Home | History | Annotate | Download | only in digest_extra
      1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com)
      2  * All rights reserved.
      3  *
      4  * This package is an SSL implementation written
      5  * by Eric Young (eay (at) cryptsoft.com).
      6  * The implementation was written so as to conform with Netscapes SSL.
      7  *
      8  * This library is free for commercial and non-commercial use as long as
      9  * the following conditions are aheared to.  The following conditions
     10  * apply to all code found in this distribution, be it the RC4, RSA,
     11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     12  * included with this distribution is covered by the same copyright terms
     13  * except that the holder is Tim Hudson (tjh (at) cryptsoft.com).
     14  *
     15  * Copyright remains Eric Young's, and as such any Copyright notices in
     16  * the code are not to be removed.
     17  * If this package is used in a product, Eric Young should be given attribution
     18  * as the author of the parts of the library used.
     19  * This can be in the form of a textual message at program startup or
     20  * in documentation (online or textual) provided with the package.
     21  *
     22  * Redistribution and use in source and binary forms, with or without
     23  * modification, are permitted provided that the following conditions
     24  * are met:
     25  * 1. Redistributions of source code must retain the copyright
     26  *    notice, this list of conditions and the following disclaimer.
     27  * 2. Redistributions in binary form must reproduce the above copyright
     28  *    notice, this list of conditions and the following disclaimer in the
     29  *    documentation and/or other materials provided with the distribution.
     30  * 3. All advertising materials mentioning features or use of this software
     31  *    must display the following acknowledgement:
     32  *    "This product includes cryptographic software written by
     33  *     Eric Young (eay (at) cryptsoft.com)"
     34  *    The word 'cryptographic' can be left out if the rouines from the library
     35  *    being used are not cryptographic related :-).
     36  * 4. If you include any Windows specific code (or a derivative thereof) from
     37  *    the apps directory (application code) you must include an acknowledgement:
     38  *    "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)"
     39  *
     40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     50  * SUCH DAMAGE.
     51  *
     52  * The licence and distribution terms for any publically available version or
     53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
     54  * copied and put under another distribution licence
     55  * [including the GNU Public Licence.] */
     56 
     57 #include <openssl/digest.h>
     58 
     59 #include <string.h>
     60 
     61 #include <openssl/asn1.h>
     62 #include <openssl/bytestring.h>
     63 #include <openssl/nid.h>
     64 
     65 #include "internal.h"
     66 #include "../internal.h"
     67 
     68 
     69 struct nid_to_digest {
     70   int nid;
     71   const EVP_MD* (*md_func)(void);
     72   const char *short_name;
     73   const char *long_name;
     74 };
     75 
     76 static const struct nid_to_digest nid_to_digest_mapping[] = {
     77     {NID_md4, EVP_md4, SN_md4, LN_md4},
     78     {NID_md5, EVP_md5, SN_md5, LN_md5},
     79     {NID_sha1, EVP_sha1, SN_sha1, LN_sha1},
     80     {NID_sha224, EVP_sha224, SN_sha224, LN_sha224},
     81     {NID_sha256, EVP_sha256, SN_sha256, LN_sha256},
     82     {NID_sha384, EVP_sha384, SN_sha384, LN_sha384},
     83     {NID_sha512, EVP_sha512, SN_sha512, LN_sha512},
     84     {NID_md5_sha1, EVP_md5_sha1, SN_md5_sha1, LN_md5_sha1},
     85     /* As a remnant of signing |EVP_MD|s, OpenSSL returned the corresponding
     86      * hash function when given a signature OID. To avoid unintended lax parsing
     87      * of hash OIDs, this is no longer supported for lookup by OID or NID.
     88      * Node.js, however, exposes |EVP_get_digestbyname|'s full behavior to
     89      * consumers so we retain it there. */
     90     {NID_undef, EVP_sha1, SN_dsaWithSHA, LN_dsaWithSHA},
     91     {NID_undef, EVP_sha1, SN_dsaWithSHA1, LN_dsaWithSHA1},
     92     {NID_undef, EVP_sha1, SN_ecdsa_with_SHA1, NULL},
     93     {NID_undef, EVP_md5, SN_md5WithRSAEncryption, LN_md5WithRSAEncryption},
     94     {NID_undef, EVP_sha1, SN_sha1WithRSAEncryption, LN_sha1WithRSAEncryption},
     95     {NID_undef, EVP_sha224, SN_sha224WithRSAEncryption,
     96      LN_sha224WithRSAEncryption},
     97     {NID_undef, EVP_sha256, SN_sha256WithRSAEncryption,
     98      LN_sha256WithRSAEncryption},
     99     {NID_undef, EVP_sha384, SN_sha384WithRSAEncryption,
    100      LN_sha384WithRSAEncryption},
    101     {NID_undef, EVP_sha512, SN_sha512WithRSAEncryption,
    102      LN_sha512WithRSAEncryption},
    103 };
    104 
    105 const EVP_MD* EVP_get_digestbynid(int nid) {
    106   if (nid == NID_undef) {
    107     /* Skip the |NID_undef| entries in |nid_to_digest_mapping|. */
    108     return NULL;
    109   }
    110 
    111   for (unsigned i = 0; i < OPENSSL_ARRAY_SIZE(nid_to_digest_mapping); i++) {
    112     if (nid_to_digest_mapping[i].nid == nid) {
    113       return nid_to_digest_mapping[i].md_func();
    114     }
    115   }
    116 
    117   return NULL;
    118 }
    119 
    120 static const struct {
    121   uint8_t oid[9];
    122   uint8_t oid_len;
    123   const EVP_MD *(*md_func) (void);
    124 } kMDOIDs[] = {
    125   /* 1.2.840.113549.2.4 */
    126   { {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x04}, 8, EVP_md4 },
    127   /* 1.2.840.113549.2.5 */
    128   { {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05}, 8, EVP_md5 },
    129   /* 1.3.14.3.2.26 */
    130   { {0x2b, 0x0e, 0x03, 0x02, 0x1a}, 5, EVP_sha1 },
    131   /* 2.16.840.1.101.3.4.2.1 */
    132   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01}, 9, EVP_sha256 },
    133   /* 2.16.840.1.101.3.4.2.2 */
    134   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02}, 9, EVP_sha384 },
    135   /* 2.16.840.1.101.3.4.2.3 */
    136   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03}, 9, EVP_sha512 },
    137   /* 2.16.840.1.101.3.4.2.4 */
    138   { {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04}, 9, EVP_sha224 },
    139 };
    140 
    141 static const EVP_MD *cbs_to_md(const CBS *cbs) {
    142   for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(kMDOIDs); i++) {
    143     if (CBS_len(cbs) == kMDOIDs[i].oid_len &&
    144         OPENSSL_memcmp(CBS_data(cbs), kMDOIDs[i].oid, kMDOIDs[i].oid_len) ==
    145             0) {
    146       return kMDOIDs[i].md_func();
    147     }
    148   }
    149 
    150   return NULL;
    151 }
    152 
    153 const EVP_MD *EVP_get_digestbyobj(const ASN1_OBJECT *obj) {
    154   /* Handle objects with no corresponding OID. */
    155   if (obj->nid != NID_undef) {
    156     return EVP_get_digestbynid(obj->nid);
    157   }
    158 
    159   CBS cbs;
    160   CBS_init(&cbs, obj->data, obj->length);
    161   return cbs_to_md(&cbs);
    162 }
    163 
    164 const EVP_MD *EVP_parse_digest_algorithm(CBS *cbs) {
    165   CBS algorithm, oid;
    166   if (!CBS_get_asn1(cbs, &algorithm, CBS_ASN1_SEQUENCE) ||
    167       !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) {
    168     OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
    169     return NULL;
    170   }
    171 
    172   const EVP_MD *ret = cbs_to_md(&oid);
    173   if (ret == NULL) {
    174     OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH);
    175     return NULL;
    176   }
    177 
    178   /* The parameters, if present, must be NULL. Historically, whether the NULL
    179    * was included or omitted was not well-specified. When parsing an
    180    * AlgorithmIdentifier, we allow both. (Note this code is not used when
    181    * verifying RSASSA-PKCS1-v1_5 signatures.) */
    182   if (CBS_len(&algorithm) > 0) {
    183     CBS param;
    184     if (!CBS_get_asn1(&algorithm, &param, CBS_ASN1_NULL) ||
    185         CBS_len(&param) != 0 ||
    186         CBS_len(&algorithm) != 0) {
    187       OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
    188       return NULL;
    189     }
    190   }
    191 
    192   return ret;
    193 }
    194 
    195 const EVP_MD *EVP_get_digestbyname(const char *name) {
    196   for (unsigned i = 0; i < OPENSSL_ARRAY_SIZE(nid_to_digest_mapping); i++) {
    197     const char *short_name = nid_to_digest_mapping[i].short_name;
    198     const char *long_name = nid_to_digest_mapping[i].long_name;
    199     if ((short_name && strcmp(short_name, name) == 0) ||
    200         (long_name && strcmp(long_name, name) == 0)) {
    201       return nid_to_digest_mapping[i].md_func();
    202     }
    203   }
    204 
    205   return NULL;
    206 }
    207