mirror of
https://github.com/openssl/openssl.git
synced 2025-01-12 13:36:28 +08:00
9311d0c471
This includes error reporting for libcrypto sub-libraries in surprising places. This was done using util/err-to-raise Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/13318)
181 lines
4.4 KiB
C
181 lines
4.4 KiB
C
/*
|
|
* Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include "internal/cryptlib.h"
|
|
#include <openssl/objects.h>
|
|
#include <openssl/evp.h>
|
|
#include "crypto/bn.h"
|
|
#include "crypto/asn1.h"
|
|
#include "crypto/evp.h"
|
|
#include "evp_local.h"
|
|
|
|
/*
|
|
* Returns:
|
|
* 1 True
|
|
* 0 False
|
|
* -1 Unsupported (use legacy path)
|
|
*/
|
|
static int try_provided_check(EVP_PKEY_CTX *ctx, int selection)
|
|
{
|
|
EVP_KEYMGMT *keymgmt;
|
|
void *keydata;
|
|
|
|
if (evp_pkey_ctx_is_legacy(ctx))
|
|
return -1;
|
|
|
|
keymgmt = ctx->keymgmt;
|
|
keydata = evp_pkey_export_to_provider(ctx->pkey, ctx->libctx,
|
|
&keymgmt, ctx->propquery);
|
|
if (keydata == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_INITIALIZATION_ERROR);
|
|
return 0;
|
|
}
|
|
|
|
return evp_keymgmt_validate(keymgmt, keydata, selection);
|
|
}
|
|
|
|
int EVP_PKEY_public_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
int ok;
|
|
|
|
if (pkey == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
if ((ok = try_provided_check(ctx, OSSL_KEYMGMT_SELECT_PUBLIC_KEY)) != -1)
|
|
return ok;
|
|
|
|
if (pkey->type == EVP_PKEY_NONE)
|
|
goto not_supported;
|
|
|
|
#ifndef FIPS_MODULE
|
|
/* legacy */
|
|
/* call customized public key check function first */
|
|
if (ctx->pmeth->public_check != NULL)
|
|
return ctx->pmeth->public_check(pkey);
|
|
|
|
/* use default public key check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_public_check == NULL)
|
|
goto not_supported;
|
|
|
|
return pkey->ameth->pkey_public_check(pkey);
|
|
#endif
|
|
not_supported:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
int EVP_PKEY_param_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
int ok;
|
|
|
|
if (pkey == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
if ((ok = try_provided_check(ctx,
|
|
OSSL_KEYMGMT_SELECT_ALL_PARAMETERS)) != -1)
|
|
return ok;
|
|
|
|
if (pkey->type == EVP_PKEY_NONE)
|
|
goto not_supported;
|
|
|
|
#ifndef FIPS_MODULE
|
|
/* legacy */
|
|
/* call customized param check function first */
|
|
if (ctx->pmeth->param_check != NULL)
|
|
return ctx->pmeth->param_check(pkey);
|
|
|
|
/* use default param check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_param_check == NULL)
|
|
goto not_supported;
|
|
|
|
return pkey->ameth->pkey_param_check(pkey);
|
|
#endif
|
|
not_supported:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
int EVP_PKEY_private_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
int ok;
|
|
|
|
if (pkey == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
if ((ok = try_provided_check(ctx, OSSL_KEYMGMT_SELECT_PRIVATE_KEY)) != -1)
|
|
return ok;
|
|
|
|
/* not supported for legacy keys */
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
int EVP_PKEY_pairwise_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
int ok;
|
|
|
|
if (pkey == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
if ((ok = try_provided_check(ctx, OSSL_KEYMGMT_SELECT_KEYPAIR)) != -1)
|
|
return ok;
|
|
|
|
/* not supported for legacy keys */
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|
|
int EVP_PKEY_check(EVP_PKEY_CTX *ctx)
|
|
{
|
|
EVP_PKEY *pkey = ctx->pkey;
|
|
int ok;
|
|
|
|
if (pkey == NULL) {
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_NO_KEY_SET);
|
|
return 0;
|
|
}
|
|
|
|
if ((ok = try_provided_check(ctx, OSSL_KEYMGMT_SELECT_KEYPAIR)) != -1)
|
|
return ok;
|
|
|
|
if (pkey->type == EVP_PKEY_NONE)
|
|
goto not_supported;
|
|
|
|
#ifndef FIPS_MODULE
|
|
/* legacy */
|
|
/* call customized check function first */
|
|
if (ctx->pmeth->check != NULL)
|
|
return ctx->pmeth->check(pkey);
|
|
|
|
/* use default check function in ameth */
|
|
if (pkey->ameth == NULL || pkey->ameth->pkey_check == NULL)
|
|
goto not_supported;
|
|
|
|
return pkey->ameth->pkey_check(pkey);
|
|
#endif
|
|
not_supported:
|
|
ERR_raise(ERR_LIB_EVP, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE);
|
|
return -2;
|
|
}
|
|
|