mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
c5f8713443
Use of the low level RSA functions has been informally discouraged for a long time. We now formally deprecate them. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11063)
157 lines
5.1 KiB
C
157 lines
5.1 KiB
C
/*
|
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/*
|
|
* RSA low level APIs are deprecated for public use, but still ok for
|
|
* internal use.
|
|
*/
|
|
#include "internal/deprecated.h"
|
|
|
|
#include <openssl/core_numbers.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/types.h>
|
|
#include <openssl/params.h>
|
|
#include "prov/bio.h"
|
|
#include "prov/implementations.h"
|
|
#include "prov/providercommonerr.h"
|
|
#include "serializer_local.h"
|
|
|
|
static OSSL_OP_serializer_newctx_fn rsa_pub_newctx;
|
|
static OSSL_OP_serializer_freectx_fn rsa_pub_freectx;
|
|
static OSSL_OP_serializer_serialize_data_fn rsa_pub_der_data;
|
|
static OSSL_OP_serializer_serialize_object_fn rsa_pub_der;
|
|
static OSSL_OP_serializer_serialize_data_fn rsa_pub_pem_data;
|
|
static OSSL_OP_serializer_serialize_object_fn rsa_pub_pem;
|
|
|
|
static OSSL_OP_serializer_serialize_data_fn rsa_pub_print_data;
|
|
static OSSL_OP_serializer_serialize_object_fn rsa_pub_print;
|
|
|
|
/* Public key : context */
|
|
|
|
/*
|
|
* There's no specific implementation context, so we use the provider context
|
|
*/
|
|
static void *rsa_pub_newctx(void *provctx)
|
|
{
|
|
return provctx;
|
|
}
|
|
|
|
static void rsa_pub_freectx(void *ctx)
|
|
{
|
|
}
|
|
|
|
/* Public key : DER */
|
|
static int rsa_pub_der_data(void *ctx, const OSSL_PARAM params[], BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
|
|
OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
|
|
OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
|
|
int ok = 0;
|
|
|
|
if (rsa_import != NULL) {
|
|
RSA *rsa;
|
|
|
|
/* ctx == provctx */
|
|
if ((rsa = rsa_new(ctx)) != NULL
|
|
&& rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& rsa_pub_der(ctx, rsa, out, cb, cbarg))
|
|
ok = 1;
|
|
rsa_free(rsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int rsa_pub_der(void *ctx, void *rsa, BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
return i2d_RSA_PUBKEY_bio(out, rsa);
|
|
}
|
|
|
|
/* Public key : PEM */
|
|
static int rsa_pub_pem_data(void *ctx, const OSSL_PARAM params[], BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
|
|
OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
|
|
OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
|
|
int ok = 0;
|
|
|
|
if (rsa_import != NULL) {
|
|
RSA *rsa;
|
|
|
|
/* ctx == provctx */
|
|
if ((rsa = rsa_new(ctx)) != NULL
|
|
&& rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& rsa_pub_pem(ctx, rsa, out, cb, cbarg))
|
|
ok = 1;
|
|
rsa_free(rsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int rsa_pub_pem(void *ctx, void *rsa, BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
return PEM_write_bio_RSA_PUBKEY(out, rsa);
|
|
}
|
|
|
|
static int rsa_pub_print_data(void *ctx, const OSSL_PARAM params[], BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
OSSL_OP_keymgmt_new_fn *rsa_new = ossl_prov_get_keymgmt_rsa_new();
|
|
OSSL_OP_keymgmt_free_fn *rsa_free = ossl_prov_get_keymgmt_rsa_free();
|
|
OSSL_OP_keymgmt_import_fn *rsa_import = ossl_prov_get_keymgmt_rsa_import();
|
|
int ok = 0;
|
|
|
|
if (rsa_import != NULL) {
|
|
RSA *rsa;
|
|
|
|
/* ctx == provctx */
|
|
if ((rsa = rsa_new(ctx)) != NULL
|
|
&& rsa_import(rsa, OSSL_KEYMGMT_SELECT_KEYPAIR, params)
|
|
&& rsa_pub_print(ctx, rsa, out, cb, cbarg))
|
|
ok = 1;
|
|
rsa_free(rsa);
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
static int rsa_pub_print(void *ctx, void *rsa, BIO *out,
|
|
OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
|
|
{
|
|
return ossl_prov_print_rsa(out, rsa, 0);
|
|
}
|
|
|
|
const OSSL_DISPATCH rsa_pub_der_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))rsa_pub_der_data },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_der },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
const OSSL_DISPATCH rsa_pub_pem_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA, (void (*)(void))rsa_pub_pem_data },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_pem },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
const OSSL_DISPATCH rsa_pub_text_serializer_functions[] = {
|
|
{ OSSL_FUNC_SERIALIZER_NEWCTX, (void (*)(void))rsa_pub_newctx },
|
|
{ OSSL_FUNC_SERIALIZER_FREECTX, (void (*)(void))rsa_pub_freectx },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_OBJECT, (void (*)(void))rsa_pub_print },
|
|
{ OSSL_FUNC_SERIALIZER_SERIALIZE_DATA,
|
|
(void (*)(void))rsa_pub_print_data },
|
|
{ 0, NULL }
|
|
};
|