0d124b0a51
Only applies to algorithms that support it. Both raw private and public keys can be obtained for X25519, Ed25519, X448, Ed448. Raw private keys only can be obtained for HMAC, Poly1305 and SipHash Fixes #6259 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/6394)
122 lines
2.6 KiB
C
122 lines
2.6 KiB
C
/*
|
|
* Copyright 2007-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include "internal/cryptlib.h"
|
|
#include <openssl/evp.h>
|
|
#include "internal/asn1_int.h"
|
|
#include "internal/poly1305.h"
|
|
#include "poly1305_local.h"
|
|
#include "internal/evp_int.h"
|
|
|
|
/*
|
|
* POLY1305 "ASN1" method. This is just here to indicate the maximum
|
|
* POLY1305 output length and to free up a POLY1305 key.
|
|
*/
|
|
|
|
static int poly1305_size(const EVP_PKEY *pkey)
|
|
{
|
|
return POLY1305_DIGEST_SIZE;
|
|
}
|
|
|
|
static void poly1305_key_free(EVP_PKEY *pkey)
|
|
{
|
|
ASN1_OCTET_STRING *os = EVP_PKEY_get0(pkey);
|
|
if (os != NULL) {
|
|
if (os->data != NULL)
|
|
OPENSSL_cleanse(os->data, os->length);
|
|
ASN1_OCTET_STRING_free(os);
|
|
}
|
|
}
|
|
|
|
static int poly1305_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
|
|
{
|
|
/* nothing, (including ASN1_PKEY_CTRL_DEFAULT_MD_NID), is supported */
|
|
return -2;
|
|
}
|
|
|
|
static int poly1305_pkey_public_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
|
|
{
|
|
return ASN1_OCTET_STRING_cmp(EVP_PKEY_get0(a), EVP_PKEY_get0(b));
|
|
}
|
|
|
|
static int poly1305_set_priv_key(EVP_PKEY *pkey, const unsigned char *priv,
|
|
size_t len)
|
|
{
|
|
ASN1_OCTET_STRING *os;
|
|
|
|
if (pkey->pkey.ptr != NULL || len != POLY1305_KEY_SIZE)
|
|
return 0;
|
|
|
|
os = ASN1_OCTET_STRING_new();
|
|
if (os == NULL)
|
|
return 0;
|
|
|
|
if (!ASN1_OCTET_STRING_set(os, priv, len)) {
|
|
ASN1_OCTET_STRING_free(os);
|
|
return 0;
|
|
}
|
|
|
|
pkey->pkey.ptr = os;
|
|
return 1;
|
|
}
|
|
|
|
static int poly1305_get_priv_key(const EVP_PKEY *pkey, unsigned char *priv,
|
|
size_t *len)
|
|
{
|
|
ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey.ptr;
|
|
|
|
if (priv == NULL) {
|
|
*len = POLY1305_KEY_SIZE;
|
|
return 1;
|
|
}
|
|
|
|
if (os == NULL || *len < POLY1305_KEY_SIZE)
|
|
return 0;
|
|
|
|
memcpy(priv, ASN1_STRING_get0_data(os), ASN1_STRING_length(os));
|
|
*len = POLY1305_KEY_SIZE;
|
|
|
|
return 1;
|
|
}
|
|
|
|
const EVP_PKEY_ASN1_METHOD poly1305_asn1_meth = {
|
|
EVP_PKEY_POLY1305,
|
|
EVP_PKEY_POLY1305,
|
|
0,
|
|
|
|
"POLY1305",
|
|
"OpenSSL POLY1305 method",
|
|
|
|
0, 0, poly1305_pkey_public_cmp, 0,
|
|
|
|
0, 0, 0,
|
|
|
|
poly1305_size,
|
|
0, 0,
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
|
|
poly1305_key_free,
|
|
poly1305_pkey_ctrl,
|
|
NULL,
|
|
NULL,
|
|
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
|
|
poly1305_set_priv_key,
|
|
NULL,
|
|
poly1305_get_priv_key,
|
|
NULL,
|
|
};
|