pmeth_gn.c revision 1.18
1/* $OpenBSD: pmeth_gn.c,v 1.18 2024/04/12 09:41:39 tb Exp $ */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project 2006.
4 */
5/* ====================================================================
6 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in
17 *    the documentation and/or other materials provided with the
18 *    distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 *    software must display the following acknowledgment:
22 *    "This product includes software developed by the OpenSSL Project
23 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 *    endorse or promote products derived from this software without
27 *    prior written permission. For written permission, please contact
28 *    licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 *    nor may "OpenSSL" appear in their names without prior written
32 *    permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 *    acknowledgment:
36 *    "This product includes software developed by the OpenSSL Project
37 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com).  This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <stdio.h>
60#include <stdlib.h>
61
62#include <openssl/bn.h>
63#include <openssl/err.h>
64#include <openssl/evp.h>
65#include <openssl/objects.h>
66
67#include "asn1_local.h"
68#include "bn_local.h"
69#include "evp_local.h"
70
71int
72EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx)
73{
74	if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->paramgen == NULL) {
75		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
76		return -2;
77	}
78
79	ctx->operation = EVP_PKEY_OP_PARAMGEN;
80
81	return 1;
82}
83LCRYPTO_ALIAS(EVP_PKEY_paramgen_init);
84
85int
86EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey)
87{
88	int ret;
89
90	if (!ctx || !ctx->pmeth || !ctx->pmeth->paramgen) {
91		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
92		return -2;
93	}
94
95	if (ctx->operation != EVP_PKEY_OP_PARAMGEN) {
96		EVPerror(EVP_R_OPERATON_NOT_INITIALIZED);
97		return -1;
98	}
99
100	if (!ppkey)
101		return -1;
102
103	if (!*ppkey)
104		*ppkey = EVP_PKEY_new();
105
106	ret = ctx->pmeth->paramgen(ctx, *ppkey);
107	if (ret <= 0) {
108		EVP_PKEY_free(*ppkey);
109		*ppkey = NULL;
110	}
111	return ret;
112}
113LCRYPTO_ALIAS(EVP_PKEY_paramgen);
114
115int
116EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx)
117{
118	if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->keygen == NULL)  {
119		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
120		return -2;
121	}
122
123	ctx->operation = EVP_PKEY_OP_KEYGEN;
124
125	return 1;
126}
127LCRYPTO_ALIAS(EVP_PKEY_keygen_init);
128
129int
130EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey)
131{
132	int ret;
133
134	if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->keygen == NULL) {
135		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
136		return -2;
137	}
138	if (ctx->operation != EVP_PKEY_OP_KEYGEN) {
139		EVPerror(EVP_R_OPERATON_NOT_INITIALIZED);
140		return -1;
141	}
142
143	if (ppkey == NULL)
144		return -1;
145
146	if (*ppkey == NULL)
147		*ppkey = EVP_PKEY_new();
148	if (*ppkey == NULL)
149		return -1;
150
151	if ((ret = ctx->pmeth->keygen(ctx, *ppkey)) <= 0) {
152		EVP_PKEY_free(*ppkey);
153		*ppkey = NULL;
154	}
155
156	return ret;
157}
158LCRYPTO_ALIAS(EVP_PKEY_keygen);
159
160void
161EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb)
162{
163	ctx->pkey_gencb = cb;
164}
165LCRYPTO_ALIAS(EVP_PKEY_CTX_set_cb);
166
167EVP_PKEY_gen_cb *
168EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx)
169{
170	return ctx->pkey_gencb;
171}
172LCRYPTO_ALIAS(EVP_PKEY_CTX_get_cb);
173
174/* "translation callback" to call EVP_PKEY_CTX callbacks using BN_GENCB
175 * style callbacks.
176 */
177
178static int
179trans_cb(int a, int b, BN_GENCB *gcb)
180{
181	EVP_PKEY_CTX *ctx = gcb->arg;
182	ctx->keygen_info[0] = a;
183	ctx->keygen_info[1] = b;
184	return ctx->pkey_gencb(ctx);
185}
186
187void
188evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx)
189{
190	BN_GENCB_set(cb, trans_cb, ctx);
191}
192
193int
194EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx)
195{
196	if (idx == -1)
197		return ctx->keygen_info_count;
198	if (idx < 0 || idx >= ctx->keygen_info_count)
199		return 0;
200	return ctx->keygen_info[idx];
201}
202LCRYPTO_ALIAS(EVP_PKEY_CTX_get_keygen_info);
203
204EVP_PKEY *
205EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen)
206{
207	EVP_PKEY_CTX *mac_ctx = NULL;
208	EVP_PKEY *mac_key = NULL;
209
210	mac_ctx = EVP_PKEY_CTX_new_id(type, NULL);
211	if (!mac_ctx)
212		return NULL;
213	if (EVP_PKEY_keygen_init(mac_ctx) <= 0)
214		goto merr;
215	if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN,
216	    EVP_PKEY_CTRL_SET_MAC_KEY, keylen, (void *)key) <= 0)
217		goto merr;
218	if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0)
219		goto merr;
220
221merr:
222	EVP_PKEY_CTX_free(mac_ctx);
223	return mac_key;
224}
225LCRYPTO_ALIAS(EVP_PKEY_new_mac_key);
226
227int
228EVP_PKEY_check(EVP_PKEY_CTX *ctx)
229{
230	EVP_PKEY *pkey;
231
232	if ((pkey = ctx->pkey) == NULL) {
233		EVPerror(EVP_R_NO_KEY_SET);
234		return 0;
235	}
236
237	if (ctx->pmeth->check != NULL)
238		return ctx->pmeth->check(pkey);
239
240	if (pkey->ameth == NULL || pkey->ameth->pkey_check == NULL) {
241		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
242		return -2;
243	}
244
245	return pkey->ameth->pkey_check(pkey);
246}
247LCRYPTO_ALIAS(EVP_PKEY_check);
248
249int
250EVP_PKEY_public_check(EVP_PKEY_CTX *ctx)
251{
252	EVP_PKEY *pkey;
253
254	if ((pkey = ctx->pkey) == NULL) {
255		EVPerror(EVP_R_NO_KEY_SET);
256		return 0;
257	}
258
259	if (ctx->pmeth->public_check != NULL)
260		return ctx->pmeth->public_check(pkey);
261
262	if (pkey->ameth == NULL || pkey->ameth->pkey_public_check == NULL) {
263		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
264		return -2;
265	}
266
267	return pkey->ameth->pkey_public_check(pkey);
268}
269LCRYPTO_ALIAS(EVP_PKEY_public_check);
270
271int
272EVP_PKEY_param_check(EVP_PKEY_CTX *ctx)
273{
274	EVP_PKEY *pkey;
275
276	if ((pkey = ctx->pkey) == NULL) {
277		EVPerror(EVP_R_NO_KEY_SET);
278		return 0;
279	}
280
281	if (ctx->pmeth->param_check != NULL)
282		return ctx->pmeth->param_check(pkey);
283
284	if (pkey->ameth == NULL || pkey->ameth->pkey_param_check == NULL) {
285		EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
286		return -2;
287	}
288
289	return pkey->ameth->pkey_param_check(pkey);
290}
291LCRYPTO_ALIAS(EVP_PKEY_param_check);
292