ameth_lib.c revision 344604
1/* 2 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project 3 * 2006. 4 */ 5/* ==================================================================== 6 * Copyright (c) 2006-2018 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59#include <stdio.h> 60#include "cryptlib.h" 61#include <openssl/asn1t.h> 62#include <openssl/x509.h> 63#ifndef OPENSSL_NO_ENGINE 64# include <openssl/engine.h> 65#endif 66#include "asn1_locl.h" 67 68extern const EVP_PKEY_ASN1_METHOD rsa_asn1_meths[]; 69extern const EVP_PKEY_ASN1_METHOD dsa_asn1_meths[]; 70extern const EVP_PKEY_ASN1_METHOD dh_asn1_meth; 71extern const EVP_PKEY_ASN1_METHOD dhx_asn1_meth; 72extern const EVP_PKEY_ASN1_METHOD eckey_asn1_meth; 73extern const EVP_PKEY_ASN1_METHOD hmac_asn1_meth; 74extern const EVP_PKEY_ASN1_METHOD cmac_asn1_meth; 75 76/* Keep this sorted in type order !! */ 77static const EVP_PKEY_ASN1_METHOD *standard_methods[] = { 78#ifndef OPENSSL_NO_RSA 79 &rsa_asn1_meths[0], 80 &rsa_asn1_meths[1], 81#endif 82#ifndef OPENSSL_NO_DH 83 &dh_asn1_meth, 84#endif 85#ifndef OPENSSL_NO_DSA 86 &dsa_asn1_meths[0], 87 &dsa_asn1_meths[1], 88 &dsa_asn1_meths[2], 89 &dsa_asn1_meths[3], 90 &dsa_asn1_meths[4], 91#endif 92#ifndef OPENSSL_NO_EC 93 &eckey_asn1_meth, 94#endif 95 &hmac_asn1_meth, 96#ifndef OPENSSL_NO_CMAC 97 &cmac_asn1_meth, 98#endif 99#ifndef OPENSSL_NO_DH 100 &dhx_asn1_meth 101#endif 102}; 103 104typedef int sk_cmp_fn_type(const char *const *a, const char *const *b); 105DECLARE_STACK_OF(EVP_PKEY_ASN1_METHOD) 106static STACK_OF(EVP_PKEY_ASN1_METHOD) *app_methods = NULL; 107 108#ifdef TEST 109void main() 110{ 111 int i; 112 for (i = 0; 113 i < sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *); i++) 114 fprintf(stderr, "Number %d id=%d (%s)\n", i, 115 standard_methods[i]->pkey_id, 116 OBJ_nid2sn(standard_methods[i]->pkey_id)); 117} 118#endif 119 120DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_ASN1_METHOD *, 121 const EVP_PKEY_ASN1_METHOD *, ameth); 122 123static int ameth_cmp(const EVP_PKEY_ASN1_METHOD *const *a, 124 const EVP_PKEY_ASN1_METHOD *const *b) 125{ 126 return ((*a)->pkey_id - (*b)->pkey_id); 127} 128 129IMPLEMENT_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_ASN1_METHOD *, 130 const EVP_PKEY_ASN1_METHOD *, ameth); 131 132int EVP_PKEY_asn1_get_count(void) 133{ 134 int num = sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *); 135 if (app_methods) 136 num += sk_EVP_PKEY_ASN1_METHOD_num(app_methods); 137 return num; 138} 139 140const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx) 141{ 142 int num = sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *); 143 if (idx < 0) 144 return NULL; 145 if (idx < num) 146 return standard_methods[idx]; 147 idx -= num; 148 return sk_EVP_PKEY_ASN1_METHOD_value(app_methods, idx); 149} 150 151static const EVP_PKEY_ASN1_METHOD *pkey_asn1_find(int type) 152{ 153 EVP_PKEY_ASN1_METHOD tmp; 154 const EVP_PKEY_ASN1_METHOD *t = &tmp, **ret; 155 tmp.pkey_id = type; 156 if (app_methods) { 157 int idx; 158 idx = sk_EVP_PKEY_ASN1_METHOD_find(app_methods, &tmp); 159 if (idx >= 0) 160 return sk_EVP_PKEY_ASN1_METHOD_value(app_methods, idx); 161 } 162 ret = OBJ_bsearch_ameth(&t, standard_methods, sizeof(standard_methods) 163 / sizeof(EVP_PKEY_ASN1_METHOD *)); 164 if (!ret || !*ret) 165 return NULL; 166 return *ret; 167} 168 169/* 170 * Find an implementation of an ASN1 algorithm. If 'pe' is not NULL also 171 * search through engines and set *pe to a functional reference to the engine 172 * implementing 'type' or NULL if no engine implements it. 173 */ 174 175const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(ENGINE **pe, int type) 176{ 177 const EVP_PKEY_ASN1_METHOD *t; 178 179 for (;;) { 180 t = pkey_asn1_find(type); 181 if (!t || !(t->pkey_flags & ASN1_PKEY_ALIAS)) 182 break; 183 type = t->pkey_base_id; 184 } 185 if (pe) { 186#ifndef OPENSSL_NO_ENGINE 187 ENGINE *e; 188 /* type will contain the final unaliased type */ 189 e = ENGINE_get_pkey_asn1_meth_engine(type); 190 if (e) { 191 *pe = e; 192 return ENGINE_get_pkey_asn1_meth(e, type); 193 } 194#endif 195 *pe = NULL; 196 } 197 return t; 198} 199 200const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(ENGINE **pe, 201 const char *str, int len) 202{ 203 int i; 204 const EVP_PKEY_ASN1_METHOD *ameth; 205 if (len == -1) 206 len = strlen(str); 207 if (pe) { 208#ifndef OPENSSL_NO_ENGINE 209 ENGINE *e; 210 ameth = ENGINE_pkey_asn1_find_str(&e, str, len); 211 if (ameth) { 212 /* 213 * Convert structural into functional reference 214 */ 215 if (!ENGINE_init(e)) 216 ameth = NULL; 217 ENGINE_free(e); 218 *pe = e; 219 return ameth; 220 } 221#endif 222 *pe = NULL; 223 } 224 for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) { 225 ameth = EVP_PKEY_asn1_get0(i); 226 if (ameth->pkey_flags & ASN1_PKEY_ALIAS) 227 continue; 228 if (((int)strlen(ameth->pem_str) == len) && 229 !strncasecmp(ameth->pem_str, str, len)) 230 return ameth; 231 } 232 return NULL; 233} 234 235int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth) 236{ 237 /* 238 * One of the following must be true: 239 * 240 * pem_str == NULL AND ASN1_PKEY_ALIAS is set 241 * pem_str != NULL AND ASN1_PKEY_ALIAS is clear 242 * 243 * Anything else is an error and may lead to a corrupt ASN1 method table 244 */ 245 if (!((ameth->pem_str == NULL 246 && (ameth->pkey_flags & ASN1_PKEY_ALIAS) != 0) 247 || (ameth->pem_str != NULL 248 && (ameth->pkey_flags & ASN1_PKEY_ALIAS) == 0))) { 249 return 0; 250 } 251 252 if (app_methods == NULL) { 253 app_methods = sk_EVP_PKEY_ASN1_METHOD_new(ameth_cmp); 254 if (!app_methods) 255 return 0; 256 } 257 if (!sk_EVP_PKEY_ASN1_METHOD_push(app_methods, ameth)) 258 return 0; 259 sk_EVP_PKEY_ASN1_METHOD_sort(app_methods); 260 return 1; 261} 262 263int EVP_PKEY_asn1_add_alias(int to, int from) 264{ 265 EVP_PKEY_ASN1_METHOD *ameth; 266 ameth = EVP_PKEY_asn1_new(from, ASN1_PKEY_ALIAS, NULL, NULL); 267 if (!ameth) 268 return 0; 269 ameth->pkey_base_id = to; 270 if (!EVP_PKEY_asn1_add0(ameth)) { 271 EVP_PKEY_asn1_free(ameth); 272 return 0; 273 } 274 return 1; 275} 276 277int EVP_PKEY_asn1_get0_info(int *ppkey_id, int *ppkey_base_id, 278 int *ppkey_flags, const char **pinfo, 279 const char **ppem_str, 280 const EVP_PKEY_ASN1_METHOD *ameth) 281{ 282 if (!ameth) 283 return 0; 284 if (ppkey_id) 285 *ppkey_id = ameth->pkey_id; 286 if (ppkey_base_id) 287 *ppkey_base_id = ameth->pkey_base_id; 288 if (ppkey_flags) 289 *ppkey_flags = ameth->pkey_flags; 290 if (pinfo) 291 *pinfo = ameth->info; 292 if (ppem_str) 293 *ppem_str = ameth->pem_str; 294 return 1; 295} 296 297const EVP_PKEY_ASN1_METHOD *EVP_PKEY_get0_asn1(EVP_PKEY *pkey) 298{ 299 return pkey->ameth; 300} 301 302EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags, 303 const char *pem_str, const char *info) 304{ 305 EVP_PKEY_ASN1_METHOD *ameth; 306 ameth = OPENSSL_malloc(sizeof(EVP_PKEY_ASN1_METHOD)); 307 if (!ameth) 308 return NULL; 309 310 memset(ameth, 0, sizeof(EVP_PKEY_ASN1_METHOD)); 311 312 ameth->pkey_id = id; 313 ameth->pkey_base_id = id; 314 ameth->pkey_flags = flags | ASN1_PKEY_DYNAMIC; 315 316 if (info) { 317 ameth->info = BUF_strdup(info); 318 if (!ameth->info) 319 goto err; 320 } else 321 ameth->info = NULL; 322 323 if (pem_str) { 324 ameth->pem_str = BUF_strdup(pem_str); 325 if (!ameth->pem_str) 326 goto err; 327 } else 328 ameth->pem_str = NULL; 329 330 ameth->pub_decode = 0; 331 ameth->pub_encode = 0; 332 ameth->pub_cmp = 0; 333 ameth->pub_print = 0; 334 335 ameth->priv_decode = 0; 336 ameth->priv_encode = 0; 337 ameth->priv_print = 0; 338 339 ameth->old_priv_encode = 0; 340 ameth->old_priv_decode = 0; 341 342 ameth->item_verify = 0; 343 ameth->item_sign = 0; 344 345 ameth->pkey_size = 0; 346 ameth->pkey_bits = 0; 347 348 ameth->param_decode = 0; 349 ameth->param_encode = 0; 350 ameth->param_missing = 0; 351 ameth->param_copy = 0; 352 ameth->param_cmp = 0; 353 ameth->param_print = 0; 354 355 ameth->pkey_free = 0; 356 ameth->pkey_ctrl = 0; 357 358 return ameth; 359 360 err: 361 362 EVP_PKEY_asn1_free(ameth); 363 return NULL; 364 365} 366 367void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, 368 const EVP_PKEY_ASN1_METHOD *src) 369{ 370 371 dst->pub_decode = src->pub_decode; 372 dst->pub_encode = src->pub_encode; 373 dst->pub_cmp = src->pub_cmp; 374 dst->pub_print = src->pub_print; 375 376 dst->priv_decode = src->priv_decode; 377 dst->priv_encode = src->priv_encode; 378 dst->priv_print = src->priv_print; 379 380 dst->old_priv_encode = src->old_priv_encode; 381 dst->old_priv_decode = src->old_priv_decode; 382 383 dst->pkey_size = src->pkey_size; 384 dst->pkey_bits = src->pkey_bits; 385 386 dst->param_decode = src->param_decode; 387 dst->param_encode = src->param_encode; 388 dst->param_missing = src->param_missing; 389 dst->param_copy = src->param_copy; 390 dst->param_cmp = src->param_cmp; 391 dst->param_print = src->param_print; 392 393 dst->pkey_free = src->pkey_free; 394 dst->pkey_ctrl = src->pkey_ctrl; 395 396 dst->item_sign = src->item_sign; 397 dst->item_verify = src->item_verify; 398 399} 400 401void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth) 402{ 403 if (ameth && (ameth->pkey_flags & ASN1_PKEY_DYNAMIC)) { 404 if (ameth->pem_str) 405 OPENSSL_free(ameth->pem_str); 406 if (ameth->info) 407 OPENSSL_free(ameth->info); 408 OPENSSL_free(ameth); 409 } 410} 411 412void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, 413 int (*pub_decode) (EVP_PKEY *pk, 414 X509_PUBKEY *pub), 415 int (*pub_encode) (X509_PUBKEY *pub, 416 const EVP_PKEY *pk), 417 int (*pub_cmp) (const EVP_PKEY *a, 418 const EVP_PKEY *b), 419 int (*pub_print) (BIO *out, 420 const EVP_PKEY *pkey, 421 int indent, ASN1_PCTX *pctx), 422 int (*pkey_size) (const EVP_PKEY *pk), 423 int (*pkey_bits) (const EVP_PKEY *pk)) 424{ 425 ameth->pub_decode = pub_decode; 426 ameth->pub_encode = pub_encode; 427 ameth->pub_cmp = pub_cmp; 428 ameth->pub_print = pub_print; 429 ameth->pkey_size = pkey_size; 430 ameth->pkey_bits = pkey_bits; 431} 432 433void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, 434 int (*priv_decode) (EVP_PKEY *pk, 435 PKCS8_PRIV_KEY_INFO 436 *p8inf), 437 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, 438 const EVP_PKEY *pk), 439 int (*priv_print) (BIO *out, 440 const EVP_PKEY *pkey, 441 int indent, 442 ASN1_PCTX *pctx)) 443{ 444 ameth->priv_decode = priv_decode; 445 ameth->priv_encode = priv_encode; 446 ameth->priv_print = priv_print; 447} 448 449void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, 450 int (*param_decode) (EVP_PKEY *pkey, 451 const unsigned char **pder, 452 int derlen), 453 int (*param_encode) (const EVP_PKEY *pkey, 454 unsigned char **pder), 455 int (*param_missing) (const EVP_PKEY *pk), 456 int (*param_copy) (EVP_PKEY *to, 457 const EVP_PKEY *from), 458 int (*param_cmp) (const EVP_PKEY *a, 459 const EVP_PKEY *b), 460 int (*param_print) (BIO *out, 461 const EVP_PKEY *pkey, 462 int indent, ASN1_PCTX *pctx)) 463{ 464 ameth->param_decode = param_decode; 465 ameth->param_encode = param_encode; 466 ameth->param_missing = param_missing; 467 ameth->param_copy = param_copy; 468 ameth->param_cmp = param_cmp; 469 ameth->param_print = param_print; 470} 471 472void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, 473 void (*pkey_free) (EVP_PKEY *pkey)) 474{ 475 ameth->pkey_free = pkey_free; 476} 477 478void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, 479 int (*pkey_ctrl) (EVP_PKEY *pkey, int op, 480 long arg1, void *arg2)) 481{ 482 ameth->pkey_ctrl = pkey_ctrl; 483} 484 485void EVP_PKEY_asn1_set_item(EVP_PKEY_ASN1_METHOD *ameth, 486 int (*item_verify) (EVP_MD_CTX *ctx, 487 const ASN1_ITEM *it, 488 void *asn, 489 X509_ALGOR *a, 490 ASN1_BIT_STRING *sig, 491 EVP_PKEY *pkey), 492 int (*item_sign) (EVP_MD_CTX *ctx, 493 const ASN1_ITEM *it, 494 void *asn, 495 X509_ALGOR *alg1, 496 X509_ALGOR *alg2, 497 ASN1_BIT_STRING *sig)) 498{ 499 ameth->item_sign = item_sign; 500 ameth->item_verify = item_verify; 501} 502