1 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
4 /* ====================================================================
5 * Copyright (c) 2006 The OpenSSL Project. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
19 * 3. All advertising materials mentioning features or use of this
20 * software must display the following acknowledgment:
21 * "This product includes software developed by the OpenSSL Project
22 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
25 * endorse or promote products derived from this software without
26 * prior written permission. For written permission, please contact
27 * licensing@OpenSSL.org.
29 * 5. Products derived from this software may not be called "OpenSSL"
30 * nor may "OpenSSL" appear in their names without prior written
31 * permission of the OpenSSL Project.
33 * 6. Redistributions of any form whatsoever must retain the following
35 * "This product includes software developed by the OpenSSL Project
36 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
39 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
40 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
41 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
42 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
43 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
44 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
45 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
46 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
47 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
48 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49 * OF THE POSSIBILITY OF SUCH DAMAGE.
50 * ====================================================================
52 * This product includes cryptographic software written by Eric Young
53 * (eay@cryptsoft.com). This product includes software written by Tim
54 * Hudson (tjh@cryptsoft.com).
60 #include <openssl/asn1t.h>
61 #include <openssl/x509.h>
62 #include <openssl/ec.h>
63 #include "asn1_locl.h"
65 extern const EVP_PKEY_ASN1_METHOD rsa_asn1_meths[];
66 extern const EVP_PKEY_ASN1_METHOD dsa_asn1_meths[];
67 extern const EVP_PKEY_ASN1_METHOD dh_asn1_meth;
68 extern const EVP_PKEY_ASN1_METHOD eckey_asn1_meth;
70 /* Keep this sorted in type order !! */
71 const EVP_PKEY_ASN1_METHOD *standard_methods[] =
73 #ifndef OPENSSL_NO_RSA
80 #ifndef OPENSSL_NO_DSA
92 typedef int sk_cmp_fn_type(const char * const *a, const char * const *b);
93 static STACK *app_methods = NULL;
102 i < sizeof(standard_methods)/sizeof(EVP_PKEY_ASN1_METHOD *);
104 fprintf(stderr, "Number %d id=%d (%s)\n", i,
105 standard_methods[i]->pkey_id,
106 OBJ_nid2sn(standard_methods[i]->pkey_id));
110 static int ameth_cmp(const EVP_PKEY_ASN1_METHOD * const *a,
111 const EVP_PKEY_ASN1_METHOD * const *b)
113 return ((*a)->pkey_id - (*b)->pkey_id);
116 int EVP_PKEY_asn1_get_count(void)
118 int num = sizeof(standard_methods)/sizeof(EVP_PKEY_ASN1_METHOD *);
120 num += sk_num(app_methods);
124 const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx)
126 int num = sizeof(standard_methods)/sizeof(EVP_PKEY_ASN1_METHOD *);
130 return standard_methods[idx];
132 return (const EVP_PKEY_ASN1_METHOD *)sk_value(app_methods, idx);
135 const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(int type)
137 EVP_PKEY_ASN1_METHOD tmp, *t = &tmp, **ret;
142 idx = sk_find(app_methods, (char *)&t);
144 return (EVP_PKEY_ASN1_METHOD *)
145 sk_value(app_methods, idx);
147 ret = (EVP_PKEY_ASN1_METHOD **) OBJ_bsearch((char *)&t,
148 (char *)standard_methods,
149 sizeof(standard_methods)/sizeof(EVP_PKEY_ASN1_METHOD *),
150 sizeof(EVP_PKEY_ASN1_METHOD *),
151 (int (*)(const void *, const void *))ameth_cmp);
154 if ((*ret)->pkey_flags & ASN1_PKEY_ALIAS)
155 return EVP_PKEY_asn1_find((*ret)->pkey_base_id);
159 const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(const char *str, int len)
162 const EVP_PKEY_ASN1_METHOD *ameth;
163 for (i = 0; i < EVP_PKEY_asn1_get_count(); i++)
165 ameth = EVP_PKEY_asn1_get0(i);
166 if (ameth->pkey_flags & ASN1_PKEY_ALIAS)
168 if ((strlen(ameth->pem_str) == len) &&
169 !strncasecmp(ameth->pem_str, str, len))
175 int EVP_PKEY_asn1_add(const EVP_PKEY_ASN1_METHOD *ameth)
177 if (app_methods == NULL)
179 app_methods = sk_new((sk_cmp_fn_type *)ameth_cmp);
183 if (!sk_push(app_methods, (char *)ameth))
185 sk_sort(app_methods);
189 EVP_PKEY_ASN1_METHOD* EVP_PKEY_asn1_new(int id,
190 const char *pem_str, const char *info)
192 EVP_PKEY_ASN1_METHOD *ameth;
193 ameth = OPENSSL_malloc(sizeof(EVP_PKEY_ASN1_METHOD));
198 ameth->pkey_base_id = id;
199 ameth->pkey_flags = ASN1_PKEY_DYNAMIC;
203 ameth->info = BUF_strdup(info);
210 ameth->pem_str = BUF_strdup(pem_str);
215 ameth->pub_decode = 0;
216 ameth->pub_encode = 0;
218 ameth->pub_print = 0;
220 ameth->priv_decode = 0;
221 ameth->priv_encode = 0;
222 ameth->priv_print = 0;
224 ameth->pkey_size = 0;
225 ameth->pkey_bits = 0;
227 ameth->param_decode = 0;
228 ameth->param_encode = 0;
229 ameth->param_missing = 0;
230 ameth->param_copy = 0;
231 ameth->param_cmp = 0;
232 ameth->param_print = 0;
234 ameth->pkey_free = 0;
235 ameth->pkey_ctrl = 0;
241 EVP_PKEY_asn1_free(ameth);
246 void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth)
248 if (ameth && (ameth->pkey_flags & ASN1_PKEY_DYNAMIC))
251 OPENSSL_free(ameth->pem_str);
253 OPENSSL_free(ameth->info);
258 void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth,
259 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub),
260 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk),
261 int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b),
262 int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent,
264 int (*pkey_size)(const EVP_PKEY *pk),
265 int (*pkey_bits)(const EVP_PKEY *pk))
267 ameth->pub_decode = pub_decode;
268 ameth->pub_encode = pub_encode;
269 ameth->pub_cmp = pub_cmp;
270 ameth->pub_print = pub_print;
271 ameth->pkey_size = pkey_size;
272 ameth->pkey_bits = pkey_bits;
275 void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth,
276 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf),
277 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk),
278 int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent,
281 ameth->priv_decode = priv_decode;
282 ameth->priv_encode = priv_encode;
283 ameth->priv_print = priv_print;
286 void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth,
287 int (*param_decode)(EVP_PKEY *pkey,
288 const unsigned char **pder, int derlen),
289 int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder),
290 int (*param_missing)(const EVP_PKEY *pk),
291 int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from),
292 int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b),
293 int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent,
296 ameth->param_decode = param_decode;
297 ameth->param_encode = param_encode;
298 ameth->param_missing = param_missing;
299 ameth->param_copy = param_copy;
300 ameth->param_cmp = param_cmp;
301 ameth->param_print = param_print;
304 void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth,
305 void (*pkey_free)(EVP_PKEY *pkey))
307 ameth->pkey_free = pkey_free;
310 void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth,
311 void (*pkey_ctrl)(EVP_PKEY *pkey, int op,
312 long arg1, void *arg2))
314 ameth->pkey_ctrl = pkey_ctrl;