1 /* 2 * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 /* 11 * Low level APIs are deprecated for public use, but still ok for internal use. 12 */ 13 #include "internal/deprecated.h" 14 15 #include <ctype.h> 16 17 #include <openssl/core.h> 18 #include <openssl/core_dispatch.h> 19 #include <openssl/core_names.h> 20 #include <openssl/bn.h> 21 #include <openssl/err.h> 22 #include <openssl/safestack.h> 23 #include <openssl/proverr.h> 24 #include "internal/ffc.h" 25 #include "crypto/bn.h" /* bn_get_words() */ 26 #include "crypto/dh.h" /* ossl_dh_get0_params() */ 27 #include "crypto/dsa.h" /* ossl_dsa_get0_params() */ 28 #include "crypto/ec.h" /* ossl_ec_key_get_libctx */ 29 #include "crypto/ecx.h" /* ECX_KEY, etc... */ 30 #include "crypto/rsa.h" /* RSA_PSS_PARAMS_30, etc... */ 31 #include "prov/bio.h" 32 #include "prov/implementations.h" 33 #include "endecoder_local.h" 34 35 DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM) 36 37 # ifdef SIXTY_FOUR_BIT_LONG 38 # define BN_FMTu "%lu" 39 # define BN_FMTx "%lx" 40 # endif 41 42 # ifdef SIXTY_FOUR_BIT 43 # define BN_FMTu "%llu" 44 # define BN_FMTx "%llx" 45 # endif 46 47 # ifdef THIRTY_TWO_BIT 48 # define BN_FMTu "%u" 49 # define BN_FMTx "%x" 50 # endif 51 52 static int print_labeled_bignum(BIO *out, const char *label, const BIGNUM *bn) 53 { 54 int ret = 0, use_sep = 0; 55 char *hex_str = NULL, *p; 56 const char spaces[] = " "; 57 const char *post_label_spc = " "; 58 59 const char *neg = ""; 60 int bytes; 61 62 if (bn == NULL) 63 return 0; 64 if (label == NULL) { 65 label = ""; 66 post_label_spc = ""; 67 } 68 69 if (BN_is_zero(bn)) 70 return BIO_printf(out, "%s%s0\n", label, post_label_spc); 71 72 if (BN_num_bytes(bn) <= BN_BYTES) { 73 BN_ULONG *words = bn_get_words(bn); 74 75 if (BN_is_negative(bn)) 76 neg = "-"; 77 78 return BIO_printf(out, "%s%s%s" BN_FMTu " (%s0x" BN_FMTx ")\n", 79 label, post_label_spc, neg, words[0], neg, words[0]); 80 } 81 82 hex_str = BN_bn2hex(bn); 83 if (hex_str == NULL) 84 return 0; 85 86 p = hex_str; 87 if (*p == '-') { 88 ++p; 89 neg = " (Negative)"; 90 } 91 if (BIO_printf(out, "%s%s\n", label, neg) <= 0) 92 goto err; 93 94 /* Keep track of how many bytes we have printed out so far */ 95 bytes = 0; 96 97 if (BIO_printf(out, "%s", spaces) <= 0) 98 goto err; 99 100 /* Add a leading 00 if the top bit is set */ 101 if (*p >= '8') { 102 if (BIO_printf(out, "%02x", 0) <= 0) 103 goto err; 104 ++bytes; 105 use_sep = 1; 106 } 107 while (*p != '\0') { 108 /* Do a newline after every 15 hex bytes + add the space indent */ 109 if ((bytes % 15) == 0 && bytes > 0) { 110 if (BIO_printf(out, ":\n%s", spaces) <= 0) 111 goto err; 112 use_sep = 0; /* The first byte on the next line doesnt have a : */ 113 } 114 if (BIO_printf(out, "%s%c%c", use_sep ? ":" : "", 115 tolower((unsigned char)p[0]), 116 tolower((unsigned char)p[1])) <= 0) 117 goto err; 118 ++bytes; 119 p += 2; 120 use_sep = 1; 121 } 122 if (BIO_printf(out, "\n") <= 0) 123 goto err; 124 ret = 1; 125 err: 126 OPENSSL_free(hex_str); 127 return ret; 128 } 129 130 /* Number of octets per line */ 131 #define LABELED_BUF_PRINT_WIDTH 15 132 133 #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC) 134 static int print_labeled_buf(BIO *out, const char *label, 135 const unsigned char *buf, size_t buflen) 136 { 137 size_t i; 138 139 if (BIO_printf(out, "%s\n", label) <= 0) 140 return 0; 141 142 for (i = 0; i < buflen; i++) { 143 if ((i % LABELED_BUF_PRINT_WIDTH) == 0) { 144 if (i > 0 && BIO_printf(out, "\n") <= 0) 145 return 0; 146 if (BIO_printf(out, " ") <= 0) 147 return 0; 148 } 149 150 if (BIO_printf(out, "%02x%s", buf[i], 151 (i == buflen - 1) ? "" : ":") <= 0) 152 return 0; 153 } 154 if (BIO_printf(out, "\n") <= 0) 155 return 0; 156 157 return 1; 158 } 159 #endif 160 161 #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) 162 static int ffc_params_to_text(BIO *out, const FFC_PARAMS *ffc) 163 { 164 if (ffc->nid != NID_undef) { 165 #ifndef OPENSSL_NO_DH 166 const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid); 167 const char *name = ossl_ffc_named_group_get_name(group); 168 169 if (name == NULL) 170 goto err; 171 if (BIO_printf(out, "GROUP: %s\n", name) <= 0) 172 goto err; 173 return 1; 174 #else 175 /* How could this be? We should not have a nid in a no-dh build. */ 176 goto err; 177 #endif 178 } 179 180 if (!print_labeled_bignum(out, "P: ", ffc->p)) 181 goto err; 182 if (ffc->q != NULL) { 183 if (!print_labeled_bignum(out, "Q: ", ffc->q)) 184 goto err; 185 } 186 if (!print_labeled_bignum(out, "G: ", ffc->g)) 187 goto err; 188 if (ffc->j != NULL) { 189 if (!print_labeled_bignum(out, "J: ", ffc->j)) 190 goto err; 191 } 192 if (ffc->seed != NULL) { 193 if (!print_labeled_buf(out, "SEED:", ffc->seed, ffc->seedlen)) 194 goto err; 195 } 196 if (ffc->gindex != -1) { 197 if (BIO_printf(out, "gindex: %d\n", ffc->gindex) <= 0) 198 goto err; 199 } 200 if (ffc->pcounter != -1) { 201 if (BIO_printf(out, "pcounter: %d\n", ffc->pcounter) <= 0) 202 goto err; 203 } 204 if (ffc->h != 0) { 205 if (BIO_printf(out, "h: %d\n", ffc->h) <= 0) 206 goto err; 207 } 208 return 1; 209 err: 210 return 0; 211 } 212 #endif 213 214 /* ---------------------------------------------------------------------- */ 215 216 #ifndef OPENSSL_NO_DH 217 static int dh_to_text(BIO *out, const void *key, int selection) 218 { 219 const DH *dh = key; 220 const char *type_label = NULL; 221 const BIGNUM *priv_key = NULL, *pub_key = NULL; 222 const FFC_PARAMS *params = NULL; 223 const BIGNUM *p = NULL; 224 long length; 225 226 if (out == NULL || dh == NULL) { 227 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 228 return 0; 229 } 230 231 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 232 type_label = "DH Private-Key"; 233 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 234 type_label = "DH Public-Key"; 235 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 236 type_label = "DH Parameters"; 237 238 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 239 priv_key = DH_get0_priv_key(dh); 240 if (priv_key == NULL) { 241 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 242 return 0; 243 } 244 } 245 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 246 pub_key = DH_get0_pub_key(dh); 247 if (pub_key == NULL) { 248 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 249 return 0; 250 } 251 } 252 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { 253 params = ossl_dh_get0_params((DH *)dh); 254 if (params == NULL) { 255 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); 256 return 0; 257 } 258 } 259 260 p = DH_get0_p(dh); 261 if (p == NULL) { 262 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 263 return 0; 264 } 265 266 if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) 267 return 0; 268 if (priv_key != NULL 269 && !print_labeled_bignum(out, "private-key:", priv_key)) 270 return 0; 271 if (pub_key != NULL 272 && !print_labeled_bignum(out, "public-key:", pub_key)) 273 return 0; 274 if (params != NULL 275 && !ffc_params_to_text(out, params)) 276 return 0; 277 length = DH_get_length(dh); 278 if (length > 0 279 && BIO_printf(out, "recommended-private-length: %ld bits\n", 280 length) <= 0) 281 return 0; 282 283 return 1; 284 } 285 286 # define dh_input_type "DH" 287 # define dhx_input_type "DHX" 288 #endif 289 290 /* ---------------------------------------------------------------------- */ 291 292 #ifndef OPENSSL_NO_DSA 293 static int dsa_to_text(BIO *out, const void *key, int selection) 294 { 295 const DSA *dsa = key; 296 const char *type_label = NULL; 297 const BIGNUM *priv_key = NULL, *pub_key = NULL; 298 const FFC_PARAMS *params = NULL; 299 const BIGNUM *p = NULL; 300 301 if (out == NULL || dsa == NULL) { 302 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 303 return 0; 304 } 305 306 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 307 type_label = "Private-Key"; 308 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 309 type_label = "Public-Key"; 310 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 311 type_label = "DSA-Parameters"; 312 313 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 314 priv_key = DSA_get0_priv_key(dsa); 315 if (priv_key == NULL) { 316 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 317 return 0; 318 } 319 } 320 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 321 pub_key = DSA_get0_pub_key(dsa); 322 if (pub_key == NULL) { 323 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 324 return 0; 325 } 326 } 327 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) { 328 params = ossl_dsa_get0_params((DSA *)dsa); 329 if (params == NULL) { 330 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS); 331 return 0; 332 } 333 } 334 335 p = DSA_get0_p(dsa); 336 if (p == NULL) { 337 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 338 return 0; 339 } 340 341 if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0) 342 return 0; 343 if (priv_key != NULL 344 && !print_labeled_bignum(out, "priv:", priv_key)) 345 return 0; 346 if (pub_key != NULL 347 && !print_labeled_bignum(out, "pub: ", pub_key)) 348 return 0; 349 if (params != NULL 350 && !ffc_params_to_text(out, params)) 351 return 0; 352 353 return 1; 354 } 355 356 # define dsa_input_type "DSA" 357 #endif 358 359 /* ---------------------------------------------------------------------- */ 360 361 #ifndef OPENSSL_NO_EC 362 static int ec_param_explicit_curve_to_text(BIO *out, const EC_GROUP *group, 363 BN_CTX *ctx) 364 { 365 const char *plabel = "Prime:"; 366 BIGNUM *p = NULL, *a = NULL, *b = NULL; 367 368 p = BN_CTX_get(ctx); 369 a = BN_CTX_get(ctx); 370 b = BN_CTX_get(ctx); 371 if (b == NULL 372 || !EC_GROUP_get_curve(group, p, a, b, ctx)) 373 return 0; 374 375 if (EC_GROUP_get_field_type(group) == NID_X9_62_characteristic_two_field) { 376 int basis_type = EC_GROUP_get_basis_type(group); 377 378 /* print the 'short name' of the base type OID */ 379 if (basis_type == NID_undef 380 || BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0) 381 return 0; 382 plabel = "Polynomial:"; 383 } 384 return print_labeled_bignum(out, plabel, p) 385 && print_labeled_bignum(out, "A: ", a) 386 && print_labeled_bignum(out, "B: ", b); 387 } 388 389 static int ec_param_explicit_gen_to_text(BIO *out, const EC_GROUP *group, 390 BN_CTX *ctx) 391 { 392 int ret; 393 size_t buflen; 394 point_conversion_form_t form; 395 const EC_POINT *point = NULL; 396 const char *glabel = NULL; 397 unsigned char *buf = NULL; 398 399 form = EC_GROUP_get_point_conversion_form(group); 400 point = EC_GROUP_get0_generator(group); 401 402 if (point == NULL) 403 return 0; 404 405 switch (form) { 406 case POINT_CONVERSION_COMPRESSED: 407 glabel = "Generator (compressed):"; 408 break; 409 case POINT_CONVERSION_UNCOMPRESSED: 410 glabel = "Generator (uncompressed):"; 411 break; 412 case POINT_CONVERSION_HYBRID: 413 glabel = "Generator (hybrid):"; 414 break; 415 default: 416 return 0; 417 } 418 419 buflen = EC_POINT_point2buf(group, point, form, &buf, ctx); 420 if (buflen == 0) 421 return 0; 422 423 ret = print_labeled_buf(out, glabel, buf, buflen); 424 OPENSSL_clear_free(buf, buflen); 425 return ret; 426 } 427 428 /* Print explicit parameters */ 429 static int ec_param_explicit_to_text(BIO *out, const EC_GROUP *group, 430 OSSL_LIB_CTX *libctx) 431 { 432 int ret = 0, tmp_nid; 433 BN_CTX *ctx = NULL; 434 const BIGNUM *order = NULL, *cofactor = NULL; 435 const unsigned char *seed; 436 size_t seed_len = 0; 437 438 ctx = BN_CTX_new_ex(libctx); 439 if (ctx == NULL) 440 return 0; 441 BN_CTX_start(ctx); 442 443 tmp_nid = EC_GROUP_get_field_type(group); 444 order = EC_GROUP_get0_order(group); 445 if (order == NULL) 446 goto err; 447 448 seed = EC_GROUP_get0_seed(group); 449 if (seed != NULL) 450 seed_len = EC_GROUP_get_seed_len(group); 451 cofactor = EC_GROUP_get0_cofactor(group); 452 453 /* print the 'short name' of the field type */ 454 if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0 455 || !ec_param_explicit_curve_to_text(out, group, ctx) 456 || !ec_param_explicit_gen_to_text(out, group, ctx) 457 || !print_labeled_bignum(out, "Order: ", order) 458 || (cofactor != NULL 459 && !print_labeled_bignum(out, "Cofactor: ", cofactor)) 460 || (seed != NULL 461 && !print_labeled_buf(out, "Seed:", seed, seed_len))) 462 goto err; 463 ret = 1; 464 err: 465 BN_CTX_end(ctx); 466 BN_CTX_free(ctx); 467 return ret; 468 } 469 470 static int ec_param_to_text(BIO *out, const EC_GROUP *group, 471 OSSL_LIB_CTX *libctx) 472 { 473 if (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE) { 474 const char *curve_name; 475 int curve_nid = EC_GROUP_get_curve_name(group); 476 477 /* Explicit parameters */ 478 if (curve_nid == NID_undef) 479 return 0; 480 481 if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0) 482 return 0; 483 484 curve_name = EC_curve_nid2nist(curve_nid); 485 return (curve_name == NULL 486 || BIO_printf(out, "%s: %s\n", "NIST CURVE", curve_name) > 0); 487 } else { 488 return ec_param_explicit_to_text(out, group, libctx); 489 } 490 } 491 492 static int ec_to_text(BIO *out, const void *key, int selection) 493 { 494 const EC_KEY *ec = key; 495 const char *type_label = NULL; 496 unsigned char *priv = NULL, *pub = NULL; 497 size_t priv_len = 0, pub_len = 0; 498 const EC_GROUP *group; 499 int ret = 0; 500 501 if (out == NULL || ec == NULL) { 502 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 503 return 0; 504 } 505 506 if ((group = EC_KEY_get0_group(ec)) == NULL) { 507 ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY); 508 return 0; 509 } 510 511 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 512 type_label = "Private-Key"; 513 else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) 514 type_label = "Public-Key"; 515 else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 516 type_label = "EC-Parameters"; 517 518 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 519 const BIGNUM *priv_key = EC_KEY_get0_private_key(ec); 520 521 if (priv_key == NULL) { 522 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 523 goto err; 524 } 525 priv_len = EC_KEY_priv2buf(ec, &priv); 526 if (priv_len == 0) 527 goto err; 528 } 529 if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) { 530 const EC_POINT *pub_pt = EC_KEY_get0_public_key(ec); 531 532 if (pub_pt == NULL) { 533 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 534 goto err; 535 } 536 537 pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL); 538 if (pub_len == 0) 539 goto err; 540 } 541 542 if (BIO_printf(out, "%s: (%d bit)\n", type_label, 543 EC_GROUP_order_bits(group)) <= 0) 544 goto err; 545 if (priv != NULL 546 && !print_labeled_buf(out, "priv:", priv, priv_len)) 547 goto err; 548 if (pub != NULL 549 && !print_labeled_buf(out, "pub:", pub, pub_len)) 550 goto err; 551 if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) 552 ret = ec_param_to_text(out, group, ossl_ec_key_get_libctx(ec)); 553 err: 554 OPENSSL_clear_free(priv, priv_len); 555 OPENSSL_free(pub); 556 return ret; 557 } 558 559 # define ec_input_type "EC" 560 561 # ifndef OPENSSL_NO_SM2 562 # define sm2_input_type "SM2" 563 # endif 564 #endif 565 566 /* ---------------------------------------------------------------------- */ 567 568 #ifndef OPENSSL_NO_EC 569 static int ecx_to_text(BIO *out, const void *key, int selection) 570 { 571 const ECX_KEY *ecx = key; 572 const char *type_label = NULL; 573 574 if (out == NULL || ecx == NULL) { 575 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 576 return 0; 577 } 578 579 switch (ecx->type) { 580 case ECX_KEY_TYPE_X25519: 581 type_label = "X25519"; 582 break; 583 case ECX_KEY_TYPE_X448: 584 type_label = "X448"; 585 break; 586 case ECX_KEY_TYPE_ED25519: 587 type_label = "ED25519"; 588 break; 589 case ECX_KEY_TYPE_ED448: 590 type_label = "ED448"; 591 break; 592 } 593 594 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 595 if (ecx->privkey == NULL) { 596 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); 597 return 0; 598 } 599 600 if (BIO_printf(out, "%s Private-Key:\n", type_label) <= 0) 601 return 0; 602 if (!print_labeled_buf(out, "priv:", ecx->privkey, ecx->keylen)) 603 return 0; 604 } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 605 /* ecx->pubkey is an array, not a pointer... */ 606 if (!ecx->haspubkey) { 607 ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); 608 return 0; 609 } 610 611 if (BIO_printf(out, "%s Public-Key:\n", type_label) <= 0) 612 return 0; 613 } 614 615 if (!print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen)) 616 return 0; 617 618 return 1; 619 } 620 621 # define ed25519_input_type "ED25519" 622 # define ed448_input_type "ED448" 623 # define x25519_input_type "X25519" 624 # define x448_input_type "X448" 625 #endif 626 627 /* ---------------------------------------------------------------------- */ 628 629 static int rsa_to_text(BIO *out, const void *key, int selection) 630 { 631 const RSA *rsa = key; 632 const char *type_label = "RSA key"; 633 const char *modulus_label = NULL; 634 const char *exponent_label = NULL; 635 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; 636 STACK_OF(BIGNUM_const) *factors = NULL; 637 STACK_OF(BIGNUM_const) *exps = NULL; 638 STACK_OF(BIGNUM_const) *coeffs = NULL; 639 int primes; 640 const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa); 641 int ret = 0; 642 643 if (out == NULL || rsa == NULL) { 644 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); 645 goto err; 646 } 647 648 factors = sk_BIGNUM_const_new_null(); 649 exps = sk_BIGNUM_const_new_null(); 650 coeffs = sk_BIGNUM_const_new_null(); 651 652 if (factors == NULL || exps == NULL || coeffs == NULL) { 653 ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); 654 goto err; 655 } 656 657 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 658 type_label = "Private-Key"; 659 modulus_label = "modulus:"; 660 exponent_label = "publicExponent:"; 661 } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 662 type_label = "Public-Key"; 663 modulus_label = "Modulus:"; 664 exponent_label = "Exponent:"; 665 } 666 667 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); 668 ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); 669 primes = sk_BIGNUM_const_num(factors); 670 671 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 672 if (BIO_printf(out, "%s: (%d bit, %d primes)\n", 673 type_label, BN_num_bits(rsa_n), primes) <= 0) 674 goto err; 675 } else { 676 if (BIO_printf(out, "%s: (%d bit)\n", 677 type_label, BN_num_bits(rsa_n)) <= 0) 678 goto err; 679 } 680 681 if (!print_labeled_bignum(out, modulus_label, rsa_n)) 682 goto err; 683 if (!print_labeled_bignum(out, exponent_label, rsa_e)) 684 goto err; 685 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 686 int i; 687 688 if (!print_labeled_bignum(out, "privateExponent:", rsa_d)) 689 goto err; 690 if (!print_labeled_bignum(out, "prime1:", 691 sk_BIGNUM_const_value(factors, 0))) 692 goto err; 693 if (!print_labeled_bignum(out, "prime2:", 694 sk_BIGNUM_const_value(factors, 1))) 695 goto err; 696 if (!print_labeled_bignum(out, "exponent1:", 697 sk_BIGNUM_const_value(exps, 0))) 698 goto err; 699 if (!print_labeled_bignum(out, "exponent2:", 700 sk_BIGNUM_const_value(exps, 1))) 701 goto err; 702 if (!print_labeled_bignum(out, "coefficient:", 703 sk_BIGNUM_const_value(coeffs, 0))) 704 goto err; 705 for (i = 2; i < sk_BIGNUM_const_num(factors); i++) { 706 if (BIO_printf(out, "prime%d:", i + 1) <= 0) 707 goto err; 708 if (!print_labeled_bignum(out, NULL, 709 sk_BIGNUM_const_value(factors, i))) 710 goto err; 711 if (BIO_printf(out, "exponent%d:", i + 1) <= 0) 712 goto err; 713 if (!print_labeled_bignum(out, NULL, 714 sk_BIGNUM_const_value(exps, i))) 715 goto err; 716 if (BIO_printf(out, "coefficient%d:", i + 1) <= 0) 717 goto err; 718 if (!print_labeled_bignum(out, NULL, 719 sk_BIGNUM_const_value(coeffs, i - 1))) 720 goto err; 721 } 722 } 723 724 if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) { 725 switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) { 726 case RSA_FLAG_TYPE_RSA: 727 if (!ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { 728 if (BIO_printf(out, "(INVALID PSS PARAMETERS)\n") <= 0) 729 goto err; 730 } 731 break; 732 case RSA_FLAG_TYPE_RSASSAPSS: 733 if (ossl_rsa_pss_params_30_is_unrestricted(pss_params)) { 734 if (BIO_printf(out, "No PSS parameter restrictions\n") <= 0) 735 goto err; 736 } else { 737 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss_params); 738 int maskgenalg_nid = 739 ossl_rsa_pss_params_30_maskgenalg(pss_params); 740 int maskgenhashalg_nid = 741 ossl_rsa_pss_params_30_maskgenhashalg(pss_params); 742 int saltlen = ossl_rsa_pss_params_30_saltlen(pss_params); 743 int trailerfield = 744 ossl_rsa_pss_params_30_trailerfield(pss_params); 745 746 if (BIO_printf(out, "PSS parameter restrictions:\n") <= 0) 747 goto err; 748 if (BIO_printf(out, " Hash Algorithm: %s%s\n", 749 ossl_rsa_oaeppss_nid2name(hashalg_nid), 750 (hashalg_nid == NID_sha1 751 ? " (default)" : "")) <= 0) 752 goto err; 753 if (BIO_printf(out, " Mask Algorithm: %s with %s%s\n", 754 ossl_rsa_mgf_nid2name(maskgenalg_nid), 755 ossl_rsa_oaeppss_nid2name(maskgenhashalg_nid), 756 (maskgenalg_nid == NID_mgf1 757 && maskgenhashalg_nid == NID_sha1 758 ? " (default)" : "")) <= 0) 759 goto err; 760 if (BIO_printf(out, " Minimum Salt Length: %d%s\n", 761 saltlen, 762 (saltlen == 20 ? " (default)" : "")) <= 0) 763 goto err; 764 if (BIO_printf(out, " Trailer Field: 0x%x%s\n", 765 trailerfield, 766 (trailerfield == 1 ? " (default)" : "")) <= 0) 767 goto err; 768 } 769 break; 770 } 771 } 772 773 ret = 1; 774 err: 775 sk_BIGNUM_const_free(factors); 776 sk_BIGNUM_const_free(exps); 777 sk_BIGNUM_const_free(coeffs); 778 return ret; 779 } 780 781 #define rsa_input_type "RSA" 782 #define rsapss_input_type "RSA-PSS" 783 784 /* ---------------------------------------------------------------------- */ 785 786 static void *key2text_newctx(void *provctx) 787 { 788 return provctx; 789 } 790 791 static void key2text_freectx(ossl_unused void *vctx) 792 { 793 } 794 795 static int key2text_encode(void *vctx, const void *key, int selection, 796 OSSL_CORE_BIO *cout, 797 int (*key2text)(BIO *out, const void *key, 798 int selection), 799 OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg) 800 { 801 BIO *out = ossl_bio_new_from_core_bio(vctx, cout); 802 int ret; 803 804 if (out == NULL) 805 return 0; 806 807 ret = key2text(out, key, selection); 808 BIO_free(out); 809 810 return ret; 811 } 812 813 #define MAKE_TEXT_ENCODER(impl, type) \ 814 static OSSL_FUNC_encoder_import_object_fn \ 815 impl##2text_import_object; \ 816 static OSSL_FUNC_encoder_free_object_fn \ 817 impl##2text_free_object; \ 818 static OSSL_FUNC_encoder_encode_fn impl##2text_encode; \ 819 \ 820 static void *impl##2text_import_object(void *ctx, int selection, \ 821 const OSSL_PARAM params[]) \ 822 { \ 823 return ossl_prov_import_key(ossl_##impl##_keymgmt_functions, \ 824 ctx, selection, params); \ 825 } \ 826 static void impl##2text_free_object(void *key) \ 827 { \ 828 ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key); \ 829 } \ 830 static int impl##2text_encode(void *vctx, OSSL_CORE_BIO *cout, \ 831 const void *key, \ 832 const OSSL_PARAM key_abstract[], \ 833 int selection, \ 834 OSSL_PASSPHRASE_CALLBACK *cb, \ 835 void *cbarg) \ 836 { \ 837 /* We don't deal with abstract objects */ \ 838 if (key_abstract != NULL) { \ 839 ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ 840 return 0; \ 841 } \ 842 return key2text_encode(vctx, key, selection, cout, \ 843 type##_to_text, cb, cbarg); \ 844 } \ 845 const OSSL_DISPATCH ossl_##impl##_to_text_encoder_functions[] = { \ 846 { OSSL_FUNC_ENCODER_NEWCTX, \ 847 (void (*)(void))key2text_newctx }, \ 848 { OSSL_FUNC_ENCODER_FREECTX, \ 849 (void (*)(void))key2text_freectx }, \ 850 { OSSL_FUNC_ENCODER_IMPORT_OBJECT, \ 851 (void (*)(void))impl##2text_import_object }, \ 852 { OSSL_FUNC_ENCODER_FREE_OBJECT, \ 853 (void (*)(void))impl##2text_free_object }, \ 854 { OSSL_FUNC_ENCODER_ENCODE, \ 855 (void (*)(void))impl##2text_encode }, \ 856 { 0, NULL } \ 857 } 858 859 #ifndef OPENSSL_NO_DH 860 MAKE_TEXT_ENCODER(dh, dh); 861 MAKE_TEXT_ENCODER(dhx, dh); 862 #endif 863 #ifndef OPENSSL_NO_DSA 864 MAKE_TEXT_ENCODER(dsa, dsa); 865 #endif 866 #ifndef OPENSSL_NO_EC 867 MAKE_TEXT_ENCODER(ec, ec); 868 # ifndef OPENSSL_NO_SM2 869 MAKE_TEXT_ENCODER(sm2, ec); 870 # endif 871 MAKE_TEXT_ENCODER(ed25519, ecx); 872 MAKE_TEXT_ENCODER(ed448, ecx); 873 MAKE_TEXT_ENCODER(x25519, ecx); 874 MAKE_TEXT_ENCODER(x448, ecx); 875 #endif 876 MAKE_TEXT_ENCODER(rsa, rsa); 877 MAKE_TEXT_ENCODER(rsapss, rsa); 878