2020-10-04 22:34:31 +08:00
|
|
|
/*
|
2021-01-28 20:54:57 +08:00
|
|
|
* Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2020-10-04 22:34:31 +08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Legacy EVP_PKEY assign/set/get APIs are deprecated for public use, but
|
|
|
|
* still ok for internal use, particularly in providers.
|
|
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
|
|
|
#include <openssl/types.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/rsa.h>
|
2020-10-15 11:41:59 +08:00
|
|
|
#include <openssl/ec.h>
|
2020-10-04 22:34:31 +08:00
|
|
|
#include "crypto/types.h"
|
|
|
|
#include "crypto/evp.h"
|
|
|
|
#include "evp_local.h"
|
|
|
|
|
|
|
|
int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key)
|
|
|
|
{
|
|
|
|
int ret = EVP_PKEY_assign_RSA(pkey, key);
|
2020-10-15 11:41:59 +08:00
|
|
|
|
2020-10-04 22:34:31 +08:00
|
|
|
if (ret)
|
|
|
|
RSA_up_ref(key);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-03-02 23:52:00 +08:00
|
|
|
RSA *evp_pkey_get0_RSA_int(const EVP_PKEY *pkey)
|
2020-10-04 22:34:31 +08:00
|
|
|
{
|
|
|
|
if (pkey->type != EVP_PKEY_RSA && pkey->type != EVP_PKEY_RSA_PSS) {
|
|
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_EXPECTING_AN_RSA_KEY);
|
|
|
|
return NULL;
|
|
|
|
}
|
2021-02-25 00:38:28 +08:00
|
|
|
return evp_pkey_get_legacy((EVP_PKEY *)pkey);
|
2020-10-04 22:34:31 +08:00
|
|
|
}
|
|
|
|
|
2021-03-02 23:52:00 +08:00
|
|
|
const RSA *EVP_PKEY_get0_RSA(const EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
return evp_pkey_get0_RSA_int(pkey);
|
|
|
|
}
|
|
|
|
|
2020-10-04 22:34:31 +08:00
|
|
|
RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey)
|
|
|
|
{
|
2021-03-02 23:52:00 +08:00
|
|
|
RSA *ret = evp_pkey_get0_RSA_int(pkey);
|
2020-10-15 11:41:59 +08:00
|
|
|
|
2020-10-04 22:34:31 +08:00
|
|
|
if (ret != NULL)
|
|
|
|
RSA_up_ref(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
2020-10-15 11:41:59 +08:00
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_EC
|
|
|
|
int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key)
|
|
|
|
{
|
2021-03-19 07:40:05 +08:00
|
|
|
if (!EC_KEY_up_ref(key))
|
|
|
|
return 0;
|
|
|
|
if (!EVP_PKEY_assign_EC_KEY(pkey, key)) {
|
|
|
|
EC_KEY_free(key);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
2020-10-15 11:41:59 +08:00
|
|
|
}
|
|
|
|
|
2021-03-02 23:52:00 +08:00
|
|
|
EC_KEY *evp_pkey_get0_EC_KEY_int(const EVP_PKEY *pkey)
|
2020-10-15 11:41:59 +08:00
|
|
|
{
|
|
|
|
if (EVP_PKEY_base_id(pkey) != EVP_PKEY_EC) {
|
2021-03-02 23:52:00 +08:00
|
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_EXPECTING_A_EC_KEY);
|
2020-10-15 11:41:59 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
2021-02-25 00:38:28 +08:00
|
|
|
return evp_pkey_get_legacy((EVP_PKEY *)pkey);
|
2020-10-15 11:41:59 +08:00
|
|
|
}
|
|
|
|
|
2021-03-02 23:52:00 +08:00
|
|
|
const EC_KEY *EVP_PKEY_get0_EC_KEY(const EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
return evp_pkey_get0_EC_KEY_int(pkey);
|
|
|
|
}
|
|
|
|
|
2020-10-15 11:41:59 +08:00
|
|
|
EC_KEY *EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey)
|
|
|
|
{
|
2021-03-02 23:52:00 +08:00
|
|
|
EC_KEY *ret = evp_pkey_get0_EC_KEY_int(pkey);
|
2020-10-15 11:41:59 +08:00
|
|
|
|
2021-03-19 07:40:05 +08:00
|
|
|
if (ret != NULL && !EC_KEY_up_ref(ret))
|
|
|
|
ret = NULL;
|
2020-10-15 11:41:59 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* OPENSSL_NO_EC */
|