2008-11-06 02:39:08 +08:00
|
|
|
/*
|
2022-05-03 18:52:38 +08:00
|
|
|
* Copyright 1998-2022 The OpenSSL Project Authors. All Rights Reserved.
|
2000-12-09 03:09:35 +08:00
|
|
|
*
|
2018-12-06 20:17:34 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:51:34 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
1998-12-21 18:52:47 +08:00
|
|
|
*/
|
|
|
|
|
2000-12-09 03:09:35 +08:00
|
|
|
#include <stddef.h>
|
1999-07-22 06:10:23 +08:00
|
|
|
#include <openssl/x509.h>
|
2000-12-09 03:09:35 +08:00
|
|
|
#include <openssl/asn1.h>
|
|
|
|
#include <openssl/asn1t.h>
|
2020-10-06 23:02:43 +08:00
|
|
|
#include <openssl/err.h>
|
|
|
|
#include "crypto/asn1.h"
|
2019-09-28 06:45:33 +08:00
|
|
|
#include "crypto/evp.h"
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2000-12-09 03:09:35 +08:00
|
|
|
ASN1_SEQUENCE(X509_ALGOR) = {
|
|
|
|
ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT),
|
|
|
|
ASN1_OPT(X509_ALGOR, parameter, ASN1_ANY)
|
2001-02-23 20:47:06 +08:00
|
|
|
} ASN1_SEQUENCE_END(X509_ALGOR)
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2008-03-13 05:14:28 +08:00
|
|
|
ASN1_ITEM_TEMPLATE(X509_ALGORS) =
|
|
|
|
ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, algorithms, X509_ALGOR)
|
|
|
|
ASN1_ITEM_TEMPLATE_END(X509_ALGORS)
|
|
|
|
|
2000-12-09 03:09:35 +08:00
|
|
|
IMPLEMENT_ASN1_FUNCTIONS(X509_ALGOR)
|
2008-03-13 05:14:28 +08:00
|
|
|
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname(X509_ALGORS, X509_ALGORS, X509_ALGORS)
|
2001-07-27 10:22:42 +08:00
|
|
|
IMPLEMENT_ASN1_DUP_FUNCTION(X509_ALGOR)
|
2006-03-20 20:22:24 +08:00
|
|
|
|
|
|
|
int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
|
|
|
|
{
|
2017-12-08 23:49:41 +08:00
|
|
|
if (alg == NULL)
|
2006-03-20 20:22:24 +08:00
|
|
|
return 0;
|
2017-12-08 23:49:41 +08:00
|
|
|
|
2021-08-06 18:11:13 +08:00
|
|
|
if (ptype != V_ASN1_UNDEF && alg->parameter == NULL
|
|
|
|
&& (alg->parameter = ASN1_TYPE_new()) == NULL)
|
|
|
|
return 0;
|
2017-12-08 23:49:41 +08:00
|
|
|
|
|
|
|
ASN1_OBJECT_free(alg->algorithm);
|
|
|
|
alg->algorithm = aobj;
|
|
|
|
|
2021-08-06 18:11:13 +08:00
|
|
|
if (ptype == V_ASN1_EOC)
|
2006-03-20 20:22:24 +08:00
|
|
|
return 1;
|
|
|
|
if (ptype == V_ASN1_UNDEF) {
|
2015-04-30 23:30:03 +08:00
|
|
|
ASN1_TYPE_free(alg->parameter);
|
|
|
|
alg->parameter = NULL;
|
2006-03-20 20:22:24 +08:00
|
|
|
} else
|
|
|
|
ASN1_TYPE_set(alg->parameter, ptype, pval);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2021-08-06 18:11:13 +08:00
|
|
|
X509_ALGOR *ossl_X509_ALGOR_from_nid(int nid, int ptype, void *pval)
|
|
|
|
{
|
|
|
|
ASN1_OBJECT *algo = OBJ_nid2obj(nid);
|
|
|
|
X509_ALGOR *alg = NULL;
|
|
|
|
|
|
|
|
if (algo == NULL)
|
|
|
|
return NULL;
|
|
|
|
if ((alg = X509_ALGOR_new()) == NULL)
|
|
|
|
goto err;
|
|
|
|
if (X509_ALGOR_set0(alg, algo, ptype, pval))
|
|
|
|
return alg;
|
|
|
|
alg->algorithm = NULL; /* precaution to prevent double free */
|
|
|
|
|
|
|
|
err:
|
|
|
|
X509_ALGOR_free(alg);
|
2021-08-06 18:11:13 +08:00
|
|
|
/* ASN1_OBJECT_free(algo) is not needed due to OBJ_nid2obj() */
|
2021-08-06 18:11:13 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-08-17 03:18:04 +08:00
|
|
|
void X509_ALGOR_get0(const ASN1_OBJECT **paobj, int *pptype,
|
|
|
|
const void **ppval, const X509_ALGOR *algor)
|
2006-03-20 20:22:24 +08:00
|
|
|
{
|
|
|
|
if (paobj)
|
|
|
|
*paobj = algor->algorithm;
|
2006-04-05 20:00:22 +08:00
|
|
|
if (pptype) {
|
2006-03-20 20:22:24 +08:00
|
|
|
if (algor->parameter == NULL) {
|
|
|
|
*pptype = V_ASN1_UNDEF;
|
|
|
|
return;
|
|
|
|
} else
|
|
|
|
*pptype = algor->parameter->type;
|
|
|
|
if (ppval)
|
|
|
|
*ppval = algor->parameter->value.ptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-03-11 21:27:05 +08:00
|
|
|
/* Set up an X509_ALGOR DigestAlgorithmIdentifier from an EVP_MD */
|
|
|
|
void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md)
|
|
|
|
{
|
2021-08-06 18:11:13 +08:00
|
|
|
int type = md->flags & EVP_MD_FLAG_DIGALGID_ABSENT ? V_ASN1_UNDEF
|
|
|
|
: V_ASN1_NULL;
|
2010-03-11 21:27:05 +08:00
|
|
|
|
2021-08-06 18:11:13 +08:00
|
|
|
(void)X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_get_type(md)), type, NULL);
|
2010-03-11 21:27:05 +08:00
|
|
|
}
|
2014-12-15 07:14:15 +08:00
|
|
|
|
|
|
|
int X509_ALGOR_cmp(const X509_ALGOR *a, const X509_ALGOR *b)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
rv = OBJ_cmp(a->algorithm, b->algorithm);
|
|
|
|
if (rv)
|
|
|
|
return rv;
|
|
|
|
if (!a->parameter && !b->parameter)
|
|
|
|
return 0;
|
|
|
|
return ASN1_TYPE_cmp(a->parameter, b->parameter);
|
|
|
|
}
|
2020-01-11 01:35:49 +08:00
|
|
|
|
|
|
|
int X509_ALGOR_copy(X509_ALGOR *dest, const X509_ALGOR *src)
|
|
|
|
{
|
|
|
|
if (src == NULL || dest == NULL)
|
2021-06-18 15:50:54 +08:00
|
|
|
return 0;
|
2020-01-11 01:35:49 +08:00
|
|
|
|
|
|
|
if (dest->algorithm)
|
|
|
|
ASN1_OBJECT_free(dest->algorithm);
|
|
|
|
dest->algorithm = NULL;
|
|
|
|
|
|
|
|
if (dest->parameter)
|
|
|
|
ASN1_TYPE_free(dest->parameter);
|
|
|
|
dest->parameter = NULL;
|
|
|
|
|
|
|
|
if (src->algorithm)
|
|
|
|
if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL)
|
2021-06-18 15:50:54 +08:00
|
|
|
return 0;
|
2020-01-11 01:35:49 +08:00
|
|
|
|
2020-08-04 10:34:22 +08:00
|
|
|
if (src->parameter != NULL) {
|
|
|
|
dest->parameter = ASN1_TYPE_new();
|
|
|
|
if (dest->parameter == NULL)
|
|
|
|
return 0;
|
|
|
|
|
2020-01-11 01:35:49 +08:00
|
|
|
/* Assuming this is also correct for a BOOL.
|
|
|
|
* set does copy as a side effect.
|
|
|
|
*/
|
2021-06-18 17:46:50 +08:00
|
|
|
if (ASN1_TYPE_set1(dest->parameter, src->parameter->type,
|
|
|
|
src->parameter->value.ptr) == 0)
|
2021-06-18 15:50:54 +08:00
|
|
|
return 0;
|
2020-08-04 10:34:22 +08:00
|
|
|
}
|
2020-01-11 01:35:49 +08:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2020-10-06 23:02:43 +08:00
|
|
|
|
|
|
|
/* allocate and set algorithm ID from EVP_MD, default SHA1 */
|
2021-03-09 07:48:16 +08:00
|
|
|
int ossl_x509_algor_new_from_md(X509_ALGOR **palg, const EVP_MD *md)
|
2020-10-06 23:02:43 +08:00
|
|
|
{
|
2021-08-06 18:11:13 +08:00
|
|
|
X509_ALGOR *alg;
|
|
|
|
|
2020-10-06 23:02:43 +08:00
|
|
|
/* Default is SHA1 so no need to create it - still success */
|
|
|
|
if (md == NULL || EVP_MD_is_a(md, "SHA1"))
|
|
|
|
return 1;
|
2021-08-06 18:11:13 +08:00
|
|
|
if ((alg = X509_ALGOR_new()) == NULL)
|
2020-10-06 23:02:43 +08:00
|
|
|
return 0;
|
2021-08-06 18:11:13 +08:00
|
|
|
X509_ALGOR_set_md(alg, md);
|
|
|
|
*palg = alg;
|
2020-10-06 23:02:43 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* convert algorithm ID to EVP_MD, default SHA1 */
|
2021-03-09 07:48:16 +08:00
|
|
|
const EVP_MD *ossl_x509_algor_get_md(X509_ALGOR *alg)
|
2020-10-06 23:02:43 +08:00
|
|
|
{
|
|
|
|
const EVP_MD *md;
|
|
|
|
|
|
|
|
if (alg == NULL)
|
|
|
|
return EVP_sha1();
|
|
|
|
md = EVP_get_digestbyobj(alg->algorithm);
|
|
|
|
if (md == NULL)
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ASN1, ASN1_R_UNKNOWN_DIGEST);
|
2020-10-06 23:02:43 +08:00
|
|
|
return md;
|
|
|
|
}
|
|
|
|
|
2021-03-09 07:48:16 +08:00
|
|
|
X509_ALGOR *ossl_x509_algor_mgf1_decode(X509_ALGOR *alg)
|
2020-10-06 23:02:43 +08:00
|
|
|
{
|
|
|
|
if (OBJ_obj2nid(alg->algorithm) != NID_mgf1)
|
|
|
|
return NULL;
|
|
|
|
return ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(X509_ALGOR),
|
|
|
|
alg->parameter);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Allocate and set MGF1 algorithm ID from EVP_MD */
|
2021-03-09 07:48:16 +08:00
|
|
|
int ossl_x509_algor_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md)
|
2020-10-06 23:02:43 +08:00
|
|
|
{
|
|
|
|
X509_ALGOR *algtmp = NULL;
|
|
|
|
ASN1_STRING *stmp = NULL;
|
|
|
|
|
|
|
|
*palg = NULL;
|
|
|
|
if (mgf1md == NULL || EVP_MD_is_a(mgf1md, "SHA1"))
|
|
|
|
return 1;
|
|
|
|
/* need to embed algorithm ID inside another */
|
2021-03-09 07:48:16 +08:00
|
|
|
if (!ossl_x509_algor_new_from_md(&algtmp, mgf1md))
|
2020-10-06 23:02:43 +08:00
|
|
|
goto err;
|
|
|
|
if (ASN1_item_pack(algtmp, ASN1_ITEM_rptr(X509_ALGOR), &stmp) == NULL)
|
|
|
|
goto err;
|
2021-08-06 18:11:13 +08:00
|
|
|
*palg = ossl_X509_ALGOR_from_nid(NID_mgf1, V_ASN1_SEQUENCE, stmp);
|
2020-10-06 23:02:43 +08:00
|
|
|
if (*palg == NULL)
|
|
|
|
goto err;
|
|
|
|
stmp = NULL;
|
|
|
|
err:
|
|
|
|
ASN1_STRING_free(stmp);
|
|
|
|
X509_ALGOR_free(algtmp);
|
2021-08-06 18:11:13 +08:00
|
|
|
return *palg != NULL;
|
2020-10-06 23:02:43 +08:00
|
|
|
}
|