GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: lib/libcrypto/crypto/../../libssl/src/crypto/ec/ec_asn1.c Lines: 9 597 1.5 %
Date: 2016-12-06 Branches: 6 422 1.4 %

Line Branch Exec Source
1
/* $OpenBSD: ec_asn1.c,v 1.22 2016/03/20 16:50:29 krw Exp $ */
2
/*
3
 * Written by Nils Larsch for the OpenSSL project.
4
 */
5
/* ====================================================================
6
 * Copyright (c) 2000-2003 The OpenSSL Project.  All rights reserved.
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 *
12
 * 1. Redistributions of source code must retain the above copyright
13
 *    notice, this list of conditions and the following disclaimer.
14
 *
15
 * 2. Redistributions in binary form must reproduce the above copyright
16
 *    notice, this list of conditions and the following disclaimer in
17
 *    the documentation and/or other materials provided with the
18
 *    distribution.
19
 *
20
 * 3. All advertising materials mentioning features or use of this
21
 *    software must display the following acknowledgment:
22
 *    "This product includes software developed by the OpenSSL Project
23
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24
 *
25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26
 *    endorse or promote products derived from this software without
27
 *    prior written permission. For written permission, please contact
28
 *    licensing@OpenSSL.org.
29
 *
30
 * 5. Products derived from this software may not be called "OpenSSL"
31
 *    nor may "OpenSSL" appear in their names without prior written
32
 *    permission of the OpenSSL Project.
33
 *
34
 * 6. Redistributions of any form whatsoever must retain the following
35
 *    acknowledgment:
36
 *    "This product includes software developed by the OpenSSL Project
37
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38
 *
39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
51
 * ====================================================================
52
 *
53
 * This product includes cryptographic software written by Eric Young
54
 * (eay@cryptsoft.com).  This product includes software written by Tim
55
 * Hudson (tjh@cryptsoft.com).
56
 *
57
 */
58
59
#include <string.h>
60
61
#include <openssl/opensslconf.h>
62
63
#include "ec_lcl.h"
64
#include <openssl/err.h>
65
#include <openssl/asn1t.h>
66
#include <openssl/objects.h>
67
68
int
69
EC_GROUP_get_basis_type(const EC_GROUP * group)
70
{
71
	int i = 0;
72
73
	if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
74
	    NID_X9_62_characteristic_two_field)
75
		/* everything else is currently not supported */
76
		return 0;
77
78
	while (group->poly[i] != 0)
79
		i++;
80
81
	if (i == 4)
82
		return NID_X9_62_ppBasis;
83
	else if (i == 2)
84
		return NID_X9_62_tpBasis;
85
	else
86
		/* everything else is currently not supported */
87
		return 0;
88
}
89
#ifndef OPENSSL_NO_EC2M
90
int
91
EC_GROUP_get_trinomial_basis(const EC_GROUP * group, unsigned int *k)
92
{
93
	if (group == NULL)
94
		return 0;
95
96
	if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
97
	    NID_X9_62_characteristic_two_field
98
	    || !((group->poly[0] != 0) && (group->poly[1] != 0) && (group->poly[2] == 0))) {
99
		ECerr(EC_F_EC_GROUP_GET_TRINOMIAL_BASIS, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
100
		return 0;
101
	}
102
	if (k)
103
		*k = group->poly[1];
104
105
	return 1;
106
}
107
int
108
EC_GROUP_get_pentanomial_basis(const EC_GROUP * group, unsigned int *k1,
109
    unsigned int *k2, unsigned int *k3)
110
{
111
	if (group == NULL)
112
		return 0;
113
114
	if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
115
	    NID_X9_62_characteristic_two_field
116
	    || !((group->poly[0] != 0) && (group->poly[1] != 0) && (group->poly[2] != 0) && (group->poly[3] != 0) && (group->poly[4] == 0))) {
117
		ECerr(EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
118
		return 0;
119
	}
120
	if (k1)
121
		*k1 = group->poly[3];
122
	if (k2)
123
		*k2 = group->poly[2];
124
	if (k3)
125
		*k3 = group->poly[1];
126
127
	return 1;
128
}
129
#endif
130
131
132
/* some structures needed for the asn1 encoding */
133
typedef struct x9_62_pentanomial_st {
134
	long k1;
135
	long k2;
136
	long k3;
137
} X9_62_PENTANOMIAL;
138
139
typedef struct x9_62_characteristic_two_st {
140
	long m;
141
	ASN1_OBJECT *type;
142
	union {
143
		char *ptr;
144
		/* NID_X9_62_onBasis */
145
		ASN1_NULL *onBasis;
146
		/* NID_X9_62_tpBasis */
147
		ASN1_INTEGER *tpBasis;
148
		/* NID_X9_62_ppBasis */
149
		X9_62_PENTANOMIAL *ppBasis;
150
		/* anything else */
151
		ASN1_TYPE *other;
152
	} p;
153
} X9_62_CHARACTERISTIC_TWO;
154
155
typedef struct x9_62_fieldid_st {
156
	ASN1_OBJECT *fieldType;
157
	union {
158
		char *ptr;
159
		/* NID_X9_62_prime_field */
160
		ASN1_INTEGER *prime;
161
		/* NID_X9_62_characteristic_two_field */
162
		X9_62_CHARACTERISTIC_TWO *char_two;
163
		/* anything else */
164
		ASN1_TYPE *other;
165
	} p;
166
} X9_62_FIELDID;
167
168
typedef struct x9_62_curve_st {
169
	ASN1_OCTET_STRING *a;
170
	ASN1_OCTET_STRING *b;
171
	ASN1_BIT_STRING *seed;
172
} X9_62_CURVE;
173
174
typedef struct ec_parameters_st {
175
	long version;
176
	X9_62_FIELDID *fieldID;
177
	X9_62_CURVE *curve;
178
	ASN1_OCTET_STRING *base;
179
	ASN1_INTEGER *order;
180
	ASN1_INTEGER *cofactor;
181
} ECPARAMETERS;
182
183
struct ecpk_parameters_st {
184
	int type;
185
	union {
186
		ASN1_OBJECT *named_curve;
187
		ECPARAMETERS *parameters;
188
		ASN1_NULL *implicitlyCA;
189
	} value;
190
} /* ECPKPARAMETERS */ ;
191
192
/* SEC1 ECPrivateKey */
193
typedef struct ec_privatekey_st {
194
	long version;
195
	ASN1_OCTET_STRING *privateKey;
196
	ECPKPARAMETERS *parameters;
197
	ASN1_BIT_STRING *publicKey;
198
} EC_PRIVATEKEY;
199
200
/* the OpenSSL ASN.1 definitions */
201
static const ASN1_TEMPLATE X9_62_PENTANOMIAL_seq_tt[] = {
202
	{
203
		.flags = 0,
204
		.tag = 0,
205
		.offset = offsetof(X9_62_PENTANOMIAL, k1),
206
		.field_name = "k1",
207
		.item = &LONG_it,
208
	},
209
	{
210
		.flags = 0,
211
		.tag = 0,
212
		.offset = offsetof(X9_62_PENTANOMIAL, k2),
213
		.field_name = "k2",
214
		.item = &LONG_it,
215
	},
216
	{
217
		.flags = 0,
218
		.tag = 0,
219
		.offset = offsetof(X9_62_PENTANOMIAL, k3),
220
		.field_name = "k3",
221
		.item = &LONG_it,
222
	},
223
};
224
225
const ASN1_ITEM X9_62_PENTANOMIAL_it = {
226
	.itype = ASN1_ITYPE_SEQUENCE,
227
	.utype = V_ASN1_SEQUENCE,
228
	.templates = X9_62_PENTANOMIAL_seq_tt,
229
	.tcount = sizeof(X9_62_PENTANOMIAL_seq_tt) / sizeof(ASN1_TEMPLATE),
230
	.funcs = NULL,
231
	.size = sizeof(X9_62_PENTANOMIAL),
232
	.sname = "X9_62_PENTANOMIAL",
233
};
234
235
X9_62_PENTANOMIAL *X9_62_PENTANOMIAL_new(void);
236
void X9_62_PENTANOMIAL_free(X9_62_PENTANOMIAL *a);
237
238
X9_62_PENTANOMIAL *
239
X9_62_PENTANOMIAL_new(void)
240
{
241
	return (X9_62_PENTANOMIAL*)ASN1_item_new(&X9_62_PENTANOMIAL_it);
242
}
243
244
void
245
X9_62_PENTANOMIAL_free(X9_62_PENTANOMIAL *a)
246
{
247
	ASN1_item_free((ASN1_VALUE *)a, &X9_62_PENTANOMIAL_it);
248
}
249
250
static const ASN1_TEMPLATE char_two_def_tt = {
251
	.flags = 0,
252
	.tag = 0,
253
	.offset = offsetof(X9_62_CHARACTERISTIC_TWO, p.other),
254
	.field_name = "p.other",
255
	.item = &ASN1_ANY_it,
256
};
257
258
static const ASN1_ADB_TABLE X9_62_CHARACTERISTIC_TWO_adbtbl[] = {
259
	{
260
		.value = NID_X9_62_onBasis,
261
		.tt = {
262
			.flags = 0,
263
			.tag = 0,
264
			.offset = offsetof(X9_62_CHARACTERISTIC_TWO, p.onBasis),
265
			.field_name = "p.onBasis",
266
			.item = &ASN1_NULL_it,
267
		},
268
269
	},
270
	{
271
		.value = NID_X9_62_tpBasis,
272
		.tt = {
273
			.flags = 0,
274
			.tag = 0,
275
			.offset = offsetof(X9_62_CHARACTERISTIC_TWO, p.tpBasis),
276
			.field_name = "p.tpBasis",
277
			.item = &ASN1_INTEGER_it,
278
		},
279
280
	},
281
	{
282
		.value = NID_X9_62_ppBasis,
283
		.tt = {
284
			.flags = 0,
285
			.tag = 0,
286
			.offset = offsetof(X9_62_CHARACTERISTIC_TWO, p.ppBasis),
287
			.field_name = "p.ppBasis",
288
			.item = &X9_62_PENTANOMIAL_it,
289
		},
290
291
	},
292
};
293
294
static const ASN1_ADB X9_62_CHARACTERISTIC_TWO_adb = {
295
	.flags = 0,
296
	.offset = offsetof(X9_62_CHARACTERISTIC_TWO, type),
297
	.app_items = 0,
298
	.tbl = X9_62_CHARACTERISTIC_TWO_adbtbl,
299
	.tblcount = sizeof(X9_62_CHARACTERISTIC_TWO_adbtbl) / sizeof(ASN1_ADB_TABLE),
300
	.default_tt = &char_two_def_tt,
301
	.null_tt = NULL,
302
};
303
304
static const ASN1_TEMPLATE X9_62_CHARACTERISTIC_TWO_seq_tt[] = {
305
	{
306
		.flags = 0,
307
		.tag = 0,
308
		.offset = offsetof(X9_62_CHARACTERISTIC_TWO, m),
309
		.field_name = "m",
310
		.item = &LONG_it,
311
	},
312
	{
313
		.flags = 0,
314
		.tag = 0,
315
		.offset = offsetof(X9_62_CHARACTERISTIC_TWO, type),
316
		.field_name = "type",
317
		.item = &ASN1_OBJECT_it,
318
	},
319
	{
320
		.flags = ASN1_TFLG_ADB_OID,
321
		.tag = -1,
322
		.offset = 0,
323
		.field_name = "X9_62_CHARACTERISTIC_TWO",
324
		.item = (const ASN1_ITEM *)&X9_62_CHARACTERISTIC_TWO_adb,
325
	},
326
};
327
328
const ASN1_ITEM X9_62_CHARACTERISTIC_TWO_it = {
329
	.itype = ASN1_ITYPE_SEQUENCE,
330
	.utype = V_ASN1_SEQUENCE,
331
	.templates = X9_62_CHARACTERISTIC_TWO_seq_tt,
332
	.tcount = sizeof(X9_62_CHARACTERISTIC_TWO_seq_tt) / sizeof(ASN1_TEMPLATE),
333
	.funcs = NULL,
334
	.size = sizeof(X9_62_CHARACTERISTIC_TWO),
335
	.sname = "X9_62_CHARACTERISTIC_TWO",
336
};
337
X9_62_CHARACTERISTIC_TWO *X9_62_CHARACTERISTIC_TWO_new(void);
338
void X9_62_CHARACTERISTIC_TWO_free(X9_62_CHARACTERISTIC_TWO *a);
339
340
X9_62_CHARACTERISTIC_TWO *
341
X9_62_CHARACTERISTIC_TWO_new(void)
342
{
343
	return (X9_62_CHARACTERISTIC_TWO*)ASN1_item_new(&X9_62_CHARACTERISTIC_TWO_it);
344
}
345
346
void
347
X9_62_CHARACTERISTIC_TWO_free(X9_62_CHARACTERISTIC_TWO *a)
348
{
349
	ASN1_item_free((ASN1_VALUE *)a, &X9_62_CHARACTERISTIC_TWO_it);
350
}
351
static const ASN1_TEMPLATE fieldID_def_tt = {
352
	.flags = 0,
353
	.tag = 0,
354
	.offset = offsetof(X9_62_FIELDID, p.other),
355
	.field_name = "p.other",
356
	.item = &ASN1_ANY_it,
357
};
358
359
static const ASN1_ADB_TABLE X9_62_FIELDID_adbtbl[] = {
360
	{
361
		.value = NID_X9_62_prime_field,
362
		.tt = {
363
			.flags = 0,
364
			.tag = 0,
365
			.offset = offsetof(X9_62_FIELDID, p.prime),
366
			.field_name = "p.prime",
367
			.item = &ASN1_INTEGER_it,
368
		},
369
370
	},
371
	{
372
		.value = NID_X9_62_characteristic_two_field,
373
		.tt = {
374
			.flags = 0,
375
			.tag = 0,
376
			.offset = offsetof(X9_62_FIELDID, p.char_two),
377
			.field_name = "p.char_two",
378
			.item = &X9_62_CHARACTERISTIC_TWO_it,
379
		},
380
381
	},
382
};
383
384
static const ASN1_ADB X9_62_FIELDID_adb = {
385
	.flags = 0,
386
	.offset = offsetof(X9_62_FIELDID, fieldType),
387
	.app_items = 0,
388
	.tbl = X9_62_FIELDID_adbtbl,
389
	.tblcount = sizeof(X9_62_FIELDID_adbtbl) / sizeof(ASN1_ADB_TABLE),
390
	.default_tt = &fieldID_def_tt,
391
	.null_tt = NULL,
392
};
393
394
static const ASN1_TEMPLATE X9_62_FIELDID_seq_tt[] = {
395
	{
396
		.flags = 0,
397
		.tag = 0,
398
		.offset = offsetof(X9_62_FIELDID, fieldType),
399
		.field_name = "fieldType",
400
		.item = &ASN1_OBJECT_it,
401
	},
402
	{
403
		.flags = ASN1_TFLG_ADB_OID,
404
		.tag = -1,
405
		.offset = 0,
406
		.field_name = "X9_62_FIELDID",
407
		.item = (const ASN1_ITEM *)&X9_62_FIELDID_adb,
408
	},
409
};
410
411
const ASN1_ITEM X9_62_FIELDID_it = {
412
	.itype = ASN1_ITYPE_SEQUENCE,
413
	.utype = V_ASN1_SEQUENCE,
414
	.templates = X9_62_FIELDID_seq_tt,
415
	.tcount = sizeof(X9_62_FIELDID_seq_tt) / sizeof(ASN1_TEMPLATE),
416
	.funcs = NULL,
417
	.size = sizeof(X9_62_FIELDID),
418
	.sname = "X9_62_FIELDID",
419
};
420
421
static const ASN1_TEMPLATE X9_62_CURVE_seq_tt[] = {
422
	{
423
		.flags = 0,
424
		.tag = 0,
425
		.offset = offsetof(X9_62_CURVE, a),
426
		.field_name = "a",
427
		.item = &ASN1_OCTET_STRING_it,
428
	},
429
	{
430
		.flags = 0,
431
		.tag = 0,
432
		.offset = offsetof(X9_62_CURVE, b),
433
		.field_name = "b",
434
		.item = &ASN1_OCTET_STRING_it,
435
	},
436
	{
437
		.flags = ASN1_TFLG_OPTIONAL,
438
		.tag = 0,
439
		.offset = offsetof(X9_62_CURVE, seed),
440
		.field_name = "seed",
441
		.item = &ASN1_BIT_STRING_it,
442
	},
443
};
444
445
const ASN1_ITEM X9_62_CURVE_it = {
446
	.itype = ASN1_ITYPE_SEQUENCE,
447
	.utype = V_ASN1_SEQUENCE,
448
	.templates = X9_62_CURVE_seq_tt,
449
	.tcount = sizeof(X9_62_CURVE_seq_tt) / sizeof(ASN1_TEMPLATE),
450
	.funcs = NULL,
451
	.size = sizeof(X9_62_CURVE),
452
	.sname = "X9_62_CURVE",
453
};
454
455
static const ASN1_TEMPLATE ECPARAMETERS_seq_tt[] = {
456
	{
457
		.flags = 0,
458
		.tag = 0,
459
		.offset = offsetof(ECPARAMETERS, version),
460
		.field_name = "version",
461
		.item = &LONG_it,
462
	},
463
	{
464
		.flags = 0,
465
		.tag = 0,
466
		.offset = offsetof(ECPARAMETERS, fieldID),
467
		.field_name = "fieldID",
468
		.item = &X9_62_FIELDID_it,
469
	},
470
	{
471
		.flags = 0,
472
		.tag = 0,
473
		.offset = offsetof(ECPARAMETERS, curve),
474
		.field_name = "curve",
475
		.item = &X9_62_CURVE_it,
476
	},
477
	{
478
		.flags = 0,
479
		.tag = 0,
480
		.offset = offsetof(ECPARAMETERS, base),
481
		.field_name = "base",
482
		.item = &ASN1_OCTET_STRING_it,
483
	},
484
	{
485
		.flags = 0,
486
		.tag = 0,
487
		.offset = offsetof(ECPARAMETERS, order),
488
		.field_name = "order",
489
		.item = &ASN1_INTEGER_it,
490
	},
491
	{
492
		.flags = ASN1_TFLG_OPTIONAL,
493
		.tag = 0,
494
		.offset = offsetof(ECPARAMETERS, cofactor),
495
		.field_name = "cofactor",
496
		.item = &ASN1_INTEGER_it,
497
	},
498
};
499
500
const ASN1_ITEM ECPARAMETERS_it = {
501
	.itype = ASN1_ITYPE_SEQUENCE,
502
	.utype = V_ASN1_SEQUENCE,
503
	.templates = ECPARAMETERS_seq_tt,
504
	.tcount = sizeof(ECPARAMETERS_seq_tt) / sizeof(ASN1_TEMPLATE),
505
	.funcs = NULL,
506
	.size = sizeof(ECPARAMETERS),
507
	.sname = "ECPARAMETERS",
508
};
509
ECPARAMETERS *ECPARAMETERS_new(void);
510
void ECPARAMETERS_free(ECPARAMETERS *a);
511
512
ECPARAMETERS *
513
ECPARAMETERS_new(void)
514
{
515
	return (ECPARAMETERS*)ASN1_item_new(&ECPARAMETERS_it);
516
}
517
518
void
519
ECPARAMETERS_free(ECPARAMETERS *a)
520
{
521
	ASN1_item_free((ASN1_VALUE *)a, &ECPARAMETERS_it);
522
}
523
524
static const ASN1_TEMPLATE ECPKPARAMETERS_ch_tt[] = {
525
	{
526
		.flags = 0,
527
		.tag = 0,
528
		.offset = offsetof(ECPKPARAMETERS, value.named_curve),
529
		.field_name = "value.named_curve",
530
		.item = &ASN1_OBJECT_it,
531
	},
532
	{
533
		.flags = 0,
534
		.tag = 0,
535
		.offset = offsetof(ECPKPARAMETERS, value.parameters),
536
		.field_name = "value.parameters",
537
		.item = &ECPARAMETERS_it,
538
	},
539
	{
540
		.flags = 0,
541
		.tag = 0,
542
		.offset = offsetof(ECPKPARAMETERS, value.implicitlyCA),
543
		.field_name = "value.implicitlyCA",
544
		.item = &ASN1_NULL_it,
545
	},
546
};
547
548
const ASN1_ITEM ECPKPARAMETERS_it = {
549
	.itype = ASN1_ITYPE_CHOICE,
550
	.utype = offsetof(ECPKPARAMETERS, type),
551
	.templates = ECPKPARAMETERS_ch_tt,
552
	.tcount = sizeof(ECPKPARAMETERS_ch_tt) / sizeof(ASN1_TEMPLATE),
553
	.funcs = NULL,
554
	.size = sizeof(ECPKPARAMETERS),
555
	.sname = "ECPKPARAMETERS",
556
};
557
558
ECPKPARAMETERS *ECPKPARAMETERS_new(void);
559
void ECPKPARAMETERS_free(ECPKPARAMETERS *a);
560
ECPKPARAMETERS *d2i_ECPKPARAMETERS(ECPKPARAMETERS **a, const unsigned char **in, long len);
561
int i2d_ECPKPARAMETERS(const ECPKPARAMETERS *a, unsigned char **out);
562
563
ECPKPARAMETERS *
564
d2i_ECPKPARAMETERS(ECPKPARAMETERS **a, const unsigned char **in, long len)
565
{
566
	return (ECPKPARAMETERS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
567
	    &ECPKPARAMETERS_it);
568
}
569
570
int
571
i2d_ECPKPARAMETERS(const ECPKPARAMETERS *a, unsigned char **out)
572
{
573
	return ASN1_item_i2d((ASN1_VALUE *)a, out, &ECPKPARAMETERS_it);
574
}
575
576
ECPKPARAMETERS *
577
ECPKPARAMETERS_new(void)
578
{
579
	return (ECPKPARAMETERS *)ASN1_item_new(&ECPKPARAMETERS_it);
580
}
581
582
void
583
ECPKPARAMETERS_free(ECPKPARAMETERS *a)
584
{
585
	ASN1_item_free((ASN1_VALUE *)a, &ECPKPARAMETERS_it);
586
}
587
588
static const ASN1_TEMPLATE EC_PRIVATEKEY_seq_tt[] = {
589
	{
590
		.flags = 0,
591
		.tag = 0,
592
		.offset = offsetof(EC_PRIVATEKEY, version),
593
		.field_name = "version",
594
		.item = &LONG_it,
595
	},
596
	{
597
		.flags = 0,
598
		.tag = 0,
599
		.offset = offsetof(EC_PRIVATEKEY, privateKey),
600
		.field_name = "privateKey",
601
		.item = &ASN1_OCTET_STRING_it,
602
	},
603
	{
604
		.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,
605
		.tag = 0,
606
		.offset = offsetof(EC_PRIVATEKEY, parameters),
607
		.field_name = "parameters",
608
		.item = &ECPKPARAMETERS_it,
609
	},
610
	{
611
		.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,
612
		.tag = 1,
613
		.offset = offsetof(EC_PRIVATEKEY, publicKey),
614
		.field_name = "publicKey",
615
		.item = &ASN1_BIT_STRING_it,
616
	},
617
};
618
619
const ASN1_ITEM EC_PRIVATEKEY_it = {
620
	.itype = ASN1_ITYPE_SEQUENCE,
621
	.utype = V_ASN1_SEQUENCE,
622
	.templates = EC_PRIVATEKEY_seq_tt,
623
	.tcount = sizeof(EC_PRIVATEKEY_seq_tt) / sizeof(ASN1_TEMPLATE),
624
	.funcs = NULL,
625
	.size = sizeof(EC_PRIVATEKEY),
626
	.sname = "EC_PRIVATEKEY",
627
};
628
629
EC_PRIVATEKEY *EC_PRIVATEKEY_new(void);
630
void EC_PRIVATEKEY_free(EC_PRIVATEKEY *a);
631
EC_PRIVATEKEY *d2i_EC_PRIVATEKEY(EC_PRIVATEKEY **a, const unsigned char **in, long len);
632
int i2d_EC_PRIVATEKEY(const EC_PRIVATEKEY *a, unsigned char **out);
633
634
EC_PRIVATEKEY *
635
d2i_EC_PRIVATEKEY(EC_PRIVATEKEY **a, const unsigned char **in, long len)
636
{
637
	return (EC_PRIVATEKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
638
	    &EC_PRIVATEKEY_it);
639
}
640
641
int
642
i2d_EC_PRIVATEKEY(const EC_PRIVATEKEY *a, unsigned char **out)
643
{
644
	return ASN1_item_i2d((ASN1_VALUE *)a, out, &EC_PRIVATEKEY_it);
645
}
646
647
EC_PRIVATEKEY *
648
EC_PRIVATEKEY_new(void)
649
{
650
	return (EC_PRIVATEKEY *)ASN1_item_new(&EC_PRIVATEKEY_it);
651
}
652
653
void
654
EC_PRIVATEKEY_free(EC_PRIVATEKEY *a)
655
{
656
	ASN1_item_free((ASN1_VALUE *)a, &EC_PRIVATEKEY_it);
657
}
658
/* some declarations of internal function */
659
660
/* ec_asn1_group2field() sets the values in a X9_62_FIELDID object */
661
static int ec_asn1_group2fieldid(const EC_GROUP *, X9_62_FIELDID *);
662
/* ec_asn1_group2curve() sets the values in a X9_62_CURVE object */
663
static int ec_asn1_group2curve(const EC_GROUP *, X9_62_CURVE *);
664
/* ec_asn1_parameters2group() creates a EC_GROUP object from a
665
 * ECPARAMETERS object */
666
static EC_GROUP *ec_asn1_parameters2group(const ECPARAMETERS *);
667
/* ec_asn1_group2parameters() creates a ECPARAMETERS object from a
668
 * EC_GROUP object */
669
static ECPARAMETERS *ec_asn1_group2parameters(const EC_GROUP *, ECPARAMETERS *);
670
/* ec_asn1_pkparameters2group() creates a EC_GROUP object from a
671
 * ECPKPARAMETERS object */
672
static EC_GROUP *ec_asn1_pkparameters2group(const ECPKPARAMETERS *);
673
/* ec_asn1_group2pkparameters() creates a ECPKPARAMETERS object from a
674
 * EC_GROUP object */
675
static ECPKPARAMETERS *ec_asn1_group2pkparameters(const EC_GROUP *,
676
    ECPKPARAMETERS *);
677
678
679
/* the function definitions */
680
681
static int
682
ec_asn1_group2fieldid(const EC_GROUP * group, X9_62_FIELDID * field)
683
{
684
	int ok = 0, nid;
685
	BIGNUM *tmp = NULL;
686
687
	if (group == NULL || field == NULL)
688
		return 0;
689
690
	/* clear the old values (if necessary) */
691
	if (field->fieldType != NULL)
692
		ASN1_OBJECT_free(field->fieldType);
693
	if (field->p.other != NULL)
694
		ASN1_TYPE_free(field->p.other);
695
696
	nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group));
697
	/* set OID for the field */
698
	if ((field->fieldType = OBJ_nid2obj(nid)) == NULL) {
699
		ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
700
		goto err;
701
	}
702
	if (nid == NID_X9_62_prime_field) {
703
		if ((tmp = BN_new()) == NULL) {
704
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
705
			goto err;
706
		}
707
		/* the parameters are specified by the prime number p */
708
		if (!EC_GROUP_get_curve_GFp(group, tmp, NULL, NULL, NULL)) {
709
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
710
			goto err;
711
		}
712
		/* set the prime number */
713
		field->p.prime = BN_to_ASN1_INTEGER(tmp, NULL);
714
		if (field->p.prime == NULL) {
715
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB);
716
			goto err;
717
		}
718
	} else			/* nid == NID_X9_62_characteristic_two_field */
719
#ifdef OPENSSL_NO_EC2M
720
	{
721
		ECerr(EC_F_EC_ASN1_GROUP2FIELDID, EC_R_GF2M_NOT_SUPPORTED);
722
		goto err;
723
	}
724
#else
725
	{
726
		int field_type;
727
		X9_62_CHARACTERISTIC_TWO *char_two;
728
729
		field->p.char_two = X9_62_CHARACTERISTIC_TWO_new();
730
		char_two = field->p.char_two;
731
732
		if (char_two == NULL) {
733
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
734
			goto err;
735
		}
736
		char_two->m = (long) EC_GROUP_get_degree(group);
737
738
		field_type = EC_GROUP_get_basis_type(group);
739
740
		if (field_type == 0) {
741
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB);
742
			goto err;
743
		}
744
		/* set base type OID */
745
		if ((char_two->type = OBJ_nid2obj(field_type)) == NULL) {
746
			ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB);
747
			goto err;
748
		}
749
		if (field_type == NID_X9_62_tpBasis) {
750
			unsigned int k;
751
752
			if (!EC_GROUP_get_trinomial_basis(group, &k))
753
				goto err;
754
755
			char_two->p.tpBasis = ASN1_INTEGER_new();
756
			if (!char_two->p.tpBasis) {
757
				ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
758
				goto err;
759
			}
760
			if (!ASN1_INTEGER_set(char_two->p.tpBasis, (long) k)) {
761
				ECerr(EC_F_EC_ASN1_GROUP2FIELDID,
762
				    ERR_R_ASN1_LIB);
763
				goto err;
764
			}
765
		} else if (field_type == NID_X9_62_ppBasis) {
766
			unsigned int k1, k2, k3;
767
768
			if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3))
769
				goto err;
770
771
			char_two->p.ppBasis = X9_62_PENTANOMIAL_new();
772
			if (!char_two->p.ppBasis) {
773
				ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
774
				goto err;
775
			}
776
			/* set k? values */
777
			char_two->p.ppBasis->k1 = (long) k1;
778
			char_two->p.ppBasis->k2 = (long) k2;
779
			char_two->p.ppBasis->k3 = (long) k3;
780
		} else {	/* field_type == NID_X9_62_onBasis */
781
			/* for ONB the parameters are (asn1) NULL */
782
			char_two->p.onBasis = ASN1_NULL_new();
783
			if (!char_two->p.onBasis) {
784
				ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE);
785
				goto err;
786
			}
787
		}
788
	}
789
#endif
790
791
	ok = 1;
792
793
err:
794
	BN_free(tmp);
795
	return (ok);
796
}
797
798
static int
799
ec_asn1_group2curve(const EC_GROUP * group, X9_62_CURVE * curve)
800
{
801
	int ok = 0, nid;
802
	BIGNUM *tmp_1 = NULL, *tmp_2 = NULL;
803
	unsigned char *buffer_1 = NULL, *buffer_2 = NULL, *a_buf = NULL,
804
	*b_buf = NULL;
805
	size_t len_1, len_2;
806
	unsigned char char_zero = 0;
807
808
	if (!group || !curve || !curve->a || !curve->b)
809
		return 0;
810
811
	if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL) {
812
		ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
813
		goto err;
814
	}
815
	nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group));
816
817
	/* get a and b */
818
	if (nid == NID_X9_62_prime_field) {
819
		if (!EC_GROUP_get_curve_GFp(group, NULL, tmp_1, tmp_2, NULL)) {
820
			ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB);
821
			goto err;
822
		}
823
	}
824
#ifndef OPENSSL_NO_EC2M
825
	else {			/* nid == NID_X9_62_characteristic_two_field */
826
		if (!EC_GROUP_get_curve_GF2m(group, NULL, tmp_1, tmp_2, NULL)) {
827
			ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB);
828
			goto err;
829
		}
830
	}
831
#endif
832
	len_1 = (size_t) BN_num_bytes(tmp_1);
833
	len_2 = (size_t) BN_num_bytes(tmp_2);
834
835
	if (len_1 == 0) {
836
		/* len_1 == 0 => a == 0 */
837
		a_buf = &char_zero;
838
		len_1 = 1;
839
	} else {
840
		if ((buffer_1 = malloc(len_1)) == NULL) {
841
			ECerr(EC_F_EC_ASN1_GROUP2CURVE,
842
			    ERR_R_MALLOC_FAILURE);
843
			goto err;
844
		}
845
		if ((len_1 = BN_bn2bin(tmp_1, buffer_1)) == 0) {
846
			ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB);
847
			goto err;
848
		}
849
		a_buf = buffer_1;
850
	}
851
852
	if (len_2 == 0) {
853
		/* len_2 == 0 => b == 0 */
854
		b_buf = &char_zero;
855
		len_2 = 1;
856
	} else {
857
		if ((buffer_2 = malloc(len_2)) == NULL) {
858
			ECerr(EC_F_EC_ASN1_GROUP2CURVE,
859
			    ERR_R_MALLOC_FAILURE);
860
			goto err;
861
		}
862
		if ((len_2 = BN_bn2bin(tmp_2, buffer_2)) == 0) {
863
			ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB);
864
			goto err;
865
		}
866
		b_buf = buffer_2;
867
	}
868
869
	/* set a and b */
870
	if (!ASN1_STRING_set(curve->a, a_buf, len_1) ||
871
	    !ASN1_STRING_set(curve->b, b_buf, len_2)) {
872
		ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
873
		goto err;
874
	}
875
	/* set the seed (optional) */
876
	if (group->seed) {
877
		if (!curve->seed)
878
			if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) {
879
				ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE);
880
				goto err;
881
			}
882
		curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
883
		curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT;
884
		if (!ASN1_BIT_STRING_set(curve->seed, group->seed,
885
			(int) group->seed_len)) {
886
			ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB);
887
			goto err;
888
		}
889
	} else {
890
		if (curve->seed) {
891
			ASN1_BIT_STRING_free(curve->seed);
892
			curve->seed = NULL;
893
		}
894
	}
895
896
	ok = 1;
897
898
err:
899
	free(buffer_1);
900
	free(buffer_2);
901
	BN_free(tmp_1);
902
	BN_free(tmp_2);
903
	return (ok);
904
}
905
906
static ECPARAMETERS *
907
ec_asn1_group2parameters(const EC_GROUP * group, ECPARAMETERS * param)
908
{
909
	int ok = 0;
910
	size_t len = 0;
911
	ECPARAMETERS *ret = NULL;
912
	BIGNUM *tmp = NULL;
913
	unsigned char *buffer = NULL;
914
	const EC_POINT *point = NULL;
915
	point_conversion_form_t form;
916
917
	if ((tmp = BN_new()) == NULL) {
918
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE);
919
		goto err;
920
	}
921
	if (param == NULL) {
922
		if ((ret = ECPARAMETERS_new()) == NULL) {
923
			ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS,
924
			    ERR_R_MALLOC_FAILURE);
925
			goto err;
926
		}
927
	} else
928
		ret = param;
929
930
	/* set the version (always one) */
931
	ret->version = (long) 0x1;
932
933
	/* set the fieldID */
934
	if (!ec_asn1_group2fieldid(group, ret->fieldID)) {
935
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB);
936
		goto err;
937
	}
938
	/* set the curve */
939
	if (!ec_asn1_group2curve(group, ret->curve)) {
940
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB);
941
		goto err;
942
	}
943
	/* set the base point */
944
	if ((point = EC_GROUP_get0_generator(group)) == NULL) {
945
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, EC_R_UNDEFINED_GENERATOR);
946
		goto err;
947
	}
948
	form = EC_GROUP_get_point_conversion_form(group);
949
950
	len = EC_POINT_point2oct(group, point, form, NULL, len, NULL);
951
	if (len == 0) {
952
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB);
953
		goto err;
954
	}
955
	if ((buffer = malloc(len)) == NULL) {
956
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE);
957
		goto err;
958
	}
959
	if (!EC_POINT_point2oct(group, point, form, buffer, len, NULL)) {
960
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB);
961
		goto err;
962
	}
963
	if (ret->base == NULL && (ret->base = ASN1_OCTET_STRING_new()) == NULL) {
964
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE);
965
		goto err;
966
	}
967
	if (!ASN1_OCTET_STRING_set(ret->base, buffer, len)) {
968
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB);
969
		goto err;
970
	}
971
	/* set the order */
972
	if (!EC_GROUP_get_order(group, tmp, NULL)) {
973
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB);
974
		goto err;
975
	}
976
	ret->order = BN_to_ASN1_INTEGER(tmp, ret->order);
977
	if (ret->order == NULL) {
978
		ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB);
979
		goto err;
980
	}
981
	/* set the cofactor (optional) */
982
	if (EC_GROUP_get_cofactor(group, tmp, NULL)) {
983
		ret->cofactor = BN_to_ASN1_INTEGER(tmp, ret->cofactor);
984
		if (ret->cofactor == NULL) {
985
			ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB);
986
			goto err;
987
		}
988
	}
989
	ok = 1;
990
991
err:	if (!ok) {
992
		if (ret && !param)
993
			ECPARAMETERS_free(ret);
994
		ret = NULL;
995
	}
996
	BN_free(tmp);
997
	free(buffer);
998
	return (ret);
999
}
1000
1001
ECPKPARAMETERS *
1002
ec_asn1_group2pkparameters(const EC_GROUP * group, ECPKPARAMETERS * params)
1003
{
1004
	int ok = 1, tmp;
1005
	ECPKPARAMETERS *ret = params;
1006
1007
	if (ret == NULL) {
1008
		if ((ret = ECPKPARAMETERS_new()) == NULL) {
1009
			ECerr(EC_F_EC_ASN1_GROUP2PKPARAMETERS,
1010
			    ERR_R_MALLOC_FAILURE);
1011
			return NULL;
1012
		}
1013
	} else {
1014
		if (ret->type == 0 && ret->value.named_curve)
1015
			ASN1_OBJECT_free(ret->value.named_curve);
1016
		else if (ret->type == 1 && ret->value.parameters)
1017
			ECPARAMETERS_free(ret->value.parameters);
1018
	}
1019
1020
	if (EC_GROUP_get_asn1_flag(group)) {
1021
		/*
1022
		 * use the asn1 OID to describe the elliptic curve
1023
		 * parameters
1024
		 */
1025
		tmp = EC_GROUP_get_curve_name(group);
1026
		if (tmp) {
1027
			ret->type = 0;
1028
			if ((ret->value.named_curve = OBJ_nid2obj(tmp)) == NULL)
1029
				ok = 0;
1030
		} else
1031
			/* we don't kmow the nid => ERROR */
1032
			ok = 0;
1033
	} else {
1034
		/* use the ECPARAMETERS structure */
1035
		ret->type = 1;
1036
		if ((ret->value.parameters = ec_asn1_group2parameters(
1037
			    group, NULL)) == NULL)
1038
			ok = 0;
1039
	}
1040
1041
	if (!ok) {
1042
		ECPKPARAMETERS_free(ret);
1043
		return NULL;
1044
	}
1045
	return ret;
1046
}
1047
1048
static EC_GROUP *
1049
ec_asn1_parameters2group(const ECPARAMETERS * params)
1050
{
1051
	int ok = 0, tmp;
1052
	EC_GROUP *ret = NULL;
1053
	BIGNUM *p = NULL, *a = NULL, *b = NULL;
1054
	EC_POINT *point = NULL;
1055
	long field_bits;
1056
1057
	if (!params->fieldID || !params->fieldID->fieldType ||
1058
	    !params->fieldID->p.ptr) {
1059
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1060
		goto err;
1061
	}
1062
	/* now extract the curve parameters a and b */
1063
	if (!params->curve || !params->curve->a ||
1064
	    !params->curve->a->data || !params->curve->b ||
1065
	    !params->curve->b->data) {
1066
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1067
		goto err;
1068
	}
1069
	a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL);
1070
	if (a == NULL) {
1071
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_BN_LIB);
1072
		goto err;
1073
	}
1074
	b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL);
1075
	if (b == NULL) {
1076
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_BN_LIB);
1077
		goto err;
1078
	}
1079
	/* get the field parameters */
1080
	tmp = OBJ_obj2nid(params->fieldID->fieldType);
1081
	if (tmp == NID_X9_62_characteristic_two_field)
1082
#ifdef OPENSSL_NO_EC2M
1083
	{
1084
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_GF2M_NOT_SUPPORTED);
1085
		goto err;
1086
	}
1087
#else
1088
	{
1089
		X9_62_CHARACTERISTIC_TWO *char_two;
1090
1091
		char_two = params->fieldID->p.char_two;
1092
1093
		field_bits = char_two->m;
1094
		if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
1095
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_FIELD_TOO_LARGE);
1096
			goto err;
1097
		}
1098
		if ((p = BN_new()) == NULL) {
1099
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_MALLOC_FAILURE);
1100
			goto err;
1101
		}
1102
		/* get the base type */
1103
		tmp = OBJ_obj2nid(char_two->type);
1104
1105
		if (tmp == NID_X9_62_tpBasis) {
1106
			long tmp_long;
1107
1108
			if (!char_two->p.tpBasis) {
1109
				ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1110
				goto err;
1111
			}
1112
			tmp_long = ASN1_INTEGER_get(char_two->p.tpBasis);
1113
1114
			if (!(char_two->m > tmp_long && tmp_long > 0)) {
1115
				ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_TRINOMIAL_BASIS);
1116
				goto err;
1117
			}
1118
			/* create the polynomial */
1119
			if (!BN_set_bit(p, (int) char_two->m))
1120
				goto err;
1121
			if (!BN_set_bit(p, (int) tmp_long))
1122
				goto err;
1123
			if (!BN_set_bit(p, 0))
1124
				goto err;
1125
		} else if (tmp == NID_X9_62_ppBasis) {
1126
			X9_62_PENTANOMIAL *penta;
1127
1128
			penta = char_two->p.ppBasis;
1129
			if (!penta) {
1130
				ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1131
				goto err;
1132
			}
1133
			if (!(char_two->m > penta->k3 && penta->k3 > penta->k2 && penta->k2 > penta->k1 && penta->k1 > 0)) {
1134
				ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_PENTANOMIAL_BASIS);
1135
				goto err;
1136
			}
1137
			/* create the polynomial */
1138
			if (!BN_set_bit(p, (int) char_two->m))
1139
				goto err;
1140
			if (!BN_set_bit(p, (int) penta->k1))
1141
				goto err;
1142
			if (!BN_set_bit(p, (int) penta->k2))
1143
				goto err;
1144
			if (!BN_set_bit(p, (int) penta->k3))
1145
				goto err;
1146
			if (!BN_set_bit(p, 0))
1147
				goto err;
1148
		} else if (tmp == NID_X9_62_onBasis) {
1149
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_NOT_IMPLEMENTED);
1150
			goto err;
1151
		} else {	/* error */
1152
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1153
			goto err;
1154
		}
1155
1156
		/* create the EC_GROUP structure */
1157
		ret = EC_GROUP_new_curve_GF2m(p, a, b, NULL);
1158
	}
1159
#endif
1160
	else if (tmp == NID_X9_62_prime_field) {
1161
		/* we have a curve over a prime field */
1162
		/* extract the prime number */
1163
		if (!params->fieldID->p.prime) {
1164
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1165
			goto err;
1166
		}
1167
		p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL);
1168
		if (p == NULL) {
1169
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB);
1170
			goto err;
1171
		}
1172
		if (BN_is_negative(p) || BN_is_zero(p)) {
1173
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_FIELD);
1174
			goto err;
1175
		}
1176
		field_bits = BN_num_bits(p);
1177
		if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) {
1178
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_FIELD_TOO_LARGE);
1179
			goto err;
1180
		}
1181
		/* create the EC_GROUP structure */
1182
		ret = EC_GROUP_new_curve_GFp(p, a, b, NULL);
1183
	} else {
1184
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_FIELD);
1185
		goto err;
1186
	}
1187
1188
	if (ret == NULL) {
1189
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB);
1190
		goto err;
1191
	}
1192
	/* extract seed (optional) */
1193
	if (params->curve->seed != NULL) {
1194
		free(ret->seed);
1195
		if (!(ret->seed = malloc(params->curve->seed->length))) {
1196
			ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP,
1197
			    ERR_R_MALLOC_FAILURE);
1198
			goto err;
1199
		}
1200
		memcpy(ret->seed, params->curve->seed->data,
1201
		    params->curve->seed->length);
1202
		ret->seed_len = params->curve->seed->length;
1203
	}
1204
	if (!params->order || !params->base || !params->base->data) {
1205
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR);
1206
		goto err;
1207
	}
1208
	if ((point = EC_POINT_new(ret)) == NULL)
1209
		goto err;
1210
1211
	/* set the point conversion form */
1212
	EC_GROUP_set_point_conversion_form(ret, (point_conversion_form_t)
1213
	    (params->base->data[0] & ~0x01));
1214
1215
	/* extract the ec point */
1216
	if (!EC_POINT_oct2point(ret, point, params->base->data,
1217
		params->base->length, NULL)) {
1218
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB);
1219
		goto err;
1220
	}
1221
	/* extract the order */
1222
	if ((a = ASN1_INTEGER_to_BN(params->order, a)) == NULL) {
1223
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB);
1224
		goto err;
1225
	}
1226
	if (BN_is_negative(a) || BN_is_zero(a)) {
1227
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_GROUP_ORDER);
1228
		goto err;
1229
	}
1230
	if (BN_num_bits(a) > (int) field_bits + 1) {	/* Hasse bound */
1231
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_GROUP_ORDER);
1232
		goto err;
1233
	}
1234
	/* extract the cofactor (optional) */
1235
	if (params->cofactor == NULL) {
1236
		BN_free(b);
1237
		b = NULL;
1238
	} else if ((b = ASN1_INTEGER_to_BN(params->cofactor, b)) == NULL) {
1239
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB);
1240
		goto err;
1241
	}
1242
	/* set the generator, order and cofactor (if present) */
1243
	if (!EC_GROUP_set_generator(ret, point, a, b)) {
1244
		ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB);
1245
		goto err;
1246
	}
1247
	ok = 1;
1248
1249
err:	if (!ok) {
1250
		EC_GROUP_clear_free(ret);
1251
		ret = NULL;
1252
	}
1253
	BN_free(p);
1254
	BN_free(a);
1255
	BN_free(b);
1256
	EC_POINT_free(point);
1257
	return (ret);
1258
}
1259
1260
EC_GROUP *
1261
ec_asn1_pkparameters2group(const ECPKPARAMETERS * params)
1262
{
1263
	EC_GROUP *ret = NULL;
1264
	int tmp = 0;
1265
1266
	if (params == NULL) {
1267
		ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP,
1268
		    EC_R_MISSING_PARAMETERS);
1269
		return NULL;
1270
	}
1271
	if (params->type == 0) {/* the curve is given by an OID */
1272
		tmp = OBJ_obj2nid(params->value.named_curve);
1273
		if ((ret = EC_GROUP_new_by_curve_name(tmp)) == NULL) {
1274
			ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP,
1275
			    EC_R_EC_GROUP_NEW_BY_NAME_FAILURE);
1276
			return NULL;
1277
		}
1278
		EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_NAMED_CURVE);
1279
	} else if (params->type == 1) {	/* the parameters are given by a
1280
					 * ECPARAMETERS structure */
1281
		ret = ec_asn1_parameters2group(params->value.parameters);
1282
		if (!ret) {
1283
			ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, ERR_R_EC_LIB);
1284
			return NULL;
1285
		}
1286
		EC_GROUP_set_asn1_flag(ret, 0x0);
1287
	} else if (params->type == 2) {	/* implicitlyCA */
1288
		return NULL;
1289
	} else {
1290
		ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, EC_R_ASN1_ERROR);
1291
		return NULL;
1292
	}
1293
1294
	return ret;
1295
}
1296
1297
/* EC_GROUP <-> DER encoding of ECPKPARAMETERS */
1298
1299
EC_GROUP *
1300
d2i_ECPKParameters(EC_GROUP ** a, const unsigned char **in, long len)
1301
{
1302
	EC_GROUP *group = NULL;
1303
	ECPKPARAMETERS *params = NULL;
1304
1305
	if ((params = d2i_ECPKPARAMETERS(NULL, in, len)) == NULL) {
1306
		ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_D2I_ECPKPARAMETERS_FAILURE);
1307
		goto err;
1308
	}
1309
	if ((group = ec_asn1_pkparameters2group(params)) == NULL) {
1310
		ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_PKPARAMETERS2GROUP_FAILURE);
1311
		goto err;
1312
	}
1313
1314
	if (a != NULL) {
1315
		EC_GROUP_clear_free(*a);
1316
		*a = group;
1317
	}
1318
1319
err:
1320
	ECPKPARAMETERS_free(params);
1321
	return (group);
1322
}
1323
1324
int
1325
i2d_ECPKParameters(const EC_GROUP * a, unsigned char **out)
1326
{
1327
	int ret = 0;
1328
	ECPKPARAMETERS *tmp = ec_asn1_group2pkparameters(a, NULL);
1329
	if (tmp == NULL) {
1330
		ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_GROUP2PKPARAMETERS_FAILURE);
1331
		return 0;
1332
	}
1333
	if ((ret = i2d_ECPKPARAMETERS(tmp, out)) == 0) {
1334
		ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_I2D_ECPKPARAMETERS_FAILURE);
1335
		ECPKPARAMETERS_free(tmp);
1336
		return 0;
1337
	}
1338
	ECPKPARAMETERS_free(tmp);
1339
	return (ret);
1340
}
1341
1342
/* some EC_KEY functions */
1343
1344
EC_KEY *
1345
d2i_ECPrivateKey(EC_KEY ** a, const unsigned char **in, long len)
1346
{
1347
	EC_KEY *ret = NULL;
1348
	EC_PRIVATEKEY *priv_key = NULL;
1349
1350
	if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
1351
		ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
1352
		return NULL;
1353
	}
1354
	if ((priv_key = d2i_EC_PRIVATEKEY(&priv_key, in, len)) == NULL) {
1355
		ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
1356
		EC_PRIVATEKEY_free(priv_key);
1357
		return NULL;
1358
	}
1359
	if (a == NULL || *a == NULL) {
1360
		if ((ret = EC_KEY_new()) == NULL) {
1361
			ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
1362
			goto err;
1363
		}
1364
	} else
1365
		ret = *a;
1366
1367
	if (priv_key->parameters) {
1368
		EC_GROUP_clear_free(ret->group);
1369
		ret->group = ec_asn1_pkparameters2group(priv_key->parameters);
1370
	}
1371
	if (ret->group == NULL) {
1372
		ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
1373
		goto err;
1374
	}
1375
	ret->version = priv_key->version;
1376
1377
	if (priv_key->privateKey) {
1378
		ret->priv_key = BN_bin2bn(
1379
		    ASN1_STRING_data(priv_key->privateKey),
1380
		    ASN1_STRING_length(priv_key->privateKey),
1381
		    ret->priv_key);
1382
		if (ret->priv_key == NULL) {
1383
			ECerr(EC_F_D2I_ECPRIVATEKEY,
1384
			    ERR_R_BN_LIB);
1385
			goto err;
1386
		}
1387
	} else {
1388
		ECerr(EC_F_D2I_ECPRIVATEKEY,
1389
		    EC_R_MISSING_PRIVATE_KEY);
1390
		goto err;
1391
	}
1392
1393
	if (priv_key->publicKey) {
1394
		const unsigned char *pub_oct;
1395
		size_t pub_oct_len;
1396
1397
		EC_POINT_clear_free(ret->pub_key);
1398
		ret->pub_key = EC_POINT_new(ret->group);
1399
		if (ret->pub_key == NULL) {
1400
			ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
1401
			goto err;
1402
		}
1403
		pub_oct = ASN1_STRING_data(priv_key->publicKey);
1404
		pub_oct_len = ASN1_STRING_length(priv_key->publicKey);
1405
		/* save the point conversion form */
1406
		ret->conv_form = (point_conversion_form_t) (pub_oct[0] & ~0x01);
1407
		if (!EC_POINT_oct2point(ret->group, ret->pub_key,
1408
			pub_oct, pub_oct_len, NULL)) {
1409
			ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB);
1410
			goto err;
1411
		}
1412
	}
1413
1414
	EC_PRIVATEKEY_free(priv_key);
1415
	if (a != NULL)
1416
		*a = ret;
1417
	return (ret);
1418
1419
err:
1420
	if (a == NULL || *a != ret)
1421
		EC_KEY_free(ret);
1422
	if (priv_key)
1423
		EC_PRIVATEKEY_free(priv_key);
1424
1425
	return (NULL);
1426
}
1427
1428
int
1429
i2d_ECPrivateKey(EC_KEY * a, unsigned char **out)
1430
{
1431
	int ret = 0, ok = 0;
1432
	unsigned char *buffer = NULL;
1433
	size_t buf_len = 0, tmp_len;
1434
	EC_PRIVATEKEY *priv_key = NULL;
1435
1436
	if (a == NULL || a->group == NULL || a->priv_key == NULL) {
1437
		ECerr(EC_F_I2D_ECPRIVATEKEY,
1438
		    ERR_R_PASSED_NULL_PARAMETER);
1439
		goto err;
1440
	}
1441
	if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
1442
		ECerr(EC_F_I2D_ECPRIVATEKEY,
1443
		    ERR_R_MALLOC_FAILURE);
1444
		goto err;
1445
	}
1446
	priv_key->version = a->version;
1447
1448
	buf_len = (size_t) BN_num_bytes(a->priv_key);
1449
	buffer = malloc(buf_len);
1450
	if (buffer == NULL) {
1451
		ECerr(EC_F_I2D_ECPRIVATEKEY,
1452
		    ERR_R_MALLOC_FAILURE);
1453
		goto err;
1454
	}
1455
	if (!BN_bn2bin(a->priv_key, buffer)) {
1456
		ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_BN_LIB);
1457
		goto err;
1458
	}
1459
	if (!ASN1_STRING_set(priv_key->privateKey, buffer, buf_len)) {
1460
		ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_ASN1_LIB);
1461
		goto err;
1462
	}
1463
	if (!(a->enc_flag & EC_PKEY_NO_PARAMETERS)) {
1464
		if ((priv_key->parameters = ec_asn1_group2pkparameters(
1465
			    a->group, priv_key->parameters)) == NULL) {
1466
			ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
1467
			goto err;
1468
		}
1469
	}
1470
	if (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key != NULL) {
1471
		priv_key->publicKey = ASN1_BIT_STRING_new();
1472
		if (priv_key->publicKey == NULL) {
1473
			ECerr(EC_F_I2D_ECPRIVATEKEY,
1474
			    ERR_R_MALLOC_FAILURE);
1475
			goto err;
1476
		}
1477
		tmp_len = EC_POINT_point2oct(a->group, a->pub_key,
1478
		    a->conv_form, NULL, 0, NULL);
1479
1480
		if (tmp_len > buf_len) {
1481
			unsigned char *tmp_buffer = realloc(buffer, tmp_len);
1482
			if (!tmp_buffer) {
1483
				ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
1484
				goto err;
1485
			}
1486
			buffer = tmp_buffer;
1487
			buf_len = tmp_len;
1488
		}
1489
		if (!EC_POINT_point2oct(a->group, a->pub_key,
1490
			a->conv_form, buffer, buf_len, NULL)) {
1491
			ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
1492
			goto err;
1493
		}
1494
		priv_key->publicKey->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
1495
		priv_key->publicKey->flags |= ASN1_STRING_FLAG_BITS_LEFT;
1496
		if (!ASN1_STRING_set(priv_key->publicKey, buffer,
1497
			buf_len)) {
1498
			ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_ASN1_LIB);
1499
			goto err;
1500
		}
1501
	}
1502
	if ((ret = i2d_EC_PRIVATEKEY(priv_key, out)) == 0) {
1503
		ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB);
1504
		goto err;
1505
	}
1506
	ok = 1;
1507
err:
1508
	free(buffer);
1509
	if (priv_key)
1510
		EC_PRIVATEKEY_free(priv_key);
1511
	return (ok ? ret : 0);
1512
}
1513
1514
int
1515
i2d_ECParameters(EC_KEY * a, unsigned char **out)
1516
{
1517
	if (a == NULL) {
1518
		ECerr(EC_F_I2D_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
1519
		return 0;
1520
	}
1521
	return i2d_ECPKParameters(a->group, out);
1522
}
1523
1524
EC_KEY *
1525
d2i_ECParameters(EC_KEY ** a, const unsigned char **in, long len)
1526
{
1527
	EC_KEY *ret;
1528
1529
	if (in == NULL || *in == NULL) {
1530
		ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER);
1531
		return NULL;
1532
	}
1533
	if (a == NULL || *a == NULL) {
1534
		if ((ret = EC_KEY_new()) == NULL) {
1535
			ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_MALLOC_FAILURE);
1536
			return NULL;
1537
		}
1538
	} else
1539
		ret = *a;
1540
1541
	if (!d2i_ECPKParameters(&ret->group, in, len)) {
1542
		ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_EC_LIB);
1543
		if (a == NULL || *a != ret)
1544
			EC_KEY_free(ret);
1545
		return NULL;
1546
	}
1547
1548
	if (a != NULL)
1549
		*a = ret;
1550
	return ret;
1551
}
1552
1553
EC_KEY *
1554
o2i_ECPublicKey(EC_KEY ** a, const unsigned char **in, long len)
1555
2
{
1556
2
	EC_KEY *ret = NULL;
1557
1558

2
	if (a == NULL || (*a) == NULL || (*a)->group == NULL) {
1559
		/*
1560
		 * sorry, but a EC_GROUP-structur is necessary to set the
1561
		 * public key
1562
		 */
1563
		ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
1564
		return 0;
1565
	}
1566
2
	ret = *a;
1567

2
	if (ret->pub_key == NULL &&
1568
	    (ret->pub_key = EC_POINT_new(ret->group)) == NULL) {
1569
		ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_MALLOC_FAILURE);
1570
		return 0;
1571
	}
1572
2
	if (!EC_POINT_oct2point(ret->group, ret->pub_key, *in, len, NULL)) {
1573
		ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_EC_LIB);
1574
		return 0;
1575
	}
1576
	/* save the point conversion form */
1577
2
	ret->conv_form = (point_conversion_form_t) (*in[0] & ~0x01);
1578
2
	*in += len;
1579
2
	return ret;
1580
}
1581
1582
int
1583
i2o_ECPublicKey(EC_KEY * a, unsigned char **out)
1584
{
1585
	size_t buf_len = 0;
1586
	int new_buffer = 0;
1587
1588
	if (a == NULL) {
1589
		ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER);
1590
		return 0;
1591
	}
1592
	buf_len = EC_POINT_point2oct(a->group, a->pub_key,
1593
	    a->conv_form, NULL, 0, NULL);
1594
1595
	if (out == NULL || buf_len == 0)
1596
		/* out == NULL => just return the length of the octet string */
1597
		return buf_len;
1598
1599
	if (*out == NULL) {
1600
		if ((*out = malloc(buf_len)) == NULL) {
1601
			ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE);
1602
			return 0;
1603
		}
1604
		new_buffer = 1;
1605
	}
1606
	if (!EC_POINT_point2oct(a->group, a->pub_key, a->conv_form,
1607
		*out, buf_len, NULL)) {
1608
		ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB);
1609
		if (new_buffer) {
1610
			free(*out);
1611
			*out = NULL;
1612
		}
1613
		return 0;
1614
	}
1615
	if (!new_buffer)
1616
		*out += buf_len;
1617
	return buf_len;
1618
}