| /* |
| * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| /* |
| * Low level APIs are deprecated for public use, but still ok for internal use. |
| */ |
| #include "internal/deprecated.h" |
| |
| #include <ctype.h> |
| |
| #include <openssl/core.h> |
| #include <openssl/core_dispatch.h> |
| #include <openssl/core_names.h> |
| #include <openssl/bn.h> |
| #include <openssl/err.h> |
| #include <openssl/safestack.h> |
| #include <openssl/proverr.h> |
| #include "internal/ffc.h" |
| #include "crypto/bn.h" /* bn_get_words() */ |
| #include "crypto/dh.h" /* ossl_dh_get0_params() */ |
| #include "crypto/dsa.h" /* ossl_dsa_get0_params() */ |
| #include "crypto/ec.h" /* ossl_ec_key_get_libctx */ |
| #include "crypto/ecx.h" /* ECX_KEY, etc... */ |
| #include "crypto/rsa.h" /* RSA_PSS_PARAMS_30, etc... */ |
| #include "prov/bio.h" |
| #include "prov/implementations.h" |
| #include "endecoder_local.h" |
| |
| DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM) |
| |
| # ifdef SIXTY_FOUR_BIT_LONG |
| # define BN_FMTu "%lu" |
| # define BN_FMTx "%lx" |
| # endif |
| |
| # ifdef SIXTY_FOUR_BIT |
| # define BN_FMTu "%llu" |
| # define BN_FMTx "%llx" |
| # endif |
| |
| # ifdef THIRTY_TWO_BIT |
| # define BN_FMTu "%u" |
| # define BN_FMTx "%x" |
| # endif |
| |
| static int print_labeled_bignum(BIO *out, const char *label, const BIGNUM *bn) |
| { |
| int ret = 0, use_sep = 0; |
| char *hex_str = NULL, *p; |
| const char spaces[] = " "; |
| const char *post_label_spc = " "; |
| |
| const char *neg = ""; |
| int bytes; |
| |
| if (bn == NULL) |
| return 0; |
| if (label == NULL) { |
| label = ""; |
| post_label_spc = ""; |
| } |
| |
| if (BN_is_zero(bn)) |
| return BIO_printf(out, "%s%s0\n", label, post_label_spc); |
| |
| if (BN_num_bytes(bn) <= BN_BYTES) { |
| BN_ULONG *words = bn_get_words(bn); |
| |
| if (BN_is_negative(bn)) |
| neg = "-"; |
| |
| return BIO_printf(out, "%s%s%s" BN_FMTu " (%s0x" BN_FMTx ")\n", |
| label, post_label_spc, neg, words[0], neg, words[0]); |
| } |
| |
| hex_str = BN_bn2hex(bn); |
| if (hex_str == NULL) |
| return 0; |
| |
| p = hex_str; |
| if (*p == '-') { |
| ++p; |
| neg = " (Negative)"; |
| } |
| if (BIO_printf(out, "%s%s\n", label, neg) <= 0) |
| goto err; |
| |
| /* Keep track of how many bytes we have printed out so far */ |
| bytes = 0; |
| |
| if (BIO_printf(out, "%s", spaces) <= 0) |
| goto err; |
| |
| /* Add a leading 00 if the top bit is set */ |
| if (*p >= '8') { |
| if (BIO_printf(out, "%02x", 0) <= 0) |
| goto err; |
| ++bytes; |
| use_sep = 1; |
| } |
| while (*p != '\0') { |
| /* Do a newline after every 15 hex bytes + add the space indent */ |
| if ((bytes % 15) == 0 && bytes > 0) { |
| if (BIO_printf(out, ":\n%s", spaces) <= 0) |
| goto err; |
| use_sep = 0; /* The first byte on the next line doesnt have a : */ |
| } |
| if (BIO_printf(out, "%s%c%c", use_sep ? ":" : "", |
| tolower(p[0]), tolower(p[1])) <= 0) |
| goto err; |
| ++bytes; |
| p += 2; |
| use_sep = 1; |
| } |
| if (BIO_printf(out, "\n") <= 0) |
| goto err; |
| ret = 1; |
| err: |
| OPENSSL_free(hex_str); |
| return ret; |
| } |
| |
| /* Number of octets per line */ |
| #define LABELED_BUF_PRINT_WIDTH 15 |
| |
| #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC) |
| static int print_labeled_buf(BIO *out, const char *label, |
| const unsigned char *buf, size_t buflen) |
| { |
| size_t i; |
| |
| if (BIO_printf(out, "%s\n", label) <= 0) |
| return 0; |
| |
| for (i = 0; i < buflen; i++) { |
| if ((i % LABELED_BUF_PRINT_WIDTH) == 0) { |
| if (i > 0 && BIO_printf(out, "\n") <= 0) |
| return 0; |
| if (BIO_printf(out, " ") <= 0) |
| return 0; |
| } |
| |
| if (BIO_printf(out, "%02x%s", buf[i], |
| (i == buflen - 1) ? "" : ":") <= 0) |
| return 0; |
| } |
| if (BIO_printf(out, "\n") <= 0) |
| return 0; |
| |
| return 1; |
| } |
| #endif |
| |
| #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) |
| static int ffc_params_to_text(BIO *out, const FFC_PARAMS *ffc) |
| { |
| if (ffc->nid != NID_undef) { |
| #ifndef OPENSSL_NO_DH |
| const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid); |
| const char *name = ossl_ffc_named_group_get_name(group); |
| |
| if (name == NULL) |
| goto err; |
| if (BIO_printf(out, "GROUP: %s\n", name) <= 0) |
| goto err; |
| return 1; |
| #else |
| /* How could this be? We should not have a nid in a no-dh build. */ |
| goto err; |
| #endif |
| } |
| |
| if (!print_labeled_bignum(out, "P: ", ffc->p)) |
| goto err; |
| if (ffc->q != NULL) { |
| if (!print_labeled_bignum(out, "Q: ", ffc->q)) |
| goto err; |
| } |
| if (!print_labeled_bignum(out, "G: ", ffc->g)) |
| goto err; |
| if (ffc->j != NULL) { |
| if (!print_labeled_bignum(out, "J: ", ffc->j)) |
| goto err; |
| } |
| if (ffc->seed != NULL) { |
| if (!print_labeled_buf(out, "SEED:", ffc->seed, ffc->seedlen)) |
| goto err; |
| } |
| if (ffc->gindex != -1) { |
| if (BIO_printf(out, "gindex: %d\n", ffc->gindex) <= 0) |
| goto err; |
| } |
| if (ffc->pcounter != -1) { |
| if (BIO_printf(out, "pcounter: %d\n", ffc->pcounter) <= 0) |
| goto err; |
| } |
| if (ffc->h != 0) { |
| if (BIO_printf(out, "h: %d\n", ffc->h) <= 0) |
| goto err; |
| } |
| return 1; |
| err: |
| return 0; |
| } |
| #endif |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| #ifndef OPENSSL_NO_DH |
| static int dh_to_text(BIO *out, const void *key, int selection) |
| { |
| const DH *dh = key; |
| const char *type_label = NULL; |
| const BIGNUM *priv_key = NULL, *pub_key = NULL; |
| const FFC_PARAMS *params = NULL; |
| const BIGNUM *p = NULL; |
| |
| if (out == NULL || dh == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
| return 0; |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) |
| type_label = "DH Private-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) |
| type_label = "DH Public-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) |
| type_label = "DH Parameters"; |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| priv_key = DH_get0_priv_key(dh); |
| if (priv_key == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
| return 0; |
| } |
| } |
| if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| pub_key = DH_get0_pub_key(dh); |
| if (pub_key == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
| return 0; |
| } |
| } |
| if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { |
| params = ossl_dh_get0_params((DH *)dh); |
| if (params == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); |
| return 0; |
| } |
| } |
| |
| p = DH_get0_p(dh); |
| if (p == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); |
| return 0; |
| } |
| |
| if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) |
| return 0; |
| if (priv_key != NULL |
| && !print_labeled_bignum(out, "private-key:", priv_key)) |
| return 0; |
| if (pub_key != NULL |
| && !print_labeled_bignum(out, "public-key:", pub_key)) |
| return 0; |
| if (params != NULL |
| && !ffc_params_to_text(out, params)) |
| return 0; |
| |
| return 1; |
| } |
| |
| # define dh_input_type "DH" |
| # define dhx_input_type "DHX" |
| #endif |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| #ifndef OPENSSL_NO_DSA |
| static int dsa_to_text(BIO *out, const void *key, int selection) |
| { |
| const DSA *dsa = key; |
| const char *type_label = NULL; |
| const BIGNUM *priv_key = NULL, *pub_key = NULL; |
| const FFC_PARAMS *params = NULL; |
| const BIGNUM *p = NULL; |
| |
| if (out == NULL || dsa == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
| return 0; |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) |
| type_label = "Private-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) |
| type_label = "Public-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) |
| type_label = "DSA-Parameters"; |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| priv_key = DSA_get0_priv_key(dsa); |
| if (priv_key == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
| return 0; |
| } |
| } |
| if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| pub_key = DSA_get0_pub_key(dsa); |
| if (pub_key == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
| return 0; |
| } |
| } |
| if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { |
| params = ossl_dsa_get0_params((DSA *)dsa); |
| if (params == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); |
| return 0; |
| } |
| } |
| |
| p = DSA_get0_p(dsa); |
| if (p == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); |
| return 0; |
| } |
| |
| if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) |
| return 0; |
| if (priv_key != NULL |
| && !print_labeled_bignum(out, "priv:", priv_key)) |
| return 0; |
| if (pub_key != NULL |
| && !print_labeled_bignum(out, "pub: ", pub_key)) |
| return 0; |
| if (params != NULL |
| && !ffc_params_to_text(out, params)) |
| return 0; |
| |
| return 1; |
| } |
| |
| # define dsa_input_type "DSA" |
| #endif |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| #ifndef OPENSSL_NO_EC |
| static int ec_param_explicit_curve_to_text(BIO *out, const EC_GROUP *group, |
| BN_CTX *ctx) |
| { |
| const char *plabel = "Prime:"; |
| BIGNUM *p = NULL, *a = NULL, *b = NULL; |
| |
| p = BN_CTX_get(ctx); |
| a = BN_CTX_get(ctx); |
| b = BN_CTX_get(ctx); |
| if (b == NULL |
| || !EC_GROUP_get_curve(group, p, a, b, ctx)) |
| return 0; |
| |
| if (EC_GROUP_get_field_type(group) == NID_X9_62_characteristic_two_field) { |
| int basis_type = EC_GROUP_get_basis_type(group); |
| |
| /* print the 'short name' of the base type OID */ |
| if (basis_type == NID_undef |
| || BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0) |
| return 0; |
| plabel = "Polynomial:"; |
| } |
| return print_labeled_bignum(out, plabel, p) |
| && print_labeled_bignum(out, "A: ", a) |
| && print_labeled_bignum(out, "B: ", b); |
| } |
| |
| static int ec_param_explicit_gen_to_text(BIO *out, const EC_GROUP *group, |
| BN_CTX *ctx) |
| { |
| int ret; |
| size_t buflen; |
| point_conversion_form_t form; |
| const EC_POINT *point = NULL; |
| const char *glabel = NULL; |
| unsigned char *buf = NULL; |
| |
| form = EC_GROUP_get_point_conversion_form(group); |
| point = EC_GROUP_get0_generator(group); |
| |
| if (point == NULL) |
| return 0; |
| |
| switch (form) { |
| case POINT_CONVERSION_COMPRESSED: |
| glabel = "Generator (compressed):"; |
| break; |
| case POINT_CONVERSION_UNCOMPRESSED: |
| glabel = "Generator (uncompressed):"; |
| break; |
| case POINT_CONVERSION_HYBRID: |
| glabel = "Generator (hybrid):"; |
| break; |
| default: |
| return 0; |
| } |
| |
| buflen = EC_POINT_point2buf(group, point, form, &buf, ctx); |
| if (buflen == 0) |
| return 0; |
| |
| ret = print_labeled_buf(out, glabel, buf, buflen); |
| OPENSSL_clear_free(buf, buflen); |
| return ret; |
| } |
| |
| /* Print explicit parameters */ |
| static int ec_param_explicit_to_text(BIO *out, const EC_GROUP *group, |
| OSSL_LIB_CTX *libctx) |
| { |
| int ret = 0, tmp_nid; |
| BN_CTX *ctx = NULL; |
| const BIGNUM *order = NULL, *cofactor = NULL; |
| const unsigned char *seed; |
| size_t seed_len = 0; |
| |
| ctx = BN_CTX_new_ex(libctx); |
| if (ctx == NULL) |
| return 0; |
| BN_CTX_start(ctx); |
| |
| tmp_nid = EC_GROUP_get_field_type(group); |
| order = EC_GROUP_get0_order(group); |
| if (order == NULL) |
| goto err; |
| |
| seed = EC_GROUP_get0_seed(group); |
| if (seed != NULL) |
| seed_len = EC_GROUP_get_seed_len(group); |
| cofactor = EC_GROUP_get0_cofactor(group); |
| |
| /* print the 'short name' of the field type */ |
| if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0 |
| || !ec_param_explicit_curve_to_text(out, group, ctx) |
| || !ec_param_explicit_gen_to_text(out, group, ctx) |
| || !print_labeled_bignum(out, "Order: ", order) |
| || (cofactor != NULL |
| && !print_labeled_bignum(out, "Cofactor: ", cofactor)) |
| || (seed != NULL |
| && !print_labeled_buf(out, "Seed:", seed, seed_len))) |
| goto err; |
| ret = 1; |
| err: |
| BN_CTX_end(ctx); |
| BN_CTX_free(ctx); |
| return ret; |
| } |
| |
| static int ec_param_to_text(BIO *out, const EC_GROUP *group, |
| OSSL_LIB_CTX *libctx) |
| { |
| if (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE) { |
| const char *curve_name; |
| int curve_nid = EC_GROUP_get_curve_name(group); |
| |
| /* Explicit parameters */ |
| if (curve_nid == NID_undef) |
| return 0; |
| |
| if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0) |
| return 0; |
| |
| curve_name = EC_curve_nid2nist(curve_nid); |
| return (curve_name == NULL |
| || BIO_printf(out, "%s: %s\n", "NIST CURVE", curve_name) > 0); |
| } else { |
| return ec_param_explicit_to_text(out, group, libctx); |
| } |
| } |
| |
| static int ec_to_text(BIO *out, const void *key, int selection) |
| { |
| const EC_KEY *ec = key; |
| const char *type_label = NULL; |
| unsigned char *priv = NULL, *pub = NULL; |
| size_t priv_len = 0, pub_len = 0; |
| const EC_GROUP *group; |
| int ret = 0; |
| |
| if (out == NULL || ec == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
| return 0; |
| } |
| |
| if ((group = EC_KEY_get0_group(ec)) == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); |
| return 0; |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) |
| type_label = "Private-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) |
| type_label = "Public-Key"; |
| else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) |
| type_label = "EC-Parameters"; |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| const BIGNUM *priv_key = EC_KEY_get0_private_key(ec); |
| |
| if (priv_key == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
| goto err; |
| } |
| priv_len = EC_KEY_priv2buf(ec, &priv); |
| if (priv_len == 0) |
| goto err; |
| } |
| if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| const EC_POINT *pub_pt = EC_KEY_get0_public_key(ec); |
| |
| if (pub_pt == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
| goto err; |
| } |
| |
| pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL); |
| if (pub_len == 0) |
| goto err; |
| } |
| |
| if (BIO_printf(out, "%s: (%d bit)\n", type_label, |
| EC_GROUP_order_bits(group)) <= 0) |
| goto err; |
| if (priv != NULL |
| && !print_labeled_buf(out, "priv:", priv, priv_len)) |
| goto err; |
| if (pub != NULL |
| && !print_labeled_buf(out, "pub:", pub, pub_len)) |
| goto err; |
| if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) |
| ret = ec_param_to_text(out, group, ossl_ec_key_get_libctx(ec)); |
| err: |
| OPENSSL_clear_free(priv, priv_len); |
| OPENSSL_free(pub); |
| return ret; |
| } |
| |
| # define ec_input_type "EC" |
| |
| # ifndef OPENSSL_NO_SM2 |
| # define sm2_input_type "SM2" |
| # endif |
| #endif |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| #ifndef OPENSSL_NO_EC |
| static int ecx_to_text(BIO *out, const void *key, int selection) |
| { |
| const ECX_KEY *ecx = key; |
| const char *type_label = NULL; |
| |
| if (out == NULL || ecx == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
| return 0; |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| if (ecx->privkey == NULL) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
| return 0; |
| } |
| |
| switch (ecx->type) { |
| case ECX_KEY_TYPE_X25519: |
| type_label = "X25519 Private-Key"; |
| break; |
| case ECX_KEY_TYPE_X448: |
| type_label = "X448 Private-Key"; |
| break; |
| case ECX_KEY_TYPE_ED25519: |
| type_label = "ED25519 Private-Key"; |
| break; |
| case ECX_KEY_TYPE_ED448: |
| type_label = "ED448 Private-Key"; |
| break; |
| } |
| } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| /* ecx->pubkey is an array, not a pointer... */ |
| if (!ecx->haspubkey) { |
| ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
| return 0; |
| } |
| |
| switch (ecx->type) { |
| case ECX_KEY_TYPE_X25519: |
| type_label = "X25519 Public-Key"; |
| break; |
| case ECX_KEY_TYPE_X448: |
| type_label = "X448 Public-Key"; |
| break; |
| case ECX_KEY_TYPE_ED25519: |
| type_label = "ED25519 Public-Key"; |
| break; |
| case ECX_KEY_TYPE_ED448: |
| type_label = "ED448 Public-Key"; |
| break; |
| } |
| } |
| |
| if (BIO_printf(out, "%s:\n", type_label) <= 0) |
| return 0; |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0 |
| && !print_labeled_buf(out, "priv:", ecx->privkey, ecx->keylen)) |
| return 0; |
| if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0 |
| && !print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen)) |
| return 0; |
| |
| return 1; |
| } |
| |
| # define ed25519_input_type "ED25519" |
| # define ed448_input_type "ED448" |
| # define x25519_input_type "X25519" |
| # define x448_input_type "X448" |
| #endif |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| static int rsa_to_text(BIO *out, const void *key, int selection) |
| { |
| const RSA *rsa = key; |
| const char *type_label = "RSA key"; |
| const char *modulus_label = NULL; |
| const char *exponent_label = NULL; |
| const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; |
| STACK_OF(BIGNUM_const) *factors = NULL; |
| STACK_OF(BIGNUM_const) *exps = NULL; |
| STACK_OF(BIGNUM_const) *coeffs = NULL; |
| int primes; |
| const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa); |
| int ret = 0; |
| |
| if (out == NULL || rsa == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
| goto err; |
| } |
| |
| factors = sk_BIGNUM_const_new_null(); |
| exps = sk_BIGNUM_const_new_null(); |
| coeffs = sk_BIGNUM_const_new_null(); |
| |
| if (factors == NULL || exps == NULL || coeffs == NULL) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
| goto err; |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| type_label = "Private-Key"; |
| modulus_label = "modulus:"; |
| exponent_label = "publicExponent:"; |
| } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| type_label = "Public-Key"; |
| modulus_label = "Modulus:"; |
| exponent_label = "Exponent:"; |
| } |
| |
| RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); |
| ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); |
| primes = sk_BIGNUM_const_num(factors); |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| if (BIO_printf(out, "%s: (%d bit, %d primes)\n", |
| type_label, BN_num_bits(rsa_n), primes) <= 0) |
| goto err; |
| } else { |
| if (BIO_printf(out, "%s: (%d bit)\n", |
| type_label, BN_num_bits(rsa_n)) <= 0) |
| goto err; |
| } |
| |
| if (!print_labeled_bignum(out, modulus_label, rsa_n)) |
| goto err; |
| if (!print_labeled_bignum(out, exponent_label, rsa_e)) |
| goto err; |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| int i; |
| |
| if (!print_labeled_bignum(out, "privateExponent:", rsa_d)) |
| goto err; |
| if (!print_labeled_bignum(out, "prime1:", |
| sk_BIGNUM_const_value(factors, 0))) |
| goto err; |
| if (!print_labeled_bignum(out, "prime2:", |
| sk_BIGNUM_const_value(factors, 1))) |
| goto err; |
| if (!print_labeled_bignum(out, "exponent1:", |
| sk_BIGNUM_const_value(exps, 0))) |
| goto err; |
| if (!print_labeled_bignum(out, "exponent2:", |
| sk_BIGNUM_const_value(exps, 1))) |
| goto err; |
| if (!print_labeled_bignum(out, "coefficient:", |
| sk_BIGNUM_const_value(coeffs, 0))) |
| goto err; |
| for (i = 2; i < sk_BIGNUM_const_num(factors); i++) { |
| if (BIO_printf(out, "prime%d:", i + 1) <= 0) |
| goto err; |
| if (!print_labeled_bignum(out, NULL, |
| sk_BIGNUM_const_value(factors, i))) |
| goto err; |
| if (BIO_printf(out, "exponent%d:", i + 1) <= 0) |
| goto err; |
| if (!print_labeled_bignum(out, NULL, |
| sk_BIGNUM_const_value(exps, i))) |
| goto err; |
| if (BIO_printf(out, "coefficient%d:", i + 1) <= 0) |
| goto err; |
| if (!print_labeled_bignum(out, NULL, |
| sk_BIGNUM_const_value(coeffs, i - 1))) |
| goto err; |
| } |
| } |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) { |
| switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) { |
| case RSA_FLAG_TYPE_RSA: |
| if (!ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { |
| if (BIO_printf(out, "(INVALID PSS PARAMETERS)\n") <= 0) |
| goto err; |
| } |
| break; |
| case RSA_FLAG_TYPE_RSASSAPSS: |
| if (ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { |
| if (BIO_printf(out, "No PSS parameter restrictions\n") <= 0) |
| goto err; |
| } else { |
| int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss_params); |
| int maskgenalg_nid = |
| ossl_rsa_pss_params_30_maskgenalg(pss_params); |
| int maskgenhashalg_nid = |
| ossl_rsa_pss_params_30_maskgenhashalg(pss_params); |
| int saltlen = ossl_rsa_pss_params_30_saltlen(pss_params); |
| int trailerfield = |
| ossl_rsa_pss_params_30_trailerfield(pss_params); |
| |
| if (BIO_printf(out, "PSS parameter restrictions:\n") <= 0) |
| goto err; |
| if (BIO_printf(out, " Hash Algorithm: %s%s\n", |
| ossl_rsa_oaeppss_nid2name(hashalg_nid), |
| (hashalg_nid == NID_sha1 |
| ? " (default)" : "")) <= 0) |
| goto err; |
| if (BIO_printf(out, " Mask Algorithm: %s with %s%s\n", |
| ossl_rsa_mgf_nid2name(maskgenalg_nid), |
| ossl_rsa_oaeppss_nid2name(maskgenhashalg_nid), |
| (maskgenalg_nid == NID_mgf1 |
| && maskgenhashalg_nid == NID_sha1 |
| ? " (default)" : "")) <= 0) |
| goto err; |
| if (BIO_printf(out, " Minimum Salt Length: %d%s\n", |
| saltlen, |
| (saltlen == 20 ? " (default)" : "")) <= 0) |
| goto err; |
| if (BIO_printf(out, " Trailer Field: 0x%x%s\n", |
| trailerfield, |
| (trailerfield == 1 ? " (default)" : "")) <= 0) |
| goto err; |
| } |
| break; |
| } |
| } |
| |
| ret = 1; |
| err: |
| sk_BIGNUM_const_free(factors); |
| sk_BIGNUM_const_free(exps); |
| sk_BIGNUM_const_free(coeffs); |
| return ret; |
| } |
| |
| #define rsa_input_type "RSA" |
| #define rsapss_input_type "RSA-PSS" |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| static void *key2text_newctx(void *provctx) |
| { |
| return provctx; |
| } |
| |
| static void key2text_freectx(ossl_unused void *vctx) |
| { |
| } |
| |
| static int key2text_encode(void *vctx, const void *key, int selection, |
| OSSL_CORE_BIO *cout, |
| int (*key2text)(BIO *out, const void *key, |
| int selection), |
| OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg) |
| { |
| BIO *out = ossl_bio_new_from_core_bio(vctx, cout); |
| int ret; |
| |
| if (out == NULL) |
| return 0; |
| |
| ret = key2text(out, key, selection); |
| BIO_free(out); |
| |
| return ret; |
| } |
| |
| #define MAKE_TEXT_ENCODER(impl, type) \ |
| static OSSL_FUNC_encoder_import_object_fn \ |
| impl##2text_import_object; \ |
| static OSSL_FUNC_encoder_free_object_fn \ |
| impl##2text_free_object; \ |
| static OSSL_FUNC_encoder_encode_fn impl##2text_encode; \ |
| \ |
| static void *impl##2text_import_object(void *ctx, int selection, \ |
| const OSSL_PARAM params[]) \ |
| { \ |
| return ossl_prov_import_key(ossl_##impl##_keymgmt_functions, \ |
| ctx, selection, params); \ |
| } \ |
| static void impl##2text_free_object(void *key) \ |
| { \ |
| ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key); \ |
| } \ |
| static int impl##2text_encode(void *vctx, OSSL_CORE_BIO *cout, \ |
| const void *key, \ |
| const OSSL_PARAM key_abstract[], \ |
| int selection, \ |
| OSSL_PASSPHRASE_CALLBACK *cb, \ |
| void *cbarg) \ |
| { \ |
| /* We don't deal with abstract objects */ \ |
| if (key_abstract != NULL) { \ |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ |
| return 0; \ |
| } \ |
| return key2text_encode(vctx, key, selection, cout, \ |
| type##_to_text, cb, cbarg); \ |
| } \ |
| const OSSL_DISPATCH ossl_##impl##_to_text_encoder_functions[] = { \ |
| { OSSL_FUNC_ENCODER_NEWCTX, \ |
| (void (*)(void))key2text_newctx }, \ |
| { OSSL_FUNC_ENCODER_FREECTX, \ |
| (void (*)(void))key2text_freectx }, \ |
| { OSSL_FUNC_ENCODER_IMPORT_OBJECT, \ |
| (void (*)(void))impl##2text_import_object }, \ |
| { OSSL_FUNC_ENCODER_FREE_OBJECT, \ |
| (void (*)(void))impl##2text_free_object }, \ |
| { OSSL_FUNC_ENCODER_ENCODE, \ |
| (void (*)(void))impl##2text_encode }, \ |
| { 0, NULL } \ |
| } |
| |
| #ifndef OPENSSL_NO_DH |
| MAKE_TEXT_ENCODER(dh, dh); |
| MAKE_TEXT_ENCODER(dhx, dh); |
| #endif |
| #ifndef OPENSSL_NO_DSA |
| MAKE_TEXT_ENCODER(dsa, dsa); |
| #endif |
| #ifndef OPENSSL_NO_EC |
| MAKE_TEXT_ENCODER(ec, ec); |
| # ifndef OPENSSL_NO_SM2 |
| MAKE_TEXT_ENCODER(sm2, ec); |
| # endif |
| MAKE_TEXT_ENCODER(ed25519, ecx); |
| MAKE_TEXT_ENCODER(ed448, ecx); |
| MAKE_TEXT_ENCODER(x25519, ecx); |
| MAKE_TEXT_ENCODER(x448, ecx); |
| #endif |
| MAKE_TEXT_ENCODER(rsa, rsa); |
| MAKE_TEXT_ENCODER(rsapss, rsa); |