2 * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include <sys/types.h>
14 #include "internal/cryptlib.h"
16 #include <openssl/bn.h>
17 #include <openssl/evp.h>
18 #include <openssl/x509.h>
19 #include <openssl/objects.h>
20 #include <openssl/buffer.h>
21 #include <openssl/core_names.h>
22 #include "crypto/asn1.h"
23 #include "crypto/evp.h"
25 #ifndef OPENSSL_NO_DEPRECATED_3_0
27 int ASN1_sign(i2d_of_void
*i2d
, X509_ALGOR
*algor1
, X509_ALGOR
*algor2
,
28 ASN1_BIT_STRING
*signature
, char *data
, EVP_PKEY
*pkey
,
31 EVP_MD_CTX
*ctx
= EVP_MD_CTX_new();
32 unsigned char *p
, *buf_in
= NULL
, *buf_out
= NULL
;
33 int i
, inl
= 0, outl
= 0;
34 size_t inll
= 0, outll
= 0;
38 ERR_raise(ERR_LIB_ASN1
, ERR_R_MALLOC_FAILURE
);
41 for (i
= 0; i
< 2; i
++) {
48 if (type
->pkey_type
== NID_dsaWithSHA1
) {
50 * special case: RFC 2459 tells us to omit 'parameters' with
53 ASN1_TYPE_free(a
->parameter
);
55 } else if ((a
->parameter
== NULL
) ||
56 (a
->parameter
->type
!= V_ASN1_NULL
)) {
57 ASN1_TYPE_free(a
->parameter
);
58 if ((a
->parameter
= ASN1_TYPE_new()) == NULL
)
60 a
->parameter
->type
= V_ASN1_NULL
;
62 ASN1_OBJECT_free(a
->algorithm
);
63 a
->algorithm
= OBJ_nid2obj(type
->pkey_type
);
64 if (a
->algorithm
== NULL
) {
65 ERR_raise(ERR_LIB_ASN1
, ASN1_R_UNKNOWN_OBJECT_TYPE
);
68 if (a
->algorithm
->length
== 0) {
69 ERR_raise(ERR_LIB_ASN1
,
70 ASN1_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD
);
74 inl
= i2d(data
, NULL
);
76 ERR_raise(ERR_LIB_ASN1
, ERR_R_INTERNAL_ERROR
);
80 buf_in
= OPENSSL_malloc(inll
);
81 outll
= outl
= EVP_PKEY_size(pkey
);
82 buf_out
= OPENSSL_malloc(outll
);
83 if (buf_in
== NULL
|| buf_out
== NULL
) {
85 ERR_raise(ERR_LIB_ASN1
, ERR_R_MALLOC_FAILURE
);
91 if (!EVP_SignInit_ex(ctx
, type
, NULL
)
92 || !EVP_SignUpdate(ctx
, (unsigned char *)buf_in
, inl
)
93 || !EVP_SignFinal(ctx
, (unsigned char *)buf_out
,
94 (unsigned int *)&outl
, pkey
)) {
96 ERR_raise(ERR_LIB_ASN1
, ERR_R_EVP_LIB
);
99 OPENSSL_free(signature
->data
);
100 signature
->data
= buf_out
;
102 signature
->length
= outl
;
104 * In the interests of compatibility, I'll make sure that the bit string
105 * has a 'not-used bits' value of 0
107 signature
->flags
&= ~(ASN1_STRING_FLAG_BITS_LEFT
| 0x07);
108 signature
->flags
|= ASN1_STRING_FLAG_BITS_LEFT
;
110 EVP_MD_CTX_free(ctx
);
111 OPENSSL_clear_free((char *)buf_in
, inll
);
112 OPENSSL_clear_free((char *)buf_out
, outll
);
118 int ASN1_item_sign(const ASN1_ITEM
*it
, X509_ALGOR
*algor1
, X509_ALGOR
*algor2
,
119 ASN1_BIT_STRING
*signature
, const void *data
,
120 EVP_PKEY
*pkey
, const EVP_MD
*md
)
122 return ASN1_item_sign_ex(it
, algor1
, algor2
, signature
, data
, NULL
, pkey
,
126 int ASN1_item_sign_ex(const ASN1_ITEM
*it
, X509_ALGOR
*algor1
,
127 X509_ALGOR
*algor2
, ASN1_BIT_STRING
*signature
,
128 const void *data
, const ASN1_OCTET_STRING
*id
,
129 EVP_PKEY
*pkey
, const EVP_MD
*md
, OSSL_LIB_CTX
*libctx
,
133 EVP_MD_CTX
*ctx
= evp_md_ctx_new_ex(pkey
, id
, libctx
, propq
);
136 ERR_raise(ERR_LIB_ASN1
, ERR_R_MALLOC_FAILURE
);
139 /* We can use the non _ex variant here since the pkey is already setup */
140 if (!EVP_DigestSignInit(ctx
, NULL
, md
, NULL
, pkey
))
143 rv
= ASN1_item_sign_ctx(it
, algor1
, algor2
, signature
, data
, ctx
);
146 EVP_PKEY_CTX_free(EVP_MD_CTX_pkey_ctx(ctx
));
147 EVP_MD_CTX_free(ctx
);
151 int ASN1_item_sign_ctx(const ASN1_ITEM
*it
, X509_ALGOR
*algor1
,
152 X509_ALGOR
*algor2
, ASN1_BIT_STRING
*signature
,
153 const void *data
, EVP_MD_CTX
*ctx
)
157 unsigned char *buf_in
= NULL
, *buf_out
= NULL
;
158 size_t inl
= 0, outl
= 0, outll
= 0;
159 int signid
, paramtype
, buf_len
= 0;
162 md
= EVP_MD_CTX_md(ctx
);
163 pkey
= EVP_PKEY_CTX_get0_pkey(EVP_MD_CTX_pkey_ctx(ctx
));
166 ERR_raise(ERR_LIB_ASN1
, ASN1_R_CONTEXT_NOT_INITIALISED
);
170 if (pkey
->ameth
== NULL
) {
171 EVP_PKEY_CTX
*pctx
= EVP_MD_CTX_pkey_ctx(ctx
);
172 OSSL_PARAM params
[2];
173 unsigned char aid
[128];
177 || !EVP_PKEY_CTX_IS_SIGNATURE_OP(pctx
)) {
178 ERR_raise(ERR_LIB_ASN1
, ASN1_R_CONTEXT_NOT_INITIALISED
);
183 OSSL_PARAM_construct_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID
,
185 params
[1] = OSSL_PARAM_construct_end();
187 if (EVP_PKEY_CTX_get_params(pctx
, params
) <= 0)
190 if ((aid_len
= params
[0].return_size
) == 0) {
191 ERR_raise(ERR_LIB_ASN1
, ASN1_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED
);
195 if (algor1
!= NULL
) {
196 const unsigned char *pp
= aid
;
198 if (d2i_X509_ALGOR(&algor1
, &pp
, aid_len
) == NULL
) {
199 ERR_raise(ERR_LIB_ASN1
, ERR_R_INTERNAL_ERROR
);
204 if (algor2
!= NULL
) {
205 const unsigned char *pp
= aid
;
207 if (d2i_X509_ALGOR(&algor2
, &pp
, aid_len
) == NULL
) {
208 ERR_raise(ERR_LIB_ASN1
, ERR_R_INTERNAL_ERROR
);
214 } else if (pkey
->ameth
->item_sign
) {
215 rv
= pkey
->ameth
->item_sign(ctx
, it
, data
, algor1
, algor2
, signature
);
217 outl
= signature
->length
;
219 * Return value meanings:
221 * 1: method does everything.
222 * 2: carry on as normal.
223 * 3: ASN1 method sets algorithm identifiers: just sign.
226 ERR_raise(ERR_LIB_ASN1
, ERR_R_EVP_LIB
);
235 ERR_raise(ERR_LIB_ASN1
, ASN1_R_CONTEXT_NOT_INITIALISED
);
240 #ifndef OPENSSL_NO_SM2
241 EVP_PKEY_id(pkey
) == NID_sm2
? NID_sm2
:
243 pkey
->ameth
->pkey_id
;
245 if (!OBJ_find_sigid_by_algs(&signid
, EVP_MD_nid(md
), pkey_id
)) {
246 ERR_raise(ERR_LIB_ASN1
, ASN1_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED
);
250 if (pkey
->ameth
->pkey_flags
& ASN1_PKEY_SIGPARAM_NULL
)
251 paramtype
= V_ASN1_NULL
;
253 paramtype
= V_ASN1_UNDEF
;
256 X509_ALGOR_set0(algor1
, OBJ_nid2obj(signid
), paramtype
, NULL
);
258 X509_ALGOR_set0(algor2
, OBJ_nid2obj(signid
), paramtype
, NULL
);
262 buf_len
= ASN1_item_i2d(data
, &buf_in
, it
);
265 ERR_raise(ERR_LIB_ASN1
, ERR_R_INTERNAL_ERROR
);
269 if (!EVP_DigestSign(ctx
, NULL
, &outll
, buf_in
, inl
)) {
271 ERR_raise(ERR_LIB_ASN1
, ERR_R_EVP_LIB
);
275 buf_out
= OPENSSL_malloc(outll
);
276 if (buf_in
== NULL
|| buf_out
== NULL
) {
278 ERR_raise(ERR_LIB_ASN1
, ERR_R_MALLOC_FAILURE
);
282 if (!EVP_DigestSign(ctx
, buf_out
, &outl
, buf_in
, inl
)) {
284 ERR_raise(ERR_LIB_ASN1
, ERR_R_EVP_LIB
);
287 OPENSSL_free(signature
->data
);
288 signature
->data
= buf_out
;
290 signature
->length
= outl
;
292 * In the interests of compatibility, I'll make sure that the bit string
293 * has a 'not-used bits' value of 0
295 signature
->flags
&= ~(ASN1_STRING_FLAG_BITS_LEFT
| 0x07);
296 signature
->flags
|= ASN1_STRING_FLAG_BITS_LEFT
;
298 OPENSSL_clear_free((char *)buf_in
, inl
);
299 OPENSSL_clear_free((char *)buf_out
, outll
);