]>
Commit | Line | Data |
---|---|---|
5270e702 RL |
1 | /* crypto/engine/engine_list.c */ |
2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | |
3 | * project 2000. | |
4 | */ | |
5 | /* ==================================================================== | |
6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * | |
12 | * 1. Redistributions of source code must retain the above copyright | |
13 | * notice, this list of conditions and the following disclaimer. | |
14 | * | |
15 | * 2. Redistributions in binary form must reproduce the above copyright | |
16 | * notice, this list of conditions and the following disclaimer in | |
17 | * the documentation and/or other materials provided with the | |
18 | * distribution. | |
19 | * | |
20 | * 3. All advertising materials mentioning features or use of this | |
21 | * software must display the following acknowledgment: | |
22 | * "This product includes software developed by the OpenSSL Project | |
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | |
24 | * | |
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
26 | * endorse or promote products derived from this software without | |
27 | * prior written permission. For written permission, please contact | |
28 | * licensing@OpenSSL.org. | |
29 | * | |
30 | * 5. Products derived from this software may not be called "OpenSSL" | |
31 | * nor may "OpenSSL" appear in their names without prior written | |
32 | * permission of the OpenSSL Project. | |
33 | * | |
34 | * 6. Redistributions of any form whatsoever must retain the following | |
35 | * acknowledgment: | |
36 | * "This product includes software developed by the OpenSSL Project | |
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | |
38 | * | |
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
51 | * ==================================================================== | |
52 | * | |
53 | * This product includes cryptographic software written by Eric Young | |
54 | * (eay@cryptsoft.com). This product includes software written by Tim | |
55 | * Hudson (tjh@cryptsoft.com). | |
56 | * | |
57 | */ | |
58 | ||
59 | #include <openssl/crypto.h> | |
60 | #include "cryptlib.h" | |
61 | #include "engine_int.h" | |
62 | #include <openssl/engine.h> | |
63 | ||
64 | /* The linked-list of pointers to engine types. engine_list_head | |
65 | * incorporates an implicit structural reference but engine_list_tail | |
66 | * does not - the latter is a computational niceity and only points | |
67 | * to something that is already pointed to by its predecessor in the | |
68 | * list (or engine_list_head itself). In the same way, the use of the | |
69 | * "prev" pointer in each ENGINE is to save excessive list iteration, | |
70 | * it doesn't correspond to an extra structural reference. Hence, | |
71 | * engine_list_head, and each non-null "next" pointer account for | |
72 | * the list itself assuming exactly 1 structural reference on each | |
73 | * list member. */ | |
74 | static ENGINE *engine_list_head = NULL; | |
75 | static ENGINE *engine_list_tail = NULL; | |
76 | /* A boolean switch, used to ensure we only initialise once. This | |
77 | * is needed because the engine list may genuinely become empty during | |
78 | * use (so we can't use engine_list_head as an indicator for example. */ | |
79 | static int engine_list_flag = 0; | |
80 | ||
81 | /* These static functions starting with a lower case "engine_" always | |
82 | * take place when CRYPTO_LOCK_ENGINE has been locked up. */ | |
83 | static int engine_list_add(ENGINE *e) | |
84 | { | |
85 | int conflict = 0; | |
86 | ENGINE *iterator = NULL; | |
87 | ||
88 | if(e == NULL) | |
89 | { | |
90 | ENGINEerr(ENGINE_F_ENGINE_LIST_ADD, | |
91 | ERR_R_PASSED_NULL_PARAMETER); | |
92 | return 0; | |
93 | } | |
94 | iterator = engine_list_head; | |
95 | while(iterator && !conflict) | |
96 | { | |
97 | conflict = (strcmp(iterator->id, e->id) == 0); | |
98 | iterator = iterator->next; | |
99 | } | |
100 | if(conflict) | |
101 | { | |
102 | ENGINEerr(ENGINE_F_ENGINE_LIST_ADD, | |
103 | ENGINE_R_CONFLICTING_ENGINE_ID); | |
104 | return 0; | |
105 | } | |
106 | if(engine_list_head == NULL) | |
107 | { | |
108 | /* We are adding to an empty list. */ | |
109 | if(engine_list_tail) | |
110 | { | |
111 | ENGINEerr(ENGINE_F_ENGINE_LIST_ADD, | |
112 | ENGINE_R_INTERNAL_LIST_ERROR); | |
113 | return 0; | |
114 | } | |
115 | engine_list_head = e; | |
116 | e->prev = NULL; | |
117 | } | |
118 | else | |
119 | { | |
120 | /* We are adding to the tail of an existing list. */ | |
121 | if((engine_list_tail == NULL) || | |
122 | (engine_list_tail->next != NULL)) | |
123 | { | |
124 | ENGINEerr(ENGINE_F_ENGINE_LIST_ADD, | |
125 | ENGINE_R_INTERNAL_LIST_ERROR); | |
126 | return 0; | |
127 | } | |
128 | engine_list_tail->next = e; | |
129 | e->prev = engine_list_tail; | |
130 | } | |
131 | /* Having the engine in the list assumes a structural | |
132 | * reference. */ | |
133 | e->struct_ref++; | |
134 | /* However it came to be, e is the last item in the list. */ | |
135 | engine_list_tail = e; | |
136 | e->next = NULL; | |
137 | return 1; | |
138 | } | |
139 | ||
140 | static int engine_list_remove(ENGINE *e) | |
141 | { | |
142 | ENGINE *iterator; | |
143 | ||
144 | if(e == NULL) | |
145 | { | |
146 | ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE, | |
147 | ERR_R_PASSED_NULL_PARAMETER); | |
148 | return 0; | |
149 | } | |
150 | /* We need to check that e is in our linked list! */ | |
151 | iterator = engine_list_head; | |
152 | while(iterator && (iterator != e)) | |
153 | iterator = iterator->next; | |
154 | if(iterator == NULL) | |
155 | { | |
156 | ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE, | |
157 | ENGINE_R_ENGINE_IS_NOT_IN_LIST); | |
158 | return 0; | |
159 | } | |
160 | /* un-link e from the chain. */ | |
161 | if(e->next) | |
162 | e->next->prev = e->prev; | |
163 | if(e->prev) | |
164 | e->prev->next = e->next; | |
165 | /* Correct our head/tail if necessary. */ | |
166 | if(engine_list_head == e) | |
167 | engine_list_head = e->next; | |
168 | if(engine_list_tail == e) | |
169 | engine_list_tail = e->prev; | |
170 | /* remove our structural reference. */ | |
171 | e->struct_ref--; | |
172 | return 1; | |
173 | } | |
174 | ||
175 | /* This check always takes place with CRYPTO_LOCK_ENGINE locked up | |
176 | * so we're synchronised, but we can't call anything that tries to | |
177 | * lock it again! :-) NB: For convenience (and code-clarity) we | |
178 | * don't output errors for failures of the engine_list_add function | |
179 | * as it will generate errors itself. */ | |
180 | static int engine_internal_check(void) | |
181 | { | |
182 | if(engine_list_flag) | |
183 | return 1; | |
184 | /* This is our first time up, we need to populate the list | |
185 | * with our statically compiled-in engines. */ | |
186 | if(!engine_list_add(ENGINE_openssl())) | |
187 | return 0; | |
5270e702 RL |
188 | engine_list_flag = 1; |
189 | return 1; | |
190 | } | |
191 | ||
192 | /* Get the first/last "ENGINE" type available. */ | |
193 | ENGINE *ENGINE_get_first(void) | |
194 | { | |
195 | ENGINE *ret = NULL; | |
196 | ||
197 | CRYPTO_r_lock(CRYPTO_LOCK_ENGINE); | |
198 | if(engine_internal_check()) | |
199 | { | |
200 | ret = engine_list_head; | |
201 | if(ret) | |
202 | ret->struct_ref++; | |
203 | } | |
204 | CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE); | |
205 | return ret; | |
206 | } | |
207 | ENGINE *ENGINE_get_last(void) | |
208 | { | |
209 | ENGINE *ret = NULL; | |
210 | ||
211 | CRYPTO_r_lock(CRYPTO_LOCK_ENGINE); | |
212 | if(engine_internal_check()) | |
213 | { | |
214 | ret = engine_list_tail; | |
215 | if(ret) | |
216 | ret->struct_ref++; | |
217 | } | |
218 | CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE); | |
219 | return ret; | |
220 | } | |
221 | ||
222 | /* Iterate to the next/previous "ENGINE" type (NULL = end of the list). */ | |
223 | ENGINE *ENGINE_get_next(ENGINE *e) | |
224 | { | |
225 | ENGINE *ret = NULL; | |
226 | if(e == NULL) | |
227 | { | |
228 | ENGINEerr(ENGINE_F_ENGINE_GET_NEXT, | |
229 | ERR_R_PASSED_NULL_PARAMETER); | |
230 | return 0; | |
231 | } | |
232 | CRYPTO_r_lock(CRYPTO_LOCK_ENGINE); | |
233 | ret = e->next; | |
5270e702 | 234 | if(ret) |
ea3a429e | 235 | /* Return a valid structural refernce to the next ENGINE */ |
5270e702 RL |
236 | ret->struct_ref++; |
237 | CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE); | |
ea3a429e GT |
238 | /* Release the structural reference to the previous ENGINE */ |
239 | ENGINE_free(e); | |
5270e702 RL |
240 | return ret; |
241 | } | |
242 | ENGINE *ENGINE_get_prev(ENGINE *e) | |
243 | { | |
244 | ENGINE *ret = NULL; | |
245 | if(e == NULL) | |
246 | { | |
247 | ENGINEerr(ENGINE_F_ENGINE_GET_PREV, | |
248 | ERR_R_PASSED_NULL_PARAMETER); | |
249 | return 0; | |
250 | } | |
251 | CRYPTO_r_lock(CRYPTO_LOCK_ENGINE); | |
252 | ret = e->prev; | |
5270e702 | 253 | if(ret) |
ea3a429e | 254 | /* Return a valid structural reference to the next ENGINE */ |
5270e702 RL |
255 | ret->struct_ref++; |
256 | CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE); | |
ea3a429e GT |
257 | /* Release the structural reference to the previous ENGINE */ |
258 | ENGINE_free(e); | |
5270e702 RL |
259 | return ret; |
260 | } | |
261 | ||
262 | /* Add another "ENGINE" type into the list. */ | |
263 | int ENGINE_add(ENGINE *e) | |
264 | { | |
265 | int to_return = 1; | |
266 | if(e == NULL) | |
267 | { | |
268 | ENGINEerr(ENGINE_F_ENGINE_ADD, | |
269 | ERR_R_PASSED_NULL_PARAMETER); | |
270 | return 0; | |
271 | } | |
272 | if((e->id == NULL) || (e->name == NULL)) | |
273 | { | |
274 | ENGINEerr(ENGINE_F_ENGINE_ADD, | |
275 | ENGINE_R_ID_OR_NAME_MISSING); | |
276 | } | |
277 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | |
278 | if(!engine_internal_check() || !engine_list_add(e)) | |
279 | { | |
280 | ENGINEerr(ENGINE_F_ENGINE_ADD, | |
281 | ENGINE_R_INTERNAL_LIST_ERROR); | |
282 | to_return = 0; | |
283 | } | |
284 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | |
285 | return to_return; | |
286 | } | |
287 | ||
288 | /* Remove an existing "ENGINE" type from the array. */ | |
289 | int ENGINE_remove(ENGINE *e) | |
290 | { | |
291 | int to_return = 1; | |
292 | if(e == NULL) | |
293 | { | |
294 | ENGINEerr(ENGINE_F_ENGINE_REMOVE, | |
295 | ERR_R_PASSED_NULL_PARAMETER); | |
296 | return 0; | |
297 | } | |
298 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | |
299 | if(!engine_internal_check() || !engine_list_remove(e)) | |
300 | { | |
301 | ENGINEerr(ENGINE_F_ENGINE_REMOVE, | |
302 | ENGINE_R_INTERNAL_LIST_ERROR); | |
303 | to_return = 0; | |
304 | } | |
305 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | |
306 | return to_return; | |
307 | } | |
308 | ||
309 | ENGINE *ENGINE_by_id(const char *id) | |
310 | { | |
311 | ENGINE *iterator = NULL; | |
312 | if(id == NULL) | |
313 | { | |
314 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, | |
315 | ERR_R_PASSED_NULL_PARAMETER); | |
316 | return NULL; | |
317 | } | |
318 | CRYPTO_r_lock(CRYPTO_LOCK_ENGINE); | |
319 | if(!engine_internal_check()) | |
320 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, | |
321 | ENGINE_R_INTERNAL_LIST_ERROR); | |
322 | else | |
323 | { | |
324 | iterator = engine_list_head; | |
325 | while(iterator && (strcmp(id, iterator->id) != 0)) | |
326 | iterator = iterator->next; | |
327 | if(iterator) | |
328 | /* We need to return a structural reference */ | |
329 | iterator->struct_ref++; | |
330 | } | |
331 | CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE); | |
332 | if(iterator == NULL) | |
333 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, | |
334 | ENGINE_R_NO_SUCH_ENGINE); | |
335 | return iterator; | |
336 | } | |
337 | ||
5270e702 RL |
338 | ENGINE *ENGINE_new(void) |
339 | { | |
340 | ENGINE *ret; | |
341 | ||
342 | ret = (ENGINE *)OPENSSL_malloc(sizeof(ENGINE)); | |
343 | if(ret == NULL) | |
344 | { | |
345 | ENGINEerr(ENGINE_F_ENGINE_NEW, ERR_R_MALLOC_FAILURE); | |
346 | return NULL; | |
347 | } | |
348 | memset(ret, 0, sizeof(ENGINE)); | |
5270e702 RL |
349 | ret->struct_ref = 1; |
350 | return ret; | |
351 | } | |
5270e702 RL |
352 | |
353 | int ENGINE_free(ENGINE *e) | |
354 | { | |
355 | int i; | |
356 | ||
357 | if(e == NULL) | |
358 | { | |
359 | ENGINEerr(ENGINE_F_ENGINE_FREE, | |
360 | ERR_R_PASSED_NULL_PARAMETER); | |
361 | return 0; | |
362 | } | |
363 | i = CRYPTO_add(&e->struct_ref,-1,CRYPTO_LOCK_ENGINE); | |
364 | #ifdef REF_PRINT | |
365 | REF_PRINT("ENGINE",e); | |
366 | #endif | |
367 | if (i > 0) return 1; | |
368 | #ifdef REF_CHECK | |
369 | if (i < 0) | |
370 | { | |
371 | fprintf(stderr,"ENGINE_free, bad reference count\n"); | |
372 | abort(); | |
373 | } | |
374 | #endif | |
dcd87618 | 375 | OPENSSL_free(e); |
5270e702 RL |
376 | return 1; |
377 | } | |
378 | ||
379 | int ENGINE_set_id(ENGINE *e, const char *id) | |
380 | { | |
d54bf145 | 381 | if(id == NULL) |
5270e702 RL |
382 | { |
383 | ENGINEerr(ENGINE_F_ENGINE_SET_ID, | |
384 | ERR_R_PASSED_NULL_PARAMETER); | |
385 | return 0; | |
386 | } | |
387 | e->id = id; | |
388 | return 1; | |
389 | } | |
390 | ||
391 | int ENGINE_set_name(ENGINE *e, const char *name) | |
392 | { | |
d54bf145 | 393 | if(name == NULL) |
5270e702 RL |
394 | { |
395 | ENGINEerr(ENGINE_F_ENGINE_SET_NAME, | |
396 | ERR_R_PASSED_NULL_PARAMETER); | |
397 | return 0; | |
398 | } | |
399 | e->name = name; | |
400 | return 1; | |
401 | } | |
402 | ||
10e473e9 | 403 | int ENGINE_set_RSA(ENGINE *e, const RSA_METHOD *rsa_meth) |
5270e702 | 404 | { |
5270e702 RL |
405 | e->rsa_meth = rsa_meth; |
406 | return 1; | |
407 | } | |
408 | ||
a4aba800 | 409 | int ENGINE_set_DSA(ENGINE *e, const DSA_METHOD *dsa_meth) |
5270e702 | 410 | { |
5270e702 RL |
411 | e->dsa_meth = dsa_meth; |
412 | return 1; | |
413 | } | |
414 | ||
f971ccb2 | 415 | int ENGINE_set_DH(ENGINE *e, const DH_METHOD *dh_meth) |
5270e702 | 416 | { |
5270e702 RL |
417 | e->dh_meth = dh_meth; |
418 | return 1; | |
419 | } | |
420 | ||
d54bf145 | 421 | int ENGINE_set_RAND(ENGINE *e, const RAND_METHOD *rand_meth) |
5270e702 | 422 | { |
5270e702 RL |
423 | e->rand_meth = rand_meth; |
424 | return 1; | |
425 | } | |
426 | ||
427 | int ENGINE_set_BN_mod_exp(ENGINE *e, BN_MOD_EXP bn_mod_exp) | |
428 | { | |
5270e702 RL |
429 | e->bn_mod_exp = bn_mod_exp; |
430 | return 1; | |
431 | } | |
432 | ||
433 | int ENGINE_set_BN_mod_exp_crt(ENGINE *e, BN_MOD_EXP_CRT bn_mod_exp_crt) | |
434 | { | |
5270e702 RL |
435 | e->bn_mod_exp_crt = bn_mod_exp_crt; |
436 | return 1; | |
437 | } | |
438 | ||
439 | int ENGINE_set_init_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR init_f) | |
440 | { | |
5270e702 RL |
441 | e->init = init_f; |
442 | return 1; | |
443 | } | |
444 | ||
445 | int ENGINE_set_finish_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR finish_f) | |
446 | { | |
5270e702 RL |
447 | e->finish = finish_f; |
448 | return 1; | |
449 | } | |
450 | ||
451 | int ENGINE_set_ctrl_function(ENGINE *e, ENGINE_CTRL_FUNC_PTR ctrl_f) | |
452 | { | |
5270e702 RL |
453 | e->ctrl = ctrl_f; |
454 | return 1; | |
455 | } | |
456 | ||
d54bf145 GT |
457 | int ENGINE_set_load_privkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpriv_f) |
458 | { | |
459 | e->load_privkey = loadpriv_f; | |
460 | return 1; | |
461 | } | |
462 | ||
463 | int ENGINE_set_load_pubkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpub_f) | |
464 | { | |
465 | e->load_pubkey = loadpub_f; | |
466 | return 1; | |
467 | } | |
468 | ||
469 | int ENGINE_set_flags(ENGINE *e, int flags) | |
470 | { | |
471 | e->flags = flags; | |
472 | return 1; | |
473 | } | |
474 | ||
475 | int ENGINE_cpy(ENGINE *dest, const ENGINE *src) | |
476 | { | |
477 | if(ENGINE_set_id(dest, ENGINE_get_id(src)) && | |
478 | ENGINE_set_name(dest, ENGINE_get_name(src)) && | |
479 | ENGINE_set_RSA(dest, ENGINE_get_RSA(src)) && | |
480 | ENGINE_set_DSA(dest, ENGINE_get_DSA(src)) && | |
481 | ENGINE_set_DH(dest, ENGINE_get_DH(src)) && | |
482 | ENGINE_set_RAND(dest, ENGINE_get_RAND(src)) && | |
483 | ENGINE_set_BN_mod_exp(dest, | |
484 | ENGINE_get_BN_mod_exp(src)) && | |
485 | ENGINE_set_BN_mod_exp_crt(dest, | |
486 | ENGINE_get_BN_mod_exp_crt(src)) && | |
487 | ENGINE_set_init_function(dest, | |
488 | ENGINE_get_init_function(src)) && | |
489 | ENGINE_set_finish_function(dest, | |
490 | ENGINE_get_finish_function(src)) && | |
491 | ENGINE_set_ctrl_function(dest, | |
492 | ENGINE_get_ctrl_function(src)) && | |
493 | ENGINE_set_load_privkey_function(dest, | |
494 | ENGINE_get_load_privkey_function(src)) && | |
495 | ENGINE_set_load_pubkey_function(dest, | |
496 | ENGINE_get_load_pubkey_function(src)) && | |
497 | ENGINE_set_flags(dest, ENGINE_get_flags(src))) | |
498 | return 1; | |
499 | return 0; | |
500 | } | |
501 | ||
502 | const char *ENGINE_get_id(const ENGINE *e) | |
5270e702 | 503 | { |
5270e702 RL |
504 | return e->id; |
505 | } | |
506 | ||
d54bf145 | 507 | const char *ENGINE_get_name(const ENGINE *e) |
5270e702 | 508 | { |
5270e702 RL |
509 | return e->name; |
510 | } | |
511 | ||
d54bf145 | 512 | const RSA_METHOD *ENGINE_get_RSA(const ENGINE *e) |
5270e702 | 513 | { |
5270e702 RL |
514 | return e->rsa_meth; |
515 | } | |
516 | ||
d54bf145 | 517 | const DSA_METHOD *ENGINE_get_DSA(const ENGINE *e) |
5270e702 | 518 | { |
5270e702 RL |
519 | return e->dsa_meth; |
520 | } | |
521 | ||
d54bf145 | 522 | const DH_METHOD *ENGINE_get_DH(const ENGINE *e) |
5270e702 | 523 | { |
5270e702 RL |
524 | return e->dh_meth; |
525 | } | |
526 | ||
d54bf145 | 527 | const RAND_METHOD *ENGINE_get_RAND(const ENGINE *e) |
5270e702 | 528 | { |
5270e702 RL |
529 | return e->rand_meth; |
530 | } | |
531 | ||
d54bf145 | 532 | BN_MOD_EXP ENGINE_get_BN_mod_exp(const ENGINE *e) |
5270e702 | 533 | { |
5270e702 RL |
534 | return e->bn_mod_exp; |
535 | } | |
536 | ||
d54bf145 | 537 | BN_MOD_EXP_CRT ENGINE_get_BN_mod_exp_crt(const ENGINE *e) |
5270e702 | 538 | { |
5270e702 RL |
539 | return e->bn_mod_exp_crt; |
540 | } | |
541 | ||
d54bf145 | 542 | ENGINE_GEN_INT_FUNC_PTR ENGINE_get_init_function(const ENGINE *e) |
5270e702 | 543 | { |
5270e702 RL |
544 | return e->init; |
545 | } | |
546 | ||
d54bf145 | 547 | ENGINE_GEN_INT_FUNC_PTR ENGINE_get_finish_function(const ENGINE *e) |
5270e702 | 548 | { |
5270e702 RL |
549 | return e->finish; |
550 | } | |
551 | ||
d54bf145 | 552 | ENGINE_CTRL_FUNC_PTR ENGINE_get_ctrl_function(const ENGINE *e) |
5270e702 | 553 | { |
5270e702 RL |
554 | return e->ctrl; |
555 | } | |
556 | ||
d54bf145 GT |
557 | ENGINE_LOAD_KEY_PTR ENGINE_get_load_privkey_function(const ENGINE *e) |
558 | { | |
559 | return e->load_privkey; | |
560 | } | |
561 | ||
562 | ENGINE_LOAD_KEY_PTR ENGINE_get_load_pubkey_function(const ENGINE *e) | |
563 | { | |
564 | return e->load_pubkey; | |
565 | } | |
566 | ||
567 | int ENGINE_get_flags(const ENGINE *e) | |
568 | { | |
569 | return e->flags; | |
570 | } |