1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
| /*
| * Copyright 2007-2018 The OpenSSL Project Authors. All Rights Reserved.
| *
| * Licensed under the OpenSSL license (the "License"). You may not use
| * this file except in compliance with the License. You can obtain a copy
| * in the file LICENSE in the source distribution or at
| * https://www.openssl.org/source/license.html
| */
|
| #include <stdio.h>
| #include "internal/cryptlib.h"
| #include <openssl/evp.h>
| #include "crypto/asn1.h"
| #include "crypto/siphash.h"
| #include "siphash_local.h"
| #include "crypto/evp.h"
|
| /*
| * SIPHASH "ASN1" method. This is just here to indicate the maximum
| * SIPHASH output length and to free up a SIPHASH key.
| */
|
| static int siphash_size(const EVP_PKEY *pkey)
| {
| return SIPHASH_MAX_DIGEST_SIZE;
| }
|
| static void siphash_key_free(EVP_PKEY *pkey)
| {
| ASN1_OCTET_STRING *os = EVP_PKEY_get0(pkey);
|
| if (os != NULL) {
| if (os->data != NULL)
| OPENSSL_cleanse(os->data, os->length);
| ASN1_OCTET_STRING_free(os);
| }
| }
|
| static int siphash_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
| {
| /* nothing (including ASN1_PKEY_CTRL_DEFAULT_MD_NID), is supported */
| return -2;
| }
|
| static int siphash_pkey_public_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
| {
| return ASN1_OCTET_STRING_cmp(EVP_PKEY_get0(a), EVP_PKEY_get0(b));
| }
|
| static int siphash_set_priv_key(EVP_PKEY *pkey, const unsigned char *priv,
| size_t len)
| {
| ASN1_OCTET_STRING *os;
|
| if (pkey->pkey.ptr != NULL || len != SIPHASH_KEY_SIZE)
| return 0;
|
| os = ASN1_OCTET_STRING_new();
| if (os == NULL)
| return 0;
|
| if (!ASN1_OCTET_STRING_set(os, priv, len)) {
| ASN1_OCTET_STRING_free(os);
| return 0;
| }
|
| pkey->pkey.ptr = os;
| return 1;
| }
|
| static int siphash_get_priv_key(const EVP_PKEY *pkey, unsigned char *priv,
| size_t *len)
| {
| ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey.ptr;
|
| if (priv == NULL) {
| *len = SIPHASH_KEY_SIZE;
| return 1;
| }
|
| if (os == NULL || *len < SIPHASH_KEY_SIZE)
| return 0;
|
| memcpy(priv, ASN1_STRING_get0_data(os), ASN1_STRING_length(os));
| *len = SIPHASH_KEY_SIZE;
|
| return 1;
| }
|
| const EVP_PKEY_ASN1_METHOD siphash_asn1_meth = {
| EVP_PKEY_SIPHASH,
| EVP_PKEY_SIPHASH,
| 0,
|
| "SIPHASH",
| "OpenSSL SIPHASH method",
|
| 0, 0, siphash_pkey_public_cmp, 0,
|
| 0, 0, 0,
|
| siphash_size,
| 0, 0,
| 0, 0, 0, 0, 0, 0, 0,
|
| siphash_key_free,
| siphash_pkey_ctrl,
| NULL,
| NULL,
|
| NULL,
| NULL,
| NULL,
|
| NULL,
| NULL,
| NULL,
|
| siphash_set_priv_key,
| NULL,
| siphash_get_priv_key,
| NULL,
| };
|
|