]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/unbound/validator/val_secalgo.c
MFV 364468:
[FreeBSD/FreeBSD.git] / contrib / unbound / validator / val_secalgo.c
1 /*
2  * validator/val_secalgo.c - validator security algorithm functions.
3  *
4  * Copyright (c) 2012, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  * 
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  * 
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  * 
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  * 
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35
36 /**
37  * \file
38  *
39  * This file contains helper functions for the validator module.
40  * These functions take raw data buffers, formatted for crypto verification,
41  * and do the library calls (for the crypto library in use).
42  */
43 #include "config.h"
44 /* packed_rrset on top to define enum types (forced by c99 standard) */
45 #include "util/data/packed_rrset.h"
46 #include "validator/val_secalgo.h"
47 #include "validator/val_nsec3.h"
48 #include "util/log.h"
49 #include "sldns/rrdef.h"
50 #include "sldns/keyraw.h"
51 #include "sldns/sbuffer.h"
52
53 #if !defined(HAVE_SSL) && !defined(HAVE_NSS) && !defined(HAVE_NETTLE)
54 #error "Need crypto library to do digital signature cryptography"
55 #endif
56
57 /** fake DSA support for unit tests */
58 int fake_dsa = 0;
59 /** fake SHA1 support for unit tests */
60 int fake_sha1 = 0;
61
62 /* OpenSSL implementation */
63 #ifdef HAVE_SSL
64 #ifdef HAVE_OPENSSL_ERR_H
65 #include <openssl/err.h>
66 #endif
67
68 #ifdef HAVE_OPENSSL_RAND_H
69 #include <openssl/rand.h>
70 #endif
71
72 #ifdef HAVE_OPENSSL_CONF_H
73 #include <openssl/conf.h>
74 #endif
75
76 #ifdef HAVE_OPENSSL_ENGINE_H
77 #include <openssl/engine.h>
78 #endif
79
80 #if defined(HAVE_OPENSSL_DSA_H) && defined(USE_DSA)
81 #include <openssl/dsa.h>
82 #endif
83
84 /**
85  * Output a libcrypto openssl error to the logfile.
86  * @param str: string to add to it.
87  * @param e: the error to output, error number from ERR_get_error().
88  */
89 static void
90 log_crypto_error(const char* str, unsigned long e)
91 {
92         char buf[128];
93         /* or use ERR_error_string if ERR_error_string_n is not avail TODO */
94         ERR_error_string_n(e, buf, sizeof(buf));
95         /* buf now contains */
96         /* error:[error code]:[library name]:[function name]:[reason string] */
97         log_err("%s crypto %s", str, buf);
98 }
99
100 /* return size of digest if supported, or 0 otherwise */
101 size_t
102 nsec3_hash_algo_size_supported(int id)
103 {
104         switch(id) {
105         case NSEC3_HASH_SHA1:
106                 return SHA_DIGEST_LENGTH;
107         default:
108                 return 0;
109         }
110 }
111
112 /* perform nsec3 hash. return false on failure */
113 int
114 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
115         unsigned char* res)
116 {
117         switch(algo) {
118         case NSEC3_HASH_SHA1:
119 #ifdef OPENSSL_FIPS
120                 if(!sldns_digest_evp(buf, len, res, EVP_sha1()))
121                         log_crypto_error("could not digest with EVP_sha1",
122                                 ERR_get_error());
123 #else
124                 (void)SHA1(buf, len, res);
125 #endif
126                 return 1;
127         default:
128                 return 0;
129         }
130 }
131
132 void
133 secalgo_hash_sha256(unsigned char* buf, size_t len, unsigned char* res)
134 {
135 #ifdef OPENSSL_FIPS
136         if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
137                 log_crypto_error("could not digest with EVP_sha256",
138                         ERR_get_error());
139 #else
140         (void)SHA256(buf, len, res);
141 #endif
142 }
143
144 /**
145  * Return size of DS digest according to its hash algorithm.
146  * @param algo: DS digest algo.
147  * @return size in bytes of digest, or 0 if not supported.
148  */
149 size_t
150 ds_digest_size_supported(int algo)
151 {
152         switch(algo) {
153                 case LDNS_SHA1:
154 #if defined(HAVE_EVP_SHA1) && defined(USE_SHA1)
155                         return SHA_DIGEST_LENGTH;
156 #else
157                         if(fake_sha1) return 20;
158                         return 0;
159 #endif
160 #ifdef HAVE_EVP_SHA256
161                 case LDNS_SHA256:
162                         return SHA256_DIGEST_LENGTH;
163 #endif
164 #ifdef USE_GOST
165                 case LDNS_HASH_GOST:
166                         /* we support GOST if it can be loaded */
167                         (void)sldns_key_EVP_load_gost_id();
168                         if(EVP_get_digestbyname("md_gost94"))
169                                 return 32;
170                         else    return 0;
171 #endif
172 #ifdef USE_ECDSA
173                 case LDNS_SHA384:
174                         return SHA384_DIGEST_LENGTH;
175 #endif
176                 default: break;
177         }
178         return 0;
179 }
180
181 #ifdef USE_GOST
182 /** Perform GOST hash */
183 static int
184 do_gost94(unsigned char* data, size_t len, unsigned char* dest)
185 {
186         const EVP_MD* md = EVP_get_digestbyname("md_gost94");
187         if(!md) 
188                 return 0;
189         return sldns_digest_evp(data, (unsigned int)len, dest, md);
190 }
191 #endif
192
193 int
194 secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
195         unsigned char* res)
196 {
197         switch(algo) {
198 #if defined(HAVE_EVP_SHA1) && defined(USE_SHA1)
199                 case LDNS_SHA1:
200 #ifdef OPENSSL_FIPS
201                         if(!sldns_digest_evp(buf, len, res, EVP_sha1()))
202                                 log_crypto_error("could not digest with EVP_sha1",
203                                         ERR_get_error());
204 #else
205                         (void)SHA1(buf, len, res);
206 #endif
207                         return 1;
208 #endif
209 #ifdef HAVE_EVP_SHA256
210                 case LDNS_SHA256:
211 #ifdef OPENSSL_FIPS
212                         if(!sldns_digest_evp(buf, len, res, EVP_sha256()))
213                                 log_crypto_error("could not digest with EVP_sha256",
214                                         ERR_get_error());
215 #else
216                         (void)SHA256(buf, len, res);
217 #endif
218                         return 1;
219 #endif
220 #ifdef USE_GOST
221                 case LDNS_HASH_GOST:
222                         if(do_gost94(buf, len, res))
223                                 return 1;
224                         break;
225 #endif
226 #ifdef USE_ECDSA
227                 case LDNS_SHA384:
228 #ifdef OPENSSL_FIPS
229                         if(!sldns_digest_evp(buf, len, res, EVP_sha384()))
230                                 log_crypto_error("could not digest with EVP_sha384",
231                                         ERR_get_error());
232 #else
233                         (void)SHA384(buf, len, res);
234 #endif
235                         return 1;
236 #endif
237                 default: 
238                         verbose(VERB_QUERY, "unknown DS digest algorithm %d", 
239                                 algo);
240                         break;
241         }
242         return 0;
243 }
244
245 /** return true if DNSKEY algorithm id is supported */
246 int
247 dnskey_algo_id_is_supported(int id)
248 {
249         switch(id) {
250         case LDNS_RSAMD5:
251                 /* RFC 6725 deprecates RSAMD5 */
252                 return 0;
253         case LDNS_DSA:
254         case LDNS_DSA_NSEC3:
255 #if defined(USE_DSA) && defined(USE_SHA1)
256                 return 1;
257 #else
258                 if(fake_dsa || fake_sha1) return 1;
259                 return 0;
260 #endif
261
262         case LDNS_RSASHA1:
263         case LDNS_RSASHA1_NSEC3:
264 #ifdef USE_SHA1
265                 return 1;
266 #else
267                 if(fake_sha1) return 1;
268                 return 0;
269 #endif
270
271 #if defined(HAVE_EVP_SHA256) && defined(USE_SHA2)
272         case LDNS_RSASHA256:
273 #endif
274 #if defined(HAVE_EVP_SHA512) && defined(USE_SHA2)
275         case LDNS_RSASHA512:
276 #endif
277 #ifdef USE_ECDSA
278         case LDNS_ECDSAP256SHA256:
279         case LDNS_ECDSAP384SHA384:
280 #endif
281 #ifdef USE_ED25519
282         case LDNS_ED25519:
283 #endif
284 #ifdef USE_ED448
285         case LDNS_ED448:
286 #endif
287 #if (defined(HAVE_EVP_SHA256) && defined(USE_SHA2)) || (defined(HAVE_EVP_SHA512) && defined(USE_SHA2)) || defined(USE_ECDSA) || defined(USE_ED25519) || defined(USE_ED448)
288                 return 1;
289 #endif
290
291 #ifdef USE_GOST
292         case LDNS_ECC_GOST:
293                 /* we support GOST if it can be loaded */
294                 return sldns_key_EVP_load_gost_id();
295 #endif
296         default:
297                 return 0;
298         }
299 }
300
301 #ifdef USE_DSA
302 /**
303  * Setup DSA key digest in DER encoding ... 
304  * @param sig: input is signature output alloced ptr (unless failure).
305  *      caller must free alloced ptr if this routine returns true.
306  * @param len: input is initial siglen, output is output len.
307  * @return false on failure.
308  */
309 static int
310 setup_dsa_sig(unsigned char** sig, unsigned int* len)
311 {
312         unsigned char* orig = *sig;
313         unsigned int origlen = *len;
314         int newlen;
315         BIGNUM *R, *S;
316         DSA_SIG *dsasig;
317
318         /* extract the R and S field from the sig buffer */
319         if(origlen < 1 + 2*SHA_DIGEST_LENGTH)
320                 return 0;
321         R = BN_new();
322         if(!R) return 0;
323         (void) BN_bin2bn(orig + 1, SHA_DIGEST_LENGTH, R);
324         S = BN_new();
325         if(!S) return 0;
326         (void) BN_bin2bn(orig + 21, SHA_DIGEST_LENGTH, S);
327         dsasig = DSA_SIG_new();
328         if(!dsasig) return 0;
329
330 #ifdef HAVE_DSA_SIG_SET0
331         if(!DSA_SIG_set0(dsasig, R, S)) return 0;
332 #else
333 #  ifndef S_SPLINT_S
334         dsasig->r = R;
335         dsasig->s = S;
336 #  endif /* S_SPLINT_S */
337 #endif
338         *sig = NULL;
339         newlen = i2d_DSA_SIG(dsasig, sig);
340         if(newlen < 0) {
341                 DSA_SIG_free(dsasig);
342                 free(*sig);
343                 return 0;
344         }
345         *len = (unsigned int)newlen;
346         DSA_SIG_free(dsasig);
347         return 1;
348 }
349 #endif /* USE_DSA */
350
351 #ifdef USE_ECDSA
352 /**
353  * Setup the ECDSA signature in its encoding that the library wants.
354  * Converts from plain numbers to ASN formatted.
355  * @param sig: input is signature, output alloced ptr (unless failure).
356  *      caller must free alloced ptr if this routine returns true.
357  * @param len: input is initial siglen, output is output len.
358  * @return false on failure.
359  */
360 static int
361 setup_ecdsa_sig(unsigned char** sig, unsigned int* len)
362 {
363         /* convert from two BIGNUMs in the rdata buffer, to ASN notation.
364          * ASN preamble: 30440220 <R 32bytefor256> 0220 <S 32bytefor256>
365          * the '20' is the length of that field (=bnsize).
366 i        * the '44' is the total remaining length.
367          * if negative, start with leading zero.
368          * if starts with 00s, remove them from the number.
369          */
370         uint8_t pre[] = {0x30, 0x44, 0x02, 0x20};
371         int pre_len = 4;
372         uint8_t mid[] = {0x02, 0x20};
373         int mid_len = 2;
374         int raw_sig_len, r_high, s_high, r_rem=0, s_rem=0;
375         int bnsize = (int)((*len)/2);
376         unsigned char* d = *sig;
377         uint8_t* p;
378         /* if too short or not even length, fails */
379         if(*len < 16 || bnsize*2 != (int)*len)
380                 return 0;
381
382         /* strip leading zeroes from r (but not last one) */
383         while(r_rem < bnsize-1 && d[r_rem] == 0)
384                 r_rem++;
385         /* strip leading zeroes from s (but not last one) */
386         while(s_rem < bnsize-1 && d[bnsize+s_rem] == 0)
387                 s_rem++;
388
389         r_high = ((d[0+r_rem]&0x80)?1:0);
390         s_high = ((d[bnsize+s_rem]&0x80)?1:0);
391         raw_sig_len = pre_len + r_high + bnsize - r_rem + mid_len +
392                 s_high + bnsize - s_rem;
393         *sig = (unsigned char*)malloc((size_t)raw_sig_len);
394         if(!*sig)
395                 return 0;
396         p = (uint8_t*)*sig;
397         p[0] = pre[0];
398         p[1] = (uint8_t)(raw_sig_len-2);
399         p[2] = pre[2];
400         p[3] = (uint8_t)(bnsize + r_high - r_rem);
401         p += 4;
402         if(r_high) {
403                 *p = 0;
404                 p += 1;
405         }
406         memmove(p, d+r_rem, (size_t)bnsize-r_rem);
407         p += bnsize-r_rem;
408         memmove(p, mid, (size_t)mid_len-1);
409         p += mid_len-1;
410         *p = (uint8_t)(bnsize + s_high - s_rem);
411         p += 1;
412         if(s_high) {
413                 *p = 0;
414                 p += 1;
415         }
416         memmove(p, d+bnsize+s_rem, (size_t)bnsize-s_rem);
417         *len = (unsigned int)raw_sig_len;
418         return 1;
419 }
420 #endif /* USE_ECDSA */
421
422 #ifdef USE_ECDSA_EVP_WORKAROUND
423 static EVP_MD ecdsa_evp_256_md;
424 static EVP_MD ecdsa_evp_384_md;
425 void ecdsa_evp_workaround_init(void)
426 {
427         /* openssl before 1.0.0 fixes RSA with the SHA256
428          * hash in EVP.  We create one for ecdsa_sha256 */
429         ecdsa_evp_256_md = *EVP_sha256();
430         ecdsa_evp_256_md.required_pkey_type[0] = EVP_PKEY_EC;
431         ecdsa_evp_256_md.verify = (void*)ECDSA_verify;
432
433         ecdsa_evp_384_md = *EVP_sha384();
434         ecdsa_evp_384_md.required_pkey_type[0] = EVP_PKEY_EC;
435         ecdsa_evp_384_md.verify = (void*)ECDSA_verify;
436 }
437 #endif /* USE_ECDSA_EVP_WORKAROUND */
438
439 /**
440  * Setup key and digest for verification. Adjust sig if necessary.
441  *
442  * @param algo: key algorithm
443  * @param evp_key: EVP PKEY public key to create.
444  * @param digest_type: digest type to use
445  * @param key: key to setup for.
446  * @param keylen: length of key.
447  * @return false on failure.
448  */
449 static int
450 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, 
451         unsigned char* key, size_t keylen)
452 {
453 #if defined(USE_DSA) && defined(USE_SHA1)
454         DSA* dsa;
455 #endif
456         RSA* rsa;
457
458         switch(algo) {
459 #if defined(USE_DSA) && defined(USE_SHA1)
460                 case LDNS_DSA:
461                 case LDNS_DSA_NSEC3:
462                         *evp_key = EVP_PKEY_new();
463                         if(!*evp_key) {
464                                 log_err("verify: malloc failure in crypto");
465                                 return 0;
466                         }
467                         dsa = sldns_key_buf2dsa_raw(key, keylen);
468                         if(!dsa) {
469                                 verbose(VERB_QUERY, "verify: "
470                                         "sldns_key_buf2dsa_raw failed");
471                                 return 0;
472                         }
473                         if(EVP_PKEY_assign_DSA(*evp_key, dsa) == 0) {
474                                 verbose(VERB_QUERY, "verify: "
475                                         "EVP_PKEY_assign_DSA failed");
476                                 return 0;
477                         }
478 #ifdef HAVE_EVP_DSS1
479                         *digest_type = EVP_dss1();
480 #else
481                         *digest_type = EVP_sha1();
482 #endif
483
484                         break;
485 #endif /* USE_DSA && USE_SHA1 */
486
487 #if defined(USE_SHA1) || (defined(HAVE_EVP_SHA256) && defined(USE_SHA2)) || (defined(HAVE_EVP_SHA512) && defined(USE_SHA2))
488 #ifdef USE_SHA1
489                 case LDNS_RSASHA1:
490                 case LDNS_RSASHA1_NSEC3:
491 #endif
492 #if defined(HAVE_EVP_SHA256) && defined(USE_SHA2)
493                 case LDNS_RSASHA256:
494 #endif
495 #if defined(HAVE_EVP_SHA512) && defined(USE_SHA2)
496                 case LDNS_RSASHA512:
497 #endif
498                         *evp_key = EVP_PKEY_new();
499                         if(!*evp_key) {
500                                 log_err("verify: malloc failure in crypto");
501                                 return 0;
502                         }
503                         rsa = sldns_key_buf2rsa_raw(key, keylen);
504                         if(!rsa) {
505                                 verbose(VERB_QUERY, "verify: "
506                                         "sldns_key_buf2rsa_raw SHA failed");
507                                 return 0;
508                         }
509                         if(EVP_PKEY_assign_RSA(*evp_key, rsa) == 0) {
510                                 verbose(VERB_QUERY, "verify: "
511                                         "EVP_PKEY_assign_RSA SHA failed");
512                                 return 0;
513                         }
514
515                         /* select SHA version */
516 #if defined(HAVE_EVP_SHA256) && defined(USE_SHA2)
517                         if(algo == LDNS_RSASHA256)
518                                 *digest_type = EVP_sha256();
519                         else
520 #endif
521 #if defined(HAVE_EVP_SHA512) && defined(USE_SHA2)
522                                 if(algo == LDNS_RSASHA512)
523                                 *digest_type = EVP_sha512();
524                         else
525 #endif
526 #ifdef USE_SHA1
527                                 *digest_type = EVP_sha1();
528 #else
529                                 { verbose(VERB_QUERY, "no digest available"); return 0; }
530 #endif
531                         break;
532 #endif /* defined(USE_SHA1) || (defined(HAVE_EVP_SHA256) && defined(USE_SHA2)) || (defined(HAVE_EVP_SHA512) && defined(USE_SHA2)) */
533
534                 case LDNS_RSAMD5:
535                         *evp_key = EVP_PKEY_new();
536                         if(!*evp_key) {
537                                 log_err("verify: malloc failure in crypto");
538                                 return 0;
539                         }
540                         rsa = sldns_key_buf2rsa_raw(key, keylen);
541                         if(!rsa) {
542                                 verbose(VERB_QUERY, "verify: "
543                                         "sldns_key_buf2rsa_raw MD5 failed");
544                                 return 0;
545                         }
546                         if(EVP_PKEY_assign_RSA(*evp_key, rsa) == 0) {
547                                 verbose(VERB_QUERY, "verify: "
548                                         "EVP_PKEY_assign_RSA MD5 failed");
549                                 return 0;
550                         }
551                         *digest_type = EVP_md5();
552
553                         break;
554 #ifdef USE_GOST
555                 case LDNS_ECC_GOST:
556                         *evp_key = sldns_gost2pkey_raw(key, keylen);
557                         if(!*evp_key) {
558                                 verbose(VERB_QUERY, "verify: "
559                                         "sldns_gost2pkey_raw failed");
560                                 return 0;
561                         }
562                         *digest_type = EVP_get_digestbyname("md_gost94");
563                         if(!*digest_type) {
564                                 verbose(VERB_QUERY, "verify: "
565                                         "EVP_getdigest md_gost94 failed");
566                                 return 0;
567                         }
568                         break;
569 #endif
570 #ifdef USE_ECDSA
571                 case LDNS_ECDSAP256SHA256:
572                         *evp_key = sldns_ecdsa2pkey_raw(key, keylen,
573                                 LDNS_ECDSAP256SHA256);
574                         if(!*evp_key) {
575                                 verbose(VERB_QUERY, "verify: "
576                                         "sldns_ecdsa2pkey_raw failed");
577                                 return 0;
578                         }
579 #ifdef USE_ECDSA_EVP_WORKAROUND
580                         *digest_type = &ecdsa_evp_256_md;
581 #else
582                         *digest_type = EVP_sha256();
583 #endif
584                         break;
585                 case LDNS_ECDSAP384SHA384:
586                         *evp_key = sldns_ecdsa2pkey_raw(key, keylen,
587                                 LDNS_ECDSAP384SHA384);
588                         if(!*evp_key) {
589                                 verbose(VERB_QUERY, "verify: "
590                                         "sldns_ecdsa2pkey_raw failed");
591                                 return 0;
592                         }
593 #ifdef USE_ECDSA_EVP_WORKAROUND
594                         *digest_type = &ecdsa_evp_384_md;
595 #else
596                         *digest_type = EVP_sha384();
597 #endif
598                         break;
599 #endif /* USE_ECDSA */
600 #ifdef USE_ED25519
601                 case LDNS_ED25519:
602                         *evp_key = sldns_ed255192pkey_raw(key, keylen);
603                         if(!*evp_key) {
604                                 verbose(VERB_QUERY, "verify: "
605                                         "sldns_ed255192pkey_raw failed");
606                                 return 0;
607                         }
608                         *digest_type = NULL;
609                         break;
610 #endif /* USE_ED25519 */
611 #ifdef USE_ED448
612                 case LDNS_ED448:
613                         *evp_key = sldns_ed4482pkey_raw(key, keylen);
614                         if(!*evp_key) {
615                                 verbose(VERB_QUERY, "verify: "
616                                         "sldns_ed4482pkey_raw failed");
617                                 return 0;
618                         }
619                         *digest_type = NULL;
620                         break;
621 #endif /* USE_ED448 */
622                 default:
623                         verbose(VERB_QUERY, "verify: unknown algorithm %d", 
624                                 algo);
625                         return 0;
626         }
627         return 1;
628 }
629
630 /**
631  * Check a canonical sig+rrset and signature against a dnskey
632  * @param buf: buffer with data to verify, the first rrsig part and the
633  *      canonicalized rrset.
634  * @param algo: DNSKEY algorithm.
635  * @param sigblock: signature rdata field from RRSIG
636  * @param sigblock_len: length of sigblock data.
637  * @param key: public key data from DNSKEY RR.
638  * @param keylen: length of keydata.
639  * @param reason: bogus reason in more detail.
640  * @return secure if verification succeeded, bogus on crypto failure,
641  *      unchecked on format errors and alloc failures.
642  */
643 enum sec_status
644 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, 
645         unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
646         char** reason)
647 {
648         const EVP_MD *digest_type;
649         EVP_MD_CTX* ctx;
650         int res, dofree = 0, docrypto_free = 0;
651         EVP_PKEY *evp_key = NULL;
652
653 #ifndef USE_DSA
654         if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3) &&(fake_dsa||fake_sha1))
655                 return sec_status_secure;
656 #endif
657 #ifndef USE_SHA1
658         if(fake_sha1 && (algo == LDNS_DSA || algo == LDNS_DSA_NSEC3 || algo == LDNS_RSASHA1 || algo == LDNS_RSASHA1_NSEC3))
659                 return sec_status_secure;
660 #endif
661         
662         if(!setup_key_digest(algo, &evp_key, &digest_type, key, keylen)) {
663                 verbose(VERB_QUERY, "verify: failed to setup key");
664                 *reason = "use of key for crypto failed";
665                 EVP_PKEY_free(evp_key);
666                 return sec_status_bogus;
667         }
668 #ifdef USE_DSA
669         /* if it is a DSA signature in bind format, convert to DER format */
670         if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3) && 
671                 sigblock_len == 1+2*SHA_DIGEST_LENGTH) {
672                 if(!setup_dsa_sig(&sigblock, &sigblock_len)) {
673                         verbose(VERB_QUERY, "verify: failed to setup DSA sig");
674                         *reason = "use of key for DSA crypto failed";
675                         EVP_PKEY_free(evp_key);
676                         return sec_status_bogus;
677                 }
678                 docrypto_free = 1;
679         }
680 #endif
681 #if defined(USE_ECDSA) && defined(USE_DSA)
682         else 
683 #endif
684 #ifdef USE_ECDSA
685         if(algo == LDNS_ECDSAP256SHA256 || algo == LDNS_ECDSAP384SHA384) {
686                 /* EVP uses ASN prefix on sig, which is not in the wire data */
687                 if(!setup_ecdsa_sig(&sigblock, &sigblock_len)) {
688                         verbose(VERB_QUERY, "verify: failed to setup ECDSA sig");
689                         *reason = "use of signature for ECDSA crypto failed";
690                         EVP_PKEY_free(evp_key);
691                         return sec_status_bogus;
692                 }
693                 dofree = 1;
694         }
695 #endif /* USE_ECDSA */
696
697         /* do the signature cryptography work */
698 #ifdef HAVE_EVP_MD_CTX_NEW
699         ctx = EVP_MD_CTX_new();
700 #else
701         ctx = (EVP_MD_CTX*)malloc(sizeof(*ctx));
702         if(ctx) EVP_MD_CTX_init(ctx);
703 #endif
704         if(!ctx) {
705                 log_err("EVP_MD_CTX_new: malloc failure");
706                 EVP_PKEY_free(evp_key);
707                 if(dofree) free(sigblock);
708                 else if(docrypto_free) OPENSSL_free(sigblock);
709                 return sec_status_unchecked;
710         }
711 #ifndef HAVE_EVP_DIGESTVERIFY
712         if(EVP_DigestInit(ctx, digest_type) == 0) {
713                 verbose(VERB_QUERY, "verify: EVP_DigestInit failed");
714 #ifdef HAVE_EVP_MD_CTX_NEW
715                 EVP_MD_CTX_destroy(ctx);
716 #else
717                 EVP_MD_CTX_cleanup(ctx);
718                 free(ctx);
719 #endif
720                 EVP_PKEY_free(evp_key);
721                 if(dofree) free(sigblock);
722                 else if(docrypto_free) OPENSSL_free(sigblock);
723                 return sec_status_unchecked;
724         }
725         if(EVP_DigestUpdate(ctx, (unsigned char*)sldns_buffer_begin(buf), 
726                 (unsigned int)sldns_buffer_limit(buf)) == 0) {
727                 verbose(VERB_QUERY, "verify: EVP_DigestUpdate failed");
728 #ifdef HAVE_EVP_MD_CTX_NEW
729                 EVP_MD_CTX_destroy(ctx);
730 #else
731                 EVP_MD_CTX_cleanup(ctx);
732                 free(ctx);
733 #endif
734                 EVP_PKEY_free(evp_key);
735                 if(dofree) free(sigblock);
736                 else if(docrypto_free) OPENSSL_free(sigblock);
737                 return sec_status_unchecked;
738         }
739
740         res = EVP_VerifyFinal(ctx, sigblock, sigblock_len, evp_key);
741 #else /* HAVE_EVP_DIGESTVERIFY */
742         if(EVP_DigestVerifyInit(ctx, NULL, digest_type, NULL, evp_key) == 0) {
743                 verbose(VERB_QUERY, "verify: EVP_DigestVerifyInit failed");
744 #ifdef HAVE_EVP_MD_CTX_NEW
745                 EVP_MD_CTX_destroy(ctx);
746 #else
747                 EVP_MD_CTX_cleanup(ctx);
748                 free(ctx);
749 #endif
750                 EVP_PKEY_free(evp_key);
751                 if(dofree) free(sigblock);
752                 else if(docrypto_free) OPENSSL_free(sigblock);
753                 return sec_status_unchecked;
754         }
755         res = EVP_DigestVerify(ctx, sigblock, sigblock_len,
756                 (unsigned char*)sldns_buffer_begin(buf),
757                 sldns_buffer_limit(buf));
758 #endif
759 #ifdef HAVE_EVP_MD_CTX_NEW
760         EVP_MD_CTX_destroy(ctx);
761 #else
762         EVP_MD_CTX_cleanup(ctx);
763         free(ctx);
764 #endif
765         EVP_PKEY_free(evp_key);
766
767         if(dofree) free(sigblock);
768         else if(docrypto_free) OPENSSL_free(sigblock);
769
770         if(res == 1) {
771                 return sec_status_secure;
772         } else if(res == 0) {
773                 verbose(VERB_QUERY, "verify: signature mismatch");
774                 *reason = "signature crypto failed";
775                 return sec_status_bogus;
776         }
777
778         log_crypto_error("verify:", ERR_get_error());
779         return sec_status_unchecked;
780 }
781
782 /**************************************************/
783 #elif defined(HAVE_NSS)
784 /* libnss implementation */
785 /* nss3 */
786 #include "sechash.h"
787 #include "pk11pub.h"
788 #include "keyhi.h"
789 #include "secerr.h"
790 #include "cryptohi.h"
791 /* nspr4 */
792 #include "prerror.h"
793
794 /* return size of digest if supported, or 0 otherwise */
795 size_t
796 nsec3_hash_algo_size_supported(int id)
797 {
798         switch(id) {
799         case NSEC3_HASH_SHA1:
800                 return SHA1_LENGTH;
801         default:
802                 return 0;
803         }
804 }
805
806 /* perform nsec3 hash. return false on failure */
807 int
808 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
809         unsigned char* res)
810 {
811         switch(algo) {
812         case NSEC3_HASH_SHA1:
813                 (void)HASH_HashBuf(HASH_AlgSHA1, res, buf, (unsigned long)len);
814                 return 1;
815         default:
816                 return 0;
817         }
818 }
819
820 void
821 secalgo_hash_sha256(unsigned char* buf, size_t len, unsigned char* res)
822 {
823         (void)HASH_HashBuf(HASH_AlgSHA256, res, buf, (unsigned long)len);
824 }
825
826 size_t
827 ds_digest_size_supported(int algo)
828 {
829         /* uses libNSS */
830         switch(algo) {
831 #ifdef USE_SHA1
832                 case LDNS_SHA1:
833                         return SHA1_LENGTH;
834 #endif
835 #ifdef USE_SHA2
836                 case LDNS_SHA256:
837                         return SHA256_LENGTH;
838 #endif
839 #ifdef USE_ECDSA
840                 case LDNS_SHA384:
841                         return SHA384_LENGTH;
842 #endif
843                 /* GOST not supported in NSS */
844                 case LDNS_HASH_GOST:
845                 default: break;
846         }
847         return 0;
848 }
849
850 int
851 secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
852         unsigned char* res)
853 {
854         /* uses libNSS */
855         switch(algo) {
856 #ifdef USE_SHA1
857                 case LDNS_SHA1:
858                         return HASH_HashBuf(HASH_AlgSHA1, res, buf, len)
859                                 == SECSuccess;
860 #endif
861 #if defined(USE_SHA2)
862                 case LDNS_SHA256:
863                         return HASH_HashBuf(HASH_AlgSHA256, res, buf, len)
864                                 == SECSuccess;
865 #endif
866 #ifdef USE_ECDSA
867                 case LDNS_SHA384:
868                         return HASH_HashBuf(HASH_AlgSHA384, res, buf, len)
869                                 == SECSuccess;
870 #endif
871                 case LDNS_HASH_GOST:
872                 default: 
873                         verbose(VERB_QUERY, "unknown DS digest algorithm %d", 
874                                 algo);
875                         break;
876         }
877         return 0;
878 }
879
880 int
881 dnskey_algo_id_is_supported(int id)
882 {
883         /* uses libNSS */
884         switch(id) {
885         case LDNS_RSAMD5:
886                 /* RFC 6725 deprecates RSAMD5 */
887                 return 0;
888 #if defined(USE_SHA1) || defined(USE_SHA2)
889 #if defined(USE_DSA) && defined(USE_SHA1)
890         case LDNS_DSA:
891         case LDNS_DSA_NSEC3:
892 #endif
893 #ifdef USE_SHA1
894         case LDNS_RSASHA1:
895         case LDNS_RSASHA1_NSEC3:
896 #endif
897 #ifdef USE_SHA2
898         case LDNS_RSASHA256:
899 #endif
900 #ifdef USE_SHA2
901         case LDNS_RSASHA512:
902 #endif
903                 return 1;
904 #endif /* SHA1 or SHA2 */
905
906 #ifdef USE_ECDSA
907         case LDNS_ECDSAP256SHA256:
908         case LDNS_ECDSAP384SHA384:
909                 return PK11_TokenExists(CKM_ECDSA);
910 #endif
911         case LDNS_ECC_GOST:
912         default:
913                 return 0;
914         }
915 }
916
917 /* return a new public key for NSS */
918 static SECKEYPublicKey* nss_key_create(KeyType ktype)
919 {
920         SECKEYPublicKey* key;
921         PLArenaPool* arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE);
922         if(!arena) {
923                 log_err("out of memory, PORT_NewArena failed");
924                 return NULL;
925         }
926         key = PORT_ArenaZNew(arena, SECKEYPublicKey);
927         if(!key) {
928                 log_err("out of memory, PORT_ArenaZNew failed");
929                 PORT_FreeArena(arena, PR_FALSE);
930                 return NULL;
931         }
932         key->arena = arena;
933         key->keyType = ktype;
934         key->pkcs11Slot = NULL;
935         key->pkcs11ID = CK_INVALID_HANDLE;
936         return key;
937 }
938
939 static SECKEYPublicKey* nss_buf2ecdsa(unsigned char* key, size_t len, int algo)
940 {
941         SECKEYPublicKey* pk;
942         SECItem pub = {siBuffer, NULL, 0};
943         SECItem params = {siBuffer, NULL, 0};
944         static unsigned char param256[] = {
945                 /* OBJECTIDENTIFIER 1.2.840.10045.3.1.7 (P-256)
946                  * {iso(1) member-body(2) us(840) ansi-x962(10045) curves(3) prime(1) prime256v1(7)} */
947                 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07
948         };
949         static unsigned char param384[] = {
950                 /* OBJECTIDENTIFIER 1.3.132.0.34 (P-384)
951                  * {iso(1) identified-organization(3) certicom(132) curve(0) ansip384r1(34)} */
952                 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x22
953         };
954         unsigned char buf[256+2]; /* sufficient for 2*384/8+1 */
955
956         /* check length, which uncompressed must be 2 bignums */
957         if(algo == LDNS_ECDSAP256SHA256) {
958                 if(len != 2*256/8) return NULL;
959                 /* ECCurve_X9_62_PRIME_256V1 */
960         } else if(algo == LDNS_ECDSAP384SHA384) {
961                 if(len != 2*384/8) return NULL;
962                 /* ECCurve_X9_62_PRIME_384R1 */
963         } else    return NULL;
964
965         buf[0] = 0x04; /* POINT_FORM_UNCOMPRESSED */
966         memmove(buf+1, key, len);
967         pub.data = buf;
968         pub.len = len+1;
969         if(algo == LDNS_ECDSAP256SHA256) {
970                 params.data = param256;
971                 params.len = sizeof(param256);
972         } else {
973                 params.data = param384;
974                 params.len = sizeof(param384);
975         }
976
977         pk = nss_key_create(ecKey);
978         if(!pk)
979                 return NULL;
980         pk->u.ec.size = (len/2)*8;
981         if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) {
982                 SECKEY_DestroyPublicKey(pk);
983                 return NULL;
984         }
985         if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, &params)) {
986                 SECKEY_DestroyPublicKey(pk);
987                 return NULL;
988         }
989
990         return pk;
991 }
992
993 static SECKEYPublicKey* nss_buf2dsa(unsigned char* key, size_t len)
994 {
995         SECKEYPublicKey* pk;
996         uint8_t T;
997         uint16_t length;
998         uint16_t offset;
999         SECItem Q = {siBuffer, NULL, 0};
1000         SECItem P = {siBuffer, NULL, 0};
1001         SECItem G = {siBuffer, NULL, 0};
1002         SECItem Y = {siBuffer, NULL, 0};
1003
1004         if(len == 0)
1005                 return NULL;
1006         T = (uint8_t)key[0];
1007         length = (64 + T * 8);
1008         offset = 1;
1009
1010         if (T > 8) {
1011                 return NULL;
1012         }
1013         if(len < (size_t)1 + SHA1_LENGTH + 3*length)
1014                 return NULL;
1015
1016         Q.data = key+offset;
1017         Q.len = SHA1_LENGTH;
1018         offset += SHA1_LENGTH;
1019
1020         P.data = key+offset;
1021         P.len = length;
1022         offset += length;
1023
1024         G.data = key+offset;
1025         G.len = length;
1026         offset += length;
1027
1028         Y.data = key+offset;
1029         Y.len = length;
1030         offset += length;
1031
1032         pk = nss_key_create(dsaKey);
1033         if(!pk)
1034                 return NULL;
1035         if(SECITEM_CopyItem(pk->arena, &pk->u.dsa.params.prime, &P)) {
1036                 SECKEY_DestroyPublicKey(pk);
1037                 return NULL;
1038         }
1039         if(SECITEM_CopyItem(pk->arena, &pk->u.dsa.params.subPrime, &Q)) {
1040                 SECKEY_DestroyPublicKey(pk);
1041                 return NULL;
1042         }
1043         if(SECITEM_CopyItem(pk->arena, &pk->u.dsa.params.base, &G)) {
1044                 SECKEY_DestroyPublicKey(pk);
1045                 return NULL;
1046         }
1047         if(SECITEM_CopyItem(pk->arena, &pk->u.dsa.publicValue, &Y)) {
1048                 SECKEY_DestroyPublicKey(pk);
1049                 return NULL;
1050         }
1051         return pk;
1052 }
1053
1054 static SECKEYPublicKey* nss_buf2rsa(unsigned char* key, size_t len)
1055 {
1056         SECKEYPublicKey* pk;
1057         uint16_t exp;
1058         uint16_t offset;
1059         uint16_t int16;
1060         SECItem modulus = {siBuffer, NULL, 0};
1061         SECItem exponent = {siBuffer, NULL, 0};
1062         if(len == 0)
1063                 return NULL;
1064         if(key[0] == 0) {
1065                 if(len < 3)
1066                         return NULL;
1067                 /* the exponent is too large so it's places further */
1068                 memmove(&int16, key+1, 2);
1069                 exp = ntohs(int16);
1070                 offset = 3;
1071         } else {
1072                 exp = key[0];
1073                 offset = 1;
1074         }
1075
1076         /* key length at least one */
1077         if(len < (size_t)offset + exp + 1)
1078                 return NULL;
1079         
1080         exponent.data = key+offset;
1081         exponent.len = exp;
1082         offset += exp;
1083         modulus.data = key+offset;
1084         modulus.len = (len - offset);
1085
1086         pk = nss_key_create(rsaKey);
1087         if(!pk)
1088                 return NULL;
1089         if(SECITEM_CopyItem(pk->arena, &pk->u.rsa.modulus, &modulus)) {
1090                 SECKEY_DestroyPublicKey(pk);
1091                 return NULL;
1092         }
1093         if(SECITEM_CopyItem(pk->arena, &pk->u.rsa.publicExponent, &exponent)) {
1094                 SECKEY_DestroyPublicKey(pk);
1095                 return NULL;
1096         }
1097         return pk;
1098 }
1099
1100 /**
1101  * Setup key and digest for verification. Adjust sig if necessary.
1102  *
1103  * @param algo: key algorithm
1104  * @param evp_key: EVP PKEY public key to create.
1105  * @param digest_type: digest type to use
1106  * @param key: key to setup for.
1107  * @param keylen: length of key.
1108  * @param prefix: if returned, the ASN prefix for the hashblob.
1109  * @param prefixlen: length of the prefix.
1110  * @return false on failure.
1111  */
1112 static int
1113 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype,
1114         unsigned char* key, size_t keylen, unsigned char** prefix,
1115         size_t* prefixlen)
1116 {
1117         /* uses libNSS */
1118
1119         /* hash prefix for md5, RFC2537 */
1120         static unsigned char p_md5[] = {0x30, 0x20, 0x30, 0x0c, 0x06, 0x08, 0x2a,
1121         0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05, 0x05, 0x00, 0x04, 0x10};
1122         /* hash prefix to prepend to hash output, from RFC3110 */
1123         static unsigned char p_sha1[] = {0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B,
1124                 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14};
1125         /* from RFC5702 */
1126         static unsigned char p_sha256[] = {0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60,
1127         0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20};
1128         static unsigned char p_sha512[] = {0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60,
1129         0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40};
1130         /* from RFC6234 */
1131         /* for future RSASHA384 .. 
1132         static unsigned char p_sha384[] = {0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60,
1133         0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30};
1134         */
1135
1136         switch(algo) {
1137
1138 #if defined(USE_SHA1) || defined(USE_SHA2)
1139 #if defined(USE_DSA) && defined(USE_SHA1)
1140                 case LDNS_DSA:
1141                 case LDNS_DSA_NSEC3:
1142                         *pubkey = nss_buf2dsa(key, keylen);
1143                         if(!*pubkey) {
1144                                 log_err("verify: malloc failure in crypto");
1145                                 return 0;
1146                         }
1147                         *htype = HASH_AlgSHA1;
1148                         /* no prefix for DSA verification */
1149                         break;
1150 #endif
1151 #ifdef USE_SHA1
1152                 case LDNS_RSASHA1:
1153                 case LDNS_RSASHA1_NSEC3:
1154 #endif
1155 #ifdef USE_SHA2
1156                 case LDNS_RSASHA256:
1157 #endif
1158 #ifdef USE_SHA2
1159                 case LDNS_RSASHA512:
1160 #endif
1161                         *pubkey = nss_buf2rsa(key, keylen);
1162                         if(!*pubkey) {
1163                                 log_err("verify: malloc failure in crypto");
1164                                 return 0;
1165                         }
1166                         /* select SHA version */
1167 #ifdef USE_SHA2
1168                         if(algo == LDNS_RSASHA256) {
1169                                 *htype = HASH_AlgSHA256;
1170                                 *prefix = p_sha256;
1171                                 *prefixlen = sizeof(p_sha256);
1172                         } else
1173 #endif
1174 #ifdef USE_SHA2
1175                                 if(algo == LDNS_RSASHA512) {
1176                                 *htype = HASH_AlgSHA512;
1177                                 *prefix = p_sha512;
1178                                 *prefixlen = sizeof(p_sha512);
1179                         } else
1180 #endif
1181 #ifdef USE_SHA1
1182                         {
1183                                 *htype = HASH_AlgSHA1;
1184                                 *prefix = p_sha1;
1185                                 *prefixlen = sizeof(p_sha1);
1186                         }
1187 #else
1188                         {
1189                                 verbose(VERB_QUERY, "verify: no digest algo");
1190                                 return 0;
1191                         }
1192 #endif
1193
1194                         break;
1195 #endif /* SHA1 or SHA2 */
1196
1197                 case LDNS_RSAMD5:
1198                         *pubkey = nss_buf2rsa(key, keylen);
1199                         if(!*pubkey) {
1200                                 log_err("verify: malloc failure in crypto");
1201                                 return 0;
1202                         }
1203                         *htype = HASH_AlgMD5;
1204                         *prefix = p_md5;
1205                         *prefixlen = sizeof(p_md5);
1206
1207                         break;
1208 #ifdef USE_ECDSA
1209                 case LDNS_ECDSAP256SHA256:
1210                         *pubkey = nss_buf2ecdsa(key, keylen,
1211                                 LDNS_ECDSAP256SHA256);
1212                         if(!*pubkey) {
1213                                 log_err("verify: malloc failure in crypto");
1214                                 return 0;
1215                         }
1216                         *htype = HASH_AlgSHA256;
1217                         /* no prefix for DSA verification */
1218                         break;
1219                 case LDNS_ECDSAP384SHA384:
1220                         *pubkey = nss_buf2ecdsa(key, keylen,
1221                                 LDNS_ECDSAP384SHA384);
1222                         if(!*pubkey) {
1223                                 log_err("verify: malloc failure in crypto");
1224                                 return 0;
1225                         }
1226                         *htype = HASH_AlgSHA384;
1227                         /* no prefix for DSA verification */
1228                         break;
1229 #endif /* USE_ECDSA */
1230                 case LDNS_ECC_GOST:
1231                 default:
1232                         verbose(VERB_QUERY, "verify: unknown algorithm %d", 
1233                                 algo);
1234                         return 0;
1235         }
1236         return 1;
1237 }
1238
1239 /**
1240  * Check a canonical sig+rrset and signature against a dnskey
1241  * @param buf: buffer with data to verify, the first rrsig part and the
1242  *      canonicalized rrset.
1243  * @param algo: DNSKEY algorithm.
1244  * @param sigblock: signature rdata field from RRSIG
1245  * @param sigblock_len: length of sigblock data.
1246  * @param key: public key data from DNSKEY RR.
1247  * @param keylen: length of keydata.
1248  * @param reason: bogus reason in more detail.
1249  * @return secure if verification succeeded, bogus on crypto failure,
1250  *      unchecked on format errors and alloc failures.
1251  */
1252 enum sec_status
1253 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, 
1254         unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
1255         char** reason)
1256 {
1257         /* uses libNSS */
1258         /* large enough for the different hashes */
1259         unsigned char hash[HASH_LENGTH_MAX];
1260         unsigned char hash2[HASH_LENGTH_MAX*2];
1261         HASH_HashType htype = 0;
1262         SECKEYPublicKey* pubkey = NULL;
1263         SECItem secsig = {siBuffer, sigblock, sigblock_len};
1264         SECItem sechash = {siBuffer, hash, 0};
1265         SECStatus res;
1266         unsigned char* prefix = NULL; /* prefix for hash, RFC3110, RFC5702 */
1267         size_t prefixlen = 0;
1268         int err;
1269
1270         if(!nss_setup_key_digest(algo, &pubkey, &htype, key, keylen,
1271                 &prefix, &prefixlen)) {
1272                 verbose(VERB_QUERY, "verify: failed to setup key");
1273                 *reason = "use of key for crypto failed";
1274                 SECKEY_DestroyPublicKey(pubkey);
1275                 return sec_status_bogus;
1276         }
1277
1278 #if defined(USE_DSA) && defined(USE_SHA1)
1279         /* need to convert DSA, ECDSA signatures? */
1280         if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3)) {
1281                 if(sigblock_len == 1+2*SHA1_LENGTH) {
1282                         secsig.data ++;
1283                         secsig.len --;
1284                 } else {
1285                         SECItem* p = DSAU_DecodeDerSig(&secsig);
1286                         if(!p) {
1287                                 verbose(VERB_QUERY, "verify: failed DER decode");
1288                                 *reason = "signature DER decode failed";
1289                                 SECKEY_DestroyPublicKey(pubkey);
1290                                 return sec_status_bogus;
1291                         }
1292                         if(SECITEM_CopyItem(pubkey->arena, &secsig, p)) {
1293                                 log_err("alloc failure in DER decode");
1294                                 SECKEY_DestroyPublicKey(pubkey);
1295                                 SECITEM_FreeItem(p, PR_TRUE);
1296                                 return sec_status_unchecked;
1297                         }
1298                         SECITEM_FreeItem(p, PR_TRUE);
1299                 }
1300         }
1301 #endif /* USE_DSA */
1302
1303         /* do the signature cryptography work */
1304         /* hash the data */
1305         sechash.len = HASH_ResultLen(htype);
1306         if(sechash.len > sizeof(hash)) {
1307                 verbose(VERB_QUERY, "verify: hash too large for buffer");
1308                 SECKEY_DestroyPublicKey(pubkey);
1309                 return sec_status_unchecked;
1310         }
1311         if(HASH_HashBuf(htype, hash, (unsigned char*)sldns_buffer_begin(buf),
1312                 (unsigned int)sldns_buffer_limit(buf)) != SECSuccess) {
1313                 verbose(VERB_QUERY, "verify: HASH_HashBuf failed");
1314                 SECKEY_DestroyPublicKey(pubkey);
1315                 return sec_status_unchecked;
1316         }
1317         if(prefix) {
1318                 int hashlen = sechash.len;
1319                 if(prefixlen+hashlen > sizeof(hash2)) {
1320                         verbose(VERB_QUERY, "verify: hashprefix too large");
1321                         SECKEY_DestroyPublicKey(pubkey);
1322                         return sec_status_unchecked;
1323                 }
1324                 sechash.data = hash2;
1325                 sechash.len = prefixlen+hashlen;
1326                 memcpy(sechash.data, prefix, prefixlen);
1327                 memmove(sechash.data+prefixlen, hash, hashlen);
1328         }
1329
1330         /* verify the signature */
1331         res = PK11_Verify(pubkey, &secsig, &sechash, NULL /*wincx*/);
1332         SECKEY_DestroyPublicKey(pubkey);
1333
1334         if(res == SECSuccess) {
1335                 return sec_status_secure;
1336         }
1337         err = PORT_GetError();
1338         if(err != SEC_ERROR_BAD_SIGNATURE) {
1339                 /* failed to verify */
1340                 verbose(VERB_QUERY, "verify: PK11_Verify failed: %s",
1341                         PORT_ErrorToString(err));
1342                 /* if it is not supported, like ECC is removed, we get,
1343                  * SEC_ERROR_NO_MODULE */
1344                 if(err == SEC_ERROR_NO_MODULE)
1345                         return sec_status_unchecked;
1346                 /* but other errors are commonly returned
1347                  * for a bad signature from NSS.  Thus we return bogus,
1348                  * not unchecked */
1349                 *reason = "signature crypto failed";
1350                 return sec_status_bogus;
1351         }
1352         verbose(VERB_QUERY, "verify: signature mismatch: %s",
1353                 PORT_ErrorToString(err));
1354         *reason = "signature crypto failed";
1355         return sec_status_bogus;
1356 }
1357
1358 #elif defined(HAVE_NETTLE)
1359
1360 #include "sha.h"
1361 #include "bignum.h"
1362 #include "macros.h"
1363 #include "rsa.h"
1364 #include "dsa.h"
1365 #ifdef HAVE_NETTLE_DSA_COMPAT_H
1366 #include "dsa-compat.h"
1367 #endif
1368 #include "asn1.h"
1369 #ifdef USE_ECDSA
1370 #include "ecdsa.h"
1371 #include "ecc-curve.h"
1372 #endif
1373 #ifdef HAVE_NETTLE_EDDSA_H
1374 #include "eddsa.h"
1375 #endif
1376
1377 static int
1378 _digest_nettle(int algo, uint8_t* buf, size_t len,
1379         unsigned char* res)
1380 {
1381         switch(algo) {
1382                 case SHA1_DIGEST_SIZE:
1383                 {
1384                         struct sha1_ctx ctx;
1385                         sha1_init(&ctx);
1386                         sha1_update(&ctx, len, buf);
1387                         sha1_digest(&ctx, SHA1_DIGEST_SIZE, res);
1388                         return 1;
1389                 }
1390                 case SHA256_DIGEST_SIZE:
1391                 {
1392                         struct sha256_ctx ctx;
1393                         sha256_init(&ctx);
1394                         sha256_update(&ctx, len, buf);
1395                         sha256_digest(&ctx, SHA256_DIGEST_SIZE, res);
1396                         return 1;
1397                 }
1398                 case SHA384_DIGEST_SIZE:
1399                 {
1400                         struct sha384_ctx ctx;
1401                         sha384_init(&ctx);
1402                         sha384_update(&ctx, len, buf);
1403                         sha384_digest(&ctx, SHA384_DIGEST_SIZE, res);
1404                         return 1;
1405                 }
1406                 case SHA512_DIGEST_SIZE:
1407                 {
1408                         struct sha512_ctx ctx;
1409                         sha512_init(&ctx);
1410                         sha512_update(&ctx, len, buf);
1411                         sha512_digest(&ctx, SHA512_DIGEST_SIZE, res);
1412                         return 1;
1413                 }
1414                 default:
1415                         break;
1416         }
1417         return 0;
1418 }
1419
1420 /* return size of digest if supported, or 0 otherwise */
1421 size_t
1422 nsec3_hash_algo_size_supported(int id)
1423 {
1424         switch(id) {
1425         case NSEC3_HASH_SHA1:
1426                 return SHA1_DIGEST_SIZE;
1427         default:
1428                 return 0;
1429         }
1430 }
1431
1432 /* perform nsec3 hash. return false on failure */
1433 int
1434 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
1435         unsigned char* res)
1436 {
1437         switch(algo) {
1438         case NSEC3_HASH_SHA1:
1439                 return _digest_nettle(SHA1_DIGEST_SIZE, (uint8_t*)buf, len,
1440                         res);
1441         default:
1442                 return 0;
1443         }
1444 }
1445
1446 void
1447 secalgo_hash_sha256(unsigned char* buf, size_t len, unsigned char* res)
1448 {
1449         _digest_nettle(SHA256_DIGEST_SIZE, (uint8_t*)buf, len, res);
1450 }
1451
1452 /**
1453  * Return size of DS digest according to its hash algorithm.
1454  * @param algo: DS digest algo.
1455  * @return size in bytes of digest, or 0 if not supported.
1456  */
1457 size_t
1458 ds_digest_size_supported(int algo)
1459 {
1460         switch(algo) {
1461                 case LDNS_SHA1:
1462 #ifdef USE_SHA1
1463                         return SHA1_DIGEST_SIZE;
1464 #else
1465                         if(fake_sha1) return 20;
1466                         return 0;
1467 #endif
1468 #ifdef USE_SHA2
1469                 case LDNS_SHA256:
1470                         return SHA256_DIGEST_SIZE;
1471 #endif
1472 #ifdef USE_ECDSA
1473                 case LDNS_SHA384:
1474                         return SHA384_DIGEST_SIZE;
1475 #endif
1476                 /* GOST not supported */
1477                 case LDNS_HASH_GOST:
1478                 default:
1479                         break;
1480         }
1481         return 0;
1482 }
1483
1484 int
1485 secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
1486         unsigned char* res)
1487 {
1488         switch(algo) {
1489 #ifdef USE_SHA1
1490                 case LDNS_SHA1:
1491                         return _digest_nettle(SHA1_DIGEST_SIZE, buf, len, res);
1492 #endif
1493 #if defined(USE_SHA2)
1494                 case LDNS_SHA256:
1495                         return _digest_nettle(SHA256_DIGEST_SIZE, buf, len, res);
1496 #endif
1497 #ifdef USE_ECDSA
1498                 case LDNS_SHA384:
1499                         return _digest_nettle(SHA384_DIGEST_SIZE, buf, len, res);
1500
1501 #endif
1502                 case LDNS_HASH_GOST:
1503                 default:
1504                         verbose(VERB_QUERY, "unknown DS digest algorithm %d",
1505                                 algo);
1506                         break;
1507         }
1508         return 0;
1509 }
1510
1511 int
1512 dnskey_algo_id_is_supported(int id)
1513 {
1514         /* uses libnettle */
1515         switch(id) {
1516         case LDNS_DSA:
1517         case LDNS_DSA_NSEC3:
1518 #if defined(USE_DSA) && defined(USE_SHA1)
1519                 return 1;
1520 #else
1521                 if(fake_dsa || fake_sha1) return 1;
1522                 return 0;
1523 #endif
1524         case LDNS_RSASHA1:
1525         case LDNS_RSASHA1_NSEC3:
1526 #ifdef USE_SHA1
1527                 return 1;
1528 #else
1529                 if(fake_sha1) return 1;
1530                 return 0;
1531 #endif
1532 #ifdef USE_SHA2
1533         case LDNS_RSASHA256:
1534         case LDNS_RSASHA512:
1535 #endif
1536 #ifdef USE_ECDSA
1537         case LDNS_ECDSAP256SHA256:
1538         case LDNS_ECDSAP384SHA384:
1539 #endif
1540                 return 1;
1541 #ifdef USE_ED25519
1542         case LDNS_ED25519:
1543                 return 1;
1544 #endif
1545         case LDNS_RSAMD5: /* RFC 6725 deprecates RSAMD5 */
1546         case LDNS_ECC_GOST:
1547         default:
1548                 return 0;
1549         }
1550 }
1551
1552 #if defined(USE_DSA) && defined(USE_SHA1)
1553 static char *
1554 _verify_nettle_dsa(sldns_buffer* buf, unsigned char* sigblock,
1555         unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1556 {
1557         uint8_t digest[SHA1_DIGEST_SIZE];
1558         uint8_t key_t_value;
1559         int res = 0;
1560         size_t offset;
1561         struct dsa_public_key pubkey;
1562         struct dsa_signature signature;
1563         unsigned int expected_len;
1564
1565         /* Extract DSA signature from the record */
1566         nettle_dsa_signature_init(&signature);
1567         /* Signature length: 41 bytes - RFC 2536 sec. 3 */
1568         if(sigblock_len == 41) {
1569                 if(key[0] != sigblock[0])
1570                         return "invalid T value in DSA signature or pubkey";
1571                 nettle_mpz_set_str_256_u(signature.r, 20, sigblock+1);
1572                 nettle_mpz_set_str_256_u(signature.s, 20, sigblock+1+20);
1573         } else {
1574                 /* DER encoded, decode the ASN1 notated R and S bignums */
1575                 /* SEQUENCE { r INTEGER, s INTEGER } */
1576                 struct asn1_der_iterator i, seq;
1577                 if(asn1_der_iterator_first(&i, sigblock_len,
1578                         (uint8_t*)sigblock) != ASN1_ITERATOR_CONSTRUCTED
1579                         || i.type != ASN1_SEQUENCE)
1580                         return "malformed DER encoded DSA signature";
1581                 /* decode this element of i using the seq iterator */
1582                 if(asn1_der_decode_constructed(&i, &seq) !=
1583                         ASN1_ITERATOR_PRIMITIVE || seq.type != ASN1_INTEGER)
1584                         return "malformed DER encoded DSA signature";
1585                 if(!asn1_der_get_bignum(&seq, signature.r, 20*8))
1586                         return "malformed DER encoded DSA signature";
1587                 if(asn1_der_iterator_next(&seq) != ASN1_ITERATOR_PRIMITIVE
1588                         || seq.type != ASN1_INTEGER)
1589                         return "malformed DER encoded DSA signature";
1590                 if(!asn1_der_get_bignum(&seq, signature.s, 20*8))
1591                         return "malformed DER encoded DSA signature";
1592                 if(asn1_der_iterator_next(&i) != ASN1_ITERATOR_END)
1593                         return "malformed DER encoded DSA signature";
1594         }
1595
1596         /* Validate T values constraints - RFC 2536 sec. 2 & sec. 3 */
1597         key_t_value = key[0];
1598         if (key_t_value > 8) {
1599                 return "invalid T value in DSA pubkey";
1600         }
1601
1602         /* Pubkey minimum length: 21 bytes - RFC 2536 sec. 2 */
1603         if (keylen < 21) {
1604                 return "DSA pubkey too short";
1605         }
1606
1607         expected_len =   1 +            /* T */
1608                         20 +            /* Q */
1609                        (64 + key_t_value*8) +   /* P */
1610                        (64 + key_t_value*8) +   /* G */
1611                        (64 + key_t_value*8);    /* Y */
1612         if (keylen != expected_len ) {
1613                 return "invalid DSA pubkey length";
1614         }
1615
1616         /* Extract DSA pubkey from the record */
1617         nettle_dsa_public_key_init(&pubkey);
1618         offset = 1;
1619         nettle_mpz_set_str_256_u(pubkey.q, 20, key+offset);
1620         offset += 20;
1621         nettle_mpz_set_str_256_u(pubkey.p, (64 + key_t_value*8), key+offset);
1622         offset += (64 + key_t_value*8);
1623         nettle_mpz_set_str_256_u(pubkey.g, (64 + key_t_value*8), key+offset);
1624         offset += (64 + key_t_value*8);
1625         nettle_mpz_set_str_256_u(pubkey.y, (64 + key_t_value*8), key+offset);
1626
1627         /* Digest content of "buf" and verify its DSA signature in "sigblock"*/
1628         res = _digest_nettle(SHA1_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1629                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1630         res &= dsa_sha1_verify_digest(&pubkey, digest, &signature);
1631
1632         /* Clear and return */
1633         nettle_dsa_signature_clear(&signature);
1634         nettle_dsa_public_key_clear(&pubkey);
1635         if (!res)
1636                 return "DSA signature verification failed";
1637         else
1638                 return NULL;
1639 }
1640 #endif /* USE_DSA */
1641
1642 static char *
1643 _verify_nettle_rsa(sldns_buffer* buf, unsigned int digest_size, char* sigblock,
1644         unsigned int sigblock_len, uint8_t* key, unsigned int keylen)
1645 {
1646         uint16_t exp_len = 0;
1647         size_t exp_offset = 0, mod_offset = 0;
1648         struct rsa_public_key pubkey;
1649         mpz_t signature;
1650         int res = 0;
1651
1652         /* RSA pubkey parsing as per RFC 3110 sec. 2 */
1653         if( keylen <= 1) {
1654                 return "null RSA key";
1655         }
1656         if (key[0] != 0) {
1657                 /* 1-byte length */
1658                 exp_len = key[0];
1659                 exp_offset = 1;
1660         } else {
1661                 /* 1-byte NUL + 2-bytes exponent length */
1662                 if (keylen < 3) {
1663                         return "incorrect RSA key length";
1664                 }
1665                 exp_len = READ_UINT16(key+1);
1666                 if (exp_len == 0)
1667                         return "null RSA exponent length";
1668                 exp_offset = 3;
1669         }
1670         /* Check that we are not over-running input length */
1671         if (keylen < exp_offset + exp_len + 1) {
1672                 return "RSA key content shorter than expected";
1673         }
1674         mod_offset = exp_offset + exp_len;
1675         nettle_rsa_public_key_init(&pubkey);
1676         pubkey.size = keylen - mod_offset;
1677         nettle_mpz_set_str_256_u(pubkey.e, exp_len, &key[exp_offset]);
1678         nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]);
1679
1680         /* Digest content of "buf" and verify its RSA signature in "sigblock"*/
1681         nettle_mpz_init_set_str_256_u(signature, sigblock_len, (uint8_t*)sigblock);
1682         switch (digest_size) {
1683                 case SHA1_DIGEST_SIZE:
1684                 {
1685                         uint8_t digest[SHA1_DIGEST_SIZE];
1686                         res = _digest_nettle(SHA1_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1687                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1688                         res &= rsa_sha1_verify_digest(&pubkey, digest, signature);
1689                         break;
1690                 }
1691                 case SHA256_DIGEST_SIZE:
1692                 {
1693                         uint8_t digest[SHA256_DIGEST_SIZE];
1694                         res = _digest_nettle(SHA256_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1695                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1696                         res &= rsa_sha256_verify_digest(&pubkey, digest, signature);
1697                         break;
1698                 }
1699                 case SHA512_DIGEST_SIZE:
1700                 {
1701                         uint8_t digest[SHA512_DIGEST_SIZE];
1702                         res = _digest_nettle(SHA512_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1703                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1704                         res &= rsa_sha512_verify_digest(&pubkey, digest, signature);
1705                         break;
1706                 }
1707                 default:
1708                         break;
1709         }
1710
1711         /* Clear and return */
1712         nettle_rsa_public_key_clear(&pubkey);
1713         mpz_clear(signature);
1714         if (!res) {
1715                 return "RSA signature verification failed";
1716         } else {
1717                 return NULL;
1718         }
1719 }
1720
1721 #ifdef USE_ECDSA
1722 static char *
1723 _verify_nettle_ecdsa(sldns_buffer* buf, unsigned int digest_size, unsigned char* sigblock,
1724         unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1725 {
1726         int res = 0;
1727         struct ecc_point pubkey;
1728         struct dsa_signature signature;
1729
1730         /* Always matched strength, as per RFC 6605 sec. 1 */
1731         if (sigblock_len != 2*digest_size || keylen != 2*digest_size) {
1732                 return "wrong ECDSA signature length";
1733         }
1734
1735         /* Parse ECDSA signature as per RFC 6605 sec. 4 */
1736         nettle_dsa_signature_init(&signature);
1737         switch (digest_size) {
1738                 case SHA256_DIGEST_SIZE:
1739                 {
1740                         uint8_t digest[SHA256_DIGEST_SIZE];
1741                         mpz_t x, y;
1742                         nettle_ecc_point_init(&pubkey, nettle_get_secp_256r1());
1743                         nettle_mpz_init_set_str_256_u(x, SHA256_DIGEST_SIZE, key);
1744                         nettle_mpz_init_set_str_256_u(y, SHA256_DIGEST_SIZE, key+SHA256_DIGEST_SIZE);
1745                         nettle_mpz_set_str_256_u(signature.r, SHA256_DIGEST_SIZE, sigblock);
1746                         nettle_mpz_set_str_256_u(signature.s, SHA256_DIGEST_SIZE, sigblock+SHA256_DIGEST_SIZE);
1747                         res = _digest_nettle(SHA256_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1748                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1749                         res &= nettle_ecc_point_set(&pubkey, x, y);
1750                         res &= nettle_ecdsa_verify (&pubkey, SHA256_DIGEST_SIZE, digest, &signature);
1751                         mpz_clear(x);
1752                         mpz_clear(y);
1753                         nettle_ecc_point_clear(&pubkey);
1754                         break;
1755                 }
1756                 case SHA384_DIGEST_SIZE:
1757                 {
1758                         uint8_t digest[SHA384_DIGEST_SIZE];
1759                         mpz_t x, y;
1760                         nettle_ecc_point_init(&pubkey, nettle_get_secp_384r1());
1761                         nettle_mpz_init_set_str_256_u(x, SHA384_DIGEST_SIZE, key);
1762                         nettle_mpz_init_set_str_256_u(y, SHA384_DIGEST_SIZE, key+SHA384_DIGEST_SIZE);
1763                         nettle_mpz_set_str_256_u(signature.r, SHA384_DIGEST_SIZE, sigblock);
1764                         nettle_mpz_set_str_256_u(signature.s, SHA384_DIGEST_SIZE, sigblock+SHA384_DIGEST_SIZE);
1765                         res = _digest_nettle(SHA384_DIGEST_SIZE, (unsigned char*)sldns_buffer_begin(buf),
1766                                                 (unsigned int)sldns_buffer_limit(buf), (unsigned char*)digest);
1767                         res &= nettle_ecc_point_set(&pubkey, x, y);
1768                         res &= nettle_ecdsa_verify (&pubkey, SHA384_DIGEST_SIZE, digest, &signature);
1769                         mpz_clear(x);
1770                         mpz_clear(y);
1771                         nettle_ecc_point_clear(&pubkey);
1772                         break;
1773                 }
1774                 default:
1775                         return "unknown ECDSA algorithm";
1776         }
1777
1778         /* Clear and return */
1779         nettle_dsa_signature_clear(&signature);
1780         if (!res)
1781                 return "ECDSA signature verification failed";
1782         else
1783                 return NULL;
1784 }
1785 #endif
1786
1787 #ifdef USE_ED25519
1788 static char *
1789 _verify_nettle_ed25519(sldns_buffer* buf, unsigned char* sigblock,
1790         unsigned int sigblock_len, unsigned char* key, unsigned int keylen)
1791 {
1792         int res = 0;
1793
1794         if(sigblock_len != ED25519_SIGNATURE_SIZE) {
1795                 return "wrong ED25519 signature length";
1796         }
1797         if(keylen != ED25519_KEY_SIZE) {
1798                 return "wrong ED25519 key length";
1799         }
1800
1801         res = ed25519_sha512_verify((uint8_t*)key, sldns_buffer_limit(buf),
1802                 sldns_buffer_begin(buf), (uint8_t*)sigblock);
1803
1804         if (!res)
1805                 return "ED25519 signature verification failed";
1806         else
1807                 return NULL;
1808 }
1809 #endif
1810
1811 /**
1812  * Check a canonical sig+rrset and signature against a dnskey
1813  * @param buf: buffer with data to verify, the first rrsig part and the
1814  *      canonicalized rrset.
1815  * @param algo: DNSKEY algorithm.
1816  * @param sigblock: signature rdata field from RRSIG
1817  * @param sigblock_len: length of sigblock data.
1818  * @param key: public key data from DNSKEY RR.
1819  * @param keylen: length of keydata.
1820  * @param reason: bogus reason in more detail.
1821  * @return secure if verification succeeded, bogus on crypto failure,
1822  *      unchecked on format errors and alloc failures.
1823  */
1824 enum sec_status
1825 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock,
1826         unsigned int sigblock_len, unsigned char* key, unsigned int keylen,
1827         char** reason)
1828 {
1829         unsigned int digest_size = 0;
1830
1831         if (sigblock_len == 0 || keylen == 0) {
1832                 *reason = "null signature";
1833                 return sec_status_bogus;
1834         }
1835
1836 #ifndef USE_DSA
1837         if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3) &&(fake_dsa||fake_sha1))
1838                 return sec_status_secure;
1839 #endif
1840 #ifndef USE_SHA1
1841         if(fake_sha1 && (algo == LDNS_DSA || algo == LDNS_DSA_NSEC3 || algo == LDNS_RSASHA1 || algo == LDNS_RSASHA1_NSEC3))
1842                 return sec_status_secure;
1843 #endif
1844
1845         switch(algo) {
1846 #if defined(USE_DSA) && defined(USE_SHA1)
1847         case LDNS_DSA:
1848         case LDNS_DSA_NSEC3:
1849                 *reason = _verify_nettle_dsa(buf, sigblock, sigblock_len, key, keylen);
1850                 if (*reason != NULL)
1851                         return sec_status_bogus;
1852                 else
1853                         return sec_status_secure;
1854 #endif /* USE_DSA */
1855
1856 #ifdef USE_SHA1
1857         case LDNS_RSASHA1:
1858         case LDNS_RSASHA1_NSEC3:
1859                 digest_size = (digest_size ? digest_size : SHA1_DIGEST_SIZE);
1860 #endif
1861                 /* double fallthrough annotation to please gcc parser */
1862                 /* fallthrough */
1863 #ifdef USE_SHA2
1864                 /* fallthrough */
1865         case LDNS_RSASHA256:
1866                 digest_size = (digest_size ? digest_size : SHA256_DIGEST_SIZE);
1867                 /* fallthrough */
1868         case LDNS_RSASHA512:
1869                 digest_size = (digest_size ? digest_size : SHA512_DIGEST_SIZE);
1870
1871 #endif
1872                 *reason = _verify_nettle_rsa(buf, digest_size, (char*)sigblock,
1873                                                 sigblock_len, key, keylen);
1874                 if (*reason != NULL)
1875                         return sec_status_bogus;
1876                 else
1877                         return sec_status_secure;
1878
1879 #ifdef USE_ECDSA
1880         case LDNS_ECDSAP256SHA256:
1881                 digest_size = (digest_size ? digest_size : SHA256_DIGEST_SIZE);
1882                 /* fallthrough */
1883         case LDNS_ECDSAP384SHA384:
1884                 digest_size = (digest_size ? digest_size : SHA384_DIGEST_SIZE);
1885                 *reason = _verify_nettle_ecdsa(buf, digest_size, sigblock,
1886                                                 sigblock_len, key, keylen);
1887                 if (*reason != NULL)
1888                         return sec_status_bogus;
1889                 else
1890                         return sec_status_secure;
1891 #endif
1892 #ifdef USE_ED25519
1893         case LDNS_ED25519:
1894                 *reason = _verify_nettle_ed25519(buf, sigblock, sigblock_len,
1895                         key, keylen);
1896                 if (*reason != NULL)
1897                         return sec_status_bogus;
1898                 else
1899                         return sec_status_secure;
1900 #endif
1901         case LDNS_RSAMD5:
1902         case LDNS_ECC_GOST:
1903         default:
1904                 *reason = "unable to verify signature, unknown algorithm";
1905                 return sec_status_bogus;
1906         }
1907 }
1908
1909 #endif /* HAVE_SSL or HAVE_NSS or HAVE_NETTLE */