xref: /openbsd-src/lib/libcrypto/dsa/dsa_lib.c (revision 343440858843cd33391cc2ad14b690061a1aa615)
1*34344085Stb /* $OpenBSD: dsa_lib.c,v 1.48 2024/03/27 01:49:31 tb Exp $ */
25b37fcf3Sryker /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
35b37fcf3Sryker  * All rights reserved.
45b37fcf3Sryker  *
55b37fcf3Sryker  * This package is an SSL implementation written
65b37fcf3Sryker  * by Eric Young (eay@cryptsoft.com).
75b37fcf3Sryker  * The implementation was written so as to conform with Netscapes SSL.
85b37fcf3Sryker  *
95b37fcf3Sryker  * This library is free for commercial and non-commercial use as long as
105b37fcf3Sryker  * the following conditions are aheared to.  The following conditions
115b37fcf3Sryker  * apply to all code found in this distribution, be it the RC4, RSA,
125b37fcf3Sryker  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
135b37fcf3Sryker  * included with this distribution is covered by the same copyright terms
145b37fcf3Sryker  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
155b37fcf3Sryker  *
165b37fcf3Sryker  * Copyright remains Eric Young's, and as such any Copyright notices in
175b37fcf3Sryker  * the code are not to be removed.
185b37fcf3Sryker  * If this package is used in a product, Eric Young should be given attribution
195b37fcf3Sryker  * as the author of the parts of the library used.
205b37fcf3Sryker  * This can be in the form of a textual message at program startup or
215b37fcf3Sryker  * in documentation (online or textual) provided with the package.
225b37fcf3Sryker  *
235b37fcf3Sryker  * Redistribution and use in source and binary forms, with or without
245b37fcf3Sryker  * modification, are permitted provided that the following conditions
255b37fcf3Sryker  * are met:
265b37fcf3Sryker  * 1. Redistributions of source code must retain the copyright
275b37fcf3Sryker  *    notice, this list of conditions and the following disclaimer.
285b37fcf3Sryker  * 2. Redistributions in binary form must reproduce the above copyright
295b37fcf3Sryker  *    notice, this list of conditions and the following disclaimer in the
305b37fcf3Sryker  *    documentation and/or other materials provided with the distribution.
315b37fcf3Sryker  * 3. All advertising materials mentioning features or use of this software
325b37fcf3Sryker  *    must display the following acknowledgement:
335b37fcf3Sryker  *    "This product includes cryptographic software written by
345b37fcf3Sryker  *     Eric Young (eay@cryptsoft.com)"
355b37fcf3Sryker  *    The word 'cryptographic' can be left out if the rouines from the library
365b37fcf3Sryker  *    being used are not cryptographic related :-).
375b37fcf3Sryker  * 4. If you include any Windows specific code (or a derivative thereof) from
385b37fcf3Sryker  *    the apps directory (application code) you must include an acknowledgement:
395b37fcf3Sryker  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
405b37fcf3Sryker  *
415b37fcf3Sryker  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
425b37fcf3Sryker  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
435b37fcf3Sryker  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
445b37fcf3Sryker  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
455b37fcf3Sryker  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
465b37fcf3Sryker  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
475b37fcf3Sryker  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
485b37fcf3Sryker  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
495b37fcf3Sryker  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
505b37fcf3Sryker  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
515b37fcf3Sryker  * SUCH DAMAGE.
525b37fcf3Sryker  *
535b37fcf3Sryker  * The licence and distribution terms for any publically available version or
545b37fcf3Sryker  * derivative of this code cannot be changed.  i.e. this code cannot simply be
555b37fcf3Sryker  * copied and put under another distribution licence
565b37fcf3Sryker  * [including the GNU Public Licence.]
575b37fcf3Sryker  */
585b37fcf3Sryker 
59913ec974Sbeck /* Original version from Steven Schoch <schoch@sheba.arc.nasa.gov> */
605b37fcf3Sryker 
615b37fcf3Sryker #include <stdio.h>
628cf4d6a6Sjsing 
638cf4d6a6Sjsing #include <openssl/opensslconf.h>
648cf4d6a6Sjsing 
65b6ab114eSjsing #include <openssl/asn1.h>
66913ec974Sbeck #include <openssl/bn.h>
67913ec974Sbeck #include <openssl/dsa.h>
68a7b8f3c1Sdoug #include <openssl/err.h>
69b6ab114eSjsing 
704fcf65c5Sdjm #ifndef OPENSSL_NO_DH
714fcf65c5Sdjm #include <openssl/dh.h>
724fcf65c5Sdjm #endif
735b37fcf3Sryker 
74a69386beStb #include "dh_local.h"
75c9675a23Stb #include "dsa_local.h"
76a69386beStb 
77da347917Sbeck static const DSA_METHOD *default_DSA_method = NULL;
78ba5406e9Sbeck 
79e85b1b81Smiod void
DSA_set_default_method(const DSA_METHOD * meth)80e85b1b81Smiod DSA_set_default_method(const DSA_METHOD *meth)
81ba5406e9Sbeck {
82ba5406e9Sbeck 	default_DSA_method = meth;
83ba5406e9Sbeck }
8481dbdadeSbeck LCRYPTO_ALIAS(DSA_set_default_method);
85ba5406e9Sbeck 
86e85b1b81Smiod const DSA_METHOD *
DSA_get_default_method(void)87e85b1b81Smiod DSA_get_default_method(void)
88ba5406e9Sbeck {
89da347917Sbeck 	if (!default_DSA_method)
90da347917Sbeck 		default_DSA_method = DSA_OpenSSL();
91ba5406e9Sbeck 	return default_DSA_method;
92ba5406e9Sbeck }
9381dbdadeSbeck LCRYPTO_ALIAS(DSA_get_default_method);
94ba5406e9Sbeck 
95e85b1b81Smiod DSA *
DSA_new(void)96e85b1b81Smiod DSA_new(void)
975b37fcf3Sryker {
98ba5406e9Sbeck 	return DSA_new_method(NULL);
99ba5406e9Sbeck }
10081dbdadeSbeck LCRYPTO_ALIAS(DSA_new);
101ba5406e9Sbeck 
102e85b1b81Smiod int
DSA_set_method(DSA * dsa,const DSA_METHOD * meth)103e85b1b81Smiod DSA_set_method(DSA *dsa, const DSA_METHOD *meth)
104ba5406e9Sbeck {
105e85b1b81Smiod 	/*
106e85b1b81Smiod 	 * NB: The caller is specifically setting a method, so it's not up to us
107e85b1b81Smiod 	 * to deal with which ENGINE it comes from.
108e85b1b81Smiod 	 */
109da347917Sbeck 	const DSA_METHOD *mtmp;
110ba5406e9Sbeck 	mtmp = dsa->meth;
111e85b1b81Smiod 	if (mtmp->finish)
112e85b1b81Smiod 		mtmp->finish(dsa);
113ba5406e9Sbeck 	dsa->meth = meth;
114e85b1b81Smiod 	if (meth->init)
115e85b1b81Smiod 		meth->init(dsa);
116c109e398Sbeck 	return 1;
117c109e398Sbeck }
11881dbdadeSbeck LCRYPTO_ALIAS(DSA_set_method);
119c109e398Sbeck 
120e85b1b81Smiod DSA *
DSA_new_method(ENGINE * engine)121e85b1b81Smiod DSA_new_method(ENGINE *engine)
122c109e398Sbeck {
123e498bf2dStb 	DSA *dsa;
1245b37fcf3Sryker 
125e498bf2dStb 	if ((dsa = calloc(1, sizeof(DSA))) == NULL) {
1265067ae9fSbeck 		DSAerror(ERR_R_MALLOC_FAILURE);
127e498bf2dStb 		goto err;
1285b37fcf3Sryker 	}
129e498bf2dStb 
130e498bf2dStb 	dsa->meth = DSA_get_default_method();
131e498bf2dStb 	dsa->flags = dsa->meth->flags & ~DSA_FLAG_NON_FIPS_ALLOW;
132e498bf2dStb 	dsa->references = 1;
133e498bf2dStb 
134e498bf2dStb 	if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_DSA, dsa, &dsa->ex_data))
135e498bf2dStb 		goto err;
136e498bf2dStb 	if (dsa->meth->init != NULL && !dsa->meth->init(dsa))
137e498bf2dStb 		goto err;
138e498bf2dStb 
139e498bf2dStb 	return dsa;
140e498bf2dStb 
141e498bf2dStb  err:
142e498bf2dStb 	DSA_free(dsa);
143e498bf2dStb 
144c109e398Sbeck 	return NULL;
145c109e398Sbeck }
14681dbdadeSbeck LCRYPTO_ALIAS(DSA_new_method);
1475b37fcf3Sryker 
148e85b1b81Smiod void
DSA_free(DSA * dsa)149*34344085Stb DSA_free(DSA *dsa)
1505b37fcf3Sryker {
151*34344085Stb 	if (dsa == NULL)
152e85b1b81Smiod 		return;
1535b37fcf3Sryker 
154*34344085Stb 	if (CRYPTO_add(&dsa->references, -1, CRYPTO_LOCK_DSA) > 0)
155e85b1b81Smiod 		return;
1565b37fcf3Sryker 
157*34344085Stb 	if (dsa->meth != NULL && dsa->meth->finish != NULL)
158*34344085Stb 		dsa->meth->finish(dsa);
159ba5406e9Sbeck 
160*34344085Stb 	CRYPTO_free_ex_data(CRYPTO_EX_INDEX_DSA, dsa, &dsa->ex_data);
1610db957eaSmarkus 
162*34344085Stb 	BN_free(dsa->p);
163*34344085Stb 	BN_free(dsa->q);
164*34344085Stb 	BN_free(dsa->g);
165*34344085Stb 	BN_free(dsa->pub_key);
166*34344085Stb 	BN_free(dsa->priv_key);
167*34344085Stb 	BN_free(dsa->kinv);
168*34344085Stb 	BN_free(dsa->r);
169*34344085Stb 	free(dsa);
1705b37fcf3Sryker }
17181dbdadeSbeck LCRYPTO_ALIAS(DSA_free);
1725b37fcf3Sryker 
173e85b1b81Smiod int
DSA_up_ref(DSA * dsa)174*34344085Stb DSA_up_ref(DSA *dsa)
175da347917Sbeck {
176*34344085Stb 	return CRYPTO_add(&dsa->references, 1, CRYPTO_LOCK_DSA) > 1;
177da347917Sbeck }
17881dbdadeSbeck LCRYPTO_ALIAS(DSA_up_ref);
179da347917Sbeck 
180e85b1b81Smiod int
DSA_size(const DSA * dsa)181*34344085Stb DSA_size(const DSA *dsa)
1820a5d6edeSdjm {
183135ec00fStb 	DSA_SIG signature;
184135ec00fStb 	int ret = 0;
1850a5d6edeSdjm 
186*34344085Stb 	signature.r = dsa->q;
187*34344085Stb 	signature.s = dsa->q;
1880a5d6edeSdjm 
189135ec00fStb 	if ((ret = i2d_DSA_SIG(&signature, NULL)) < 0)
190135ec00fStb 		ret = 0;
191135ec00fStb 
192e85b1b81Smiod 	return ret;
1930a5d6edeSdjm }
19481dbdadeSbeck LCRYPTO_ALIAS(DSA_size);
1950a5d6edeSdjm 
196e85b1b81Smiod int
DSA_get_ex_new_index(long argl,void * argp,CRYPTO_EX_new * new_func,CRYPTO_EX_dup * dup_func,CRYPTO_EX_free * free_func)197e85b1b81Smiod DSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
198ba5406e9Sbeck     CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func)
199ba5406e9Sbeck {
200da347917Sbeck 	return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_DSA, argl, argp,
201da347917Sbeck 	    new_func, dup_func, free_func);
202ba5406e9Sbeck }
20381dbdadeSbeck LCRYPTO_ALIAS(DSA_get_ex_new_index);
204ba5406e9Sbeck 
205e85b1b81Smiod int
DSA_set_ex_data(DSA * dsa,int idx,void * arg)206*34344085Stb DSA_set_ex_data(DSA *dsa, int idx, void *arg)
207ba5406e9Sbeck {
208*34344085Stb 	return CRYPTO_set_ex_data(&dsa->ex_data, idx, arg);
209ba5406e9Sbeck }
21081dbdadeSbeck LCRYPTO_ALIAS(DSA_set_ex_data);
211ba5406e9Sbeck 
212e85b1b81Smiod void *
DSA_get_ex_data(DSA * dsa,int idx)213*34344085Stb DSA_get_ex_data(DSA *dsa, int idx)
214ba5406e9Sbeck {
215*34344085Stb 	return CRYPTO_get_ex_data(&dsa->ex_data, idx);
216ba5406e9Sbeck }
21781dbdadeSbeck LCRYPTO_ALIAS(DSA_get_ex_data);
218ba5406e9Sbeck 
219cd0827c4Stb int
DSA_security_bits(const DSA * dsa)220*34344085Stb DSA_security_bits(const DSA *dsa)
221cd0827c4Stb {
222*34344085Stb 	if (dsa->p == NULL || dsa->q == NULL)
223cd0827c4Stb 		return -1;
224cd0827c4Stb 
225*34344085Stb 	return BN_security_bits(BN_num_bits(dsa->p), BN_num_bits(dsa->q));
226cd0827c4Stb }
22781dbdadeSbeck LCRYPTO_ALIAS(DSA_security_bits);
228cd0827c4Stb 
229da347917Sbeck #ifndef OPENSSL_NO_DH
230e85b1b81Smiod DH *
DSA_dup_DH(const DSA * dsa)231*34344085Stb DSA_dup_DH(const DSA *dsa)
232913ec974Sbeck {
233e85b1b81Smiod 	/*
234e85b1b81Smiod 	 * DSA has p, q, g, optional pub_key, optional priv_key.
2355cdd308eSdjm 	 * DH has p, optional length, g, optional pub_key, optional priv_key,
2365cdd308eSdjm 	 * optional q.
237913ec974Sbeck 	 */
238*34344085Stb 	DH *dh = NULL;
239913ec974Sbeck 
240*34344085Stb 	if (dsa == NULL)
241913ec974Sbeck 		goto err;
242*34344085Stb 
243*34344085Stb 	if ((dh = DH_new()) == NULL)
244913ec974Sbeck 		goto err;
245*34344085Stb 
246*34344085Stb 	if (dsa->p != NULL) {
247*34344085Stb 		if ((dh->p = BN_dup(dsa->p)) == NULL)
2485cdd308eSdjm 			goto err;
2495cdd308eSdjm 	}
250*34344085Stb 	if (dsa->q != NULL) {
251*34344085Stb 		dh->length = BN_num_bits(dsa->q);
252*34344085Stb 		if ((dh->q = BN_dup(dsa->q)) == NULL)
253913ec974Sbeck 			goto err;
254*34344085Stb 	}
255*34344085Stb 	if (dsa->g != NULL) {
256*34344085Stb 		if ((dh->g = BN_dup(dsa->g)) == NULL)
257913ec974Sbeck 			goto err;
258*34344085Stb 	}
259*34344085Stb 	if (dsa->pub_key != NULL) {
260*34344085Stb 		if ((dh->pub_key = BN_dup(dsa->pub_key)) == NULL)
261913ec974Sbeck 			goto err;
262*34344085Stb 	}
263*34344085Stb 	if (dsa->priv_key != NULL) {
264*34344085Stb 		if ((dh->priv_key = BN_dup(dsa->priv_key)) == NULL)
265*34344085Stb 			goto err;
266*34344085Stb 	}
267913ec974Sbeck 
268*34344085Stb 	return dh;
269913ec974Sbeck 
270913ec974Sbeck  err:
271*34344085Stb 	DH_free(dh);
272913ec974Sbeck 	return NULL;
273913ec974Sbeck }
27481dbdadeSbeck LCRYPTO_ALIAS(DSA_dup_DH);
275913ec974Sbeck #endif
276f08abba0Stb 
277f08abba0Stb void
DSA_get0_pqg(const DSA * dsa,const BIGNUM ** p,const BIGNUM ** q,const BIGNUM ** g)278*34344085Stb DSA_get0_pqg(const DSA *dsa, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
279f08abba0Stb {
280f08abba0Stb 	if (p != NULL)
281*34344085Stb 		*p = dsa->p;
282f08abba0Stb 	if (q != NULL)
283*34344085Stb 		*q = dsa->q;
284f08abba0Stb 	if (g != NULL)
285*34344085Stb 		*g = dsa->g;
286f08abba0Stb }
28781dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_pqg);
288f08abba0Stb 
2895c89949fStb int
DSA_set0_pqg(DSA * dsa,BIGNUM * p,BIGNUM * q,BIGNUM * g)290*34344085Stb DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g)
2915c89949fStb {
292*34344085Stb 	if ((dsa->p == NULL && p == NULL) || (dsa->q == NULL && q == NULL) ||
293*34344085Stb 	    (dsa->g == NULL && g == NULL))
2945c89949fStb 		return 0;
2955c89949fStb 
2965c89949fStb 	if (p != NULL) {
297*34344085Stb 		BN_free(dsa->p);
298*34344085Stb 		dsa->p = p;
2995c89949fStb 	}
3005c89949fStb 	if (q != NULL) {
301*34344085Stb 		BN_free(dsa->q);
302*34344085Stb 		dsa->q = q;
3035c89949fStb 	}
3045c89949fStb 	if (g != NULL) {
305*34344085Stb 		BN_free(dsa->g);
306*34344085Stb 		dsa->g = g;
3075c89949fStb 	}
3085c89949fStb 
3095c89949fStb 	return 1;
3105c89949fStb }
31181dbdadeSbeck LCRYPTO_ALIAS(DSA_set0_pqg);
3125c89949fStb 
313f08abba0Stb void
DSA_get0_key(const DSA * dsa,const BIGNUM ** pub_key,const BIGNUM ** priv_key)314*34344085Stb DSA_get0_key(const DSA *dsa, const BIGNUM **pub_key, const BIGNUM **priv_key)
315f08abba0Stb {
316f08abba0Stb 	if (pub_key != NULL)
317*34344085Stb 		*pub_key = dsa->pub_key;
318f08abba0Stb 	if (priv_key != NULL)
319*34344085Stb 		*priv_key = dsa->priv_key;
320f08abba0Stb }
32181dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_key);
3221cdc303dStb 
3231cdc303dStb int
DSA_set0_key(DSA * dsa,BIGNUM * pub_key,BIGNUM * priv_key)324*34344085Stb DSA_set0_key(DSA *dsa, BIGNUM *pub_key, BIGNUM *priv_key)
3251cdc303dStb {
326*34344085Stb 	if (dsa->pub_key == NULL && pub_key == NULL)
3271cdc303dStb 		return 0;
3281cdc303dStb 
3291cdc303dStb 	if (pub_key != NULL) {
330*34344085Stb 		BN_free(dsa->pub_key);
331*34344085Stb 		dsa->pub_key = pub_key;
3321cdc303dStb 	}
3331cdc303dStb 	if (priv_key != NULL) {
334*34344085Stb 		BN_free(dsa->priv_key);
335*34344085Stb 		dsa->priv_key = priv_key;
3361cdc303dStb 	}
3371cdc303dStb 
3381cdc303dStb 	return 1;
3391cdc303dStb }
34081dbdadeSbeck LCRYPTO_ALIAS(DSA_set0_key);
341cee30fc5Stb 
3427b4d6ff7Stb const BIGNUM *
DSA_get0_p(const DSA * dsa)343*34344085Stb DSA_get0_p(const DSA *dsa)
3447b4d6ff7Stb {
345*34344085Stb 	return dsa->p;
3467b4d6ff7Stb }
34781dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_p);
3487b4d6ff7Stb 
3497b4d6ff7Stb const BIGNUM *
DSA_get0_q(const DSA * dsa)350*34344085Stb DSA_get0_q(const DSA *dsa)
3517b4d6ff7Stb {
352*34344085Stb 	return dsa->q;
3537b4d6ff7Stb }
35481dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_q);
3557b4d6ff7Stb 
3567b4d6ff7Stb const BIGNUM *
DSA_get0_g(const DSA * dsa)357*34344085Stb DSA_get0_g(const DSA *dsa)
3587b4d6ff7Stb {
359*34344085Stb 	return dsa->g;
3607b4d6ff7Stb }
36181dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_g);
3627b4d6ff7Stb 
3637b4d6ff7Stb const BIGNUM *
DSA_get0_pub_key(const DSA * dsa)364*34344085Stb DSA_get0_pub_key(const DSA *dsa)
3657b4d6ff7Stb {
366*34344085Stb 	return dsa->pub_key;
3677b4d6ff7Stb }
36881dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_pub_key);
3697b4d6ff7Stb 
3707b4d6ff7Stb const BIGNUM *
DSA_get0_priv_key(const DSA * dsa)371*34344085Stb DSA_get0_priv_key(const DSA *dsa)
3727b4d6ff7Stb {
373*34344085Stb 	return dsa->priv_key;
3747b4d6ff7Stb }
37581dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_priv_key);
3767b4d6ff7Stb 
377cee30fc5Stb void
DSA_clear_flags(DSA * dsa,int flags)378*34344085Stb DSA_clear_flags(DSA *dsa, int flags)
379cee30fc5Stb {
380*34344085Stb 	dsa->flags &= ~flags;
381cee30fc5Stb }
38281dbdadeSbeck LCRYPTO_ALIAS(DSA_clear_flags);
383cee30fc5Stb 
384cee30fc5Stb int
DSA_test_flags(const DSA * dsa,int flags)385*34344085Stb DSA_test_flags(const DSA *dsa, int flags)
386cee30fc5Stb {
387*34344085Stb 	return dsa->flags & flags;
388cee30fc5Stb }
38981dbdadeSbeck LCRYPTO_ALIAS(DSA_test_flags);
390cee30fc5Stb 
391cee30fc5Stb void
DSA_set_flags(DSA * dsa,int flags)392*34344085Stb DSA_set_flags(DSA *dsa, int flags)
393cee30fc5Stb {
394*34344085Stb 	dsa->flags |= flags;
395cee30fc5Stb }
39681dbdadeSbeck LCRYPTO_ALIAS(DSA_set_flags);
397871f92a6Stb 
398871f92a6Stb ENGINE *
DSA_get0_engine(DSA * dsa)399*34344085Stb DSA_get0_engine(DSA *dsa)
400871f92a6Stb {
401592331b2Stb 	return NULL;
402871f92a6Stb }
40381dbdadeSbeck LCRYPTO_ALIAS(DSA_get0_engine);
4043c1fcd29Stb 
4053c1fcd29Stb int
DSA_bits(const DSA * dsa)4063c1fcd29Stb DSA_bits(const DSA *dsa)
4073c1fcd29Stb {
4083c1fcd29Stb 	return BN_num_bits(dsa->p);
4093c1fcd29Stb }
41081dbdadeSbeck LCRYPTO_ALIAS(DSA_bits);
4113f42ce0aStb 
4123f42ce0aStb int
dsa_check_key(const DSA * dsa)4133f42ce0aStb dsa_check_key(const DSA *dsa)
4143f42ce0aStb {
4153f42ce0aStb 	int p_bits, q_bits;
4163f42ce0aStb 
4173f42ce0aStb 	if (dsa->p == NULL || dsa->q == NULL || dsa->g == NULL) {
4183f42ce0aStb 		DSAerror(DSA_R_MISSING_PARAMETERS);
4193f42ce0aStb 		return 0;
4203f42ce0aStb 	}
4213f42ce0aStb 
4223f42ce0aStb 	/* Checking that p and q are primes is expensive. Check they are odd. */
4233f42ce0aStb 	if (!BN_is_odd(dsa->p) || !BN_is_odd(dsa->q)) {
4243f42ce0aStb 		DSAerror(DSA_R_INVALID_PARAMETERS);
4253f42ce0aStb 		return 0;
4263f42ce0aStb 	}
4273f42ce0aStb 
4283f42ce0aStb 	/* FIPS 186-4: 1 < g < p. */
4293f42ce0aStb 	if (BN_cmp(dsa->g, BN_value_one()) <= 0 ||
4303f42ce0aStb 	    BN_cmp(dsa->g, dsa->p) >= 0) {
4313f42ce0aStb 		DSAerror(DSA_R_INVALID_PARAMETERS);
4323f42ce0aStb 		return 0;
4333f42ce0aStb 	}
4343f42ce0aStb 
4353f42ce0aStb 	/* We know p and g are positive. The next two checks imply q > 0. */
4363f42ce0aStb 	if (BN_is_negative(dsa->q)) {
4373f42ce0aStb 		DSAerror(DSA_R_BAD_Q_VALUE);
4383f42ce0aStb 		return 0;
4393f42ce0aStb 	}
4403f42ce0aStb 
4413f42ce0aStb 	/* FIPS 186-4 only allows three sizes for q. */
4423f42ce0aStb 	q_bits = BN_num_bits(dsa->q);
4433f42ce0aStb 	if (q_bits != 160 && q_bits != 224 && q_bits != 256) {
4443f42ce0aStb 		DSAerror(DSA_R_BAD_Q_VALUE);
4453f42ce0aStb 		return 0;
4463f42ce0aStb 	}
4473f42ce0aStb 
4483f42ce0aStb 	/*
4493f42ce0aStb 	 * XXX - FIPS 186-4 only allows 1024, 2048, and 3072 bits for p.
4503f42ce0aStb 	 * Cap the size to reduce DoS risks. Poor defaults make keys with
4513f42ce0aStb 	 * incorrect p sizes >= 512 bits common, so only enforce a weak
4523f42ce0aStb 	 * lower bound.
4533f42ce0aStb 	 */
4543f42ce0aStb 	p_bits = BN_num_bits(dsa->p);
4553f42ce0aStb 	if (p_bits > OPENSSL_DSA_MAX_MODULUS_BITS) {
4563f42ce0aStb 		DSAerror(DSA_R_MODULUS_TOO_LARGE);
4573f42ce0aStb 		return 0;
4583f42ce0aStb 	}
4593f42ce0aStb 	if (p_bits < 512) {
4603f42ce0aStb 		DSAerror(DSA_R_INVALID_PARAMETERS);
4613f42ce0aStb 		return 0;
4623f42ce0aStb 	}
4633f42ce0aStb 
4643f42ce0aStb 	/* The public key must be in the multiplicative group (mod p). */
4653f42ce0aStb 	if (dsa->pub_key != NULL) {
4663f42ce0aStb 		if (BN_cmp(dsa->pub_key, BN_value_one()) <= 0 ||
4673f42ce0aStb 		    BN_cmp(dsa->pub_key, dsa->p) >= 0) {
4683f42ce0aStb 			DSAerror(DSA_R_INVALID_PARAMETERS);
4693f42ce0aStb 			return 0;
4703f42ce0aStb 		}
4713f42ce0aStb 	}
4723f42ce0aStb 
4733f42ce0aStb 	/* The private key must be nonzero and in GF(q). */
4743f42ce0aStb 	if (dsa->priv_key != NULL) {
47554339fe5Stb 		if (BN_cmp(dsa->priv_key, BN_value_one()) < 0 ||
4763f42ce0aStb 		    BN_cmp(dsa->priv_key, dsa->q) >= 0) {
4773f42ce0aStb 			DSAerror(DSA_R_INVALID_PARAMETERS);
4783f42ce0aStb 			return 0;
4793f42ce0aStb 		}
4803f42ce0aStb 	}
4813f42ce0aStb 
4823f42ce0aStb 	return 1;
4833f42ce0aStb }
484