| 
									
										
										
										
											2020-01-28 00:50:47 +08:00
										 |  |  | /*
 | 
					
						
							|  |  |  |  * Copyright 2020 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							|  |  |  |  * this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  |  * in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  |  * https://www.openssl.org/source/license.html
 | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <openssl/err.h>
 | 
					
						
							|  |  |  | #include "crypto/ecx.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-04-24 22:43:20 +08:00
										 |  |  | ECX_KEY *ecx_key_new(OPENSSL_CTX *libctx, ECX_KEY_TYPE type, int haspubkey) | 
					
						
							| 
									
										
										
										
											2020-01-28 00:50:47 +08:00
										 |  |  | { | 
					
						
							|  |  |  |     ECX_KEY *ret = OPENSSL_zalloc(sizeof(*ret)); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (ret == NULL) | 
					
						
							|  |  |  |         return NULL; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-04-24 22:43:20 +08:00
										 |  |  |     ret->libctx = libctx; | 
					
						
							| 
									
										
										
										
											2020-01-28 00:50:47 +08:00
										 |  |  |     ret->haspubkey = haspubkey; | 
					
						
							| 
									
										
										
										
											2020-03-18 06:40:33 +08:00
										 |  |  |     switch (type) { | 
					
						
							|  |  |  |     case ECX_KEY_TYPE_X25519: | 
					
						
							|  |  |  |         ret->keylen = X25519_KEYLEN; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  |     case ECX_KEY_TYPE_X448: | 
					
						
							|  |  |  |         ret->keylen = X448_KEYLEN; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  |     case ECX_KEY_TYPE_ED25519: | 
					
						
							|  |  |  |         ret->keylen = ED25519_KEYLEN; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  |     case ECX_KEY_TYPE_ED448: | 
					
						
							|  |  |  |         ret->keylen = ED448_KEYLEN; | 
					
						
							|  |  |  |         break; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     ret->type = type; | 
					
						
							| 
									
										
										
										
											2020-01-28 00:50:47 +08:00
										 |  |  |     ret->references = 1; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     ret->lock = CRYPTO_THREAD_lock_new(); | 
					
						
							|  |  |  |     if (ret->lock == NULL) { | 
					
						
							|  |  |  |         ERR_raise(ERR_LIB_EC, ERR_R_MALLOC_FAILURE); | 
					
						
							|  |  |  |         OPENSSL_free(ret); | 
					
						
							|  |  |  |         return NULL; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return ret; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ecx_key_free(ECX_KEY *key) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int i; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (key == NULL) | 
					
						
							|  |  |  |         return; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     CRYPTO_DOWN_REF(&key->references, &i, key->lock); | 
					
						
							|  |  |  |     REF_PRINT_COUNT("ECX_KEY", r); | 
					
						
							|  |  |  |     if (i > 0) | 
					
						
							|  |  |  |         return; | 
					
						
							|  |  |  |     REF_ASSERT_ISNT(i < 0); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     OPENSSL_secure_clear_free(key->privkey, key->keylen); | 
					
						
							|  |  |  |     CRYPTO_THREAD_lock_free(key->lock); | 
					
						
							|  |  |  |     OPENSSL_free(key); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int ecx_key_up_ref(ECX_KEY *key) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     int i; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (CRYPTO_UP_REF(&key->references, &i, key->lock) <= 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     REF_PRINT_COUNT("ECX_KEY", key); | 
					
						
							|  |  |  |     REF_ASSERT_ISNT(i < 2); | 
					
						
							|  |  |  |     return ((i > 1) ? 1 : 0); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | unsigned char *ecx_key_allocate_privkey(ECX_KEY *key) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     key->privkey = OPENSSL_secure_zalloc(key->keylen); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return key->privkey; | 
					
						
							|  |  |  | } |