]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/asn1/x_pubkey.c
Add manual pages for certficate/key loading and friends.
[thirdparty/openssl.git] / crypto / asn1 / x_pubkey.c
CommitLineData
d02b48c6 1/* crypto/asn1/x_pubkey.c */
58964a49 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
d02b48c6
RE
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include "cryptlib.h"
ec577822 61#include <openssl/asn1_mac.h>
f0e8ae72 62#include <openssl/x509.h>
d02b48c6 63
6b691a5c 64int i2d_X509_PUBKEY(X509_PUBKEY *a, unsigned char **pp)
d02b48c6
RE
65 {
66 M_ASN1_I2D_vars(a);
67
68 M_ASN1_I2D_len(a->algor, i2d_X509_ALGOR);
69 M_ASN1_I2D_len(a->public_key, i2d_ASN1_BIT_STRING);
70
71 M_ASN1_I2D_seq_total();
72
73 M_ASN1_I2D_put(a->algor, i2d_X509_ALGOR);
74 M_ASN1_I2D_put(a->public_key, i2d_ASN1_BIT_STRING);
75
76 M_ASN1_I2D_finish();
77 }
78
6b691a5c
UM
79X509_PUBKEY *d2i_X509_PUBKEY(X509_PUBKEY **a, unsigned char **pp,
80 long length)
d02b48c6
RE
81 {
82 M_ASN1_D2I_vars(a,X509_PUBKEY *,X509_PUBKEY_new);
83
84 M_ASN1_D2I_Init();
85 M_ASN1_D2I_start_sequence();
86 M_ASN1_D2I_get(ret->algor,d2i_X509_ALGOR);
87 M_ASN1_D2I_get(ret->public_key,d2i_ASN1_BIT_STRING);
88 if (ret->pkey != NULL)
89 {
90 EVP_PKEY_free(ret->pkey);
91 ret->pkey=NULL;
92 }
93 M_ASN1_D2I_Finish(a,X509_PUBKEY_free,ASN1_F_D2I_X509_PUBKEY);
94 }
95
6b691a5c 96X509_PUBKEY *X509_PUBKEY_new(void)
d02b48c6
RE
97 {
98 X509_PUBKEY *ret=NULL;
dfeab068 99 ASN1_CTX c;
d02b48c6
RE
100
101 M_ASN1_New_Malloc(ret,X509_PUBKEY);
102 M_ASN1_New(ret->algor,X509_ALGOR_new);
08e9c1af 103 M_ASN1_New(ret->public_key,M_ASN1_BIT_STRING_new);
d02b48c6
RE
104 ret->pkey=NULL;
105 return(ret);
106 M_ASN1_New_Error(ASN1_F_X509_PUBKEY_NEW);
107 }
108
6b691a5c 109void X509_PUBKEY_free(X509_PUBKEY *a)
d02b48c6
RE
110 {
111 if (a == NULL) return;
112 X509_ALGOR_free(a->algor);
08e9c1af 113 M_ASN1_BIT_STRING_free(a->public_key);
d02b48c6 114 if (a->pkey != NULL) EVP_PKEY_free(a->pkey);
26a3a48d 115 OPENSSL_free(a);
d02b48c6
RE
116 }
117
6b691a5c 118int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey)
d02b48c6
RE
119 {
120 int ok=0;
121 X509_PUBKEY *pk;
122 X509_ALGOR *a;
123 ASN1_OBJECT *o;
124 unsigned char *s,*p;
125 int i;
126
127 if (x == NULL) return(0);
128
129 if ((pk=X509_PUBKEY_new()) == NULL) goto err;
130 a=pk->algor;
131
132 /* set the algorithm id */
133 if ((o=OBJ_nid2obj(pkey->type)) == NULL) goto err;
134 ASN1_OBJECT_free(a->algorithm);
135 a->algorithm=o;
136
137 /* Set the parameter list */
138 if (!pkey->save_parameters || (pkey->type == EVP_PKEY_RSA))
139 {
140 if ((a->parameter == NULL) ||
141 (a->parameter->type != V_ASN1_NULL))
142 {
143 ASN1_TYPE_free(a->parameter);
144 a->parameter=ASN1_TYPE_new();
145 a->parameter->type=V_ASN1_NULL;
146 }
147 }
148 else
149#ifndef NO_DSA
150 if (pkey->type == EVP_PKEY_DSA)
151 {
152 unsigned char *pp;
153 DSA *dsa;
154
155 dsa=pkey->pkey.dsa;
156 dsa->write_params=0;
157 ASN1_TYPE_free(a->parameter);
158 i=i2d_DSAparams(dsa,NULL);
26a3a48d 159 p=(unsigned char *)OPENSSL_malloc(i);
d02b48c6
RE
160 pp=p;
161 i2d_DSAparams(dsa,&pp);
162 a->parameter=ASN1_TYPE_new();
163 a->parameter->type=V_ASN1_SEQUENCE;
164 a->parameter->value.sequence=ASN1_STRING_new();
165 ASN1_STRING_set(a->parameter->value.sequence,p,i);
26a3a48d 166 OPENSSL_free(p);
d02b48c6
RE
167 }
168 else
169#endif
170 {
171 X509err(X509_F_X509_PUBKEY_SET,X509_R_UNSUPPORTED_ALGORITHM);
172 goto err;
173 }
174
ad65ce75 175 if ((i=i2d_PublicKey(pkey,NULL)) <= 0) goto err;
26a3a48d 176 if ((s=(unsigned char *)OPENSSL_malloc(i+1)) == NULL) goto err;
d02b48c6
RE
177 p=s;
178 i2d_PublicKey(pkey,&p);
08e9c1af 179 if (!M_ASN1_BIT_STRING_set(pk->public_key,s,i)) goto err;
c35f549e
DSH
180 /* Set number of unused bits to zero */
181 pk->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07);
182 pk->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT;
183
26a3a48d 184 OPENSSL_free(s);
d02b48c6 185
e77066ea 186#if 0
d02b48c6
RE
187 CRYPTO_add(&pkey->references,1,CRYPTO_LOCK_EVP_PKEY);
188 pk->pkey=pkey;
e77066ea 189#endif
d02b48c6
RE
190
191 if (*x != NULL)
192 X509_PUBKEY_free(*x);
193
194 *x=pk;
195 pk=NULL;
196
197 ok=1;
198err:
199 if (pk != NULL) X509_PUBKEY_free(pk);
200 return(ok);
201 }
202
6b691a5c 203EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key)
d02b48c6
RE
204 {
205 EVP_PKEY *ret=NULL;
206 long j;
207 int type;
208 unsigned char *p;
a4aba800 209 const unsigned char *cp;
58964a49 210#ifndef NO_DSA
d02b48c6 211 X509_ALGOR *a;
58964a49
RE
212#endif
213
214 if (key == NULL) goto err;
215
cdbb8c2f
BL
216 if (key->pkey != NULL)
217 {
218 CRYPTO_add(&key->pkey->references,1,CRYPTO_LOCK_EVP_PKEY);
219 return(key->pkey);
220 }
58964a49
RE
221
222 if (key->public_key == NULL) goto err;
d02b48c6 223
d02b48c6
RE
224 type=OBJ_obj2nid(key->algor->algorithm);
225 p=key->public_key->data;
226 j=key->public_key->length;
227 if ((ret=d2i_PublicKey(type,NULL,&p,(long)j)) == NULL)
228 {
229 X509err(X509_F_X509_PUBKEY_GET,X509_R_ERR_ASN1_LIB);
230 goto err;
231 }
232 ret->save_parameters=0;
233
234#ifndef NO_DSA
235 a=key->algor;
236 if (ret->type == EVP_PKEY_DSA)
237 {
238 if (a->parameter->type == V_ASN1_SEQUENCE)
239 {
240 ret->pkey.dsa->write_params=0;
a4aba800 241 cp=p=a->parameter->value.sequence->data;
d02b48c6 242 j=a->parameter->value.sequence->length;
a4aba800 243 if (!d2i_DSAparams(&ret->pkey.dsa,&cp,(long)j))
d02b48c6
RE
244 goto err;
245 }
246 ret->save_parameters=1;
247 }
248#endif
249 key->pkey=ret;
cdbb8c2f 250 CRYPTO_add(&ret->references,1,CRYPTO_LOCK_EVP_PKEY);
d02b48c6
RE
251 return(ret);
252err:
253 if (ret != NULL)
254 EVP_PKEY_free(ret);
255 return(NULL);
256 }
257
52664f50
DSH
258/* Now two pseudo ASN1 routines that take an EVP_PKEY structure
259 * and encode or decode as X509_PUBKEY
260 */
261
262EVP_PKEY *d2i_PUBKEY(EVP_PKEY **a, unsigned char **pp,
263 long length)
264{
265 X509_PUBKEY *xpk;
266 EVP_PKEY *pktmp;
267 xpk = d2i_X509_PUBKEY(NULL, pp, length);
268 if(!xpk) return NULL;
269 pktmp = X509_PUBKEY_get(xpk);
270 X509_PUBKEY_free(xpk);
271 if(!pktmp) return NULL;
272 if(a) {
273 EVP_PKEY_free(*a);
274 *a = pktmp;
275 }
276 return pktmp;
277}
278
279int i2d_PUBKEY(EVP_PKEY *a, unsigned char **pp)
280{
281 X509_PUBKEY *xpk=NULL;
282 int ret;
283 if(!a) return 0;
284 if(!X509_PUBKEY_set(&xpk, a)) return 0;
285 ret = i2d_X509_PUBKEY(xpk, pp);
286 X509_PUBKEY_free(xpk);
287 return ret;
288}
289
290/* The following are equivalents but which return RSA and DSA
291 * keys
292 */
12aefe78 293#ifndef NO_RSA
52664f50
DSH
294RSA *d2i_RSA_PUBKEY(RSA **a, unsigned char **pp,
295 long length)
296{
297 EVP_PKEY *pkey;
298 RSA *key;
299 unsigned char *q;
300 q = *pp;
301 pkey = d2i_PUBKEY(NULL, &q, length);
302 if(!pkey) return NULL;
c7cb16a8 303 key = EVP_PKEY_get1_RSA(pkey);
52664f50
DSH
304 EVP_PKEY_free(pkey);
305 if(!key) return NULL;
306 *pp = q;
307 if(a) {
308 RSA_free(*a);
309 *a = key;
310 }
311 return key;
312}
313
314int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp)
315{
316 EVP_PKEY *pktmp;
317 int ret;
318 if(!a) return 0;
319 pktmp = EVP_PKEY_new();
320 if(!pktmp) {
321 ASN1err(ASN1_F_I2D_RSA_PUBKEY, ERR_R_MALLOC_FAILURE);
322 return 0;
323 }
c7cb16a8 324 EVP_PKEY_set1_RSA(pktmp, a);
52664f50
DSH
325 ret = i2d_PUBKEY(pktmp, pp);
326 EVP_PKEY_free(pktmp);
327 return ret;
328}
12aefe78 329#endif
52664f50 330
12aefe78 331#ifndef NO_DSA
52664f50
DSH
332DSA *d2i_DSA_PUBKEY(DSA **a, unsigned char **pp,
333 long length)
334{
335 EVP_PKEY *pkey;
336 DSA *key;
337 unsigned char *q;
338 q = *pp;
339 pkey = d2i_PUBKEY(NULL, &q, length);
340 if(!pkey) return NULL;
c7cb16a8 341 key = EVP_PKEY_get1_DSA(pkey);
52664f50
DSH
342 EVP_PKEY_free(pkey);
343 if(!key) return NULL;
344 *pp = q;
345 if(a) {
346 DSA_free(*a);
347 *a = key;
348 }
349 return key;
350}
351
352int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp)
353{
354 EVP_PKEY *pktmp;
355 int ret;
356 if(!a) return 0;
357 pktmp = EVP_PKEY_new();
358 if(!pktmp) {
359 ASN1err(ASN1_F_I2D_DSA_PUBKEY, ERR_R_MALLOC_FAILURE);
360 return 0;
361 }
c7cb16a8 362 EVP_PKEY_set1_DSA(pktmp, a);
52664f50
DSH
363 ret = i2d_PUBKEY(pktmp, pp);
364 EVP_PKEY_free(pktmp);
365 return ret;
366}
12aefe78 367#endif