0c994d54af
Currently, there are two different directories which contain internal header files of libcrypto which are meant to be shared internally: While header files in 'include/internal' are intended to be shared between libcrypto and libssl, the files in 'crypto/include/internal' are intended to be shared inside libcrypto only. To make things complicated, the include search path is set up in such a way that the directive #include "internal/file.h" could refer to a file in either of these two directoroes. This makes it necessary in some cases to add a '_int.h' suffix to some files to resolve this ambiguity: #include "internal/file.h" # located in 'include/internal' #include "internal/file_int.h" # located in 'crypto/include/internal' This commit moves the private crypto headers from 'crypto/include/internal' to 'include/crypto' As a result, the include directives become unambiguous #include "internal/file.h" # located in 'include/internal' #include "crypto/file.h" # located in 'include/crypto' hence the superfluous '_int.h' suffixes can be stripped. The files 'store_int.h' and 'store.h' need to be treated specially; they are joined into a single file. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9681)
239 lines
6 KiB
C
239 lines
6 KiB
C
/*
|
|
* Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include "internal/cryptlib.h"
|
|
#include <openssl/objects.h>
|
|
#include <openssl/evp.h>
|
|
#include "crypto/bn.h"
|
|
#include "crypto/asn1.h"
|
|
#include "crypto/evp.h"
|
|
|
|
int EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx)
|
|
{
|
|
int ret;
|
|
if (!ctx || !ctx->pmeth || !ctx->pmeth->paramgen) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAMGEN_INIT,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
ctx->operation = EVP_PKEY_OP_PARAMGEN;
|
|
if (!ctx->pmeth->paramgen_init)
|
|
return 1;
|
|
ret = ctx->pmeth->paramgen_init(ctx);
|
|
if (ret <= 0)
|
|
ctx->operation = EVP_PKEY_OP_UNDEFINED;
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey)
|
|
{
|
|
int ret;
|
|
if (!ctx || !ctx->pmeth || !ctx->pmeth->paramgen) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAMGEN,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
if (ctx->operation != EVP_PKEY_OP_PARAMGEN) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAMGEN, EVP_R_OPERATON_NOT_INITIALIZED);
|
|
return -1;
|
|
}
|
|
|
|
if (ppkey == NULL)
|
|
return -1;
|
|
|
|
if (*ppkey == NULL)
|
|
*ppkey = EVP_PKEY_new();
|
|
|
|
if (*ppkey == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAMGEN, ERR_R_MALLOC_FAILURE);
|
|
return -1;
|
|
}
|
|
|
|
ret = ctx->pmeth->paramgen(ctx, *ppkey);
|
|
if (ret <= 0) {
|
|
EVP_PKEY_free(*ppkey);
|
|
*ppkey = NULL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx)
|
|
{
|
|
int ret;
|
|
if (!ctx || !ctx->pmeth || !ctx->pmeth->keygen) {
|
|
EVPerr(EVP_F_EVP_PKEY_KEYGEN_INIT,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
ctx->operation = EVP_PKEY_OP_KEYGEN;
|
|
if (!ctx->pmeth->keygen_init)
|
|
return 1;
|
|
ret = ctx->pmeth->keygen_init(ctx);
|
|
if (ret <= 0)
|
|
ctx->operation = EVP_PKEY_OP_UNDEFINED;
|
|
return ret;
|
|
}
|
|
|
|
int EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey)
|
|
{
|
|
int ret;
|
|
|
|
if (!ctx || !ctx->pmeth || !ctx->pmeth->keygen) {
|
|
EVPerr(EVP_F_EVP_PKEY_KEYGEN,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
if (ctx->operation != EVP_PKEY_OP_KEYGEN) {
|
|
EVPerr(EVP_F_EVP_PKEY_KEYGEN, EVP_R_OPERATON_NOT_INITIALIZED);
|
|
return -1;
|
|
}
|
|
|
|
if (ppkey == NULL)
|
|
return -1;
|
|
|
|
if (*ppkey == NULL)
|
|
*ppkey = EVP_PKEY_new();
|
|
if (*ppkey == NULL)
|
|
return -1;
|
|
|
|
ret = ctx->pmeth->keygen(ctx, *ppkey);
|
|
if (ret <= 0) {
|
|
EVP_PKEY_free(*ppkey);
|
|
*ppkey = NULL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
void EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb)
|
|
{
|
|
ctx->pkey_gencb = cb;
|
|
}
|
|
|
|
EVP_PKEY_gen_cb *EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx)
|
|
{
|
|
return ctx->pkey_gencb;
|
|
}
|
|
|
|
/*
|
|
* "translation callback" to call EVP_PKEY_CTX callbacks using BN_GENCB style
|
|
* callbacks.
|
|
*/
|
|
|
|
static int trans_cb(int a, int b, BN_GENCB *gcb)
|
|
{
|
|
EVP_PKEY_CTX *ctx = BN_GENCB_get_arg(gcb);
|
|
ctx->keygen_info[0] = a;
|
|
ctx->keygen_info[1] = b;
|
|
return ctx->pkey_gencb(ctx);
|
|
}
|
|
|
|
void evp_pkey_set_cb_translate(BN_GENCB *cb, EVP_PKEY_CTX *ctx)
|
|
{
|
|
BN_GENCB_set(cb, trans_cb, ctx);
|
|
}
|
|
|
|
int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx)
|
|
{
|
|
if (idx == -1)
|
|
return ctx->keygen_info_count;
|
|
if (idx < 0 || idx > ctx->keygen_info_count)
|
|
return 0;
|
|
return ctx->keygen_info[idx];
|
|
}
|
|
|
|
EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e,
|
|
const unsigned char *key, int keylen)
|
|
{
|
|
EVP_PKEY_CTX *mac_ctx = NULL;
|
|
EVP_PKEY *mac_key = NULL;
|
|
mac_ctx = EVP_PKEY_CTX_new_id(type, e);
|
|
if (!mac_ctx)
|
|
return NULL;
|
|
if (EVP_PKEY_keygen_init(mac_ctx) <= 0)
|
|
goto merr;
|
|
if (EVP_PKEY_CTX_set_mac_key(mac_ctx, key, keylen) <= 0)
|
|
goto merr;
|
|
if (EVP_PKEY_keygen(mac_ctx, &mac_key) <= 0)
|
|
goto merr;
|
|
merr:
|
|
EVP_PKEY_CTX_free(mac_ctx);
|
|
return mac_key;
|
|
}
|
|
|
|
int EVP_PKEY_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
|
|
if (pkey == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_CHECK, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
/* call customized check function first */
|
|
if (ctx->pmeth->check != NULL)
|
|
return ctx->pmeth->check(pkey);
|
|
|
|
/* use default check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_check == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_CHECK,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
return pkey->ameth->pkey_check(pkey);
|
|
}
|
|
|
|
int EVP_PKEY_public_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
|
|
if (pkey == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_PUBLIC_CHECK, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
/* call customized public key check function first */
|
|
if (ctx->pmeth->public_check != NULL)
|
|
return ctx->pmeth->public_check(pkey);
|
|
|
|
/* use default public key check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_public_check == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_PUBLIC_CHECK,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
return pkey->ameth->pkey_public_check(pkey);
|
|
}
|
|
|
|
int EVP_PKEY_param_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
|
|
if (pkey == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAM_CHECK, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
/* call customized param check function first */
|
|
if (ctx->pmeth->param_check != NULL)
|
|
return ctx->pmeth->param_check(pkey);
|
|
|
|
/* use default param check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_param_check == NULL) {
|
|
EVPerr(EVP_F_EVP_PKEY_PARAM_CHECK,
|
|
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
return pkey->ameth->pkey_param_check(pkey);
|
|
}
|