mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
0941666728
I realised that any application that passes AlgorithmIdentifier parameters to and from a provider may also be interested in the full AlgorithmIdentifier of the implementation invocation. Likewise, any application that wants to get the full AlgorithmIdentifier from an implementation invocation may also want to pass AlgorithmIdentifier parameters to that same implementation invocation. These amendments should be useful to cover all intended uses of the legacy ctrls for PKCS7 and CMS: - EVP_PKEY_CTRL_PKCS7_ENCRYPT - EVP_PKEY_CTRL_PKCS7_DECRYPT - EVP_PKEY_CTRL_PKCS7_SIGN - EVP_PKEY_CTRL_CMS_ENCRYPT - EVP_PKEY_CTRL_CMS_DECRYPT - EVP_PKEY_CTRL_CMS_SIGN It should also cover a number of other cases that were previously implemented through EVP_PKEY_ASN1_METHOD, as well as all sorts of other cases where the application has had to assemble a X509_ALGOR on their own. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25000)
176 lines
7.1 KiB
Markdown
176 lines
7.1 KiB
Markdown
Handling AlgorithmIdentifier and its parameters with provider operations
|
|
========================================================================
|
|
|
|
Quick background
|
|
----------------
|
|
|
|
We currently only support passing the AlgorithmIdentifier (`X509_ALGOR`)
|
|
parameter field to symmetric cipher provider implementations. We currently
|
|
only support getting full AlgorithmIdentifier (`X509_ALGOR`) from signature
|
|
provider implementations.
|
|
|
|
We do support passing them to legacy implementations of other types of
|
|
operation algorithms as well, but it's done in a way that can't be supported
|
|
with providers, because it involves sharing specific structures between
|
|
libcrypto and the backend implementation.
|
|
|
|
For a longer background and explanation, see
|
|
[Background / tl;dr](#background-tldr) at the end of this design.
|
|
|
|
Establish OSSL_PARAM keys that any algorithms may become aware of
|
|
-----------------------------------------------------------------
|
|
|
|
We already have known parameter keys:
|
|
|
|
- "algor_id_param", also known as the macro `OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS`.
|
|
|
|
This is currently only specified for `EVP_CIPHER`, in support of
|
|
`EVP_CIPHER_param_to_asn1()` and `EVP_CIPHER_asn1_to_param()`
|
|
|
|
- "algorithm-id", also known as the macro `OSSL_SIGNATURE_PARAM_ALGORITHM_ID`.
|
|
|
|
This design proposes:
|
|
|
|
1. Adding a parameter key "algorithm-id-params", to replace "algor_id_param",
|
|
and deprecate the latter.
|
|
2. Making both "algorithm-id" and "algorithm-id-params" generically available,
|
|
rather than only tied to `EVP_SIGNATURE` ("algorithm-id") or `EVP_CIPHER`
|
|
("algor_id_param").
|
|
|
|
This way, these parameters can be used in the exact same manner with other
|
|
operations, with the value of the AlgorithmIdentifier as well as its
|
|
parameters as octet strings, to be used and interpreted by applications and
|
|
provider implementations alike in whatever way they see fit.
|
|
|
|
Applications can choose to add these in an `OSSL_PARAM` array, to be passed
|
|
with the multitude of initialization functions that take such an array, or
|
|
using specific operation `OSSL_PARAM` setters and getters (such as
|
|
`EVP_PKEY_CTX_set_params`), or using other available convenience functions
|
|
(see below).
|
|
|
|
These parameter will have to be documented in the following files:
|
|
|
|
- `doc/man7/provider-asym_cipher.pod`
|
|
- `doc/man7/provider-cipher.pod`
|
|
- `doc/man7/provider-digest.pod`
|
|
- `doc/man7/provider-kdf.pod`
|
|
- `doc/man7/provider-kem.pod`
|
|
- `doc/man7/provider-keyexch.pod`
|
|
- `doc/man7/provider-mac.pod`
|
|
- `doc/man7/provider-signature.pod`
|
|
|
|
That should cover all algorithms that are, or should be possible to fetch by
|
|
AlgorithmIdentifier.algorithm, and for which there's potentially a relevant
|
|
AlgorithmIdentifier.parameters field.
|
|
|
|
We may arguably want to consider `doc/man7/provider-keymgmt.pod` too, but
|
|
an AlgorithmIdentifier that's attached directly to a key is usually part of
|
|
a PrivKeyInfo or SubjectPublicKeyInfo structure, and those are handled by
|
|
encoders and decoders as those see fit, and there's no tangible reason why
|
|
that would have to change.
|
|
|
|
Public convenience API
|
|
----------------------
|
|
|
|
For convenience, the following set of functions would be added to pass the
|
|
AlgorithmIdentifier parameter data to diverse operations, or to retrieve
|
|
such parameter data from them.
|
|
|
|
``` C
|
|
/*
|
|
* These two would essentially be aliases for EVP_CIPHER_param_to_asn1()
|
|
* and EVP_CIPHER_asn1_to_param().
|
|
*/
|
|
EVP_CIPHER_CTX_set_algor_params(EVP_CIPHER_CTX *ctx, const X509_ALGOR *alg);
|
|
EVP_CIPHER_CTX_get_algor_params(EVP_CIPHER_CTX *ctx, X509_ALGOR *alg);
|
|
EVP_CIPHER_CTX_get_algor(EVP_CIPHER_CTX *ctx, X509_ALGOR **alg);
|
|
|
|
EVP_MD_CTX_set_algor_params(EVP_MD_CTX *ctx, const X509_ALGOR *alg);
|
|
EVP_MD_CTX_get_algor_params(EVP_MD_CTX *ctx, X509_ALGOR *alg);
|
|
EVP_MD_CTX_get_algor(EVP_MD_CTX *ctx, X509_ALGOR **alg);
|
|
|
|
EVP_MAC_CTX_set_algor_params(EVP_MAC_CTX *ctx, const X509_ALGOR *alg);
|
|
EVP_MAC_CTX_get_algor_params(EVP_MAC_CTX *ctx, X509_ALGOR *alg);
|
|
EVP_MAC_CTX_get_algor(EVP_MAC_CTX *ctx, X509_ALGOR **alg);
|
|
|
|
EVP_KDF_CTX_set_algor_params(EVP_KDF_CTX *ctx, const X509_ALGOR *alg);
|
|
EVP_KDF_CTX_get_algor_params(EVP_KDF_CTX *ctx, X509_ALGOR *alg);
|
|
EVP_KDF_CTX_get_algor(EVP_KDF_CTX *ctx, X509_ALGOR **alg);
|
|
|
|
EVP_PKEY_CTX_set_algor_params(EVP_PKEY_CTX *ctx, const X509_ALGOR *alg);
|
|
EVP_PKEY_CTX_get_algor_params(EVP_PKEY_CTX *ctx, X509_ALGOR *alg);
|
|
EVP_PKEY_CTX_get_algor(EVP_PKEY_CTX *ctx, X509_ALGOR **alg);
|
|
```
|
|
|
|
Note that all might not need to be added immediately, depending on if they
|
|
are considered useful or not. For future proofing, however, they should
|
|
probably all be added.
|
|
|
|
Requirements on the providers
|
|
-----------------------------
|
|
|
|
Providers that implement ciphers or any operation that uses asymmetric keys
|
|
will have to implement support for passing AlgorithmIdentifier parameter
|
|
data, and will have to process that data in whatever manner that's necessary
|
|
to meet the standards for that operation.
|
|
|
|
Fallback strategies
|
|
-------------------
|
|
|
|
There are no possible fallback strategies, which is fine, considering that
|
|
current provider functionality doesn't support passing AlgorithmIdentifier
|
|
parameter data at all (except for `EVP_CIPHER`), and therefore do not work
|
|
at all when such parameter data needs to be passed.
|
|
|
|
-----
|
|
|
|
-----
|
|
|
|
Background / tl;dr
|
|
------------------
|
|
|
|
### AlgorithmIdenfier parameter and how it's used
|
|
|
|
OpenSSL has historically done a few tricks to not have to pass
|
|
AlgorithmIdenfier parameter data to the backend implementations of
|
|
cryptographic operations:
|
|
|
|
- In some cases, they were passed as part of the lower level key structure
|
|
(for example, the `RSA` structure can also carry RSA-PSS parameters).
|
|
- In the `EVP_CIPHER` case, there is functionality to pass the parameter
|
|
data specifically.
|
|
- For asymmetric key operations, PKCS#7 and CMS support was added as
|
|
`EVP_PKEY` ctrls.
|
|
|
|
With providers, some of that support was retained, but not others. Most
|
|
crucially, the `EVP_PKEY` ctrls for PKCS#7 and CMS were not retained,
|
|
because the way they were implemented violated the principle that provider
|
|
implementations *MUST NOT* share complex OpenSSL specific structures with
|
|
libcrypto.
|
|
|
|
### Usage examples
|
|
|
|
Quite a lot of the available examples today revolve around CMS, with a
|
|
number of RFCs that specify what parameters should be passed with certain
|
|
operations / algorithms. This list is not exhaustive, the reader is
|
|
encouraged to research further usages.
|
|
|
|
- [DSA](https://www.rfc-editor.org/rfc/rfc3370#section-3.1) signatures
|
|
typically have the domain parameters *p*, *q* and *g*.
|
|
- [RC2 key wrap](https://www.rfc-editor.org/rfc/rfc3370#section-4.3.2)
|
|
- [PBKDF2](https://www.rfc-editor.org/rfc/rfc3370#section-4.4.1)
|
|
- [3DES-CBC](https://www.rfc-editor.org/rfc/rfc3370#section-5.1)
|
|
- [RC2-CBC](https://www.rfc-editor.org/rfc/rfc3370#section-5.2)
|
|
|
|
- [GOST 28147-89](https://www.rfc-editor.org/rfc/rfc4490.html#section-5.1)
|
|
|
|
- [RSA-OAEP](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.1)
|
|
- [RSA-PSS](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.3)
|
|
|
|
- [XOR-MD5](https://www.rfc-editor.org/rfc/rfc6210.html) is experimental,
|
|
but it does demonstrate the possibility of a parametrized hash algorithm.
|
|
|
|
Some of it can be claimed to already have support in OpenSSL. However, this
|
|
is with old libcrypto code that has special knowledge of the algorithms that
|
|
are involved.
|