keys.c revision 256281
1/*
2 * keys.c handle private keys for use in DNSSEC
3 *
4 * This module should hide some of the openSSL complexities
5 * and give a general interface for private keys and hmac
6 * handling
7 *
8 * (c) NLnet Labs, 2004-2006
9 *
10 * See the file LICENSE for the license
11 */
12
13#include <ldns/config.h>
14
15#include <ldns/ldns.h>
16
17#ifdef HAVE_SSL
18#include <openssl/ssl.h>
19#include <openssl/engine.h>
20#include <openssl/rand.h>
21#endif /* HAVE_SSL */
22
23ldns_lookup_table ldns_signing_algorithms[] = {
24        { LDNS_SIGN_RSAMD5, "RSAMD5" },
25        { LDNS_SIGN_RSASHA1, "RSASHA1" },
26        { LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
27#ifdef USE_SHA2
28        { LDNS_SIGN_RSASHA256, "RSASHA256" },
29        { LDNS_SIGN_RSASHA512, "RSASHA512" },
30#endif
31#ifdef USE_GOST
32        { LDNS_SIGN_ECC_GOST, "ECC-GOST" },
33#endif
34#ifdef USE_ECDSA
35        { LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
36        { LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
37#endif
38        { LDNS_SIGN_DSA, "DSA" },
39        { LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
40        { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
41        { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
42        { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
43        { 0, NULL }
44};
45
46ldns_key_list *
47ldns_key_list_new(void)
48{
49	ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
50	if (!key_list) {
51		return NULL;
52	} else {
53		key_list->_key_count = 0;
54		key_list->_keys = NULL;
55		return key_list;
56	}
57}
58
59ldns_key *
60ldns_key_new(void)
61{
62	ldns_key *newkey;
63
64	newkey = LDNS_MALLOC(ldns_key);
65	if (!newkey) {
66		return NULL;
67	} else {
68		/* some defaults - not sure wether to do this */
69		ldns_key_set_use(newkey, true);
70		ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
71		ldns_key_set_origttl(newkey, 0);
72		ldns_key_set_keytag(newkey, 0);
73		ldns_key_set_inception(newkey, 0);
74		ldns_key_set_expiration(newkey, 0);
75		ldns_key_set_pubkey_owner(newkey, NULL);
76#ifdef HAVE_SSL
77		ldns_key_set_evp_key(newkey, NULL);
78#endif /* HAVE_SSL */
79		ldns_key_set_hmac_key(newkey, NULL);
80		ldns_key_set_external_key(newkey, NULL);
81		return newkey;
82	}
83}
84
85ldns_status
86ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
87{
88	return ldns_key_new_frm_fp_l(k, fp, NULL);
89}
90
91#ifdef HAVE_SSL
92ldns_status
93ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
94{
95	ldns_key *k;
96
97	k = ldns_key_new();
98        if(!k) return LDNS_STATUS_MEM_ERR;
99#ifndef S_SPLINT_S
100	k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
101        if(!k->_key.key) {
102                ldns_key_free(k);
103                return LDNS_STATUS_ERR;
104        }
105	ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
106	if (!k->_key.key) {
107                ldns_key_free(k);
108		return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
109	}
110#endif /* splint */
111	*key = k;
112	return LDNS_STATUS_OK;
113}
114#endif
115
116#ifdef USE_GOST
117/** store GOST engine reference loaded into OpenSSL library */
118ENGINE* ldns_gost_engine = NULL;
119
120int
121ldns_key_EVP_load_gost_id(void)
122{
123	static int gost_id = 0;
124	const EVP_PKEY_ASN1_METHOD* meth;
125	ENGINE* e;
126
127	if(gost_id) return gost_id;
128
129	/* see if configuration loaded gost implementation from other engine*/
130	meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
131	if(meth) {
132		EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
133		return gost_id;
134	}
135
136	/* see if engine can be loaded already */
137	e = ENGINE_by_id("gost");
138	if(!e) {
139		/* load it ourself, in case statically linked */
140		ENGINE_load_builtin_engines();
141		ENGINE_load_dynamic();
142		e = ENGINE_by_id("gost");
143	}
144	if(!e) {
145		/* no gost engine in openssl */
146		return 0;
147	}
148	if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
149		ENGINE_finish(e);
150		ENGINE_free(e);
151		return 0;
152	}
153
154	meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
155	if(!meth) {
156		/* algo not found */
157		ENGINE_finish(e);
158		ENGINE_free(e);
159		return 0;
160	}
161        /* Note: do not ENGINE_finish and ENGINE_free the acquired engine
162         * on some platforms this frees up the meth and unloads gost stuff */
163        ldns_gost_engine = e;
164
165	EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
166	return gost_id;
167}
168
169void ldns_key_EVP_unload_gost(void)
170{
171        if(ldns_gost_engine) {
172                ENGINE_finish(ldns_gost_engine);
173                ENGINE_free(ldns_gost_engine);
174                ldns_gost_engine = NULL;
175        }
176}
177
178/** read GOST private key */
179static EVP_PKEY*
180ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
181{
182	char token[16384];
183	const unsigned char* pp;
184	int gost_id;
185	EVP_PKEY* pkey;
186	ldns_rdf* b64rdf = NULL;
187
188	gost_id = ldns_key_EVP_load_gost_id();
189	if(!gost_id)
190		return NULL;
191
192	if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
193		sizeof(token), line_nr) == -1)
194		return NULL;
195	while(strlen(token) < 96) {
196		/* read more b64 from the file, b64 split on multiple lines */
197		if(ldns_fget_token_l(fp, token+strlen(token), "\n",
198			sizeof(token)-strlen(token), line_nr) == -1)
199			return NULL;
200	}
201	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
202		return NULL;
203	pp = (unsigned char*)ldns_rdf_data(b64rdf);
204	pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
205	ldns_rdf_deep_free(b64rdf);
206	return pkey;
207}
208#endif
209
210#ifdef USE_ECDSA
211/** calculate public key from private key */
212static int
213ldns_EC_KEY_calc_public(EC_KEY* ec)
214{
215        EC_POINT* pub_key;
216        const EC_GROUP* group;
217        group = EC_KEY_get0_group(ec);
218        pub_key = EC_POINT_new(group);
219        if(!pub_key) return 0;
220        if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
221                EC_POINT_free(pub_key);
222                return 0;
223        }
224        if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
225                NULL, NULL, NULL)) {
226                EC_POINT_free(pub_key);
227                return 0;
228        }
229        if(EC_KEY_set_public_key(ec, pub_key) == 0) {
230                EC_POINT_free(pub_key);
231                return 0;
232        }
233        EC_POINT_free(pub_key);
234        return 1;
235}
236
237/** read ECDSA private key */
238static EVP_PKEY*
239ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
240{
241	char token[16384];
242        ldns_rdf* b64rdf = NULL;
243        unsigned char* pp;
244        BIGNUM* bn;
245        EVP_PKEY* evp_key;
246        EC_KEY* ec;
247	if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
248		sizeof(token), line_nr) == -1)
249		return NULL;
250	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
251		return NULL;
252        pp = (unsigned char*)ldns_rdf_data(b64rdf);
253
254        if(alg == LDNS_ECDSAP256SHA256)
255                ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
256        else if(alg == LDNS_ECDSAP384SHA384)
257                ec = EC_KEY_new_by_curve_name(NID_secp384r1);
258        else    ec = NULL;
259        if(!ec) {
260	        ldns_rdf_deep_free(b64rdf);
261                return NULL;
262        }
263	bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
264	ldns_rdf_deep_free(b64rdf);
265        if(!bn) {
266                EC_KEY_free(ec);
267                return NULL;
268        }
269        EC_KEY_set_private_key(ec, bn);
270        BN_free(bn);
271        if(!ldns_EC_KEY_calc_public(ec)) {
272                EC_KEY_free(ec);
273                return NULL;
274        }
275
276        evp_key = EVP_PKEY_new();
277        if(!evp_key) {
278                EC_KEY_free(ec);
279                return NULL;
280        }
281        if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
282		EVP_PKEY_free(evp_key);
283                EC_KEY_free(ec);
284                return NULL;
285	}
286        return evp_key;
287}
288#endif
289
290ldns_status
291ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
292{
293	ldns_key *k;
294	char *d;
295	ldns_signing_algorithm alg;
296	ldns_rr *key_rr;
297#ifdef HAVE_SSL
298	RSA *rsa;
299	DSA *dsa;
300	unsigned char *hmac;
301	size_t hmac_size;
302#endif /* HAVE_SSL */
303
304	k = ldns_key_new();
305
306	d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
307	if (!k || !d) {
308                ldns_key_free(k);
309                LDNS_FREE(d);
310		return LDNS_STATUS_MEM_ERR;
311	}
312
313	alg = 0;
314
315	/* the file is highly structured. Do this in sequence */
316	/* RSA:
317	 * Private-key-format: v1.x.
318 	 * Algorithm: 1 (RSA)
319
320	 */
321	/* get the key format version number */
322	if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
323				LDNS_MAX_LINELEN, line_nr) == -1) {
324		/* no version information */
325                ldns_key_free(k);
326                LDNS_FREE(d);
327		return LDNS_STATUS_SYNTAX_ERR;
328	}
329	if (strncmp(d, "v1.", 3) != 0) {
330                ldns_key_free(k);
331                LDNS_FREE(d);
332		return LDNS_STATUS_SYNTAX_VERSION_ERR;
333	}
334
335	/* get the algorithm type, our file function strip ( ) so there are
336	 * not in the return string! */
337	if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
338				LDNS_MAX_LINELEN, line_nr) == -1) {
339		/* no alg information */
340                ldns_key_free(k);
341                LDNS_FREE(d);
342		return LDNS_STATUS_SYNTAX_ALG_ERR;
343	}
344
345	if (strncmp(d, "1 RSA", 2) == 0) {
346		alg = LDNS_SIGN_RSAMD5;
347	}
348	if (strncmp(d, "2 DH", 2) == 0) {
349		alg = (ldns_signing_algorithm)LDNS_DH;
350	}
351	if (strncmp(d, "3 DSA", 2) == 0) {
352		alg = LDNS_SIGN_DSA;
353	}
354	if (strncmp(d, "4 ECC", 2) == 0) {
355		alg = (ldns_signing_algorithm)LDNS_ECC;
356	}
357	if (strncmp(d, "5 RSASHA1", 2) == 0) {
358		alg = LDNS_SIGN_RSASHA1;
359	}
360	if (strncmp(d, "6 DSA", 2) == 0) {
361		alg = LDNS_SIGN_DSA_NSEC3;
362	}
363	if (strncmp(d, "7 RSASHA1", 2) == 0) {
364		alg = LDNS_SIGN_RSASHA1_NSEC3;
365	}
366
367	if (strncmp(d, "8 RSASHA256", 2) == 0) {
368#ifdef USE_SHA2
369		alg = LDNS_SIGN_RSASHA256;
370#else
371		fprintf(stderr, "Warning: SHA256 not compiled into this ");
372		fprintf(stderr, "version of ldns\n");
373#endif
374	}
375	if (strncmp(d, "10 RSASHA512", 3) == 0) {
376#ifdef USE_SHA2
377		alg = LDNS_SIGN_RSASHA512;
378#else
379		fprintf(stderr, "Warning: SHA512 not compiled into this ");
380		fprintf(stderr, "version of ldns\n");
381#endif
382	}
383	if (strncmp(d, "12 ECC-GOST", 3) == 0) {
384#ifdef USE_GOST
385		alg = LDNS_SIGN_ECC_GOST;
386#else
387		fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
388		fprintf(stderr, "version of ldns, use --enable-gost\n");
389#endif
390	}
391	if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
392#ifdef USE_ECDSA
393                alg = LDNS_SIGN_ECDSAP256SHA256;
394#else
395		fprintf(stderr, "Warning: ECDSA not compiled into this ");
396		fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
397#endif
398        }
399	if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
400#ifdef USE_ECDSA
401                alg = LDNS_SIGN_ECDSAP384SHA384;
402#else
403		fprintf(stderr, "Warning: ECDSA not compiled into this ");
404		fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
405#endif
406        }
407	if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
408		alg = LDNS_SIGN_HMACMD5;
409	}
410	if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
411		alg = LDNS_SIGN_HMACSHA1;
412	}
413	if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
414		alg = LDNS_SIGN_HMACSHA256;
415	}
416
417	LDNS_FREE(d);
418
419	switch(alg) {
420		case LDNS_SIGN_RSAMD5:
421		case LDNS_SIGN_RSASHA1:
422		case LDNS_SIGN_RSASHA1_NSEC3:
423#ifdef USE_SHA2
424		case LDNS_SIGN_RSASHA256:
425		case LDNS_SIGN_RSASHA512:
426#endif
427			ldns_key_set_algorithm(k, alg);
428#ifdef HAVE_SSL
429			rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
430			if (!rsa) {
431				ldns_key_free(k);
432				return LDNS_STATUS_ERR;
433			}
434			ldns_key_assign_rsa_key(k, rsa);
435#endif /* HAVE_SSL */
436			break;
437		case LDNS_SIGN_DSA:
438		case LDNS_SIGN_DSA_NSEC3:
439			ldns_key_set_algorithm(k, alg);
440#ifdef HAVE_SSL
441			dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
442			if (!dsa) {
443				ldns_key_free(k);
444				return LDNS_STATUS_ERR;
445			}
446			ldns_key_assign_dsa_key(k, dsa);
447#endif /* HAVE_SSL */
448			break;
449		case LDNS_SIGN_HMACMD5:
450		case LDNS_SIGN_HMACSHA1:
451		case LDNS_SIGN_HMACSHA256:
452			ldns_key_set_algorithm(k, alg);
453#ifdef HAVE_SSL
454			hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
455			if (!hmac) {
456				ldns_key_free(k);
457				return LDNS_STATUS_ERR;
458			}
459			ldns_key_set_hmac_size(k, hmac_size);
460			ldns_key_set_hmac_key(k, hmac);
461#endif /* HAVE_SSL */
462			break;
463		case LDNS_SIGN_ECC_GOST:
464			ldns_key_set_algorithm(k, alg);
465#if defined(HAVE_SSL) && defined(USE_GOST)
466                        if(!ldns_key_EVP_load_gost_id()) {
467				ldns_key_free(k);
468                                return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
469                        }
470			ldns_key_set_evp_key(k,
471				ldns_key_new_frm_fp_gost_l(fp, line_nr));
472#ifndef S_SPLINT_S
473			if(!k->_key.key) {
474				ldns_key_free(k);
475				return LDNS_STATUS_ERR;
476			}
477#endif /* splint */
478#endif
479			break;
480#ifdef USE_ECDSA
481               case LDNS_SIGN_ECDSAP256SHA256:
482               case LDNS_SIGN_ECDSAP384SHA384:
483                        ldns_key_set_algorithm(k, alg);
484                        ldns_key_set_evp_key(k,
485                                ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
486#ifndef S_SPLINT_S
487			if(!k->_key.key) {
488				ldns_key_free(k);
489				return LDNS_STATUS_ERR;
490			}
491#endif /* splint */
492			break;
493#endif
494		default:
495			ldns_key_free(k);
496			return LDNS_STATUS_SYNTAX_ALG_ERR;
497	}
498	key_rr = ldns_key2rr(k);
499	ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
500	ldns_rr_free(key_rr);
501
502	if (key) {
503		*key = k;
504		return LDNS_STATUS_OK;
505	}
506	ldns_key_free(k);
507	return LDNS_STATUS_ERR;
508}
509
510#ifdef HAVE_SSL
511RSA *
512ldns_key_new_frm_fp_rsa(FILE *f)
513{
514	return ldns_key_new_frm_fp_rsa_l(f, NULL);
515}
516
517RSA *
518ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
519{
520	/* we parse
521 	 * Modulus:
522 	 * PublicExponent:
523 	 * PrivateExponent:
524 	 * Prime1:
525 	 * Prime2:
526 	 * Exponent1:
527 	 * Exponent2:
528 	 * Coefficient:
529	 *
530	 * man 3 RSA:
531	 *
532	 * struct
533         *     {
534         *     BIGNUM *n;              // public modulus
535         *     BIGNUM *e;              // public exponent
536         *     BIGNUM *d;              // private exponent
537         *     BIGNUM *p;              // secret prime factor
538         *     BIGNUM *q;              // secret prime factor
539         *     BIGNUM *dmp1;           // d mod (p-1)
540         *     BIGNUM *dmq1;           // d mod (q-1)
541         *     BIGNUM *iqmp;           // q^-1 mod p
542         *     // ...
543	 *
544	 */
545	char *d;
546	RSA *rsa;
547	uint8_t *buf;
548	int i;
549
550	d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
551	buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
552	rsa = RSA_new();
553	if (!d || !rsa || !buf) {
554                goto error;
555	}
556
557	/* I could use functions again, but that seems an overkill,
558	 * allthough this also looks tedious
559	 */
560
561	/* Modules, rsa->n */
562	if (ldns_fget_keyword_data_l(f, "Modulus", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
563		goto error;
564	}
565	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
566#ifndef S_SPLINT_S
567	rsa->n = BN_bin2bn((const char unsigned*)buf, i, NULL);
568	if (!rsa->n) {
569		goto error;
570	}
571
572	/* PublicExponent, rsa->e */
573	if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
574		goto error;
575	}
576	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
577	rsa->e = BN_bin2bn((const char unsigned*)buf, i, NULL);
578	if (!rsa->e) {
579		goto error;
580	}
581
582	/* PrivateExponent, rsa->d */
583	if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
584		goto error;
585	}
586	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
587	rsa->d = BN_bin2bn((const char unsigned*)buf, i, NULL);
588	if (!rsa->d) {
589		goto error;
590	}
591
592	/* Prime1, rsa->p */
593	if (ldns_fget_keyword_data_l(f, "Prime1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
594		goto error;
595	}
596	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
597	rsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
598	if (!rsa->p) {
599		goto error;
600	}
601
602	/* Prime2, rsa->q */
603	if (ldns_fget_keyword_data_l(f, "Prime2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
604		goto error;
605	}
606	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
607	rsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
608	if (!rsa->q) {
609		goto error;
610	}
611
612	/* Exponent1, rsa->dmp1 */
613	if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
614		goto error;
615	}
616	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
617	rsa->dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
618	if (!rsa->dmp1) {
619		goto error;
620	}
621
622	/* Exponent2, rsa->dmq1 */
623	if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
624		goto error;
625	}
626	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
627	rsa->dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
628	if (!rsa->dmq1) {
629		goto error;
630	}
631
632	/* Coefficient, rsa->iqmp */
633	if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
634		goto error;
635	}
636	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
637	rsa->iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
638	if (!rsa->iqmp) {
639		goto error;
640	}
641#endif /* splint */
642
643	LDNS_FREE(buf);
644	LDNS_FREE(d);
645	return rsa;
646
647error:
648	RSA_free(rsa);
649	LDNS_FREE(d);
650	LDNS_FREE(buf);
651	return NULL;
652}
653
654DSA *
655ldns_key_new_frm_fp_dsa(FILE *f)
656{
657	return ldns_key_new_frm_fp_dsa_l(f, NULL);
658}
659
660DSA *
661ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
662{
663	int i;
664	char *d;
665	DSA *dsa;
666	uint8_t *buf;
667
668	d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
669	buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
670	dsa = DSA_new();
671	if (!d || !dsa || !buf) {
672                goto error;
673	}
674
675	/* the line parser removes the () from the input... */
676
677	/* Prime, dsa->p */
678	if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
679		goto error;
680	}
681	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
682#ifndef S_SPLINT_S
683	dsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
684	if (!dsa->p) {
685		goto error;
686	}
687
688	/* Subprime, dsa->q */
689	if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
690		goto error;
691	}
692	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
693	dsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
694	if (!dsa->q) {
695		goto error;
696	}
697
698	/* Base, dsa->g */
699	if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
700		goto error;
701	}
702	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
703	dsa->g = BN_bin2bn((const char unsigned*)buf, i, NULL);
704	if (!dsa->g) {
705		goto error;
706	}
707
708	/* Private key, dsa->priv_key */
709	if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
710		goto error;
711	}
712	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
713	dsa->priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
714	if (!dsa->priv_key) {
715		goto error;
716	}
717
718	/* Public key, dsa->priv_key */
719	if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
720		goto error;
721	}
722	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
723	dsa->pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
724	if (!dsa->pub_key) {
725		goto error;
726	}
727#endif /* splint */
728
729	LDNS_FREE(buf);
730	LDNS_FREE(d);
731
732	return dsa;
733
734error:
735	LDNS_FREE(d);
736	LDNS_FREE(buf);
737        DSA_free(dsa);
738	return NULL;
739}
740
741unsigned char *
742ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
743{
744	return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
745}
746
747unsigned char *
748ldns_key_new_frm_fp_hmac_l( FILE *f
749			  , ATTR_UNUSED(int *line_nr)
750			  , size_t *hmac_size
751			  )
752{
753	size_t i, bufsz;
754	char d[LDNS_MAX_LINELEN];
755	unsigned char *buf = NULL;
756
757	if (ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
758		goto error;
759	}
760	bufsz = ldns_b64_ntop_calculate_size(strlen(d));
761	buf = LDNS_XMALLOC(unsigned char, bufsz);
762	i = (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
763
764	*hmac_size = i;
765	return buf;
766
767	error:
768	LDNS_FREE(buf);
769	*hmac_size = 0;
770	return NULL;
771}
772#endif /* HAVE_SSL */
773
774#ifdef USE_GOST
775static EVP_PKEY*
776ldns_gen_gost_key(void)
777{
778	EVP_PKEY_CTX* ctx;
779	EVP_PKEY* p = NULL;
780	int gost_id = ldns_key_EVP_load_gost_id();
781	if(!gost_id)
782		return NULL;
783	ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
784	if(!ctx) {
785		/* the id should be available now */
786		return NULL;
787	}
788	if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
789		/* cannot set paramset */
790		EVP_PKEY_CTX_free(ctx);
791		return NULL;
792	}
793
794	if(EVP_PKEY_keygen_init(ctx) <= 0) {
795		EVP_PKEY_CTX_free(ctx);
796		return NULL;
797	}
798	if(EVP_PKEY_keygen(ctx, &p) <= 0) {
799		EVP_PKEY_free(p);
800		EVP_PKEY_CTX_free(ctx);
801		return NULL;
802	}
803	EVP_PKEY_CTX_free(ctx);
804	return p;
805}
806#endif
807
808ldns_key *
809ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
810{
811	ldns_key *k;
812#ifdef HAVE_SSL
813	DSA *d;
814	RSA *r;
815#  ifdef USE_ECDSA
816        EC_KEY *ec = NULL;
817#  endif
818#else
819	int i;
820	uint16_t offset = 0;
821#endif
822	unsigned char *hmac;
823
824	k = ldns_key_new();
825	if (!k) {
826		return NULL;
827	}
828	switch(alg) {
829		case LDNS_SIGN_RSAMD5:
830		case LDNS_SIGN_RSASHA1:
831		case LDNS_SIGN_RSASHA1_NSEC3:
832		case LDNS_SIGN_RSASHA256:
833		case LDNS_SIGN_RSASHA512:
834#ifdef HAVE_SSL
835			r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
836                        if(!r) {
837				ldns_key_free(k);
838				return NULL;
839			}
840			if (RSA_check_key(r) != 1) {
841				ldns_key_free(k);
842				return NULL;
843			}
844			ldns_key_set_rsa_key(k, r);
845			RSA_free(r);
846#endif /* HAVE_SSL */
847			break;
848		case LDNS_SIGN_DSA:
849		case LDNS_SIGN_DSA_NSEC3:
850#ifdef HAVE_SSL
851			d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
852			if (!d) {
853				ldns_key_free(k);
854				return NULL;
855			}
856			if (DSA_generate_key(d) != 1) {
857				ldns_key_free(k);
858				return NULL;
859			}
860			ldns_key_set_dsa_key(k, d);
861			DSA_free(d);
862#endif /* HAVE_SSL */
863			break;
864		case LDNS_SIGN_HMACMD5:
865		case LDNS_SIGN_HMACSHA1:
866		case LDNS_SIGN_HMACSHA256:
867#ifdef HAVE_SSL
868#ifndef S_SPLINT_S
869			k->_key.key = NULL;
870#endif /* splint */
871#endif /* HAVE_SSL */
872			size = size / 8;
873			ldns_key_set_hmac_size(k, size);
874
875			hmac = LDNS_XMALLOC(unsigned char, size);
876                        if(!hmac) {
877				ldns_key_free(k);
878				return NULL;
879                        }
880#ifdef HAVE_SSL
881			if (RAND_bytes(hmac, (int) size) != 1) {
882				LDNS_FREE(hmac);
883				ldns_key_free(k);
884				return NULL;
885			}
886#else
887			while (offset + sizeof(i) < size) {
888			  i = random();
889			  memcpy(&hmac[offset], &i, sizeof(i));
890			  offset += sizeof(i);
891			}
892			if (offset < size) {
893			  i = random();
894			  memcpy(&hmac[offset], &i, size - offset);
895			}
896#endif /* HAVE_SSL */
897			ldns_key_set_hmac_key(k, hmac);
898
899			ldns_key_set_flags(k, 0);
900			break;
901		case LDNS_SIGN_ECC_GOST:
902#if defined(HAVE_SSL) && defined(USE_GOST)
903			ldns_key_set_evp_key(k, ldns_gen_gost_key());
904#ifndef S_SPLINT_S
905                        if(!k->_key.key) {
906                                ldns_key_free(k);
907                                return NULL;
908                        }
909#endif /* splint */
910#else
911			ldns_key_free(k);
912			return NULL;
913#endif /* HAVE_SSL and USE_GOST */
914                        break;
915                case LDNS_SIGN_ECDSAP256SHA256:
916                case LDNS_SIGN_ECDSAP384SHA384:
917#ifdef USE_ECDSA
918                        if(alg == LDNS_SIGN_ECDSAP256SHA256)
919                                ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
920                        else if(alg == LDNS_SIGN_ECDSAP384SHA384)
921                                ec = EC_KEY_new_by_curve_name(NID_secp384r1);
922                        if(!ec) {
923                                ldns_key_free(k);
924                                return NULL;
925                        }
926                        if(!EC_KEY_generate_key(ec)) {
927                                ldns_key_free(k);
928                                EC_KEY_free(ec);
929                                return NULL;
930                        }
931#ifndef S_SPLINT_S
932                        k->_key.key = EVP_PKEY_new();
933                        if(!k->_key.key) {
934                                ldns_key_free(k);
935                                EC_KEY_free(ec);
936                                return NULL;
937                        }
938                        if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
939                                ldns_key_free(k);
940                                EC_KEY_free(ec);
941                                return NULL;
942			}
943#endif /* splint */
944#else
945			ldns_key_free(k);
946			return NULL;
947#endif /* ECDSA */
948			break;
949	}
950	ldns_key_set_algorithm(k, alg);
951	return k;
952}
953
954void
955ldns_key_print(FILE *output, const ldns_key *k)
956{
957	char *str = ldns_key2str(k);
958	if (str) {
959                fprintf(output, "%s", str);
960        } else {
961                fprintf(output, "Unable to convert private key to string\n");
962        }
963        LDNS_FREE(str);
964}
965
966
967void
968ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
969{
970	k->_alg = l;
971}
972
973void
974ldns_key_set_flags(ldns_key *k, uint16_t f)
975{
976	k->_extra.dnssec.flags = f;
977}
978
979#ifdef HAVE_SSL
980#ifndef S_SPLINT_S
981void
982ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
983{
984	k->_key.key = e;
985}
986
987void
988ldns_key_set_rsa_key(ldns_key *k, RSA *r)
989{
990	EVP_PKEY *key = EVP_PKEY_new();
991	EVP_PKEY_set1_RSA(key, r);
992	k->_key.key = key;
993}
994
995void
996ldns_key_set_dsa_key(ldns_key *k, DSA *d)
997{
998	EVP_PKEY *key = EVP_PKEY_new();
999	EVP_PKEY_set1_DSA(key, d);
1000	k->_key.key  = key;
1001}
1002
1003void
1004ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
1005{
1006	EVP_PKEY *key = EVP_PKEY_new();
1007	EVP_PKEY_assign_RSA(key, r);
1008	k->_key.key = key;
1009}
1010
1011void
1012ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
1013{
1014	EVP_PKEY *key = EVP_PKEY_new();
1015	EVP_PKEY_assign_DSA(key, d);
1016	k->_key.key  = key;
1017}
1018#endif /* splint */
1019#endif /* HAVE_SSL */
1020
1021void
1022ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
1023{
1024	k->_key.hmac.key = hmac;
1025}
1026
1027void
1028ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
1029{
1030	k->_key.hmac.size = hmac_size;
1031}
1032
1033void
1034ldns_key_set_external_key(ldns_key *k, void *external_key)
1035{
1036	k->_key.external_key = external_key;
1037}
1038
1039void
1040ldns_key_set_origttl(ldns_key *k, uint32_t t)
1041{
1042	k->_extra.dnssec.orig_ttl = t;
1043}
1044
1045void
1046ldns_key_set_inception(ldns_key *k, uint32_t i)
1047{
1048	k->_extra.dnssec.inception = i;
1049}
1050
1051void
1052ldns_key_set_expiration(ldns_key *k, uint32_t e)
1053{
1054	k->_extra.dnssec.expiration = e;
1055}
1056
1057void
1058ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
1059{
1060	k->_pubkey_owner = r;
1061}
1062
1063void
1064ldns_key_set_keytag(ldns_key *k, uint16_t tag)
1065{
1066	k->_extra.dnssec.keytag = tag;
1067}
1068
1069/* read */
1070size_t
1071ldns_key_list_key_count(const ldns_key_list *key_list)
1072{
1073	        return key_list->_key_count;
1074}
1075
1076ldns_key *
1077ldns_key_list_key(const ldns_key_list *key, size_t nr)
1078{
1079	if (nr < ldns_key_list_key_count(key)) {
1080		return key->_keys[nr];
1081	} else {
1082		return NULL;
1083	}
1084}
1085
1086ldns_signing_algorithm
1087ldns_key_algorithm(const ldns_key *k)
1088{
1089	return k->_alg;
1090}
1091
1092void
1093ldns_key_set_use(ldns_key *k, bool v)
1094{
1095	if (k) {
1096		k->_use = v;
1097	}
1098}
1099
1100bool
1101ldns_key_use(const ldns_key *k)
1102{
1103	if (k) {
1104		return k->_use;
1105	}
1106	return false;
1107}
1108
1109#ifdef HAVE_SSL
1110#ifndef S_SPLINT_S
1111EVP_PKEY *
1112ldns_key_evp_key(const ldns_key *k)
1113{
1114	return k->_key.key;
1115}
1116
1117RSA *
1118ldns_key_rsa_key(const ldns_key *k)
1119{
1120	if (k->_key.key) {
1121		return EVP_PKEY_get1_RSA(k->_key.key);
1122	} else {
1123		return NULL;
1124	}
1125}
1126
1127DSA *
1128ldns_key_dsa_key(const ldns_key *k)
1129{
1130	if (k->_key.key) {
1131		return EVP_PKEY_get1_DSA(k->_key.key);
1132	} else {
1133		return NULL;
1134	}
1135}
1136#endif /* splint */
1137#endif /* HAVE_SSL */
1138
1139unsigned char *
1140ldns_key_hmac_key(const ldns_key *k)
1141{
1142	if (k->_key.hmac.key) {
1143		return k->_key.hmac.key;
1144	} else {
1145		return NULL;
1146	}
1147}
1148
1149size_t
1150ldns_key_hmac_size(const ldns_key *k)
1151{
1152	if (k->_key.hmac.size) {
1153		return k->_key.hmac.size;
1154	} else {
1155		return 0;
1156	}
1157}
1158
1159void *
1160ldns_key_external_key(const ldns_key *k)
1161{
1162	return k->_key.external_key;
1163}
1164
1165uint32_t
1166ldns_key_origttl(const ldns_key *k)
1167{
1168	return k->_extra.dnssec.orig_ttl;
1169}
1170
1171uint16_t
1172ldns_key_flags(const ldns_key *k)
1173{
1174	return k->_extra.dnssec.flags;
1175}
1176
1177uint32_t
1178ldns_key_inception(const ldns_key *k)
1179{
1180	return k->_extra.dnssec.inception;
1181}
1182
1183uint32_t
1184ldns_key_expiration(const ldns_key *k)
1185{
1186	return k->_extra.dnssec.expiration;
1187}
1188
1189uint16_t
1190ldns_key_keytag(const ldns_key *k)
1191{
1192	return k->_extra.dnssec.keytag;
1193}
1194
1195ldns_rdf *
1196ldns_key_pubkey_owner(const ldns_key *k)
1197{
1198	return k->_pubkey_owner;
1199}
1200
1201/* write */
1202void
1203ldns_key_list_set_use(ldns_key_list *keys, bool v)
1204{
1205	size_t i;
1206
1207	for (i = 0; i < ldns_key_list_key_count(keys); i++) {
1208		ldns_key_set_use(ldns_key_list_key(keys, i), v);
1209	}
1210}
1211
1212void
1213ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
1214{
1215	        key->_key_count = count;
1216}
1217
1218bool
1219ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
1220{
1221        size_t key_count;
1222        ldns_key **keys;
1223
1224        key_count = ldns_key_list_key_count(key_list);
1225
1226        /* grow the array */
1227        keys = LDNS_XREALLOC(
1228                key_list->_keys, ldns_key *, key_count + 1);
1229        if (!keys) {
1230                return false;
1231        }
1232
1233        /* add the new member */
1234        key_list->_keys = keys;
1235        key_list->_keys[key_count] = key;
1236
1237        ldns_key_list_set_key_count(key_list, key_count + 1);
1238        return true;
1239}
1240
1241ldns_key *
1242ldns_key_list_pop_key(ldns_key_list *key_list)
1243{
1244        size_t key_count;
1245        ldns_key** a;
1246        ldns_key *pop;
1247
1248	if (!key_list) {
1249		return NULL;
1250	}
1251
1252        key_count = ldns_key_list_key_count(key_list);
1253        if (key_count == 0) {
1254                return NULL;
1255        }
1256
1257        pop = ldns_key_list_key(key_list, key_count);
1258
1259        /* shrink the array */
1260        a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
1261        if(a) {
1262                key_list->_keys = a;
1263        }
1264
1265        ldns_key_list_set_key_count(key_list, key_count - 1);
1266
1267        return pop;
1268}
1269
1270#ifdef HAVE_SSL
1271#ifndef S_SPLINT_S
1272/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1273static bool
1274ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
1275{
1276	int i,j;
1277
1278	if (!k) {
1279		return false;
1280	}
1281
1282	if (BN_num_bytes(k->e) <= 256) {
1283		/* normally only this path is executed (small factors are
1284		 * more common
1285		 */
1286		data[0] = (unsigned char) BN_num_bytes(k->e);
1287		i = BN_bn2bin(k->e, data + 1);
1288		j = BN_bn2bin(k->n, data + i + 1);
1289		*size = (uint16_t) i + j;
1290	} else if (BN_num_bytes(k->e) <= 65536) {
1291		data[0] = 0;
1292		/* BN_bn2bin does bigendian, _uint16 also */
1293		ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(k->e));
1294
1295		BN_bn2bin(k->e, data + 3);
1296		BN_bn2bin(k->n, data + 4 + BN_num_bytes(k->e));
1297		*size = (uint16_t) BN_num_bytes(k->n) + 6;
1298	} else {
1299		return false;
1300	}
1301	return true;
1302}
1303
1304/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1305static bool
1306ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
1307{
1308	uint8_t T;
1309
1310	if (!k) {
1311		return false;
1312	}
1313
1314	/* See RFC2536 */
1315	*size = (uint16_t)BN_num_bytes(k->p);
1316	T = (*size - 64) / 8;
1317	memcpy(data, &T, 1);
1318
1319	if (T > 8) {
1320		fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
1321		fprintf(stderr, " not implemented\n");
1322		return false;
1323	}
1324
1325	/* size = 64 + (T * 8); */
1326	data[0] = (unsigned char)T;
1327	BN_bn2bin(k->q, data + 1 ); 		/* 20 octects */
1328	BN_bn2bin(k->p, data + 21 ); 		/* offset octects */
1329	BN_bn2bin(k->g, data + 21 + *size); 	/* offset octets */
1330	BN_bn2bin(k->pub_key, data + 21 + *size + *size); /* offset octets */
1331	*size = 21 + (*size * 3);
1332	return true;
1333}
1334
1335#ifdef USE_GOST
1336static bool
1337ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1338{
1339	int i;
1340	unsigned char* pp = NULL;
1341	if(i2d_PUBKEY(k, &pp) != 37 + 64) {
1342		/* expect 37 byte(ASN header) and 64 byte(X and Y) */
1343		CRYPTO_free(pp);
1344		return false;
1345	}
1346	/* omit ASN header */
1347	for(i=0; i<64; i++)
1348		data[i] = pp[i+37];
1349	CRYPTO_free(pp);
1350	*size = 64;
1351	return true;
1352}
1353#endif /* USE_GOST */
1354#endif /* splint */
1355#endif /* HAVE_SSL */
1356
1357ldns_rr *
1358ldns_key2rr(const ldns_key *k)
1359{
1360	/* this function will convert a the keydata contained in
1361	 * rsa/dsa pointers to a DNSKEY rr. It will fill in as
1362	 * much as it can, but it does not know about key-flags
1363	 * for instance
1364	 */
1365	ldns_rr *pubkey;
1366	ldns_rdf *keybin;
1367	unsigned char *bin = NULL;
1368	uint16_t size = 0;
1369#ifdef HAVE_SSL
1370	RSA *rsa = NULL;
1371	DSA *dsa = NULL;
1372#endif /* HAVE_SSL */
1373#ifdef USE_ECDSA
1374        EC_KEY* ec;
1375#endif
1376	int internal_data = 0;
1377
1378	if (!k) {
1379		return NULL;
1380	}
1381	pubkey = ldns_rr_new();
1382
1383	switch (ldns_key_algorithm(k)) {
1384	case LDNS_SIGN_HMACMD5:
1385	case LDNS_SIGN_HMACSHA1:
1386	case LDNS_SIGN_HMACSHA256:
1387		ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
1388        	break;
1389	default:
1390		ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
1391		break;
1392        }
1393	/* zero-th rdf - flags */
1394	ldns_rr_push_rdf(pubkey,
1395			ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
1396				ldns_key_flags(k)));
1397	/* first - proto */
1398	ldns_rr_push_rdf(pubkey,
1399			ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
1400
1401	if (ldns_key_pubkey_owner(k)) {
1402		ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
1403	}
1404
1405	/* third - da algorithm */
1406	switch(ldns_key_algorithm(k)) {
1407		case LDNS_SIGN_RSAMD5:
1408		case LDNS_SIGN_RSASHA1:
1409		case LDNS_SIGN_RSASHA1_NSEC3:
1410		case LDNS_SIGN_RSASHA256:
1411		case LDNS_SIGN_RSASHA512:
1412			ldns_rr_push_rdf(pubkey,
1413						  ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1414#ifdef HAVE_SSL
1415			rsa =  ldns_key_rsa_key(k);
1416			if (rsa) {
1417				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1418				if (!bin) {
1419                                        ldns_rr_free(pubkey);
1420					return NULL;
1421				}
1422				if (!ldns_key_rsa2bin(bin, rsa, &size)) {
1423		                        LDNS_FREE(bin);
1424                                        ldns_rr_free(pubkey);
1425					return NULL;
1426				}
1427				RSA_free(rsa);
1428				internal_data = 1;
1429			}
1430#endif
1431			size++;
1432			break;
1433		case LDNS_SIGN_DSA:
1434			ldns_rr_push_rdf(pubkey,
1435					ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
1436#ifdef HAVE_SSL
1437			dsa = ldns_key_dsa_key(k);
1438			if (dsa) {
1439				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1440				if (!bin) {
1441                                        ldns_rr_free(pubkey);
1442					return NULL;
1443				}
1444				if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1445		                        LDNS_FREE(bin);
1446                                        ldns_rr_free(pubkey);
1447					return NULL;
1448				}
1449				DSA_free(dsa);
1450				internal_data = 1;
1451			}
1452#endif /* HAVE_SSL */
1453			break;
1454		case LDNS_SIGN_DSA_NSEC3:
1455			ldns_rr_push_rdf(pubkey,
1456					ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
1457#ifdef HAVE_SSL
1458			dsa = ldns_key_dsa_key(k);
1459			if (dsa) {
1460				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1461				if (!bin) {
1462                                        ldns_rr_free(pubkey);
1463					return NULL;
1464				}
1465				if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1466		                        LDNS_FREE(bin);
1467                                        ldns_rr_free(pubkey);
1468					return NULL;
1469				}
1470				DSA_free(dsa);
1471				internal_data = 1;
1472			}
1473#endif /* HAVE_SSL */
1474			break;
1475		case LDNS_SIGN_ECC_GOST:
1476			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1477				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1478#if defined(HAVE_SSL) && defined(USE_GOST)
1479			bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1480			if (!bin) {
1481                                ldns_rr_free(pubkey);
1482				return NULL;
1483                        }
1484#ifndef S_SPLINT_S
1485			if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
1486		                LDNS_FREE(bin);
1487                                ldns_rr_free(pubkey);
1488				return NULL;
1489			}
1490#endif /* splint */
1491			internal_data = 1;
1492#else
1493                        ldns_rr_free(pubkey);
1494			return NULL;
1495#endif /* HAVE_SSL and USE_GOST */
1496			break;
1497                case LDNS_SIGN_ECDSAP256SHA256:
1498                case LDNS_SIGN_ECDSAP384SHA384:
1499#ifdef USE_ECDSA
1500			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1501				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1502                        bin = NULL;
1503#ifndef S_SPLINT_S
1504                        ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
1505#endif
1506                        EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
1507                        size = (uint16_t)i2o_ECPublicKey(ec, NULL);
1508                        if(!i2o_ECPublicKey(ec, &bin)) {
1509                                EC_KEY_free(ec);
1510                                ldns_rr_free(pubkey);
1511                                return NULL;
1512                        }
1513			if(size > 1) {
1514				/* move back one byte to shave off the 0x02
1515				 * 'uncompressed' indicator that openssl made
1516				 * Actually its 0x04 (from implementation).
1517				 */
1518				assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
1519				size -= 1;
1520				memmove(bin, bin+1, size);
1521			}
1522                        /* down the reference count for ec, its still assigned
1523                         * to the pkey */
1524                        EC_KEY_free(ec);
1525			internal_data = 1;
1526#else
1527                        ldns_rr_free(pubkey);
1528			return NULL;
1529#endif /* ECDSA */
1530                        break;
1531		case LDNS_SIGN_HMACMD5:
1532		case LDNS_SIGN_HMACSHA1:
1533		case LDNS_SIGN_HMACSHA256:
1534			bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
1535			if (!bin) {
1536                                ldns_rr_free(pubkey);
1537				return NULL;
1538			}
1539			ldns_rr_push_rdf(pubkey,
1540			                 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
1541			                 ldns_key_algorithm(k)));
1542			size = ldns_key_hmac_size(k);
1543			memcpy(bin, ldns_key_hmac_key(k), size);
1544			internal_data = 1;
1545			break;
1546	}
1547	/* fourth the key bin material */
1548	if (internal_data) {
1549		keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
1550		LDNS_FREE(bin);
1551		ldns_rr_push_rdf(pubkey, keybin);
1552	}
1553	return pubkey;
1554}
1555
1556void
1557ldns_key_free(ldns_key *key)
1558{
1559	LDNS_FREE(key);
1560}
1561
1562void
1563ldns_key_deep_free(ldns_key *key)
1564{
1565	unsigned char* hmac;
1566	if (ldns_key_pubkey_owner(key)) {
1567		ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
1568	}
1569#ifdef HAVE_SSL
1570	if (ldns_key_evp_key(key)) {
1571		EVP_PKEY_free(ldns_key_evp_key(key));
1572	}
1573#endif /* HAVE_SSL */
1574	if (ldns_key_hmac_key(key)) {
1575		hmac = ldns_key_hmac_key(key);
1576		LDNS_FREE(hmac);
1577	}
1578	LDNS_FREE(key);
1579}
1580
1581void
1582ldns_key_list_free(ldns_key_list *key_list)
1583{
1584	size_t i;
1585	for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
1586		ldns_key_deep_free(ldns_key_list_key(key_list, i));
1587	}
1588	LDNS_FREE(key_list->_keys);
1589	LDNS_FREE(key_list);
1590}
1591
1592ldns_rr *
1593ldns_read_anchor_file(const char *filename)
1594{
1595	FILE *fp;
1596	/*char line[LDNS_MAX_PACKETLEN];*/
1597	char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
1598	int c;
1599	size_t i = 0;
1600	ldns_rr *r;
1601	ldns_status status;
1602        if(!line) {
1603                return NULL;
1604        }
1605
1606	fp = fopen(filename, "r");
1607	if (!fp) {
1608		fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
1609		LDNS_FREE(line);
1610		return NULL;
1611	}
1612
1613	while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
1614		line[i] = c;
1615		i++;
1616	}
1617	line[i] = '\0';
1618
1619	fclose(fp);
1620
1621	if (i <= 0) {
1622		fprintf(stderr, "nothing read from %s", filename);
1623		LDNS_FREE(line);
1624		return NULL;
1625	} else {
1626		status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
1627		if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
1628			LDNS_FREE(line);
1629			return r;
1630		} else {
1631			fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
1632			LDNS_FREE(line);
1633			return NULL;
1634		}
1635	}
1636}
1637
1638char *
1639ldns_key_get_file_base_name(ldns_key *key)
1640{
1641	ldns_buffer *buffer;
1642	char *file_base_name;
1643
1644	buffer = ldns_buffer_new(255);
1645	ldns_buffer_printf(buffer, "K");
1646	(void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
1647	ldns_buffer_printf(buffer,
1648	                   "+%03u+%05u",
1649			   ldns_key_algorithm(key),
1650			   ldns_key_keytag(key));
1651	file_base_name = ldns_buffer_export(buffer);
1652	ldns_buffer_free(buffer);
1653	return file_base_name;
1654}
1655
1656int ldns_key_algo_supported(int algo)
1657{
1658	ldns_lookup_table *lt = ldns_signing_algorithms;
1659	while(lt->name) {
1660		if(lt->id == algo)
1661			return 1;
1662		lt++;
1663	}
1664	return 0;
1665}
1666
1667ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
1668{
1669        /* list of (signing algorithm id, alias_name) */
1670        ldns_lookup_table aliases[] = {
1671                /* from bind dnssec-keygen */
1672                {LDNS_SIGN_HMACMD5, "HMAC-MD5"},
1673                {LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
1674                {LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
1675                /* old ldns usage, now RFC names */
1676                {LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
1677                {LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
1678#ifdef USE_GOST
1679                {LDNS_SIGN_ECC_GOST, "GOST"},
1680#endif
1681                /* compat with possible output */
1682                {LDNS_DH, "DH"},
1683                {LDNS_ECC, "ECC"},
1684                {LDNS_INDIRECT, "INDIRECT"},
1685                {LDNS_PRIVATEDNS, "PRIVATEDNS"},
1686                {LDNS_PRIVATEOID, "PRIVATEOID"},
1687                {0, NULL}};
1688        ldns_lookup_table* lt = ldns_signing_algorithms;
1689        while(lt->name) {
1690                if(strcasecmp(lt->name, name) == 0)
1691                        return lt->id;
1692                lt++;
1693        }
1694        lt = aliases;
1695        while(lt->name) {
1696                if(strcasecmp(lt->name, name) == 0)
1697                        return lt->id;
1698                lt++;
1699        }
1700        if(atoi(name) != 0)
1701                return atoi(name);
1702        return 0;
1703}
1704