keys.c
Go to the documentation of this file.
1 /*
2  * keys.c handle private keys for use in DNSSEC
3  *
4  * This module should hide some of the openSSL complexities
5  * and give a general interface for private keys and hmac
6  * handling
7  *
8  * (c) NLnet Labs, 2004-2006
9  *
10  * See the file LICENSE for the license
11  */
12 
13 #include <ldns/config.h>
14 
15 #include <ldns/ldns.h>
16 
17 #ifdef HAVE_SSL
18 #include <openssl/ui.h>
19 #include <openssl/ssl.h>
20 #include <openssl/rand.h>
21 #include <openssl/bn.h>
22 #include <openssl/rsa.h>
23 #ifdef USE_DSA
24 #include <openssl/dsa.h>
25 #endif
26 #ifndef OPENSSL_NO_ENGINE
27 #include <openssl/engine.h>
28 #endif
29 #endif /* HAVE_SSL */
30 
32  { LDNS_SIGN_RSAMD5, "RSAMD5" },
33  { LDNS_SIGN_RSASHA1, "RSASHA1" },
34  { LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
35 #ifdef USE_SHA2
36  { LDNS_SIGN_RSASHA256, "RSASHA256" },
37  { LDNS_SIGN_RSASHA512, "RSASHA512" },
38 #endif
39 #ifdef USE_GOST
40  { LDNS_SIGN_ECC_GOST, "ECC-GOST" },
41 #endif
42 #ifdef USE_ECDSA
43  { LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
44  { LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
45 #endif
46 #ifdef USE_ED25519
47  { LDNS_SIGN_ED25519, "ED25519" },
48 #endif
49 #ifdef USE_ED448
50  { LDNS_SIGN_ED448, "ED448" },
51 #endif
52 #ifdef USE_DSA
53  { LDNS_SIGN_DSA, "DSA" },
54  { LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
55 #endif
56  { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
57  { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
58  { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
59  { LDNS_SIGN_HMACSHA224, "hmac-sha224" },
60  { LDNS_SIGN_HMACSHA384, "hmac-sha384" },
61  { LDNS_SIGN_HMACSHA512, "hmac-sha512" },
62  { 0, NULL }
63 };
64 
67 {
69  if (!key_list) {
70  return NULL;
71  } else {
72  key_list->_key_count = 0;
73  key_list->_keys = NULL;
74  return key_list;
75  }
76 }
77 
78 ldns_key *
80 {
81  ldns_key *newkey;
82 
83  newkey = LDNS_MALLOC(ldns_key);
84  if (!newkey) {
85  return NULL;
86  } else {
87  /* some defaults - not sure whether to do this */
88  ldns_key_set_use(newkey, true);
90  ldns_key_set_origttl(newkey, 0);
91  ldns_key_set_keytag(newkey, 0);
92  ldns_key_set_inception(newkey, 0);
93  ldns_key_set_expiration(newkey, 0);
94  ldns_key_set_pubkey_owner(newkey, NULL);
95 #ifdef HAVE_SSL
96  ldns_key_set_evp_key(newkey, NULL);
97 #endif /* HAVE_SSL */
98  ldns_key_set_hmac_key(newkey, NULL);
99  ldns_key_set_external_key(newkey, NULL);
100  return newkey;
101  }
102 }
103 
106 {
107  return ldns_key_new_frm_fp_l(k, fp, NULL);
108 }
109 
110 #if defined(HAVE_SSL) && !defined(OPENSSL_NO_ENGINE)
112 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
113 {
114  ldns_key *k;
115 
116  k = ldns_key_new();
117  if(!k) return LDNS_STATUS_MEM_ERR;
118 #ifndef S_SPLINT_S
119  k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
120  if(!k->_key.key) {
121  ldns_key_free(k);
122  return LDNS_STATUS_ERR;
123  }
125  if (!k->_key.key) {
126  ldns_key_free(k);
128  }
129 #endif /* splint */
130  *key = k;
131  return LDNS_STATUS_OK;
132 }
133 #endif
134 
135 #ifdef USE_GOST
137 ENGINE* ldns_gost_engine = NULL;
138 
139 int
141 {
142  static int gost_id = 0;
143  const EVP_PKEY_ASN1_METHOD* meth;
144  ENGINE* e;
145 
146  if(gost_id) return gost_id;
147 
148  /* see if configuration loaded gost implementation from other engine*/
149  meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
150  if(meth) {
151  EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
152  return gost_id;
153  }
154 
155  /* see if engine can be loaded already */
156  e = ENGINE_by_id("gost");
157  if(!e) {
158  /* load it ourself, in case statically linked */
159  ENGINE_load_builtin_engines();
160  ENGINE_load_dynamic();
161  e = ENGINE_by_id("gost");
162  }
163  if(!e) {
164  /* no gost engine in openssl */
165  return 0;
166  }
167  if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
168  ENGINE_finish(e);
169  ENGINE_free(e);
170  return 0;
171  }
172 
173  meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
174  if(!meth) {
175  /* algo not found */
176  ENGINE_finish(e);
177  ENGINE_free(e);
178  return 0;
179  }
180  /* Note: do not ENGINE_finish and ENGINE_free the acquired engine
181  * on some platforms this frees up the meth and unloads gost stuff */
182  ldns_gost_engine = e;
183 
184  EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
185  return gost_id;
186 }
187 
188 void ldns_key_EVP_unload_gost(void)
189 {
190  if(ldns_gost_engine) {
191  ENGINE_finish(ldns_gost_engine);
192  ENGINE_free(ldns_gost_engine);
193  ldns_gost_engine = NULL;
194  }
195 }
196 
198 static EVP_PKEY*
199 ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
200 {
201  char token[16384];
202  const unsigned char* pp;
203  int gost_id;
204  EVP_PKEY* pkey;
205  ldns_rdf* b64rdf = NULL;
206 
207  gost_id = ldns_key_EVP_load_gost_id();
208  if(!gost_id)
209  return NULL;
210 
211  if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
212  sizeof(token), line_nr) == -1)
213  return NULL;
214  while(strlen(token) < 96) {
215  /* read more b64 from the file, b64 split on multiple lines */
216  if(ldns_fget_token_l(fp, token+strlen(token), "\n",
217  sizeof(token)-strlen(token), line_nr) == -1)
218  return NULL;
219  }
220  if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
221  return NULL;
222  pp = (unsigned char*)ldns_rdf_data(b64rdf);
223  pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
224  ldns_rdf_deep_free(b64rdf);
225  return pkey;
226 }
227 #endif
228 
229 #ifdef USE_ECDSA
231 static int
232 ldns_EC_KEY_calc_public(EC_KEY* ec)
233 {
234  EC_POINT* pub_key;
235  const EC_GROUP* group;
236  group = EC_KEY_get0_group(ec);
237  pub_key = EC_POINT_new(group);
238  if(!pub_key) return 0;
239  if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
240  EC_POINT_free(pub_key);
241  return 0;
242  }
243  if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
244  NULL, NULL, NULL)) {
245  EC_POINT_free(pub_key);
246  return 0;
247  }
248  if(EC_KEY_set_public_key(ec, pub_key) == 0) {
249  EC_POINT_free(pub_key);
250  return 0;
251  }
252  EC_POINT_free(pub_key);
253  return 1;
254 }
255 
257 static EVP_PKEY*
258 ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
259 {
260  char token[16384];
261  ldns_rdf* b64rdf = NULL;
262  unsigned char* pp;
263  BIGNUM* bn;
264  EVP_PKEY* evp_key;
265  EC_KEY* ec;
266  if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
267  sizeof(token), line_nr) == -1)
268  return NULL;
269  if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
270  return NULL;
271  pp = (unsigned char*)ldns_rdf_data(b64rdf);
272 
273  if(alg == LDNS_ECDSAP256SHA256)
274  ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
275  else if(alg == LDNS_ECDSAP384SHA384)
276  ec = EC_KEY_new_by_curve_name(NID_secp384r1);
277  else ec = NULL;
278  if(!ec) {
279  ldns_rdf_deep_free(b64rdf);
280  return NULL;
281  }
282  bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
283  ldns_rdf_deep_free(b64rdf);
284  if(!bn) {
285  EC_KEY_free(ec);
286  return NULL;
287  }
288  EC_KEY_set_private_key(ec, bn);
289  BN_free(bn);
290  if(!ldns_EC_KEY_calc_public(ec)) {
291  EC_KEY_free(ec);
292  return NULL;
293  }
294 
295  evp_key = EVP_PKEY_new();
296  if(!evp_key) {
297  EC_KEY_free(ec);
298  return NULL;
299  }
300  if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
301  EVP_PKEY_free(evp_key);
302  EC_KEY_free(ec);
303  return NULL;
304  }
305  return evp_key;
306 }
307 #endif
308 
309 #ifdef USE_ED25519
311 static EVP_PKEY*
312 ldns_ed25519_priv_raw(uint8_t* pkey, int plen)
313 {
314  const unsigned char* pp;
315  uint8_t buf[256];
316  int buflen = 0;
317  uint8_t pre[] = {0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06,
318  0x03, 0x2b, 0x65, 0x70, 0x04, 0x22, 0x04, 0x20};
319  int pre_len = 16;
320  /* ASN looks like this for ED25519 public key
321  * 302a300506032b6570032100 <32byteskey>
322  * for ED25519 private key
323  * 302e020100300506032b657004220420 <32bytes>
324  *
325  * for X25519 this was
326  * 30320201010420 <32byteskey>
327  * andparameters a00b06092b06010401da470f01
328  * (noparameters, preamble is 30250201010420).
329  * the key is reversed (little endian).
330  */
331  buflen = pre_len + plen;
332  if((size_t)buflen > sizeof(buf))
333  return NULL;
334  memmove(buf, pre, pre_len);
335  memmove(buf+pre_len, pkey, plen);
336  /* reverse the pkey into the buf - key is not reversed it seems */
337  /* for(i=0; i<plen; i++)
338  buf[pre_len+i] = pkey[plen-1-i]; */
339  pp = buf;
340  return d2i_PrivateKey(NID_ED25519, NULL, &pp, buflen);
341 }
342 
344 static EVP_PKEY*
345 ldns_key_new_frm_fp_ed25519_l(FILE* fp, int* line_nr)
346 {
347  char token[16384];
348  ldns_rdf* b64rdf = NULL;
349  EVP_PKEY* evp_key;
350  if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
351  sizeof(token), line_nr) == -1)
352  return NULL;
353  if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
354  return NULL;
355 
356  /* we use d2i_ECPrivateKey because it calculates the public key
357  * from the private part, which others, EC_KEY_set_private_key,
358  * and o2i methods, do not do */
359  /* for that the private key has to be encoded in ASN1 notation
360  * with a ED25519 prefix on it */
361 
362  evp_key = ldns_ed25519_priv_raw(ldns_rdf_data(b64rdf),
363  (int)ldns_rdf_size(b64rdf));
364  ldns_rdf_deep_free(b64rdf);
365  return evp_key;
366 }
367 #endif
368 
369 #ifdef USE_ED448
371 static EVP_PKEY*
372 ldns_ed448_priv_raw(uint8_t* pkey, int plen)
373 {
374  const unsigned char* pp;
375  uint8_t buf[256];
376  int buflen = 0;
377  uint8_t pre[] = {0x30, 0x47, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x71, 0x04, 0x3b, 0x04, 0x39};
378  int pre_len = 16;
379  /* ASN looks like this for ED448
380  * 3047020100300506032b6571043b0439 <57bytekey>
381  * the key is reversed (little endian).
382  */
383  buflen = pre_len + plen;
384  if((size_t)buflen > sizeof(buf))
385  return NULL;
386  memmove(buf, pre, pre_len);
387  memmove(buf+pre_len, pkey, plen);
388  /* reverse the pkey into the buf - key is not reversed it seems */
389  /* for(i=0; i<plen; i++)
390  buf[pre_len+i] = pkey[plen-1-i]; */
391  pp = buf;
392  return d2i_PrivateKey(NID_ED448, NULL, &pp, buflen);
393 }
394 
396 static EVP_PKEY*
397 ldns_key_new_frm_fp_ed448_l(FILE* fp, int* line_nr)
398 {
399  char token[16384];
400  ldns_rdf* b64rdf = NULL;
401  EVP_PKEY* evp_key;
402  if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
403  sizeof(token), line_nr) == -1)
404  return NULL;
405  if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
406  return NULL;
407 
408  /* convert private key into ASN notation and then convert that */
409  evp_key = ldns_ed448_priv_raw(ldns_rdf_data(b64rdf),
410  (int)ldns_rdf_size(b64rdf));
411  ldns_rdf_deep_free(b64rdf);
412  return evp_key;
413 }
414 #endif
415 
417 ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
418 {
419  ldns_key *k;
420  char *d;
422  ldns_rr *key_rr;
423 #ifdef HAVE_SSL
424  RSA *rsa;
425 #ifdef USE_DSA
426  DSA *dsa;
427 #endif
428  unsigned char *hmac;
429  size_t hmac_size;
430 #endif /* HAVE_SSL */
431 
432  k = ldns_key_new();
433 
434  d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
435  if (!k || !d) {
436  ldns_key_free(k);
437  LDNS_FREE(d);
438  return LDNS_STATUS_MEM_ERR;
439  }
440 
441  alg = 0;
442 
443  /* the file is highly structured. Do this in sequence */
444  /* RSA:
445  * Private-key-format: v1.x.
446  * Algorithm: 1 (RSA)
447 
448  */
449  /* get the key format version number */
450  if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
451  LDNS_MAX_LINELEN, line_nr) == -1) {
452  /* no version information */
453  ldns_key_free(k);
454  LDNS_FREE(d);
455  return LDNS_STATUS_SYNTAX_ERR;
456  }
457  if (strncmp(d, "v1.", 3) != 0) {
458  ldns_key_free(k);
459  LDNS_FREE(d);
461  }
462 
463  /* get the algorithm type, our file function strip ( ) so there are
464  * not in the return string! */
465  if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
466  LDNS_MAX_LINELEN, line_nr) == -1) {
467  /* no alg information */
468  ldns_key_free(k);
469  LDNS_FREE(d);
471  }
472 
473  if (strncmp(d, "1 RSA", 2) == 0) {
474  alg = LDNS_SIGN_RSAMD5;
475  }
476  if (strncmp(d, "2 DH", 2) == 0) {
478  }
479  if (strncmp(d, "3 DSA", 2) == 0) {
480 #ifdef USE_DSA
481  alg = LDNS_SIGN_DSA;
482 #else
483 # ifdef STDERR_MSGS
484  fprintf(stderr, "Warning: DSA not compiled into this ");
485  fprintf(stderr, "version of ldns\n");
486 # endif
487 #endif
488  }
489  if (strncmp(d, "4 ECC", 2) == 0) {
491  }
492  if (strncmp(d, "5 RSASHA1", 2) == 0) {
493  alg = LDNS_SIGN_RSASHA1;
494  }
495  if (strncmp(d, "6 DSA", 2) == 0) {
496 #ifdef USE_DSA
497  alg = LDNS_SIGN_DSA_NSEC3;
498 #else
499 # ifdef STDERR_MSGS
500  fprintf(stderr, "Warning: DSA not compiled into this ");
501  fprintf(stderr, "version of ldns\n");
502 # endif
503 #endif
504  }
505  if (strncmp(d, "7 RSASHA1", 2) == 0) {
507  }
508 
509  if (strncmp(d, "8 RSASHA256", 2) == 0) {
510 #ifdef USE_SHA2
511  alg = LDNS_SIGN_RSASHA256;
512 #else
513 # ifdef STDERR_MSGS
514  fprintf(stderr, "Warning: SHA256 not compiled into this ");
515  fprintf(stderr, "version of ldns\n");
516 # endif
517 #endif
518  }
519  if (strncmp(d, "10 RSASHA512", 3) == 0) {
520 #ifdef USE_SHA2
521  alg = LDNS_SIGN_RSASHA512;
522 #else
523 # ifdef STDERR_MSGS
524  fprintf(stderr, "Warning: SHA512 not compiled into this ");
525  fprintf(stderr, "version of ldns\n");
526 # endif
527 #endif
528  }
529  if (strncmp(d, "12 ECC-GOST", 3) == 0) {
530 #ifdef USE_GOST
531  alg = LDNS_SIGN_ECC_GOST;
532 #else
533 # ifdef STDERR_MSGS
534  fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
535  fprintf(stderr, "version of ldns, use --enable-gost\n");
536 # endif
537 #endif
538  }
539  if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
540 #ifdef USE_ECDSA
542 #else
543 # ifdef STDERR_MSGS
544  fprintf(stderr, "Warning: ECDSA not compiled into this ");
545  fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
546 # endif
547 #endif
548  }
549  if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
550 #ifdef USE_ECDSA
552 #else
553 # ifdef STDERR_MSGS
554  fprintf(stderr, "Warning: ECDSA not compiled into this ");
555  fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
556 # endif
557 #endif
558  }
559  if (strncmp(d, "15 ED25519", 3) == 0) {
560 #ifdef USE_ED25519
561  alg = LDNS_SIGN_ED25519;
562 #else
563 # ifdef STDERR_MSGS
564  fprintf(stderr, "Warning: ED25519 not compiled into this ");
565  fprintf(stderr, "version of ldns, use --enable-ed25519\n");
566 # endif
567 #endif
568  }
569  if (strncmp(d, "16 ED448", 3) == 0) {
570 #ifdef USE_ED448
571  alg = LDNS_SIGN_ED448;
572 #else
573 # ifdef STDERR_MSGS
574  fprintf(stderr, "Warning: ED448 not compiled into this ");
575  fprintf(stderr, "version of ldns, use --enable-ed448\n");
576 # endif
577 #endif
578  }
579  if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
580  alg = LDNS_SIGN_HMACMD5;
581  }
582  if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
583  alg = LDNS_SIGN_HMACSHA1;
584  }
585  if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
586  alg = LDNS_SIGN_HMACSHA256;
587  }
588  /* For compatibility with dnssec-keygen */
589  if (strncmp(d, "161 ", 4) == 0) {
590  alg = LDNS_SIGN_HMACSHA1;
591  }
592  if (strncmp(d, "162 HMAC-SHA224", 4) == 0) {
593  alg = LDNS_SIGN_HMACSHA224;
594  }
595  /* For compatibility with dnssec-keygen */
596  if (strncmp(d, "163 ", 4) == 0) {
597  alg = LDNS_SIGN_HMACSHA256;
598  }
599  if (strncmp(d, "164 HMAC-SHA384", 4) == 0) {
600  alg = LDNS_SIGN_HMACSHA384;
601  }
602  if (strncmp(d, "165 HMAC-SHA512", 4) == 0) {
603  alg = LDNS_SIGN_HMACSHA512;
604  }
605  LDNS_FREE(d);
606 
607  switch(alg) {
608  case LDNS_SIGN_RSAMD5:
609  case LDNS_SIGN_RSASHA1:
611 #ifdef USE_SHA2
612  case LDNS_SIGN_RSASHA256:
613  case LDNS_SIGN_RSASHA512:
614 #endif
615  ldns_key_set_algorithm(k, alg);
616 #ifdef HAVE_SSL
617  rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
618  if (!rsa) {
619  ldns_key_free(k);
620  return LDNS_STATUS_ERR;
621  }
622  ldns_key_assign_rsa_key(k, rsa);
623 #endif /* HAVE_SSL */
624  break;
625 #ifdef USE_DSA
626  case LDNS_SIGN_DSA:
627  case LDNS_SIGN_DSA_NSEC3:
628  ldns_key_set_algorithm(k, alg);
629 #ifdef HAVE_SSL
630  dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
631  if (!dsa) {
632  ldns_key_free(k);
633  return LDNS_STATUS_ERR;
634  }
635  ldns_key_assign_dsa_key(k, dsa);
636 #endif /* HAVE_SSL */
637  break;
638 #endif /* USE_DSA */
639  case LDNS_SIGN_HMACMD5:
640  case LDNS_SIGN_HMACSHA1:
645  ldns_key_set_algorithm(k, alg);
646 #ifdef HAVE_SSL
647  hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
648  if (!hmac) {
649  ldns_key_free(k);
650  return LDNS_STATUS_ERR;
651  }
652  ldns_key_set_hmac_size(k, hmac_size);
653  ldns_key_set_hmac_key(k, hmac);
654 #endif /* HAVE_SSL */
655  break;
656  case LDNS_SIGN_ECC_GOST:
657  ldns_key_set_algorithm(k, alg);
658 #if defined(HAVE_SSL) && defined(USE_GOST)
660  ldns_key_free(k);
662  }
664  ldns_key_new_frm_fp_gost_l(fp, line_nr));
665 #ifndef S_SPLINT_S
666  if(!k->_key.key) {
667  ldns_key_free(k);
668  return LDNS_STATUS_ERR;
669  }
670 #endif /* splint */
671 #endif
672  break;
673 #ifdef USE_ECDSA
676  ldns_key_set_algorithm(k, alg);
678  ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
679 #ifndef S_SPLINT_S
680  if(!k->_key.key) {
681  ldns_key_free(k);
682  return LDNS_STATUS_ERR;
683  }
684 #endif /* splint */
685  break;
686 #endif
687 #ifdef USE_ED25519
688  case LDNS_SIGN_ED25519:
689  ldns_key_set_algorithm(k, alg);
691  ldns_key_new_frm_fp_ed25519_l(fp, line_nr));
692 #ifndef S_SPLINT_S
693  if(!k->_key.key) {
694  ldns_key_free(k);
695  return LDNS_STATUS_ERR;
696  }
697 #endif /* splint */
698  break;
699 #endif
700 #ifdef USE_ED448
701  case LDNS_SIGN_ED448:
702  ldns_key_set_algorithm(k, alg);
704  ldns_key_new_frm_fp_ed448_l(fp, line_nr));
705 #ifndef S_SPLINT_S
706  if(!k->_key.key) {
707  ldns_key_free(k);
708  return LDNS_STATUS_ERR;
709  }
710 #endif /* splint */
711  break;
712 #endif
713  default:
714  ldns_key_free(k);
716  }
717  key_rr = ldns_key2rr(k);
719  ldns_rr_free(key_rr);
720 
721  if (key) {
722  *key = k;
723  return LDNS_STATUS_OK;
724  }
725  ldns_key_free(k);
726  return LDNS_STATUS_ERR;
727 }
728 
729 #ifdef HAVE_SSL
730 RSA *
732 {
733  return ldns_key_new_frm_fp_rsa_l(f, NULL);
734 }
735 
736 RSA *
737 ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
738 {
739  /* we parse
740  * Modulus:
741  * PublicExponent:
742  * PrivateExponent:
743  * Prime1:
744  * Prime2:
745  * Exponent1:
746  * Exponent2:
747  * Coefficient:
748  *
749  * man 3 RSA:
750  *
751  * struct
752  * {
753  * BIGNUM *n; // public modulus
754  * BIGNUM *e; // public exponent
755  * BIGNUM *d; // private exponent
756  * BIGNUM *p; // secret prime factor
757  * BIGNUM *q; // secret prime factor
758  * BIGNUM *dmp1; // d mod (p-1)
759  * BIGNUM *dmq1; // d mod (q-1)
760  * BIGNUM *iqmp; // q^-1 mod p
761  * // ...
762  *
763  */
764  char *b;
765  RSA *rsa;
766  uint8_t *buf;
767  int i;
768  BIGNUM *n=NULL, *e=NULL, *d=NULL, *p=NULL, *q=NULL,
769  *dmp1=NULL, *dmq1=NULL, *iqmp=NULL;
770 
771  b = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
772  buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
773  rsa = RSA_new();
774  if (!b || !rsa || !buf) {
775  goto error;
776  }
777 
778  /* I could use functions again, but that seems an overkill,
779  * although this also looks tedious
780  */
781 
782  /* Modules, rsa->n */
783  if (ldns_fget_keyword_data_l(f, "Modulus", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
784  goto error;
785  }
786  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
787 #ifndef S_SPLINT_S
788  n = BN_bin2bn((const char unsigned*)buf, i, NULL);
789  if (!n) {
790  goto error;
791  }
792 
793  /* PublicExponent, rsa->e */
794  if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
795  goto error;
796  }
797  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
798  e = BN_bin2bn((const char unsigned*)buf, i, NULL);
799  if (!e) {
800  goto error;
801  }
802 
803  /* PrivateExponent, rsa->d */
804  if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
805  goto error;
806  }
807  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
808  d = BN_bin2bn((const char unsigned*)buf, i, NULL);
809  if (!d) {
810  goto error;
811  }
812 
813  /* Prime1, rsa->p */
814  if (ldns_fget_keyword_data_l(f, "Prime1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
815  goto error;
816  }
817  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
818  p = BN_bin2bn((const char unsigned*)buf, i, NULL);
819  if (!p) {
820  goto error;
821  }
822 
823  /* Prime2, rsa->q */
824  if (ldns_fget_keyword_data_l(f, "Prime2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
825  goto error;
826  }
827  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
828  q = BN_bin2bn((const char unsigned*)buf, i, NULL);
829  if (!q) {
830  goto error;
831  }
832 
833  /* Exponent1, rsa->dmp1 */
834  if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
835  goto error;
836  }
837  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
838  dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
839  if (!dmp1) {
840  goto error;
841  }
842 
843  /* Exponent2, rsa->dmq1 */
844  if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
845  goto error;
846  }
847  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
848  dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
849  if (!dmq1) {
850  goto error;
851  }
852 
853  /* Coefficient, rsa->iqmp */
854  if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
855  goto error;
856  }
857  i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
858  iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
859  if (!iqmp) {
860  goto error;
861  }
862 #endif /* splint */
863 
864 #if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
865 # ifndef S_SPLINT_S
866  rsa->n = n;
867  rsa->e = e;
868  rsa->d = d;
869  rsa->p = p;
870  rsa->q = q;
871  rsa->dmp1 = dmp1;
872  rsa->dmq1 = dmq1;
873  rsa->iqmp = iqmp;
874 # endif
875 #else
876  if(!RSA_set0_key(rsa, n, e, d))
877  goto error;
878  n = NULL;
879  e = NULL;
880  d = NULL;
881  if(!RSA_set0_factors(rsa, p, q))
882  goto error;
883  p = NULL;
884  q = NULL;
885  if(!RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp))
886  goto error;
887 #endif
888 
889  LDNS_FREE(buf);
890  LDNS_FREE(b);
891  return rsa;
892 
893 error:
894  RSA_free(rsa);
895  LDNS_FREE(b);
896  LDNS_FREE(buf);
897  BN_free(n);
898  BN_free(e);
899  BN_free(d);
900  BN_free(p);
901  BN_free(q);
902  BN_free(dmp1);
903  BN_free(dmq1);
904  BN_free(iqmp);
905  return NULL;
906 }
907 
908 #ifdef USE_DSA
909 DSA *
911 {
912  return ldns_key_new_frm_fp_dsa_l(f, NULL);
913 }
914 
915 DSA *
916 ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
917 {
918  int i;
919  char *d;
920  DSA *dsa;
921  uint8_t *buf;
922  BIGNUM *p=NULL, *q=NULL, *g=NULL, *priv_key=NULL, *pub_key=NULL;
923 
924  d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
925  buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
926  dsa = DSA_new();
927  if (!d || !dsa || !buf) {
928  goto error;
929  }
930 
931  /* the line parser removes the () from the input... */
932 
933  /* Prime, dsa->p */
934  if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
935  goto error;
936  }
937  i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
938 #ifndef S_SPLINT_S
939  p = BN_bin2bn((const char unsigned*)buf, i, NULL);
940  if (!p) {
941  goto error;
942  }
943 
944  /* Subprime, dsa->q */
945  if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
946  goto error;
947  }
948  i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
949  q = BN_bin2bn((const char unsigned*)buf, i, NULL);
950  if (!q) {
951  goto error;
952  }
953 
954  /* Base, dsa->g */
955  if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
956  goto error;
957  }
958  i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
959  g = BN_bin2bn((const char unsigned*)buf, i, NULL);
960  if (!g) {
961  goto error;
962  }
963 
964  /* Private key, dsa->priv_key */
965  if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
966  goto error;
967  }
968  i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
969  priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
970  if (!priv_key) {
971  goto error;
972  }
973 
974  /* Public key, dsa->priv_key */
975  if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
976  goto error;
977  }
978  i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
979  pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
980  if (!pub_key) {
981  goto error;
982  }
983 #endif /* splint */
984 
985 #if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
986 # ifndef S_SPLINT_S
987  dsa->p = p;
988  dsa->q = q;
989  dsa->g = g;
990  dsa->priv_key = priv_key;
991  dsa->pub_key = pub_key;
992 # endif
993 #else
994  if(!DSA_set0_pqg(dsa, p, q, g))
995  goto error;
996  p = NULL;
997  q = NULL;
998  g = NULL;
999  if(!DSA_set0_key(dsa, pub_key, priv_key))
1000  goto error;
1001 #endif
1002 
1003  LDNS_FREE(buf);
1004  LDNS_FREE(d);
1005 
1006  return dsa;
1007 
1008 error:
1009  LDNS_FREE(d);
1010  LDNS_FREE(buf);
1011  DSA_free(dsa);
1012  BN_free(p);
1013  BN_free(q);
1014  BN_free(g);
1015  BN_free(priv_key);
1016  BN_free(pub_key);
1017  return NULL;
1018 }
1019 #endif /* USE_DSA */
1020 
1021 unsigned char *
1022 ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
1023 {
1024  return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
1025 }
1026 
1027 unsigned char *
1029  , ATTR_UNUSED(int *line_nr)
1030  , size_t *hmac_size
1031  )
1032 {
1033  size_t bufsz;
1034  char d[LDNS_MAX_LINELEN];
1035  unsigned char *buf = NULL;
1036 
1037  *hmac_size = ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n",
1038  LDNS_MAX_LINELEN, line_nr) == -1
1039  ? 0
1040  : (buf = LDNS_XMALLOC( unsigned char, (bufsz =
1041  ldns_b64_ntop_calculate_size(strlen(d))))) == NULL
1042  ? 0
1043  : (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
1044  return buf;
1045 }
1046 #endif /* HAVE_SSL */
1047 
1048 #ifdef USE_GOST
1049 static EVP_PKEY*
1050 ldns_gen_gost_key(void)
1051 {
1052  EVP_PKEY_CTX* ctx;
1053  EVP_PKEY* p = NULL;
1054  int gost_id = ldns_key_EVP_load_gost_id();
1055  if(!gost_id)
1056  return NULL;
1057  ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
1058  if(!ctx) {
1059  /* the id should be available now */
1060  return NULL;
1061  }
1062  if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
1063  /* cannot set paramset */
1064  EVP_PKEY_CTX_free(ctx);
1065  return NULL;
1066  }
1067 
1068  if(EVP_PKEY_keygen_init(ctx) <= 0) {
1069  EVP_PKEY_CTX_free(ctx);
1070  return NULL;
1071  }
1072  if(EVP_PKEY_keygen(ctx, &p) <= 0) {
1073  EVP_PKEY_free(p);
1074  EVP_PKEY_CTX_free(ctx);
1075  return NULL;
1076  }
1077  EVP_PKEY_CTX_free(ctx);
1078  return p;
1079 }
1080 #endif
1081 
1082 ldns_key *
1084 {
1085  ldns_key *k;
1086 #ifdef HAVE_SSL
1087 #ifdef USE_DSA
1088  DSA *d;
1089 #endif /* USE_DSA */
1090 # ifdef USE_ECDSA
1091  EC_KEY *ec = NULL;
1092 # endif
1093 # ifdef HAVE_EVP_PKEY_KEYGEN
1094  EVP_PKEY_CTX *ctx;
1095 # else
1096  RSA *r;
1097 # endif
1098 #else
1099  int i;
1100  uint16_t offset = 0;
1101 #endif
1102  unsigned char *hmac;
1103 
1104  k = ldns_key_new();
1105  if (!k) {
1106  return NULL;
1107  }
1108  switch(alg) {
1109  case LDNS_SIGN_RSAMD5:
1110  case LDNS_SIGN_RSASHA1:
1112  case LDNS_SIGN_RSASHA256:
1113  case LDNS_SIGN_RSASHA512:
1114 #ifdef HAVE_SSL
1115 #ifdef HAVE_EVP_PKEY_KEYGEN
1116  ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL);
1117  if(!ctx) {
1118  ldns_key_free(k);
1119  return NULL;
1120  }
1121  if(EVP_PKEY_keygen_init(ctx) <= 0) {
1122  ldns_key_free(k);
1123  EVP_PKEY_CTX_free(ctx);
1124  return NULL;
1125  }
1126  if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, size) <= 0) {
1127  ldns_key_free(k);
1128  EVP_PKEY_CTX_free(ctx);
1129  return NULL;
1130  }
1131 #ifndef S_SPLINT_S
1132  if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1133  ldns_key_free(k);
1134  EVP_PKEY_CTX_free(ctx);
1135  return NULL;
1136  }
1137 #endif
1138  EVP_PKEY_CTX_free(ctx);
1139 #else /* HAVE_EVP_PKEY_KEYGEN */
1140  r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
1141  if(!r) {
1142  ldns_key_free(k);
1143  return NULL;
1144  }
1145  if (RSA_check_key(r) != 1) {
1146  ldns_key_free(k);
1147  return NULL;
1148  }
1149  ldns_key_set_rsa_key(k, r);
1150  RSA_free(r);
1151 #endif /* HAVE_EVP_PKEY_KEYGEN */
1152 #endif /* HAVE_SSL */
1153  break;
1154 #ifdef USE_DSA
1155  case LDNS_SIGN_DSA:
1156  case LDNS_SIGN_DSA_NSEC3:
1157 #ifdef HAVE_SSL
1158 # if OPENSSL_VERSION_NUMBER < 0x00908000L
1159  d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
1160  if (!d) {
1161  ldns_key_free(k);
1162  return NULL;
1163  }
1164 
1165 # else
1166  if (! (d = DSA_new())) {
1167  ldns_key_free(k);
1168  return NULL;
1169  }
1170  if (! DSA_generate_parameters_ex(d, (int)size, NULL, 0, NULL, NULL, NULL)) {
1171  DSA_free(d);
1172  ldns_key_free(k);
1173  return NULL;
1174  }
1175 # endif
1176  if (DSA_generate_key(d) != 1) {
1177  ldns_key_free(k);
1178  return NULL;
1179  }
1180  ldns_key_set_dsa_key(k, d);
1181  DSA_free(d);
1182 #endif /* HAVE_SSL */
1183 #endif /* USE_DSA */
1184  break;
1185  case LDNS_SIGN_HMACMD5:
1186  case LDNS_SIGN_HMACSHA1:
1187  case LDNS_SIGN_HMACSHA224:
1188  case LDNS_SIGN_HMACSHA256:
1189  case LDNS_SIGN_HMACSHA384:
1190  case LDNS_SIGN_HMACSHA512:
1191 #ifdef HAVE_SSL
1192 #ifndef S_SPLINT_S
1193  k->_key.key = NULL;
1194 #endif /* splint */
1195 #endif /* HAVE_SSL */
1196  size = size / 8;
1197  ldns_key_set_hmac_size(k, size);
1198 
1199  hmac = LDNS_XMALLOC(unsigned char, size);
1200  if(!hmac) {
1201  ldns_key_free(k);
1202  return NULL;
1203  }
1204 #ifdef HAVE_SSL
1205  if (RAND_bytes(hmac, (int) size) != 1) {
1206  LDNS_FREE(hmac);
1207  ldns_key_free(k);
1208  return NULL;
1209  }
1210 #else
1211  while (offset + sizeof(i) < size) {
1212  i = random();
1213  memcpy(&hmac[offset], &i, sizeof(i));
1214  offset += sizeof(i);
1215  }
1216  if (offset < size) {
1217  i = random();
1218  memcpy(&hmac[offset], &i, size - offset);
1219  }
1220 #endif /* HAVE_SSL */
1221  ldns_key_set_hmac_key(k, hmac);
1222 
1223  ldns_key_set_flags(k, 0);
1224  break;
1225  case LDNS_SIGN_ECC_GOST:
1226 #if defined(HAVE_SSL) && defined(USE_GOST)
1227  ldns_key_set_evp_key(k, ldns_gen_gost_key());
1228 #ifndef S_SPLINT_S
1229  if(!k->_key.key) {
1230  ldns_key_free(k);
1231  return NULL;
1232  }
1233 #endif /* splint */
1234 #else
1235  ldns_key_free(k);
1236  return NULL;
1237 #endif /* HAVE_SSL and USE_GOST */
1238  break;
1241 #ifdef USE_ECDSA
1242  if(alg == LDNS_SIGN_ECDSAP256SHA256)
1243  ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
1244  else if(alg == LDNS_SIGN_ECDSAP384SHA384)
1245  ec = EC_KEY_new_by_curve_name(NID_secp384r1);
1246  if(!ec) {
1247  ldns_key_free(k);
1248  return NULL;
1249  }
1250  if(!EC_KEY_generate_key(ec)) {
1251  ldns_key_free(k);
1252  EC_KEY_free(ec);
1253  return NULL;
1254  }
1255 #ifndef S_SPLINT_S
1256  k->_key.key = EVP_PKEY_new();
1257  if(!k->_key.key) {
1258  ldns_key_free(k);
1259  EC_KEY_free(ec);
1260  return NULL;
1261  }
1262  if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
1263  ldns_key_free(k);
1264  EC_KEY_free(ec);
1265  return NULL;
1266  }
1267 #endif /* splint */
1268 #else
1269  ldns_key_free(k);
1270  return NULL;
1271 #endif /* ECDSA */
1272  break;
1273 #ifdef USE_ED25519
1274  case LDNS_SIGN_ED25519:
1275 #ifdef HAVE_EVP_PKEY_KEYGEN
1276  ctx = EVP_PKEY_CTX_new_id(NID_ED25519, NULL);
1277  if(!ctx) {
1278  ldns_key_free(k);
1279  return NULL;
1280  }
1281  if(EVP_PKEY_keygen_init(ctx) <= 0) {
1282  ldns_key_free(k);
1283  EVP_PKEY_CTX_free(ctx);
1284  return NULL;
1285  }
1286  if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1287  ldns_key_free(k);
1288  EVP_PKEY_CTX_free(ctx);
1289  return NULL;
1290  }
1291  EVP_PKEY_CTX_free(ctx);
1292 #endif
1293  break;
1294 #endif /* ED25519 */
1295 #ifdef USE_ED448
1296  case LDNS_SIGN_ED448:
1297 #ifdef HAVE_EVP_PKEY_KEYGEN
1298  ctx = EVP_PKEY_CTX_new_id(NID_ED448, NULL);
1299  if(!ctx) {
1300  ldns_key_free(k);
1301  return NULL;
1302  }
1303  if(EVP_PKEY_keygen_init(ctx) <= 0) {
1304  ldns_key_free(k);
1305  EVP_PKEY_CTX_free(ctx);
1306  return NULL;
1307  }
1308  if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1309  ldns_key_free(k);
1310  EVP_PKEY_CTX_free(ctx);
1311  return NULL;
1312  }
1313  EVP_PKEY_CTX_free(ctx);
1314 #endif
1315  break;
1316 #endif /* ED448 */
1317  }
1318  ldns_key_set_algorithm(k, alg);
1319  return k;
1320 }
1321 
1322 void
1323 ldns_key_print(FILE *output, const ldns_key *k)
1324 {
1325  char *str = ldns_key2str(k);
1326  if (str) {
1327  fprintf(output, "%s", str);
1328  } else {
1329  fprintf(output, "Unable to convert private key to string\n");
1330  }
1331  LDNS_FREE(str);
1332 }
1333 
1334 
1335 void
1337 {
1338  k->_alg = l;
1339 }
1340 
1341 void
1343 {
1344  k->_extra.dnssec.flags = f;
1345 }
1346 
1347 #ifdef HAVE_SSL
1348 #ifndef S_SPLINT_S
1349 void
1351 {
1352  k->_key.key = e;
1353 }
1354 
1355 void
1357 {
1358  EVP_PKEY *key = EVP_PKEY_new();
1359  EVP_PKEY_set1_RSA(key, r);
1360  k->_key.key = key;
1361 }
1362 
1363 void
1365 {
1366 #ifdef USE_DSA
1367  EVP_PKEY *key = EVP_PKEY_new();
1368  EVP_PKEY_set1_DSA(key, d);
1369  k->_key.key = key;
1370 #else
1371  (void)k; (void)d;
1372 #endif
1373 }
1374 
1375 void
1377 {
1378  EVP_PKEY *key = EVP_PKEY_new();
1379  EVP_PKEY_assign_RSA(key, r);
1380  k->_key.key = key;
1381 }
1382 
1383 void
1385 {
1386 #ifdef USE_DSA
1387  EVP_PKEY *key = EVP_PKEY_new();
1388  EVP_PKEY_assign_DSA(key, d);
1389  k->_key.key = key;
1390 #else
1391  (void)k; (void)d;
1392 #endif
1393 }
1394 #endif /* splint */
1395 #endif /* HAVE_SSL */
1396 
1397 void
1398 ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
1399 {
1400  k->_key.hmac.key = hmac;
1401 }
1402 
1403 void
1404 ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
1405 {
1406  k->_key.hmac.size = hmac_size;
1407 }
1408 
1409 void
1410 ldns_key_set_external_key(ldns_key *k, void *external_key)
1411 {
1412  k->_key.external_key = external_key;
1413 }
1414 
1415 void
1417 {
1418  k->_extra.dnssec.orig_ttl = t;
1419 }
1420 
1421 void
1423 {
1424  k->_extra.dnssec.inception = i;
1425 }
1426 
1427 void
1429 {
1430  k->_extra.dnssec.expiration = e;
1431 }
1432 
1433 void
1435 {
1436  k->_pubkey_owner = r;
1437 }
1438 
1439 void
1441 {
1442  k->_extra.dnssec.keytag = tag;
1443 }
1444 
1445 /* read */
1446 size_t
1448 {
1449  return key_list ? key_list->_key_count : 0;
1450 }
1451 
1452 ldns_key *
1453 ldns_key_list_key(const ldns_key_list *key, size_t nr)
1454 {
1455  if (nr < ldns_key_list_key_count(key)) {
1456  return key->_keys[nr];
1457  } else {
1458  return NULL;
1459  }
1460 }
1461 
1464 {
1465  return k->_alg;
1466 }
1467 
1468 void
1470 {
1471  if (k) {
1472  k->_use = v;
1473  }
1474 }
1475 
1476 bool
1478 {
1479  if (k) {
1480  return k->_use;
1481  }
1482  return false;
1483 }
1484 
1485 #ifdef HAVE_SSL
1486 #ifndef S_SPLINT_S
1487 EVP_PKEY *
1489 {
1490  return k->_key.key;
1491 }
1492 
1493 RSA *
1495 {
1496  if (k->_key.key) {
1497  return EVP_PKEY_get1_RSA(k->_key.key);
1498  } else {
1499  return NULL;
1500  }
1501 }
1502 
1503 DSA *
1505 {
1506 #ifdef USE_DSA
1507  if (k->_key.key) {
1508  return EVP_PKEY_get1_DSA(k->_key.key);
1509  } else {
1510  return NULL;
1511  }
1512 #else
1513  (void)k;
1514  return NULL;
1515 #endif
1516 }
1517 #endif /* splint */
1518 #endif /* HAVE_SSL */
1519 
1520 unsigned char *
1522 {
1523  if (k->_key.hmac.key) {
1524  return k->_key.hmac.key;
1525  } else {
1526  return NULL;
1527  }
1528 }
1529 
1530 size_t
1532 {
1533  if (k->_key.hmac.size) {
1534  return k->_key.hmac.size;
1535  } else {
1536  return 0;
1537  }
1538 }
1539 
1540 void *
1542 {
1543  return k->_key.external_key;
1544 }
1545 
1546 uint32_t
1548 {
1549  return k->_extra.dnssec.orig_ttl;
1550 }
1551 
1552 uint16_t
1554 {
1555  return k->_extra.dnssec.flags;
1556 }
1557 
1558 uint32_t
1560 {
1561  return k->_extra.dnssec.inception;
1562 }
1563 
1564 uint32_t
1566 {
1567  return k->_extra.dnssec.expiration;
1568 }
1569 
1570 uint16_t
1572 {
1573  return k->_extra.dnssec.keytag;
1574 }
1575 
1576 ldns_rdf *
1578 {
1579  return k->_pubkey_owner;
1580 }
1581 
1582 /* write */
1583 void
1585 {
1586  size_t i;
1587 
1588  for (i = 0; i < ldns_key_list_key_count(keys); i++) {
1589  ldns_key_set_use(ldns_key_list_key(keys, i), v);
1590  }
1591 }
1592 
1593 void
1595 {
1596  key->_key_count = count;
1597 }
1598 
1599 bool
1601 {
1602  size_t key_count;
1603  ldns_key **keys;
1604 
1605  key_count = ldns_key_list_key_count(key_list);
1606 
1607  /* grow the array */
1608  keys = LDNS_XREALLOC(
1609  key_list->_keys, ldns_key *, key_count + 1);
1610  if (!keys) {
1611  return false;
1612  }
1613 
1614  /* add the new member */
1615  key_list->_keys = keys;
1616  key_list->_keys[key_count] = key;
1617 
1618  ldns_key_list_set_key_count(key_list, key_count + 1);
1619  return true;
1620 }
1621 
1622 ldns_key *
1624 {
1625  size_t key_count;
1626  ldns_key** a;
1627  ldns_key *pop;
1628 
1629  if (!key_list) {
1630  return NULL;
1631  }
1632 
1633  key_count = ldns_key_list_key_count(key_list);
1634  if (key_count == 0) {
1635  return NULL;
1636  }
1637 
1638  pop = ldns_key_list_key(key_list, key_count);
1639 
1640  /* shrink the array */
1641  a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
1642  if(a) {
1643  key_list->_keys = a;
1644  }
1645 
1646  ldns_key_list_set_key_count(key_list, key_count - 1);
1647 
1648  return pop;
1649 }
1650 
1651 #ifdef HAVE_SSL
1652 #ifndef S_SPLINT_S
1653 /* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1654 static bool
1655 ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
1656 {
1657  int i,j;
1658  const BIGNUM *n=NULL, *e=NULL;
1659 
1660  if (!k) {
1661  return false;
1662  }
1663 #if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
1664  n = k->n;
1665  e = k->e;
1666 #else
1667  RSA_get0_key(k, &n, &e, NULL);
1668 #endif
1669 
1670  if (BN_num_bytes(e) <= 256) {
1671  /* normally only this path is executed (small factors are
1672  * more common
1673  */
1674  data[0] = (unsigned char) BN_num_bytes(e);
1675  i = BN_bn2bin(e, data + 1);
1676  j = BN_bn2bin(n, data + i + 1);
1677  *size = (uint16_t) i + j;
1678  } else if (BN_num_bytes(e) <= 65536) {
1679  data[0] = 0;
1680  /* BN_bn2bin does bigendian, _uint16 also */
1681  ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(e));
1682 
1683  BN_bn2bin(e, data + 3);
1684  BN_bn2bin(n, data + 4 + BN_num_bytes(e));
1685  *size = (uint16_t) BN_num_bytes(n) + 6;
1686  } else {
1687  return false;
1688  }
1689  return true;
1690 }
1691 
1692 #ifdef USE_DSA
1693 /* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1694 static bool
1695 ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
1696 {
1697  uint8_t T;
1698  const BIGNUM *p, *q, *g;
1699  const BIGNUM *pub_key, *priv_key;
1700 
1701  if (!k) {
1702  return false;
1703  }
1704 
1705  /* See RFC2536 */
1706 # ifdef HAVE_DSA_GET0_PQG
1707  DSA_get0_pqg(k, &p, &q, &g);
1708 # else
1709  p = k->p; q = k->q; g = k->g;
1710 # endif
1711 # ifdef HAVE_DSA_GET0_KEY
1712  DSA_get0_key(k, &pub_key, &priv_key);
1713 # else
1714  pub_key = k->pub_key; priv_key = k->priv_key;
1715 # endif
1716  (void)priv_key;
1717  *size = (uint16_t)BN_num_bytes(p);
1718  T = (*size - 64) / 8;
1719 
1720  if (T > 8) {
1721 #ifdef STDERR_MSGS
1722  fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
1723  fprintf(stderr, " not implemented\n");
1724 #endif
1725  return false;
1726  }
1727 
1728  /* size = 64 + (T * 8); */
1729  memset(data, 0, 21 + *size * 3);
1730  data[0] = (unsigned char)T;
1731  BN_bn2bin(q, data + 1 ); /* 20 octects */
1732  BN_bn2bin(p, data + 21 ); /* offset octects */
1733  BN_bn2bin(g, data + 21 + *size * 2 - BN_num_bytes(g));
1734  BN_bn2bin(pub_key,data + 21 + *size * 3 - BN_num_bytes(pub_key));
1735  *size = 21 + *size * 3;
1736  return true;
1737 }
1738 #endif /* USE_DSA */
1739 
1740 #ifdef USE_GOST
1741 static bool
1742 ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1743 {
1744  int i;
1745  unsigned char* pp = NULL;
1746  if(i2d_PUBKEY(k, &pp) != 37 + 64) {
1747  /* expect 37 byte(ASN header) and 64 byte(X and Y) */
1748  free(pp);
1749  return false;
1750  }
1751  /* omit ASN header */
1752  for(i=0; i<64; i++)
1753  data[i] = pp[i+37];
1754  free(pp);
1755  *size = 64;
1756  return true;
1757 }
1758 #endif /* USE_GOST */
1759 
1760 #ifdef USE_ED25519
1761 static bool
1762 ldns_key_ed255192bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1763 {
1764  int i;
1765  unsigned char* pp = NULL;
1766  if(i2d_PUBKEY(k, &pp) != 12 + 32) {
1767  /* expect 12 byte(ASN header) and 32 byte(pubkey) */
1768  free(pp);
1769  return false;
1770  }
1771  /* omit ASN header */
1772  for(i=0; i<32; i++)
1773  data[i] = pp[i+12];
1774  free(pp);
1775  *size = 32;
1776  return true;
1777 }
1778 #endif /* USE_ED25519 */
1779 
1780 #ifdef USE_ED448
1781 static bool
1782 ldns_key_ed4482bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1783 {
1784  int i;
1785  unsigned char* pp = NULL;
1786  if(i2d_PUBKEY(k, &pp) != 12 + 57) {
1787  /* expect 12 byte(ASN header) and 57 byte(pubkey) */
1788  free(pp);
1789  return false;
1790  }
1791  /* omit ASN header */
1792  for(i=0; i<57; i++)
1793  data[i] = pp[i+12];
1794  free(pp);
1795  *size = 57;
1796  return true;
1797 }
1798 #endif /* USE_ED448 */
1799 #endif /* splint */
1800 #endif /* HAVE_SSL */
1801 
1802 ldns_rr *
1804 {
1805  /* this function will convert a the keydata contained in
1806  * rsa/dsa pointers to a DNSKEY rr. It will fill in as
1807  * much as it can, but it does not know about key-flags
1808  * for instance
1809  */
1810  ldns_rr *pubkey;
1811  ldns_rdf *keybin;
1812  unsigned char *bin = NULL;
1813  uint16_t size = 0;
1814 #ifdef HAVE_SSL
1815  RSA *rsa = NULL;
1816 #ifdef USE_DSA
1817  DSA *dsa = NULL;
1818 #endif /* USE_DSA */
1819 #endif /* HAVE_SSL */
1820 #ifdef USE_ECDSA
1821  EC_KEY* ec;
1822 #endif
1823  int internal_data = 0;
1824 
1825  if (!k) {
1826  return NULL;
1827  }
1828  pubkey = ldns_rr_new();
1829 
1830  switch (ldns_key_algorithm(k)) {
1831  case LDNS_SIGN_HMACMD5:
1832  case LDNS_SIGN_HMACSHA1:
1833  case LDNS_SIGN_HMACSHA224:
1834  case LDNS_SIGN_HMACSHA256:
1835  case LDNS_SIGN_HMACSHA384:
1836  case LDNS_SIGN_HMACSHA512:
1838  break;
1839  default:
1841  break;
1842  }
1843  /* zero-th rdf - flags */
1844  ldns_rr_push_rdf(pubkey,
1846  ldns_key_flags(k)));
1847  /* first - proto */
1848  ldns_rr_push_rdf(pubkey,
1850 
1851  if (ldns_key_pubkey_owner(k)) {
1853  }
1854 
1855  /* third - da algorithm */
1856  switch(ldns_key_algorithm(k)) {
1857  case LDNS_SIGN_RSAMD5:
1858  case LDNS_SIGN_RSASHA1:
1860  case LDNS_SIGN_RSASHA256:
1861  case LDNS_SIGN_RSASHA512:
1862  ldns_rr_push_rdf(pubkey,
1864 #ifdef HAVE_SSL
1865  rsa = ldns_key_rsa_key(k);
1866  if (rsa) {
1867  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1868  if (!bin) {
1869  ldns_rr_free(pubkey);
1870  return NULL;
1871  }
1872  if (!ldns_key_rsa2bin(bin, rsa, &size)) {
1873  LDNS_FREE(bin);
1874  ldns_rr_free(pubkey);
1875  return NULL;
1876  }
1877  RSA_free(rsa);
1878  internal_data = 1;
1879  }
1880 #endif
1881  size++;
1882  break;
1883 #ifdef USE_DSA
1884  case LDNS_SIGN_DSA:
1885  ldns_rr_push_rdf(pubkey,
1887 #ifdef HAVE_SSL
1888  dsa = ldns_key_dsa_key(k);
1889  if (dsa) {
1890  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1891  if (!bin) {
1892  ldns_rr_free(pubkey);
1893  return NULL;
1894  }
1895  if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1896  LDNS_FREE(bin);
1897  ldns_rr_free(pubkey);
1898  return NULL;
1899  }
1900  DSA_free(dsa);
1901  internal_data = 1;
1902  }
1903 #endif /* HAVE_SSL */
1904 #endif /* USE_DSA */
1905  break;
1906 #ifdef USE_DSA
1907  case LDNS_SIGN_DSA_NSEC3:
1908  ldns_rr_push_rdf(pubkey,
1910 #ifdef HAVE_SSL
1911  dsa = ldns_key_dsa_key(k);
1912  if (dsa) {
1913  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1914  if (!bin) {
1915  ldns_rr_free(pubkey);
1916  return NULL;
1917  }
1918  if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1919  LDNS_FREE(bin);
1920  ldns_rr_free(pubkey);
1921  return NULL;
1922  }
1923  DSA_free(dsa);
1924  internal_data = 1;
1925  }
1926 #endif /* HAVE_SSL */
1927 #endif /* USE_DSA */
1928  break;
1929  case LDNS_SIGN_ECC_GOST:
1932 #if defined(HAVE_SSL) && defined(USE_GOST)
1933  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1934  if (!bin) {
1935  ldns_rr_free(pubkey);
1936  return NULL;
1937  }
1938 #ifndef S_SPLINT_S
1939  if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
1940  LDNS_FREE(bin);
1941  ldns_rr_free(pubkey);
1942  return NULL;
1943  }
1944 #endif /* splint */
1945  internal_data = 1;
1946 #else
1947  ldns_rr_free(pubkey);
1948  return NULL;
1949 #endif /* HAVE_SSL and USE_GOST */
1950  break;
1953 #ifdef USE_ECDSA
1956  bin = NULL;
1957 #ifndef S_SPLINT_S
1958  ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
1959 #endif
1960  EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
1961  size = (uint16_t)i2o_ECPublicKey(ec, NULL);
1962  if(!i2o_ECPublicKey(ec, &bin)) {
1963  EC_KEY_free(ec);
1964  ldns_rr_free(pubkey);
1965  return NULL;
1966  }
1967  if(size > 1) {
1968  /* move back one byte to shave off the 0x02
1969  * 'uncompressed' indicator that openssl made
1970  * Actually its 0x04 (from implementation).
1971  */
1972  assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
1973  size -= 1;
1974  memmove(bin, bin+1, size);
1975  }
1976  /* down the reference count for ec, its still assigned
1977  * to the pkey */
1978  EC_KEY_free(ec);
1979  internal_data = 1;
1980 #else
1981  ldns_rr_free(pubkey);
1982  return NULL;
1983 #endif /* ECDSA */
1984  break;
1985 #ifdef USE_ED25519
1986  case LDNS_SIGN_ED25519:
1989  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1990  if (!bin) {
1991  ldns_rr_free(pubkey);
1992  return NULL;
1993  }
1994  if (!ldns_key_ed255192bin(bin, k->_key.key, &size)) {
1995  LDNS_FREE(bin);
1996  ldns_rr_free(pubkey);
1997  return NULL;
1998  }
1999  internal_data = 1;
2000  break;
2001 #endif
2002 #ifdef USE_ED448
2003  case LDNS_SIGN_ED448:
2006  bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
2007  if (!bin) {
2008  ldns_rr_free(pubkey);
2009  return NULL;
2010  }
2011  if (!ldns_key_ed4482bin(bin, k->_key.key, &size)) {
2012  LDNS_FREE(bin);
2013  ldns_rr_free(pubkey);
2014  return NULL;
2015  }
2016  internal_data = 1;
2017  break;
2018 #endif
2019  case LDNS_SIGN_HMACMD5:
2020  case LDNS_SIGN_HMACSHA1:
2021  case LDNS_SIGN_HMACSHA224:
2022  case LDNS_SIGN_HMACSHA256:
2023  case LDNS_SIGN_HMACSHA384:
2024  case LDNS_SIGN_HMACSHA512:
2025  bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
2026  if (!bin) {
2027  ldns_rr_free(pubkey);
2028  return NULL;
2029  }
2030  ldns_rr_push_rdf(pubkey,
2032  ldns_key_algorithm(k)));
2033  size = ldns_key_hmac_size(k);
2034  memcpy(bin, ldns_key_hmac_key(k), size);
2035  internal_data = 1;
2036  break;
2037  }
2038  /* fourth the key bin material */
2039  if (internal_data) {
2040  keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
2041  LDNS_FREE(bin);
2042  ldns_rr_push_rdf(pubkey, keybin);
2043  }
2044  return pubkey;
2045 }
2046 
2047 void
2049 {
2050  LDNS_FREE(key);
2051 }
2052 
2053 void
2055 {
2056  unsigned char* hmac;
2057  if (ldns_key_pubkey_owner(key)) {
2059  }
2060 #ifdef HAVE_SSL
2061  if (ldns_key_evp_key(key)) {
2062  EVP_PKEY_free(ldns_key_evp_key(key));
2063  }
2064 #endif /* HAVE_SSL */
2065  if (ldns_key_hmac_key(key)) {
2066  hmac = ldns_key_hmac_key(key);
2067  LDNS_FREE(hmac);
2068  }
2069  LDNS_FREE(key);
2070 }
2071 
2072 void
2074 {
2075  size_t i;
2076  for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
2077  ldns_key_deep_free(ldns_key_list_key(key_list, i));
2078  }
2079  LDNS_FREE(key_list->_keys);
2080  LDNS_FREE(key_list);
2081 }
2082 
2083 ldns_rr *
2084 ldns_read_anchor_file(const char *filename)
2085 {
2086  FILE *fp;
2087  /*char line[LDNS_MAX_PACKETLEN];*/
2088  char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
2089  int c;
2090  size_t i = 0;
2091  ldns_rr *r;
2092  ldns_status status;
2093  if(!line) {
2094  return NULL;
2095  }
2096 
2097  fp = fopen(filename, "r");
2098  if (!fp) {
2099 #ifdef STDERR_MSGS
2100  fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
2101 #endif
2102  LDNS_FREE(line);
2103  return NULL;
2104  }
2105 
2106  while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
2107  line[i] = c;
2108  i++;
2109  }
2110  line[i] = '\0';
2111 
2112  fclose(fp);
2113 
2114  if (i <= 0) {
2115 #ifdef STDERR_MSGS
2116  fprintf(stderr, "nothing read from %s", filename);
2117 #endif
2118  LDNS_FREE(line);
2119  return NULL;
2120  } else {
2121  status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
2123  LDNS_FREE(line);
2124  return r;
2125  } else {
2126 #ifdef STDERR_MSGS
2127  fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
2128 #endif
2129  LDNS_FREE(line);
2130  return NULL;
2131  }
2132  }
2133 }
2134 
2135 char *
2137 {
2138  ldns_buffer *buffer;
2139  char *file_base_name;
2140 
2141  buffer = ldns_buffer_new(255);
2142  ldns_buffer_printf(buffer, "K");
2144  ldns_buffer_printf(buffer,
2145  "+%03u+%05u",
2146  ldns_key_algorithm(key),
2147  ldns_key_keytag(key));
2148  file_base_name = ldns_buffer_export(buffer);
2149  ldns_buffer_free(buffer);
2150  return file_base_name;
2151 }
2152 
2154 {
2156  while(lt->name) {
2157  if(lt->id == algo)
2158  return 1;
2159  lt++;
2160  }
2161  return 0;
2162 }
2163 
2165 {
2166  /* list of (signing algorithm id, alias_name) */
2167  ldns_lookup_table aliases[] = {
2168  /* from bind dnssec-keygen */
2169  {LDNS_SIGN_HMACMD5, "HMAC-MD5"},
2170 #ifdef USE_DSA
2171  {LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
2172 #endif /* USE_DSA */
2173  {LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
2174  /* old ldns usage, now RFC names */
2175 #ifdef USE_DSA
2176  {LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
2177 #endif
2178  {LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
2179 #ifdef USE_GOST
2180  {LDNS_SIGN_ECC_GOST, "GOST"},
2181 #endif
2182  /* compat with possible output */
2183  {LDNS_DH, "DH"},
2184  {LDNS_ECC, "ECC"},
2185  {LDNS_INDIRECT, "INDIRECT"},
2186  {LDNS_PRIVATEDNS, "PRIVATEDNS"},
2187  {LDNS_PRIVATEOID, "PRIVATEOID"},
2188  {0, NULL}};
2191  char *endptr;
2192 
2193  while(lt->name) {
2194  if(strcasecmp(lt->name, name) == 0)
2195  return lt->id;
2196  lt++;
2197  }
2198  lt = aliases;
2199  while(lt->name) {
2200  if(strcasecmp(lt->name, name) == 0)
2201  return lt->id;
2202  lt++;
2203  }
2204  a = strtol(name, &endptr, 10);
2205  if (*name && !*endptr)
2206  return a;
2207 
2208  return 0;
2209 }
void ldns_buffer_free(ldns_buffer *buffer)
frees the buffer.
Definition: buffer.c:137
ldns_buffer * ldns_buffer_new(size_t capacity)
creates a new buffer with the specified capacity.
Definition: buffer.c:16
int ldns_buffer_printf(ldns_buffer *buffer, const char *format,...)
prints to the buffer, increasing the capacity if required using buffer_reserve().
Definition: buffer.c:99
void * ldns_buffer_export(ldns_buffer *buffer)
Makes the buffer fixed and returns a pointer to the data.
Definition: buffer.c:150
#define ATTR_UNUSED(x)
Definition: common.h:72
int ldns_b64_pton(char const *src, uint8_t *target, size_t targsize)
uint16_t ldns_calc_keytag(const ldns_rr *key)
calculates a keytag of a key for use in DNSSEC.
Definition: dnssec.c:277
#define LDNS_DNSSEC_KEYPROTO
Definition: dnssec.h:42
#define LDNS_MAX_KEYLEN
Definition: dnssec.h:41
const char * ldns_get_errorstr_by_id(ldns_status err)
look up a descriptive text by each error.
Definition: error.c:191
@ LDNS_STATUS_SYNTAX_VERSION_ERR
Definition: error.h:85
@ LDNS_STATUS_ENGINE_KEY_NOT_LOADED
Definition: error.h:68
@ LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL
Definition: error.h:53
@ LDNS_STATUS_SYNTAX_ERR
Definition: error.h:97
@ LDNS_STATUS_ERR
Definition: error.h:37
@ LDNS_STATUS_MEM_ERR
Definition: error.h:34
@ LDNS_STATUS_OK
Definition: error.h:26
@ LDNS_STATUS_SYNTAX_ALG_ERR
Definition: error.h:86
enum ldns_enum_status ldns_status
Definition: error.h:146
char * ldns_key2str(const ldns_key *k)
Converts a private key to the test presentation fmt and returns that as a char *.
Definition: host2str.c:3334
ldns_status ldns_rdf2buffer_str_dname(ldns_buffer *output, const ldns_rdf *dname)
Print the ldns_rdf containing a dname to the buffer.
Definition: host2str.c:337
ldns_status ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
Creates a new private key based on the contents of the file pointed by fp.
Definition: keys.c:417
void ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
Set the keylist's key count to count.
Definition: keys.c:1594
uint32_t ldns_key_expiration(const ldns_key *k)
return the key's expiration date
Definition: keys.c:1565
void ldns_key_list_free(ldns_key_list *key_list)
Frees a key list structure.
Definition: keys.c:2073
EVP_PKEY * ldns_key_evp_key(const ldns_key *k)
returns the (openssl) EVP struct contained in the key
Definition: keys.c:1488
ldns_key * ldns_key_list_pop_key(ldns_key_list *key_list)
pops the last rr from a keylist
Definition: keys.c:1623
bool ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
pushes a key to a keylist
Definition: keys.c:1600
ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char *name)
Get signing algorithm by name.
Definition: keys.c:2164
RSA * ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
frm_fp helper function.
Definition: keys.c:737
int ldns_key_algo_supported(int algo)
See if a key algorithm is supported.
Definition: keys.c:2153
void ldns_key_set_external_key(ldns_key *k, void *external_key)
Set the key id data.
Definition: keys.c:1410
void ldns_key_set_expiration(ldns_key *k, uint32_t e)
Set the key's expiration date (seconds after epoch)
Definition: keys.c:1428
ldns_status ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
Creates a new priv key based on the contents of the file pointed by fp.
Definition: keys.c:105
void ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
Set the key's hmac data.
Definition: keys.c:1398
void ldns_key_set_dsa_key(ldns_key *k, DSA *d)
Set the key's dsa data The dsa data should be freed by the user.
Definition: keys.c:1364
void ldns_key_set_use(ldns_key *k, bool v)
set the use flag
Definition: keys.c:1469
void ldns_key_list_set_use(ldns_key_list *keys, bool v)
Set the 'use' flag for all keys in the list.
Definition: keys.c:1584
ldns_rr * ldns_key2rr(const ldns_key *k)
converts a ldns_key to a public key rr If the key data exists at an external point,...
Definition: keys.c:1803
void ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
Set the key's pubkey owner.
Definition: keys.c:1434
unsigned char * ldns_key_hmac_key(const ldns_key *k)
return the hmac key data
Definition: keys.c:1521
ldns_key_list * ldns_key_list_new(void)
Creates a new empty key list.
Definition: keys.c:66
ldns_key * ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
Creates a new key based on the algorithm.
Definition: keys.c:1083
DSA * ldns_key_new_frm_fp_dsa(FILE *f)
frm_fp helper function.
Definition: keys.c:910
ldns_rr * ldns_read_anchor_file(const char *filename)
Instantiates a DNSKEY or DS RR from file.
Definition: keys.c:2084
uint32_t ldns_key_origttl(const ldns_key *k)
return the original ttl of the key
Definition: keys.c:1547
void * ldns_key_external_key(const ldns_key *k)
return the key id key data
Definition: keys.c:1541
void ldns_key_print(FILE *output, const ldns_key *k)
print a private key to the file output
Definition: keys.c:1323
unsigned char * ldns_key_new_frm_fp_hmac_l(FILE *f, int *line_nr __attribute__((unused)), size_t *hmac_size)
Definition: keys.c:1028
void ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
Assign the key's dsa data The dsa data will be freed automatically when the key is freed.
Definition: keys.c:1384
size_t ldns_key_hmac_size(const ldns_key *k)
return the hmac key size
Definition: keys.c:1531
char * ldns_key_get_file_base_name(const ldns_key *key)
Returns the 'default base name' for key files; IE.
Definition: keys.c:2136
uint16_t ldns_key_keytag(const ldns_key *k)
return the keytag
Definition: keys.c:1571
void ldns_key_set_origttl(ldns_key *k, uint32_t t)
Set the key's original ttl.
Definition: keys.c:1416
ldns_signing_algorithm ldns_key_algorithm(const ldns_key *k)
return the signing alg of the key
Definition: keys.c:1463
void ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
Set the key's evp key.
Definition: keys.c:1350
void ldns_key_set_keytag(ldns_key *k, uint16_t tag)
Set the key's key tag.
Definition: keys.c:1440
void ldns_key_free(ldns_key *key)
frees a key structure, but not its internal data structures
Definition: keys.c:2048
uint32_t ldns_key_inception(const ldns_key *k)
return the key's inception date
Definition: keys.c:1559
void ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
Set the key's hmac size.
Definition: keys.c:1404
RSA * ldns_key_rsa_key(const ldns_key *k)
returns the (openssl) RSA struct contained in the key
Definition: keys.c:1494
ldns_rdf * ldns_key_pubkey_owner(const ldns_key *k)
return the public key's owner
Definition: keys.c:1577
RSA * ldns_key_new_frm_fp_rsa(FILE *f)
frm_fp helper function.
Definition: keys.c:731
ldns_lookup_table ldns_signing_algorithms[]
Definition: keys.c:31
ldns_status ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
Read the key with the given id from the given engine and store it in the given ldns_key structure.
Definition: keys.c:112
ldns_key * ldns_key_new(void)
Creates a new empty key structure.
Definition: keys.c:79
unsigned char * ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
frm_fp helper function.
Definition: keys.c:1022
uint16_t ldns_key_flags(const ldns_key *k)
return the flag of the key
Definition: keys.c:1553
void ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
Set the key's algorithm.
Definition: keys.c:1336
DSA * ldns_key_dsa_key(const ldns_key *k)
returns the (openssl) DSA struct contained in the key
Definition: keys.c:1504
void ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
Assign the key's rsa data The rsa data will be freed automatically when the key is freed.
Definition: keys.c:1376
DSA * ldns_key_new_frm_fp_dsa_l(FILE *f, int *line_nr __attribute__((unused)))
Definition: keys.c:916
size_t ldns_key_list_key_count(const ldns_key_list *key_list)
returns the number of keys in the key list
Definition: keys.c:1447
void ldns_key_set_flags(ldns_key *k, uint16_t f)
Set the key's flags.
Definition: keys.c:1342
void ldns_key_set_rsa_key(ldns_key *k, RSA *r)
Set the key's rsa data.
Definition: keys.c:1356
void ldns_key_deep_free(ldns_key *key)
frees a key structure and all its internal data structures, except the data set by ldns_key_set_exter...
Definition: keys.c:2054
void ldns_key_set_inception(ldns_key *k, uint32_t i)
Set the key's inception date (seconds after epoch)
Definition: keys.c:1422
ldns_key * ldns_key_list_key(const ldns_key_list *key, size_t nr)
returns a pointer to the key in the list at the given position
Definition: keys.c:1453
bool ldns_key_use(const ldns_key *k)
return the use flag
Definition: keys.c:1477
void ldns_key_EVP_unload_gost(void)
Release the engine reference held for the GOST engine.
int ldns_key_EVP_load_gost_id(void)
Get the PKEY id for GOST, loads GOST into openssl as a side effect.
@ LDNS_ECDSAP384SHA384
Definition: keys.h:57
@ LDNS_DSA_NSEC3
Definition: keys.h:51
@ LDNS_DSA
Definition: keys.h:48
@ LDNS_ECDSAP256SHA256
Definition: keys.h:56
@ LDNS_PRIVATEOID
Definition: keys.h:62
@ LDNS_PRIVATEDNS
Definition: keys.h:61
@ LDNS_DH
Definition: keys.h:47
@ LDNS_INDIRECT
Definition: keys.h:60
@ LDNS_ECC
Definition: keys.h:49
enum ldns_enum_signing_algorithm ldns_signing_algorithm
Definition: keys.h:110
@ LDNS_SIGN_RSASHA1
Definition: keys.h:84
@ LDNS_SIGN_ECDSAP256SHA256
Definition: keys.h:95
@ LDNS_SIGN_DSA_NSEC3
Definition: keys.h:92
@ LDNS_SIGN_ECC_GOST
Definition: keys.h:94
@ LDNS_SIGN_ED448
Definition: keys.h:101
@ LDNS_SIGN_ED25519
Definition: keys.h:98
@ LDNS_SIGN_RSASHA1_NSEC3
Definition: keys.h:88
@ LDNS_SIGN_HMACSHA224
Definition: keys.h:106
@ LDNS_SIGN_ECDSAP384SHA384
Definition: keys.h:96
@ LDNS_SIGN_HMACMD5
Definition: keys.h:103
@ LDNS_SIGN_RSAMD5
Definition: keys.h:83
@ LDNS_SIGN_RSASHA512
Definition: keys.h:90
@ LDNS_SIGN_DSA
Definition: keys.h:86
@ LDNS_SIGN_RSASHA256
Definition: keys.h:89
@ LDNS_SIGN_HMACSHA384
Definition: keys.h:107
@ LDNS_SIGN_HMACSHA1
Definition: keys.h:104
@ LDNS_SIGN_HMACSHA512
Definition: keys.h:108
@ LDNS_SIGN_HMACSHA256
Definition: keys.h:105
#define LDNS_KEY_ZONE_KEY
Definition: keys.h:37
enum ldns_enum_algorithm ldns_algorithm
Definition: keys.h:64
Including this file will include all ldns files, and define some lookup tables.
#define LDNS_MAX_PACKETLEN
Definition: packet.h:24
ssize_t ldns_fget_token_l(FILE *f, char *token, const char *delim, size_t limit, int *line_nr)
returns a token/char from the stream F.
Definition: parse.c:220
ssize_t ldns_fget_keyword_data_l(FILE *f, const char *keyword, const char *k_del, char *data, const char *d_del, size_t data_limit, int *line_nr)
Definition: parse.c:239
#define LDNS_MAX_LINELEN
Definition: parse.h:23
ldns_rdf * ldns_native2rdf_int8(ldns_rdf_type type, uint8_t value)
returns the rdf containing the native uint8_t repr.
Definition: rdata.c:126
void ldns_rdf_deep_free(ldns_rdf *rd)
frees a rdf structure and frees the data.
Definition: rdata.c:230
ldns_rdf * ldns_native2rdf_int16(ldns_rdf_type type, uint16_t value)
returns the rdf containing the native uint16_t representation.
Definition: rdata.c:132
size_t ldns_rdf_size(const ldns_rdf *rd)
returns the size of the rdf.
Definition: rdata.c:24
uint8_t * ldns_rdf_data(const ldns_rdf *rd)
returns the data of the rdf.
Definition: rdata.c:38
ldns_rdf * ldns_rdf_clone(const ldns_rdf *rd)
clones a rdf structure.
Definition: rdata.c:222
ldns_rdf * ldns_rdf_new_frm_data(ldns_rdf_type type, size_t size, const void *data)
allocates a new rdf structure and fills it.
Definition: rdata.c:193
@ LDNS_RDF_TYPE_B64
b64 string
Definition: rdata.h:68
@ LDNS_RDF_TYPE_INT8
8 bits
Definition: rdata.h:52
@ LDNS_RDF_TYPE_INT16
16 bits
Definition: rdata.h:54
@ LDNS_RDF_TYPE_ALG
a key algorithm
Definition: rdata.h:80
ldns_status ldns_rr_new_frm_str(ldns_rr **newrr, const char *str, uint32_t default_ttl, const ldns_rdf *origin, ldns_rdf **prev)
creates an rr from a string.
Definition: rr.c:676
void ldns_rr_free(ldns_rr *rr)
frees an RR structure
Definition: rr.c:81
void ldns_rr_set_owner(ldns_rr *rr, ldns_rdf *owner)
sets the owner in the rr structure.
Definition: rr.c:804
void ldns_rr_set_type(ldns_rr *rr, ldns_rr_type rr_type)
sets the type in the rr.
Definition: rr.c:828
ldns_rr_type ldns_rr_get_type(const ldns_rr *rr)
returns the type of the rr.
Definition: rr.c:943
bool ldns_rr_push_rdf(ldns_rr *rr, const ldns_rdf *f)
sets rd_field member, it will be placed in the next available spot.
Definition: rr.c:857
ldns_rr * ldns_rr_new(void)
creates a new rr structure.
Definition: rr.c:30
@ LDNS_RR_TYPE_DNSKEY
Definition: rr.h:172
@ LDNS_RR_TYPE_DS
RFC4034, RFC3658.
Definition: rr.h:164
@ LDNS_RR_TYPE_KEY
2535typecode
Definition: rr.h:128
ldns_status ldns_str2rdf_b64(ldns_rdf **rd, const char *str)
convert the string with the b64 data into wireformat
Definition: str2host.c:583
implementation of buffers to ease operations
Definition: buffer.h:51
Same as rr_list, but now for keys.
Definition: keys.h:173
size_t _key_count
Definition: keys.h:174
ldns_key ** _keys
Definition: keys.h:175
General key structure, can contain all types of keys that are used in DNSSEC.
Definition: keys.h:122
struct ldns_struct_key::@1::@3 dnssec
Some values that influence generated signatures.
struct ldns_struct_key::@0::@2 hmac
The key can be an HMAC key.
EVP_PKEY * key
Definition: keys.h:133
bool _use
Whether to use this key when signing.
Definition: keys.h:125
ldns_rdf * _pubkey_owner
Owner name of the key.
Definition: keys.h:165
ldns_signing_algorithm _alg
Definition: keys.h:123
union ldns_struct_key::@1 _extra
Depending on the key we can have extra data.
void * external_key
the key structure can also just point to some external key data
Definition: keys.h:146
struct ldns_struct_key::@0 _key
Storage pointers for the types of keys supported.
A general purpose lookup table.
Definition: util.h:156
const char * name
Definition: util.h:158
Resource record data field.
Definition: rdata.h:197
Resource Record.
Definition: rr.h:310
#define LDNS_FREE(ptr)
Definition: util.h:60
#define LDNS_MALLOC(type)
Memory management macros.
Definition: util.h:49
#define LDNS_XMALLOC(type, count)
Definition: util.h:51
#define LDNS_XREALLOC(ptr, type, count)
Definition: util.h:57