xref: /openbsd-src/lib/libcrypto/evp/p_lib.c (revision b2ea75c1b17e1a9a339660e7ed45cd24946b230e)
1 /* crypto/evp/p_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/objects.h>
62 #include <openssl/evp.h>
63 #include <openssl/asn1_mac.h>
64 #include <openssl/x509.h>
65 
66 static void EVP_PKEY_free_it(EVP_PKEY *x);
67 int EVP_PKEY_bits(EVP_PKEY *pkey)
68 	{
69 #ifndef NO_RSA
70 	if (pkey->type == EVP_PKEY_RSA)
71 		return(BN_num_bits(pkey->pkey.rsa->n));
72 	else
73 #endif
74 #ifndef NO_DSA
75 		if (pkey->type == EVP_PKEY_DSA)
76 		return(BN_num_bits(pkey->pkey.dsa->p));
77 #endif
78 	return(0);
79 	}
80 
81 int EVP_PKEY_size(EVP_PKEY *pkey)
82 	{
83 	if (pkey == NULL)
84 		return(0);
85 #ifndef NO_RSA
86 	if (pkey->type == EVP_PKEY_RSA)
87 		return(RSA_size(pkey->pkey.rsa));
88 	else
89 #endif
90 #ifndef NO_DSA
91 		if (pkey->type == EVP_PKEY_DSA)
92 		return(DSA_size(pkey->pkey.dsa));
93 #endif
94 	return(0);
95 	}
96 
97 int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode)
98 	{
99 #ifndef NO_DSA
100 	if (pkey->type == EVP_PKEY_DSA)
101 		{
102 		int ret=pkey->save_parameters=mode;
103 
104 		if (mode >= 0)
105 			pkey->save_parameters=mode;
106 		return(ret);
107 		}
108 #endif
109 	return(0);
110 	}
111 
112 int EVP_PKEY_copy_parameters(EVP_PKEY *to, EVP_PKEY *from)
113 	{
114 	if (to->type != from->type)
115 		{
116 		EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_DIFFERENT_KEY_TYPES);
117 		goto err;
118 		}
119 
120 	if (EVP_PKEY_missing_parameters(from))
121 		{
122 		EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_MISSING_PARAMETERS);
123 		goto err;
124 		}
125 #ifndef NO_DSA
126 	if (to->type == EVP_PKEY_DSA)
127 		{
128 		BIGNUM *a;
129 
130 		if ((a=BN_dup(from->pkey.dsa->p)) == NULL) goto err;
131 		if (to->pkey.dsa->p != NULL) BN_free(to->pkey.dsa->p);
132 		to->pkey.dsa->p=a;
133 
134 		if ((a=BN_dup(from->pkey.dsa->q)) == NULL) goto err;
135 		if (to->pkey.dsa->q != NULL) BN_free(to->pkey.dsa->q);
136 		to->pkey.dsa->q=a;
137 
138 		if ((a=BN_dup(from->pkey.dsa->g)) == NULL) goto err;
139 		if (to->pkey.dsa->g != NULL) BN_free(to->pkey.dsa->g);
140 		to->pkey.dsa->g=a;
141 		}
142 #endif
143 	return(1);
144 err:
145 	return(0);
146 	}
147 
148 int EVP_PKEY_missing_parameters(EVP_PKEY *pkey)
149 	{
150 #ifndef NO_DSA
151 	if (pkey->type == EVP_PKEY_DSA)
152 		{
153 		DSA *dsa;
154 
155 		dsa=pkey->pkey.dsa;
156 		if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
157 			return(1);
158 		}
159 #endif
160 	return(0);
161 	}
162 
163 int EVP_PKEY_cmp_parameters(EVP_PKEY *a, EVP_PKEY *b)
164 	{
165 #ifndef NO_DSA
166 	if ((a->type == EVP_PKEY_DSA) && (b->type == EVP_PKEY_DSA))
167 		{
168 		if (	BN_cmp(a->pkey.dsa->p,b->pkey.dsa->p) ||
169 			BN_cmp(a->pkey.dsa->q,b->pkey.dsa->q) ||
170 			BN_cmp(a->pkey.dsa->g,b->pkey.dsa->g))
171 			return(0);
172 		else
173 			return(1);
174 		}
175 #endif
176 	return(-1);
177 	}
178 
179 EVP_PKEY *EVP_PKEY_new(void)
180 	{
181 	EVP_PKEY *ret;
182 
183 	ret=(EVP_PKEY *)OPENSSL_malloc(sizeof(EVP_PKEY));
184 	if (ret == NULL)
185 		{
186 		EVPerr(EVP_F_EVP_PKEY_NEW,ERR_R_MALLOC_FAILURE);
187 		return(NULL);
188 		}
189 	ret->type=EVP_PKEY_NONE;
190 	ret->references=1;
191 	ret->pkey.ptr=NULL;
192 	ret->attributes=NULL;
193 	ret->save_parameters=1;
194 	return(ret);
195 	}
196 
197 int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key)
198 	{
199 	if (pkey == NULL) return(0);
200 	if (pkey->pkey.ptr != NULL)
201 		EVP_PKEY_free_it(pkey);
202 	pkey->type=EVP_PKEY_type(type);
203 	pkey->save_type=type;
204 	pkey->pkey.ptr=key;
205 	return(key != NULL);
206 	}
207 
208 #ifndef NO_RSA
209 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key)
210 {
211 	int ret = EVP_PKEY_assign_RSA(pkey, key);
212 	if(ret) CRYPTO_add(&key->references, 1, CRYPTO_LOCK_RSA);
213 	return ret;
214 }
215 
216 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey)
217 	{
218 	if(pkey->type != EVP_PKEY_RSA) {
219 		EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY);
220 		return NULL;
221 	}
222 	CRYPTO_add(&pkey->pkey.rsa->references, 1, CRYPTO_LOCK_RSA);
223 	return pkey->pkey.rsa;
224 }
225 #endif
226 
227 #ifndef NO_DSA
228 int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key)
229 {
230 	int ret = EVP_PKEY_assign_DSA(pkey, key);
231 	if(ret) CRYPTO_add(&key->references, 1, CRYPTO_LOCK_DSA);
232 	return ret;
233 }
234 
235 DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey)
236 	{
237 	if(pkey->type != EVP_PKEY_DSA) {
238 		EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY);
239 		return NULL;
240 	}
241 	CRYPTO_add(&pkey->pkey.dsa->references, 1, CRYPTO_LOCK_DSA);
242 	return pkey->pkey.dsa;
243 }
244 #endif
245 
246 #ifndef NO_DH
247 
248 int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key)
249 {
250 	int ret = EVP_PKEY_assign_DH(pkey, key);
251 	if(ret) CRYPTO_add(&key->references, 1, CRYPTO_LOCK_DH);
252 	return ret;
253 }
254 
255 DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey)
256 	{
257 	if(pkey->type != EVP_PKEY_DH) {
258 		EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY);
259 		return NULL;
260 	}
261 	CRYPTO_add(&pkey->pkey.dh->references, 1, CRYPTO_LOCK_DH);
262 	return pkey->pkey.dh;
263 }
264 #endif
265 
266 int EVP_PKEY_type(int type)
267 	{
268 	switch (type)
269 		{
270 	case EVP_PKEY_RSA:
271 	case EVP_PKEY_RSA2:
272 		return(EVP_PKEY_RSA);
273 	case EVP_PKEY_DSA:
274 	case EVP_PKEY_DSA1:
275 	case EVP_PKEY_DSA2:
276 	case EVP_PKEY_DSA3:
277 	case EVP_PKEY_DSA4:
278 		return(EVP_PKEY_DSA);
279 	case EVP_PKEY_DH:
280 		return(EVP_PKEY_DH);
281 	default:
282 		return(NID_undef);
283 		}
284 	}
285 
286 void EVP_PKEY_free(EVP_PKEY *x)
287 	{
288 	int i;
289 
290 	if (x == NULL) return;
291 
292 	i=CRYPTO_add(&x->references,-1,CRYPTO_LOCK_EVP_PKEY);
293 #ifdef REF_PRINT
294 	REF_PRINT("EVP_PKEY",x);
295 #endif
296 	if (i > 0) return;
297 #ifdef REF_CHECK
298 	if (i < 0)
299 		{
300 		fprintf(stderr,"EVP_PKEY_free, bad reference count\n");
301 		abort();
302 		}
303 #endif
304 	EVP_PKEY_free_it(x);
305 	OPENSSL_free(x);
306 	}
307 
308 static void EVP_PKEY_free_it(EVP_PKEY *x)
309 	{
310 	switch (x->type)
311 		{
312 #ifndef NO_RSA
313 	case EVP_PKEY_RSA:
314 	case EVP_PKEY_RSA2:
315 		RSA_free(x->pkey.rsa);
316 		break;
317 #endif
318 #ifndef NO_DSA
319 	case EVP_PKEY_DSA:
320 	case EVP_PKEY_DSA2:
321 	case EVP_PKEY_DSA3:
322 	case EVP_PKEY_DSA4:
323 		DSA_free(x->pkey.dsa);
324 		break;
325 #endif
326 #ifndef NO_DH
327 	case EVP_PKEY_DH:
328 		DH_free(x->pkey.dh);
329 		break;
330 #endif
331 		}
332 	}
333 
334