2 * Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 * DSA low level APIs are deprecated for public use, but still ok for
14 #include "internal/deprecated.h"
17 #include "internal/cryptlib.h"
18 #include <openssl/asn1t.h>
19 #include <openssl/x509.h>
20 #include <openssl/evp.h>
21 #include <openssl/bn.h>
22 #include "crypto/evp.h"
23 #include "dsa_local.h"
25 /* DSA pkey context structure */
28 /* Parameter gen parameters */
29 int nbits
; /* size of p in bits (default: 2048) */
30 int qbits
; /* size of q in bits (default: 224) */
31 const EVP_MD
*pmd
; /* MD for parameter generation */
32 /* Keygen callback info */
35 const EVP_MD
*md
; /* MD for the signature */
38 static int pkey_dsa_init(EVP_PKEY_CTX
*ctx
)
40 DSA_PKEY_CTX
*dctx
= OPENSSL_malloc(sizeof(*dctx
));
50 ctx
->keygen_info
= dctx
->gentmp
;
51 ctx
->keygen_info_count
= 2;
56 static int pkey_dsa_copy(EVP_PKEY_CTX
*dst
, const EVP_PKEY_CTX
*src
)
58 DSA_PKEY_CTX
*dctx
, *sctx
;
60 if (!pkey_dsa_init(dst
))
64 dctx
->nbits
= sctx
->nbits
;
65 dctx
->qbits
= sctx
->qbits
;
66 dctx
->pmd
= sctx
->pmd
;
71 static void pkey_dsa_cleanup(EVP_PKEY_CTX
*ctx
)
73 DSA_PKEY_CTX
*dctx
= ctx
->data
;
77 static int pkey_dsa_sign(EVP_PKEY_CTX
*ctx
, unsigned char *sig
,
78 size_t *siglen
, const unsigned char *tbs
,
83 DSA_PKEY_CTX
*dctx
= ctx
->data
;
84 DSA
*dsa
= ctx
->pkey
->pkey
.dsa
;
86 if (dctx
->md
!= NULL
&& tbslen
!= (size_t)EVP_MD_size(dctx
->md
))
89 ret
= DSA_sign(0, tbs
, tbslen
, sig
, &sltmp
, dsa
);
97 static int pkey_dsa_verify(EVP_PKEY_CTX
*ctx
,
98 const unsigned char *sig
, size_t siglen
,
99 const unsigned char *tbs
, size_t tbslen
)
102 DSA_PKEY_CTX
*dctx
= ctx
->data
;
103 DSA
*dsa
= ctx
->pkey
->pkey
.dsa
;
105 if (dctx
->md
!= NULL
&& tbslen
!= (size_t)EVP_MD_size(dctx
->md
))
108 ret
= DSA_verify(0, tbs
, tbslen
, sig
, siglen
, dsa
);
113 static int pkey_dsa_ctrl(EVP_PKEY_CTX
*ctx
, int type
, int p1
, void *p2
)
115 DSA_PKEY_CTX
*dctx
= ctx
->data
;
118 case EVP_PKEY_CTRL_DSA_PARAMGEN_BITS
:
124 case EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS
:
125 if (p1
!= 160 && p1
!= 224 && p1
&& p1
!= 256)
130 case EVP_PKEY_CTRL_DSA_PARAMGEN_MD
:
131 if (EVP_MD_type((const EVP_MD
*)p2
) != NID_sha1
&&
132 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha224
&&
133 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha256
) {
134 DSAerr(DSA_F_PKEY_DSA_CTRL
, DSA_R_INVALID_DIGEST_TYPE
);
140 case EVP_PKEY_CTRL_MD
:
141 if (EVP_MD_type((const EVP_MD
*)p2
) != NID_sha1
&&
142 EVP_MD_type((const EVP_MD
*)p2
) != NID_dsa
&&
143 EVP_MD_type((const EVP_MD
*)p2
) != NID_dsaWithSHA
&&
144 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha224
&&
145 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha256
&&
146 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha384
&&
147 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha512
&&
148 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha3_224
&&
149 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha3_256
&&
150 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha3_384
&&
151 EVP_MD_type((const EVP_MD
*)p2
) != NID_sha3_512
) {
152 DSAerr(DSA_F_PKEY_DSA_CTRL
, DSA_R_INVALID_DIGEST_TYPE
);
158 case EVP_PKEY_CTRL_GET_MD
:
159 *(const EVP_MD
**)p2
= dctx
->md
;
162 case EVP_PKEY_CTRL_DIGESTINIT
:
163 case EVP_PKEY_CTRL_PKCS7_SIGN
:
164 case EVP_PKEY_CTRL_CMS_SIGN
:
167 case EVP_PKEY_CTRL_PEER_KEY
:
168 DSAerr(DSA_F_PKEY_DSA_CTRL
,
169 EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE
);
177 static int pkey_dsa_ctrl_str(EVP_PKEY_CTX
*ctx
,
178 const char *type
, const char *value
)
180 if (strcmp(type
, "dsa_paramgen_bits") == 0) {
183 return EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx
, nbits
);
185 if (strcmp(type
, "dsa_paramgen_q_bits") == 0) {
186 int qbits
= atoi(value
);
187 return EVP_PKEY_CTX_set_dsa_paramgen_q_bits(ctx
, qbits
);
189 if (strcmp(type
, "dsa_paramgen_md") == 0) {
190 const EVP_MD
*md
= EVP_get_digestbyname(value
);
193 DSAerr(DSA_F_PKEY_DSA_CTRL_STR
, DSA_R_INVALID_DIGEST_TYPE
);
196 return EVP_PKEY_CTX_set_dsa_paramgen_md(ctx
, md
);
201 static int pkey_dsa_paramgen(EVP_PKEY_CTX
*ctx
, EVP_PKEY
*pkey
)
204 DSA_PKEY_CTX
*dctx
= ctx
->data
;
208 if (ctx
->pkey_gencb
) {
209 pcb
= BN_GENCB_new();
212 evp_pkey_set_cb_translate(pcb
, ctx
);
220 if (dctx
->md
!= NULL
)
221 ossl_ffc_set_digest(&dsa
->params
, EVP_MD_name(dctx
->md
), NULL
);
223 ret
= ossl_ffc_params_FIPS186_4_generate(NULL
, &dsa
->params
,
224 FFC_PARAM_TYPE_DSA
, dctx
->nbits
,
225 dctx
->qbits
, &res
, pcb
);
228 EVP_PKEY_assign_DSA(pkey
, dsa
);
234 static int pkey_dsa_keygen(EVP_PKEY_CTX
*ctx
, EVP_PKEY
*pkey
)
238 if (ctx
->pkey
== NULL
) {
239 DSAerr(DSA_F_PKEY_DSA_KEYGEN
, DSA_R_NO_PARAMETERS_SET
);
245 EVP_PKEY_assign_DSA(pkey
, dsa
);
246 /* Note: if error return, pkey is freed by parent routine */
247 if (!EVP_PKEY_copy_parameters(pkey
, ctx
->pkey
))
249 return DSA_generate_key(pkey
->pkey
.dsa
);
252 static const EVP_PKEY_METHOD dsa_pkey_meth
= {
254 EVP_PKEY_FLAG_AUTOARGLEN
,
285 const EVP_PKEY_METHOD
*dsa_pkey_method(void)
287 return &dsa_pkey_meth
;