p_lib.c revision 109998
1/* crypto/evp/p_lib.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#include "cryptlib.h" 61#include <openssl/objects.h> 62#include <openssl/evp.h> 63#include <openssl/asn1_mac.h> 64#include <openssl/x509.h> 65 66static void EVP_PKEY_free_it(EVP_PKEY *x); 67 68int EVP_PKEY_bits(EVP_PKEY *pkey) 69 { 70#ifndef OPENSSL_NO_RSA 71 if (pkey->type == EVP_PKEY_RSA) 72 return(BN_num_bits(pkey->pkey.rsa->n)); 73 else 74#endif 75#ifndef OPENSSL_NO_DSA 76 if (pkey->type == EVP_PKEY_DSA) 77 return(BN_num_bits(pkey->pkey.dsa->p)); 78#endif 79 return(0); 80 } 81 82int EVP_PKEY_size(EVP_PKEY *pkey) 83 { 84 if (pkey == NULL) 85 return(0); 86#ifndef OPENSSL_NO_RSA 87 if (pkey->type == EVP_PKEY_RSA) 88 return(RSA_size(pkey->pkey.rsa)); 89 else 90#endif 91#ifndef OPENSSL_NO_DSA 92 if (pkey->type == EVP_PKEY_DSA) 93 return(DSA_size(pkey->pkey.dsa)); 94#endif 95 return(0); 96 } 97 98int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode) 99 { 100#ifndef OPENSSL_NO_DSA 101 if (pkey->type == EVP_PKEY_DSA) 102 { 103 int ret=pkey->save_parameters; 104 105 if (mode >= 0) 106 pkey->save_parameters=mode; 107 return(ret); 108 } 109#endif 110 return(0); 111 } 112 113int EVP_PKEY_copy_parameters(EVP_PKEY *to, EVP_PKEY *from) 114 { 115 if (to->type != from->type) 116 { 117 EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_DIFFERENT_KEY_TYPES); 118 goto err; 119 } 120 121 if (EVP_PKEY_missing_parameters(from)) 122 { 123 EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_MISSING_PARAMETERS); 124 goto err; 125 } 126#ifndef OPENSSL_NO_DSA 127 if (to->type == EVP_PKEY_DSA) 128 { 129 BIGNUM *a; 130 131 if ((a=BN_dup(from->pkey.dsa->p)) == NULL) goto err; 132 if (to->pkey.dsa->p != NULL) BN_free(to->pkey.dsa->p); 133 to->pkey.dsa->p=a; 134 135 if ((a=BN_dup(from->pkey.dsa->q)) == NULL) goto err; 136 if (to->pkey.dsa->q != NULL) BN_free(to->pkey.dsa->q); 137 to->pkey.dsa->q=a; 138 139 if ((a=BN_dup(from->pkey.dsa->g)) == NULL) goto err; 140 if (to->pkey.dsa->g != NULL) BN_free(to->pkey.dsa->g); 141 to->pkey.dsa->g=a; 142 } 143#endif 144 return(1); 145err: 146 return(0); 147 } 148 149int EVP_PKEY_missing_parameters(EVP_PKEY *pkey) 150 { 151#ifndef OPENSSL_NO_DSA 152 if (pkey->type == EVP_PKEY_DSA) 153 { 154 DSA *dsa; 155 156 dsa=pkey->pkey.dsa; 157 if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL)) 158 return(1); 159 } 160#endif 161 return(0); 162 } 163 164int EVP_PKEY_cmp_parameters(EVP_PKEY *a, EVP_PKEY *b) 165 { 166#ifndef OPENSSL_NO_DSA 167 if ((a->type == EVP_PKEY_DSA) && (b->type == EVP_PKEY_DSA)) 168 { 169 if ( BN_cmp(a->pkey.dsa->p,b->pkey.dsa->p) || 170 BN_cmp(a->pkey.dsa->q,b->pkey.dsa->q) || 171 BN_cmp(a->pkey.dsa->g,b->pkey.dsa->g)) 172 return(0); 173 else 174 return(1); 175 } 176#endif 177 return(-1); 178 } 179 180EVP_PKEY *EVP_PKEY_new(void) 181 { 182 EVP_PKEY *ret; 183 184 ret=(EVP_PKEY *)OPENSSL_malloc(sizeof(EVP_PKEY)); 185 if (ret == NULL) 186 { 187 EVPerr(EVP_F_EVP_PKEY_NEW,ERR_R_MALLOC_FAILURE); 188 return(NULL); 189 } 190 ret->type=EVP_PKEY_NONE; 191 ret->references=1; 192 ret->pkey.ptr=NULL; 193 ret->attributes=NULL; 194 ret->save_parameters=1; 195 return(ret); 196 } 197 198int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key) 199 { 200 if (pkey == NULL) return(0); 201 if (pkey->pkey.ptr != NULL) 202 EVP_PKEY_free_it(pkey); 203 pkey->type=EVP_PKEY_type(type); 204 pkey->save_type=type; 205 pkey->pkey.ptr=key; 206 return(key != NULL); 207 } 208 209#ifndef OPENSSL_NO_RSA 210int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) 211{ 212 int ret = EVP_PKEY_assign_RSA(pkey, key); 213 if(ret) 214 RSA_up_ref(key); 215 return ret; 216} 217 218RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) 219 { 220 if(pkey->type != EVP_PKEY_RSA) { 221 EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY); 222 return NULL; 223 } 224 RSA_up_ref(pkey->pkey.rsa); 225 return pkey->pkey.rsa; 226} 227#endif 228 229#ifndef OPENSSL_NO_DSA 230int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) 231{ 232 int ret = EVP_PKEY_assign_DSA(pkey, key); 233 if(ret) 234 DSA_up_ref(key); 235 return ret; 236} 237 238DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey) 239 { 240 if(pkey->type != EVP_PKEY_DSA) { 241 EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY); 242 return NULL; 243 } 244 DSA_up_ref(pkey->pkey.dsa); 245 return pkey->pkey.dsa; 246} 247#endif 248 249#ifndef OPENSSL_NO_DH 250 251int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) 252{ 253 int ret = EVP_PKEY_assign_DH(pkey, key); 254 if(ret) 255 DH_up_ref(key); 256 return ret; 257} 258 259DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey) 260 { 261 if(pkey->type != EVP_PKEY_DH) { 262 EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY); 263 return NULL; 264 } 265 DH_up_ref(pkey->pkey.dh); 266 return pkey->pkey.dh; 267} 268#endif 269 270int EVP_PKEY_type(int type) 271 { 272 switch (type) 273 { 274 case EVP_PKEY_RSA: 275 case EVP_PKEY_RSA2: 276 return(EVP_PKEY_RSA); 277 case EVP_PKEY_DSA: 278 case EVP_PKEY_DSA1: 279 case EVP_PKEY_DSA2: 280 case EVP_PKEY_DSA3: 281 case EVP_PKEY_DSA4: 282 return(EVP_PKEY_DSA); 283 case EVP_PKEY_DH: 284 return(EVP_PKEY_DH); 285 default: 286 return(NID_undef); 287 } 288 } 289 290void EVP_PKEY_free(EVP_PKEY *x) 291 { 292 int i; 293 294 if (x == NULL) return; 295 296 i=CRYPTO_add(&x->references,-1,CRYPTO_LOCK_EVP_PKEY); 297#ifdef REF_PRINT 298 REF_PRINT("EVP_PKEY",x); 299#endif 300 if (i > 0) return; 301#ifdef REF_CHECK 302 if (i < 0) 303 { 304 fprintf(stderr,"EVP_PKEY_free, bad reference count\n"); 305 abort(); 306 } 307#endif 308 EVP_PKEY_free_it(x); 309 OPENSSL_free(x); 310 } 311 312static void EVP_PKEY_free_it(EVP_PKEY *x) 313 { 314 switch (x->type) 315 { 316#ifndef OPENSSL_NO_RSA 317 case EVP_PKEY_RSA: 318 case EVP_PKEY_RSA2: 319 RSA_free(x->pkey.rsa); 320 break; 321#endif 322#ifndef OPENSSL_NO_DSA 323 case EVP_PKEY_DSA: 324 case EVP_PKEY_DSA2: 325 case EVP_PKEY_DSA3: 326 case EVP_PKEY_DSA4: 327 DSA_free(x->pkey.dsa); 328 break; 329#endif 330#ifndef OPENSSL_NO_DH 331 case EVP_PKEY_DH: 332 DH_free(x->pkey.dh); 333 break; 334#endif 335 } 336 } 337 338