• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young (eay@cryptsoft.com).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to.  The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  *    notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  *    notice, this list of conditions and the following disclaimer in the
29  *    documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  *    must display the following acknowledgement:
32  *    "This product includes cryptographic software written by
33  *     Eric Young (eay@cryptsoft.com)"
34  *    The word 'cryptographic' can be left out if the rouines from the library
35  *    being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  *    the apps directory (application code) you must include an acknowledgement:
38  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.] */
56 
57 #include <openssl/digest.h>
58 
59 #include <string.h>
60 
61 #include <openssl/asn1.h>
62 #include <openssl/bytestring.h>
63 #include <openssl/nid.h>
64 
65 #include "internal.h"
66 #include "../internal.h"
67 
68 
69 struct nid_to_digest {
70   int nid;
71   const EVP_MD* (*md_func)(void);
72   const char *short_name;
73   const char *long_name;
74 };
75 
76 static const struct nid_to_digest nid_to_digest_mapping[] = {
77     {NID_md4, EVP_md4, SN_md4, LN_md4},
78     {NID_md5, EVP_md5, SN_md5, LN_md5},
79     {NID_sha1, EVP_sha1, SN_sha1, LN_sha1},
80     {NID_sha224, EVP_sha224, SN_sha224, LN_sha224},
81     {NID_sha256, EVP_sha256, SN_sha256, LN_sha256},
82     {NID_sha384, EVP_sha384, SN_sha384, LN_sha384},
83     {NID_sha512, EVP_sha512, SN_sha512, LN_sha512},
84     {NID_md5_sha1, EVP_md5_sha1, SN_md5_sha1, LN_md5_sha1},
85     /* As a remnant of signing |EVP_MD|s, OpenSSL returned the corresponding
86      * hash function when given a signature OID. To avoid unintended lax parsing
87      * of hash OIDs, this is no longer supported for lookup by OID or NID.
88      * Node.js, however, exposes |EVP_get_digestbyname|'s full behavior to
89      * consumers so we retain it there. */
90     {NID_undef, EVP_sha1, SN_dsaWithSHA, LN_dsaWithSHA},
91     {NID_undef, EVP_sha1, SN_dsaWithSHA1, LN_dsaWithSHA1},
92     {NID_undef, EVP_sha1, SN_ecdsa_with_SHA1, NULL},
93     {NID_undef, EVP_md5, SN_md5WithRSAEncryption, LN_md5WithRSAEncryption},
94     {NID_undef, EVP_sha1, SN_sha1WithRSAEncryption, LN_sha1WithRSAEncryption},
95     {NID_undef, EVP_sha224, SN_sha224WithRSAEncryption,
96      LN_sha224WithRSAEncryption},
97     {NID_undef, EVP_sha256, SN_sha256WithRSAEncryption,
98      LN_sha256WithRSAEncryption},
99     {NID_undef, EVP_sha384, SN_sha384WithRSAEncryption,
100      LN_sha384WithRSAEncryption},
101     {NID_undef, EVP_sha512, SN_sha512WithRSAEncryption,
102      LN_sha512WithRSAEncryption},
103 };
104 
EVP_get_digestbynid(int nid)105 const EVP_MD* EVP_get_digestbynid(int nid) {
106   if (nid == NID_undef) {
107     /* Skip the |NID_undef| entries in |nid_to_digest_mapping|. */
108     return NULL;
109   }
110 
111   for (unsigned i = 0; i < OPENSSL_ARRAY_SIZE(nid_to_digest_mapping); i++) {
112     if (nid_to_digest_mapping[i].nid == nid) {
113       return nid_to_digest_mapping[i].md_func();
114     }
115   }
116 
117   return NULL;
118 }
119 
120 static const struct {
121   uint8_t oid[9];
122   uint8_t oid_len;
123   const EVP_MD *(*md_func) (void);
124 } kMDOIDs[] = {
125   /* 1.2.840.113549.2.4 */
126   { {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x04}, 8, EVP_md4 },
127   /* 1.2.840.113549.2.5 */
128   { {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05}, 8, EVP_md5 },
129   /* 1.3.14.3.2.26 */
130   { {0x2b, 0x0e, 0x03, 0x02, 0x1a}, 5, EVP_sha1 },
131   /* 2.16.840.1.101.3.4.2.1 */
132   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01}, 9, EVP_sha256 },
133   /* 2.16.840.1.101.3.4.2.2 */
134   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02}, 9, EVP_sha384 },
135   /* 2.16.840.1.101.3.4.2.3 */
136   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03}, 9, EVP_sha512 },
137   /* 2.16.840.1.101.3.4.2.4 */
138   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04}, 9, EVP_sha224 },
139 };
140 
cbs_to_md(const CBS * cbs)141 static const EVP_MD *cbs_to_md(const CBS *cbs) {
142   for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(kMDOIDs); i++) {
143     if (CBS_len(cbs) == kMDOIDs[i].oid_len &&
144         OPENSSL_memcmp(CBS_data(cbs), kMDOIDs[i].oid, kMDOIDs[i].oid_len) ==
145             0) {
146       return kMDOIDs[i].md_func();
147     }
148   }
149 
150   return NULL;
151 }
152 
EVP_get_digestbyobj(const ASN1_OBJECT * obj)153 const EVP_MD *EVP_get_digestbyobj(const ASN1_OBJECT *obj) {
154   /* Handle objects with no corresponding OID. */
155   if (obj->nid != NID_undef) {
156     return EVP_get_digestbynid(obj->nid);
157   }
158 
159   CBS cbs;
160   CBS_init(&cbs, obj->data, obj->length);
161   return cbs_to_md(&cbs);
162 }
163 
EVP_parse_digest_algorithm(CBS * cbs)164 const EVP_MD *EVP_parse_digest_algorithm(CBS *cbs) {
165   CBS algorithm, oid;
166   if (!CBS_get_asn1(cbs, &algorithm, CBS_ASN1_SEQUENCE) ||
167       !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) {
168     OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
169     return NULL;
170   }
171 
172   const EVP_MD *ret = cbs_to_md(&oid);
173   if (ret == NULL) {
174     OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH);
175     return NULL;
176   }
177 
178   /* The parameters, if present, must be NULL. Historically, whether the NULL
179    * was included or omitted was not well-specified. When parsing an
180    * AlgorithmIdentifier, we allow both. (Note this code is not used when
181    * verifying RSASSA-PKCS1-v1_5 signatures.) */
182   if (CBS_len(&algorithm) > 0) {
183     CBS param;
184     if (!CBS_get_asn1(&algorithm, &param, CBS_ASN1_NULL) ||
185         CBS_len(&param) != 0 ||
186         CBS_len(&algorithm) != 0) {
187       OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
188       return NULL;
189     }
190   }
191 
192   return ret;
193 }
194 
EVP_get_digestbyname(const char * name)195 const EVP_MD *EVP_get_digestbyname(const char *name) {
196   for (unsigned i = 0; i < OPENSSL_ARRAY_SIZE(nid_to_digest_mapping); i++) {
197     const char *short_name = nid_to_digest_mapping[i].short_name;
198     const char *long_name = nid_to_digest_mapping[i].long_name;
199     if ((short_name && strcmp(short_name, name) == 0) ||
200         (long_name && strcmp(long_name, name) == 0)) {
201       return nid_to_digest_mapping[i].md_func();
202     }
203   }
204 
205   return NULL;
206 }
207