diff options
| author | markus <> | 2002-09-05 12:51:50 +0000 |
|---|---|---|
| committer | markus <> | 2002-09-05 12:51:50 +0000 |
| commit | 15b5d84f9da2ce4bfae8580e56e34a859f74ad71 (patch) | |
| tree | bf939e82d7fd73cc8a01cf6959002209972091bc /src/lib/libcrypto/dsa/dsa_lib.c | |
| parent | 027351f729b9e837200dae6e1520cda6577ab930 (diff) | |
| download | openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.gz openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.bz2 openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.zip | |
import openssl-0.9.7-beta1
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_lib.c')
| -rw-r--r-- | src/lib/libcrypto/dsa/dsa_lib.c | 176 |
1 files changed, 163 insertions, 13 deletions
diff --git a/src/lib/libcrypto/dsa/dsa_lib.c b/src/lib/libcrypto/dsa/dsa_lib.c index b647257f9f..da2cdfa3d6 100644 --- a/src/lib/libcrypto/dsa/dsa_lib.c +++ b/src/lib/libcrypto/dsa/dsa_lib.c | |||
| @@ -56,26 +56,89 @@ | |||
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | 58 | ||
| 59 | /* Origional version from Steven Schoch <schoch@sheba.arc.nasa.gov> */ | 59 | /* Original version from Steven Schoch <schoch@sheba.arc.nasa.gov> */ |
| 60 | 60 | ||
| 61 | #include <stdio.h> | 61 | #include <stdio.h> |
| 62 | #include "cryptlib.h" | 62 | #include "cryptlib.h" |
| 63 | #include "bn.h" | 63 | #include <openssl/bn.h> |
| 64 | #include "dsa.h" | 64 | #include <openssl/dsa.h> |
| 65 | #include "asn1.h" | 65 | #include <openssl/asn1.h> |
| 66 | #include <openssl/engine.h> | ||
| 66 | 67 | ||
| 67 | char *DSA_version="\0DSA part of SSLeay 0.9.0b 29-Jun-1998"; | 68 | const char *DSA_version="DSA" OPENSSL_VERSION_PTEXT; |
| 68 | 69 | ||
| 69 | DSA *DSA_new() | 70 | static const DSA_METHOD *default_DSA_method = NULL; |
| 71 | |||
| 72 | void DSA_set_default_method(const DSA_METHOD *meth) | ||
| 73 | { | ||
| 74 | default_DSA_method = meth; | ||
| 75 | } | ||
| 76 | |||
| 77 | const DSA_METHOD *DSA_get_default_method(void) | ||
| 78 | { | ||
| 79 | if(!default_DSA_method) | ||
| 80 | default_DSA_method = DSA_OpenSSL(); | ||
| 81 | return default_DSA_method; | ||
| 82 | } | ||
| 83 | |||
| 84 | DSA *DSA_new(void) | ||
| 85 | { | ||
| 86 | return DSA_new_method(NULL); | ||
| 87 | } | ||
| 88 | |||
| 89 | int DSA_set_method(DSA *dsa, const DSA_METHOD *meth) | ||
| 90 | { | ||
| 91 | /* NB: The caller is specifically setting a method, so it's not up to us | ||
| 92 | * to deal with which ENGINE it comes from. */ | ||
| 93 | const DSA_METHOD *mtmp; | ||
| 94 | mtmp = dsa->meth; | ||
| 95 | if (mtmp->finish) mtmp->finish(dsa); | ||
| 96 | if (dsa->engine) | ||
| 97 | { | ||
| 98 | ENGINE_finish(dsa->engine); | ||
| 99 | dsa->engine = NULL; | ||
| 100 | } | ||
| 101 | dsa->meth = meth; | ||
| 102 | if (meth->init) meth->init(dsa); | ||
| 103 | return 1; | ||
| 104 | } | ||
| 105 | |||
| 106 | DSA *DSA_new_method(ENGINE *engine) | ||
| 70 | { | 107 | { |
| 71 | DSA *ret; | 108 | DSA *ret; |
| 72 | 109 | ||
| 73 | ret=(DSA *)Malloc(sizeof(DSA)); | 110 | ret=(DSA *)OPENSSL_malloc(sizeof(DSA)); |
| 74 | if (ret == NULL) | 111 | if (ret == NULL) |
| 75 | { | 112 | { |
| 76 | DSAerr(DSA_F_DSA_NEW,ERR_R_MALLOC_FAILURE); | 113 | DSAerr(DSA_F_DSA_NEW_METHOD,ERR_R_MALLOC_FAILURE); |
| 77 | return(NULL); | 114 | return(NULL); |
| 78 | } | 115 | } |
| 116 | ret->meth = DSA_get_default_method(); | ||
| 117 | if (engine) | ||
| 118 | { | ||
| 119 | if (!ENGINE_init(engine)) | ||
| 120 | { | ||
| 121 | DSAerr(DSA_F_DSA_NEW_METHOD, ERR_R_ENGINE_LIB); | ||
| 122 | OPENSSL_free(ret); | ||
| 123 | return NULL; | ||
| 124 | } | ||
| 125 | ret->engine = engine; | ||
| 126 | } | ||
| 127 | else | ||
| 128 | ret->engine = ENGINE_get_default_DSA(); | ||
| 129 | if(ret->engine) | ||
| 130 | { | ||
| 131 | ret->meth = ENGINE_get_DSA(ret->engine); | ||
| 132 | if(!ret->meth) | ||
| 133 | { | ||
| 134 | DSAerr(DSA_F_DSA_NEW_METHOD, | ||
| 135 | ERR_R_ENGINE_LIB); | ||
| 136 | ENGINE_finish(ret->engine); | ||
| 137 | OPENSSL_free(ret); | ||
| 138 | return NULL; | ||
| 139 | } | ||
| 140 | } | ||
| 141 | |||
| 79 | ret->pad=0; | 142 | ret->pad=0; |
| 80 | ret->version=0; | 143 | ret->version=0; |
| 81 | ret->write_params=1; | 144 | ret->write_params=1; |
| @@ -88,13 +151,24 @@ DSA *DSA_new() | |||
| 88 | 151 | ||
| 89 | ret->kinv=NULL; | 152 | ret->kinv=NULL; |
| 90 | ret->r=NULL; | 153 | ret->r=NULL; |
| 154 | ret->method_mont_p=NULL; | ||
| 91 | 155 | ||
| 92 | ret->references=1; | 156 | ret->references=1; |
| 157 | ret->flags=ret->meth->flags; | ||
| 158 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_DSA, ret, &ret->ex_data); | ||
| 159 | if ((ret->meth->init != NULL) && !ret->meth->init(ret)) | ||
| 160 | { | ||
| 161 | if (ret->engine) | ||
| 162 | ENGINE_finish(ret->engine); | ||
| 163 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_DSA, ret, &ret->ex_data); | ||
| 164 | OPENSSL_free(ret); | ||
| 165 | ret=NULL; | ||
| 166 | } | ||
| 167 | |||
| 93 | return(ret); | 168 | return(ret); |
| 94 | } | 169 | } |
| 95 | 170 | ||
| 96 | void DSA_free(r) | 171 | void DSA_free(DSA *r) |
| 97 | DSA *r; | ||
| 98 | { | 172 | { |
| 99 | int i; | 173 | int i; |
| 100 | 174 | ||
| @@ -113,6 +187,13 @@ DSA *r; | |||
| 113 | } | 187 | } |
| 114 | #endif | 188 | #endif |
| 115 | 189 | ||
| 190 | if(r->meth->finish) | ||
| 191 | r->meth->finish(r); | ||
| 192 | if(r->engine) | ||
| 193 | ENGINE_finish(r->engine); | ||
| 194 | |||
| 195 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_DSA, r, &r->ex_data); | ||
| 196 | |||
| 116 | if (r->p != NULL) BN_clear_free(r->p); | 197 | if (r->p != NULL) BN_clear_free(r->p); |
| 117 | if (r->q != NULL) BN_clear_free(r->q); | 198 | if (r->q != NULL) BN_clear_free(r->q); |
| 118 | if (r->g != NULL) BN_clear_free(r->g); | 199 | if (r->g != NULL) BN_clear_free(r->g); |
| @@ -120,11 +201,26 @@ DSA *r; | |||
| 120 | if (r->priv_key != NULL) BN_clear_free(r->priv_key); | 201 | if (r->priv_key != NULL) BN_clear_free(r->priv_key); |
| 121 | if (r->kinv != NULL) BN_clear_free(r->kinv); | 202 | if (r->kinv != NULL) BN_clear_free(r->kinv); |
| 122 | if (r->r != NULL) BN_clear_free(r->r); | 203 | if (r->r != NULL) BN_clear_free(r->r); |
| 123 | Free(r); | 204 | OPENSSL_free(r); |
| 205 | } | ||
| 206 | |||
| 207 | int DSA_up_ref(DSA *r) | ||
| 208 | { | ||
| 209 | int i = CRYPTO_add(&r->references, 1, CRYPTO_LOCK_DSA); | ||
| 210 | #ifdef REF_PRINT | ||
| 211 | REF_PRINT("DSA",r); | ||
| 212 | #endif | ||
| 213 | #ifdef REF_CHECK | ||
| 214 | if (i < 2) | ||
| 215 | { | ||
| 216 | fprintf(stderr, "DSA_up_ref, bad reference count\n"); | ||
| 217 | abort(); | ||
| 218 | } | ||
| 219 | #endif | ||
| 220 | return ((i > 1) ? 1 : 0); | ||
| 124 | } | 221 | } |
| 125 | 222 | ||
| 126 | int DSA_size(r) | 223 | int DSA_size(const DSA *r) |
| 127 | DSA *r; | ||
| 128 | { | 224 | { |
| 129 | int ret,i; | 225 | int ret,i; |
| 130 | ASN1_INTEGER bs; | 226 | ASN1_INTEGER bs; |
| @@ -143,3 +239,57 @@ DSA *r; | |||
| 143 | return(ret); | 239 | return(ret); |
| 144 | } | 240 | } |
| 145 | 241 | ||
| 242 | int DSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | ||
| 243 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | ||
| 244 | { | ||
| 245 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_DSA, argl, argp, | ||
| 246 | new_func, dup_func, free_func); | ||
| 247 | } | ||
| 248 | |||
| 249 | int DSA_set_ex_data(DSA *d, int idx, void *arg) | ||
| 250 | { | ||
| 251 | return(CRYPTO_set_ex_data(&d->ex_data,idx,arg)); | ||
| 252 | } | ||
| 253 | |||
| 254 | void *DSA_get_ex_data(DSA *d, int idx) | ||
| 255 | { | ||
| 256 | return(CRYPTO_get_ex_data(&d->ex_data,idx)); | ||
| 257 | } | ||
| 258 | |||
| 259 | #ifndef OPENSSL_NO_DH | ||
| 260 | DH *DSA_dup_DH(const DSA *r) | ||
| 261 | { | ||
| 262 | /* DSA has p, q, g, optional pub_key, optional priv_key. | ||
| 263 | * DH has p, optional length, g, optional pub_key, optional priv_key. | ||
| 264 | */ | ||
| 265 | |||
| 266 | DH *ret = NULL; | ||
| 267 | |||
| 268 | if (r == NULL) | ||
| 269 | goto err; | ||
| 270 | ret = DH_new(); | ||
| 271 | if (ret == NULL) | ||
| 272 | goto err; | ||
| 273 | if (r->p != NULL) | ||
| 274 | if ((ret->p = BN_dup(r->p)) == NULL) | ||
| 275 | goto err; | ||
| 276 | if (r->q != NULL) | ||
| 277 | ret->length = BN_num_bits(r->q); | ||
| 278 | if (r->g != NULL) | ||
| 279 | if ((ret->g = BN_dup(r->g)) == NULL) | ||
| 280 | goto err; | ||
| 281 | if (r->pub_key != NULL) | ||
| 282 | if ((ret->pub_key = BN_dup(r->pub_key)) == NULL) | ||
| 283 | goto err; | ||
| 284 | if (r->priv_key != NULL) | ||
| 285 | if ((ret->priv_key = BN_dup(r->priv_key)) == NULL) | ||
| 286 | goto err; | ||
| 287 | |||
| 288 | return ret; | ||
| 289 | |||
| 290 | err: | ||
| 291 | if (ret != NULL) | ||
| 292 | DH_free(ret); | ||
| 293 | return NULL; | ||
| 294 | } | ||
| 295 | #endif | ||
