mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-11 19:06:27 +08:00
715 lines
19 KiB
C
715 lines
19 KiB
C
/* crypto/skf/skf_ec.c */
|
|
/* ====================================================================
|
|
* Copyright (c) 2015-2016 The GmSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the GmSSL Project.
|
|
* (http://gmssl.org/)"
|
|
*
|
|
* 4. The name "GmSSL Project" must not be used to endorse or promote
|
|
* products derived from this software without prior written
|
|
* permission. For written permission, please contact
|
|
* guanzhi1980@gmail.com.
|
|
*
|
|
* 5. Products derived from this software may not be called "GmSSL"
|
|
* nor may "GmSSL" appear in their names without prior written
|
|
* permission of the GmSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the GmSSL Project
|
|
* (http://gmssl.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <openssl/ec.h>
|
|
#include <openssl/ecdsa.h>
|
|
#include <openssl/skf.h>
|
|
#include <openssl/skf_ex.h>
|
|
#include "skf_lcl.h"
|
|
|
|
ULONG DEVAPI SKF_GenExtECCKeyPair(DEVHANDLE hDev,
|
|
ECCPRIVATEKEYBLOB *priKey,
|
|
ECCPUBLICKEYBLOB *pubKey)
|
|
{
|
|
ULONG ret = SAR_FAIL;
|
|
EC_KEY *ec_key;
|
|
|
|
if(!(ec_key = EC_KEY_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_SKF_GENEXTECCKEYPAIR, ERR_R_EC_LIB);
|
|
return SAR_FAIL;
|
|
}
|
|
if (!EC_KEY_get_ECCPRIVATEKEYBLOB(ec_key, priKey)) {
|
|
SKFerr(SKF_F_SKF_GENEXTECCKEYPAIR, SKF_R_GET_PRIVATE_KEY_FAILED);
|
|
goto end;
|
|
}
|
|
if (!EC_KEY_get_ECCPUBLICKEYBLOB(ec_key, pubKey)) {
|
|
SKFerr(SKF_F_SKF_GENEXTECCKEYPAIR, SKF_R_GET_PUBLIC_KEY_FAILED);
|
|
goto end;
|
|
}
|
|
ret = SAR_OK;
|
|
end:
|
|
EC_KEY_free(ec_key);
|
|
return ret;
|
|
}
|
|
|
|
ULONG DEVAPI SKF_ExtECCSign(DEVHANDLE hDev,
|
|
ECCPRIVATEKEYBLOB *pECCPriKeyBlob,
|
|
BYTE *pbData,
|
|
ULONG ulDataLen,
|
|
ECCSIGNATUREBLOB *pSignature)
|
|
{
|
|
ULONG ret = SAR_FAIL;
|
|
EC_KEY *ec_key = NULL;
|
|
ECDSA_SIG *sig = NULL;
|
|
|
|
if (!pECCPriKeyBlob || !pbData || !pSignature) {
|
|
SKFerr(SKF_F_SKF_EXTECCSIGN, SKF_R_NULL_ARGUMENT);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (ulDataLen != SM3_DIGEST_LENGTH) {
|
|
SKFerr(SKF_F_SKF_EXTECCSIGN, SKF_R_INVALID_DIGEST_LENGTH);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (!(ec_key = EC_KEY_new_from_ECCPRIVATEKEYBLOB(pECCPriKeyBlob))) {
|
|
SKFerr(SKF_F_SKF_EXTECCSIGN, SKF_R_INVALID_ECC_PRIVATE_KEY);
|
|
goto end;
|
|
}
|
|
|
|
if (!(sig = SM2_do_sign(pbData, (int)ulDataLen, ec_key))) {
|
|
SKFerr(SKF_F_SKF_EXTECCSIGN, SKF_R_SIGN_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
if (!ECDSA_SIG_get_ECCSIGNATUREBLOB(sig, pSignature)) {
|
|
SKFerr(SKF_F_SKF_EXTECCSIGN, SKF_R_ENCODE_SIGNATURE_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
ret = SAR_OK;
|
|
end:
|
|
EC_KEY_free(ec_key);
|
|
ECDSA_SIG_free(sig);
|
|
return ret;
|
|
}
|
|
|
|
ULONG DEVAPI SKF_ExtECCVerify(DEVHANDLE hDev,
|
|
ECCPUBLICKEYBLOB *pECCPubKeyBlob,
|
|
BYTE *pbData,
|
|
ULONG ulDataLen,
|
|
ECCSIGNATUREBLOB *pSignature)
|
|
{
|
|
ULONG ret = SAR_FAIL;
|
|
EC_KEY *ec_key = NULL;
|
|
ECDSA_SIG *sig = NULL;
|
|
|
|
if (!pECCPubKeyBlob || !pbData || pSignature) {
|
|
SKFerr(SKF_F_SKF_EXTECCVERIFY, SKF_R_NULL_ARGUMENT);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (ulDataLen != SM3_DIGEST_LENGTH) {
|
|
SKFerr(SKF_F_SKF_EXTECCVERIFY, SKF_R_INVALID_DIGEST_LENGTH);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (!(ec_key = EC_KEY_new_from_ECCPUBLICKEYBLOB(pECCPubKeyBlob))) {
|
|
SKFerr(SKF_F_SKF_EXTECCVERIFY, SKF_R_INVALID_ECC_PUBLIC_KEY);
|
|
goto end;
|
|
}
|
|
|
|
if (!(sig = ECDSA_SIG_new_from_ECCSIGNATUREBLOB(pSignature))) {
|
|
SKFerr(SKF_F_SKF_EXTECCVERIFY, SKF_R_INVALID_SIGNATURE);
|
|
goto end;
|
|
}
|
|
|
|
if (1 != SM2_do_verify(pbData, (int)ulDataLen, sig, ec_key)) {
|
|
SKFerr(SKF_F_SKF_EXTECCVERIFY, SKF_R_VERIFY_NOT_PASS);
|
|
goto end;
|
|
}
|
|
|
|
ret = SAR_OK;
|
|
|
|
end:
|
|
EC_KEY_free(ec_key);
|
|
ECDSA_SIG_free(sig);
|
|
return ret;
|
|
}
|
|
|
|
ULONG DEVAPI SKF_ECCVerify(DEVHANDLE hDev,
|
|
ECCPUBLICKEYBLOB *pECCPubKeyBlob,
|
|
BYTE *pbData,
|
|
ULONG ulDataLen,
|
|
ECCSIGNATUREBLOB *pSignature)
|
|
{
|
|
return SKF_ExtECCVerify(hDev, pECCPubKeyBlob, pbData, ulDataLen, pSignature);
|
|
}
|
|
|
|
ULONG DEVAPI SKF_ExtECCEncrypt(DEVHANDLE hDev,
|
|
ECCPUBLICKEYBLOB *pECCPubKeyBlob,
|
|
BYTE *pbPlainText,
|
|
ULONG ulPlainTextLen,
|
|
ECCCIPHERBLOB *pCipherText)
|
|
{
|
|
ULONG ret = SAR_FAIL;
|
|
EC_KEY *ec_key = NULL;
|
|
SM2_CIPHERTEXT_VALUE *cv = NULL;
|
|
SM2_ENC_PARAMS params;
|
|
|
|
if (!pECCPubKeyBlob || !pbPlainText || !pCipherText) {
|
|
SKFerr(SKF_F_SKF_EXTECCENCRYPT, SKF_R_NULL_ARGUMENT);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (ulPlainTextLen <= 0) {
|
|
SKFerr(SKF_F_SKF_EXTECCENCRYPT, SKF_R_INVALID_PLAINTEXT_LENGTH);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (!(ec_key = EC_KEY_new_from_ECCPUBLICKEYBLOB(pECCPubKeyBlob))) {
|
|
SKFerr(SKF_F_SKF_EXTECCENCRYPT, SKF_R_INVALID_EC_PUBLIC_KEY);
|
|
goto end;
|
|
}
|
|
|
|
SM2_ENC_PARAMS_init_with_recommended(¶ms);
|
|
if (!(cv = SM2_do_encrypt(¶ms, pbPlainText, ulPlainTextLen, ec_key))) {
|
|
SKFerr(SKF_F_SKF_EXTECCENCRYPT, SKF_R_ENCRYPT_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
if (!SM2_CIPHERTEXT_VALUE_get_ECCCIPHERBLOB(cv, pCipherText)) {
|
|
SKFerr(SKF_F_SKF_EXTECCENCRYPT, SKF_R_ENCODE_CIPHERTEXT_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
ret = SAR_OK;
|
|
|
|
end:
|
|
EC_KEY_free(ec_key);
|
|
SM2_CIPHERTEXT_VALUE_free(cv);
|
|
return ret;
|
|
}
|
|
|
|
ULONG DEVAPI SKF_ExtECCDecrypt(DEVHANDLE hDev,
|
|
ECCPRIVATEKEYBLOB *pECCPriKeyBlob,
|
|
ECCCIPHERBLOB *pCipherText,
|
|
BYTE *pbPlainText,
|
|
ULONG *pulPlainTextLen)
|
|
{
|
|
ULONG ret = SAR_FAIL;
|
|
EC_KEY *ec_key = NULL;
|
|
SM2_CIPHERTEXT_VALUE *cv = NULL;
|
|
SM2_ENC_PARAMS params;
|
|
size_t len;
|
|
|
|
if (!pECCPriKeyBlob || !pCipherText || !pulPlainTextLen) {
|
|
SKFerr(SKF_F_SKF_EXTECCDECRYPT, SKF_R_NULL_ARGUMENT);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (pCipherText->CipherLen <= 0) {
|
|
SKFerr(SKF_F_SKF_EXTECCDECRYPT, SKF_R_INVALID_CIPHERTEXT_LENGTH);
|
|
return SAR_INVALIDPARAMERR;
|
|
}
|
|
|
|
if (!pbPlainText) {
|
|
*pulPlainTextLen = pCipherText->CipherLen;
|
|
return SAR_OK;
|
|
}
|
|
|
|
if (!(ec_key = EC_KEY_new_from_ECCPRIVATEKEYBLOB(pECCPriKeyBlob))) {
|
|
SKFerr(SKF_F_SKF_EXTECCDECRYPT, SKF_R_INVALID_EC_PRIVATE_KEY);
|
|
goto end;
|
|
}
|
|
|
|
if (!(cv = SM2_CIPHERTEXT_VALUE_new_from_ECCCIPHERBLOB(pCipherText))) {
|
|
SKFerr(SKF_F_SKF_EXTECCDECRYPT, SKF_R_INVALID_CIPHERTEXT);
|
|
goto end;
|
|
}
|
|
|
|
SM2_ENC_PARAMS_init_with_recommended(¶ms);
|
|
len = *pulPlainTextLen; //FIXME: check length?
|
|
if (!SM2_do_decrypt(¶ms, cv, pbPlainText, &len, ec_key)) {
|
|
SKFerr(SKF_F_SKF_EXTECCDECRYPT, SKF_R_DECRYPT_FAILED);
|
|
goto end;
|
|
}
|
|
*pulPlainTextLen = (ULONG)len;
|
|
|
|
ret = SAR_OK;
|
|
|
|
end:
|
|
EC_KEY_free(ec_key);
|
|
SM2_CIPHERTEXT_VALUE_free(cv);
|
|
return ret;
|
|
}
|
|
|
|
/* Wrapper Functions */
|
|
|
|
EC_KEY *EC_KEY_new_from_ECCPUBLICKEYBLOB(const ECCPUBLICKEYBLOB *blob)
|
|
{
|
|
EC_KEY *ret;
|
|
|
|
if (!(ret = EC_KEY_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_EC_KEY_NEW_FROM_ECCPUBLICKEYBLOB, ERR_R_EC_LIB);
|
|
return NULL;
|
|
}
|
|
|
|
if (!EC_KEY_set_ECCPUBLICKEYBLOB(ret, blob)) {
|
|
SKFerr(SKF_F_EC_KEY_NEW_FROM_ECCPUBLICKEYBLOB,
|
|
SKF_R_DECODE_EC_PUBLIC_KEY_FAILED);
|
|
EC_KEY_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
EC_KEY *EC_KEY_new_from_ECCPRIVATEKEYBLOB(const ECCPRIVATEKEYBLOB *blob)
|
|
{
|
|
EC_KEY *ret;
|
|
|
|
if (!(ret = EC_KEY_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_EC_KEY_NEW_FROM_ECCPRIVATEKEYBLOB, ERR_R_EC_LIB);
|
|
return NULL;
|
|
}
|
|
|
|
if (!EC_KEY_set_ECCPRIVATEKEYBLOB(ret, blob)) {
|
|
SKFerr(SKF_F_EC_KEY_NEW_FROM_ECCPRIVATEKEYBLOB,
|
|
SKF_R_DECODE_EC_PRIVATE_KEY_FAILED);
|
|
EC_KEY_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int EC_KEY_set_ECCPUBLICKEYBLOB(EC_KEY *ec_key, const ECCPUBLICKEYBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
BIGNUM *x = NULL;
|
|
BIGNUM *y = NULL;
|
|
int nbytes;
|
|
|
|
if (blob->BitLen != EC_GROUP_get_degree(EC_KEY_get0_group(ec_key))) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPUBLICKEYBLOB, SKF_R_INVALID_KEY_LENGTH);
|
|
return 0;
|
|
}
|
|
|
|
nbytes = (blob->BitLen + 7)/8;
|
|
|
|
if (!(x = BN_bin2bn(blob->XCoordinate, nbytes, NULL))) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPUBLICKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!(y = BN_bin2bn(blob->YCoordinate, nbytes, NULL))) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPUBLICKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!EC_KEY_set_public_key_affine_coordinates(ec_key, x, y)) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPUBLICKEYBLOB, SKF_R_INVALID_PUBLIC_KEY);
|
|
goto end;
|
|
}
|
|
|
|
ret = 1;
|
|
end:
|
|
BN_free(x);
|
|
BN_free(y);
|
|
return ret;
|
|
}
|
|
|
|
int EC_KEY_get_ECCPUBLICKEYBLOB(EC_KEY *ec_key, ECCPUBLICKEYBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
int nbytes;
|
|
BIGNUM *x = NULL;
|
|
BIGNUM *y = NULL;
|
|
BN_CTX *bn_ctx = NULL;
|
|
const EC_GROUP *group = EC_KEY_get0_group(ec_key);
|
|
const EC_POINT *point = EC_KEY_get0_public_key(ec_key);
|
|
|
|
nbytes = (EC_GROUP_get_degree(group) + 7)/8;
|
|
if (nbytes > ECC_MAX_MODULUS_BITS_LEN/8) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, SKF_R_INVALID_KEY_LENGTH);
|
|
goto end;
|
|
}
|
|
|
|
x = BN_new();
|
|
y = BN_new();
|
|
bn_ctx = BN_CTX_new();
|
|
if (!x || !y || !bn_ctx) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) {
|
|
if (!EC_POINT_get_affine_coordinates_GFp(group, point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
} else {
|
|
if (!EC_POINT_get_affine_coordinates_GF2m(group, point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
}
|
|
|
|
memset(blob, 0, sizeof(*blob));
|
|
blob->BitLen = EC_GROUP_get_degree(group);
|
|
if (!BN_bn2bin(x, blob->XCoordinate + nbytes - BN_num_bytes(x))) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!BN_bn2bin(y, blob->YCoordinate + nbytes - BN_num_bytes(y))) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPUBLICKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
ret = 1;
|
|
end:
|
|
BN_free(x);
|
|
BN_free(y);
|
|
BN_CTX_free(bn_ctx);
|
|
return ret;
|
|
}
|
|
|
|
int EC_KEY_set_ECCPRIVATEKEYBLOB(EC_KEY *ec_key, const ECCPRIVATEKEYBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
BIGNUM *d = NULL;
|
|
int nbytes;
|
|
|
|
//FIXME: is this right?
|
|
if (blob->BitLen != EC_GROUP_get_degree(EC_KEY_get0_group(ec_key))) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPRIVATEKEYBLOB, SKF_R_INVALID_KEY_LENGTH);
|
|
goto end;
|
|
}
|
|
|
|
nbytes = (blob->BitLen + 7)/8;
|
|
|
|
if (!(d = BN_bin2bn(blob->PrivateKey, nbytes, NULL))) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPRIVATEKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!EC_KEY_set_private_key(ec_key, d)) {
|
|
SKFerr(SKF_F_EC_KEY_SET_ECCPRIVATEKEYBLOB, SKF_R_INVALID_PRIVATE_KEY);
|
|
goto end;
|
|
}
|
|
|
|
ret = 1;
|
|
end:
|
|
BN_clear_free(d);
|
|
return ret;
|
|
}
|
|
|
|
int EC_KEY_get_ECCPRIVATEKEYBLOB(EC_KEY *ec_key, ECCPRIVATEKEYBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
BIGNUM *order = NULL;
|
|
const BIGNUM *d;
|
|
int nbytes;
|
|
|
|
if (!(order = BN_new())) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPRIVATEKEYBLOB, SKF_R_MALLOC_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
if (!EC_GROUP_get_order(EC_KEY_get0_group(ec_key), order, NULL)) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPRIVATEKEYBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
|
|
nbytes = BN_num_bytes(order);
|
|
if (nbytes > ECC_MAX_MODULUS_BITS_LEN/8) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPRIVATEKEYBLOB, SKF_R_INVALID_KEY_LENGTH);
|
|
goto end;
|
|
}
|
|
|
|
if (!(d = EC_KEY_get0_private_key(ec_key))) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPRIVATEKEYBLOB, SKF_R_INVALID_EC_KEY);
|
|
goto end;
|
|
}
|
|
|
|
if (!BN_bn2bin(d, blob->PrivateKey + nbytes - BN_num_bytes(d))) {
|
|
SKFerr(SKF_F_EC_KEY_GET_ECCPRIVATEKEYBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
end:
|
|
BN_free(order);
|
|
return ret;
|
|
}
|
|
|
|
SM2_CIPHERTEXT_VALUE *SM2_CIPHERTEXT_VALUE_new_from_ECCCIPHERBLOB(
|
|
const ECCCIPHERBLOB *blob)
|
|
{
|
|
int ok = 0;
|
|
SM2_CIPHERTEXT_VALUE *ret = NULL;
|
|
EC_GROUP *group = NULL;
|
|
|
|
if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_NEW_FROM_ECCCIPHERBLOB,
|
|
ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
|
|
if (!(ret = SM2_CIPHERTEXT_VALUE_new(group))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_NEW_FROM_ECCCIPHERBLOB,
|
|
SKF_R_MALLOC_FAILED);
|
|
goto end;
|
|
}
|
|
|
|
if (!SM2_CIPHERTEXT_VALUE_set_ECCCIPHERBLOB(ret, blob)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_NEW_FROM_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_EC_PUBLIC_KEY);
|
|
goto end;
|
|
}
|
|
|
|
ok = 1;
|
|
|
|
end:
|
|
if (!ok) {
|
|
SM2_CIPHERTEXT_VALUE_free(ret);
|
|
ret = NULL;
|
|
}
|
|
EC_GROUP_free(group);
|
|
return ret;
|
|
}
|
|
|
|
int SM2_CIPHERTEXT_VALUE_set_ECCCIPHERBLOB(SM2_CIPHERTEXT_VALUE *cv,
|
|
const ECCCIPHERBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
EC_GROUP *group = NULL;
|
|
BIGNUM *x = NULL;
|
|
BIGNUM *y = NULL;
|
|
BN_CTX *bn_ctx = NULL;
|
|
int nbytes;
|
|
|
|
if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB,
|
|
ERR_R_EC_LIB);
|
|
return 0;
|
|
}
|
|
|
|
nbytes = (EC_GROUP_get_degree(group) + 7)/8;
|
|
if (nbytes > ECC_MAX_XCOORDINATE_BITS_LEN/8) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_KEY_LENGTH);
|
|
goto end;
|
|
}
|
|
|
|
if (!(x = BN_bin2bn(blob->XCoordinate, nbytes, NULL))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!(y = BN_bin2bn(blob->YCoordinate, nbytes, NULL))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!(bn_ctx = BN_CTX_new())) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
if (!cv->ephem_point) {
|
|
if (!(cv->ephem_point = EC_POINT_new(group))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
}
|
|
if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) {
|
|
if (!EC_POINT_set_affine_coordinates_GFp(group, cv->ephem_point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
} else {
|
|
if (!EC_POINT_get_affine_coordinates_GF2m(group, cv->ephem_point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
}
|
|
|
|
memcpy(cv->mactag, blob->HASH, 32);
|
|
cv->mactag_size = 32;
|
|
|
|
if ((cv->ciphertext_size = blob->CipherLen) <= 0) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_CIPHERTEXT_LENGTH);
|
|
goto end;
|
|
}
|
|
if (!(cv->ciphertext = OPENSSL_realloc(cv->ciphertext, blob->CipherLen))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_SET_ECCCIPHERBLOB,
|
|
SKF_R_MALLOC_FAILED);
|
|
goto end;
|
|
}
|
|
memcpy(cv->ciphertext, blob->Cipher, blob->CipherLen);
|
|
|
|
ret = 0;
|
|
|
|
end:
|
|
EC_GROUP_free(group);
|
|
BN_free(x);
|
|
BN_free(y);
|
|
BN_CTX_free(bn_ctx);
|
|
return ret;
|
|
}
|
|
|
|
int SM2_CIPHERTEXT_VALUE_get_ECCCIPHERBLOB(const SM2_CIPHERTEXT_VALUE *cv,
|
|
ECCCIPHERBLOB *blob)
|
|
{
|
|
int ret = 0;
|
|
EC_GROUP *group = NULL;
|
|
BIGNUM *x = NULL;
|
|
BIGNUM *y = NULL;
|
|
BN_CTX *bn_ctx = NULL;
|
|
|
|
if (!(group = EC_GROUP_new_by_curve_name(NID_sm2p256v1))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
return 0;
|
|
}
|
|
|
|
x = BN_new();
|
|
y = BN_new();
|
|
bn_ctx = BN_CTX_new();
|
|
if (!x || !y || !bn_ctx) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) {
|
|
if (!EC_POINT_get_affine_coordinates_GFp(group, cv->ephem_point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
} else {
|
|
if (!EC_POINT_get_affine_coordinates_GF2m(group, cv->ephem_point, x, y, bn_ctx)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_EC_LIB);
|
|
goto end;
|
|
}
|
|
}
|
|
|
|
if ((BN_num_bytes(x) > 256/8) || (BN_num_bytes(y) > 256/8)) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_CIPHERTEXT_POINT);
|
|
goto end;
|
|
}
|
|
if (!BN_bn2bin(x, blob->XCoordinate + 256/8 - BN_num_bytes(x))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
if (!BN_bn2bin(y, blob->YCoordinate + 256/8 - BN_num_bytes(y))) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB, ERR_R_BN_LIB);
|
|
goto end;
|
|
}
|
|
|
|
if (cv->mactag_size != 32) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_CIPHERTEXT_MAC);
|
|
goto end;
|
|
}
|
|
memcpy(blob->HASH, cv->mactag, cv->mactag_size);
|
|
|
|
if (cv->ciphertext_size <= 0) {
|
|
SKFerr(SKF_F_SM2_CIPHERTEXT_VALUE_GET_ECCCIPHERBLOB,
|
|
SKF_R_INVALID_CIPHERTEXT_LENGTH);
|
|
goto end;
|
|
}
|
|
memcpy(blob->Cipher, cv->ciphertext, cv->ciphertext_size);
|
|
|
|
ret = 1;
|
|
end:
|
|
EC_GROUP_free(group);
|
|
BN_free(x);
|
|
BN_free(y);
|
|
BN_CTX_free(bn_ctx);
|
|
return ret;
|
|
}
|
|
|
|
ECDSA_SIG *ECDSA_SIG_new_from_ECCSIGNATUREBLOB(const ECCSIGNATUREBLOB *blob)
|
|
{
|
|
ECDSA_SIG *ret = NULL;
|
|
|
|
if (!(ret = ECDSA_SIG_new())) {
|
|
SKFerr(SKF_F_ECDSA_SIG_NEW_FROM_ECCSIGNATUREBLOB,
|
|
SKF_R_MALLOC_FAILED);
|
|
return NULL;
|
|
}
|
|
|
|
if (!ECDSA_SIG_set_ECCSIGNATUREBLOB(ret, blob)) {
|
|
SKFerr(SKF_F_ECDSA_SIG_NEW_FROM_ECCSIGNATUREBLOB,
|
|
SKF_R_INVALID_SIGNATURE);
|
|
ECDSA_SIG_free(ret);
|
|
return NULL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int ECDSA_SIG_get_ECCSIGNATUREBLOB(const ECDSA_SIG *sig, ECCSIGNATUREBLOB *blob)
|
|
{
|
|
if ((BN_num_bytes(sig->r) > 256/8) || (BN_num_bytes(sig->s) > 256/8)) {
|
|
SKFerr(SKF_F_ECDSA_SIG_GET_ECCSIGNATUREBLOB, SKF_R_INVALID_BIGNUM_LENGTH);
|
|
return SAR_FAIL;
|
|
}
|
|
|
|
if (!BN_bn2bin(sig->r, blob->r + 256/8 - BN_num_bytes(sig->r))) {
|
|
SKFerr(SKF_F_ECDSA_SIG_GET_ECCSIGNATUREBLOB, ERR_R_BN_LIB);
|
|
return SAR_FAIL;
|
|
}
|
|
|
|
if (!BN_bn2bin(sig->s, blob->s + 256/8 - BN_num_bytes(sig->s))) {
|
|
SKFerr(SKF_F_ECDSA_SIG_GET_ECCSIGNATUREBLOB, ERR_R_BN_LIB);
|
|
return SAR_FAIL;
|
|
}
|
|
|
|
return SAR_OK;
|
|
}
|
|
|
|
int ECDSA_SIG_set_ECCSIGNATUREBLOB(ECDSA_SIG *sig, const ECCSIGNATUREBLOB *blob)
|
|
{
|
|
if (!(sig->r = BN_bin2bn(blob->r, 256/8, sig->r))) {
|
|
SKFerr(SKF_F_ECDSA_SIG_SET_ECCSIGNATUREBLOB, ERR_R_BN_LIB);
|
|
return SAR_FAIL;
|
|
}
|
|
|
|
if (!(sig->s = BN_bin2bn(blob->s, 256/8, sig->s))) {
|
|
SKFerr(SKF_F_ECDSA_SIG_SET_ECCSIGNATUREBLOB, ERR_R_BN_LIB);
|
|
return SAR_FAIL;
|
|
}
|
|
|
|
return SAR_OK;
|
|
}
|
|
|