s_lib.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. /*
  2. * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. #include <string.h>
  10. #include <openssl/params.h>
  11. #include <openssl/param_build.h>
  12. #include <openssl/evp.h>
  13. #include <openssl/core_names.h>
  14. #include "internal/common.h"
  15. #include "internal/provider.h"
  16. #include "crypto/evp.h"
  17. #include "evp_local.h"
  18. int EVP_SKEY_export(const EVP_SKEY *skey, int selection,
  19. OSSL_CALLBACK *export_cb, void *export_cbarg)
  20. {
  21. if (skey == NULL) {
  22. ERR_raise(ERR_LIB_EVP, ERR_R_PASSED_NULL_PARAMETER);
  23. return 0;
  24. }
  25. return evp_skeymgmt_export(skey->skeymgmt, skey->keydata, selection, export_cb, export_cbarg);
  26. }
  27. static EVP_SKEY *evp_skey_alloc(EVP_SKEYMGMT *skeymgmt)
  28. {
  29. EVP_SKEY *skey;
  30. if (!ossl_assert(skeymgmt != NULL))
  31. return NULL;
  32. if ((skey = OPENSSL_zalloc(sizeof(*skey))) == NULL)
  33. return NULL;
  34. if (!CRYPTO_NEW_REF(&skey->references, 1))
  35. goto err;
  36. skey->lock = CRYPTO_THREAD_lock_new();
  37. if (skey->lock == NULL) {
  38. ERR_raise(ERR_LIB_EVP, ERR_R_CRYPTO_LIB);
  39. goto err;
  40. }
  41. skey->skeymgmt = skeymgmt;
  42. return skey;
  43. err:
  44. CRYPTO_FREE_REF(&skey->references);
  45. CRYPTO_THREAD_lock_free(skey->lock);
  46. OPENSSL_free(skey);
  47. return NULL;
  48. }
  49. static EVP_SKEY *evp_skey_alloc_fetch(OSSL_LIB_CTX *libctx,
  50. const char *skeymgmtname,
  51. const char *propquery)
  52. {
  53. EVP_SKEYMGMT *skeymgmt;
  54. EVP_SKEY *skey;
  55. skeymgmt = EVP_SKEYMGMT_fetch(libctx, skeymgmtname, propquery);
  56. if (skeymgmt == NULL) {
  57. /*
  58. * if the specific key_type is unknown, attempt to use the generic
  59. * key management
  60. */
  61. skeymgmt = EVP_SKEYMGMT_fetch(libctx, OSSL_SKEY_TYPE_GENERIC, propquery);
  62. if (skeymgmt == NULL) {
  63. ERR_raise(ERR_LIB_EVP, ERR_R_FETCH_FAILED);
  64. return NULL;
  65. }
  66. }
  67. skey = evp_skey_alloc(skeymgmt);
  68. if (skey == NULL)
  69. EVP_SKEYMGMT_free(skeymgmt);
  70. return skey;
  71. }
  72. EVP_SKEY *EVP_SKEY_import(OSSL_LIB_CTX *libctx, const char *skeymgmtname, const char *propquery,
  73. int selection, const OSSL_PARAM *params)
  74. {
  75. EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery);
  76. if (skey == NULL)
  77. return NULL;
  78. skey->keydata = evp_skeymgmt_import(skey->skeymgmt, selection, params);
  79. if (skey->keydata == NULL)
  80. goto err;
  81. return skey;
  82. err:
  83. EVP_SKEY_free(skey);
  84. return NULL;
  85. }
  86. EVP_SKEY *EVP_SKEY_generate(OSSL_LIB_CTX *libctx, const char *skeymgmtname,
  87. const char *propquery, const OSSL_PARAM *params)
  88. {
  89. EVP_SKEY *skey = evp_skey_alloc_fetch(libctx, skeymgmtname, propquery);
  90. if (skey == NULL)
  91. return NULL;
  92. skey->keydata = evp_skeymgmt_generate(skey->skeymgmt, params);
  93. if (skey->keydata == NULL)
  94. goto err;
  95. return skey;
  96. err:
  97. EVP_SKEY_free(skey);
  98. return NULL;
  99. }
  100. struct raw_key_details_st {
  101. const void **key;
  102. size_t *len;
  103. };
  104. static int get_secret_key(const OSSL_PARAM params[], void *arg)
  105. {
  106. const OSSL_PARAM *p = NULL;
  107. struct raw_key_details_st *raw_key = arg;
  108. if ((p = OSSL_PARAM_locate_const(params, OSSL_SKEY_PARAM_RAW_BYTES)) != NULL)
  109. return OSSL_PARAM_get_octet_string_ptr(p, raw_key->key, raw_key->len);
  110. return 0;
  111. }
  112. int EVP_SKEY_get0_raw_key(const EVP_SKEY *skey, const unsigned char **key,
  113. size_t *len)
  114. {
  115. struct raw_key_details_st raw_key;
  116. if (skey == NULL || key == NULL || len == NULL) {
  117. ERR_raise(ERR_LIB_EVP, ERR_R_PASSED_NULL_PARAMETER);
  118. return 0;
  119. }
  120. raw_key.key = (const void **)key;
  121. raw_key.len = len;
  122. return evp_skeymgmt_export(skey->skeymgmt, skey->keydata,
  123. OSSL_SKEYMGMT_SELECT_SECRET_KEY,
  124. get_secret_key, &raw_key);
  125. }
  126. EVP_SKEY *EVP_SKEY_import_raw_key(OSSL_LIB_CTX *libctx, const char *skeymgmtname,
  127. unsigned char *key, size_t keylen,
  128. const char *propquery)
  129. {
  130. OSSL_PARAM params[2];
  131. params[0] = OSSL_PARAM_construct_octet_string(OSSL_SKEY_PARAM_RAW_BYTES,
  132. (void *)key, keylen);
  133. params[1] = OSSL_PARAM_construct_end();
  134. return EVP_SKEY_import(libctx, skeymgmtname, propquery,
  135. OSSL_SKEYMGMT_SELECT_SECRET_KEY, params);
  136. }
  137. int EVP_SKEY_up_ref(EVP_SKEY *skey)
  138. {
  139. int i;
  140. if (CRYPTO_UP_REF(&skey->references, &i) <= 0)
  141. return 0;
  142. REF_PRINT_COUNT("EVP_SKEY", i, skey);
  143. REF_ASSERT_ISNT(i < 2);
  144. return i > 1 ? 1 : 0;
  145. }
  146. void EVP_SKEY_free(EVP_SKEY *skey)
  147. {
  148. int i;
  149. if (skey == NULL)
  150. return;
  151. CRYPTO_DOWN_REF(&skey->references, &i);
  152. REF_PRINT_COUNT("EVP_SKEY", i, skey);
  153. if (i > 0)
  154. return;
  155. REF_ASSERT_ISNT(i < 0);
  156. evp_skeymgmt_freedata(skey->skeymgmt, skey->keydata);
  157. EVP_SKEYMGMT_free(skey->skeymgmt);
  158. CRYPTO_THREAD_lock_free(skey->lock);
  159. CRYPTO_FREE_REF(&skey->references);
  160. OPENSSL_free(skey);
  161. }
  162. const char *EVP_SKEY_get0_key_id(const EVP_SKEY *skey)
  163. {
  164. if (skey == NULL)
  165. return NULL;
  166. if (skey->skeymgmt->get_key_id)
  167. return skey->skeymgmt->get_key_id(skey->keydata);
  168. return NULL;
  169. }
  170. const char *EVP_SKEY_get0_skeymgmt_name(const EVP_SKEY *skey)
  171. {
  172. if (skey == NULL)
  173. return NULL;
  174. return skey->skeymgmt->type_name;
  175. }
  176. const char *EVP_SKEY_get0_provider_name(const EVP_SKEY *skey)
  177. {
  178. if (skey == NULL)
  179. return NULL;
  180. return ossl_provider_name(skey->skeymgmt->prov);
  181. }
  182. int EVP_SKEY_is_a(const EVP_SKEY *skey, const char *name)
  183. {
  184. if (skey == NULL)
  185. return 0;
  186. return EVP_SKEYMGMT_is_a(skey->skeymgmt, name);
  187. }
  188. struct transfer_cb_ctx {
  189. int selection;
  190. EVP_SKEYMGMT *skeymgmt;
  191. void *keydata;
  192. };
  193. static int transfer_cb(const OSSL_PARAM params[], void *arg)
  194. {
  195. struct transfer_cb_ctx *ctx = arg;
  196. ctx->keydata = evp_skeymgmt_import(ctx->skeymgmt, ctx->selection, params);
  197. return 1;
  198. }
  199. EVP_SKEY *EVP_SKEY_to_provider(EVP_SKEY *skey, OSSL_LIB_CTX *libctx,
  200. OSSL_PROVIDER *prov, const char *propquery)
  201. {
  202. struct transfer_cb_ctx ctx = { 0 };
  203. EVP_SKEYMGMT *skeymgmt = NULL;
  204. EVP_SKEY *ret = NULL;
  205. if (skey == NULL) {
  206. ERR_raise(ERR_LIB_EVP, ERR_R_PASSED_NULL_PARAMETER);
  207. return NULL;
  208. }
  209. if (prov != NULL) {
  210. if (skey->skeymgmt->prov == prov)
  211. skeymgmt = skey->skeymgmt;
  212. else
  213. skeymgmt = evp_skeymgmt_fetch_from_prov(prov, skey->skeymgmt->type_name,
  214. propquery);
  215. } else {
  216. /* If no provider, get the default skeymgmt */
  217. skeymgmt = EVP_SKEYMGMT_fetch(libctx, skey->skeymgmt->type_name,
  218. propquery);
  219. }
  220. if (skeymgmt == NULL) {
  221. ERR_raise(ERR_LIB_EVP, ERR_R_FETCH_FAILED);
  222. return NULL;
  223. }
  224. /* Short-circuit if destination provider is the same as origin */
  225. if (skey->skeymgmt->name_id == skeymgmt->name_id
  226. && skey->skeymgmt->prov == skeymgmt->prov) {
  227. if (!EVP_SKEY_up_ref(skey))
  228. goto err;
  229. EVP_SKEYMGMT_free(skeymgmt);
  230. return skey;
  231. }
  232. ctx.selection = OSSL_SKEYMGMT_SELECT_ALL;
  233. ctx.skeymgmt = skeymgmt;
  234. if (!EVP_SKEY_export(skey, ctx.selection, transfer_cb, &ctx))
  235. goto err;
  236. if (ctx.keydata == NULL)
  237. goto err;
  238. ret = evp_skey_alloc(skeymgmt);
  239. if (ret == NULL)
  240. goto err;
  241. ret->keydata = ctx.keydata;
  242. return ret;
  243. err:
  244. EVP_SKEYMGMT_free(skeymgmt);
  245. EVP_SKEY_free(ret);
  246. return NULL;
  247. }