summaryrefslogtreecommitdiffstats
path: root/providers/implementations/encode_decode/encoder_ecx.c
diff options
context:
space:
mode:
Diffstat (limited to 'providers/implementations/encode_decode/encoder_ecx.c')
-rw-r--r--providers/implementations/encode_decode/encoder_ecx.c145
1 files changed, 145 insertions, 0 deletions
diff --git a/providers/implementations/encode_decode/encoder_ecx.c b/providers/implementations/encode_decode/encoder_ecx.c
new file mode 100644
index 0000000000..83de9fe002
--- /dev/null
+++ b/providers/implementations/encode_decode/encoder_ecx.c
@@ -0,0 +1,145 @@
+/*
+ * Copyright 2020 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+#include <openssl/err.h>
+#include "crypto/ecx.h"
+#include "prov/bio.h" /* ossl_prov_bio_printf() */
+#include "prov/implementations.h" /* ecx_keymgmt_functions */
+#include "encoder_local.h"
+
+void ecx_get_new_free_import(ECX_KEY_TYPE type,
+ OSSL_FUNC_keymgmt_new_fn **ecx_new,
+ OSSL_FUNC_keymgmt_free_fn **ecx_free,
+ OSSL_FUNC_keymgmt_import_fn **ecx_import)
+{
+ if (type == ECX_KEY_TYPE_X25519) {
+ *ecx_new = ossl_prov_get_keymgmt_new(x25519_keymgmt_functions);
+ *ecx_free = ossl_prov_get_keymgmt_free(x25519_keymgmt_functions);
+ *ecx_import = ossl_prov_get_keymgmt_import(x25519_keymgmt_functions);
+ } else if (type == ECX_KEY_TYPE_X448) {
+ *ecx_new = ossl_prov_get_keymgmt_new(x448_keymgmt_functions);
+ *ecx_free = ossl_prov_get_keymgmt_free(x448_keymgmt_functions);
+ *ecx_import = ossl_prov_get_keymgmt_import(x448_keymgmt_functions);
+ } else if (type == ECX_KEY_TYPE_ED25519) {
+ *ecx_new = ossl_prov_get_keymgmt_new(ed25519_keymgmt_functions);
+ *ecx_free = ossl_prov_get_keymgmt_free(ed25519_keymgmt_functions);
+ *ecx_import = ossl_prov_get_keymgmt_import(ed25519_keymgmt_functions);
+ } else if (type == ECX_KEY_TYPE_ED448) {
+ *ecx_new = ossl_prov_get_keymgmt_new(ed448_keymgmt_functions);
+ *ecx_free = ossl_prov_get_keymgmt_free(ed448_keymgmt_functions);
+ *ecx_import = ossl_prov_get_keymgmt_import(ed448_keymgmt_functions);
+ } else {
+ *ecx_new = NULL;
+ *ecx_free = NULL;
+ *ecx_import = NULL;
+ }
+}
+
+
+int ossl_prov_print_ecx(BIO *out, ECX_KEY *ecxkey, enum ecx_print_type type)
+{
+ const char *type_label = NULL;
+
+ switch (type) {
+ case ecx_print_priv:
+ switch (ecxkey->type) {
+ case ECX_KEY_TYPE_X25519:
+ type_label = "X25519 Private-Key";
+ break;
+ case ECX_KEY_TYPE_X448:
+ type_label = "X448 Private-Key";
+ break;
+ case ECX_KEY_TYPE_ED25519:
+ type_label = "ED25519 Private-Key";
+ break;
+ case ECX_KEY_TYPE_ED448:
+ type_label = "ED448 Private-Key";
+ break;
+ }
+ break;
+ case ecx_print_pub:
+ switch (ecxkey->type) {
+ case ECX_KEY_TYPE_X25519:
+ type_label = "X25519 Public-Key";
+ break;
+ case ECX_KEY_TYPE_X448:
+ type_label = "X448 Public-Key";
+ break;
+ case ECX_KEY_TYPE_ED25519:
+ type_label = "ED25519 Public-Key";
+ break;
+ case ECX_KEY_TYPE_ED448:
+ type_label = "ED448 Public-Key";
+ break;
+ }
+ break;
+ }
+
+ if (type == ecx_print_priv && ecxkey->privkey == NULL) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
+ return 0;
+ }
+
+ if (BIO_printf(out, "%s:\n", type_label) <= 0)
+ return 0;
+ if (type == ecx_print_priv
+ && !ossl_prov_print_labeled_buf(out, "priv:", ecxkey->privkey,
+ ecxkey->keylen))
+ return 0;
+ if (!ossl_prov_print_labeled_buf(out, "pub:", ecxkey->pubkey,
+ ecxkey->keylen))
+ return 0;
+
+ return 1;
+}
+
+
+int ossl_prov_ecx_pub_to_der(const void *vecxkey, unsigned char **pder)
+{
+ const ECX_KEY *ecxkey = vecxkey;
+ unsigned char *keyblob;
+
+ if (ecxkey == NULL) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
+ return 0;
+ }
+
+ keyblob = OPENSSL_memdup(ecxkey->pubkey, ecxkey->keylen);
+ if (keyblob == NULL) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
+ return 0;
+ }
+
+ *pder = keyblob;
+ return ecxkey->keylen;
+}
+
+int ossl_prov_ecx_priv_to_der(const void *vecxkey, unsigned char **pder)
+{
+ const ECX_KEY *ecxkey = vecxkey;
+ ASN1_OCTET_STRING oct;
+ int keybloblen;
+
+ if (ecxkey == NULL || ecxkey->privkey == NULL) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
+ return 0;
+ }
+
+ oct.data = ecxkey->privkey;
+ oct.length = ecxkey->keylen;
+ oct.flags = 0;
+
+ keybloblen = i2d_ASN1_OCTET_STRING(&oct, pder);
+ if (keybloblen < 0) {
+ ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
+ return 0;
+ }
+
+ return keybloblen;
+}