]> git.ipfire.org Git - thirdparty/openssl.git/blame - providers/implementations/serializers/serializer_rsa_pub.c
Deprecate the low level Diffie-Hellman functions.
[thirdparty/openssl.git] / providers / implementations / serializers / serializer_rsa_pub.c
CommitLineData
677add38
RL
1/*
2 * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
c5f87134
P
10/*
11 * RSA low level APIs are deprecated for public use, but still ok for
12 * internal use.
13 */
14#include "internal/deprecated.h"
15
677add38
RL
16#include <openssl/core_numbers.h>
17#include <openssl/pem.h>
18#include <openssl/rsa.h>
19#include <openssl/types.h>
20#include <openssl/params.h>
21#include "prov/bio.h"
22#include "prov/implementations.h"
23#include "prov/providercommonerr.h"
24#include "serializer_local.h"
25
26static OSSL_OP_serializer_newctx_fn rsa_pub_newctx;
27static OSSL_OP_serializer_freectx_fn rsa_pub_freectx;
28static OSSL_OP_serializer_serialize_data_fn rsa_pub_der_data;
29static OSSL_OP_serializer_serialize_object_fn rsa_pub_der;
30static OSSL_OP_serializer_serialize_data_fn rsa_pub_pem_data;
31static OSSL_OP_serializer_serialize_object_fn rsa_pub_pem;
32
33static OSSL_OP_serializer_serialize_data_fn rsa_pub_print_data;
34static OSSL_OP_serializer_serialize_object_fn rsa_pub_print;
35
36/* Public key : context */
37
38/*
39 * There's no specific implementation context, so we use the provider context
40 */
41static void *rsa_pub_newctx(void *provctx)
42{
43 return provctx;
44}
45
46static void rsa_pub_freectx(void *ctx)
47{
48}
49
50/* Public key : DER */
51static int rsa_pub_der_data(void *ctx, const OSSL_PARAM params[], BIO *out,
52 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
53{
32b0645c
RL
54 OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
55 OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
56 OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
677add38
RL
57 int ok = 0;
58
32b0645c
RL
59 if (rsa_import != NULL) {
60 RSA *rsa;
677add38 61
32b0645c
RL
62 /* ctx == provctx */
63 if ((rsa = rsa_new(ctx)) != NULL
64 && rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
65 && rsa_pub_der(ctx, rsa, out, cb, cbarg))
66 ok = 1;
67 rsa_free(rsa);
677add38
RL
68 }
69 return ok;
70}
71
72static int rsa_pub_der(void *ctx, void *rsa, BIO *out,
73 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
74{
75 return i2d_RSA_PUBKEY_bio(out, rsa);
76}
77
78/* Public key : PEM */
79static int rsa_pub_pem_data(void *ctx, const OSSL_PARAM params[], BIO *out,
80 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
81{
32b0645c
RL
82 OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
83 OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
84 OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
677add38
RL
85 int ok = 0;
86
32b0645c
RL
87 if (rsa_import != NULL) {
88 RSA *rsa;
677add38 89
32b0645c
RL
90 /* ctx == provctx */
91 if ((rsa = rsa_new(ctx)) != NULL
92 && rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
93 && rsa_pub_pem(ctx, rsa, out, cb, cbarg))
94 ok = 1;
95 rsa_free(rsa);
677add38
RL
96 }
97 return ok;
98}
99
100static int rsa_pub_pem(void *ctx, void *rsa, BIO *out,
101 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
102{
103 return PEM_write_bio_RSA_PUBKEY(out, rsa);
104}
105
106static int rsa_pub_print_data(void *ctx, const OSSL_PARAM params[], BIO *out,
107 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
108{
32b0645c
RL
109 OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
110 OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
111 OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
677add38
RL
112 int ok = 0;
113
32b0645c
RL
114 if (rsa_import != NULL) {
115 RSA *rsa;
677add38 116
32b0645c
RL
117 /* ctx == provctx */
118 if ((rsa = rsa_new(ctx)) != NULL
119 && rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
120 && rsa_pub_print(ctx, rsa, out, cb, cbarg))
121 ok = 1;
122 rsa_free(rsa);
677add38
RL
123 }
124 return ok;
125}
126
127static int rsa_pub_print(void *ctx, void *rsa, BIO *out,
128 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
129{
130 return ossl_prov_print_rsa(out, rsa, 0);
131}
132
133const OSSL_DISPATCH rsa_pub_der_serializer_functions[] = {
134 { OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
135 { OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
136 { OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))rsa_pub_der_data },
137 { OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_der },
138 { 0, NULL }
139};
140
141const OSSL_DISPATCH rsa_pub_pem_serializer_functions[] = {
142 { OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
143 { OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
144 { OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))rsa_pub_pem_data },
145 { OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_pem },
146 { 0, NULL }
147};
148
149const OSSL_DISPATCH rsa_pub_text_serializer_functions[] = {
150 { OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
151 { OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
152 { OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_print },
153 { OSSL_FUNC_SERIALIZER_SERIALIZE_DATA,
154 (void (*)(void))rsa_pub_print_data },
155 { 0, NULL }
156};