mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-13 05:41:26 +01:00
5afab0e5e5
Merge commit 'cf3e3d5bd0a1fae39c74c7db5a4e8b10732d0766' Reviewed by: emaste Differential Revision: https://reviews.freebsd.org/D40226
2210 lines
52 KiB
C
2210 lines
52 KiB
C
/*
|
|
* keys.c handle private keys for use in DNSSEC
|
|
*
|
|
* This module should hide some of the openSSL complexities
|
|
* and give a general interface for private keys and hmac
|
|
* handling
|
|
*
|
|
* (c) NLnet Labs, 2004-2006
|
|
*
|
|
* See the file LICENSE for the license
|
|
*/
|
|
|
|
#include <ldns/config.h>
|
|
|
|
#include <ldns/ldns.h>
|
|
|
|
#ifdef HAVE_SSL
|
|
#include <openssl/ui.h>
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/rand.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/rsa.h>
|
|
#ifdef USE_DSA
|
|
#include <openssl/dsa.h>
|
|
#endif
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
#include <openssl/engine.h>
|
|
#endif
|
|
#endif /* HAVE_SSL */
|
|
|
|
ldns_lookup_table ldns_signing_algorithms[] = {
|
|
{ LDNS_SIGN_RSAMD5, "RSAMD5" },
|
|
{ LDNS_SIGN_RSASHA1, "RSASHA1" },
|
|
{ LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
|
|
#ifdef USE_SHA2
|
|
{ LDNS_SIGN_RSASHA256, "RSASHA256" },
|
|
{ LDNS_SIGN_RSASHA512, "RSASHA512" },
|
|
#endif
|
|
#ifdef USE_GOST
|
|
{ LDNS_SIGN_ECC_GOST, "ECC-GOST" },
|
|
#endif
|
|
#ifdef USE_ECDSA
|
|
{ LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
|
|
{ LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
|
|
#endif
|
|
#ifdef USE_ED25519
|
|
{ LDNS_SIGN_ED25519, "ED25519" },
|
|
#endif
|
|
#ifdef USE_ED448
|
|
{ LDNS_SIGN_ED448, "ED448" },
|
|
#endif
|
|
#ifdef USE_DSA
|
|
{ LDNS_SIGN_DSA, "DSA" },
|
|
{ LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
|
|
#endif
|
|
{ LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
|
|
{ LDNS_SIGN_HMACSHA1, "hmac-sha1" },
|
|
{ LDNS_SIGN_HMACSHA256, "hmac-sha256" },
|
|
{ LDNS_SIGN_HMACSHA224, "hmac-sha224" },
|
|
{ LDNS_SIGN_HMACSHA384, "hmac-sha384" },
|
|
{ LDNS_SIGN_HMACSHA512, "hmac-sha512" },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
ldns_key_list *
|
|
ldns_key_list_new(void)
|
|
{
|
|
ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
|
|
if (!key_list) {
|
|
return NULL;
|
|
} else {
|
|
key_list->_key_count = 0;
|
|
key_list->_keys = NULL;
|
|
return key_list;
|
|
}
|
|
}
|
|
|
|
ldns_key *
|
|
ldns_key_new(void)
|
|
{
|
|
ldns_key *newkey;
|
|
|
|
newkey = LDNS_MALLOC(ldns_key);
|
|
if (!newkey) {
|
|
return NULL;
|
|
} else {
|
|
/* some defaults - not sure whether to do this */
|
|
ldns_key_set_use(newkey, true);
|
|
ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
|
|
ldns_key_set_origttl(newkey, 0);
|
|
ldns_key_set_keytag(newkey, 0);
|
|
ldns_key_set_inception(newkey, 0);
|
|
ldns_key_set_expiration(newkey, 0);
|
|
ldns_key_set_pubkey_owner(newkey, NULL);
|
|
#ifdef HAVE_SSL
|
|
ldns_key_set_evp_key(newkey, NULL);
|
|
#endif /* HAVE_SSL */
|
|
ldns_key_set_hmac_key(newkey, NULL);
|
|
ldns_key_set_external_key(newkey, NULL);
|
|
return newkey;
|
|
}
|
|
}
|
|
|
|
ldns_status
|
|
ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
|
|
{
|
|
return ldns_key_new_frm_fp_l(k, fp, NULL);
|
|
}
|
|
|
|
#if defined(HAVE_SSL) && !defined(OPENSSL_NO_ENGINE)
|
|
ldns_status
|
|
ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
|
|
{
|
|
ldns_key *k;
|
|
|
|
k = ldns_key_new();
|
|
if(!k) return LDNS_STATUS_MEM_ERR;
|
|
#ifndef S_SPLINT_S
|
|
k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
|
|
if (!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
|
|
}
|
|
#endif /* splint */
|
|
*key = k;
|
|
return LDNS_STATUS_OK;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_GOST
|
|
/** store GOST engine reference loaded into OpenSSL library */
|
|
ENGINE* ldns_gost_engine = NULL;
|
|
|
|
int
|
|
ldns_key_EVP_load_gost_id(void)
|
|
{
|
|
static int gost_id = 0;
|
|
const EVP_PKEY_ASN1_METHOD* meth;
|
|
ENGINE* e;
|
|
|
|
if(gost_id) return gost_id;
|
|
|
|
/* see if configuration loaded gost implementation from other engine*/
|
|
meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
|
|
if(meth) {
|
|
EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
|
|
return gost_id;
|
|
}
|
|
|
|
/* see if engine can be loaded already */
|
|
e = ENGINE_by_id("gost");
|
|
if(!e) {
|
|
/* load it ourself, in case statically linked */
|
|
ENGINE_load_builtin_engines();
|
|
ENGINE_load_dynamic();
|
|
e = ENGINE_by_id("gost");
|
|
}
|
|
if(!e) {
|
|
/* no gost engine in openssl */
|
|
return 0;
|
|
}
|
|
if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
|
|
ENGINE_finish(e);
|
|
ENGINE_free(e);
|
|
return 0;
|
|
}
|
|
|
|
meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
|
|
if(!meth) {
|
|
/* algo not found */
|
|
ENGINE_finish(e);
|
|
ENGINE_free(e);
|
|
return 0;
|
|
}
|
|
/* Note: do not ENGINE_finish and ENGINE_free the acquired engine
|
|
* on some platforms this frees up the meth and unloads gost stuff */
|
|
ldns_gost_engine = e;
|
|
|
|
EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
|
|
return gost_id;
|
|
}
|
|
|
|
void ldns_key_EVP_unload_gost(void)
|
|
{
|
|
if(ldns_gost_engine) {
|
|
ENGINE_finish(ldns_gost_engine);
|
|
ENGINE_free(ldns_gost_engine);
|
|
ldns_gost_engine = NULL;
|
|
}
|
|
}
|
|
|
|
/** read GOST private key */
|
|
static EVP_PKEY*
|
|
ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
|
|
{
|
|
char token[16384];
|
|
const unsigned char* pp;
|
|
int gost_id;
|
|
EVP_PKEY* pkey;
|
|
ldns_rdf* b64rdf = NULL;
|
|
|
|
gost_id = ldns_key_EVP_load_gost_id();
|
|
if(!gost_id)
|
|
return NULL;
|
|
|
|
if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
|
|
sizeof(token), line_nr) == -1)
|
|
return NULL;
|
|
while(strlen(token) < 96) {
|
|
/* read more b64 from the file, b64 split on multiple lines */
|
|
if(ldns_fget_token_l(fp, token+strlen(token), "\n",
|
|
sizeof(token)-strlen(token), line_nr) == -1)
|
|
return NULL;
|
|
}
|
|
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
|
|
return NULL;
|
|
pp = (unsigned char*)ldns_rdf_data(b64rdf);
|
|
pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
|
|
ldns_rdf_deep_free(b64rdf);
|
|
return pkey;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_ECDSA
|
|
/** calculate public key from private key */
|
|
static int
|
|
ldns_EC_KEY_calc_public(EC_KEY* ec)
|
|
{
|
|
EC_POINT* pub_key;
|
|
const EC_GROUP* group;
|
|
group = EC_KEY_get0_group(ec);
|
|
pub_key = EC_POINT_new(group);
|
|
if(!pub_key) return 0;
|
|
if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
|
|
EC_POINT_free(pub_key);
|
|
return 0;
|
|
}
|
|
if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
|
|
NULL, NULL, NULL)) {
|
|
EC_POINT_free(pub_key);
|
|
return 0;
|
|
}
|
|
if(EC_KEY_set_public_key(ec, pub_key) == 0) {
|
|
EC_POINT_free(pub_key);
|
|
return 0;
|
|
}
|
|
EC_POINT_free(pub_key);
|
|
return 1;
|
|
}
|
|
|
|
/** read ECDSA private key */
|
|
static EVP_PKEY*
|
|
ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
|
|
{
|
|
char token[16384];
|
|
ldns_rdf* b64rdf = NULL;
|
|
unsigned char* pp;
|
|
BIGNUM* bn;
|
|
EVP_PKEY* evp_key;
|
|
EC_KEY* ec;
|
|
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
|
|
sizeof(token), line_nr) == -1)
|
|
return NULL;
|
|
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
|
|
return NULL;
|
|
pp = (unsigned char*)ldns_rdf_data(b64rdf);
|
|
|
|
if(alg == LDNS_ECDSAP256SHA256)
|
|
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
|
|
else if(alg == LDNS_ECDSAP384SHA384)
|
|
ec = EC_KEY_new_by_curve_name(NID_secp384r1);
|
|
else ec = NULL;
|
|
if(!ec) {
|
|
ldns_rdf_deep_free(b64rdf);
|
|
return NULL;
|
|
}
|
|
bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
|
|
ldns_rdf_deep_free(b64rdf);
|
|
if(!bn) {
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
EC_KEY_set_private_key(ec, bn);
|
|
BN_free(bn);
|
|
if(!ldns_EC_KEY_calc_public(ec)) {
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
|
|
evp_key = EVP_PKEY_new();
|
|
if(!evp_key) {
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
|
|
EVP_PKEY_free(evp_key);
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
return evp_key;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_ED25519
|
|
/** turn private key buffer into EC_KEY structure */
|
|
static EVP_PKEY*
|
|
ldns_ed25519_priv_raw(uint8_t* pkey, int plen)
|
|
{
|
|
const unsigned char* pp;
|
|
uint8_t buf[256];
|
|
int buflen = 0;
|
|
uint8_t pre[] = {0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06,
|
|
0x03, 0x2b, 0x65, 0x70, 0x04, 0x22, 0x04, 0x20};
|
|
int pre_len = 16;
|
|
/* ASN looks like this for ED25519 public key
|
|
* 302a300506032b6570032100 <32byteskey>
|
|
* for ED25519 private key
|
|
* 302e020100300506032b657004220420 <32bytes>
|
|
*
|
|
* for X25519 this was
|
|
* 30320201010420 <32byteskey>
|
|
* andparameters a00b06092b06010401da470f01
|
|
* (noparameters, preamble is 30250201010420).
|
|
* the key is reversed (little endian).
|
|
*/
|
|
buflen = pre_len + plen;
|
|
if((size_t)buflen > sizeof(buf))
|
|
return NULL;
|
|
memmove(buf, pre, pre_len);
|
|
memmove(buf+pre_len, pkey, plen);
|
|
/* reverse the pkey into the buf - key is not reversed it seems */
|
|
/* for(i=0; i<plen; i++)
|
|
buf[pre_len+i] = pkey[plen-1-i]; */
|
|
pp = buf;
|
|
return d2i_PrivateKey(NID_ED25519, NULL, &pp, buflen);
|
|
}
|
|
|
|
/** read ED25519 private key */
|
|
static EVP_PKEY*
|
|
ldns_key_new_frm_fp_ed25519_l(FILE* fp, int* line_nr)
|
|
{
|
|
char token[16384];
|
|
ldns_rdf* b64rdf = NULL;
|
|
EVP_PKEY* evp_key;
|
|
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
|
|
sizeof(token), line_nr) == -1)
|
|
return NULL;
|
|
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
|
|
return NULL;
|
|
|
|
/* we use d2i_ECPrivateKey because it calculates the public key
|
|
* from the private part, which others, EC_KEY_set_private_key,
|
|
* and o2i methods, do not do */
|
|
/* for that the private key has to be encoded in ASN1 notation
|
|
* with a ED25519 prefix on it */
|
|
|
|
evp_key = ldns_ed25519_priv_raw(ldns_rdf_data(b64rdf),
|
|
(int)ldns_rdf_size(b64rdf));
|
|
ldns_rdf_deep_free(b64rdf);
|
|
return evp_key;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_ED448
|
|
/** turn private key buffer into EC_KEY structure */
|
|
static EVP_PKEY*
|
|
ldns_ed448_priv_raw(uint8_t* pkey, int plen)
|
|
{
|
|
const unsigned char* pp;
|
|
uint8_t buf[256];
|
|
int buflen = 0;
|
|
uint8_t pre[] = {0x30, 0x47, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x71, 0x04, 0x3b, 0x04, 0x39};
|
|
int pre_len = 16;
|
|
/* ASN looks like this for ED448
|
|
* 3047020100300506032b6571043b0439 <57bytekey>
|
|
* the key is reversed (little endian).
|
|
*/
|
|
buflen = pre_len + plen;
|
|
if((size_t)buflen > sizeof(buf))
|
|
return NULL;
|
|
memmove(buf, pre, pre_len);
|
|
memmove(buf+pre_len, pkey, plen);
|
|
/* reverse the pkey into the buf - key is not reversed it seems */
|
|
/* for(i=0; i<plen; i++)
|
|
buf[pre_len+i] = pkey[plen-1-i]; */
|
|
pp = buf;
|
|
return d2i_PrivateKey(NID_ED448, NULL, &pp, buflen);
|
|
}
|
|
|
|
/** read ED448 private key */
|
|
static EVP_PKEY*
|
|
ldns_key_new_frm_fp_ed448_l(FILE* fp, int* line_nr)
|
|
{
|
|
char token[16384];
|
|
ldns_rdf* b64rdf = NULL;
|
|
EVP_PKEY* evp_key;
|
|
if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
|
|
sizeof(token), line_nr) == -1)
|
|
return NULL;
|
|
if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
|
|
return NULL;
|
|
|
|
/* convert private key into ASN notation and then convert that */
|
|
evp_key = ldns_ed448_priv_raw(ldns_rdf_data(b64rdf),
|
|
(int)ldns_rdf_size(b64rdf));
|
|
ldns_rdf_deep_free(b64rdf);
|
|
return evp_key;
|
|
}
|
|
#endif
|
|
|
|
ldns_status
|
|
ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
|
|
{
|
|
ldns_key *k;
|
|
char *d;
|
|
ldns_signing_algorithm alg;
|
|
ldns_rr *key_rr;
|
|
#ifdef HAVE_SSL
|
|
RSA *rsa;
|
|
#ifdef USE_DSA
|
|
DSA *dsa;
|
|
#endif
|
|
unsigned char *hmac;
|
|
size_t hmac_size;
|
|
#endif /* HAVE_SSL */
|
|
|
|
k = ldns_key_new();
|
|
|
|
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
|
|
if (!k || !d) {
|
|
ldns_key_free(k);
|
|
LDNS_FREE(d);
|
|
return LDNS_STATUS_MEM_ERR;
|
|
}
|
|
|
|
alg = 0;
|
|
|
|
/* the file is highly structured. Do this in sequence */
|
|
/* RSA:
|
|
* Private-key-format: v1.x.
|
|
* Algorithm: 1 (RSA)
|
|
|
|
*/
|
|
/* get the key format version number */
|
|
if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
|
|
LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
/* no version information */
|
|
ldns_key_free(k);
|
|
LDNS_FREE(d);
|
|
return LDNS_STATUS_SYNTAX_ERR;
|
|
}
|
|
if (strncmp(d, "v1.", 3) != 0) {
|
|
ldns_key_free(k);
|
|
LDNS_FREE(d);
|
|
return LDNS_STATUS_SYNTAX_VERSION_ERR;
|
|
}
|
|
|
|
/* get the algorithm type, our file function strip ( ) so there are
|
|
* not in the return string! */
|
|
if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
|
|
LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
/* no alg information */
|
|
ldns_key_free(k);
|
|
LDNS_FREE(d);
|
|
return LDNS_STATUS_SYNTAX_ALG_ERR;
|
|
}
|
|
|
|
if (strncmp(d, "1 RSA", 2) == 0) {
|
|
alg = LDNS_SIGN_RSAMD5;
|
|
}
|
|
if (strncmp(d, "2 DH", 2) == 0) {
|
|
alg = (ldns_signing_algorithm)LDNS_DH;
|
|
}
|
|
if (strncmp(d, "3 DSA", 2) == 0) {
|
|
#ifdef USE_DSA
|
|
alg = LDNS_SIGN_DSA;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: DSA not compiled into this ");
|
|
fprintf(stderr, "version of ldns\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "4 ECC", 2) == 0) {
|
|
alg = (ldns_signing_algorithm)LDNS_ECC;
|
|
}
|
|
if (strncmp(d, "5 RSASHA1", 2) == 0) {
|
|
alg = LDNS_SIGN_RSASHA1;
|
|
}
|
|
if (strncmp(d, "6 DSA", 2) == 0) {
|
|
#ifdef USE_DSA
|
|
alg = LDNS_SIGN_DSA_NSEC3;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: DSA not compiled into this ");
|
|
fprintf(stderr, "version of ldns\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "7 RSASHA1", 2) == 0) {
|
|
alg = LDNS_SIGN_RSASHA1_NSEC3;
|
|
}
|
|
|
|
if (strncmp(d, "8 RSASHA256", 2) == 0) {
|
|
#ifdef USE_SHA2
|
|
alg = LDNS_SIGN_RSASHA256;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: SHA256 not compiled into this ");
|
|
fprintf(stderr, "version of ldns\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "10 RSASHA512", 3) == 0) {
|
|
#ifdef USE_SHA2
|
|
alg = LDNS_SIGN_RSASHA512;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: SHA512 not compiled into this ");
|
|
fprintf(stderr, "version of ldns\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "12 ECC-GOST", 3) == 0) {
|
|
#ifdef USE_GOST
|
|
alg = LDNS_SIGN_ECC_GOST;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
|
|
fprintf(stderr, "version of ldns, use --enable-gost\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
|
|
#ifdef USE_ECDSA
|
|
alg = LDNS_SIGN_ECDSAP256SHA256;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: ECDSA not compiled into this ");
|
|
fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
|
|
#ifdef USE_ECDSA
|
|
alg = LDNS_SIGN_ECDSAP384SHA384;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: ECDSA not compiled into this ");
|
|
fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "15 ED25519", 3) == 0) {
|
|
#ifdef USE_ED25519
|
|
alg = LDNS_SIGN_ED25519;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: ED25519 not compiled into this ");
|
|
fprintf(stderr, "version of ldns, use --enable-ed25519\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "16 ED448", 3) == 0) {
|
|
#ifdef USE_ED448
|
|
alg = LDNS_SIGN_ED448;
|
|
#else
|
|
# ifdef STDERR_MSGS
|
|
fprintf(stderr, "Warning: ED448 not compiled into this ");
|
|
fprintf(stderr, "version of ldns, use --enable-ed448\n");
|
|
# endif
|
|
#endif
|
|
}
|
|
if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACMD5;
|
|
}
|
|
if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA1;
|
|
}
|
|
if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA256;
|
|
}
|
|
/* For compatibility with dnssec-keygen */
|
|
if (strncmp(d, "161 ", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA1;
|
|
}
|
|
if (strncmp(d, "162 HMAC-SHA224", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA224;
|
|
}
|
|
/* For compatibility with dnssec-keygen */
|
|
if (strncmp(d, "163 ", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA256;
|
|
}
|
|
if (strncmp(d, "164 HMAC-SHA384", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA384;
|
|
}
|
|
if (strncmp(d, "165 HMAC-SHA512", 4) == 0) {
|
|
alg = LDNS_SIGN_HMACSHA512;
|
|
}
|
|
LDNS_FREE(d);
|
|
|
|
switch(alg) {
|
|
case LDNS_SIGN_RSAMD5:
|
|
case LDNS_SIGN_RSASHA1:
|
|
case LDNS_SIGN_RSASHA1_NSEC3:
|
|
#ifdef USE_SHA2
|
|
case LDNS_SIGN_RSASHA256:
|
|
case LDNS_SIGN_RSASHA512:
|
|
#endif
|
|
ldns_key_set_algorithm(k, alg);
|
|
#ifdef HAVE_SSL
|
|
rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
|
|
if (!rsa) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_key_assign_rsa_key(k, rsa);
|
|
#endif /* HAVE_SSL */
|
|
break;
|
|
#ifdef USE_DSA
|
|
case LDNS_SIGN_DSA:
|
|
case LDNS_SIGN_DSA_NSEC3:
|
|
ldns_key_set_algorithm(k, alg);
|
|
#ifdef HAVE_SSL
|
|
dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
|
|
if (!dsa) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_key_assign_dsa_key(k, dsa);
|
|
#endif /* HAVE_SSL */
|
|
break;
|
|
#endif /* USE_DSA */
|
|
case LDNS_SIGN_HMACMD5:
|
|
case LDNS_SIGN_HMACSHA1:
|
|
case LDNS_SIGN_HMACSHA224:
|
|
case LDNS_SIGN_HMACSHA256:
|
|
case LDNS_SIGN_HMACSHA384:
|
|
case LDNS_SIGN_HMACSHA512:
|
|
ldns_key_set_algorithm(k, alg);
|
|
#ifdef HAVE_SSL
|
|
hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
|
|
if (!hmac) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
ldns_key_set_hmac_size(k, hmac_size);
|
|
ldns_key_set_hmac_key(k, hmac);
|
|
#endif /* HAVE_SSL */
|
|
break;
|
|
case LDNS_SIGN_ECC_GOST:
|
|
ldns_key_set_algorithm(k, alg);
|
|
#if defined(HAVE_SSL) && defined(USE_GOST)
|
|
if(!ldns_key_EVP_load_gost_id()) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
|
|
}
|
|
ldns_key_set_evp_key(k,
|
|
ldns_key_new_frm_fp_gost_l(fp, line_nr));
|
|
#ifndef S_SPLINT_S
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
#endif /* splint */
|
|
#endif
|
|
break;
|
|
#ifdef USE_ECDSA
|
|
case LDNS_SIGN_ECDSAP256SHA256:
|
|
case LDNS_SIGN_ECDSAP384SHA384:
|
|
ldns_key_set_algorithm(k, alg);
|
|
ldns_key_set_evp_key(k,
|
|
ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
|
|
#ifndef S_SPLINT_S
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
#endif /* splint */
|
|
break;
|
|
#endif
|
|
#ifdef USE_ED25519
|
|
case LDNS_SIGN_ED25519:
|
|
ldns_key_set_algorithm(k, alg);
|
|
ldns_key_set_evp_key(k,
|
|
ldns_key_new_frm_fp_ed25519_l(fp, line_nr));
|
|
#ifndef S_SPLINT_S
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
#endif /* splint */
|
|
break;
|
|
#endif
|
|
#ifdef USE_ED448
|
|
case LDNS_SIGN_ED448:
|
|
ldns_key_set_algorithm(k, alg);
|
|
ldns_key_set_evp_key(k,
|
|
ldns_key_new_frm_fp_ed448_l(fp, line_nr));
|
|
#ifndef S_SPLINT_S
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
#endif /* splint */
|
|
break;
|
|
#endif
|
|
default:
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_SYNTAX_ALG_ERR;
|
|
}
|
|
key_rr = ldns_key2rr(k);
|
|
ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
|
|
ldns_rr_free(key_rr);
|
|
|
|
if (key) {
|
|
*key = k;
|
|
return LDNS_STATUS_OK;
|
|
}
|
|
ldns_key_free(k);
|
|
return LDNS_STATUS_ERR;
|
|
}
|
|
|
|
#ifdef HAVE_SSL
|
|
RSA *
|
|
ldns_key_new_frm_fp_rsa(FILE *f)
|
|
{
|
|
return ldns_key_new_frm_fp_rsa_l(f, NULL);
|
|
}
|
|
|
|
RSA *
|
|
ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
|
|
{
|
|
/* we parse
|
|
* Modulus:
|
|
* PublicExponent:
|
|
* PrivateExponent:
|
|
* Prime1:
|
|
* Prime2:
|
|
* Exponent1:
|
|
* Exponent2:
|
|
* Coefficient:
|
|
*
|
|
* man 3 RSA:
|
|
*
|
|
* struct
|
|
* {
|
|
* BIGNUM *n; // public modulus
|
|
* BIGNUM *e; // public exponent
|
|
* BIGNUM *d; // private exponent
|
|
* BIGNUM *p; // secret prime factor
|
|
* BIGNUM *q; // secret prime factor
|
|
* BIGNUM *dmp1; // d mod (p-1)
|
|
* BIGNUM *dmq1; // d mod (q-1)
|
|
* BIGNUM *iqmp; // q^-1 mod p
|
|
* // ...
|
|
*
|
|
*/
|
|
char *b;
|
|
RSA *rsa;
|
|
uint8_t *buf;
|
|
int i;
|
|
BIGNUM *n=NULL, *e=NULL, *d=NULL, *p=NULL, *q=NULL,
|
|
*dmp1=NULL, *dmq1=NULL, *iqmp=NULL;
|
|
|
|
b = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
|
|
buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
|
|
rsa = RSA_new();
|
|
if (!b || !rsa || !buf) {
|
|
goto error;
|
|
}
|
|
|
|
/* I could use functions again, but that seems an overkill,
|
|
* although this also looks tedious
|
|
*/
|
|
|
|
/* Modules, rsa->n */
|
|
if (ldns_fget_keyword_data_l(f, "Modulus", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
#ifndef S_SPLINT_S
|
|
n = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!n) {
|
|
goto error;
|
|
}
|
|
|
|
/* PublicExponent, rsa->e */
|
|
if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
e = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!e) {
|
|
goto error;
|
|
}
|
|
|
|
/* PrivateExponent, rsa->d */
|
|
if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
d = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!d) {
|
|
goto error;
|
|
}
|
|
|
|
/* Prime1, rsa->p */
|
|
if (ldns_fget_keyword_data_l(f, "Prime1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
p = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!p) {
|
|
goto error;
|
|
}
|
|
|
|
/* Prime2, rsa->q */
|
|
if (ldns_fget_keyword_data_l(f, "Prime2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
q = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!q) {
|
|
goto error;
|
|
}
|
|
|
|
/* Exponent1, rsa->dmp1 */
|
|
if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!dmp1) {
|
|
goto error;
|
|
}
|
|
|
|
/* Exponent2, rsa->dmq1 */
|
|
if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!dmq1) {
|
|
goto error;
|
|
}
|
|
|
|
/* Coefficient, rsa->iqmp */
|
|
if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
|
|
iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!iqmp) {
|
|
goto error;
|
|
}
|
|
#endif /* splint */
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
|
|
# ifndef S_SPLINT_S
|
|
rsa->n = n;
|
|
rsa->e = e;
|
|
rsa->d = d;
|
|
rsa->p = p;
|
|
rsa->q = q;
|
|
rsa->dmp1 = dmp1;
|
|
rsa->dmq1 = dmq1;
|
|
rsa->iqmp = iqmp;
|
|
# endif
|
|
#else
|
|
if(!RSA_set0_key(rsa, n, e, d))
|
|
goto error;
|
|
n = NULL;
|
|
e = NULL;
|
|
d = NULL;
|
|
if(!RSA_set0_factors(rsa, p, q))
|
|
goto error;
|
|
p = NULL;
|
|
q = NULL;
|
|
if(!RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp))
|
|
goto error;
|
|
#endif
|
|
|
|
LDNS_FREE(buf);
|
|
LDNS_FREE(b);
|
|
return rsa;
|
|
|
|
error:
|
|
RSA_free(rsa);
|
|
LDNS_FREE(b);
|
|
LDNS_FREE(buf);
|
|
BN_free(n);
|
|
BN_free(e);
|
|
BN_free(d);
|
|
BN_free(p);
|
|
BN_free(q);
|
|
BN_free(dmp1);
|
|
BN_free(dmq1);
|
|
BN_free(iqmp);
|
|
return NULL;
|
|
}
|
|
|
|
#ifdef USE_DSA
|
|
DSA *
|
|
ldns_key_new_frm_fp_dsa(FILE *f)
|
|
{
|
|
return ldns_key_new_frm_fp_dsa_l(f, NULL);
|
|
}
|
|
|
|
DSA *
|
|
ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
|
|
{
|
|
int i;
|
|
char *d;
|
|
DSA *dsa;
|
|
uint8_t *buf;
|
|
BIGNUM *p=NULL, *q=NULL, *g=NULL, *priv_key=NULL, *pub_key=NULL;
|
|
|
|
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
|
|
buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
|
|
dsa = DSA_new();
|
|
if (!d || !dsa || !buf) {
|
|
goto error;
|
|
}
|
|
|
|
/* the line parser removes the () from the input... */
|
|
|
|
/* Prime, dsa->p */
|
|
if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
|
|
#ifndef S_SPLINT_S
|
|
p = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!p) {
|
|
goto error;
|
|
}
|
|
|
|
/* Subprime, dsa->q */
|
|
if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
|
|
q = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!q) {
|
|
goto error;
|
|
}
|
|
|
|
/* Base, dsa->g */
|
|
if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
|
|
g = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!g) {
|
|
goto error;
|
|
}
|
|
|
|
/* Private key, dsa->priv_key */
|
|
if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
|
|
priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!priv_key) {
|
|
goto error;
|
|
}
|
|
|
|
/* Public key, dsa->priv_key */
|
|
if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
|
|
goto error;
|
|
}
|
|
i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
|
|
pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
|
|
if (!pub_key) {
|
|
goto error;
|
|
}
|
|
#endif /* splint */
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
|
|
# ifndef S_SPLINT_S
|
|
dsa->p = p;
|
|
dsa->q = q;
|
|
dsa->g = g;
|
|
dsa->priv_key = priv_key;
|
|
dsa->pub_key = pub_key;
|
|
# endif
|
|
#else
|
|
if(!DSA_set0_pqg(dsa, p, q, g))
|
|
goto error;
|
|
p = NULL;
|
|
q = NULL;
|
|
g = NULL;
|
|
if(!DSA_set0_key(dsa, pub_key, priv_key))
|
|
goto error;
|
|
#endif
|
|
|
|
LDNS_FREE(buf);
|
|
LDNS_FREE(d);
|
|
|
|
return dsa;
|
|
|
|
error:
|
|
LDNS_FREE(d);
|
|
LDNS_FREE(buf);
|
|
DSA_free(dsa);
|
|
BN_free(p);
|
|
BN_free(q);
|
|
BN_free(g);
|
|
BN_free(priv_key);
|
|
BN_free(pub_key);
|
|
return NULL;
|
|
}
|
|
#endif /* USE_DSA */
|
|
|
|
unsigned char *
|
|
ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
|
|
{
|
|
return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
|
|
}
|
|
|
|
unsigned char *
|
|
ldns_key_new_frm_fp_hmac_l( FILE *f
|
|
, ATTR_UNUSED(int *line_nr)
|
|
, size_t *hmac_size
|
|
)
|
|
{
|
|
size_t bufsz;
|
|
char d[LDNS_MAX_LINELEN];
|
|
unsigned char *buf = NULL;
|
|
|
|
*hmac_size = ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n",
|
|
LDNS_MAX_LINELEN, line_nr) == -1
|
|
? 0
|
|
: (buf = LDNS_XMALLOC( unsigned char, (bufsz =
|
|
ldns_b64_ntop_calculate_size(strlen(d))))) == NULL
|
|
? 0
|
|
: (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
|
|
return buf;
|
|
}
|
|
#endif /* HAVE_SSL */
|
|
|
|
#ifdef USE_GOST
|
|
static EVP_PKEY*
|
|
ldns_gen_gost_key(void)
|
|
{
|
|
EVP_PKEY_CTX* ctx;
|
|
EVP_PKEY* p = NULL;
|
|
int gost_id = ldns_key_EVP_load_gost_id();
|
|
if(!gost_id)
|
|
return NULL;
|
|
ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
|
|
if(!ctx) {
|
|
/* the id should be available now */
|
|
return NULL;
|
|
}
|
|
if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
|
|
/* cannot set paramset */
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
|
|
if(EVP_PKEY_keygen_init(ctx) <= 0) {
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
if(EVP_PKEY_keygen(ctx, &p) <= 0) {
|
|
EVP_PKEY_free(p);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return p;
|
|
}
|
|
#endif
|
|
|
|
ldns_key *
|
|
ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
|
|
{
|
|
ldns_key *k;
|
|
#ifdef HAVE_SSL
|
|
#ifdef USE_DSA
|
|
DSA *d;
|
|
#endif /* USE_DSA */
|
|
# ifdef USE_ECDSA
|
|
EC_KEY *ec = NULL;
|
|
# endif
|
|
# ifdef HAVE_EVP_PKEY_KEYGEN
|
|
EVP_PKEY_CTX *ctx;
|
|
# else
|
|
RSA *r;
|
|
# endif
|
|
#else
|
|
int i;
|
|
uint16_t offset = 0;
|
|
#endif
|
|
unsigned char *hmac;
|
|
|
|
k = ldns_key_new();
|
|
if (!k) {
|
|
return NULL;
|
|
}
|
|
switch(alg) {
|
|
case LDNS_SIGN_RSAMD5:
|
|
case LDNS_SIGN_RSASHA1:
|
|
case LDNS_SIGN_RSASHA1_NSEC3:
|
|
case LDNS_SIGN_RSASHA256:
|
|
case LDNS_SIGN_RSASHA512:
|
|
#ifdef HAVE_SSL
|
|
#ifdef HAVE_EVP_PKEY_KEYGEN
|
|
ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL);
|
|
if(!ctx) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if(EVP_PKEY_keygen_init(ctx) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, size) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
#ifndef S_SPLINT_S
|
|
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
#endif
|
|
EVP_PKEY_CTX_free(ctx);
|
|
#else /* HAVE_EVP_PKEY_KEYGEN */
|
|
r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
|
|
if(!r) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if (RSA_check_key(r) != 1) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
ldns_key_set_rsa_key(k, r);
|
|
RSA_free(r);
|
|
#endif /* HAVE_EVP_PKEY_KEYGEN */
|
|
#endif /* HAVE_SSL */
|
|
break;
|
|
#ifdef USE_DSA
|
|
case LDNS_SIGN_DSA:
|
|
case LDNS_SIGN_DSA_NSEC3:
|
|
#ifdef HAVE_SSL
|
|
# if OPENSSL_VERSION_NUMBER < 0x00908000L
|
|
d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
|
|
if (!d) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
|
|
# else
|
|
if (! (d = DSA_new())) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if (! DSA_generate_parameters_ex(d, (int)size, NULL, 0, NULL, NULL, NULL)) {
|
|
DSA_free(d);
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
# endif
|
|
if (DSA_generate_key(d) != 1) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
ldns_key_set_dsa_key(k, d);
|
|
DSA_free(d);
|
|
#endif /* HAVE_SSL */
|
|
#endif /* USE_DSA */
|
|
break;
|
|
case LDNS_SIGN_HMACMD5:
|
|
case LDNS_SIGN_HMACSHA1:
|
|
case LDNS_SIGN_HMACSHA224:
|
|
case LDNS_SIGN_HMACSHA256:
|
|
case LDNS_SIGN_HMACSHA384:
|
|
case LDNS_SIGN_HMACSHA512:
|
|
#ifdef HAVE_SSL
|
|
#ifndef S_SPLINT_S
|
|
k->_key.key = NULL;
|
|
#endif /* splint */
|
|
#endif /* HAVE_SSL */
|
|
size = size / 8;
|
|
ldns_key_set_hmac_size(k, size);
|
|
|
|
hmac = LDNS_XMALLOC(unsigned char, size);
|
|
if(!hmac) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
#ifdef HAVE_SSL
|
|
if (RAND_bytes(hmac, (int) size) != 1) {
|
|
LDNS_FREE(hmac);
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
#else
|
|
while (offset + sizeof(i) < size) {
|
|
i = random();
|
|
memcpy(&hmac[offset], &i, sizeof(i));
|
|
offset += sizeof(i);
|
|
}
|
|
if (offset < size) {
|
|
i = random();
|
|
memcpy(&hmac[offset], &i, size - offset);
|
|
}
|
|
#endif /* HAVE_SSL */
|
|
ldns_key_set_hmac_key(k, hmac);
|
|
|
|
ldns_key_set_flags(k, 0);
|
|
break;
|
|
case LDNS_SIGN_ECC_GOST:
|
|
#if defined(HAVE_SSL) && defined(USE_GOST)
|
|
ldns_key_set_evp_key(k, ldns_gen_gost_key());
|
|
#ifndef S_SPLINT_S
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
#endif /* splint */
|
|
#else
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
#endif /* HAVE_SSL and USE_GOST */
|
|
break;
|
|
case LDNS_SIGN_ECDSAP256SHA256:
|
|
case LDNS_SIGN_ECDSAP384SHA384:
|
|
#ifdef USE_ECDSA
|
|
if(alg == LDNS_SIGN_ECDSAP256SHA256)
|
|
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
|
|
else if(alg == LDNS_SIGN_ECDSAP384SHA384)
|
|
ec = EC_KEY_new_by_curve_name(NID_secp384r1);
|
|
if(!ec) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if(!EC_KEY_generate_key(ec)) {
|
|
ldns_key_free(k);
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
#ifndef S_SPLINT_S
|
|
k->_key.key = EVP_PKEY_new();
|
|
if(!k->_key.key) {
|
|
ldns_key_free(k);
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
|
|
ldns_key_free(k);
|
|
EC_KEY_free(ec);
|
|
return NULL;
|
|
}
|
|
#endif /* splint */
|
|
#else
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
#endif /* ECDSA */
|
|
break;
|
|
#ifdef USE_ED25519
|
|
case LDNS_SIGN_ED25519:
|
|
#ifdef HAVE_EVP_PKEY_KEYGEN
|
|
ctx = EVP_PKEY_CTX_new_id(NID_ED25519, NULL);
|
|
if(!ctx) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if(EVP_PKEY_keygen_init(ctx) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
EVP_PKEY_CTX_free(ctx);
|
|
#endif
|
|
break;
|
|
#endif /* ED25519 */
|
|
#ifdef USE_ED448
|
|
case LDNS_SIGN_ED448:
|
|
#ifdef HAVE_EVP_PKEY_KEYGEN
|
|
ctx = EVP_PKEY_CTX_new_id(NID_ED448, NULL);
|
|
if(!ctx) {
|
|
ldns_key_free(k);
|
|
return NULL;
|
|
}
|
|
if(EVP_PKEY_keygen_init(ctx) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
|
|
ldns_key_free(k);
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return NULL;
|
|
}
|
|
EVP_PKEY_CTX_free(ctx);
|
|
#endif
|
|
break;
|
|
#endif /* ED448 */
|
|
}
|
|
ldns_key_set_algorithm(k, alg);
|
|
return k;
|
|
}
|
|
|
|
void
|
|
ldns_key_print(FILE *output, const ldns_key *k)
|
|
{
|
|
char *str = ldns_key2str(k);
|
|
if (str) {
|
|
fprintf(output, "%s", str);
|
|
} else {
|
|
fprintf(output, "Unable to convert private key to string\n");
|
|
}
|
|
LDNS_FREE(str);
|
|
}
|
|
|
|
|
|
void
|
|
ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
|
|
{
|
|
k->_alg = l;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_flags(ldns_key *k, uint16_t f)
|
|
{
|
|
k->_extra.dnssec.flags = f;
|
|
}
|
|
|
|
#ifdef HAVE_SSL
|
|
#ifndef S_SPLINT_S
|
|
void
|
|
ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
|
|
{
|
|
k->_key.key = e;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_rsa_key(ldns_key *k, RSA *r)
|
|
{
|
|
EVP_PKEY *key = EVP_PKEY_new();
|
|
EVP_PKEY_set1_RSA(key, r);
|
|
k->_key.key = key;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_dsa_key(ldns_key *k, DSA *d)
|
|
{
|
|
#ifdef USE_DSA
|
|
EVP_PKEY *key = EVP_PKEY_new();
|
|
EVP_PKEY_set1_DSA(key, d);
|
|
k->_key.key = key;
|
|
#else
|
|
(void)k; (void)d;
|
|
#endif
|
|
}
|
|
|
|
void
|
|
ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
|
|
{
|
|
EVP_PKEY *key = EVP_PKEY_new();
|
|
EVP_PKEY_assign_RSA(key, r);
|
|
k->_key.key = key;
|
|
}
|
|
|
|
void
|
|
ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
|
|
{
|
|
#ifdef USE_DSA
|
|
EVP_PKEY *key = EVP_PKEY_new();
|
|
EVP_PKEY_assign_DSA(key, d);
|
|
k->_key.key = key;
|
|
#else
|
|
(void)k; (void)d;
|
|
#endif
|
|
}
|
|
#endif /* splint */
|
|
#endif /* HAVE_SSL */
|
|
|
|
void
|
|
ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
|
|
{
|
|
k->_key.hmac.key = hmac;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
|
|
{
|
|
k->_key.hmac.size = hmac_size;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_external_key(ldns_key *k, void *external_key)
|
|
{
|
|
k->_key.external_key = external_key;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_origttl(ldns_key *k, uint32_t t)
|
|
{
|
|
k->_extra.dnssec.orig_ttl = t;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_inception(ldns_key *k, uint32_t i)
|
|
{
|
|
k->_extra.dnssec.inception = i;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_expiration(ldns_key *k, uint32_t e)
|
|
{
|
|
k->_extra.dnssec.expiration = e;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
|
|
{
|
|
k->_pubkey_owner = r;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_keytag(ldns_key *k, uint16_t tag)
|
|
{
|
|
k->_extra.dnssec.keytag = tag;
|
|
}
|
|
|
|
/* read */
|
|
size_t
|
|
ldns_key_list_key_count(const ldns_key_list *key_list)
|
|
{
|
|
return key_list ? key_list->_key_count : 0;
|
|
}
|
|
|
|
ldns_key *
|
|
ldns_key_list_key(const ldns_key_list *key, size_t nr)
|
|
{
|
|
if (nr < ldns_key_list_key_count(key)) {
|
|
return key->_keys[nr];
|
|
} else {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
ldns_signing_algorithm
|
|
ldns_key_algorithm(const ldns_key *k)
|
|
{
|
|
return k->_alg;
|
|
}
|
|
|
|
void
|
|
ldns_key_set_use(ldns_key *k, bool v)
|
|
{
|
|
if (k) {
|
|
k->_use = v;
|
|
}
|
|
}
|
|
|
|
bool
|
|
ldns_key_use(const ldns_key *k)
|
|
{
|
|
if (k) {
|
|
return k->_use;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
#ifdef HAVE_SSL
|
|
#ifndef S_SPLINT_S
|
|
EVP_PKEY *
|
|
ldns_key_evp_key(const ldns_key *k)
|
|
{
|
|
return k->_key.key;
|
|
}
|
|
|
|
RSA *
|
|
ldns_key_rsa_key(const ldns_key *k)
|
|
{
|
|
if (k->_key.key) {
|
|
return EVP_PKEY_get1_RSA(k->_key.key);
|
|
} else {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
DSA *
|
|
ldns_key_dsa_key(const ldns_key *k)
|
|
{
|
|
#ifdef USE_DSA
|
|
if (k->_key.key) {
|
|
return EVP_PKEY_get1_DSA(k->_key.key);
|
|
} else {
|
|
return NULL;
|
|
}
|
|
#else
|
|
(void)k;
|
|
return NULL;
|
|
#endif
|
|
}
|
|
#endif /* splint */
|
|
#endif /* HAVE_SSL */
|
|
|
|
unsigned char *
|
|
ldns_key_hmac_key(const ldns_key *k)
|
|
{
|
|
if (k->_key.hmac.key) {
|
|
return k->_key.hmac.key;
|
|
} else {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
size_t
|
|
ldns_key_hmac_size(const ldns_key *k)
|
|
{
|
|
if (k->_key.hmac.size) {
|
|
return k->_key.hmac.size;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
void *
|
|
ldns_key_external_key(const ldns_key *k)
|
|
{
|
|
return k->_key.external_key;
|
|
}
|
|
|
|
uint32_t
|
|
ldns_key_origttl(const ldns_key *k)
|
|
{
|
|
return k->_extra.dnssec.orig_ttl;
|
|
}
|
|
|
|
uint16_t
|
|
ldns_key_flags(const ldns_key *k)
|
|
{
|
|
return k->_extra.dnssec.flags;
|
|
}
|
|
|
|
uint32_t
|
|
ldns_key_inception(const ldns_key *k)
|
|
{
|
|
return k->_extra.dnssec.inception;
|
|
}
|
|
|
|
uint32_t
|
|
ldns_key_expiration(const ldns_key *k)
|
|
{
|
|
return k->_extra.dnssec.expiration;
|
|
}
|
|
|
|
uint16_t
|
|
ldns_key_keytag(const ldns_key *k)
|
|
{
|
|
return k->_extra.dnssec.keytag;
|
|
}
|
|
|
|
ldns_rdf *
|
|
ldns_key_pubkey_owner(const ldns_key *k)
|
|
{
|
|
return k->_pubkey_owner;
|
|
}
|
|
|
|
/* write */
|
|
void
|
|
ldns_key_list_set_use(ldns_key_list *keys, bool v)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < ldns_key_list_key_count(keys); i++) {
|
|
ldns_key_set_use(ldns_key_list_key(keys, i), v);
|
|
}
|
|
}
|
|
|
|
void
|
|
ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
|
|
{
|
|
key->_key_count = count;
|
|
}
|
|
|
|
bool
|
|
ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
|
|
{
|
|
size_t key_count;
|
|
ldns_key **keys;
|
|
|
|
key_count = ldns_key_list_key_count(key_list);
|
|
|
|
/* grow the array */
|
|
keys = LDNS_XREALLOC(
|
|
key_list->_keys, ldns_key *, key_count + 1);
|
|
if (!keys) {
|
|
return false;
|
|
}
|
|
|
|
/* add the new member */
|
|
key_list->_keys = keys;
|
|
key_list->_keys[key_count] = key;
|
|
|
|
ldns_key_list_set_key_count(key_list, key_count + 1);
|
|
return true;
|
|
}
|
|
|
|
ldns_key *
|
|
ldns_key_list_pop_key(ldns_key_list *key_list)
|
|
{
|
|
size_t key_count;
|
|
ldns_key** a;
|
|
ldns_key *pop;
|
|
|
|
if (!key_list) {
|
|
return NULL;
|
|
}
|
|
|
|
key_count = ldns_key_list_key_count(key_list);
|
|
if (key_count == 0) {
|
|
return NULL;
|
|
}
|
|
|
|
pop = ldns_key_list_key(key_list, key_count);
|
|
|
|
/* shrink the array */
|
|
a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
|
|
if(a) {
|
|
key_list->_keys = a;
|
|
}
|
|
|
|
ldns_key_list_set_key_count(key_list, key_count - 1);
|
|
|
|
return pop;
|
|
}
|
|
|
|
#ifdef HAVE_SSL
|
|
#ifndef S_SPLINT_S
|
|
/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
|
|
static bool
|
|
ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
|
|
{
|
|
int i,j;
|
|
const BIGNUM *n=NULL, *e=NULL;
|
|
|
|
if (!k) {
|
|
return false;
|
|
}
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
|
|
n = k->n;
|
|
e = k->e;
|
|
#else
|
|
RSA_get0_key(k, &n, &e, NULL);
|
|
#endif
|
|
|
|
if (BN_num_bytes(e) <= 256) {
|
|
/* normally only this path is executed (small factors are
|
|
* more common
|
|
*/
|
|
data[0] = (unsigned char) BN_num_bytes(e);
|
|
i = BN_bn2bin(e, data + 1);
|
|
j = BN_bn2bin(n, data + i + 1);
|
|
*size = (uint16_t) i + j;
|
|
} else if (BN_num_bytes(e) <= 65536) {
|
|
data[0] = 0;
|
|
/* BN_bn2bin does bigendian, _uint16 also */
|
|
ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(e));
|
|
|
|
BN_bn2bin(e, data + 3);
|
|
BN_bn2bin(n, data + 4 + BN_num_bytes(e));
|
|
*size = (uint16_t) BN_num_bytes(n) + 6;
|
|
} else {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
#ifdef USE_DSA
|
|
/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
|
|
static bool
|
|
ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
|
|
{
|
|
uint8_t T;
|
|
const BIGNUM *p, *q, *g;
|
|
const BIGNUM *pub_key, *priv_key;
|
|
|
|
if (!k) {
|
|
return false;
|
|
}
|
|
|
|
/* See RFC2536 */
|
|
# ifdef HAVE_DSA_GET0_PQG
|
|
DSA_get0_pqg(k, &p, &q, &g);
|
|
# else
|
|
p = k->p; q = k->q; g = k->g;
|
|
# endif
|
|
# ifdef HAVE_DSA_GET0_KEY
|
|
DSA_get0_key(k, &pub_key, &priv_key);
|
|
# else
|
|
pub_key = k->pub_key; priv_key = k->priv_key;
|
|
# endif
|
|
(void)priv_key;
|
|
*size = (uint16_t)BN_num_bytes(p);
|
|
T = (*size - 64) / 8;
|
|
|
|
if (T > 8) {
|
|
#ifdef STDERR_MSGS
|
|
fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
|
|
fprintf(stderr, " not implemented\n");
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
/* size = 64 + (T * 8); */
|
|
memset(data, 0, 21 + *size * 3);
|
|
data[0] = (unsigned char)T;
|
|
BN_bn2bin(q, data + 1 ); /* 20 octects */
|
|
BN_bn2bin(p, data + 21 ); /* offset octects */
|
|
BN_bn2bin(g, data + 21 + *size * 2 - BN_num_bytes(g));
|
|
BN_bn2bin(pub_key,data + 21 + *size * 3 - BN_num_bytes(pub_key));
|
|
*size = 21 + *size * 3;
|
|
return true;
|
|
}
|
|
#endif /* USE_DSA */
|
|
|
|
#ifdef USE_GOST
|
|
static bool
|
|
ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
|
|
{
|
|
int i;
|
|
unsigned char* pp = NULL;
|
|
if(i2d_PUBKEY(k, &pp) != 37 + 64) {
|
|
/* expect 37 byte(ASN header) and 64 byte(X and Y) */
|
|
free(pp);
|
|
return false;
|
|
}
|
|
/* omit ASN header */
|
|
for(i=0; i<64; i++)
|
|
data[i] = pp[i+37];
|
|
free(pp);
|
|
*size = 64;
|
|
return true;
|
|
}
|
|
#endif /* USE_GOST */
|
|
|
|
#ifdef USE_ED25519
|
|
static bool
|
|
ldns_key_ed255192bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
|
|
{
|
|
int i;
|
|
unsigned char* pp = NULL;
|
|
if(i2d_PUBKEY(k, &pp) != 12 + 32) {
|
|
/* expect 12 byte(ASN header) and 32 byte(pubkey) */
|
|
free(pp);
|
|
return false;
|
|
}
|
|
/* omit ASN header */
|
|
for(i=0; i<32; i++)
|
|
data[i] = pp[i+12];
|
|
free(pp);
|
|
*size = 32;
|
|
return true;
|
|
}
|
|
#endif /* USE_ED25519 */
|
|
|
|
#ifdef USE_ED448
|
|
static bool
|
|
ldns_key_ed4482bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
|
|
{
|
|
int i;
|
|
unsigned char* pp = NULL;
|
|
if(i2d_PUBKEY(k, &pp) != 12 + 57) {
|
|
/* expect 12 byte(ASN header) and 57 byte(pubkey) */
|
|
free(pp);
|
|
return false;
|
|
}
|
|
/* omit ASN header */
|
|
for(i=0; i<57; i++)
|
|
data[i] = pp[i+12];
|
|
free(pp);
|
|
*size = 57;
|
|
return true;
|
|
}
|
|
#endif /* USE_ED448 */
|
|
#endif /* splint */
|
|
#endif /* HAVE_SSL */
|
|
|
|
ldns_rr *
|
|
ldns_key2rr(const ldns_key *k)
|
|
{
|
|
/* this function will convert a the keydata contained in
|
|
* rsa/dsa pointers to a DNSKEY rr. It will fill in as
|
|
* much as it can, but it does not know about key-flags
|
|
* for instance
|
|
*/
|
|
ldns_rr *pubkey;
|
|
ldns_rdf *keybin;
|
|
unsigned char *bin = NULL;
|
|
uint16_t size = 0;
|
|
#ifdef HAVE_SSL
|
|
RSA *rsa = NULL;
|
|
#ifdef USE_DSA
|
|
DSA *dsa = NULL;
|
|
#endif /* USE_DSA */
|
|
#endif /* HAVE_SSL */
|
|
#ifdef USE_ECDSA
|
|
EC_KEY* ec;
|
|
#endif
|
|
int internal_data = 0;
|
|
|
|
if (!k) {
|
|
return NULL;
|
|
}
|
|
pubkey = ldns_rr_new();
|
|
|
|
switch (ldns_key_algorithm(k)) {
|
|
case LDNS_SIGN_HMACMD5:
|
|
case LDNS_SIGN_HMACSHA1:
|
|
case LDNS_SIGN_HMACSHA224:
|
|
case LDNS_SIGN_HMACSHA256:
|
|
case LDNS_SIGN_HMACSHA384:
|
|
case LDNS_SIGN_HMACSHA512:
|
|
ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
|
|
break;
|
|
default:
|
|
ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
|
|
break;
|
|
}
|
|
/* zero-th rdf - flags */
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
|
|
ldns_key_flags(k)));
|
|
/* first - proto */
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
|
|
|
|
if (ldns_key_pubkey_owner(k)) {
|
|
ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
|
|
}
|
|
|
|
/* third - da algorithm */
|
|
switch(ldns_key_algorithm(k)) {
|
|
case LDNS_SIGN_RSAMD5:
|
|
case LDNS_SIGN_RSASHA1:
|
|
case LDNS_SIGN_RSASHA1_NSEC3:
|
|
case LDNS_SIGN_RSASHA256:
|
|
case LDNS_SIGN_RSASHA512:
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
|
|
#ifdef HAVE_SSL
|
|
rsa = ldns_key_rsa_key(k);
|
|
if (rsa) {
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if (!ldns_key_rsa2bin(bin, rsa, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
RSA_free(rsa);
|
|
internal_data = 1;
|
|
}
|
|
#endif
|
|
size++;
|
|
break;
|
|
#ifdef USE_DSA
|
|
case LDNS_SIGN_DSA:
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
|
|
#ifdef HAVE_SSL
|
|
dsa = ldns_key_dsa_key(k);
|
|
if (dsa) {
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if (!ldns_key_dsa2bin(bin, dsa, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
DSA_free(dsa);
|
|
internal_data = 1;
|
|
}
|
|
#endif /* HAVE_SSL */
|
|
#endif /* USE_DSA */
|
|
break;
|
|
#ifdef USE_DSA
|
|
case LDNS_SIGN_DSA_NSEC3:
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
|
|
#ifdef HAVE_SSL
|
|
dsa = ldns_key_dsa_key(k);
|
|
if (dsa) {
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if (!ldns_key_dsa2bin(bin, dsa, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
DSA_free(dsa);
|
|
internal_data = 1;
|
|
}
|
|
#endif /* HAVE_SSL */
|
|
#endif /* USE_DSA */
|
|
break;
|
|
case LDNS_SIGN_ECC_GOST:
|
|
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
|
|
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
|
|
#if defined(HAVE_SSL) && defined(USE_GOST)
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
#ifndef S_SPLINT_S
|
|
if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
#endif /* splint */
|
|
internal_data = 1;
|
|
#else
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
#endif /* HAVE_SSL and USE_GOST */
|
|
break;
|
|
case LDNS_SIGN_ECDSAP256SHA256:
|
|
case LDNS_SIGN_ECDSAP384SHA384:
|
|
#ifdef USE_ECDSA
|
|
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
|
|
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
|
|
bin = NULL;
|
|
#ifndef S_SPLINT_S
|
|
ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
|
|
#endif
|
|
EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
|
|
size = (uint16_t)i2o_ECPublicKey(ec, NULL);
|
|
if(!i2o_ECPublicKey(ec, &bin)) {
|
|
EC_KEY_free(ec);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if(size > 1) {
|
|
/* move back one byte to shave off the 0x02
|
|
* 'uncompressed' indicator that openssl made
|
|
* Actually its 0x04 (from implementation).
|
|
*/
|
|
assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
|
|
size -= 1;
|
|
memmove(bin, bin+1, size);
|
|
}
|
|
/* down the reference count for ec, its still assigned
|
|
* to the pkey */
|
|
EC_KEY_free(ec);
|
|
internal_data = 1;
|
|
#else
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
#endif /* ECDSA */
|
|
break;
|
|
#ifdef USE_ED25519
|
|
case LDNS_SIGN_ED25519:
|
|
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
|
|
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if (!ldns_key_ed255192bin(bin, k->_key.key, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
internal_data = 1;
|
|
break;
|
|
#endif
|
|
#ifdef USE_ED448
|
|
case LDNS_SIGN_ED448:
|
|
ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
|
|
LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
|
|
bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
if (!ldns_key_ed4482bin(bin, k->_key.key, &size)) {
|
|
LDNS_FREE(bin);
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
internal_data = 1;
|
|
break;
|
|
#endif
|
|
case LDNS_SIGN_HMACMD5:
|
|
case LDNS_SIGN_HMACSHA1:
|
|
case LDNS_SIGN_HMACSHA224:
|
|
case LDNS_SIGN_HMACSHA256:
|
|
case LDNS_SIGN_HMACSHA384:
|
|
case LDNS_SIGN_HMACSHA512:
|
|
bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
|
|
if (!bin) {
|
|
ldns_rr_free(pubkey);
|
|
return NULL;
|
|
}
|
|
ldns_rr_push_rdf(pubkey,
|
|
ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
|
|
ldns_key_algorithm(k)));
|
|
size = ldns_key_hmac_size(k);
|
|
memcpy(bin, ldns_key_hmac_key(k), size);
|
|
internal_data = 1;
|
|
break;
|
|
}
|
|
/* fourth the key bin material */
|
|
if (internal_data) {
|
|
keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
|
|
LDNS_FREE(bin);
|
|
ldns_rr_push_rdf(pubkey, keybin);
|
|
}
|
|
return pubkey;
|
|
}
|
|
|
|
void
|
|
ldns_key_free(ldns_key *key)
|
|
{
|
|
LDNS_FREE(key);
|
|
}
|
|
|
|
void
|
|
ldns_key_deep_free(ldns_key *key)
|
|
{
|
|
unsigned char* hmac;
|
|
if (ldns_key_pubkey_owner(key)) {
|
|
ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
|
|
}
|
|
#ifdef HAVE_SSL
|
|
if (ldns_key_evp_key(key)) {
|
|
EVP_PKEY_free(ldns_key_evp_key(key));
|
|
}
|
|
#endif /* HAVE_SSL */
|
|
if (ldns_key_hmac_key(key)) {
|
|
hmac = ldns_key_hmac_key(key);
|
|
LDNS_FREE(hmac);
|
|
}
|
|
LDNS_FREE(key);
|
|
}
|
|
|
|
void
|
|
ldns_key_list_free(ldns_key_list *key_list)
|
|
{
|
|
size_t i;
|
|
for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
|
|
ldns_key_deep_free(ldns_key_list_key(key_list, i));
|
|
}
|
|
LDNS_FREE(key_list->_keys);
|
|
LDNS_FREE(key_list);
|
|
}
|
|
|
|
ldns_rr *
|
|
ldns_read_anchor_file(const char *filename)
|
|
{
|
|
FILE *fp;
|
|
/*char line[LDNS_MAX_PACKETLEN];*/
|
|
char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
|
|
int c;
|
|
size_t i = 0;
|
|
ldns_rr *r;
|
|
ldns_status status;
|
|
if(!line) {
|
|
return NULL;
|
|
}
|
|
|
|
fp = fopen(filename, "r");
|
|
if (!fp) {
|
|
#ifdef STDERR_MSGS
|
|
fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
|
|
#endif
|
|
LDNS_FREE(line);
|
|
return NULL;
|
|
}
|
|
|
|
while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
|
|
line[i] = c;
|
|
i++;
|
|
}
|
|
line[i] = '\0';
|
|
|
|
fclose(fp);
|
|
|
|
if (i <= 0) {
|
|
#ifdef STDERR_MSGS
|
|
fprintf(stderr, "nothing read from %s", filename);
|
|
#endif
|
|
LDNS_FREE(line);
|
|
return NULL;
|
|
} else {
|
|
status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
|
|
if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
|
|
LDNS_FREE(line);
|
|
return r;
|
|
} else {
|
|
#ifdef STDERR_MSGS
|
|
fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
|
|
#endif
|
|
LDNS_FREE(line);
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
char *
|
|
ldns_key_get_file_base_name(const ldns_key *key)
|
|
{
|
|
ldns_buffer *buffer;
|
|
char *file_base_name;
|
|
|
|
buffer = ldns_buffer_new(255);
|
|
ldns_buffer_printf(buffer, "K");
|
|
(void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
|
|
ldns_buffer_printf(buffer,
|
|
"+%03u+%05u",
|
|
ldns_key_algorithm(key),
|
|
ldns_key_keytag(key));
|
|
file_base_name = ldns_buffer_export(buffer);
|
|
ldns_buffer_free(buffer);
|
|
return file_base_name;
|
|
}
|
|
|
|
int ldns_key_algo_supported(int algo)
|
|
{
|
|
ldns_lookup_table *lt = ldns_signing_algorithms;
|
|
while(lt->name) {
|
|
if(lt->id == algo)
|
|
return 1;
|
|
lt++;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
|
|
{
|
|
/* list of (signing algorithm id, alias_name) */
|
|
ldns_lookup_table aliases[] = {
|
|
/* from bind dnssec-keygen */
|
|
{LDNS_SIGN_HMACMD5, "HMAC-MD5"},
|
|
#ifdef USE_DSA
|
|
{LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
|
|
#endif /* USE_DSA */
|
|
{LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
|
|
/* old ldns usage, now RFC names */
|
|
#ifdef USE_DSA
|
|
{LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
|
|
#endif
|
|
{LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
|
|
#ifdef USE_GOST
|
|
{LDNS_SIGN_ECC_GOST, "GOST"},
|
|
#endif
|
|
/* compat with possible output */
|
|
{LDNS_DH, "DH"},
|
|
{LDNS_ECC, "ECC"},
|
|
{LDNS_INDIRECT, "INDIRECT"},
|
|
{LDNS_PRIVATEDNS, "PRIVATEDNS"},
|
|
{LDNS_PRIVATEOID, "PRIVATEOID"},
|
|
{0, NULL}};
|
|
ldns_lookup_table* lt = ldns_signing_algorithms;
|
|
ldns_signing_algorithm a;
|
|
char *endptr;
|
|
|
|
while(lt->name) {
|
|
if(strcasecmp(lt->name, name) == 0)
|
|
return lt->id;
|
|
lt++;
|
|
}
|
|
lt = aliases;
|
|
while(lt->name) {
|
|
if(strcasecmp(lt->name, name) == 0)
|
|
return lt->id;
|
|
lt++;
|
|
}
|
|
a = strtol(name, &endptr, 10);
|
|
if (*name && !*endptr)
|
|
return a;
|
|
|
|
return 0;
|
|
}
|