1/*
2 * keys.c handle private keys for use in DNSSEC
3 *
4 * This module should hide some of the openSSL complexities
5 * and give a general interface for private keys and hmac
6 * handling
7 *
8 * (c) NLnet Labs, 2004-2006
9 *
10 * See the file LICENSE for the license
11 */
12
13#include <ldns/config.h>
14
15#include <ldns/ldns.h>
16
17#ifdef HAVE_SSL
18#include <openssl/ui.h>
19#include <openssl/ssl.h>
20#include <openssl/rand.h>
21#include <openssl/bn.h>
22#include <openssl/rsa.h>
23#ifdef USE_DSA
24#include <openssl/dsa.h>
25#endif
26#ifndef OPENSSL_NO_ENGINE
27#include <openssl/engine.h>
28#endif
29#endif /* HAVE_SSL */
30
31ldns_lookup_table ldns_signing_algorithms[] = {
32        { LDNS_SIGN_RSAMD5, "RSAMD5" },
33        { LDNS_SIGN_RSASHA1, "RSASHA1" },
34        { LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
35#ifdef USE_SHA2
36        { LDNS_SIGN_RSASHA256, "RSASHA256" },
37        { LDNS_SIGN_RSASHA512, "RSASHA512" },
38#endif
39#ifdef USE_GOST
40        { LDNS_SIGN_ECC_GOST, "ECC-GOST" },
41#endif
42#ifdef USE_ECDSA
43        { LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
44        { LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
45#endif
46#ifdef USE_ED25519
47	{ LDNS_SIGN_ED25519, "ED25519" },
48#endif
49#ifdef USE_ED448
50	{ LDNS_SIGN_ED448, "ED448" },
51#endif
52#ifdef USE_DSA
53        { LDNS_SIGN_DSA, "DSA" },
54        { LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
55#endif
56        { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
57        { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
58        { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
59        { LDNS_SIGN_HMACSHA224, "hmac-sha224" },
60        { LDNS_SIGN_HMACSHA384, "hmac-sha384" },
61        { LDNS_SIGN_HMACSHA512, "hmac-sha512" },
62        { 0, NULL }
63};
64
65ldns_key_list *
66ldns_key_list_new(void)
67{
68	ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
69	if (!key_list) {
70		return NULL;
71	} else {
72		key_list->_key_count = 0;
73		key_list->_keys = NULL;
74		return key_list;
75	}
76}
77
78ldns_key *
79ldns_key_new(void)
80{
81	ldns_key *newkey;
82
83	newkey = LDNS_MALLOC(ldns_key);
84	if (!newkey) {
85		return NULL;
86	} else {
87		/* some defaults - not sure whether to do this */
88		ldns_key_set_use(newkey, true);
89		ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
90		ldns_key_set_origttl(newkey, 0);
91		ldns_key_set_keytag(newkey, 0);
92		ldns_key_set_inception(newkey, 0);
93		ldns_key_set_expiration(newkey, 0);
94		ldns_key_set_pubkey_owner(newkey, NULL);
95#ifdef HAVE_SSL
96		ldns_key_set_evp_key(newkey, NULL);
97#endif /* HAVE_SSL */
98		ldns_key_set_hmac_key(newkey, NULL);
99		ldns_key_set_external_key(newkey, NULL);
100		return newkey;
101	}
102}
103
104ldns_status
105ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
106{
107	return ldns_key_new_frm_fp_l(k, fp, NULL);
108}
109
110#if defined(HAVE_SSL) && !defined(OPENSSL_NO_ENGINE)
111ldns_status
112ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
113{
114	ldns_key *k;
115
116	k = ldns_key_new();
117        if(!k) return LDNS_STATUS_MEM_ERR;
118#ifndef S_SPLINT_S
119	k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
120        if(!k->_key.key) {
121                ldns_key_free(k);
122                return LDNS_STATUS_ERR;
123        }
124	ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
125	if (!k->_key.key) {
126                ldns_key_free(k);
127		return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
128	}
129#endif /* splint */
130	*key = k;
131	return LDNS_STATUS_OK;
132}
133#endif
134
135#ifdef USE_GOST
136/** store GOST engine reference loaded into OpenSSL library */
137ENGINE* ldns_gost_engine = NULL;
138
139int
140ldns_key_EVP_load_gost_id(void)
141{
142	static int gost_id = 0;
143	const EVP_PKEY_ASN1_METHOD* meth;
144	ENGINE* e;
145
146	if(gost_id) return gost_id;
147
148	/* see if configuration loaded gost implementation from other engine*/
149	meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
150	if(meth) {
151		EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
152		return gost_id;
153	}
154
155	/* see if engine can be loaded already */
156	e = ENGINE_by_id("gost");
157	if(!e) {
158		/* load it ourself, in case statically linked */
159		ENGINE_load_builtin_engines();
160		ENGINE_load_dynamic();
161		e = ENGINE_by_id("gost");
162	}
163	if(!e) {
164		/* no gost engine in openssl */
165		return 0;
166	}
167	if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
168		ENGINE_finish(e);
169		ENGINE_free(e);
170		return 0;
171	}
172
173	meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
174	if(!meth) {
175		/* algo not found */
176		ENGINE_finish(e);
177		ENGINE_free(e);
178		return 0;
179	}
180        /* Note: do not ENGINE_finish and ENGINE_free the acquired engine
181         * on some platforms this frees up the meth and unloads gost stuff */
182        ldns_gost_engine = e;
183
184	EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
185	return gost_id;
186}
187
188void ldns_key_EVP_unload_gost(void)
189{
190        if(ldns_gost_engine) {
191                ENGINE_finish(ldns_gost_engine);
192                ENGINE_free(ldns_gost_engine);
193                ldns_gost_engine = NULL;
194        }
195}
196
197/** read GOST private key */
198static EVP_PKEY*
199ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
200{
201	char token[16384];
202	const unsigned char* pp;
203	int gost_id;
204	EVP_PKEY* pkey;
205	ldns_rdf* b64rdf = NULL;
206
207	gost_id = ldns_key_EVP_load_gost_id();
208	if(!gost_id)
209		return NULL;
210
211	if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
212		sizeof(token), line_nr) == -1)
213		return NULL;
214	while(strlen(token) < 96) {
215		/* read more b64 from the file, b64 split on multiple lines */
216		if(ldns_fget_token_l(fp, token+strlen(token), "\n",
217			sizeof(token)-strlen(token), line_nr) == -1)
218			return NULL;
219	}
220	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
221		return NULL;
222	pp = (unsigned char*)ldns_rdf_data(b64rdf);
223	pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
224	ldns_rdf_deep_free(b64rdf);
225	return pkey;
226}
227#endif
228
229#ifdef USE_ECDSA
230/** calculate public key from private key */
231static int
232ldns_EC_KEY_calc_public(EC_KEY* ec)
233{
234        EC_POINT* pub_key;
235        const EC_GROUP* group;
236        group = EC_KEY_get0_group(ec);
237        pub_key = EC_POINT_new(group);
238        if(!pub_key) return 0;
239        if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
240                EC_POINT_free(pub_key);
241                return 0;
242        }
243        if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
244                NULL, NULL, NULL)) {
245                EC_POINT_free(pub_key);
246                return 0;
247        }
248        if(EC_KEY_set_public_key(ec, pub_key) == 0) {
249                EC_POINT_free(pub_key);
250                return 0;
251        }
252        EC_POINT_free(pub_key);
253        return 1;
254}
255
256/** read ECDSA private key */
257static EVP_PKEY*
258ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
259{
260	char token[16384];
261        ldns_rdf* b64rdf = NULL;
262        unsigned char* pp;
263        BIGNUM* bn;
264        EVP_PKEY* evp_key;
265        EC_KEY* ec;
266	if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
267		sizeof(token), line_nr) == -1)
268		return NULL;
269	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
270		return NULL;
271        pp = (unsigned char*)ldns_rdf_data(b64rdf);
272
273        if(alg == LDNS_ECDSAP256SHA256)
274                ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
275        else if(alg == LDNS_ECDSAP384SHA384)
276                ec = EC_KEY_new_by_curve_name(NID_secp384r1);
277        else    ec = NULL;
278        if(!ec) {
279	        ldns_rdf_deep_free(b64rdf);
280                return NULL;
281        }
282	bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
283	ldns_rdf_deep_free(b64rdf);
284        if(!bn) {
285                EC_KEY_free(ec);
286                return NULL;
287        }
288        EC_KEY_set_private_key(ec, bn);
289        BN_free(bn);
290        if(!ldns_EC_KEY_calc_public(ec)) {
291                EC_KEY_free(ec);
292                return NULL;
293        }
294
295        evp_key = EVP_PKEY_new();
296        if(!evp_key) {
297                EC_KEY_free(ec);
298                return NULL;
299        }
300        if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
301		EVP_PKEY_free(evp_key);
302                EC_KEY_free(ec);
303                return NULL;
304	}
305        return evp_key;
306}
307#endif
308
309#ifdef USE_ED25519
310/** turn private key buffer into EC_KEY structure */
311static EVP_PKEY*
312ldns_ed25519_priv_raw(uint8_t* pkey, int plen)
313{
314	const unsigned char* pp;
315	uint8_t buf[256];
316	int buflen = 0;
317	uint8_t pre[] = {0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06,
318		0x03, 0x2b, 0x65, 0x70, 0x04, 0x22, 0x04, 0x20};
319	int pre_len = 16;
320	/* ASN looks like this for ED25519 public key
321	 * 302a300506032b6570032100 <32byteskey>
322	 * for ED25519 private key
323	 * 302e020100300506032b657004220420 <32bytes>
324	 *
325	 * for X25519 this was
326	 * 30320201010420 <32byteskey>
327	 * andparameters a00b06092b06010401da470f01
328	 * (noparameters, preamble is 30250201010420).
329	 * the key is reversed (little endian).
330	 */
331	buflen = pre_len + plen;
332	if((size_t)buflen > sizeof(buf))
333		return NULL;
334	memmove(buf, pre, pre_len);
335	memmove(buf+pre_len, pkey, plen);
336	/* reverse the pkey into the buf - key is not reversed it seems */
337	/* for(i=0; i<plen; i++)
338		buf[pre_len+i] = pkey[plen-1-i]; */
339	pp = buf;
340	return d2i_PrivateKey(NID_ED25519, NULL, &pp, buflen);
341}
342
343/** read ED25519 private key */
344static EVP_PKEY*
345ldns_key_new_frm_fp_ed25519_l(FILE* fp, int* line_nr)
346{
347	char token[16384];
348        ldns_rdf* b64rdf = NULL;
349        EVP_PKEY* evp_key;
350	if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
351		sizeof(token), line_nr) == -1)
352		return NULL;
353	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
354		return NULL;
355
356	/* we use d2i_ECPrivateKey because it calculates the public key
357	 * from the private part, which others, EC_KEY_set_private_key,
358	 * and o2i methods, do not do */
359	/* for that the private key has to be encoded in ASN1 notation
360	 * with a ED25519 prefix on it */
361
362	evp_key = ldns_ed25519_priv_raw(ldns_rdf_data(b64rdf),
363		(int)ldns_rdf_size(b64rdf));
364	ldns_rdf_deep_free(b64rdf);
365        return evp_key;
366}
367#endif
368
369#ifdef USE_ED448
370/** turn private key buffer into EC_KEY structure */
371static EVP_PKEY*
372ldns_ed448_priv_raw(uint8_t* pkey, int plen)
373{
374	const unsigned char* pp;
375	uint8_t buf[256];
376	int buflen = 0;
377	uint8_t pre[] = {0x30, 0x47, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x71, 0x04, 0x3b, 0x04, 0x39};
378	int pre_len = 16;
379	/* ASN looks like this for ED448
380	 * 3047020100300506032b6571043b0439 <57bytekey>
381	 * the key is reversed (little endian).
382	 */
383	buflen = pre_len + plen;
384	if((size_t)buflen > sizeof(buf))
385		return NULL;
386	memmove(buf, pre, pre_len);
387	memmove(buf+pre_len, pkey, plen);
388	/* reverse the pkey into the buf - key is not reversed it seems */
389	/* for(i=0; i<plen; i++)
390		buf[pre_len+i] = pkey[plen-1-i]; */
391	pp = buf;
392	return d2i_PrivateKey(NID_ED448, NULL, &pp, buflen);
393}
394
395/** read ED448 private key */
396static EVP_PKEY*
397ldns_key_new_frm_fp_ed448_l(FILE* fp, int* line_nr)
398{
399	char token[16384];
400        ldns_rdf* b64rdf = NULL;
401        EVP_PKEY* evp_key;
402	if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
403		sizeof(token), line_nr) == -1)
404		return NULL;
405	if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
406		return NULL;
407
408	/* convert private key into ASN notation and then convert that */
409	evp_key = ldns_ed448_priv_raw(ldns_rdf_data(b64rdf),
410		(int)ldns_rdf_size(b64rdf));
411	ldns_rdf_deep_free(b64rdf);
412	return evp_key;
413}
414#endif
415
416ldns_status
417ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
418{
419	ldns_key *k;
420	char *d;
421	ldns_signing_algorithm alg;
422	ldns_rr *key_rr;
423#ifdef HAVE_SSL
424	RSA *rsa;
425#ifdef USE_DSA
426	DSA *dsa;
427#endif
428	unsigned char *hmac;
429	size_t hmac_size;
430#endif /* HAVE_SSL */
431
432	k = ldns_key_new();
433
434	d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
435	if (!k || !d) {
436                ldns_key_free(k);
437                LDNS_FREE(d);
438		return LDNS_STATUS_MEM_ERR;
439	}
440
441	alg = 0;
442
443	/* the file is highly structured. Do this in sequence */
444	/* RSA:
445	 * Private-key-format: v1.x.
446 	 * Algorithm: 1 (RSA)
447
448	 */
449	/* get the key format version number */
450	if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
451				LDNS_MAX_LINELEN, line_nr) == -1) {
452		/* no version information */
453                ldns_key_free(k);
454                LDNS_FREE(d);
455		return LDNS_STATUS_SYNTAX_ERR;
456	}
457	if (strncmp(d, "v1.", 3) != 0) {
458                ldns_key_free(k);
459                LDNS_FREE(d);
460		return LDNS_STATUS_SYNTAX_VERSION_ERR;
461	}
462
463	/* get the algorithm type, our file function strip ( ) so there are
464	 * not in the return string! */
465	if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
466				LDNS_MAX_LINELEN, line_nr) == -1) {
467		/* no alg information */
468                ldns_key_free(k);
469                LDNS_FREE(d);
470		return LDNS_STATUS_SYNTAX_ALG_ERR;
471	}
472
473	if (strncmp(d, "1 RSA", 2) == 0) {
474		alg = LDNS_SIGN_RSAMD5;
475	}
476	if (strncmp(d, "2 DH", 2) == 0) {
477		alg = (ldns_signing_algorithm)LDNS_DH;
478	}
479	if (strncmp(d, "3 DSA", 2) == 0) {
480#ifdef USE_DSA
481		alg = LDNS_SIGN_DSA;
482#else
483# ifdef STDERR_MSGS
484		fprintf(stderr, "Warning: DSA not compiled into this ");
485		fprintf(stderr, "version of ldns\n");
486# endif
487#endif
488	}
489	if (strncmp(d, "4 ECC", 2) == 0) {
490		alg = (ldns_signing_algorithm)LDNS_ECC;
491	}
492	if (strncmp(d, "5 RSASHA1", 2) == 0) {
493		alg = LDNS_SIGN_RSASHA1;
494	}
495	if (strncmp(d, "6 DSA", 2) == 0) {
496#ifdef USE_DSA
497		alg = LDNS_SIGN_DSA_NSEC3;
498#else
499# ifdef STDERR_MSGS
500		fprintf(stderr, "Warning: DSA not compiled into this ");
501		fprintf(stderr, "version of ldns\n");
502# endif
503#endif
504	}
505	if (strncmp(d, "7 RSASHA1", 2) == 0) {
506		alg = LDNS_SIGN_RSASHA1_NSEC3;
507	}
508
509	if (strncmp(d, "8 RSASHA256", 2) == 0) {
510#ifdef USE_SHA2
511		alg = LDNS_SIGN_RSASHA256;
512#else
513# ifdef STDERR_MSGS
514		fprintf(stderr, "Warning: SHA256 not compiled into this ");
515		fprintf(stderr, "version of ldns\n");
516# endif
517#endif
518	}
519	if (strncmp(d, "10 RSASHA512", 3) == 0) {
520#ifdef USE_SHA2
521		alg = LDNS_SIGN_RSASHA512;
522#else
523# ifdef STDERR_MSGS
524		fprintf(stderr, "Warning: SHA512 not compiled into this ");
525		fprintf(stderr, "version of ldns\n");
526# endif
527#endif
528	}
529	if (strncmp(d, "12 ECC-GOST", 3) == 0) {
530#ifdef USE_GOST
531		alg = LDNS_SIGN_ECC_GOST;
532#else
533# ifdef STDERR_MSGS
534		fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
535		fprintf(stderr, "version of ldns, use --enable-gost\n");
536# endif
537#endif
538	}
539	if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
540#ifdef USE_ECDSA
541                alg = LDNS_SIGN_ECDSAP256SHA256;
542#else
543# ifdef STDERR_MSGS
544		fprintf(stderr, "Warning: ECDSA not compiled into this ");
545		fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
546# endif
547#endif
548        }
549	if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
550#ifdef USE_ECDSA
551                alg = LDNS_SIGN_ECDSAP384SHA384;
552#else
553# ifdef STDERR_MSGS
554		fprintf(stderr, "Warning: ECDSA not compiled into this ");
555		fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
556# endif
557#endif
558        }
559	if (strncmp(d, "15 ED25519", 3) == 0) {
560#ifdef USE_ED25519
561                alg = LDNS_SIGN_ED25519;
562#else
563# ifdef STDERR_MSGS
564		fprintf(stderr, "Warning: ED25519 not compiled into this ");
565		fprintf(stderr, "version of ldns, use --enable-ed25519\n");
566# endif
567#endif
568        }
569	if (strncmp(d, "16 ED448", 3) == 0) {
570#ifdef USE_ED448
571                alg = LDNS_SIGN_ED448;
572#else
573# ifdef STDERR_MSGS
574		fprintf(stderr, "Warning: ED448 not compiled into this ");
575		fprintf(stderr, "version of ldns, use --enable-ed448\n");
576# endif
577#endif
578        }
579	if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
580		alg = LDNS_SIGN_HMACMD5;
581	}
582	if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
583		alg = LDNS_SIGN_HMACSHA1;
584	}
585	if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
586		alg = LDNS_SIGN_HMACSHA256;
587	}
588	/* For compatibility with dnssec-keygen */
589	if (strncmp(d, "161 ", 4) == 0) {
590		alg = LDNS_SIGN_HMACSHA1;
591	}
592	if (strncmp(d, "162 HMAC-SHA224", 4) == 0) {
593		alg = LDNS_SIGN_HMACSHA224;
594	}
595	/* For compatibility with dnssec-keygen */
596	if (strncmp(d, "163 ", 4) == 0) {
597		alg = LDNS_SIGN_HMACSHA256;
598	}
599	if (strncmp(d, "164 HMAC-SHA384", 4) == 0) {
600		alg = LDNS_SIGN_HMACSHA384;
601	}
602	if (strncmp(d, "165 HMAC-SHA512", 4) == 0) {
603		alg = LDNS_SIGN_HMACSHA512;
604	}
605	LDNS_FREE(d);
606
607	switch(alg) {
608		case LDNS_SIGN_RSAMD5:
609		case LDNS_SIGN_RSASHA1:
610		case LDNS_SIGN_RSASHA1_NSEC3:
611#ifdef USE_SHA2
612		case LDNS_SIGN_RSASHA256:
613		case LDNS_SIGN_RSASHA512:
614#endif
615			ldns_key_set_algorithm(k, alg);
616#ifdef HAVE_SSL
617			rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
618			if (!rsa) {
619				ldns_key_free(k);
620				return LDNS_STATUS_ERR;
621			}
622			ldns_key_assign_rsa_key(k, rsa);
623#endif /* HAVE_SSL */
624			break;
625#ifdef USE_DSA
626		case LDNS_SIGN_DSA:
627		case LDNS_SIGN_DSA_NSEC3:
628			ldns_key_set_algorithm(k, alg);
629#ifdef HAVE_SSL
630			dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
631			if (!dsa) {
632				ldns_key_free(k);
633				return LDNS_STATUS_ERR;
634			}
635			ldns_key_assign_dsa_key(k, dsa);
636#endif /* HAVE_SSL */
637			break;
638#endif /* USE_DSA */
639		case LDNS_SIGN_HMACMD5:
640		case LDNS_SIGN_HMACSHA1:
641		case LDNS_SIGN_HMACSHA224:
642		case LDNS_SIGN_HMACSHA256:
643		case LDNS_SIGN_HMACSHA384:
644		case LDNS_SIGN_HMACSHA512:
645			ldns_key_set_algorithm(k, alg);
646#ifdef HAVE_SSL
647			hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
648			if (!hmac) {
649				ldns_key_free(k);
650				return LDNS_STATUS_ERR;
651			}
652			ldns_key_set_hmac_size(k, hmac_size);
653			ldns_key_set_hmac_key(k, hmac);
654#endif /* HAVE_SSL */
655			break;
656		case LDNS_SIGN_ECC_GOST:
657			ldns_key_set_algorithm(k, alg);
658#if defined(HAVE_SSL) && defined(USE_GOST)
659                        if(!ldns_key_EVP_load_gost_id()) {
660				ldns_key_free(k);
661                                return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
662                        }
663			ldns_key_set_evp_key(k,
664				ldns_key_new_frm_fp_gost_l(fp, line_nr));
665#ifndef S_SPLINT_S
666			if(!k->_key.key) {
667				ldns_key_free(k);
668				return LDNS_STATUS_ERR;
669			}
670#endif /* splint */
671#endif
672			break;
673#ifdef USE_ECDSA
674               case LDNS_SIGN_ECDSAP256SHA256:
675               case LDNS_SIGN_ECDSAP384SHA384:
676                        ldns_key_set_algorithm(k, alg);
677                        ldns_key_set_evp_key(k,
678                                ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
679#ifndef S_SPLINT_S
680			if(!k->_key.key) {
681				ldns_key_free(k);
682				return LDNS_STATUS_ERR;
683			}
684#endif /* splint */
685			break;
686#endif
687#ifdef USE_ED25519
688		case LDNS_SIGN_ED25519:
689                        ldns_key_set_algorithm(k, alg);
690                        ldns_key_set_evp_key(k,
691                                ldns_key_new_frm_fp_ed25519_l(fp, line_nr));
692#ifndef S_SPLINT_S
693			if(!k->_key.key) {
694				ldns_key_free(k);
695				return LDNS_STATUS_ERR;
696			}
697#endif /* splint */
698			break;
699#endif
700#ifdef USE_ED448
701		case LDNS_SIGN_ED448:
702                        ldns_key_set_algorithm(k, alg);
703                        ldns_key_set_evp_key(k,
704                                ldns_key_new_frm_fp_ed448_l(fp, line_nr));
705#ifndef S_SPLINT_S
706			if(!k->_key.key) {
707				ldns_key_free(k);
708				return LDNS_STATUS_ERR;
709			}
710#endif /* splint */
711			break;
712#endif
713		default:
714			ldns_key_free(k);
715			return LDNS_STATUS_SYNTAX_ALG_ERR;
716	}
717	key_rr = ldns_key2rr(k);
718	ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
719	ldns_rr_free(key_rr);
720
721	if (key) {
722		*key = k;
723		return LDNS_STATUS_OK;
724	}
725	ldns_key_free(k);
726	return LDNS_STATUS_ERR;
727}
728
729#ifdef HAVE_SSL
730RSA *
731ldns_key_new_frm_fp_rsa(FILE *f)
732{
733	return ldns_key_new_frm_fp_rsa_l(f, NULL);
734}
735
736RSA *
737ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
738{
739	/* we parse
740 	 * Modulus:
741 	 * PublicExponent:
742 	 * PrivateExponent:
743 	 * Prime1:
744 	 * Prime2:
745 	 * Exponent1:
746 	 * Exponent2:
747 	 * Coefficient:
748	 *
749	 * man 3 RSA:
750	 *
751	 * struct
752         *     {
753         *     BIGNUM *n;              // public modulus
754         *     BIGNUM *e;              // public exponent
755         *     BIGNUM *d;              // private exponent
756         *     BIGNUM *p;              // secret prime factor
757         *     BIGNUM *q;              // secret prime factor
758         *     BIGNUM *dmp1;           // d mod (p-1)
759         *     BIGNUM *dmq1;           // d mod (q-1)
760         *     BIGNUM *iqmp;           // q^-1 mod p
761         *     // ...
762	 *
763	 */
764	char *b;
765	RSA *rsa;
766	uint8_t *buf;
767	int i;
768	BIGNUM *n=NULL, *e=NULL, *d=NULL, *p=NULL, *q=NULL,
769		*dmp1=NULL, *dmq1=NULL, *iqmp=NULL;
770
771	b = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
772	buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
773	rsa = RSA_new();
774	if (!b || !rsa || !buf) {
775                goto error;
776	}
777
778	/* I could use functions again, but that seems an overkill,
779	 * although this also looks tedious
780	 */
781
782	/* Modules, rsa->n */
783	if (ldns_fget_keyword_data_l(f, "Modulus", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
784		goto error;
785	}
786	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
787#ifndef S_SPLINT_S
788	n = BN_bin2bn((const char unsigned*)buf, i, NULL);
789	if (!n) {
790		goto error;
791	}
792
793	/* PublicExponent, rsa->e */
794	if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
795		goto error;
796	}
797	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
798	e = BN_bin2bn((const char unsigned*)buf, i, NULL);
799	if (!e) {
800		goto error;
801	}
802
803	/* PrivateExponent, rsa->d */
804	if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
805		goto error;
806	}
807	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
808	d = BN_bin2bn((const char unsigned*)buf, i, NULL);
809	if (!d) {
810		goto error;
811	}
812
813	/* Prime1, rsa->p */
814	if (ldns_fget_keyword_data_l(f, "Prime1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
815		goto error;
816	}
817	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
818	p = BN_bin2bn((const char unsigned*)buf, i, NULL);
819	if (!p) {
820		goto error;
821	}
822
823	/* Prime2, rsa->q */
824	if (ldns_fget_keyword_data_l(f, "Prime2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
825		goto error;
826	}
827	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
828	q = BN_bin2bn((const char unsigned*)buf, i, NULL);
829	if (!q) {
830		goto error;
831	}
832
833	/* Exponent1, rsa->dmp1 */
834	if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
835		goto error;
836	}
837	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
838	dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
839	if (!dmp1) {
840		goto error;
841	}
842
843	/* Exponent2, rsa->dmq1 */
844	if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
845		goto error;
846	}
847	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
848	dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
849	if (!dmq1) {
850		goto error;
851	}
852
853	/* Coefficient, rsa->iqmp */
854	if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", b, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
855		goto error;
856	}
857	i = ldns_b64_pton((const char*)b, buf, ldns_b64_ntop_calculate_size(strlen(b)));
858	iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
859	if (!iqmp) {
860		goto error;
861	}
862#endif /* splint */
863
864#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
865# ifndef S_SPLINT_S
866	rsa->n = n;
867	rsa->e = e;
868	rsa->d = d;
869	rsa->p = p;
870	rsa->q = q;
871	rsa->dmp1 = dmp1;
872	rsa->dmq1 = dmq1;
873	rsa->iqmp = iqmp;
874# endif
875#else
876	if(!RSA_set0_key(rsa, n, e, d))
877		goto error;
878	n = NULL;
879	e = NULL;
880	d = NULL;
881	if(!RSA_set0_factors(rsa, p, q))
882		goto error;
883	p = NULL;
884	q = NULL;
885	if(!RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp))
886		goto error;
887#endif
888
889	LDNS_FREE(buf);
890	LDNS_FREE(b);
891	return rsa;
892
893error:
894	RSA_free(rsa);
895	LDNS_FREE(b);
896	LDNS_FREE(buf);
897	BN_free(n);
898	BN_free(e);
899	BN_free(d);
900	BN_free(p);
901	BN_free(q);
902	BN_free(dmp1);
903	BN_free(dmq1);
904	BN_free(iqmp);
905	return NULL;
906}
907
908#ifdef USE_DSA
909DSA *
910ldns_key_new_frm_fp_dsa(FILE *f)
911{
912	return ldns_key_new_frm_fp_dsa_l(f, NULL);
913}
914
915DSA *
916ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
917{
918	int i;
919	char *d;
920	DSA *dsa;
921	uint8_t *buf;
922	BIGNUM *p=NULL, *q=NULL, *g=NULL, *priv_key=NULL, *pub_key=NULL;
923
924	d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
925	buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
926	dsa = DSA_new();
927	if (!d || !dsa || !buf) {
928                goto error;
929	}
930
931	/* the line parser removes the () from the input... */
932
933	/* Prime, dsa->p */
934	if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
935		goto error;
936	}
937	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
938#ifndef S_SPLINT_S
939	p = BN_bin2bn((const char unsigned*)buf, i, NULL);
940	if (!p) {
941		goto error;
942	}
943
944	/* Subprime, dsa->q */
945	if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
946		goto error;
947	}
948	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
949	q = BN_bin2bn((const char unsigned*)buf, i, NULL);
950	if (!q) {
951		goto error;
952	}
953
954	/* Base, dsa->g */
955	if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
956		goto error;
957	}
958	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
959	g = BN_bin2bn((const char unsigned*)buf, i, NULL);
960	if (!g) {
961		goto error;
962	}
963
964	/* Private key, dsa->priv_key */
965	if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
966		goto error;
967	}
968	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
969	priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
970	if (!priv_key) {
971		goto error;
972	}
973
974	/* Public key, dsa->priv_key */
975	if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
976		goto error;
977	}
978	i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
979	pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
980	if (!pub_key) {
981		goto error;
982	}
983#endif /* splint */
984
985#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
986# ifndef S_SPLINT_S
987	dsa->p = p;
988	dsa->q = q;
989	dsa->g = g;
990	dsa->priv_key = priv_key;
991	dsa->pub_key = pub_key;
992# endif
993#else
994	if(!DSA_set0_pqg(dsa, p, q, g))
995		goto error;
996	p = NULL;
997	q = NULL;
998	g = NULL;
999	if(!DSA_set0_key(dsa, pub_key, priv_key))
1000		goto error;
1001#endif
1002
1003	LDNS_FREE(buf);
1004	LDNS_FREE(d);
1005
1006	return dsa;
1007
1008error:
1009	LDNS_FREE(d);
1010	LDNS_FREE(buf);
1011        DSA_free(dsa);
1012	BN_free(p);
1013	BN_free(q);
1014	BN_free(g);
1015	BN_free(priv_key);
1016	BN_free(pub_key);
1017	return NULL;
1018}
1019#endif /* USE_DSA */
1020
1021unsigned char *
1022ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
1023{
1024	return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
1025}
1026
1027unsigned char *
1028ldns_key_new_frm_fp_hmac_l( FILE *f
1029			  , ATTR_UNUSED(int *line_nr)
1030			  , size_t *hmac_size
1031			  )
1032{
1033	size_t bufsz;
1034	char d[LDNS_MAX_LINELEN];
1035	unsigned char *buf = NULL;
1036
1037	*hmac_size = ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n",
1038	                                      LDNS_MAX_LINELEN, line_nr) == -1
1039	           ? 0
1040		   : (buf = LDNS_XMALLOC( unsigned char, (bufsz =
1041	                    ldns_b64_ntop_calculate_size(strlen(d))))) == NULL
1042		   ? 0
1043	           : (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
1044	return buf;
1045}
1046#endif /* HAVE_SSL */
1047
1048#ifdef USE_GOST
1049static EVP_PKEY*
1050ldns_gen_gost_key(void)
1051{
1052	EVP_PKEY_CTX* ctx;
1053	EVP_PKEY* p = NULL;
1054	int gost_id = ldns_key_EVP_load_gost_id();
1055	if(!gost_id)
1056		return NULL;
1057	ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
1058	if(!ctx) {
1059		/* the id should be available now */
1060		return NULL;
1061	}
1062	if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
1063		/* cannot set paramset */
1064		EVP_PKEY_CTX_free(ctx);
1065		return NULL;
1066	}
1067
1068	if(EVP_PKEY_keygen_init(ctx) <= 0) {
1069		EVP_PKEY_CTX_free(ctx);
1070		return NULL;
1071	}
1072	if(EVP_PKEY_keygen(ctx, &p) <= 0) {
1073		EVP_PKEY_free(p);
1074		EVP_PKEY_CTX_free(ctx);
1075		return NULL;
1076	}
1077	EVP_PKEY_CTX_free(ctx);
1078	return p;
1079}
1080#endif
1081
1082ldns_key *
1083ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
1084{
1085	ldns_key *k;
1086#ifdef HAVE_SSL
1087#ifdef USE_DSA
1088	DSA *d;
1089#endif /* USE_DSA */
1090#  ifdef USE_ECDSA
1091        EC_KEY *ec = NULL;
1092#  endif
1093#  ifdef HAVE_EVP_PKEY_KEYGEN
1094	EVP_PKEY_CTX *ctx;
1095#  else
1096	RSA *r;
1097#  endif
1098#else
1099	int i;
1100	uint16_t offset = 0;
1101#endif
1102	unsigned char *hmac;
1103
1104	k = ldns_key_new();
1105	if (!k) {
1106		return NULL;
1107	}
1108	switch(alg) {
1109		case LDNS_SIGN_RSAMD5:
1110		case LDNS_SIGN_RSASHA1:
1111		case LDNS_SIGN_RSASHA1_NSEC3:
1112		case LDNS_SIGN_RSASHA256:
1113		case LDNS_SIGN_RSASHA512:
1114#ifdef HAVE_SSL
1115#ifdef HAVE_EVP_PKEY_KEYGEN
1116			ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL);
1117			if(!ctx) {
1118				ldns_key_free(k);
1119				return NULL;
1120			}
1121			if(EVP_PKEY_keygen_init(ctx) <= 0) {
1122				ldns_key_free(k);
1123				EVP_PKEY_CTX_free(ctx);
1124				return NULL;
1125			}
1126			if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, size) <= 0) {
1127				ldns_key_free(k);
1128				EVP_PKEY_CTX_free(ctx);
1129				return NULL;
1130			}
1131#ifndef S_SPLINT_S
1132			if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1133				ldns_key_free(k);
1134				EVP_PKEY_CTX_free(ctx);
1135				return NULL;
1136			}
1137#endif
1138			EVP_PKEY_CTX_free(ctx);
1139#else /* HAVE_EVP_PKEY_KEYGEN */
1140			r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
1141                        if(!r) {
1142				ldns_key_free(k);
1143				return NULL;
1144			}
1145			if (RSA_check_key(r) != 1) {
1146				ldns_key_free(k);
1147				return NULL;
1148			}
1149			ldns_key_set_rsa_key(k, r);
1150			RSA_free(r);
1151#endif /* HAVE_EVP_PKEY_KEYGEN */
1152#endif /* HAVE_SSL */
1153			break;
1154#ifdef USE_DSA
1155		case LDNS_SIGN_DSA:
1156		case LDNS_SIGN_DSA_NSEC3:
1157#ifdef HAVE_SSL
1158# if OPENSSL_VERSION_NUMBER < 0x00908000L
1159			d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
1160			if (!d) {
1161				ldns_key_free(k);
1162				return NULL;
1163			}
1164
1165# else
1166			if (! (d = DSA_new())) {
1167				ldns_key_free(k);
1168				return NULL;
1169			}
1170			if (! DSA_generate_parameters_ex(d, (int)size, NULL, 0, NULL, NULL, NULL)) {
1171				DSA_free(d);
1172				ldns_key_free(k);
1173				return NULL;
1174			}
1175# endif
1176			if (DSA_generate_key(d) != 1) {
1177				ldns_key_free(k);
1178				return NULL;
1179			}
1180			ldns_key_set_dsa_key(k, d);
1181			DSA_free(d);
1182#endif /* HAVE_SSL */
1183#endif /* USE_DSA */
1184			break;
1185		case LDNS_SIGN_HMACMD5:
1186		case LDNS_SIGN_HMACSHA1:
1187		case LDNS_SIGN_HMACSHA224:
1188		case LDNS_SIGN_HMACSHA256:
1189		case LDNS_SIGN_HMACSHA384:
1190		case LDNS_SIGN_HMACSHA512:
1191#ifdef HAVE_SSL
1192#ifndef S_SPLINT_S
1193			k->_key.key = NULL;
1194#endif /* splint */
1195#endif /* HAVE_SSL */
1196			size = size / 8;
1197			ldns_key_set_hmac_size(k, size);
1198
1199			hmac = LDNS_XMALLOC(unsigned char, size);
1200                        if(!hmac) {
1201				ldns_key_free(k);
1202				return NULL;
1203                        }
1204#ifdef HAVE_SSL
1205			if (RAND_bytes(hmac, (int) size) != 1) {
1206				LDNS_FREE(hmac);
1207				ldns_key_free(k);
1208				return NULL;
1209			}
1210#else
1211			while (offset + sizeof(i) < size) {
1212			  i = random();
1213			  memcpy(&hmac[offset], &i, sizeof(i));
1214			  offset += sizeof(i);
1215			}
1216			if (offset < size) {
1217			  i = random();
1218			  memcpy(&hmac[offset], &i, size - offset);
1219			}
1220#endif /* HAVE_SSL */
1221			ldns_key_set_hmac_key(k, hmac);
1222
1223			ldns_key_set_flags(k, 0);
1224			break;
1225		case LDNS_SIGN_ECC_GOST:
1226#if defined(HAVE_SSL) && defined(USE_GOST)
1227			ldns_key_set_evp_key(k, ldns_gen_gost_key());
1228#ifndef S_SPLINT_S
1229                        if(!k->_key.key) {
1230                                ldns_key_free(k);
1231                                return NULL;
1232                        }
1233#endif /* splint */
1234#else
1235			ldns_key_free(k);
1236			return NULL;
1237#endif /* HAVE_SSL and USE_GOST */
1238                        break;
1239                case LDNS_SIGN_ECDSAP256SHA256:
1240                case LDNS_SIGN_ECDSAP384SHA384:
1241#ifdef USE_ECDSA
1242                        if(alg == LDNS_SIGN_ECDSAP256SHA256)
1243                                ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
1244                        else if(alg == LDNS_SIGN_ECDSAP384SHA384)
1245                                ec = EC_KEY_new_by_curve_name(NID_secp384r1);
1246                        if(!ec) {
1247                                ldns_key_free(k);
1248                                return NULL;
1249                        }
1250                        if(!EC_KEY_generate_key(ec)) {
1251                                ldns_key_free(k);
1252                                EC_KEY_free(ec);
1253                                return NULL;
1254                        }
1255#ifndef S_SPLINT_S
1256                        k->_key.key = EVP_PKEY_new();
1257                        if(!k->_key.key) {
1258                                ldns_key_free(k);
1259                                EC_KEY_free(ec);
1260                                return NULL;
1261                        }
1262                        if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
1263                                ldns_key_free(k);
1264                                EC_KEY_free(ec);
1265                                return NULL;
1266			}
1267#endif /* splint */
1268#else
1269			ldns_key_free(k);
1270			return NULL;
1271#endif /* ECDSA */
1272			break;
1273#ifdef USE_ED25519
1274		case LDNS_SIGN_ED25519:
1275#ifdef HAVE_EVP_PKEY_KEYGEN
1276			ctx = EVP_PKEY_CTX_new_id(NID_ED25519, NULL);
1277			if(!ctx) {
1278				ldns_key_free(k);
1279				return NULL;
1280			}
1281			if(EVP_PKEY_keygen_init(ctx) <= 0) {
1282				ldns_key_free(k);
1283				EVP_PKEY_CTX_free(ctx);
1284				return NULL;
1285			}
1286			if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1287				ldns_key_free(k);
1288				EVP_PKEY_CTX_free(ctx);
1289				return NULL;
1290			}
1291			EVP_PKEY_CTX_free(ctx);
1292#endif
1293			break;
1294#endif /* ED25519 */
1295#ifdef USE_ED448
1296		case LDNS_SIGN_ED448:
1297#ifdef HAVE_EVP_PKEY_KEYGEN
1298			ctx = EVP_PKEY_CTX_new_id(NID_ED448, NULL);
1299			if(!ctx) {
1300				ldns_key_free(k);
1301				return NULL;
1302			}
1303			if(EVP_PKEY_keygen_init(ctx) <= 0) {
1304				ldns_key_free(k);
1305				EVP_PKEY_CTX_free(ctx);
1306				return NULL;
1307			}
1308			if (EVP_PKEY_keygen(ctx, &k->_key.key) <= 0) {
1309				ldns_key_free(k);
1310				EVP_PKEY_CTX_free(ctx);
1311				return NULL;
1312			}
1313			EVP_PKEY_CTX_free(ctx);
1314#endif
1315			break;
1316#endif /* ED448 */
1317	}
1318	ldns_key_set_algorithm(k, alg);
1319	return k;
1320}
1321
1322void
1323ldns_key_print(FILE *output, const ldns_key *k)
1324{
1325	char *str = ldns_key2str(k);
1326	if (str) {
1327                fprintf(output, "%s", str);
1328        } else {
1329                fprintf(output, "Unable to convert private key to string\n");
1330        }
1331        LDNS_FREE(str);
1332}
1333
1334
1335void
1336ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
1337{
1338	k->_alg = l;
1339}
1340
1341void
1342ldns_key_set_flags(ldns_key *k, uint16_t f)
1343{
1344	k->_extra.dnssec.flags = f;
1345}
1346
1347#ifdef HAVE_SSL
1348#ifndef S_SPLINT_S
1349void
1350ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
1351{
1352	k->_key.key = e;
1353}
1354
1355void
1356ldns_key_set_rsa_key(ldns_key *k, RSA *r)
1357{
1358	EVP_PKEY *key = EVP_PKEY_new();
1359	EVP_PKEY_set1_RSA(key, r);
1360	k->_key.key = key;
1361}
1362
1363void
1364ldns_key_set_dsa_key(ldns_key *k, DSA *d)
1365{
1366#ifdef USE_DSA
1367	EVP_PKEY *key = EVP_PKEY_new();
1368	EVP_PKEY_set1_DSA(key, d);
1369	k->_key.key  = key;
1370#else
1371	(void)k; (void)d;
1372#endif
1373}
1374
1375void
1376ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
1377{
1378	EVP_PKEY *key = EVP_PKEY_new();
1379	EVP_PKEY_assign_RSA(key, r);
1380	k->_key.key = key;
1381}
1382
1383void
1384ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
1385{
1386#ifdef USE_DSA
1387	EVP_PKEY *key = EVP_PKEY_new();
1388	EVP_PKEY_assign_DSA(key, d);
1389	k->_key.key  = key;
1390#else
1391	(void)k; (void)d;
1392#endif
1393}
1394#endif /* splint */
1395#endif /* HAVE_SSL */
1396
1397void
1398ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
1399{
1400	k->_key.hmac.key = hmac;
1401}
1402
1403void
1404ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
1405{
1406	k->_key.hmac.size = hmac_size;
1407}
1408
1409void
1410ldns_key_set_external_key(ldns_key *k, void *external_key)
1411{
1412	k->_key.external_key = external_key;
1413}
1414
1415void
1416ldns_key_set_origttl(ldns_key *k, uint32_t t)
1417{
1418	k->_extra.dnssec.orig_ttl = t;
1419}
1420
1421void
1422ldns_key_set_inception(ldns_key *k, uint32_t i)
1423{
1424	k->_extra.dnssec.inception = i;
1425}
1426
1427void
1428ldns_key_set_expiration(ldns_key *k, uint32_t e)
1429{
1430	k->_extra.dnssec.expiration = e;
1431}
1432
1433void
1434ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
1435{
1436	k->_pubkey_owner = r;
1437}
1438
1439void
1440ldns_key_set_keytag(ldns_key *k, uint16_t tag)
1441{
1442	k->_extra.dnssec.keytag = tag;
1443}
1444
1445/* read */
1446size_t
1447ldns_key_list_key_count(const ldns_key_list *key_list)
1448{
1449	return key_list ? key_list->_key_count : 0;
1450}
1451
1452ldns_key *
1453ldns_key_list_key(const ldns_key_list *key, size_t nr)
1454{
1455	if (nr < ldns_key_list_key_count(key)) {
1456		return key->_keys[nr];
1457	} else {
1458		return NULL;
1459	}
1460}
1461
1462ldns_signing_algorithm
1463ldns_key_algorithm(const ldns_key *k)
1464{
1465	return k->_alg;
1466}
1467
1468void
1469ldns_key_set_use(ldns_key *k, bool v)
1470{
1471	if (k) {
1472		k->_use = v;
1473	}
1474}
1475
1476bool
1477ldns_key_use(const ldns_key *k)
1478{
1479	if (k) {
1480		return k->_use;
1481	}
1482	return false;
1483}
1484
1485#ifdef HAVE_SSL
1486#ifndef S_SPLINT_S
1487EVP_PKEY *
1488ldns_key_evp_key(const ldns_key *k)
1489{
1490	return k->_key.key;
1491}
1492
1493RSA *
1494ldns_key_rsa_key(const ldns_key *k)
1495{
1496	if (k->_key.key) {
1497		return EVP_PKEY_get1_RSA(k->_key.key);
1498	} else {
1499		return NULL;
1500	}
1501}
1502
1503DSA *
1504ldns_key_dsa_key(const ldns_key *k)
1505{
1506#ifdef USE_DSA
1507	if (k->_key.key) {
1508		return EVP_PKEY_get1_DSA(k->_key.key);
1509	} else {
1510		return NULL;
1511	}
1512#else
1513	(void)k;
1514	return NULL;
1515#endif
1516}
1517#endif /* splint */
1518#endif /* HAVE_SSL */
1519
1520unsigned char *
1521ldns_key_hmac_key(const ldns_key *k)
1522{
1523	if (k->_key.hmac.key) {
1524		return k->_key.hmac.key;
1525	} else {
1526		return NULL;
1527	}
1528}
1529
1530size_t
1531ldns_key_hmac_size(const ldns_key *k)
1532{
1533	if (k->_key.hmac.size) {
1534		return k->_key.hmac.size;
1535	} else {
1536		return 0;
1537	}
1538}
1539
1540void *
1541ldns_key_external_key(const ldns_key *k)
1542{
1543	return k->_key.external_key;
1544}
1545
1546uint32_t
1547ldns_key_origttl(const ldns_key *k)
1548{
1549	return k->_extra.dnssec.orig_ttl;
1550}
1551
1552uint16_t
1553ldns_key_flags(const ldns_key *k)
1554{
1555	return k->_extra.dnssec.flags;
1556}
1557
1558uint32_t
1559ldns_key_inception(const ldns_key *k)
1560{
1561	return k->_extra.dnssec.inception;
1562}
1563
1564uint32_t
1565ldns_key_expiration(const ldns_key *k)
1566{
1567	return k->_extra.dnssec.expiration;
1568}
1569
1570uint16_t
1571ldns_key_keytag(const ldns_key *k)
1572{
1573	return k->_extra.dnssec.keytag;
1574}
1575
1576ldns_rdf *
1577ldns_key_pubkey_owner(const ldns_key *k)
1578{
1579	return k->_pubkey_owner;
1580}
1581
1582/* write */
1583void
1584ldns_key_list_set_use(ldns_key_list *keys, bool v)
1585{
1586	size_t i;
1587
1588	for (i = 0; i < ldns_key_list_key_count(keys); i++) {
1589		ldns_key_set_use(ldns_key_list_key(keys, i), v);
1590	}
1591}
1592
1593void
1594ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
1595{
1596	        key->_key_count = count;
1597}
1598
1599bool
1600ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
1601{
1602        size_t key_count;
1603        ldns_key **keys;
1604
1605        key_count = ldns_key_list_key_count(key_list);
1606
1607        /* grow the array */
1608        keys = LDNS_XREALLOC(
1609                key_list->_keys, ldns_key *, key_count + 1);
1610        if (!keys) {
1611                return false;
1612        }
1613
1614        /* add the new member */
1615        key_list->_keys = keys;
1616        key_list->_keys[key_count] = key;
1617
1618        ldns_key_list_set_key_count(key_list, key_count + 1);
1619        return true;
1620}
1621
1622ldns_key *
1623ldns_key_list_pop_key(ldns_key_list *key_list)
1624{
1625        size_t key_count;
1626        ldns_key** a;
1627        ldns_key *pop;
1628
1629	if (!key_list) {
1630		return NULL;
1631	}
1632
1633        key_count = ldns_key_list_key_count(key_list);
1634        if (key_count == 0) {
1635                return NULL;
1636        }
1637
1638        pop = ldns_key_list_key(key_list, key_count);
1639
1640        /* shrink the array */
1641        a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
1642        if(a) {
1643                key_list->_keys = a;
1644        }
1645
1646        ldns_key_list_set_key_count(key_list, key_count - 1);
1647
1648        return pop;
1649}
1650
1651#ifdef HAVE_SSL
1652#ifndef S_SPLINT_S
1653/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1654static bool
1655ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
1656{
1657	int i,j;
1658	const BIGNUM *n=NULL, *e=NULL;
1659
1660	if (!k) {
1661		return false;
1662	}
1663#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000)
1664	n = k->n;
1665	e = k->e;
1666#else
1667	RSA_get0_key(k, &n, &e, NULL);
1668#endif
1669
1670	if (BN_num_bytes(e) <= 256) {
1671		/* normally only this path is executed (small factors are
1672		 * more common
1673		 */
1674		data[0] = (unsigned char) BN_num_bytes(e);
1675		i = BN_bn2bin(e, data + 1);
1676		j = BN_bn2bin(n, data + i + 1);
1677		*size = (uint16_t) i + j;
1678	} else if (BN_num_bytes(e) <= 65536) {
1679		data[0] = 0;
1680		/* BN_bn2bin does bigendian, _uint16 also */
1681		ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(e));
1682
1683		BN_bn2bin(e, data + 3);
1684		BN_bn2bin(n, data + 4 + BN_num_bytes(e));
1685		*size = (uint16_t) BN_num_bytes(n) + 6;
1686	} else {
1687		return false;
1688	}
1689	return true;
1690}
1691
1692#ifdef USE_DSA
1693/* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1694static bool
1695ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
1696{
1697	uint8_t T;
1698	const BIGNUM *p, *q, *g;
1699	const BIGNUM *pub_key, *priv_key;
1700
1701	if (!k) {
1702		return false;
1703	}
1704
1705	/* See RFC2536 */
1706# ifdef HAVE_DSA_GET0_PQG
1707	DSA_get0_pqg(k, &p, &q, &g);
1708# else
1709	p = k->p; q = k->q; g = k->g;
1710# endif
1711# ifdef HAVE_DSA_GET0_KEY
1712	DSA_get0_key(k, &pub_key, &priv_key);
1713# else
1714	pub_key = k->pub_key; priv_key = k->priv_key;
1715# endif
1716	(void)priv_key;
1717	*size = (uint16_t)BN_num_bytes(p);
1718	T = (*size - 64) / 8;
1719
1720	if (T > 8) {
1721#ifdef STDERR_MSGS
1722		fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
1723		fprintf(stderr, " not implemented\n");
1724#endif
1725		return false;
1726	}
1727
1728	/* size = 64 + (T * 8); */
1729	memset(data, 0, 21 + *size * 3);
1730	data[0] = (unsigned char)T;
1731	BN_bn2bin(q, data + 1 ); 		/* 20 octects */
1732	BN_bn2bin(p, data + 21 ); 		/* offset octects */
1733	BN_bn2bin(g, data + 21 + *size * 2 - BN_num_bytes(g));
1734	BN_bn2bin(pub_key,data + 21 + *size * 3 - BN_num_bytes(pub_key));
1735	*size = 21 + *size * 3;
1736	return true;
1737}
1738#endif /* USE_DSA */
1739
1740#ifdef USE_GOST
1741static bool
1742ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1743{
1744	int i;
1745	unsigned char* pp = NULL;
1746	if(i2d_PUBKEY(k, &pp) != 37 + 64) {
1747		/* expect 37 byte(ASN header) and 64 byte(X and Y) */
1748		free(pp);
1749		return false;
1750	}
1751	/* omit ASN header */
1752	for(i=0; i<64; i++)
1753		data[i] = pp[i+37];
1754	free(pp);
1755	*size = 64;
1756	return true;
1757}
1758#endif /* USE_GOST */
1759
1760#ifdef USE_ED25519
1761static bool
1762ldns_key_ed255192bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1763{
1764	int i;
1765	unsigned char* pp = NULL;
1766	if(i2d_PUBKEY(k, &pp) != 12 + 32) {
1767		/* expect 12 byte(ASN header) and 32 byte(pubkey) */
1768		free(pp);
1769		return false;
1770	}
1771	/* omit ASN header */
1772	for(i=0; i<32; i++)
1773		data[i] = pp[i+12];
1774	free(pp);
1775	*size = 32;
1776	return true;
1777}
1778#endif /* USE_ED25519 */
1779
1780#ifdef USE_ED448
1781static bool
1782ldns_key_ed4482bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1783{
1784	int i;
1785	unsigned char* pp = NULL;
1786	if(i2d_PUBKEY(k, &pp) != 12 + 57) {
1787		/* expect 12 byte(ASN header) and 57 byte(pubkey) */
1788		free(pp);
1789		return false;
1790	}
1791	/* omit ASN header */
1792	for(i=0; i<57; i++)
1793		data[i] = pp[i+12];
1794	free(pp);
1795	*size = 57;
1796	return true;
1797}
1798#endif /* USE_ED448 */
1799#endif /* splint */
1800#endif /* HAVE_SSL */
1801
1802ldns_rr *
1803ldns_key2rr(const ldns_key *k)
1804{
1805	/* this function will convert a the keydata contained in
1806	 * rsa/dsa pointers to a DNSKEY rr. It will fill in as
1807	 * much as it can, but it does not know about key-flags
1808	 * for instance
1809	 */
1810	ldns_rr *pubkey;
1811	ldns_rdf *keybin;
1812	unsigned char *bin = NULL;
1813	uint16_t size = 0;
1814#ifdef HAVE_SSL
1815	RSA *rsa = NULL;
1816#ifdef USE_DSA
1817	DSA *dsa = NULL;
1818#endif /* USE_DSA */
1819#endif /* HAVE_SSL */
1820#ifdef USE_ECDSA
1821        EC_KEY* ec;
1822#endif
1823	int internal_data = 0;
1824
1825	if (!k) {
1826		return NULL;
1827	}
1828	pubkey = ldns_rr_new();
1829
1830	switch (ldns_key_algorithm(k)) {
1831	case LDNS_SIGN_HMACMD5:
1832	case LDNS_SIGN_HMACSHA1:
1833	case LDNS_SIGN_HMACSHA224:
1834	case LDNS_SIGN_HMACSHA256:
1835	case LDNS_SIGN_HMACSHA384:
1836	case LDNS_SIGN_HMACSHA512:
1837		ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
1838        	break;
1839	default:
1840		ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
1841		break;
1842        }
1843	/* zero-th rdf - flags */
1844	ldns_rr_push_rdf(pubkey,
1845			ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
1846				ldns_key_flags(k)));
1847	/* first - proto */
1848	ldns_rr_push_rdf(pubkey,
1849			ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
1850
1851	if (ldns_key_pubkey_owner(k)) {
1852		ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
1853	}
1854
1855	/* third - da algorithm */
1856	switch(ldns_key_algorithm(k)) {
1857		case LDNS_SIGN_RSAMD5:
1858		case LDNS_SIGN_RSASHA1:
1859		case LDNS_SIGN_RSASHA1_NSEC3:
1860		case LDNS_SIGN_RSASHA256:
1861		case LDNS_SIGN_RSASHA512:
1862			ldns_rr_push_rdf(pubkey,
1863						  ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1864#ifdef HAVE_SSL
1865			rsa =  ldns_key_rsa_key(k);
1866			if (rsa) {
1867				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1868				if (!bin) {
1869                                        ldns_rr_free(pubkey);
1870					return NULL;
1871				}
1872				if (!ldns_key_rsa2bin(bin, rsa, &size)) {
1873		                        LDNS_FREE(bin);
1874                                        ldns_rr_free(pubkey);
1875					return NULL;
1876				}
1877				RSA_free(rsa);
1878				internal_data = 1;
1879			}
1880#endif
1881			size++;
1882			break;
1883#ifdef USE_DSA
1884		case LDNS_SIGN_DSA:
1885			ldns_rr_push_rdf(pubkey,
1886					ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
1887#ifdef HAVE_SSL
1888			dsa = ldns_key_dsa_key(k);
1889			if (dsa) {
1890				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1891				if (!bin) {
1892                                        ldns_rr_free(pubkey);
1893					return NULL;
1894				}
1895				if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1896		                        LDNS_FREE(bin);
1897                                        ldns_rr_free(pubkey);
1898					return NULL;
1899				}
1900				DSA_free(dsa);
1901				internal_data = 1;
1902			}
1903#endif /* HAVE_SSL */
1904#endif /* USE_DSA */
1905			break;
1906#ifdef USE_DSA
1907		case LDNS_SIGN_DSA_NSEC3:
1908			ldns_rr_push_rdf(pubkey,
1909					ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
1910#ifdef HAVE_SSL
1911			dsa = ldns_key_dsa_key(k);
1912			if (dsa) {
1913				bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1914				if (!bin) {
1915                                        ldns_rr_free(pubkey);
1916					return NULL;
1917				}
1918				if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1919		                        LDNS_FREE(bin);
1920                                        ldns_rr_free(pubkey);
1921					return NULL;
1922				}
1923				DSA_free(dsa);
1924				internal_data = 1;
1925			}
1926#endif /* HAVE_SSL */
1927#endif /* USE_DSA */
1928			break;
1929		case LDNS_SIGN_ECC_GOST:
1930			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1931				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1932#if defined(HAVE_SSL) && defined(USE_GOST)
1933			bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1934			if (!bin) {
1935                                ldns_rr_free(pubkey);
1936				return NULL;
1937                        }
1938#ifndef S_SPLINT_S
1939			if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
1940		                LDNS_FREE(bin);
1941                                ldns_rr_free(pubkey);
1942				return NULL;
1943			}
1944#endif /* splint */
1945			internal_data = 1;
1946#else
1947                        ldns_rr_free(pubkey);
1948			return NULL;
1949#endif /* HAVE_SSL and USE_GOST */
1950			break;
1951                case LDNS_SIGN_ECDSAP256SHA256:
1952                case LDNS_SIGN_ECDSAP384SHA384:
1953#ifdef USE_ECDSA
1954			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1955				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1956                        bin = NULL;
1957#ifndef S_SPLINT_S
1958                        ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
1959#endif
1960                        EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
1961                        size = (uint16_t)i2o_ECPublicKey(ec, NULL);
1962                        if(!i2o_ECPublicKey(ec, &bin)) {
1963                                EC_KEY_free(ec);
1964                                ldns_rr_free(pubkey);
1965                                return NULL;
1966                        }
1967			if(size > 1) {
1968				/* move back one byte to shave off the 0x02
1969				 * 'uncompressed' indicator that openssl made
1970				 * Actually its 0x04 (from implementation).
1971				 */
1972				assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
1973				size -= 1;
1974				memmove(bin, bin+1, size);
1975			}
1976                        /* down the reference count for ec, its still assigned
1977                         * to the pkey */
1978                        EC_KEY_free(ec);
1979			internal_data = 1;
1980#else
1981                        ldns_rr_free(pubkey);
1982			return NULL;
1983#endif /* ECDSA */
1984                        break;
1985#ifdef USE_ED25519
1986                case LDNS_SIGN_ED25519:
1987			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1988				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1989			bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1990			if (!bin) {
1991                                ldns_rr_free(pubkey);
1992				return NULL;
1993                        }
1994			if (!ldns_key_ed255192bin(bin, k->_key.key, &size)) {
1995		                LDNS_FREE(bin);
1996                                ldns_rr_free(pubkey);
1997				return NULL;
1998			}
1999			internal_data = 1;
2000			break;
2001#endif
2002#ifdef USE_ED448
2003                case LDNS_SIGN_ED448:
2004			ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
2005				LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
2006			bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
2007			if (!bin) {
2008                                ldns_rr_free(pubkey);
2009				return NULL;
2010                        }
2011			if (!ldns_key_ed4482bin(bin, k->_key.key, &size)) {
2012		                LDNS_FREE(bin);
2013                                ldns_rr_free(pubkey);
2014				return NULL;
2015			}
2016			internal_data = 1;
2017			break;
2018#endif
2019		case LDNS_SIGN_HMACMD5:
2020		case LDNS_SIGN_HMACSHA1:
2021		case LDNS_SIGN_HMACSHA224:
2022		case LDNS_SIGN_HMACSHA256:
2023		case LDNS_SIGN_HMACSHA384:
2024		case LDNS_SIGN_HMACSHA512:
2025			bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
2026			if (!bin) {
2027                                ldns_rr_free(pubkey);
2028				return NULL;
2029			}
2030			ldns_rr_push_rdf(pubkey,
2031			                 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
2032			                 ldns_key_algorithm(k)));
2033			size = ldns_key_hmac_size(k);
2034			memcpy(bin, ldns_key_hmac_key(k), size);
2035			internal_data = 1;
2036			break;
2037	}
2038	/* fourth the key bin material */
2039	if (internal_data) {
2040		keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
2041		LDNS_FREE(bin);
2042		ldns_rr_push_rdf(pubkey, keybin);
2043	}
2044	return pubkey;
2045}
2046
2047void
2048ldns_key_free(ldns_key *key)
2049{
2050	LDNS_FREE(key);
2051}
2052
2053void
2054ldns_key_deep_free(ldns_key *key)
2055{
2056	unsigned char* hmac;
2057	if (ldns_key_pubkey_owner(key)) {
2058		ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
2059	}
2060#ifdef HAVE_SSL
2061	if (ldns_key_evp_key(key)) {
2062		EVP_PKEY_free(ldns_key_evp_key(key));
2063	}
2064#endif /* HAVE_SSL */
2065	if (ldns_key_hmac_key(key)) {
2066		hmac = ldns_key_hmac_key(key);
2067		LDNS_FREE(hmac);
2068	}
2069	LDNS_FREE(key);
2070}
2071
2072void
2073ldns_key_list_free(ldns_key_list *key_list)
2074{
2075	size_t i;
2076	for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
2077		ldns_key_deep_free(ldns_key_list_key(key_list, i));
2078	}
2079	LDNS_FREE(key_list->_keys);
2080	LDNS_FREE(key_list);
2081}
2082
2083ldns_rr *
2084ldns_read_anchor_file(const char *filename)
2085{
2086	FILE *fp;
2087	/*char line[LDNS_MAX_PACKETLEN];*/
2088	char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
2089	int c;
2090	size_t i = 0;
2091	ldns_rr *r;
2092	ldns_status status;
2093        if(!line) {
2094                return NULL;
2095        }
2096
2097	fp = fopen(filename, "r");
2098	if (!fp) {
2099#ifdef STDERR_MSGS
2100		fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
2101#endif
2102		LDNS_FREE(line);
2103		return NULL;
2104	}
2105
2106	while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
2107		line[i] = c;
2108		i++;
2109	}
2110	line[i] = '\0';
2111
2112	fclose(fp);
2113
2114	if (i <= 0) {
2115#ifdef STDERR_MSGS
2116		fprintf(stderr, "nothing read from %s", filename);
2117#endif
2118		LDNS_FREE(line);
2119		return NULL;
2120	} else {
2121		status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
2122		if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
2123			LDNS_FREE(line);
2124			return r;
2125		} else {
2126#ifdef STDERR_MSGS
2127			fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
2128#endif
2129			LDNS_FREE(line);
2130			return NULL;
2131		}
2132	}
2133}
2134
2135char *
2136ldns_key_get_file_base_name(const ldns_key *key)
2137{
2138	ldns_buffer *buffer;
2139	char *file_base_name;
2140
2141	buffer = ldns_buffer_new(255);
2142	ldns_buffer_printf(buffer, "K");
2143	(void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
2144	ldns_buffer_printf(buffer,
2145	                   "+%03u+%05u",
2146			   ldns_key_algorithm(key),
2147			   ldns_key_keytag(key));
2148	file_base_name = ldns_buffer_export(buffer);
2149	ldns_buffer_free(buffer);
2150	return file_base_name;
2151}
2152
2153int ldns_key_algo_supported(int algo)
2154{
2155	ldns_lookup_table *lt = ldns_signing_algorithms;
2156	while(lt->name) {
2157		if(lt->id == algo)
2158			return 1;
2159		lt++;
2160	}
2161	return 0;
2162}
2163
2164ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
2165{
2166        /* list of (signing algorithm id, alias_name) */
2167        ldns_lookup_table aliases[] = {
2168                /* from bind dnssec-keygen */
2169                {LDNS_SIGN_HMACMD5, "HMAC-MD5"},
2170#ifdef USE_DSA
2171                {LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
2172#endif /* USE_DSA */
2173                {LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
2174                /* old ldns usage, now RFC names */
2175#ifdef USE_DSA
2176                {LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
2177#endif
2178                {LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
2179#ifdef USE_GOST
2180                {LDNS_SIGN_ECC_GOST, "GOST"},
2181#endif
2182                /* compat with possible output */
2183                {LDNS_DH, "DH"},
2184                {LDNS_ECC, "ECC"},
2185                {LDNS_INDIRECT, "INDIRECT"},
2186                {LDNS_PRIVATEDNS, "PRIVATEDNS"},
2187                {LDNS_PRIVATEOID, "PRIVATEOID"},
2188                {0, NULL}};
2189        ldns_lookup_table* lt = ldns_signing_algorithms;
2190	ldns_signing_algorithm a;
2191	char *endptr;
2192
2193        while(lt->name) {
2194                if(strcasecmp(lt->name, name) == 0)
2195                        return lt->id;
2196                lt++;
2197        }
2198        lt = aliases;
2199        while(lt->name) {
2200                if(strcasecmp(lt->name, name) == 0)
2201                        return lt->id;
2202                lt++;
2203        }
2204	a = strtol(name, &endptr, 10);
2205	if (*name && !*endptr)
2206		return a;
2207
2208        return 0;
2209}
2210