]>
Commit | Line | Data |
---|---|---|
14a7cfb3 | 1 | /* |
7eb18f12 | 2 | * Written by Nils Larsch for the OpenSSL project. |
14a7cfb3 | 3 | */ |
5dbd3efc | 4 | /* ==================================================================== |
9dd84053 | 5 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. |
5dbd3efc BM |
6 | * |
7 | * Redistribution and use in source and binary forms, with or without | |
8 | * modification, are permitted provided that the following conditions | |
9 | * are met: | |
10 | * | |
11 | * 1. Redistributions of source code must retain the above copyright | |
0f113f3e | 12 | * notice, this list of conditions and the following disclaimer. |
5dbd3efc BM |
13 | * |
14 | * 2. Redistributions in binary form must reproduce the above copyright | |
15 | * notice, this list of conditions and the following disclaimer in | |
16 | * the documentation and/or other materials provided with the | |
17 | * distribution. | |
18 | * | |
19 | * 3. All advertising materials mentioning features or use of this | |
20 | * software must display the following acknowledgment: | |
21 | * "This product includes software developed by the OpenSSL Project | |
22 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
23 | * | |
24 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
25 | * endorse or promote products derived from this software without | |
26 | * prior written permission. For written permission, please contact | |
27 | * openssl-core@openssl.org. | |
28 | * | |
29 | * 5. Products derived from this software may not be called "OpenSSL" | |
30 | * nor may "OpenSSL" appear in their names without prior written | |
31 | * permission of the OpenSSL Project. | |
32 | * | |
33 | * 6. Redistributions of any form whatsoever must retain the following | |
34 | * acknowledgment: | |
35 | * "This product includes software developed by the OpenSSL Project | |
36 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
37 | * | |
38 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
39 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
40 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
41 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
42 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
43 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
44 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
45 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
46 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
47 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
48 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
49 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
50 | * ==================================================================== | |
51 | * | |
52 | * This product includes cryptographic software written by Eric Young | |
53 | * (eay@cryptsoft.com). This product includes software written by Tim | |
54 | * Hudson (tjh@cryptsoft.com). | |
55 | * | |
56 | */ | |
714df32e BM |
57 | /* ==================================================================== |
58 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | |
59 | * | |
0f113f3e | 60 | * Portions of the attached software ("Contribution") are developed by |
714df32e BM |
61 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. |
62 | * | |
63 | * The Contribution is licensed pursuant to the OpenSSL open source | |
64 | * license provided above. | |
65 | * | |
0f113f3e | 66 | * The elliptic curve binary polynomial software is originally written by |
714df32e BM |
67 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. |
68 | * | |
69 | */ | |
6e04afb8 NL |
70 | |
71 | #include <openssl/opensslconf.h> | |
14a7cfb3 | 72 | #ifndef OPENSSL_NO_EC |
0f113f3e MC |
73 | # include <assert.h> |
74 | # include <stdio.h> | |
75 | # include <stdlib.h> | |
76 | # include <time.h> | |
77 | # include <string.h> | |
78 | # include "apps.h" | |
79 | # include <openssl/bio.h> | |
80 | # include <openssl/err.h> | |
81 | # include <openssl/bn.h> | |
82 | # include <openssl/ec.h> | |
83 | # include <openssl/x509.h> | |
84 | # include <openssl/pem.h> | |
85 | ||
7e1b7485 RS |
86 | typedef enum OPTION_choice { |
87 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | |
88 | OPT_INFORM, OPT_OUTFORM, OPT_IN, OPT_OUT, OPT_TEXT, OPT_C, | |
89 | OPT_CHECK, OPT_LIST_CURVES, OPT_NO_SEED, OPT_NOOUT, OPT_NAME, | |
90 | OPT_CONV_FORM, OPT_PARAM_ENC, OPT_GENKEY, OPT_RAND, OPT_ENGINE | |
91 | } OPTION_CHOICE; | |
92 | ||
93 | OPTIONS ecparam_options[] = { | |
94 | {"help", OPT_HELP, '-', "Display this summary"}, | |
95 | {"inform", OPT_INFORM, 'F', "Input format - default PEM (DER or PEM)"}, | |
96 | {"outform", OPT_OUTFORM, 'F', "Output format - default PEM"}, | |
97 | {"in", OPT_IN, '<', "Input file - default stdin"}, | |
98 | {"out", OPT_OUT, '>', "Output file - default stdout"}, | |
99 | {"text", OPT_TEXT, '-', "Print the ec parameters in text form"}, | |
100 | {"C", OPT_C, '-', "Print a 'C' function creating the parameters"}, | |
101 | {"check", OPT_CHECK, '-', "Validate the ec parameters"}, | |
102 | {"list_curves", OPT_LIST_CURVES, '-', | |
103 | "Prints a list of all curve 'short names'"}, | |
104 | {"no_seed", OPT_NO_SEED, '-', | |
105 | "If 'explicit' parameters are chosen do not use the seed"}, | |
106 | {"noout", OPT_NOOUT, '-', "Do not print the ec parameter"}, | |
107 | {"name", OPT_NAME, 's', | |
108 | "Use the ec parameters with specified 'short name'"}, | |
109 | {"conv_form", OPT_CONV_FORM, 's', "Specifies the point conversion form "}, | |
110 | {"param_enc", OPT_PARAM_ENC, 's', | |
111 | "Specifies the way the ec parameters are encoded"}, | |
112 | {"genkey", OPT_GENKEY, '-', "Generate ec key"}, | |
113 | {"rand", OPT_RAND, 's', "Files to use for random number input"}, | |
114 | # ifndef OPENSSL_NO_ENGINE | |
115 | {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, | |
116 | # endif | |
117 | {NULL} | |
118 | }; | |
119 | ||
120 | OPT_PAIR forms[] = { | |
121 | {"compressed", POINT_CONVERSION_COMPRESSED}, | |
122 | {"uncompressed", POINT_CONVERSION_UNCOMPRESSED}, | |
123 | {"hybrid", POINT_CONVERSION_HYBRID}, | |
124 | {NULL} | |
125 | }; | |
126 | ||
127 | OPT_PAIR encodings[] = { | |
128 | {"named_curve", OPENSSL_EC_NAMED_CURVE}, | |
129 | {"explicit", 0}, | |
130 | {NULL} | |
131 | }; | |
132 | ||
133 | int ecparam_main(int argc, char **argv) | |
0f113f3e | 134 | { |
7e1b7485 RS |
135 | BIGNUM *ec_gen = NULL, *ec_order = NULL, *ec_cofactor = NULL; |
136 | BIGNUM *ec_p = NULL, *ec_a = NULL, *ec_b = NULL; | |
137 | BIO *in = NULL, *out = NULL; | |
0f113f3e MC |
138 | EC_GROUP *group = NULL; |
139 | point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED; | |
0f113f3e | 140 | char *curve_name = NULL, *inrand = NULL; |
7e1b7485 | 141 | char *engine = NULL, *infile = NULL, *outfile = NULL, *prog; |
0f113f3e | 142 | unsigned char *buffer = NULL; |
7e1b7485 RS |
143 | OPTION_CHOICE o; |
144 | int asn1_flag = OPENSSL_EC_NAMED_CURVE, new_asn1_flag = 0; | |
145 | int informat = FORMAT_PEM, outformat = FORMAT_PEM, noout = 0, C = 0, ret = | |
146 | 1; | |
147 | int list_curves = 0, no_seed = 0, check = 0, new_form = 0; | |
148 | int text = 0, i, need_rand = 0, genkey = 0; | |
149 | ||
150 | prog = opt_init(argc, argv, ecparam_options); | |
151 | while ((o = opt_next()) != OPT_EOF) { | |
152 | switch (o) { | |
153 | case OPT_EOF: | |
154 | case OPT_ERR: | |
155 | opthelp: | |
156 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | |
157 | goto end; | |
158 | case OPT_HELP: | |
159 | opt_help(ecparam_options); | |
160 | ret = 0; | |
161 | goto end; | |
162 | case OPT_INFORM: | |
163 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) | |
164 | goto opthelp; | |
165 | break; | |
166 | case OPT_IN: | |
167 | infile = opt_arg(); | |
168 | break; | |
169 | case OPT_OUTFORM: | |
170 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &outformat)) | |
171 | goto opthelp; | |
172 | break; | |
173 | case OPT_OUT: | |
174 | outfile = opt_arg(); | |
175 | break; | |
176 | case OPT_TEXT: | |
0f113f3e | 177 | text = 1; |
7e1b7485 RS |
178 | break; |
179 | case OPT_C: | |
0f113f3e | 180 | C = 1; |
7e1b7485 RS |
181 | break; |
182 | case OPT_CHECK: | |
0f113f3e | 183 | check = 1; |
7e1b7485 RS |
184 | break; |
185 | case OPT_LIST_CURVES: | |
0f113f3e | 186 | list_curves = 1; |
7e1b7485 RS |
187 | break; |
188 | case OPT_NO_SEED: | |
0f113f3e | 189 | no_seed = 1; |
7e1b7485 RS |
190 | break; |
191 | case OPT_NOOUT: | |
0f113f3e | 192 | noout = 1; |
7e1b7485 RS |
193 | break; |
194 | case OPT_NAME: | |
195 | curve_name = opt_arg(); | |
196 | break; | |
197 | case OPT_CONV_FORM: | |
198 | if (!opt_pair(opt_arg(), forms, &new_form)) | |
199 | goto opthelp; | |
200 | form = new_form; | |
201 | new_form = 1; | |
202 | break; | |
203 | case OPT_PARAM_ENC: | |
204 | if (!opt_pair(opt_arg(), encodings, &asn1_flag)) | |
205 | goto opthelp; | |
206 | new_asn1_flag = 1; | |
207 | break; | |
208 | case OPT_GENKEY: | |
209 | genkey = need_rand = 1; | |
210 | break; | |
211 | case OPT_RAND: | |
212 | inrand = opt_arg(); | |
0f113f3e | 213 | need_rand = 1; |
7e1b7485 RS |
214 | break; |
215 | case OPT_ENGINE: | |
216 | engine = opt_arg(); | |
0f113f3e MC |
217 | break; |
218 | } | |
0f113f3e | 219 | } |
7e1b7485 RS |
220 | argc = opt_num_rest(); |
221 | argv = opt_rest(); | |
0f113f3e | 222 | |
7e1b7485 RS |
223 | in = bio_open_default(infile, RB(informat)); |
224 | if (in == NULL) | |
0f113f3e | 225 | goto end; |
7e1b7485 RS |
226 | out = bio_open_default(outfile, WB(outformat)); |
227 | if (out == NULL) | |
0f113f3e | 228 | goto end; |
0f113f3e MC |
229 | |
230 | # ifndef OPENSSL_NO_ENGINE | |
7e1b7485 | 231 | setup_engine(engine, 0); |
0f113f3e | 232 | # endif |
5dbd3efc | 233 | |
0f113f3e MC |
234 | if (list_curves) { |
235 | EC_builtin_curve *curves = NULL; | |
236 | size_t crv_len = 0; | |
237 | size_t n = 0; | |
238 | ||
239 | crv_len = EC_get_builtin_curves(NULL, 0); | |
240 | ||
241 | curves = OPENSSL_malloc((int)(sizeof(EC_builtin_curve) * crv_len)); | |
242 | ||
243 | if (curves == NULL) | |
244 | goto end; | |
245 | ||
246 | if (!EC_get_builtin_curves(curves, crv_len)) { | |
247 | OPENSSL_free(curves); | |
248 | goto end; | |
249 | } | |
250 | ||
251 | for (n = 0; n < crv_len; n++) { | |
252 | const char *comment; | |
253 | const char *sname; | |
254 | comment = curves[n].comment; | |
255 | sname = OBJ_nid2sn(curves[n].nid); | |
256 | if (comment == NULL) | |
257 | comment = "CURVE DESCRIPTION NOT AVAILABLE"; | |
258 | if (sname == NULL) | |
259 | sname = ""; | |
260 | ||
261 | BIO_printf(out, " %-10s: ", sname); | |
262 | BIO_printf(out, "%s\n", comment); | |
263 | } | |
264 | ||
265 | OPENSSL_free(curves); | |
266 | ret = 0; | |
267 | goto end; | |
268 | } | |
269 | ||
270 | if (curve_name != NULL) { | |
271 | int nid; | |
272 | ||
273 | /* | |
274 | * workaround for the SECG curve names secp192r1 and secp256r1 (which | |
275 | * are the same as the curves prime192v1 and prime256v1 defined in | |
276 | * X9.62) | |
277 | */ | |
278 | if (!strcmp(curve_name, "secp192r1")) { | |
279 | BIO_printf(bio_err, "using curve name prime192v1 " | |
280 | "instead of secp192r1\n"); | |
281 | nid = NID_X9_62_prime192v1; | |
282 | } else if (!strcmp(curve_name, "secp256r1")) { | |
283 | BIO_printf(bio_err, "using curve name prime256v1 " | |
284 | "instead of secp256r1\n"); | |
285 | nid = NID_X9_62_prime256v1; | |
286 | } else | |
287 | nid = OBJ_sn2nid(curve_name); | |
288 | ||
289 | if (nid == 0) | |
290 | nid = EC_curve_nist2nid(curve_name); | |
291 | ||
292 | if (nid == 0) { | |
293 | BIO_printf(bio_err, "unknown curve name (%s)\n", curve_name); | |
294 | goto end; | |
295 | } | |
296 | ||
297 | group = EC_GROUP_new_by_curve_name(nid); | |
298 | if (group == NULL) { | |
299 | BIO_printf(bio_err, "unable to create curve (%s)\n", curve_name); | |
300 | goto end; | |
301 | } | |
302 | EC_GROUP_set_asn1_flag(group, asn1_flag); | |
303 | EC_GROUP_set_point_conversion_form(group, form); | |
7e1b7485 | 304 | } else if (informat == FORMAT_ASN1) |
0f113f3e | 305 | group = d2i_ECPKParameters_bio(in, NULL); |
7e1b7485 | 306 | else |
0f113f3e | 307 | group = PEM_read_bio_ECPKParameters(in, NULL, NULL, NULL); |
0f113f3e MC |
308 | if (group == NULL) { |
309 | BIO_printf(bio_err, "unable to load elliptic curve parameters\n"); | |
310 | ERR_print_errors(bio_err); | |
311 | goto end; | |
312 | } | |
313 | ||
314 | if (new_form) | |
315 | EC_GROUP_set_point_conversion_form(group, form); | |
316 | ||
317 | if (new_asn1_flag) | |
318 | EC_GROUP_set_asn1_flag(group, asn1_flag); | |
319 | ||
320 | if (no_seed) { | |
321 | EC_GROUP_set_seed(group, NULL, 0); | |
322 | } | |
323 | ||
324 | if (text) { | |
325 | if (!ECPKParameters_print(out, group, 0)) | |
326 | goto end; | |
327 | } | |
328 | ||
329 | if (check) { | |
330 | if (group == NULL) | |
331 | BIO_printf(bio_err, "no elliptic curve parameters\n"); | |
332 | BIO_printf(bio_err, "checking elliptic curve parameters: "); | |
333 | if (!EC_GROUP_check(group, NULL)) { | |
334 | BIO_printf(bio_err, "failed\n"); | |
335 | ERR_print_errors(bio_err); | |
336 | } else | |
337 | BIO_printf(bio_err, "ok\n"); | |
338 | ||
339 | } | |
340 | ||
341 | if (C) { | |
342 | size_t buf_len = 0, tmp_len = 0; | |
343 | const EC_POINT *point; | |
344 | int is_prime, len = 0; | |
345 | const EC_METHOD *meth = EC_GROUP_method_of(group); | |
346 | ||
7e1b7485 RS |
347 | if ((ec_p = BN_new()) == NULL |
348 | || (ec_a = BN_new()) == NULL | |
349 | || (ec_b = BN_new()) == NULL | |
350 | || (ec_gen = BN_new()) == NULL | |
351 | || (ec_order = BN_new()) == NULL | |
352 | || (ec_cofactor = BN_new()) == NULL) { | |
0f113f3e MC |
353 | perror("OPENSSL_malloc"); |
354 | goto end; | |
355 | } | |
356 | ||
357 | is_prime = (EC_METHOD_get_field_type(meth) == NID_X9_62_prime_field); | |
7e1b7485 RS |
358 | if (!is_prime) { |
359 | BIO_printf(bio_err, "Can only handle X9.62 prime fields\n"); | |
0f113f3e MC |
360 | goto end; |
361 | } | |
362 | ||
7e1b7485 RS |
363 | if (!EC_GROUP_get_curve_GFp(group, ec_p, ec_a, ec_b, NULL)) |
364 | goto end; | |
365 | ||
0f113f3e MC |
366 | if ((point = EC_GROUP_get0_generator(group)) == NULL) |
367 | goto end; | |
368 | if (!EC_POINT_point2bn(group, point, | |
369 | EC_GROUP_get_point_conversion_form(group), | |
370 | ec_gen, NULL)) | |
371 | goto end; | |
372 | if (!EC_GROUP_get_order(group, ec_order, NULL)) | |
373 | goto end; | |
374 | if (!EC_GROUP_get_cofactor(group, ec_cofactor, NULL)) | |
375 | goto end; | |
376 | ||
377 | if (!ec_p || !ec_a || !ec_b || !ec_gen || !ec_order || !ec_cofactor) | |
378 | goto end; | |
379 | ||
380 | len = BN_num_bits(ec_order); | |
381 | ||
382 | if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len) | |
383 | buf_len = tmp_len; | |
384 | if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len) | |
385 | buf_len = tmp_len; | |
386 | if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len) | |
387 | buf_len = tmp_len; | |
388 | if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len) | |
389 | buf_len = tmp_len; | |
390 | if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len) | |
391 | buf_len = tmp_len; | |
392 | if ((tmp_len = (size_t)BN_num_bytes(ec_cofactor)) > buf_len) | |
393 | buf_len = tmp_len; | |
394 | ||
395 | buffer = (unsigned char *)OPENSSL_malloc(buf_len); | |
396 | ||
397 | if (buffer == NULL) { | |
398 | perror("OPENSSL_malloc"); | |
399 | goto end; | |
400 | } | |
401 | ||
7e1b7485 RS |
402 | BIO_printf(out, "EC_GROUP *get_ec_group_%d(void)\n{\n", len); |
403 | print_bignum_var(out, ec_p, "ec_p", len, buffer); | |
404 | print_bignum_var(out, ec_a, "ec_a", len, buffer); | |
405 | print_bignum_var(out, ec_b, "ec_b", len, buffer); | |
406 | print_bignum_var(out, ec_gen, "ec_gen", len, buffer); | |
407 | print_bignum_var(out, ec_order, "ec_order", len, buffer); | |
408 | print_bignum_var(out, ec_cofactor, "ec_cofactor", len, buffer); | |
409 | BIO_printf(out, " int ok = 0;\n" | |
410 | " EC_GROUP *group = NULL;\n" | |
411 | " EC_POINT *point = NULL;\n" | |
412 | " BIGNUM *tmp_1 = NULL;\n" | |
413 | " BIGNUM *tmp_2 = NULL;\n" | |
414 | " BIGNUM *tmp_3 = NULL;\n" | |
415 | "\n"); | |
416 | ||
417 | BIO_printf(out, " if ((tmp_1 = BN_bin2bn(ec_p_%d, sizeof (ec_p_%d), NULL)) == NULL)\n" | |
418 | " goto err;\n", len, len); | |
419 | BIO_printf(out, " if ((tmp_2 = BN_bin2bn(ec_a_%d, sizeof (ec_a_%d), NULL)) == NULL)\n" | |
420 | " goto err;\n", len, len); | |
421 | BIO_printf(out, " if ((tmp_3 = BN_bin2bn(ec_b_%d, sizeof (ec_b_%d), NULL)) == NULL)\n" | |
422 | " goto err;\n", len, len); | |
423 | BIO_printf(out, " if ((group = EC_GROUP_new_curve_GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL)\n" | |
424 | " goto err;\n" | |
425 | "\n"); | |
426 | BIO_printf(out, " /* build generator */\n"); | |
427 | BIO_printf(out, " if ((tmp_1 = BN_bin2bn(ec_gen_%d, sizeof (ec_gen_%d), tmp_1)) == NULL)\n" | |
428 | " goto err;\n", len, len); | |
429 | BIO_printf(out, " point = EC_POINT_bn2point(group, tmp_1, NULL, NULL);\n"); | |
430 | BIO_printf(out, " if (point == NULL)\n" | |
431 | " goto err;\n"); | |
432 | BIO_printf(out, " if ((tmp_2 = BN_bin2bn(ec_order_%d, sizeof (ec_order_%d), tmp_2)) == NULL)\n" | |
433 | " goto err;\n", len, len); | |
434 | BIO_printf(out, " if ((tmp_3 = BN_bin2bn(ec_cofactor_%d, sizeof (ec_cofactor_%d), tmp_3)) == NULL)\n" | |
435 | " goto err;\n", len, len); | |
436 | BIO_printf(out, " if (!EC_GROUP_set_generator(group, point, tmp_2, tmp_3))\n" | |
437 | " goto err;\n" | |
438 | "ok = 1;" | |
439 | "\n"); | |
440 | BIO_printf(out, "err:\n" | |
441 | " BN_free(tmp_1);\n" | |
442 | " BN_free(tmp_2);\n" | |
443 | " BN_free(tmp_3);\n" | |
444 | " EC_POINT_free(point);\n" | |
445 | " if (!ok) {\n" | |
446 | " EC_GROUP_free(group);\n" | |
447 | " return NULL;\n" | |
448 | " }\n" | |
449 | " return (group);\n" | |
450 | "}\n"); | |
0f113f3e MC |
451 | } |
452 | ||
453 | if (!noout) { | |
454 | if (outformat == FORMAT_ASN1) | |
455 | i = i2d_ECPKParameters_bio(out, group); | |
7e1b7485 | 456 | else |
0f113f3e | 457 | i = PEM_write_bio_ECPKParameters(out, group); |
0f113f3e MC |
458 | if (!i) { |
459 | BIO_printf(bio_err, "unable to write elliptic " | |
460 | "curve parameters\n"); | |
461 | ERR_print_errors(bio_err); | |
462 | goto end; | |
463 | } | |
464 | } | |
465 | ||
466 | if (need_rand) { | |
7e1b7485 | 467 | app_RAND_load_file(NULL, (inrand != NULL)); |
0f113f3e MC |
468 | if (inrand != NULL) |
469 | BIO_printf(bio_err, "%ld semi-random bytes loaded\n", | |
470 | app_RAND_load_files(inrand)); | |
471 | } | |
472 | ||
473 | if (genkey) { | |
474 | EC_KEY *eckey = EC_KEY_new(); | |
475 | ||
476 | if (eckey == NULL) | |
477 | goto end; | |
478 | ||
479 | assert(need_rand); | |
480 | ||
481 | if (EC_KEY_set_group(eckey, group) == 0) | |
482 | goto end; | |
483 | ||
484 | if (!EC_KEY_generate_key(eckey)) { | |
485 | EC_KEY_free(eckey); | |
486 | goto end; | |
487 | } | |
488 | if (outformat == FORMAT_ASN1) | |
489 | i = i2d_ECPrivateKey_bio(out, eckey); | |
7e1b7485 | 490 | else |
0f113f3e MC |
491 | i = PEM_write_bio_ECPrivateKey(out, eckey, NULL, |
492 | NULL, 0, NULL, NULL); | |
0f113f3e MC |
493 | EC_KEY_free(eckey); |
494 | } | |
495 | ||
496 | if (need_rand) | |
7e1b7485 | 497 | app_RAND_write_file(NULL); |
0f113f3e MC |
498 | |
499 | ret = 0; | |
500 | end: | |
501 | if (ec_p) | |
502 | BN_free(ec_p); | |
503 | if (ec_a) | |
504 | BN_free(ec_a); | |
505 | if (ec_b) | |
506 | BN_free(ec_b); | |
507 | if (ec_gen) | |
508 | BN_free(ec_gen); | |
509 | if (ec_order) | |
510 | BN_free(ec_order); | |
511 | if (ec_cofactor) | |
512 | BN_free(ec_cofactor); | |
513 | if (buffer) | |
514 | OPENSSL_free(buffer); | |
ca3a82c3 RS |
515 | BIO_free(in); |
516 | BIO_free_all(out); | |
8fdc3734 | 517 | EC_GROUP_free(group); |
7e1b7485 | 518 | return (ret); |
5dbd3efc BM |
519 | } |
520 | ||
0f113f3e | 521 | #else /* !OPENSSL_NO_EC */ |
ef236ec3 DSH |
522 | |
523 | # if PEDANTIC | |
0f113f3e | 524 | static void *dummy = &dummy; |
ef236ec3 DSH |
525 | # endif |
526 | ||
5dbd3efc | 527 | #endif |