| OLD | NEW |
| (Empty) |
| 1 /* crypto/asn1/x_pubkey.c */ | |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
| 3 * All rights reserved. | |
| 4 * | |
| 5 * This package is an SSL implementation written | |
| 6 * by Eric Young (eay@cryptsoft.com). | |
| 7 * The implementation was written so as to conform with Netscapes SSL. | |
| 8 * | |
| 9 * This library is free for commercial and non-commercial use as long as | |
| 10 * the following conditions are aheared to. The following conditions | |
| 11 * apply to all code found in this distribution, be it the RC4, RSA, | |
| 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
| 13 * included with this distribution is covered by the same copyright terms | |
| 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
| 15 * | |
| 16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
| 17 * the code are not to be removed. | |
| 18 * If this package is used in a product, Eric Young should be given attribution | |
| 19 * as the author of the parts of the library used. | |
| 20 * This can be in the form of a textual message at program startup or | |
| 21 * in documentation (online or textual) provided with the package. | |
| 22 * | |
| 23 * Redistribution and use in source and binary forms, with or without | |
| 24 * modification, are permitted provided that the following conditions | |
| 25 * are met: | |
| 26 * 1. Redistributions of source code must retain the copyright | |
| 27 * notice, this list of conditions and the following disclaimer. | |
| 28 * 2. Redistributions in binary form must reproduce the above copyright | |
| 29 * notice, this list of conditions and the following disclaimer in the | |
| 30 * documentation and/or other materials provided with the distribution. | |
| 31 * 3. All advertising materials mentioning features or use of this software | |
| 32 * must display the following acknowledgement: | |
| 33 * "This product includes cryptographic software written by | |
| 34 * Eric Young (eay@cryptsoft.com)" | |
| 35 * The word 'cryptographic' can be left out if the rouines from the library | |
| 36 * being used are not cryptographic related :-). | |
| 37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
| 38 * the apps directory (application code) you must include an acknowledgement: | |
| 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
| 40 * | |
| 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
| 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
| 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
| 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
| 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
| 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
| 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
| 51 * SUCH DAMAGE. | |
| 52 * | |
| 53 * The licence and distribution terms for any publically available version or | |
| 54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
| 55 * copied and put under another distribution licence | |
| 56 * [including the GNU Public Licence.] | |
| 57 */ | |
| 58 | |
| 59 #include <stdio.h> | |
| 60 #include "cryptlib.h" | |
| 61 #include <openssl/asn1t.h> | |
| 62 #include <openssl/x509.h> | |
| 63 #include "asn1_locl.h" | |
| 64 #ifndef OPENSSL_NO_RSA | |
| 65 #include <openssl/rsa.h> | |
| 66 #endif | |
| 67 #ifndef OPENSSL_NO_DSA | |
| 68 #include <openssl/dsa.h> | |
| 69 #endif | |
| 70 | |
| 71 /* Minor tweak to operation: free up EVP_PKEY */ | |
| 72 static int pubkey_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, | |
| 73 void *exarg) | |
| 74 { | |
| 75 if (operation == ASN1_OP_FREE_POST) | |
| 76 { | |
| 77 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; | |
| 78 EVP_PKEY_free(pubkey->pkey); | |
| 79 } | |
| 80 return 1; | |
| 81 } | |
| 82 | |
| 83 ASN1_SEQUENCE_cb(X509_PUBKEY, pubkey_cb) = { | |
| 84 ASN1_SIMPLE(X509_PUBKEY, algor, X509_ALGOR), | |
| 85 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) | |
| 86 } ASN1_SEQUENCE_END_cb(X509_PUBKEY, X509_PUBKEY) | |
| 87 | |
| 88 IMPLEMENT_ASN1_FUNCTIONS(X509_PUBKEY) | |
| 89 | |
| 90 int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) | |
| 91 { | |
| 92 X509_PUBKEY *pk=NULL; | |
| 93 | |
| 94 if (x == NULL) return(0); | |
| 95 | |
| 96 if ((pk=X509_PUBKEY_new()) == NULL) goto error; | |
| 97 | |
| 98 if (pkey->ameth) | |
| 99 { | |
| 100 if (pkey->ameth->pub_encode) | |
| 101 { | |
| 102 if (!pkey->ameth->pub_encode(pk, pkey)) | |
| 103 { | |
| 104 X509err(X509_F_X509_PUBKEY_SET, | |
| 105 X509_R_PUBLIC_KEY_ENCODE_ERROR); | |
| 106 goto error; | |
| 107 } | |
| 108 } | |
| 109 else | |
| 110 { | |
| 111 X509err(X509_F_X509_PUBKEY_SET, | |
| 112 X509_R_METHOD_NOT_SUPPORTED); | |
| 113 goto error; | |
| 114 } | |
| 115 } | |
| 116 else | |
| 117 { | |
| 118 X509err(X509_F_X509_PUBKEY_SET,X509_R_UNSUPPORTED_ALGORITHM); | |
| 119 goto error; | |
| 120 } | |
| 121 | |
| 122 if (*x != NULL) | |
| 123 X509_PUBKEY_free(*x); | |
| 124 | |
| 125 *x=pk; | |
| 126 | |
| 127 return 1; | |
| 128 error: | |
| 129 if (pk != NULL) X509_PUBKEY_free(pk); | |
| 130 return 0; | |
| 131 } | |
| 132 | |
| 133 EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key) | |
| 134 { | |
| 135 EVP_PKEY *ret=NULL; | |
| 136 | |
| 137 if (key == NULL) goto error; | |
| 138 | |
| 139 if (key->pkey != NULL) | |
| 140 { | |
| 141 CRYPTO_add(&key->pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); | |
| 142 return key->pkey; | |
| 143 } | |
| 144 | |
| 145 if (key->public_key == NULL) goto error; | |
| 146 | |
| 147 if ((ret = EVP_PKEY_new()) == NULL) | |
| 148 { | |
| 149 X509err(X509_F_X509_PUBKEY_GET, ERR_R_MALLOC_FAILURE); | |
| 150 goto error; | |
| 151 } | |
| 152 | |
| 153 if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) | |
| 154 { | |
| 155 X509err(X509_F_X509_PUBKEY_GET,X509_R_UNSUPPORTED_ALGORITHM); | |
| 156 goto error; | |
| 157 } | |
| 158 | |
| 159 if (ret->ameth->pub_decode) | |
| 160 { | |
| 161 if (!ret->ameth->pub_decode(ret, key)) | |
| 162 { | |
| 163 X509err(X509_F_X509_PUBKEY_GET, | |
| 164 X509_R_PUBLIC_KEY_DECODE_ERROR); | |
| 165 goto error; | |
| 166 } | |
| 167 } | |
| 168 else | |
| 169 { | |
| 170 X509err(X509_F_X509_PUBKEY_GET, X509_R_METHOD_NOT_SUPPORTED); | |
| 171 goto error; | |
| 172 } | |
| 173 | |
| 174 /* Check to see if another thread set key->pkey first */ | |
| 175 CRYPTO_w_lock(CRYPTO_LOCK_EVP_PKEY); | |
| 176 if (key->pkey) | |
| 177 { | |
| 178 CRYPTO_w_unlock(CRYPTO_LOCK_EVP_PKEY); | |
| 179 EVP_PKEY_free(ret); | |
| 180 ret = key->pkey; | |
| 181 } | |
| 182 else | |
| 183 { | |
| 184 key->pkey = ret; | |
| 185 CRYPTO_w_unlock(CRYPTO_LOCK_EVP_PKEY); | |
| 186 } | |
| 187 CRYPTO_add(&ret->references, 1, CRYPTO_LOCK_EVP_PKEY); | |
| 188 | |
| 189 return ret; | |
| 190 | |
| 191 error: | |
| 192 if (ret != NULL) | |
| 193 EVP_PKEY_free(ret); | |
| 194 return(NULL); | |
| 195 } | |
| 196 | |
| 197 /* Now two pseudo ASN1 routines that take an EVP_PKEY structure | |
| 198 * and encode or decode as X509_PUBKEY | |
| 199 */ | |
| 200 | |
| 201 EVP_PKEY *d2i_PUBKEY(EVP_PKEY **a, const unsigned char **pp, | |
| 202 long length) | |
| 203 { | |
| 204 X509_PUBKEY *xpk; | |
| 205 EVP_PKEY *pktmp; | |
| 206 xpk = d2i_X509_PUBKEY(NULL, pp, length); | |
| 207 if(!xpk) return NULL; | |
| 208 pktmp = X509_PUBKEY_get(xpk); | |
| 209 X509_PUBKEY_free(xpk); | |
| 210 if(!pktmp) return NULL; | |
| 211 if(a) | |
| 212 { | |
| 213 EVP_PKEY_free(*a); | |
| 214 *a = pktmp; | |
| 215 } | |
| 216 return pktmp; | |
| 217 } | |
| 218 | |
| 219 int i2d_PUBKEY(EVP_PKEY *a, unsigned char **pp) | |
| 220 { | |
| 221 X509_PUBKEY *xpk=NULL; | |
| 222 int ret; | |
| 223 if(!a) return 0; | |
| 224 if(!X509_PUBKEY_set(&xpk, a)) return 0; | |
| 225 ret = i2d_X509_PUBKEY(xpk, pp); | |
| 226 X509_PUBKEY_free(xpk); | |
| 227 return ret; | |
| 228 } | |
| 229 | |
| 230 /* The following are equivalents but which return RSA and DSA | |
| 231 * keys | |
| 232 */ | |
| 233 #ifndef OPENSSL_NO_RSA | |
| 234 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, | |
| 235 long length) | |
| 236 { | |
| 237 EVP_PKEY *pkey; | |
| 238 RSA *key; | |
| 239 const unsigned char *q; | |
| 240 q = *pp; | |
| 241 pkey = d2i_PUBKEY(NULL, &q, length); | |
| 242 if (!pkey) return NULL; | |
| 243 key = EVP_PKEY_get1_RSA(pkey); | |
| 244 EVP_PKEY_free(pkey); | |
| 245 if (!key) return NULL; | |
| 246 *pp = q; | |
| 247 if (a) | |
| 248 { | |
| 249 RSA_free(*a); | |
| 250 *a = key; | |
| 251 } | |
| 252 return key; | |
| 253 } | |
| 254 | |
| 255 int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp) | |
| 256 { | |
| 257 EVP_PKEY *pktmp; | |
| 258 int ret; | |
| 259 if (!a) return 0; | |
| 260 pktmp = EVP_PKEY_new(); | |
| 261 if (!pktmp) | |
| 262 { | |
| 263 ASN1err(ASN1_F_I2D_RSA_PUBKEY, ERR_R_MALLOC_FAILURE); | |
| 264 return 0; | |
| 265 } | |
| 266 EVP_PKEY_set1_RSA(pktmp, a); | |
| 267 ret = i2d_PUBKEY(pktmp, pp); | |
| 268 EVP_PKEY_free(pktmp); | |
| 269 return ret; | |
| 270 } | |
| 271 #endif | |
| 272 | |
| 273 #ifndef OPENSSL_NO_DSA | |
| 274 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, | |
| 275 long length) | |
| 276 { | |
| 277 EVP_PKEY *pkey; | |
| 278 DSA *key; | |
| 279 const unsigned char *q; | |
| 280 q = *pp; | |
| 281 pkey = d2i_PUBKEY(NULL, &q, length); | |
| 282 if (!pkey) return NULL; | |
| 283 key = EVP_PKEY_get1_DSA(pkey); | |
| 284 EVP_PKEY_free(pkey); | |
| 285 if (!key) return NULL; | |
| 286 *pp = q; | |
| 287 if (a) | |
| 288 { | |
| 289 DSA_free(*a); | |
| 290 *a = key; | |
| 291 } | |
| 292 return key; | |
| 293 } | |
| 294 | |
| 295 int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp) | |
| 296 { | |
| 297 EVP_PKEY *pktmp; | |
| 298 int ret; | |
| 299 if(!a) return 0; | |
| 300 pktmp = EVP_PKEY_new(); | |
| 301 if(!pktmp) | |
| 302 { | |
| 303 ASN1err(ASN1_F_I2D_DSA_PUBKEY, ERR_R_MALLOC_FAILURE); | |
| 304 return 0; | |
| 305 } | |
| 306 EVP_PKEY_set1_DSA(pktmp, a); | |
| 307 ret = i2d_PUBKEY(pktmp, pp); | |
| 308 EVP_PKEY_free(pktmp); | |
| 309 return ret; | |
| 310 } | |
| 311 #endif | |
| 312 | |
| 313 #ifndef OPENSSL_NO_EC | |
| 314 EC_KEY *d2i_EC_PUBKEY(EC_KEY **a, const unsigned char **pp, long length) | |
| 315 { | |
| 316 EVP_PKEY *pkey; | |
| 317 EC_KEY *key; | |
| 318 const unsigned char *q; | |
| 319 q = *pp; | |
| 320 pkey = d2i_PUBKEY(NULL, &q, length); | |
| 321 if (!pkey) return(NULL); | |
| 322 key = EVP_PKEY_get1_EC_KEY(pkey); | |
| 323 EVP_PKEY_free(pkey); | |
| 324 if (!key) return(NULL); | |
| 325 *pp = q; | |
| 326 if (a) | |
| 327 { | |
| 328 EC_KEY_free(*a); | |
| 329 *a = key; | |
| 330 } | |
| 331 return(key); | |
| 332 } | |
| 333 | |
| 334 int i2d_EC_PUBKEY(EC_KEY *a, unsigned char **pp) | |
| 335 { | |
| 336 EVP_PKEY *pktmp; | |
| 337 int ret; | |
| 338 if (!a) return(0); | |
| 339 if ((pktmp = EVP_PKEY_new()) == NULL) | |
| 340 { | |
| 341 ASN1err(ASN1_F_I2D_EC_PUBKEY, ERR_R_MALLOC_FAILURE); | |
| 342 return(0); | |
| 343 } | |
| 344 EVP_PKEY_set1_EC_KEY(pktmp, a); | |
| 345 ret = i2d_PUBKEY(pktmp, pp); | |
| 346 EVP_PKEY_free(pktmp); | |
| 347 return(ret); | |
| 348 } | |
| 349 #endif | |
| 350 | |
| 351 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, | |
| 352 int ptype, void *pval, | |
| 353 unsigned char *penc, int penclen) | |
| 354 { | |
| 355 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) | |
| 356 return 0; | |
| 357 if (penc) | |
| 358 { | |
| 359 if (pub->public_key->data) | |
| 360 OPENSSL_free(pub->public_key->data); | |
| 361 pub->public_key->data = penc; | |
| 362 pub->public_key->length = penclen; | |
| 363 /* Set number of unused bits to zero */ | |
| 364 pub->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); | |
| 365 pub->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT; | |
| 366 } | |
| 367 return 1; | |
| 368 } | |
| 369 | |
| 370 int X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, | |
| 371 const unsigned char **pk, int *ppklen, | |
| 372 X509_ALGOR **pa, | |
| 373 X509_PUBKEY *pub) | |
| 374 { | |
| 375 if (ppkalg) | |
| 376 *ppkalg = pub->algor->algorithm; | |
| 377 if (pk) | |
| 378 { | |
| 379 *pk = pub->public_key->data; | |
| 380 *ppklen = pub->public_key->length; | |
| 381 } | |
| 382 if (pa) | |
| 383 *pa = pub->algor; | |
| 384 return 1; | |
| 385 } | |
| OLD | NEW |