2017-01-11 21:38:44 +00:00
|
|
|
/*
|
2018-03-20 13:00:17 +00:00
|
|
|
* Copyright 2007-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2017-01-11 21:38:44 +00:00
|
|
|
*
|
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "internal/cryptlib.h"
|
|
|
|
#include <openssl/evp.h>
|
2019-09-27 21:57:58 +00:00
|
|
|
#include "crypto/asn1.h"
|
|
|
|
#include "crypto/siphash.h"
|
2017-01-11 21:38:44 +00:00
|
|
|
#include "siphash_local.h"
|
2019-09-27 21:57:58 +00:00
|
|
|
#include "crypto/evp.h"
|
2017-01-11 21:38:44 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* SIPHASH "ASN1" method. This is just here to indicate the maximum
|
|
|
|
* SIPHASH output length and to free up a SIPHASH key.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int siphash_size(const EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
return SIPHASH_MAX_DIGEST_SIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void siphash_key_free(EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
ASN1_OCTET_STRING *os = EVP_PKEY_get0(pkey);
|
|
|
|
|
|
|
|
if (os != NULL) {
|
|
|
|
if (os->data != NULL)
|
|
|
|
OPENSSL_cleanse(os->data, os->length);
|
|
|
|
ASN1_OCTET_STRING_free(os);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int siphash_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
|
|
|
|
{
|
|
|
|
/* nothing (including ASN1_PKEY_CTRL_DEFAULT_MD_NID), is supported */
|
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int siphash_pkey_public_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
|
|
|
|
{
|
|
|
|
return ASN1_OCTET_STRING_cmp(EVP_PKEY_get0(a), EVP_PKEY_get0(b));
|
|
|
|
}
|
|
|
|
|
2018-03-05 16:17:24 +00:00
|
|
|
static int siphash_set_priv_key(EVP_PKEY *pkey, const unsigned char *priv,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
ASN1_OCTET_STRING *os;
|
|
|
|
|
|
|
|
if (pkey->pkey.ptr != NULL || len != SIPHASH_KEY_SIZE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
os = ASN1_OCTET_STRING_new();
|
|
|
|
if (os == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!ASN1_OCTET_STRING_set(os, priv, len)) {
|
|
|
|
ASN1_OCTET_STRING_free(os);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
pkey->pkey.ptr = os;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-06-01 11:22:28 +00:00
|
|
|
static int siphash_get_priv_key(const EVP_PKEY *pkey, unsigned char *priv,
|
|
|
|
size_t *len)
|
|
|
|
{
|
|
|
|
ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey.ptr;
|
|
|
|
|
|
|
|
if (priv == NULL) {
|
|
|
|
*len = SIPHASH_KEY_SIZE;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (os == NULL || *len < SIPHASH_KEY_SIZE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
memcpy(priv, ASN1_STRING_get0_data(os), ASN1_STRING_length(os));
|
|
|
|
*len = SIPHASH_KEY_SIZE;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-11 21:38:44 +00:00
|
|
|
const EVP_PKEY_ASN1_METHOD siphash_asn1_meth = {
|
|
|
|
EVP_PKEY_SIPHASH,
|
|
|
|
EVP_PKEY_SIPHASH,
|
|
|
|
0,
|
|
|
|
|
|
|
|
"SIPHASH",
|
|
|
|
"OpenSSL SIPHASH method",
|
|
|
|
|
|
|
|
0, 0, siphash_pkey_public_cmp, 0,
|
|
|
|
|
|
|
|
0, 0, 0,
|
|
|
|
|
|
|
|
siphash_size,
|
|
|
|
0, 0,
|
|
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
|
|
|
|
|
|
siphash_key_free,
|
|
|
|
siphash_pkey_ctrl,
|
2018-03-05 16:17:24 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
|
|
|
|
siphash_set_priv_key,
|
|
|
|
NULL,
|
2018-06-01 11:22:28 +00:00
|
|
|
siphash_get_priv_key,
|
|
|
|
NULL,
|
2017-01-11 21:38:44 +00:00
|
|
|
};
|