]>
Commit | Line | Data |
---|---|---|
2039c421 RS |
1 | /* |
2 | * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | |
d02b48c6 | 3 | * |
365a2d99 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
2039c421 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
d02b48c6 RE |
8 | */ |
9 | ||
f41ac0ee P |
10 | /* |
11 | * DSA low level APIs are deprecated for public use, but still ok for | |
12 | * internal use. | |
13 | */ | |
14 | #include "internal/deprecated.h" | |
15 | ||
d02b48c6 | 16 | #include <stdio.h> |
b39fc560 | 17 | #include "internal/cryptlib.h" |
ec577822 BM |
18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | |
20 | #include <openssl/objects.h> | |
f66c3032 | 21 | #include <openssl/asn1.h> |
3c27208f RS |
22 | #include <openssl/rsa.h> |
23 | #include <openssl/dsa.h> | |
24 | #include <openssl/ec.h> | |
d02b48c6 | 25 | |
25f2138b | 26 | #include "crypto/evp.h" |
3aeb9348 | 27 | |
875a644a | 28 | EVP_PKEY *d2i_PublicKey(int type, EVP_PKEY **a, const unsigned char **pp, |
0f113f3e MC |
29 | long length) |
30 | { | |
31 | EVP_PKEY *ret; | |
d02b48c6 | 32 | |
0f113f3e MC |
33 | if ((a == NULL) || (*a == NULL)) { |
34 | if ((ret = EVP_PKEY_new()) == NULL) { | |
35 | ASN1err(ASN1_F_D2I_PUBLICKEY, ERR_R_EVP_LIB); | |
26a7d938 | 36 | return NULL; |
0f113f3e MC |
37 | } |
38 | } else | |
39 | ret = *a; | |
d02b48c6 | 40 | |
2aa2beb0 | 41 | if (type != EVP_PKEY_id(ret) && !EVP_PKEY_set_type(ret, type)) { |
0f113f3e MC |
42 | ASN1err(ASN1_F_D2I_PUBLICKEY, ERR_R_EVP_LIB); |
43 | goto err; | |
44 | } | |
c18e51ba | 45 | |
0f113f3e | 46 | switch (EVP_PKEY_id(ret)) { |
cf1b7d96 | 47 | #ifndef OPENSSL_NO_RSA |
0f113f3e | 48 | case EVP_PKEY_RSA: |
3aeb9348 | 49 | if ((ret->pkey.rsa = d2i_RSAPublicKey(NULL, pp, length)) == NULL) { |
0f113f3e MC |
50 | ASN1err(ASN1_F_D2I_PUBLICKEY, ERR_R_ASN1_LIB); |
51 | goto err; | |
52 | } | |
53 | break; | |
d02b48c6 | 54 | #endif |
cf1b7d96 | 55 | #ifndef OPENSSL_NO_DSA |
0f113f3e MC |
56 | case EVP_PKEY_DSA: |
57 | /* TMP UGLY CAST */ | |
3aeb9348 | 58 | if (!d2i_DSAPublicKey(&ret->pkey.dsa, pp, length)) { |
0f113f3e MC |
59 | ASN1err(ASN1_F_D2I_PUBLICKEY, ERR_R_ASN1_LIB); |
60 | goto err; | |
61 | } | |
62 | break; | |
4d94ae00 | 63 | #endif |
14a7cfb3 | 64 | #ifndef OPENSSL_NO_EC |
0f113f3e | 65 | case EVP_PKEY_EC: |
3aeb9348 | 66 | if (!o2i_ECPublicKey(&ret->pkey.ec, pp, length)) { |
0f113f3e MC |
67 | ASN1err(ASN1_F_D2I_PUBLICKEY, ERR_R_ASN1_LIB); |
68 | goto err; | |
69 | } | |
70 | break; | |
d02b48c6 | 71 | #endif |
0f113f3e MC |
72 | default: |
73 | ASN1err(ASN1_F_D2I_PUBLICKEY, ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE); | |
74 | goto err; | |
0f113f3e MC |
75 | } |
76 | if (a != NULL) | |
77 | (*a) = ret; | |
26a7d938 | 78 | return ret; |
0f113f3e | 79 | err: |
c5ba2d99 | 80 | if (a == NULL || *a != ret) |
0f113f3e | 81 | EVP_PKEY_free(ret); |
26a7d938 | 82 | return NULL; |
0f113f3e | 83 | } |