xref: /openbsd-src/lib/libcrypto/evp/p_lib.c (revision daf88648c0e349d5c02e1504293082072c981640)
1 /* crypto/evp/p_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/objects.h>
62 #include <openssl/evp.h>
63 #include <openssl/asn1_mac.h>
64 #include <openssl/x509.h>
65 
66 static void EVP_PKEY_free_it(EVP_PKEY *x);
67 
68 int EVP_PKEY_bits(EVP_PKEY *pkey)
69 	{
70 #ifndef OPENSSL_NO_RSA
71 	if (pkey->type == EVP_PKEY_RSA)
72 		return(BN_num_bits(pkey->pkey.rsa->n));
73 	else
74 #endif
75 #ifndef OPENSSL_NO_DSA
76 		if (pkey->type == EVP_PKEY_DSA)
77 		return(BN_num_bits(pkey->pkey.dsa->p));
78 #endif
79 	return(0);
80 	}
81 
82 int EVP_PKEY_size(EVP_PKEY *pkey)
83 	{
84 	if (pkey == NULL)
85 		return(0);
86 #ifndef OPENSSL_NO_RSA
87 	if (pkey->type == EVP_PKEY_RSA)
88 		return(RSA_size(pkey->pkey.rsa));
89 	else
90 #endif
91 #ifndef OPENSSL_NO_DSA
92 		if (pkey->type == EVP_PKEY_DSA)
93 		return(DSA_size(pkey->pkey.dsa));
94 #endif
95 	return(0);
96 	}
97 
98 int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode)
99 	{
100 #ifndef OPENSSL_NO_DSA
101 	if (pkey->type == EVP_PKEY_DSA)
102 		{
103 		int ret=pkey->save_parameters;
104 
105 		if (mode >= 0)
106 			pkey->save_parameters=mode;
107 		return(ret);
108 		}
109 #endif
110 	return(0);
111 	}
112 
113 int EVP_PKEY_copy_parameters(EVP_PKEY *to, EVP_PKEY *from)
114 	{
115 	if (to->type != from->type)
116 		{
117 		EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_DIFFERENT_KEY_TYPES);
118 		goto err;
119 		}
120 
121 	if (EVP_PKEY_missing_parameters(from))
122 		{
123 		EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS,EVP_R_MISSING_PARAMETERS);
124 		goto err;
125 		}
126 #ifndef OPENSSL_NO_DSA
127 	if (to->type == EVP_PKEY_DSA)
128 		{
129 		BIGNUM *a;
130 
131 		if ((a=BN_dup(from->pkey.dsa->p)) == NULL) goto err;
132 		if (to->pkey.dsa->p != NULL) BN_free(to->pkey.dsa->p);
133 		to->pkey.dsa->p=a;
134 
135 		if ((a=BN_dup(from->pkey.dsa->q)) == NULL) goto err;
136 		if (to->pkey.dsa->q != NULL) BN_free(to->pkey.dsa->q);
137 		to->pkey.dsa->q=a;
138 
139 		if ((a=BN_dup(from->pkey.dsa->g)) == NULL) goto err;
140 		if (to->pkey.dsa->g != NULL) BN_free(to->pkey.dsa->g);
141 		to->pkey.dsa->g=a;
142 		}
143 #endif
144 	return(1);
145 err:
146 	return(0);
147 	}
148 
149 int EVP_PKEY_missing_parameters(EVP_PKEY *pkey)
150 	{
151 #ifndef OPENSSL_NO_DSA
152 	if (pkey->type == EVP_PKEY_DSA)
153 		{
154 		DSA *dsa;
155 
156 		dsa=pkey->pkey.dsa;
157 		if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
158 			return(1);
159 		}
160 #endif
161 	return(0);
162 	}
163 
164 int EVP_PKEY_cmp_parameters(EVP_PKEY *a, EVP_PKEY *b)
165 	{
166 #ifndef OPENSSL_NO_DSA
167 	if ((a->type == EVP_PKEY_DSA) && (b->type == EVP_PKEY_DSA))
168 		{
169 		if (	BN_cmp(a->pkey.dsa->p,b->pkey.dsa->p) ||
170 			BN_cmp(a->pkey.dsa->q,b->pkey.dsa->q) ||
171 			BN_cmp(a->pkey.dsa->g,b->pkey.dsa->g))
172 			return(0);
173 		else
174 			return(1);
175 		}
176 #endif
177 	return(-1);
178 	}
179 
180 EVP_PKEY *EVP_PKEY_new(void)
181 	{
182 	EVP_PKEY *ret;
183 
184 	ret=(EVP_PKEY *)OPENSSL_malloc(sizeof(EVP_PKEY));
185 	if (ret == NULL)
186 		{
187 		EVPerr(EVP_F_EVP_PKEY_NEW,ERR_R_MALLOC_FAILURE);
188 		return(NULL);
189 		}
190 	ret->type=EVP_PKEY_NONE;
191 	ret->references=1;
192 	ret->pkey.ptr=NULL;
193 	ret->attributes=NULL;
194 	ret->save_parameters=1;
195 	return(ret);
196 	}
197 
198 int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key)
199 	{
200 	if (pkey == NULL) return(0);
201 	if (pkey->pkey.ptr != NULL)
202 		EVP_PKEY_free_it(pkey);
203 	pkey->type=EVP_PKEY_type(type);
204 	pkey->save_type=type;
205 	pkey->pkey.ptr=key;
206 	return(key != NULL);
207 	}
208 
209 #ifndef OPENSSL_NO_RSA
210 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key)
211 {
212 	int ret = EVP_PKEY_assign_RSA(pkey, key);
213 	if(ret)
214 		RSA_up_ref(key);
215 	return ret;
216 }
217 
218 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey)
219 	{
220 	if(pkey->type != EVP_PKEY_RSA) {
221 		EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY);
222 		return NULL;
223 	}
224 	RSA_up_ref(pkey->pkey.rsa);
225 	return pkey->pkey.rsa;
226 }
227 #endif
228 
229 #ifndef OPENSSL_NO_DSA
230 int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key)
231 {
232 	int ret = EVP_PKEY_assign_DSA(pkey, key);
233 	if(ret)
234 		DSA_up_ref(key);
235 	return ret;
236 }
237 
238 DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey)
239 	{
240 	if(pkey->type != EVP_PKEY_DSA) {
241 		EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY);
242 		return NULL;
243 	}
244 	DSA_up_ref(pkey->pkey.dsa);
245 	return pkey->pkey.dsa;
246 }
247 #endif
248 
249 #ifndef OPENSSL_NO_DH
250 
251 int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key)
252 {
253 	int ret = EVP_PKEY_assign_DH(pkey, key);
254 	if(ret)
255 		DH_up_ref(key);
256 	return ret;
257 }
258 
259 DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey)
260 	{
261 	if(pkey->type != EVP_PKEY_DH) {
262 		EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY);
263 		return NULL;
264 	}
265 	DH_up_ref(pkey->pkey.dh);
266 	return pkey->pkey.dh;
267 }
268 #endif
269 
270 int EVP_PKEY_type(int type)
271 	{
272 	switch (type)
273 		{
274 	case EVP_PKEY_RSA:
275 	case EVP_PKEY_RSA2:
276 		return(EVP_PKEY_RSA);
277 	case EVP_PKEY_DSA:
278 	case EVP_PKEY_DSA1:
279 	case EVP_PKEY_DSA2:
280 	case EVP_PKEY_DSA3:
281 	case EVP_PKEY_DSA4:
282 		return(EVP_PKEY_DSA);
283 	case EVP_PKEY_DH:
284 		return(EVP_PKEY_DH);
285 	default:
286 		return(NID_undef);
287 		}
288 	}
289 
290 void EVP_PKEY_free(EVP_PKEY *x)
291 	{
292 	int i;
293 
294 	if (x == NULL) return;
295 
296 	i=CRYPTO_add(&x->references,-1,CRYPTO_LOCK_EVP_PKEY);
297 #ifdef REF_PRINT
298 	REF_PRINT("EVP_PKEY",x);
299 #endif
300 	if (i > 0) return;
301 #ifdef REF_CHECK
302 	if (i < 0)
303 		{
304 		fprintf(stderr,"EVP_PKEY_free, bad reference count\n");
305 		abort();
306 		}
307 #endif
308 	EVP_PKEY_free_it(x);
309 	OPENSSL_free(x);
310 	}
311 
312 static void EVP_PKEY_free_it(EVP_PKEY *x)
313 	{
314 	switch (x->type)
315 		{
316 #ifndef OPENSSL_NO_RSA
317 	case EVP_PKEY_RSA:
318 	case EVP_PKEY_RSA2:
319 		RSA_free(x->pkey.rsa);
320 		break;
321 #endif
322 #ifndef OPENSSL_NO_DSA
323 	case EVP_PKEY_DSA:
324 	case EVP_PKEY_DSA2:
325 	case EVP_PKEY_DSA3:
326 	case EVP_PKEY_DSA4:
327 		DSA_free(x->pkey.dsa);
328 		break;
329 #endif
330 #ifndef OPENSSL_NO_DH
331 	case EVP_PKEY_DH:
332 		DH_free(x->pkey.dh);
333 		break;
334 #endif
335 		}
336 	}
337 
338