1 /* $OpenBSD: cm_pmeth.c,v 1.12 2023/12/28 21:56:12 tb Exp $ */ 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project 2010. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2010 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 */ 53 54 #include <stdio.h> 55 #include <string.h> 56 57 #include <openssl/cmac.h> 58 #include <openssl/evp.h> 59 #include <openssl/x509.h> 60 #include <openssl/x509v3.h> 61 62 #include "evp_local.h" 63 64 /* The context structure and "key" is simply a CMAC_CTX */ 65 66 static int 67 pkey_cmac_init(EVP_PKEY_CTX *ctx) 68 { 69 ctx->data = CMAC_CTX_new(); 70 if (!ctx->data) 71 return 0; 72 ctx->keygen_info_count = 0; 73 return 1; 74 } 75 76 static int 77 pkey_cmac_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src) 78 { 79 if (!pkey_cmac_init(dst)) 80 return 0; 81 if (!CMAC_CTX_copy(dst->data, src->data)) 82 return 0; 83 return 1; 84 } 85 86 static void 87 pkey_cmac_cleanup(EVP_PKEY_CTX *ctx) 88 { 89 CMAC_CTX_free(ctx->data); 90 } 91 92 static int 93 pkey_cmac_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) 94 { 95 CMAC_CTX *cmkey; 96 int ret = 0; 97 98 if ((cmkey = CMAC_CTX_new()) == NULL) 99 goto err; 100 if (!CMAC_CTX_copy(cmkey, ctx->data)) 101 goto err; 102 if (!EVP_PKEY_assign(pkey, EVP_PKEY_CMAC, cmkey)) 103 goto err; 104 cmkey = NULL; 105 106 ret = 1; 107 108 err: 109 CMAC_CTX_free(cmkey); 110 111 return ret; 112 } 113 114 static int 115 int_update(EVP_MD_CTX *ctx, const void *data, size_t count) 116 { 117 if (!CMAC_Update(ctx->pctx->data, data, count)) 118 return 0; 119 return 1; 120 } 121 122 static int 123 cmac_signctx_init(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx) 124 { 125 EVP_MD_CTX_set_flags(mctx, EVP_MD_CTX_FLAG_NO_INIT); 126 mctx->update = int_update; 127 return 1; 128 } 129 130 static int 131 cmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 132 EVP_MD_CTX *mctx) 133 { 134 return CMAC_Final(ctx->data, sig, siglen); 135 } 136 137 static int 138 pkey_cmac_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) 139 { 140 CMAC_CTX *cmctx = ctx->data; 141 142 switch (type) { 143 case EVP_PKEY_CTRL_SET_MAC_KEY: 144 if (!p2 || p1 < 0) 145 return 0; 146 if (!CMAC_Init(cmctx, p2, p1, NULL, NULL)) 147 return 0; 148 break; 149 150 case EVP_PKEY_CTRL_CIPHER: 151 if (!CMAC_Init(cmctx, NULL, 0, p2, NULL)) 152 return 0; 153 break; 154 155 case EVP_PKEY_CTRL_MD: 156 if (ctx->pkey && !CMAC_CTX_copy(ctx->data, ctx->pkey->pkey.ptr)) 157 return 0; 158 if (!CMAC_Init(cmctx, NULL, 0, NULL, NULL)) 159 return 0; 160 break; 161 162 default: 163 return -2; 164 } 165 return 1; 166 } 167 168 static int 169 pkey_cmac_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value) 170 { 171 if (!value) 172 return 0; 173 if (!strcmp(type, "key")) { 174 void *p = (void *)value; 175 return pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, 176 strlen(p), p); 177 } 178 if (!strcmp(type, "cipher")) { 179 const EVP_CIPHER *c; 180 181 c = EVP_get_cipherbyname(value); 182 if (!c) 183 return 0; 184 return pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_CIPHER, -1, (void *)c); 185 } 186 if (!strcmp(type, "hexkey")) { 187 unsigned char *key; 188 int r; 189 long keylen; 190 191 key = string_to_hex(value, &keylen); 192 if (!key) 193 return 0; 194 r = pkey_cmac_ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, keylen, key); 195 free(key); 196 return r; 197 } 198 199 return -2; 200 } 201 202 const EVP_PKEY_METHOD cmac_pkey_meth = { 203 .pkey_id = EVP_PKEY_CMAC, 204 .flags = EVP_PKEY_FLAG_SIGCTX_CUSTOM, 205 206 .init = pkey_cmac_init, 207 .copy = pkey_cmac_copy, 208 .cleanup = pkey_cmac_cleanup, 209 210 .keygen = pkey_cmac_keygen, 211 212 .signctx_init = cmac_signctx_init, 213 .signctx = cmac_signctx, 214 215 .ctrl = pkey_cmac_ctrl, 216 .ctrl_str = pkey_cmac_ctrl_str 217 }; 218