_tpBasis) {
            long tmp_long;

            if (!char_two->p.tpBasis) {
R
Rich Salz 已提交
642
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
643 644 645 646 647 648
                goto err;
            }

            tmp_long = ASN1_INTEGER_get(char_two->p.tpBasis);

            if (!(char_two->m > tmp_long && tmp_long > 0)) {
R
Rich Salz 已提交
649
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS,
650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665
                      EC_R_INVALID_TRINOMIAL_BASIS);
                goto err;
            }

            /* create the polynomial */
            if (!BN_set_bit(p, (int)char_two->m))
                goto err;
            if (!BN_set_bit(p, (int)tmp_long))
                goto err;
            if (!BN_set_bit(p, 0))
                goto err;
        } else if (tmp == NID_X9_62_ppBasis) {
            X9_62_PENTANOMIAL *penta;

            penta = char_two->p.ppBasis;
            if (!penta) {
R
Rich Salz 已提交
666
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
667 668 669 670 671 672
                goto err;
            }

            if (!
                (char_two->m > penta->k3 && penta->k3 > penta->k2
                 && penta->k2 > penta->k1 && penta->k1 > 0)) {
R
Rich Salz 已提交
673
                ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS,
674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689
                      EC_R_INVALID_PENTANOMIAL_BASIS);
                goto err;
            }

            /* create the polynomial */
            if (!BN_set_bit(p, (int)char_two->m))
                goto err;
            if (!BN_set_bit(p, (int)penta->k1))
                goto err;
            if (!BN_set_bit(p, (int)penta->k2))
                goto err;
            if (!BN_set_bit(p, (int)penta->k3))
                goto err;
            if (!BN_set_bit(p, 0))
                goto err;
        } else if (tmp == NID_X9_62_onBasis) {
R
Rich Salz 已提交
690
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_NOT_IMPLEMENTED);
691 692 693
            goto err;
        } else {                /* error */

R
Rich Salz 已提交
694
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
695 696 697 698 699 700
            goto err;
        }

        /* create the EC_GROUP structure */
        ret = EC_GROUP_new_curve_GF2m(p, a, b, NULL);
    }
701
#endif
702 703 704 705
    else if (tmp == NID_X9_62_prime_field) {
        /* we have a curve over a prime field */
        /* extract the prime number */
        if (!params->fieldID->p.prime) {
R
Rich Salz 已提交
706
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
707 708 709 710
            goto err;
        }
        p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL);
        if (p == NULL) {
R
Rich Salz 已提交
711
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
712 713 714 715
            goto err;
        }

        if (BN_is_negative(p) || BN_is_zero(p)) {
R
Rich Salz 已提交
716
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_FIELD);
717 718 719 720 721
            goto err;
        }

        field_bits = BN_num_bits(p);
        if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
R
Rich Salz 已提交
722
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_FIELD_TOO_LARGE);
723 724 725 726 727 728
            goto err;
        }

        /* create the EC_GROUP structure */
        ret = EC_GROUP_new_curve_GFp(p, a, b, NULL);
    } else {
R
Rich Salz 已提交
729
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_FIELD);
730 731 732 733
        goto err;
    }

    if (ret == NULL) {
R
Rich Salz 已提交
734
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
735 736 737 738 739
        goto err;
    }

    /* extract seed (optional) */
    if (params->curve->seed != NULL) {
R
Rich Salz 已提交
740
        OPENSSL_free(ret->seed);
741
        if ((ret->seed = OPENSSL_malloc(params->curve->seed->length)) == NULL) {
R
Rich Salz 已提交
742
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
743 744 745 746 747 748 749
            goto err;
        }
        memcpy(ret->seed, params->curve->seed->data,
               params->curve->seed->length);
        ret->seed_len = params->curve->seed->length;
    }

750 751 752 753
    if (params->order == NULL
            || params->base == NULL
            || params->base->data == NULL
            || params->base->length == 0) {
R
Rich Salz 已提交
754
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_ASN1_ERROR);
755 756 757 758 759 760 761 762 763 764 765 766 767
        goto err;
    }

    if ((point = EC_POINT_new(ret)) == NULL)
        goto err;

    /* set the point conversion form */
    EC_GROUP_set_point_conversion_form(ret, (point_conversion_form_t)
                                       (params->base->data[0] & ~0x01));

    /* extract the ec point */
    if (!EC_POINT_oct2point(ret, point, params->base->data,
                            params->base->length, NULL)) {
R
Rich Salz 已提交
768
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
769 770 771 772 773
        goto err;
    }

    /* extract the order */
    if ((a = ASN1_INTEGER_to_BN(params->order, a)) == NULL) {
R
Rich Salz 已提交
774
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
775 776 777
        goto err;
    }
    if (BN_is_negative(a) || BN_is_zero(a)) {
R
Rich Salz 已提交
778
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_GROUP_ORDER);
779 780 781
        goto err;
    }
    if (BN_num_bits(a) > (int)field_bits + 1) { /* Hasse bound */
R
Rich Salz 已提交
782
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, EC_R_INVALID_GROUP_ORDER);
783 784 785 786 787
        goto err;
    }

    /* extract the cofactor (optional) */
    if (params->cofactor == NULL) {
R
Rich Salz 已提交
788 789
        BN_free(b);
        b = NULL;
790
    } else if ((b = ASN1_INTEGER_to_BN(params->cofactor, b)) == NULL) {
R
Rich Salz 已提交
791
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_ASN1_LIB);
792 793 794 795
        goto err;
    }
    /* set the generator, order and cofactor (if present) */
    if (!EC_GROUP_set_generator(ret, point, a, b)) {
R
Rich Salz 已提交
796
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
797 798 799
        goto err;
    }

800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854
    /*
     * Check if the explicit parameters group just created matches one of the
     * built-in curves.
     *
     * We create a copy of the group just built, so that we can remove optional
     * fields for the lookup: we do this to avoid the possibility that one of
     * the optional parameters is used to force the library into using a less
     * performant and less secure EC_METHOD instead of the specialized one.
     * In any case, `seed` is not really used in any computation, while a
     * cofactor different from the one in the built-in table is just
     * mathematically wrong anyway and should not be used.
     */
    if ((ctx = BN_CTX_new()) == NULL) {
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
        goto err;
    }
    if ((dup = EC_GROUP_dup(ret)) == NULL
            || EC_GROUP_set_seed(dup, NULL, 0) != 1
            || !EC_GROUP_set_generator(dup, point, a, NULL)) {
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
        goto err;
    }
    if ((curve_name = ec_curve_nid_from_params(dup, ctx)) != NID_undef) {
        /*
         * The input explicit parameters successfully matched one of the
         * built-in curves: often for built-in curves we have specialized
         * methods with better performance and hardening.
         *
         * In this case we replace the `EC_GROUP` created through explicit
         * parameters with one created from a named group.
         */
        EC_GROUP *named_group = NULL;

#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
        /*
         * NID_wap_wsg_idm_ecid_wtls12 and NID_secp224r1 are both aliases for
         * the same curve, we prefer the SECP nid when matching explicit
         * parameters as that is associated with a specialized EC_METHOD.
         */
        if (curve_name == NID_wap_wsg_idm_ecid_wtls12)
            curve_name = NID_secp224r1;
#endif /* !def(OPENSSL_NO_EC_NISTP_64_GCC_128) */

        if ((named_group = EC_GROUP_new_by_curve_name(curve_name)) == NULL) {
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
            goto err;
        }
        EC_GROUP_free(ret);
        ret = named_group;

        /*
         * Set the flag so that EC_GROUPs created from explicit parameters are
         * serialized using explicit parameters by default.
         */
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
855 856 857 858 859 860 861 862 863 864 865 866 867 868

        /*
         * If the input params do not contain the optional seed field we make
         * sure it is not added to the returned group.
         *
         * The seed field is not really used inside libcrypto anyway, and
         * adding it to parsed explicit parameter keys would alter their DER
         * encoding output (because of the extra field) which could impact
         * applications fingerprinting keys by their DER encoding.
         */
        if (params->curve->seed == NULL) {
            if (EC_GROUP_set_seed(ret, NULL, 0) != 1)
                goto err;
        }
869 870
    }

871 872
    ok = 1;

R
Rich Salz 已提交
873 874
 err:
    if (!ok) {
875
        EC_GROUP_free(ret);
876 877
        ret = NULL;
    }
878
    EC_GROUP_free(dup);
879

R
Rich Salz 已提交
880 881 882
    BN_free(p);
    BN_free(a);
    BN_free(b);
R
Rich Salz 已提交
883
    EC_POINT_free(point);
884 885 886

    BN_CTX_free(ctx);

K
KaoruToda 已提交
887
    return ret;
888 889
}

R
Rich Salz 已提交
890
EC_GROUP *EC_GROUP_new_from_ecpkparameters(const ECPKPARAMETERS *params)
891 892 893 894 895
{
    EC_GROUP *ret = NULL;
    int tmp = 0;

    if (params == NULL) {
R
Rich Salz 已提交
896
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, EC_R_MISSING_PARAMETERS);
897 898 899 900 901 902
        return NULL;
    }

    if (params->type == 0) {    /* the curve is given by an OID */
        tmp = OBJ_obj2nid(params->value.named_curve);
        if ((ret = EC_GROUP_new_by_curve_name(tmp)) == NULL) {
R
Rich Salz 已提交
903
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS,
904 905 906 907 908 909
                  EC_R_EC_GROUP_NEW_BY_NAME_FAILURE);
            return NULL;
        }
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_NAMED_CURVE);
    } else if (params->type == 1) { /* the parameters are given by a
                                     * ECPARAMETERS structure */
R
Rich Salz 已提交
910
        ret = EC_GROUP_new_from_ecparameters(params->value.parameters);
911
        if (!ret) {
R
Rich Salz 已提交
912
            ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, ERR_R_EC_LIB);
913 914
            return NULL;
        }
915
        EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
916 917 918
    } else if (params->type == 2) { /* implicitlyCA */
        return NULL;
    } else {
R
Rich Salz 已提交
919
        ECerr(EC_F_EC_GROUP_NEW_FROM_ECPKPARAMETERS, EC_R_ASN1_ERROR);
920 921 922 923 924
        return NULL;
    }

    return ret;
}
925

926
/* EC_GROUP <-> DER encoding of ECPKPARAMETERS */
927

928
EC_GROUP *d2i_ECPKParameters(EC_GROUP **a, const unsigned char **in, long len)
929 930 931
{
    EC_GROUP *group = NULL;
    ECPKPARAMETERS *params = NULL;
932
    const unsigned char *p = *in;
933

934
    if ((params = d2i_ECPKPARAMETERS(NULL, &p, len)) == NULL) {
935 936 937 938 939
        ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_D2I_ECPKPARAMETERS_FAILURE);
        ECPKPARAMETERS_free(params);
        return NULL;
    }

R
Rich Salz 已提交
940
    if ((group = EC_GROUP_new_from_ecpkparameters(params)) == NULL) {
941 942 943 944 945
        ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_PKPARAMETERS2GROUP_FAILURE);
        ECPKPARAMETERS_free(params);
        return NULL;
    }

R
Rich Salz 已提交
946
    if (a) {
947
        EC_GROUP_free(*a);
948
        *a = group;
R
Rich Salz 已提交
949
    }
950 951

    ECPKPARAMETERS_free(params);
952
    *in = p;
K
KaoruToda 已提交
953
    return group;
954
}
955

956
int i2d_ECPKParameters(const EC_GROUP *a, unsigned char **out)
957 958
{
    int ret = 0;
R
Rich Salz 已提交
959
    ECPKPARAMETERS *tmp = EC_GROUP_get_ecpkparameters(a, NULL);
960 961 962 963 964 965 966 967 968 969
    if (tmp == NULL) {
        ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_GROUP2PKPARAMETERS_FAILURE);
        return 0;
    }
    if ((ret = i2d_ECPKPARAMETERS(tmp, out)) == 0) {
        ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_I2D_ECPKPARAMETERS_FAILURE);
        ECPKPARAMETERS_free(tmp);
        return 0;
    }
    ECPKPARAMETERS_free(tmp);
K
KaoruToda 已提交
970
    return ret;
971
}
972

973 974
/* some EC_KEY functions */

975
EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
976 977 978
{
    EC_KEY *ret = NULL;
    EC_PRIVATEKEY *priv_key = NULL;
979
    const unsigned char *p = *in;
980

981
    if ((priv_key = d2i_EC_PRIVATEKEY(NULL, &p, len)) == NULL) {
982 983 984 985 986 987 988 989 990 991 992 993 994
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        return NULL;
    }

    if (a == NULL || *a == NULL) {
        if ((ret = EC_KEY_new()) == NULL) {
            ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
            goto err;
        }
    } else
        ret = *a;

    if (priv_key->parameters) {
995
        EC_GROUP_free(ret->group);
R
Rich Salz 已提交
996
        ret->group = EC_GROUP_new_from_ecpkparameters(priv_key->parameters);
997 998 999 1000 1001 1002 1003 1004 1005 1006
    }

    if (ret->group == NULL) {
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }

    ret->version = priv_key->version;

    if (priv_key->privateKey) {
1007
        ASN1_OCTET_STRING *pkey = priv_key->privateKey;
1008
        if (EC_KEY_oct2priv(ret, ASN1_STRING_get0_data(pkey),
1009
                            ASN1_STRING_length(pkey)) == 0)
1010 1011 1012 1013 1014 1015
            goto err;
    } else {
        ECerr(EC_F_D2I_ECPRIVATEKEY, EC_R_MISSING_PRIVATE_KEY);
        goto err;
    }

R
Rich Salz 已提交
1016
    EC_POINT_clear_free(ret->pub_key);
1017 1018 1019 1020 1021 1022 1023 1024 1025 1026
    ret->pub_key = EC_POINT_new(ret->group);
    if (ret->pub_key == NULL) {
        ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }

    if (priv_key->publicKey) {
        const unsigned char *pub_oct;
        int pub_oct_len;

1027
        pub_oct = ASN1_STRING_get0_data(priv_key->publicKey);
D
Dr. Stephen Henson 已提交
1028
        pub_oct_len = ASN1_STRING_length(priv_key->publicKey);
1029
        if (!EC_KEY_oct2key(ret, pub_oct, pub_oct_len, NULL)) {
1030 1031 1032 1033
            ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }
    } else {
D
Dr. Stephen Henson 已提交
1034 1035
        if (ret->group->meth->keygenpub == NULL
            || ret->group->meth->keygenpub(ret) == 0)
1036
                goto err;
1037 1038 1039 1040
        /* Remember the original private-key-only encoding. */
        ret->enc_flag |= EC_PKEY_NO_PUBKEY;
    }

1041 1042
    if (a)
        *a = ret;
R
Rich Salz 已提交
1043
    EC_PRIVATEKEY_free(priv_key);
1044
    *in = p;
K
KaoruToda 已提交
1045
    return ret;
R
Rich Salz 已提交
1046 1047 1048 1049 1050 1051

 err:
    if (a == NULL || *a != ret)
        EC_KEY_free(ret);
    EC_PRIVATEKEY_free(priv_key);
    return NULL;
1052 1053 1054 1055 1056
}

int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
{
    int ret = 0, ok = 0;
D
Dr. Stephen Henson 已提交
1057
    unsigned char *priv= NULL, *pub= NULL;
R
Richard Levitte 已提交
1058
    size_t privlen = 0, publen = 0;
D
Dr. Stephen Henson 已提交
1059

1060 1061
    EC_PRIVATEKEY *priv_key = NULL;

1062
    if (a == NULL || a->group == NULL ||
1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074
        (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key == NULL)) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_PASSED_NULL_PARAMETER);
        goto err;
    }

    if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    priv_key->version = a->version;

D
Dr. Stephen Henson 已提交
1075
    privlen = EC_KEY_priv2buf(a, &priv);
1076

D
Dr. Stephen Henson 已提交
1077
    if (privlen == 0) {
1078
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
1079 1080 1081
        goto err;
    }

D
Dr. Stephen Henson 已提交
1082 1083
    ASN1_STRING_set0(priv_key->privateKey, priv, privlen);
    priv = NULL;
1084 1085 1086

    if (!(a->enc_flag & EC_PKEY_NO_PARAMETERS)) {
        if ((priv_key->parameters =
R
Rich Salz 已提交
1087
             EC_GROUP_get_ecpkparameters(a->group,
1088 1089 1090 1091 1092 1093 1094
                                        priv_key->parameters)) == NULL) {
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }
    }

    if (!(a->enc_flag & EC_PKEY_NO_PUBKEY)) {
D
Dr. Stephen Henson 已提交
1095
        priv_key->publicKey = ASN1_BIT_STRING_new();
1096 1097 1098 1099 1100
        if (priv_key->publicKey == NULL) {
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
            goto err;
        }

D
Dr. Stephen Henson 已提交
1101
        publen = EC_KEY_key2buf(a, a->conv_form, &pub, NULL);
1102

D
Dr. Stephen Henson 已提交
1103
        if (publen == 0) {
1104 1105 1106 1107 1108 1109
            ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
            goto err;
        }

        priv_key->publicKey->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
        priv_key->publicKey->flags |= ASN1_STRING_FLAG_BITS_LEFT;
D
Dr. Stephen Henson 已提交
1110 1111
        ASN1_STRING_set0(priv_key->publicKey, pub, publen);
        pub = NULL;
1112 1113 1114 1115 1116 1117 1118 1119
    }

    if ((ret = i2d_EC_PRIVATEKEY(priv_key, out)) == 0) {
        ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
        goto err;
    }
    ok = 1;
 err:
D
Dr. Stephen Henson 已提交
1120 1121
    OPENSSL_clear_free(priv, privlen);
    OPENSSL_free(pub);
R
Rich Salz 已提交
1122
    EC_PRIVATEKEY_free(priv_key);
1123 1124
    return (ok ? ret : 0);
}
1125 1126

int i2d_ECParameters(EC_KEY *a, unsigned char **out)
1127 1128 1129 1130 1131 1132 1133
{
    if (a == NULL) {
        ECerr(EC_F_I2D_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }
    return i2d_ECPKParameters(a->group, out);
}
1134 1135

EC_KEY *d2i_ECParameters(EC_KEY **a, const unsigned char **in, long len)
1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153
{
    EC_KEY *ret;

    if (in == NULL || *in == NULL) {
        ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
        return NULL;
    }

    if (a == NULL || *a == NULL) {
        if ((ret = EC_KEY_new()) == NULL) {
            ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
            return NULL;
        }
    } else
        ret = *a;

    if (!d2i_ECPKParameters(&ret->group, in, len)) {
        ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_EC_LIB);
1154 1155
        if (a == NULL || *a != ret)
             EC_KEY_free(ret);
1156 1157 1158
        return NULL;
    }

1159 1160 1161
    if (a)
        *a = ret;

1162 1163
    return ret;
}
1164

1165
EC_KEY *o2i_ECPublicKey(EC_KEY **a, const unsigned char **in, long len)
1166 1167 1168 1169 1170
{
    EC_KEY *ret = NULL;

    if (a == NULL || (*a) == NULL || (*a)->group == NULL) {
        /*
F
FdaSilvaYY 已提交
1171
         * sorry, but a EC_GROUP-structure is necessary to set the public key
1172 1173 1174 1175 1176
         */
        ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }
    ret = *a;
1177
    if (!EC_KEY_oct2key(ret, *in, len, NULL)) {
1178 1179 1180 1181 1182 1183
        ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_EC_LIB);
        return 0;
    }
    *in += len;
    return ret;
}
1184

D
Dr. Stephen Henson 已提交
1185
int i2o_ECPublicKey(const EC_KEY *a, unsigned char **out)
1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221
{
    size_t buf_len = 0;
    int new_buffer = 0;

    if (a == NULL) {
        ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
        return 0;
    }

    buf_len = EC_POINT_point2oct(a->group, a->pub_key,
                                 a->conv_form, NULL, 0, NULL);

    if (out == NULL || buf_len == 0)
        /* out == NULL => just return the length of the octet string */
        return buf_len;

    if (*out == NULL) {
        if ((*out = OPENSSL_malloc(buf_len)) == NULL) {
            ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE);
            return 0;
        }
        new_buffer = 1;
    }
    if (!EC_POINT_point2oct(a->group, a->pub_key, a->conv_form,
                            *out, buf_len, NULL)) {
        ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB);
        if (new_buffer) {
            OPENSSL_free(*out);
            *out = NULL;
        }
        return 0;
    }
    if (!new_buffer)
        *out += buf_len;
    return buf_len;
}
1222 1223 1224 1225 1226 1227 1228 1229

ASN1_SEQUENCE(ECDSA_SIG) = {
        ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM),
        ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM)
} static_ASN1_SEQUENCE_END(ECDSA_SIG)

DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG)
DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG)
1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(ECDSA_SIG, ECDSA_SIG, ECDSA_SIG)

ECDSA_SIG *ECDSA_SIG_new(void)
{
    ECDSA_SIG *sig = OPENSSL_zalloc(sizeof(*sig));
    if (sig == NULL)
        ECerr(EC_F_ECDSA_SIG_NEW, ERR_R_MALLOC_FAILURE);
    return sig;
}

void ECDSA_SIG_free(ECDSA_SIG *sig)
{
    if (sig == NULL)
        return;
    BN_clear_free(sig->r);
    BN_clear_free(sig->s);
    OPENSSL_free(sig);
}
D
Dr. Stephen Henson 已提交
1248

1249
void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps)
D
Dr. Stephen Henson 已提交
1250
{
D
Dr. Stephen Henson 已提交
1251
    if (pr != NULL)
D
Dr. Stephen Henson 已提交
1252
        *pr = sig->r;
D
Dr. Stephen Henson 已提交
1253
    if (ps != NULL)
D
Dr. Stephen Henson 已提交
1254 1255
        *ps = sig->s;
}
D
Dr. Stephen Henson 已提交
1256

1257 1258 1259 1260 1261 1262 1263 1264 1265 1266
const BIGNUM *ECDSA_SIG_get0_r(const ECDSA_SIG *sig)
{
    return sig->r;
}

const BIGNUM *ECDSA_SIG_get0_s(const ECDSA_SIG *sig)
{
    return sig->s;
}

1267
int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s)
1268
{
1269 1270
    if (r == NULL || s == NULL)
        return 0;
1271 1272 1273 1274 1275 1276 1277
    BN_clear_free(sig->r);
    BN_clear_free(sig->s);
    sig->r = r;
    sig->s = s;
    return 1;
}

D
Dr. Stephen Henson 已提交
1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290
int ECDSA_size(const EC_KEY *r)
{
    int ret, i;
    ASN1_INTEGER bs;
    unsigned char buf[4];
    const EC_GROUP *group;

    if (r == NULL)
        return 0;
    group = EC_KEY_get0_group(r);
    if (group == NULL)
        return 0;

1291 1292
    i = EC_GROUP_order_bits(group);
    if (i == 0)
D
Dr. Stephen Henson 已提交
1293 1294 1295 1296 1297 1298 1299 1300 1301 1302
        return 0;
    bs.length = (i + 7) / 8;
    bs.data = buf;
    bs.type = V_ASN1_INTEGER;
    /* If the top bit is set the asn1 encoding is 1 larger. */
    buf[0] = 0xff;

    i = i2d_ASN1_INTEGER(&bs, NULL);
    i += i;                     /* r and s */
    ret = ASN1_object_size(1, i, V_ASN1_SEQUENCE);
K
KaoruToda 已提交
1303
    return ret;
D
Dr. Stephen Henson 已提交
1304
}