]>
Commit | Line | Data |
---|---|---|
a94a3e0d | 1 | /* |
a28d06f3 | 2 | * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. |
a94a3e0d RL |
3 | * |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | #include <openssl/crypto.h> | |
23c48d94 | 11 | #include <openssl/core_dispatch.h> |
a94a3e0d RL |
12 | #include <openssl/evp.h> |
13 | #include <openssl/err.h> | |
14 | #include "internal/provider.h" | |
15 | #include "internal/refcount.h" | |
6c9bc258 | 16 | #include "internal/core.h" |
25f2138b | 17 | #include "crypto/evp.h" |
706457b7 | 18 | #include "evp_local.h" |
a94a3e0d | 19 | |
a94a3e0d RL |
20 | static void *keymgmt_new(void) |
21 | { | |
22 | EVP_KEYMGMT *keymgmt = NULL; | |
23 | ||
24 | if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL | |
25 | || (keymgmt->lock = CRYPTO_THREAD_lock_new()) == NULL) { | |
26 | EVP_KEYMGMT_free(keymgmt); | |
9311d0c4 | 27 | ERR_raise(ERR_LIB_EVP, ERR_R_MALLOC_FAILURE); |
a94a3e0d RL |
28 | return NULL; |
29 | } | |
30 | ||
31 | keymgmt->refcnt = 1; | |
32 | ||
33 | return keymgmt; | |
34 | } | |
35 | ||
309a78aa RL |
36 | static void *keymgmt_from_algorithm(int name_id, |
37 | const OSSL_ALGORITHM *algodef, | |
38 | OSSL_PROVIDER *prov) | |
a94a3e0d | 39 | { |
309a78aa | 40 | const OSSL_DISPATCH *fns = algodef->implementation; |
a94a3e0d | 41 | EVP_KEYMGMT *keymgmt = NULL; |
2b9add69 | 42 | int setparamfncnt = 0, getparamfncnt = 0; |
5e77b79a | 43 | int setgenparamfncnt = 0; |
1a5632e0 | 44 | int importfncnt = 0, exportfncnt = 0; |
a94a3e0d | 45 | |
6c9bc258 TM |
46 | if ((keymgmt = keymgmt_new()) == NULL) |
47 | return NULL; | |
48 | ||
49 | keymgmt->name_id = name_id; | |
50 | if ((keymgmt->type_name = ossl_algorithm_get1_first_name(algodef)) == NULL) { | |
6b9e3724 | 51 | EVP_KEYMGMT_free(keymgmt); |
a94a3e0d | 52 | return NULL; |
6b9e3724 | 53 | } |
309a78aa | 54 | keymgmt->description = algodef->algorithm_description; |
a94a3e0d RL |
55 | |
56 | for (; fns->function_id != 0; fns++) { | |
57 | switch (fns->function_id) { | |
b305452f RL |
58 | case OSSL_FUNC_KEYMGMT_NEW: |
59 | if (keymgmt->new == NULL) | |
363b1e5d | 60 | keymgmt->new = OSSL_FUNC_keymgmt_new(fns); |
a94a3e0d | 61 | break; |
1a5632e0 RL |
62 | case OSSL_FUNC_KEYMGMT_GEN_INIT: |
63 | if (keymgmt->gen_init == NULL) | |
363b1e5d | 64 | keymgmt->gen_init = OSSL_FUNC_keymgmt_gen_init(fns); |
1a5632e0 RL |
65 | break; |
66 | case OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE: | |
67 | if (keymgmt->gen_set_template == NULL) | |
68 | keymgmt->gen_set_template = | |
363b1e5d | 69 | OSSL_FUNC_keymgmt_gen_set_template(fns); |
1a5632e0 RL |
70 | break; |
71 | case OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS: | |
72 | if (keymgmt->gen_set_params == NULL) { | |
73 | setgenparamfncnt++; | |
74 | keymgmt->gen_set_params = | |
363b1e5d | 75 | OSSL_FUNC_keymgmt_gen_set_params(fns); |
1a5632e0 RL |
76 | } |
77 | break; | |
78 | case OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS: | |
79 | if (keymgmt->gen_settable_params == NULL) { | |
80 | setgenparamfncnt++; | |
81 | keymgmt->gen_settable_params = | |
363b1e5d | 82 | OSSL_FUNC_keymgmt_gen_settable_params(fns); |
1a5632e0 RL |
83 | } |
84 | break; | |
85 | case OSSL_FUNC_KEYMGMT_GEN: | |
86 | if (keymgmt->gen == NULL) | |
363b1e5d | 87 | keymgmt->gen = OSSL_FUNC_keymgmt_gen(fns); |
1a5632e0 RL |
88 | break; |
89 | case OSSL_FUNC_KEYMGMT_GEN_CLEANUP: | |
90 | if (keymgmt->gen_cleanup == NULL) | |
363b1e5d | 91 | keymgmt->gen_cleanup = OSSL_FUNC_keymgmt_gen_cleanup(fns); |
1a5632e0 | 92 | break; |
b305452f RL |
93 | case OSSL_FUNC_KEYMGMT_FREE: |
94 | if (keymgmt->free == NULL) | |
363b1e5d | 95 | keymgmt->free = OSSL_FUNC_keymgmt_free(fns); |
a94a3e0d | 96 | break; |
5dacb38c RL |
97 | case OSSL_FUNC_KEYMGMT_LOAD: |
98 | if (keymgmt->load == NULL) | |
99 | keymgmt->load = OSSL_FUNC_keymgmt_load(fns); | |
100 | break; | |
b305452f | 101 | case OSSL_FUNC_KEYMGMT_GET_PARAMS: |
273a67e3 | 102 | if (keymgmt->get_params == NULL) { |
4fe54d67 | 103 | getparamfncnt++; |
363b1e5d | 104 | keymgmt->get_params = OSSL_FUNC_keymgmt_get_params(fns); |
273a67e3 | 105 | } |
a94a3e0d | 106 | break; |
b305452f | 107 | case OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS: |
273a67e3 | 108 | if (keymgmt->gettable_params == NULL) { |
4fe54d67 | 109 | getparamfncnt++; |
b305452f | 110 | keymgmt->gettable_params = |
363b1e5d | 111 | OSSL_FUNC_keymgmt_gettable_params(fns); |
273a67e3 | 112 | } |
a94a3e0d | 113 | break; |
4fe54d67 NT |
114 | case OSSL_FUNC_KEYMGMT_SET_PARAMS: |
115 | if (keymgmt->set_params == NULL) { | |
116 | setparamfncnt++; | |
363b1e5d | 117 | keymgmt->set_params = OSSL_FUNC_keymgmt_set_params(fns); |
4fe54d67 NT |
118 | } |
119 | break; | |
120 | case OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS: | |
121 | if (keymgmt->settable_params == NULL) { | |
122 | setparamfncnt++; | |
123 | keymgmt->settable_params = | |
363b1e5d | 124 | OSSL_FUNC_keymgmt_settable_params(fns); |
4fe54d67 NT |
125 | } |
126 | break; | |
b305452f RL |
127 | case OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME: |
128 | if (keymgmt->query_operation_name == NULL) | |
129 | keymgmt->query_operation_name = | |
363b1e5d | 130 | OSSL_FUNC_keymgmt_query_operation_name(fns); |
6508e858 | 131 | break; |
b305452f RL |
132 | case OSSL_FUNC_KEYMGMT_HAS: |
133 | if (keymgmt->has == NULL) | |
363b1e5d | 134 | keymgmt->has = OSSL_FUNC_keymgmt_has(fns); |
6508e858 | 135 | break; |
4a9fe33c TM |
136 | case OSSL_FUNC_KEYMGMT_DUP: |
137 | if (keymgmt->dup == NULL) | |
138 | keymgmt->dup = OSSL_FUNC_keymgmt_dup(fns); | |
139 | break; | |
b305452f RL |
140 | case OSSL_FUNC_KEYMGMT_VALIDATE: |
141 | if (keymgmt->validate == NULL) | |
363b1e5d | 142 | keymgmt->validate = OSSL_FUNC_keymgmt_validate(fns); |
e62a45b6 | 143 | break; |
bee5d6cd RL |
144 | case OSSL_FUNC_KEYMGMT_MATCH: |
145 | if (keymgmt->match == NULL) | |
363b1e5d | 146 | keymgmt->match = OSSL_FUNC_keymgmt_match(fns); |
bee5d6cd | 147 | break; |
b305452f | 148 | case OSSL_FUNC_KEYMGMT_IMPORT: |
273a67e3 RL |
149 | if (keymgmt->import == NULL) { |
150 | importfncnt++; | |
363b1e5d | 151 | keymgmt->import = OSSL_FUNC_keymgmt_import(fns); |
273a67e3 | 152 | } |
12603de6 | 153 | break; |
b305452f | 154 | case OSSL_FUNC_KEYMGMT_IMPORT_TYPES: |
273a67e3 RL |
155 | if (keymgmt->import_types == NULL) { |
156 | importfncnt++; | |
363b1e5d | 157 | keymgmt->import_types = OSSL_FUNC_keymgmt_import_types(fns); |
273a67e3 | 158 | } |
12603de6 | 159 | break; |
b305452f | 160 | case OSSL_FUNC_KEYMGMT_EXPORT: |
273a67e3 RL |
161 | if (keymgmt->export == NULL) { |
162 | exportfncnt++; | |
363b1e5d | 163 | keymgmt->export = OSSL_FUNC_keymgmt_export(fns); |
273a67e3 | 164 | } |
12603de6 | 165 | break; |
b305452f | 166 | case OSSL_FUNC_KEYMGMT_EXPORT_TYPES: |
273a67e3 RL |
167 | if (keymgmt->export_types == NULL) { |
168 | exportfncnt++; | |
363b1e5d | 169 | keymgmt->export_types = OSSL_FUNC_keymgmt_export_types(fns); |
273a67e3 | 170 | } |
12603de6 | 171 | break; |
a94a3e0d RL |
172 | } |
173 | } | |
174 | /* | |
175 | * Try to check that the method is sensible. | |
b305452f RL |
176 | * At least one constructor and the destructor are MANDATORY |
177 | * The functions 'has' is MANDATORY | |
a94a3e0d RL |
178 | * It makes no sense being able to free stuff if you can't create it. |
179 | * It makes no sense providing OSSL_PARAM descriptors for import and | |
180 | * export if you can't import or export. | |
181 | */ | |
b305452f | 182 | if (keymgmt->free == NULL |
5dacb38c RL |
183 | || (keymgmt->new == NULL |
184 | && keymgmt->gen == NULL | |
185 | && keymgmt->load == NULL) | |
b305452f | 186 | || keymgmt->has == NULL |
4fe54d67 NT |
187 | || (getparamfncnt != 0 && getparamfncnt != 2) |
188 | || (setparamfncnt != 0 && setparamfncnt != 2) | |
1a5632e0 | 189 | || (setgenparamfncnt != 0 && setgenparamfncnt != 2) |
273a67e3 | 190 | || (importfncnt != 0 && importfncnt != 2) |
1a5632e0 RL |
191 | || (exportfncnt != 0 && exportfncnt != 2) |
192 | || (keymgmt->gen != NULL | |
193 | && (keymgmt->gen_init == NULL | |
194 | || keymgmt->gen_cleanup == NULL))) { | |
a94a3e0d | 195 | EVP_KEYMGMT_free(keymgmt); |
9311d0c4 | 196 | ERR_raise(ERR_LIB_EVP, EVP_R_INVALID_PROVIDER_FUNCTIONS); |
a94a3e0d RL |
197 | return NULL; |
198 | } | |
199 | keymgmt->prov = prov; | |
200 | if (prov != NULL) | |
201 | ossl_provider_up_ref(prov); | |
202 | ||
203 | return keymgmt; | |
204 | } | |
205 | ||
b4250010 | 206 | EVP_KEYMGMT *evp_keymgmt_fetch_by_number(OSSL_LIB_CTX *ctx, int name_id, |
f7c16d48 RL |
207 | const char *properties) |
208 | { | |
209 | return evp_generic_fetch_by_number(ctx, | |
210 | OSSL_OP_KEYMGMT, name_id, properties, | |
309a78aa | 211 | keymgmt_from_algorithm, |
f7c16d48 RL |
212 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
213 | (void (*)(void *))EVP_KEYMGMT_free); | |
214 | } | |
215 | ||
b4250010 | 216 | EVP_KEYMGMT *EVP_KEYMGMT_fetch(OSSL_LIB_CTX *ctx, const char *algorithm, |
a94a3e0d RL |
217 | const char *properties) |
218 | { | |
f7c16d48 | 219 | return evp_generic_fetch(ctx, OSSL_OP_KEYMGMT, algorithm, properties, |
309a78aa | 220 | keymgmt_from_algorithm, |
f7c16d48 RL |
221 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
222 | (void (*)(void *))EVP_KEYMGMT_free); | |
a94a3e0d RL |
223 | } |
224 | ||
225 | int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt) | |
226 | { | |
227 | int ref = 0; | |
228 | ||
229 | CRYPTO_UP_REF(&keymgmt->refcnt, &ref, keymgmt->lock); | |
230 | return 1; | |
231 | } | |
232 | ||
233 | void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt) | |
234 | { | |
235 | int ref = 0; | |
236 | ||
237 | if (keymgmt == NULL) | |
238 | return; | |
239 | ||
240 | CRYPTO_DOWN_REF(&keymgmt->refcnt, &ref, keymgmt->lock); | |
241 | if (ref > 0) | |
242 | return; | |
6c9bc258 | 243 | OPENSSL_free(keymgmt->type_name); |
a94a3e0d RL |
244 | ossl_provider_free(keymgmt->prov); |
245 | CRYPTO_THREAD_lock_free(keymgmt->lock); | |
246 | OPENSSL_free(keymgmt); | |
247 | } | |
248 | ||
ed576acd | 249 | const OSSL_PROVIDER *EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt) |
a94a3e0d RL |
250 | { |
251 | return keymgmt->prov; | |
252 | } | |
253 | ||
ed576acd | 254 | int EVP_KEYMGMT_get_number(const EVP_KEYMGMT *keymgmt) |
506cb0f6 RL |
255 | { |
256 | return keymgmt->name_id; | |
257 | } | |
258 | ||
ed576acd | 259 | const char *EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt) |
03888233 RL |
260 | { |
261 | return keymgmt->description; | |
262 | } | |
263 | ||
ed576acd | 264 | const char *EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt) |
d8025f4a | 265 | { |
6c9bc258 | 266 | return keymgmt->type_name; |
d8025f4a MC |
267 | } |
268 | ||
251e610c RL |
269 | int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name) |
270 | { | |
e4a1d023 | 271 | return evp_is_a(keymgmt->prov, keymgmt->name_id, NULL, name); |
251e610c RL |
272 | } |
273 | ||
b4250010 | 274 | void EVP_KEYMGMT_do_all_provided(OSSL_LIB_CTX *libctx, |
251e610c RL |
275 | void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), |
276 | void *arg) | |
277 | { | |
278 | evp_generic_do_all(libctx, OSSL_OP_KEYMGMT, | |
279 | (void (*)(void *, void *))fn, arg, | |
309a78aa | 280 | keymgmt_from_algorithm, |
251e610c RL |
281 | (void (*)(void *))EVP_KEYMGMT_free); |
282 | } | |
f651c727 | 283 | |
d84f5515 MC |
284 | int EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, |
285 | void (*fn)(const char *name, void *data), | |
286 | void *data) | |
f651c727 RL |
287 | { |
288 | if (keymgmt->prov != NULL) | |
d84f5515 MC |
289 | return evp_names_do_all(keymgmt->prov, keymgmt->name_id, fn, data); |
290 | ||
291 | return 1; | |
f651c727 | 292 | } |
68552cde RL |
293 | |
294 | /* | |
295 | * Internal API that interfaces with the method function pointers | |
296 | */ | |
b305452f | 297 | void *evp_keymgmt_newdata(const EVP_KEYMGMT *keymgmt) |
68552cde | 298 | { |
ed576acd | 299 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
68552cde | 300 | |
b305452f | 301 | /* |
91bd45eb TM |
302 | * 'new' is currently mandatory on its own, but when new |
303 | * constructors appear, it won't be quite as mandatory, | |
304 | * so we have a check for future cases. | |
b305452f RL |
305 | */ |
306 | if (keymgmt->new == NULL) | |
307 | return NULL; | |
308 | return keymgmt->new(provctx); | |
68552cde RL |
309 | } |
310 | ||
b305452f | 311 | void evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata) |
68552cde | 312 | { |
b305452f RL |
313 | /* This is mandatory, no need to check for its presence */ |
314 | keymgmt->free(keydata); | |
68552cde RL |
315 | } |
316 | ||
1be63b3e P |
317 | void *evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection, |
318 | const OSSL_PARAM params[]) | |
1a5632e0 | 319 | { |
ed576acd | 320 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
1a5632e0 RL |
321 | |
322 | if (keymgmt->gen_init == NULL) | |
323 | return NULL; | |
1be63b3e | 324 | return keymgmt->gen_init(provctx, selection, params); |
1a5632e0 RL |
325 | } |
326 | ||
327 | int evp_keymgmt_gen_set_template(const EVP_KEYMGMT *keymgmt, void *genctx, | |
328 | void *template) | |
329 | { | |
d0ddf9b4 RL |
330 | /* |
331 | * It's arguable if we actually should return success in this case, as | |
332 | * it allows the caller to set a template key, which is then ignored. | |
333 | * However, this is how the legacy methods (EVP_PKEY_METHOD) operate, | |
334 | * so we do this in the interest of backward compatibility. | |
d0ddf9b4 | 335 | */ |
1a5632e0 | 336 | if (keymgmt->gen_set_template == NULL) |
d0ddf9b4 | 337 | return 1; |
1a5632e0 RL |
338 | return keymgmt->gen_set_template(genctx, template); |
339 | } | |
340 | ||
341 | int evp_keymgmt_gen_set_params(const EVP_KEYMGMT *keymgmt, void *genctx, | |
342 | const OSSL_PARAM params[]) | |
343 | { | |
344 | if (keymgmt->gen_set_params == NULL) | |
345 | return 0; | |
346 | return keymgmt->gen_set_params(genctx, params); | |
347 | } | |
348 | ||
e3efe7a5 | 349 | const OSSL_PARAM *EVP_KEYMGMT_gen_settable_params(const EVP_KEYMGMT *keymgmt) |
1a5632e0 | 350 | { |
ed576acd | 351 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
1a5632e0 RL |
352 | |
353 | if (keymgmt->gen_settable_params == NULL) | |
354 | return NULL; | |
fb67126e | 355 | return keymgmt->gen_settable_params(NULL, provctx); |
1a5632e0 RL |
356 | } |
357 | ||
358 | void *evp_keymgmt_gen(const EVP_KEYMGMT *keymgmt, void *genctx, | |
359 | OSSL_CALLBACK *cb, void *cbarg) | |
360 | { | |
361 | if (keymgmt->gen == NULL) | |
362 | return NULL; | |
363 | return keymgmt->gen(genctx, cb, cbarg); | |
364 | } | |
365 | ||
366 | void evp_keymgmt_gen_cleanup(const EVP_KEYMGMT *keymgmt, void *genctx) | |
367 | { | |
368 | if (keymgmt->gen != NULL) | |
369 | keymgmt->gen_cleanup(genctx); | |
370 | } | |
371 | ||
5dacb38c RL |
372 | void *evp_keymgmt_load(const EVP_KEYMGMT *keymgmt, |
373 | const void *objref, size_t objref_sz) | |
374 | { | |
375 | if (keymgmt->load != NULL) | |
376 | return keymgmt->load(objref, objref_sz); | |
377 | return NULL; | |
378 | } | |
379 | ||
b305452f RL |
380 | int evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata, |
381 | OSSL_PARAM params[]) | |
68552cde | 382 | { |
b305452f | 383 | if (keymgmt->get_params == NULL) |
68552cde | 384 | return 1; |
b305452f | 385 | return keymgmt->get_params(keydata, params); |
68552cde RL |
386 | } |
387 | ||
e3efe7a5 | 388 | const OSSL_PARAM *EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt) |
68552cde | 389 | { |
ed576acd | 390 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
18ec26ba | 391 | |
b305452f | 392 | if (keymgmt->gettable_params == NULL) |
68552cde | 393 | return NULL; |
18ec26ba | 394 | return keymgmt->gettable_params(provctx); |
68552cde RL |
395 | } |
396 | ||
4fe54d67 NT |
397 | int evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata, |
398 | const OSSL_PARAM params[]) | |
399 | { | |
400 | if (keymgmt->set_params == NULL) | |
401 | return 1; | |
402 | return keymgmt->set_params(keydata, params); | |
403 | } | |
404 | ||
e3efe7a5 | 405 | const OSSL_PARAM *EVP_KEYMGMT_settable_params(const EVP_KEYMGMT *keymgmt) |
4fe54d67 | 406 | { |
ed576acd | 407 | void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt)); |
18ec26ba | 408 | |
4fe54d67 NT |
409 | if (keymgmt->settable_params == NULL) |
410 | return NULL; | |
18ec26ba | 411 | return keymgmt->settable_params(provctx); |
4fe54d67 NT |
412 | } |
413 | ||
b305452f | 414 | int evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) |
68552cde | 415 | { |
b305452f RL |
416 | /* This is mandatory, no need to check for its presence */ |
417 | return keymgmt->has(keydata, selection); | |
68552cde RL |
418 | } |
419 | ||
b305452f | 420 | int evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, |
899e2564 | 421 | int selection, int checktype) |
68552cde | 422 | { |
b305452f RL |
423 | /* We assume valid if the implementation doesn't have a function */ |
424 | if (keymgmt->validate == NULL) | |
68552cde | 425 | return 1; |
899e2564 | 426 | return keymgmt->validate(keydata, selection, checktype); |
68552cde RL |
427 | } |
428 | ||
bee5d6cd RL |
429 | int evp_keymgmt_match(const EVP_KEYMGMT *keymgmt, |
430 | const void *keydata1, const void *keydata2, | |
431 | int selection) | |
432 | { | |
433 | /* We assume no match if the implementation doesn't have a function */ | |
434 | if (keymgmt->match == NULL) | |
435 | return 0; | |
436 | return keymgmt->match(keydata1, keydata2, selection); | |
437 | } | |
438 | ||
b305452f RL |
439 | int evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, |
440 | int selection, const OSSL_PARAM params[]) | |
68552cde | 441 | { |
b305452f RL |
442 | if (keymgmt->import == NULL) |
443 | return 0; | |
444 | return keymgmt->import(keydata, selection, params); | |
68552cde RL |
445 | } |
446 | ||
b305452f RL |
447 | const OSSL_PARAM *evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt, |
448 | int selection) | |
68552cde | 449 | { |
b305452f RL |
450 | if (keymgmt->import_types == NULL) |
451 | return NULL; | |
452 | return keymgmt->import_types(selection); | |
68552cde RL |
453 | } |
454 | ||
b305452f RL |
455 | int evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, |
456 | int selection, OSSL_CALLBACK *param_cb, void *cbarg) | |
68552cde | 457 | { |
b305452f RL |
458 | if (keymgmt->export == NULL) |
459 | return 0; | |
460 | return keymgmt->export(keydata, selection, param_cb, cbarg); | |
68552cde RL |
461 | } |
462 | ||
b305452f RL |
463 | const OSSL_PARAM *evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt, |
464 | int selection) | |
68552cde | 465 | { |
b305452f RL |
466 | if (keymgmt->export_types == NULL) |
467 | return NULL; | |
468 | return keymgmt->export_types(selection); | |
68552cde | 469 | } |
13697f1c | 470 | |
b4f447c0 TM |
471 | void *evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from, |
472 | int selection) | |
4a9fe33c TM |
473 | { |
474 | /* We assume no dup if the implementation doesn't have a function */ | |
475 | if (keymgmt->dup == NULL) | |
476 | return NULL; | |
b4f447c0 | 477 | return keymgmt->dup(keydata_from, selection); |
4a9fe33c | 478 | } |