Line data Source code
1 : /*
2 : * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
3 : * 2006.
4 : */
5 : /* ====================================================================
6 : * Copyright (c) 2006 The OpenSSL Project. All rights reserved.
7 : *
8 : * Redistribution and use in source and binary forms, with or without
9 : * modification, are permitted provided that the following conditions
10 : * are met:
11 : *
12 : * 1. Redistributions of source code must retain the above copyright
13 : * notice, this list of conditions and the following disclaimer.
14 : *
15 : * 2. Redistributions in binary form must reproduce the above copyright
16 : * notice, this list of conditions and the following disclaimer in
17 : * the documentation and/or other materials provided with the
18 : * distribution.
19 : *
20 : * 3. All advertising materials mentioning features or use of this
21 : * software must display the following acknowledgment:
22 : * "This product includes software developed by the OpenSSL Project
23 : * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 : *
25 : * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 : * endorse or promote products derived from this software without
27 : * prior written permission. For written permission, please contact
28 : * licensing@OpenSSL.org.
29 : *
30 : * 5. Products derived from this software may not be called "OpenSSL"
31 : * nor may "OpenSSL" appear in their names without prior written
32 : * permission of the OpenSSL Project.
33 : *
34 : * 6. Redistributions of any form whatsoever must retain the following
35 : * acknowledgment:
36 : * "This product includes software developed by the OpenSSL Project
37 : * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 : *
39 : * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 : * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 : * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 : * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 : * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 : * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 : * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 : * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 : * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 : * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 : * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 : * OF THE POSSIBILITY OF SUCH DAMAGE.
51 : * ====================================================================
52 : *
53 : * This product includes cryptographic software written by Eric Young
54 : * (eay@cryptsoft.com). This product includes software written by Tim
55 : * Hudson (tjh@cryptsoft.com).
56 : *
57 : */
58 :
59 : #include <stdio.h>
60 : #include "cryptlib.h"
61 : #include <openssl/asn1t.h>
62 : #include <openssl/x509.h>
63 : #ifndef OPENSSL_NO_ENGINE
64 : # include <openssl/engine.h>
65 : #endif
66 : #include "asn1_locl.h"
67 :
68 : extern const EVP_PKEY_ASN1_METHOD rsa_asn1_meths[];
69 : extern const EVP_PKEY_ASN1_METHOD dsa_asn1_meths[];
70 : extern const EVP_PKEY_ASN1_METHOD dh_asn1_meth;
71 : extern const EVP_PKEY_ASN1_METHOD dhx_asn1_meth;
72 : extern const EVP_PKEY_ASN1_METHOD eckey_asn1_meth;
73 : extern const EVP_PKEY_ASN1_METHOD hmac_asn1_meth;
74 : extern const EVP_PKEY_ASN1_METHOD cmac_asn1_meth;
75 :
76 : /* Keep this sorted in type order !! */
77 : static const EVP_PKEY_ASN1_METHOD *standard_methods[] = {
78 : #ifndef OPENSSL_NO_RSA
79 : &rsa_asn1_meths[0],
80 : &rsa_asn1_meths[1],
81 : #endif
82 : #ifndef OPENSSL_NO_DH
83 : &dh_asn1_meth,
84 : #endif
85 : #ifndef OPENSSL_NO_DSA
86 : &dsa_asn1_meths[0],
87 : &dsa_asn1_meths[1],
88 : &dsa_asn1_meths[2],
89 : &dsa_asn1_meths[3],
90 : &dsa_asn1_meths[4],
91 : #endif
92 : #ifndef OPENSSL_NO_EC
93 : &eckey_asn1_meth,
94 : #endif
95 : &hmac_asn1_meth,
96 : &cmac_asn1_meth,
97 : #ifndef OPENSSL_NO_DH
98 : &dhx_asn1_meth
99 : #endif
100 : };
101 :
102 : typedef int sk_cmp_fn_type(const char *const *a, const char *const *b);
103 : DECLARE_STACK_OF(EVP_PKEY_ASN1_METHOD)
104 : static STACK_OF(EVP_PKEY_ASN1_METHOD) *app_methods = NULL;
105 :
106 : #ifdef TEST
107 : void main()
108 : {
109 : int i;
110 : for (i = 0;
111 : i < sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *); i++)
112 : fprintf(stderr, "Number %d id=%d (%s)\n", i,
113 : standard_methods[i]->pkey_id,
114 : OBJ_nid2sn(standard_methods[i]->pkey_id));
115 : }
116 : #endif
117 :
118 : DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_ASN1_METHOD *,
119 : const EVP_PKEY_ASN1_METHOD *, ameth);
120 :
121 0 : static int ameth_cmp(const EVP_PKEY_ASN1_METHOD *const *a,
122 : const EVP_PKEY_ASN1_METHOD *const *b)
123 : {
124 15238 : return ((*a)->pkey_id - (*b)->pkey_id);
125 : }
126 :
127 36123 : IMPLEMENT_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_ASN1_METHOD *,
128 : const EVP_PKEY_ASN1_METHOD *, ameth);
129 :
130 0 : int EVP_PKEY_asn1_get_count(void)
131 : {
132 : int num = sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *);
133 47793 : if (app_methods)
134 0 : num += sk_EVP_PKEY_ASN1_METHOD_num(app_methods);
135 0 : return num;
136 : }
137 :
138 44184 : const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx)
139 : {
140 : int num = sizeof(standard_methods) / sizeof(EVP_PKEY_ASN1_METHOD *);
141 44184 : if (idx < 0)
142 : return NULL;
143 44184 : if (idx < num)
144 44184 : return standard_methods[idx];
145 0 : idx -= num;
146 0 : return sk_EVP_PKEY_ASN1_METHOD_value(app_methods, idx);
147 : }
148 :
149 5647 : static const EVP_PKEY_ASN1_METHOD *pkey_asn1_find(int type)
150 : {
151 : EVP_PKEY_ASN1_METHOD tmp;
152 5647 : const EVP_PKEY_ASN1_METHOD *t = &tmp, **ret;
153 5647 : tmp.pkey_id = type;
154 5647 : if (app_methods) {
155 : int idx;
156 0 : idx = sk_EVP_PKEY_ASN1_METHOD_find(app_methods, &tmp);
157 0 : if (idx >= 0)
158 0 : return sk_EVP_PKEY_ASN1_METHOD_value(app_methods, idx);
159 : }
160 : ret = OBJ_bsearch_ameth(&t, standard_methods, sizeof(standard_methods)
161 : / sizeof(EVP_PKEY_ASN1_METHOD *));
162 5647 : if (!ret || !*ret)
163 : return NULL;
164 5647 : return *ret;
165 : }
166 :
167 : /*
168 : * Find an implementation of an ASN1 algorithm. If 'pe' is not NULL also
169 : * search through engines and set *pe to a functional reference to the engine
170 : * implementing 'type' or NULL if no engine implements it.
171 : */
172 :
173 5647 : const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(ENGINE **pe, int type)
174 : {
175 : const EVP_PKEY_ASN1_METHOD *t;
176 :
177 : for (;;) {
178 5647 : t = pkey_asn1_find(type);
179 5647 : if (!t || !(t->pkey_flags & ASN1_PKEY_ALIAS))
180 : break;
181 0 : type = t->pkey_base_id;
182 0 : }
183 5647 : if (pe) {
184 : #ifndef OPENSSL_NO_ENGINE
185 : ENGINE *e;
186 : /* type will contain the final unaliased type */
187 5647 : e = ENGINE_get_pkey_asn1_meth_engine(type);
188 5647 : if (e) {
189 0 : *pe = e;
190 0 : return ENGINE_get_pkey_asn1_meth(e, type);
191 : }
192 : #endif
193 5647 : *pe = NULL;
194 : }
195 5647 : return t;
196 : }
197 :
198 4485 : const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(ENGINE **pe,
199 : const char *str, int len)
200 : {
201 : int i;
202 : const EVP_PKEY_ASN1_METHOD *ameth;
203 4485 : if (len == -1)
204 3609 : len = strlen(str);
205 4485 : if (pe) {
206 : #ifndef OPENSSL_NO_ENGINE
207 : ENGINE *e;
208 3609 : ameth = ENGINE_pkey_asn1_find_str(&e, str, len);
209 3609 : if (ameth) {
210 : /*
211 : * Convert structural into functional reference
212 : */
213 0 : if (!ENGINE_init(e))
214 : ameth = NULL;
215 0 : ENGINE_free(e);
216 0 : *pe = e;
217 0 : return ameth;
218 : }
219 : #endif
220 3609 : *pe = NULL;
221 : }
222 91101 : for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) {
223 44184 : ameth = EVP_PKEY_asn1_get0(i);
224 44184 : if (ameth->pkey_flags & ASN1_PKEY_ALIAS)
225 18045 : continue;
226 28880 : if (((int)strlen(ameth->pem_str) == len) &&
227 2741 : !strncasecmp(ameth->pem_str, str, len))
228 : return ameth;
229 : }
230 : return NULL;
231 : }
232 :
233 0 : int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth)
234 : {
235 0 : if (app_methods == NULL) {
236 0 : app_methods = sk_EVP_PKEY_ASN1_METHOD_new(ameth_cmp);
237 0 : if (!app_methods)
238 : return 0;
239 : }
240 0 : if (!sk_EVP_PKEY_ASN1_METHOD_push(app_methods, ameth))
241 : return 0;
242 0 : sk_EVP_PKEY_ASN1_METHOD_sort(app_methods);
243 0 : return 1;
244 : }
245 :
246 0 : int EVP_PKEY_asn1_add_alias(int to, int from)
247 : {
248 : EVP_PKEY_ASN1_METHOD *ameth;
249 0 : ameth = EVP_PKEY_asn1_new(from, ASN1_PKEY_ALIAS, NULL, NULL);
250 0 : if (!ameth)
251 : return 0;
252 0 : ameth->pkey_base_id = to;
253 0 : if (!EVP_PKEY_asn1_add0(ameth)) {
254 0 : EVP_PKEY_asn1_free(ameth);
255 0 : return 0;
256 : }
257 : return 1;
258 : }
259 :
260 0 : int EVP_PKEY_asn1_get0_info(int *ppkey_id, int *ppkey_base_id,
261 : int *ppkey_flags, const char **pinfo,
262 : const char **ppem_str,
263 : const EVP_PKEY_ASN1_METHOD *ameth)
264 : {
265 0 : if (!ameth)
266 : return 0;
267 0 : if (ppkey_id)
268 0 : *ppkey_id = ameth->pkey_id;
269 0 : if (ppkey_base_id)
270 0 : *ppkey_base_id = ameth->pkey_base_id;
271 0 : if (ppkey_flags)
272 0 : *ppkey_flags = ameth->pkey_flags;
273 0 : if (pinfo)
274 0 : *pinfo = ameth->info;
275 0 : if (ppem_str)
276 0 : *ppem_str = ameth->pem_str;
277 : return 1;
278 : }
279 :
280 0 : const EVP_PKEY_ASN1_METHOD *EVP_PKEY_get0_asn1(EVP_PKEY *pkey)
281 : {
282 0 : return pkey->ameth;
283 : }
284 :
285 0 : EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags,
286 : const char *pem_str, const char *info)
287 : {
288 : EVP_PKEY_ASN1_METHOD *ameth;
289 0 : ameth = OPENSSL_malloc(sizeof(EVP_PKEY_ASN1_METHOD));
290 0 : if (!ameth)
291 : return NULL;
292 :
293 : memset(ameth, 0, sizeof(EVP_PKEY_ASN1_METHOD));
294 :
295 0 : ameth->pkey_id = id;
296 0 : ameth->pkey_base_id = id;
297 0 : ameth->pkey_flags = flags | ASN1_PKEY_DYNAMIC;
298 :
299 0 : if (info) {
300 0 : ameth->info = BUF_strdup(info);
301 0 : if (!ameth->info)
302 : goto err;
303 : } else
304 0 : ameth->info = NULL;
305 :
306 0 : if (pem_str) {
307 0 : ameth->pem_str = BUF_strdup(pem_str);
308 0 : if (!ameth->pem_str)
309 : goto err;
310 : } else
311 0 : ameth->pem_str = NULL;
312 :
313 0 : ameth->pub_decode = 0;
314 0 : ameth->pub_encode = 0;
315 0 : ameth->pub_cmp = 0;
316 0 : ameth->pub_print = 0;
317 :
318 0 : ameth->priv_decode = 0;
319 0 : ameth->priv_encode = 0;
320 0 : ameth->priv_print = 0;
321 :
322 0 : ameth->old_priv_encode = 0;
323 0 : ameth->old_priv_decode = 0;
324 :
325 0 : ameth->item_verify = 0;
326 0 : ameth->item_sign = 0;
327 :
328 0 : ameth->pkey_size = 0;
329 0 : ameth->pkey_bits = 0;
330 :
331 0 : ameth->param_decode = 0;
332 0 : ameth->param_encode = 0;
333 0 : ameth->param_missing = 0;
334 0 : ameth->param_copy = 0;
335 0 : ameth->param_cmp = 0;
336 0 : ameth->param_print = 0;
337 :
338 0 : ameth->pkey_free = 0;
339 0 : ameth->pkey_ctrl = 0;
340 :
341 0 : return ameth;
342 :
343 : err:
344 :
345 0 : EVP_PKEY_asn1_free(ameth);
346 0 : return NULL;
347 :
348 : }
349 :
350 0 : void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst,
351 : const EVP_PKEY_ASN1_METHOD *src)
352 : {
353 :
354 0 : dst->pub_decode = src->pub_decode;
355 0 : dst->pub_encode = src->pub_encode;
356 0 : dst->pub_cmp = src->pub_cmp;
357 0 : dst->pub_print = src->pub_print;
358 :
359 0 : dst->priv_decode = src->priv_decode;
360 0 : dst->priv_encode = src->priv_encode;
361 0 : dst->priv_print = src->priv_print;
362 :
363 0 : dst->old_priv_encode = src->old_priv_encode;
364 0 : dst->old_priv_decode = src->old_priv_decode;
365 :
366 0 : dst->pkey_size = src->pkey_size;
367 0 : dst->pkey_bits = src->pkey_bits;
368 :
369 0 : dst->param_decode = src->param_decode;
370 0 : dst->param_encode = src->param_encode;
371 0 : dst->param_missing = src->param_missing;
372 0 : dst->param_copy = src->param_copy;
373 0 : dst->param_cmp = src->param_cmp;
374 0 : dst->param_print = src->param_print;
375 :
376 0 : dst->pkey_free = src->pkey_free;
377 0 : dst->pkey_ctrl = src->pkey_ctrl;
378 :
379 0 : dst->item_sign = src->item_sign;
380 0 : dst->item_verify = src->item_verify;
381 :
382 0 : }
383 :
384 0 : void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth)
385 : {
386 0 : if (ameth && (ameth->pkey_flags & ASN1_PKEY_DYNAMIC)) {
387 0 : if (ameth->pem_str)
388 0 : OPENSSL_free(ameth->pem_str);
389 0 : if (ameth->info)
390 0 : OPENSSL_free(ameth->info);
391 0 : OPENSSL_free(ameth);
392 : }
393 0 : }
394 :
395 0 : void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth,
396 : int (*pub_decode) (EVP_PKEY *pk,
397 : X509_PUBKEY *pub),
398 : int (*pub_encode) (X509_PUBKEY *pub,
399 : const EVP_PKEY *pk),
400 : int (*pub_cmp) (const EVP_PKEY *a,
401 : const EVP_PKEY *b),
402 : int (*pub_print) (BIO *out,
403 : const EVP_PKEY *pkey,
404 : int indent, ASN1_PCTX *pctx),
405 : int (*pkey_size) (const EVP_PKEY *pk),
406 : int (*pkey_bits) (const EVP_PKEY *pk))
407 : {
408 0 : ameth->pub_decode = pub_decode;
409 0 : ameth->pub_encode = pub_encode;
410 0 : ameth->pub_cmp = pub_cmp;
411 0 : ameth->pub_print = pub_print;
412 0 : ameth->pkey_size = pkey_size;
413 0 : ameth->pkey_bits = pkey_bits;
414 0 : }
415 :
416 0 : void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth,
417 : int (*priv_decode) (EVP_PKEY *pk,
418 : PKCS8_PRIV_KEY_INFO
419 : *p8inf),
420 : int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8,
421 : const EVP_PKEY *pk),
422 : int (*priv_print) (BIO *out,
423 : const EVP_PKEY *pkey,
424 : int indent,
425 : ASN1_PCTX *pctx))
426 : {
427 0 : ameth->priv_decode = priv_decode;
428 0 : ameth->priv_encode = priv_encode;
429 0 : ameth->priv_print = priv_print;
430 0 : }
431 :
432 0 : void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth,
433 : int (*param_decode) (EVP_PKEY *pkey,
434 : const unsigned char **pder,
435 : int derlen),
436 : int (*param_encode) (const EVP_PKEY *pkey,
437 : unsigned char **pder),
438 : int (*param_missing) (const EVP_PKEY *pk),
439 : int (*param_copy) (EVP_PKEY *to,
440 : const EVP_PKEY *from),
441 : int (*param_cmp) (const EVP_PKEY *a,
442 : const EVP_PKEY *b),
443 : int (*param_print) (BIO *out,
444 : const EVP_PKEY *pkey,
445 : int indent, ASN1_PCTX *pctx))
446 : {
447 0 : ameth->param_decode = param_decode;
448 0 : ameth->param_encode = param_encode;
449 0 : ameth->param_missing = param_missing;
450 0 : ameth->param_copy = param_copy;
451 0 : ameth->param_cmp = param_cmp;
452 0 : ameth->param_print = param_print;
453 0 : }
454 :
455 0 : void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth,
456 : void (*pkey_free) (EVP_PKEY *pkey))
457 : {
458 0 : ameth->pkey_free = pkey_free;
459 0 : }
460 :
461 0 : void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth,
462 : int (*pkey_ctrl) (EVP_PKEY *pkey, int op,
463 : long arg1, void *arg2))
464 : {
465 0 : ameth->pkey_ctrl = pkey_ctrl;
466 0 : }
467 :
468 0 : void EVP_PKEY_asn1_set_item(EVP_PKEY_ASN1_METHOD *ameth,
469 : int (*item_verify) (EVP_MD_CTX *ctx,
470 : const ASN1_ITEM *it,
471 : void *asn,
472 : X509_ALGOR *a,
473 : ASN1_BIT_STRING *sig,
474 : EVP_PKEY *pkey),
475 : int (*item_sign) (EVP_MD_CTX *ctx,
476 : const ASN1_ITEM *it,
477 : void *asn,
478 : X509_ALGOR *alg1,
479 : X509_ALGOR *alg2,
480 : ASN1_BIT_STRING *sig))
481 : {
482 0 : ameth->item_sign = item_sign;
483 0 : ameth->item_verify = item_verify;
484 0 : }
|