1 /* 2 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 /* 11 * Low level APIs are deprecated for public use, but still ok for internal use. 12 */ 13 #include "internal/deprecated.h" 14 15 #include <openssl/core.h> 16 #include <openssl/core_dispatch.h> 17 #include <openssl/core_names.h> 18 #include <openssl/bn.h> 19 #include <openssl/err.h> 20 #include <openssl/safestack.h> 21 #include <openssl/proverr.h> 22 #include "crypto/dh.h" /* ossl_dh_get0_params() */ 23 #include "crypto/dsa.h" /* ossl_dsa_get0_params() */ 24 #include "crypto/ec.h" /* ossl_ec_key_get_libctx */ 25 #include "crypto/ecx.h" /* ECX_KEY, etc... */ 26 #include "crypto/ml_kem.h" /* ML_KEM_KEY, etc... */ 27 #include "crypto/rsa.h" /* RSA_PSS_PARAMS_30, etc... */ 28 #include "crypto/ml_dsa.h" 29 #include "crypto/slh_dsa.h" 30 #include "prov/bio.h" 31 #include "prov/implementations.h" 32 #include "internal/encoder.h" 33 #include "endecoder_local.h" 34 #include "ml_dsa_codecs.h" 35 #include "ml_kem_codecs.h" 36 37 DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM) 38 39 /* ---------------------------------------------------------------------- */ 40 41 #ifndef OPENSSL_NO_DH 42 static int dh_to_text(BIO *out, const void *key, int selection) 43 { 44 const DH *dh = key; 45 const char *type_label = NULL; 46 const BIGNUM *priv_key = NULL, *pub_key = NULL; 47 const FFC_PARAMS *params = NULL; 48 const BIGNUM *p = NULL; 49 long length; 50 51 if (out == NULL || dh == NULL) { 52 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 53 return 0; 54 } 55 56 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 57 type_label = "DH Private-Key"; 58 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 59 type_label = "DH Public-Key"; 60 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 61 type_label = "DH Parameters"; 62 63 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 64 priv_key = DH_get0_priv_key(dh); 65 if (priv_key == NULL) { 66 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 67 return 0; 68 } 69 } 70 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 71 pub_key = DH_get0_pub_key(dh); 72 if (pub_key == NULL) { 73 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 74 return 0; 75 } 76 } 77 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { 78 params = ossl_dh_get0_params((DH *)dh); 79 if (params == NULL) { 80 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); 81 return 0; 82 } 83 } 84 85 p = DH_get0_p(dh); 86 if (p == NULL) { 87 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 88 return 0; 89 } 90 91 if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) 92 return 0; 93 if (priv_key != NULL 94 && !ossl_bio_print_labeled_bignum(out, "private-key:", priv_key)) 95 return 0; 96 if (pub_key != NULL 97 && !ossl_bio_print_labeled_bignum(out, "public-key:", pub_key)) 98 return 0; 99 if (params != NULL 100 && !ossl_bio_print_ffc_params(out, params)) 101 return 0; 102 length = DH_get_length(dh); 103 if (length > 0 104 && BIO_printf(out, "recommended-private-length: %ld bits\n", 105 length) <= 0) 106 return 0; 107 108 return 1; 109 } 110 #endif 111 112 /* ---------------------------------------------------------------------- */ 113 114 #ifndef OPENSSL_NO_DSA 115 static int dsa_to_text(BIO *out, const void *key, int selection) 116 { 117 const DSA *dsa = key; 118 const char *type_label = NULL; 119 const BIGNUM *priv_key = NULL, *pub_key = NULL; 120 const FFC_PARAMS *params = NULL; 121 const BIGNUM *p = NULL; 122 123 if (out == NULL || dsa == NULL) { 124 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 125 return 0; 126 } 127 128 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 129 type_label = "Private-Key"; 130 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 131 type_label = "Public-Key"; 132 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 133 type_label = "DSA-Parameters"; 134 135 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 136 priv_key = DSA_get0_priv_key(dsa); 137 if (priv_key == NULL) { 138 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 139 return 0; 140 } 141 } 142 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 143 pub_key = DSA_get0_pub_key(dsa); 144 if (pub_key == NULL) { 145 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 146 return 0; 147 } 148 } 149 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { 150 params = ossl_dsa_get0_params((DSA *)dsa); 151 if (params == NULL) { 152 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); 153 return 0; 154 } 155 } 156 157 p = DSA_get0_p(dsa); 158 if (p == NULL) { 159 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 160 return 0; 161 } 162 163 if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) 164 return 0; 165 if (priv_key != NULL 166 && !ossl_bio_print_labeled_bignum(out, "priv:", priv_key)) 167 return 0; 168 if (pub_key != NULL 169 && !ossl_bio_print_labeled_bignum(out, "pub: ", pub_key)) 170 return 0; 171 if (params != NULL 172 && !ossl_bio_print_ffc_params(out, params)) 173 return 0; 174 175 return 1; 176 } 177 #endif 178 179 /* ---------------------------------------------------------------------- */ 180 181 #ifndef OPENSSL_NO_EC 182 static int ec_param_explicit_curve_to_text(BIO *out, const EC_GROUP *group, 183 BN_CTX *ctx) 184 { 185 const char *plabel = "Prime:"; 186 BIGNUM *p = NULL, *a = NULL, *b = NULL; 187 188 p = BN_CTX_get(ctx); 189 a = BN_CTX_get(ctx); 190 b = BN_CTX_get(ctx); 191 if (b == NULL 192 || !EC_GROUP_get_curve(group, p, a, b, ctx)) 193 return 0; 194 195 if (EC_GROUP_get_field_type(group) == NID_X9_62_characteristic_two_field) { 196 int basis_type = EC_GROUP_get_basis_type(group); 197 198 /* print the 'short name' of the base type OID */ 199 if (basis_type == NID_undef 200 || BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0) 201 return 0; 202 plabel = "Polynomial:"; 203 } 204 return ossl_bio_print_labeled_bignum(out, plabel, p) 205 && ossl_bio_print_labeled_bignum(out, "A: ", a) 206 && ossl_bio_print_labeled_bignum(out, "B: ", b); 207 } 208 209 static int ec_param_explicit_gen_to_text(BIO *out, const EC_GROUP *group, 210 BN_CTX *ctx) 211 { 212 int ret; 213 size_t buflen; 214 point_conversion_form_t form; 215 const EC_POINT *point = NULL; 216 const char *glabel = NULL; 217 unsigned char *buf = NULL; 218 219 form = EC_GROUP_get_point_conversion_form(group); 220 point = EC_GROUP_get0_generator(group); 221 222 if (point == NULL) 223 return 0; 224 225 switch (form) { 226 case POINT_CONVERSION_COMPRESSED: 227 glabel = "Generator (compressed):"; 228 break; 229 case POINT_CONVERSION_UNCOMPRESSED: 230 glabel = "Generator (uncompressed):"; 231 break; 232 case POINT_CONVERSION_HYBRID: 233 glabel = "Generator (hybrid):"; 234 break; 235 default: 236 return 0; 237 } 238 239 buflen = EC_POINT_point2buf(group, point, form, &buf, ctx); 240 if (buflen == 0) 241 return 0; 242 243 ret = ossl_bio_print_labeled_buf(out, glabel, buf, buflen); 244 OPENSSL_clear_free(buf, buflen); 245 return ret; 246 } 247 248 /* Print explicit parameters */ 249 static int ec_param_explicit_to_text(BIO *out, const EC_GROUP *group, 250 OSSL_LIB_CTX *libctx) 251 { 252 int ret = 0, tmp_nid; 253 BN_CTX *ctx = NULL; 254 const BIGNUM *order = NULL, *cofactor = NULL; 255 const unsigned char *seed; 256 size_t seed_len = 0; 257 258 ctx = BN_CTX_new_ex(libctx); 259 if (ctx == NULL) 260 return 0; 261 BN_CTX_start(ctx); 262 263 tmp_nid = EC_GROUP_get_field_type(group); 264 order = EC_GROUP_get0_order(group); 265 if (order == NULL) 266 goto err; 267 268 seed = EC_GROUP_get0_seed(group); 269 if (seed != NULL) 270 seed_len = EC_GROUP_get_seed_len(group); 271 cofactor = EC_GROUP_get0_cofactor(group); 272 273 /* print the 'short name' of the field type */ 274 if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0 275 || !ec_param_explicit_curve_to_text(out, group, ctx) 276 || !ec_param_explicit_gen_to_text(out, group, ctx) 277 || !ossl_bio_print_labeled_bignum(out, "Order: ", order) 278 || (cofactor != NULL 279 && !ossl_bio_print_labeled_bignum(out, "Cofactor: ", cofactor)) 280 || (seed != NULL 281 && !ossl_bio_print_labeled_buf(out, "Seed:", seed, seed_len))) 282 goto err; 283 ret = 1; 284 err: 285 BN_CTX_end(ctx); 286 BN_CTX_free(ctx); 287 return ret; 288 } 289 290 static int ec_param_to_text(BIO *out, const EC_GROUP *group, 291 OSSL_LIB_CTX *libctx) 292 { 293 if (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE) { 294 const char *curve_name; 295 int curve_nid = EC_GROUP_get_curve_name(group); 296 297 /* Explicit parameters */ 298 if (curve_nid == NID_undef) 299 return 0; 300 301 if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0) 302 return 0; 303 304 curve_name = EC_curve_nid2nist(curve_nid); 305 return (curve_name == NULL 306 || BIO_printf(out, "%s: %s\n", "NIST CURVE", curve_name) > 0); 307 } else { 308 return ec_param_explicit_to_text(out, group, libctx); 309 } 310 } 311 312 static int ec_to_text(BIO *out, const void *key, int selection) 313 { 314 const EC_KEY *ec = key; 315 const char *type_label = NULL; 316 unsigned char *priv = NULL, *pub = NULL; 317 size_t priv_len = 0, pub_len = 0; 318 const EC_GROUP *group; 319 int ret = 0; 320 321 if (out == NULL || ec == NULL) { 322 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 323 return 0; 324 } 325 326 if ((group = EC_KEY_get0_group(ec)) == NULL) { 327 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 328 return 0; 329 } 330 331 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 332 type_label = "Private-Key"; 333 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 334 type_label = "Public-Key"; 335 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 336 if (EC_GROUP_get_curve_name(group) != NID_sm2) 337 type_label = "EC-Parameters"; 338 339 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 340 const BIGNUM *priv_key = EC_KEY_get0_private_key(ec); 341 342 if (priv_key == NULL) { 343 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 344 goto err; 345 } 346 priv_len = EC_KEY_priv2buf(ec, &priv); 347 if (priv_len == 0) 348 goto err; 349 } 350 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 351 const EC_POINT *pub_pt = EC_KEY_get0_public_key(ec); 352 353 if (pub_pt == NULL) { 354 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 355 goto err; 356 } 357 358 pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL); 359 if (pub_len == 0) 360 goto err; 361 } 362 363 if (type_label != NULL 364 && BIO_printf(out, "%s: (%d bit)\n", type_label, 365 EC_GROUP_order_bits(group)) <= 0) 366 goto err; 367 if (priv != NULL 368 && !ossl_bio_print_labeled_buf(out, "priv:", priv, priv_len)) 369 goto err; 370 if (pub != NULL 371 && !ossl_bio_print_labeled_buf(out, "pub:", pub, pub_len)) 372 goto err; 373 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 374 ret = ec_param_to_text(out, group, ossl_ec_key_get_libctx(ec)); 375 err: 376 OPENSSL_clear_free(priv, priv_len); 377 OPENSSL_free(pub); 378 return ret; 379 } 380 #endif 381 382 /* ---------------------------------------------------------------------- */ 383 384 #ifndef OPENSSL_NO_ECX 385 static int ecx_to_text(BIO *out, const void *key, int selection) 386 { 387 const ECX_KEY *ecx = key; 388 const char *type_label = NULL; 389 390 if (out == NULL || ecx == NULL) { 391 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 392 return 0; 393 } 394 395 switch (ecx->type) { 396 case ECX_KEY_TYPE_X25519: 397 type_label = "X25519"; 398 break; 399 case ECX_KEY_TYPE_X448: 400 type_label = "X448"; 401 break; 402 case ECX_KEY_TYPE_ED25519: 403 type_label = "ED25519"; 404 break; 405 case ECX_KEY_TYPE_ED448: 406 type_label = "ED448"; 407 break; 408 } 409 410 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 411 if (ecx->privkey == NULL) { 412 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 413 return 0; 414 } 415 416 if (BIO_printf(out, "%s Private-Key:\n", type_label) <= 0) 417 return 0; 418 if (!ossl_bio_print_labeled_buf(out, "priv:", ecx->privkey, ecx->keylen)) 419 return 0; 420 } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 421 /* ecx->pubkey is an array, not a pointer... */ 422 if (!ecx->haspubkey) { 423 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 424 return 0; 425 } 426 427 if (BIO_printf(out, "%s Public-Key:\n", type_label) <= 0) 428 return 0; 429 } 430 431 if (!ossl_bio_print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen)) 432 return 0; 433 434 return 1; 435 } 436 #endif 437 438 /* ---------------------------------------------------------------------- */ 439 440 #ifndef OPENSSL_NO_ML_KEM 441 static int ml_kem_to_text(BIO *out, const void *vkey, int selection) 442 { 443 return ossl_ml_kem_key_to_text(out, (ML_KEM_KEY *)vkey, selection); 444 } 445 #endif 446 447 /* ---------------------------------------------------------------------- */ 448 449 #ifndef OPENSSL_NO_SLH_DSA 450 static int slh_dsa_to_text(BIO *out, const void *key, int selection) 451 { 452 return ossl_slh_dsa_key_to_text(out, (SLH_DSA_KEY *)key, selection); 453 } 454 #endif /* OPENSSL_NO_SLH_DSA */ 455 456 static int rsa_to_text(BIO *out, const void *key, int selection) 457 { 458 const RSA *rsa = key; 459 const char *type_label = "RSA key"; 460 const char *modulus_label = NULL; 461 const char *exponent_label = NULL; 462 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; 463 STACK_OF(BIGNUM_const) *factors = NULL; 464 STACK_OF(BIGNUM_const) *exps = NULL; 465 STACK_OF(BIGNUM_const) *coeffs = NULL; 466 int primes; 467 const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa); 468 int ret = 0; 469 470 if (out == NULL || rsa == NULL) { 471 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 472 goto err; 473 } 474 475 factors = sk_BIGNUM_const_new_null(); 476 exps = sk_BIGNUM_const_new_null(); 477 coeffs = sk_BIGNUM_const_new_null(); 478 479 if (factors == NULL || exps == NULL || coeffs == NULL) { 480 ERR_raise(ERR_LIB_PROV, ERR_R_CRYPTO_LIB); 481 goto err; 482 } 483 484 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 485 type_label = "Private-Key"; 486 modulus_label = "modulus:"; 487 exponent_label = "publicExponent:"; 488 } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 489 type_label = "Public-Key"; 490 modulus_label = "Modulus:"; 491 exponent_label = "Exponent:"; 492 } 493 494 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); 495 ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); 496 primes = sk_BIGNUM_const_num(factors); 497 498 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 499 if (BIO_printf(out, "%s: (%d bit, %d primes)\n", 500 type_label, BN_num_bits(rsa_n), primes) <= 0) 501 goto err; 502 } else { 503 if (BIO_printf(out, "%s: (%d bit)\n", 504 type_label, BN_num_bits(rsa_n)) <= 0) 505 goto err; 506 } 507 508 if (!ossl_bio_print_labeled_bignum(out, modulus_label, rsa_n)) 509 goto err; 510 if (!ossl_bio_print_labeled_bignum(out, exponent_label, rsa_e)) 511 goto err; 512 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 513 int i; 514 515 if (!ossl_bio_print_labeled_bignum(out, "privateExponent:", rsa_d)) 516 goto err; 517 if (!ossl_bio_print_labeled_bignum(out, "prime1:", 518 sk_BIGNUM_const_value(factors, 0))) 519 goto err; 520 if (!ossl_bio_print_labeled_bignum(out, "prime2:", 521 sk_BIGNUM_const_value(factors, 1))) 522 goto err; 523 if (!ossl_bio_print_labeled_bignum(out, "exponent1:", 524 sk_BIGNUM_const_value(exps, 0))) 525 goto err; 526 if (!ossl_bio_print_labeled_bignum(out, "exponent2:", 527 sk_BIGNUM_const_value(exps, 1))) 528 goto err; 529 if (!ossl_bio_print_labeled_bignum(out, "coefficient:", 530 sk_BIGNUM_const_value(coeffs, 0))) 531 goto err; 532 for (i = 2; i < sk_BIGNUM_const_num(factors); i++) { 533 if (BIO_printf(out, "prime%d:", i + 1) <= 0) 534 goto err; 535 if (!ossl_bio_print_labeled_bignum(out, NULL, 536 sk_BIGNUM_const_value(factors, i))) 537 goto err; 538 if (BIO_printf(out, "exponent%d:", i + 1) <= 0) 539 goto err; 540 if (!ossl_bio_print_labeled_bignum(out, NULL, 541 sk_BIGNUM_const_value(exps, i))) 542 goto err; 543 if (BIO_printf(out, "coefficient%d:", i + 1) <= 0) 544 goto err; 545 if (!ossl_bio_print_labeled_bignum(out, NULL, 546 sk_BIGNUM_const_value(coeffs, i - 1))) 547 goto err; 548 } 549 } 550 551 if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) { 552 switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) { 553 case RSA_FLAG_TYPE_RSA: 554 if (!ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { 555 if (BIO_printf(out, "(INVALID PSS PARAMETERS)\n") <= 0) 556 goto err; 557 } 558 break; 559 case RSA_FLAG_TYPE_RSASSAPSS: 560 if (ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { 561 if (BIO_printf(out, "No PSS parameter restrictions\n") <= 0) 562 goto err; 563 } else { 564 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss_params); 565 int maskgenalg_nid = 566 ossl_rsa_pss_params_30_maskgenalg(pss_params); 567 int maskgenhashalg_nid = 568 ossl_rsa_pss_params_30_maskgenhashalg(pss_params); 569 int saltlen = ossl_rsa_pss_params_30_saltlen(pss_params); 570 int trailerfield = 571 ossl_rsa_pss_params_30_trailerfield(pss_params); 572 573 if (BIO_printf(out, "PSS parameter restrictions:\n") <= 0) 574 goto err; 575 if (BIO_printf(out, " Hash Algorithm: %s%s\n", 576 ossl_rsa_oaeppss_nid2name(hashalg_nid), 577 (hashalg_nid == NID_sha1 578 ? " (default)" : "")) <= 0) 579 goto err; 580 if (BIO_printf(out, " Mask Algorithm: %s with %s%s\n", 581 ossl_rsa_mgf_nid2name(maskgenalg_nid), 582 ossl_rsa_oaeppss_nid2name(maskgenhashalg_nid), 583 (maskgenalg_nid == NID_mgf1 584 && maskgenhashalg_nid == NID_sha1 585 ? " (default)" : "")) <= 0) 586 goto err; 587 if (BIO_printf(out, " Minimum Salt Length: %d%s\n", 588 saltlen, 589 (saltlen == 20 ? " (default)" : "")) <= 0) 590 goto err; 591 if (BIO_printf(out, " Trailer Field: 0x%x%s\n", 592 trailerfield, 593 (trailerfield == 1 ? " (default)" : "")) <= 0) 594 goto err; 595 } 596 break; 597 } 598 } 599 600 ret = 1; 601 err: 602 sk_BIGNUM_const_free(factors); 603 sk_BIGNUM_const_free(exps); 604 sk_BIGNUM_const_free(coeffs); 605 return ret; 606 } 607 608 /* ---------------------------------------------------------------------- */ 609 610 #ifndef OPENSSL_NO_ML_DSA 611 static int ml_dsa_to_text(BIO *out, const void *key, int selection) 612 { 613 return ossl_ml_dsa_key_to_text(out, (ML_DSA_KEY *)key, selection); 614 } 615 #endif /* OPENSSL_NO_ML_DSA */ 616 /* ---------------------------------------------------------------------- */ 617 618 static void *key2text_newctx(void *provctx) 619 { 620 return provctx; 621 } 622 623 static void key2text_freectx(ossl_unused void *vctx) 624 { 625 } 626 627 static int key2text_encode(void *vctx, const void *key, int selection, 628 OSSL_CORE_BIO *cout, 629 int (*key2text)(BIO *out, const void *key, 630 int selection), 631 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg) 632 { 633 BIO *out = ossl_bio_new_from_core_bio(vctx, cout); 634 int ret; 635 636 if (out == NULL) 637 return 0; 638 639 ret = key2text(out, key, selection); 640 BIO_free(out); 641 642 return ret; 643 } 644 645 #define MAKE_TEXT_ENCODER(impl, type) \ 646 static OSSL_FUNC_encoder_import_object_fn \ 647 impl##2text_import_object; \ 648 static OSSL_FUNC_encoder_free_object_fn \ 649 impl##2text_free_object; \ 650 static OSSL_FUNC_encoder_encode_fn impl##2text_encode; \ 651 \ 652 static void *impl##2text_import_object(void *ctx, int selection, \ 653 const OSSL_PARAM params[]) \ 654 { \ 655 return ossl_prov_import_key(ossl_##impl##_keymgmt_functions, \ 656 ctx, selection, params); \ 657 } \ 658 static void impl##2text_free_object(void *key) \ 659 { \ 660 ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key); \ 661 } \ 662 static int impl##2text_encode(void *vctx, OSSL_CORE_BIO *cout, \ 663 const void *key, \ 664 const OSSL_PARAM key_abstract[], \ 665 int selection, \ 666 OSSL_PASSPHRASE_CALLBACK *cb, \ 667 void *cbarg) \ 668 { \ 669 /* We don't deal with abstract objects */ \ 670 if (key_abstract != NULL) { \ 671 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ 672 return 0; \ 673 } \ 674 return key2text_encode(vctx, key, selection, cout, \ 675 type##_to_text, cb, cbarg); \ 676 } \ 677 const OSSL_DISPATCH ossl_##impl##_to_text_encoder_functions[] = { \ 678 { OSSL_FUNC_ENCODER_NEWCTX, \ 679 (void (*)(void))key2text_newctx }, \ 680 { OSSL_FUNC_ENCODER_FREECTX, \ 681 (void (*)(void))key2text_freectx }, \ 682 { OSSL_FUNC_ENCODER_IMPORT_OBJECT, \ 683 (void (*)(void))impl##2text_import_object }, \ 684 { OSSL_FUNC_ENCODER_FREE_OBJECT, \ 685 (void (*)(void))impl##2text_free_object }, \ 686 { OSSL_FUNC_ENCODER_ENCODE, \ 687 (void (*)(void))impl##2text_encode }, \ 688 OSSL_DISPATCH_END \ 689 } 690 691 #ifndef OPENSSL_NO_DH 692 MAKE_TEXT_ENCODER(dh, dh); 693 MAKE_TEXT_ENCODER(dhx, dh); 694 #endif 695 #ifndef OPENSSL_NO_DSA 696 MAKE_TEXT_ENCODER(dsa, dsa); 697 #endif 698 #ifndef OPENSSL_NO_EC 699 MAKE_TEXT_ENCODER(ec, ec); 700 # ifndef OPENSSL_NO_SM2 701 MAKE_TEXT_ENCODER(sm2, ec); 702 # endif 703 # ifndef OPENSSL_NO_ECX 704 MAKE_TEXT_ENCODER(ed25519, ecx); 705 MAKE_TEXT_ENCODER(ed448, ecx); 706 MAKE_TEXT_ENCODER(x25519, ecx); 707 MAKE_TEXT_ENCODER(x448, ecx); 708 # endif 709 #endif 710 #ifndef OPENSSL_NO_ML_KEM 711 MAKE_TEXT_ENCODER(ml_kem_512, ml_kem); 712 MAKE_TEXT_ENCODER(ml_kem_768, ml_kem); 713 MAKE_TEXT_ENCODER(ml_kem_1024, ml_kem); 714 #endif 715 MAKE_TEXT_ENCODER(rsa, rsa); 716 MAKE_TEXT_ENCODER(rsapss, rsa); 717 718 #ifndef OPENSSL_NO_ML_DSA 719 MAKE_TEXT_ENCODER(ml_dsa_44, ml_dsa); 720 MAKE_TEXT_ENCODER(ml_dsa_65, ml_dsa); 721 MAKE_TEXT_ENCODER(ml_dsa_87, ml_dsa); 722 #endif 723 724 #ifndef OPENSSL_NO_SLH_DSA 725 MAKE_TEXT_ENCODER(slh_dsa_sha2_128s, slh_dsa); 726 MAKE_TEXT_ENCODER(slh_dsa_sha2_128f, slh_dsa); 727 MAKE_TEXT_ENCODER(slh_dsa_sha2_192s, slh_dsa); 728 MAKE_TEXT_ENCODER(slh_dsa_sha2_192f, slh_dsa); 729 MAKE_TEXT_ENCODER(slh_dsa_sha2_256s, slh_dsa); 730 MAKE_TEXT_ENCODER(slh_dsa_sha2_256f, slh_dsa); 731 MAKE_TEXT_ENCODER(slh_dsa_shake_128s, slh_dsa); 732 MAKE_TEXT_ENCODER(slh_dsa_shake_128f, slh_dsa); 733 MAKE_TEXT_ENCODER(slh_dsa_shake_192s, slh_dsa); 734 MAKE_TEXT_ENCODER(slh_dsa_shake_192f, slh_dsa); 735 MAKE_TEXT_ENCODER(slh_dsa_shake_256s, slh_dsa); 736 MAKE_TEXT_ENCODER(slh_dsa_shake_256f, slh_dsa); 737 #endif 738