]>
Commit | Line | Data |
---|---|---|
a94a3e0d | 1 | /* |
a28d06f3 | 2 | * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. |
a94a3e0d RL |
3 | * |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | #include <openssl/crypto.h> | |
23c48d94 | 11 | #include <openssl/core_dispatch.h> |
a94a3e0d RL |
12 | #include <openssl/evp.h> |
13 | #include <openssl/err.h> | |
14 | #include "internal/provider.h" | |
15 | #include "internal/refcount.h" | |
6c9bc258 | 16 | #include "internal/core.h" |
25f2138b | 17 | #include "crypto/evp.h" |
706457b7 | 18 | #include "evp_local.h" |
a94a3e0d | 19 | |
a94a3e0d RL |
20 | static void *keymgmt_new(void) |
21 | { | |
22 | EVP_KEYMGMT *keymgmt = NULL; | |
23 | ||
24 | if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL | |
25 | || (keymgmt->lock = CRYPTO_THREAD_lock_new()) == NULL) { | |
26 | EVP_KEYMGMT_free(keymgmt); | |
9311d0c4 | 27 | ERR_raise(ERR_LIB_EVP, ERR_R_MALLOC_FAILURE); |
a94a3e0d RL |
28 | return NULL; |
29 | } | |
30 | ||
31 | keymgmt->refcnt = 1; | |
32 | ||
33 | return keymgmt; | |
34 | } | |
35 | ||
309a78aa RL |
36 | static void *keymgmt_from_algorithm(int name_id, |
37 | const OSSL_ALGORITHM *algodef, | |
38 | OSSL_PROVIDER *prov) | |
a94a3e0d | 39 | { |
309a78aa | 40 | const OSSL_DISPATCH *fns = algodef->implementation; |
a94a3e0d | 41 | EVP_KEYMGMT *keymgmt = NULL; |
2b9add69 | 42 | int setparamfncnt = 0, getparamfncnt = 0; |
5e77b79a | 43 | int setgenparamfncnt = 0; |
1a5632e0 | 44 | int importfncnt = 0, exportfncnt = 0; |
a94a3e0d | 45 | |
6c9bc258 TM |
46 | if ((keymgmt = keymgmt_new()) == NULL) |
47 | return NULL; | |
48 | ||
49 | keymgmt->name_id = name_id; | |
50 | if ((keymgmt->type_name = ossl_algorithm_get1_first_name(algodef)) == NULL) { | |
6b9e3724 | 51 | EVP_KEYMGMT_free(keymgmt); |
a94a3e0d | 52 | return NULL; |
6b9e3724 | 53 | } |
309a78aa | 54 | keymgmt->description = algodef->algorithm_description; |
a94a3e0d RL |
55 | |
56 | for (; fns->function_id != 0; fns++) { | |
57 | switch (fns->function_id) { | |
b305452f RL |
58 | case OSSL_FUNC_KEYMGMT_NEW: |
59 | if (keymgmt->new == NULL) | |
363b1e5d | 60 | keymgmt->new = OSSL_FUNC_keymgmt_new(fns); |
a94a3e0d | 61 | break; |
1a5632e0 RL |
62 | case OSSL_FUNC_KEYMGMT_GEN_INIT: |
63 | if (keymgmt->gen_init == NULL) | |
363b1e5d | 64 | keymgmt->gen_init = OSSL_FUNC_keymgmt_gen_init(fns); |
1a5632e0 RL |
65 | break; |
66 | case OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE: | |
67 | if (keymgmt->gen_set_template == NULL) | |
68 | keymgmt->gen_set_template = | |
363b1e5d | 69 | OSSL_FUNC_keymgmt_gen_set_template(fns); |
1a5632e0 RL |
70 | break; |
71 | case OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS: | |
72 | if (keymgmt->gen_set_params == NULL) { | |
73 | setgenparamfncnt++; | |
74 | keymgmt->gen_set_params = | |
363b1e5d | 75 | OSSL_FUNC_keymgmt_gen_set_params(fns); |
1a5632e0 RL |
76 | } |
77 | break; | |
78 | case OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS: | |
79 | if (keymgmt->gen_settable_params == NULL) { | |
80 | setgenparamfncnt++; | |
81 | keymgmt->gen_settable_params = | |
363b1e5d | 82 | OSSL_FUNC_keymgmt_gen_settable_params(fns); |
1a5632e0 RL |
83 | } |
84 | break; | |
85 | case OSSL_FUNC_KEYMGMT_GEN: | |
86 | if (keymgmt->gen == NULL) | |
363b1e5d | 87 | keymgmt->gen = OSSL_FUNC_keymgmt_gen(fns); |
1a5632e0 RL |
88 | break; |
89 | case OSSL_FUNC_KEYMGMT_GEN_CLEANUP: | |
90 | if (keymgmt->gen_cleanup == NULL) | |
363b1e5d | 91 | keymgmt->gen_cleanup = OSSL_FUNC_keymgmt_gen_cleanup(fns); |
1a5632e0 | 92 | break; |
b305452f RL |
93 | case OSSL_FUNC_KEYMGMT_FREE: |
94 | if (keymgmt->free == NULL) | |
363b1e5d | 95 | keymgmt->free = OSSL_FUNC_keymgmt_free(fns); |
a94a3e0d | 96 | break; |
5dacb38c RL |
97 | case OSSL_FUNC_KEYMGMT_LOAD: |
98 | if (keymgmt->load == NULL) | |
99 | keymgmt->load = OSSL_FUNC_keymgmt_load(fns); | |
100 | break; | |
b305452f | 101 | case OSSL_FUNC_KEYMGMT_GET_PARAMS: |
273a67e3 | 102 | if (keymgmt->get_params == NULL) { |
4fe54d67 | 103 | getparamfncnt++; |
363b1e5d | 104 | keymgmt->get_params = OSSL_FUNC_keymgmt_get_params(fns); |
273a67e3 | 105 | } |
a94a3e0d | 106 | break; |
b305452f | 107 | case OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS: |
273a67e3 | 108 | if (keymgmt->gettable_params == NULL) { |
4fe54d67 | 109 | getparamfncnt++; |
b305452f | 110 | keymgmt->gettable_params = |
363b1e5d | 111 | OSSL_FUNC_keymgmt_gettable_params(fns); |
273a67e3 | 112 | } |
a94a3e0d | 113 | break; |
4fe54d67 NT |
114 | case OSSL_FUNC_KEYMGMT_SET_PARAMS: |
115 | if (keymgmt->set_params == NULL) { | |
116 | setparamfncnt++; | |
363b1e5d | 117 | keymgmt->set_params = OSSL_FUNC_keymgmt_set_params(fns); |
4fe54d67 NT |
118 | } |
119 | break; | |
120 | case OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS: | |
121 | if (keymgmt->settable_params == NULL) { | |
122 | setparamfncnt++; | |
123 | keymgmt->settable_params = | |
363b1e5d | 124 | OSSL_FUNC_keymgmt_settable_params(fns); |
4fe54d67 NT |
125 | } |
126 | break; | |
b305452f RL |
127 | case OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME: |
128 | if (keymgmt->query_operation_name == NULL) | |
129 | keymgmt->query_operation_name = | |
363b1e5d | 130 | OSSL_FUNC_keymgmt_query_operation_name(fns); |
6508e858 | 131 | break; |
b305452f RL |
132 | case OSSL_FUNC_KEYMGMT_HAS: |
133 | if (keymgmt->has == NULL) | |
363b1e5d | 134 | keymgmt->has = OSSL_FUNC_keymgmt_has(fns); |
6508e858 | 135 | break; |
4a9fe33c TM |
136 | case OSSL_FUNC_KEYMGMT_DUP: |
137 | if (keymgmt->dup == NULL) | |
138 | keymgmt->dup = OSSL_FUNC_keymgmt_dup(fns); | |
139 | break; | |
b305452f RL |
140 | case OSSL_FUNC_KEYMGMT_VALIDATE: |
141 | if (keymgmt->validate == NULL) | |
363b1e5d | 142 | keymgmt->validate = OSSL_FUNC_keymgmt_validate(fns); |
e62a45b6 | 143 | break; |
bee5d6cd RL |
144 | case OSSL_FUNC_KEYMGMT_MATCH: |
145 | if (keymgmt->match == NULL) | |
363b1e5d | 146 | keymgmt->match = OSSL_FUNC_keymgmt_match(fns); |
bee5d6cd | 147 | break; |
b305452f | 148 | case OSSL_FUNC_KEYMGMT_IMPORT: |
273a67e3 RL |
149 | if (keymgmt->import == NULL) { |
150 | importfncnt++; | |
363b1e5d | 151 | keymgmt->import = OSSL_FUNC_keymgmt_import(fns); |
273a67e3 | 152 | } |
12603de6 | 153 | break; |
b305452f | 154 | case OSSL_FUNC_KEYMGMT_IMPORT_TYPES: |
273a67e3 RL |
155 | if (keymgmt->import_types == NULL) { |
156 | importfncnt++; | |
363b1e5d | 157 | keymgmt->import_types = OSSL_FUNC_keymgmt_import_types(fns); |
273a67e3 | 158 | } |
12603de6 | 159 | break; |
b305452f | 160 | case OSSL_FUNC_KEYMGMT_EXPORT: |
273a67e3 RL |
161 | if (keymgmt->export == NULL) { |
162 | exportfncnt++; | |
363b1e5d | 163 | keymgmt->export = OSSL_FUNC_keymgmt_export(fns); |
273a67e3 | 164 | } |
12603de6 | 165 | break; |
b305452f | 166 | case OSSL_FUNC_KEYMGMT_EXPORT_TYPES: |
273a67e3 RL |
167 | if (keymgmt->export_types == NULL) { |
168 | exportfncnt++; | |
363b1e5d | 169 | keymgmt->export_types = OSSL_FUNC_keymgmt_export_types(fns); |
273a67e3 | 170 | } |
12603de6 | 171 | break; |
a94a3e0d RL |
172 | } |
173 | } | |
174 | /* | |
175 | * Try to check that the method is sensible. | |
b305452f RL |
176 | * At least one constructor and the destructor are MANDATORY |
177 | * The functions 'has' is MANDATORY | |
a94a3e0d RL |
178 | * It makes no sense being able to free stuff if you can't create it. |
179 | * It makes no sense providing OSSL_PARAM descriptors for import and | |
180 | * export if you can't import or export. | |
181 | */ | |
b305452f | 182 | if (keymgmt->free == NULL |
5dacb38c RL |
183 | || (keymgmt->new == NULL |
184 | && keymgmt->gen == NULL | |
185 | && keymgmt->load == NULL) | |
b305452f | 186 | || keymgmt->has == NULL |
4fe54d67 NT |
187 | || (getparamfncnt != 0 && getparamfncnt != 2) |
188 | || (setparamfncnt != 0 && setparamfncnt != 2) | |
1a5632e0 | 189 | || (setgenparamfncnt != 0 && setgenparamfncnt != 2) |
273a67e3 | 190 | || (importfncnt != 0 && importfncnt != 2) |
1a5632e0 RL |
191 | || (exportfncnt != 0 && exportfncnt != 2) |
192 | || (keymgmt->gen != NULL | |
193 | && (keymgmt->gen_init == NULL | |
194 | || keymgmt->gen_cleanup == NULL))) { | |
a94a3e0d | 195 | EVP_KEYMGMT_free(keymgmt); |
9311d0c4 | 196 | ERR_raise(ERR_LIB_EVP, EVP_R_INVALID_PROVIDER_FUNCTIONS); |
a94a3e0d RL |
197 | return NULL; |
198 | } | |
199 | keymgmt->prov = prov; | |
200 | if (prov != NULL) | |
201 | ossl_provider_up_ref(prov); | |
202 | ||
203 | return keymgmt; | |
204 | } | |
205 | ||
b4250010 | 206 | EVP_KEYMGMT *evp_keymgmt_fetch_by_number(OSSL_LIB_CTX *ctx, int name_id, |
f7c16d48 RL |
207 | const char *properties) |
208 | { | |
209 | return evp_generic_fetch_by_number(ctx, | |
210 | OSSL_OP_KEYMGMT, name_id, properties, | |
309a78aa | 211 | keymgmt_from_algorithm, |
33561e0d RL |
212 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
213 | (void (*)(void *))EVP_KEYMGMT_free); | |
214 | } | |
215 | ||
216 | EVP_KEYMGMT *evp_keymgmt_fetch_from_prov(OSSL_PROVIDER *prov, | |
217 | const char *name, | |
218 | const char *properties) | |
219 | { | |
220 | return evp_generic_fetch_from_prov(prov, OSSL_OP_KEYMGMT, | |
221 | name, properties, | |
222 | keymgmt_from_algorithm, | |
f7c16d48 RL |
223 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
224 | (void (*)(void *))EVP_KEYMGMT_free); | |
225 | } | |
226 | ||
b4250010 | 227 | EVP_KEYMGMT *EVP_KEYMGMT_fetch(OSSL_LIB_CTX *ctx, const char *algorithm, |
a94a3e0d RL |
228 | const char *properties) |
229 | { | |
f7c16d48 | 230 | return evp_generic_fetch(ctx, OSSL_OP_KEYMGMT, algorithm, properties, |
309a78aa | 231 | keymgmt_from_algorithm, |
f7c16d48 RL |
232 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
233 | (void (*)(void *))EVP_KEYMGMT_free); | |
a94a3e0d RL |
234 | } |
235 | ||
236 | int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt) | |
237 | { | |
238 | int ref = 0; | |
239 | ||
240 | CRYPTO_UP_REF(&keymgmt->refcnt, &ref, keymgmt->lock); | |
241 | return 1; | |
242 | } | |
243 | ||
244 | void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt) | |
245 | { | |
246 | int ref = 0; | |
247 | ||
248 | if (keymgmt == NULL) | |
249 | return; | |
250 | ||
251 | CRYPTO_DOWN_REF(&keymgmt->refcnt, &ref, keymgmt->lock); | |
252 | if (ref > 0) | |
253 | return; | |
6c9bc258 | 254 | OPENSSL_free(keymgmt->type_name); |
a94a3e0d RL |
255 | ossl_provider_free(keymgmt->prov); |
256 | CRYPTO_THREAD_lock_free(keymgmt->lock); | |
257 | OPENSSL_free(keymgmt); | |
258 | } | |
259 | ||
ed576acd | 260 | const OSSL_PROVIDER *EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt) |
a94a3e0d RL |
261 | { |
262 | return keymgmt->prov; | |
263 | } | |
264 | ||
bcd5d3a2 | 265 | int evp_keymgmt_get_number(const EVP_KEYMGMT *keymgmt) |
506cb0f6 RL |
266 | { |
267 | return keymgmt->name_id; | |
268 | } | |
269 | ||
ed576acd | 270 | const char *EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt) |
03888233 RL |
271 | { |
272 | return keymgmt->description; | |
273 | } | |
274 | ||
ed576acd | 275 | const char *EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt) |
d8025f4a | 276 | { |
6c9bc258 | 277 | return keymgmt->type_name; |
d8025f4a MC |
278 | } |
279 | ||
251e610c RL |
280 | int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name) |
281 | { | |
e4a1d023 | 282 | return evp_is_a(keymgmt->prov, keymgmt->name_id, NULL, name); |
251e610c RL |
283 | } |
284 | ||
b4250010 | 285 | void EVP_KEYMGMT_do_all_provided(OSSL_LIB_CTX *libctx, |
251e610c RL |
286 | void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), |
287 | void *arg) | |
288 | { | |
289 | evp_generic_do_all(libctx, OSSL_OP_KEYMGMT, | |
290 | (void (*)(void *, void *))fn, arg, | |
309a78aa | 291 | keymgmt_from_algorithm, |
cd770738 | 292 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
251e610c RL |
293 | (void (*)(void *))EVP_KEYMGMT_free); |
294 | } | |
f651c727 | 295 | |
d84f5515 MC |
296 | int EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, |
297 | void (*fn)(const char *name, void *data), | |
298 | void *data) | |
f651c727 RL |
299 | { |
300 | if (keymgmt->prov != NULL) | |
d84f5515 MC |
301 | return evp_names_do_all(keymgmt->prov, keymgmt->name_id, fn, data); |
302 | ||
303 | return 1; | |
f651c727 | 304 | } |
68552cde RL |
305 | |
306 | /* | |
307 | * Internal API that interfaces with the method function pointers | |
308 | */ | |
b305452f | 309 | void *evp_keymgmt_newdata(const EVP_KEYMGMT *keymgmt) |
68552cde | 310 | { |
ed576acd | 311 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
68552cde | 312 | |
b305452f | 313 | /* |
91bd45eb TM |
314 | * 'new' is currently mandatory on its own, but when new |
315 | * constructors appear, it won't be quite as mandatory, | |
316 | * so we have a check for future cases. | |
b305452f RL |
317 | */ |
318 | if (keymgmt->new == NULL) | |
319 | return NULL; | |
320 | return keymgmt->new(provctx); | |
68552cde RL |
321 | } |
322 | ||
b305452f | 323 | void evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata) |
68552cde | 324 | { |
b305452f RL |
325 | /* This is mandatory, no need to check for its presence */ |
326 | keymgmt->free(keydata); | |
68552cde RL |
327 | } |
328 | ||
1be63b3e P |
329 | void *evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection, |
330 | const OSSL_PARAM params[]) | |
1a5632e0 | 331 | { |
ed576acd | 332 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
1a5632e0 RL |
333 | |
334 | if (keymgmt->gen_init == NULL) | |
335 | return NULL; | |
1be63b3e | 336 | return keymgmt->gen_init(provctx, selection, params); |
1a5632e0 RL |
337 | } |
338 | ||
339 | int evp_keymgmt_gen_set_template(const EVP_KEYMGMT *keymgmt, void *genctx, | |
340 | void *template) | |
341 | { | |
d0ddf9b4 RL |
342 | /* |
343 | * It's arguable if we actually should return success in this case, as | |
344 | * it allows the caller to set a template key, which is then ignored. | |
345 | * However, this is how the legacy methods (EVP_PKEY_METHOD) operate, | |
346 | * so we do this in the interest of backward compatibility. | |
d0ddf9b4 | 347 | */ |
1a5632e0 | 348 | if (keymgmt->gen_set_template == NULL) |
d0ddf9b4 | 349 | return 1; |
1a5632e0 RL |
350 | return keymgmt->gen_set_template(genctx, template); |
351 | } | |
352 | ||
353 | int evp_keymgmt_gen_set_params(const EVP_KEYMGMT *keymgmt, void *genctx, | |
354 | const OSSL_PARAM params[]) | |
355 | { | |
356 | if (keymgmt->gen_set_params == NULL) | |
357 | return 0; | |
358 | return keymgmt->gen_set_params(genctx, params); | |
359 | } | |
360 | ||
e3efe7a5 | 361 | const OSSL_PARAM *EVP_KEYMGMT_gen_settable_params(const EVP_KEYMGMT *keymgmt) |
1a5632e0 | 362 | { |
ed576acd | 363 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
1a5632e0 RL |
364 | |
365 | if (keymgmt->gen_settable_params == NULL) | |
366 | return NULL; | |
fb67126e | 367 | return keymgmt->gen_settable_params(NULL, provctx); |
1a5632e0 RL |
368 | } |
369 | ||
370 | void *evp_keymgmt_gen(const EVP_KEYMGMT *keymgmt, void *genctx, | |
371 | OSSL_CALLBACK *cb, void *cbarg) | |
372 | { | |
373 | if (keymgmt->gen == NULL) | |
374 | return NULL; | |
375 | return keymgmt->gen(genctx, cb, cbarg); | |
376 | } | |
377 | ||
378 | void evp_keymgmt_gen_cleanup(const EVP_KEYMGMT *keymgmt, void *genctx) | |
379 | { | |
380 | if (keymgmt->gen != NULL) | |
381 | keymgmt->gen_cleanup(genctx); | |
382 | } | |
383 | ||
f616ad4b RL |
384 | int evp_keymgmt_has_load(const EVP_KEYMGMT *keymgmt) |
385 | { | |
386 | return keymgmt != NULL && keymgmt->load != NULL; | |
387 | } | |
388 | ||
5dacb38c RL |
389 | void *evp_keymgmt_load(const EVP_KEYMGMT *keymgmt, |
390 | const void *objref, size_t objref_sz) | |
391 | { | |
f616ad4b | 392 | if (evp_keymgmt_has_load(keymgmt)) |
5dacb38c RL |
393 | return keymgmt->load(objref, objref_sz); |
394 | return NULL; | |
395 | } | |
396 | ||
b305452f RL |
397 | int evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata, |
398 | OSSL_PARAM params[]) | |
68552cde | 399 | { |
b305452f | 400 | if (keymgmt->get_params == NULL) |
68552cde | 401 | return 1; |
b305452f | 402 | return keymgmt->get_params(keydata, params); |
68552cde RL |
403 | } |
404 | ||
e3efe7a5 | 405 | const OSSL_PARAM *EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt) |
68552cde | 406 | { |
ed576acd | 407 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
18ec26ba | 408 | |
b305452f | 409 | if (keymgmt->gettable_params == NULL) |
68552cde | 410 | return NULL; |
18ec26ba | 411 | return keymgmt->gettable_params(provctx); |
68552cde RL |
412 | } |
413 | ||
4fe54d67 NT |
414 | int evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata, |
415 | const OSSL_PARAM params[]) | |
416 | { | |
417 | if (keymgmt->set_params == NULL) | |
418 | return 1; | |
419 | return keymgmt->set_params(keydata, params); | |
420 | } | |
421 | ||
e3efe7a5 | 422 | const OSSL_PARAM *EVP_KEYMGMT_settable_params(const EVP_KEYMGMT *keymgmt) |
4fe54d67 | 423 | { |
ed576acd | 424 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
18ec26ba | 425 | |
4fe54d67 NT |
426 | if (keymgmt->settable_params == NULL) |
427 | return NULL; | |
18ec26ba | 428 | return keymgmt->settable_params(provctx); |
4fe54d67 NT |
429 | } |
430 | ||
b305452f | 431 | int evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) |
68552cde | 432 | { |
b305452f RL |
433 | /* This is mandatory, no need to check for its presence */ |
434 | return keymgmt->has(keydata, selection); | |
68552cde RL |
435 | } |
436 | ||
b305452f | 437 | int evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, |
899e2564 | 438 | int selection, int checktype) |
68552cde | 439 | { |
b305452f RL |
440 | /* We assume valid if the implementation doesn't have a function */ |
441 | if (keymgmt->validate == NULL) | |
68552cde | 442 | return 1; |
899e2564 | 443 | return keymgmt->validate(keydata, selection, checktype); |
68552cde RL |
444 | } |
445 | ||
bee5d6cd RL |
446 | int evp_keymgmt_match(const EVP_KEYMGMT *keymgmt, |
447 | const void *keydata1, const void *keydata2, | |
448 | int selection) | |
449 | { | |
450 | /* We assume no match if the implementation doesn't have a function */ | |
451 | if (keymgmt->match == NULL) | |
452 | return 0; | |
453 | return keymgmt->match(keydata1, keydata2, selection); | |
454 | } | |
455 | ||
b305452f RL |
456 | int evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, |
457 | int selection, const OSSL_PARAM params[]) | |
68552cde | 458 | { |
b305452f RL |
459 | if (keymgmt->import == NULL) |
460 | return 0; | |
461 | return keymgmt->import(keydata, selection, params); | |
68552cde RL |
462 | } |
463 | ||
b305452f RL |
464 | const OSSL_PARAM *evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt, |
465 | int selection) | |
68552cde | 466 | { |
b305452f RL |
467 | if (keymgmt->import_types == NULL) |
468 | return NULL; | |
469 | return keymgmt->import_types(selection); | |
68552cde RL |
470 | } |
471 | ||
b305452f RL |
472 | int evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, |
473 | int selection, OSSL_CALLBACK *param_cb, void *cbarg) | |
68552cde | 474 | { |
b305452f RL |
475 | if (keymgmt->export == NULL) |
476 | return 0; | |
477 | return keymgmt->export(keydata, selection, param_cb, cbarg); | |
68552cde RL |
478 | } |
479 | ||
b305452f RL |
480 | const OSSL_PARAM *evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt, |
481 | int selection) | |
68552cde | 482 | { |
b305452f RL |
483 | if (keymgmt->export_types == NULL) |
484 | return NULL; | |
485 | return keymgmt->export_types(selection); | |
68552cde | 486 | } |
13697f1c | 487 | |
b4f447c0 TM |
488 | void *evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from, |
489 | int selection) | |
4a9fe33c TM |
490 | { |
491 | /* We assume no dup if the implementation doesn't have a function */ | |
492 | if (keymgmt->dup == NULL) | |
493 | return NULL; | |
b4f447c0 | 494 | return keymgmt->dup(keydata_from, selection); |
4a9fe33c | 495 | } |