Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/contrib/ldns/keys.c
39478 views
1
/*
2
* keys.c handle private keys for use in DNSSEC
3
*
4
* This module should hide some of the openSSL complexities
5
* and give a general interface for private keys and hmac
6
* handling
7
*
8
* (c) NLnet Labs, 2004-2006
9
*
10
* See the file LICENSE for the license
11
*/
12
13
#include <ldns/config.h>
14
15
#include <ldns/ldns.h>
16
17
#ifdef HAVE_SSL
18
#include <openssl/ui.h>
19
#include <openssl/ssl.h>
20
#include <openssl/rand.h>
21
#include <openssl/bn.h>
22
#include <openssl/rsa.h>
23
#ifdef USE_DSA
24
#include <openssl/dsa.h>
25
#endif
26
#ifndef OPENSSL_NO_ENGINE
27
#include <openssl/engine.h>
28
#endif
29
#endif /* HAVE_SSL */
30
31
ldns_lookup_table ldns_signing_algorithms[] = {
32
{ LDNS_SIGN_RSAMD5, "RSAMD5" },
33
{ LDNS_SIGN_RSASHA1, "RSASHA1" },
34
{ LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
35
#ifdef USE_SHA2
36
{ LDNS_SIGN_RSASHA256, "RSASHA256" },
37
{ LDNS_SIGN_RSASHA512, "RSASHA512" },
38
#endif
39
#ifdef USE_GOST
40
{ LDNS_SIGN_ECC_GOST, "ECC-GOST" },
41
#endif
42
#ifdef USE_ECDSA
43
{ LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
44
{ LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
45
#endif
46
#ifdef USE_ED25519
47
{ LDNS_SIGN_ED25519, "ED25519" },
48
#endif
49
#ifdef USE_ED448
50
{ LDNS_SIGN_ED448, "ED448" },
51
#endif
52
#ifdef USE_DSA
53
{ LDNS_SIGN_DSA, "DSA" },
54
{ LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
55
#endif
56
{ LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
57
{ LDNS_SIGN_HMACSHA1, "hmac-sha1" },
58
{ LDNS_SIGN_HMACSHA256, "hmac-sha256" },
59
{ LDNS_SIGN_HMACSHA224, "hmac-sha224" },
60
{ LDNS_SIGN_HMACSHA384, "hmac-sha384" },
61
{ LDNS_SIGN_HMACSHA512, "hmac-sha512" },
62
{ 0, NULL }
63
};
64
65
ldns_key_list *
66
ldns_key_list_new(void)
67
{
68
ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
69
if (!key_list) {
70
return NULL;
71
} else {
72
key_list->_key_count = 0;
73
key_list->_keys = NULL;
74
return key_list;
75
}
76
}
77
78
ldns_key *
79
ldns_key_new(void)
80
{
81
ldns_key *newkey;
82
83
newkey = LDNS_MALLOC(ldns_key);
84
if (!newkey) {
85
return NULL;
86
} else {
87
/* some defaults - not sure whether to do this */
88
ldns_key_set_use(newkey, true);
89
ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
90
ldns_key_set_origttl(newkey, 0);
91
ldns_key_set_keytag(newkey, 0);
92
ldns_key_set_inception(newkey, 0);
93
ldns_key_set_expiration(newkey, 0);
94
ldns_key_set_pubkey_owner(newkey, NULL);
95
#ifdef HAVE_SSL
96
ldns_key_set_evp_key(newkey, NULL);
97
#endif /* HAVE_SSL */
98
ldns_key_set_hmac_key(newkey, NULL);
99
ldns_key_set_external_key(newkey, NULL);
100
return newkey;
101
}
102
}
103
104
ldns_status
105
ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
106
{
107
return ldns_key_new_frm_fp_l(k, fp, NULL);
108
}
109
110
#if defined(HAVE_SSL) && !defined(OPENSSL_NO_ENGINE)
111
ldns_status
112
ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
113
{
114
ldns_key *k;
115
116
k = ldns_key_new();
117
if(!k) return LDNS_STATUS_MEM_ERR;
118
#ifndef S_SPLINT_S
119
k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
120
if(!k->_key.key) {
121
ldns_key_free(k);
122
return LDNS_STATUS_ERR;
123
}
124
ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
125
if (!k->_key.key) {
126
ldns_key_free(k);
127
return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
128
}
129
#endif /* splint */
130
*key = k;
131
return LDNS_STATUS_OK;
132
}
133
#endif
134
135
#ifdef USE_GOST
136
/** store GOST engine reference loaded into OpenSSL library */
137
ENGINE* ldns_gost_engine = NULL;
138
139
int
140
ldns_key_EVP_load_gost_id(void)
141
{
142
static int gost_id = 0;
143
const EVP_PKEY_ASN1_METHOD* meth;
144
ENGINE* e;
145
146
if(gost_id) return gost_id;
147
148
/* see if configuration loaded gost implementation from other engine*/
149
meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
150
if(meth) {
151
EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
152
return gost_id;
153
}
154
155
/* see if engine can be loaded already */
156
e = ENGINE_by_id("gost");
157
if(!e) {
158
/* load it ourself, in case statically linked */
159
ENGINE_load_builtin_engines();
160
ENGINE_load_dynamic();
161
e = ENGINE_by_id("gost");
162
}
163
if(!e) {
164
/* no gost engine in openssl */
165
return 0;
166
}
167
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
168
ENGINE_finish(e);
169
ENGINE_free(e);
170
return 0;
171
}
172
173
meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
174
if(!meth) {
175
/* algo not found */
176
ENGINE_finish(e);
177
ENGINE_free(e);
178
return 0;
179
}
180
/* Note: do not ENGINE_finish and ENGINE_free the acquired engine
181
* on some platforms this frees up the meth and unloads gost stuff */
182
ldns_gost_engine = e;
183
184
EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
185
return gost_id;
186
}
187
188
void ldns_key_EVP_unload_gost(void)
189
{
190
if(ldns_gost_engine) {
191
ENGINE_finish(ldns_gost_engine);
192
ENGINE_free(ldns_gost_engine);
193
ldns_gost_engine = NULL;
194
}
195
}
196
197
/** read GOST private key */
198
static EVP_PKEY*
199
ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
200
{
201
char token[16384];
202
const unsigned char* pp;
203
int gost_id;
204
EVP_PKEY* pkey;
205
ldns_rdf* b64rdf = NULL;
206
207
gost_id = ldns_key_EVP_load_gost_id();
208
if(!gost_id)
209
return NULL;
210
211
if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
212
sizeof(token), line_nr) == -1)
213
return NULL;
214
while(strlen(token) < 96) {
215
/* read more b64 from the file, b64 split on multiple lines */
216
if(ldns_fget_token_l(fp, token+strlen(token), "\n",
217
sizeof(token)-strlen(token), line_nr) == -1)
218
return NULL;
219
}
220
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
221
return NULL;
222
pp = (unsigned char*)ldns_rdf_data(b64rdf);
223
pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
224
ldns_rdf_deep_free(b64rdf);
225
return pkey;
226
}
227
#endif
228
229
#ifdef USE_ECDSA
230
/** calculate public key from private key */
231
static int
232
ldns_EC_KEY_calc_public(EC_KEY* ec)
233
{
234
EC_POINT* pub_key;
235
const EC_GROUP* group;
236
group = EC_KEY_get0_group(ec);
237
pub_key = EC_POINT_new(group);
238
if(!pub_key) return 0;
239
if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
240
EC_POINT_free(pub_key);
241
return 0;
242
}
243
if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
244
NULL, NULL, NULL)) {
245
EC_POINT_free(pub_key);
246
return 0;
247
}
248
if(EC_KEY_set_public_key(ec, pub_key) == 0) {
249
EC_POINT_free(pub_key);
250
return 0;
251
}
252
EC_POINT_free(pub_key);
253
return 1;
254
}
255
256
/** read ECDSA private key */
257
static EVP_PKEY*
258
ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
259
{
260
char token[16384];
261
ldns_rdf* b64rdf = NULL;
262
unsigned char* pp;
263
BIGNUM* bn;
264
EVP_PKEY* evp_key;
265
EC_KEY* ec;
266
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
267
sizeof(token), line_nr) == -1)
268
return NULL;
269
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
270
return NULL;
271
pp = (unsigned char*)ldns_rdf_data(b64rdf);
272
273
if(alg == LDNS_ECDSAP256SHA256)
274
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
275
else if(alg == LDNS_ECDSAP384SHA384)
276
ec = EC_KEY_new_by_curve_name(NID_secp384r1);
277
else ec = NULL;
278
if(!ec) {
279
ldns_rdf_deep_free(b64rdf);
280
return NULL;
281
}
282
bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
283
ldns_rdf_deep_free(b64rdf);
284
if(!bn) {
285
EC_KEY_free(ec);
286
return NULL;
287
}
288
EC_KEY_set_private_key(ec, bn);
289
BN_free(bn);
290
if(!ldns_EC_KEY_calc_public(ec)) {
291
EC_KEY_free(ec);
292
return NULL;
293
}
294
295
evp_key = EVP_PKEY_new();
296
if(!evp_key) {
297
EC_KEY_free(ec);
298
return NULL;
299
}
300
if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
301
EVP_PKEY_free(evp_key);
302
EC_KEY_free(ec);
303
return NULL;
304
}
305
return evp_key;
306
}
307
#endif
308
309
#ifdef USE_ED25519
310
/** turn private key buffer into EC_KEY structure */
311
static EVP_PKEY*
312
ldns_ed25519_priv_raw(uint8_t* pkey, int plen)
313
{
314
const unsigned char* pp;
315
uint8_t buf[256];
316
int buflen = 0;
317
uint8_t pre[] = {0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06,
318
0x03, 0x2b, 0x65, 0x70, 0x04, 0x22, 0x04, 0x20};
319
int pre_len = 16;
320
/* ASN looks like this for ED25519 public key
321
* 302a300506032b6570032100 <32byteskey>
322
* for ED25519 private key
323
* 302e020100300506032b657004220420 <32bytes>
324
*
325
* for X25519 this was
326
* 30320201010420 <32byteskey>
327
* andparameters a00b06092b06010401da470f01
328
* (noparameters, preamble is 30250201010420).
329
* the key is reversed (little endian).
330
*/
331
buflen = pre_len + plen;
332
if((size_t)buflen > sizeof(buf))
333
return NULL;
334
memmove(buf, pre, pre_len);
335
memmove(buf+pre_len, pkey, plen);
336
/* reverse the pkey into the buf - key is not reversed it seems */
337
/* for(i=0; i<plen; i++)
338
buf[pre_len+i] = pkey[plen-1-i]; */
339
pp = buf;
340
return d2i_PrivateKey(NID_ED25519, NULL, &pp, buflen);
341
}
342
343
/** read ED25519 private key */
344
static EVP_PKEY*
345
ldns_key_new_frm_fp_ed25519_l(FILE* fp, int* line_nr)
346
{
347
char token[16384];
348
ldns_rdf* b64rdf = NULL;
349
EVP_PKEY* evp_key;
350
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
351
sizeof(token), line_nr) == -1)
352
return NULL;
353
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
354
return NULL;
355
356
/* we use d2i_ECPrivateKey because it calculates the public key
357
* from the private part, which others, EC_KEY_set_private_key,
358
* and o2i methods, do not do */
359
/* for that the private key has to be encoded in ASN1 notation
360
* with a ED25519 prefix on it */
361
362
evp_key = ldns_ed25519_priv_raw(ldns_rdf_data(b64rdf),
363
(int)ldns_rdf_size(b64rdf));
364
ldns_rdf_deep_free(b64rdf);
365
return evp_key;
366
}
367
#endif
368
369
#ifdef USE_ED448
370
/** turn private key buffer into EC_KEY structure */
371
static EVP_PKEY*
372
ldns_ed448_priv_raw(uint8_t* pkey, int plen)
373
{
374
const unsigned char* pp;
375
uint8_t buf[256];
376
int buflen = 0;
377
uint8_t pre[] = {0x30, 0x47, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x71, 0x04, 0x3b, 0x04, 0x39};
378
int pre_len = 16;
379
/* ASN looks like this for ED448
380
* 3047020100300506032b6571043b0439 <57bytekey>
381
* the key is reversed (little endian).
382
*/
383
buflen = pre_len + plen;
384
if((size_t)buflen > sizeof(buf))
385
return NULL;
386
memmove(buf, pre, pre_len);
387
memmove(buf+pre_len, pkey, plen);
388
/* reverse the pkey into the buf - key is not reversed it seems */
389
/* for(i=0; i<plen; i++)
390
buf[pre_len+i] = pkey[plen-1-i]; */
391
pp = buf;
392
return d2i_PrivateKey(NID_ED448, NULL, &pp, buflen);
393
}
394
395
/** read ED448 private key */
396
static EVP_PKEY*
397
ldns_key_new_frm_fp_ed448_l(FILE* fp, int* line_nr)
398
{
399
char token[16384];
400
ldns_rdf* b64rdf = NULL;
401
EVP_PKEY* evp_key;
402
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
403
sizeof(token), line_nr) == -1)
404
return NULL;
405
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
406
return NULL;
407
408
/* convert private key into ASN notation and then convert that */
409
evp_key = ldns_ed448_priv_raw(ldns_rdf_data(b64rdf),
410
(int)ldns_rdf_size(b64rdf));
411
ldns_rdf_deep_free(b64rdf);
412
return evp_key;
413
}
414
#endif
415
416
ldns_status
417
ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
418
{
419
ldns_key *k;
420
char *d;
421
ldns_signing_algorithm alg;
422
ldns_rr *key_rr;
423
#ifdef HAVE_SSL
424
RSA *rsa;
425
#ifdef USE_DSA
426
DSA *dsa;
427
#endif
428
unsigned char *hmac;
429
size_t hmac_size;
430
#endif /* HAVE_SSL */
431
432
k = ldns_key_new();
433
434
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
435
if (!k || !d) {
436
ldns_key_free(k);
437
LDNS_FREE(d);
438
return LDNS_STATUS_MEM_ERR;
439
}
440
441
alg = 0;
442
443
/* the file is highly structured. Do this in sequence */
444
/* RSA:
445
* Private-key-format: v1.x.
446
* Algorithm: 1 (RSA)
447
448
*/
449
/* get the key format version number */
450
if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
451
LDNS_MAX_LINELEN, line_nr) == -1) {
452
/* no version information */
453
ldns_key_free(k);
454
LDNS_FREE(d);
455
return LDNS_STATUS_SYNTAX_ERR;
456
}
457
if (strncmp(d, "v1.", 3) != 0) {
458
ldns_key_free(k);
459
LDNS_FREE(d);
460
return LDNS_STATUS_SYNTAX_VERSION_ERR;
461
}
462
463
/* get the algorithm type, our file function strip ( ) so there are
464
* not in the return string! */
465
if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
466
LDNS_MAX_LINELEN, line_nr) == -1) {
467
/* no alg information */
468
ldns_key_free(k);
469
LDNS_FREE(d);
470
return LDNS_STATUS_SYNTAX_ALG_ERR;
471
}
472
473
if (strncmp(d, "1 RSA", 2) == 0) {
474
alg = LDNS_SIGN_RSAMD5;
475
}
476
if (strncmp(d, "2 DH", 2) == 0) {
477
alg = (ldns_signing_algorithm)LDNS_DH;
478
}
479
if (strncmp(d, "3 DSA", 2) == 0) {
480
#ifdef USE_DSA
481
alg = LDNS_SIGN_DSA;
482
#else
483
# ifdef STDERR_MSGS
484
fprintf(stderr, "Warning: DSA not compiled into this ");
485
fprintf(stderr, "version of ldns\n");
486
# endif
487
#endif
488
}
489
if (strncmp(d, "4 ECC", 2) == 0) {
490
alg = (ldns_signing_algorithm)LDNS_ECC;
491
}
492
if (strncmp(d, "5 RSASHA1", 2) == 0) {
493
alg = LDNS_SIGN_RSASHA1;
494
}
495
if (strncmp(d, "6 DSA", 2) == 0) {
496
#ifdef USE_DSA
497
alg = LDNS_SIGN_DSA_NSEC3;
498
#else
499
# ifdef STDERR_MSGS
500
fprintf(stderr, "Warning: DSA not compiled into this ");
501
fprintf(stderr, "version of ldns\n");
502
# endif
503
#endif
504
}
505
if (strncmp(d, "7 RSASHA1", 2) == 0) {
506
alg = LDNS_SIGN_RSASHA1_NSEC3;
507
}
508
509
if (strncmp(d, "8 RSASHA256", 2) == 0) {
510
#ifdef USE_SHA2
511
alg = LDNS_SIGN_RSASHA256;
512
#else
513
# ifdef STDERR_MSGS
514
fprintf(stderr, "Warning: SHA256 not compiled into this ");
515
fprintf(stderr, "version of ldns\n");
516
# endif
517
#endif
518
}
519
if (strncmp(d, "10 RSASHA512", 3) == 0) {
520
#ifdef USE_SHA2
521
alg = LDNS_SIGN_RSASHA512;
522
#else
523
# ifdef STDERR_MSGS
524
fprintf(stderr, "Warning: SHA512 not compiled into this ");
525
fprintf(stderr, "version of ldns\n");
526
# endif
527
#endif
528
}
529
if (strncmp(d, "12 ECC-GOST", 3) == 0) {
530
#ifdef USE_GOST
531
alg = LDNS_SIGN_ECC_GOST;
532
#else
533
# ifdef STDERR_MSGS
534
fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
535
fprintf(stderr, "version of ldns, use --enable-gost\n");
536
# endif
537
#endif
538
}
539
if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
540
#ifdef USE_ECDSA
541
alg = LDNS_SIGN_ECDSAP256SHA256;
542
#else
543
# ifdef STDERR_MSGS
544
fprintf(stderr, "Warning: ECDSA not compiled into this ");
545
fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
546
# endif
547
#endif
548
}
549
if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
550
#ifdef USE_ECDSA
551
alg = LDNS_SIGN_ECDSAP384SHA384;
552
#else
553
# ifdef STDERR_MSGS
554
fprintf(stderr, "Warning: ECDSA not compiled into this ");
555
fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
556
# endif
557
#endif
558
}
559
if (strncmp(d, "15 ED25519", 3) == 0) {
560
#ifdef USE_ED25519
561
alg = LDNS_SIGN_ED25519;
562
#else
563
# ifdef STDERR_MSGS
564
fprintf(stderr, "Warning: ED25519 not compiled into this ");
565
fprintf(stderr, "version of ldns, use --enable-ed25519\n");
566
# endif
567
#endif
568
}
569
if (strncmp(d, "16 ED448", 3) == 0) {
570
#ifdef USE_ED448
571
alg = LDNS_SIGN_ED448;
572
#else
573
# ifdef STDERR_MSGS
574
fprintf(stderr, "Warning: ED448 not compiled into this ");
575
fprintf(stderr, "version of ldns, use --enable-ed448\n");
576
# endif
577
#endif
578
}
579
if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
580
alg = LDNS_SIGN_HMACMD5;
581
}
582
if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
583
alg = LDNS_SIGN_HMACSHA1;
584
}
585
if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
586
alg = LDNS_SIGN_HMACSHA256;
587
}
588
/* For compatibility with dnssec-keygen */
589
if (strncmp(d, "161 ", 4) == 0) {
590
alg = LDNS_SIGN_HMACSHA1;
591
}
592
if (strncmp(d, "162 HMAC-SHA224", 4) == 0) {
593
alg = LDNS_SIGN_HMACSHA224;
594
}
595
/* For compatibility with dnssec-keygen */
596
if (strncmp(d, "163 ", 4) == 0) {
597
alg = LDNS_SIGN_HMACSHA256;
598
}
599
if (strncmp(d, "164 HMAC-SHA384", 4) == 0) {
600
alg = LDNS_SIGN_HMACSHA384;
601
}
602
if (strncmp(d, "165 HMAC-SHA512", 4) == 0) {
603
alg = LDNS_SIGN_HMACSHA512;
604
}
605
LDNS_FREE(d);
606
607
switch(alg) {
608
case LDNS_SIGN_RSAMD5:
609
case LDNS_SIGN_RSASHA1:
610
case LDNS_SIGN_RSASHA1_NSEC3:
611
#ifdef USE_SHA2
612
case LDNS_SIGN_RSASHA256:
613
case LDNS_SIGN_RSASHA512:
614
#endif
615
ldns_key_set_algorithm(k, alg);
616
#ifdef HAVE_SSL
617
rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
618
if (!rsa) {
619
ldns_key_free(k);
620
return LDNS_STATUS_ERR;
621
}
622
ldns_key_assign_rsa_key(k, rsa);
623
#endif /* HAVE_SSL */
624
break;
625
#ifdef USE_DSA
626
case LDNS_SIGN_DSA:
627
case LDNS_SIGN_DSA_NSEC3:
628
ldns_key_set_algorithm(k, alg);
629
#ifdef HAVE_SSL
630
dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
631
if (!dsa) {
632
ldns_key_free(k);
633
return LDNS_STATUS_ERR;
634
}
635
ldns_key_assign_dsa_key(k, dsa);
636
#endif /* HAVE_SSL */
637
break;
638
#endif /* USE_DSA */
639
case LDNS_SIGN_HMACMD5:
640
case LDNS_SIGN_HMACSHA1:
641
case LDNS_SIGN_HMACSHA224:
642
case LDNS_SIGN_HMACSHA256:
643
case LDNS_SIGN_HMACSHA384:
644
case LDNS_SIGN_HMACSHA512:
645
ldns_key_set_algorithm(k, alg);
646
#ifdef HAVE_SSL
647
hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
648
if (!hmac) {
649
ldns_key_free(k);
650
return LDNS_STATUS_ERR;
651
}
652
ldns_key_set_hmac_size(k, hmac_size);
653
ldns_key_set_hmac_key(k, hmac);
654
#endif /* HAVE_SSL */
655
break;
656
case LDNS_SIGN_ECC_GOST:
657
ldns_key_set_algorithm(k, alg);
658
#if defined(HAVE_SSL) && defined(USE_GOST)
659
if(!ldns_key_EVP_load_gost_id()) {
660
ldns_key_free(k);
661
return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
662
}
663
ldns_key_set_evp_key(k,
664
ldns_key_new_frm_fp_gost_l(fp, line_nr));
665
#ifndef S_SPLINT_S
666
if(!k->_key.key) {
667
ldns_key_free(k);
668
return LDNS_STATUS_ERR;
669
}
670
#endif /* splint */
671
#endif
672
break;
673
#ifdef USE_ECDSA
674
case LDNS_SIGN_ECDSAP256SHA256:
675
case LDNS_SIGN_ECDSAP384SHA384:
676
ldns_key_set_algorithm(k, alg);
677
ldns_key_set_evp_key(k,
678
ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
679
#ifndef S_SPLINT_S
680
if(!k->_key.key) {
681
ldns_key_free(k);
682
return LDNS_STATUS_ERR;
683
}
684
#endif /* splint */
685
break;
686
#endif
687
#ifdef USE_ED25519
688
case LDNS_SIGN_ED25519:
689
ldns_key_set_algorithm(k, alg);
690
ldns_key_set_evp_key(k,
691
ldns_key_new_frm_fp_ed25519_l(fp, line_nr));
692
#ifndef S_SPLINT_S
693
if(!k->_key.key) {
694
ldns_key_free(k);
695
return LDNS_STATUS_ERR;
696
}
697
#endif /* splint */
698
break;
699
#endif
700
#ifdef USE_ED448
701
case LDNS_SIGN_ED448:
702
ldns_key_set_algorithm(k, alg);
703
ldns_key_set_evp_key(k,
704
ldns_key_new_frm_fp_ed448_l(fp, line_nr));
705
#ifndef S_SPLINT_S
706
if(!k->_key.key) {
707
ldns_key_free(k);
708
return LDNS_STATUS_ERR;
709
}
710
#endif /* splint */
711
break;
712
#endif
713
default:
714
ldns_key_free(k);
715
return LDNS_STATUS_SYNTAX_ALG_ERR;
716
}
717
key_rr = ldns_key2rr(k);
718
ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
719
ldns_rr_free(key_rr);
720
721
if (key) {
722
*key = k;
723
return LDNS_STATUS_OK;
724
}
725
ldns_key_free(k);
726
return LDNS_STATUS_ERR;
727
}
728
729
#ifdef HAVE_SSL
730
RSA *
731
ldns_key_new_frm_fp_rsa(FILE *f)
732
{
733
return ldns_key_new_frm_fp_rsa_l(f, NULL);
734
}
735
736
RSA *
737
ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
738
{
739
/* we parse
740
* Modulus:
741
* PublicExponent:
742
* PrivateExponent:
743
* Prime1:
744
* Prime2:
745
* Exponent1:
746
* Exponent2:
747
* Coefficient:
748
*
749
* man 3 RSA:
750
*
751
* struct
752
* {
753
* BIGNUM *n; // public modulus
754
* BIGNUM *e; // public exponent
755
* BIGNUM *d; // private exponent
756
* BIGNUM *p; // secret prime factor
757
* BIGNUM *q; // secret prime factor
758
* BIGNUM *dmp1; // d mod (p-1)
759
* BIGNUM *dmq1; // d mod (q-1)
760
* BIGNUM *iqmp; // q^-1 mod p
761
* // ...
762
*
763
*/
764
char *b;
765
RSA *rsa;
766
uint8_t *buf;
767
int i;
768
BIGNUM *n=NULL, *e=NULL, *d=NULL, *p=NULL, *q=NULL,
769
*dmp1=NULL, *dmq1=NULL, *iqmp=NULL;
770
771
b = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
772
buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
773
rsa = RSA_new();
774
if (!b || !rsa || !buf) {
775
goto error;
776
}
777
778
/* I could use functions again, but that seems an overkill,
779
* although this also looks tedious
780
*/
781
782
/* Modules, rsa->n */
783
if (ldns_fget_keyword_data_l(f, "Modulus", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
784
goto error;
785
}
786
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
787
#ifndef S_SPLINT_S
788
n = BN_bin2bn((const char unsigned*)buf, i, NULL);
789
if (!n) {
790
goto error;
791
}
792
793
/* PublicExponent, rsa->e */
794
if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
795
goto error;
796
}
797
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
798
e = BN_bin2bn((const char unsigned*)buf, i, NULL);
799
if (!e) {
800
goto error;
801
}
802
803
/* PrivateExponent, rsa->d */
804
if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
805
goto error;
806
}
807
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
808
d = BN_bin2bn((const char unsigned*)buf, i, NULL);
809
if (!d) {
810
goto error;
811
}
812
813
/* Prime1, rsa->p */
814
if (ldns_fget_keyword_data_l(f, "Prime1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
815
goto error;
816
}
817
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
818
p = BN_bin2bn((const char unsigned*)buf, i, NULL);
819
if (!p) {
820
goto error;
821
}
822
823
/* Prime2, rsa->q */
824
if (ldns_fget_keyword_data_l(f, "Prime2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
825
goto error;
826
}
827
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
828
q = BN_bin2bn((const char unsigned*)buf, i, NULL);
829
if (!q) {
830
goto error;
831
}
832
833
/* Exponent1, rsa->dmp1 */
834
if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
835
goto error;
836
}
837
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
838
dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
839
if (!dmp1) {
840
goto error;
841
}
842
843
/* Exponent2, rsa->dmq1 */
844
if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
845
goto error;
846
}
847
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
848
dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
849
if (!dmq1) {
850
goto error;
851
}
852
853
/* Coefficient, rsa->iqmp */
854
if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
855
goto error;
856
}
857
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
858
iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
859
if (!iqmp) {
860
goto error;
861
}
862
#endif /* splint */
863
864
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
865
# ifndef S_SPLINT_S
866
rsa->n = n;
867
rsa->e = e;
868
rsa->d = d;
869
rsa->p = p;
870
rsa->q = q;
871
rsa->dmp1 = dmp1;
872
rsa->dmq1 = dmq1;
873
rsa->iqmp = iqmp;
874
# endif
875
#else
876
if(!RSA_set0_key(rsa, n, e, d))
877
goto error;
878
n = NULL;
879
e = NULL;
880
d = NULL;
881
if(!RSA_set0_factors(rsa, p, q))
882
goto error;
883
p = NULL;
884
q = NULL;
885
if(!RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp))
886
goto error;
887
#endif
888
889
LDNS_FREE(buf);
890
LDNS_FREE(b);
891
return rsa;
892
893
error:
894
RSA_free(rsa);
895
LDNS_FREE(b);
896
LDNS_FREE(buf);
897
BN_free(n);
898
BN_free(e);
899
BN_free(d);
900
BN_free(p);
901
BN_free(q);
902
BN_free(dmp1);
903
BN_free(dmq1);
904
BN_free(iqmp);
905
return NULL;
906
}
907
908
#ifdef USE_DSA
909
DSA *
910
ldns_key_new_frm_fp_dsa(FILE *f)
911
{
912
return ldns_key_new_frm_fp_dsa_l(f, NULL);
913
}
914
915
DSA *
916
ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
917
{
918
int i;
919
char *d;
920
DSA *dsa;
921
uint8_t *buf;
922
BIGNUM *p=NULL, *q=NULL, *g=NULL, *priv_key=NULL, *pub_key=NULL;
923
924
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
925
buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
926
dsa = DSA_new();
927
if (!d || !dsa || !buf) {
928
goto error;
929
}
930
931
/* the line parser removes the () from the input... */
932
933
/* Prime, dsa->p */
934
if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
935
goto error;
936
}
937
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
938
#ifndef S_SPLINT_S
939
p = BN_bin2bn((const char unsigned*)buf, i, NULL);
940
if (!p) {
941
goto error;
942
}
943
944
/* Subprime, dsa->q */
945
if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
946
goto error;
947
}
948
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
949
q = BN_bin2bn((const char unsigned*)buf, i, NULL);
950
if (!q) {
951
goto error;
952
}
953
954
/* Base, dsa->g */
955
if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
956
goto error;
957
}
958
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
959
g = BN_bin2bn((const char unsigned*)buf, i, NULL);
960
if (!g) {
961
goto error;
962
}
963
964
/* Private key, dsa->priv_key */
965
if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
966
goto error;
967
}
968
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
969
priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
970
if (!priv_key) {
971
goto error;
972
}
973
974
/* Public key, dsa->priv_key */
975
if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
976
goto error;
977
}
978
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
979
pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
980
if (!pub_key) {
981
goto error;
982
}
983
#endif /* splint */
984
985
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
986
# ifndef S_SPLINT_S
987
dsa->p = p;
988
dsa->q = q;
989
dsa->g = g;
990
dsa->priv_key = priv_key;
991
dsa->pub_key = pub_key;
992
# endif
993
#else
994
if(!DSA_set0_pqg(dsa, p, q, g))
995
goto error;
996
p = NULL;
997
q = NULL;
998
g = NULL;
999
if(!DSA_set0_key(dsa, pub_key, priv_key))
1000
goto error;
1001
#endif
1002
1003
LDNS_FREE(buf);
1004
LDNS_FREE(d);
1005
1006
return dsa;
1007
1008
error:
1009
LDNS_FREE(d);
1010
LDNS_FREE(buf);
1011
DSA_free(dsa);
1012
BN_free(p);
1013
BN_free(q);
1014
BN_free(g);
1015
BN_free(priv_key);
1016
BN_free(pub_key);
1017
return NULL;
1018
}
1019
#endif /* USE_DSA */
1020
1021
unsigned char *
1022
ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
1023
{
1024
return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
1025
}
1026
1027
unsigned char *
1028
ldns_key_new_frm_fp_hmac_l( FILE *f
1029
, ATTR_UNUSED(int *line_nr)
1030
, size_t *hmac_size
1031
)
1032
{
1033
size_t bufsz;
1034
char d[LDNS_MAX_LINELEN];
1035
unsigned char *buf = NULL;
1036
1037
*hmac_size = ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n",
1038
LDNS_MAX_LINELEN, line_nr) == -1
1039
? 0
1040
: (buf = LDNS_XMALLOC( unsigned char, (bufsz =
1041
ldns_b64_ntop_calculate_size(strlen(d))))) == NULL
1042
? 0
1043
: (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
1044
return buf;
1045
}
1046
#endif /* HAVE_SSL */
1047
1048
#ifdef USE_GOST
1049
static EVP_PKEY*
1050
ldns_gen_gost_key(void)
1051
{
1052
EVP_PKEY_CTX* ctx;
1053
EVP_PKEY* p = NULL;
1054
int gost_id = ldns_key_EVP_load_gost_id();
1055
if(!gost_id)
1056
return NULL;
1057
ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
1058
if(!ctx) {
1059
/* the id should be available now */
1060
return NULL;
1061
}
1062
if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
1063
/* cannot set paramset */
1064
EVP_PKEY_CTX_free(ctx);
1065
return NULL;
1066
}
1067
1068
if(EVP_PKEY_keygen_init(ctx) <= 0) {
1069
EVP_PKEY_CTX_free(ctx);
1070
return NULL;
1071
}
1072
if(EVP_PKEY_keygen(ctx, &p) <= 0) {
1073
EVP_PKEY_free(p);
1074
EVP_PKEY_CTX_free(ctx);
1075
return NULL;
1076
}
1077
EVP_PKEY_CTX_free(ctx);
1078
return p;
1079
}
1080
#endif
1081
1082
ldns_key *
1083
ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
1084
{
1085
ldns_key *k;
1086
#ifdef HAVE_SSL
1087
#ifdef USE_DSA
1088
DSA *d;
1089
#endif /* USE_DSA */
1090
# ifdef USE_ECDSA
1091
EC_KEY *ec = NULL;
1092
# endif
1093
# ifdef HAVE_EVP_PKEY_KEYGEN
1094
EVP_PKEY_CTX *ctx;
1095
# else
1096
RSA *r;
1097
# endif
1098
#else
1099
int i;
1100
uint16_t offset = 0;
1101
#endif
1102
unsigned char *hmac;
1103
1104
k = ldns_key_new();
1105
if (!k) {
1106
return NULL;
1107
}
1108
switch(alg) {
1109
case LDNS_SIGN_RSAMD5:
1110
case LDNS_SIGN_RSASHA1:
1111
case LDNS_SIGN_RSASHA1_NSEC3:
1112
case LDNS_SIGN_RSASHA256:
1113
case LDNS_SIGN_RSASHA512:
1114
#ifdef HAVE_SSL
1115
#ifdef HAVE_EVP_PKEY_KEYGEN
1116
ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL);
1117
if(!ctx) {
1118
ldns_key_free(k);
1119
return NULL;
1120
}
1121
if(EVP_PKEY_keygen_init(ctx) <= 0) {
1122
ldns_key_free(k);
1123
EVP_PKEY_CTX_free(ctx);
1124
return NULL;
1125
}
1126
if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, size) <= 0) {
1127
ldns_key_free(k);
1128
EVP_PKEY_CTX_free(ctx);
1129
return NULL;
1130
}
1131
#ifndef S_SPLINT_S
1132
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1133
ldns_key_free(k);
1134
EVP_PKEY_CTX_free(ctx);
1135
return NULL;
1136
}
1137
#endif
1138
EVP_PKEY_CTX_free(ctx);
1139
#else /* HAVE_EVP_PKEY_KEYGEN */
1140
r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
1141
if(!r) {
1142
ldns_key_free(k);
1143
return NULL;
1144
}
1145
if (RSA_check_key(r) != 1) {
1146
ldns_key_free(k);
1147
return NULL;
1148
}
1149
ldns_key_set_rsa_key(k, r);
1150
RSA_free(r);
1151
#endif /* HAVE_EVP_PKEY_KEYGEN */
1152
#endif /* HAVE_SSL */
1153
break;
1154
#ifdef USE_DSA
1155
case LDNS_SIGN_DSA:
1156
case LDNS_SIGN_DSA_NSEC3:
1157
#ifdef HAVE_SSL
1158
# if OPENSSL_VERSION_NUMBER < 0x00908000L
1159
d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
1160
if (!d) {
1161
ldns_key_free(k);
1162
return NULL;
1163
}
1164
1165
# else
1166
if (! (d = DSA_new())) {
1167
ldns_key_free(k);
1168
return NULL;
1169
}
1170
if (! DSA_generate_parameters_ex(d, (int)size, NULL, 0, NULL, NULL, NULL)) {
1171
DSA_free(d);
1172
ldns_key_free(k);
1173
return NULL;
1174
}
1175
# endif
1176
if (DSA_generate_key(d) != 1) {
1177
ldns_key_free(k);
1178
return NULL;
1179
}
1180
ldns_key_set_dsa_key(k, d);
1181
DSA_free(d);
1182
#endif /* HAVE_SSL */
1183
#endif /* USE_DSA */
1184
break;
1185
case LDNS_SIGN_HMACMD5:
1186
case LDNS_SIGN_HMACSHA1:
1187
case LDNS_SIGN_HMACSHA224:
1188
case LDNS_SIGN_HMACSHA256:
1189
case LDNS_SIGN_HMACSHA384:
1190
case LDNS_SIGN_HMACSHA512:
1191
#ifdef HAVE_SSL
1192
#ifndef S_SPLINT_S
1193
k->_key.key = NULL;
1194
#endif /* splint */
1195
#endif /* HAVE_SSL */
1196
size = size / 8;
1197
ldns_key_set_hmac_size(k, size);
1198
1199
hmac = LDNS_XMALLOC(unsigned char, size);
1200
if(!hmac) {
1201
ldns_key_free(k);
1202
return NULL;
1203
}
1204
#ifdef HAVE_SSL
1205
if (RAND_bytes(hmac, (int) size) != 1) {
1206
LDNS_FREE(hmac);
1207
ldns_key_free(k);
1208
return NULL;
1209
}
1210
#else
1211
while (offset + sizeof(i) < size) {
1212
i = random();
1213
memcpy(&hmac[offset], &i, sizeof(i));
1214
offset += sizeof(i);
1215
}
1216
if (offset < size) {
1217
i = random();
1218
memcpy(&hmac[offset], &i, size - offset);
1219
}
1220
#endif /* HAVE_SSL */
1221
ldns_key_set_hmac_key(k, hmac);
1222
1223
ldns_key_set_flags(k, 0);
1224
break;
1225
case LDNS_SIGN_ECC_GOST:
1226
#if defined(HAVE_SSL) && defined(USE_GOST)
1227
ldns_key_set_evp_key(k, ldns_gen_gost_key());
1228
#ifndef S_SPLINT_S
1229
if(!k->_key.key) {
1230
ldns_key_free(k);
1231
return NULL;
1232
}
1233
#endif /* splint */
1234
#else
1235
ldns_key_free(k);
1236
return NULL;
1237
#endif /* HAVE_SSL and USE_GOST */
1238
break;
1239
case LDNS_SIGN_ECDSAP256SHA256:
1240
case LDNS_SIGN_ECDSAP384SHA384:
1241
#ifdef USE_ECDSA
1242
if(alg == LDNS_SIGN_ECDSAP256SHA256)
1243
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
1244
else if(alg == LDNS_SIGN_ECDSAP384SHA384)
1245
ec = EC_KEY_new_by_curve_name(NID_secp384r1);
1246
if(!ec) {
1247
ldns_key_free(k);
1248
return NULL;
1249
}
1250
if(!EC_KEY_generate_key(ec)) {
1251
ldns_key_free(k);
1252
EC_KEY_free(ec);
1253
return NULL;
1254
}
1255
#ifndef S_SPLINT_S
1256
k->_key.key = EVP_PKEY_new();
1257
if(!k->_key.key) {
1258
ldns_key_free(k);
1259
EC_KEY_free(ec);
1260
return NULL;
1261
}
1262
if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
1263
ldns_key_free(k);
1264
EC_KEY_free(ec);
1265
return NULL;
1266
}
1267
#endif /* splint */
1268
#else
1269
ldns_key_free(k);
1270
return NULL;
1271
#endif /* ECDSA */
1272
break;
1273
#ifdef USE_ED25519
1274
case LDNS_SIGN_ED25519:
1275
#ifdef HAVE_EVP_PKEY_KEYGEN
1276
ctx = EVP_PKEY_CTX_new_id(NID_ED25519, NULL);
1277
if(!ctx) {
1278
ldns_key_free(k);
1279
return NULL;
1280
}
1281
if(EVP_PKEY_keygen_init(ctx) <= 0) {
1282
ldns_key_free(k);
1283
EVP_PKEY_CTX_free(ctx);
1284
return NULL;
1285
}
1286
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1287
ldns_key_free(k);
1288
EVP_PKEY_CTX_free(ctx);
1289
return NULL;
1290
}
1291
EVP_PKEY_CTX_free(ctx);
1292
#endif
1293
break;
1294
#endif /* ED25519 */
1295
#ifdef USE_ED448
1296
case LDNS_SIGN_ED448:
1297
#ifdef HAVE_EVP_PKEY_KEYGEN
1298
ctx = EVP_PKEY_CTX_new_id(NID_ED448, NULL);
1299
if(!ctx) {
1300
ldns_key_free(k);
1301
return NULL;
1302
}
1303
if(EVP_PKEY_keygen_init(ctx) <= 0) {
1304
ldns_key_free(k);
1305
EVP_PKEY_CTX_free(ctx);
1306
return NULL;
1307
}
1308
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1309
ldns_key_free(k);
1310
EVP_PKEY_CTX_free(ctx);
1311
return NULL;
1312
}
1313
EVP_PKEY_CTX_free(ctx);
1314
#endif
1315
break;
1316
#endif /* ED448 */
1317
}
1318
ldns_key_set_algorithm(k, alg);
1319
return k;
1320
}
1321
1322
void
1323
ldns_key_print(FILE *output, const ldns_key *k)
1324
{
1325
char *str = ldns_key2str(k);
1326
if (str) {
1327
fprintf(output, "%s", str);
1328
} else {
1329
fprintf(output, "Unable to convert private key to string\n");
1330
}
1331
LDNS_FREE(str);
1332
}
1333
1334
1335
void
1336
ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
1337
{
1338
k->_alg = l;
1339
}
1340
1341
void
1342
ldns_key_set_flags(ldns_key *k, uint16_t f)
1343
{
1344
k->_extra.dnssec.flags = f;
1345
}
1346
1347
#ifdef HAVE_SSL
1348
#ifndef S_SPLINT_S
1349
void
1350
ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
1351
{
1352
k->_key.key = e;
1353
}
1354
1355
void
1356
ldns_key_set_rsa_key(ldns_key *k, RSA *r)
1357
{
1358
EVP_PKEY *key = EVP_PKEY_new();
1359
EVP_PKEY_set1_RSA(key, r);
1360
k->_key.key = key;
1361
}
1362
1363
void
1364
ldns_key_set_dsa_key(ldns_key *k, DSA *d)
1365
{
1366
#ifdef USE_DSA
1367
EVP_PKEY *key = EVP_PKEY_new();
1368
EVP_PKEY_set1_DSA(key, d);
1369
k->_key.key = key;
1370
#else
1371
(void)k; (void)d;
1372
#endif
1373
}
1374
1375
void
1376
ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
1377
{
1378
EVP_PKEY *key = EVP_PKEY_new();
1379
EVP_PKEY_assign_RSA(key, r);
1380
k->_key.key = key;
1381
}
1382
1383
void
1384
ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
1385
{
1386
#ifdef USE_DSA
1387
EVP_PKEY *key = EVP_PKEY_new();
1388
EVP_PKEY_assign_DSA(key, d);
1389
k->_key.key = key;
1390
#else
1391
(void)k; (void)d;
1392
#endif
1393
}
1394
#endif /* splint */
1395
#endif /* HAVE_SSL */
1396
1397
void
1398
ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
1399
{
1400
k->_key.hmac.key = hmac;
1401
}
1402
1403
void
1404
ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
1405
{
1406
k->_key.hmac.size = hmac_size;
1407
}
1408
1409
void
1410
ldns_key_set_external_key(ldns_key *k, void *external_key)
1411
{
1412
k->_key.external_key = external_key;
1413
}
1414
1415
void
1416
ldns_key_set_origttl(ldns_key *k, uint32_t t)
1417
{
1418
k->_extra.dnssec.orig_ttl = t;
1419
}
1420
1421
void
1422
ldns_key_set_inception(ldns_key *k, uint32_t i)
1423
{
1424
k->_extra.dnssec.inception = i;
1425
}
1426
1427
void
1428
ldns_key_set_expiration(ldns_key *k, uint32_t e)
1429
{
1430
k->_extra.dnssec.expiration = e;
1431
}
1432
1433
void
1434
ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
1435
{
1436
k->_pubkey_owner = r;
1437
}
1438
1439
void
1440
ldns_key_set_keytag(ldns_key *k, uint16_t tag)
1441
{
1442
k->_extra.dnssec.keytag = tag;
1443
}
1444
1445
/* read */
1446
size_t
1447
ldns_key_list_key_count(const ldns_key_list *key_list)
1448
{
1449
return key_list ? key_list->_key_count : 0;
1450
}
1451
1452
ldns_key *
1453
ldns_key_list_key(const ldns_key_list *key, size_t nr)
1454
{
1455
if (nr < ldns_key_list_key_count(key)) {
1456
return key->_keys[nr];
1457
} else {
1458
return NULL;
1459
}
1460
}
1461
1462
ldns_signing_algorithm
1463
ldns_key_algorithm(const ldns_key *k)
1464
{
1465
return k->_alg;
1466
}
1467
1468
void
1469
ldns_key_set_use(ldns_key *k, bool v)
1470
{
1471
if (k) {
1472
k->_use = v;
1473
}
1474
}
1475
1476
bool
1477
ldns_key_use(const ldns_key *k)
1478
{
1479
if (k) {
1480
return k->_use;
1481
}
1482
return false;
1483
}
1484
1485
#ifdef HAVE_SSL
1486
#ifndef S_SPLINT_S
1487
EVP_PKEY *
1488
ldns_key_evp_key(const ldns_key *k)
1489
{
1490
return k->_key.key;
1491
}
1492
1493
RSA *
1494
ldns_key_rsa_key(const ldns_key *k)
1495
{
1496
if (k->_key.key) {
1497
return EVP_PKEY_get1_RSA(k->_key.key);
1498
} else {
1499
return NULL;
1500
}
1501
}
1502
1503
DSA *
1504
ldns_key_dsa_key(const ldns_key *k)
1505
{
1506
#ifdef USE_DSA
1507
if (k->_key.key) {
1508
return EVP_PKEY_get1_DSA(k->_key.key);
1509
} else {
1510
return NULL;
1511
}
1512
#else
1513
(void)k;
1514
return NULL;
1515
#endif
1516
}
1517
#endif /* splint */
1518
#endif /* HAVE_SSL */
1519
1520
unsigned char *
1521
ldns_key_hmac_key(const ldns_key *k)
1522
{
1523
if (k->_key.hmac.key) {
1524
return k->_key.hmac.key;
1525
} else {
1526
return NULL;
1527
}
1528
}
1529
1530
size_t
1531
ldns_key_hmac_size(const ldns_key *k)
1532
{
1533
if (k->_key.hmac.size) {
1534
return k->_key.hmac.size;
1535
} else {
1536
return 0;
1537
}
1538
}
1539
1540
void *
1541
ldns_key_external_key(const ldns_key *k)
1542
{
1543
return k->_key.external_key;
1544
}
1545
1546
uint32_t
1547
ldns_key_origttl(const ldns_key *k)
1548
{
1549
return k->_extra.dnssec.orig_ttl;
1550
}
1551
1552
uint16_t
1553
ldns_key_flags(const ldns_key *k)
1554
{
1555
return k->_extra.dnssec.flags;
1556
}
1557
1558
uint32_t
1559
ldns_key_inception(const ldns_key *k)
1560
{
1561
return k->_extra.dnssec.inception;
1562
}
1563
1564
uint32_t
1565
ldns_key_expiration(const ldns_key *k)
1566
{
1567
return k->_extra.dnssec.expiration;
1568
}
1569
1570
uint16_t
1571
ldns_key_keytag(const ldns_key *k)
1572
{
1573
return k->_extra.dnssec.keytag;
1574
}
1575
1576
ldns_rdf *
1577
ldns_key_pubkey_owner(const ldns_key *k)
1578
{
1579
return k->_pubkey_owner;
1580
}
1581
1582
/* write */
1583
void
1584
ldns_key_list_set_use(ldns_key_list *keys, bool v)
1585
{
1586
size_t i;
1587
1588
for (i = 0; i < ldns_key_list_key_count(keys); i++) {
1589
ldns_key_set_use(ldns_key_list_key(keys, i), v);
1590
}
1591
}
1592
1593
void
1594
ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
1595
{
1596
key->_key_count = count;
1597
}
1598
1599
bool
1600
ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
1601
{
1602
size_t key_count;
1603
ldns_key **keys;
1604
1605
key_count = ldns_key_list_key_count(key_list);
1606
1607
/* grow the array */
1608
keys = LDNS_XREALLOC(
1609
key_list->_keys, ldns_key *, key_count + 1);
1610
if (!keys) {
1611
return false;
1612
}
1613
1614
/* add the new member */
1615
key_list->_keys = keys;
1616
key_list->_keys[key_count] = key;
1617
1618
ldns_key_list_set_key_count(key_list, key_count + 1);
1619
return true;
1620
}
1621
1622
ldns_key *
1623
ldns_key_list_pop_key(ldns_key_list *key_list)
1624
{
1625
size_t key_count;
1626
ldns_key** a;
1627
ldns_key *pop;
1628
1629
if (!key_list) {
1630
return NULL;
1631
}
1632
1633
key_count = ldns_key_list_key_count(key_list);
1634
if (key_count == 0) {
1635
return NULL;
1636
}
1637
1638
pop = ldns_key_list_key(key_list, key_count);
1639
1640
/* shrink the array */
1641
a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
1642
if(a) {
1643
key_list->_keys = a;
1644
}
1645
1646
ldns_key_list_set_key_count(key_list, key_count - 1);
1647
1648
return pop;
1649
}
1650
1651
#ifdef HAVE_SSL
1652
#ifndef S_SPLINT_S
1653
/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1654
static bool
1655
ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
1656
{
1657
int i,j;
1658
const BIGNUM *n=NULL, *e=NULL;
1659
1660
if (!k) {
1661
return false;
1662
}
1663
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
1664
n = k->n;
1665
e = k->e;
1666
#else
1667
RSA_get0_key(k, &n, &e, NULL);
1668
#endif
1669
1670
if (BN_num_bytes(e) <= 256) {
1671
/* normally only this path is executed (small factors are
1672
* more common
1673
*/
1674
data[0] = (unsigned char) BN_num_bytes(e);
1675
i = BN_bn2bin(e, data + 1);
1676
j = BN_bn2bin(n, data + i + 1);
1677
*size = (uint16_t) i + j;
1678
} else if (BN_num_bytes(e) <= 65536) {
1679
data[0] = 0;
1680
/* BN_bn2bin does bigendian, _uint16 also */
1681
ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(e));
1682
1683
BN_bn2bin(e, data + 3);
1684
BN_bn2bin(n, data + 4 + BN_num_bytes(e));
1685
*size = (uint16_t) BN_num_bytes(n) + 6;
1686
} else {
1687
return false;
1688
}
1689
return true;
1690
}
1691
1692
#ifdef USE_DSA
1693
/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1694
static bool
1695
ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
1696
{
1697
uint8_t T;
1698
const BIGNUM *p, *q, *g;
1699
const BIGNUM *pub_key, *priv_key;
1700
1701
if (!k) {
1702
return false;
1703
}
1704
1705
/* See RFC2536 */
1706
# ifdef HAVE_DSA_GET0_PQG
1707
DSA_get0_pqg(k, &p, &q, &g);
1708
# else
1709
p = k->p; q = k->q; g = k->g;
1710
# endif
1711
# ifdef HAVE_DSA_GET0_KEY
1712
DSA_get0_key(k, &pub_key, &priv_key);
1713
# else
1714
pub_key = k->pub_key; priv_key = k->priv_key;
1715
# endif
1716
(void)priv_key;
1717
*size = (uint16_t)BN_num_bytes(p);
1718
T = (*size - 64) / 8;
1719
1720
if (T > 8) {
1721
#ifdef STDERR_MSGS
1722
fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
1723
fprintf(stderr, " not implemented\n");
1724
#endif
1725
return false;
1726
}
1727
1728
/* size = 64 + (T * 8); */
1729
memset(data, 0, 21 + *size * 3);
1730
data[0] = (unsigned char)T;
1731
BN_bn2bin(q, data + 1 ); /* 20 octects */
1732
BN_bn2bin(p, data + 21 ); /* offset octects */
1733
BN_bn2bin(g, data + 21 + *size * 2 - BN_num_bytes(g));
1734
BN_bn2bin(pub_key,data + 21 + *size * 3 - BN_num_bytes(pub_key));
1735
*size = 21 + *size * 3;
1736
return true;
1737
}
1738
#endif /* USE_DSA */
1739
1740
#ifdef USE_GOST
1741
static bool
1742
ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1743
{
1744
int i;
1745
unsigned char* pp = NULL;
1746
if(i2d_PUBKEY(k, &pp) != 37 + 64) {
1747
/* expect 37 byte(ASN header) and 64 byte(X and Y) */
1748
free(pp);
1749
return false;
1750
}
1751
/* omit ASN header */
1752
for(i=0; i<64; i++)
1753
data[i] = pp[i+37];
1754
free(pp);
1755
*size = 64;
1756
return true;
1757
}
1758
#endif /* USE_GOST */
1759
1760
#ifdef USE_ED25519
1761
static bool
1762
ldns_key_ed255192bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1763
{
1764
int i;
1765
unsigned char* pp = NULL;
1766
if(i2d_PUBKEY(k, &pp) != 12 + 32) {
1767
/* expect 12 byte(ASN header) and 32 byte(pubkey) */
1768
free(pp);
1769
return false;
1770
}
1771
/* omit ASN header */
1772
for(i=0; i<32; i++)
1773
data[i] = pp[i+12];
1774
free(pp);
1775
*size = 32;
1776
return true;
1777
}
1778
#endif /* USE_ED25519 */
1779
1780
#ifdef USE_ED448
1781
static bool
1782
ldns_key_ed4482bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1783
{
1784
int i;
1785
unsigned char* pp = NULL;
1786
if(i2d_PUBKEY(k, &pp) != 12 + 57) {
1787
/* expect 12 byte(ASN header) and 57 byte(pubkey) */
1788
free(pp);
1789
return false;
1790
}
1791
/* omit ASN header */
1792
for(i=0; i<57; i++)
1793
data[i] = pp[i+12];
1794
free(pp);
1795
*size = 57;
1796
return true;
1797
}
1798
#endif /* USE_ED448 */
1799
#endif /* splint */
1800
#endif /* HAVE_SSL */
1801
1802
ldns_rr *
1803
ldns_key2rr(const ldns_key *k)
1804
{
1805
/* this function will convert a the keydata contained in
1806
* rsa/dsa pointers to a DNSKEY rr. It will fill in as
1807
* much as it can, but it does not know about key-flags
1808
* for instance
1809
*/
1810
ldns_rr *pubkey;
1811
ldns_rdf *keybin;
1812
unsigned char *bin = NULL;
1813
uint16_t size = 0;
1814
#ifdef HAVE_SSL
1815
RSA *rsa = NULL;
1816
#ifdef USE_DSA
1817
DSA *dsa = NULL;
1818
#endif /* USE_DSA */
1819
#endif /* HAVE_SSL */
1820
#ifdef USE_ECDSA
1821
EC_KEY* ec;
1822
#endif
1823
int internal_data = 0;
1824
1825
if (!k) {
1826
return NULL;
1827
}
1828
pubkey = ldns_rr_new();
1829
1830
switch (ldns_key_algorithm(k)) {
1831
case LDNS_SIGN_HMACMD5:
1832
case LDNS_SIGN_HMACSHA1:
1833
case LDNS_SIGN_HMACSHA224:
1834
case LDNS_SIGN_HMACSHA256:
1835
case LDNS_SIGN_HMACSHA384:
1836
case LDNS_SIGN_HMACSHA512:
1837
ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
1838
break;
1839
default:
1840
ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
1841
break;
1842
}
1843
/* zero-th rdf - flags */
1844
ldns_rr_push_rdf(pubkey,
1845
ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
1846
ldns_key_flags(k)));
1847
/* first - proto */
1848
ldns_rr_push_rdf(pubkey,
1849
ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
1850
1851
if (ldns_key_pubkey_owner(k)) {
1852
ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
1853
}
1854
1855
/* third - da algorithm */
1856
switch(ldns_key_algorithm(k)) {
1857
case LDNS_SIGN_RSAMD5:
1858
case LDNS_SIGN_RSASHA1:
1859
case LDNS_SIGN_RSASHA1_NSEC3:
1860
case LDNS_SIGN_RSASHA256:
1861
case LDNS_SIGN_RSASHA512:
1862
ldns_rr_push_rdf(pubkey,
1863
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1864
#ifdef HAVE_SSL
1865
rsa = ldns_key_rsa_key(k);
1866
if (rsa) {
1867
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1868
if (!bin) {
1869
ldns_rr_free(pubkey);
1870
return NULL;
1871
}
1872
if (!ldns_key_rsa2bin(bin, rsa, &size)) {
1873
LDNS_FREE(bin);
1874
ldns_rr_free(pubkey);
1875
return NULL;
1876
}
1877
RSA_free(rsa);
1878
internal_data = 1;
1879
}
1880
#endif
1881
size++;
1882
break;
1883
#ifdef USE_DSA
1884
case LDNS_SIGN_DSA:
1885
ldns_rr_push_rdf(pubkey,
1886
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
1887
#ifdef HAVE_SSL
1888
dsa = ldns_key_dsa_key(k);
1889
if (dsa) {
1890
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1891
if (!bin) {
1892
ldns_rr_free(pubkey);
1893
return NULL;
1894
}
1895
if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1896
LDNS_FREE(bin);
1897
ldns_rr_free(pubkey);
1898
return NULL;
1899
}
1900
DSA_free(dsa);
1901
internal_data = 1;
1902
}
1903
#endif /* HAVE_SSL */
1904
#endif /* USE_DSA */
1905
break;
1906
#ifdef USE_DSA
1907
case LDNS_SIGN_DSA_NSEC3:
1908
ldns_rr_push_rdf(pubkey,
1909
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
1910
#ifdef HAVE_SSL
1911
dsa = ldns_key_dsa_key(k);
1912
if (dsa) {
1913
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1914
if (!bin) {
1915
ldns_rr_free(pubkey);
1916
return NULL;
1917
}
1918
if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1919
LDNS_FREE(bin);
1920
ldns_rr_free(pubkey);
1921
return NULL;
1922
}
1923
DSA_free(dsa);
1924
internal_data = 1;
1925
}
1926
#endif /* HAVE_SSL */
1927
#endif /* USE_DSA */
1928
break;
1929
case LDNS_SIGN_ECC_GOST:
1930
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1931
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1932
#if defined(HAVE_SSL) && defined(USE_GOST)
1933
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1934
if (!bin) {
1935
ldns_rr_free(pubkey);
1936
return NULL;
1937
}
1938
#ifndef S_SPLINT_S
1939
if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
1940
LDNS_FREE(bin);
1941
ldns_rr_free(pubkey);
1942
return NULL;
1943
}
1944
#endif /* splint */
1945
internal_data = 1;
1946
#else
1947
ldns_rr_free(pubkey);
1948
return NULL;
1949
#endif /* HAVE_SSL and USE_GOST */
1950
break;
1951
case LDNS_SIGN_ECDSAP256SHA256:
1952
case LDNS_SIGN_ECDSAP384SHA384:
1953
#ifdef USE_ECDSA
1954
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1955
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1956
bin = NULL;
1957
#ifndef S_SPLINT_S
1958
ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
1959
#endif
1960
EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
1961
size = (uint16_t)i2o_ECPublicKey(ec, NULL);
1962
if(!i2o_ECPublicKey(ec, &bin)) {
1963
EC_KEY_free(ec);
1964
ldns_rr_free(pubkey);
1965
return NULL;
1966
}
1967
if(size > 1) {
1968
/* move back one byte to shave off the 0x02
1969
* 'uncompressed' indicator that openssl made
1970
* Actually its 0x04 (from implementation).
1971
*/
1972
assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
1973
size -= 1;
1974
memmove(bin, bin+1, size);
1975
}
1976
/* down the reference count for ec, its still assigned
1977
* to the pkey */
1978
EC_KEY_free(ec);
1979
internal_data = 1;
1980
#else
1981
ldns_rr_free(pubkey);
1982
return NULL;
1983
#endif /* ECDSA */
1984
break;
1985
#ifdef USE_ED25519
1986
case LDNS_SIGN_ED25519:
1987
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1988
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1989
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1990
if (!bin) {
1991
ldns_rr_free(pubkey);
1992
return NULL;
1993
}
1994
if (!ldns_key_ed255192bin(bin, k->_key.key, &size)) {
1995
LDNS_FREE(bin);
1996
ldns_rr_free(pubkey);
1997
return NULL;
1998
}
1999
internal_data = 1;
2000
break;
2001
#endif
2002
#ifdef USE_ED448
2003
case LDNS_SIGN_ED448:
2004
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
2005
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
2006
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
2007
if (!bin) {
2008
ldns_rr_free(pubkey);
2009
return NULL;
2010
}
2011
if (!ldns_key_ed4482bin(bin, k->_key.key, &size)) {
2012
LDNS_FREE(bin);
2013
ldns_rr_free(pubkey);
2014
return NULL;
2015
}
2016
internal_data = 1;
2017
break;
2018
#endif
2019
case LDNS_SIGN_HMACMD5:
2020
case LDNS_SIGN_HMACSHA1:
2021
case LDNS_SIGN_HMACSHA224:
2022
case LDNS_SIGN_HMACSHA256:
2023
case LDNS_SIGN_HMACSHA384:
2024
case LDNS_SIGN_HMACSHA512:
2025
bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
2026
if (!bin) {
2027
ldns_rr_free(pubkey);
2028
return NULL;
2029
}
2030
ldns_rr_push_rdf(pubkey,
2031
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
2032
ldns_key_algorithm(k)));
2033
size = ldns_key_hmac_size(k);
2034
memcpy(bin, ldns_key_hmac_key(k), size);
2035
internal_data = 1;
2036
break;
2037
}
2038
/* fourth the key bin material */
2039
if (internal_data) {
2040
keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
2041
LDNS_FREE(bin);
2042
ldns_rr_push_rdf(pubkey, keybin);
2043
}
2044
return pubkey;
2045
}
2046
2047
void
2048
ldns_key_free(ldns_key *key)
2049
{
2050
LDNS_FREE(key);
2051
}
2052
2053
void
2054
ldns_key_deep_free(ldns_key *key)
2055
{
2056
unsigned char* hmac;
2057
if (ldns_key_pubkey_owner(key)) {
2058
ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
2059
}
2060
#ifdef HAVE_SSL
2061
if (ldns_key_evp_key(key)) {
2062
EVP_PKEY_free(ldns_key_evp_key(key));
2063
}
2064
#endif /* HAVE_SSL */
2065
if (ldns_key_hmac_key(key)) {
2066
hmac = ldns_key_hmac_key(key);
2067
LDNS_FREE(hmac);
2068
}
2069
LDNS_FREE(key);
2070
}
2071
2072
void
2073
ldns_key_list_free(ldns_key_list *key_list)
2074
{
2075
size_t i;
2076
for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
2077
ldns_key_deep_free(ldns_key_list_key(key_list, i));
2078
}
2079
LDNS_FREE(key_list->_keys);
2080
LDNS_FREE(key_list);
2081
}
2082
2083
ldns_rr *
2084
ldns_read_anchor_file(const char *filename)
2085
{
2086
FILE *fp;
2087
/*char line[LDNS_MAX_PACKETLEN];*/
2088
char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
2089
int c;
2090
size_t i = 0;
2091
ldns_rr *r;
2092
ldns_status status;
2093
if(!line) {
2094
return NULL;
2095
}
2096
2097
fp = fopen(filename, "r");
2098
if (!fp) {
2099
#ifdef STDERR_MSGS
2100
fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
2101
#endif
2102
LDNS_FREE(line);
2103
return NULL;
2104
}
2105
2106
while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
2107
line[i] = c;
2108
i++;
2109
}
2110
line[i] = '\0';
2111
2112
fclose(fp);
2113
2114
if (i <= 0) {
2115
#ifdef STDERR_MSGS
2116
fprintf(stderr, "nothing read from %s", filename);
2117
#endif
2118
LDNS_FREE(line);
2119
return NULL;
2120
} else {
2121
status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
2122
if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
2123
LDNS_FREE(line);
2124
return r;
2125
} else {
2126
#ifdef STDERR_MSGS
2127
fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
2128
#endif
2129
LDNS_FREE(line);
2130
return NULL;
2131
}
2132
}
2133
}
2134
2135
char *
2136
ldns_key_get_file_base_name(const ldns_key *key)
2137
{
2138
ldns_buffer *buffer;
2139
char *file_base_name;
2140
2141
buffer = ldns_buffer_new(255);
2142
ldns_buffer_printf(buffer, "K");
2143
(void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
2144
ldns_buffer_printf(buffer,
2145
"+%03u+%05u",
2146
ldns_key_algorithm(key),
2147
ldns_key_keytag(key));
2148
file_base_name = ldns_buffer_export(buffer);
2149
ldns_buffer_free(buffer);
2150
return file_base_name;
2151
}
2152
2153
int ldns_key_algo_supported(int algo)
2154
{
2155
ldns_lookup_table *lt = ldns_signing_algorithms;
2156
while(lt->name) {
2157
if(lt->id == algo)
2158
return 1;
2159
lt++;
2160
}
2161
return 0;
2162
}
2163
2164
ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
2165
{
2166
/* list of (signing algorithm id, alias_name) */
2167
ldns_lookup_table aliases[] = {
2168
/* from bind dnssec-keygen */
2169
{LDNS_SIGN_HMACMD5, "HMAC-MD5"},
2170
#ifdef USE_DSA
2171
{LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
2172
#endif /* USE_DSA */
2173
{LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
2174
/* old ldns usage, now RFC names */
2175
#ifdef USE_DSA
2176
{LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
2177
#endif
2178
{LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
2179
#ifdef USE_GOST
2180
{LDNS_SIGN_ECC_GOST, "GOST"},
2181
#endif
2182
/* compat with possible output */
2183
{LDNS_DH, "DH"},
2184
{LDNS_ECC, "ECC"},
2185
{LDNS_INDIRECT, "INDIRECT"},
2186
{LDNS_PRIVATEDNS, "PRIVATEDNS"},
2187
{LDNS_PRIVATEOID, "PRIVATEOID"},
2188
{0, NULL}};
2189
ldns_lookup_table* lt = ldns_signing_algorithms;
2190
ldns_signing_algorithm a;
2191
char *endptr;
2192
2193
while(lt->name) {
2194
if(strcasecmp(lt->name, name) == 0)
2195
return lt->id;
2196
lt++;
2197
}
2198
lt = aliases;
2199
while(lt->name) {
2200
if(strcasecmp(lt->name, name) == 0)
2201
return lt->id;
2202
lt++;
2203
}
2204
a = strtol(name, &endptr, 10);
2205
if (*name && !*endptr)
2206
return a;
2207
2208
return 0;
2209
}
2210
2211