mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
87e4e9c473
Almost all were notes about wanting to deprecate CTRLs/utility functions. Fixes #15325 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/15328)
301 lines
8.0 KiB
C
301 lines
8.0 KiB
C
/*
|
|
* Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
#include <openssl/core_names.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/ec.h>
|
|
#include "crypto/evp.h"
|
|
#include "crypto/ec.h"
|
|
|
|
/*
|
|
* This file is meant to contain functions to provide EVP_PKEY support for EC
|
|
* keys.
|
|
*/
|
|
|
|
static ossl_inline
|
|
int evp_pkey_ctx_getset_ecdh_param_checks(const EVP_PKEY_CTX *ctx)
|
|
{
|
|
if (ctx == NULL || !EVP_PKEY_CTX_IS_DERIVE_OP(ctx)) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
/* Uses the same return values as EVP_PKEY_CTX_ctrl */
|
|
return -2;
|
|
}
|
|
|
|
/* If key type not EC return error */
|
|
if (evp_pkey_ctx_is_legacy(ctx)
|
|
&& ctx->pmeth != NULL && ctx->pmeth->pkey_id != EVP_PKEY_EC)
|
|
return -1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int EVP_PKEY_CTX_set_ecdh_cofactor_mode(EVP_PKEY_CTX *ctx, int cofactor_mode)
|
|
{
|
|
int ret;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
/*
|
|
* Valid input values are:
|
|
* * 0 for disable
|
|
* * 1 for enable
|
|
* * -1 for reset to default for associated priv key
|
|
*/
|
|
if (cofactor_mode < -1 || cofactor_mode > 1) {
|
|
/* Uses the same return value of pkey_ec_ctrl() */
|
|
return -2;
|
|
}
|
|
|
|
*p++ = OSSL_PARAM_construct_int(OSSL_EXCHANGE_PARAM_EC_ECDH_COFACTOR_MODE,
|
|
&cofactor_mode);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_set_params_strict(ctx, params);
|
|
if (ret == -2)
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_CTX_get_ecdh_cofactor_mode(EVP_PKEY_CTX *ctx)
|
|
{
|
|
int ret, mode;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
*p++ = OSSL_PARAM_construct_int(OSSL_EXCHANGE_PARAM_EC_ECDH_COFACTOR_MODE,
|
|
&mode);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_get_params_strict(ctx, params);
|
|
|
|
switch (ret) {
|
|
case -2:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
break;
|
|
case 1:
|
|
ret = mode;
|
|
if (mode < 0 || mode > 1) {
|
|
/*
|
|
* The provider should return either 0 or 1, any other value is a
|
|
* provider error.
|
|
*/
|
|
ret = -1;
|
|
}
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
*/
|
|
int EVP_PKEY_CTX_set_ecdh_kdf_type(EVP_PKEY_CTX *ctx, int kdf)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_DERIVE,
|
|
EVP_PKEY_CTRL_EC_KDF_TYPE, kdf, NULL);
|
|
}
|
|
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
*/
|
|
int EVP_PKEY_CTX_get_ecdh_kdf_type(EVP_PKEY_CTX *ctx)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_DERIVE,
|
|
EVP_PKEY_CTRL_EC_KDF_TYPE, -2, NULL);
|
|
}
|
|
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
*/
|
|
int EVP_PKEY_CTX_set_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_DERIVE,
|
|
EVP_PKEY_CTRL_EC_KDF_MD, 0, (void *)(md));
|
|
}
|
|
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
*/
|
|
int EVP_PKEY_CTX_get_ecdh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **pmd)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_DERIVE,
|
|
EVP_PKEY_CTRL_GET_EC_KDF_MD, 0, (void *)(pmd));
|
|
}
|
|
|
|
int EVP_PKEY_CTX_set_ecdh_kdf_outlen(EVP_PKEY_CTX *ctx, int outlen)
|
|
{
|
|
int ret;
|
|
size_t len = outlen;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
if (outlen <= 0) {
|
|
/*
|
|
* This would ideally be -1 or 0, but we have to retain compatibility
|
|
* with legacy behaviour of EVP_PKEY_CTX_ctrl() which returned -2 if
|
|
* in <= 0
|
|
*/
|
|
return -2;
|
|
}
|
|
|
|
*p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
|
|
&len);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_set_params_strict(ctx, params);
|
|
if (ret == -2)
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_CTX_get_ecdh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen)
|
|
{
|
|
size_t len = UINT_MAX;
|
|
int ret;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
*p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
|
|
&len);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_get_params_strict(ctx, params);
|
|
|
|
switch (ret) {
|
|
case -2:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
break;
|
|
case 1:
|
|
if (len <= INT_MAX)
|
|
*plen = (int)len;
|
|
else
|
|
ret = -1;
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len)
|
|
{
|
|
int ret;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
*p++ = OSSL_PARAM_construct_octet_string(OSSL_EXCHANGE_PARAM_KDF_UKM,
|
|
/*
|
|
* Cast away the const. This is read
|
|
* only so should be safe
|
|
*/
|
|
(void *)ukm,
|
|
(size_t)len);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_set_params_strict(ctx, params);
|
|
|
|
switch (ret) {
|
|
case -2:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
break;
|
|
case 1:
|
|
OPENSSL_free(ukm);
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifndef OPENSSL_NO_DEPRECATED_3_0
|
|
int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **pukm)
|
|
{
|
|
size_t ukmlen;
|
|
int ret;
|
|
OSSL_PARAM params[2], *p = params;
|
|
|
|
ret = evp_pkey_ctx_getset_ecdh_param_checks(ctx);
|
|
if (ret != 1)
|
|
return ret;
|
|
|
|
*p++ = OSSL_PARAM_construct_octet_ptr(OSSL_EXCHANGE_PARAM_KDF_UKM,
|
|
(void **)pukm, 0);
|
|
*p++ = OSSL_PARAM_construct_end();
|
|
|
|
ret = evp_pkey_ctx_get_params_strict(ctx, params);
|
|
|
|
switch (ret) {
|
|
case -2:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
|
|
break;
|
|
case 1:
|
|
ret = -1;
|
|
ukmlen = params[0].return_size;
|
|
if (ukmlen <= INT_MAX)
|
|
ret = (int)ukmlen;
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
#ifndef FIPS_MODULE
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
* ASN1_OBJECT (which would be converted to text internally)?
|
|
*/
|
|
int EVP_PKEY_CTX_set_ec_paramgen_curve_nid(EVP_PKEY_CTX *ctx, int nid)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_TYPE_GEN,
|
|
EVP_PKEY_CTRL_EC_PARAMGEN_CURVE_NID,
|
|
nid, NULL);
|
|
}
|
|
|
|
/*
|
|
* This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
|
|
* simply because that's easier.
|
|
*/
|
|
int EVP_PKEY_CTX_set_ec_param_enc(EVP_PKEY_CTX *ctx, int param_enc)
|
|
{
|
|
return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_TYPE_GEN,
|
|
EVP_PKEY_CTRL_EC_PARAM_ENC, param_enc, NULL);
|
|
}
|
|
#endif
|