/src/openssl31/providers/implementations/encode_decode/encode_key2any.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | /* |
11 | | * Low level APIs are deprecated for public use, but still ok for internal use. |
12 | | */ |
13 | | #include "internal/deprecated.h" |
14 | | |
15 | | #include <openssl/core.h> |
16 | | #include <openssl/core_dispatch.h> |
17 | | #include <openssl/core_names.h> |
18 | | #include <openssl/crypto.h> |
19 | | #include <openssl/params.h> |
20 | | #include <openssl/asn1.h> |
21 | | #include <openssl/err.h> |
22 | | #include <openssl/pem.h> |
23 | | #include <openssl/x509.h> |
24 | | #include <openssl/pkcs12.h> /* PKCS8_encrypt() */ |
25 | | #include <openssl/dh.h> |
26 | | #include <openssl/dsa.h> |
27 | | #include <openssl/ec.h> |
28 | | #include <openssl/proverr.h> |
29 | | #include "internal/passphrase.h" |
30 | | #include "internal/cryptlib.h" |
31 | | #include "crypto/ecx.h" |
32 | | #include "crypto/rsa.h" |
33 | | #include "prov/implementations.h" |
34 | | #include "prov/bio.h" |
35 | | #include "prov/provider_ctx.h" |
36 | | #include "prov/der_rsa.h" |
37 | | #include "endecoder_local.h" |
38 | | |
39 | | #if defined(OPENSSL_NO_DH) && defined(OPENSSL_NO_DSA) && defined(OPENSSL_NO_EC) |
40 | | # define OPENSSL_NO_KEYPARAMS |
41 | | #endif |
42 | | |
43 | | struct key2any_ctx_st { |
44 | | PROV_CTX *provctx; |
45 | | |
46 | | /* Set to 0 if parameters should not be saved (dsa only) */ |
47 | | int save_parameters; |
48 | | |
49 | | /* Set to 1 if intending to encrypt/decrypt, otherwise 0 */ |
50 | | int cipher_intent; |
51 | | |
52 | | EVP_CIPHER *cipher; |
53 | | |
54 | | struct ossl_passphrase_data_st pwdata; |
55 | | }; |
56 | | |
57 | | typedef int check_key_type_fn(const void *key, int nid); |
58 | | typedef int key_to_paramstring_fn(const void *key, int nid, int save, |
59 | | void **str, int *strtype); |
60 | | typedef int key_to_der_fn(BIO *out, const void *key, |
61 | | int key_nid, const char *pemname, |
62 | | key_to_paramstring_fn *p2s, i2d_of_void *k2d, |
63 | | struct key2any_ctx_st *ctx); |
64 | | typedef int write_bio_of_void_fn(BIO *bp, const void *x); |
65 | | |
66 | | |
67 | | /* Free the blob allocated during key_to_paramstring_fn */ |
68 | | static void free_asn1_data(int type, void *data) |
69 | 880 | { |
70 | 880 | switch(type) { |
71 | 700 | case V_ASN1_OBJECT: |
72 | 700 | ASN1_OBJECT_free(data); |
73 | 700 | break; |
74 | 180 | case V_ASN1_SEQUENCE: |
75 | 180 | ASN1_STRING_free(data); |
76 | 180 | break; |
77 | 880 | } |
78 | 880 | } |
79 | | |
80 | | static PKCS8_PRIV_KEY_INFO *key_to_p8info(const void *key, int key_nid, |
81 | | void *params, int params_type, |
82 | | i2d_of_void *k2d) |
83 | 985 | { |
84 | | /* der, derlen store the key DER output and its length */ |
85 | 985 | unsigned char *der = NULL; |
86 | 985 | int derlen; |
87 | | /* The final PKCS#8 info */ |
88 | 985 | PKCS8_PRIV_KEY_INFO *p8info = NULL; |
89 | | |
90 | 985 | if ((p8info = PKCS8_PRIV_KEY_INFO_new()) == NULL |
91 | 985 | || (derlen = k2d(key, &der)) <= 0 |
92 | 985 | || !PKCS8_pkey_set0(p8info, OBJ_nid2obj(key_nid), 0, |
93 | 880 | params_type, params, der, derlen)) { |
94 | 880 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
95 | 880 | PKCS8_PRIV_KEY_INFO_free(p8info); |
96 | 880 | OPENSSL_free(der); |
97 | 880 | p8info = NULL; |
98 | 880 | } |
99 | | |
100 | 985 | return p8info; |
101 | 985 | } |
102 | | |
103 | | static X509_SIG *p8info_to_encp8(PKCS8_PRIV_KEY_INFO *p8info, |
104 | | struct key2any_ctx_st *ctx) |
105 | 0 | { |
106 | 0 | X509_SIG *p8 = NULL; |
107 | 0 | char kstr[PEM_BUFSIZE]; |
108 | 0 | size_t klen = 0; |
109 | 0 | OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx); |
110 | |
|
111 | 0 | if (ctx->cipher == NULL) |
112 | 0 | return NULL; |
113 | | |
114 | 0 | if (!ossl_pw_get_passphrase(kstr, sizeof(kstr), &klen, NULL, 1, |
115 | 0 | &ctx->pwdata)) { |
116 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_UNABLE_TO_GET_PASSPHRASE); |
117 | 0 | return NULL; |
118 | 0 | } |
119 | | /* First argument == -1 means "standard" */ |
120 | 0 | p8 = PKCS8_encrypt_ex(-1, ctx->cipher, kstr, klen, NULL, 0, 0, p8info, libctx, NULL); |
121 | 0 | OPENSSL_cleanse(kstr, klen); |
122 | 0 | return p8; |
123 | 0 | } |
124 | | |
125 | | static X509_SIG *key_to_encp8(const void *key, int key_nid, |
126 | | void *params, int params_type, |
127 | | i2d_of_void *k2d, struct key2any_ctx_st *ctx) |
128 | 0 | { |
129 | 0 | PKCS8_PRIV_KEY_INFO *p8info = |
130 | 0 | key_to_p8info(key, key_nid, params, params_type, k2d); |
131 | 0 | X509_SIG *p8 = NULL; |
132 | |
|
133 | 0 | if (p8info == NULL) { |
134 | 0 | free_asn1_data(params_type, params); |
135 | 0 | } else { |
136 | 0 | p8 = p8info_to_encp8(p8info, ctx); |
137 | 0 | PKCS8_PRIV_KEY_INFO_free(p8info); |
138 | 0 | } |
139 | 0 | return p8; |
140 | 0 | } |
141 | | |
142 | | static X509_PUBKEY *key_to_pubkey(const void *key, int key_nid, |
143 | | void *params, int params_type, |
144 | | i2d_of_void k2d) |
145 | 0 | { |
146 | | /* der, derlen store the key DER output and its length */ |
147 | 0 | unsigned char *der = NULL; |
148 | 0 | int derlen; |
149 | | /* The final X509_PUBKEY */ |
150 | 0 | X509_PUBKEY *xpk = NULL; |
151 | | |
152 | |
|
153 | 0 | if ((xpk = X509_PUBKEY_new()) == NULL |
154 | 0 | || (derlen = k2d(key, &der)) <= 0 |
155 | 0 | || !X509_PUBKEY_set0_param(xpk, OBJ_nid2obj(key_nid), |
156 | 0 | params_type, params, der, derlen)) { |
157 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
158 | 0 | X509_PUBKEY_free(xpk); |
159 | 0 | OPENSSL_free(der); |
160 | 0 | xpk = NULL; |
161 | 0 | } |
162 | |
|
163 | 0 | return xpk; |
164 | 0 | } |
165 | | |
166 | | /* |
167 | | * key_to_epki_* produce encoded output with the private key data in a |
168 | | * EncryptedPrivateKeyInfo structure (defined by PKCS#8). They require |
169 | | * that there's an intent to encrypt, anything else is an error. |
170 | | * |
171 | | * key_to_pki_* primarily produce encoded output with the private key data |
172 | | * in a PrivateKeyInfo structure (also defined by PKCS#8). However, if |
173 | | * there is an intent to encrypt the data, the corresponding key_to_epki_* |
174 | | * function is used instead. |
175 | | * |
176 | | * key_to_spki_* produce encoded output with the public key data in an |
177 | | * X.509 SubjectPublicKeyInfo. |
178 | | * |
179 | | * Key parameters don't have any defined envelopment of this kind, but are |
180 | | * included in some manner in the output from the functions described above, |
181 | | * either in the AlgorithmIdentifier's parameter field, or as part of the |
182 | | * key data itself. |
183 | | */ |
184 | | |
185 | | static int key_to_epki_der_priv_bio(BIO *out, const void *key, |
186 | | int key_nid, |
187 | | ossl_unused const char *pemname, |
188 | | key_to_paramstring_fn *p2s, |
189 | | i2d_of_void *k2d, |
190 | | struct key2any_ctx_st *ctx) |
191 | 0 | { |
192 | 0 | int ret = 0; |
193 | 0 | void *str = NULL; |
194 | 0 | int strtype = V_ASN1_UNDEF; |
195 | 0 | X509_SIG *p8; |
196 | |
|
197 | 0 | if (!ctx->cipher_intent) |
198 | 0 | return 0; |
199 | | |
200 | 0 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
201 | 0 | &str, &strtype)) |
202 | 0 | return 0; |
203 | | |
204 | 0 | p8 = key_to_encp8(key, key_nid, str, strtype, k2d, ctx); |
205 | 0 | if (p8 != NULL) |
206 | 0 | ret = i2d_PKCS8_bio(out, p8); |
207 | |
|
208 | 0 | X509_SIG_free(p8); |
209 | |
|
210 | 0 | return ret; |
211 | 0 | } |
212 | | |
213 | | static int key_to_epki_pem_priv_bio(BIO *out, const void *key, |
214 | | int key_nid, |
215 | | ossl_unused const char *pemname, |
216 | | key_to_paramstring_fn *p2s, |
217 | | i2d_of_void *k2d, |
218 | | struct key2any_ctx_st *ctx) |
219 | 0 | { |
220 | 0 | int ret = 0; |
221 | 0 | void *str = NULL; |
222 | 0 | int strtype = V_ASN1_UNDEF; |
223 | 0 | X509_SIG *p8; |
224 | |
|
225 | 0 | if (!ctx->cipher_intent) |
226 | 0 | return 0; |
227 | | |
228 | 0 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
229 | 0 | &str, &strtype)) |
230 | 0 | return 0; |
231 | | |
232 | 0 | p8 = key_to_encp8(key, key_nid, str, strtype, k2d, ctx); |
233 | 0 | if (p8 != NULL) |
234 | 0 | ret = PEM_write_bio_PKCS8(out, p8); |
235 | |
|
236 | 0 | X509_SIG_free(p8); |
237 | |
|
238 | 0 | return ret; |
239 | 0 | } |
240 | | |
241 | | static int key_to_pki_der_priv_bio(BIO *out, const void *key, |
242 | | int key_nid, |
243 | | ossl_unused const char *pemname, |
244 | | key_to_paramstring_fn *p2s, |
245 | | i2d_of_void *k2d, |
246 | | struct key2any_ctx_st *ctx) |
247 | 985 | { |
248 | 985 | int ret = 0; |
249 | 985 | void *str = NULL; |
250 | 985 | int strtype = V_ASN1_UNDEF; |
251 | 985 | PKCS8_PRIV_KEY_INFO *p8info; |
252 | | |
253 | 985 | if (ctx->cipher_intent) |
254 | 0 | return key_to_epki_der_priv_bio(out, key, key_nid, pemname, |
255 | 0 | p2s, k2d, ctx); |
256 | | |
257 | 985 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
258 | 959 | &str, &strtype)) |
259 | 0 | return 0; |
260 | | |
261 | 985 | p8info = key_to_p8info(key, key_nid, str, strtype, k2d); |
262 | | |
263 | 985 | if (p8info != NULL) |
264 | 105 | ret = i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8info); |
265 | 880 | else |
266 | 880 | free_asn1_data(strtype, str); |
267 | | |
268 | 985 | PKCS8_PRIV_KEY_INFO_free(p8info); |
269 | | |
270 | 985 | return ret; |
271 | 985 | } |
272 | | |
273 | | static int key_to_pki_pem_priv_bio(BIO *out, const void *key, |
274 | | int key_nid, |
275 | | ossl_unused const char *pemname, |
276 | | key_to_paramstring_fn *p2s, |
277 | | i2d_of_void *k2d, |
278 | | struct key2any_ctx_st *ctx) |
279 | 0 | { |
280 | 0 | int ret = 0; |
281 | 0 | void *str = NULL; |
282 | 0 | int strtype = V_ASN1_UNDEF; |
283 | 0 | PKCS8_PRIV_KEY_INFO *p8info; |
284 | |
|
285 | 0 | if (ctx->cipher_intent) |
286 | 0 | return key_to_epki_pem_priv_bio(out, key, key_nid, pemname, |
287 | 0 | p2s, k2d, ctx); |
288 | | |
289 | 0 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
290 | 0 | &str, &strtype)) |
291 | 0 | return 0; |
292 | | |
293 | 0 | p8info = key_to_p8info(key, key_nid, str, strtype, k2d); |
294 | |
|
295 | 0 | if (p8info != NULL) |
296 | 0 | ret = PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8info); |
297 | 0 | else |
298 | 0 | free_asn1_data(strtype, str); |
299 | |
|
300 | 0 | PKCS8_PRIV_KEY_INFO_free(p8info); |
301 | |
|
302 | 0 | return ret; |
303 | 0 | } |
304 | | |
305 | | static int key_to_spki_der_pub_bio(BIO *out, const void *key, |
306 | | int key_nid, |
307 | | ossl_unused const char *pemname, |
308 | | key_to_paramstring_fn *p2s, |
309 | | i2d_of_void *k2d, |
310 | | struct key2any_ctx_st *ctx) |
311 | 0 | { |
312 | 0 | int ret = 0; |
313 | 0 | void *str = NULL; |
314 | 0 | int strtype = V_ASN1_UNDEF; |
315 | 0 | X509_PUBKEY *xpk = NULL; |
316 | |
|
317 | 0 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
318 | 0 | &str, &strtype)) |
319 | 0 | return 0; |
320 | | |
321 | 0 | xpk = key_to_pubkey(key, key_nid, str, strtype, k2d); |
322 | |
|
323 | 0 | if (xpk != NULL) |
324 | 0 | ret = i2d_X509_PUBKEY_bio(out, xpk); |
325 | | |
326 | | /* Also frees |str| */ |
327 | 0 | X509_PUBKEY_free(xpk); |
328 | 0 | return ret; |
329 | 0 | } |
330 | | |
331 | | static int key_to_spki_pem_pub_bio(BIO *out, const void *key, |
332 | | int key_nid, |
333 | | ossl_unused const char *pemname, |
334 | | key_to_paramstring_fn *p2s, |
335 | | i2d_of_void *k2d, |
336 | | struct key2any_ctx_st *ctx) |
337 | 0 | { |
338 | 0 | int ret = 0; |
339 | 0 | void *str = NULL; |
340 | 0 | int strtype = V_ASN1_UNDEF; |
341 | 0 | X509_PUBKEY *xpk = NULL; |
342 | |
|
343 | 0 | if (p2s != NULL && !p2s(key, key_nid, ctx->save_parameters, |
344 | 0 | &str, &strtype)) |
345 | 0 | return 0; |
346 | | |
347 | 0 | xpk = key_to_pubkey(key, key_nid, str, strtype, k2d); |
348 | |
|
349 | 0 | if (xpk != NULL) |
350 | 0 | ret = PEM_write_bio_X509_PUBKEY(out, xpk); |
351 | 0 | else |
352 | 0 | free_asn1_data(strtype, str); |
353 | | |
354 | | /* Also frees |str| */ |
355 | 0 | X509_PUBKEY_free(xpk); |
356 | 0 | return ret; |
357 | 0 | } |
358 | | |
359 | | /* |
360 | | * key_to_type_specific_* produce encoded output with type specific key data, |
361 | | * no envelopment; the same kind of output as the type specific i2d_ and |
362 | | * PEM_write_ functions, which is often a simple SEQUENCE of INTEGER. |
363 | | * |
364 | | * OpenSSL tries to discourage production of new keys in this form, because |
365 | | * of the ambiguity when trying to recognise them, but can't deny that PKCS#1 |
366 | | * et al still are live standards. |
367 | | * |
368 | | * Note that these functions completely ignore p2s, and rather rely entirely |
369 | | * on k2d to do the complete work. |
370 | | */ |
371 | | static int key_to_type_specific_der_bio(BIO *out, const void *key, |
372 | | int key_nid, |
373 | | ossl_unused const char *pemname, |
374 | | key_to_paramstring_fn *p2s, |
375 | | i2d_of_void *k2d, |
376 | | struct key2any_ctx_st *ctx) |
377 | 5.61k | { |
378 | 5.61k | unsigned char *der = NULL; |
379 | 5.61k | int derlen; |
380 | 5.61k | int ret; |
381 | | |
382 | 5.61k | if ((derlen = k2d(key, &der)) <= 0) { |
383 | 880 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
384 | 880 | return 0; |
385 | 880 | } |
386 | | |
387 | 4.73k | ret = BIO_write(out, der, derlen); |
388 | 4.73k | OPENSSL_free(der); |
389 | 4.73k | return ret > 0; |
390 | 5.61k | } |
391 | 5.61k | #define key_to_type_specific_der_priv_bio key_to_type_specific_der_bio |
392 | 0 | #define key_to_type_specific_der_pub_bio key_to_type_specific_der_bio |
393 | 0 | #define key_to_type_specific_der_param_bio key_to_type_specific_der_bio |
394 | | |
395 | | static int key_to_type_specific_pem_bio_cb(BIO *out, const void *key, |
396 | | int key_nid, const char *pemname, |
397 | | key_to_paramstring_fn *p2s, |
398 | | i2d_of_void *k2d, |
399 | | struct key2any_ctx_st *ctx, |
400 | | pem_password_cb *cb, void *cbarg) |
401 | 0 | { |
402 | 0 | return |
403 | 0 | PEM_ASN1_write_bio(k2d, pemname, out, key, ctx->cipher, |
404 | 0 | NULL, 0, cb, cbarg) > 0; |
405 | 0 | } |
406 | | |
407 | | static int key_to_type_specific_pem_priv_bio(BIO *out, const void *key, |
408 | | int key_nid, const char *pemname, |
409 | | key_to_paramstring_fn *p2s, |
410 | | i2d_of_void *k2d, |
411 | | struct key2any_ctx_st *ctx) |
412 | 0 | { |
413 | 0 | return key_to_type_specific_pem_bio_cb(out, key, key_nid, pemname, |
414 | 0 | p2s, k2d, ctx, |
415 | 0 | ossl_pw_pem_password, &ctx->pwdata); |
416 | 0 | } |
417 | | |
418 | | static int key_to_type_specific_pem_pub_bio(BIO *out, const void *key, |
419 | | int key_nid, const char *pemname, |
420 | | key_to_paramstring_fn *p2s, |
421 | | i2d_of_void *k2d, |
422 | | struct key2any_ctx_st *ctx) |
423 | 0 | { |
424 | 0 | return key_to_type_specific_pem_bio_cb(out, key, key_nid, pemname, |
425 | 0 | p2s, k2d, ctx, NULL, NULL); |
426 | 0 | } |
427 | | |
428 | | #ifndef OPENSSL_NO_KEYPARAMS |
429 | | static int key_to_type_specific_pem_param_bio(BIO *out, const void *key, |
430 | | int key_nid, const char *pemname, |
431 | | key_to_paramstring_fn *p2s, |
432 | | i2d_of_void *k2d, |
433 | | struct key2any_ctx_st *ctx) |
434 | 0 | { |
435 | 0 | return key_to_type_specific_pem_bio_cb(out, key, key_nid, pemname, |
436 | 0 | p2s, k2d, ctx, NULL, NULL); |
437 | 0 | } |
438 | | #endif |
439 | | |
440 | | /* ---------------------------------------------------------------------- */ |
441 | | |
442 | | #ifndef OPENSSL_NO_DH |
443 | | static int prepare_dh_params(const void *dh, int nid, int save, |
444 | | void **pstr, int *pstrtype) |
445 | 75 | { |
446 | 75 | ASN1_STRING *params = ASN1_STRING_new(); |
447 | | |
448 | 75 | if (params == NULL) { |
449 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
450 | 0 | return 0; |
451 | 0 | } |
452 | | |
453 | 75 | if (nid == EVP_PKEY_DHX) |
454 | 75 | params->length = i2d_DHxparams(dh, ¶ms->data); |
455 | 0 | else |
456 | 0 | params->length = i2d_DHparams(dh, ¶ms->data); |
457 | | |
458 | 75 | if (params->length <= 0) { |
459 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
460 | 0 | ASN1_STRING_free(params); |
461 | 0 | return 0; |
462 | 0 | } |
463 | 75 | params->type = V_ASN1_SEQUENCE; |
464 | | |
465 | 75 | *pstr = params; |
466 | 75 | *pstrtype = V_ASN1_SEQUENCE; |
467 | 75 | return 1; |
468 | 75 | } |
469 | | |
470 | | static int dh_spki_pub_to_der(const void *dh, unsigned char **pder) |
471 | 0 | { |
472 | 0 | const BIGNUM *bn = NULL; |
473 | 0 | ASN1_INTEGER *pub_key = NULL; |
474 | 0 | int ret; |
475 | |
|
476 | 0 | if ((bn = DH_get0_pub_key(dh)) == NULL) { |
477 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
478 | 0 | return 0; |
479 | 0 | } |
480 | 0 | if ((pub_key = BN_to_ASN1_INTEGER(bn, NULL)) == NULL) { |
481 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_BN_ERROR); |
482 | 0 | return 0; |
483 | 0 | } |
484 | | |
485 | 0 | ret = i2d_ASN1_INTEGER(pub_key, pder); |
486 | |
|
487 | 0 | ASN1_STRING_clear_free(pub_key); |
488 | 0 | return ret; |
489 | 0 | } |
490 | | |
491 | | static int dh_pki_priv_to_der(const void *dh, unsigned char **pder) |
492 | 75 | { |
493 | 75 | const BIGNUM *bn = NULL; |
494 | 75 | ASN1_INTEGER *priv_key = NULL; |
495 | 75 | int ret; |
496 | | |
497 | 75 | if ((bn = DH_get0_priv_key(dh)) == NULL) { |
498 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
499 | 0 | return 0; |
500 | 0 | } |
501 | 75 | if ((priv_key = BN_to_ASN1_INTEGER(bn, NULL)) == NULL) { |
502 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_BN_ERROR); |
503 | 0 | return 0; |
504 | 0 | } |
505 | | |
506 | 75 | ret = i2d_ASN1_INTEGER(priv_key, pder); |
507 | | |
508 | 75 | ASN1_STRING_clear_free(priv_key); |
509 | 75 | return ret; |
510 | 75 | } |
511 | | |
512 | 0 | # define dh_epki_priv_to_der dh_pki_priv_to_der |
513 | | |
514 | | static int dh_type_specific_params_to_der(const void *dh, unsigned char **pder) |
515 | 0 | { |
516 | 0 | if (DH_test_flags(dh, DH_FLAG_TYPE_DHX)) |
517 | 0 | return i2d_DHxparams(dh, pder); |
518 | 0 | return i2d_DHparams(dh, pder); |
519 | 0 | } |
520 | | |
521 | | /* |
522 | | * DH doesn't have i2d_DHPrivateKey or i2d_DHPublicKey, so we can't make |
523 | | * corresponding functions here. |
524 | | */ |
525 | | # define dh_type_specific_priv_to_der NULL |
526 | | # define dh_type_specific_pub_to_der NULL |
527 | | |
528 | | static int dh_check_key_type(const void *dh, int expected_type) |
529 | 75 | { |
530 | 75 | int type = |
531 | 75 | DH_test_flags(dh, DH_FLAG_TYPE_DHX) ? EVP_PKEY_DHX : EVP_PKEY_DH; |
532 | | |
533 | 75 | return type == expected_type; |
534 | 75 | } |
535 | | |
536 | 0 | # define dh_evp_type EVP_PKEY_DH |
537 | 75 | # define dhx_evp_type EVP_PKEY_DHX |
538 | | # define dh_input_type "DH" |
539 | | # define dhx_input_type "DHX" |
540 | 0 | # define dh_pem_type "DH" |
541 | 75 | # define dhx_pem_type "X9.42 DH" |
542 | | #endif |
543 | | |
544 | | /* ---------------------------------------------------------------------- */ |
545 | | |
546 | | #ifndef OPENSSL_NO_DSA |
547 | | static int encode_dsa_params(const void *dsa, int nid, |
548 | | void **pstr, int *pstrtype) |
549 | 0 | { |
550 | 0 | ASN1_STRING *params = ASN1_STRING_new(); |
551 | |
|
552 | 0 | if (params == NULL) { |
553 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
554 | 0 | return 0; |
555 | 0 | } |
556 | | |
557 | 0 | params->length = i2d_DSAparams(dsa, ¶ms->data); |
558 | |
|
559 | 0 | if (params->length <= 0) { |
560 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
561 | 0 | ASN1_STRING_free(params); |
562 | 0 | return 0; |
563 | 0 | } |
564 | | |
565 | 0 | *pstrtype = V_ASN1_SEQUENCE; |
566 | 0 | *pstr = params; |
567 | 0 | return 1; |
568 | 0 | } |
569 | | |
570 | | static int prepare_dsa_params(const void *dsa, int nid, int save, |
571 | | void **pstr, int *pstrtype) |
572 | 0 | { |
573 | 0 | const BIGNUM *p = DSA_get0_p(dsa); |
574 | 0 | const BIGNUM *q = DSA_get0_q(dsa); |
575 | 0 | const BIGNUM *g = DSA_get0_g(dsa); |
576 | |
|
577 | 0 | if (save && p != NULL && q != NULL && g != NULL) |
578 | 0 | return encode_dsa_params(dsa, nid, pstr, pstrtype); |
579 | | |
580 | 0 | *pstr = NULL; |
581 | 0 | *pstrtype = V_ASN1_UNDEF; |
582 | 0 | return 1; |
583 | 0 | } |
584 | | |
585 | | static int dsa_spki_pub_to_der(const void *dsa, unsigned char **pder) |
586 | 0 | { |
587 | 0 | const BIGNUM *bn = NULL; |
588 | 0 | ASN1_INTEGER *pub_key = NULL; |
589 | 0 | int ret; |
590 | |
|
591 | 0 | if ((bn = DSA_get0_pub_key(dsa)) == NULL) { |
592 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
593 | 0 | return 0; |
594 | 0 | } |
595 | 0 | if ((pub_key = BN_to_ASN1_INTEGER(bn, NULL)) == NULL) { |
596 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_BN_ERROR); |
597 | 0 | return 0; |
598 | 0 | } |
599 | | |
600 | 0 | ret = i2d_ASN1_INTEGER(pub_key, pder); |
601 | |
|
602 | 0 | ASN1_STRING_clear_free(pub_key); |
603 | 0 | return ret; |
604 | 0 | } |
605 | | |
606 | | static int dsa_pki_priv_to_der(const void *dsa, unsigned char **pder) |
607 | 0 | { |
608 | 0 | const BIGNUM *bn = NULL; |
609 | 0 | ASN1_INTEGER *priv_key = NULL; |
610 | 0 | int ret; |
611 | |
|
612 | 0 | if ((bn = DSA_get0_priv_key(dsa)) == NULL) { |
613 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY); |
614 | 0 | return 0; |
615 | 0 | } |
616 | 0 | if ((priv_key = BN_to_ASN1_INTEGER(bn, NULL)) == NULL) { |
617 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_BN_ERROR); |
618 | 0 | return 0; |
619 | 0 | } |
620 | | |
621 | 0 | ret = i2d_ASN1_INTEGER(priv_key, pder); |
622 | |
|
623 | 0 | ASN1_STRING_clear_free(priv_key); |
624 | 0 | return ret; |
625 | 0 | } |
626 | | |
627 | 0 | # define dsa_epki_priv_to_der dsa_pki_priv_to_der |
628 | | |
629 | 1.75k | # define dsa_type_specific_priv_to_der (i2d_of_void *)i2d_DSAPrivateKey |
630 | 0 | # define dsa_type_specific_pub_to_der (i2d_of_void *)i2d_DSAPublicKey |
631 | 0 | # define dsa_type_specific_params_to_der (i2d_of_void *)i2d_DSAparams |
632 | | |
633 | 1.75k | # define dsa_check_key_type NULL |
634 | 1.75k | # define dsa_evp_type EVP_PKEY_DSA |
635 | | # define dsa_input_type "DSA" |
636 | 1.75k | # define dsa_pem_type "DSA" |
637 | | #endif |
638 | | |
639 | | /* ---------------------------------------------------------------------- */ |
640 | | |
641 | | #ifndef OPENSSL_NO_EC |
642 | | static int prepare_ec_explicit_params(const void *eckey, |
643 | | void **pstr, int *pstrtype) |
644 | 180 | { |
645 | 180 | ASN1_STRING *params = ASN1_STRING_new(); |
646 | | |
647 | 180 | if (params == NULL) { |
648 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
649 | 0 | return 0; |
650 | 0 | } |
651 | | |
652 | 180 | params->length = i2d_ECParameters(eckey, ¶ms->data); |
653 | 180 | if (params->length <= 0) { |
654 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
655 | 0 | ASN1_STRING_free(params); |
656 | 0 | return 0; |
657 | 0 | } |
658 | | |
659 | 180 | *pstrtype = V_ASN1_SEQUENCE; |
660 | 180 | *pstr = params; |
661 | 180 | return 1; |
662 | 180 | } |
663 | | |
664 | | /* |
665 | | * This implements EcpkParameters, where the CHOICE is based on whether there |
666 | | * is a curve name (curve nid) to be found or not. See RFC 3279 for details. |
667 | | */ |
668 | | static int prepare_ec_params(const void *eckey, int nid, int save, |
669 | | void **pstr, int *pstrtype) |
670 | 880 | { |
671 | 880 | int curve_nid; |
672 | 880 | const EC_GROUP *group = EC_KEY_get0_group(eckey); |
673 | 880 | ASN1_OBJECT *params = NULL; |
674 | | |
675 | 880 | if (group == NULL) |
676 | 0 | return 0; |
677 | 880 | curve_nid = EC_GROUP_get_curve_name(group); |
678 | 880 | if (curve_nid != NID_undef) { |
679 | 700 | params = OBJ_nid2obj(curve_nid); |
680 | 700 | if (params == NULL) |
681 | 0 | return 0; |
682 | 700 | } |
683 | | |
684 | 880 | if (curve_nid != NID_undef |
685 | 880 | && (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE)) { |
686 | | /* The CHOICE came to namedCurve */ |
687 | 700 | if (OBJ_length(params) == 0) { |
688 | | /* Some curves might not have an associated OID */ |
689 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_OID); |
690 | 0 | ASN1_OBJECT_free(params); |
691 | 0 | return 0; |
692 | 0 | } |
693 | 700 | *pstr = params; |
694 | 700 | *pstrtype = V_ASN1_OBJECT; |
695 | 700 | return 1; |
696 | 700 | } else { |
697 | | /* The CHOICE came to ecParameters */ |
698 | 180 | return prepare_ec_explicit_params(eckey, pstr, pstrtype); |
699 | 180 | } |
700 | 880 | } |
701 | | |
702 | | static int ec_spki_pub_to_der(const void *eckey, unsigned char **pder) |
703 | 0 | { |
704 | 0 | if (EC_KEY_get0_public_key(eckey) == NULL) { |
705 | 0 | ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY); |
706 | 0 | return 0; |
707 | 0 | } |
708 | 0 | return i2o_ECPublicKey(eckey, pder); |
709 | 0 | } |
710 | | |
711 | | static int ec_pki_priv_to_der(const void *veckey, unsigned char **pder) |
712 | 880 | { |
713 | 880 | EC_KEY *eckey = (EC_KEY *)veckey; |
714 | 880 | unsigned int old_flags; |
715 | 880 | int ret = 0; |
716 | | |
717 | | /* |
718 | | * For PKCS8 the curve name appears in the PKCS8_PRIV_KEY_INFO object |
719 | | * as the pkeyalg->parameter field. (For a named curve this is an OID) |
720 | | * The pkey field is an octet string that holds the encoded |
721 | | * ECPrivateKey SEQUENCE with the optional parameters field omitted. |
722 | | * We omit this by setting the EC_PKEY_NO_PARAMETERS flag. |
723 | | */ |
724 | 880 | old_flags = EC_KEY_get_enc_flags(eckey); /* save old flags */ |
725 | 880 | EC_KEY_set_enc_flags(eckey, old_flags | EC_PKEY_NO_PARAMETERS); |
726 | 880 | ret = i2d_ECPrivateKey(eckey, pder); |
727 | 880 | EC_KEY_set_enc_flags(eckey, old_flags); /* restore old flags */ |
728 | 880 | return ret; /* return the length of the der encoded data */ |
729 | 880 | } |
730 | | |
731 | 0 | # define ec_epki_priv_to_der ec_pki_priv_to_der |
732 | | |
733 | 0 | # define ec_type_specific_params_to_der (i2d_of_void *)i2d_ECParameters |
734 | | /* No ec_type_specific_pub_to_der, there simply is no such thing */ |
735 | 2.73k | # define ec_type_specific_priv_to_der (i2d_of_void *)i2d_ECPrivateKey |
736 | | |
737 | 3.61k | # define ec_check_key_type NULL |
738 | 3.61k | # define ec_evp_type EVP_PKEY_EC |
739 | | # define ec_input_type "EC" |
740 | 3.59k | # define ec_pem_type "EC" |
741 | | |
742 | | # ifndef OPENSSL_NO_SM2 |
743 | | /* |
744 | | * Albeit SM2 is a slightly different algorithm than ECDSA, the key type |
745 | | * encoding (in all places where an AlgorithmIdentifier is produced, such |
746 | | * as PrivateKeyInfo and SubjectPublicKeyInfo) is the same as for ECC keys |
747 | | * according to the example in GM/T 0015-2012, appendix D.2. |
748 | | * This leaves the distinction of SM2 keys to the EC group (which is found |
749 | | * in AlgorithmIdentified.params). |
750 | | */ |
751 | 21 | # define sm2_evp_type ec_evp_type |
752 | | # define sm2_input_type "SM2" |
753 | 21 | # define sm2_pem_type "SM2" |
754 | | # endif |
755 | | #endif |
756 | | |
757 | | /* ---------------------------------------------------------------------- */ |
758 | | |
759 | | #ifndef OPENSSL_NO_EC |
760 | 26 | # define prepare_ecx_params NULL |
761 | | |
762 | | static int ecx_spki_pub_to_der(const void *vecxkey, unsigned char **pder) |
763 | 0 | { |
764 | 0 | const ECX_KEY *ecxkey = vecxkey; |
765 | 0 | unsigned char *keyblob; |
766 | |
|
767 | 0 | if (ecxkey == NULL) { |
768 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
769 | 0 | return 0; |
770 | 0 | } |
771 | | |
772 | 0 | keyblob = OPENSSL_memdup(ecxkey->pubkey, ecxkey->keylen); |
773 | 0 | if (keyblob == NULL) { |
774 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
775 | 0 | return 0; |
776 | 0 | } |
777 | | |
778 | 0 | *pder = keyblob; |
779 | 0 | return ecxkey->keylen; |
780 | 0 | } |
781 | | |
782 | | static int ecx_pki_priv_to_der(const void *vecxkey, unsigned char **pder) |
783 | 26 | { |
784 | 26 | const ECX_KEY *ecxkey = vecxkey; |
785 | 26 | ASN1_OCTET_STRING oct; |
786 | 26 | int keybloblen; |
787 | | |
788 | 26 | if (ecxkey == NULL || ecxkey->privkey == NULL) { |
789 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
790 | 0 | return 0; |
791 | 0 | } |
792 | | |
793 | 26 | oct.data = ecxkey->privkey; |
794 | 26 | oct.length = ecxkey->keylen; |
795 | 26 | oct.flags = 0; |
796 | | |
797 | 26 | keybloblen = i2d_ASN1_OCTET_STRING(&oct, pder); |
798 | 26 | if (keybloblen < 0) { |
799 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE); |
800 | 0 | return 0; |
801 | 0 | } |
802 | | |
803 | 26 | return keybloblen; |
804 | 26 | } |
805 | | |
806 | 0 | # define ecx_epki_priv_to_der ecx_pki_priv_to_der |
807 | | |
808 | | /* |
809 | | * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo |
810 | | * representation, so we don't define ecx_type_specific_[priv,pub,params]_to_der. |
811 | | */ |
812 | | |
813 | 26 | # define ecx_check_key_type NULL |
814 | | |
815 | 5 | # define ed25519_evp_type EVP_PKEY_ED25519 |
816 | 9 | # define ed448_evp_type EVP_PKEY_ED448 |
817 | 7 | # define x25519_evp_type EVP_PKEY_X25519 |
818 | 5 | # define x448_evp_type EVP_PKEY_X448 |
819 | | # define ed25519_input_type "ED25519" |
820 | | # define ed448_input_type "ED448" |
821 | | # define x25519_input_type "X25519" |
822 | | # define x448_input_type "X448" |
823 | 5 | # define ed25519_pem_type "ED25519" |
824 | 9 | # define ed448_pem_type "ED448" |
825 | 7 | # define x25519_pem_type "X25519" |
826 | 5 | # define x448_pem_type "X448" |
827 | | #endif |
828 | | |
829 | | /* ---------------------------------------------------------------------- */ |
830 | | |
831 | | /* |
832 | | * Helper functions to prepare RSA-PSS params for encoding. We would |
833 | | * have simply written the whole AlgorithmIdentifier, but existing libcrypto |
834 | | * functionality doesn't allow that. |
835 | | */ |
836 | | |
837 | | static int prepare_rsa_params(const void *rsa, int nid, int save, |
838 | | void **pstr, int *pstrtype) |
839 | 4 | { |
840 | 4 | const RSA_PSS_PARAMS_30 *pss = ossl_rsa_get0_pss_params_30((RSA *)rsa); |
841 | | |
842 | 4 | *pstr = NULL; |
843 | | |
844 | 4 | switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) { |
845 | 0 | case RSA_FLAG_TYPE_RSA: |
846 | | /* If plain RSA, the parameters shall be NULL */ |
847 | 0 | *pstrtype = V_ASN1_NULL; |
848 | 0 | return 1; |
849 | 4 | case RSA_FLAG_TYPE_RSASSAPSS: |
850 | 4 | if (ossl_rsa_pss_params_30_is_unrestricted(pss)) { |
851 | 0 | *pstrtype = V_ASN1_UNDEF; |
852 | 0 | return 1; |
853 | 4 | } else { |
854 | 4 | ASN1_STRING *astr = NULL; |
855 | 4 | WPACKET pkt; |
856 | 4 | unsigned char *str = NULL; |
857 | 4 | size_t str_sz = 0; |
858 | 4 | int i; |
859 | | |
860 | 12 | for (i = 0; i < 2; i++) { |
861 | 8 | switch (i) { |
862 | 4 | case 0: |
863 | 4 | if (!WPACKET_init_null_der(&pkt)) |
864 | 0 | goto err; |
865 | 4 | break; |
866 | 4 | case 1: |
867 | 4 | if ((str = OPENSSL_malloc(str_sz)) == NULL |
868 | 4 | || !WPACKET_init_der(&pkt, str, str_sz)) { |
869 | 0 | WPACKET_cleanup(&pkt); |
870 | 0 | goto err; |
871 | 0 | } |
872 | 4 | break; |
873 | 8 | } |
874 | 8 | if (!ossl_DER_w_RSASSA_PSS_params(&pkt, -1, pss) |
875 | 8 | || !WPACKET_finish(&pkt) |
876 | 8 | || !WPACKET_get_total_written(&pkt, &str_sz)) { |
877 | 0 | WPACKET_cleanup(&pkt); |
878 | 0 | goto err; |
879 | 0 | } |
880 | 8 | WPACKET_cleanup(&pkt); |
881 | | |
882 | | /* |
883 | | * If no PSS parameters are going to be written, there's no |
884 | | * point going for another iteration. |
885 | | * This saves us from getting |str| allocated just to have it |
886 | | * immediately de-allocated. |
887 | | */ |
888 | 8 | if (str_sz == 0) |
889 | 0 | break; |
890 | 8 | } |
891 | | |
892 | 4 | if ((astr = ASN1_STRING_new()) == NULL) |
893 | 0 | goto err; |
894 | 4 | *pstrtype = V_ASN1_SEQUENCE; |
895 | 4 | ASN1_STRING_set0(astr, str, (int)str_sz); |
896 | 4 | *pstr = astr; |
897 | | |
898 | 4 | return 1; |
899 | 0 | err: |
900 | 0 | OPENSSL_free(str); |
901 | 0 | return 0; |
902 | 4 | } |
903 | 4 | } |
904 | | |
905 | | /* Currently unsupported RSA key type */ |
906 | 0 | return 0; |
907 | 4 | } |
908 | | |
909 | | /* |
910 | | * RSA is extremely simple, as PKCS#1 is used for the PKCS#8 |privateKey| |
911 | | * field as well as the SubjectPublicKeyInfo |subjectPublicKey| field. |
912 | | */ |
913 | 4 | #define rsa_pki_priv_to_der rsa_type_specific_priv_to_der |
914 | 0 | #define rsa_epki_priv_to_der rsa_type_specific_priv_to_der |
915 | 0 | #define rsa_spki_pub_to_der rsa_type_specific_pub_to_der |
916 | 1.12k | #define rsa_type_specific_priv_to_der (i2d_of_void *)i2d_RSAPrivateKey |
917 | 0 | #define rsa_type_specific_pub_to_der (i2d_of_void *)i2d_RSAPublicKey |
918 | | #define rsa_type_specific_params_to_der NULL |
919 | | |
920 | | static int rsa_check_key_type(const void *rsa, int expected_type) |
921 | 1.12k | { |
922 | 1.12k | switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) { |
923 | 1.12k | case RSA_FLAG_TYPE_RSA: |
924 | 1.12k | return expected_type == EVP_PKEY_RSA; |
925 | 4 | case RSA_FLAG_TYPE_RSASSAPSS: |
926 | 4 | return expected_type == EVP_PKEY_RSA_PSS; |
927 | 1.12k | } |
928 | | |
929 | | /* Currently unsupported RSA key type */ |
930 | 0 | return EVP_PKEY_NONE; |
931 | 1.12k | } |
932 | | |
933 | 1.12k | #define rsa_evp_type EVP_PKEY_RSA |
934 | 4 | #define rsapss_evp_type EVP_PKEY_RSA_PSS |
935 | | #define rsa_input_type "RSA" |
936 | | #define rsapss_input_type "RSA-PSS" |
937 | 1.12k | #define rsa_pem_type "RSA" |
938 | 4 | #define rsapss_pem_type "RSA-PSS" |
939 | | |
940 | | /* ---------------------------------------------------------------------- */ |
941 | | |
942 | | static OSSL_FUNC_decoder_newctx_fn key2any_newctx; |
943 | | static OSSL_FUNC_decoder_freectx_fn key2any_freectx; |
944 | | |
945 | | static void *key2any_newctx(void *provctx) |
946 | 275k | { |
947 | 275k | struct key2any_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx)); |
948 | | |
949 | 275k | if (ctx != NULL) { |
950 | 275k | ctx->provctx = provctx; |
951 | 275k | ctx->save_parameters = 1; |
952 | 275k | } |
953 | | |
954 | 275k | return ctx; |
955 | 275k | } |
956 | | |
957 | | static void key2any_freectx(void *vctx) |
958 | 275k | { |
959 | 275k | struct key2any_ctx_st *ctx = vctx; |
960 | | |
961 | 275k | ossl_pw_clear_passphrase_data(&ctx->pwdata); |
962 | 275k | EVP_CIPHER_free(ctx->cipher); |
963 | 275k | OPENSSL_free(ctx); |
964 | 275k | } |
965 | | |
966 | | static const OSSL_PARAM *key2any_settable_ctx_params(ossl_unused void *provctx) |
967 | 0 | { |
968 | 0 | static const OSSL_PARAM settables[] = { |
969 | 0 | OSSL_PARAM_utf8_string(OSSL_ENCODER_PARAM_CIPHER, NULL, 0), |
970 | 0 | OSSL_PARAM_utf8_string(OSSL_ENCODER_PARAM_PROPERTIES, NULL, 0), |
971 | 0 | OSSL_PARAM_END, |
972 | 0 | }; |
973 | |
|
974 | 0 | return settables; |
975 | 0 | } |
976 | | |
977 | | static int key2any_set_ctx_params(void *vctx, const OSSL_PARAM params[]) |
978 | 275k | { |
979 | 275k | struct key2any_ctx_st *ctx = vctx; |
980 | 275k | OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(ctx->provctx); |
981 | 275k | const OSSL_PARAM *cipherp = |
982 | 275k | OSSL_PARAM_locate_const(params, OSSL_ENCODER_PARAM_CIPHER); |
983 | 275k | const OSSL_PARAM *propsp = |
984 | 275k | OSSL_PARAM_locate_const(params, OSSL_ENCODER_PARAM_PROPERTIES); |
985 | 275k | const OSSL_PARAM *save_paramsp = |
986 | 275k | OSSL_PARAM_locate_const(params, OSSL_ENCODER_PARAM_SAVE_PARAMETERS); |
987 | | |
988 | 275k | if (cipherp != NULL) { |
989 | 0 | const char *ciphername = NULL; |
990 | 0 | const char *props = NULL; |
991 | |
|
992 | 0 | if (!OSSL_PARAM_get_utf8_string_ptr(cipherp, &ciphername)) |
993 | 0 | return 0; |
994 | 0 | if (propsp != NULL && !OSSL_PARAM_get_utf8_string_ptr(propsp, &props)) |
995 | 0 | return 0; |
996 | | |
997 | 0 | EVP_CIPHER_free(ctx->cipher); |
998 | 0 | ctx->cipher = NULL; |
999 | 0 | ctx->cipher_intent = ciphername != NULL; |
1000 | 0 | if (ciphername != NULL |
1001 | 0 | && ((ctx->cipher = |
1002 | 0 | EVP_CIPHER_fetch(libctx, ciphername, props)) == NULL)) |
1003 | 0 | return 0; |
1004 | 0 | } |
1005 | | |
1006 | 275k | if (save_paramsp != NULL) { |
1007 | 275k | if (!OSSL_PARAM_get_int(save_paramsp, &ctx->save_parameters)) |
1008 | 0 | return 0; |
1009 | 275k | } |
1010 | 275k | return 1; |
1011 | 275k | } |
1012 | | |
1013 | | static int key2any_check_selection(int selection, int selection_mask) |
1014 | 1.24M | { |
1015 | | /* |
1016 | | * The selections are kinda sorta "levels", i.e. each selection given |
1017 | | * here is assumed to include those following. |
1018 | | */ |
1019 | 1.24M | int checks[] = { |
1020 | 1.24M | OSSL_KEYMGMT_SELECT_PRIVATE_KEY, |
1021 | 1.24M | OSSL_KEYMGMT_SELECT_PUBLIC_KEY, |
1022 | 1.24M | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS |
1023 | 1.24M | }; |
1024 | 1.24M | size_t i; |
1025 | | |
1026 | | /* The decoder implementations made here support guessing */ |
1027 | 1.24M | if (selection == 0) |
1028 | 0 | return 1; |
1029 | | |
1030 | 2.29M | for (i = 0; i < OSSL_NELEM(checks); i++) { |
1031 | 2.29M | int check1 = (selection & checks[i]) != 0; |
1032 | 2.29M | int check2 = (selection_mask & checks[i]) != 0; |
1033 | | |
1034 | | /* |
1035 | | * If the caller asked for the currently checked bit(s), return |
1036 | | * whether the decoder description says it's supported. |
1037 | | */ |
1038 | 2.29M | if (check1) |
1039 | 1.24M | return check2; |
1040 | 2.29M | } |
1041 | | |
1042 | | /* This should be dead code, but just to be safe... */ |
1043 | 0 | return 0; |
1044 | 1.24M | } |
1045 | | |
1046 | | static int key2any_encode(struct key2any_ctx_st *ctx, OSSL_CORE_BIO *cout, |
1047 | | const void *key, int type, const char *pemname, |
1048 | | check_key_type_fn *checker, |
1049 | | key_to_der_fn *writer, |
1050 | | OSSL_PASSPHRASE_CALLBACK *pwcb, void *pwcbarg, |
1051 | | key_to_paramstring_fn *key2paramstring, |
1052 | | i2d_of_void *key2der) |
1053 | 6.59k | { |
1054 | 6.59k | int ret = 0; |
1055 | | |
1056 | 6.59k | if (key == NULL) { |
1057 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); |
1058 | 6.59k | } else if (writer != NULL |
1059 | 6.59k | && (checker == NULL || checker(key, type))) { |
1060 | 6.59k | BIO *out = ossl_bio_new_from_core_bio(ctx->provctx, cout); |
1061 | | |
1062 | 6.59k | if (out != NULL |
1063 | 6.59k | && (pwcb == NULL |
1064 | 6.59k | || ossl_pw_set_ossl_passphrase_cb(&ctx->pwdata, pwcb, pwcbarg))) |
1065 | 6.59k | ret = |
1066 | 6.59k | writer(out, key, type, pemname, key2paramstring, key2der, ctx); |
1067 | | |
1068 | 6.59k | BIO_free(out); |
1069 | 6.59k | } else { |
1070 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); |
1071 | 0 | } |
1072 | 6.59k | return ret; |
1073 | 6.59k | } |
1074 | | |
1075 | 705k | #define DO_PRIVATE_KEY_selection_mask OSSL_KEYMGMT_SELECT_PRIVATE_KEY |
1076 | | #define DO_PRIVATE_KEY(impl, type, kind, output) \ |
1077 | 6.59k | if ((selection & DO_PRIVATE_KEY_selection_mask) != 0) \ |
1078 | 6.59k | return key2any_encode(ctx, cout, key, impl##_evp_type, \ |
1079 | 6.59k | impl##_pem_type " PRIVATE KEY", \ |
1080 | 6.59k | type##_check_key_type, \ |
1081 | 6.59k | key_to_##kind##_##output##_priv_bio, \ |
1082 | 6.59k | cb, cbarg, prepare_##type##_params, \ |
1083 | 6.59k | type##_##kind##_priv_to_der); |
1084 | | |
1085 | 429k | #define DO_PUBLIC_KEY_selection_mask OSSL_KEYMGMT_SELECT_PUBLIC_KEY |
1086 | | #define DO_PUBLIC_KEY(impl, type, kind, output) \ |
1087 | 0 | if ((selection & DO_PUBLIC_KEY_selection_mask) != 0) \ |
1088 | 0 | return key2any_encode(ctx, cout, key, impl##_evp_type, \ |
1089 | 0 | impl##_pem_type " PUBLIC KEY", \ |
1090 | 0 | type##_check_key_type, \ |
1091 | 0 | key_to_##kind##_##output##_pub_bio, \ |
1092 | 0 | cb, cbarg, prepare_##type##_params, \ |
1093 | 0 | type##_##kind##_pub_to_der); |
1094 | | |
1095 | 368k | #define DO_PARAMETERS_selection_mask OSSL_KEYMGMT_SELECT_ALL_PARAMETERS |
1096 | | #define DO_PARAMETERS(impl, type, kind, output) \ |
1097 | 0 | if ((selection & DO_PARAMETERS_selection_mask) != 0) \ |
1098 | 0 | return key2any_encode(ctx, cout, key, impl##_evp_type, \ |
1099 | 0 | impl##_pem_type " PARAMETERS", \ |
1100 | 0 | type##_check_key_type, \ |
1101 | 0 | key_to_##kind##_##output##_param_bio, \ |
1102 | 0 | NULL, NULL, NULL, \ |
1103 | 0 | type##_##kind##_params_to_der); |
1104 | | |
1105 | | /*- |
1106 | | * Implement the kinds of output structure that can be produced. They are |
1107 | | * referred to by name, and for each name, the following macros are defined |
1108 | | * (braces not included): |
1109 | | * |
1110 | | * DO_{kind}_selection_mask |
1111 | | * |
1112 | | * A mask of selection bits that must not be zero. This is used as a |
1113 | | * selection criterion for each implementation. |
1114 | | * This mask must never be zero. |
1115 | | * |
1116 | | * DO_{kind} |
1117 | | * |
1118 | | * The performing macro. It must use the DO_ macros defined above, |
1119 | | * always in this order: |
1120 | | * |
1121 | | * - DO_PRIVATE_KEY |
1122 | | * - DO_PUBLIC_KEY |
1123 | | * - DO_PARAMETERS |
1124 | | * |
1125 | | * Any of those may be omitted, but the relative order must still be |
1126 | | * the same. |
1127 | | */ |
1128 | | |
1129 | | /* |
1130 | | * PKCS#8 defines two structures for private keys only: |
1131 | | * - PrivateKeyInfo (raw unencrypted form) |
1132 | | * - EncryptedPrivateKeyInfo (encrypted wrapping) |
1133 | | * |
1134 | | * To allow a certain amount of flexibility, we allow the routines |
1135 | | * for PrivateKeyInfo to also produce EncryptedPrivateKeyInfo if a |
1136 | | * passphrase callback has been passed to them. |
1137 | | */ |
1138 | 234k | #define DO_PrivateKeyInfo_selection_mask DO_PRIVATE_KEY_selection_mask |
1139 | | #define DO_PrivateKeyInfo(impl, type, output) \ |
1140 | 985 | DO_PRIVATE_KEY(impl, type, pki, output) |
1141 | | |
1142 | 234k | #define DO_EncryptedPrivateKeyInfo_selection_mask DO_PRIVATE_KEY_selection_mask |
1143 | | #define DO_EncryptedPrivateKeyInfo(impl, type, output) \ |
1144 | 0 | DO_PRIVATE_KEY(impl, type, epki, output) |
1145 | | |
1146 | | /* SubjectPublicKeyInfo is a structure for public keys only */ |
1147 | 318k | #define DO_SubjectPublicKeyInfo_selection_mask DO_PUBLIC_KEY_selection_mask |
1148 | | #define DO_SubjectPublicKeyInfo(impl, type, output) \ |
1149 | 0 | DO_PUBLIC_KEY(impl, type, spki, output) |
1150 | | |
1151 | | /* |
1152 | | * "type-specific" is a uniform name for key type specific output for private |
1153 | | * and public keys as well as key parameters. This is used internally in |
1154 | | * libcrypto so it doesn't have to have special knowledge about select key |
1155 | | * types, but also when no better name has been found. If there are more |
1156 | | * expressive DO_ names above, those are preferred. |
1157 | | * |
1158 | | * Three forms exist: |
1159 | | * |
1160 | | * - type_specific_keypair Only supports private and public key |
1161 | | * - type_specific_params Only supports parameters |
1162 | | * - type_specific Supports all parts of an EVP_PKEY |
1163 | | * - type_specific_no_pub Supports all parts of an EVP_PKEY |
1164 | | * except public key |
1165 | | */ |
1166 | 249k | #define DO_type_specific_params_selection_mask DO_PARAMETERS_selection_mask |
1167 | | #define DO_type_specific_params(impl, type, output) \ |
1168 | 0 | DO_PARAMETERS(impl, type, type_specific, output) |
1169 | | #define DO_type_specific_keypair_selection_mask \ |
1170 | 110k | ( DO_PRIVATE_KEY_selection_mask | DO_PUBLIC_KEY_selection_mask ) |
1171 | | #define DO_type_specific_keypair(impl, type, output) \ |
1172 | 2.87k | DO_PRIVATE_KEY(impl, type, type_specific, output) \ |
1173 | 2.87k | DO_PUBLIC_KEY(impl, type, type_specific, output) |
1174 | | #define DO_type_specific_selection_mask \ |
1175 | 25.6k | ( DO_type_specific_keypair_selection_mask \ |
1176 | 25.6k | | DO_type_specific_params_selection_mask ) |
1177 | | #define DO_type_specific(impl, type, output) \ |
1178 | 1.75k | DO_type_specific_keypair(impl, type, output) \ |
1179 | 0 | DO_type_specific_params(impl, type, output) |
1180 | | #define DO_type_specific_no_pub_selection_mask \ |
1181 | 118k | ( DO_PRIVATE_KEY_selection_mask | DO_PARAMETERS_selection_mask) |
1182 | | #define DO_type_specific_no_pub(impl, type, output) \ |
1183 | 2.73k | DO_PRIVATE_KEY(impl, type, type_specific, output) \ |
1184 | 2.73k | DO_type_specific_params(impl, type, output) |
1185 | | |
1186 | | /* |
1187 | | * Type specific aliases for the cases where we need to refer to them by |
1188 | | * type name. |
1189 | | * This only covers key types that are represented with i2d_{TYPE}PrivateKey, |
1190 | | * i2d_{TYPE}PublicKey and i2d_{TYPE}params / i2d_{TYPE}Parameters. |
1191 | | */ |
1192 | 56.8k | #define DO_RSA_selection_mask DO_type_specific_keypair_selection_mask |
1193 | 0 | #define DO_RSA(impl, type, output) DO_type_specific_keypair(impl, type, output) |
1194 | | |
1195 | 46.4k | #define DO_DH_selection_mask DO_type_specific_params_selection_mask |
1196 | 0 | #define DO_DH(impl, type, output) DO_type_specific_params(impl, type, output) |
1197 | | |
1198 | 102k | #define DO_DHX_selection_mask DO_type_specific_params_selection_mask |
1199 | 0 | #define DO_DHX(impl, type, output) DO_type_specific_params(impl, type, output) |
1200 | | |
1201 | 12.8k | #define DO_DSA_selection_mask DO_type_specific_selection_mask |
1202 | 0 | #define DO_DSA(impl, type, output) DO_type_specific(impl, type, output) |
1203 | | |
1204 | 78.9k | #define DO_EC_selection_mask DO_type_specific_no_pub_selection_mask |
1205 | 0 | #define DO_EC(impl, type, output) DO_type_specific_no_pub(impl, type, output) |
1206 | | |
1207 | 0 | #define DO_SM2_selection_mask DO_type_specific_no_pub_selection_mask |
1208 | 0 | #define DO_SM2(impl, type, output) DO_type_specific_no_pub(impl, type, output) |
1209 | | |
1210 | | /* PKCS#1 defines a structure for RSA private and public keys */ |
1211 | 28.5k | #define DO_PKCS1_selection_mask DO_RSA_selection_mask |
1212 | 0 | #define DO_PKCS1(impl, type, output) DO_RSA(impl, type, output) |
1213 | | |
1214 | | /* PKCS#3 defines a structure for DH parameters */ |
1215 | 23.2k | #define DO_PKCS3_selection_mask DO_DH_selection_mask |
1216 | 0 | #define DO_PKCS3(impl, type, output) DO_DH(impl, type, output) |
1217 | | /* X9.42 defines a structure for DHx parameters */ |
1218 | 51.4k | #define DO_X9_42_selection_mask DO_DHX_selection_mask |
1219 | 0 | #define DO_X9_42(impl, type, output) DO_DHX(impl, type, output) |
1220 | | |
1221 | | /* X9.62 defines a structure for EC keys and parameters */ |
1222 | 39.4k | #define DO_X9_62_selection_mask DO_EC_selection_mask |
1223 | 0 | #define DO_X9_62(impl, type, output) DO_EC(impl, type, output) |
1224 | | |
1225 | | /* |
1226 | | * MAKE_ENCODER is the single driver for creating OSSL_DISPATCH tables. |
1227 | | * It takes the following arguments: |
1228 | | * |
1229 | | * impl This is the key type name that's being implemented. |
1230 | | * type This is the type name for the set of functions that implement |
1231 | | * the key type. For example, ed25519, ed448, x25519 and x448 |
1232 | | * are all implemented with the exact same set of functions. |
1233 | | * evp_type The corresponding EVP_PKEY_xxx type macro for each key. |
1234 | | * Necessary because we currently use EVP_PKEY with legacy |
1235 | | * native keys internally. This will need to be refactored |
1236 | | * when that legacy support goes away. |
1237 | | * kind What kind of support to implement. These translate into |
1238 | | * the DO_##kind macros above. |
1239 | | * output The output type to implement. may be der or pem. |
1240 | | * |
1241 | | * The resulting OSSL_DISPATCH array gets the following name (expressed in |
1242 | | * C preprocessor terms) from those arguments: |
1243 | | * |
1244 | | * ossl_##impl##_to_##kind##_##output##_encoder_functions |
1245 | | */ |
1246 | | #define MAKE_ENCODER(impl, type, evp_type, kind, output) \ |
1247 | | static OSSL_FUNC_encoder_import_object_fn \ |
1248 | | impl##_to_##kind##_##output##_import_object; \ |
1249 | | static OSSL_FUNC_encoder_free_object_fn \ |
1250 | | impl##_to_##kind##_##output##_free_object; \ |
1251 | | static OSSL_FUNC_encoder_encode_fn \ |
1252 | | impl##_to_##kind##_##output##_encode; \ |
1253 | | \ |
1254 | | static void * \ |
1255 | | impl##_to_##kind##_##output##_import_object(void *vctx, int selection, \ |
1256 | | const OSSL_PARAM params[]) \ |
1257 | 0 | { \ |
1258 | 0 | struct key2any_ctx_st *ctx = vctx; \ |
1259 | 0 | \ |
1260 | 0 | return ossl_prov_import_key(ossl_##impl##_keymgmt_functions, \ |
1261 | 0 | ctx->provctx, selection, params); \ |
1262 | 0 | } \ Unexecuted instantiation: encode_key2any.c:rsa_to_type_specific_keypair_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_der_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_type_specific_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_type_specific_no_pub_der_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_type_specific_no_pub_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_type_specific_keypair_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_pem_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_type_specific_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_type_specific_no_pub_pem_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_type_specific_no_pub_pem_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x448_to_PrivateKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x448_to_PrivateKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_der_import_object Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_pem_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_DH_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_DH_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_pem_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_der_import_object Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_EC_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_EC_pem_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_der_import_object Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_pem_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_der_import_object Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_pem_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_der_import_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_pem_import_object Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_der_import_object Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_pem_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_der_import_object Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_pem_import_object Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_der_import_object Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_pem_import_object |
1263 | | static void impl##_to_##kind##_##output##_free_object(void *key) \ |
1264 | 0 | { \ |
1265 | 0 | ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key); \ |
1266 | 0 | } \ Unexecuted instantiation: encode_key2any.c:rsa_to_type_specific_keypair_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_der_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_type_specific_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_type_specific_no_pub_der_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_type_specific_no_pub_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_type_specific_keypair_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_pem_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_type_specific_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_type_specific_no_pub_pem_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_type_specific_no_pub_pem_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x448_to_PrivateKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x448_to_PrivateKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_der_free_object Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_pem_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_DH_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_DH_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_pem_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_der_free_object Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_EC_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_EC_pem_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_der_free_object Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_pem_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_der_free_object Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_pem_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_der_free_object Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_pem_free_object Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_der_free_object Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_pem_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_der_free_object Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_pem_free_object Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_der_free_object Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_pem_free_object |
1267 | | static int impl##_to_##kind##_##output##_does_selection(void *ctx, \ |
1268 | | int selection) \ |
1269 | 1.24M | { \ |
1270 | 1.24M | return key2any_check_selection(selection, \ |
1271 | 1.24M | DO_##kind##_selection_mask); \ |
1272 | 1.24M | } \ encode_key2any.c:rsa_to_type_specific_keypair_der_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:dh_to_type_specific_params_der_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dhx_to_type_specific_params_der_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:dsa_to_type_specific_der_does_selection Line | Count | Source | 1269 | 6.41k | { \ | 1270 | 6.41k | return key2any_check_selection(selection, \ | 1271 | 6.41k | DO_##kind##_selection_mask); \ | 1272 | 6.41k | } \ |
encode_key2any.c:ec_to_type_specific_no_pub_der_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
encode_key2any.c:sm2_to_type_specific_no_pub_der_does_selection Line | Count | Source | 1269 | 146 | { \ | 1270 | 146 | return key2any_check_selection(selection, \ | 1271 | 146 | DO_##kind##_selection_mask); \ | 1272 | 146 | } \ |
encode_key2any.c:rsa_to_type_specific_keypair_pem_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:dh_to_type_specific_params_pem_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dhx_to_type_specific_params_pem_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:dsa_to_type_specific_pem_does_selection Line | Count | Source | 1269 | 6.41k | { \ | 1270 | 6.41k | return key2any_check_selection(selection, \ | 1271 | 6.41k | DO_##kind##_selection_mask); \ | 1272 | 6.41k | } \ |
encode_key2any.c:ec_to_type_specific_no_pub_pem_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
encode_key2any.c:sm2_to_type_specific_no_pub_pem_does_selection Line | Count | Source | 1269 | 146 | { \ | 1270 | 146 | return key2any_check_selection(selection, \ | 1271 | 146 | DO_##kind##_selection_mask); \ | 1272 | 146 | } \ |
encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 29.8k | { \ | 1270 | 29.8k | return key2any_check_selection(selection, \ | 1271 | 29.8k | DO_##kind##_selection_mask); \ | 1272 | 29.8k | } \ |
encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 29.8k | { \ | 1270 | 29.8k | return key2any_check_selection(selection, \ | 1271 | 29.8k | DO_##kind##_selection_mask); \ | 1272 | 29.8k | } \ |
encode_key2any.c:rsa_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 29.8k | { \ | 1270 | 29.8k | return key2any_check_selection(selection, \ | 1271 | 29.8k | DO_##kind##_selection_mask); \ | 1272 | 29.8k | } \ |
encode_key2any.c:rsa_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 29.8k | { \ | 1270 | 29.8k | return key2any_check_selection(selection, \ | 1271 | 29.8k | DO_##kind##_selection_mask); \ | 1272 | 29.8k | } \ |
encode_key2any.c:rsa_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 24.8k | { \ | 1270 | 24.8k | return key2any_check_selection(selection, \ | 1271 | 24.8k | DO_##kind##_selection_mask); \ | 1272 | 24.8k | } \ |
encode_key2any.c:rsa_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 24.8k | { \ | 1270 | 24.8k | return key2any_check_selection(selection, \ | 1271 | 24.8k | DO_##kind##_selection_mask); \ | 1272 | 24.8k | } \ |
encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 451 | { \ | 1270 | 451 | return key2any_check_selection(selection, \ | 1271 | 451 | DO_##kind##_selection_mask); \ | 1272 | 451 | } \ |
encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 451 | { \ | 1270 | 451 | return key2any_check_selection(selection, \ | 1271 | 451 | DO_##kind##_selection_mask); \ | 1272 | 451 | } \ |
encode_key2any.c:rsapss_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 451 | { \ | 1270 | 451 | return key2any_check_selection(selection, \ | 1271 | 451 | DO_##kind##_selection_mask); \ | 1272 | 451 | } \ |
encode_key2any.c:rsapss_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 451 | { \ | 1270 | 451 | return key2any_check_selection(selection, \ | 1271 | 451 | DO_##kind##_selection_mask); \ | 1272 | 451 | } \ |
encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 205 | { \ | 1270 | 205 | return key2any_check_selection(selection, \ | 1271 | 205 | DO_##kind##_selection_mask); \ | 1272 | 205 | } \ |
encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 205 | { \ | 1270 | 205 | return key2any_check_selection(selection, \ | 1271 | 205 | DO_##kind##_selection_mask); \ | 1272 | 205 | } \ |
encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 10.6k | { \ | 1270 | 10.6k | return key2any_check_selection(selection, \ | 1271 | 10.6k | DO_##kind##_selection_mask); \ | 1272 | 10.6k | } \ |
encode_key2any.c:dh_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 10.6k | { \ | 1270 | 10.6k | return key2any_check_selection(selection, \ | 1271 | 10.6k | DO_##kind##_selection_mask); \ | 1272 | 10.6k | } \ |
encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 25.0k | { \ | 1270 | 25.0k | return key2any_check_selection(selection, \ | 1271 | 25.0k | DO_##kind##_selection_mask); \ | 1272 | 25.0k | } \ |
encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 25.0k | { \ | 1270 | 25.0k | return key2any_check_selection(selection, \ | 1271 | 25.0k | DO_##kind##_selection_mask); \ | 1272 | 25.0k | } \ |
encode_key2any.c:dhx_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 25.0k | { \ | 1270 | 25.0k | return key2any_check_selection(selection, \ | 1271 | 25.0k | DO_##kind##_selection_mask); \ | 1272 | 25.0k | } \ |
encode_key2any.c:dhx_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 25.0k | { \ | 1270 | 25.0k | return key2any_check_selection(selection, \ | 1271 | 25.0k | DO_##kind##_selection_mask); \ | 1272 | 25.0k | } \ |
encode_key2any.c:dhx_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 25.3k | { \ | 1270 | 25.3k | return key2any_check_selection(selection, \ | 1271 | 25.3k | DO_##kind##_selection_mask); \ | 1272 | 25.3k | } \ |
encode_key2any.c:dhx_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 25.3k | { \ | 1270 | 25.3k | return key2any_check_selection(selection, \ | 1271 | 25.3k | DO_##kind##_selection_mask); \ | 1272 | 25.3k | } \ |
encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 26.2k | { \ | 1270 | 26.2k | return key2any_check_selection(selection, \ | 1271 | 26.2k | DO_##kind##_selection_mask); \ | 1272 | 26.2k | } \ |
encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 26.2k | { \ | 1270 | 26.2k | return key2any_check_selection(selection, \ | 1271 | 26.2k | DO_##kind##_selection_mask); \ | 1272 | 26.2k | } \ |
encode_key2any.c:dsa_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 26.2k | { \ | 1270 | 26.2k | return key2any_check_selection(selection, \ | 1271 | 26.2k | DO_##kind##_selection_mask); \ | 1272 | 26.2k | } \ |
encode_key2any.c:dsa_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 26.2k | { \ | 1270 | 26.2k | return key2any_check_selection(selection, \ | 1271 | 26.2k | DO_##kind##_selection_mask); \ | 1272 | 26.2k | } \ |
encode_key2any.c:dsa_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 64.5k | { \ | 1270 | 64.5k | return key2any_check_selection(selection, \ | 1271 | 64.5k | DO_##kind##_selection_mask); \ | 1272 | 64.5k | } \ |
encode_key2any.c:dsa_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 64.5k | { \ | 1270 | 64.5k | return key2any_check_selection(selection, \ | 1271 | 64.5k | DO_##kind##_selection_mask); \ | 1272 | 64.5k | } \ |
encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 23.2k | { \ | 1270 | 23.2k | return key2any_check_selection(selection, \ | 1271 | 23.2k | DO_##kind##_selection_mask); \ | 1272 | 23.2k | } \ |
encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 23.2k | { \ | 1270 | 23.2k | return key2any_check_selection(selection, \ | 1271 | 23.2k | DO_##kind##_selection_mask); \ | 1272 | 23.2k | } \ |
encode_key2any.c:ec_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 23.2k | { \ | 1270 | 23.2k | return key2any_check_selection(selection, \ | 1271 | 23.2k | DO_##kind##_selection_mask); \ | 1272 | 23.2k | } \ |
encode_key2any.c:ec_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 23.2k | { \ | 1270 | 23.2k | return key2any_check_selection(selection, \ | 1271 | 23.2k | DO_##kind##_selection_mask); \ | 1272 | 23.2k | } \ |
encode_key2any.c:ec_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 32.7k | { \ | 1270 | 32.7k | return key2any_check_selection(selection, \ | 1271 | 32.7k | DO_##kind##_selection_mask); \ | 1272 | 32.7k | } \ |
encode_key2any.c:ec_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 32.7k | { \ | 1270 | 32.7k | return key2any_check_selection(selection, \ | 1271 | 32.7k | DO_##kind##_selection_mask); \ | 1272 | 32.7k | } \ |
encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 166 | { \ | 1270 | 166 | return key2any_check_selection(selection, \ | 1271 | 166 | DO_##kind##_selection_mask); \ | 1272 | 166 | } \ |
encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 166 | { \ | 1270 | 166 | return key2any_check_selection(selection, \ | 1271 | 166 | DO_##kind##_selection_mask); \ | 1272 | 166 | } \ |
encode_key2any.c:sm2_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 166 | { \ | 1270 | 166 | return key2any_check_selection(selection, \ | 1271 | 166 | DO_##kind##_selection_mask); \ | 1272 | 166 | } \ |
encode_key2any.c:sm2_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 166 | { \ | 1270 | 166 | return key2any_check_selection(selection, \ | 1271 | 166 | DO_##kind##_selection_mask); \ | 1272 | 166 | } \ |
encode_key2any.c:sm2_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 190 | { \ | 1270 | 190 | return key2any_check_selection(selection, \ | 1271 | 190 | DO_##kind##_selection_mask); \ | 1272 | 190 | } \ |
encode_key2any.c:sm2_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 190 | { \ | 1270 | 190 | return key2any_check_selection(selection, \ | 1271 | 190 | DO_##kind##_selection_mask); \ | 1272 | 190 | } \ |
encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 345 | { \ | 1270 | 345 | return key2any_check_selection(selection, \ | 1271 | 345 | DO_##kind##_selection_mask); \ | 1272 | 345 | } \ |
encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 345 | { \ | 1270 | 345 | return key2any_check_selection(selection, \ | 1271 | 345 | DO_##kind##_selection_mask); \ | 1272 | 345 | } \ |
encode_key2any.c:ed25519_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 345 | { \ | 1270 | 345 | return key2any_check_selection(selection, \ | 1271 | 345 | DO_##kind##_selection_mask); \ | 1272 | 345 | } \ |
encode_key2any.c:ed25519_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 345 | { \ | 1270 | 345 | return key2any_check_selection(selection, \ | 1271 | 345 | DO_##kind##_selection_mask); \ | 1272 | 345 | } \ |
encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 210 | { \ | 1270 | 210 | return key2any_check_selection(selection, \ | 1271 | 210 | DO_##kind##_selection_mask); \ | 1272 | 210 | } \ |
encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 210 | { \ | 1270 | 210 | return key2any_check_selection(selection, \ | 1271 | 210 | DO_##kind##_selection_mask); \ | 1272 | 210 | } \ |
encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 247 | { \ | 1270 | 247 | return key2any_check_selection(selection, \ | 1271 | 247 | DO_##kind##_selection_mask); \ | 1272 | 247 | } \ |
encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 247 | { \ | 1270 | 247 | return key2any_check_selection(selection, \ | 1271 | 247 | DO_##kind##_selection_mask); \ | 1272 | 247 | } \ |
encode_key2any.c:ed448_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 247 | { \ | 1270 | 247 | return key2any_check_selection(selection, \ | 1271 | 247 | DO_##kind##_selection_mask); \ | 1272 | 247 | } \ |
encode_key2any.c:ed448_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 247 | { \ | 1270 | 247 | return key2any_check_selection(selection, \ | 1271 | 247 | DO_##kind##_selection_mask); \ | 1272 | 247 | } \ |
encode_key2any.c:ed448_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 184 | { \ | 1270 | 184 | return key2any_check_selection(selection, \ | 1271 | 184 | DO_##kind##_selection_mask); \ | 1272 | 184 | } \ |
encode_key2any.c:ed448_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 184 | { \ | 1270 | 184 | return key2any_check_selection(selection, \ | 1271 | 184 | DO_##kind##_selection_mask); \ | 1272 | 184 | } \ |
encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x25519_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x25519_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x25519_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x25519_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 83 | { \ | 1270 | 83 | return key2any_check_selection(selection, \ | 1271 | 83 | DO_##kind##_selection_mask); \ | 1272 | 83 | } \ |
encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 91 | { \ | 1270 | 91 | return key2any_check_selection(selection, \ | 1271 | 91 | DO_##kind##_selection_mask); \ | 1272 | 91 | } \ |
encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 91 | { \ | 1270 | 91 | return key2any_check_selection(selection, \ | 1271 | 91 | DO_##kind##_selection_mask); \ | 1272 | 91 | } \ |
encode_key2any.c:x448_to_PrivateKeyInfo_der_does_selection Line | Count | Source | 1269 | 91 | { \ | 1270 | 91 | return key2any_check_selection(selection, \ | 1271 | 91 | DO_##kind##_selection_mask); \ | 1272 | 91 | } \ |
encode_key2any.c:x448_to_PrivateKeyInfo_pem_does_selection Line | Count | Source | 1269 | 91 | { \ | 1270 | 91 | return key2any_check_selection(selection, \ | 1271 | 91 | DO_##kind##_selection_mask); \ | 1272 | 91 | } \ |
encode_key2any.c:x448_to_SubjectPublicKeyInfo_der_does_selection Line | Count | Source | 1269 | 78 | { \ | 1270 | 78 | return key2any_check_selection(selection, \ | 1271 | 78 | DO_##kind##_selection_mask); \ | 1272 | 78 | } \ |
encode_key2any.c:x448_to_SubjectPublicKeyInfo_pem_does_selection Line | Count | Source | 1269 | 78 | { \ | 1270 | 78 | return key2any_check_selection(selection, \ | 1271 | 78 | DO_##kind##_selection_mask); \ | 1272 | 78 | } \ |
encode_key2any.c:rsa_to_RSA_der_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:rsa_to_RSA_pem_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:dh_to_DH_der_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_DH_pem_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dhx_to_DHX_der_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:dhx_to_DHX_pem_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:dsa_to_DSA_der_does_selection Line | Count | Source | 1269 | 6.41k | { \ | 1270 | 6.41k | return key2any_check_selection(selection, \ | 1271 | 6.41k | DO_##kind##_selection_mask); \ | 1272 | 6.41k | } \ |
encode_key2any.c:dsa_to_DSA_pem_does_selection Line | Count | Source | 1269 | 6.41k | { \ | 1270 | 6.41k | return key2any_check_selection(selection, \ | 1271 | 6.41k | DO_##kind##_selection_mask); \ | 1272 | 6.41k | } \ |
encode_key2any.c:ec_to_EC_der_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
encode_key2any.c:ec_to_EC_pem_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_der_does_selection Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_pem_does_selection encode_key2any.c:rsa_to_PKCS1_der_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:rsa_to_PKCS1_pem_does_selection Line | Count | Source | 1269 | 14.1k | { \ | 1270 | 14.1k | return key2any_check_selection(selection, \ | 1271 | 14.1k | DO_##kind##_selection_mask); \ | 1272 | 14.1k | } \ |
encode_key2any.c:rsapss_to_PKCS1_der_does_selection Line | Count | Source | 1269 | 148 | { \ | 1270 | 148 | return key2any_check_selection(selection, \ | 1271 | 148 | DO_##kind##_selection_mask); \ | 1272 | 148 | } \ |
encode_key2any.c:rsapss_to_PKCS1_pem_does_selection Line | Count | Source | 1269 | 148 | { \ | 1270 | 148 | return key2any_check_selection(selection, \ | 1271 | 148 | DO_##kind##_selection_mask); \ | 1272 | 148 | } \ |
encode_key2any.c:dh_to_PKCS3_der_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dh_to_PKCS3_pem_does_selection Line | Count | Source | 1269 | 11.6k | { \ | 1270 | 11.6k | return key2any_check_selection(selection, \ | 1271 | 11.6k | DO_##kind##_selection_mask); \ | 1272 | 11.6k | } \ |
encode_key2any.c:dhx_to_X9_42_der_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:dhx_to_X9_42_pem_does_selection Line | Count | Source | 1269 | 25.7k | { \ | 1270 | 25.7k | return key2any_check_selection(selection, \ | 1271 | 25.7k | DO_##kind##_selection_mask); \ | 1272 | 25.7k | } \ |
encode_key2any.c:ec_to_X9_62_der_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
encode_key2any.c:ec_to_X9_62_pem_does_selection Line | Count | Source | 1269 | 19.7k | { \ | 1270 | 19.7k | return key2any_check_selection(selection, \ | 1271 | 19.7k | DO_##kind##_selection_mask); \ | 1272 | 19.7k | } \ |
|
1273 | | static int \ |
1274 | | impl##_to_##kind##_##output##_encode(void *ctx, OSSL_CORE_BIO *cout, \ |
1275 | | const void *key, \ |
1276 | | const OSSL_PARAM key_abstract[], \ |
1277 | | int selection, \ |
1278 | | OSSL_PASSPHRASE_CALLBACK *cb, \ |
1279 | | void *cbarg) \ |
1280 | 6.59k | { \ |
1281 | 6.59k | /* We don't deal with abstract objects */ \ |
1282 | 6.59k | if (key_abstract != NULL) { \ |
1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ |
1284 | 0 | return 0; \ |
1285 | 0 | } \ |
1286 | 6.59k | DO_##kind(impl, type, output) \ |
1287 | 6.59k | \ |
1288 | 6.59k | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ |
1289 | 0 | return 0; \ |
1290 | 6.59k | } \ encode_key2any.c:rsa_to_type_specific_keypair_der_encode Line | Count | Source | 1280 | 1.12k | { \ | 1281 | 1.12k | /* We don't deal with abstract objects */ \ | 1282 | 1.12k | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 1.12k | DO_##kind(impl, type, output) \ | 1287 | 1.12k | \ | 1288 | 1.12k | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 1.12k | } \ |
Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_der_encode Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_der_encode encode_key2any.c:dsa_to_type_specific_der_encode Line | Count | Source | 1280 | 1.75k | { \ | 1281 | 1.75k | /* We don't deal with abstract objects */ \ | 1282 | 1.75k | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 1.75k | DO_##kind(impl, type, output) \ | 1287 | 1.75k | \ | 1288 | 1.75k | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 1.75k | } \ |
encode_key2any.c:ec_to_type_specific_no_pub_der_encode Line | Count | Source | 1280 | 2.71k | { \ | 1281 | 2.71k | /* We don't deal with abstract objects */ \ | 1282 | 2.71k | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 2.71k | DO_##kind(impl, type, output) \ | 1287 | 2.71k | \ | 1288 | 2.71k | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 2.71k | } \ |
encode_key2any.c:sm2_to_type_specific_no_pub_der_encode Line | Count | Source | 1280 | 17 | { \ | 1281 | 17 | /* We don't deal with abstract objects */ \ | 1282 | 17 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 17 | DO_##kind(impl, type, output) \ | 1287 | 17 | \ | 1288 | 17 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 17 | } \ |
Unexecuted instantiation: encode_key2any.c:rsa_to_type_specific_keypair_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_type_specific_params_pem_encode Unexecuted instantiation: encode_key2any.c:dhx_to_type_specific_params_pem_encode Unexecuted instantiation: encode_key2any.c:dsa_to_type_specific_pem_encode Unexecuted instantiation: encode_key2any.c:ec_to_type_specific_no_pub_pem_encode Unexecuted instantiation: encode_key2any.c:sm2_to_type_specific_no_pub_pem_encode Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:rsa_to_EncryptedPrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:rsa_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:rsa_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:rsapss_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 4 | { \ | 1281 | 4 | /* We don't deal with abstract objects */ \ | 1282 | 4 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 4 | DO_##kind(impl, type, output) \ | 1287 | 4 | \ | 1288 | 4 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 4 | } \ |
Unexecuted instantiation: encode_key2any.c:rsapss_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dh_to_EncryptedPrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dh_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dh_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dhx_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:dhx_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 75 | { \ | 1281 | 75 | /* We don't deal with abstract objects */ \ | 1282 | 75 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 75 | DO_##kind(impl, type, output) \ | 1287 | 75 | \ | 1288 | 75 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 75 | } \ |
Unexecuted instantiation: encode_key2any.c:dhx_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dhx_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dsa_to_EncryptedPrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dsa_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:dsa_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ec_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:ec_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 876 | { \ | 1281 | 876 | /* We don't deal with abstract objects */ \ | 1282 | 876 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 876 | DO_##kind(impl, type, output) \ | 1287 | 876 | \ | 1288 | 876 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 876 | } \ |
Unexecuted instantiation: encode_key2any.c:ec_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ec_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:sm2_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:sm2_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 4 | { \ | 1281 | 4 | /* We don't deal with abstract objects */ \ | 1282 | 4 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 4 | DO_##kind(impl, type, output) \ | 1287 | 4 | \ | 1288 | 4 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 4 | } \ |
Unexecuted instantiation: encode_key2any.c:sm2_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:sm2_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ed25519_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:ed25519_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 5 | { \ | 1281 | 5 | /* We don't deal with abstract objects */ \ | 1282 | 5 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 5 | DO_##kind(impl, type, output) \ | 1287 | 5 | \ | 1288 | 5 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 5 | } \ |
Unexecuted instantiation: encode_key2any.c:ed25519_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ed25519_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ed448_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:ed448_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 9 | { \ | 1281 | 9 | /* We don't deal with abstract objects */ \ | 1282 | 9 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 9 | DO_##kind(impl, type, output) \ | 1287 | 9 | \ | 1288 | 9 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 9 | } \ |
Unexecuted instantiation: encode_key2any.c:ed448_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:ed448_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:x25519_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:x25519_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 7 | { \ | 1281 | 7 | /* We don't deal with abstract objects */ \ | 1282 | 7 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 7 | DO_##kind(impl, type, output) \ | 1287 | 7 | \ | 1288 | 7 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 7 | } \ |
Unexecuted instantiation: encode_key2any.c:x25519_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:x25519_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:x448_to_EncryptedPrivateKeyInfo_pem_encode encode_key2any.c:x448_to_PrivateKeyInfo_der_encode Line | Count | Source | 1280 | 5 | { \ | 1281 | 5 | /* We don't deal with abstract objects */ \ | 1282 | 5 | if (key_abstract != NULL) { \ | 1283 | 0 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1284 | 0 | return 0; \ | 1285 | 0 | } \ | 1286 | 5 | DO_##kind(impl, type, output) \ | 1287 | 5 | \ | 1288 | 5 | ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); \ | 1289 | 0 | return 0; \ | 1290 | 5 | } \ |
Unexecuted instantiation: encode_key2any.c:x448_to_PrivateKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_der_encode Unexecuted instantiation: encode_key2any.c:x448_to_SubjectPublicKeyInfo_pem_encode Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_der_encode Unexecuted instantiation: encode_key2any.c:rsa_to_RSA_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_DH_der_encode Unexecuted instantiation: encode_key2any.c:dh_to_DH_pem_encode Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_der_encode Unexecuted instantiation: encode_key2any.c:dhx_to_DHX_pem_encode Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_der_encode Unexecuted instantiation: encode_key2any.c:dsa_to_DSA_pem_encode Unexecuted instantiation: encode_key2any.c:ec_to_EC_der_encode Unexecuted instantiation: encode_key2any.c:ec_to_EC_pem_encode Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_der_encode Unexecuted instantiation: encode_key2any.c:sm2_to_SM2_pem_encode Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_der_encode Unexecuted instantiation: encode_key2any.c:rsa_to_PKCS1_pem_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_der_encode Unexecuted instantiation: encode_key2any.c:rsapss_to_PKCS1_pem_encode Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_der_encode Unexecuted instantiation: encode_key2any.c:dh_to_PKCS3_pem_encode Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_der_encode Unexecuted instantiation: encode_key2any.c:dhx_to_X9_42_pem_encode Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_der_encode Unexecuted instantiation: encode_key2any.c:ec_to_X9_62_pem_encode |
1291 | | const OSSL_DISPATCH \ |
1292 | | ossl_##impl##_to_##kind##_##output##_encoder_functions[] = { \ |
1293 | | { OSSL_FUNC_ENCODER_NEWCTX, \ |
1294 | | (void (*)(void))key2any_newctx }, \ |
1295 | | { OSSL_FUNC_ENCODER_FREECTX, \ |
1296 | | (void (*)(void))key2any_freectx }, \ |
1297 | | { OSSL_FUNC_ENCODER_SETTABLE_CTX_PARAMS, \ |
1298 | | (void (*)(void))key2any_settable_ctx_params }, \ |
1299 | | { OSSL_FUNC_ENCODER_SET_CTX_PARAMS, \ |
1300 | | (void (*)(void))key2any_set_ctx_params }, \ |
1301 | | { OSSL_FUNC_ENCODER_DOES_SELECTION, \ |
1302 | | (void (*)(void))impl##_to_##kind##_##output##_does_selection }, \ |
1303 | | { OSSL_FUNC_ENCODER_IMPORT_OBJECT, \ |
1304 | | (void (*)(void))impl##_to_##kind##_##output##_import_object }, \ |
1305 | | { OSSL_FUNC_ENCODER_FREE_OBJECT, \ |
1306 | | (void (*)(void))impl##_to_##kind##_##output##_free_object }, \ |
1307 | | { OSSL_FUNC_ENCODER_ENCODE, \ |
1308 | | (void (*)(void))impl##_to_##kind##_##output##_encode }, \ |
1309 | | { 0, NULL } \ |
1310 | | } |
1311 | | |
1312 | | /* |
1313 | | * Replacements for i2d_{TYPE}PrivateKey, i2d_{TYPE}PublicKey, |
1314 | | * i2d_{TYPE}params, as they exist. |
1315 | | */ |
1316 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, der); |
1317 | | #ifndef OPENSSL_NO_DH |
1318 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, der); |
1319 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, der); |
1320 | | #endif |
1321 | | #ifndef OPENSSL_NO_DSA |
1322 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, der); |
1323 | | #endif |
1324 | | #ifndef OPENSSL_NO_EC |
1325 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, der); |
1326 | | # ifndef OPENSSL_NO_SM2 |
1327 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, der); |
1328 | | # endif |
1329 | | #endif |
1330 | | |
1331 | | /* |
1332 | | * Replacements for PEM_write_bio_{TYPE}PrivateKey, |
1333 | | * PEM_write_bio_{TYPE}PublicKey, PEM_write_bio_{TYPE}params, as they exist. |
1334 | | */ |
1335 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, pem); |
1336 | | #ifndef OPENSSL_NO_DH |
1337 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, pem); |
1338 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, pem); |
1339 | | #endif |
1340 | | #ifndef OPENSSL_NO_DSA |
1341 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, pem); |
1342 | | #endif |
1343 | | #ifndef OPENSSL_NO_EC |
1344 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, pem); |
1345 | | # ifndef OPENSSL_NO_SM2 |
1346 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem); |
1347 | | # endif |
1348 | | #endif |
1349 | | |
1350 | | /* |
1351 | | * PKCS#8 and SubjectPublicKeyInfo support. This may duplicate some of the |
1352 | | * implementations specified above, but are more specific. |
1353 | | * The SubjectPublicKeyInfo implementations also replace the |
1354 | | * PEM_write_bio_{TYPE}_PUBKEY functions. |
1355 | | * For PEM, these are expected to be used by PEM_write_bio_PrivateKey(), |
1356 | | * PEM_write_bio_PUBKEY() and PEM_write_bio_Parameters(). |
1357 | | */ |
1358 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, der); |
1359 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, pem); |
1360 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, der); |
1361 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, pem); |
1362 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, SubjectPublicKeyInfo, der); |
1363 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, SubjectPublicKeyInfo, pem); |
1364 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, EncryptedPrivateKeyInfo, der); |
1365 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, EncryptedPrivateKeyInfo, pem); |
1366 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PrivateKeyInfo, der); |
1367 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PrivateKeyInfo, pem); |
1368 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, SubjectPublicKeyInfo, der); |
1369 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, SubjectPublicKeyInfo, pem); |
1370 | | #ifndef OPENSSL_NO_DH |
1371 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, EncryptedPrivateKeyInfo, der); |
1372 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, EncryptedPrivateKeyInfo, pem); |
1373 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, PrivateKeyInfo, der); |
1374 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, PrivateKeyInfo, pem); |
1375 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, SubjectPublicKeyInfo, der); |
1376 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, SubjectPublicKeyInfo, pem); |
1377 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, EncryptedPrivateKeyInfo, der); |
1378 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, EncryptedPrivateKeyInfo, pem); |
1379 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, PrivateKeyInfo, der); |
1380 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, PrivateKeyInfo, pem); |
1381 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, SubjectPublicKeyInfo, der); |
1382 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, SubjectPublicKeyInfo, pem); |
1383 | | #endif |
1384 | | #ifndef OPENSSL_NO_DSA |
1385 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, EncryptedPrivateKeyInfo, der); |
1386 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, EncryptedPrivateKeyInfo, pem); |
1387 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, PrivateKeyInfo, der); |
1388 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, PrivateKeyInfo, pem); |
1389 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, SubjectPublicKeyInfo, der); |
1390 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, SubjectPublicKeyInfo, pem); |
1391 | | #endif |
1392 | | #ifndef OPENSSL_NO_EC |
1393 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, der); |
1394 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, pem); |
1395 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, PrivateKeyInfo, der); |
1396 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, PrivateKeyInfo, pem); |
1397 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, SubjectPublicKeyInfo, der); |
1398 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, SubjectPublicKeyInfo, pem); |
1399 | | # ifndef OPENSSL_NO_SM2 |
1400 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, der); |
1401 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, pem); |
1402 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, der); |
1403 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, pem); |
1404 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, SubjectPublicKeyInfo, der); |
1405 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, SubjectPublicKeyInfo, pem); |
1406 | | # endif |
1407 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, der); |
1408 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, pem); |
1409 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, der); |
1410 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, pem); |
1411 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, der); |
1412 | | MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, pem); |
1413 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); |
1414 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); |
1415 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); |
1416 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); |
1417 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); |
1418 | | MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem); |
1419 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, EncryptedPrivateKeyInfo, der); |
1420 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, EncryptedPrivateKeyInfo, pem); |
1421 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, PrivateKeyInfo, der); |
1422 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, PrivateKeyInfo, pem); |
1423 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, SubjectPublicKeyInfo, der); |
1424 | | MAKE_ENCODER(x25519, ecx, EVP_PKEY_X25519, SubjectPublicKeyInfo, pem); |
1425 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); |
1426 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); |
1427 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); |
1428 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); |
1429 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); |
1430 | | MAKE_ENCODER(x448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem); |
1431 | | #endif |
1432 | | |
1433 | | /* |
1434 | | * Support for key type specific output formats. Not all key types have |
1435 | | * this, we only aim to duplicate what is available in 1.1.1 as |
1436 | | * i2d_TYPEPrivateKey(), i2d_TYPEPublicKey() and i2d_TYPEparams(). |
1437 | | * For example, there are no publicly available i2d_ function for |
1438 | | * ED25519, ED448, X25519 or X448, and they therefore only have PKCS#8 |
1439 | | * and SubjectPublicKeyInfo implementations as implemented above. |
1440 | | */ |
1441 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, RSA, der); |
1442 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, RSA, pem); |
1443 | | #ifndef OPENSSL_NO_DH |
1444 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, DH, der); |
1445 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, DH, pem); |
1446 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, DHX, der); |
1447 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, DHX, pem); |
1448 | | #endif |
1449 | | #ifndef OPENSSL_NO_DSA |
1450 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, DSA, der); |
1451 | | MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, DSA, pem); |
1452 | | #endif |
1453 | | #ifndef OPENSSL_NO_EC |
1454 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, EC, der); |
1455 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, EC, pem); |
1456 | | # ifndef OPENSSL_NO_SM2 |
1457 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, SM2, der); |
1458 | | MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, SM2, pem); |
1459 | | # endif |
1460 | | #endif |
1461 | | |
1462 | | /* Convenience structure names */ |
1463 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PKCS1, der); |
1464 | | MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PKCS1, pem); |
1465 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PKCS1, der); |
1466 | | MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PKCS1, pem); |
1467 | | #ifndef OPENSSL_NO_DH |
1468 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, PKCS3, der); /* parameters only */ |
1469 | | MAKE_ENCODER(dh, dh, EVP_PKEY_DH, PKCS3, pem); /* parameters only */ |
1470 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, X9_42, der); /* parameters only */ |
1471 | | MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, X9_42, pem); /* parameters only */ |
1472 | | #endif |
1473 | | #ifndef OPENSSL_NO_EC |
1474 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, X9_62, der); |
1475 | | MAKE_ENCODER(ec, ec, EVP_PKEY_EC, X9_62, pem); |
1476 | | #endif |