p_lib.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742
  1. /*
  2. * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. #include <stdio.h>
  10. #include "internal/cryptlib.h"
  11. #include "internal/refcount.h"
  12. #include <openssl/bn.h>
  13. #include <openssl/err.h>
  14. #include <openssl/objects.h>
  15. #include <openssl/evp.h>
  16. #include <openssl/x509.h>
  17. #include <openssl/rsa.h>
  18. #include <openssl/dsa.h>
  19. #include <openssl/dh.h>
  20. #include <openssl/cmac.h>
  21. #include <openssl/engine.h>
  22. #include <openssl/params.h>
  23. #include <openssl/core_names.h>
  24. #include "crypto/asn1.h"
  25. #include "crypto/evp.h"
  26. #include "internal/provider.h"
  27. static void EVP_PKEY_free_it(EVP_PKEY *x);
  28. int EVP_PKEY_bits(const EVP_PKEY *pkey)
  29. {
  30. if (pkey && pkey->ameth && pkey->ameth->pkey_bits)
  31. return pkey->ameth->pkey_bits(pkey);
  32. return 0;
  33. }
  34. int EVP_PKEY_security_bits(const EVP_PKEY *pkey)
  35. {
  36. if (pkey == NULL)
  37. return 0;
  38. if (pkey->ameth == NULL || pkey->ameth->pkey_security_bits == NULL)
  39. return -2;
  40. return pkey->ameth->pkey_security_bits(pkey);
  41. }
  42. int EVP_PKEY_size(const EVP_PKEY *pkey)
  43. {
  44. if (pkey && pkey->ameth && pkey->ameth->pkey_size)
  45. return pkey->ameth->pkey_size(pkey);
  46. return 0;
  47. }
  48. int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode)
  49. {
  50. #ifndef OPENSSL_NO_DSA
  51. if (pkey->type == EVP_PKEY_DSA) {
  52. int ret = pkey->save_parameters;
  53. if (mode >= 0)
  54. pkey->save_parameters = mode;
  55. return ret;
  56. }
  57. #endif
  58. #ifndef OPENSSL_NO_EC
  59. if (pkey->type == EVP_PKEY_EC) {
  60. int ret = pkey->save_parameters;
  61. if (mode >= 0)
  62. pkey->save_parameters = mode;
  63. return ret;
  64. }
  65. #endif
  66. return 0;
  67. }
  68. int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from)
  69. {
  70. if (to->type == EVP_PKEY_NONE) {
  71. if (EVP_PKEY_set_type(to, from->type) == 0)
  72. return 0;
  73. } else if (to->type != from->type) {
  74. EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, EVP_R_DIFFERENT_KEY_TYPES);
  75. goto err;
  76. }
  77. if (EVP_PKEY_missing_parameters(from)) {
  78. EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, EVP_R_MISSING_PARAMETERS);
  79. goto err;
  80. }
  81. if (!EVP_PKEY_missing_parameters(to)) {
  82. if (EVP_PKEY_cmp_parameters(to, from) == 1)
  83. return 1;
  84. EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, EVP_R_DIFFERENT_PARAMETERS);
  85. return 0;
  86. }
  87. if (from->ameth && from->ameth->param_copy)
  88. return from->ameth->param_copy(to, from);
  89. err:
  90. return 0;
  91. }
  92. int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey)
  93. {
  94. if (pkey->ameth && pkey->ameth->param_missing)
  95. return pkey->ameth->param_missing(pkey);
  96. return 0;
  97. }
  98. int EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b)
  99. {
  100. if (a->type != b->type)
  101. return -1;
  102. if (a->ameth && a->ameth->param_cmp)
  103. return a->ameth->param_cmp(a, b);
  104. return -2;
  105. }
  106. int EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
  107. {
  108. if (a->type != b->type)
  109. return -1;
  110. if (a->ameth) {
  111. int ret;
  112. /* Compare parameters if the algorithm has them */
  113. if (a->ameth->param_cmp) {
  114. ret = a->ameth->param_cmp(a, b);
  115. if (ret <= 0)
  116. return ret;
  117. }
  118. if (a->ameth->pub_cmp)
  119. return a->ameth->pub_cmp(a, b);
  120. }
  121. return -2;
  122. }
  123. EVP_PKEY *EVP_PKEY_new(void)
  124. {
  125. EVP_PKEY *ret = OPENSSL_zalloc(sizeof(*ret));
  126. if (ret == NULL) {
  127. EVPerr(EVP_F_EVP_PKEY_NEW, ERR_R_MALLOC_FAILURE);
  128. return NULL;
  129. }
  130. ret->type = EVP_PKEY_NONE;
  131. ret->save_type = EVP_PKEY_NONE;
  132. ret->references = 1;
  133. ret->save_parameters = 1;
  134. ret->lock = CRYPTO_THREAD_lock_new();
  135. if (ret->lock == NULL) {
  136. EVPerr(EVP_F_EVP_PKEY_NEW, ERR_R_MALLOC_FAILURE);
  137. OPENSSL_free(ret);
  138. return NULL;
  139. }
  140. return ret;
  141. }
  142. int EVP_PKEY_up_ref(EVP_PKEY *pkey)
  143. {
  144. int i;
  145. if (CRYPTO_UP_REF(&pkey->references, &i, pkey->lock) <= 0)
  146. return 0;
  147. REF_PRINT_COUNT("EVP_PKEY", pkey);
  148. REF_ASSERT_ISNT(i < 2);
  149. return ((i > 1) ? 1 : 0);
  150. }
  151. /*
  152. * Setup a public key ASN1 method and ENGINE from a NID or a string. If pkey
  153. * is NULL just return 1 or 0 if the algorithm exists.
  154. */
  155. static int pkey_set_type(EVP_PKEY *pkey, ENGINE *e, int type, const char *str,
  156. int len)
  157. {
  158. const EVP_PKEY_ASN1_METHOD *ameth;
  159. ENGINE **eptr = (e == NULL) ? &e : NULL;
  160. if (pkey) {
  161. if (pkey->pkey.ptr)
  162. EVP_PKEY_free_it(pkey);
  163. /*
  164. * If key type matches and a method exists then this lookup has
  165. * succeeded once so just indicate success.
  166. */
  167. if ((type == pkey->save_type) && pkey->ameth)
  168. return 1;
  169. #ifndef OPENSSL_NO_ENGINE
  170. /* If we have ENGINEs release them */
  171. ENGINE_finish(pkey->engine);
  172. pkey->engine = NULL;
  173. ENGINE_finish(pkey->pmeth_engine);
  174. pkey->pmeth_engine = NULL;
  175. #endif
  176. }
  177. if (str)
  178. ameth = EVP_PKEY_asn1_find_str(eptr, str, len);
  179. else
  180. ameth = EVP_PKEY_asn1_find(eptr, type);
  181. #ifndef OPENSSL_NO_ENGINE
  182. if (pkey == NULL && eptr != NULL)
  183. ENGINE_finish(e);
  184. #endif
  185. if (ameth == NULL) {
  186. EVPerr(EVP_F_PKEY_SET_TYPE, EVP_R_UNSUPPORTED_ALGORITHM);
  187. return 0;
  188. }
  189. if (pkey) {
  190. pkey->ameth = ameth;
  191. pkey->engine = e;
  192. pkey->type = pkey->ameth->pkey_id;
  193. pkey->save_type = type;
  194. }
  195. return 1;
  196. }
  197. EVP_PKEY *EVP_PKEY_new_raw_private_key(int type, ENGINE *e,
  198. const unsigned char *priv,
  199. size_t len)
  200. {
  201. EVP_PKEY *ret = EVP_PKEY_new();
  202. if (ret == NULL
  203. || !pkey_set_type(ret, e, type, NULL, -1)) {
  204. /* EVPerr already called */
  205. goto err;
  206. }
  207. if (ret->ameth->set_priv_key == NULL) {
  208. EVPerr(EVP_F_EVP_PKEY_NEW_RAW_PRIVATE_KEY,
  209. EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  210. goto err;
  211. }
  212. if (!ret->ameth->set_priv_key(ret, priv, len)) {
  213. EVPerr(EVP_F_EVP_PKEY_NEW_RAW_PRIVATE_KEY, EVP_R_KEY_SETUP_FAILED);
  214. goto err;
  215. }
  216. return ret;
  217. err:
  218. EVP_PKEY_free(ret);
  219. return NULL;
  220. }
  221. EVP_PKEY *EVP_PKEY_new_raw_public_key(int type, ENGINE *e,
  222. const unsigned char *pub,
  223. size_t len)
  224. {
  225. EVP_PKEY *ret = EVP_PKEY_new();
  226. if (ret == NULL
  227. || !pkey_set_type(ret, e, type, NULL, -1)) {
  228. /* EVPerr already called */
  229. goto err;
  230. }
  231. if (ret->ameth->set_pub_key == NULL) {
  232. EVPerr(EVP_F_EVP_PKEY_NEW_RAW_PUBLIC_KEY,
  233. EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  234. goto err;
  235. }
  236. if (!ret->ameth->set_pub_key(ret, pub, len)) {
  237. EVPerr(EVP_F_EVP_PKEY_NEW_RAW_PUBLIC_KEY, EVP_R_KEY_SETUP_FAILED);
  238. goto err;
  239. }
  240. return ret;
  241. err:
  242. EVP_PKEY_free(ret);
  243. return NULL;
  244. }
  245. int EVP_PKEY_get_raw_private_key(const EVP_PKEY *pkey, unsigned char *priv,
  246. size_t *len)
  247. {
  248. if (pkey->ameth->get_priv_key == NULL) {
  249. EVPerr(EVP_F_EVP_PKEY_GET_RAW_PRIVATE_KEY,
  250. EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  251. return 0;
  252. }
  253. if (!pkey->ameth->get_priv_key(pkey, priv, len)) {
  254. EVPerr(EVP_F_EVP_PKEY_GET_RAW_PRIVATE_KEY, EVP_R_GET_RAW_KEY_FAILED);
  255. return 0;
  256. }
  257. return 1;
  258. }
  259. int EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, unsigned char *pub,
  260. size_t *len)
  261. {
  262. if (pkey->ameth->get_pub_key == NULL) {
  263. EVPerr(EVP_F_EVP_PKEY_GET_RAW_PUBLIC_KEY,
  264. EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  265. return 0;
  266. }
  267. if (!pkey->ameth->get_pub_key(pkey, pub, len)) {
  268. EVPerr(EVP_F_EVP_PKEY_GET_RAW_PUBLIC_KEY, EVP_R_GET_RAW_KEY_FAILED);
  269. return 0;
  270. }
  271. return 1;
  272. }
  273. EVP_PKEY *EVP_PKEY_new_CMAC_key(ENGINE *e, const unsigned char *priv,
  274. size_t len, const EVP_CIPHER *cipher)
  275. {
  276. #ifndef OPENSSL_NO_CMAC
  277. # ifndef OPENSSL_NO_ENGINE
  278. const char *engine_id = e != NULL ? ENGINE_get_id(e) : NULL;
  279. # endif
  280. const char *cipher_name = EVP_CIPHER_name(cipher);
  281. const OSSL_PROVIDER *prov = EVP_CIPHER_provider(cipher);
  282. OPENSSL_CTX *libctx =
  283. prov == NULL ? NULL : ossl_provider_library_context(prov);
  284. EVP_PKEY *ret = EVP_PKEY_new();
  285. EVP_MAC *cmac = EVP_MAC_fetch(libctx, OSSL_MAC_NAME_CMAC, NULL);
  286. EVP_MAC_CTX *cmctx = cmac != NULL ? EVP_MAC_CTX_new(cmac) : NULL;
  287. OSSL_PARAM params[4];
  288. size_t paramsn = 0;
  289. if (ret == NULL
  290. || cmctx == NULL
  291. || !pkey_set_type(ret, e, EVP_PKEY_CMAC, NULL, -1)) {
  292. /* EVPerr already called */
  293. goto err;
  294. }
  295. # ifndef OPENSSL_NO_ENGINE
  296. if (engine_id != NULL)
  297. params[paramsn++] =
  298. OSSL_PARAM_construct_utf8_string("engine", (char *)engine_id, 0);
  299. # endif
  300. params[paramsn++] =
  301. OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER,
  302. (char *)cipher_name, 0);
  303. params[paramsn++] =
  304. OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY,
  305. (char *)priv, len);
  306. params[paramsn] = OSSL_PARAM_construct_end();
  307. if (!EVP_MAC_CTX_set_params(cmctx, params)) {
  308. EVPerr(EVP_F_EVP_PKEY_NEW_CMAC_KEY, EVP_R_KEY_SETUP_FAILED);
  309. goto err;
  310. }
  311. ret->pkey.ptr = cmctx;
  312. return ret;
  313. err:
  314. EVP_PKEY_free(ret);
  315. EVP_MAC_CTX_free(cmctx);
  316. EVP_MAC_free(cmac);
  317. return NULL;
  318. #else
  319. EVPerr(EVP_F_EVP_PKEY_NEW_CMAC_KEY,
  320. EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
  321. return NULL;
  322. #endif
  323. }
  324. int EVP_PKEY_set_type(EVP_PKEY *pkey, int type)
  325. {
  326. return pkey_set_type(pkey, NULL, type, NULL, -1);
  327. }
  328. int EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len)
  329. {
  330. return pkey_set_type(pkey, NULL, EVP_PKEY_NONE, str, len);
  331. }
  332. int EVP_PKEY_set_alias_type(EVP_PKEY *pkey, int type)
  333. {
  334. if (pkey->type == type) {
  335. return 1; /* it already is that type */
  336. }
  337. /*
  338. * The application is requesting to alias this to a different pkey type,
  339. * but not one that resolves to the base type.
  340. */
  341. if (EVP_PKEY_type(type) != EVP_PKEY_base_id(pkey)) {
  342. EVPerr(EVP_F_EVP_PKEY_SET_ALIAS_TYPE, EVP_R_UNSUPPORTED_ALGORITHM);
  343. return 0;
  344. }
  345. pkey->type = type;
  346. return 1;
  347. }
  348. #ifndef OPENSSL_NO_ENGINE
  349. int EVP_PKEY_set1_engine(EVP_PKEY *pkey, ENGINE *e)
  350. {
  351. if (e != NULL) {
  352. if (!ENGINE_init(e)) {
  353. EVPerr(EVP_F_EVP_PKEY_SET1_ENGINE, ERR_R_ENGINE_LIB);
  354. return 0;
  355. }
  356. if (ENGINE_get_pkey_meth(e, pkey->type) == NULL) {
  357. ENGINE_finish(e);
  358. EVPerr(EVP_F_EVP_PKEY_SET1_ENGINE, EVP_R_UNSUPPORTED_ALGORITHM);
  359. return 0;
  360. }
  361. }
  362. ENGINE_finish(pkey->pmeth_engine);
  363. pkey->pmeth_engine = e;
  364. return 1;
  365. }
  366. ENGINE *EVP_PKEY_get0_engine(const EVP_PKEY *pkey)
  367. {
  368. return pkey->engine;
  369. }
  370. #endif
  371. int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key)
  372. {
  373. if (pkey == NULL || !EVP_PKEY_set_type(pkey, type))
  374. return 0;
  375. pkey->pkey.ptr = key;
  376. return (key != NULL);
  377. }
  378. void *EVP_PKEY_get0(const EVP_PKEY *pkey)
  379. {
  380. return pkey->pkey.ptr;
  381. }
  382. const unsigned char *EVP_PKEY_get0_hmac(const EVP_PKEY *pkey, size_t *len)
  383. {
  384. ASN1_OCTET_STRING *os = NULL;
  385. if (pkey->type != EVP_PKEY_HMAC) {
  386. EVPerr(EVP_F_EVP_PKEY_GET0_HMAC, EVP_R_EXPECTING_AN_HMAC_KEY);
  387. return NULL;
  388. }
  389. os = EVP_PKEY_get0(pkey);
  390. *len = os->length;
  391. return os->data;
  392. }
  393. #ifndef OPENSSL_NO_POLY1305
  394. const unsigned char *EVP_PKEY_get0_poly1305(const EVP_PKEY *pkey, size_t *len)
  395. {
  396. ASN1_OCTET_STRING *os = NULL;
  397. if (pkey->type != EVP_PKEY_POLY1305) {
  398. EVPerr(EVP_F_EVP_PKEY_GET0_POLY1305, EVP_R_EXPECTING_A_POLY1305_KEY);
  399. return NULL;
  400. }
  401. os = EVP_PKEY_get0(pkey);
  402. *len = os->length;
  403. return os->data;
  404. }
  405. #endif
  406. #ifndef OPENSSL_NO_SIPHASH
  407. const unsigned char *EVP_PKEY_get0_siphash(const EVP_PKEY *pkey, size_t *len)
  408. {
  409. ASN1_OCTET_STRING *os = NULL;
  410. if (pkey->type != EVP_PKEY_SIPHASH) {
  411. EVPerr(EVP_F_EVP_PKEY_GET0_SIPHASH, EVP_R_EXPECTING_A_SIPHASH_KEY);
  412. return NULL;
  413. }
  414. os = EVP_PKEY_get0(pkey);
  415. *len = os->length;
  416. return os->data;
  417. }
  418. #endif
  419. #ifndef OPENSSL_NO_RSA
  420. int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key)
  421. {
  422. int ret = EVP_PKEY_assign_RSA(pkey, key);
  423. if (ret)
  424. RSA_up_ref(key);
  425. return ret;
  426. }
  427. RSA *EVP_PKEY_get0_RSA(const EVP_PKEY *pkey)
  428. {
  429. if (pkey->type != EVP_PKEY_RSA) {
  430. EVPerr(EVP_F_EVP_PKEY_GET0_RSA, EVP_R_EXPECTING_AN_RSA_KEY);
  431. return NULL;
  432. }
  433. return pkey->pkey.rsa;
  434. }
  435. RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey)
  436. {
  437. RSA *ret = EVP_PKEY_get0_RSA(pkey);
  438. if (ret != NULL)
  439. RSA_up_ref(ret);
  440. return ret;
  441. }
  442. #endif
  443. #ifndef OPENSSL_NO_DSA
  444. int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key)
  445. {
  446. int ret = EVP_PKEY_assign_DSA(pkey, key);
  447. if (ret)
  448. DSA_up_ref(key);
  449. return ret;
  450. }
  451. DSA *EVP_PKEY_get0_DSA(const EVP_PKEY *pkey)
  452. {
  453. if (pkey->type != EVP_PKEY_DSA) {
  454. EVPerr(EVP_F_EVP_PKEY_GET0_DSA, EVP_R_EXPECTING_A_DSA_KEY);
  455. return NULL;
  456. }
  457. return pkey->pkey.dsa;
  458. }
  459. DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey)
  460. {
  461. DSA *ret = EVP_PKEY_get0_DSA(pkey);
  462. if (ret != NULL)
  463. DSA_up_ref(ret);
  464. return ret;
  465. }
  466. #endif
  467. #ifndef OPENSSL_NO_EC
  468. int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key)
  469. {
  470. int ret = EVP_PKEY_assign_EC_KEY(pkey, key);
  471. if (ret)
  472. EC_KEY_up_ref(key);
  473. return ret;
  474. }
  475. EC_KEY *EVP_PKEY_get0_EC_KEY(const EVP_PKEY *pkey)
  476. {
  477. if (pkey->type != EVP_PKEY_EC) {
  478. EVPerr(EVP_F_EVP_PKEY_GET0_EC_KEY, EVP_R_EXPECTING_A_EC_KEY);
  479. return NULL;
  480. }
  481. return pkey->pkey.ec;
  482. }
  483. EC_KEY *EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey)
  484. {
  485. EC_KEY *ret = EVP_PKEY_get0_EC_KEY(pkey);
  486. if (ret != NULL)
  487. EC_KEY_up_ref(ret);
  488. return ret;
  489. }
  490. #endif
  491. #ifndef OPENSSL_NO_DH
  492. int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key)
  493. {
  494. int ret = EVP_PKEY_assign_DH(pkey, key);
  495. if (ret)
  496. DH_up_ref(key);
  497. return ret;
  498. }
  499. DH *EVP_PKEY_get0_DH(const EVP_PKEY *pkey)
  500. {
  501. if (pkey->type != EVP_PKEY_DH && pkey->type != EVP_PKEY_DHX) {
  502. EVPerr(EVP_F_EVP_PKEY_GET0_DH, EVP_R_EXPECTING_A_DH_KEY);
  503. return NULL;
  504. }
  505. return pkey->pkey.dh;
  506. }
  507. DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey)
  508. {
  509. DH *ret = EVP_PKEY_get0_DH(pkey);
  510. if (ret != NULL)
  511. DH_up_ref(ret);
  512. return ret;
  513. }
  514. #endif
  515. int EVP_PKEY_type(int type)
  516. {
  517. int ret;
  518. const EVP_PKEY_ASN1_METHOD *ameth;
  519. ENGINE *e;
  520. ameth = EVP_PKEY_asn1_find(&e, type);
  521. if (ameth)
  522. ret = ameth->pkey_id;
  523. else
  524. ret = NID_undef;
  525. #ifndef OPENSSL_NO_ENGINE
  526. ENGINE_finish(e);
  527. #endif
  528. return ret;
  529. }
  530. int EVP_PKEY_id(const EVP_PKEY *pkey)
  531. {
  532. return pkey->type;
  533. }
  534. int EVP_PKEY_base_id(const EVP_PKEY *pkey)
  535. {
  536. return EVP_PKEY_type(pkey->type);
  537. }
  538. void EVP_PKEY_free(EVP_PKEY *x)
  539. {
  540. int i;
  541. if (x == NULL)
  542. return;
  543. CRYPTO_DOWN_REF(&x->references, &i, x->lock);
  544. REF_PRINT_COUNT("EVP_PKEY", x);
  545. if (i > 0)
  546. return;
  547. REF_ASSERT_ISNT(i < 0);
  548. EVP_PKEY_free_it(x);
  549. CRYPTO_THREAD_lock_free(x->lock);
  550. sk_X509_ATTRIBUTE_pop_free(x->attributes, X509_ATTRIBUTE_free);
  551. OPENSSL_free(x);
  552. }
  553. static void EVP_PKEY_free_it(EVP_PKEY *x)
  554. {
  555. /* internal function; x is never NULL */
  556. evp_keymgmt_clear_pkey_cache(x);
  557. if (x->ameth && x->ameth->pkey_free) {
  558. x->ameth->pkey_free(x);
  559. x->pkey.ptr = NULL;
  560. }
  561. #ifndef OPENSSL_NO_ENGINE
  562. ENGINE_finish(x->engine);
  563. x->engine = NULL;
  564. ENGINE_finish(x->pmeth_engine);
  565. x->pmeth_engine = NULL;
  566. #endif
  567. }
  568. static int unsup_alg(BIO *out, const EVP_PKEY *pkey, int indent,
  569. const char *kstr)
  570. {
  571. BIO_indent(out, indent, 128);
  572. BIO_printf(out, "%s algorithm \"%s\" unsupported\n",
  573. kstr, OBJ_nid2ln(pkey->type));
  574. return 1;
  575. }
  576. int EVP_PKEY_print_public(BIO *out, const EVP_PKEY *pkey,
  577. int indent, ASN1_PCTX *pctx)
  578. {
  579. if (pkey->ameth && pkey->ameth->pub_print)
  580. return pkey->ameth->pub_print(out, pkey, indent, pctx);
  581. return unsup_alg(out, pkey, indent, "Public Key");
  582. }
  583. int EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey,
  584. int indent, ASN1_PCTX *pctx)
  585. {
  586. if (pkey->ameth && pkey->ameth->priv_print)
  587. return pkey->ameth->priv_print(out, pkey, indent, pctx);
  588. return unsup_alg(out, pkey, indent, "Private Key");
  589. }
  590. int EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey,
  591. int indent, ASN1_PCTX *pctx)
  592. {
  593. if (pkey->ameth && pkey->ameth->param_print)
  594. return pkey->ameth->param_print(out, pkey, indent, pctx);
  595. return unsup_alg(out, pkey, indent, "Parameters");
  596. }
  597. static int evp_pkey_asn1_ctrl(EVP_PKEY *pkey, int op, int arg1, void *arg2)
  598. {
  599. if (pkey->ameth == NULL || pkey->ameth->pkey_ctrl == NULL)
  600. return -2;
  601. return pkey->ameth->pkey_ctrl(pkey, op, arg1, arg2);
  602. }
  603. int EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid)
  604. {
  605. return evp_pkey_asn1_ctrl(pkey, ASN1_PKEY_CTRL_DEFAULT_MD_NID, 0, pnid);
  606. }
  607. int EVP_PKEY_supports_digest_nid(EVP_PKEY *pkey, int nid)
  608. {
  609. int rv, default_nid;
  610. rv = evp_pkey_asn1_ctrl(pkey, ASN1_PKEY_CTRL_SUPPORTS_MD_NID, nid, NULL);
  611. if (rv == -2) {
  612. /*
  613. * If there is a mandatory default digest and this isn't it, then
  614. * the answer is 'no'.
  615. */
  616. rv = EVP_PKEY_get_default_digest_nid(pkey, &default_nid);
  617. if (rv == 2)
  618. return (nid == default_nid);
  619. /* zero is an error from EVP_PKEY_get_default_digest_nid() */
  620. if (rv == 0)
  621. return -1;
  622. }
  623. return rv;
  624. }
  625. int EVP_PKEY_set1_tls_encodedpoint(EVP_PKEY *pkey,
  626. const unsigned char *pt, size_t ptlen)
  627. {
  628. if (ptlen > INT_MAX)
  629. return 0;
  630. if (evp_pkey_asn1_ctrl(pkey, ASN1_PKEY_CTRL_SET1_TLS_ENCPT, ptlen,
  631. (void *)pt) <= 0)
  632. return 0;
  633. return 1;
  634. }
  635. size_t EVP_PKEY_get1_tls_encodedpoint(EVP_PKEY *pkey, unsigned char **ppt)
  636. {
  637. int rv;
  638. rv = evp_pkey_asn1_ctrl(pkey, ASN1_PKEY_CTRL_GET1_TLS_ENCPT, 0, ppt);
  639. if (rv <= 0)
  640. return 0;
  641. return rv;
  642. }