/* ==================================================================== * Copyright (c) 2016 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== */ /* put these functions under name `gmapi`, even if in the future the SDF * implementation is organized into a standalone sub-library, we still need * some convert functions between native types and the SDF types. So we can * mix this with SDF engine without relying on the `sdf` sub-library * * Attension: as the functions in this file can be seen as the native * functions of GmSSL/OpenSSL, so the return values of these functions will * follow the convention of OpenSSL, return 1 for success and 0 for error. * This is different from SAF/SDF/SKF where return 0 means success. */ #include #include "internal/cryptlib.h" #if !defined(OPENSSL_NO_SDF) && !defined(OPENSSL_NO_EC) # include # include # include # include # include # include # include "../sm2/sm2_lcl.h" # include "../ecies/ecies_lcl.h" EC_KEY *EC_KEY_new_from_ECCrefPublicKey(const ECCrefPublicKey *ref) { EC_KEY *ret; if (!ref) { GMAPIerr(GMAPI_F_EC_KEY_NEW_FROM_ECCREFPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER); return NULL; } if (!(ret = EC_KEY_new_by_curve_name(NID_sm2p256v1))) { GMAPIerr(GMAPI_F_EC_KEY_NEW_FROM_ECCREFPUBLICKEY, ERR_R_EC_LIB); return NULL; } if (!EC_KEY_set_ECCrefPublicKey(ret, ref)) { GMAPIerr(GMAPI_F_EC_KEY_NEW_FROM_ECCREFPUBLICKEY, GMAPI_R_DECODE_EC_PUBLIC_KEY_FAILED); EC_KEY_free(ret); return NULL; } return ret; } int EC_KEY_set_ECCrefPublicKey(EC_KEY *ec_key, const ECCrefPublicKey *ref) { int ret = 0; BIGNUM *x = NULL; BIGNUM *y = NULL; int nbytes; /* check arguments */ if (!ec_key || !ref) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (ref->bits != EC_GROUP_get_degree(EC_KEY_get0_group(ec_key))) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPUBLICKEY, GMAPI_R_INVALID_KEY_LENGTH); return 0; } /* ECCrefPublicKey ==> EC_KEY */ nbytes = (ref->bits + 7)/8; if (!(x = BN_bin2bn(ref->x, nbytes, NULL))) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } if (!(y = BN_bin2bn(ref->y, nbytes, NULL))) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } if (!EC_KEY_set_public_key_affine_coordinates(ec_key, x, y)) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPUBLICKEY, GMAPI_R_INVALID_PUBLIC_KEY); goto end; } ret = 1; end: BN_free(x); BN_free(y); return ret; } int EC_KEY_get_ECCrefPublicKey(EC_KEY *ec_key, ECCrefPublicKey *ref) { int ret = 0; BN_CTX *bn_ctx = NULL; const EC_GROUP *group = EC_KEY_get0_group(ec_key); const EC_POINT *point = EC_KEY_get0_public_key(ec_key); BIGNUM *x; BIGNUM *y; /* check arguments */ if (!ec_key || !ref) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER); return 0; } /* prepare */ if (!(bn_ctx = BN_CTX_new())) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } BN_CTX_start(bn_ctx); x = BN_CTX_get(bn_ctx); y = BN_CTX_get(bn_ctx); if (!x || !y) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } if (EC_GROUP_get_degree(group) > ECCref_MAX_BITS) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, GMAPI_R_INVALID_KEY_LENGTH); goto end; } if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) { if (!EC_POINT_get_affine_coordinates_GFp(group, point, x, y, bn_ctx)) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_EC_LIB); goto end; } } else { if (!EC_POINT_get_affine_coordinates_GF2m(group, point, x, y, bn_ctx)) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_EC_LIB); goto end; } } /* EC_KEY ==> ECCrefPublicKey */ memset(ref, 0, sizeof(*ref)); ref->bits = EC_GROUP_get_degree(group); if (!BN_bn2bin(x, ref->x + ECCref_MAX_LEN - BN_num_bytes(x))) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } if (!BN_bn2bin(y, ref->y + ECCref_MAX_LEN - BN_num_bytes(y))) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPUBLICKEY, ERR_R_BN_LIB); goto end; } ret = 1; end: if (bn_ctx) { BN_CTX_end(bn_ctx); } BN_CTX_free(bn_ctx); return ret; } EC_KEY *EC_KEY_new_from_ECCrefPrivateKey(const ECCrefPrivateKey *ref) { EC_KEY *ret; if (!(ret = EC_KEY_new_by_curve_name(NID_sm2p256v1))) { GMAPIerr(GMAPI_F_EC_KEY_NEW_FROM_ECCREFPRIVATEKEY, ERR_R_EC_LIB); return NULL; } if (!EC_KEY_set_ECCrefPrivateKey(ret, ref)) { GMAPIerr(GMAPI_F_EC_KEY_NEW_FROM_ECCREFPRIVATEKEY, GMAPI_R_DECODE_EC_PRIVATE_KEY_FAILED); EC_KEY_free(ret); return NULL; } return ret; } int EC_KEY_set_ECCrefPrivateKey(EC_KEY *ec_key, const ECCrefPrivateKey *ref) { int ret = 0; BIGNUM *d = NULL; if (!ec_key || !ref) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPRIVATEKEY, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (ref->bits != EC_GROUP_get_degree(EC_KEY_get0_group(ec_key))) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPRIVATEKEY, GMAPI_R_INVALID_KEY_LENGTH); goto end; } if (!(d = BN_bin2bn(ref->K, ECCref_MAX_LEN, NULL))) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPRIVATEKEY, ERR_R_BN_LIB); goto end; } if (!EC_KEY_set_private_key(ec_key, d)) { GMAPIerr(GMAPI_F_EC_KEY_SET_ECCREFPRIVATEKEY, GMAPI_R_INVALID_PRIVATE_KEY); goto end; } ret = 1; end: BN_clear_free(d); return ret; } int EC_KEY_get_ECCrefPrivateKey(EC_KEY *ec_key, ECCrefPrivateKey *ref) { const EC_GROUP *group; const BIGNUM *sk; /* check arguments */ if (!ec_key || !ref) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPRIVATEKEY, ERR_R_PASSED_NULL_PARAMETER); return 0; } group = EC_KEY_get0_group(ec_key); sk = EC_KEY_get0_private_key(ec_key); if (!group || !sk) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPRIVATEKEY, GMAPI_R_INVALID_EC_PRIVATE_KEY); return 0; } if (EC_GROUP_get_degree(group) > ECCref_MAX_BITS) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPRIVATEKEY, GMAPI_R_INVALID_KEY_LENGTH); return 0; } /* EC_KEY ==> ECCrefPrivateKey */ memset(ref, 0, sizeof(*ref)); ref->bits = EC_GROUP_get_degree(group); if (!BN_bn2bin(sk, ref->K + sizeof(ref->K) - BN_num_bytes(sk))) { GMAPIerr(GMAPI_F_EC_KEY_GET_ECCREFPRIVATEKEY, ERR_R_BN_LIB); return 0; } return 1; } # ifndef OPENSSL_NO_SM2 SM2CiphertextValue *SM2CiphertextValue_new_from_ECCCipher(const ECCCipher *ref) { SM2CiphertextValue *ret = NULL; SM2CiphertextValue *cv = NULL; EC_GROUP *group = NULL; /* check arguments */ if (!ref) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_NEW_FROM_ECCCIPHER, ERR_R_PASSED_NULL_PARAMETER); return NULL; } if (ref->L > INT_MAX) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_NEW_FROM_ECCCIPHER, GMAPI_R_INVALID_CIPHETEXT_LENGTH); return NULL; } /* ECCCipher => SM2CiphertextValue */ if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1))) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_NEW_FROM_ECCCIPHER, ERR_R_EC_LIB); goto end; } if (!(cv = SM2CiphertextValue_new())) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_NEW_FROM_ECCCIPHER, GMAPI_R_MALLOC_FAILED); goto end; } if (!SM2CiphertextValue_set_ECCCipher(cv, ref)) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_NEW_FROM_ECCCIPHER, GMAPI_R_INVALID_SM2_CIPHERTEXT); goto end; } ret = cv; cv = NULL; end: EC_GROUP_free(group); SM2CiphertextValue_free(cv); return ret; } int SM2CiphertextValue_set_ECCCipher(SM2CiphertextValue *cv, const ECCCipher *ref) { int ret = 0; /* check arguments */ if (!cv || !ref) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_SET_ECCCIPHER, ERR_R_PASSED_NULL_PARAMETER); return 0; } /* ECCCipher ==> SM2CiphertextValue */ if (!BN_bin2bn(ref->x, ECCref_MAX_LEN, cv->xCoordinate)) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_SET_ECCCIPHER, ERR_R_BN_LIB); goto end; } if (!BN_bin2bn(ref->y, ECCref_MAX_LEN, cv->yCoordinate)) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_SET_ECCCIPHER, ERR_R_BN_LIB); goto end; } if (!ASN1_OCTET_STRING_set(cv->hash, ref->M, 32)) { goto end; } if (ref->L <= 0 || ref->L > INT_MAX) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_SET_ECCCIPHER, GMAPI_R_INVALID_CIPHERTEXT_LENGTH); goto end; } if (!ASN1_OCTET_STRING_set(cv->ciphertext, ref->C, ref->L)) { goto end; } /* set return value */ ret = 1; end: return ret; } int SM2CiphertextValue_get_ECCCipher(const SM2CiphertextValue *cv, ECCCipher *ref) { int ret = 0; /* check arguments */ if (!cv || !ref) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, ERR_R_PASSED_NULL_PARAMETER); return 0; } /* as the `ECCCipher->C[1]` default size is too small, we have to * check `ECCCipher->L` to make sure caller has initialized this * structure and prepared enough buffer to hold variable length * ciphertext */ if (ref->L < ASN1_STRING_length(cv->ciphertext)) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, GMAPI_R_BUFFER_TOO_SMALL); return 0; } /* * check compatible of SM2CiphertextValue with EC_GROUP * In gmapi we only do simple checks, i.e. length of coordinates. * We assume that more checks, such as x, y in the range of [1, p] * and other semantic checks should be done by the `sm2` module. */ if (BN_num_bytes(cv->xCoordinate) > ECCref_MAX_LEN || BN_num_bytes(cv->yCoordinate) > ECCref_MAX_LEN) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, GMAPI_R_INVALID_CIPHERTEXT_POINT); goto end; } if (ASN1_STRING_length(cv->hash) != 32) { goto end; } /* SM2CiphertextValue ==> ECCCipher */ memset(ref, 0, sizeof(*ref)); if (!BN_bn2bin(cv->xCoordinate, ref->x + ECCref_MAX_LEN - BN_num_bytes(cv->xCoordinate))) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, ERR_R_BN_LIB); goto end; } if (!BN_bn2bin(cv->yCoordinate, ref->y + ECCref_MAX_LEN - BN_num_bytes(cv->yCoordinate))) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, ERR_R_BN_LIB); goto end; } /* encode mac `ECCCipher->M[32]` */ if (ASN1_STRING_length(cv->hash) != 32) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, GMAPI_R_INVALID_CIPHERTEXT_MAC); goto end; } memcpy(ref->M, ASN1_STRING_get0_data(cv->hash), ASN1_STRING_length(cv->hash)); /* encode ciphertext `ECCCipher->L`, `ECCCipher->C[]` */ if (ASN1_STRING_length(cv->ciphertext) <= 0 || ASN1_STRING_length(cv->ciphertext) > INT_MAX) { GMAPIerr(GMAPI_F_SM2CIPHERTEXTVALUE_GET_ECCCIPHER, GMAPI_R_INVALID_CIPHERTEXT_LENGTH); goto end; } ref->L = ASN1_STRING_length(cv->ciphertext); memcpy(ref->C, ASN1_STRING_get0_data(cv->ciphertext), ASN1_STRING_length(cv->ciphertext)); /* set return value */ ret = 1; end: return ret; } # endif ECDSA_SIG *ECDSA_SIG_new_from_ECCSignature(const ECCSignature *ref) { ECDSA_SIG *ret = NULL; ECDSA_SIG *sig = NULL; /* check arguments */ if (!ref) { GMAPIerr(GMAPI_F_ECDSA_SIG_NEW_FROM_ECCSIGNATURE, ERR_R_PASSED_NULL_PARAMETER); return NULL; } /* generate and convert */ if (!(sig = ECDSA_SIG_new())) { GMAPIerr(GMAPI_F_ECDSA_SIG_NEW_FROM_ECCSIGNATURE, GMAPI_R_MALLOC_FAILED); goto end; } if (!ECDSA_SIG_set_ECCSignature(sig, ref)) { GMAPIerr(GMAPI_F_ECDSA_SIG_NEW_FROM_ECCSIGNATURE, GMAPI_R_INVALID_SIGNATURE); goto end; } /* set return value */ ret = sig; sig = NULL; end: ECDSA_SIG_free(sig); return ret; } int ECDSA_SIG_set_ECCSignature(ECDSA_SIG *sig, const ECCSignature *ref) { int ret = 0; BIGNUM *r = NULL; BIGNUM *s = NULL; /* check arguments */ if (!sig || !ref) { GMAPIerr(GMAPI_F_ECDSA_SIG_SET_ECCSIGNATURE, ERR_R_PASSED_NULL_PARAMETER); return 0; } /* ECCSignature ==> ECDSA_SIG */ if (!(r = BN_bin2bn(ref->r, ECCref_MAX_LEN, NULL))) { GMAPIerr(GMAPI_F_ECDSA_SIG_SET_ECCSIGNATURE, ERR_R_BN_LIB); goto end; } if (!(s = BN_bin2bn(ref->s, ECCref_MAX_LEN, NULL))) { GMAPIerr(GMAPI_F_ECDSA_SIG_SET_ECCSIGNATURE, ERR_R_BN_LIB); goto end; } /* when using `sm2p256v1`, we need to check (s, r) length correct */ if (BN_num_bytes(r) != 256/8 || BN_num_bytes(s) != 256/8) { GMAPIerr(GMAPI_F_ECDSA_SIG_SET_ECCSIGNATURE, GMAPI_R_INVALID_SM2_SIGNATURE); goto end; } /* set return value * `ECDSA_SIG_set0` should make sure that if failed, do not accept * the value of (r, s), or there will be double-free */ if (!ECDSA_SIG_set0(sig, r, s)) { GMAPIerr(GMAPI_F_ECDSA_SIG_SET_ECCSIGNATURE, ERR_R_EC_LIB); goto end; } r = NULL; s = NULL; ret = 1; end: BN_free(r); BN_free(s); return ret; } int ECDSA_SIG_get_ECCSignature(const ECDSA_SIG *sig, ECCSignature *ref) { /* (r, s) are pointed to (sig->r, sig->s), so dont free (r, s) */ const BIGNUM *r = NULL; const BIGNUM *s = NULL; /* check arguments */ if (!sig || !ref) { GMAPIerr(GMAPI_F_ECDSA_SIG_GET_ECCSIGNATURE, ERR_R_PASSED_NULL_PARAMETER); return 0; } /* check ECDSA_SIG * `ECDSA_SIG_get0() return void */ ECDSA_SIG_get0(sig, &r, &s); if (BN_num_bytes(r) > ECCref_MAX_LEN || BN_num_bytes(s) > ECCref_MAX_LEN) { GMAPIerr(GMAPI_F_ECDSA_SIG_GET_ECCSIGNATURE, GMAPI_R_NOT_CONVERTABLE); return 0; } /* ECDSA_SIG ==> ECCSignature */ memset(ref, 0, sizeof(*ref)); if (!BN_bn2bin(r, ref->r + ECCref_MAX_LEN - BN_num_bytes(r))) { GMAPIerr(GMAPI_F_ECDSA_SIG_GET_ECCSIGNATURE, ERR_R_BN_LIB); return 0; } if (!BN_bn2bin(s, ref->s + ECCref_MAX_LEN - BN_num_bytes(s))) { GMAPIerr(GMAPI_F_ECDSA_SIG_GET_ECCSIGNATURE, ERR_R_BN_LIB); return 0; } return 1; } ECCCipher *d2i_ECCCipher(ECCCipher **a, const unsigned char **pp, long length) { ECCCipher *ret = NULL; ECCCipher *sdf = NULL; SM2CiphertextValue *cv = NULL; if (!(cv = d2i_SM2CiphertextValue(NULL, pp, length))) { GMAPIerr(GMAPI_F_D2I_ECCCIPHER, ERR_R_SM2_LIB); goto end; } if (a && *a) { if (!SM2CiphertextValue_get_ECCCipher(cv, *a)) { GMAPIerr(GMAPI_F_D2I_ECCCIPHER, ERR_R_GMAPI_LIB); goto end; } ret = *a; } else { if (SDF_NewECCCipher(&sdf, ASN1_STRING_length(cv->ciphertext)) != SDR_OK) { GMAPIerr(GMAPI_F_D2I_ECCCIPHER, ERR_R_SDF_LIB); goto end; } sdf->L = ASN1_STRING_length(cv->ciphertext); if (!SM2CiphertextValue_get_ECCCipher(cv, sdf)) { GMAPIerr(GMAPI_F_D2I_ECCCIPHER, ERR_R_GMAPI_LIB); goto end; } ret = sdf; sdf = NULL; } end: OPENSSL_free(sdf); SM2CiphertextValue_free(cv); return ret; } ECCCipher *d2i_ECCCipher_bio(BIO *bp, ECCCipher **a) { return NULL; } ECCCipher *d2i_ECCCipher_fp(FILE *fp, ECCCipher **a) { return NULL; } int i2d_ECCCipher(ECCCipher *a, unsigned char **pp) { int ret; SM2CiphertextValue *cv = NULL; if (!(cv = SM2CiphertextValue_new_from_ECCCipher(a))) { GMAPIerr(GMAPI_F_I2D_ECCCIPHER, ERR_R_SM2_LIB); return 0; } ret = i2d_SM2CiphertextValue(cv, pp); SM2CiphertextValue_free(cv); return ret; } int i2d_ECCCipher_bio(BIO *bp, ECCCipher *a) { return 0; } int i2d_ECCCipher_fp(FILE *fp, ECCCipher *a) { return 0; } ECCSignature *d2i_ECCSignature(ECCSignature **a, const unsigned char **pp, long length) { ECCSignature *ret = NULL; ECCSignature *sdf_sig = NULL; ECDSA_SIG *sig = NULL; if (!(sig = d2i_ECDSA_SIG(NULL, pp, length))) { GMAPIerr(GMAPI_F_D2I_ECCSIGNATURE, ERR_R_EC_LIB); goto end; } if (!(sdf_sig = OPENSSL_malloc(sizeof(ECCSignature)))) { GMAPIerr(GMAPI_F_D2I_ECCSIGNATURE, ERR_R_MALLOC_FAILURE); goto end; } if (!ECDSA_SIG_get_ECCSignature(sig, sdf_sig)) { GMAPIerr(GMAPI_F_D2I_ECCSIGNATURE, ERR_R_GMAPI_LIB); goto end; } ret = sdf_sig; sdf_sig = NULL; end: OPENSSL_free(sdf_sig); ECDSA_SIG_free(sig); return ret; } ECCSignature *d2i_ECCSignature_bio(BIO *bp, ECCSignature **a) { return NULL; } ECCSignature *d2i_ECCSignature_fp(FILE *fp, ECCSignature **a) { return NULL; } int i2d_ECCSignature(ECCSignature *a, unsigned char **pp) { int ret; ECDSA_SIG *sig = NULL; if (!(sig = ECDSA_SIG_new_from_ECCSignature(a))) { GMAPIerr(GMAPI_F_I2D_ECCSIGNATURE, ERR_R_GMAPI_LIB); return 0; } ret = i2d_ECDSA_SIG(sig, pp); ECDSA_SIG_free(sig); return ret; } int i2d_ECCSignature_bio(BIO *bp, ECCSignature *a) { return 0; } int i2d_ECCSignature_fp(FILE *fp, ECCSignature *a) { return 0; } # ifndef OPENSSL_NO_ECIES ECIES_CIPHERTEXT_VALUE *ECIES_CIPHERTEXT_VALUE_new_from_ECCCipher( const ECCCipher *ref) { ECIES_CIPHERTEXT_VALUE *ret = NULL; ECIES_CIPHERTEXT_VALUE *cv = NULL; if (!(cv = ECIES_CIPHERTEXT_VALUE_new())) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_NEW_FROM_ECCCIPHER, ERR_R_MALLOC_FAILURE); goto end; } if (!ECIES_CIPHERTEXT_VALUE_set_ECCCipher(cv, ref)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_NEW_FROM_ECCCIPHER, ERR_R_GMAPI_LIB); goto end; } ret = cv; cv = NULL; end: ECIES_CIPHERTEXT_VALUE_free(cv); return ret; } int ECIES_CIPHERTEXT_VALUE_set_ECCCipher(ECIES_CIPHERTEXT_VALUE *cv, const ECCCipher *ref) { int ret = 0; int point_form = POINT_CONVERSION_COMPRESSED; EC_GROUP *group = NULL; EC_POINT *point = NULL; BIGNUM *x = NULL; BIGNUM *y = NULL; BN_CTX *bn_ctx = NULL; int len; if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1)) || !(point = EC_POINT_new(group)) || !(x = BN_new()) || !(y = BN_new()) || !(bn_ctx = BN_CTX_new())) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_MALLOC_FAILURE); goto end; } if (!BN_bin2bn(ref->x, sizeof(ref->x), x) || !BN_bin2bn(ref->y, sizeof(ref->y), y)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_BN_LIB); goto end; } if (!EC_POINT_set_affine_coordinates_GFp(group, point, x, y, bn_ctx)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_EC_LIB); goto end; } len = EC_POINT_point2oct(group, point, point_form, NULL, 0, NULL); if (!ASN1_OCTET_STRING_set(cv->ephem_point, NULL, len)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_MALLOC_FAILURE); goto end; } if (EC_POINT_point2oct(group, point, point_form, cv->ephem_point->data, len, NULL) <= 0) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_EC_LIB); goto end; } if (!ASN1_OCTET_STRING_set(cv->ciphertext, ref->C, ref->L)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_ASN1_LIB); goto end; } if (!ASN1_OCTET_STRING_set(cv->mactag, ref->M, sizeof(ref->M))) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_SET_ECCCIPHER, ERR_R_ASN1_LIB); goto end; } ret = 1; end: EC_GROUP_free(group); EC_POINT_free(point); BN_free(x); BN_free(y); BN_CTX_free(bn_ctx); return ret; } int ECIES_CIPHERTEXT_VALUE_get_ECCCipher(const ECIES_CIPHERTEXT_VALUE *cv, ECCCipher *ref) { int ret = 0; EC_GROUP *group = NULL; EC_POINT *point = NULL; BIGNUM *x = NULL; BIGNUM *y = NULL; BN_CTX *bn_ctx = NULL; int len; if (ASN1_STRING_length(cv->mactag) != sizeof(ref->M)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_GET_ECCCIPHER, GMAPI_R_INVALID_SM2_CIPHERTEXT_MAC_LENGTH); return 0; } len = sizeof(ECCCipher) - 1 + ASN1_STRING_length(cv->ciphertext); if (!ref) { return len; } if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1)) || !(point = EC_POINT_new(group)) || !(x = BN_new()) || !(y = BN_new()) || !(bn_ctx = BN_CTX_new())) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_GET_ECCCIPHER, ERR_R_MALLOC_FAILURE); goto end; } if (!EC_POINT_oct2point(group, point, ASN1_STRING_get0_data(cv->ephem_point), ASN1_STRING_length(cv->ephem_point), bn_ctx)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_GET_ECCCIPHER, ERR_R_EC_LIB); goto end; } if (!EC_POINT_get_affine_coordinates_GFp(group, point, x, y, bn_ctx)) { GMAPIerr(GMAPI_F_ECIES_CIPHERTEXT_VALUE_GET_ECCCIPHER, ERR_R_EC_LIB); goto end; } memset(ref, 0, len); BN_bn2bin(x, ref->x + sizeof(ref->x) - BN_num_bytes(x)); BN_bn2bin(y, ref->y + sizeof(ref->y) - BN_num_bytes(y)); memcpy(ref->C, ASN1_STRING_get0_data(cv->ciphertext), ASN1_STRING_length(cv->ciphertext)); memcpy(ref->M, ASN1_STRING_get0_data(cv->mactag), ASN1_STRING_length(cv->mactag)); ret = len; end: EC_GROUP_free(group); EC_POINT_free(point); BN_free(x); BN_free(y); BN_CTX_free(bn_ctx); return ret; } # endif /* OPENSSL_NO_ECIES */ #endif