X-Git-Url: http://git.silcnet.org/gitweb/?a=blobdiff_plain;f=lib%2Fsilccrypt%2Fsilcpkcs.c;h=74fd6f03ab8b5a3ed35d106a288ec8853d05e7b9;hb=52e57c880aba9c5e89f59d962eb9af75670b76e0;hp=6b99d59b62f31c0973e45643d67587be2e62dc3a;hpb=62f89b2886bbe9df82d9b2fdabfe707509d9e0fc;p=silc.git diff --git a/lib/silccrypt/silcpkcs.c b/lib/silccrypt/silcpkcs.c index 6b99d59b..74fd6f03 100644 --- a/lib/silccrypt/silcpkcs.c +++ b/lib/silccrypt/silcpkcs.c @@ -2,242 +2,813 @@ silcpkcs.c - Author: Pekka Riikonen + Author: Pekka Riikonen - Copyright (C) 1997 - 2000 Pekka Riikonen + Copyright (C) 1997 - 2007 Pekka Riikonen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - + the Free Software Foundation; version 2 of the License. + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. */ +/* $Id$ */ + +#include "silc.h" +#include "silcpk_i.h" +#include "silcpkcs1_i.h" + +#ifndef SILC_SYMBIAN +/* Dynamically registered list of PKCS. */ +SilcDList silc_pkcs_list = NULL; +SilcDList silc_pkcs_alg_list = NULL; +#define SILC_PKCS_LIST silc_pkcs_list +#define SILC_PKCS_ALG_LIST silc_pkcs_alg_list +#else +#define SILC_PKCS_LIST TRUE +#define SILC_PKCS_ALG_LIST TRUE +#endif /* SILC_SYMBIAN */ + +/* Static list of PKCS for silc_pkcs_register_default(). */ +const SilcPKCSObject silc_default_pkcs[] = +{ + /* SILC PKCS */ + { + SILC_PKCS_SILC, + silc_pkcs_silc_get_algorithm, + silc_pkcs_silc_import_public_key_file, + silc_pkcs_silc_import_public_key, + silc_pkcs_silc_export_public_key_file, + silc_pkcs_silc_export_public_key, + silc_pkcs_silc_public_key_bitlen, + silc_pkcs_silc_public_key_copy, + silc_pkcs_silc_public_key_compare, + silc_pkcs_silc_public_key_free, + silc_pkcs_silc_import_private_key_file, + silc_pkcs_silc_import_private_key, + silc_pkcs_silc_export_private_key_file, + silc_pkcs_silc_export_private_key, + silc_pkcs_silc_private_key_bitlen, + silc_pkcs_silc_private_key_free, + silc_pkcs_silc_encrypt, + silc_pkcs_silc_decrypt, + silc_pkcs_silc_sign, + silc_pkcs_silc_verify, + }, + + { + 0, NULL, NULL, NULL, NULL, NULL, + NULL, NULL, NULL, NULL, NULL + } +}; -#include "silcincludes.h" +/* Builtin PKCS algorithms */ +const SilcPKCSAlgorithm silc_default_pkcs_alg[] = +{ + /* PKCS #1, Version 1.5 without hash OIDs */ + { + "rsa", + "pkcs1-no-oid", + "sha1,md5", + silc_pkcs1_generate_key, + silc_pkcs1_import_public_key, + silc_pkcs1_export_public_key, + silc_pkcs1_public_key_bitlen, + silc_pkcs1_public_key_copy, + silc_pkcs1_public_key_compare, + silc_pkcs1_public_key_free, + silc_pkcs1_import_private_key, + silc_pkcs1_export_private_key, + silc_pkcs1_private_key_bitlen, + silc_pkcs1_private_key_free, + silc_pkcs1_encrypt, + silc_pkcs1_decrypt, + silc_pkcs1_sign_no_oid, + silc_pkcs1_verify_no_oid + }, + + /* PKCS #1, Version 1.5 */ + { + "rsa", + "pkcs1", + "sha1,md5", + silc_pkcs1_generate_key, + silc_pkcs1_import_public_key, + silc_pkcs1_export_public_key, + silc_pkcs1_public_key_bitlen, + silc_pkcs1_public_key_copy, + silc_pkcs1_public_key_compare, + silc_pkcs1_public_key_free, + silc_pkcs1_import_private_key, + silc_pkcs1_export_private_key, + silc_pkcs1_private_key_bitlen, + silc_pkcs1_private_key_free, + silc_pkcs1_encrypt, + silc_pkcs1_decrypt, + silc_pkcs1_sign, + silc_pkcs1_verify + }, + + { + NULL, NULL, NULL, NULL, + NULL, NULL, NULL, NULL, + NULL, NULL, NULL, NULL, + NULL, NULL + } +}; -#include "rsa.h" +/* Register a new PKCS into SILC. */ -/* List of all PKCS's in SILC. PKCS's don't support SIM's thus - only static declarations are possible. XXX: I hope this to change - real soon. */ -SilcPKCSObject silc_pkcs_list[] = +SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs) { - { "rsa", &silc_rsa_data_context, - silc_rsa_init, silc_rsa_clear_keys, silc_rsa_get_public_key, - silc_rsa_get_private_key, silc_rsa_set_public_key, - silc_rsa_set_private_key, silc_rsa_context_len, - silc_rsa_data_context_len, silc_rsa_set_arg, - silc_rsa_encrypt, silc_rsa_decrypt, - silc_rsa_sign, silc_rsa_verify }, +#ifndef SILC_SYMBIAN + SilcPKCSObject *newpkcs; + + SILC_LOG_DEBUG(("Registering new PKCS")); + + /* Check if exists already */ + if (silc_pkcs_list) { + SilcPKCSObject *entry; + silc_dlist_start(silc_pkcs_list); + while ((entry = silc_dlist_get(silc_pkcs_list)) != SILC_LIST_END) { + if (entry->type == pkcs->type) + return FALSE; + } + } - { NULL, NULL, NULL, NULL, NULL, - NULL, NULL, NULL, NULL, NULL, NULL } -}; + newpkcs = silc_calloc(1, sizeof(*newpkcs)); + if (!newpkcs) + return FALSE; + *newpkcs = *pkcs; -/* Allocates a new SilcPKCS object. The new allocated object is returned - to the 'new_pkcs' argument. This function also initializes the data - context structure. Function returns 1 on success and 0 on error. + /* Add to list */ + if (silc_pkcs_list == NULL) + silc_pkcs_list = silc_dlist_init(); + silc_dlist_add(silc_pkcs_list, newpkcs); -*/ -int silc_pkcs_alloc(const unsigned char *name, SilcPKCS *new_pkcs) +#endif /* SILC_SYMBIAN */ + return TRUE; +} + +/* Unregister a PKCS from the SILC. */ + +SilcBool silc_pkcs_unregister(SilcPKCSObject *pkcs) { - int i; +#ifndef SILC_SYMBIAN + SilcPKCSObject *entry; + + SILC_LOG_DEBUG(("Unregistering PKCS")); - SILC_LOG_DEBUG(("Allocating new PKCS object")); + if (!silc_pkcs_list) + return FALSE; - for (i = 0; silc_pkcs_list[i].name; i++) { - if (!strcmp(silc_pkcs_list[i].name, name)) - break; + silc_dlist_start(silc_pkcs_list); + while ((entry = silc_dlist_get(silc_pkcs_list)) != SILC_LIST_END) { + if (pkcs == SILC_ALL_PKCS || entry == pkcs) { + silc_dlist_del(silc_pkcs_list, entry); + silc_free(entry); + + if (silc_dlist_count(silc_pkcs_list) == 0) { + silc_dlist_uninit(silc_pkcs_list); + silc_pkcs_list = NULL; + } + + return TRUE; + } } - if (silc_pkcs_list[i].name == NULL) +#endif /* SILC_SYMBIAN */ + return FALSE; +} + +/* Register algorithm */ + +SilcBool silc_pkcs_algorithm_register(const SilcPKCSAlgorithm *pkcs) +{ +#ifndef SILC_SYMBIAN + SilcPKCSAlgorithm *newalg; + + SILC_LOG_DEBUG(("Registering new PKCS algorithm %s", + pkcs->name)); + + /* Check if exists already */ + if (silc_pkcs_alg_list) { + SilcPKCSAlgorithm *entry; + silc_dlist_start(silc_pkcs_alg_list); + while ((entry = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) { + if (!strcmp(entry->name, pkcs->name) && + entry->scheme && pkcs->scheme && + !strcmp(entry->scheme, pkcs->scheme)) + return FALSE; + } + } + + newalg = silc_calloc(1, sizeof(*newalg)); + if (!newalg) return FALSE; - *new_pkcs = silc_calloc(1, sizeof(**new_pkcs)); - if (*new_pkcs == NULL) { - SILC_LOG_ERROR(("Could not allocate new PKCS object")); + *newalg = *pkcs; + newalg->name = strdup(pkcs->name); + if (!newalg->name) return FALSE; + if (pkcs->scheme) { + newalg->scheme = strdup(pkcs->scheme); + if (!newalg->scheme) + return FALSE; } + newalg->hash = strdup(pkcs->hash); + if (!newalg->hash) + return FALSE; - /* Set the pointers */ - (*new_pkcs)->pkcs = &silc_pkcs_list[i]; - (*new_pkcs)->pkcs->data_context = - silc_calloc(1, (*new_pkcs)->pkcs->data_context_len()); - (*new_pkcs)->context = silc_calloc(1, (*new_pkcs)->pkcs->context_len()); - (*new_pkcs)->get_key_len = silc_pkcs_get_key_len; + /* Add to list */ + if (silc_pkcs_alg_list == NULL) + silc_pkcs_alg_list = silc_dlist_init(); + silc_dlist_add(silc_pkcs_alg_list, newalg); +#endif /* SILC_SYMBIAN */ return TRUE; } -/* Free's the PKCS object */ +/* Unregister algorithm */ -void silc_pkcs_free(SilcPKCS pkcs) +SilcBool silc_pkcs_algorithm_unregister(SilcPKCSAlgorithm *pkcs) { - if (pkcs) - silc_free(pkcs->context); +#ifndef SILC_SYMBIAN + SilcPKCSAlgorithm*entry; + + SILC_LOG_DEBUG(("Unregistering PKCS algorithm")); + + if (!silc_pkcs_alg_list) + return FALSE; + + silc_dlist_start(silc_pkcs_alg_list); + while ((entry = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) { + if (pkcs == SILC_ALL_PKCS_ALG || entry == pkcs) { + silc_dlist_del(silc_pkcs_alg_list, entry); + silc_free(entry->name); + silc_free(entry->scheme); + silc_free(entry->hash); + silc_free(entry); + + if (silc_dlist_count(silc_pkcs_alg_list) == 0) { + silc_dlist_uninit(silc_pkcs_alg_list); + silc_pkcs_alg_list = NULL; + } + + return TRUE; + } + } + +#endif /* SILC_SYMBIAN */ + return FALSE; } -/* Return TRUE if PKCS algorithm `name' is supported. */ +/* Function that registers all the default PKCS and PKCS algorithms. */ -int silc_pkcs_is_supported(const unsigned char *name) +SilcBool silc_pkcs_register_default(void) { +#ifndef SILC_SYMBIAN int i; - for (i = 0; silc_pkcs_list[i].name; i++) { - if (!strcmp(silc_pkcs_list[i].name, name)) - return TRUE; + for (i = 0; silc_default_pkcs[i].type; i++) + silc_pkcs_register(&(silc_default_pkcs[i])); + + for (i = 0; silc_default_pkcs_alg[i].name; i++) + silc_pkcs_algorithm_register(&(silc_default_pkcs_alg[i])); + +#endif /* SILC_SYMBIAN */ + return TRUE; +} + +SilcBool silc_pkcs_unregister_all(void) +{ +#ifndef SILC_SYMBIAN + SilcPKCSObject *entry; + SilcPKCSAlgorithm *alg; + + if (silc_pkcs_list) { + silc_dlist_start(silc_pkcs_list); + while ((entry = silc_dlist_get(silc_pkcs_list)) != SILC_LIST_END) { + silc_pkcs_unregister(entry); + if (!silc_pkcs_list) + break; + } } - return FALSE; + if (silc_pkcs_alg_list) { + silc_dlist_start(silc_pkcs_alg_list); + while ((alg = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) { + silc_pkcs_algorithm_unregister(alg); + if (!silc_pkcs_alg_list) + break; + } + } + +#endif /* SILC_SYMBIAN */ + return TRUE; } /* Returns comma separated list of supported PKCS algorithms */ -char *silc_pkcs_get_supported() +char *silc_pkcs_get_supported(void) { + SilcPKCSAlgorithm *entry; char *list = NULL; - int i, len; - - len = 0; - for (i = 0; silc_pkcs_list[i].name; i++) { - len += strlen(silc_pkcs_list[i].name); - list = silc_realloc(list, len + 1); - - memcpy(list + (len - strlen(silc_pkcs_list[i].name)), - silc_pkcs_list[i].name, strlen(silc_pkcs_list[i].name)); - memcpy(list + len, ",", 1); - len++; + int len = 0; + +#ifndef SILC_SYMBIAN + if (silc_pkcs_alg_list) { + silc_dlist_start(silc_pkcs_alg_list); + while ((entry = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) { + len += strlen(entry->name); + list = silc_realloc(list, len + 1); + if (!list) + return NULL; + + memcpy(list + (len - strlen(entry->name)), + entry->name, strlen(entry->name)); + memcpy(list + len, ",", 1); + len++; + } + } +#else + { + int i; + for (i = 0; silc_default_pkcs_alg[i].name; i++) { + entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]); + len += strlen(entry->name); + list = silc_realloc(list, len + 1); + if (!list) + return NULL; + + memcpy(list + (len - strlen(entry->name)), + entry->name, strlen(entry->name)); + memcpy(list + len, ",", 1); + len++; + } } +#endif /* SILC_SYMBIAN */ list[len - 1] = 0; return list; } -/* Returns the length of the key */ +/* Finds PKCS object */ + +const SilcPKCSObject *silc_pkcs_find_pkcs(SilcPKCSType type) +{ + SilcPKCSObject *entry; + +#ifndef SILC_SYMBIAN + if (silc_pkcs_list) { + silc_dlist_start(silc_pkcs_list); + while ((entry = silc_dlist_get(silc_pkcs_list)) != SILC_LIST_END) { + if (entry->type == type) + return (const SilcPKCSObject *)entry; + } + } +#else + { + int i; + for (i = 0; silc_default_pkcs[i].type; i++) { + entry = (SilcPKCSObject *)&(silc_default_pkcs[i]); + if (entry->type == type) + return (const SilcPKCSObject *)entry; + } + } +#endif /* SILC_SYMBIAN */ + + return NULL; +} + +/* Finds PKCS algorithms object */ + +const SilcPKCSAlgorithm *silc_pkcs_find_algorithm(const char *algorithm, + const char *scheme) +{ + SilcPKCSAlgorithm *entry; + +#ifndef SILC_SYMBIAN + if (silc_pkcs_alg_list) { + silc_dlist_start(silc_pkcs_alg_list); + while ((entry = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) { + if (!strcmp(entry->name, algorithm) && + (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme))) + return (const SilcPKCSAlgorithm *)entry; + } + } +#else + { + int i; + for (i = 0; silc_default_pkcs_alg[i].name; i++) { + entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]); + if (!strcmp(entry->name, algorithm) && + (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme))) + return (const SilcPKCSAlgorithm *)entry; + } + } +#endif /* SILC_SYMBIAN */ + + return NULL; +} + +/* Returns PKCS context */ + +const SilcPKCSObject *silc_pkcs_get_pkcs(void *key) +{ + SilcPublicKey public_key = key; + return public_key->pkcs; +} + +/* Returns PKCS algorithm context */ + +const SilcPKCSAlgorithm *silc_pkcs_get_algorithm(void *key) +{ + SilcPublicKey public_key = key; + return public_key->pkcs->get_algorithm(public_key->public_key); +} + +/* Return algorithm name */ + +const char *silc_pkcs_get_name(void *key) +{ + const SilcPKCSAlgorithm *pkcs = silc_pkcs_get_algorithm(key); + return pkcs->name; +} + +/* Returns PKCS type */ + +SilcPKCSType silc_pkcs_get_type(void *key) +{ + SilcPublicKey public_key = key; + return public_key->pkcs->type; +} + +/* Allocates new public key from the key data */ + +SilcBool silc_pkcs_public_key_alloc(SilcPKCSType type, + unsigned char *key, + SilcUInt32 key_len, + SilcPublicKey *ret_public_key) +{ + const SilcPKCSObject *pkcs; + SilcPublicKey public_key; + + if (!ret_public_key) + return FALSE; + + /* Allocate public key context */ + public_key = silc_calloc(1, sizeof(*public_key)); + if (!public_key) + return FALSE; + + public_key->pkcs = pkcs = silc_pkcs_find_pkcs(type); + if (!public_key->pkcs) { + silc_free(public_key); + return FALSE; + } + + /* Import the PKCS public key */ + if (!pkcs->import_public_key(key, key_len, &public_key->public_key)) { + silc_free(public_key); + return FALSE; + } + + *ret_public_key = public_key; + + return TRUE; +} + +/* Frees the public key */ -unsigned int silc_pkcs_get_key_len(SilcPKCS self) +void silc_pkcs_public_key_free(SilcPublicKey public_key) { - return self->key_len; + public_key->pkcs->public_key_free(public_key->public_key); + silc_free(public_key); } -/* Returns SILC style public key */ +/* Exports public key */ -unsigned char *silc_pkcs_get_public_key(SilcPKCS pkcs, unsigned int *len) +unsigned char *silc_pkcs_public_key_encode(SilcPublicKey public_key, + SilcUInt32 *ret_len) { - return pkcs->pkcs->get_public_key(pkcs->context, len); + return public_key->pkcs->export_public_key(public_key->public_key, + ret_len); } -/* Returns SILC style private key */ +/* Return key length */ -unsigned char *silc_pkcs_get_private_key(SilcPKCS pkcs, unsigned int *len) +SilcUInt32 silc_pkcs_public_key_get_len(SilcPublicKey public_key) { - return pkcs->pkcs->get_private_key(pkcs->context, len); + return public_key->pkcs->public_key_bitlen(public_key->public_key); } -/* Sets public key */ -/* XXX rewrite */ +/* Returns internal PKCS public key context */ -int silc_pkcs_set_public_key(SilcPKCS pkcs, unsigned char *pk, - unsigned int pk_len) +void *silc_pkcs_get_context(SilcPKCSType type, SilcPublicKey public_key) { - return pkcs->pkcs->set_public_key(pkcs->context, pk, pk_len); + if (public_key->pkcs->type != type) + return NULL; + return public_key->public_key; } -/* Sets private key */ -int silc_pkcs_set_private_key(SilcPKCS pkcs, unsigned char *prv, - unsigned int prv_len) +/* Allocates new private key from key data */ + +SilcBool silc_pkcs_private_key_alloc(SilcPKCSType type, + unsigned char *key, + SilcUInt32 key_len, + SilcPrivateKey *ret_private_key) { - return pkcs->pkcs->set_private_key(pkcs->context, prv, prv_len); + const SilcPKCSObject *pkcs; + SilcPrivateKey private_key; + + if (!ret_private_key) + return FALSE; + + /* Allocate private key context */ + private_key = silc_calloc(1, sizeof(*private_key)); + if (!private_key) + return FALSE; + + private_key->pkcs = pkcs = silc_pkcs_find_pkcs(type); + if (!private_key->pkcs) { + silc_free(private_key); + return FALSE; + } + + /* Import the PKCS private key */ + if (!pkcs->import_private_key(key, key_len, &private_key->private_key)) { + silc_free(private_key); + return FALSE; + } + + *ret_private_key = private_key; + + return TRUE; +} + +/* Return key length */ + +SilcUInt32 silc_pkcs_private_key_get_len(SilcPrivateKey private_key) +{ + return private_key->pkcs->private_key_bitlen(private_key->private_key); +} + +/* Frees the private key */ + +void silc_pkcs_private_key_free(SilcPrivateKey private_key) +{ + private_key->pkcs->private_key_free(private_key->private_key); + silc_free(private_key); +} + +/* Encrypts */ + +SilcBool silc_pkcs_encrypt(SilcPublicKey public_key, + unsigned char *src, SilcUInt32 src_len, + unsigned char *dst, SilcUInt32 dst_size, + SilcUInt32 *dst_len, SilcRng rng) +{ + return public_key->pkcs->encrypt(public_key->public_key, src, src_len, + dst, dst_size, dst_len, rng); } -/* Saves public key into file */ +/* Decrypts */ -int silc_pkcs_save_public_key(SilcPKCS pkcs, char *filename, - unsigned char *pk, unsigned int pk_len) +SilcBool silc_pkcs_decrypt(SilcPrivateKey private_key, + unsigned char *src, SilcUInt32 src_len, + unsigned char *dst, SilcUInt32 dst_size, + SilcUInt32 *dst_len) { - SilcBuffer buf; - int ret = TRUE; + return private_key->pkcs->decrypt(private_key->private_key, src, src_len, + dst, dst_size, dst_len); +} - buf = silc_buffer_alloc(strlen(pkcs->pkcs->name) + 2 + pk_len - + strlen(SILC_PKCS_PUBLIC_KEYFILE_BEGIN) - + strlen(SILC_PKCS_PUBLIC_KEYFILE_END)); +/* Generates signature */ - silc_buffer_pull_tail(buf, SILC_BUFFER_END(buf)); +SilcBool silc_pkcs_sign(SilcPrivateKey private_key, + unsigned char *src, SilcUInt32 src_len, + unsigned char *dst, SilcUInt32 dst_size, + SilcUInt32 *dst_len, SilcBool compute_hash, + SilcHash hash) +{ + return private_key->pkcs->sign(private_key->private_key, src, src_len, + dst, dst_size, dst_len, compute_hash, hash); +} - silc_buffer_format(buf, - SILC_STR_UI32_STRING(SILC_PKCS_PUBLIC_KEYFILE_BEGIN), - SILC_STR_UI32_STRING(pkcs->pkcs->name), - SILC_STR_UI_SHORT(pk_len), - SILC_STR_UI_XNSTRING(pk, pk_len), - SILC_STR_UI32_STRING(SILC_PKCS_PUBLIC_KEYFILE_END), - SILC_STR_END); +/* Verifies signature */ - /* Save into a file */ - if (silc_file_write(filename, buf->data, buf->len)) { - ret = FALSE; - goto out; +SilcBool silc_pkcs_verify(SilcPublicKey public_key, + unsigned char *signature, + SilcUInt32 signature_len, + unsigned char *data, + SilcUInt32 data_len, SilcHash hash) +{ + return public_key->pkcs->verify(public_key->public_key, signature, + signature_len, data, data_len, hash); +} + +/* Compares two public keys and returns TRUE if they are same key, and + FALSE if they are not same. */ + +SilcBool silc_pkcs_public_key_compare(SilcPublicKey key1, SilcPublicKey key2) +{ + if (key1->pkcs->type != key2->pkcs->type) + return FALSE; + + return key1->pkcs->public_key_compare(key1->public_key, key2->public_key); +} + +/* Copies the public key indicated by `public_key' and returns new allocated + public key which is indentical to the `public_key'. */ + +SilcPublicKey silc_pkcs_public_key_copy(SilcPublicKey public_key) +{ + SilcPublicKey key = silc_calloc(1, sizeof(*key)); + if (!key) + return NULL; + + key->pkcs = public_key->pkcs; + key->public_key = public_key->pkcs->public_key_copy(public_key->public_key); + if (!key->public_key) { + silc_free(key); + return NULL; } - out: - silc_buffer_free(buf); - return ret; + return key; } -/* XXX The buffer should be encrypted */ -/* XXX rewrite */ +/* Loads any kind of public key */ -int silc_pkcs_save_private_key(SilcPKCS pkcs, char *filename, - unsigned char *prv, unsigned int prv_len, - char *passphrase) +SilcBool silc_pkcs_load_public_key(const char *filename, + SilcPublicKey *ret_public_key) { - SilcBuffer buf; - int ret = TRUE; + unsigned char *data; + SilcUInt32 data_len; + SilcPublicKey public_key; + SilcPKCSType type; + + SILC_LOG_DEBUG(("Loading public key file '%s'", filename)); + + if (!ret_public_key) + return FALSE; + + data = silc_file_readfile(filename, &data_len); + if (!data) + return FALSE; - buf = silc_buffer_alloc(strlen(pkcs->pkcs->name) + 2 + prv_len - + strlen(SILC_PKCS_PRIVATE_KEYFILE_BEGIN) - + strlen(SILC_PKCS_PRIVATE_KEYFILE_END)); - silc_buffer_pull_tail(buf, SILC_BUFFER_END(buf)); + /* Allocate public key context */ + *ret_public_key = public_key = silc_calloc(1, sizeof(*public_key)); + if (!public_key) { + silc_free(data); + return FALSE; + } + + /* Try loading all types until one succeeds. */ + for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) { + public_key->pkcs = silc_pkcs_find_pkcs(type); + if (!public_key->pkcs) + continue; - silc_buffer_format(buf, - SILC_STR_UI32_STRING(SILC_PKCS_PRIVATE_KEYFILE_BEGIN), - SILC_STR_UI32_STRING(pkcs->pkcs->name), - SILC_STR_UI_SHORT(prv_len), - SILC_STR_UI_XNSTRING(prv, prv_len), - SILC_STR_UI32_STRING(SILC_PKCS_PRIVATE_KEYFILE_END), - SILC_STR_END); + if (public_key->pkcs->import_public_key_file(data, data_len, + SILC_PKCS_FILE_BASE64, + &public_key->public_key)) { + silc_free(data); + return TRUE; + } - /* Save into a file */ - if (silc_file_write(filename, buf->data, buf->len)) { - ret = FALSE; - goto out; + if (public_key->pkcs->import_public_key_file(data, data_len, + SILC_PKCS_FILE_BIN, + &public_key->public_key)) { + silc_free(data); + return TRUE; + } } - out: - silc_buffer_free(buf); - return ret; + silc_free(data); + silc_free(public_key); + *ret_public_key = NULL; + return FALSE; } -/* Loads public key from file and allocates new PKCS object and - sets the loaded key into it. */ +/* Saves public key into a file */ -int silc_pkcs_load_public_key(char *filename, SilcPKCS *ret_pkcs) +SilcBool silc_pkcs_save_public_key(const char *filename, + SilcPublicKey public_key, + SilcPKCSFileEncoding encoding) { + unsigned char *data; + SilcUInt32 data_len; + + /* Export the public key file */ + data = public_key->pkcs->export_public_key_file(public_key->public_key, + encoding, &data_len); + if (!data) + return FALSE; + + /* Write to file */ + if (silc_file_writefile(filename, data, data_len)) { + silc_free(data); + return FALSE; + } + silc_free(data); return TRUE; } -/* Loads private key from file and allocates new PKCS object and - sets the loaded key into it. */ +/* Loads any kind of private key */ -int silc_pkcs_load_private_key(char *filename, SilcPKCS *ret_pkcs) +SilcBool silc_pkcs_load_private_key(const char *filename, + const unsigned char *passphrase, + SilcUInt32 passphrase_len, + SilcPrivateKey *ret_private_key) { + unsigned char *data; + SilcUInt32 data_len; + SilcPrivateKey private_key; + SilcPKCSType type; + + SILC_LOG_DEBUG(("Loading private key file '%s'", filename)); + + if (!ret_private_key) + return FALSE; + + data = silc_file_readfile(filename, &data_len); + if (!data) + return FALSE; + + /* Allocate private key context */ + *ret_private_key = private_key = silc_calloc(1, sizeof(*private_key)); + if (!private_key) { + silc_free(data); + return FALSE; + } + + /* Try loading all types until one succeeds. */ + for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) { + private_key->pkcs = silc_pkcs_find_pkcs(type); + if (!private_key->pkcs) + continue; + + if (private_key->pkcs->import_private_key_file( + data, data_len, + passphrase, + passphrase_len, + SILC_PKCS_FILE_BIN, + &private_key->private_key)) { + silc_free(data); + return TRUE; + } + + if (private_key->pkcs->import_private_key_file( + data, data_len, + passphrase, + passphrase_len, + SILC_PKCS_FILE_BASE64, + &private_key->private_key)) { + silc_free(data); + return TRUE; + } + } + + silc_free(data); + silc_free(private_key); + *ret_private_key = NULL; + return FALSE; +} + +/* Saves private key into a file */ + +SilcBool silc_pkcs_save_private_key(const char *filename, + SilcPrivateKey private_key, + const unsigned char *passphrase, + SilcUInt32 passphrase_len, + SilcPKCSFileEncoding encoding, + SilcRng rng) +{ + unsigned char *data; + SilcUInt32 data_len; + + /* Export the private key file */ + data = private_key->pkcs->export_private_key_file(private_key->private_key, + passphrase, + passphrase_len, + encoding, rng, &data_len); + if (!data) + return FALSE; + + /* Write to file */ + if (silc_file_writefile(filename, data, data_len)) { + silc_free(data); + return FALSE; + } + silc_free(data); return TRUE; }