1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay (at) cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay (at) cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57 #include <openssl/asn1.h> 58 #include <openssl/asn1t.h> 59 #include <openssl/err.h> 60 #include <openssl/evp.h> 61 #include <openssl/mem.h> 62 #include <openssl/obj.h> 63 #include <openssl/thread.h> 64 #include <openssl/x509.h> 65 66 #include "../evp/internal.h" 67 #include "../internal.h" 68 69 70 /* Minor tweak to operation: free up EVP_PKEY */ 71 static int pubkey_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 72 void *exarg) 73 { 74 if (operation == ASN1_OP_FREE_POST) 75 { 76 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; 77 EVP_PKEY_free(pubkey->pkey); 78 } 79 return 1; 80 } 81 82 ASN1_SEQUENCE_cb(X509_PUBKEY, pubkey_cb) = { 83 ASN1_SIMPLE(X509_PUBKEY, algor, X509_ALGOR), 84 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 85 } ASN1_SEQUENCE_END_cb(X509_PUBKEY, X509_PUBKEY) 86 87 IMPLEMENT_ASN1_FUNCTIONS(X509_PUBKEY) 88 89 int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) 90 { 91 X509_PUBKEY *pk=NULL; 92 93 if (x == NULL) return(0); 94 95 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 96 97 if (pkey->ameth) 98 { 99 if (pkey->ameth->pub_encode) 100 { 101 if (!pkey->ameth->pub_encode(pk, pkey)) 102 { 103 OPENSSL_PUT_ERROR(X509, X509_R_PUBLIC_KEY_ENCODE_ERROR); 104 goto error; 105 } 106 } 107 else 108 { 109 OPENSSL_PUT_ERROR(X509, X509_R_METHOD_NOT_SUPPORTED); 110 goto error; 111 } 112 } 113 else 114 { 115 OPENSSL_PUT_ERROR(X509, X509_R_UNSUPPORTED_ALGORITHM); 116 goto error; 117 } 118 119 if (*x != NULL) 120 X509_PUBKEY_free(*x); 121 122 *x=pk; 123 124 return 1; 125 error: 126 if (pk != NULL) X509_PUBKEY_free(pk); 127 return 0; 128 } 129 130 /* g_pubkey_lock is used to protect the initialisation of the |pkey| member of 131 * |X509_PUBKEY| objects. Really |X509_PUBKEY| should have a |CRYPTO_once_t| 132 * inside it for this, but |CRYPTO_once_t| is private and |X509_PUBKEY| is 133 * not. */ 134 static struct CRYPTO_STATIC_MUTEX g_pubkey_lock = CRYPTO_STATIC_MUTEX_INIT; 135 136 EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key) 137 { 138 EVP_PKEY *ret=NULL; 139 140 if (key == NULL) goto error; 141 142 CRYPTO_STATIC_MUTEX_lock_read(&g_pubkey_lock); 143 if (key->pkey != NULL) 144 { 145 CRYPTO_STATIC_MUTEX_unlock(&g_pubkey_lock); 146 return EVP_PKEY_up_ref(key->pkey); 147 } 148 CRYPTO_STATIC_MUTEX_unlock(&g_pubkey_lock); 149 150 if (key->public_key == NULL) goto error; 151 152 if ((ret = EVP_PKEY_new()) == NULL) 153 { 154 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 155 goto error; 156 } 157 158 if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) 159 { 160 OPENSSL_PUT_ERROR(X509, X509_R_UNSUPPORTED_ALGORITHM); 161 goto error; 162 } 163 164 if (ret->ameth->pub_decode) 165 { 166 if (!ret->ameth->pub_decode(ret, key)) 167 { 168 OPENSSL_PUT_ERROR(X509, X509_R_PUBLIC_KEY_DECODE_ERROR); 169 goto error; 170 } 171 } 172 else 173 { 174 OPENSSL_PUT_ERROR(X509, X509_R_METHOD_NOT_SUPPORTED); 175 goto error; 176 } 177 178 /* Check to see if another thread set key->pkey first */ 179 CRYPTO_STATIC_MUTEX_lock_write(&g_pubkey_lock); 180 if (key->pkey) 181 { 182 CRYPTO_STATIC_MUTEX_unlock(&g_pubkey_lock); 183 EVP_PKEY_free(ret); 184 ret = key->pkey; 185 } 186 else 187 { 188 key->pkey = ret; 189 CRYPTO_STATIC_MUTEX_unlock(&g_pubkey_lock); 190 } 191 192 return EVP_PKEY_up_ref(ret); 193 194 error: 195 if (ret != NULL) 196 EVP_PKEY_free(ret); 197 return(NULL); 198 } 199 200 /* Now two pseudo ASN1 routines that take an EVP_PKEY structure 201 * and encode or decode as X509_PUBKEY 202 */ 203 204 EVP_PKEY *d2i_PUBKEY(EVP_PKEY **a, const unsigned char **pp, 205 long length) 206 { 207 X509_PUBKEY *xpk; 208 EVP_PKEY *pktmp; 209 xpk = d2i_X509_PUBKEY(NULL, pp, length); 210 if(!xpk) return NULL; 211 pktmp = X509_PUBKEY_get(xpk); 212 X509_PUBKEY_free(xpk); 213 if(!pktmp) return NULL; 214 if(a) 215 { 216 EVP_PKEY_free(*a); 217 *a = pktmp; 218 } 219 return pktmp; 220 } 221 222 int i2d_PUBKEY(const EVP_PKEY *a, unsigned char **pp) 223 { 224 X509_PUBKEY *xpk=NULL; 225 int ret; 226 if(!a) return 0; 227 if(!X509_PUBKEY_set(&xpk, (EVP_PKEY*) a)) return 0; 228 ret = i2d_X509_PUBKEY(xpk, pp); 229 X509_PUBKEY_free(xpk); 230 return ret; 231 } 232 233 /* The following are equivalents but which return RSA and DSA 234 * keys 235 */ 236 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, 237 long length) 238 { 239 EVP_PKEY *pkey; 240 RSA *key; 241 const unsigned char *q; 242 q = *pp; 243 pkey = d2i_PUBKEY(NULL, &q, length); 244 if (!pkey) return NULL; 245 key = EVP_PKEY_get1_RSA(pkey); 246 EVP_PKEY_free(pkey); 247 if (!key) return NULL; 248 *pp = q; 249 if (a) 250 { 251 RSA_free(*a); 252 *a = key; 253 } 254 return key; 255 } 256 257 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) 258 { 259 EVP_PKEY *pktmp; 260 int ret; 261 if (!a) return 0; 262 pktmp = EVP_PKEY_new(); 263 if (!pktmp) 264 { 265 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 266 return 0; 267 } 268 EVP_PKEY_set1_RSA(pktmp, (RSA*) a); 269 ret = i2d_PUBKEY(pktmp, pp); 270 EVP_PKEY_free(pktmp); 271 return ret; 272 } 273 274 #ifndef OPENSSL_NO_DSA 275 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, 276 long length) 277 { 278 EVP_PKEY *pkey; 279 DSA *key; 280 const unsigned char *q; 281 q = *pp; 282 pkey = d2i_PUBKEY(NULL, &q, length); 283 if (!pkey) return NULL; 284 key = EVP_PKEY_get1_DSA(pkey); 285 EVP_PKEY_free(pkey); 286 if (!key) return NULL; 287 *pp = q; 288 if (a) 289 { 290 DSA_free(*a); 291 *a = key; 292 } 293 return key; 294 } 295 296 int i2d_DSA_PUBKEY(const DSA *a, unsigned char **pp) 297 { 298 EVP_PKEY *pktmp; 299 int ret; 300 if(!a) return 0; 301 pktmp = EVP_PKEY_new(); 302 if(!pktmp) 303 { 304 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 305 return 0; 306 } 307 EVP_PKEY_set1_DSA(pktmp, (DSA*) a); 308 ret = i2d_PUBKEY(pktmp, pp); 309 EVP_PKEY_free(pktmp); 310 return ret; 311 } 312 #endif 313 314 EC_KEY *d2i_EC_PUBKEY(EC_KEY **a, const unsigned char **pp, long length) 315 { 316 EVP_PKEY *pkey; 317 EC_KEY *key; 318 const unsigned char *q; 319 q = *pp; 320 pkey = d2i_PUBKEY(NULL, &q, length); 321 if (!pkey) return(NULL); 322 key = EVP_PKEY_get1_EC_KEY(pkey); 323 EVP_PKEY_free(pkey); 324 if (!key) return(NULL); 325 *pp = q; 326 if (a) 327 { 328 EC_KEY_free(*a); 329 *a = key; 330 } 331 return(key); 332 } 333 334 int i2d_EC_PUBKEY(const EC_KEY *a, unsigned char **pp) 335 { 336 EVP_PKEY *pktmp; 337 int ret; 338 if (!a) return(0); 339 if ((pktmp = EVP_PKEY_new()) == NULL) 340 { 341 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 342 return(0); 343 } 344 EVP_PKEY_set1_EC_KEY(pktmp, (EC_KEY*) a); 345 ret = i2d_PUBKEY(pktmp, pp); 346 EVP_PKEY_free(pktmp); 347 return(ret); 348 } 349 350 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, const ASN1_OBJECT *aobj, 351 int ptype, void *pval, 352 unsigned char *penc, int penclen) 353 { 354 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) 355 return 0; 356 if (penc) 357 { 358 if (pub->public_key->data) 359 OPENSSL_free(pub->public_key->data); 360 pub->public_key->data = penc; 361 pub->public_key->length = penclen; 362 /* Set number of unused bits to zero */ 363 pub->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 364 pub->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT; 365 } 366 return 1; 367 } 368 369 int X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, 370 const unsigned char **pk, int *ppklen, 371 X509_ALGOR **pa, 372 X509_PUBKEY *pub) 373 { 374 if (ppkalg) 375 *ppkalg = pub->algor->algorithm; 376 if (pk) 377 { 378 *pk = pub->public_key->data; 379 *ppklen = pub->public_key->length; 380 } 381 if (pa) 382 *pa = pub->algor; 383 return 1; 384 } 385