summaryrefslogtreecommitdiff
path: root/usr.sbin/unbound/ldns/keys.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr.sbin/unbound/ldns/keys.c')
-rw-r--r--usr.sbin/unbound/ldns/keys.c1672
1 files changed, 0 insertions, 1672 deletions
diff --git a/usr.sbin/unbound/ldns/keys.c b/usr.sbin/unbound/ldns/keys.c
deleted file mode 100644
index 3772122afdd..00000000000
--- a/usr.sbin/unbound/ldns/keys.c
+++ /dev/null
@@ -1,1672 +0,0 @@
-/*
- * keys.c handle private keys for use in DNSSEC
- *
- * This module should hide some of the openSSL complexities
- * and give a general interface for private keys and hmac
- * handling
- *
- * (c) NLnet Labs, 2004-2006
- *
- * See the file LICENSE for the license
- */
-
-#include <ldns/config.h>
-
-#include <ldns/ldns.h>
-
-#ifdef HAVE_SSL
-#include <openssl/ssl.h>
-#include <openssl/engine.h>
-#include <openssl/rand.h>
-#endif /* HAVE_SSL */
-
-ldns_lookup_table ldns_signing_algorithms[] = {
- { LDNS_SIGN_RSAMD5, "RSAMD5" },
- { LDNS_SIGN_RSASHA1, "RSASHA1" },
- { LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
-#ifdef USE_SHA2
- { LDNS_SIGN_RSASHA256, "RSASHA256" },
- { LDNS_SIGN_RSASHA512, "RSASHA512" },
-#endif
-#ifdef USE_GOST
- { LDNS_SIGN_ECC_GOST, "ECC-GOST" },
-#endif
-#ifdef USE_ECDSA
- { LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
- { LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
-#endif
- { LDNS_SIGN_DSA, "DSA" },
- { LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
- { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
- { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
- { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
- { 0, NULL }
-};
-
-ldns_key_list *
-ldns_key_list_new()
-{
- ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
- if (!key_list) {
- return NULL;
- } else {
- key_list->_key_count = 0;
- key_list->_keys = NULL;
- return key_list;
- }
-}
-
-ldns_key *
-ldns_key_new()
-{
- ldns_key *newkey;
-
- newkey = LDNS_MALLOC(ldns_key);
- if (!newkey) {
- return NULL;
- } else {
- /* some defaults - not sure wether to do this */
- ldns_key_set_use(newkey, true);
- ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
- ldns_key_set_origttl(newkey, 0);
- ldns_key_set_keytag(newkey, 0);
- ldns_key_set_inception(newkey, 0);
- ldns_key_set_expiration(newkey, 0);
- ldns_key_set_pubkey_owner(newkey, NULL);
-#ifdef HAVE_SSL
- ldns_key_set_evp_key(newkey, NULL);
-#endif /* HAVE_SSL */
- ldns_key_set_hmac_key(newkey, NULL);
- ldns_key_set_external_key(newkey, NULL);
- return newkey;
- }
-}
-
-ldns_status
-ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
-{
- return ldns_key_new_frm_fp_l(k, fp, NULL);
-}
-
-#ifdef HAVE_SSL
-ldns_status
-ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
-{
- ldns_key *k;
-
- k = ldns_key_new();
- if(!k) return LDNS_STATUS_MEM_ERR;
-#ifndef S_SPLINT_S
- k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
- if(!k->_key.key) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
- ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
- if (!k->_key.key) {
- ldns_key_free(k);
- return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
- }
-#endif /* splint */
- *key = k;
- return LDNS_STATUS_OK;
-}
-#endif
-
-#ifdef USE_GOST
-/** store GOST engine reference loaded into OpenSSL library */
-ENGINE* ldns_gost_engine = NULL;
-
-int
-ldns_key_EVP_load_gost_id(void)
-{
- static int gost_id = 0;
- const EVP_PKEY_ASN1_METHOD* meth;
- ENGINE* e;
-
- if(gost_id) return gost_id;
-
- /* see if configuration loaded gost implementation from other engine*/
- meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
- if(meth) {
- EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
- return gost_id;
- }
-
- /* see if engine can be loaded already */
- e = ENGINE_by_id("gost");
- if(!e) {
- /* load it ourself, in case statically linked */
- ENGINE_load_builtin_engines();
- ENGINE_load_dynamic();
- e = ENGINE_by_id("gost");
- }
- if(!e) {
- /* no gost engine in openssl */
- return 0;
- }
- if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
- ENGINE_finish(e);
- ENGINE_free(e);
- return 0;
- }
-
- meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
- if(!meth) {
- /* algo not found */
- ENGINE_finish(e);
- ENGINE_free(e);
- return 0;
- }
- /* Note: do not ENGINE_finish and ENGINE_free the acquired engine
- * on some platforms this frees up the meth and unloads gost stuff */
- ldns_gost_engine = e;
-
- EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
- return gost_id;
-}
-
-void ldns_key_EVP_unload_gost(void)
-{
- if(ldns_gost_engine) {
- ENGINE_finish(ldns_gost_engine);
- ENGINE_free(ldns_gost_engine);
- ldns_gost_engine = NULL;
- }
-}
-
-/** read GOST private key */
-static EVP_PKEY*
-ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
-{
- char token[16384];
- const unsigned char* pp;
- int gost_id;
- EVP_PKEY* pkey;
- ldns_rdf* b64rdf = NULL;
-
- gost_id = ldns_key_EVP_load_gost_id();
- if(!gost_id)
- return NULL;
-
- if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
- sizeof(token), line_nr) == -1)
- return NULL;
- while(strlen(token) < 96) {
- /* read more b64 from the file, b64 split on multiple lines */
- if(ldns_fget_token_l(fp, token+strlen(token), "\n",
- sizeof(token)-strlen(token), line_nr) == -1)
- return NULL;
- }
- if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
- return NULL;
- pp = (unsigned char*)ldns_rdf_data(b64rdf);
- pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
- ldns_rdf_deep_free(b64rdf);
- return pkey;
-}
-#endif
-
-#ifdef USE_ECDSA
-/** calculate public key from private key */
-static int
-ldns_EC_KEY_calc_public(EC_KEY* ec)
-{
- EC_POINT* pub_key;
- const EC_GROUP* group;
- group = EC_KEY_get0_group(ec);
- pub_key = EC_POINT_new(group);
- if(!pub_key) return 0;
- if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
- EC_POINT_free(pub_key);
- return 0;
- }
- if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
- NULL, NULL, NULL)) {
- EC_POINT_free(pub_key);
- return 0;
- }
- if(EC_KEY_set_public_key(ec, pub_key) == 0) {
- EC_POINT_free(pub_key);
- return 0;
- }
- EC_POINT_free(pub_key);
- return 1;
-}
-
-/** read ECDSA private key */
-static EVP_PKEY*
-ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
-{
- char token[16384];
- ldns_rdf* b64rdf = NULL;
- unsigned char* pp;
- BIGNUM* bn;
- EVP_PKEY* evp_key;
- EC_KEY* ec;
- if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
- sizeof(token), line_nr) == -1)
- return NULL;
- if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
- return NULL;
- pp = (unsigned char*)ldns_rdf_data(b64rdf);
-
- if(alg == LDNS_ECDSAP256SHA256)
- ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
- else if(alg == LDNS_ECDSAP384SHA384)
- ec = EC_KEY_new_by_curve_name(NID_secp384r1);
- else ec = NULL;
- if(!ec) {
- ldns_rdf_deep_free(b64rdf);
- return NULL;
- }
- bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
- ldns_rdf_deep_free(b64rdf);
- if(!bn) {
- EC_KEY_free(ec);
- return NULL;
- }
- EC_KEY_set_private_key(ec, bn);
- BN_free(bn);
- if(!ldns_EC_KEY_calc_public(ec)) {
- EC_KEY_free(ec);
- return NULL;
- }
-
- evp_key = EVP_PKEY_new();
- if(!evp_key) {
- EC_KEY_free(ec);
- return NULL;
- }
- if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
- EVP_PKEY_free(evp_key);
- EC_KEY_free(ec);
- return NULL;
- }
- return evp_key;
-}
-#endif
-
-ldns_status
-ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
-{
- ldns_key *k;
- char *d;
- ldns_signing_algorithm alg;
- ldns_rr *key_rr;
-#ifdef HAVE_SSL
- RSA *rsa;
- DSA *dsa;
- unsigned char *hmac;
- size_t hmac_size;
-#endif /* HAVE_SSL */
-
- k = ldns_key_new();
-
- d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
- if (!k || !d) {
- ldns_key_free(k);
- LDNS_FREE(d);
- return LDNS_STATUS_MEM_ERR;
- }
-
- alg = 0;
-
- /* the file is highly structured. Do this in sequence */
- /* RSA:
- * Private-key-format: v1.x.
- * Algorithm: 1 (RSA)
-
- */
- /* get the key format version number */
- if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
- LDNS_MAX_LINELEN, line_nr) == -1) {
- /* no version information */
- ldns_key_free(k);
- LDNS_FREE(d);
- return LDNS_STATUS_SYNTAX_ERR;
- }
- if (strncmp(d, "v1.", 3) != 0) {
- ldns_key_free(k);
- LDNS_FREE(d);
- return LDNS_STATUS_SYNTAX_VERSION_ERR;
- }
-
- /* get the algorithm type, our file function strip ( ) so there are
- * not in the return string! */
- if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
- LDNS_MAX_LINELEN, line_nr) == -1) {
- /* no alg information */
- ldns_key_free(k);
- LDNS_FREE(d);
- return LDNS_STATUS_SYNTAX_ALG_ERR;
- }
-
- if (strncmp(d, "1 RSA", 2) == 0) {
- alg = LDNS_SIGN_RSAMD5;
- }
- if (strncmp(d, "2 DH", 2) == 0) {
- alg = (ldns_signing_algorithm)LDNS_DH;
- }
- if (strncmp(d, "3 DSA", 2) == 0) {
- alg = LDNS_SIGN_DSA;
- }
- if (strncmp(d, "4 ECC", 2) == 0) {
- alg = (ldns_signing_algorithm)LDNS_ECC;
- }
- if (strncmp(d, "5 RSASHA1", 2) == 0) {
- alg = LDNS_SIGN_RSASHA1;
- }
- if (strncmp(d, "6 DSA", 2) == 0) {
- alg = LDNS_SIGN_DSA_NSEC3;
- }
- if (strncmp(d, "7 RSASHA1", 2) == 0) {
- alg = LDNS_SIGN_RSASHA1_NSEC3;
- }
-
- if (strncmp(d, "8 RSASHA256", 2) == 0) {
-#ifdef USE_SHA2
- alg = LDNS_SIGN_RSASHA256;
-#else
- fprintf(stderr, "Warning: SHA256 not compiled into this ");
- fprintf(stderr, "version of ldns\n");
-#endif
- }
- if (strncmp(d, "10 RSASHA512", 3) == 0) {
-#ifdef USE_SHA2
- alg = LDNS_SIGN_RSASHA512;
-#else
- fprintf(stderr, "Warning: SHA512 not compiled into this ");
- fprintf(stderr, "version of ldns\n");
-#endif
- }
- if (strncmp(d, "12 ECC-GOST", 3) == 0) {
-#ifdef USE_GOST
- alg = LDNS_SIGN_ECC_GOST;
-#else
- fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
- fprintf(stderr, "version of ldns, use --enable-gost\n");
-#endif
- }
-#ifdef USE_ECDSA
- if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
- alg = LDNS_SIGN_ECDSAP256SHA256;
- }
- if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
- alg = LDNS_SIGN_ECDSAP384SHA384;
- }
-#endif
- if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
- alg = LDNS_SIGN_HMACMD5;
- }
- if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
- alg = LDNS_SIGN_HMACSHA1;
- }
- if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
- alg = LDNS_SIGN_HMACSHA256;
- }
-
- LDNS_FREE(d);
-
- switch(alg) {
- case LDNS_SIGN_RSAMD5:
- case LDNS_SIGN_RSASHA1:
- case LDNS_SIGN_RSASHA1_NSEC3:
-#ifdef USE_SHA2
- case LDNS_SIGN_RSASHA256:
- case LDNS_SIGN_RSASHA512:
-#endif
- ldns_key_set_algorithm(k, alg);
-#ifdef HAVE_SSL
- rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
- if (!rsa) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
- ldns_key_set_rsa_key(k, rsa);
- RSA_free(rsa);
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_DSA:
- case LDNS_SIGN_DSA_NSEC3:
- ldns_key_set_algorithm(k, alg);
-#ifdef HAVE_SSL
- dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
- if (!dsa) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
- ldns_key_set_dsa_key(k, dsa);
- DSA_free(dsa);
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_HMACMD5:
- case LDNS_SIGN_HMACSHA1:
- case LDNS_SIGN_HMACSHA256:
- ldns_key_set_algorithm(k, alg);
-#ifdef HAVE_SSL
- hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
- if (!hmac) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
- ldns_key_set_hmac_size(k, hmac_size);
- ldns_key_set_hmac_key(k, hmac);
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_ECC_GOST:
- ldns_key_set_algorithm(k, alg);
-#if defined(HAVE_SSL) && defined(USE_GOST)
- if(!ldns_key_EVP_load_gost_id()) {
- ldns_key_free(k);
- return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
- }
- ldns_key_set_evp_key(k,
- ldns_key_new_frm_fp_gost_l(fp, line_nr));
-#ifndef S_SPLINT_S
- if(!k->_key.key) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
-#endif /* splint */
-#endif
- break;
-#ifdef USE_ECDSA
- case LDNS_SIGN_ECDSAP256SHA256:
- case LDNS_SIGN_ECDSAP384SHA384:
- ldns_key_set_algorithm(k, alg);
- ldns_key_set_evp_key(k,
- ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
-#ifndef S_SPLINT_S
- if(!k->_key.key) {
- ldns_key_free(k);
- return LDNS_STATUS_ERR;
- }
-#endif /* splint */
- break;
-#endif
- default:
- ldns_key_free(k);
- return LDNS_STATUS_SYNTAX_ALG_ERR;
- }
- key_rr = ldns_key2rr(k);
- ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
- ldns_rr_free(key_rr);
-
- if (key) {
- *key = k;
- return LDNS_STATUS_OK;
- }
- return LDNS_STATUS_ERR;
-}
-
-#ifdef HAVE_SSL
-RSA *
-ldns_key_new_frm_fp_rsa(FILE *f)
-{
- return ldns_key_new_frm_fp_rsa_l(f, NULL);
-}
-
-RSA *
-ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
-{
- /* we parse
- * Modulus:
- * PublicExponent:
- * PrivateExponent:
- * Prime1:
- * Prime2:
- * Exponent1:
- * Exponent2:
- * Coefficient:
- *
- * man 3 RSA:
- *
- * struct
- * {
- * BIGNUM *n; // public modulus
- * BIGNUM *e; // public exponent
- * BIGNUM *d; // private exponent
- * BIGNUM *p; // secret prime factor
- * BIGNUM *q; // secret prime factor
- * BIGNUM *dmp1; // d mod (p-1)
- * BIGNUM *dmq1; // d mod (q-1)
- * BIGNUM *iqmp; // q^-1 mod p
- * // ...
- *
- */
- char *d;
- RSA *rsa;
- uint8_t *buf;
- int i;
-
- d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
- buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
- rsa = RSA_new();
- if (!d || !rsa || !buf) {
- goto error;
- }
-
- /* I could use functions again, but that seems an overkill,
- * allthough this also looks tedious
- */
-
- /* Modules, rsa->n */
- if (ldns_fget_keyword_data_l(f, "Modulus", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
-#ifndef S_SPLINT_S
- rsa->n = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->n) {
- goto error;
- }
-
- /* PublicExponent, rsa->e */
- if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->e = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->e) {
- goto error;
- }
-
- /* PrivateExponent, rsa->d */
- if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->d = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->d) {
- goto error;
- }
-
- /* Prime1, rsa->p */
- if (ldns_fget_keyword_data_l(f, "Prime1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->p) {
- goto error;
- }
-
- /* Prime2, rsa->q */
- if (ldns_fget_keyword_data_l(f, "Prime2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->q) {
- goto error;
- }
-
- /* Exponent1, rsa->dmp1 */
- if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->dmp1) {
- goto error;
- }
-
- /* Exponent2, rsa->dmq1 */
- if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->dmq1) {
- goto error;
- }
-
- /* Coefficient, rsa->iqmp */
- if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- rsa->iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!rsa->iqmp) {
- goto error;
- }
-#endif /* splint */
-
- LDNS_FREE(buf);
- LDNS_FREE(d);
- return rsa;
-
-error:
- RSA_free(rsa);
- LDNS_FREE(d);
- LDNS_FREE(buf);
- return NULL;
-}
-
-DSA *
-ldns_key_new_frm_fp_dsa(FILE *f)
-{
- return ldns_key_new_frm_fp_dsa_l(f, NULL);
-}
-
-DSA *
-ldns_key_new_frm_fp_dsa_l(FILE *f, int *line_nr)
-{
- int i;
- char *d;
- DSA *dsa;
- uint8_t *buf;
-
- line_nr = line_nr;
-
- d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
- buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
- dsa = DSA_new();
- if (!d || !dsa || !buf) {
- goto error;
- }
-
- /* the line parser removes the () from the input... */
-
- /* Prime, dsa->p */
- if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
-#ifndef S_SPLINT_S
- dsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!dsa->p) {
- goto error;
- }
-
- /* Subprime, dsa->q */
- if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- dsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!dsa->q) {
- goto error;
- }
-
- /* Base, dsa->g */
- if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- dsa->g = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!dsa->g) {
- goto error;
- }
-
- /* Private key, dsa->priv_key */
- if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- dsa->priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!dsa->priv_key) {
- goto error;
- }
-
- /* Public key, dsa->priv_key */
- if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
- dsa->pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
- if (!dsa->pub_key) {
- goto error;
- }
-#endif /* splint */
-
- LDNS_FREE(buf);
- LDNS_FREE(d);
-
- return dsa;
-
-error:
- LDNS_FREE(d);
- LDNS_FREE(buf);
- DSA_free(dsa);
- return NULL;
-}
-
-unsigned char *
-ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
-{
- return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
-}
-
-unsigned char *
-ldns_key_new_frm_fp_hmac_l(FILE *f, int *line_nr, size_t *hmac_size)
-{
- size_t i;
- char *d;
- unsigned char *buf;
-
- line_nr = line_nr;
-
- d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
- buf = LDNS_XMALLOC(unsigned char, LDNS_MAX_LINELEN);
- if(!d || !buf) {
- goto error;
- }
-
- if (ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
- goto error;
- }
- i = (size_t) ldns_b64_pton((const char*)d,
- buf,
- ldns_b64_ntop_calculate_size(strlen(d)));
-
- *hmac_size = i;
- return buf;
-
- error:
- LDNS_FREE(d);
- LDNS_FREE(buf);
- *hmac_size = 0;
- return NULL;
-}
-#endif /* HAVE_SSL */
-
-#ifdef USE_GOST
-static EVP_PKEY*
-ldns_gen_gost_key(void)
-{
- EVP_PKEY_CTX* ctx;
- EVP_PKEY* p = NULL;
- int gost_id = ldns_key_EVP_load_gost_id();
- if(!gost_id)
- return NULL;
- ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
- if(!ctx) {
- /* the id should be available now */
- return NULL;
- }
- if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
- /* cannot set paramset */
- EVP_PKEY_CTX_free(ctx);
- return NULL;
- }
-
- if(EVP_PKEY_keygen_init(ctx) <= 0) {
- EVP_PKEY_CTX_free(ctx);
- return NULL;
- }
- if(EVP_PKEY_keygen(ctx, &p) <= 0) {
- EVP_PKEY_free(p);
- EVP_PKEY_CTX_free(ctx);
- return NULL;
- }
- EVP_PKEY_CTX_free(ctx);
- return p;
-}
-#endif
-
-ldns_key *
-ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
-{
- ldns_key *k;
-#ifdef HAVE_SSL
- DSA *d;
- RSA *r;
-# ifdef USE_ECDSA
- EC_KEY *ec = NULL;
-# endif
-#else
- int i;
- uint16_t offset = 0;
-#endif
- unsigned char *hmac;
-
- k = ldns_key_new();
- if (!k) {
- return NULL;
- }
- switch(alg) {
- case LDNS_SIGN_RSAMD5:
- case LDNS_SIGN_RSASHA1:
- case LDNS_SIGN_RSASHA1_NSEC3:
- case LDNS_SIGN_RSASHA256:
- case LDNS_SIGN_RSASHA512:
-#ifdef HAVE_SSL
- r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
- if(!r) {
- ldns_key_free(k);
- return NULL;
- }
- if (RSA_check_key(r) != 1) {
- ldns_key_free(k);
- return NULL;
- }
- ldns_key_set_rsa_key(k, r);
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_DSA:
- case LDNS_SIGN_DSA_NSEC3:
-#ifdef HAVE_SSL
- d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
- if (!d) {
- ldns_key_free(k);
- return NULL;
- }
- if (DSA_generate_key(d) != 1) {
- ldns_key_free(k);
- return NULL;
- }
- ldns_key_set_dsa_key(k, d);
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_HMACMD5:
- case LDNS_SIGN_HMACSHA1:
- case LDNS_SIGN_HMACSHA256:
-#ifdef HAVE_SSL
-#ifndef S_SPLINT_S
- k->_key.key = NULL;
-#endif /* splint */
-#endif /* HAVE_SSL */
- size = size / 8;
- ldns_key_set_hmac_size(k, size);
-
- hmac = LDNS_XMALLOC(unsigned char, size);
- if(!hmac) {
- ldns_key_free(k);
- return NULL;
- }
-#ifdef HAVE_SSL
- if (RAND_bytes(hmac, (int) size) != 1) {
- LDNS_FREE(hmac);
- ldns_key_free(k);
- return NULL;
- }
-#else
- while (offset + sizeof(i) < size) {
- i = random();
- memcpy(&hmac[offset], &i, sizeof(i));
- offset += sizeof(i);
- }
- if (offset < size) {
- i = random();
- memcpy(&hmac[offset], &i, size - offset);
- }
-#endif /* HAVE_SSL */
- ldns_key_set_hmac_key(k, hmac);
-
- ldns_key_set_flags(k, 0);
- break;
- case LDNS_SIGN_ECC_GOST:
-#if defined(HAVE_SSL) && defined(USE_GOST)
- ldns_key_set_evp_key(k, ldns_gen_gost_key());
-#ifndef S_SPLINT_S
- if(!k->_key.key) {
- ldns_key_free(k);
- return NULL;
- }
-#endif /* splint */
-#endif /* HAVE_SSL and USE_GOST */
- break;
-#ifdef USE_ECDSA
- case LDNS_SIGN_ECDSAP256SHA256:
- case LDNS_SIGN_ECDSAP384SHA384:
- if(alg == LDNS_SIGN_ECDSAP256SHA256)
- ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
- else if(alg == LDNS_SIGN_ECDSAP384SHA384)
- ec = EC_KEY_new_by_curve_name(NID_secp384r1);
- if(!ec) {
- ldns_key_free(k);
- return NULL;
- }
- if(!EC_KEY_generate_key(ec)) {
- ldns_key_free(k);
- EC_KEY_free(ec);
- return NULL;
- }
-#ifndef S_SPLINT_S
- k->_key.key = EVP_PKEY_new();
- if(!k->_key.key) {
- ldns_key_free(k);
- EC_KEY_free(ec);
- return NULL;
- }
- if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
- ldns_key_free(k);
- EC_KEY_free(ec);
- return NULL;
- }
-#endif /* splint */
- break;
-#endif
- }
- ldns_key_set_algorithm(k, alg);
- return k;
-}
-
-void
-ldns_key_print(FILE *output, const ldns_key *k)
-{
- char *str = ldns_key2str(k);
- if (str) {
- fprintf(output, "%s", str);
- } else {
- fprintf(output, "Unable to convert private key to string\n");
- }
- LDNS_FREE(str);
-}
-
-
-void
-ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
-{
- k->_alg = l;
-}
-
-void
-ldns_key_set_flags(ldns_key *k, uint16_t f)
-{
- k->_extra.dnssec.flags = f;
-}
-
-#ifdef HAVE_SSL
-#ifndef S_SPLINT_S
-void
-ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
-{
- k->_key.key = e;
-}
-
-void
-ldns_key_set_rsa_key(ldns_key *k, RSA *r)
-{
- EVP_PKEY *key = EVP_PKEY_new();
- EVP_PKEY_set1_RSA(key, r);
- k->_key.key = key;
-}
-
-void
-ldns_key_set_dsa_key(ldns_key *k, DSA *d)
-{
- EVP_PKEY *key = EVP_PKEY_new();
- EVP_PKEY_set1_DSA(key, d);
- k->_key.key = key;
-}
-#endif /* splint */
-#endif /* HAVE_SSL */
-
-void
-ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
-{
- k->_key.hmac.key = hmac;
-}
-
-void
-ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
-{
- k->_key.hmac.size = hmac_size;
-}
-
-void
-ldns_key_set_external_key(ldns_key *k, void *external_key)
-{
- k->_key.external_key = external_key;
-}
-
-void
-ldns_key_set_origttl(ldns_key *k, uint32_t t)
-{
- k->_extra.dnssec.orig_ttl = t;
-}
-
-void
-ldns_key_set_inception(ldns_key *k, uint32_t i)
-{
- k->_extra.dnssec.inception = i;
-}
-
-void
-ldns_key_set_expiration(ldns_key *k, uint32_t e)
-{
- k->_extra.dnssec.expiration = e;
-}
-
-void
-ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
-{
- k->_pubkey_owner = r;
-}
-
-void
-ldns_key_set_keytag(ldns_key *k, uint16_t tag)
-{
- k->_extra.dnssec.keytag = tag;
-}
-
-/* read */
-size_t
-ldns_key_list_key_count(const ldns_key_list *key_list)
-{
- return key_list->_key_count;
-}
-
-ldns_key *
-ldns_key_list_key(const ldns_key_list *key, size_t nr)
-{
- if (nr < ldns_key_list_key_count(key)) {
- return key->_keys[nr];
- } else {
- return NULL;
- }
-}
-
-ldns_signing_algorithm
-ldns_key_algorithm(const ldns_key *k)
-{
- return k->_alg;
-}
-
-void
-ldns_key_set_use(ldns_key *k, bool v)
-{
- if (k) {
- k->_use = v;
- }
-}
-
-bool
-ldns_key_use(const ldns_key *k)
-{
- if (k) {
- return k->_use;
- }
- return false;
-}
-
-#ifdef HAVE_SSL
-#ifndef S_SPLINT_S
-EVP_PKEY *
-ldns_key_evp_key(const ldns_key *k)
-{
- return k->_key.key;
-}
-
-RSA *
-ldns_key_rsa_key(const ldns_key *k)
-{
- if (k->_key.key) {
- return EVP_PKEY_get1_RSA(k->_key.key);
- } else {
- return NULL;
- }
-}
-
-DSA *
-ldns_key_dsa_key(const ldns_key *k)
-{
- if (k->_key.key) {
- return EVP_PKEY_get1_DSA(k->_key.key);
- } else {
- return NULL;
- }
-}
-#endif /* splint */
-#endif /* HAVE_SSL */
-
-unsigned char *
-ldns_key_hmac_key(const ldns_key *k)
-{
- if (k->_key.hmac.key) {
- return k->_key.hmac.key;
- } else {
- return NULL;
- }
-}
-
-size_t
-ldns_key_hmac_size(const ldns_key *k)
-{
- if (k->_key.hmac.size) {
- return k->_key.hmac.size;
- } else {
- return 0;
- }
-}
-
-void *
-ldns_key_external_key(const ldns_key *k)
-{
- return k->_key.external_key;
-}
-
-uint32_t
-ldns_key_origttl(const ldns_key *k)
-{
- return k->_extra.dnssec.orig_ttl;
-}
-
-uint16_t
-ldns_key_flags(const ldns_key *k)
-{
- return k->_extra.dnssec.flags;
-}
-
-uint32_t
-ldns_key_inception(const ldns_key *k)
-{
- return k->_extra.dnssec.inception;
-}
-
-uint32_t
-ldns_key_expiration(const ldns_key *k)
-{
- return k->_extra.dnssec.expiration;
-}
-
-uint16_t
-ldns_key_keytag(const ldns_key *k)
-{
- return k->_extra.dnssec.keytag;
-}
-
-ldns_rdf *
-ldns_key_pubkey_owner(const ldns_key *k)
-{
- return k->_pubkey_owner;
-}
-
-/* write */
-void
-ldns_key_list_set_use(ldns_key_list *keys, bool v)
-{
- size_t i;
-
- for (i = 0; i < ldns_key_list_key_count(keys); i++) {
- ldns_key_set_use(ldns_key_list_key(keys, i), v);
- }
-}
-
-void
-ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
-{
- key->_key_count = count;
-}
-
-bool
-ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
-{
- size_t key_count;
- ldns_key **keys;
-
- key_count = ldns_key_list_key_count(key_list);
-
- /* grow the array */
- keys = LDNS_XREALLOC(
- key_list->_keys, ldns_key *, key_count + 1);
- if (!keys) {
- return false;
- }
-
- /* add the new member */
- key_list->_keys = keys;
- key_list->_keys[key_count] = key;
-
- ldns_key_list_set_key_count(key_list, key_count + 1);
- return true;
-}
-
-ldns_key *
-ldns_key_list_pop_key(ldns_key_list *key_list)
-{
- size_t key_count;
- ldns_key** a;
- ldns_key *pop;
-
- if (!key_list) {
- return NULL;
- }
-
- key_count = ldns_key_list_key_count(key_list);
- if (key_count == 0) {
- return NULL;
- }
-
- pop = ldns_key_list_key(key_list, key_count);
-
- /* shrink the array */
- a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
- if(a) {
- key_list->_keys = a;
- }
-
- ldns_key_list_set_key_count(key_list, key_count - 1);
-
- return pop;
-}
-
-#ifdef HAVE_SSL
-#ifndef S_SPLINT_S
-/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
-static bool
-ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
-{
- int i,j;
-
- if (!k) {
- return false;
- }
-
- if (BN_num_bytes(k->e) <= 256) {
- /* normally only this path is executed (small factors are
- * more common
- */
- data[0] = (unsigned char) BN_num_bytes(k->e);
- i = BN_bn2bin(k->e, data + 1);
- j = BN_bn2bin(k->n, data + i + 1);
- *size = (uint16_t) i + j;
- } else if (BN_num_bytes(k->e) <= 65536) {
- data[0] = 0;
- /* BN_bn2bin does bigendian, _uint16 also */
- ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(k->e));
-
- BN_bn2bin(k->e, data + 3);
- BN_bn2bin(k->n, data + 4 + BN_num_bytes(k->e));
- *size = (uint16_t) BN_num_bytes(k->n) + 6;
- } else {
- return false;
- }
- return true;
-}
-
-/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
-static bool
-ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
-{
- uint8_t T;
-
- if (!k) {
- return false;
- }
-
- /* See RFC2536 */
- *size = (uint16_t)BN_num_bytes(k->g);
- T = (*size - 64) / 8;
- memcpy(data, &T, 1);
-
- if (T > 8) {
- fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
- fprintf(stderr, " not implemented\n");
- return false;
- }
-
- /* size = 64 + (T * 8); */
- data[0] = (unsigned char)T;
- BN_bn2bin(k->q, data + 1 ); /* 20 octects */
- BN_bn2bin(k->p, data + 21 ); /* offset octects */
- BN_bn2bin(k->g, data + 21 + *size); /* offset octets */
- BN_bn2bin(k->pub_key, data + 21 + *size + *size); /* offset octets */
- *size = 21 + (*size * 3);
- return true;
-}
-
-#ifdef USE_GOST
-static bool
-ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
-{
- int i;
- unsigned char* pp = NULL;
- if(i2d_PUBKEY(k, &pp) != 37 + 64) {
- /* expect 37 byte(ASN header) and 64 byte(X and Y) */
- CRYPTO_free(pp);
- return false;
- }
- /* omit ASN header */
- for(i=0; i<64; i++)
- data[i] = pp[i+37];
- CRYPTO_free(pp);
- *size = 64;
- return true;
-}
-#endif /* USE_GOST */
-#endif /* splint */
-#endif /* HAVE_SSL */
-
-ldns_rr *
-ldns_key2rr(const ldns_key *k)
-{
- /* this function will convert a the keydata contained in
- * rsa/dsa pointers to a DNSKEY rr. It will fill in as
- * much as it can, but it does not know about key-flags
- * for instance
- */
- ldns_rr *pubkey;
- ldns_rdf *keybin;
- unsigned char *bin = NULL;
- uint16_t size = 0;
-#ifdef HAVE_SSL
- RSA *rsa = NULL;
- DSA *dsa = NULL;
-#endif /* HAVE_SSL */
-#ifdef USE_ECDSA
- EC_KEY* ec;
-#endif
- int internal_data = 0;
-
- pubkey = ldns_rr_new();
- if (!k) {
- return NULL;
- }
-
- switch (ldns_key_algorithm(k)) {
- case LDNS_SIGN_HMACMD5:
- case LDNS_SIGN_HMACSHA1:
- case LDNS_SIGN_HMACSHA256:
- ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
- break;
- default:
- ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
- break;
- }
- /* zero-th rdf - flags */
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
- ldns_key_flags(k)));
- /* first - proto */
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
-
- if (ldns_key_pubkey_owner(k)) {
- ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
- }
-
- /* third - da algorithm */
- switch(ldns_key_algorithm(k)) {
- case LDNS_SIGN_RSAMD5:
- case LDNS_SIGN_RSASHA1:
- case LDNS_SIGN_RSASHA1_NSEC3:
- case LDNS_SIGN_RSASHA256:
- case LDNS_SIGN_RSASHA512:
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
-#ifdef HAVE_SSL
- rsa = ldns_key_rsa_key(k);
- if (rsa) {
- bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
- if (!bin) {
- ldns_rr_free(pubkey);
- return NULL;
- }
- if (!ldns_key_rsa2bin(bin, rsa, &size)) {
- LDNS_FREE(bin);
- ldns_rr_free(pubkey);
- return NULL;
- }
- RSA_free(rsa);
- internal_data = 1;
- }
-#endif
- size++;
- break;
- case LDNS_SIGN_DSA:
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
-#ifdef HAVE_SSL
- dsa = ldns_key_dsa_key(k);
- if (dsa) {
- bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
- if (!bin) {
- ldns_rr_free(pubkey);
- return NULL;
- }
- if (!ldns_key_dsa2bin(bin, dsa, &size)) {
- LDNS_FREE(bin);
- ldns_rr_free(pubkey);
- return NULL;
- }
- DSA_free(dsa);
- internal_data = 1;
- }
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_DSA_NSEC3:
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
-#ifdef HAVE_SSL
- dsa = ldns_key_dsa_key(k);
- if (dsa) {
- bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
- if (!bin) {
- ldns_rr_free(pubkey);
- return NULL;
- }
- if (!ldns_key_dsa2bin(bin, dsa, &size)) {
- LDNS_FREE(bin);
- ldns_rr_free(pubkey);
- return NULL;
- }
- DSA_free(dsa);
- internal_data = 1;
- }
-#endif /* HAVE_SSL */
- break;
- case LDNS_SIGN_ECC_GOST:
- ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
- LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
-#if defined(HAVE_SSL) && defined(USE_GOST)
- bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
- if (!bin) {
- ldns_rr_free(pubkey);
- return NULL;
- }
-#ifndef S_SPLINT_S
- if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
- LDNS_FREE(bin);
- ldns_rr_free(pubkey);
- return NULL;
- }
-#endif /* splint */
- internal_data = 1;
-#endif /* HAVE_SSL and USE_GOST */
- break;
-#ifdef USE_ECDSA
- case LDNS_SIGN_ECDSAP256SHA256:
- case LDNS_SIGN_ECDSAP384SHA384:
- ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
- LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
- bin = NULL;
-#ifndef S_SPLINT_S
- ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
-#endif
- EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
- size = (uint16_t)i2o_ECPublicKey(ec, NULL);
- if(!i2o_ECPublicKey(ec, &bin)) {
- EC_KEY_free(ec);
- ldns_rr_free(pubkey);
- return NULL;
- }
- if(size > 1) {
- /* move back one byte to shave off the 0x02
- * 'uncompressed' indicator that openssl made
- * Actually its 0x04 (from implementation).
- */
- assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
- size -= 1;
- memmove(bin, bin+1, size);
- }
- /* down the reference count for ec, its still assigned
- * to the pkey */
- EC_KEY_free(ec);
- internal_data = 1;
- break;
-#endif
- case LDNS_SIGN_HMACMD5:
- case LDNS_SIGN_HMACSHA1:
- case LDNS_SIGN_HMACSHA256:
- bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
- if (!bin) {
- ldns_rr_free(pubkey);
- return NULL;
- }
- ldns_rr_push_rdf(pubkey,
- ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
- ldns_key_algorithm(k)));
- size = ldns_key_hmac_size(k);
- memcpy(bin, ldns_key_hmac_key(k), size);
- internal_data = 1;
- break;
- }
- /* fourth the key bin material */
- if (internal_data) {
- keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
- LDNS_FREE(bin);
- ldns_rr_push_rdf(pubkey, keybin);
- }
- return pubkey;
-}
-
-void
-ldns_key_free(ldns_key *key)
-{
- LDNS_FREE(key);
-}
-
-void
-ldns_key_deep_free(ldns_key *key)
-{
- if (ldns_key_pubkey_owner(key)) {
- ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
- }
-#ifdef HAVE_SSL
- if (ldns_key_evp_key(key)) {
- EVP_PKEY_free(ldns_key_evp_key(key));
- }
-#endif /* HAVE_SSL */
- if (ldns_key_hmac_key(key)) {
- free(ldns_key_hmac_key(key));
- }
- LDNS_FREE(key);
-}
-
-void
-ldns_key_list_free(ldns_key_list *key_list)
-{
- size_t i;
- for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
- ldns_key_deep_free(ldns_key_list_key(key_list, i));
- }
- LDNS_FREE(key_list->_keys);
- LDNS_FREE(key_list);
-}
-
-ldns_rr *
-ldns_read_anchor_file(const char *filename)
-{
- FILE *fp;
- /*char line[LDNS_MAX_PACKETLEN];*/
- char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
- int c;
- size_t i = 0;
- ldns_rr *r;
- ldns_status status;
- if(!line) {
- return NULL;
- }
-
- fp = fopen(filename, "r");
- if (!fp) {
- fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
- LDNS_FREE(line);
- return NULL;
- }
-
- while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
- line[i] = c;
- i++;
- }
- line[i] = '\0';
-
- fclose(fp);
-
- if (i <= 0) {
- fprintf(stderr, "nothing read from %s", filename);
- LDNS_FREE(line);
- return NULL;
- } else {
- status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
- if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
- LDNS_FREE(line);
- return r;
- } else {
- fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
- LDNS_FREE(line);
- return NULL;
- }
- }
-}
-
-char *
-ldns_key_get_file_base_name(ldns_key *key)
-{
- ldns_buffer *buffer;
- char *file_base_name;
-
- buffer = ldns_buffer_new(255);
- ldns_buffer_printf(buffer, "K");
- (void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
- ldns_buffer_printf(buffer,
- "+%03u+%05u",
- ldns_key_algorithm(key),
- ldns_key_keytag(key));
- file_base_name = strdup(ldns_buffer_export(buffer));
- ldns_buffer_free(buffer);
- return file_base_name;
-}
-
-int ldns_key_algo_supported(int algo)
-{
- ldns_lookup_table *lt = ldns_signing_algorithms;
- while(lt->name) {
- if(lt->id == algo)
- return 1;
- lt++;
- }
- return 0;
-}
-
-ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
-{
- /* list of (signing algorithm id, alias_name) */
- ldns_lookup_table aliases[] = {
- /* from bind dnssec-keygen */
- {LDNS_SIGN_HMACMD5, "HMAC-MD5"},
- {LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
- {LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
- /* old ldns usage, now RFC names */
- {LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
- {LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
-#ifdef USE_GOST
- {LDNS_SIGN_ECC_GOST, "GOST"},
-#endif
- /* compat with possible output */
- {LDNS_DH, "DH"},
- {LDNS_ECC, "ECC"},
- {LDNS_INDIRECT, "INDIRECT"},
- {LDNS_PRIVATEDNS, "PRIVATEDNS"},
- {LDNS_PRIVATEOID, "PRIVATEOID"},
- {0, NULL}};
- ldns_lookup_table* lt = ldns_signing_algorithms;
- while(lt->name) {
- if(strcasecmp(lt->name, name) == 0)
- return lt->id;
- lt++;
- }
- lt = aliases;
- while(lt->name) {
- if(strcasecmp(lt->name, name) == 0)
- return lt->id;
- lt++;
- }
- if(atoi(name) != 0)
- return atoi(name);
- return 0;
-}