mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-04 20:30:38 +09:00
Since OpenSSL 1.0.1 is the minimum version, this function is always available so no compatibility check is needed anymore. Signed-off-by: Dirkjan Bussink <d.bussink@gmail.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
306 lines
6.2 KiB
C
306 lines
6.2 KiB
C
/*
|
|
* Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <string.h>
|
|
#include "libcrypto-compat.h"
|
|
|
|
int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d)
|
|
{
|
|
/* If the fields n and e in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL for n and e. d may be
|
|
* left NULL (in case only the public key is used).
|
|
*/
|
|
if ((r->n == NULL && n == NULL)
|
|
|| (r->e == NULL && e == NULL))
|
|
return 0;
|
|
|
|
if (n != NULL) {
|
|
BN_free(r->n);
|
|
r->n = n;
|
|
}
|
|
if (e != NULL) {
|
|
BN_free(r->e);
|
|
r->e = e;
|
|
}
|
|
if (d != NULL) {
|
|
BN_free(r->d);
|
|
r->d = d;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q)
|
|
{
|
|
/* If the fields p and q in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL.
|
|
*/
|
|
if ((r->p == NULL && p == NULL)
|
|
|| (r->q == NULL && q == NULL))
|
|
return 0;
|
|
|
|
if (p != NULL) {
|
|
BN_free(r->p);
|
|
r->p = p;
|
|
}
|
|
if (q != NULL) {
|
|
BN_free(r->q);
|
|
r->q = q;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp)
|
|
{
|
|
/* If the fields dmp1, dmq1 and iqmp in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL.
|
|
*/
|
|
if ((r->dmp1 == NULL && dmp1 == NULL)
|
|
|| (r->dmq1 == NULL && dmq1 == NULL)
|
|
|| (r->iqmp == NULL && iqmp == NULL))
|
|
return 0;
|
|
|
|
if (dmp1 != NULL) {
|
|
BN_free(r->dmp1);
|
|
r->dmp1 = dmp1;
|
|
}
|
|
if (dmq1 != NULL) {
|
|
BN_free(r->dmq1);
|
|
r->dmq1 = dmq1;
|
|
}
|
|
if (iqmp != NULL) {
|
|
BN_free(r->iqmp);
|
|
r->iqmp = iqmp;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
void RSA_get0_key(const RSA *r,
|
|
const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
|
|
{
|
|
if (n != NULL)
|
|
*n = r->n;
|
|
if (e != NULL)
|
|
*e = r->e;
|
|
if (d != NULL)
|
|
*d = r->d;
|
|
}
|
|
|
|
void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q)
|
|
{
|
|
if (p != NULL)
|
|
*p = r->p;
|
|
if (q != NULL)
|
|
*q = r->q;
|
|
}
|
|
|
|
void RSA_get0_crt_params(const RSA *r,
|
|
const BIGNUM **dmp1, const BIGNUM **dmq1,
|
|
const BIGNUM **iqmp)
|
|
{
|
|
if (dmp1 != NULL)
|
|
*dmp1 = r->dmp1;
|
|
if (dmq1 != NULL)
|
|
*dmq1 = r->dmq1;
|
|
if (iqmp != NULL)
|
|
*iqmp = r->iqmp;
|
|
}
|
|
|
|
void DSA_get0_pqg(const DSA *d,
|
|
const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
|
|
{
|
|
if (p != NULL)
|
|
*p = d->p;
|
|
if (q != NULL)
|
|
*q = d->q;
|
|
if (g != NULL)
|
|
*g = d->g;
|
|
}
|
|
|
|
int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g)
|
|
{
|
|
/* If the fields p, q and g in d are NULL, the corresponding input
|
|
* parameters MUST be non-NULL.
|
|
*/
|
|
if ((d->p == NULL && p == NULL)
|
|
|| (d->q == NULL && q == NULL)
|
|
|| (d->g == NULL && g == NULL))
|
|
return 0;
|
|
|
|
if (p != NULL) {
|
|
BN_free(d->p);
|
|
d->p = p;
|
|
}
|
|
if (q != NULL) {
|
|
BN_free(d->q);
|
|
d->q = q;
|
|
}
|
|
if (g != NULL) {
|
|
BN_free(d->g);
|
|
d->g = g;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
void DSA_get0_key(const DSA *d,
|
|
const BIGNUM **pub_key, const BIGNUM **priv_key)
|
|
{
|
|
if (pub_key != NULL)
|
|
*pub_key = d->pub_key;
|
|
if (priv_key != NULL)
|
|
*priv_key = d->priv_key;
|
|
}
|
|
|
|
int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key)
|
|
{
|
|
/* If the field pub_key in d is NULL, the corresponding input
|
|
* parameters MUST be non-NULL. The priv_key field may
|
|
* be left NULL.
|
|
*/
|
|
if (d->pub_key == NULL && pub_key == NULL)
|
|
return 0;
|
|
|
|
if (pub_key != NULL) {
|
|
BN_free(d->pub_key);
|
|
d->pub_key = pub_key;
|
|
}
|
|
if (priv_key != NULL) {
|
|
BN_free(d->priv_key);
|
|
d->priv_key = priv_key;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
void DSA_SIG_get0(const DSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps)
|
|
{
|
|
if (pr != NULL)
|
|
*pr = sig->r;
|
|
if (ps != NULL)
|
|
*ps = sig->s;
|
|
}
|
|
|
|
int DSA_SIG_set0(DSA_SIG *sig, BIGNUM *r, BIGNUM *s)
|
|
{
|
|
if (r == NULL || s == NULL)
|
|
return 0;
|
|
BN_clear_free(sig->r);
|
|
BN_clear_free(sig->s);
|
|
sig->r = r;
|
|
sig->s = s;
|
|
return 1;
|
|
}
|
|
|
|
void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps)
|
|
{
|
|
if (pr != NULL)
|
|
*pr = sig->r;
|
|
if (ps != NULL)
|
|
*ps = sig->s;
|
|
}
|
|
|
|
int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s)
|
|
{
|
|
if (r == NULL || s == NULL)
|
|
return 0;
|
|
BN_clear_free(sig->r);
|
|
BN_clear_free(sig->s);
|
|
sig->r = r;
|
|
sig->s = s;
|
|
return 1;
|
|
}
|
|
|
|
EVP_MD_CTX *EVP_MD_CTX_new(void)
|
|
{
|
|
EVP_MD_CTX *ctx = OPENSSL_malloc(sizeof(EVP_MD_CTX));
|
|
if (ctx != NULL) {
|
|
EVP_MD_CTX_init(ctx);
|
|
}
|
|
return ctx;
|
|
}
|
|
|
|
void EVP_MD_CTX_free(EVP_MD_CTX *ctx)
|
|
{
|
|
EVP_MD_CTX_cleanup(ctx);
|
|
OPENSSL_free(ctx);
|
|
}
|
|
|
|
void DH_get0_pqg(const DH *dh,
|
|
const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
|
|
{
|
|
if (p) {
|
|
*p = dh->p;
|
|
}
|
|
if (q) {
|
|
*q = NULL;
|
|
}
|
|
if (g) {
|
|
*g = dh->g;
|
|
}
|
|
}
|
|
|
|
int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g)
|
|
{
|
|
if (p) {
|
|
if (dh->p) {
|
|
BN_free(dh->p);
|
|
}
|
|
dh->p = p;
|
|
}
|
|
if (g) {
|
|
if (dh->g) {
|
|
BN_free(dh->g);
|
|
}
|
|
dh->g = g;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
void DH_get0_key(const DH *dh,
|
|
const BIGNUM **pub_key, const BIGNUM **priv_key)
|
|
{
|
|
if (pub_key) {
|
|
*pub_key = dh->pub_key;
|
|
}
|
|
if (priv_key) {
|
|
*priv_key = dh->priv_key;
|
|
}
|
|
}
|
|
|
|
int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key)
|
|
{
|
|
if (pub_key) {
|
|
if (dh->pub_key) {
|
|
BN_free(dh->pub_key);
|
|
}
|
|
dh->pub_key = pub_key;
|
|
}
|
|
if (priv_key) {
|
|
if (dh->priv_key) {
|
|
BN_free(dh->priv_key);
|
|
}
|
|
dh->priv_key = priv_key;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
const char *OpenSSL_version(int type)
|
|
{
|
|
return SSLeay_version(type);
|
|
}
|
|
unsigned long OpenSSL_version_num(void)
|
|
{
|
|
return SSLeay();
|
|
}
|