]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/asn1/d2i_pr.c
Run util/openssl-format-source -v -c .
[thirdparty/openssl.git] / crypto / asn1 / d2i_pr.c
CommitLineData
d02b48c6 1/* crypto/asn1/d2i_pr.c */
58964a49 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
d02b48c6
RE
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
40720ce3 8 *
d02b48c6
RE
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
40720ce3 15 *
d02b48c6
RE
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
40720ce3 22 *
d02b48c6
RE
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
40720ce3 37 * 4. If you include any Windows specific code (or a derivative thereof) from
d02b48c6
RE
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40720ce3 40 *
d02b48c6
RE
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
40720ce3 52 *
d02b48c6
RE
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include "cryptlib.h"
ec577822
BM
61#include <openssl/bn.h>
62#include <openssl/evp.h>
63#include <openssl/objects.h>
f66c3032 64#include <openssl/asn1.h>
322de0c8 65#ifndef OPENSSL_NO_RSA
40720ce3 66# include <openssl/rsa.h>
322de0c8
DSH
67#endif
68#ifndef OPENSSL_NO_DSA
40720ce3 69# include <openssl/dsa.h>
322de0c8 70#endif
14a7cfb3 71#ifndef OPENSSL_NO_EC
40720ce3 72# include <openssl/ec.h>
4d94ae00 73#endif
d02b48c6 74
875a644a 75EVP_PKEY *d2i_PrivateKey(int type, EVP_PKEY **a, const unsigned char **pp,
40720ce3
MC
76 long length)
77{
78 EVP_PKEY *ret;
d02b48c6 79
40720ce3
MC
80 if ((a == NULL) || (*a == NULL)) {
81 if ((ret = EVP_PKEY_new()) == NULL) {
82 ASN1err(ASN1_F_D2I_PRIVATEKEY, ERR_R_EVP_LIB);
83 return (NULL);
84 }
85 } else
86 ret = *a;
d02b48c6 87
40720ce3
MC
88 ret->save_type = type;
89 ret->type = EVP_PKEY_type(type);
90 switch (ret->type) {
cf1b7d96 91#ifndef OPENSSL_NO_RSA
40720ce3
MC
92 case EVP_PKEY_RSA:
93 /* TMP UGLY CAST */
94 if ((ret->pkey.rsa = d2i_RSAPrivateKey(NULL,
95 (const unsigned char **)pp,
96 length)) == NULL) {
97 ASN1err(ASN1_F_D2I_PRIVATEKEY, ERR_R_ASN1_LIB);
98 goto err;
99 }
100 break;
d02b48c6 101#endif
cf1b7d96 102#ifndef OPENSSL_NO_DSA
40720ce3
MC
103 case EVP_PKEY_DSA:
104 /* TMP UGLY CAST */
105 if ((ret->pkey.dsa = d2i_DSAPrivateKey(NULL,
106 (const unsigned char **)pp,
107 length)) == NULL) {
108 ASN1err(ASN1_F_D2I_PRIVATEKEY, ERR_R_ASN1_LIB);
109 goto err;
110 }
111 break;
4d94ae00 112#endif
14a7cfb3 113#ifndef OPENSSL_NO_EC
40720ce3
MC
114 case EVP_PKEY_EC:
115 if ((ret->pkey.ec = d2i_ECPrivateKey(NULL,
116 (const unsigned char **)pp,
117 length)) == NULL) {
118 ASN1err(ASN1_F_D2I_PRIVATEKEY, ERR_R_ASN1_LIB);
119 goto err;
120 }
121 break;
d02b48c6 122#endif
40720ce3
MC
123 default:
124 ASN1err(ASN1_F_D2I_PRIVATEKEY, ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE);
125 goto err;
126 /* break; */
127 }
128 if (a != NULL)
129 (*a) = ret;
130 return (ret);
131 err:
132 if ((ret != NULL) && ((a == NULL) || (*a != ret)))
133 EVP_PKEY_free(ret);
134 return (NULL);
135}
d02b48c6 136
40720ce3
MC
137/*
138 * This works like d2i_PrivateKey() except it automatically works out the
139 * type
140 */
20432eae 141
875a644a 142EVP_PKEY *d2i_AutoPrivateKey(EVP_PKEY **a, const unsigned char **pp,
40720ce3 143 long length)
20432eae 144{
40720ce3
MC
145 STACK_OF(ASN1_TYPE) *inkey;
146 const unsigned char *p;
147 int keytype;
148 p = *pp;
149 /*
150 * Dirty trick: read in the ASN1 data into a STACK_OF(ASN1_TYPE): by
151 * analyzing it we can determine the passed structure: this assumes the
152 * input is surrounded by an ASN1 SEQUENCE.
153 */
154 inkey = d2i_ASN1_SET_OF_ASN1_TYPE(NULL, &p, length, d2i_ASN1_TYPE,
155 ASN1_TYPE_free, V_ASN1_SEQUENCE,
156 V_ASN1_UNIVERSAL);
157 /*
158 * Since we only need to discern "traditional format" RSA and DSA keys we
159 * can just count the elements.
160 */
161 if (sk_ASN1_TYPE_num(inkey) == 6)
162 keytype = EVP_PKEY_DSA;
163 else if (sk_ASN1_TYPE_num(inkey) == 4)
164 keytype = EVP_PKEY_EC;
165 else
166 keytype = EVP_PKEY_RSA;
167 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
168 return d2i_PrivateKey(keytype, a, pp, length);
20432eae 169}