/src/openssl/crypto/evp/keymgmt_meth.c
Line  | Count  | Source (jump to first uncovered line)  | 
1  |  | /*  | 
2  |  |  * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.  | 
3  |  |  *  | 
4  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use  | 
5  |  |  * this file except in compliance with the License.  You can obtain a copy  | 
6  |  |  * in the file LICENSE in the source distribution or at  | 
7  |  |  * https://www.openssl.org/source/license.html  | 
8  |  |  */  | 
9  |  |  | 
10  |  | #include <openssl/crypto.h>  | 
11  |  | #include <openssl/core_dispatch.h>  | 
12  |  | #include <openssl/evp.h>  | 
13  |  | #include <openssl/err.h>  | 
14  |  | #include "internal/provider.h"  | 
15  |  | #include "internal/refcount.h"  | 
16  |  | #include "internal/core.h"  | 
17  |  | #include "crypto/evp.h"  | 
18  |  | #include "evp_local.h"  | 
19  |  |  | 
20  |  | static void evp_keymgmt_free(void *data)  | 
21  | 0  | { | 
22  | 0  |     EVP_KEYMGMT_free(data);  | 
23  | 0  | }  | 
24  |  |  | 
25  |  | static int evp_keymgmt_up_ref(void *data)  | 
26  | 0  | { | 
27  | 0  |     return EVP_KEYMGMT_up_ref(data);  | 
28  | 0  | }  | 
29  |  |  | 
30  |  | static void *keymgmt_new(void)  | 
31  | 0  | { | 
32  | 0  |     EVP_KEYMGMT *keymgmt = NULL;  | 
33  |  | 
  | 
34  | 0  |     if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL)  | 
35  | 0  |         return NULL;  | 
36  | 0  |     if (!CRYPTO_NEW_REF(&keymgmt->refcnt, 1)) { | 
37  | 0  |         EVP_KEYMGMT_free(keymgmt);  | 
38  | 0  |         return NULL;  | 
39  | 0  |     }  | 
40  | 0  |     return keymgmt;  | 
41  | 0  | }  | 
42  |  |  | 
43  |  | #ifndef FIPS_MODULE  | 
44  |  | static void help_get_legacy_alg_type_from_keymgmt(const char *keytype,  | 
45  |  |                                                   void *arg)  | 
46  | 0  | { | 
47  | 0  |     int *type = arg;  | 
48  |  | 
  | 
49  | 0  |     if (*type == NID_undef)  | 
50  | 0  |         *type = evp_pkey_name2type(keytype);  | 
51  | 0  | }  | 
52  |  |  | 
53  |  | static int get_legacy_alg_type_from_keymgmt(const EVP_KEYMGMT *keymgmt)  | 
54  | 0  | { | 
55  | 0  |     int type = NID_undef;  | 
56  |  | 
  | 
57  | 0  |     EVP_KEYMGMT_names_do_all(keymgmt, help_get_legacy_alg_type_from_keymgmt,  | 
58  | 0  |                              &type);  | 
59  | 0  |     return type;  | 
60  | 0  | }  | 
61  |  | #endif  | 
62  |  |  | 
63  |  | static void *keymgmt_from_algorithm(int name_id,  | 
64  |  |                                     const OSSL_ALGORITHM *algodef,  | 
65  |  |                                     OSSL_PROVIDER *prov)  | 
66  | 0  | { | 
67  | 0  |     const OSSL_DISPATCH *fns = algodef->implementation;  | 
68  | 0  |     EVP_KEYMGMT *keymgmt = NULL;  | 
69  | 0  |     int setparamfncnt = 0, getparamfncnt = 0;  | 
70  | 0  |     int setgenparamfncnt = 0;  | 
71  | 0  |     int importfncnt = 0, exportfncnt = 0;  | 
72  | 0  |     int importtypesfncnt = 0, exporttypesfncnt = 0;  | 
73  | 0  |     int getgenparamfncnt = 0;  | 
74  |  | 
  | 
75  | 0  |     if ((keymgmt = keymgmt_new()) == NULL)  | 
76  | 0  |         return NULL;  | 
77  |  |  | 
78  | 0  |     keymgmt->name_id = name_id;  | 
79  | 0  |     if ((keymgmt->type_name = ossl_algorithm_get1_first_name(algodef)) == NULL) { | 
80  | 0  |         EVP_KEYMGMT_free(keymgmt);  | 
81  | 0  |         return NULL;  | 
82  | 0  |     }  | 
83  | 0  |     keymgmt->description = algodef->algorithm_description;  | 
84  |  | 
  | 
85  | 0  |     for (; fns->function_id != 0; fns++) { | 
86  | 0  |         switch (fns->function_id) { | 
87  | 0  |         case OSSL_FUNC_KEYMGMT_NEW:  | 
88  | 0  |             if (keymgmt->new == NULL)  | 
89  | 0  |                 keymgmt->new = OSSL_FUNC_keymgmt_new(fns);  | 
90  | 0  |             break;  | 
91  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_INIT:  | 
92  | 0  |             if (keymgmt->gen_init == NULL)  | 
93  | 0  |                 keymgmt->gen_init = OSSL_FUNC_keymgmt_gen_init(fns);  | 
94  | 0  |             break;  | 
95  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE:  | 
96  | 0  |             if (keymgmt->gen_set_template == NULL)  | 
97  | 0  |                 keymgmt->gen_set_template =  | 
98  | 0  |                     OSSL_FUNC_keymgmt_gen_set_template(fns);  | 
99  | 0  |             break;  | 
100  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS:  | 
101  | 0  |             if (keymgmt->gen_set_params == NULL) { | 
102  | 0  |                 setgenparamfncnt++;  | 
103  | 0  |                 keymgmt->gen_set_params =  | 
104  | 0  |                     OSSL_FUNC_keymgmt_gen_set_params(fns);  | 
105  | 0  |             }  | 
106  | 0  |             break;  | 
107  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS:  | 
108  | 0  |             if (keymgmt->gen_settable_params == NULL) { | 
109  | 0  |                 setgenparamfncnt++;  | 
110  | 0  |                 keymgmt->gen_settable_params =  | 
111  | 0  |                     OSSL_FUNC_keymgmt_gen_settable_params(fns);  | 
112  | 0  |             }  | 
113  | 0  |             break;  | 
114  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_GET_PARAMS:  | 
115  | 0  |             if (keymgmt->gen_get_params == NULL) { | 
116  | 0  |                 getgenparamfncnt++;  | 
117  | 0  |                 keymgmt->gen_get_params =  | 
118  | 0  |                     OSSL_FUNC_keymgmt_gen_get_params(fns);  | 
119  | 0  |             }  | 
120  | 0  |             break;  | 
121  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_GETTABLE_PARAMS:  | 
122  | 0  |             if (keymgmt->gen_gettable_params == NULL) { | 
123  | 0  |                 getgenparamfncnt++;  | 
124  | 0  |                 keymgmt->gen_gettable_params =  | 
125  | 0  |                     OSSL_FUNC_keymgmt_gen_gettable_params(fns);  | 
126  | 0  |             }  | 
127  | 0  |             break;  | 
128  | 0  |         case OSSL_FUNC_KEYMGMT_GEN:  | 
129  | 0  |             if (keymgmt->gen == NULL)  | 
130  | 0  |                 keymgmt->gen = OSSL_FUNC_keymgmt_gen(fns);  | 
131  | 0  |             break;  | 
132  | 0  |         case OSSL_FUNC_KEYMGMT_GEN_CLEANUP:  | 
133  | 0  |             if (keymgmt->gen_cleanup == NULL)  | 
134  | 0  |                 keymgmt->gen_cleanup = OSSL_FUNC_keymgmt_gen_cleanup(fns);  | 
135  | 0  |             break;  | 
136  | 0  |         case OSSL_FUNC_KEYMGMT_FREE:  | 
137  | 0  |             if (keymgmt->free == NULL)  | 
138  | 0  |                 keymgmt->free = OSSL_FUNC_keymgmt_free(fns);  | 
139  | 0  |             break;  | 
140  | 0  |         case OSSL_FUNC_KEYMGMT_LOAD:  | 
141  | 0  |             if (keymgmt->load == NULL)  | 
142  | 0  |                 keymgmt->load = OSSL_FUNC_keymgmt_load(fns);  | 
143  | 0  |             break;  | 
144  | 0  |         case OSSL_FUNC_KEYMGMT_GET_PARAMS:  | 
145  | 0  |             if (keymgmt->get_params == NULL) { | 
146  | 0  |                 getparamfncnt++;  | 
147  | 0  |                 keymgmt->get_params = OSSL_FUNC_keymgmt_get_params(fns);  | 
148  | 0  |             }  | 
149  | 0  |             break;  | 
150  | 0  |         case OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS:  | 
151  | 0  |             if (keymgmt->gettable_params == NULL) { | 
152  | 0  |                 getparamfncnt++;  | 
153  | 0  |                 keymgmt->gettable_params =  | 
154  | 0  |                     OSSL_FUNC_keymgmt_gettable_params(fns);  | 
155  | 0  |             }  | 
156  | 0  |             break;  | 
157  | 0  |          case OSSL_FUNC_KEYMGMT_SET_PARAMS:  | 
158  | 0  |             if (keymgmt->set_params == NULL) { | 
159  | 0  |                 setparamfncnt++;  | 
160  | 0  |                 keymgmt->set_params = OSSL_FUNC_keymgmt_set_params(fns);  | 
161  | 0  |             }  | 
162  | 0  |             break;  | 
163  | 0  |         case OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS:  | 
164  | 0  |             if (keymgmt->settable_params == NULL) { | 
165  | 0  |                 setparamfncnt++;  | 
166  | 0  |                 keymgmt->settable_params =  | 
167  | 0  |                     OSSL_FUNC_keymgmt_settable_params(fns);  | 
168  | 0  |             }  | 
169  | 0  |             break;  | 
170  | 0  |         case OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME:  | 
171  | 0  |             if (keymgmt->query_operation_name == NULL)  | 
172  | 0  |                 keymgmt->query_operation_name =  | 
173  | 0  |                     OSSL_FUNC_keymgmt_query_operation_name(fns);  | 
174  | 0  |             break;  | 
175  | 0  |         case OSSL_FUNC_KEYMGMT_HAS:  | 
176  | 0  |             if (keymgmt->has == NULL)  | 
177  | 0  |                 keymgmt->has = OSSL_FUNC_keymgmt_has(fns);  | 
178  | 0  |             break;  | 
179  | 0  |         case OSSL_FUNC_KEYMGMT_DUP:  | 
180  | 0  |             if (keymgmt->dup == NULL)  | 
181  | 0  |                 keymgmt->dup = OSSL_FUNC_keymgmt_dup(fns);  | 
182  | 0  |             break;  | 
183  | 0  |         case OSSL_FUNC_KEYMGMT_VALIDATE:  | 
184  | 0  |             if (keymgmt->validate == NULL)  | 
185  | 0  |                 keymgmt->validate = OSSL_FUNC_keymgmt_validate(fns);  | 
186  | 0  |             break;  | 
187  | 0  |         case OSSL_FUNC_KEYMGMT_MATCH:  | 
188  | 0  |             if (keymgmt->match == NULL)  | 
189  | 0  |                 keymgmt->match = OSSL_FUNC_keymgmt_match(fns);  | 
190  | 0  |             break;  | 
191  | 0  |         case OSSL_FUNC_KEYMGMT_IMPORT:  | 
192  | 0  |             if (keymgmt->import == NULL) { | 
193  | 0  |                 importfncnt++;  | 
194  | 0  |                 keymgmt->import = OSSL_FUNC_keymgmt_import(fns);  | 
195  | 0  |             }  | 
196  | 0  |             break;  | 
197  | 0  |         case OSSL_FUNC_KEYMGMT_IMPORT_TYPES:  | 
198  | 0  |             if (keymgmt->import_types == NULL) { | 
199  | 0  |                 if (importtypesfncnt == 0)  | 
200  | 0  |                     importfncnt++;  | 
201  | 0  |                 importtypesfncnt++;  | 
202  | 0  |                 keymgmt->import_types = OSSL_FUNC_keymgmt_import_types(fns);  | 
203  | 0  |             }  | 
204  | 0  |             break;  | 
205  | 0  |         case OSSL_FUNC_KEYMGMT_IMPORT_TYPES_EX:  | 
206  | 0  |             if (keymgmt->import_types_ex == NULL) { | 
207  | 0  |                 if (importtypesfncnt == 0)  | 
208  | 0  |                     importfncnt++;  | 
209  | 0  |                 importtypesfncnt++;  | 
210  | 0  |                 keymgmt->import_types_ex = OSSL_FUNC_keymgmt_import_types_ex(fns);  | 
211  | 0  |             }  | 
212  | 0  |             break;  | 
213  | 0  |         case OSSL_FUNC_KEYMGMT_EXPORT:  | 
214  | 0  |             if (keymgmt->export == NULL) { | 
215  | 0  |                 exportfncnt++;  | 
216  | 0  |                 keymgmt->export = OSSL_FUNC_keymgmt_export(fns);  | 
217  | 0  |             }  | 
218  | 0  |             break;  | 
219  | 0  |         case OSSL_FUNC_KEYMGMT_EXPORT_TYPES:  | 
220  | 0  |             if (keymgmt->export_types == NULL) { | 
221  | 0  |                 if (exporttypesfncnt == 0)  | 
222  | 0  |                     exportfncnt++;  | 
223  | 0  |                 exporttypesfncnt++;  | 
224  | 0  |                 keymgmt->export_types = OSSL_FUNC_keymgmt_export_types(fns);  | 
225  | 0  |             }  | 
226  | 0  |             break;  | 
227  | 0  |         case OSSL_FUNC_KEYMGMT_EXPORT_TYPES_EX:  | 
228  | 0  |             if (keymgmt->export_types_ex == NULL) { | 
229  | 0  |                 if (exporttypesfncnt == 0)  | 
230  | 0  |                     exportfncnt++;  | 
231  | 0  |                 exporttypesfncnt++;  | 
232  | 0  |                 keymgmt->export_types_ex = OSSL_FUNC_keymgmt_export_types_ex(fns);  | 
233  | 0  |             }  | 
234  | 0  |             break;  | 
235  | 0  |         }  | 
236  | 0  |     }  | 
237  |  |     /*  | 
238  |  |      * Try to check that the method is sensible.  | 
239  |  |      * At least one constructor and the destructor are MANDATORY  | 
240  |  |      * The functions 'has' is MANDATORY  | 
241  |  |      * It makes no sense being able to free stuff if you can't create it.  | 
242  |  |      * It makes no sense providing OSSL_PARAM descriptors for import and  | 
243  |  |      * export if you can't import or export.  | 
244  |  |      */  | 
245  | 0  |     if (keymgmt->free == NULL  | 
246  | 0  |         || (keymgmt->new == NULL  | 
247  | 0  |             && keymgmt->gen == NULL  | 
248  | 0  |             && keymgmt->load == NULL)  | 
249  | 0  |         || keymgmt->has == NULL  | 
250  | 0  |         || (getparamfncnt != 0 && getparamfncnt != 2)  | 
251  | 0  |         || (setparamfncnt != 0 && setparamfncnt != 2)  | 
252  | 0  |         || (setgenparamfncnt != 0 && setgenparamfncnt != 2)  | 
253  | 0  |         || (getgenparamfncnt != 0 && getgenparamfncnt != 2)  | 
254  | 0  |         || (importfncnt != 0 && importfncnt != 2)  | 
255  | 0  |         || (exportfncnt != 0 && exportfncnt != 2)  | 
256  | 0  |         || (keymgmt->gen != NULL  | 
257  | 0  |             && (keymgmt->gen_init == NULL  | 
258  | 0  |                 || keymgmt->gen_cleanup == NULL))) { | 
259  | 0  |         EVP_KEYMGMT_free(keymgmt);  | 
260  | 0  |         ERR_raise(ERR_LIB_EVP, EVP_R_INVALID_PROVIDER_FUNCTIONS);  | 
261  | 0  |         return NULL;  | 
262  | 0  |     }  | 
263  | 0  |     keymgmt->prov = prov;  | 
264  | 0  |     if (prov != NULL)  | 
265  | 0  |         ossl_provider_up_ref(prov);  | 
266  |  | 
  | 
267  | 0  | #ifndef FIPS_MODULE  | 
268  | 0  |     keymgmt->legacy_alg = get_legacy_alg_type_from_keymgmt(keymgmt);  | 
269  | 0  | #endif  | 
270  |  | 
  | 
271  | 0  |     return keymgmt;  | 
272  | 0  | }  | 
273  |  |  | 
274  |  | EVP_KEYMGMT *evp_keymgmt_fetch_from_prov(OSSL_PROVIDER *prov,  | 
275  |  |                                          const char *name,  | 
276  |  |                                          const char *properties)  | 
277  | 0  | { | 
278  | 0  |     return evp_generic_fetch_from_prov(prov, OSSL_OP_KEYMGMT,  | 
279  | 0  |                                        name, properties,  | 
280  | 0  |                                        keymgmt_from_algorithm,  | 
281  | 0  |                                        evp_keymgmt_up_ref,  | 
282  | 0  |                                        evp_keymgmt_free);  | 
283  | 0  | }  | 
284  |  |  | 
285  |  | EVP_KEYMGMT *EVP_KEYMGMT_fetch(OSSL_LIB_CTX *ctx, const char *algorithm,  | 
286  |  |                                const char *properties)  | 
287  | 0  | { | 
288  | 0  |     return evp_generic_fetch(ctx, OSSL_OP_KEYMGMT, algorithm, properties,  | 
289  | 0  |                              keymgmt_from_algorithm,  | 
290  | 0  |                              evp_keymgmt_up_ref,  | 
291  | 0  |                              evp_keymgmt_free);  | 
292  | 0  | }  | 
293  |  |  | 
294  |  | int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt)  | 
295  | 0  | { | 
296  | 0  |     int ref = 0;  | 
297  |  | 
  | 
298  | 0  |     CRYPTO_UP_REF(&keymgmt->refcnt, &ref);  | 
299  | 0  |     return 1;  | 
300  | 0  | }  | 
301  |  |  | 
302  |  | void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt)  | 
303  | 0  | { | 
304  | 0  |     int ref = 0;  | 
305  |  | 
  | 
306  | 0  |     if (keymgmt == NULL)  | 
307  | 0  |         return;  | 
308  |  |  | 
309  | 0  |     CRYPTO_DOWN_REF(&keymgmt->refcnt, &ref);  | 
310  | 0  |     if (ref > 0)  | 
311  | 0  |         return;  | 
312  | 0  |     OPENSSL_free(keymgmt->type_name);  | 
313  | 0  |     ossl_provider_free(keymgmt->prov);  | 
314  | 0  |     CRYPTO_FREE_REF(&keymgmt->refcnt);  | 
315  | 0  |     OPENSSL_free(keymgmt);  | 
316  | 0  | }  | 
317  |  |  | 
318  |  | const OSSL_PROVIDER *EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt)  | 
319  | 0  | { | 
320  | 0  |     return keymgmt->prov;  | 
321  | 0  | }  | 
322  |  |  | 
323  |  | int evp_keymgmt_get_number(const EVP_KEYMGMT *keymgmt)  | 
324  | 0  | { | 
325  | 0  |     return keymgmt->name_id;  | 
326  | 0  | }  | 
327  |  |  | 
328  |  | int evp_keymgmt_get_legacy_alg(const EVP_KEYMGMT *keymgmt)  | 
329  | 0  | { | 
330  | 0  |     return keymgmt->legacy_alg;  | 
331  | 0  | }  | 
332  |  |  | 
333  |  | const char *EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt)  | 
334  | 0  | { | 
335  | 0  |     return keymgmt->description;  | 
336  | 0  | }  | 
337  |  |  | 
338  |  | const char *EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt)  | 
339  | 0  | { | 
340  | 0  |     return keymgmt->type_name;  | 
341  | 0  | }  | 
342  |  |  | 
343  |  | int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name)  | 
344  | 0  | { | 
345  | 0  |     return keymgmt != NULL  | 
346  | 0  |            && evp_is_a(keymgmt->prov, keymgmt->name_id, NULL, name);  | 
347  | 0  | }  | 
348  |  |  | 
349  |  | void EVP_KEYMGMT_do_all_provided(OSSL_LIB_CTX *libctx,  | 
350  |  |                                  void (*fn)(EVP_KEYMGMT *keymgmt, void *arg),  | 
351  |  |                                  void *arg)  | 
352  | 0  | { | 
353  | 0  |     evp_generic_do_all(libctx, OSSL_OP_KEYMGMT,  | 
354  | 0  |                        (void (*)(void *, void *))fn, arg,  | 
355  | 0  |                        keymgmt_from_algorithm,  | 
356  | 0  |                        evp_keymgmt_up_ref,  | 
357  | 0  |                        evp_keymgmt_free);  | 
358  | 0  | }  | 
359  |  |  | 
360  |  | int EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt,  | 
361  |  |                              void (*fn)(const char *name, void *data),  | 
362  |  |                              void *data)  | 
363  | 0  | { | 
364  | 0  |     if (keymgmt->prov != NULL)  | 
365  | 0  |         return evp_names_do_all(keymgmt->prov, keymgmt->name_id, fn, data);  | 
366  |  |  | 
367  | 0  |     return 1;  | 
368  | 0  | }  | 
369  |  |  | 
370  |  | /*  | 
371  |  |  * Internal API that interfaces with the method function pointers  | 
372  |  |  */  | 
373  |  | void *evp_keymgmt_newdata(const EVP_KEYMGMT *keymgmt)  | 
374  | 0  | { | 
375  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
376  |  |  | 
377  |  |     /*  | 
378  |  |      * 'new' is currently mandatory on its own, but when new  | 
379  |  |      * constructors appear, it won't be quite as mandatory,  | 
380  |  |      * so we have a check for future cases.  | 
381  |  |      */  | 
382  | 0  |     if (keymgmt->new == NULL)  | 
383  | 0  |         return NULL;  | 
384  | 0  |     return keymgmt->new(provctx);  | 
385  | 0  | }  | 
386  |  |  | 
387  |  | void evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata)  | 
388  | 0  | { | 
389  |  |     /* This is mandatory, no need to check for its presence */  | 
390  | 0  |     keymgmt->free(keydata);  | 
391  | 0  | }  | 
392  |  |  | 
393  |  | void *evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection,  | 
394  |  |                            const OSSL_PARAM params[])  | 
395  | 0  | { | 
396  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
397  |  | 
  | 
398  | 0  |     if (keymgmt->gen_init == NULL)  | 
399  | 0  |         return NULL;  | 
400  | 0  |     return keymgmt->gen_init(provctx, selection, params);  | 
401  | 0  | }  | 
402  |  |  | 
403  |  | int evp_keymgmt_gen_set_template(const EVP_KEYMGMT *keymgmt, void *genctx,  | 
404  |  |                                  void *templ)  | 
405  | 0  | { | 
406  |  |     /*  | 
407  |  |      * It's arguable if we actually should return success in this case, as  | 
408  |  |      * it allows the caller to set a template key, which is then ignored.  | 
409  |  |      * However, this is how the legacy methods (EVP_PKEY_METHOD) operate,  | 
410  |  |      * so we do this in the interest of backward compatibility.  | 
411  |  |      */  | 
412  | 0  |     if (keymgmt->gen_set_template == NULL)  | 
413  | 0  |         return 1;  | 
414  | 0  |     return keymgmt->gen_set_template(genctx, templ);  | 
415  | 0  | }  | 
416  |  |  | 
417  |  | int evp_keymgmt_gen_set_params(const EVP_KEYMGMT *keymgmt, void *genctx,  | 
418  |  |                                const OSSL_PARAM params[])  | 
419  | 0  | { | 
420  | 0  |     if (keymgmt->gen_set_params == NULL)  | 
421  | 0  |         return 0;  | 
422  | 0  |     return keymgmt->gen_set_params(genctx, params);  | 
423  | 0  | }  | 
424  |  |  | 
425  |  | const OSSL_PARAM *EVP_KEYMGMT_gen_settable_params(const EVP_KEYMGMT *keymgmt)  | 
426  | 0  | { | 
427  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
428  |  | 
  | 
429  | 0  |     if (keymgmt->gen_settable_params == NULL)  | 
430  | 0  |         return NULL;  | 
431  | 0  |     return keymgmt->gen_settable_params(NULL, provctx);  | 
432  | 0  | }  | 
433  |  |  | 
434  |  | int evp_keymgmt_gen_get_params(const EVP_KEYMGMT *keymgmt, void *genctx,  | 
435  |  |                                OSSL_PARAM params[])  | 
436  | 0  | { | 
437  | 0  |     if (keymgmt->gen_get_params == NULL)  | 
438  | 0  |         return 0;  | 
439  | 0  |     return keymgmt->gen_get_params(genctx, params);  | 
440  | 0  | }  | 
441  |  |  | 
442  |  | const OSSL_PARAM *EVP_KEYMGMT_gen_gettable_params(const EVP_KEYMGMT *keymgmt)  | 
443  | 0  | { | 
444  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
445  |  | 
  | 
446  | 0  |     if (keymgmt->gen_gettable_params == NULL)  | 
447  | 0  |         return NULL;  | 
448  | 0  |     return keymgmt->gen_gettable_params(NULL, provctx);  | 
449  | 0  | }  | 
450  |  |  | 
451  |  | void *evp_keymgmt_gen(const EVP_KEYMGMT *keymgmt, void *genctx,  | 
452  |  |                       OSSL_CALLBACK *cb, void *cbarg)  | 
453  | 0  | { | 
454  | 0  |     void *ret;  | 
455  | 0  |     const char *desc = keymgmt->description != NULL ? keymgmt->description : "";  | 
456  |  | 
  | 
457  | 0  |     if (keymgmt->gen == NULL) { | 
458  | 0  |         ERR_raise_data(ERR_LIB_EVP, EVP_R_PROVIDER_KEYMGMT_NOT_SUPPORTED,  | 
459  | 0  |                        "%s key generation:%s", keymgmt->type_name, desc);  | 
460  | 0  |         return NULL;  | 
461  | 0  |     }  | 
462  |  |  | 
463  | 0  |     ret = keymgmt->gen(genctx, cb, cbarg);  | 
464  | 0  |     if (ret == NULL)  | 
465  | 0  |         ERR_raise_data(ERR_LIB_EVP, EVP_R_PROVIDER_KEYMGMT_FAILURE,  | 
466  | 0  |                        "%s key generation:%s", keymgmt->type_name, desc);  | 
467  | 0  |     return ret;  | 
468  | 0  | }  | 
469  |  |  | 
470  |  | void evp_keymgmt_gen_cleanup(const EVP_KEYMGMT *keymgmt, void *genctx)  | 
471  | 0  | { | 
472  | 0  |     if (keymgmt->gen_cleanup != NULL)  | 
473  | 0  |         keymgmt->gen_cleanup(genctx);  | 
474  | 0  | }  | 
475  |  |  | 
476  |  | int evp_keymgmt_has_load(const EVP_KEYMGMT *keymgmt)  | 
477  | 0  | { | 
478  | 0  |     return keymgmt != NULL && keymgmt->load != NULL;  | 
479  | 0  | }  | 
480  |  |  | 
481  |  | void *evp_keymgmt_load(const EVP_KEYMGMT *keymgmt,  | 
482  |  |                        const void *objref, size_t objref_sz)  | 
483  | 0  | { | 
484  | 0  |     if (evp_keymgmt_has_load(keymgmt))  | 
485  | 0  |         return keymgmt->load(objref, objref_sz);  | 
486  | 0  |     return NULL;  | 
487  | 0  | }  | 
488  |  |  | 
489  |  | int evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata,  | 
490  |  |                            OSSL_PARAM params[])  | 
491  | 0  | { | 
492  | 0  |     if (keymgmt->get_params == NULL)  | 
493  | 0  |         return 1;  | 
494  | 0  |     return keymgmt->get_params(keydata, params);  | 
495  | 0  | }  | 
496  |  |  | 
497  |  | const OSSL_PARAM *EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt)  | 
498  | 0  | { | 
499  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
500  |  | 
  | 
501  | 0  |     if (keymgmt->gettable_params == NULL)  | 
502  | 0  |         return NULL;  | 
503  | 0  |     return keymgmt->gettable_params(provctx);  | 
504  | 0  | }  | 
505  |  |  | 
506  |  | int evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata,  | 
507  |  |                            const OSSL_PARAM params[])  | 
508  | 0  | { | 
509  | 0  |     if (keymgmt->set_params == NULL)  | 
510  | 0  |         return 1;  | 
511  | 0  |     return keymgmt->set_params(keydata, params);  | 
512  | 0  | }  | 
513  |  |  | 
514  |  | const OSSL_PARAM *EVP_KEYMGMT_settable_params(const EVP_KEYMGMT *keymgmt)  | 
515  | 0  | { | 
516  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
517  |  | 
  | 
518  | 0  |     if (keymgmt->settable_params == NULL)  | 
519  | 0  |         return NULL;  | 
520  | 0  |     return keymgmt->settable_params(provctx);  | 
521  | 0  | }  | 
522  |  |  | 
523  |  | int evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection)  | 
524  | 0  | { | 
525  |  |     /* This is mandatory, no need to check for its presence */  | 
526  | 0  |     return keymgmt->has(keydata, selection);  | 
527  | 0  | }  | 
528  |  |  | 
529  |  | int evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata,  | 
530  |  |                          int selection, int checktype)  | 
531  | 0  | { | 
532  |  |     /* We assume valid if the implementation doesn't have a function */  | 
533  | 0  |     if (keymgmt->validate == NULL)  | 
534  | 0  |         return 1;  | 
535  | 0  |     return keymgmt->validate(keydata, selection, checktype);  | 
536  | 0  | }  | 
537  |  |  | 
538  |  | int evp_keymgmt_match(const EVP_KEYMGMT *keymgmt,  | 
539  |  |                       const void *keydata1, const void *keydata2,  | 
540  |  |                       int selection)  | 
541  | 0  | { | 
542  |  |     /* We assume no match if the implementation doesn't have a function */  | 
543  | 0  |     if (keymgmt->match == NULL)  | 
544  | 0  |         return 0;  | 
545  | 0  |     return keymgmt->match(keydata1, keydata2, selection);  | 
546  | 0  | }  | 
547  |  |  | 
548  |  | int evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata,  | 
549  |  |                        int selection, const OSSL_PARAM params[])  | 
550  | 0  | { | 
551  | 0  |     if (keymgmt->import == NULL)  | 
552  | 0  |         return 0;  | 
553  | 0  |     return keymgmt->import(keydata, selection, params);  | 
554  | 0  | }  | 
555  |  |  | 
556  |  | const OSSL_PARAM *evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt,  | 
557  |  |                                            int selection)  | 
558  | 0  | { | 
559  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
560  |  | 
  | 
561  | 0  |     if (keymgmt->import_types_ex != NULL)  | 
562  | 0  |         return keymgmt->import_types_ex(provctx, selection);  | 
563  | 0  |     if (keymgmt->import_types == NULL)  | 
564  | 0  |         return NULL;  | 
565  | 0  |     return keymgmt->import_types(selection);  | 
566  | 0  | }  | 
567  |  |  | 
568  |  | int evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata,  | 
569  |  |                        int selection, OSSL_CALLBACK *param_cb, void *cbarg)  | 
570  | 0  | { | 
571  | 0  |     if (keymgmt->export == NULL)  | 
572  | 0  |         return 0;  | 
573  | 0  |     return keymgmt->export(keydata, selection, param_cb, cbarg);  | 
574  | 0  | }  | 
575  |  |  | 
576  |  | const OSSL_PARAM *evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt,  | 
577  |  |                                            int selection)  | 
578  | 0  | { | 
579  | 0  |     void *provctx = ossl_provider_ctx(EVP_KEYMGMT_get0_provider(keymgmt));  | 
580  |  | 
  | 
581  | 0  |     if (keymgmt->export_types_ex != NULL)  | 
582  | 0  |         return keymgmt->export_types_ex(provctx, selection);  | 
583  | 0  |     if (keymgmt->export_types == NULL)  | 
584  | 0  |         return NULL;  | 
585  | 0  |     return keymgmt->export_types(selection);  | 
586  | 0  | }  | 
587  |  |  | 
588  |  | void *evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from,  | 
589  |  |                       int selection)  | 
590  | 0  | { | 
591  |  |     /* We assume no dup if the implementation doesn't have a function */  | 
592  | 0  |     if (keymgmt->dup == NULL)  | 
593  | 0  |         return NULL;  | 
594  | 0  |     return keymgmt->dup(keydata_from, selection);  | 
595  | 0  | }  |