Coverage Report

Created: 2025-11-16 06:40

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl32/providers/implementations/encode_decode/encode_key2text.c
Line
Count
Source
1
/*
2
 * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * Low level APIs are deprecated for public use, but still ok for internal use.
12
 */
13
#include "internal/deprecated.h"
14
15
#include <ctype.h>
16
17
#include <openssl/core.h>
18
#include <openssl/core_dispatch.h>
19
#include <openssl/core_names.h>
20
#include <openssl/bn.h>
21
#include <openssl/err.h>
22
#include <openssl/safestack.h>
23
#include <openssl/proverr.h>
24
#include "internal/ffc.h"
25
#include "crypto/bn.h"           /* bn_get_words() */
26
#include "crypto/dh.h"           /* ossl_dh_get0_params() */
27
#include "crypto/dsa.h"          /* ossl_dsa_get0_params() */
28
#include "crypto/ec.h"           /* ossl_ec_key_get_libctx */
29
#include "crypto/ecx.h"          /* ECX_KEY, etc... */
30
#include "crypto/rsa.h"          /* RSA_PSS_PARAMS_30, etc... */
31
#include "prov/bio.h"
32
#include "prov/implementations.h"
33
#include "endecoder_local.h"
34
35
DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM)
36
37
# ifdef SIXTY_FOUR_BIT_LONG
38
#  define BN_FMTu "%lu"
39
#  define BN_FMTx "%lx"
40
# endif
41
42
# ifdef SIXTY_FOUR_BIT
43
#  define BN_FMTu "%llu"
44
#  define BN_FMTx "%llx"
45
# endif
46
47
# ifdef THIRTY_TWO_BIT
48
#  define BN_FMTu "%u"
49
#  define BN_FMTx "%x"
50
# endif
51
52
static int print_labeled_bignum(BIO *out, const char *label, const BIGNUM *bn)
53
295k
{
54
295k
    int ret = 0, use_sep = 0;
55
295k
    char *hex_str = NULL, *p;
56
295k
    const char spaces[] = "    ";
57
295k
    const char *post_label_spc = " ";
58
59
295k
    const char *neg = "";
60
295k
    int bytes;
61
62
295k
    if (bn == NULL)
63
992
        return 0;
64
294k
    if (label == NULL) {
65
211k
        label = "";
66
211k
        post_label_spc = "";
67
211k
    }
68
69
294k
    if (BN_is_zero(bn))
70
47.1k
        return BIO_printf(out, "%s%s0\n", label, post_label_spc);
71
72
247k
    if (BN_num_bytes(bn) <= BN_BYTES) {
73
204k
        BN_ULONG *words = bn_get_words(bn);
74
75
204k
        if (BN_is_negative(bn))
76
395
            neg = "-";
77
78
204k
        return BIO_printf(out, "%s%s%s" BN_FMTu " (%s0x" BN_FMTx ")\n",
79
204k
                          label, post_label_spc, neg, words[0], neg, words[0]);
80
204k
    }
81
82
42.4k
    hex_str = BN_bn2hex(bn);
83
42.4k
    if (hex_str == NULL)
84
0
        return 0;
85
86
42.4k
    p = hex_str;
87
42.4k
    if (*p == '-') {
88
220
        ++p;
89
220
        neg = " (Negative)";
90
220
    }
91
42.4k
    if (BIO_printf(out, "%s%s\n", label, neg) <= 0)
92
0
        goto err;
93
94
    /* Keep track of how many bytes we have printed out so far */
95
42.4k
    bytes = 0;
96
97
42.4k
    if (BIO_printf(out, "%s", spaces) <= 0)
98
0
        goto err;
99
100
    /* Add a leading 00 if the top bit is set */
101
42.4k
    if (*p >= '8') {
102
19.7k
        if (BIO_printf(out, "%02x", 0) <= 0)
103
0
            goto err;
104
19.7k
        ++bytes;
105
19.7k
        use_sep = 1;
106
19.7k
    }
107
41.5M
    while (*p != '\0') {
108
        /* Do a newline after every 15 hex bytes + add the space indent */
109
41.5M
        if ((bytes % 15) == 0 && bytes > 0) {
110
2.74M
            if (BIO_printf(out, ":\n%s", spaces) <= 0)
111
0
                goto err;
112
2.74M
            use_sep = 0; /* The first byte on the next line doesn't have a : */
113
2.74M
        }
114
41.5M
        if (BIO_printf(out, "%s%c%c", use_sep ? ":" : "",
115
41.5M
                       tolower((unsigned char)p[0]),
116
41.5M
                       tolower((unsigned char)p[1])) <= 0)
117
0
            goto err;
118
41.5M
        ++bytes;
119
41.5M
        p += 2;
120
41.5M
        use_sep = 1;
121
41.5M
    }
122
42.4k
    if (BIO_printf(out, "\n") <= 0)
123
0
        goto err;
124
42.4k
    ret = 1;
125
42.4k
err:
126
42.4k
    OPENSSL_free(hex_str);
127
42.4k
    return ret;
128
42.4k
}
129
130
/* Number of octets per line */
131
547k
#define LABELED_BUF_PRINT_WIDTH    15
132
133
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC)
134
static int print_labeled_buf(BIO *out, const char *label,
135
                             const unsigned char *buf, size_t buflen)
136
13.4k
{
137
13.4k
    size_t i;
138
139
13.4k
    if (BIO_printf(out, "%s\n", label) <= 0)
140
0
        return 0;
141
142
560k
    for (i = 0; i < buflen; i++) {
143
547k
        if ((i % LABELED_BUF_PRINT_WIDTH) == 0) {
144
42.0k
            if (i > 0 && BIO_printf(out, "\n") <= 0)
145
0
                return 0;
146
42.0k
            if (BIO_printf(out, "    ") <= 0)
147
0
                return 0;
148
42.0k
        }
149
150
547k
        if (BIO_printf(out, "%02x%s", buf[i],
151
547k
                                 (i == buflen - 1) ? "" : ":") <= 0)
152
0
            return 0;
153
547k
    }
154
13.4k
    if (BIO_printf(out, "\n") <= 0)
155
0
        return 0;
156
157
13.4k
    return 1;
158
13.4k
}
159
#endif
160
161
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA)
162
static int ffc_params_to_text(BIO *out, const FFC_PARAMS *ffc)
163
12.7k
{
164
12.7k
    if (ffc->nid != NID_undef) {
165
0
#ifndef OPENSSL_NO_DH
166
0
        const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid);
167
0
        const char *name = ossl_ffc_named_group_get_name(group);
168
169
0
        if (name == NULL)
170
0
            goto err;
171
0
        if (BIO_printf(out, "GROUP: %s\n", name) <= 0)
172
0
            goto err;
173
0
        return 1;
174
#else
175
        /* How could this be? We should not have a nid in a no-dh build. */
176
        goto err;
177
#endif
178
0
    }
179
180
12.7k
    if (!print_labeled_bignum(out, "P:   ", ffc->p))
181
0
        goto err;
182
12.7k
    if (ffc->q != NULL) {
183
10.4k
        if (!print_labeled_bignum(out, "Q:   ", ffc->q))
184
0
            goto err;
185
10.4k
    }
186
12.7k
    if (!print_labeled_bignum(out, "G:   ", ffc->g))
187
0
        goto err;
188
12.7k
    if (ffc->j != NULL) {
189
331
        if (!print_labeled_bignum(out, "J:   ", ffc->j))
190
0
            goto err;
191
331
    }
192
12.7k
    if (ffc->seed != NULL) {
193
120
        if (!print_labeled_buf(out, "SEED:", ffc->seed, ffc->seedlen))
194
0
            goto err;
195
120
    }
196
12.7k
    if (ffc->gindex != -1) {
197
0
        if (BIO_printf(out, "gindex: %d\n", ffc->gindex) <= 0)
198
0
            goto err;
199
0
    }
200
12.7k
    if (ffc->pcounter != -1) {
201
169
        if (BIO_printf(out, "pcounter: %d\n", ffc->pcounter) <= 0)
202
0
            goto err;
203
169
    }
204
12.7k
    if (ffc->h != 0) {
205
0
        if (BIO_printf(out, "h: %d\n", ffc->h) <= 0)
206
0
            goto err;
207
0
    }
208
12.7k
    return 1;
209
0
err:
210
0
    return 0;
211
12.7k
}
212
#endif
213
214
/* ---------------------------------------------------------------------- */
215
216
#ifndef OPENSSL_NO_DH
217
static int dh_to_text(BIO *out, const void *key, int selection)
218
28.7k
{
219
28.7k
    const DH *dh = key;
220
28.7k
    const char *type_label = NULL;
221
28.7k
    const BIGNUM *priv_key = NULL, *pub_key = NULL;
222
28.7k
    const FFC_PARAMS *params = NULL;
223
28.7k
    const BIGNUM *p = NULL;
224
28.7k
    long length;
225
226
28.7k
    if (out == NULL || dh == NULL) {
227
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
228
0
        return 0;
229
0
    }
230
231
28.7k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
232
9.35k
        type_label = "DH Private-Key";
233
19.3k
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
234
10.1k
        type_label = "DH Public-Key";
235
9.25k
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
236
9.25k
        type_label = "DH Parameters";
237
238
28.7k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
239
9.35k
        priv_key = DH_get0_priv_key(dh);
240
9.35k
        if (priv_key == NULL) {
241
9.17k
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
242
9.17k
            return 0;
243
9.17k
        }
244
9.35k
    }
245
19.5k
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
246
10.3k
        pub_key = DH_get0_pub_key(dh);
247
10.3k
        if (pub_key == NULL) {
248
8.81k
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
249
8.81k
            return 0;
250
8.81k
        }
251
10.3k
    }
252
10.7k
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) {
253
10.7k
        params = ossl_dh_get0_params((DH *)dh);
254
10.7k
        if (params == NULL) {
255
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS);
256
0
            return 0;
257
0
        }
258
10.7k
    }
259
260
10.7k
    p = DH_get0_p(dh);
261
10.7k
    if (p == NULL) {
262
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
263
0
        return 0;
264
0
    }
265
266
10.7k
    if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0)
267
0
        return 0;
268
10.7k
    if (priv_key != NULL
269
189
        && !print_labeled_bignum(out, "private-key:", priv_key))
270
0
        return 0;
271
10.7k
    if (pub_key != NULL
272
1.49k
        && !print_labeled_bignum(out, "public-key:", pub_key))
273
0
        return 0;
274
10.7k
    if (params != NULL
275
10.7k
        && !ffc_params_to_text(out, params))
276
0
        return 0;
277
10.7k
    length = DH_get_length(dh);
278
10.7k
    if (length > 0
279
332
        && BIO_printf(out, "recommended-private-length: %ld bits\n",
280
332
                      length) <= 0)
281
0
        return 0;
282
283
10.7k
    return 1;
284
10.7k
}
285
286
# define dh_input_type          "DH"
287
# define dhx_input_type         "DHX"
288
#endif
289
290
/* ---------------------------------------------------------------------- */
291
292
#ifndef OPENSSL_NO_DSA
293
static int dsa_to_text(BIO *out, const void *key, int selection)
294
9.69k
{
295
9.69k
    const DSA *dsa = key;
296
9.69k
    const char *type_label = NULL;
297
9.69k
    const BIGNUM *priv_key = NULL, *pub_key = NULL;
298
9.69k
    const FFC_PARAMS *params = NULL;
299
9.69k
    const BIGNUM *p = NULL;
300
301
9.69k
    if (out == NULL || dsa == NULL) {
302
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
303
0
        return 0;
304
0
    }
305
306
9.69k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
307
5.15k
        type_label = "Private-Key";
308
4.53k
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
309
2.31k
        type_label = "Public-Key";
310
2.21k
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
311
2.21k
        type_label = "DSA-Parameters";
312
313
9.69k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
314
5.15k
        priv_key = DSA_get0_priv_key(dsa);
315
5.15k
        if (priv_key == NULL) {
316
241
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
317
241
            return 0;
318
241
        }
319
5.15k
    }
320
9.44k
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
321
7.23k
        pub_key = DSA_get0_pub_key(dsa);
322
7.23k
        if (pub_key == NULL) {
323
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
324
0
            return 0;
325
0
        }
326
7.23k
    }
327
9.44k
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0) {
328
9.44k
        params = ossl_dsa_get0_params((DSA *)dsa);
329
9.44k
        if (params == NULL) {
330
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_PARAMETERS);
331
0
            return 0;
332
0
        }
333
9.44k
    }
334
335
9.44k
    p = DSA_get0_p(dsa);
336
9.44k
    if (p == NULL) {
337
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
338
0
        return 0;
339
0
    }
340
341
9.44k
    if (BIO_printf(out, "%s: (%d bit)\n", type_label, BN_num_bits(p)) <= 0)
342
0
        return 0;
343
9.44k
    if (priv_key != NULL
344
4.91k
        && !print_labeled_bignum(out, "priv:", priv_key))
345
0
        return 0;
346
9.44k
    if (pub_key != NULL
347
7.23k
        && !print_labeled_bignum(out, "pub: ", pub_key))
348
0
        return 0;
349
9.44k
    if (params != NULL
350
9.44k
        && !ffc_params_to_text(out, params))
351
0
        return 0;
352
353
9.44k
    return 1;
354
9.44k
}
355
356
# define dsa_input_type         "DSA"
357
#endif
358
359
/* ---------------------------------------------------------------------- */
360
361
#ifndef OPENSSL_NO_EC
362
static int ec_param_explicit_curve_to_text(BIO *out, const EC_GROUP *group,
363
                                           BN_CTX *ctx)
364
1.93k
{
365
1.93k
    const char *plabel = "Prime:";
366
1.93k
    BIGNUM *p = NULL, *a = NULL, *b = NULL;
367
368
1.93k
    p = BN_CTX_get(ctx);
369
1.93k
    a = BN_CTX_get(ctx);
370
1.93k
    b = BN_CTX_get(ctx);
371
1.93k
    if (b == NULL
372
1.93k
        || !EC_GROUP_get_curve(group, p, a, b, ctx))
373
0
        return 0;
374
375
1.93k
    if (EC_GROUP_get_field_type(group) == NID_X9_62_characteristic_two_field) {
376
0
        int basis_type = EC_GROUP_get_basis_type(group);
377
378
        /* print the 'short name' of the base type OID */
379
0
        if (basis_type == NID_undef
380
0
            || BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0)
381
0
            return 0;
382
0
        plabel = "Polynomial:";
383
0
    }
384
1.93k
    return print_labeled_bignum(out, plabel, p)
385
1.93k
        && print_labeled_bignum(out, "A:   ", a)
386
1.93k
        && print_labeled_bignum(out, "B:   ", b);
387
1.93k
}
388
389
static int ec_param_explicit_gen_to_text(BIO *out, const EC_GROUP *group,
390
                                         BN_CTX *ctx)
391
1.93k
{
392
1.93k
    int ret;
393
1.93k
    size_t buflen;
394
1.93k
    point_conversion_form_t form;
395
1.93k
    const EC_POINT *point = NULL;
396
1.93k
    const char *glabel = NULL;
397
1.93k
    unsigned char *buf = NULL;
398
399
1.93k
    form = EC_GROUP_get_point_conversion_form(group);
400
1.93k
    point = EC_GROUP_get0_generator(group);
401
402
1.93k
    if (point == NULL)
403
0
        return 0;
404
405
1.93k
    switch (form) {
406
1.65k
    case POINT_CONVERSION_COMPRESSED:
407
1.65k
       glabel = "Generator (compressed):";
408
1.65k
       break;
409
184
    case POINT_CONVERSION_UNCOMPRESSED:
410
184
        glabel = "Generator (uncompressed):";
411
184
        break;
412
102
    case POINT_CONVERSION_HYBRID:
413
102
        glabel = "Generator (hybrid):";
414
102
        break;
415
0
    default:
416
0
        return 0;
417
1.93k
    }
418
419
1.93k
    buflen = EC_POINT_point2buf(group, point, form, &buf, ctx);
420
1.93k
    if (buflen == 0)
421
0
        return 0;
422
423
1.93k
    ret = print_labeled_buf(out, glabel, buf, buflen);
424
1.93k
    OPENSSL_clear_free(buf, buflen);
425
1.93k
    return ret;
426
1.93k
}
427
428
/* Print explicit parameters */
429
static int ec_param_explicit_to_text(BIO *out, const EC_GROUP *group,
430
                                     OSSL_LIB_CTX *libctx)
431
1.93k
{
432
1.93k
    int ret = 0, tmp_nid;
433
1.93k
    BN_CTX *ctx = NULL;
434
1.93k
    const BIGNUM *order = NULL, *cofactor = NULL;
435
1.93k
    const unsigned char *seed;
436
1.93k
    size_t seed_len = 0;
437
438
1.93k
    ctx = BN_CTX_new_ex(libctx);
439
1.93k
    if (ctx == NULL)
440
0
        return 0;
441
1.93k
    BN_CTX_start(ctx);
442
443
1.93k
    tmp_nid = EC_GROUP_get_field_type(group);
444
1.93k
    order = EC_GROUP_get0_order(group);
445
1.93k
    if (order == NULL)
446
0
        goto err;
447
448
1.93k
    seed = EC_GROUP_get0_seed(group);
449
1.93k
    if (seed != NULL)
450
1.11k
        seed_len = EC_GROUP_get_seed_len(group);
451
1.93k
    cofactor = EC_GROUP_get0_cofactor(group);
452
453
    /* print the 'short name' of the field type */
454
1.93k
    if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0
455
1.93k
        || !ec_param_explicit_curve_to_text(out, group, ctx)
456
1.93k
        || !ec_param_explicit_gen_to_text(out, group, ctx)
457
1.93k
        || !print_labeled_bignum(out, "Order: ", order)
458
1.93k
        || (cofactor != NULL
459
1.93k
            && !print_labeled_bignum(out, "Cofactor: ", cofactor))
460
1.93k
        || (seed != NULL
461
1.11k
            && !print_labeled_buf(out, "Seed:", seed, seed_len)))
462
0
        goto err;
463
1.93k
    ret = 1;
464
1.93k
err:
465
1.93k
    BN_CTX_end(ctx);
466
1.93k
    BN_CTX_free(ctx);
467
1.93k
    return ret;
468
1.93k
}
469
470
static int ec_param_to_text(BIO *out, const EC_GROUP *group,
471
                            OSSL_LIB_CTX *libctx)
472
16.4k
{
473
16.4k
    if (EC_GROUP_get_asn1_flag(group) & OPENSSL_EC_NAMED_CURVE) {
474
14.4k
        const char *curve_name;
475
14.4k
        int curve_nid = EC_GROUP_get_curve_name(group);
476
477
        /* Explicit parameters */
478
14.4k
        if (curve_nid == NID_undef)
479
0
            return 0;
480
481
14.4k
        if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0)
482
0
            return 0;
483
484
14.4k
        curve_name = EC_curve_nid2nist(curve_nid);
485
14.4k
        return (curve_name == NULL
486
7.87k
                || BIO_printf(out, "%s: %s\n", "NIST CURVE", curve_name) > 0);
487
14.4k
    } else {
488
1.93k
        return ec_param_explicit_to_text(out, group, libctx);
489
1.93k
    }
490
16.4k
}
491
492
static int ec_to_text(BIO *out, const void *key, int selection)
493
21.0k
{
494
21.0k
    const EC_KEY *ec = key;
495
21.0k
    const char *type_label = NULL;
496
21.0k
    unsigned char *priv = NULL, *pub = NULL;
497
21.0k
    size_t priv_len = 0, pub_len = 0;
498
21.0k
    const EC_GROUP *group;
499
21.0k
    int ret = 0;
500
501
21.0k
    if (out == NULL || ec == NULL) {
502
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
503
0
        return 0;
504
0
    }
505
506
21.0k
    if ((group = EC_KEY_get0_group(ec)) == NULL) {
507
0
        ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY);
508
0
        return 0;
509
0
    }
510
511
21.0k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)
512
9.39k
        type_label = "Private-Key";
513
11.6k
    else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0)
514
6.87k
        type_label = "Public-Key";
515
4.82k
    else if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
516
4.82k
        if (EC_GROUP_get_curve_name(group) != NID_sm2)
517
4.77k
            type_label = "EC-Parameters";
518
519
21.0k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
520
9.39k
        const BIGNUM *priv_key = EC_KEY_get0_private_key(ec);
521
522
9.39k
        if (priv_key == NULL) {
523
1.26k
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
524
1.26k
            goto err;
525
1.26k
        }
526
8.13k
        priv_len = EC_KEY_priv2buf(ec, &priv);
527
8.13k
        if (priv_len == 0)
528
2.34k
            goto err;
529
8.13k
    }
530
17.4k
    if ((selection & OSSL_KEYMGMT_SELECT_KEYPAIR) != 0) {
531
12.6k
        const EC_POINT *pub_pt = EC_KEY_get0_public_key(ec);
532
533
12.6k
        if (pub_pt == NULL) {
534
631
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
535
631
            goto err;
536
631
        }
537
538
12.0k
        pub_len = EC_KEY_key2buf(ec, EC_KEY_get_conv_form(ec), &pub, NULL);
539
12.0k
        if (pub_len == 0)
540
421
            goto err;
541
12.0k
    }
542
543
16.4k
    if (type_label != NULL
544
16.3k
        && BIO_printf(out, "%s: (%d bit)\n", type_label,
545
16.3k
                      EC_GROUP_order_bits(group)) <= 0)
546
0
        goto err;
547
16.4k
    if (priv != NULL
548
5.73k
        && !print_labeled_buf(out, "priv:", priv, priv_len))
549
0
        goto err;
550
16.4k
    if (pub != NULL
551
11.6k
        && !print_labeled_buf(out, "pub:", pub, pub_len))
552
0
        goto err;
553
16.4k
    if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
554
16.4k
        ret = ec_param_to_text(out, group, ossl_ec_key_get_libctx(ec));
555
21.0k
err:
556
21.0k
    OPENSSL_clear_free(priv, priv_len);
557
21.0k
    OPENSSL_free(pub);
558
21.0k
    return ret;
559
16.4k
}
560
561
# define ec_input_type          "EC"
562
563
# ifndef OPENSSL_NO_SM2
564
#  define sm2_input_type        "SM2"
565
# endif
566
#endif
567
568
/* ---------------------------------------------------------------------- */
569
570
#ifndef OPENSSL_NO_ECX
571
static int ecx_to_text(BIO *out, const void *key, int selection)
572
384
{
573
384
    const ECX_KEY *ecx = key;
574
384
    const char *type_label = NULL;
575
576
384
    if (out == NULL || ecx == NULL) {
577
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
578
0
        return 0;
579
0
    }
580
581
384
    switch (ecx->type) {
582
66
    case ECX_KEY_TYPE_X25519:
583
66
        type_label = "X25519";
584
66
        break;
585
65
    case ECX_KEY_TYPE_X448:
586
65
        type_label = "X448";
587
65
        break;
588
63
    case ECX_KEY_TYPE_ED25519:
589
63
        type_label = "ED25519";
590
63
        break;
591
190
    case ECX_KEY_TYPE_ED448:
592
190
        type_label = "ED448";
593
190
        break;
594
384
    }
595
596
384
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
597
75
        if (ecx->privkey == NULL) {
598
20
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PRIVATE_KEY);
599
20
            return 0;
600
20
        }
601
602
55
        if (BIO_printf(out, "%s Private-Key:\n", type_label) <= 0)
603
0
            return 0;
604
55
        if (!print_labeled_buf(out, "priv:", ecx->privkey, ecx->keylen))
605
0
            return 0;
606
309
    } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
607
        /* ecx->pubkey is an array, not a pointer... */
608
260
        if (!ecx->haspubkey) {
609
0
            ERR_raise(ERR_LIB_PROV, PROV_R_NOT_A_PUBLIC_KEY);
610
0
            return 0;
611
0
        }
612
613
260
        if (BIO_printf(out, "%s Public-Key:\n", type_label) <= 0)
614
0
            return 0;
615
260
    }
616
617
364
    if (!print_labeled_buf(out, "pub:", ecx->pubkey, ecx->keylen))
618
0
        return 0;
619
620
364
    return 1;
621
364
}
622
623
# define ed25519_input_type     "ED25519"
624
# define ed448_input_type       "ED448"
625
# define x25519_input_type      "X25519"
626
# define x448_input_type        "X448"
627
#endif
628
629
/* ---------------------------------------------------------------------- */
630
631
static int rsa_to_text(BIO *out, const void *key, int selection)
632
17.4k
{
633
17.4k
    const RSA *rsa = key;
634
17.4k
    const char *type_label = "RSA key";
635
17.4k
    const char *modulus_label = NULL;
636
17.4k
    const char *exponent_label = NULL;
637
17.4k
    const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL;
638
17.4k
    STACK_OF(BIGNUM_const) *factors = NULL;
639
17.4k
    STACK_OF(BIGNUM_const) *exps = NULL;
640
17.4k
    STACK_OF(BIGNUM_const) *coeffs = NULL;
641
17.4k
    int primes;
642
17.4k
    const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa);
643
17.4k
    int ret = 0;
644
645
17.4k
    if (out == NULL || rsa == NULL) {
646
0
        ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER);
647
0
        goto err;
648
0
    }
649
650
17.4k
    factors = sk_BIGNUM_const_new_null();
651
17.4k
    exps = sk_BIGNUM_const_new_null();
652
17.4k
    coeffs = sk_BIGNUM_const_new_null();
653
654
17.4k
    if (factors == NULL || exps == NULL || coeffs == NULL) {
655
0
        ERR_raise(ERR_LIB_PROV, ERR_R_CRYPTO_LIB);
656
0
        goto err;
657
0
    }
658
659
17.4k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
660
4.80k
        type_label = "Private-Key";
661
4.80k
        modulus_label = "modulus:";
662
4.80k
        exponent_label = "publicExponent:";
663
12.6k
    } else if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) {
664
9.15k
        type_label = "Public-Key";
665
9.15k
        modulus_label = "Modulus:";
666
9.15k
        exponent_label = "Exponent:";
667
9.15k
    }
668
669
17.4k
    RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d);
670
17.4k
    ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs);
671
17.4k
    primes = sk_BIGNUM_const_num(factors);
672
673
17.4k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
674
4.80k
        if (BIO_printf(out, "%s: (%d bit, %d primes)\n",
675
4.80k
                       type_label, BN_num_bits(rsa_n), primes) <= 0)
676
0
            goto err;
677
12.6k
    } else {
678
12.6k
        if (BIO_printf(out, "%s: (%d bit)\n",
679
12.6k
                       type_label, BN_num_bits(rsa_n)) <= 0)
680
0
            goto err;
681
12.6k
    }
682
683
17.4k
    if (!print_labeled_bignum(out, modulus_label, rsa_n))
684
0
        goto err;
685
17.4k
    if (!print_labeled_bignum(out, exponent_label, rsa_e))
686
0
        goto err;
687
17.4k
    if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
688
4.80k
        int i;
689
690
4.80k
        if (!print_labeled_bignum(out, "privateExponent:", rsa_d))
691
1.51k
            goto err;
692
3.28k
        if (!print_labeled_bignum(out, "prime1:",
693
3.28k
                                  sk_BIGNUM_const_value(factors, 0)))
694
0
            goto err;
695
3.28k
        if (!print_labeled_bignum(out, "prime2:",
696
3.28k
                                  sk_BIGNUM_const_value(factors, 1)))
697
0
            goto err;
698
3.28k
        if (!print_labeled_bignum(out, "exponent1:",
699
3.28k
                                  sk_BIGNUM_const_value(exps, 0)))
700
0
            goto err;
701
3.28k
        if (!print_labeled_bignum(out, "exponent2:",
702
3.28k
                                  sk_BIGNUM_const_value(exps, 1)))
703
0
            goto err;
704
3.28k
        if (!print_labeled_bignum(out, "coefficient:",
705
3.28k
                                  sk_BIGNUM_const_value(coeffs, 0)))
706
0
            goto err;
707
77.9k
        for (i = 2; i < sk_BIGNUM_const_num(factors); i++) {
708
74.6k
            if (BIO_printf(out, "prime%d:", i + 1) <= 0)
709
0
                goto err;
710
74.6k
            if (!print_labeled_bignum(out, NULL,
711
74.6k
                                      sk_BIGNUM_const_value(factors, i)))
712
0
                goto err;
713
74.6k
            if (BIO_printf(out, "exponent%d:", i + 1) <= 0)
714
0
                goto err;
715
74.6k
            if (!print_labeled_bignum(out, NULL,
716
74.6k
                                      sk_BIGNUM_const_value(exps, i)))
717
0
                goto err;
718
74.6k
            if (BIO_printf(out, "coefficient%d:", i + 1) <= 0)
719
0
                goto err;
720
74.6k
            if (!print_labeled_bignum(out, NULL,
721
74.6k
                                      sk_BIGNUM_const_value(coeffs, i - 1)))
722
0
                goto err;
723
74.6k
        }
724
3.28k
    }
725
726
15.8k
    if ((selection & OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS) != 0) {
727
15.8k
        switch (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK)) {
728
15.5k
        case RSA_FLAG_TYPE_RSA:
729
15.5k
            if (!ossl_rsa_pss_params_30_is_unrestricted(pss_params)) {
730
0
                if (BIO_printf(out, "(INVALID PSS PARAMETERS)\n") <= 0)
731
0
                    goto err;
732
0
            }
733
15.5k
            break;
734
15.5k
        case RSA_FLAG_TYPE_RSASSAPSS:
735
304
            if (ossl_rsa_pss_params_30_is_unrestricted(pss_params)) {
736
154
                if (BIO_printf(out, "No PSS parameter restrictions\n") <= 0)
737
0
                    goto err;
738
154
            } else {
739
150
                int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss_params);
740
150
                int maskgenalg_nid =
741
150
                    ossl_rsa_pss_params_30_maskgenalg(pss_params);
742
150
                int maskgenhashalg_nid =
743
150
                    ossl_rsa_pss_params_30_maskgenhashalg(pss_params);
744
150
                int saltlen = ossl_rsa_pss_params_30_saltlen(pss_params);
745
150
                int trailerfield =
746
150
                    ossl_rsa_pss_params_30_trailerfield(pss_params);
747
748
150
                if (BIO_printf(out, "PSS parameter restrictions:\n") <= 0)
749
0
                    goto err;
750
150
                if (BIO_printf(out, "  Hash Algorithm: %s%s\n",
751
150
                               ossl_rsa_oaeppss_nid2name(hashalg_nid),
752
150
                               (hashalg_nid == NID_sha1
753
150
                                ? " (default)" : "")) <= 0)
754
0
                    goto err;
755
150
                if (BIO_printf(out, "  Mask Algorithm: %s with %s%s\n",
756
150
                               ossl_rsa_mgf_nid2name(maskgenalg_nid),
757
150
                               ossl_rsa_oaeppss_nid2name(maskgenhashalg_nid),
758
150
                               (maskgenalg_nid == NID_mgf1
759
150
                                && maskgenhashalg_nid == NID_sha1
760
150
                                ? " (default)" : "")) <= 0)
761
0
                    goto err;
762
150
                if (BIO_printf(out, "  Minimum Salt Length: %d%s\n",
763
150
                               saltlen,
764
150
                               (saltlen == 20 ? " (default)" : "")) <= 0)
765
0
                    goto err;
766
150
                if (BIO_printf(out, "  Trailer Field: 0x%x%s\n",
767
150
                               trailerfield,
768
150
                               (trailerfield == 1 ? " (default)" : "")) <= 0)
769
0
                    goto err;
770
150
            }
771
304
            break;
772
15.8k
        }
773
15.8k
    }
774
775
15.8k
    ret = 1;
776
17.4k
 err:
777
17.4k
    sk_BIGNUM_const_free(factors);
778
17.4k
    sk_BIGNUM_const_free(exps);
779
17.4k
    sk_BIGNUM_const_free(coeffs);
780
17.4k
    return ret;
781
15.8k
}
782
783
#define rsa_input_type          "RSA"
784
#define rsapss_input_type       "RSA-PSS"
785
786
/* ---------------------------------------------------------------------- */
787
788
static void *key2text_newctx(void *provctx)
789
88.4k
{
790
88.4k
    return provctx;
791
88.4k
}
792
793
static void key2text_freectx(ossl_unused void *vctx)
794
88.4k
{
795
88.4k
}
796
797
static int key2text_encode(void *vctx, const void *key, int selection,
798
                           OSSL_CORE_BIO *cout,
799
                           int (*key2text)(BIO *out, const void *key,
800
                                           int selection),
801
                           OSSL_PASSPHRASE_CALLBACK *cb, void *cbarg)
802
77.7k
{
803
77.7k
    BIO *out = ossl_bio_new_from_core_bio(vctx, cout);
804
77.7k
    int ret;
805
806
77.7k
    if (out == NULL)
807
0
        return 0;
808
809
77.7k
    ret = key2text(out, key, selection);
810
77.7k
    BIO_free(out);
811
812
77.7k
    return ret;
813
77.7k
}
814
815
#define MAKE_TEXT_ENCODER(impl, type)                                   \
816
    static OSSL_FUNC_encoder_import_object_fn                           \
817
    impl##2text_import_object;                                          \
818
    static OSSL_FUNC_encoder_free_object_fn                             \
819
    impl##2text_free_object;                                            \
820
    static OSSL_FUNC_encoder_encode_fn impl##2text_encode;              \
821
                                                                        \
822
    static void *impl##2text_import_object(void *ctx, int selection,    \
823
                                           const OSSL_PARAM params[])   \
824
0
    {                                                                   \
825
0
        return ossl_prov_import_key(ossl_##impl##_keymgmt_functions,    \
826
0
                                    ctx, selection, params);            \
827
0
    }                                                                   \
Unexecuted instantiation: encode_key2text.c:dh2text_import_object
Unexecuted instantiation: encode_key2text.c:dhx2text_import_object
Unexecuted instantiation: encode_key2text.c:dsa2text_import_object
Unexecuted instantiation: encode_key2text.c:ec2text_import_object
Unexecuted instantiation: encode_key2text.c:sm22text_import_object
Unexecuted instantiation: encode_key2text.c:ed255192text_import_object
Unexecuted instantiation: encode_key2text.c:ed4482text_import_object
Unexecuted instantiation: encode_key2text.c:x255192text_import_object
Unexecuted instantiation: encode_key2text.c:x4482text_import_object
Unexecuted instantiation: encode_key2text.c:rsa2text_import_object
Unexecuted instantiation: encode_key2text.c:rsapss2text_import_object
828
    static void impl##2text_free_object(void *key)                      \
829
0
    {                                                                   \
830
0
        ossl_prov_free_key(ossl_##impl##_keymgmt_functions, key);       \
831
0
    }                                                                   \
Unexecuted instantiation: encode_key2text.c:dh2text_free_object
Unexecuted instantiation: encode_key2text.c:dhx2text_free_object
Unexecuted instantiation: encode_key2text.c:dsa2text_free_object
Unexecuted instantiation: encode_key2text.c:ec2text_free_object
Unexecuted instantiation: encode_key2text.c:sm22text_free_object
Unexecuted instantiation: encode_key2text.c:ed255192text_free_object
Unexecuted instantiation: encode_key2text.c:ed4482text_free_object
Unexecuted instantiation: encode_key2text.c:x255192text_free_object
Unexecuted instantiation: encode_key2text.c:x4482text_free_object
Unexecuted instantiation: encode_key2text.c:rsa2text_free_object
Unexecuted instantiation: encode_key2text.c:rsapss2text_free_object
832
    static int impl##2text_encode(void *vctx, OSSL_CORE_BIO *cout,      \
833
                                  const void *key,                      \
834
                                  const OSSL_PARAM key_abstract[],      \
835
                                  int selection,                        \
836
                                  OSSL_PASSPHRASE_CALLBACK *cb,         \
837
                                  void *cbarg)                          \
838
77.3k
    {                                                                   \
839
77.3k
        /* We don't deal with abstract objects */                       \
840
77.3k
        if (key_abstract != NULL) {                                     \
841
0
            ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT);     \
842
0
            return 0;                                                   \
843
0
        }                                                               \
844
77.3k
        return key2text_encode(vctx, key, selection, cout,              \
845
77.3k
                               type##_to_text, cb, cbarg);              \
846
77.3k
    }                                                                   \
847
    const OSSL_DISPATCH ossl_##impl##_to_text_encoder_functions[] = {   \
848
        { OSSL_FUNC_ENCODER_NEWCTX,                                     \
849
          (void (*)(void))key2text_newctx },                            \
850
        { OSSL_FUNC_ENCODER_FREECTX,                                    \
851
          (void (*)(void))key2text_freectx },                           \
852
        { OSSL_FUNC_ENCODER_IMPORT_OBJECT,                              \
853
          (void (*)(void))impl##2text_import_object },                  \
854
        { OSSL_FUNC_ENCODER_FREE_OBJECT,                                \
855
          (void (*)(void))impl##2text_free_object },                    \
856
        { OSSL_FUNC_ENCODER_ENCODE,                                     \
857
          (void (*)(void))impl##2text_encode },                         \
858
        OSSL_DISPATCH_END                                               \
859
    }
860
861
#ifndef OPENSSL_NO_DH
862
8.20k
MAKE_TEXT_ENCODER(dh, dh);
863
20.5k
MAKE_TEXT_ENCODER(dhx, dh);
864
#endif
865
#ifndef OPENSSL_NO_DSA
866
9.69k
MAKE_TEXT_ENCODER(dsa, dsa);
867
#endif
868
#ifndef OPENSSL_NO_EC
869
20.9k
MAKE_TEXT_ENCODER(ec, ec);
870
# ifndef OPENSSL_NO_SM2
871
194
MAKE_TEXT_ENCODER(sm2, ec);
872
# endif
873
# ifndef OPENSSL_NO_ECX
874
63
MAKE_TEXT_ENCODER(ed25519, ecx);
875
190
MAKE_TEXT_ENCODER(ed448, ecx);
876
66
MAKE_TEXT_ENCODER(x25519, ecx);
877
65
MAKE_TEXT_ENCODER(x448, ecx);
878
# endif
879
#endif
880
17.0k
MAKE_TEXT_ENCODER(rsa, rsa);
881
MAKE_TEXT_ENCODER(rsapss, rsa);