dsa_ameth.c 15.8 KB
Newer Older
1 2 3
/*
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
 * 2006.
4 5 6 7 8 9 10 11 12
 */
/* ====================================================================
 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * 1. Redistributions of source code must retain the above copyright
13
 *    notice, this list of conditions and the following disclaimer.
14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
 *
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in
 *    the documentation and/or other materials provided with the
 *    distribution.
 *
 * 3. All advertising materials mentioning features or use of this
 *    software must display the following acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 *
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 *    endorse or promote products derived from this software without
 *    prior written permission. For written permission, please contact
 *    licensing@OpenSSL.org.
 *
 * 5. Products derived from this software may not be called "OpenSSL"
 *    nor may "OpenSSL" appear in their names without prior written
 *    permission of the OpenSSL Project.
 *
 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 * ====================================================================
 *
 * This product includes cryptographic software written by Eric Young
 * (eay@cryptsoft.com).  This product includes software written by Tim
 * Hudson (tjh@cryptsoft.com).
 *
 */

#include <stdio.h>
60
#include "internal/cryptlib.h"
61 62 63
#include <openssl/x509.h>
#include <openssl/asn1.h>
#include <openssl/dsa.h>
64
#include <openssl/bn.h>
R
Rich Salz 已提交
65
#include <openssl/cms.h>
66
#include "internal/asn1_int.h"
D
Dr. Stephen Henson 已提交
67
#include "internal/evp_int.h"
68 69

static int dsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey)
70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
{
    const unsigned char *p, *pm;
    int pklen, pmlen;
    int ptype;
    void *pval;
    ASN1_STRING *pstr;
    X509_ALGOR *palg;
    ASN1_INTEGER *public_key = NULL;

    DSA *dsa = NULL;

    if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
        return 0;
    X509_ALGOR_get0(NULL, &ptype, &pval, palg);

    if (ptype == V_ASN1_SEQUENCE) {
        pstr = pval;
        pm = pstr->data;
        pmlen = pstr->length;

90
        if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) {
91 92 93 94 95
            DSAerr(DSA_F_DSA_PUB_DECODE, DSA_R_DECODE_ERROR);
            goto err;
        }

    } else if ((ptype == V_ASN1_NULL) || (ptype == V_ASN1_UNDEF)) {
96
        if ((dsa = DSA_new()) == NULL) {
97 98 99 100 101 102 103 104
            DSAerr(DSA_F_DSA_PUB_DECODE, ERR_R_MALLOC_FAILURE);
            goto err;
        }
    } else {
        DSAerr(DSA_F_DSA_PUB_DECODE, DSA_R_PARAMETER_ENCODING_ERROR);
        goto err;
    }

105
    if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) {
106 107 108 109
        DSAerr(DSA_F_DSA_PUB_DECODE, DSA_R_DECODE_ERROR);
        goto err;
    }

110
    if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) {
111 112 113 114 115 116 117 118 119
        DSAerr(DSA_F_DSA_PUB_DECODE, DSA_R_BN_DECODE_ERROR);
        goto err;
    }

    ASN1_INTEGER_free(public_key);
    EVP_PKEY_assign_DSA(pkey, dsa);
    return 1;

 err:
R
Rich Salz 已提交
120
    ASN1_INTEGER_free(public_key);
R
Rich Salz 已提交
121
    DSA_free(dsa);
122 123 124
    return 0;

}
125

126
static int dsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey)
127 128 129 130 131
{
    DSA *dsa;
    int ptype;
    unsigned char *penc = NULL;
    int penclen;
M
Matt Caswell 已提交
132
    ASN1_STRING *str = NULL;
133
    ASN1_INTEGER *pubint = NULL;
134 135 136 137

    dsa = pkey->pkey.dsa;
    if (pkey->save_parameters && dsa->p && dsa->q && dsa->g) {
        str = ASN1_STRING_new();
138
        if (str == NULL) {
M
Matt Caswell 已提交
139 140 141
            DSAerr(DSA_F_DSA_PUB_ENCODE, ERR_R_MALLOC_FAILURE);
            goto err;
        }
142 143 144 145 146 147 148 149 150
        str->length = i2d_DSAparams(dsa, &str->data);
        if (str->length <= 0) {
            DSAerr(DSA_F_DSA_PUB_ENCODE, ERR_R_MALLOC_FAILURE);
            goto err;
        }
        ptype = V_ASN1_SEQUENCE;
    } else
        ptype = V_ASN1_UNDEF;

151
    pubint = BN_to_ASN1_INTEGER(dsa->pub_key, NULL);
152

153 154 155 156 157 158 159
    if (pubint == NULL) {
        DSAerr(DSA_F_DSA_PUB_ENCODE, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    penclen = i2d_ASN1_INTEGER(pubint, &penc);
    ASN1_INTEGER_free(pubint);
160 161 162 163 164 165 166

    if (penclen <= 0) {
        DSAerr(DSA_F_DSA_PUB_ENCODE, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(EVP_PKEY_DSA),
M
Matt Caswell 已提交
167
                               ptype, str, penc, penclen))
168 169 170
        return 1;

 err:
R
Rich Salz 已提交
171
    OPENSSL_free(penc);
R
Rich Salz 已提交
172
    ASN1_STRING_free(str);
173 174 175 176 177 178

    return 0;
}

/*
 * In PKCS#8 DSA: you just get a private key integer and parameters in the
179 180
 * AlgorithmIdentifier the pubkey must be recalculated.
 */
181

182
static int dsa_priv_decode(EVP_PKEY *pkey, PKCS8_PRIV_KEY_INFO *p8)
183
{
184
    const unsigned char *p, *pm;
185 186 187 188 189 190 191 192 193 194
    int pklen, pmlen;
    int ptype;
    void *pval;
    ASN1_STRING *pstr;
    X509_ALGOR *palg;
    ASN1_INTEGER *privkey = NULL;
    BN_CTX *ctx = NULL;

    DSA *dsa = NULL;

195 196
    int ret = 0;

197 198 199 200
    if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8))
        return 0;
    X509_ALGOR_get0(NULL, &ptype, &pval, palg);

201 202
    if ((privkey = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL)
        goto decerr;
203
    if (privkey->type == V_ASN1_NEG_INTEGER || ptype != V_ASN1_SEQUENCE)
204
        goto decerr;
205 206 207 208

    pstr = pval;
    pm = pstr->data;
    pmlen = pstr->length;
209
    if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL)
210 211
        goto decerr;
    /* We have parameters now set private key */
R
Rich Salz 已提交
212 213
    if ((dsa->priv_key = BN_secure_new()) == NULL
        || !ASN1_INTEGER_to_BN(privkey, dsa->priv_key)) {
214 215 216 217
        DSAerr(DSA_F_DSA_PRIV_DECODE, DSA_R_BN_ERROR);
        goto dsaerr;
    }
    /* Calculate public key */
218
    if ((dsa->pub_key = BN_new()) == NULL) {
219 220 221
        DSAerr(DSA_F_DSA_PRIV_DECODE, ERR_R_MALLOC_FAILURE);
        goto dsaerr;
    }
222
    if ((ctx = BN_CTX_new()) == NULL) {
223 224 225 226 227 228 229 230 231 232 233
        DSAerr(DSA_F_DSA_PRIV_DECODE, ERR_R_MALLOC_FAILURE);
        goto dsaerr;
    }

    if (!BN_mod_exp(dsa->pub_key, dsa->g, dsa->priv_key, dsa->p, ctx)) {
        DSAerr(DSA_F_DSA_PRIV_DECODE, DSA_R_BN_ERROR);
        goto dsaerr;
    }

    EVP_PKEY_assign_DSA(pkey, dsa);

234 235
    ret = 1;
    goto done;
236 237

 decerr:
D
typo  
Dr. Stephen Henson 已提交
238
    DSAerr(DSA_F_DSA_PRIV_DECODE, DSA_R_DECODE_ERROR);
239
 dsaerr:
240 241
    DSA_free(dsa);
 done:
242
    BN_CTX_free(ctx);
R
Rich Salz 已提交
243
    ASN1_STRING_clear_free(privkey);
244
    return ret;
245
}
246

247
static int dsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey)
248
{
249 250 251 252 253 254 255 256 257 258 259 260
    ASN1_STRING *params = NULL;
    ASN1_INTEGER *prkey = NULL;
    unsigned char *dp = NULL;
    int dplen;

    if (!pkey->pkey.dsa || !pkey->pkey.dsa->priv_key) {
        DSAerr(DSA_F_DSA_PRIV_ENCODE, DSA_R_MISSING_PARAMETERS);
        goto err;
    }

    params = ASN1_STRING_new();

261
    if (params == NULL) {
262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282
        DSAerr(DSA_F_DSA_PRIV_ENCODE, ERR_R_MALLOC_FAILURE);
        goto err;
    }

    params->length = i2d_DSAparams(pkey->pkey.dsa, &params->data);
    if (params->length <= 0) {
        DSAerr(DSA_F_DSA_PRIV_ENCODE, ERR_R_MALLOC_FAILURE);
        goto err;
    }
    params->type = V_ASN1_SEQUENCE;

    /* Get private key into integer */
    prkey = BN_to_ASN1_INTEGER(pkey->pkey.dsa->priv_key, NULL);

    if (!prkey) {
        DSAerr(DSA_F_DSA_PRIV_ENCODE, DSA_R_BN_ERROR);
        goto err;
    }

    dplen = i2d_ASN1_INTEGER(prkey, &dp);

283
    ASN1_STRING_clear_free(prkey);
M
Martin Vejnar 已提交
284
    prkey = NULL;
285 286 287 288 289 290 291 292

    if (!PKCS8_pkey_set0(p8, OBJ_nid2obj(NID_dsa), 0,
                         V_ASN1_SEQUENCE, params, dp, dplen))
        goto err;

    return 1;

 err:
R
Rich Salz 已提交
293
    OPENSSL_free(dp);
R
Rich Salz 已提交
294
    ASN1_STRING_free(params);
R
Rich Salz 已提交
295
    ASN1_STRING_clear_free(prkey);
296
    return 0;
297 298
}

299
static int int_dsa_size(const EVP_PKEY *pkey)
300 301 302
{
    return (DSA_size(pkey->pkey.dsa));
}
303 304

static int dsa_bits(const EVP_PKEY *pkey)
305 306 307
{
    return BN_num_bits(pkey->pkey.dsa->p);
}
308

309
static int dsa_security_bits(const EVP_PKEY *pkey)
310 311 312
{
    return DSA_security_bits(pkey->pkey.dsa);
}
313

314
static int dsa_missing_parameters(const EVP_PKEY *pkey)
315 316 317 318 319 320 321
{
    DSA *dsa;
    dsa = pkey->pkey.dsa;
    if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
        return 1;
    return 0;
}
322 323

static int dsa_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from)
324 325 326
{
    BIGNUM *a;

327 328 329 330 331 332
    if (to->pkey.dsa == NULL) {
        to->pkey.dsa = DSA_new();
        if (to->pkey.dsa == NULL)
            return 0;
    }

333 334
    if ((a = BN_dup(from->pkey.dsa->p)) == NULL)
        return 0;
R
Rich Salz 已提交
335
    BN_free(to->pkey.dsa->p);
336 337 338 339
    to->pkey.dsa->p = a;

    if ((a = BN_dup(from->pkey.dsa->q)) == NULL)
        return 0;
R
Rich Salz 已提交
340
    BN_free(to->pkey.dsa->q);
341 342 343 344
    to->pkey.dsa->q = a;

    if ((a = BN_dup(from->pkey.dsa->g)) == NULL)
        return 0;
R
Rich Salz 已提交
345
    BN_free(to->pkey.dsa->g);
346 347 348
    to->pkey.dsa->g = a;
    return 1;
}
349 350

static int dsa_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b)
351 352 353 354 355 356 357 358
{
    if (BN_cmp(a->pkey.dsa->p, b->pkey.dsa->p) ||
        BN_cmp(a->pkey.dsa->q, b->pkey.dsa->q) ||
        BN_cmp(a->pkey.dsa->g, b->pkey.dsa->g))
        return 0;
    else
        return 1;
}
359

360
static int dsa_pub_cmp(const EVP_PKEY *a, const EVP_PKEY *b)
361 362 363 364 365 366
{
    if (BN_cmp(b->pkey.dsa->pub_key, a->pkey.dsa->pub_key) != 0)
        return 0;
    else
        return 1;
}
367

368
static void int_dsa_free(EVP_PKEY *pkey)
369 370 371
{
    DSA_free(pkey->pkey.dsa);
}
372

373
static int do_dsa_print(BIO *bp, const DSA *x, int off, int ptype)
374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403
{
    int ret = 0;
    const char *ktype = NULL;
    const BIGNUM *priv_key, *pub_key;

    if (ptype == 2)
        priv_key = x->priv_key;
    else
        priv_key = NULL;

    if (ptype > 0)
        pub_key = x->pub_key;
    else
        pub_key = NULL;

    if (ptype == 2)
        ktype = "Private-Key";
    else if (ptype == 1)
        ktype = "Public-Key";
    else
        ktype = "DSA-Parameters";

    if (priv_key) {
        if (!BIO_indent(bp, off, 128))
            goto err;
        if (BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p))
            <= 0)
            goto err;
    }

404
    if (!ASN1_bn_print(bp, "priv:", priv_key, NULL, off))
405
        goto err;
406
    if (!ASN1_bn_print(bp, "pub: ", pub_key, NULL, off))
407
        goto err;
408
    if (!ASN1_bn_print(bp, "P:   ", x->p, NULL, off))
409
        goto err;
410
    if (!ASN1_bn_print(bp, "Q:   ", x->q, NULL, off))
411
        goto err;
412
    if (!ASN1_bn_print(bp, "G:   ", x->g, NULL, off))
413 414 415 416 417
        goto err;
    ret = 1;
 err:
    return (ret);
}
418

419
static int dsa_param_decode(EVP_PKEY *pkey,
420 421 422
                            const unsigned char **pder, int derlen)
{
    DSA *dsa;
423 424

    if ((dsa = d2i_DSAparams(NULL, pder, derlen)) == NULL) {
425 426 427 428 429 430
        DSAerr(DSA_F_DSA_PARAM_DECODE, ERR_R_DSA_LIB);
        return 0;
    }
    EVP_PKEY_assign_DSA(pkey, dsa);
    return 1;
}
431 432

static int dsa_param_encode(const EVP_PKEY *pkey, unsigned char **pder)
433 434 435
{
    return i2d_DSAparams(pkey->pkey.dsa, pder);
}
436 437

static int dsa_param_print(BIO *bp, const EVP_PKEY *pkey, int indent,
438 439 440 441
                           ASN1_PCTX *ctx)
{
    return do_dsa_print(bp, pkey->pkey.dsa, indent, 0);
}
442 443

static int dsa_pub_print(BIO *bp, const EVP_PKEY *pkey, int indent,
444 445 446 447
                         ASN1_PCTX *ctx)
{
    return do_dsa_print(bp, pkey->pkey.dsa, indent, 1);
}
448 449

static int dsa_priv_print(BIO *bp, const EVP_PKEY *pkey, int indent,
450 451 452 453
                          ASN1_PCTX *ctx)
{
    return do_dsa_print(bp, pkey->pkey.dsa, indent, 2);
}
454

455
static int old_dsa_priv_decode(EVP_PKEY *pkey,
456 457 458
                               const unsigned char **pder, int derlen)
{
    DSA *dsa;
459 460

    if ((dsa = d2i_DSAPrivateKey(NULL, pder, derlen)) == NULL) {
461 462 463 464 465 466
        DSAerr(DSA_F_OLD_DSA_PRIV_DECODE, ERR_R_DSA_LIB);
        return 0;
    }
    EVP_PKEY_assign_DSA(pkey, dsa);
    return 1;
}
467 468

static int old_dsa_priv_encode(const EVP_PKEY *pkey, unsigned char **pder)
469 470 471
{
    return i2d_DSAPrivateKey(pkey->pkey.dsa, pder);
}
472

473
static int dsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
474 475 476 477
                         const ASN1_STRING *sig, int indent, ASN1_PCTX *pctx)
{
    DSA_SIG *dsa_sig;
    const unsigned char *p;
478

479 480 481 482 483 484 485 486 487 488
    if (!sig) {
        if (BIO_puts(bp, "\n") <= 0)
            return 0;
        else
            return 1;
    }
    p = sig->data;
    dsa_sig = d2i_DSA_SIG(NULL, &p, sig->length);
    if (dsa_sig) {
        int rv = 0;
D
Dr. Stephen Henson 已提交
489 490 491
        BIGNUM *r, *s;

        DSA_SIG_get0(&r, &s, dsa_sig);
492 493 494 495

        if (BIO_write(bp, "\n", 1) != 1)
            goto err;

D
Dr. Stephen Henson 已提交
496
        if (!ASN1_bn_print(bp, "r:   ", r, NULL, indent))
497
            goto err;
D
Dr. Stephen Henson 已提交
498
        if (!ASN1_bn_print(bp, "s:   ", s, NULL, indent))
499 500 501 502 503 504 505 506
            goto err;
        rv = 1;
 err:
        DSA_SIG_free(dsa_sig);
        return rv;
    }
    return X509_signature_dump(bp, sig, indent);
}
507

508
static int dsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525
{
    switch (op) {
    case ASN1_PKEY_CTRL_PKCS7_SIGN:
        if (arg1 == 0) {
            int snid, hnid;
            X509_ALGOR *alg1, *alg2;
            PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, &alg1, &alg2);
            if (alg1 == NULL || alg1->algorithm == NULL)
                return -1;
            hnid = OBJ_obj2nid(alg1->algorithm);
            if (hnid == NID_undef)
                return -1;
            if (!OBJ_find_sigid_by_algs(&snid, hnid, EVP_PKEY_id(pkey)))
                return -1;
            X509_ALGOR_set0(alg2, OBJ_nid2obj(snid), V_ASN1_UNDEF, 0);
        }
        return 1;
D
Dr. Stephen Henson 已提交
526
#ifndef OPENSSL_NO_CMS
527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545
    case ASN1_PKEY_CTRL_CMS_SIGN:
        if (arg1 == 0) {
            int snid, hnid;
            X509_ALGOR *alg1, *alg2;
            CMS_SignerInfo_get0_algs(arg2, NULL, NULL, &alg1, &alg2);
            if (alg1 == NULL || alg1->algorithm == NULL)
                return -1;
            hnid = OBJ_obj2nid(alg1->algorithm);
            if (hnid == NID_undef)
                return -1;
            if (!OBJ_find_sigid_by_algs(&snid, hnid, EVP_PKEY_id(pkey)))
                return -1;
            X509_ALGOR_set0(alg2, OBJ_nid2obj(snid), V_ASN1_UNDEF, 0);
        }
        return 1;

    case ASN1_PKEY_CTRL_CMS_RI_TYPE:
        *(int *)arg2 = CMS_RECIPINFO_NONE;
        return 1;
D
Dr. Stephen Henson 已提交
546
#endif
547

548 549 550
    case ASN1_PKEY_CTRL_DEFAULT_MD_NID:
        *(int *)arg2 = NID_sha256;
        return 2;
551

552 553
    default:
        return -2;
554

555
    }
556

557
}
558

559 560
/* NB these are sorted in pkey_id order, lowest first */

561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616
const EVP_PKEY_ASN1_METHOD dsa_asn1_meths[] = {

    {
     EVP_PKEY_DSA2,
     EVP_PKEY_DSA,
     ASN1_PKEY_ALIAS},

    {
     EVP_PKEY_DSA1,
     EVP_PKEY_DSA,
     ASN1_PKEY_ALIAS},

    {
     EVP_PKEY_DSA4,
     EVP_PKEY_DSA,
     ASN1_PKEY_ALIAS},

    {
     EVP_PKEY_DSA3,
     EVP_PKEY_DSA,
     ASN1_PKEY_ALIAS},

    {
     EVP_PKEY_DSA,
     EVP_PKEY_DSA,
     0,

     "DSA",
     "OpenSSL DSA method",

     dsa_pub_decode,
     dsa_pub_encode,
     dsa_pub_cmp,
     dsa_pub_print,

     dsa_priv_decode,
     dsa_priv_encode,
     dsa_priv_print,

     int_dsa_size,
     dsa_bits,
     dsa_security_bits,

     dsa_param_decode,
     dsa_param_encode,
     dsa_missing_parameters,
     dsa_copy_parameters,
     dsa_cmp_parameters,
     dsa_param_print,
     dsa_sig_print,

     int_dsa_free,
     dsa_pkey_ctrl,
     old_dsa_priv_decode,
     old_dsa_priv_encode}
};