Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
3ba0885a
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
3ba0885a
编写于
4月 12, 2006
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Extend DH ASN1 method, add DH EVP_PKEY_METHOD.
上级
023c9d8d
变更
7
隐藏空白更改
内联
并排
Showing
7 changed file
with
244 addition
and
9 deletion
+244
-9
CHANGES
CHANGES
+7
-0
crypto/dh/Makefile
crypto/dh/Makefile
+2
-2
crypto/dh/dh.h
crypto/dh/dh.h
+13
-1
crypto/dh/dh_ameth.c
crypto/dh/dh_ameth.c
+4
-4
crypto/dh/dh_err.c
crypto/dh/dh_err.c
+1
-1
crypto/dh/dh_pmeth.c
crypto/dh/dh_pmeth.c
+215
-0
crypto/evp/pmeth_lib.c
crypto/evp/pmeth_lib.c
+2
-1
未找到文件。
CHANGES
浏览文件 @
3ba0885a
...
...
@@ -4,6 +4,13 @@
Changes between 0.9.8a and 0.9.9 [xx XXX xxxx]
*) Add DSA pkey method and DH pkey methods, extend DH ASN1 method to support
public and private key formats. As a side effect these add additional
command line functionality not previously available: DSA signatures can be
generated and verified using pkeyutl and DH key support and generation in
pkey, genpkey.
[Steve Henson]
*) BeOS support.
[Oliver Tappe <zooey@hirschkaefer.de>]
...
...
crypto/dh/Makefile
浏览文件 @
3ba0885a
...
...
@@ -18,9 +18,9 @@ APPS=
LIB
=
$(TOP)
/libcrypto.a
LIBSRC
=
dh_asn1.c dh_gen.c dh_key.c dh_lib.c dh_check.c dh_err.c dh_depr.c
\
dh_ameth.c dh_prn.c
dh_ameth.c dh_p
meth.c dh_p
rn.c
LIBOBJ
=
dh_asn1.o dh_gen.o dh_key.o dh_lib.o dh_check.o dh_err.o dh_depr.o
\
dh_ameth.o dh_prn.o
dh_ameth.o dh_p
meth.o dh_p
rn.o
SRC
=
$(LIBSRC)
...
...
crypto/dh/dh.h
浏览文件 @
3ba0885a
...
...
@@ -201,6 +201,18 @@ int DHparams_print(BIO *bp, const DH *x);
int
DHparams_print
(
char
*
bp
,
const
DH
*
x
);
#endif
#define EVP_PKEY_CTX_set_dh_paramgen_prime_len(ctx, len) \
EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN, \
EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN, len, NULL)
#define EVP_PKEY_CTX_set_dh_paramgen_generator(ctx, gen) \
EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN, \
EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR, gen, NULL)
#define EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN (EVP_PKEY_ALG_CTRL + 1)
#define EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR (EVP_PKEY_ALG_CTRL + 2)
/* BEGIN ERROR CODES */
/* The following lines are auto generated by the script mkerr.pl. Any changes
* made after this point may be overwritten when the script is next run.
...
...
@@ -220,9 +232,9 @@ void ERR_load_DH_strings(void);
#define DH_F_DH_PRIV_ENCODE 111
#define DH_F_DH_PUB_DECODE 108
#define DH_F_DH_PUB_ENCODE 109
#define DH_F_DSA_PRIV_ENCODE 112
#define DH_F_GENERATE_KEY 103
#define DH_F_GENERATE_PARAMETERS 104
#define DH_F_PKEY_DH_KEYGEN 113
/* Reason codes. */
#define DH_R_BAD_GENERATOR 101
...
...
crypto/dh/dh_ameth.c
浏览文件 @
3ba0885a
...
...
@@ -260,7 +260,7 @@ static int dh_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey)
if
(
!
prkey
)
{
DHerr
(
DH_F_D
SA
_PRIV_ENCODE
,
DH_R_BN_ERROR
);
DHerr
(
DH_F_D
H
_PRIV_ENCODE
,
DH_R_BN_ERROR
);
goto
err
;
}
...
...
@@ -268,7 +268,7 @@ static int dh_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey)
ASN1_INTEGER_free
(
prkey
);
if
(
!
PKCS8_pkey_set0
(
p8
,
OBJ_nid2obj
(
NID_d
sa
),
0
,
if
(
!
PKCS8_pkey_set0
(
p8
,
OBJ_nid2obj
(
NID_d
hKeyAgreement
),
0
,
V_ASN1_SEQUENCE
,
params
,
dp
,
dplen
))
goto
err
;
...
...
@@ -403,9 +403,9 @@ static int dh_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from)
if
((
a
=
BN_dup
(
from
->
pkey
.
dh
->
p
))
==
NULL
)
return
0
;
if
(
to
->
pkey
.
d
sa
->
p
!=
NULL
)
if
(
to
->
pkey
.
d
h
->
p
!=
NULL
)
BN_free
(
to
->
pkey
.
dh
->
p
);
to
->
pkey
.
d
sa
->
p
=
a
;
to
->
pkey
.
d
h
->
p
=
a
;
if
((
a
=
BN_dup
(
from
->
pkey
.
dh
->
g
))
==
NULL
)
return
0
;
...
...
crypto/dh/dh_err.c
浏览文件 @
3ba0885a
...
...
@@ -80,9 +80,9 @@ static ERR_STRING_DATA DH_str_functs[]=
{
ERR_FUNC
(
DH_F_DH_PRIV_ENCODE
),
"DH_PRIV_ENCODE"
},
{
ERR_FUNC
(
DH_F_DH_PUB_DECODE
),
"DH_PUB_DECODE"
},
{
ERR_FUNC
(
DH_F_DH_PUB_ENCODE
),
"DH_PUB_ENCODE"
},
{
ERR_FUNC
(
DH_F_DSA_PRIV_ENCODE
),
"DSA_PRIV_ENCODE"
},
{
ERR_FUNC
(
DH_F_GENERATE_KEY
),
"GENERATE_KEY"
},
{
ERR_FUNC
(
DH_F_GENERATE_PARAMETERS
),
"GENERATE_PARAMETERS"
},
{
ERR_FUNC
(
DH_F_PKEY_DH_KEYGEN
),
"PKEY_DH_KEYGEN"
},
{
0
,
NULL
}
};
...
...
crypto/dh/dh_pmeth.c
0 → 100644
浏览文件 @
3ba0885a
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
* project 2006.
*/
/* ====================================================================
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* licensing@OpenSSL.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
#include <stdio.h>
#include "cryptlib.h"
#include <openssl/asn1t.h>
#include <openssl/x509.h>
#include <openssl/rsa.h>
#include <openssl/evp.h>
#include "evp_locl.h"
/* DH pkey context structure */
typedef
struct
{
/* Parameter gen parameters */
int
prime_len
;
int
generator
;
int
use_dsa
;
/* Keygen callback info */
int
gentmp
[
2
];
/* message digest */
}
DH_PKEY_CTX
;
static
int
pkey_dh_init
(
EVP_PKEY_CTX
*
ctx
)
{
DH_PKEY_CTX
*
dctx
;
dctx
=
OPENSSL_malloc
(
sizeof
(
DH_PKEY_CTX
));
if
(
!
dctx
)
return
0
;
dctx
->
prime_len
=
1024
;
dctx
->
generator
=
2
;
dctx
->
use_dsa
=
0
;
ctx
->
data
=
dctx
;
ctx
->
keygen_info
=
dctx
->
gentmp
;
ctx
->
keygen_info_count
=
2
;
return
1
;
}
static
void
pkey_dh_cleanup
(
EVP_PKEY_CTX
*
ctx
)
{
DH_PKEY_CTX
*
dctx
=
ctx
->
data
;
if
(
dctx
)
OPENSSL_free
(
dctx
);
}
static
int
pkey_dh_ctrl
(
EVP_PKEY_CTX
*
ctx
,
int
type
,
int
p1
,
void
*
p2
)
{
DH_PKEY_CTX
*
dctx
=
ctx
->
data
;
switch
(
type
)
{
case
EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN
:
if
(
p1
<
256
)
return
-
2
;
dctx
->
prime_len
=
p1
;
return
1
;
case
EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR
:
dctx
->
generator
=
p1
;
return
1
;
default:
return
-
2
;
}
}
static
int
pkey_dh_ctrl_str
(
EVP_PKEY_CTX
*
ctx
,
const
char
*
type
,
const
char
*
value
)
{
if
(
!
strcmp
(
type
,
"dh_paramgen_prime_len"
))
{
int
len
;
len
=
atoi
(
value
);
return
EVP_PKEY_CTX_set_dh_paramgen_prime_len
(
ctx
,
len
);
}
if
(
!
strcmp
(
type
,
"dh_paramgen_generator"
))
{
int
len
;
len
=
atoi
(
value
);
return
EVP_PKEY_CTX_set_dh_paramgen_generator
(
ctx
,
len
);
}
return
-
2
;
}
static
int
pkey_dh_paramgen
(
EVP_PKEY_CTX
*
ctx
,
EVP_PKEY
*
pkey
)
{
DH
*
dh
=
NULL
;
DH_PKEY_CTX
*
dctx
=
ctx
->
data
;
BN_GENCB
*
pcb
,
cb
;
int
ret
;
if
(
ctx
->
pkey_gencb
)
{
pcb
=
&
cb
;
evp_pkey_set_cb_translate
(
pcb
,
ctx
);
}
else
pcb
=
NULL
;
dh
=
DH_new
();
if
(
!
dh
)
return
0
;
ret
=
DH_generate_parameters_ex
(
dh
,
dctx
->
prime_len
,
dctx
->
generator
,
pcb
);
if
(
ret
)
EVP_PKEY_assign_DH
(
pkey
,
dh
);
else
DH_free
(
dh
);
return
ret
;
}
static
int
pkey_dh_keygen
(
EVP_PKEY_CTX
*
ctx
,
EVP_PKEY
*
pkey
)
{
DH
*
dh
=
NULL
;
if
(
ctx
->
pkey
==
NULL
)
{
DHerr
(
DH_F_PKEY_DH_KEYGEN
,
DSA_R_NO_PARAMETERS_SET
);
return
0
;
}
dh
=
DH_new
();
if
(
!
dh
)
return
0
;
EVP_PKEY_assign_DH
(
pkey
,
dh
);
/* Note: if error return, pkey is freed by parent routine */
if
(
!
EVP_PKEY_copy_parameters
(
pkey
,
ctx
->
pkey
))
return
0
;
return
DH_generate_key
(
pkey
->
pkey
.
dh
);
}
const
EVP_PKEY_METHOD
dh_pkey_meth
=
{
EVP_PKEY_DH
,
0
,
pkey_dh_init
,
pkey_dh_cleanup
,
0
,
pkey_dh_paramgen
,
0
,
pkey_dh_keygen
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
0
,
pkey_dh_ctrl
,
pkey_dh_ctrl_str
};
crypto/evp/pmeth_lib.c
浏览文件 @
3ba0885a
...
...
@@ -66,11 +66,12 @@
STACK
*
app_pkey_methods
=
NULL
;
extern
EVP_PKEY_METHOD
rsa_pkey_meth
,
dsa_pkey_meth
;
extern
EVP_PKEY_METHOD
rsa_pkey_meth
,
d
h_pkey_meth
,
d
sa_pkey_meth
;
static
const
EVP_PKEY_METHOD
*
standard_methods
[]
=
{
&
rsa_pkey_meth
,
&
dh_pkey_meth
,
&
dsa_pkey_meth
};
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录