pmeth_gn.c revision 1.18
1/* $OpenBSD: pmeth_gn.c,v 1.18 2024/04/12 09:41:39 tb Exp $ */ 2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project 2006. 4 */ 5/* ==================================================================== 6 * Copyright (c) 2006 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59#include <stdio.h> 60#include <stdlib.h> 61 62#include <openssl/bn.h> 63#include <openssl/err.h> 64#include <openssl/evp.h> 65#include <openssl/objects.h> 66 67#include "asn1_local.h" 68#include "bn_local.h" 69#include "evp_local.h" 70 71int 72EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx) 73{ 74 if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->paramgen == NULL) { 75 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 76 return -2; 77 } 78 79 ctx->operation = EVP_PKEY_OP_PARAMGEN; 80 81 return 1; 82} 83LCRYPTO_ALIAS(EVP_PKEY_paramgen_init); 84 85int 86EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) 87{ 88 int ret; 89 90 if (!ctx || !ctx->pmeth || !ctx->pmeth->paramgen) { 91 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 92 return -2; 93 } 94 95 if (ctx->operation != EVP_PKEY_OP_PARAMGEN) { 96 EVPerror(EVP_R_OPERATON_NOT_INITIALIZED); 97 return -1; 98 } 99 100 if (!ppkey) 101 return -1; 102 103 if (!*ppkey) 104 *ppkey = EVP_PKEY_new(); 105 106 ret = ctx->pmeth->paramgen(ctx, *ppkey); 107 if (ret <= 0) { 108 EVP_PKEY_free(*ppkey); 109 *ppkey = NULL; 110 } 111 return ret; 112} 113LCRYPTO_ALIAS(EVP_PKEY_paramgen); 114 115int 116EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx) 117{ 118 if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->keygen == NULL) { 119 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 120 return -2; 121 } 122 123 ctx->operation = EVP_PKEY_OP_KEYGEN; 124 125 return 1; 126} 127LCRYPTO_ALIAS(EVP_PKEY_keygen_init); 128 129int 130EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) 131{ 132 int ret; 133 134 if (ctx == NULL || ctx->pmeth == NULL || ctx->pmeth->keygen == NULL) { 135 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 136 return -2; 137 } 138 if (ctx->operation != EVP_PKEY_OP_KEYGEN) { 139 EVPerror(EVP_R_OPERATON_NOT_INITIALIZED); 140 return -1; 141 } 142 143 if (ppkey == NULL) 144 return -1; 145 146 if (*ppkey == NULL) 147 *ppkey = EVP_PKEY_new(); 148 if (*ppkey == NULL) 149 return -1; 150 151 if ((ret = ctx->pmeth->keygen(ctx, *ppkey)) <= 0) { 152 EVP_PKEY_free(*ppkey); 153 *ppkey = NULL; 154 } 155 156 return ret; 157} 158LCRYPTO_ALIAS(EVP_PKEY_keygen); 159 160void 161EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb) 162{ 163 ctx->pkey_gencb = cb; 164} 165LCRYPTO_ALIAS(EVP_PKEY_CTX_set_cb); 166 167EVP_PKEY_gen_cb * 168EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx) 169{ 170 return ctx->pkey_gencb; 171} 172LCRYPTO_ALIAS(EVP_PKEY_CTX_get_cb); 173 174/* "translation callback" to call EVP_PKEY_CTX callbacks using BN_GENCB 175 * style callbacks. 176 */ 177 178static int 179trans_cb(int a, int b, BN_GENCB *gcb) 180{ 181 EVP_PKEY_CTX *ctx = gcb->arg; 182 ctx->keygen_info[0] = a; 183 ctx->keygen_info[1] = b; 184 return ctx->pkey_gencb(ctx); 185} 186 187void 188evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx) 189{ 190 BN_GENCB_set(cb, trans_cb, ctx); 191} 192 193int 194EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx) 195{ 196 if (idx == -1) 197 return ctx->keygen_info_count; 198 if (idx < 0 || idx >= ctx->keygen_info_count) 199 return 0; 200 return ctx->keygen_info[idx]; 201} 202LCRYPTO_ALIAS(EVP_PKEY_CTX_get_keygen_info); 203 204EVP_PKEY * 205EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen) 206{ 207 EVP_PKEY_CTX *mac_ctx = NULL; 208 EVP_PKEY *mac_key = NULL; 209 210 mac_ctx = EVP_PKEY_CTX_new_id(type, NULL); 211 if (!mac_ctx) 212 return NULL; 213 if (EVP_PKEY_keygen_init(mac_ctx) <= 0) 214 goto merr; 215 if (EVP_PKEY_CTX_ctrl(mac_ctx, -1, EVP_PKEY_OP_KEYGEN, 216 EVP_PKEY_CTRL_SET_MAC_KEY, keylen, (void *)key) <= 0) 217 goto merr; 218 if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0) 219 goto merr; 220 221merr: 222 EVP_PKEY_CTX_free(mac_ctx); 223 return mac_key; 224} 225LCRYPTO_ALIAS(EVP_PKEY_new_mac_key); 226 227int 228EVP_PKEY_check(EVP_PKEY_CTX *ctx) 229{ 230 EVP_PKEY *pkey; 231 232 if ((pkey = ctx->pkey) == NULL) { 233 EVPerror(EVP_R_NO_KEY_SET); 234 return 0; 235 } 236 237 if (ctx->pmeth->check != NULL) 238 return ctx->pmeth->check(pkey); 239 240 if (pkey->ameth == NULL || pkey->ameth->pkey_check == NULL) { 241 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 242 return -2; 243 } 244 245 return pkey->ameth->pkey_check(pkey); 246} 247LCRYPTO_ALIAS(EVP_PKEY_check); 248 249int 250EVP_PKEY_public_check(EVP_PKEY_CTX *ctx) 251{ 252 EVP_PKEY *pkey; 253 254 if ((pkey = ctx->pkey) == NULL) { 255 EVPerror(EVP_R_NO_KEY_SET); 256 return 0; 257 } 258 259 if (ctx->pmeth->public_check != NULL) 260 return ctx->pmeth->public_check(pkey); 261 262 if (pkey->ameth == NULL || pkey->ameth->pkey_public_check == NULL) { 263 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 264 return -2; 265 } 266 267 return pkey->ameth->pkey_public_check(pkey); 268} 269LCRYPTO_ALIAS(EVP_PKEY_public_check); 270 271int 272EVP_PKEY_param_check(EVP_PKEY_CTX *ctx) 273{ 274 EVP_PKEY *pkey; 275 276 if ((pkey = ctx->pkey) == NULL) { 277 EVPerror(EVP_R_NO_KEY_SET); 278 return 0; 279 } 280 281 if (ctx->pmeth->param_check != NULL) 282 return ctx->pmeth->param_check(pkey); 283 284 if (pkey->ameth == NULL || pkey->ameth->pkey_param_check == NULL) { 285 EVPerror(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE); 286 return -2; 287 } 288 289 return pkey->ameth->pkey_param_check(pkey); 290} 291LCRYPTO_ALIAS(EVP_PKEY_param_check); 292