]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* crypto/asn1/t_pkey.c */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
8 | * | |
9 | * This library is free for commercial and non-commercial use as long as | |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 | * | |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
22 | * | |
23 | * Redistribution and use in source and binary forms, with or without | |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 | * the apps directory (application code) you must include an acknowledgement: | |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 | * | |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
52 | * | |
53 | * The licence and distribution terms for any publically available version or | |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
59 | #include <stdio.h> | |
60 | #include "cryptlib.h" | |
ec577822 BM |
61 | #include <openssl/buffer.h> |
62 | #include <openssl/bn.h> | |
cf1b7d96 | 63 | #ifndef OPENSSL_NO_RSA |
ec577822 | 64 | #include <openssl/rsa.h> |
d02b48c6 | 65 | #endif |
cf1b7d96 | 66 | #ifndef OPENSSL_NO_DH |
ec577822 | 67 | #include <openssl/dh.h> |
d02b48c6 | 68 | #endif |
cf1b7d96 | 69 | #ifndef OPENSSL_NO_DSA |
ec577822 | 70 | #include <openssl/dsa.h> |
d02b48c6 | 71 | #endif |
4d94ae00 BM |
72 | #ifndef OPENSSL_NO_ECDSA |
73 | #include <openssl/ecdsa.h> | |
74 | #endif | |
d02b48c6 | 75 | |
e778802f | 76 | static int print(BIO *fp,const char *str,BIGNUM *num, |
d02b48c6 | 77 | unsigned char *buf,int off); |
cf1b7d96 RL |
78 | #ifndef OPENSSL_NO_RSA |
79 | #ifndef OPENSSL_NO_FP_API | |
7081f3bd | 80 | int RSA_print_fp(FILE *fp, const RSA *x, int off) |
4d94ae00 BM |
81 | { |
82 | BIO *b; | |
83 | int ret; | |
d02b48c6 | 84 | |
4d94ae00 | 85 | if ((b=BIO_new(BIO_s_file())) == NULL) |
d02b48c6 RE |
86 | { |
87 | RSAerr(RSA_F_RSA_PRINT_FP,ERR_R_BUF_LIB); | |
4d94ae00 | 88 | return(0); |
d02b48c6 | 89 | } |
4d94ae00 BM |
90 | BIO_set_fp(b,fp,BIO_NOCLOSE); |
91 | ret=RSA_print(b,x,off); | |
92 | BIO_free(b); | |
93 | return(ret); | |
94 | } | |
d02b48c6 RE |
95 | #endif |
96 | ||
7081f3bd | 97 | int RSA_print(BIO *bp, const RSA *x, int off) |
d02b48c6 | 98 | { |
e778802f BL |
99 | char str[128]; |
100 | const char *s; | |
d02b48c6 RE |
101 | unsigned char *m=NULL; |
102 | int i,ret=0; | |
103 | ||
104 | i=RSA_size(x); | |
26a3a48d | 105 | m=(unsigned char *)OPENSSL_malloc((unsigned int)i+10); |
d02b48c6 RE |
106 | if (m == NULL) |
107 | { | |
108 | RSAerr(RSA_F_RSA_PRINT,ERR_R_MALLOC_FAILURE); | |
109 | goto err; | |
110 | } | |
111 | ||
112 | if (off) | |
113 | { | |
114 | if (off > 128) off=128; | |
115 | memset(str,' ',off); | |
116 | } | |
117 | if (x->d != NULL) | |
118 | { | |
119 | if (off && (BIO_write(bp,str,off) <= 0)) goto err; | |
120 | if (BIO_printf(bp,"Private-Key: (%d bit)\n",BN_num_bits(x->n)) | |
121 | <= 0) goto err; | |
122 | } | |
123 | ||
124 | if (x->d == NULL) | |
125 | sprintf(str,"Modulus (%d bit):",BN_num_bits(x->n)); | |
126 | else | |
127 | strcpy(str,"modulus:"); | |
128 | if (!print(bp,str,x->n,m,off)) goto err; | |
129 | s=(x->d == NULL)?"Exponent:":"publicExponent:"; | |
130 | if (!print(bp,s,x->e,m,off)) goto err; | |
131 | if (!print(bp,"privateExponent:",x->d,m,off)) goto err; | |
132 | if (!print(bp,"prime1:",x->p,m,off)) goto err; | |
133 | if (!print(bp,"prime2:",x->q,m,off)) goto err; | |
134 | if (!print(bp,"exponent1:",x->dmp1,m,off)) goto err; | |
135 | if (!print(bp,"exponent2:",x->dmq1,m,off)) goto err; | |
136 | if (!print(bp,"coefficient:",x->iqmp,m,off)) goto err; | |
137 | ret=1; | |
138 | err: | |
26a3a48d | 139 | if (m != NULL) OPENSSL_free(m); |
d02b48c6 RE |
140 | return(ret); |
141 | } | |
cf1b7d96 | 142 | #endif /* OPENSSL_NO_RSA */ |
d02b48c6 | 143 | |
cf1b7d96 RL |
144 | #ifndef OPENSSL_NO_DSA |
145 | #ifndef OPENSSL_NO_FP_API | |
a4aba800 | 146 | int DSA_print_fp(FILE *fp, const DSA *x, int off) |
d02b48c6 RE |
147 | { |
148 | BIO *b; | |
149 | int ret; | |
150 | ||
151 | if ((b=BIO_new(BIO_s_file())) == NULL) | |
152 | { | |
153 | DSAerr(DSA_F_DSA_PRINT_FP,ERR_R_BUF_LIB); | |
154 | return(0); | |
155 | } | |
156 | BIO_set_fp(b,fp,BIO_NOCLOSE); | |
157 | ret=DSA_print(b,x,off); | |
158 | BIO_free(b); | |
159 | return(ret); | |
160 | } | |
161 | #endif | |
162 | ||
a4aba800 | 163 | int DSA_print(BIO *bp, const DSA *x, int off) |
d02b48c6 RE |
164 | { |
165 | char str[128]; | |
166 | unsigned char *m=NULL; | |
167 | int i,ret=0; | |
168 | BIGNUM *bn=NULL; | |
169 | ||
170 | if (x->p != NULL) | |
171 | bn=x->p; | |
172 | else if (x->priv_key != NULL) | |
173 | bn=x->priv_key; | |
174 | else if (x->pub_key != NULL) | |
175 | bn=x->pub_key; | |
176 | ||
177 | /* larger than needed but what the hell :-) */ | |
178 | if (bn != NULL) | |
179 | i=BN_num_bytes(bn)*2; | |
180 | else | |
181 | i=256; | |
26a3a48d | 182 | m=(unsigned char *)OPENSSL_malloc((unsigned int)i+10); |
d02b48c6 RE |
183 | if (m == NULL) |
184 | { | |
185 | DSAerr(DSA_F_DSA_PRINT,ERR_R_MALLOC_FAILURE); | |
186 | goto err; | |
187 | } | |
188 | ||
189 | if (off) | |
190 | { | |
191 | if (off > 128) off=128; | |
192 | memset(str,' ',off); | |
193 | } | |
194 | if (x->priv_key != NULL) | |
195 | { | |
196 | if (off && (BIO_write(bp,str,off) <= 0)) goto err; | |
197 | if (BIO_printf(bp,"Private-Key: (%d bit)\n",BN_num_bits(x->p)) | |
198 | <= 0) goto err; | |
199 | } | |
200 | ||
201 | if ((x->priv_key != NULL) && !print(bp,"priv:",x->priv_key,m,off)) | |
202 | goto err; | |
203 | if ((x->pub_key != NULL) && !print(bp,"pub: ",x->pub_key,m,off)) | |
204 | goto err; | |
205 | if ((x->p != NULL) && !print(bp,"P: ",x->p,m,off)) goto err; | |
206 | if ((x->q != NULL) && !print(bp,"Q: ",x->q,m,off)) goto err; | |
207 | if ((x->g != NULL) && !print(bp,"G: ",x->g,m,off)) goto err; | |
208 | ret=1; | |
209 | err: | |
26a3a48d | 210 | if (m != NULL) OPENSSL_free(m); |
d02b48c6 RE |
211 | return(ret); |
212 | } | |
cf1b7d96 | 213 | #endif /* !OPENSSL_NO_DSA */ |
d02b48c6 | 214 | |
4d94ae00 BM |
215 | #ifndef OPENSSL_NO_ECDSA |
216 | #ifndef OPENSSL_NO_FP_API | |
217 | int ECDSA_print_fp(FILE *fp, const ECDSA *x, int off) | |
218 | { | |
219 | BIO *b; | |
220 | int ret; | |
221 | ||
222 | if ((b=BIO_new(BIO_s_file())) == NULL) | |
223 | { | |
224 | ECDSAerr(ECDSA_F_ECDSA_PRINT_FP, ERR_R_BIO_LIB); | |
225 | return(0); | |
226 | } | |
227 | BIO_set_fp(b, fp, BIO_NOCLOSE); | |
228 | ret = ECDSA_print(b, x, off); | |
229 | BIO_free(b); | |
230 | return(ret); | |
231 | } | |
232 | #endif | |
233 | ||
234 | int ECDSA_print(BIO *bp, const ECDSA *x, int off) | |
235 | { | |
236 | char str[128]; | |
237 | unsigned char *buffer=NULL; | |
238 | int i, buf_len=0, ret=0, reason=ERR_R_BIO_LIB; | |
239 | BIGNUM *tmp_1=NULL, *tmp_2=NULL, *tmp_3=NULL, | |
240 | *tmp_4=NULL, *tmp_5=NULL; | |
241 | BN_CTX *ctx=NULL; | |
242 | EC_POINT *point=NULL; | |
243 | ||
244 | /* TODO: fields other than prime fields */ | |
245 | ||
246 | if (!x || !x->group) | |
247 | { | |
248 | reason = ECDSA_R_MISSING_PARAMETERS; | |
249 | goto err; | |
250 | } | |
251 | if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL || | |
252 | (tmp_3 = BN_new()) == NULL || (ctx = BN_CTX_new()) == NULL) | |
253 | { | |
254 | reason = ERR_R_MALLOC_FAILURE; | |
255 | goto err; | |
256 | } | |
257 | if (!EC_GROUP_get_curve_GFp(x->group, tmp_1, tmp_2, tmp_3, ctx)) | |
258 | { | |
259 | reason = ERR_R_EC_LIB; | |
260 | goto err; | |
261 | } | |
262 | if ((point = EC_GROUP_get0_generator(x->group)) == NULL) | |
263 | { | |
264 | reason = ERR_R_EC_LIB; | |
265 | goto err; | |
266 | } | |
267 | if ((buf_len = EC_POINT_point2oct(x->group, point, POINT_CONVERSION_COMPRESSED, NULL, 0, ctx)) == 0) | |
268 | { | |
269 | reason = ECDSA_R_UNEXPECTED_PARAMETER_LENGTH; | |
270 | goto err; | |
271 | } | |
272 | if ((buffer = OPENSSL_malloc(buf_len)) == NULL) | |
273 | { | |
274 | reason = ERR_R_MALLOC_FAILURE; | |
275 | goto err; | |
276 | } | |
277 | if (!EC_POINT_point2oct(x->group, point, POINT_CONVERSION_COMPRESSED, | |
278 | buffer, buf_len, ctx)) goto err; | |
279 | if ((tmp_4 = BN_bin2bn(buffer, buf_len, NULL)) == NULL) | |
280 | { | |
281 | reason = ERR_R_BN_LIB; | |
282 | goto err; | |
283 | } | |
284 | if ((i = EC_POINT_point2oct(x->group, x->pub_key, POINT_CONVERSION_COMPRESSED, NULL, 0, ctx)) == 0) | |
285 | { | |
286 | reason = ECDSA_R_UNEXPECTED_PARAMETER_LENGTH; | |
287 | goto err; | |
288 | } | |
289 | if (i > buf_len && (buffer = OPENSSL_realloc(buffer, i)) == NULL) | |
290 | { | |
291 | reason = ERR_R_MALLOC_FAILURE; | |
292 | buf_len = i; | |
293 | goto err; | |
294 | } | |
295 | if (!EC_POINT_point2oct(x->group, x->pub_key, POINT_CONVERSION_COMPRESSED, | |
296 | buffer, buf_len, ctx)) | |
297 | { | |
298 | reason = ERR_R_EC_LIB; | |
299 | goto err; | |
300 | } | |
301 | if ((tmp_5 = BN_bin2bn(buffer, buf_len, NULL)) == NULL) | |
302 | { | |
303 | reason = ERR_R_BN_LIB; | |
304 | goto err; | |
305 | } | |
306 | if (tmp_1 != NULL) | |
307 | i = BN_num_bytes(tmp_1)*2; | |
308 | else | |
309 | i=256; | |
310 | if ((i + 10) > buf_len && (buffer = OPENSSL_realloc(buffer, i+10)) == NULL) | |
311 | { | |
312 | reason = ERR_R_MALLOC_FAILURE; | |
313 | buf_len = i; | |
314 | goto err; | |
315 | } | |
316 | if (off) | |
317 | { | |
318 | if (off > 128) off=128; | |
319 | memset(str,' ',off); | |
320 | } | |
321 | if (x->priv_key != NULL) | |
322 | { | |
323 | if (off && (BIO_write(bp, str, off) <= 0)) goto err; | |
324 | if (BIO_printf(bp, "Private-Key: (%d bit)\n", BN_num_bits(tmp_1)) <= 0) goto err; | |
325 | } | |
326 | ||
327 | if ((x->priv_key != NULL) && !print(bp, "priv:", x->priv_key, buffer, off)) goto err; | |
328 | if ((tmp_5 != NULL) && !print(bp, "pub: ", tmp_5, buffer, off)) goto err; | |
329 | if ((tmp_1 != NULL) && !print(bp, "P: ", tmp_1, buffer, off)) goto err; | |
330 | if ((tmp_2 != NULL) && !print(bp, "A: ", tmp_2, buffer, off)) goto err; | |
331 | if ((tmp_3 != NULL) && !print(bp, "B: ", tmp_3, buffer, off)) goto err; | |
332 | if ((tmp_4 != NULL) && !print(bp, "Gen: ", tmp_4, buffer, off)) goto err; | |
333 | ret=1; | |
334 | err: | |
335 | if (!ret) | |
336 | ECDSAerr(ECDSA_F_ECDSA_PRINT, reason); | |
337 | if (tmp_1) BN_free(tmp_1); | |
338 | if (tmp_2) BN_free(tmp_2); | |
339 | if (tmp_3) BN_free(tmp_3); | |
340 | if (tmp_4) BN_free(tmp_4); | |
341 | if (tmp_5) BN_free(tmp_5); | |
342 | if (ctx) BN_CTX_free(ctx); | |
343 | if (buffer != NULL) OPENSSL_free(buffer); | |
344 | return(ret); | |
345 | } | |
346 | #endif | |
347 | ||
6b691a5c UM |
348 | static int print(BIO *bp, const char *number, BIGNUM *num, unsigned char *buf, |
349 | int off) | |
d02b48c6 RE |
350 | { |
351 | int n,i; | |
e778802f BL |
352 | char str[128]; |
353 | const char *neg; | |
d02b48c6 RE |
354 | |
355 | if (num == NULL) return(1); | |
356 | neg=(num->neg)?"-":""; | |
357 | if (off) | |
358 | { | |
359 | if (off > 128) off=128; | |
360 | memset(str,' ',off); | |
361 | if (BIO_write(bp,str,off) <= 0) return(0); | |
362 | } | |
363 | ||
364 | if (BN_num_bytes(num) <= BN_BYTES) | |
365 | { | |
366 | if (BIO_printf(bp,"%s %s%lu (%s0x%lx)\n",number,neg, | |
367 | (unsigned long)num->d[0],neg,(unsigned long)num->d[0]) | |
368 | <= 0) return(0); | |
369 | } | |
370 | else | |
371 | { | |
372 | buf[0]=0; | |
373 | if (BIO_printf(bp,"%s%s",number, | |
374 | (neg[0] == '-')?" (Negative)":"") <= 0) | |
375 | return(0); | |
376 | n=BN_bn2bin(num,&buf[1]); | |
377 | ||
378 | if (buf[1] & 0x80) | |
379 | n++; | |
380 | else buf++; | |
381 | ||
382 | for (i=0; i<n; i++) | |
383 | { | |
384 | if ((i%15) == 0) | |
385 | { | |
386 | str[0]='\n'; | |
387 | memset(&(str[1]),' ',off+4); | |
388 | if (BIO_write(bp,str,off+1+4) <= 0) return(0); | |
389 | } | |
390 | if (BIO_printf(bp,"%02x%s",buf[i],((i+1) == n)?"":":") | |
391 | <= 0) return(0); | |
392 | } | |
393 | if (BIO_write(bp,"\n",1) <= 0) return(0); | |
394 | } | |
395 | return(1); | |
396 | } | |
397 | ||
cf1b7d96 RL |
398 | #ifndef OPENSSL_NO_DH |
399 | #ifndef OPENSSL_NO_FP_API | |
f971ccb2 | 400 | int DHparams_print_fp(FILE *fp, const DH *x) |
4d94ae00 BM |
401 | { |
402 | BIO *b; | |
403 | int ret; | |
d02b48c6 | 404 | |
4d94ae00 | 405 | if ((b=BIO_new(BIO_s_file())) == NULL) |
d02b48c6 RE |
406 | { |
407 | DHerr(DH_F_DHPARAMS_PRINT_FP,ERR_R_BUF_LIB); | |
4d94ae00 | 408 | return(0); |
d02b48c6 | 409 | } |
4d94ae00 BM |
410 | BIO_set_fp(b,fp,BIO_NOCLOSE); |
411 | ret=DHparams_print(b, x); | |
412 | BIO_free(b); | |
413 | return(ret); | |
414 | } | |
d02b48c6 RE |
415 | #endif |
416 | ||
f971ccb2 | 417 | int DHparams_print(BIO *bp, const DH *x) |
d02b48c6 RE |
418 | { |
419 | unsigned char *m=NULL; | |
420 | int reason=ERR_R_BUF_LIB,i,ret=0; | |
421 | ||
422 | i=BN_num_bytes(x->p); | |
26a3a48d | 423 | m=(unsigned char *)OPENSSL_malloc((unsigned int)i+10); |
d02b48c6 RE |
424 | if (m == NULL) |
425 | { | |
426 | reason=ERR_R_MALLOC_FAILURE; | |
427 | goto err; | |
428 | } | |
429 | ||
430 | if (BIO_printf(bp,"Diffie-Hellman-Parameters: (%d bit)\n", | |
431 | BN_num_bits(x->p)) <= 0) | |
432 | goto err; | |
433 | if (!print(bp,"prime:",x->p,m,4)) goto err; | |
434 | if (!print(bp,"generator:",x->g,m,4)) goto err; | |
435 | if (x->length != 0) | |
436 | { | |
657e60fa | 437 | if (BIO_printf(bp," recommended-private-length: %d bits\n", |
d02b48c6 RE |
438 | (int)x->length) <= 0) goto err; |
439 | } | |
440 | ret=1; | |
58964a49 RE |
441 | if (0) |
442 | { | |
d02b48c6 | 443 | err: |
58964a49 RE |
444 | DHerr(DH_F_DHPARAMS_PRINT,reason); |
445 | } | |
26a3a48d | 446 | if (m != NULL) OPENSSL_free(m); |
d02b48c6 RE |
447 | return(ret); |
448 | } | |
449 | #endif | |
450 | ||
cf1b7d96 RL |
451 | #ifndef OPENSSL_NO_DSA |
452 | #ifndef OPENSSL_NO_FP_API | |
a4aba800 | 453 | int DSAparams_print_fp(FILE *fp, const DSA *x) |
4d94ae00 BM |
454 | { |
455 | BIO *b; | |
456 | int ret; | |
d02b48c6 | 457 | |
4d94ae00 | 458 | if ((b=BIO_new(BIO_s_file())) == NULL) |
d02b48c6 RE |
459 | { |
460 | DSAerr(DSA_F_DSAPARAMS_PRINT_FP,ERR_R_BUF_LIB); | |
4d94ae00 | 461 | return(0); |
d02b48c6 | 462 | } |
4d94ae00 BM |
463 | BIO_set_fp(b,fp,BIO_NOCLOSE); |
464 | ret=DSAparams_print(b, x); | |
465 | BIO_free(b); | |
466 | return(ret); | |
467 | } | |
d02b48c6 RE |
468 | #endif |
469 | ||
a4aba800 | 470 | int DSAparams_print(BIO *bp, const DSA *x) |
d02b48c6 RE |
471 | { |
472 | unsigned char *m=NULL; | |
473 | int reason=ERR_R_BUF_LIB,i,ret=0; | |
474 | ||
475 | i=BN_num_bytes(x->p); | |
26a3a48d | 476 | m=(unsigned char *)OPENSSL_malloc((unsigned int)i+10); |
d02b48c6 RE |
477 | if (m == NULL) |
478 | { | |
479 | reason=ERR_R_MALLOC_FAILURE; | |
480 | goto err; | |
481 | } | |
482 | ||
483 | if (BIO_printf(bp,"DSA-Parameters: (%d bit)\n", | |
484 | BN_num_bits(x->p)) <= 0) | |
485 | goto err; | |
486 | if (!print(bp,"p:",x->p,m,4)) goto err; | |
487 | if (!print(bp,"q:",x->q,m,4)) goto err; | |
488 | if (!print(bp,"g:",x->g,m,4)) goto err; | |
489 | ret=1; | |
490 | err: | |
26a3a48d | 491 | if (m != NULL) OPENSSL_free(m); |
d02b48c6 RE |
492 | DSAerr(DSA_F_DSAPARAMS_PRINT,reason); |
493 | return(ret); | |
494 | } | |
495 | ||
cf1b7d96 | 496 | #endif /* !OPENSSL_NO_DSA */ |
d02b48c6 | 497 | |
4d94ae00 BM |
498 | #ifndef OPENSSL_NO_ECDSA |
499 | #ifndef OPENSSL_NO_FP_API | |
500 | int ECDSAParameters_print_fp(FILE *fp, const ECDSA *x) | |
501 | { | |
502 | BIO *b; | |
503 | int ret; | |
504 | ||
505 | if ((b=BIO_new(BIO_s_file())) == NULL) | |
506 | { | |
507 | ECDSAerr(ECDSA_F_ECDSAPARAMETERS_PRINT_FP, ERR_R_BIO_LIB); | |
508 | return(0); | |
509 | } | |
510 | BIO_set_fp(b, fp, BIO_NOCLOSE); | |
511 | ret = ECDSAParameters_print(b, x); | |
512 | BIO_free(b); | |
513 | return(ret); | |
514 | } | |
515 | #endif | |
516 | ||
517 | int ECDSAParameters_print(BIO *bp, const ECDSA *x) | |
518 | { | |
519 | unsigned char *buffer=NULL; | |
520 | int buf_len; | |
521 | int reason=ERR_R_EC_LIB, i, ret=0; | |
522 | BIGNUM *tmp_1=NULL, *tmp_2=NULL, *tmp_3=NULL, *tmp_4=NULL; | |
523 | BN_CTX *ctx=NULL; | |
524 | EC_POINT *point=NULL; | |
525 | ||
526 | /* TODO: fields other than prime fields */ | |
527 | if (!x || !x->group) | |
528 | { | |
529 | reason = ECDSA_R_MISSING_PARAMETERS; | |
530 | goto err; | |
531 | } | |
532 | if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL || | |
533 | (tmp_3 = BN_new()) == NULL || (ctx = BN_CTX_new()) == NULL) | |
534 | { | |
535 | reason = ERR_R_MALLOC_FAILURE; | |
536 | goto err; | |
537 | } | |
538 | if (!EC_GROUP_get_curve_GFp(x->group, tmp_1, tmp_2, tmp_3, ctx)) goto err; | |
539 | if ((point = EC_GROUP_get0_generator(x->group)) == NULL) goto err; | |
540 | buf_len = EC_POINT_point2oct(x->group, point, POINT_CONVERSION_COMPRESSED, NULL, 0, ctx); | |
541 | if (!buf_len || (buffer = OPENSSL_malloc(buf_len)) == NULL) | |
542 | { | |
543 | reason = ERR_R_MALLOC_FAILURE; | |
544 | goto err; | |
545 | } | |
546 | if (!EC_POINT_point2oct(x->group, point, POINT_CONVERSION_COMPRESSED, buffer, buf_len, ctx)) | |
547 | { | |
548 | reason = ERR_R_EC_LIB; | |
549 | goto err; | |
550 | } | |
551 | if ((tmp_4 = BN_bin2bn(buffer, buf_len, NULL)) == NULL) | |
552 | { | |
553 | reason = ERR_R_BN_LIB; | |
554 | goto err; | |
555 | } | |
556 | ||
557 | i = BN_num_bits(tmp_1) + 10; | |
558 | if (i > buf_len && (buffer = OPENSSL_realloc(buffer, i)) == NULL) | |
559 | { | |
560 | reason=ERR_R_MALLOC_FAILURE; | |
561 | goto err; | |
562 | } | |
563 | ||
564 | if (BIO_printf(bp, "ECDSA-Parameters: (%d bit)\n", BN_num_bits(tmp_1)) <= 0) goto err; | |
565 | if (!print(bp, "Prime p:", tmp_1, buffer, 4)) goto err; | |
566 | if (!print(bp, "Curve a:", tmp_2, buffer, 4)) goto err; | |
567 | if (!print(bp, "Curve b:", tmp_3, buffer, 4)) goto err; | |
568 | if (!print(bp, "Generator ( compressed ) :", tmp_4, buffer, 4)) goto err; | |
569 | ret=1; | |
570 | err: | |
571 | if (tmp_1) BN_free(tmp_1); | |
572 | if (tmp_2) BN_free(tmp_2); | |
573 | if (tmp_3) BN_free(tmp_3); | |
574 | if (tmp_4) BN_free(tmp_4); | |
575 | if (ctx) BN_CTX_free(ctx); | |
576 | if (buffer) OPENSSL_free(buffer); | |
577 | ECDSAerr(ECDSA_F_ECDSAPARAMETERS_PRINT, reason); | |
578 | return(ret); | |
579 | } | |
580 | ||
581 | #endif |