]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/evp/pmeth_lib.c
Ensure that the requested memory size cannot exceed the limit imposed by a
[thirdparty/openssl.git] / crypto / evp / pmeth_lib.c
CommitLineData
0f113f3e 1/*
3f5616d7 2 * Copyright 2006-2017 The OpenSSL Project Authors. All Rights Reserved.
0b6f3c66 3 *
62867571
RS
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
0b6f3c66
DSH
8 */
9
10#include <stdio.h>
11#include <stdlib.h>
b39fc560 12#include "internal/cryptlib.h"
3c27208f 13#include <openssl/engine.h>
33bed28b 14#include <openssl/evp.h>
99119000 15#include <openssl/x509v3.h>
5fe736e5 16#include "internal/asn1_int.h"
27af42f9 17#include "internal/evp_int.h"
99119000 18#include "internal/numbers.h"
0b6f3c66 19
0f113f3e 20typedef int sk_cmp_fn_type(const char *const *a, const char *const *b);
5ce278a7 21
df2ee0e2 22static STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL;
0b6f3c66 23
cefa762e 24/* This array needs to be in order of NIDs */
0f113f3e 25static const EVP_PKEY_METHOD *standard_methods[] = {
d4f0339c 26#ifndef OPENSSL_NO_RSA
0f113f3e 27 &rsa_pkey_meth,
d4f0339c
DSH
28#endif
29#ifndef OPENSSL_NO_DH
0f113f3e 30 &dh_pkey_meth,
d4f0339c
DSH
31#endif
32#ifndef OPENSSL_NO_DSA
0f113f3e 33 &dsa_pkey_meth,
d4f0339c 34#endif
ef236ec3 35#ifndef OPENSSL_NO_EC
0f113f3e 36 &ec_pkey_meth,
ef236ec3 37#endif
0f113f3e 38 &hmac_pkey_meth,
b4a3aeeb 39#ifndef OPENSSL_NO_CMAC
0f113f3e 40 &cmac_pkey_meth,
b4a3aeeb 41#endif
6577e008
DSH
42#ifndef OPENSSL_NO_RSA
43 &rsa_pss_pkey_meth,
44#endif
afb14cda 45#ifndef OPENSSL_NO_DH
1eff3485 46 &dhx_pkey_meth,
cefa762e
JB
47#endif
48#ifndef OPENSSL_NO_SCRYPT
49 &scrypt_pkey_meth,
afb14cda 50#endif
aacfb134 51 &tls1_prf_pkey_meth,
262bd85f
DSH
52#ifndef OPENSSL_NO_EC
53 &ecx25519_pkey_meth,
54#endif
52ad5b60
TS
55 &hkdf_pkey_meth,
56#ifndef OPENSSL_NO_POLY1305
57 &poly1305_pkey_meth,
58#endif
3f5616d7
TS
59#ifndef OPENSSL_NO_SIPHASH
60 &siphash_pkey_meth,
61#endif
42a3008a
DSH
62#ifndef OPENSSL_NO_EC
63 &ed25519_pkey_meth,
64#endif
0f113f3e 65};
0b6f3c66 66
606f6c47 67DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *,
0f113f3e 68 pmeth);
babb3798 69
0f113f3e
MC
70static int pmeth_cmp(const EVP_PKEY_METHOD *const *a,
71 const EVP_PKEY_METHOD *const *b)
72{
73 return ((*a)->pkey_id - (*b)->pkey_id);
74}
0b6f3c66 75
606f6c47 76IMPLEMENT_OBJ_BSEARCH_CMP_FN(const EVP_PKEY_METHOD *, const EVP_PKEY_METHOD *,
0f113f3e 77 pmeth);
babb3798 78
c9777d26 79const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type)
0f113f3e
MC
80{
81 EVP_PKEY_METHOD tmp;
82 const EVP_PKEY_METHOD *t = &tmp, **ret;
83 tmp.pkey_id = type;
84 if (app_pkey_methods) {
85 int idx;
86 idx = sk_EVP_PKEY_METHOD_find(app_pkey_methods, &tmp);
87 if (idx >= 0)
88 return sk_EVP_PKEY_METHOD_value(app_pkey_methods, idx);
89 }
90 ret = OBJ_bsearch_pmeth(&t, standard_methods,
91 sizeof(standard_methods) /
92 sizeof(EVP_PKEY_METHOD *));
93 if (!ret || !*ret)
94 return NULL;
95 return *ret;
96}
0b6f3c66 97
f5cda4cb 98static EVP_PKEY_CTX *int_ctx_new(EVP_PKEY *pkey, ENGINE *e, int id)
0f113f3e
MC
99{
100 EVP_PKEY_CTX *ret;
101 const EVP_PKEY_METHOD *pmeth;
102 if (id == -1) {
103 if (!pkey || !pkey->ameth)
104 return NULL;
105 id = pkey->ameth->pkey_id;
106 }
a63bf2c5 107#ifndef OPENSSL_NO_ENGINE
0f113f3e
MC
108 if (pkey && pkey->engine)
109 e = pkey->engine;
110 /* Try to find an ENGINE which implements this method */
111 if (e) {
112 if (!ENGINE_init(e)) {
113 EVPerr(EVP_F_INT_CTX_NEW, ERR_R_ENGINE_LIB);
114 return NULL;
115 }
116 } else
117 e = ENGINE_get_pkey_meth_engine(id);
118
119 /*
0d4fb843 120 * If an ENGINE handled this method look it up. Otherwise use internal
0f113f3e
MC
121 * tables.
122 */
123
124 if (e)
125 pmeth = ENGINE_get_pkey_meth(e, id);
126 else
a63bf2c5 127#endif
0f113f3e 128 pmeth = EVP_PKEY_meth_find(id);
c9777d26 129
0f113f3e
MC
130 if (pmeth == NULL) {
131 EVPerr(EVP_F_INT_CTX_NEW, EVP_R_UNSUPPORTED_ALGORITHM);
132 return NULL;
133 }
c9777d26 134
64b25758 135 ret = OPENSSL_zalloc(sizeof(*ret));
90945fa3 136 if (ret == NULL) {
a63bf2c5 137#ifndef OPENSSL_NO_ENGINE
7c96dbcd 138 ENGINE_finish(e);
a63bf2c5 139#endif
0f113f3e
MC
140 EVPerr(EVP_F_INT_CTX_NEW, ERR_R_MALLOC_FAILURE);
141 return NULL;
142 }
143 ret->engine = e;
144 ret->pmeth = pmeth;
145 ret->operation = EVP_PKEY_OP_UNDEFINED;
146 ret->pkey = pkey;
0f113f3e 147 if (pkey)
03273d61 148 EVP_PKEY_up_ref(pkey);
0f113f3e
MC
149
150 if (pmeth->init) {
151 if (pmeth->init(ret) <= 0) {
83b4049a 152 ret->pmeth = NULL;
0f113f3e
MC
153 EVP_PKEY_CTX_free(ret);
154 return NULL;
155 }
156 }
157
158 return ret;
159}
160
161EVP_PKEY_METHOD *EVP_PKEY_meth_new(int id, int flags)
162{
163 EVP_PKEY_METHOD *pmeth;
b4faea50 164
b51bce94 165 pmeth = OPENSSL_zalloc(sizeof(*pmeth));
90945fa3 166 if (pmeth == NULL)
0f113f3e
MC
167 return NULL;
168
0f113f3e
MC
169 pmeth->pkey_id = id;
170 pmeth->flags = flags | EVP_PKEY_FLAG_DYNAMIC;
0f113f3e
MC
171 return pmeth;
172}
ba30bad5 173
f830c68f 174void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags,
0f113f3e
MC
175 const EVP_PKEY_METHOD *meth)
176{
177 if (ppkey_id)
178 *ppkey_id = meth->pkey_id;
179 if (pflags)
180 *pflags = meth->flags;
181}
f830c68f
DSH
182
183void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src)
0f113f3e 184{
f830c68f 185
0f113f3e
MC
186 dst->init = src->init;
187 dst->copy = src->copy;
188 dst->cleanup = src->cleanup;
f830c68f 189
0f113f3e
MC
190 dst->paramgen_init = src->paramgen_init;
191 dst->paramgen = src->paramgen;
f830c68f 192
0f113f3e
MC
193 dst->keygen_init = src->keygen_init;
194 dst->keygen = src->keygen;
f830c68f 195
0f113f3e
MC
196 dst->sign_init = src->sign_init;
197 dst->sign = src->sign;
f830c68f 198
0f113f3e
MC
199 dst->verify_init = src->verify_init;
200 dst->verify = src->verify;
f830c68f 201
0f113f3e
MC
202 dst->verify_recover_init = src->verify_recover_init;
203 dst->verify_recover = src->verify_recover;
f830c68f 204
0f113f3e
MC
205 dst->signctx_init = src->signctx_init;
206 dst->signctx = src->signctx;
f830c68f 207
0f113f3e
MC
208 dst->verifyctx_init = src->verifyctx_init;
209 dst->verifyctx = src->verifyctx;
f830c68f 210
0f113f3e
MC
211 dst->encrypt_init = src->encrypt_init;
212 dst->encrypt = src->encrypt;
f830c68f 213
0f113f3e
MC
214 dst->decrypt_init = src->decrypt_init;
215 dst->decrypt = src->decrypt;
f830c68f 216
0f113f3e
MC
217 dst->derive_init = src->derive_init;
218 dst->derive = src->derive;
f830c68f 219
0f113f3e
MC
220 dst->ctrl = src->ctrl;
221 dst->ctrl_str = src->ctrl_str;
2aee35d3
PY
222
223 dst->check = src->check;
0f113f3e 224}
f830c68f 225
ba30bad5 226void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth)
0f113f3e
MC
227{
228 if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC))
229 OPENSSL_free(pmeth);
230}
ba30bad5 231
f5cda4cb 232EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e)
0f113f3e
MC
233{
234 return int_ctx_new(pkey, e, -1);
235}
f5cda4cb
DSH
236
237EVP_PKEY_CTX *EVP_PKEY_CTX_new_id(int id, ENGINE *e)
0f113f3e
MC
238{
239 return int_ctx_new(NULL, e, id);
240}
f5cda4cb 241
8bdcef40 242EVP_PKEY_CTX *EVP_PKEY_CTX_dup(EVP_PKEY_CTX *pctx)
0f113f3e
MC
243{
244 EVP_PKEY_CTX *rctx;
245 if (!pctx->pmeth || !pctx->pmeth->copy)
246 return NULL;
c9777d26 247#ifndef OPENSSL_NO_ENGINE
0f113f3e
MC
248 /* Make sure it's safe to copy a pkey context using an ENGINE */
249 if (pctx->engine && !ENGINE_init(pctx->engine)) {
250 EVPerr(EVP_F_EVP_PKEY_CTX_DUP, ERR_R_ENGINE_LIB);
251 return 0;
252 }
c9777d26 253#endif
b4faea50 254 rctx = OPENSSL_malloc(sizeof(*rctx));
90945fa3 255 if (rctx == NULL)
0f113f3e 256 return NULL;
8bdcef40 257
0f113f3e 258 rctx->pmeth = pctx->pmeth;
c9777d26 259#ifndef OPENSSL_NO_ENGINE
0f113f3e 260 rctx->engine = pctx->engine;
c9777d26 261#endif
8bdcef40 262
0f113f3e 263 if (pctx->pkey)
03273d61 264 EVP_PKEY_up_ref(pctx->pkey);
944f8580 265
0f113f3e 266 rctx->pkey = pctx->pkey;
8bdcef40 267
0f113f3e 268 if (pctx->peerkey)
03273d61 269 EVP_PKEY_up_ref(pctx->peerkey);
944f8580 270
0f113f3e 271 rctx->peerkey = pctx->peerkey;
8bdcef40 272
0f113f3e
MC
273 rctx->data = NULL;
274 rctx->app_data = NULL;
275 rctx->operation = pctx->operation;
8bdcef40 276
0f113f3e
MC
277 if (pctx->pmeth->copy(rctx, pctx) > 0)
278 return rctx;
8bdcef40 279
83b4049a 280 rctx->pmeth = NULL;
0f113f3e
MC
281 EVP_PKEY_CTX_free(rctx);
282 return NULL;
8bdcef40 283
0f113f3e 284}
8bdcef40 285
ba30bad5 286int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth)
0f113f3e
MC
287{
288 if (app_pkey_methods == NULL) {
289 app_pkey_methods = sk_EVP_PKEY_METHOD_new(pmeth_cmp);
90945fa3 290 if (app_pkey_methods == NULL)
0f113f3e
MC
291 return 0;
292 }
293 if (!sk_EVP_PKEY_METHOD_push(app_pkey_methods, pmeth))
294 return 0;
295 sk_EVP_PKEY_METHOD_sort(app_pkey_methods);
296 return 1;
297}
ba30bad5 298
48ed9c23
DSH
299size_t EVP_PKEY_meth_get_count(void)
300{
301 size_t rv = OSSL_NELEM(standard_methods);
302
303 if (app_pkey_methods)
304 rv += sk_EVP_PKEY_METHOD_num(app_pkey_methods);
305 return rv;
306}
307
308const EVP_PKEY_METHOD *EVP_PKEY_meth_get0(size_t idx)
309{
310 if (idx < OSSL_NELEM(standard_methods))
311 return standard_methods[idx];
312 if (app_pkey_methods == NULL)
313 return NULL;
314 idx -= OSSL_NELEM(standard_methods);
315 if (idx >= (size_t)sk_EVP_PKEY_METHOD_num(app_pkey_methods))
316 return NULL;
317 return sk_EVP_PKEY_METHOD_value(app_pkey_methods, idx);
318}
319
5da98aa6 320void EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx)
0f113f3e
MC
321{
322 if (ctx == NULL)
323 return;
324 if (ctx->pmeth && ctx->pmeth->cleanup)
325 ctx->pmeth->cleanup(ctx);
c5ba2d99
RS
326 EVP_PKEY_free(ctx->pkey);
327 EVP_PKEY_free(ctx->peerkey);
c9777d26 328#ifndef OPENSSL_NO_ENGINE
7c96dbcd 329 ENGINE_finish(ctx->engine);
c9777d26 330#endif
0f113f3e
MC
331 OPENSSL_free(ctx);
332}
5da98aa6 333
0b6f3c66 334int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype,
0f113f3e
MC
335 int cmd, int p1, void *p2)
336{
337 int ret;
338 if (!ctx || !ctx->pmeth || !ctx->pmeth->ctrl) {
339 EVPerr(EVP_F_EVP_PKEY_CTX_CTRL, EVP_R_COMMAND_NOT_SUPPORTED);
340 return -2;
341 }
342 if ((keytype != -1) && (ctx->pmeth->pkey_id != keytype))
343 return -1;
344
345 if (ctx->operation == EVP_PKEY_OP_UNDEFINED) {
346 EVPerr(EVP_F_EVP_PKEY_CTX_CTRL, EVP_R_NO_OPERATION_SET);
347 return -1;
348 }
349
350 if ((optype != -1) && !(ctx->operation & optype)) {
351 EVPerr(EVP_F_EVP_PKEY_CTX_CTRL, EVP_R_INVALID_OPERATION);
352 return -1;
353 }
354
355 ret = ctx->pmeth->ctrl(ctx, cmd, p1, p2);
356
357 if (ret == -2)
358 EVPerr(EVP_F_EVP_PKEY_CTX_CTRL, EVP_R_COMMAND_NOT_SUPPORTED);
359
360 return ret;
361
362}
0b6f3c66 363
cefa762e 364int EVP_PKEY_CTX_ctrl_uint64(EVP_PKEY_CTX *ctx, int keytype, int optype,
64bf1016 365 int cmd, uint64_t value)
cefa762e
JB
366{
367 return EVP_PKEY_CTX_ctrl(ctx, keytype, optype, cmd, 0, &value);
368}
369
4a3dc3c0 370int EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx,
0f113f3e
MC
371 const char *name, const char *value)
372{
373 if (!ctx || !ctx->pmeth || !ctx->pmeth->ctrl_str) {
374 EVPerr(EVP_F_EVP_PKEY_CTX_CTRL_STR, EVP_R_COMMAND_NOT_SUPPORTED);
375 return -2;
376 }
410877ba
DSH
377 if (strcmp(name, "digest") == 0)
378 return EVP_PKEY_CTX_md(ctx, EVP_PKEY_OP_TYPE_SIG, EVP_PKEY_CTRL_MD,
379 value);
0f113f3e
MC
380 return ctx->pmeth->ctrl_str(ctx, name, value);
381}
f5cda4cb 382
99119000
DSH
383/* Utility functions to send a string of hex string to a ctrl */
384
385int EVP_PKEY_CTX_str2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *str)
386{
387 size_t len;
388
389 len = strlen(str);
390 if (len > INT_MAX)
391 return -1;
392 return ctx->pmeth->ctrl(ctx, cmd, len, (void *)str);
393}
394
395int EVP_PKEY_CTX_hex2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *hex)
396{
397 unsigned char *bin;
398 long binlen;
399 int rv = -1;
400
14f051a0 401 bin = OPENSSL_hexstr2buf(hex, &binlen);
99119000
DSH
402 if (bin == NULL)
403 return 0;
404 if (binlen <= INT_MAX)
405 rv = ctx->pmeth->ctrl(ctx, cmd, binlen, bin);
406 OPENSSL_free(bin);
407 return rv;
408}
52ad523c 409
410877ba
DSH
410/* Pass a message digest to a ctrl */
411int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md)
412{
413 const EVP_MD *m;
c82bafc5 414
410877ba
DSH
415 if (md == NULL || (m = EVP_get_digestbyname(md)) == NULL) {
416 EVPerr(EVP_F_EVP_PKEY_CTX_MD, EVP_R_INVALID_DIGEST);
417 return 0;
418 }
419 return EVP_PKEY_CTX_ctrl(ctx, -1, optype, cmd, 0, (void *)m);
420}
99119000 421
b28dea4e 422int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx)
0f113f3e
MC
423{
424 return ctx->operation;
425}
b28dea4e
DSH
426
427void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen)
0f113f3e
MC
428{
429 ctx->keygen_info = dat;
430 ctx->keygen_info_count = datlen;
431}
b28dea4e 432
f5cda4cb 433void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data)
0f113f3e
MC
434{
435 ctx->data = data;
436}
f5cda4cb
DSH
437
438void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx)
0f113f3e
MC
439{
440 return ctx->data;
441}
f5cda4cb 442
81cebb8b 443EVP_PKEY *EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx)
0f113f3e
MC
444{
445 return ctx->pkey;
446}
81cebb8b 447
0e1dba93 448EVP_PKEY *EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx)
0f113f3e
MC
449{
450 return ctx->peerkey;
451}
452
f5cda4cb 453void EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data)
0f113f3e
MC
454{
455 ctx->app_data = data;
456}
f5cda4cb
DSH
457
458void *EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx)
0f113f3e
MC
459{
460 return ctx->app_data;
461}
ba30bad5
DSH
462
463void EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
464 int (*init) (EVP_PKEY_CTX *ctx))
465{
466 pmeth->init = init;
467}
8bdcef40
DSH
468
469void EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
470 int (*copy) (EVP_PKEY_CTX *dst,
471 EVP_PKEY_CTX *src))
472{
473 pmeth->copy = copy;
474}
ba30bad5
DSH
475
476void EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
477 void (*cleanup) (EVP_PKEY_CTX *ctx))
478{
479 pmeth->cleanup = cleanup;
480}
ba30bad5
DSH
481
482void EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
483 int (*paramgen_init) (EVP_PKEY_CTX *ctx),
484 int (*paramgen) (EVP_PKEY_CTX *ctx,
485 EVP_PKEY *pkey))
486{
487 pmeth->paramgen_init = paramgen_init;
488 pmeth->paramgen = paramgen;
489}
ba30bad5
DSH
490
491void EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
492 int (*keygen_init) (EVP_PKEY_CTX *ctx),
493 int (*keygen) (EVP_PKEY_CTX *ctx,
494 EVP_PKEY *pkey))
495{
496 pmeth->keygen_init = keygen_init;
497 pmeth->keygen = keygen;
498}
ba30bad5
DSH
499
500void EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
501 int (*sign_init) (EVP_PKEY_CTX *ctx),
502 int (*sign) (EVP_PKEY_CTX *ctx,
503 unsigned char *sig, size_t *siglen,
504 const unsigned char *tbs,
505 size_t tbslen))
506{
507 pmeth->sign_init = sign_init;
508 pmeth->sign = sign;
509}
ba30bad5
DSH
510
511void EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
512 int (*verify_init) (EVP_PKEY_CTX *ctx),
513 int (*verify) (EVP_PKEY_CTX *ctx,
514 const unsigned char *sig,
515 size_t siglen,
516 const unsigned char *tbs,
517 size_t tbslen))
518{
519 pmeth->verify_init = verify_init;
520 pmeth->verify = verify;
521}
ba30bad5
DSH
522
523void EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
524 int (*verify_recover_init) (EVP_PKEY_CTX
525 *ctx),
526 int (*verify_recover) (EVP_PKEY_CTX
527 *ctx,
528 unsigned char
529 *sig,
530 size_t *siglen,
531 const unsigned
532 char *tbs,
533 size_t tbslen))
534{
535 pmeth->verify_recover_init = verify_recover_init;
536 pmeth->verify_recover = verify_recover;
537}
ba30bad5
DSH
538
539void EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
540 int (*signctx_init) (EVP_PKEY_CTX *ctx,
541 EVP_MD_CTX *mctx),
542 int (*signctx) (EVP_PKEY_CTX *ctx,
543 unsigned char *sig,
544 size_t *siglen,
545 EVP_MD_CTX *mctx))
546{
547 pmeth->signctx_init = signctx_init;
548 pmeth->signctx = signctx;
549}
ba30bad5
DSH
550
551void EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
552 int (*verifyctx_init) (EVP_PKEY_CTX *ctx,
553 EVP_MD_CTX *mctx),
554 int (*verifyctx) (EVP_PKEY_CTX *ctx,
555 const unsigned char *sig,
556 int siglen,
557 EVP_MD_CTX *mctx))
558{
559 pmeth->verifyctx_init = verifyctx_init;
560 pmeth->verifyctx = verifyctx;
561}
ba30bad5
DSH
562
563void EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
564 int (*encrypt_init) (EVP_PKEY_CTX *ctx),
565 int (*encryptfn) (EVP_PKEY_CTX *ctx,
566 unsigned char *out,
567 size_t *outlen,
568 const unsigned char *in,
569 size_t inlen))
570{
571 pmeth->encrypt_init = encrypt_init;
572 pmeth->encrypt = encryptfn;
573}
ba30bad5
DSH
574
575void EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
576 int (*decrypt_init) (EVP_PKEY_CTX *ctx),
577 int (*decrypt) (EVP_PKEY_CTX *ctx,
578 unsigned char *out,
579 size_t *outlen,
580 const unsigned char *in,
581 size_t inlen))
582{
583 pmeth->decrypt_init = decrypt_init;
584 pmeth->decrypt = decrypt;
585}
ba30bad5
DSH
586
587void EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
588 int (*derive_init) (EVP_PKEY_CTX *ctx),
589 int (*derive) (EVP_PKEY_CTX *ctx,
590 unsigned char *key,
591 size_t *keylen))
592{
593 pmeth->derive_init = derive_init;
594 pmeth->derive = derive;
595}
ba30bad5
DSH
596
597void EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth,
0f113f3e
MC
598 int (*ctrl) (EVP_PKEY_CTX *ctx, int type, int p1,
599 void *p2),
600 int (*ctrl_str) (EVP_PKEY_CTX *ctx,
601 const char *type,
602 const char *value))
603{
604 pmeth->ctrl = ctrl;
605 pmeth->ctrl_str = ctrl_str;
606}
e7451ed1 607
2aee35d3
PY
608void EVP_PKEY_meth_set_check(EVP_PKEY_METHOD *pmeth,
609 int (*check) (EVP_PKEY *pkey))
610{
611 pmeth->check = check;
612}
613
e7451ed1
DSH
614void EVP_PKEY_meth_get_init(EVP_PKEY_METHOD *pmeth,
615 int (**pinit) (EVP_PKEY_CTX *ctx))
616{
617 *pinit = pmeth->init;
618}
619
620void EVP_PKEY_meth_get_copy(EVP_PKEY_METHOD *pmeth,
621 int (**pcopy) (EVP_PKEY_CTX *dst,
622 EVP_PKEY_CTX *src))
623{
624 *pcopy = pmeth->copy;
625}
626
627void EVP_PKEY_meth_get_cleanup(EVP_PKEY_METHOD *pmeth,
628 void (**pcleanup) (EVP_PKEY_CTX *ctx))
629{
630 *pcleanup = pmeth->cleanup;
631}
632
633void EVP_PKEY_meth_get_paramgen(EVP_PKEY_METHOD *pmeth,
634 int (**pparamgen_init) (EVP_PKEY_CTX *ctx),
635 int (**pparamgen) (EVP_PKEY_CTX *ctx,
636 EVP_PKEY *pkey))
637{
638 if (pparamgen_init)
639 *pparamgen_init = pmeth->paramgen_init;
640 if (pparamgen)
641 *pparamgen = pmeth->paramgen;
642}
643
644void EVP_PKEY_meth_get_keygen(EVP_PKEY_METHOD *pmeth,
645 int (**pkeygen_init) (EVP_PKEY_CTX *ctx),
646 int (**pkeygen) (EVP_PKEY_CTX *ctx,
647 EVP_PKEY *pkey))
648{
649 if (pkeygen_init)
650 *pkeygen_init = pmeth->keygen_init;
651 if (pkeygen)
652 *pkeygen = pmeth->keygen;
653}
654
655void EVP_PKEY_meth_get_sign(EVP_PKEY_METHOD *pmeth,
656 int (**psign_init) (EVP_PKEY_CTX *ctx),
657 int (**psign) (EVP_PKEY_CTX *ctx,
658 unsigned char *sig, size_t *siglen,
659 const unsigned char *tbs,
660 size_t tbslen))
661{
662 if (psign_init)
663 *psign_init = pmeth->sign_init;
664 if (psign)
665 *psign = pmeth->sign;
666}
667
668void EVP_PKEY_meth_get_verify(EVP_PKEY_METHOD *pmeth,
669 int (**pverify_init) (EVP_PKEY_CTX *ctx),
670 int (**pverify) (EVP_PKEY_CTX *ctx,
671 const unsigned char *sig,
672 size_t siglen,
673 const unsigned char *tbs,
674 size_t tbslen))
675{
676 if (pverify_init)
677 *pverify_init = pmeth->verify_init;
678 if (pverify)
679 *pverify = pmeth->verify;
680}
681
682void EVP_PKEY_meth_get_verify_recover(EVP_PKEY_METHOD *pmeth,
683 int (**pverify_recover_init) (EVP_PKEY_CTX
684 *ctx),
685 int (**pverify_recover) (EVP_PKEY_CTX
686 *ctx,
687 unsigned char
688 *sig,
689 size_t *siglen,
690 const unsigned
691 char *tbs,
692 size_t tbslen))
693{
694 if (pverify_recover_init)
695 *pverify_recover_init = pmeth->verify_recover_init;
696 if (pverify_recover)
697 *pverify_recover = pmeth->verify_recover;
698}
699
700void EVP_PKEY_meth_get_signctx(EVP_PKEY_METHOD *pmeth,
701 int (**psignctx_init) (EVP_PKEY_CTX *ctx,
702 EVP_MD_CTX *mctx),
703 int (**psignctx) (EVP_PKEY_CTX *ctx,
704 unsigned char *sig,
705 size_t *siglen,
706 EVP_MD_CTX *mctx))
707{
708 if (psignctx_init)
709 *psignctx_init = pmeth->signctx_init;
710 if (psignctx)
711 *psignctx = pmeth->signctx;
712}
713
714void EVP_PKEY_meth_get_verifyctx(EVP_PKEY_METHOD *pmeth,
715 int (**pverifyctx_init) (EVP_PKEY_CTX *ctx,
716 EVP_MD_CTX *mctx),
717 int (**pverifyctx) (EVP_PKEY_CTX *ctx,
718 const unsigned char *sig,
719 int siglen,
720 EVP_MD_CTX *mctx))
721{
722 if (pverifyctx_init)
723 *pverifyctx_init = pmeth->verifyctx_init;
724 if (pverifyctx)
725 *pverifyctx = pmeth->verifyctx;
726}
727
728void EVP_PKEY_meth_get_encrypt(EVP_PKEY_METHOD *pmeth,
729 int (**pencrypt_init) (EVP_PKEY_CTX *ctx),
730 int (**pencryptfn) (EVP_PKEY_CTX *ctx,
731 unsigned char *out,
732 size_t *outlen,
733 const unsigned char *in,
734 size_t inlen))
735{
736 if (pencrypt_init)
737 *pencrypt_init = pmeth->encrypt_init;
738 if (pencryptfn)
739 *pencryptfn = pmeth->encrypt;
740}
741
742void EVP_PKEY_meth_get_decrypt(EVP_PKEY_METHOD *pmeth,
743 int (**pdecrypt_init) (EVP_PKEY_CTX *ctx),
744 int (**pdecrypt) (EVP_PKEY_CTX *ctx,
745 unsigned char *out,
746 size_t *outlen,
747 const unsigned char *in,
748 size_t inlen))
749{
750 if (pdecrypt_init)
751 *pdecrypt_init = pmeth->decrypt_init;
752 if (pdecrypt)
753 *pdecrypt = pmeth->decrypt;
754}
755
756void EVP_PKEY_meth_get_derive(EVP_PKEY_METHOD *pmeth,
757 int (**pderive_init) (EVP_PKEY_CTX *ctx),
758 int (**pderive) (EVP_PKEY_CTX *ctx,
759 unsigned char *key,
760 size_t *keylen))
761{
762 if (pderive_init)
763 *pderive_init = pmeth->derive_init;
764 if (pderive)
765 *pderive = pmeth->derive;
766}
767
768void EVP_PKEY_meth_get_ctrl(EVP_PKEY_METHOD *pmeth,
769 int (**pctrl) (EVP_PKEY_CTX *ctx, int type, int p1,
770 void *p2),
771 int (**pctrl_str) (EVP_PKEY_CTX *ctx,
772 const char *type,
773 const char *value))
774{
775 if (pctrl)
776 *pctrl = pmeth->ctrl;
777 if (pctrl_str)
778 *pctrl_str = pmeth->ctrl_str;
779}
2aee35d3
PY
780
781void EVP_PKEY_meth_get_check(EVP_PKEY_METHOD *pmeth,
782 int (**pcheck) (EVP_PKEY *pkey))
783{
784 if (*pcheck)
785 *pcheck = pmeth->check;
786}