| /* | 
 |  * Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. | 
 |  * | 
 |  * Licensed under the OpenSSL license (the "License").  You may not use | 
 |  * this file except in compliance with the License.  You can obtain a copy | 
 |  * in the file LICENSE in the source distribution or at | 
 |  * https://www.openssl.org/source/license.html | 
 |  */ | 
 |  | 
 | #ifndef OPENSSL_HEADER_EVP_INTERNAL_H | 
 | #define OPENSSL_HEADER_EVP_INTERNAL_H | 
 |  | 
 | #include <openssl/base.h> | 
 |  | 
 | #include <openssl/rsa.h> | 
 |  | 
 | #if defined(__cplusplus) | 
 | extern "C" { | 
 | #endif | 
 |  | 
 |  | 
 | typedef struct evp_pkey_asn1_method_st EVP_PKEY_ASN1_METHOD; | 
 | typedef struct evp_pkey_method_st EVP_PKEY_METHOD; | 
 |  | 
 | struct evp_pkey_asn1_method_st { | 
 |   int pkey_id; | 
 |   uint8_t oid[9]; | 
 |   uint8_t oid_len; | 
 |  | 
 |   const EVP_PKEY_METHOD *pkey_method; | 
 |  | 
 |   // pub_decode decodes |params| and |key| as a SubjectPublicKeyInfo | 
 |   // and writes the result into |out|. It returns one on success and zero on | 
 |   // error. |params| is the AlgorithmIdentifier after the OBJECT IDENTIFIER | 
 |   // type field, and |key| is the contents of the subjectPublicKey with the | 
 |   // leading padding byte checked and removed. Although X.509 uses BIT STRINGs | 
 |   // to represent SubjectPublicKeyInfo, every key type defined encodes the key | 
 |   // as a byte string with the same conversion to BIT STRING. | 
 |   int (*pub_decode)(EVP_PKEY *out, CBS *params, CBS *key); | 
 |  | 
 |   // pub_encode encodes |key| as a SubjectPublicKeyInfo and appends the result | 
 |   // to |out|. It returns one on success and zero on error. | 
 |   int (*pub_encode)(CBB *out, const EVP_PKEY *key); | 
 |  | 
 |   int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b); | 
 |  | 
 |   // priv_decode decodes |params| and |key| as a PrivateKeyInfo and writes the | 
 |   // result into |out|. It returns one on success and zero on error. |params| is | 
 |   // the AlgorithmIdentifier after the OBJECT IDENTIFIER type field, and |key| | 
 |   // is the contents of the OCTET STRING privateKey field. | 
 |   int (*priv_decode)(EVP_PKEY *out, CBS *params, CBS *key); | 
 |  | 
 |   // priv_encode encodes |key| as a PrivateKeyInfo and appends the result to | 
 |   // |out|. It returns one on success and zero on error. | 
 |   int (*priv_encode)(CBB *out, const EVP_PKEY *key); | 
 |  | 
 |   int (*set_priv_raw)(EVP_PKEY *pkey, const uint8_t *in, size_t len); | 
 |   int (*set_pub_raw)(EVP_PKEY *pkey, const uint8_t *in, size_t len); | 
 |   int (*get_priv_raw)(const EVP_PKEY *pkey, uint8_t *out, size_t *out_len); | 
 |   int (*get_pub_raw)(const EVP_PKEY *pkey, uint8_t *out, size_t *out_len); | 
 |  | 
 |   // TODO(davidben): Can these be merged with the functions above? OpenSSL does | 
 |   // not implement |EVP_PKEY_get_raw_public_key|, etc., for |EVP_PKEY_EC|, but | 
 |   // the distinction seems unimportant. OpenSSL 3.0 has since renamed | 
 |   // |EVP_PKEY_get1_tls_encodedpoint| to |EVP_PKEY_get1_encoded_public_key|, and | 
 |   // what is the difference between "raw" and an "encoded" public key. | 
 |   // | 
 |   // One nuisance is the notion of "raw" is slightly ambiguous for EC keys. Is | 
 |   // it a DER ECPrivateKey or just the scalar? | 
 |   int (*set1_tls_encodedpoint)(EVP_PKEY *pkey, const uint8_t *in, size_t len); | 
 |   size_t (*get1_tls_encodedpoint)(const EVP_PKEY *pkey, uint8_t **out_ptr); | 
 |  | 
 |   // pkey_opaque returns 1 if the |pk| is opaque. Opaque keys are backed by | 
 |   // custom implementations which do not expose key material and parameters. | 
 |   int (*pkey_opaque)(const EVP_PKEY *pk); | 
 |  | 
 |   int (*pkey_size)(const EVP_PKEY *pk); | 
 |   int (*pkey_bits)(const EVP_PKEY *pk); | 
 |  | 
 |   int (*param_missing)(const EVP_PKEY *pk); | 
 |   int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from); | 
 |   int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b); | 
 |  | 
 |   void (*pkey_free)(EVP_PKEY *pkey); | 
 | } /* EVP_PKEY_ASN1_METHOD */; | 
 |  | 
 | struct evp_pkey_st { | 
 |   CRYPTO_refcount_t references; | 
 |  | 
 |   // type contains one of the EVP_PKEY_* values or NID_undef and determines | 
 |   // the type of |pkey|. | 
 |   int type; | 
 |  | 
 |   // pkey contains a pointer to a structure dependent on |type|. | 
 |   void *pkey; | 
 |  | 
 |   // ameth contains a pointer to a method table that contains many ASN.1 | 
 |   // methods for the key type. | 
 |   const EVP_PKEY_ASN1_METHOD *ameth; | 
 | } /* EVP_PKEY */; | 
 |  | 
 | #define EVP_PKEY_OP_UNDEFINED 0 | 
 | #define EVP_PKEY_OP_KEYGEN (1 << 2) | 
 | #define EVP_PKEY_OP_SIGN (1 << 3) | 
 | #define EVP_PKEY_OP_VERIFY (1 << 4) | 
 | #define EVP_PKEY_OP_VERIFYRECOVER (1 << 5) | 
 | #define EVP_PKEY_OP_ENCRYPT (1 << 6) | 
 | #define EVP_PKEY_OP_DECRYPT (1 << 7) | 
 | #define EVP_PKEY_OP_DERIVE (1 << 8) | 
 | #define EVP_PKEY_OP_PARAMGEN (1 << 9) | 
 |  | 
 | #define EVP_PKEY_OP_TYPE_SIG \ | 
 |   (EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY | EVP_PKEY_OP_VERIFYRECOVER) | 
 |  | 
 | #define EVP_PKEY_OP_TYPE_CRYPT (EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT) | 
 |  | 
 | #define EVP_PKEY_OP_TYPE_NOGEN \ | 
 |   (EVP_PKEY_OP_SIG | EVP_PKEY_OP_CRYPT | EVP_PKEY_OP_DERIVE) | 
 |  | 
 | #define EVP_PKEY_OP_TYPE_GEN (EVP_PKEY_OP_KEYGEN | EVP_PKEY_OP_PARAMGEN) | 
 |  | 
 | // EVP_PKEY_CTX_ctrl performs |cmd| on |ctx|. The |keytype| and |optype| | 
 | // arguments can be -1 to specify that any type and operation are acceptable, | 
 | // otherwise |keytype| must match the type of |ctx| and the bits of |optype| | 
 | // must intersect the operation flags set on |ctx|. | 
 | // | 
 | // The |p1| and |p2| arguments depend on the value of |cmd|. | 
 | // | 
 | // It returns one on success and zero on error. | 
 | OPENSSL_EXPORT int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, | 
 |                                      int cmd, int p1, void *p2); | 
 |  | 
 | #define EVP_PKEY_CTRL_MD 1 | 
 | #define EVP_PKEY_CTRL_GET_MD 2 | 
 |  | 
 | // EVP_PKEY_CTRL_PEER_KEY is called with different values of |p1|: | 
 | //   0: Is called from |EVP_PKEY_derive_set_peer| and |p2| contains a peer key. | 
 | //      If the return value is <= 0, the key is rejected. | 
 | //   1: Is called at the end of |EVP_PKEY_derive_set_peer| and |p2| contains a | 
 | //      peer key. If the return value is <= 0, the key is rejected. | 
 | //   2: Is called with |p2| == NULL to test whether the peer's key was used. | 
 | //      (EC)DH always return one in this case. | 
 | //   3: Is called with |p2| == NULL to set whether the peer's key was used. | 
 | //      (EC)DH always return one in this case. This was only used for GOST. | 
 | #define EVP_PKEY_CTRL_PEER_KEY 3 | 
 |  | 
 | // EVP_PKEY_ALG_CTRL is the base value from which key-type specific ctrl | 
 | // commands are numbered. | 
 | #define EVP_PKEY_ALG_CTRL 0x1000 | 
 |  | 
 | #define EVP_PKEY_CTRL_RSA_PADDING (EVP_PKEY_ALG_CTRL + 1) | 
 | #define EVP_PKEY_CTRL_GET_RSA_PADDING (EVP_PKEY_ALG_CTRL + 2) | 
 | #define EVP_PKEY_CTRL_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 3) | 
 | #define EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 4) | 
 | #define EVP_PKEY_CTRL_RSA_KEYGEN_BITS (EVP_PKEY_ALG_CTRL + 5) | 
 | #define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP (EVP_PKEY_ALG_CTRL + 6) | 
 | #define EVP_PKEY_CTRL_RSA_OAEP_MD (EVP_PKEY_ALG_CTRL + 7) | 
 | #define EVP_PKEY_CTRL_GET_RSA_OAEP_MD (EVP_PKEY_ALG_CTRL + 8) | 
 | #define EVP_PKEY_CTRL_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 9) | 
 | #define EVP_PKEY_CTRL_GET_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 10) | 
 | #define EVP_PKEY_CTRL_RSA_OAEP_LABEL (EVP_PKEY_ALG_CTRL + 11) | 
 | #define EVP_PKEY_CTRL_GET_RSA_OAEP_LABEL (EVP_PKEY_ALG_CTRL + 12) | 
 | #define EVP_PKEY_CTRL_EC_PARAMGEN_CURVE_NID (EVP_PKEY_ALG_CTRL + 13) | 
 | #define EVP_PKEY_CTRL_HKDF_MODE (EVP_PKEY_ALG_CTRL + 14) | 
 | #define EVP_PKEY_CTRL_HKDF_MD (EVP_PKEY_ALG_CTRL + 15) | 
 | #define EVP_PKEY_CTRL_HKDF_KEY (EVP_PKEY_ALG_CTRL + 16) | 
 | #define EVP_PKEY_CTRL_HKDF_SALT (EVP_PKEY_ALG_CTRL + 17) | 
 | #define EVP_PKEY_CTRL_HKDF_INFO (EVP_PKEY_ALG_CTRL + 18) | 
 | #define EVP_PKEY_CTRL_DH_PAD (EVP_PKEY_ALG_CTRL + 19) | 
 |  | 
 | struct evp_pkey_ctx_st { | 
 |   // Method associated with this operation | 
 |   const EVP_PKEY_METHOD *pmeth; | 
 |   // Engine that implements this method or NULL if builtin | 
 |   ENGINE *engine; | 
 |   // Key: may be NULL | 
 |   EVP_PKEY *pkey; | 
 |   // Peer key for key agreement, may be NULL | 
 |   EVP_PKEY *peerkey; | 
 |   // operation contains one of the |EVP_PKEY_OP_*| values. | 
 |   int operation; | 
 |   // Algorithm specific data | 
 |   void *data; | 
 | } /* EVP_PKEY_CTX */; | 
 |  | 
 | struct evp_pkey_method_st { | 
 |   int pkey_id; | 
 |  | 
 |   int (*init)(EVP_PKEY_CTX *ctx); | 
 |   int (*copy)(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src); | 
 |   void (*cleanup)(EVP_PKEY_CTX *ctx); | 
 |  | 
 |   int (*keygen)(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); | 
 |  | 
 |   int (*sign)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, | 
 |               const uint8_t *tbs, size_t tbslen); | 
 |  | 
 |   int (*sign_message)(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *siglen, | 
 |                       const uint8_t *tbs, size_t tbslen); | 
 |  | 
 |   int (*verify)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, | 
 |                 const uint8_t *tbs, size_t tbslen); | 
 |  | 
 |   int (*verify_message)(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t siglen, | 
 |                         const uint8_t *tbs, size_t tbslen); | 
 |  | 
 |   int (*verify_recover)(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len, | 
 |                         const uint8_t *sig, size_t sig_len); | 
 |  | 
 |   int (*encrypt)(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *outlen, | 
 |                  const uint8_t *in, size_t inlen); | 
 |  | 
 |   int (*decrypt)(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *outlen, | 
 |                  const uint8_t *in, size_t inlen); | 
 |  | 
 |   int (*derive)(EVP_PKEY_CTX *ctx, uint8_t *key, size_t *keylen); | 
 |  | 
 |   int (*paramgen)(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); | 
 |  | 
 |   int (*ctrl)(EVP_PKEY_CTX *ctx, int type, int p1, void *p2); | 
 | } /* EVP_PKEY_METHOD */; | 
 |  | 
 | typedef struct { | 
 |   // key is the concatenation of the private seed and public key. It is stored | 
 |   // as a single 64-bit array to allow passing to |ED25519_sign|. If | 
 |   // |has_private| is false, the first 32 bytes are uninitialized and the public | 
 |   // key is in the last 32 bytes. | 
 |   uint8_t key[64]; | 
 |   char has_private; | 
 | } ED25519_KEY; | 
 |  | 
 | #define ED25519_PUBLIC_KEY_OFFSET 32 | 
 |  | 
 | typedef struct { | 
 |   uint8_t pub[32]; | 
 |   uint8_t priv[32]; | 
 |   char has_private; | 
 | } X25519_KEY; | 
 |  | 
 | extern const EVP_PKEY_ASN1_METHOD dsa_asn1_meth; | 
 | extern const EVP_PKEY_ASN1_METHOD ec_asn1_meth; | 
 | extern const EVP_PKEY_ASN1_METHOD rsa_asn1_meth; | 
 | extern const EVP_PKEY_ASN1_METHOD ed25519_asn1_meth; | 
 | extern const EVP_PKEY_ASN1_METHOD x25519_asn1_meth; | 
 | extern const EVP_PKEY_ASN1_METHOD dh_asn1_meth; | 
 |  | 
 | extern const EVP_PKEY_METHOD rsa_pkey_meth; | 
 | extern const EVP_PKEY_METHOD ec_pkey_meth; | 
 | extern const EVP_PKEY_METHOD ed25519_pkey_meth; | 
 | extern const EVP_PKEY_METHOD x25519_pkey_meth; | 
 | extern const EVP_PKEY_METHOD hkdf_pkey_meth; | 
 | extern const EVP_PKEY_METHOD dh_pkey_meth; | 
 |  | 
 | // evp_pkey_set_method behaves like |EVP_PKEY_set_type|, but takes a pointer to | 
 | // a method table. This avoids depending on every |EVP_PKEY_ASN1_METHOD|. | 
 | void evp_pkey_set_method(EVP_PKEY *pkey, const EVP_PKEY_ASN1_METHOD *method); | 
 |  | 
 |  | 
 | #if defined(__cplusplus) | 
 | }  // extern C | 
 | #endif | 
 |  | 
 | #endif  // OPENSSL_HEADER_EVP_INTERNAL_H |