| 1 | /* |
| 2 | * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved. |
| 3 | * |
| 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
| 5 | * this file except in compliance with the License. You can obtain a copy |
| 6 | * in the file LICENSE in the source distribution or at |
| 7 | * https://www.openssl.org/source/license.html |
| 8 | */ |
| 9 | |
| 10 | #include <openssl/crypto.h> |
| 11 | #include <openssl/core_numbers.h> |
| 12 | #include <openssl/evp.h> |
| 13 | #include <openssl/err.h> |
| 14 | #include "internal/provider.h" |
| 15 | #include "internal/refcount.h" |
| 16 | #include "crypto/evp.h" |
| 17 | #include "evp_local.h" |
| 18 | |
| 19 | |
| 20 | static void *keymgmt_new(void) |
| 21 | { |
| 22 | EVP_KEYMGMT *keymgmt = NULL; |
| 23 | |
| 24 | if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL |
| 25 | || (keymgmt->lock = CRYPTO_THREAD_lock_new()) == NULL) { |
| 26 | EVP_KEYMGMT_free(keymgmt); |
| 27 | EVPerr(0, ERR_R_MALLOC_FAILURE); |
| 28 | return NULL; |
| 29 | } |
| 30 | |
| 31 | keymgmt->refcnt = 1; |
| 32 | |
| 33 | return keymgmt; |
| 34 | } |
| 35 | |
| 36 | static void *keymgmt_from_dispatch(int name_id, |
| 37 | const OSSL_DISPATCH *fns, |
| 38 | OSSL_PROVIDER *prov) |
| 39 | { |
| 40 | EVP_KEYMGMT *keymgmt = NULL; |
| 41 | |
| 42 | if ((keymgmt = keymgmt_new()) == NULL) { |
| 43 | EVP_KEYMGMT_free(keymgmt); |
| 44 | return NULL; |
| 45 | } |
| 46 | keymgmt->name_id = name_id; |
| 47 | |
| 48 | for (; fns->function_id != 0; fns++) { |
| 49 | switch (fns->function_id) { |
| 50 | case OSSL_FUNC_KEYMGMT_IMPORTDOMPARAMS: |
| 51 | if (keymgmt->importdomparams != NULL) |
| 52 | break; |
| 53 | keymgmt->importdomparams = |
| 54 | OSSL_get_OP_keymgmt_importdomparams(fns); |
| 55 | break; |
| 56 | case OSSL_FUNC_KEYMGMT_GENDOMPARAMS: |
| 57 | if (keymgmt->gendomparams != NULL) |
| 58 | break; |
| 59 | keymgmt->gendomparams = OSSL_get_OP_keymgmt_gendomparams(fns); |
| 60 | break; |
| 61 | case OSSL_FUNC_KEYMGMT_FREEDOMPARAMS: |
| 62 | if (keymgmt->freedomparams != NULL) |
| 63 | break; |
| 64 | keymgmt->freedomparams = OSSL_get_OP_keymgmt_freedomparams(fns); |
| 65 | break; |
| 66 | case OSSL_FUNC_KEYMGMT_EXPORTDOMPARAMS: |
| 67 | if (keymgmt->exportdomparams != NULL) |
| 68 | break; |
| 69 | keymgmt->exportdomparams = |
| 70 | OSSL_get_OP_keymgmt_exportdomparams(fns); |
| 71 | break; |
| 72 | case OSSL_FUNC_KEYMGMT_IMPORTDOMPARAM_TYPES: |
| 73 | if (keymgmt->importdomparam_types != NULL) |
| 74 | break; |
| 75 | keymgmt->importdomparam_types = |
| 76 | OSSL_get_OP_keymgmt_importdomparam_types(fns); |
| 77 | break; |
| 78 | case OSSL_FUNC_KEYMGMT_EXPORTDOMPARAM_TYPES: |
| 79 | if (keymgmt->exportdomparam_types != NULL) |
| 80 | break; |
| 81 | keymgmt->exportdomparam_types = |
| 82 | OSSL_get_OP_keymgmt_exportdomparam_types(fns); |
| 83 | break; |
| 84 | case OSSL_FUNC_KEYMGMT_IMPORTKEY: |
| 85 | if (keymgmt->importkey != NULL) |
| 86 | break; |
| 87 | keymgmt->importkey = OSSL_get_OP_keymgmt_importkey(fns); |
| 88 | break; |
| 89 | case OSSL_FUNC_KEYMGMT_GENKEY: |
| 90 | if (keymgmt->genkey != NULL) |
| 91 | break; |
| 92 | keymgmt->genkey = OSSL_get_OP_keymgmt_genkey(fns); |
| 93 | break; |
| 94 | case OSSL_FUNC_KEYMGMT_LOADKEY: |
| 95 | if (keymgmt->loadkey != NULL) |
| 96 | break; |
| 97 | keymgmt->loadkey = OSSL_get_OP_keymgmt_loadkey(fns); |
| 98 | break; |
| 99 | case OSSL_FUNC_KEYMGMT_FREEKEY: |
| 100 | if (keymgmt->freekey != NULL) |
| 101 | break; |
| 102 | keymgmt->freekey = OSSL_get_OP_keymgmt_freekey(fns); |
| 103 | break; |
| 104 | case OSSL_FUNC_KEYMGMT_EXPORTKEY: |
| 105 | if (keymgmt->exportkey != NULL) |
| 106 | break; |
| 107 | keymgmt->exportkey = OSSL_get_OP_keymgmt_exportkey(fns); |
| 108 | break; |
| 109 | case OSSL_FUNC_KEYMGMT_IMPORTKEY_TYPES: |
| 110 | if (keymgmt->importkey_types != NULL) |
| 111 | break; |
| 112 | keymgmt->importkey_types = |
| 113 | OSSL_get_OP_keymgmt_importkey_types(fns); |
| 114 | break; |
| 115 | case OSSL_FUNC_KEYMGMT_EXPORTKEY_TYPES: |
| 116 | if (keymgmt->exportkey_types != NULL) |
| 117 | break; |
| 118 | keymgmt->exportkey_types = |
| 119 | OSSL_get_OP_keymgmt_exportkey_types(fns); |
| 120 | break; |
| 121 | } |
| 122 | } |
| 123 | /* |
| 124 | * Try to check that the method is sensible. |
| 125 | * It makes no sense being able to free stuff if you can't create it. |
| 126 | * It makes no sense providing OSSL_PARAM descriptors for import and |
| 127 | * export if you can't import or export. |
| 128 | */ |
| 129 | if ((keymgmt->freedomparams != NULL |
| 130 | && (keymgmt->importdomparams == NULL |
| 131 | && keymgmt->gendomparams == NULL)) |
| 132 | || (keymgmt->freekey != NULL |
| 133 | && (keymgmt->importkey == NULL |
| 134 | && keymgmt->genkey == NULL |
| 135 | && keymgmt->loadkey == NULL)) |
| 136 | || (keymgmt->importdomparam_types != NULL |
| 137 | && keymgmt->importdomparams == NULL) |
| 138 | || (keymgmt->exportdomparam_types != NULL |
| 139 | && keymgmt->exportdomparams == NULL) |
| 140 | || (keymgmt->importkey_types != NULL |
| 141 | && keymgmt->importkey == NULL) |
| 142 | || (keymgmt->exportkey_types != NULL |
| 143 | && keymgmt->exportkey == NULL)) { |
| 144 | EVP_KEYMGMT_free(keymgmt); |
| 145 | EVPerr(0, EVP_R_INVALID_PROVIDER_FUNCTIONS); |
| 146 | return NULL; |
| 147 | } |
| 148 | keymgmt->prov = prov; |
| 149 | if (prov != NULL) |
| 150 | ossl_provider_up_ref(prov); |
| 151 | |
| 152 | return keymgmt; |
| 153 | } |
| 154 | |
| 155 | EVP_KEYMGMT *evp_keymgmt_fetch_by_number(OPENSSL_CTX *ctx, int name_id, |
| 156 | const char *properties) |
| 157 | { |
| 158 | return evp_generic_fetch_by_number(ctx, |
| 159 | OSSL_OP_KEYMGMT, name_id, properties, |
| 160 | keymgmt_from_dispatch, |
| 161 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
| 162 | (void (*)(void *))EVP_KEYMGMT_free); |
| 163 | } |
| 164 | |
| 165 | EVP_KEYMGMT *EVP_KEYMGMT_fetch(OPENSSL_CTX *ctx, const char *algorithm, |
| 166 | const char *properties) |
| 167 | { |
| 168 | return evp_generic_fetch(ctx, OSSL_OP_KEYMGMT, algorithm, properties, |
| 169 | keymgmt_from_dispatch, |
| 170 | (int (*)(void *))EVP_KEYMGMT_up_ref, |
| 171 | (void (*)(void *))EVP_KEYMGMT_free); |
| 172 | } |
| 173 | |
| 174 | int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt) |
| 175 | { |
| 176 | int ref = 0; |
| 177 | |
| 178 | CRYPTO_UP_REF(&keymgmt->refcnt, &ref, keymgmt->lock); |
| 179 | return 1; |
| 180 | } |
| 181 | |
| 182 | void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt) |
| 183 | { |
| 184 | int ref = 0; |
| 185 | |
| 186 | if (keymgmt == NULL) |
| 187 | return; |
| 188 | |
| 189 | CRYPTO_DOWN_REF(&keymgmt->refcnt, &ref, keymgmt->lock); |
| 190 | if (ref > 0) |
| 191 | return; |
| 192 | ossl_provider_free(keymgmt->prov); |
| 193 | CRYPTO_THREAD_lock_free(keymgmt->lock); |
| 194 | OPENSSL_free(keymgmt); |
| 195 | } |
| 196 | |
| 197 | const OSSL_PROVIDER *EVP_KEYMGMT_provider(const EVP_KEYMGMT *keymgmt) |
| 198 | { |
| 199 | return keymgmt->prov; |
| 200 | } |
| 201 | |
| 202 | int EVP_KEYMGMT_number(const EVP_KEYMGMT *keymgmt) |
| 203 | { |
| 204 | return keymgmt->name_id; |
| 205 | } |
| 206 | |
| 207 | int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name) |
| 208 | { |
| 209 | return evp_is_a(keymgmt->prov, keymgmt->name_id, name); |
| 210 | } |
| 211 | |
| 212 | void EVP_KEYMGMT_do_all_provided(OPENSSL_CTX *libctx, |
| 213 | void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), |
| 214 | void *arg) |
| 215 | { |
| 216 | evp_generic_do_all(libctx, OSSL_OP_KEYMGMT, |
| 217 | (void (*)(void *, void *))fn, arg, |
| 218 | keymgmt_from_dispatch, |
| 219 | (void (*)(void *))EVP_KEYMGMT_free); |
| 220 | } |
| 221 | |
| 222 | void EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, |
| 223 | void (*fn)(const char *name, void *data), |
| 224 | void *data) |
| 225 | { |
| 226 | if (keymgmt->prov != NULL) |
| 227 | evp_names_do_all(keymgmt->prov, keymgmt->name_id, fn, data); |
| 228 | } |
| 229 | |