1 /* crypto/asn1/x_pubkey.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
61 #include <openssl/asn1t.h>
62 #include <openssl/x509.h>
64 /* Minor tweak to operation: free up EVP_PKEY */
65 static int pubkey_cb(int operation
, ASN1_VALUE
**pval
, const ASN1_ITEM
*it
)
67 if (operation
== ASN1_OP_FREE_POST
)
69 X509_PUBKEY
*pubkey
= (X509_PUBKEY
*)*pval
;
70 EVP_PKEY_free(pubkey
->pkey
);
75 ASN1_SEQUENCE_cb(X509_PUBKEY
, pubkey_cb
) = {
76 ASN1_SIMPLE(X509_PUBKEY
, algor
, X509_ALGOR
),
77 ASN1_SIMPLE(X509_PUBKEY
, public_key
, ASN1_BIT_STRING
)
78 } ASN1_SEQUENCE_END_cb(X509_PUBKEY
, X509_PUBKEY
)
80 IMPLEMENT_ASN1_FUNCTIONS(X509_PUBKEY
)
82 int X509_PUBKEY_set(X509_PUBKEY
**x
, EVP_PKEY
*pkey
)
88 unsigned char *s
,*p
= NULL
;
91 if (x
== NULL
) return(0);
93 if ((pk
=X509_PUBKEY_new()) == NULL
) goto err
;
96 /* set the algorithm id */
97 if ((o
=OBJ_nid2obj(pkey
->type
)) == NULL
) goto err
;
98 ASN1_OBJECT_free(a
->algorithm
);
101 /* Set the parameter list */
102 if (!pkey
->save_parameters
|| (pkey
->type
== EVP_PKEY_RSA
))
104 if ((a
->parameter
== NULL
) ||
105 (a
->parameter
->type
!= V_ASN1_NULL
))
107 ASN1_TYPE_free(a
->parameter
);
108 a
->parameter
=ASN1_TYPE_new();
109 a
->parameter
->type
=V_ASN1_NULL
;
112 #ifndef OPENSSL_NO_DSA
113 else if (pkey
->type
== EVP_PKEY_DSA
)
120 ASN1_TYPE_free(a
->parameter
);
121 i
=i2d_DSAparams(dsa
,NULL
);
122 if ((p
=(unsigned char *)OPENSSL_malloc(i
)) == NULL
) goto err
;
124 i2d_DSAparams(dsa
,&pp
);
125 a
->parameter
=ASN1_TYPE_new();
126 a
->parameter
->type
=V_ASN1_SEQUENCE
;
127 a
->parameter
->value
.sequence
=ASN1_STRING_new();
128 ASN1_STRING_set(a
->parameter
->value
.sequence
,p
,i
);
132 #ifndef OPENSSL_NO_EC
133 else if (pkey
->type
== EVP_PKEY_EC
)
139 eckey
= pkey
->pkey
.eckey
;
140 ASN1_TYPE_free(a
->parameter
);
142 if ((a
->parameter
= ASN1_TYPE_new()) == NULL
)
144 X509err(X509_F_X509_PUBKEY_SET
, ERR_R_ASN1_LIB
);
148 if (EC_GROUP_get_asn1_flag(eckey
->group
)
149 && (nid
= EC_GROUP_get_nid(eckey
->group
)))
151 /* just set the OID */
152 a
->parameter
->type
= V_ASN1_OBJECT
;
153 a
->parameter
->value
.object
= OBJ_nid2obj(nid
);
155 else /* explicit parameters */
157 if ((i
= i2d_ECParameters(eckey
, NULL
)) == 0)
159 X509err(X509_F_X509_PUBKEY_SET
, ERR_R_EC_LIB
);
162 if ((p
= (unsigned char *) OPENSSL_malloc(i
)) == NULL
)
164 X509err(X509_F_X509_PUBKEY_SET
, ERR_R_MALLOC_FAILURE
);
168 if (!i2d_ECParameters(eckey
, &pp
))
170 X509err(X509_F_X509_PUBKEY_SET
, ERR_R_EC_LIB
);
174 a
->parameter
->type
= V_ASN1_SEQUENCE
;
175 if ((a
->parameter
->value
.sequence
= ASN1_STRING_new()) == NULL
)
177 X509err(X509_F_X509_PUBKEY_SET
, ERR_R_ASN1_LIB
);
181 ASN1_STRING_set(a
->parameter
->value
.sequence
, p
, i
);
188 X509err(X509_F_X509_PUBKEY_SET
,X509_R_UNSUPPORTED_ALGORITHM
);
192 if ((i
=i2d_PublicKey(pkey
,NULL
)) <= 0) goto err
;
193 if ((s
=(unsigned char *)OPENSSL_malloc(i
+1)) == NULL
)
195 X509err(X509_F_X509_PUBKEY_SET
,ERR_R_MALLOC_FAILURE
);
199 i2d_PublicKey(pkey
,&p
);
200 if (!M_ASN1_BIT_STRING_set(pk
->public_key
,s
,i
)) goto err
;
201 /* Set number of unused bits to zero */
202 pk
->public_key
->flags
&= ~(ASN1_STRING_FLAG_BITS_LEFT
|0x07);
203 pk
->public_key
->flags
|=ASN1_STRING_FLAG_BITS_LEFT
;
208 CRYPTO_add(&pkey
->references
,1,CRYPTO_LOCK_EVP_PKEY
);
213 X509_PUBKEY_free(*x
);
220 if (pk
!= NULL
) X509_PUBKEY_free(pk
);
224 EVP_PKEY
*X509_PUBKEY_get(X509_PUBKEY
*key
)
230 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA)
231 const unsigned char *cp
;
235 if (key
== NULL
) goto err
;
237 if (key
->pkey
!= NULL
)
239 CRYPTO_add(&key
->pkey
->references
, 1, CRYPTO_LOCK_EVP_PKEY
);
243 if (key
->public_key
== NULL
) goto err
;
245 type
=OBJ_obj2nid(key
->algor
->algorithm
);
246 if ((ret
= EVP_PKEY_new()) == NULL
)
248 X509err(X509_F_X509_PUBKEY_GET
, ERR_R_MALLOC_FAILURE
);
251 ret
->type
= EVP_PKEY_type(type
);
253 /* the parameters must be extracted before the public key (ECDSA!) */
255 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA)
261 #ifndef OPENSSL_NO_DSA
262 else if (ret
->type
== EVP_PKEY_DSA
)
264 if (a
->parameter
&& (a
->parameter
->type
== V_ASN1_SEQUENCE
))
266 if ((ret
->pkey
.dsa
= DSA_new()) == NULL
)
268 X509err(X509_F_X509_PUBKEY_GET
, ERR_R_MALLOC_FAILURE
);
271 ret
->pkey
.dsa
->write_params
=0;
272 cp
=p
=a
->parameter
->value
.sequence
->data
;
273 j
=a
->parameter
->value
.sequence
->length
;
274 if (!d2i_DSAparams(&ret
->pkey
.dsa
, &cp
, (long)j
))
277 ret
->save_parameters
=1;
280 #ifndef OPENSSL_NO_EC
281 else if (ret
->type
== EVP_PKEY_EC
)
283 if (a
->parameter
&& (a
->parameter
->type
== V_ASN1_SEQUENCE
))
285 /* type == V_ASN1_SEQUENCE => we have explicit parameters
286 * (e.g. parameters in the X9_62_EC_PARAMETERS-structure )
288 if ((ret
->pkey
.eckey
= EC_KEY_new()) == NULL
)
290 X509err(X509_F_X509_PUBKEY_GET
,
291 ERR_R_MALLOC_FAILURE
);
294 cp
= p
= a
->parameter
->value
.sequence
->data
;
295 j
= a
->parameter
->value
.sequence
->length
;
296 if (!d2i_ECParameters(&ret
->pkey
.eckey
, &cp
, (long)j
))
298 X509err(X509_F_X509_PUBKEY_GET
, ERR_R_EC_LIB
);
302 else if (a
->parameter
&& (a
->parameter
->type
== V_ASN1_OBJECT
))
304 /* type == V_ASN1_OBJECT => the parameters are given
308 if (ret
->pkey
.eckey
== NULL
)
309 ret
->pkey
.eckey
= EC_KEY_new();
310 eckey
= ret
->pkey
.eckey
;
312 EC_GROUP_free(eckey
->group
);
313 if ((eckey
->group
= EC_GROUP_new_by_nid(
314 OBJ_obj2nid(a
->parameter
->value
.object
))) == NULL
)
316 EC_GROUP_set_asn1_flag(eckey
->group
,
317 OPENSSL_EC_NAMED_CURVE
);
319 /* the case implicitlyCA is currently not implemented */
320 ret
->save_parameters
= 1;
324 p
=key
->public_key
->data
;
325 j
=key
->public_key
->length
;
326 if ((ret
= d2i_PublicKey(type
, &ret
, &p
, (long)j
)) == NULL
)
328 X509err(X509_F_X509_PUBKEY_GET
, X509_R_ERR_ASN1_LIB
);
333 CRYPTO_add(&ret
->references
, 1, CRYPTO_LOCK_EVP_PKEY
);
341 /* Now two pseudo ASN1 routines that take an EVP_PKEY structure
342 * and encode or decode as X509_PUBKEY
345 EVP_PKEY
*d2i_PUBKEY(EVP_PKEY
**a
, unsigned char **pp
,
350 xpk
= d2i_X509_PUBKEY(NULL
, pp
, length
);
351 if(!xpk
) return NULL
;
352 pktmp
= X509_PUBKEY_get(xpk
);
353 X509_PUBKEY_free(xpk
);
354 if(!pktmp
) return NULL
;
363 int i2d_PUBKEY(EVP_PKEY
*a
, unsigned char **pp
)
365 X509_PUBKEY
*xpk
=NULL
;
368 if(!X509_PUBKEY_set(&xpk
, a
)) return 0;
369 ret
= i2d_X509_PUBKEY(xpk
, pp
);
370 X509_PUBKEY_free(xpk
);
374 /* The following are equivalents but which return RSA and DSA
377 #ifndef OPENSSL_NO_RSA
378 RSA
*d2i_RSA_PUBKEY(RSA
**a
, unsigned char **pp
,
385 pkey
= d2i_PUBKEY(NULL
, &q
, length
);
386 if (!pkey
) return NULL
;
387 key
= EVP_PKEY_get1_RSA(pkey
);
389 if (!key
) return NULL
;
399 int i2d_RSA_PUBKEY(RSA
*a
, unsigned char **pp
)
404 pktmp
= EVP_PKEY_new();
407 ASN1err(ASN1_F_I2D_RSA_PUBKEY
, ERR_R_MALLOC_FAILURE
);
410 EVP_PKEY_set1_RSA(pktmp
, a
);
411 ret
= i2d_PUBKEY(pktmp
, pp
);
412 EVP_PKEY_free(pktmp
);
417 #ifndef OPENSSL_NO_DSA
418 DSA
*d2i_DSA_PUBKEY(DSA
**a
, unsigned char **pp
,
425 pkey
= d2i_PUBKEY(NULL
, &q
, length
);
426 if (!pkey
) return NULL
;
427 key
= EVP_PKEY_get1_DSA(pkey
);
429 if (!key
) return NULL
;
439 int i2d_DSA_PUBKEY(DSA
*a
, unsigned char **pp
)
444 pktmp
= EVP_PKEY_new();
447 ASN1err(ASN1_F_I2D_DSA_PUBKEY
, ERR_R_MALLOC_FAILURE
);
450 EVP_PKEY_set1_DSA(pktmp
, a
);
451 ret
= i2d_PUBKEY(pktmp
, pp
);
452 EVP_PKEY_free(pktmp
);
457 #ifndef OPENSSL_NO_EC
458 EC_KEY
*d2i_EC_PUBKEY(EC_KEY
**a
, unsigned char **pp
, long length
)
464 pkey
= d2i_PUBKEY(NULL
, &q
, length
);
465 if (!pkey
) return(NULL
);
466 key
= EVP_PKEY_get1_EC_KEY(pkey
);
468 if (!key
) return(NULL
);
478 int i2d_EC_PUBKEY(EC_KEY
*a
, unsigned char **pp
)
483 if ((pktmp
= EVP_PKEY_new()) == NULL
)
485 ASN1err(ASN1_F_I2D_EC_PUBKEY
, ERR_R_MALLOC_FAILURE
);
488 EVP_PKEY_set1_EC_KEY(pktmp
, a
);
489 ret
= i2d_PUBKEY(pktmp
, pp
);
490 EVP_PKEY_free(pktmp
);