Files
GmSSL/crypto/sm9/sm9_asn1.c
2020-06-19 15:56:33 +08:00

327 lines
9.8 KiB
C
Executable File

/* ====================================================================
* Copyright (c) 2016 The GmSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the GmSSL Project.
* (http://gmssl.org/)"
*
* 4. The name "GmSSL Project" must not be used to endorse or promote
* products derived from this software without prior written
* permission. For written permission, please contact
* guanzhi1980@gmail.com.
*
* 5. Products derived from this software may not be called "GmSSL"
* nor may "GmSSL" appear in their names without prior written
* permission of the GmSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the GmSSL Project
* (http://gmssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*/
#include <openssl/bn.h>
#include <openssl/err.h>
#include <openssl/sm3.h>
#include <openssl/asn1.h>
#include <openssl/asn1t.h>
#include <openssl/objects.h>
#include <openssl/sm9.h>
#include "sm9_lcl.h"
static int sm9_master_key_cb(int operation, ASN1_VALUE **pval,
const ASN1_ITEM *it, void *exarg)
{
/* FIXME: usage of it and exarg? */
(void)it;
(void)exarg;
if (operation == ASN1_OP_NEW_PRE) {
*pval = (ASN1_VALUE *)SM9_MASTER_KEY_new();
if (*pval)
return 2;
return 0;
} else if (operation == ASN1_OP_FREE_PRE) {
SM9_MASTER_KEY_free((SM9_MASTER_KEY *)*pval);
*pval = NULL;
return 2;
}
return 1;
}
ASN1_SEQUENCE_cb(SM9MasterSecret, sm9_master_key_cb) = {
ASN1_SIMPLE(SM9_MASTER_KEY, pairing, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, scheme, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, hash1, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, pointPpub, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_MASTER_KEY, masterSecret, BIGNUM)
} ASN1_SEQUENCE_END_cb(SM9_MASTER_KEY, SM9MasterSecret)
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(SM9_MASTER_KEY,SM9MasterSecret,SM9MasterSecret)
ASN1_SEQUENCE_cb(SM9PublicParameters, sm9_master_key_cb) = {
ASN1_SIMPLE(SM9_MASTER_KEY, pairing, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, scheme, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, hash1, ASN1_OBJECT),
ASN1_SIMPLE(SM9_MASTER_KEY, pointPpub, ASN1_OCTET_STRING)
} ASN1_SEQUENCE_END_cb(SM9_MASTER_KEY, SM9PublicParameters)
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(SM9_MASTER_KEY,SM9PublicParameters,SM9PublicParameters)
static int sm9_key_cb(int operation, ASN1_VALUE **pval,
const ASN1_ITEM *it, void *exarg)
{
/* FIXME: usage of it and exarg? */
(void)it;
(void)exarg;
if (operation == ASN1_OP_NEW_PRE) {
*pval = (ASN1_VALUE *)SM9_KEY_new();
if (*pval)
return 2;
return 0;
} else if (operation == ASN1_OP_FREE_PRE) {
SM9_KEY_free((SM9_KEY *)*pval);
*pval = NULL;
return 2;
}
return 1;
}
ASN1_SEQUENCE_cb(SM9PrivateKey, sm9_key_cb) = {
ASN1_SIMPLE(SM9_KEY, pairing, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, scheme, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, hash1, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, pointPpub, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_KEY, identity, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_KEY, publicPoint, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_KEY, privatePoint, ASN1_OCTET_STRING)
} ASN1_SEQUENCE_END_cb(SM9_KEY, SM9PrivateKey)
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(SM9_KEY,SM9PrivateKey,SM9PrivateKey)
ASN1_SEQUENCE_cb(SM9PublicKey, sm9_key_cb) = {
ASN1_SIMPLE(SM9_KEY, pairing, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, scheme, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, hash1, ASN1_OBJECT),
ASN1_SIMPLE(SM9_KEY, pointPpub, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_KEY, identity, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9_KEY, publicPoint, ASN1_OCTET_STRING)
} ASN1_SEQUENCE_END_cb(SM9_KEY, SM9PublicKey)
IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(SM9_KEY,SM9PublicKey,SM9PublicKey)
ASN1_SEQUENCE(SM9Ciphertext) = {
ASN1_SIMPLE(SM9Ciphertext, pointC1, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9Ciphertext, c2, ASN1_OCTET_STRING),
ASN1_SIMPLE(SM9Ciphertext, c3, ASN1_OCTET_STRING)
} ASN1_SEQUENCE_END(SM9Ciphertext)
IMPLEMENT_ASN1_FUNCTIONS(SM9Ciphertext)
IMPLEMENT_ASN1_DUP_FUNCTION(SM9Ciphertext)
ASN1_SEQUENCE(SM9Signature) = {
ASN1_SIMPLE(SM9Signature, h, BIGNUM),
ASN1_SIMPLE(SM9Signature, pointS, ASN1_OCTET_STRING)
} ASN1_SEQUENCE_END(SM9Signature)
IMPLEMENT_ASN1_FUNCTIONS(SM9Signature)
IMPLEMENT_ASN1_DUP_FUNCTION(SM9Signature)
int SM9PublicKey_gmtls_encode(SM9PublicKey *pk, unsigned char key[1024])
{
/* FIMXE: implement this */
(void)pk;
(void)key;
return 0;
}
int i2d_SM9MasterSecret_bio(BIO *bp, SM9MasterSecret *a)
{
return ASN1_item_i2d_bio(ASN1_ITEM_rptr(SM9MasterSecret), bp, a);
}
SM9MasterSecret *d2i_SM9MasterSecret_bio(BIO *bp, SM9MasterSecret **a)
{
return ASN1_item_d2i_bio(ASN1_ITEM_rptr(SM9MasterSecret), bp, a);
}
int i2d_SM9PublicParameters_bio(BIO *bp, SM9PublicParameters *a)
{
return ASN1_item_i2d_bio(ASN1_ITEM_rptr(SM9PublicParameters), bp, a);
}
SM9PublicParameters *d2i_SM9PublicParameters_bio(BIO *bp, SM9PublicParameters **a)
{
return ASN1_item_d2i_bio(ASN1_ITEM_rptr(SM9PublicParameters), bp, a);
}
int i2d_SM9PrivateKey_bio(BIO *bp, SM9PrivateKey *a)
{
return ASN1_item_i2d_bio(ASN1_ITEM_rptr(SM9PrivateKey), bp, a);
}
SM9PrivateKey *d2i_SM9PrivateKey_bio(BIO *bp, SM9PrivateKey **a)
{
return ASN1_item_d2i_bio(ASN1_ITEM_rptr(SM9PrivateKey), bp, a);
}
int i2d_SM9Signature_bio(BIO *bp, SM9Signature *a)
{
return ASN1_item_i2d_bio(ASN1_ITEM_rptr(SM9Signature), bp, a);
}
SM9Signature *d2i_SM9Signature_bio(BIO *bp, SM9Signature **a)
{
return ASN1_item_d2i_bio(ASN1_ITEM_rptr(SM9Signature), bp, a);
}
int i2d_SM9Ciphertext_bio(BIO *bp, SM9Ciphertext *a)
{
return ASN1_item_i2d_bio(ASN1_ITEM_rptr(SM9Ciphertext), bp, a);
}
SM9Ciphertext *d2i_SM9Ciphertext_bio(BIO *bp, SM9Ciphertext **a)
{
return ASN1_item_d2i_bio(ASN1_ITEM_rptr(SM9Ciphertext), bp, a);
}
#ifndef OPENSSL_NO_STDIO
SM9MasterSecret *d2i_SM9MasterSecret_fp(FILE *fp, SM9MasterSecret **msk)
{
return ASN1_item_d2i_fp(ASN1_ITEM_rptr(SM9MasterSecret), fp, msk);
}
int i2d_SM9MasterSecret_fp(FILE *fp, SM9MasterSecret *msk)
{
return ASN1_item_i2d_fp(ASN1_ITEM_rptr(SM9MasterSecret), fp, msk);
}
SM9PublicParameters *d2i_SM9PublicParameters_fp(FILE *fp, SM9PublicParameters **mpk)
{
return ASN1_item_d2i_fp(ASN1_ITEM_rptr(SM9PublicParameters), fp, mpk);
}
int i2d_SM9PublicParameters_fp(FILE *fp, SM9PublicParameters *mpk)
{
return ASN1_item_i2d_fp(ASN1_ITEM_rptr(SM9PublicParameters), fp, mpk);
}
SM9PrivateKey *d2i_SM9PrivateKey_fp(FILE *fp, SM9PrivateKey **sk)
{
return ASN1_item_d2i_fp(ASN1_ITEM_rptr(SM9PrivateKey), fp, sk);
}
int i2d_SM9PrivateKey_fp(FILE *fp, SM9PrivateKey *sk)
{
return ASN1_item_i2d_fp(ASN1_ITEM_rptr(SM9PrivateKey), fp, sk);
}
SM9Signature *d2i_SM9Signature_fp(FILE *fp, SM9Signature **sig)
{
return ASN1_item_d2i_fp(ASN1_ITEM_rptr(SM9Signature), fp, sig);
}
int i2d_SM9Signature_fp(FILE *fp, SM9Signature *sig)
{
return ASN1_item_i2d_fp(ASN1_ITEM_rptr(SM9Signature), fp, sig);
}
SM9Ciphertext *d2i_SM9Ciphertext_fp(FILE *fp, SM9Ciphertext **c)
{
return ASN1_item_d2i_fp(ASN1_ITEM_rptr(SM9Ciphertext), fp, c);
}
int i2d_SM9Ciphertext_fp(FILE *fp, SM9Ciphertext *c)
{
return ASN1_item_i2d_fp(ASN1_ITEM_rptr(SM9Ciphertext), fp, c);
}
#endif
int SM9_signature_size(const SM9_MASTER_KEY *params)
{
if (params) {
int ret;
ASN1_INTEGER h;
ASN1_OCTET_STRING s;
unsigned char buf[4] = {0xff};
int len = 0;
/* ASN1_INTEGER h convert from hash */
h.length = SM3_DIGEST_LENGTH;
h.data = buf;
h.type = V_ASN1_INTEGER;
len += i2d_ASN1_INTEGER(&h, NULL);
/* ASN1_OCTET_STRING pointS over E'(F_p^2) */
s.length = 129;
s.data = buf;
s.type = V_ASN1_OCTET_STRING;
len += i2d_ASN1_OCTET_STRING(&s, NULL);
ret = ASN1_object_size(1, len, V_ASN1_SEQUENCE);
return ret;
} else {
return 170;
}
}
int SM9_ciphertext_size(const SM9_MASTER_KEY *params, size_t inlen)
{
int ret;
ASN1_OCTET_STRING s;
s.type = V_ASN1_OCTET_STRING;
s.data = NULL;
int len = 0;
if (inlen > SM9_MAX_PLAINTEXT_LENGTH) {
SM9err(SM9_F_SM9_CIPHERTEXT_SIZE, SM9_R_PLAINTEXT_TOO_LONG);
return 0;
}
if (params) {
/* ASN1_OCTET_STRING pointC1 over E(F_p) */
s.length = 65;
len += i2d_ASN1_OCTET_STRING(&s, NULL);
/* ASN1_OCTET_STRING c3 SM3-MAC */
s.length = SM3_DIGEST_LENGTH;
len += i2d_ASN1_OCTET_STRING(&s, NULL);
} else {
/* when no params given, if use point compression is unknown,
* so the maximum uncompressed point length is used */
len += 101;
}
/* ASN1_OCTET_STRING c2 ciphertext */
s.length = inlen;
len += i2d_ASN1_OCTET_STRING(&s, NULL);
ret = ASN1_object_size(1, len, V_ASN1_SEQUENCE);
return ret;
}