--- /dev/null
+/*
+ * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+#include <openssl/opensslconf.h> /* SIXTY_FOUR_BIT_LONG, ... */
+#include <openssl/err.h>
+#include <openssl/pem.h> /* PEM_BUFSIZE */
+#include <openssl/pkcs12.h> /* PKCS8_encrypt() */
+#include <openssl/types.h>
+#include <openssl/x509.h> /* i2d_X509_PUBKEY_bio() */
+#include "crypto/bn.h" /* bn_get_words() */
+#include "prov/bio.h" /* ossl_prov_bio_printf() */
+#include "prov/implementations.h"
+#include "prov/providercommonerr.h" /* PROV_R_READ_KEY */
+#include "serializer_local.h"
+
+static PKCS8_PRIV_KEY_INFO *
+ossl_prov_p8info_from_obj(const void *obj, int obj_nid,
+ ASN1_STRING *params,
+ int params_type,
+ int (*k2d)(const void *obj,
+ unsigned char **pder))
+{
+ /* der, derlen store the key DER output and its length */
+ unsigned char *der = NULL;
+ int derlen;
+ /* The final PKCS#8 info */
+ PKCS8_PRIV_KEY_INFO *p8info = NULL;
+
+
+ if ((p8info = PKCS8_PRIV_KEY_INFO_new()) == NULL
+ || (derlen = k2d(obj, &der)) <= 0
+ || !PKCS8_pkey_set0(p8info, OBJ_nid2obj(obj_nid), 0,
+ params_type, params, der, derlen)) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
+ PKCS8_PRIV_KEY_INFO_free(p8info);
+ OPENSSL_free(der);
+ p8info = NULL;
+ }
+
+ return p8info;
+}
+
+static X509_SIG *ossl_prov_encp8_from_p8info(PKCS8_PRIV_KEY_INFO *p8info,
+ struct pkcs8_encrypt_ctx_st *ctx)
+{
+ X509_SIG *p8 = NULL;
+ char buf[PEM_BUFSIZE];
+ const void *kstr = ctx->cipher_pass;
+ size_t klen = ctx->cipher_pass_length;
+
+ if (ctx->cipher == NULL)
+ return NULL;
+
+ if (kstr == NULL) {
+ if (!ctx->cb(buf, sizeof(buf), &klen, NULL, ctx->cbarg)) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_READ_KEY);
+ return NULL;
+ }
+ kstr = buf;
+ }
+ /* NID == -1 means "standard" */
+ p8 = PKCS8_encrypt(-1, ctx->cipher, kstr, klen, NULL, 0, 0, p8info);
+ if (kstr == buf)
+ OPENSSL_cleanse(buf, klen);
+ return p8;
+}
+
+static X509_SIG *ossl_prov_encp8_from_obj(const void *obj, int obj_nid,
+ ASN1_STRING *params,
+ int params_type,
+ int (*k2d)(const void *obj,
+ unsigned char **pder),
+ struct pkcs8_encrypt_ctx_st *ctx)
+{
+ PKCS8_PRIV_KEY_INFO *p8info =
+ ossl_prov_p8info_from_obj(obj, obj_nid, params, params_type, k2d);
+ X509_SIG *p8 = ossl_prov_encp8_from_p8info(p8info, ctx);
+
+ PKCS8_PRIV_KEY_INFO_free(p8info);
+ return p8;
+}
+
+static X509_PUBKEY *ossl_prov_pubkey_from_obj(const void *obj, int obj_nid,
+ ASN1_STRING *params,
+ int params_type,
+ int (*k2d)(const void *obj,
+ unsigned char **pder))
+{
+ /* der, derlen store the key DER output and its length */
+ unsigned char *der = NULL;
+ int derlen;
+ /* The final X509_PUBKEY */
+ X509_PUBKEY *xpk = NULL;
+
+
+ if ((xpk = X509_PUBKEY_new()) == NULL
+ || (derlen = k2d(obj, &der)) <= 0
+ || !X509_PUBKEY_set0_param(xpk, OBJ_nid2obj(obj_nid),
+ params_type, params, der, derlen)) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
+ X509_PUBKEY_free(xpk);
+ OPENSSL_free(der);
+ xpk = NULL;
+ }
+
+ return xpk;
+}
+
+OSSL_OP_keymgmt_importkey_fn *ossl_prov_get_importkey(const OSSL_DISPATCH *fns)
+{
+ /* Pilfer the keymgmt dispatch table */
+ for (; fns->function_id != 0; fns++)
+ if (fns->function_id == OSSL_FUNC_KEYMGMT_IMPORTKEY)
+ return OSSL_get_OP_keymgmt_importkey(fns);
+
+ return NULL;
+}
+
+# ifdef SIXTY_FOUR_BIT_LONG
+# define BN_FMTu "%lu"
+# define BN_FMTx "%lx"
+# endif
+
+# ifdef SIXTY_FOUR_BIT
+# define BN_FMTu "%llu"
+# define BN_FMTx "%llx"
+# endif
+
+# ifdef THIRTY_TWO_BIT
+# define BN_FMTu "%u"
+# define BN_FMTx "%x"
+# endif
+
+int ossl_prov_print_labeled_bignum(BIO *out, const char *label,
+ const BIGNUM *n)
+{
+ const char *neg;
+ const char *post_label_spc = " ";
+ int bytes;
+ BN_ULONG *words;
+ int i, off;
+
+ if (n == NULL)
+ return 0;
+ if (label == NULL) {
+ label = "";
+ post_label_spc = "";
+ }
+
+ bytes = BN_num_bytes(n);
+ words = bn_get_words(n);
+ neg = BN_is_negative(n) ? "-" : "";
+
+ if (BN_is_zero(n))
+ return ossl_prov_bio_printf(out, "%s%s0\n", label, post_label_spc);
+
+ if (BN_num_bytes(n) <= BN_BYTES)
+ return ossl_prov_bio_printf(out,
+ "%s%s%s" BN_FMTu " (%s0x" BN_FMTx ")\n",
+ label, post_label_spc, neg, words[0],
+ neg, words[0]);
+
+ if (neg[0] == '-')
+ neg = " (Negative)";
+
+ if (ossl_prov_bio_printf(out, "%s%s\n", label, neg) <= 0)
+ return 0;
+
+ /* Skip past the zero bytes in the first word */
+ for (off = 0; off < BN_BYTES; off++) {
+ BN_ULONG l = words[0];
+ int o = 8 * (BN_BYTES - off - 1);
+ int b = ((l & (0xffLU << o)) >> o) & 0xff;
+
+ if (b != 0)
+ break;
+ }
+ /* print 16 hex digits per line, indented with 4 spaces */
+ for (i = 0; i < bytes; i += 16) {
+ int j, step;
+
+ if (ossl_prov_bio_printf(out, " ") <= 0)
+ return 0;
+
+ for (j = 0; i + j < bytes && j < 16; j += BN_BYTES - step) {
+ int k;
+ BN_ULONG l = words[(i + j + off) / BN_BYTES];
+
+ step = (i + j + off) % BN_BYTES;
+
+ for (k = step; k < BN_BYTES; k++) {
+ int o = 8 * (BN_BYTES - k - 1);
+ int b = ((l & (0xffLU << o)) >> o) & 0xff;
+
+ /* We may have reached the number of bytes prematurely */
+ if (i + j + k - off >= bytes)
+ break;
+
+ if (ossl_prov_bio_printf(out, "%02x:", b) <= 0)
+ return 0;
+ }
+ }
+
+ if (ossl_prov_bio_printf(out, "\n") <= 0)
+ return 0;
+ }
+
+ return 1;
+}
+
+/* p2s = param to asn1_string, k2d = key to der */
+int ossl_prov_write_priv_der_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder),
+ struct pkcs8_encrypt_ctx_st *ctx)
+{
+ int ret = 0;
+ ASN1_STRING *str = NULL;
+ int strtype = 0;
+
+ if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
+ return 0;
+
+ if (ctx->cipher_intent) {
+ X509_SIG *p8 =
+ ossl_prov_encp8_from_obj(obj, obj_nid, str, strtype, k2d, ctx);
+
+ if (p8 != NULL)
+ ret = i2d_PKCS8_bio(out, p8);
+
+ X509_SIG_free(p8);
+ } else {
+ PKCS8_PRIV_KEY_INFO *p8info =
+ ossl_prov_p8info_from_obj(obj, obj_nid, str, strtype, k2d);
+
+ if (p8info != NULL)
+ ret = i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8info);
+
+ PKCS8_PRIV_KEY_INFO_free(p8info);
+ }
+
+ return ret;
+}
+
+int ossl_prov_write_priv_pem_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder),
+ struct pkcs8_encrypt_ctx_st *ctx)
+{
+ int ret = 0;
+ ASN1_STRING *str = NULL;
+ int strtype = 0;
+
+ if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
+ return 0;
+
+ if (ctx->cipher_intent) {
+ X509_SIG *p8 = ossl_prov_encp8_from_obj(obj, obj_nid, str, strtype,
+ k2d, ctx);
+
+ if (p8 != NULL)
+ ret = PEM_write_bio_PKCS8(out, p8);
+
+ X509_SIG_free(p8);
+ } else {
+ PKCS8_PRIV_KEY_INFO *p8info =
+ ossl_prov_p8info_from_obj(obj, obj_nid, str, strtype, k2d);
+
+ if (p8info != NULL)
+ ret = PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8info);
+
+ PKCS8_PRIV_KEY_INFO_free(p8info);
+ }
+
+ return ret;
+}
+
+int ossl_prov_write_pub_der_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder))
+{
+ int ret = 0;
+ ASN1_STRING *str = NULL;
+ int strtype = 0;
+ X509_PUBKEY *xpk = NULL;
+
+ if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
+ return 0;
+
+ xpk = ossl_prov_pubkey_from_obj(obj, obj_nid, str, strtype, k2d);
+
+ if (xpk != NULL)
+ ret = i2d_X509_PUBKEY_bio(out, xpk);
+
+ /* Also frees |str| */
+ X509_PUBKEY_free(xpk);
+ return ret;
+}
+
+int ossl_prov_write_pub_pem_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder))
+{
+ int ret = 0;
+ ASN1_STRING *str = NULL;
+ int strtype = 0;
+ X509_PUBKEY *xpk = NULL;
+
+ if (p2s != NULL && !p2s(obj, obj_nid, &str, &strtype))
+ return 0;
+
+ xpk = ossl_prov_pubkey_from_obj(obj, obj_nid, str, strtype, k2d);
+
+ if (xpk != NULL)
+ ret = PEM_write_bio_X509_PUBKEY(out, xpk);
+
+ /* Also frees |str| */
+ X509_PUBKEY_free(xpk);
+ return ret;
+}
+
--- /dev/null
+/*
+ * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+#include <openssl/core.h>
+#include <openssl/core_numbers.h>
+#include <openssl/bn.h>
+#include <openssl/asn1.h> /* i2d_of_void */
+#include <openssl/x509.h> /* X509_SIG */
+#include <openssl/types.h>
+
+struct pkcs8_encrypt_ctx_st {
+ /* Set to 1 if intending to encrypt/decrypt, otherwise 0 */
+ int cipher_intent;
+
+ EVP_CIPHER *cipher;
+ int pbe_nid; /* For future variation */
+
+ /* Passphrase that was passed by the caller */
+ void *cipher_pass;
+ size_t cipher_pass_length;
+
+ /* This callback is only used of |cipher_pass| is NULL */
+ OSSL_PASSPHRASE_CALLBACK *cb;
+ void *cbarg;
+};
+
+OSSL_OP_keymgmt_importkey_fn *ossl_prov_get_importkey(const OSSL_DISPATCH *fns);
+
+int ossl_prov_print_labeled_bignum(BIO *out, const char *label,
+ const BIGNUM *n);
+
+enum dh_print_type {
+ dh_print_priv,
+ dh_print_pub,
+ dh_print_params
+};
+
+int ossl_prov_write_priv_der_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder),
+ struct pkcs8_encrypt_ctx_st *ctx);
+int ossl_prov_write_priv_pem_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder),
+ struct pkcs8_encrypt_ctx_st *ctx);
+int ossl_prov_write_pub_der_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder));
+int ossl_prov_write_pub_pem_from_obj(BIO *out, const void *obj, int obj_nid,
+ int (*p2s)(const void *obj, int nid,
+ ASN1_STRING **str,
+ int *strtype),
+ int (*k2d)(const void *obj,
+ unsigned char **pder));