Coverage Report

Created: 2026-03-09 06:12

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/encode_decode/encode_key2text.c
Line
Count
Source
1
/*
2
 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * Low level APIs are deprecated for public use, but still ok for internal use.
12
 */
13
#include "internal/deprecated.h"
14
15
#include <openssl/core.h>
16
#include <openssl/core_dispatch.h>
17
#include <openssl/core_names.h>
18
#include <openssl/bn.h>
19
#include <openssl/err.h>
20
#include <openssl/safestack.h>
21
#include <openssl/proverr.h>
22
#include "crypto/dh.h" /* ossl_dh_get0_params() */
23
#include "crypto/dsa.h" /* ossl_dsa_get0_params() */
24
#include "crypto/ec.h" /* ossl_ec_key_get_libctx */
25
#include "crypto/ecx.h" /* ECX_KEY, etc... */
26
#include "crypto/ml_kem.h" /* ML_KEM_KEY, etc... */
27
#include "crypto/rsa.h" /* RSA_PSS_PARAMS_30, etc... */
28
#include "crypto/ml_dsa.h"
29
#include "crypto/slh_dsa.h"
30
#include "prov/bio.h"
31
#include "prov/implementations.h"
32
#include "internal/encoder.h"
33
#include "prov/endecoder_local.h"
34
#include "prov/ml_dsa_codecs.h"
35
#include "prov/ml_kem_codecs.h"
36
#include "prov/lms_codecs.h"
37
38
DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM)
39
40
/* ---------------------------------------------------------------------- */
41
42
#ifndef OPENSSL_NO_DH
43
static int dh_to_text(BIO *out, const void *key, int selection)
44
0
{
45
0
    const DH *dh = key;
46
0
    const char *type_label = NULL;
47
0
    const BIGNUM *priv_key = NULL, *pub_key = NULL;
48
0
    const FFC_PARAMS *params = NULL;
49
0
    const BIGNUM *p = NULL;
50
0
    long length;
51
52
0
    if (out == NULL || dh == NULL) {
53
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
54
0
        return 0;
55
0
    }
56
57
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
58
0
        type_label = "DH Private-Key";
59
0
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
60
0
        type_label = "DH Public-Key";
61
0
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
62
0
        type_label = "DH Parameters";
63
64
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
65
0
        priv_key = DH_get0_priv_key(dh);
66
0
        if (priv_key == NULL) {
67
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
68
0
            return 0;
69
0
        }
70
0
    }
71
0
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
72
0
        pub_key = DH_get0_pub_key(dh);
73
0
        if (pub_key == NULL) {
74
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
75
0
            return 0;
76
0
        }
77
0
    }
78
0
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) {
79
0
        params = ossl_dh_get0_params((DH *)dh);
80
0
        if (params == NULL) {
81
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS);
82
0
            return 0;
83
0
        }
84
0
    }
85
86
0
    p = DH_get0_p(dh);
87
0
    if (p == NULL) {
88
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
89
0
        return 0;
90
0
    }
91
92
0
    if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0)
93
0
        return 0;
94
0
    if (priv_key != NULL
95
0
        && !ossl_bio_print_labeled_bignum(out, "private-key:", priv_key))
96
0
        return 0;
97
0
    if (pub_key != NULL
98
0
        && !ossl_bio_print_labeled_bignum(out, "public-key:", pub_key))
99
0
        return 0;
100
0
    if (params != NULL
101
0
        && !ossl_bio_print_ffc_params(out, params))
102
0
        return 0;
103
0
    length = DH_get_length(dh);
104
0
    if (length > 0
105
0
        && BIO_printf(out, "recommended-private-length: %ld bits\n",
106
0
               length)
107
0
            <= 0)
108
0
        return 0;
109
110
0
    return 1;
111
0
}
112
#endif
113
114
/* ---------------------------------------------------------------------- */
115
116
#ifndef OPENSSL_NO_DSA
117
static int dsa_to_text(BIO *out, const void *key, int selection)
118
0
{
119
0
    const DSA *dsa = key;
120
0
    const char *type_label = NULL;
121
0
    const BIGNUM *priv_key = NULL, *pub_key = NULL;
122
0
    const FFC_PARAMS *params = NULL;
123
0
    const BIGNUM *p = NULL;
124
125
0
    if (out == NULL || dsa == NULL) {
126
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
127
0
        return 0;
128
0
    }
129
130
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
131
0
        type_label = "Private-Key";
132
0
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
133
0
        type_label = "Public-Key";
134
0
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
135
0
        type_label = "DSA-Parameters";
136
137
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
138
0
        priv_key = DSA_get0_priv_key(dsa);
139
0
        if (priv_key == NULL) {
140
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
141
0
            return 0;
142
0
        }
143
0
    }
144
0
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
145
0
        pub_key = DSA_get0_pub_key(dsa);
146
0
        if (pub_key == NULL) {
147
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
148
0
            return 0;
149
0
        }
150
0
    }
151
0
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) {
152
0
        params = ossl_dsa_get0_params((DSA *)dsa);
153
0
        if (params == NULL) {
154
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS);
155
0
            return 0;
156
0
        }
157
0
    }
158
159
0
    p = DSA_get0_p(dsa);
160
0
    if (p == NULL) {
161
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
162
0
        return 0;
163
0
    }
164
165
0
    if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0)
166
0
        return 0;
167
0
    if (priv_key != NULL
168
0
        && !ossl_bio_print_labeled_bignum(out, "priv:", priv_key))
169
0
        return 0;
170
0
    if (pub_key != NULL
171
0
        && !ossl_bio_print_labeled_bignum(out, "pub: ", pub_key))
172
0
        return 0;
173
0
    if (params != NULL
174
0
        && !ossl_bio_print_ffc_params(out, params))
175
0
        return 0;
176
177
0
    return 1;
178
0
}
179
#endif
180
181
/* ---------------------------------------------------------------------- */
182
183
#ifndef OPENSSL_NO_EC
184
static int ec_param_explicit_curve_to_text(BIO *out, const EC_GROUP *group,
185
    BN_CTX *ctx)
186
0
{
187
0
    const char *plabel = "Prime:";
188
0
    BIGNUM *p = NULL, *a = NULL, *b = NULL;
189
190
0
    p = BN_CTX_get(ctx);
191
0
    a = BN_CTX_get(ctx);
192
0
    b = BN_CTX_get(ctx);
193
0
    if (b == NULL
194
0
        || !EC_GROUP_get_curve(group, p, a, b, ctx))
195
0
        return 0;
196
197
0
    if (EC_GROUP_get_field_type(group) == NID_X9_62_characteristic_two_field) {
198
0
        int basis_type = EC_GROUP_get_basis_type(group);
199
200
        /* print the 'short name' of the base type OID */
201
0
        if (basis_type == NID_undef
202
0
            || BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0)
203
0
            return 0;
204
0
        plabel = "Polynomial:";
205
0
    }
206
0
    return ossl_bio_print_labeled_bignum(out, plabel, p)
207
0
        && ossl_bio_print_labeled_bignum(out, "A:   ", a)
208
0
        && ossl_bio_print_labeled_bignum(out, "B:   ", b);
209
0
}
210
211
static int ec_param_explicit_gen_to_text(BIO *out, const EC_GROUP *group,
212
    BN_CTX *ctx)
213
0
{
214
0
    int ret;
215
0
    size_t buflen;
216
0
    point_conversion_form_t form;
217
0
    const EC_POINT *point = NULL;
218
0
    const char *glabel = NULL;
219
0
    unsigned char *buf = NULL;
220
221
0
    form = EC_GROUP_get_point_conversion_form(group);
222
0
    point = EC_GROUP_get0_generator(group);
223
224
0
    if (point == NULL)
225
0
        return 0;
226
227
0
    switch (form) {
228
0
    case POINT_CONVERSION_COMPRESSED:
229
0
        glabel = "Generator (compressed):";
230
0
        break;
231
0
    case POINT_CONVERSION_UNCOMPRESSED:
232
0
        glabel = "Generator (uncompressed):";
233
0
        break;
234
0
    case POINT_CONVERSION_HYBRID:
235
0
        glabel = "Generator (hybrid):";
236
0
        break;
237
0
    default:
238
0
        return 0;
239
0
    }
240
241
0
    buflen = EC_POINT_point2buf(group, point, form, &buf, ctx);
242
0
    if (buflen == 0)
243
0
        return 0;
244
245
0
    ret = ossl_bio_print_labeled_buf(out, glabel, buf, buflen);
246
0
    OPENSSL_clear_free(buf, buflen);
247
0
    return ret;
248
0
}
249
250
/* Print explicit parameters */
251
static int ec_param_explicit_to_text(BIO *out, const EC_GROUP *group,
252
    OSSL_LIB_CTX *libctx)
253
0
{
254
0
    int ret = 0, tmp_nid;
255
0
    BN_CTX *ctx = NULL;
256
0
    const BIGNUM *order = NULL, *cofactor = NULL;
257
0
    const unsigned char *seed;
258
0
    size_t seed_len = 0;
259
260
0
    ctx = BN_CTX_new_ex(libctx);
261
0
    if (ctx == NULL)
262
0
        return 0;
263
0
    BN_CTX_start(ctx);
264
265
0
    tmp_nid = EC_GROUP_get_field_type(group);
266
0
    order = EC_GROUP_get0_order(group);
267
0
    if (order == NULL)
268
0
        goto err;
269
270
0
    seed = EC_GROUP_get0_seed(group);
271
0
    if (seed != NULL)
272
0
        seed_len = EC_GROUP_get_seed_len(group);
273
0
    cofactor = EC_GROUP_get0_cofactor(group);
274
275
    /* print the 'short name' of the field type */
276
0
    if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0
277
0
        || !ec_param_explicit_curve_to_text(out, group, ctx)
278
0
        || !ec_param_explicit_gen_to_text(out, group, ctx)
279
0
        || !ossl_bio_print_labeled_bignum(out, "Order: ", order)
280
0
        || (cofactor != NULL
281
0
            && !ossl_bio_print_labeled_bignum(out, "Cofactor: ", cofactor))
282
0
        || (seed != NULL
283
0
            && !ossl_bio_print_labeled_buf(out, "Seed:", seed, seed_len)))
284
0
        goto err;
285
0
    ret = 1;
286
0
err:
287
0
    BN_CTX_end(ctx);
288
0
    BN_CTX_free(ctx);
289
0
    return ret;
290
0
}
291
292
static int ec_param_to_text(BIO *out, const EC_GROUP *group,
293
    OSSL_LIB_CTX *libctx)
294
0
{
295
0
    if (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE) {
296
0
        const char *curve_name;
297
0
        int curve_nid = EC_GROUP_get_curve_name(group);
298
299
        /* Explicit parameters */
300
0
        if (curve_nid == NID_undef)
301
0
            return 0;
302
303
0
        if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0)
304
0
            return 0;
305
306
0
        curve_name = EC_curve_nid2nist(curve_nid);
307
0
        return (curve_name == NULL
308
0
            || BIO_printf(out, "%s: %s\n", "NIST CURVE", curve_name) > 0);
309
0
    } else {
310
0
        return ec_param_explicit_to_text(out, group, libctx);
311
0
    }
312
0
}
313
314
static int ec_to_text(BIO *out, const void *key, int selection)
315
0
{
316
0
    const EC_KEY *ec = key;
317
0
    const char *type_label = NULL;
318
0
    unsigned char *priv = NULL, *pub = NULL;
319
0
    size_t priv_len = 0, pub_len = 0;
320
0
    const EC_GROUP *group;
321
0
    int ret = 0;
322
323
0
    if (out == NULL || ec == NULL) {
324
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
325
0
        return 0;
326
0
    }
327
328
0
    if ((group = EC_KEY_get0_group(ec)) == NULL) {
329
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
330
0
        return 0;
331
0
    }
332
333
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
334
0
        type_label = "Private-Key";
335
0
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
336
0
        type_label = "Public-Key";
337
0
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
338
0
        if (EC_GROUP_get_curve_name(group) != NID_sm2)
339
0
            type_label = "EC-Parameters";
340
341
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
342
0
        const BIGNUM *priv_key = EC_KEY_get0_private_key(ec);
343
344
0
        if (priv_key == NULL) {
345
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
346
0
            goto err;
347
0
        }
348
0
        priv_len = EC_KEY_priv2buf(ec, &priv);
349
0
        if (priv_len == 0)
350
0
            goto err;
351
0
    }
352
0
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
353
0
        const EC_POINT *pub_pt = EC_KEY_get0_public_key(ec);
354
355
0
        if (pub_pt == NULL) {
356
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
357
0
            goto err;
358
0
        }
359
360
0
        pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL);
361
0
        if (pub_len == 0)
362
0
            goto err;
363
0
    }
364
365
0
    if (type_label != NULL
366
0
        && BIO_printf(out, "%s: (%d bit field, %d bit security level)\n",
367
0
               type_label, EC_GROUP_get_degree(group),
368
0
               EC_GROUP_security_bits(group))
369
0
            <= 0)
370
0
        goto err;
371
0
    if (priv != NULL
372
0
        && !ossl_bio_print_labeled_buf(out, "priv:", priv, priv_len))
373
0
        goto err;
374
0
    if (pub != NULL
375
0
        && !ossl_bio_print_labeled_buf(out, "pub:", pub, pub_len))
376
0
        goto err;
377
0
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
378
0
        ret = ec_param_to_text(out, group, ossl_ec_key_get_libctx(ec));
379
0
err:
380
0
    OPENSSL_clear_free(priv, priv_len);
381
0
    OPENSSL_free(pub);
382
0
    return ret;
383
0
}
384
#endif
385
386
/* ---------------------------------------------------------------------- */
387
388
#ifndef OPENSSL_NO_ECX
389
static int ecx_to_text(BIO *out, const void *key, int selection)
390
0
{
391
0
    const ECX_KEY *ecx = key;
392
0
    const char *type_label = NULL;
393
394
0
    if (out == NULL || ecx == NULL) {
395
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
396
0
        return 0;
397
0
    }
398
399
0
    switch (ecx->type) {
400
0
    case ECX_KEY_TYPE_X25519:
401
0
        type_label = "X25519";
402
0
        break;
403
0
    case ECX_KEY_TYPE_X448:
404
0
        type_label = "X448";
405
0
        break;
406
0
    case ECX_KEY_TYPE_ED25519:
407
0
        type_label = "ED25519";
408
0
        break;
409
0
    case ECX_KEY_TYPE_ED448:
410
0
        type_label = "ED448";
411
0
        break;
412
0
    }
413
414
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
415
0
        if (ecx->privkey == NULL) {
416
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
417
0
            return 0;
418
0
        }
419
420
0
        if (BIO_printf(out, "%s Private-Key:\n", type_label) <= 0)
421
0
            return 0;
422
0
        if (!ossl_bio_print_labeled_buf(out, "priv:", ecx->privkey, ecx->keylen))
423
0
            return 0;
424
0
    } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
425
        /* ecx->pubkey is an array, not a pointer... */
426
0
        if (!ecx->haspubkey) {
427
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
428
0
            return 0;
429
0
        }
430
431
0
        if (BIO_printf(out, "%s Public-Key:\n", type_label) <= 0)
432
0
            return 0;
433
0
    }
434
435
0
    if (!ossl_bio_print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen))
436
0
        return 0;
437
438
0
    return 1;
439
0
}
440
#endif
441
442
/* ---------------------------------------------------------------------- */
443
444
#ifndef OPENSSL_NO_ML_KEM
445
static int ml_kem_to_text(BIO *out, const void *vkey, int selection)
446
0
{
447
0
    return ossl_ml_kem_key_to_text(out, (const ML_KEM_KEY *)vkey, selection);
448
0
}
449
#endif
450
451
/* ---------------------------------------------------------------------- */
452
453
#ifndef OPENSSL_NO_SLH_DSA
454
static int slh_dsa_to_text(BIO *out, const void *key, int selection)
455
0
{
456
0
    return ossl_slh_dsa_key_to_text(out, (const SLH_DSA_KEY *)key, selection);
457
0
}
458
#endif /* OPENSSL_NO_SLH_DSA */
459
460
static int rsa_to_text(BIO *out, const void *key, int selection)
461
0
{
462
0
    const RSA *rsa = key;
463
0
    const char *type_label = "RSA key";
464
0
    const char *modulus_label = NULL;
465
0
    const char *exponent_label = NULL;
466
0
    const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL;
467
0
    STACK_OF(BIGNUM_const) *factors = NULL;
468
0
    STACK_OF(BIGNUM_const) *exps = NULL;
469
0
    STACK_OF(BIGNUM_const) *coeffs = NULL;
470
0
    int primes;
471
0
    const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa);
472
0
    int ret = 0;
473
474
0
    if (out == NULL || rsa == NULL) {
475
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
476
0
        goto err;
477
0
    }
478
479
0
    factors = sk_BIGNUM_const_new_null();
480
0
    exps = sk_BIGNUM_const_new_null();
481
0
    coeffs = sk_BIGNUM_const_new_null();
482
483
0
    if (factors == NULL || exps == NULL || coeffs == NULL) {
484
0
        ERR_raise(ERR_LIB_PROV, ERR_R_CRYPTO_LIB);
485
0
        goto err;
486
0
    }
487
488
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
489
0
        type_label = "Private-Key";
490
0
        modulus_label = "modulus:";
491
0
        exponent_label = "publicExponent:";
492
0
    } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
493
0
        type_label = "Public-Key";
494
0
        modulus_label = "Modulus:";
495
0
        exponent_label = "Exponent:";
496
0
    }
497
498
0
    RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d);
499
0
    ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs);
500
0
    primes = sk_BIGNUM_const_num(factors);
501
502
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
503
0
        if (BIO_printf(out, "%s: (%d bit, %d primes)\n",
504
0
                type_label, BN_num_bits(rsa_n), primes)
505
0
            <= 0)
506
0
            goto err;
507
0
    } else {
508
0
        if (BIO_printf(out, "%s: (%d bit)\n",
509
0
                type_label, BN_num_bits(rsa_n))
510
0
            <= 0)
511
0
            goto err;
512
0
    }
513
514
0
    if (!ossl_bio_print_labeled_bignum(out, modulus_label, rsa_n))
515
0
        goto err;
516
0
    if (!ossl_bio_print_labeled_bignum(out, exponent_label, rsa_e))
517
0
        goto err;
518
0
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
519
0
        int i;
520
521
0
        if (!ossl_bio_print_labeled_bignum(out, "privateExponent:", rsa_d))
522
0
            goto err;
523
0
        if (!ossl_bio_print_labeled_bignum(out, "prime1:",
524
0
                sk_BIGNUM_const_value(factors, 0)))
525
0
            goto err;
526
0
        if (!ossl_bio_print_labeled_bignum(out, "prime2:",
527
0
                sk_BIGNUM_const_value(factors, 1)))
528
0
            goto err;
529
0
        if (!ossl_bio_print_labeled_bignum(out, "exponent1:",
530
0
                sk_BIGNUM_const_value(exps, 0)))
531
0
            goto err;
532
0
        if (!ossl_bio_print_labeled_bignum(out, "exponent2:",
533
0
                sk_BIGNUM_const_value(exps, 1)))
534
0
            goto err;
535
0
        if (!ossl_bio_print_labeled_bignum(out, "coefficient:",
536
0
                sk_BIGNUM_const_value(coeffs, 0)))
537
0
            goto err;
538
0
        for (i = 2; i < sk_BIGNUM_const_num(factors); i++) {
539
0
            if (BIO_printf(out, "prime%d:", i + 1) <= 0)
540
0
                goto err;
541
0
            if (!ossl_bio_print_labeled_bignum(out, NULL,
542
0
                    sk_BIGNUM_const_value(factors, i)))
543
0
                goto err;
544
0
            if (BIO_printf(out, "exponent%d:", i + 1) <= 0)
545
0
                goto err;
546
0
            if (!ossl_bio_print_labeled_bignum(out, NULL,
547
0
                    sk_BIGNUM_const_value(exps, i)))
548
0
                goto err;
549
0
            if (BIO_printf(out, "coefficient%d:", i + 1) <= 0)
550
0
                goto err;
551
0
            if (!ossl_bio_print_labeled_bignum(out, NULL,
552
0
                    sk_BIGNUM_const_value(coeffs, i - 1)))
553
0
                goto err;
554
0
        }
555
0
    }
556
557
0
    if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) {
558
0
        switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) {
559
0
        case RSA_FLAG_TYPE_RSA:
560
0
            if (!ossl_rsa_pss_params_30_is_unrestricted(pss_params)) {
561
0
                if (BIO_printf(out, "(INVALID PSS PARAMETERS)\n") <= 0)
562
0
                    goto err;
563
0
            }
564
0
            break;
565
0
        case RSA_FLAG_TYPE_RSASSAPSS:
566
0
            if (ossl_rsa_pss_params_30_is_unrestricted(pss_params)) {
567
0
                if (BIO_printf(out, "No PSS parameter restrictions\n") <= 0)
568
0
                    goto err;
569
0
            } else {
570
0
                int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss_params);
571
0
                int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss_params);
572
0
                int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss_params);
573
0
                int saltlen = ossl_rsa_pss_params_30_saltlen(pss_params);
574
0
                int trailerfield = ossl_rsa_pss_params_30_trailerfield(pss_params);
575
576
0
                if (BIO_printf(out, "PSS parameter restrictions:\n") <= 0)
577
0
                    goto err;
578
0
                if (BIO_printf(out, "  Hash Algorithm: %s%s\n",
579
0
                        ossl_rsa_oaeppss_nid2name(hashalg_nid),
580
0
                        (hashalg_nid == NID_sha1
581
0
                                ? " (default)"
582
0
                                : ""))
583
0
                    <= 0)
584
0
                    goto err;
585
0
                if (BIO_printf(out, "  Mask Algorithm: %s with %s%s\n",
586
0
                        ossl_rsa_mgf_nid2name(maskgenalg_nid),
587
0
                        ossl_rsa_oaeppss_nid2name(maskgenhashalg_nid),
588
0
                        (maskgenalg_nid == NID_mgf1
589
0
                                    && maskgenhashalg_nid == NID_sha1
590
0
                                ? " (default)"
591
0
                                : ""))
592
0
                    <= 0)
593
0
                    goto err;
594
0
                if (BIO_printf(out, "  Minimum Salt Length: %d%s\n",
595
0
                        saltlen,
596
0
                        (saltlen == 20 ? " (default)" : ""))
597
0
                    <= 0)
598
0
                    goto err;
599
0
                if (BIO_printf(out, "  Trailer Field: 0x%x%s\n",
600
0
                        trailerfield,
601
0
                        (trailerfield == 1 ? " (default)" : ""))
602
0
                    <= 0)
603
0
                    goto err;
604
0
            }
605
0
            break;
606
0
        }
607
0
    }
608
609
0
    ret = 1;
610
0
err:
611
0
    sk_BIGNUM_const_free(factors);
612
0
    sk_BIGNUM_const_free(exps);
613
0
    sk_BIGNUM_const_free(coeffs);
614
0
    return ret;
615
0
}
616
617
/* ---------------------------------------------------------------------- */
618
619
#ifndef OPENSSL_NO_ML_DSA
620
static int ml_dsa_to_text(BIO *out, const void *key, int selection)
621
0
{
622
0
    return ossl_ml_dsa_key_to_text(out, (const ML_DSA_KEY *)key, selection);
623
0
}
624
#endif /* OPENSSL_NO_ML_DSA */
625
626
#ifndef OPENSSL_NO_LMS
627
static int lms_to_text(BIO *out, const void *key, int selection)
628
{
629
    return ossl_lms_key_to_text(out, (LMS_KEY *)key, selection);
630
}
631
#endif /* OPENSSL_NO_LMS */
632
633
/* ---------------------------------------------------------------------- */
634
635
static void *key2text_newctx(void *provctx)
636
0
{
637
0
    return provctx;
638
0
}
639
640
static void key2text_freectx(ossl_unused void *vctx)
641
0
{
642
0
}
643
644
static int key2text_encode(void *vctx, const void *key, int selection,
645
    OSSL_CORE_BIO *cout,
646
    int (*key2text)(BIO *out, const void *key,
647
        int selection),
648
    OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
649
0
{
650
0
    BIO *out = ossl_bio_new_from_core_bio(vctx, cout);
651
0
    int ret;
652
653
0
    if (out == NULL)
654
0
        return 0;
655
656
0
    ret = key2text(out, key, selection);
657
0
    BIO_free(out);
658
659
0
    return ret;
660
0
}
661
662
#define MAKE_TEXT_ENCODER(impl, type)                                 \
663
    static OSSL_FUNC_encoder_import_object_fn                         \
664
        impl##2text_import_object;                                    \
665
    static OSSL_FUNC_encoder_free_object_fn                           \
666
        impl##2text_free_object;                                      \
667
    static OSSL_FUNC_encoder_encode_fn impl##2text_encode;            \
668
                                                                      \
669
    static void *impl##2text_import_object(void *ctx, int selection,  \
670
        const OSSL_PARAM params[])                                    \
671
0
    {                                                                 \
672
0
        return ossl_prov_import_key(ossl_##impl##_keymgmt_functions,  \
673
0
            ctx, selection, params);                                  \
674
0
    }                                                                 \
Unexecuted instantiation: encode_key2text.c:dh2text_import_object
Unexecuted instantiation: encode_key2text.c:dhx2text_import_object
Unexecuted instantiation: encode_key2text.c:dsa2text_import_object
Unexecuted instantiation: encode_key2text.c:ec2text_import_object
Unexecuted instantiation: encode_key2text.c:sm22text_import_object
Unexecuted instantiation: encode_key2text.c:ed255192text_import_object
Unexecuted instantiation: encode_key2text.c:ed4482text_import_object
Unexecuted instantiation: encode_key2text.c:x255192text_import_object
Unexecuted instantiation: encode_key2text.c:x4482text_import_object
Unexecuted instantiation: encode_key2text.c:ml_kem_5122text_import_object
Unexecuted instantiation: encode_key2text.c:ml_kem_7682text_import_object
Unexecuted instantiation: encode_key2text.c:ml_kem_10242text_import_object
Unexecuted instantiation: encode_key2text.c:rsa2text_import_object
Unexecuted instantiation: encode_key2text.c:rsapss2text_import_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_442text_import_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_652text_import_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_872text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_128s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_128f2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_192s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_192f2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_256s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_256f2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_128s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_128f2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_192s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_192f2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_256s2text_import_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_256f2text_import_object
675
    static void impl##2text_free_object(void *key)                    \
676
0
    {                                                                 \
677
0
        ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key);     \
678
0
    }                                                                 \
Unexecuted instantiation: encode_key2text.c:dh2text_free_object
Unexecuted instantiation: encode_key2text.c:dhx2text_free_object
Unexecuted instantiation: encode_key2text.c:dsa2text_free_object
Unexecuted instantiation: encode_key2text.c:ec2text_free_object
Unexecuted instantiation: encode_key2text.c:sm22text_free_object
Unexecuted instantiation: encode_key2text.c:ed255192text_free_object
Unexecuted instantiation: encode_key2text.c:ed4482text_free_object
Unexecuted instantiation: encode_key2text.c:x255192text_free_object
Unexecuted instantiation: encode_key2text.c:x4482text_free_object
Unexecuted instantiation: encode_key2text.c:ml_kem_5122text_free_object
Unexecuted instantiation: encode_key2text.c:ml_kem_7682text_free_object
Unexecuted instantiation: encode_key2text.c:ml_kem_10242text_free_object
Unexecuted instantiation: encode_key2text.c:rsa2text_free_object
Unexecuted instantiation: encode_key2text.c:rsapss2text_free_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_442text_free_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_652text_free_object
Unexecuted instantiation: encode_key2text.c:ml_dsa_872text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_128s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_128f2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_192s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_192f2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_256s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_sha2_256f2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_128s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_128f2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_192s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_192f2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_256s2text_free_object
Unexecuted instantiation: encode_key2text.c:slh_dsa_shake_256f2text_free_object
679
    static int impl##2text_encode(void *vctx, OSSL_CORE_BIO *cout,    \
680
        const void *key,                                              \
681
        const OSSL_PARAM key_abstract[],                              \
682
        int selection,                                                \
683
        OSSL_PASSPHRASE_CALLBACK *cb,                                 \
684
        void *cbarg)                                                  \
685
0
    {                                                                 \
686
0
        /* We don't deal with abstract objects */                     \
687
0
        if (key_abstract != NULL) {                                   \
688
0
            ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT);   \
689
0
            return 0;                                                 \
690
0
        }                                                             \
691
0
        return key2text_encode(vctx, key, selection, cout,            \
692
0
            type##_to_text, cb, cbarg);                               \
693
0
    }                                                                 \
694
    const OSSL_DISPATCH ossl_##impl##_to_text_encoder_functions[] = { \
695
        { OSSL_FUNC_ENCODER_NEWCTX,                                   \
696
            (void (*)(void))key2text_newctx },                        \
697
        { OSSL_FUNC_ENCODER_FREECTX,                                  \
698
            (void (*)(void))key2text_freectx },                       \
699
        { OSSL_FUNC_ENCODER_IMPORT_OBJECT,                            \
700
            (void (*)(void))impl##2text_import_object },              \
701
        { OSSL_FUNC_ENCODER_FREE_OBJECT,                              \
702
            (void (*)(void))impl##2text_free_object },                \
703
        { OSSL_FUNC_ENCODER_ENCODE,                                   \
704
            (void (*)(void))impl##2text_encode },                     \
705
        OSSL_DISPATCH_END                                             \
706
    }
707
708
#ifndef OPENSSL_NO_DH
709
0
MAKE_TEXT_ENCODER(dh, dh);
710
0
MAKE_TEXT_ENCODER(dhx, dh);
711
#endif
712
#ifndef OPENSSL_NO_DSA
713
0
MAKE_TEXT_ENCODER(dsa, dsa);
714
#endif
715
#ifndef OPENSSL_NO_EC
716
0
MAKE_TEXT_ENCODER(ec, ec);
717
#ifndef OPENSSL_NO_SM2
718
0
MAKE_TEXT_ENCODER(sm2, ec);
719
#endif
720
#ifndef OPENSSL_NO_ECX
721
0
MAKE_TEXT_ENCODER(ed25519, ecx);
722
0
MAKE_TEXT_ENCODER(ed448, ecx);
723
0
MAKE_TEXT_ENCODER(x25519, ecx);
724
0
MAKE_TEXT_ENCODER(x448, ecx);
725
#endif
726
#endif
727
#ifndef OPENSSL_NO_ML_KEM
728
0
MAKE_TEXT_ENCODER(ml_kem_512, ml_kem);
729
0
MAKE_TEXT_ENCODER(ml_kem_768, ml_kem);
730
0
MAKE_TEXT_ENCODER(ml_kem_1024, ml_kem);
731
#endif
732
0
MAKE_TEXT_ENCODER(rsa, rsa);
733
0
MAKE_TEXT_ENCODER(rsapss, rsa);
734
735
#ifndef OPENSSL_NO_ML_DSA
736
0
MAKE_TEXT_ENCODER(ml_dsa_44, ml_dsa);
737
0
MAKE_TEXT_ENCODER(ml_dsa_65, ml_dsa);
738
0
MAKE_TEXT_ENCODER(ml_dsa_87, ml_dsa);
739
#endif
740
741
#ifndef OPENSSL_NO_SLH_DSA
742
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_128s, slh_dsa);
743
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_128f, slh_dsa);
744
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_192s, slh_dsa);
745
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_192f, slh_dsa);
746
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_256s, slh_dsa);
747
0
MAKE_TEXT_ENCODER(slh_dsa_sha2_256f, slh_dsa);
748
0
MAKE_TEXT_ENCODER(slh_dsa_shake_128s, slh_dsa);
749
0
MAKE_TEXT_ENCODER(slh_dsa_shake_128f, slh_dsa);
750
0
MAKE_TEXT_ENCODER(slh_dsa_shake_192s, slh_dsa);
751
0
MAKE_TEXT_ENCODER(slh_dsa_shake_192f, slh_dsa);
752
0
MAKE_TEXT_ENCODER(slh_dsa_shake_256s, slh_dsa);
753
MAKE_TEXT_ENCODER(slh_dsa_shake_256f, slh_dsa);
754
#endif
755
756
#ifndef OPENSSL_NO_LMS
757
MAKE_TEXT_ENCODER(lms, lms);
758
#endif