mirror of
https://github.com/openssl/openssl.git
synced 2025-01-30 14:01:55 +08:00
d40b42ab4c
A provider could be linked against a different version of libcrypto than the version of libcrypto that loaded the provider. Different versions of libcrypto could define opaque types differently. It must never occur that a type created in one libcrypto is used directly by the other libcrypto. This will cause crashes. We can "cheat" for "built-in" providers that are part of libcrypto itself, because we know that the two libcrypto versions are the same - but not for other providers. To ensure this does not occur we use different types names for the handful of opaque types that are passed between the core and providers. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11758)
291 lines
9.2 KiB
C
291 lines
9.2 KiB
C
/*
|
|
* Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/*
|
|
* DSA low level APIs are deprecated for public use, but still ok for
|
|
* internal use.
|
|
*/
|
|
#include "internal/deprecated.h"
|
|
|
|
#include <openssl/core_numbers.h>
|
|
#include <openssl/core_names.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/dsa.h>
|
|
#include <openssl/types.h>
|
|
#include <openssl/params.h>
|
|
#include "prov/bio.h"
|
|
#include "prov/implementations.h"
|
|
#include "prov/provider_ctx.h"
|
|
#include "serializer_local.h"
|
|
|
|
static OSSL_OP_serializer_newctx_fn dsa_priv_newctx;
|
|
static OSSL_OP_serializer_freectx_fn dsa_priv_freectx;
|
|
static OSSL_OP_serializer_set_ctx_params_fn dsa_priv_set_ctx_params;
|
|
static OSSL_OP_serializer_settable_ctx_params_fn dsa_priv_settable_ctx_params;
|
|
static OSSL_OP_serializer_serialize_data_fn dsa_priv_der_data;
|
|
static OSSL_OP_serializer_serialize_object_fn dsa_priv_der;
|
|
static OSSL_OP_serializer_serialize_data_fn dsa_pem_priv_data;
|
|
static OSSL_OP_serializer_serialize_object_fn dsa_pem_priv;
|
|
|
|
static OSSL_OP_serializer_newctx_fn dsa_print_newctx;
|
|
static OSSL_OP_serializer_freectx_fn dsa_print_freectx;
|
|
static OSSL_OP_serializer_serialize_data_fn dsa_priv_print_data;
|
|
static OSSL_OP_serializer_serialize_object_fn dsa_priv_print;
|
|
|
|
/*
|
|
* Context used for private key serialization.
|
|
*/
|
|
struct dsa_priv_ctx_st {
|
|
void *provctx;
|
|
|
|
struct pkcs8_encrypt_ctx_st sc;
|
|
};
|
|
|
|
/* Private key : context */
|
|
static void *dsa_priv_newctx(void *provctx)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx));
|
|
|
|
if (ctx != NULL) {
|
|
ctx->provctx = provctx;
|
|
|
|
/* -1 is the "whatever" indicator, i.e. the PKCS8 library default PBE */
|
|
ctx->sc.pbe_nid = -1;
|
|
}
|
|
return ctx;
|
|
}
|
|
|
|
static void dsa_priv_freectx(void *vctx)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
|
|
EVP_CIPHER_free(ctx->sc.cipher);
|
|
OPENSSL_free(ctx->sc.cipher_pass);
|
|
OPENSSL_free(ctx);
|
|
}
|
|
|
|
static const OSSL_PARAM *dsa_priv_settable_ctx_params(void)
|
|
{
|
|
static const OSSL_PARAM settables[] = {
|
|
OSSL_PARAM_utf8_string(OSSL_SERIALIZER_PARAM_CIPHER, NULL, 0),
|
|
OSSL_PARAM_octet_string(OSSL_SERIALIZER_PARAM_PASS, NULL, 0),
|
|
OSSL_PARAM_END,
|
|
};
|
|
|
|
return settables;
|
|
}
|
|
|
|
static int dsa_priv_set_ctx_params(void *vctx, const OSSL_PARAM params[])
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
const OSSL_PARAM *p;
|
|
|
|
if ((p = OSSL_PARAM_locate_const(params, OSSL_SERIALIZER_PARAM_CIPHER))
|
|
!= NULL) {
|
|
const OSSL_PARAM *propsp =
|
|
OSSL_PARAM_locate_const(params, OSSL_SERIALIZER_PARAM_PROPERTIES);
|
|
const char *props = NULL;
|
|
|
|
if (p->data_type != OSSL_PARAM_UTF8_STRING)
|
|
return 0;
|
|
if (propsp != NULL && propsp->data_type != OSSL_PARAM_UTF8_STRING)
|
|
return 0;
|
|
props = (propsp != NULL ? propsp->data : NULL);
|
|
|
|
EVP_CIPHER_free(ctx->sc.cipher);
|
|
ctx->sc.cipher_intent = p->data != NULL;
|
|
if (p->data != NULL
|
|
&& ((ctx->sc.cipher = EVP_CIPHER_fetch(NULL, p->data, props))
|
|
== NULL))
|
|
return 0;
|
|
}
|
|
if ((p = OSSL_PARAM_locate_const(params, OSSL_SERIALIZER_PARAM_PASS))
|
|
!= NULL) {
|
|
OPENSSL_free(ctx->sc.cipher_pass);
|
|
ctx->sc.cipher_pass = NULL;
|
|
if (!OSSL_PARAM_get_octet_string(p, &ctx->sc.cipher_pass, 0,
|
|
&ctx->sc.cipher_pass_length))
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
/* Private key : DER */
|
|
static int dsa_priv_der_data(void *vctx, const OSSL_PARAM params[],
|
|
OSSL_CORE_BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
OSSL_OP_keymgmt_new_fn *dsa_new = ossl_prov_get_keymgmt_dsa_new();
|
|
OSSL_OP_keymgmt_free_fn *dsa_free = ossl_prov_get_keymgmt_dsa_free();
|
|
OSSL_OP_keymgmt_import_fn *dsa_import = ossl_prov_get_keymgmt_dsa_import();
|
|
int ok = 0;
|
|
|
|
if (dsa_import != NULL) {
|
|
DSA *dsa;
|
|
|
|
if ((dsa = dsa_new(ctx->provctx)) != NULL
|
|
&& dsa_import(dsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& dsa_priv_der(ctx, dsa, out, cb, cbarg))
|
|
ok = 1;
|
|
dsa_free(dsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int dsa_priv_der(void *vctx, void *dsa, OSSL_CORE_BIO *cout,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
BIO *out = bio_new_from_core_bio(ctx->provctx, cout);
|
|
int ret;
|
|
|
|
if (out == NULL)
|
|
return 0;
|
|
|
|
ctx->sc.cb = cb;
|
|
ctx->sc.cbarg = cbarg;
|
|
|
|
ret = ossl_prov_write_priv_der_from_obj(out, dsa, EVP_PKEY_DSA,
|
|
ossl_prov_prepare_dsa_params,
|
|
ossl_prov_dsa_priv_to_der,
|
|
&ctx->sc);
|
|
BIO_free(out);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Private key : PEM */
|
|
static int dsa_pem_priv_data(void *vctx, const OSSL_PARAM params[],
|
|
OSSL_CORE_BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
OSSL_OP_keymgmt_new_fn *dsa_new = ossl_prov_get_keymgmt_dsa_new();
|
|
OSSL_OP_keymgmt_free_fn *dsa_free = ossl_prov_get_keymgmt_dsa_free();
|
|
OSSL_OP_keymgmt_import_fn *dsa_import = ossl_prov_get_keymgmt_dsa_import();
|
|
int ok = 0;
|
|
|
|
if (dsa_import != NULL) {
|
|
DSA *dsa;
|
|
|
|
if ((dsa = dsa_new(ctx->provctx)) != NULL
|
|
&& dsa_import(dsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& dsa_pem_priv(ctx, dsa, out, cb, cbarg))
|
|
ok = 1;
|
|
dsa_free(dsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int dsa_pem_priv(void *vctx, void *dsa, OSSL_CORE_BIO *cout,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
BIO *out = bio_new_from_core_bio(ctx->provctx, cout);
|
|
int ret;
|
|
|
|
if (out == NULL)
|
|
return 0;
|
|
|
|
ctx->sc.cb = cb;
|
|
ctx->sc.cbarg = cbarg;
|
|
|
|
ret = ossl_prov_write_priv_pem_from_obj(out, dsa, EVP_PKEY_DSA,
|
|
ossl_prov_prepare_dsa_params,
|
|
ossl_prov_dsa_priv_to_der,
|
|
&ctx->sc);
|
|
BIO_free(out);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* There's no specific print context, so we use the provider context
|
|
*/
|
|
static void *dsa_print_newctx(void *provctx)
|
|
{
|
|
return provctx;
|
|
}
|
|
|
|
static void dsa_print_freectx(void *ctx)
|
|
{
|
|
}
|
|
|
|
static int dsa_priv_print_data(void *vctx, const OSSL_PARAM params[],
|
|
OSSL_CORE_BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
struct dsa_priv_ctx_st *ctx = vctx;
|
|
OSSL_OP_keymgmt_new_fn *dsa_new = ossl_prov_get_keymgmt_dsa_new();
|
|
OSSL_OP_keymgmt_free_fn *dsa_free = ossl_prov_get_keymgmt_dsa_free();
|
|
OSSL_OP_keymgmt_import_fn *dsa_import = ossl_prov_get_keymgmt_dsa_import();
|
|
int ok = 0;
|
|
|
|
if (dsa_import != NULL) {
|
|
DSA *dsa;
|
|
|
|
if ((dsa = dsa_new(ctx->provctx)) != NULL
|
|
&& dsa_import(dsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& dsa_priv_print(ctx, dsa, out, cb, cbarg))
|
|
ok = 1;
|
|
dsa_free(dsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int dsa_priv_print(void *ctx, void *dsa, OSSL_CORE_BIO *cout,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
BIO *out = bio_new_from_core_bio(ctx, cout);
|
|
int ret;
|
|
|
|
if (out == NULL)
|
|
return 0;
|
|
|
|
ret = ossl_prov_print_dsa(out, dsa, dsa_print_priv);
|
|
BIO_free(out);
|
|
|
|
return ret;
|
|
}
|
|
|
|
const OSSL_DISPATCH dsa_priv_der_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))dsa_priv_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))dsa_priv_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SET_CTX_PARAMS,
|
|
(void (*)(void))dsa_priv_set_ctx_params },
|
|
{ OSSL_FUNC_SERIALIZER_SETTABLE_CTX_PARAMS,
|
|
(void (*)(void))dsa_priv_settable_ctx_params },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))dsa_priv_der_data },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))dsa_priv_der },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
const OSSL_DISPATCH dsa_priv_pem_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))dsa_priv_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))dsa_priv_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SET_CTX_PARAMS,
|
|
(void (*)(void))dsa_priv_set_ctx_params },
|
|
{ OSSL_FUNC_SERIALIZER_SETTABLE_CTX_PARAMS,
|
|
(void (*)(void))dsa_priv_settable_ctx_params },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))dsa_pem_priv_data },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))dsa_pem_priv },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
const OSSL_DISPATCH dsa_priv_text_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))dsa_print_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))dsa_print_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))dsa_priv_print },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA,
|
|
(void (*)(void))dsa_priv_print_data },
|
|
{ 0, NULL }
|
|
};
|