2 * keys.c handle private keys for use in DNSSEC
4 * This module should hide some of the openSSL complexities
5 * and give a general interface for private keys and hmac
8 * (c) NLnet Labs, 2004-2006
10 * See the file LICENSE for the license
13 #include <ldns/config.h>
15 #include <ldns/ldns.h>
18 #include <openssl/ssl.h>
19 #ifndef OPENSSL_NO_ENGINE
20 #include <openssl/engine.h>
22 #include <openssl/rand.h>
25 ldns_lookup_table ldns_signing_algorithms[] = {
26 { LDNS_SIGN_RSAMD5, "RSAMD5" },
27 { LDNS_SIGN_RSASHA1, "RSASHA1" },
28 { LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
30 { LDNS_SIGN_RSASHA256, "RSASHA256" },
31 { LDNS_SIGN_RSASHA512, "RSASHA512" },
34 { LDNS_SIGN_ECC_GOST, "ECC-GOST" },
37 { LDNS_SIGN_ECDSAP256SHA256, "ECDSAP256SHA256" },
38 { LDNS_SIGN_ECDSAP384SHA384, "ECDSAP384SHA384" },
40 { LDNS_SIGN_DSA, "DSA" },
41 { LDNS_SIGN_DSA_NSEC3, "DSA-NSEC3-SHA1" },
42 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
43 { LDNS_SIGN_HMACSHA1, "hmac-sha1" },
44 { LDNS_SIGN_HMACSHA256, "hmac-sha256" },
51 ldns_key_list *key_list = LDNS_MALLOC(ldns_key_list);
55 key_list->_key_count = 0;
56 key_list->_keys = NULL;
66 newkey = LDNS_MALLOC(ldns_key);
70 /* some defaults - not sure wether to do this */
71 ldns_key_set_use(newkey, true);
72 ldns_key_set_flags(newkey, LDNS_KEY_ZONE_KEY);
73 ldns_key_set_origttl(newkey, 0);
74 ldns_key_set_keytag(newkey, 0);
75 ldns_key_set_inception(newkey, 0);
76 ldns_key_set_expiration(newkey, 0);
77 ldns_key_set_pubkey_owner(newkey, NULL);
79 ldns_key_set_evp_key(newkey, NULL);
81 ldns_key_set_hmac_key(newkey, NULL);
82 ldns_key_set_external_key(newkey, NULL);
88 ldns_key_new_frm_fp(ldns_key **k, FILE *fp)
90 return ldns_key_new_frm_fp_l(k, fp, NULL);
93 #if defined(HAVE_SSL) && !defined(OPENSSL_NO_ENGINE)
95 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg)
100 if(!k) return LDNS_STATUS_MEM_ERR;
102 k->_key.key = ENGINE_load_private_key(e, key_id, UI_OpenSSL(), NULL);
105 return LDNS_STATUS_ERR;
107 ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
110 return LDNS_STATUS_ENGINE_KEY_NOT_LOADED;
114 return LDNS_STATUS_OK;
119 /** store GOST engine reference loaded into OpenSSL library */
120 ENGINE* ldns_gost_engine = NULL;
123 ldns_key_EVP_load_gost_id(void)
125 static int gost_id = 0;
126 const EVP_PKEY_ASN1_METHOD* meth;
129 if(gost_id) return gost_id;
131 /* see if configuration loaded gost implementation from other engine*/
132 meth = EVP_PKEY_asn1_find_str(NULL, "gost2001", -1);
134 EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
138 /* see if engine can be loaded already */
139 e = ENGINE_by_id("gost");
141 /* load it ourself, in case statically linked */
142 ENGINE_load_builtin_engines();
143 ENGINE_load_dynamic();
144 e = ENGINE_by_id("gost");
147 /* no gost engine in openssl */
150 if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
156 meth = EVP_PKEY_asn1_find_str(&e, "gost2001", -1);
163 /* Note: do not ENGINE_finish and ENGINE_free the acquired engine
164 * on some platforms this frees up the meth and unloads gost stuff */
165 ldns_gost_engine = e;
167 EVP_PKEY_asn1_get0_info(&gost_id, NULL, NULL, NULL, NULL, meth);
171 void ldns_key_EVP_unload_gost(void)
173 if(ldns_gost_engine) {
174 ENGINE_finish(ldns_gost_engine);
175 ENGINE_free(ldns_gost_engine);
176 ldns_gost_engine = NULL;
180 /** read GOST private key */
182 ldns_key_new_frm_fp_gost_l(FILE* fp, int* line_nr)
185 const unsigned char* pp;
188 ldns_rdf* b64rdf = NULL;
190 gost_id = ldns_key_EVP_load_gost_id();
194 if (ldns_fget_keyword_data_l(fp, "GostAsn1", ": ", token, "\n",
195 sizeof(token), line_nr) == -1)
197 while(strlen(token) < 96) {
198 /* read more b64 from the file, b64 split on multiple lines */
199 if(ldns_fget_token_l(fp, token+strlen(token), "\n",
200 sizeof(token)-strlen(token), line_nr) == -1)
203 if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
205 pp = (unsigned char*)ldns_rdf_data(b64rdf);
206 pkey = d2i_PrivateKey(gost_id, NULL, &pp, (int)ldns_rdf_size(b64rdf));
207 ldns_rdf_deep_free(b64rdf);
213 /** calculate public key from private key */
215 ldns_EC_KEY_calc_public(EC_KEY* ec)
218 const EC_GROUP* group;
219 group = EC_KEY_get0_group(ec);
220 pub_key = EC_POINT_new(group);
221 if(!pub_key) return 0;
222 if(!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) {
223 EC_POINT_free(pub_key);
226 if(!EC_POINT_mul(group, pub_key, EC_KEY_get0_private_key(ec),
228 EC_POINT_free(pub_key);
231 if(EC_KEY_set_public_key(ec, pub_key) == 0) {
232 EC_POINT_free(pub_key);
235 EC_POINT_free(pub_key);
239 /** read ECDSA private key */
241 ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr)
244 ldns_rdf* b64rdf = NULL;
249 if (ldns_fget_keyword_data_l(fp, "PrivateKey", ": ", token, "\n",
250 sizeof(token), line_nr) == -1)
252 if(ldns_str2rdf_b64(&b64rdf, token) != LDNS_STATUS_OK)
254 pp = (unsigned char*)ldns_rdf_data(b64rdf);
256 if(alg == LDNS_ECDSAP256SHA256)
257 ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
258 else if(alg == LDNS_ECDSAP384SHA384)
259 ec = EC_KEY_new_by_curve_name(NID_secp384r1);
262 ldns_rdf_deep_free(b64rdf);
265 bn = BN_bin2bn(pp, (int)ldns_rdf_size(b64rdf), NULL);
266 ldns_rdf_deep_free(b64rdf);
271 EC_KEY_set_private_key(ec, bn);
273 if(!ldns_EC_KEY_calc_public(ec)) {
278 evp_key = EVP_PKEY_new();
283 if (!EVP_PKEY_assign_EC_KEY(evp_key, ec)) {
284 EVP_PKEY_free(evp_key);
293 ldns_key_new_frm_fp_l(ldns_key **key, FILE *fp, int *line_nr)
297 ldns_signing_algorithm alg;
304 #endif /* HAVE_SSL */
308 d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
312 return LDNS_STATUS_MEM_ERR;
317 /* the file is highly structured. Do this in sequence */
319 * Private-key-format: v1.x.
323 /* get the key format version number */
324 if (ldns_fget_keyword_data_l(fp, "Private-key-format", ": ", d, "\n",
325 LDNS_MAX_LINELEN, line_nr) == -1) {
326 /* no version information */
329 return LDNS_STATUS_SYNTAX_ERR;
331 if (strncmp(d, "v1.", 3) != 0) {
334 return LDNS_STATUS_SYNTAX_VERSION_ERR;
337 /* get the algorithm type, our file function strip ( ) so there are
338 * not in the return string! */
339 if (ldns_fget_keyword_data_l(fp, "Algorithm", ": ", d, "\n",
340 LDNS_MAX_LINELEN, line_nr) == -1) {
341 /* no alg information */
344 return LDNS_STATUS_SYNTAX_ALG_ERR;
347 if (strncmp(d, "1 RSA", 2) == 0) {
348 alg = LDNS_SIGN_RSAMD5;
350 if (strncmp(d, "2 DH", 2) == 0) {
351 alg = (ldns_signing_algorithm)LDNS_DH;
353 if (strncmp(d, "3 DSA", 2) == 0) {
356 if (strncmp(d, "4 ECC", 2) == 0) {
357 alg = (ldns_signing_algorithm)LDNS_ECC;
359 if (strncmp(d, "5 RSASHA1", 2) == 0) {
360 alg = LDNS_SIGN_RSASHA1;
362 if (strncmp(d, "6 DSA", 2) == 0) {
363 alg = LDNS_SIGN_DSA_NSEC3;
365 if (strncmp(d, "7 RSASHA1", 2) == 0) {
366 alg = LDNS_SIGN_RSASHA1_NSEC3;
369 if (strncmp(d, "8 RSASHA256", 2) == 0) {
371 alg = LDNS_SIGN_RSASHA256;
373 fprintf(stderr, "Warning: SHA256 not compiled into this ");
374 fprintf(stderr, "version of ldns\n");
377 if (strncmp(d, "10 RSASHA512", 3) == 0) {
379 alg = LDNS_SIGN_RSASHA512;
381 fprintf(stderr, "Warning: SHA512 not compiled into this ");
382 fprintf(stderr, "version of ldns\n");
385 if (strncmp(d, "12 ECC-GOST", 3) == 0) {
387 alg = LDNS_SIGN_ECC_GOST;
389 fprintf(stderr, "Warning: ECC-GOST not compiled into this ");
390 fprintf(stderr, "version of ldns, use --enable-gost\n");
393 if (strncmp(d, "13 ECDSAP256SHA256", 3) == 0) {
395 alg = LDNS_SIGN_ECDSAP256SHA256;
397 fprintf(stderr, "Warning: ECDSA not compiled into this ");
398 fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
401 if (strncmp(d, "14 ECDSAP384SHA384", 3) == 0) {
403 alg = LDNS_SIGN_ECDSAP384SHA384;
405 fprintf(stderr, "Warning: ECDSA not compiled into this ");
406 fprintf(stderr, "version of ldns, use --enable-ecdsa\n");
409 if (strncmp(d, "157 HMAC-MD5", 4) == 0) {
410 alg = LDNS_SIGN_HMACMD5;
412 if (strncmp(d, "158 HMAC-SHA1", 4) == 0) {
413 alg = LDNS_SIGN_HMACSHA1;
415 if (strncmp(d, "159 HMAC-SHA256", 4) == 0) {
416 alg = LDNS_SIGN_HMACSHA256;
422 case LDNS_SIGN_RSAMD5:
423 case LDNS_SIGN_RSASHA1:
424 case LDNS_SIGN_RSASHA1_NSEC3:
426 case LDNS_SIGN_RSASHA256:
427 case LDNS_SIGN_RSASHA512:
429 ldns_key_set_algorithm(k, alg);
431 rsa = ldns_key_new_frm_fp_rsa_l(fp, line_nr);
434 return LDNS_STATUS_ERR;
436 ldns_key_assign_rsa_key(k, rsa);
437 #endif /* HAVE_SSL */
440 case LDNS_SIGN_DSA_NSEC3:
441 ldns_key_set_algorithm(k, alg);
443 dsa = ldns_key_new_frm_fp_dsa_l(fp, line_nr);
446 return LDNS_STATUS_ERR;
448 ldns_key_assign_dsa_key(k, dsa);
449 #endif /* HAVE_SSL */
451 case LDNS_SIGN_HMACMD5:
452 case LDNS_SIGN_HMACSHA1:
453 case LDNS_SIGN_HMACSHA256:
454 ldns_key_set_algorithm(k, alg);
456 hmac = ldns_key_new_frm_fp_hmac_l(fp, line_nr, &hmac_size);
459 return LDNS_STATUS_ERR;
461 ldns_key_set_hmac_size(k, hmac_size);
462 ldns_key_set_hmac_key(k, hmac);
463 #endif /* HAVE_SSL */
465 case LDNS_SIGN_ECC_GOST:
466 ldns_key_set_algorithm(k, alg);
467 #if defined(HAVE_SSL) && defined(USE_GOST)
468 if(!ldns_key_EVP_load_gost_id()) {
470 return LDNS_STATUS_CRYPTO_ALGO_NOT_IMPL;
472 ldns_key_set_evp_key(k,
473 ldns_key_new_frm_fp_gost_l(fp, line_nr));
477 return LDNS_STATUS_ERR;
483 case LDNS_SIGN_ECDSAP256SHA256:
484 case LDNS_SIGN_ECDSAP384SHA384:
485 ldns_key_set_algorithm(k, alg);
486 ldns_key_set_evp_key(k,
487 ldns_key_new_frm_fp_ecdsa_l(fp, (ldns_algorithm)alg, line_nr));
491 return LDNS_STATUS_ERR;
498 return LDNS_STATUS_SYNTAX_ALG_ERR;
500 key_rr = ldns_key2rr(k);
501 ldns_key_set_keytag(k, ldns_calc_keytag(key_rr));
502 ldns_rr_free(key_rr);
506 return LDNS_STATUS_OK;
509 return LDNS_STATUS_ERR;
514 ldns_key_new_frm_fp_rsa(FILE *f)
516 return ldns_key_new_frm_fp_rsa_l(f, NULL);
520 ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr)
536 * BIGNUM *n; // public modulus
537 * BIGNUM *e; // public exponent
538 * BIGNUM *d; // private exponent
539 * BIGNUM *p; // secret prime factor
540 * BIGNUM *q; // secret prime factor
541 * BIGNUM *dmp1; // d mod (p-1)
542 * BIGNUM *dmq1; // d mod (q-1)
543 * BIGNUM *iqmp; // q^-1 mod p
552 d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
553 buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
555 if (!d || !rsa || !buf) {
559 /* I could use functions again, but that seems an overkill,
560 * allthough this also looks tedious
563 /* Modules, rsa->n */
564 if (ldns_fget_keyword_data_l(f, "Modulus", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
567 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
569 rsa->n = BN_bin2bn((const char unsigned*)buf, i, NULL);
574 /* PublicExponent, rsa->e */
575 if (ldns_fget_keyword_data_l(f, "PublicExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
578 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
579 rsa->e = BN_bin2bn((const char unsigned*)buf, i, NULL);
584 /* PrivateExponent, rsa->d */
585 if (ldns_fget_keyword_data_l(f, "PrivateExponent", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
588 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
589 rsa->d = BN_bin2bn((const char unsigned*)buf, i, NULL);
595 if (ldns_fget_keyword_data_l(f, "Prime1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
598 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
599 rsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
605 if (ldns_fget_keyword_data_l(f, "Prime2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
608 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
609 rsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
614 /* Exponent1, rsa->dmp1 */
615 if (ldns_fget_keyword_data_l(f, "Exponent1", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
618 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
619 rsa->dmp1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
624 /* Exponent2, rsa->dmq1 */
625 if (ldns_fget_keyword_data_l(f, "Exponent2", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
628 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
629 rsa->dmq1 = BN_bin2bn((const char unsigned*)buf, i, NULL);
634 /* Coefficient, rsa->iqmp */
635 if (ldns_fget_keyword_data_l(f, "Coefficient", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
638 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
639 rsa->iqmp = BN_bin2bn((const char unsigned*)buf, i, NULL);
657 ldns_key_new_frm_fp_dsa(FILE *f)
659 return ldns_key_new_frm_fp_dsa_l(f, NULL);
663 ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
670 d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
671 buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
673 if (!d || !dsa || !buf) {
677 /* the line parser removes the () from the input... */
680 if (ldns_fget_keyword_data_l(f, "Primep", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
683 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
685 dsa->p = BN_bin2bn((const char unsigned*)buf, i, NULL);
690 /* Subprime, dsa->q */
691 if (ldns_fget_keyword_data_l(f, "Subprimeq", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
694 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
695 dsa->q = BN_bin2bn((const char unsigned*)buf, i, NULL);
701 if (ldns_fget_keyword_data_l(f, "Baseg", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
704 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
705 dsa->g = BN_bin2bn((const char unsigned*)buf, i, NULL);
710 /* Private key, dsa->priv_key */
711 if (ldns_fget_keyword_data_l(f, "Private_valuex", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
714 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
715 dsa->priv_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
716 if (!dsa->priv_key) {
720 /* Public key, dsa->priv_key */
721 if (ldns_fget_keyword_data_l(f, "Public_valuey", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
724 i = ldns_b64_pton((const char*)d, buf, ldns_b64_ntop_calculate_size(strlen(d)));
725 dsa->pub_key = BN_bin2bn((const char unsigned*)buf, i, NULL);
744 ldns_key_new_frm_fp_hmac(FILE *f, size_t *hmac_size)
746 return ldns_key_new_frm_fp_hmac_l(f, NULL, hmac_size);
750 ldns_key_new_frm_fp_hmac_l( FILE *f
751 , ATTR_UNUSED(int *line_nr)
756 char d[LDNS_MAX_LINELEN];
757 unsigned char *buf = NULL;
759 if (ldns_fget_keyword_data_l(f, "Key", ": ", d, "\n", LDNS_MAX_LINELEN, line_nr) == -1) {
762 bufsz = ldns_b64_ntop_calculate_size(strlen(d));
763 buf = LDNS_XMALLOC(unsigned char, bufsz);
764 i = (size_t) ldns_b64_pton((const char*)d, buf, bufsz);
774 #endif /* HAVE_SSL */
778 ldns_gen_gost_key(void)
782 int gost_id = ldns_key_EVP_load_gost_id();
785 ctx = EVP_PKEY_CTX_new_id(gost_id, NULL);
787 /* the id should be available now */
790 if(EVP_PKEY_CTX_ctrl_str(ctx, "paramset", "A") <= 0) {
791 /* cannot set paramset */
792 EVP_PKEY_CTX_free(ctx);
796 if(EVP_PKEY_keygen_init(ctx) <= 0) {
797 EVP_PKEY_CTX_free(ctx);
800 if(EVP_PKEY_keygen(ctx, &p) <= 0) {
802 EVP_PKEY_CTX_free(ctx);
805 EVP_PKEY_CTX_free(ctx);
811 ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size)
831 case LDNS_SIGN_RSAMD5:
832 case LDNS_SIGN_RSASHA1:
833 case LDNS_SIGN_RSASHA1_NSEC3:
834 case LDNS_SIGN_RSASHA256:
835 case LDNS_SIGN_RSASHA512:
837 r = RSA_generate_key((int)size, RSA_F4, NULL, NULL);
842 if (RSA_check_key(r) != 1) {
846 ldns_key_set_rsa_key(k, r);
848 #endif /* HAVE_SSL */
851 case LDNS_SIGN_DSA_NSEC3:
853 d = DSA_generate_parameters((int)size, NULL, 0, NULL, NULL, NULL, NULL);
858 if (DSA_generate_key(d) != 1) {
862 ldns_key_set_dsa_key(k, d);
864 #endif /* HAVE_SSL */
866 case LDNS_SIGN_HMACMD5:
867 case LDNS_SIGN_HMACSHA1:
868 case LDNS_SIGN_HMACSHA256:
873 #endif /* HAVE_SSL */
875 ldns_key_set_hmac_size(k, size);
877 hmac = LDNS_XMALLOC(unsigned char, size);
883 if (RAND_bytes(hmac, (int) size) != 1) {
889 while (offset + sizeof(i) < size) {
891 memcpy(&hmac[offset], &i, sizeof(i));
896 memcpy(&hmac[offset], &i, size - offset);
898 #endif /* HAVE_SSL */
899 ldns_key_set_hmac_key(k, hmac);
901 ldns_key_set_flags(k, 0);
903 case LDNS_SIGN_ECC_GOST:
904 #if defined(HAVE_SSL) && defined(USE_GOST)
905 ldns_key_set_evp_key(k, ldns_gen_gost_key());
915 #endif /* HAVE_SSL and USE_GOST */
917 case LDNS_SIGN_ECDSAP256SHA256:
918 case LDNS_SIGN_ECDSAP384SHA384:
920 if(alg == LDNS_SIGN_ECDSAP256SHA256)
921 ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
922 else if(alg == LDNS_SIGN_ECDSAP384SHA384)
923 ec = EC_KEY_new_by_curve_name(NID_secp384r1);
928 if(!EC_KEY_generate_key(ec)) {
934 k->_key.key = EVP_PKEY_new();
940 if (!EVP_PKEY_assign_EC_KEY(k->_key.key, ec)) {
952 ldns_key_set_algorithm(k, alg);
957 ldns_key_print(FILE *output, const ldns_key *k)
959 char *str = ldns_key2str(k);
961 fprintf(output, "%s", str);
963 fprintf(output, "Unable to convert private key to string\n");
970 ldns_key_set_algorithm(ldns_key *k, ldns_signing_algorithm l)
976 ldns_key_set_flags(ldns_key *k, uint16_t f)
978 k->_extra.dnssec.flags = f;
984 ldns_key_set_evp_key(ldns_key *k, EVP_PKEY *e)
990 ldns_key_set_rsa_key(ldns_key *k, RSA *r)
992 EVP_PKEY *key = EVP_PKEY_new();
993 EVP_PKEY_set1_RSA(key, r);
998 ldns_key_set_dsa_key(ldns_key *k, DSA *d)
1000 EVP_PKEY *key = EVP_PKEY_new();
1001 EVP_PKEY_set1_DSA(key, d);
1006 ldns_key_assign_rsa_key(ldns_key *k, RSA *r)
1008 EVP_PKEY *key = EVP_PKEY_new();
1009 EVP_PKEY_assign_RSA(key, r);
1014 ldns_key_assign_dsa_key(ldns_key *k, DSA *d)
1016 EVP_PKEY *key = EVP_PKEY_new();
1017 EVP_PKEY_assign_DSA(key, d);
1021 #endif /* HAVE_SSL */
1024 ldns_key_set_hmac_key(ldns_key *k, unsigned char *hmac)
1026 k->_key.hmac.key = hmac;
1030 ldns_key_set_hmac_size(ldns_key *k, size_t hmac_size)
1032 k->_key.hmac.size = hmac_size;
1036 ldns_key_set_external_key(ldns_key *k, void *external_key)
1038 k->_key.external_key = external_key;
1042 ldns_key_set_origttl(ldns_key *k, uint32_t t)
1044 k->_extra.dnssec.orig_ttl = t;
1048 ldns_key_set_inception(ldns_key *k, uint32_t i)
1050 k->_extra.dnssec.inception = i;
1054 ldns_key_set_expiration(ldns_key *k, uint32_t e)
1056 k->_extra.dnssec.expiration = e;
1060 ldns_key_set_pubkey_owner(ldns_key *k, ldns_rdf *r)
1062 k->_pubkey_owner = r;
1066 ldns_key_set_keytag(ldns_key *k, uint16_t tag)
1068 k->_extra.dnssec.keytag = tag;
1073 ldns_key_list_key_count(const ldns_key_list *key_list)
1075 return key_list->_key_count;
1079 ldns_key_list_key(const ldns_key_list *key, size_t nr)
1081 if (nr < ldns_key_list_key_count(key)) {
1082 return key->_keys[nr];
1088 ldns_signing_algorithm
1089 ldns_key_algorithm(const ldns_key *k)
1095 ldns_key_set_use(ldns_key *k, bool v)
1103 ldns_key_use(const ldns_key *k)
1114 ldns_key_evp_key(const ldns_key *k)
1120 ldns_key_rsa_key(const ldns_key *k)
1123 return EVP_PKEY_get1_RSA(k->_key.key);
1130 ldns_key_dsa_key(const ldns_key *k)
1133 return EVP_PKEY_get1_DSA(k->_key.key);
1139 #endif /* HAVE_SSL */
1142 ldns_key_hmac_key(const ldns_key *k)
1144 if (k->_key.hmac.key) {
1145 return k->_key.hmac.key;
1152 ldns_key_hmac_size(const ldns_key *k)
1154 if (k->_key.hmac.size) {
1155 return k->_key.hmac.size;
1162 ldns_key_external_key(const ldns_key *k)
1164 return k->_key.external_key;
1168 ldns_key_origttl(const ldns_key *k)
1170 return k->_extra.dnssec.orig_ttl;
1174 ldns_key_flags(const ldns_key *k)
1176 return k->_extra.dnssec.flags;
1180 ldns_key_inception(const ldns_key *k)
1182 return k->_extra.dnssec.inception;
1186 ldns_key_expiration(const ldns_key *k)
1188 return k->_extra.dnssec.expiration;
1192 ldns_key_keytag(const ldns_key *k)
1194 return k->_extra.dnssec.keytag;
1198 ldns_key_pubkey_owner(const ldns_key *k)
1200 return k->_pubkey_owner;
1205 ldns_key_list_set_use(ldns_key_list *keys, bool v)
1209 for (i = 0; i < ldns_key_list_key_count(keys); i++) {
1210 ldns_key_set_use(ldns_key_list_key(keys, i), v);
1215 ldns_key_list_set_key_count(ldns_key_list *key, size_t count)
1217 key->_key_count = count;
1221 ldns_key_list_push_key(ldns_key_list *key_list, ldns_key *key)
1226 key_count = ldns_key_list_key_count(key_list);
1228 /* grow the array */
1229 keys = LDNS_XREALLOC(
1230 key_list->_keys, ldns_key *, key_count + 1);
1235 /* add the new member */
1236 key_list->_keys = keys;
1237 key_list->_keys[key_count] = key;
1239 ldns_key_list_set_key_count(key_list, key_count + 1);
1244 ldns_key_list_pop_key(ldns_key_list *key_list)
1254 key_count = ldns_key_list_key_count(key_list);
1255 if (key_count == 0) {
1259 pop = ldns_key_list_key(key_list, key_count);
1261 /* shrink the array */
1262 a = LDNS_XREALLOC(key_list->_keys, ldns_key *, key_count - 1);
1264 key_list->_keys = a;
1267 ldns_key_list_set_key_count(key_list, key_count - 1);
1274 /* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1276 ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size)
1284 if (BN_num_bytes(k->e) <= 256) {
1285 /* normally only this path is executed (small factors are
1288 data[0] = (unsigned char) BN_num_bytes(k->e);
1289 i = BN_bn2bin(k->e, data + 1);
1290 j = BN_bn2bin(k->n, data + i + 1);
1291 *size = (uint16_t) i + j;
1292 } else if (BN_num_bytes(k->e) <= 65536) {
1294 /* BN_bn2bin does bigendian, _uint16 also */
1295 ldns_write_uint16(data + 1, (uint16_t) BN_num_bytes(k->e));
1297 BN_bn2bin(k->e, data + 3);
1298 BN_bn2bin(k->n, data + 4 + BN_num_bytes(k->e));
1299 *size = (uint16_t) BN_num_bytes(k->n) + 6;
1306 /* data pointer must be large enough (LDNS_MAX_KEYLEN) */
1308 ldns_key_dsa2bin(unsigned char *data, DSA *k, uint16_t *size)
1317 *size = (uint16_t)BN_num_bytes(k->p);
1318 T = (*size - 64) / 8;
1319 memcpy(data, &T, 1);
1322 fprintf(stderr, "DSA key with T > 8 (ie. > 1024 bits)");
1323 fprintf(stderr, " not implemented\n");
1327 /* size = 64 + (T * 8); */
1328 data[0] = (unsigned char)T;
1329 BN_bn2bin(k->q, data + 1 ); /* 20 octects */
1330 BN_bn2bin(k->p, data + 21 ); /* offset octects */
1331 BN_bn2bin(k->g, data + 21 + *size); /* offset octets */
1332 BN_bn2bin(k->pub_key, data + 21 + *size + *size); /* offset octets */
1333 *size = 21 + (*size * 3);
1339 ldns_key_gost2bin(unsigned char* data, EVP_PKEY* k, uint16_t* size)
1342 unsigned char* pp = NULL;
1343 if(i2d_PUBKEY(k, &pp) != 37 + 64) {
1344 /* expect 37 byte(ASN header) and 64 byte(X and Y) */
1348 /* omit ASN header */
1355 #endif /* USE_GOST */
1357 #endif /* HAVE_SSL */
1360 ldns_key2rr(const ldns_key *k)
1362 /* this function will convert a the keydata contained in
1363 * rsa/dsa pointers to a DNSKEY rr. It will fill in as
1364 * much as it can, but it does not know about key-flags
1369 unsigned char *bin = NULL;
1374 #endif /* HAVE_SSL */
1378 int internal_data = 0;
1383 pubkey = ldns_rr_new();
1385 switch (ldns_key_algorithm(k)) {
1386 case LDNS_SIGN_HMACMD5:
1387 case LDNS_SIGN_HMACSHA1:
1388 case LDNS_SIGN_HMACSHA256:
1389 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
1392 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
1395 /* zero-th rdf - flags */
1396 ldns_rr_push_rdf(pubkey,
1397 ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16,
1398 ldns_key_flags(k)));
1400 ldns_rr_push_rdf(pubkey,
1401 ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, LDNS_DNSSEC_KEYPROTO));
1403 if (ldns_key_pubkey_owner(k)) {
1404 ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
1407 /* third - da algorithm */
1408 switch(ldns_key_algorithm(k)) {
1409 case LDNS_SIGN_RSAMD5:
1410 case LDNS_SIGN_RSASHA1:
1411 case LDNS_SIGN_RSASHA1_NSEC3:
1412 case LDNS_SIGN_RSASHA256:
1413 case LDNS_SIGN_RSASHA512:
1414 ldns_rr_push_rdf(pubkey,
1415 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1417 rsa = ldns_key_rsa_key(k);
1419 bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1421 ldns_rr_free(pubkey);
1424 if (!ldns_key_rsa2bin(bin, rsa, &size)) {
1426 ldns_rr_free(pubkey);
1436 ldns_rr_push_rdf(pubkey,
1437 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA));
1439 dsa = ldns_key_dsa_key(k);
1441 bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1443 ldns_rr_free(pubkey);
1446 if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1448 ldns_rr_free(pubkey);
1454 #endif /* HAVE_SSL */
1456 case LDNS_SIGN_DSA_NSEC3:
1457 ldns_rr_push_rdf(pubkey,
1458 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG, LDNS_DSA_NSEC3));
1460 dsa = ldns_key_dsa_key(k);
1462 bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1464 ldns_rr_free(pubkey);
1467 if (!ldns_key_dsa2bin(bin, dsa, &size)) {
1469 ldns_rr_free(pubkey);
1475 #endif /* HAVE_SSL */
1477 case LDNS_SIGN_ECC_GOST:
1478 ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1479 LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1480 #if defined(HAVE_SSL) && defined(USE_GOST)
1481 bin = LDNS_XMALLOC(unsigned char, LDNS_MAX_KEYLEN);
1483 ldns_rr_free(pubkey);
1487 if (!ldns_key_gost2bin(bin, k->_key.key, &size)) {
1489 ldns_rr_free(pubkey);
1495 ldns_rr_free(pubkey);
1497 #endif /* HAVE_SSL and USE_GOST */
1499 case LDNS_SIGN_ECDSAP256SHA256:
1500 case LDNS_SIGN_ECDSAP384SHA384:
1502 ldns_rr_push_rdf(pubkey, ldns_native2rdf_int8(
1503 LDNS_RDF_TYPE_ALG, ldns_key_algorithm(k)));
1506 ec = EVP_PKEY_get1_EC_KEY(k->_key.key);
1508 EC_KEY_set_conv_form(ec, POINT_CONVERSION_UNCOMPRESSED);
1509 size = (uint16_t)i2o_ECPublicKey(ec, NULL);
1510 if(!i2o_ECPublicKey(ec, &bin)) {
1512 ldns_rr_free(pubkey);
1516 /* move back one byte to shave off the 0x02
1517 * 'uncompressed' indicator that openssl made
1518 * Actually its 0x04 (from implementation).
1520 assert(bin[0] == POINT_CONVERSION_UNCOMPRESSED);
1522 memmove(bin, bin+1, size);
1524 /* down the reference count for ec, its still assigned
1529 ldns_rr_free(pubkey);
1533 case LDNS_SIGN_HMACMD5:
1534 case LDNS_SIGN_HMACSHA1:
1535 case LDNS_SIGN_HMACSHA256:
1536 bin = LDNS_XMALLOC(unsigned char, ldns_key_hmac_size(k));
1538 ldns_rr_free(pubkey);
1541 ldns_rr_push_rdf(pubkey,
1542 ldns_native2rdf_int8(LDNS_RDF_TYPE_ALG,
1543 ldns_key_algorithm(k)));
1544 size = ldns_key_hmac_size(k);
1545 memcpy(bin, ldns_key_hmac_key(k), size);
1549 /* fourth the key bin material */
1550 if (internal_data) {
1551 keybin = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, size, bin);
1553 ldns_rr_push_rdf(pubkey, keybin);
1559 ldns_key_free(ldns_key *key)
1565 ldns_key_deep_free(ldns_key *key)
1567 unsigned char* hmac;
1568 if (ldns_key_pubkey_owner(key)) {
1569 ldns_rdf_deep_free(ldns_key_pubkey_owner(key));
1572 if (ldns_key_evp_key(key)) {
1573 EVP_PKEY_free(ldns_key_evp_key(key));
1575 #endif /* HAVE_SSL */
1576 if (ldns_key_hmac_key(key)) {
1577 hmac = ldns_key_hmac_key(key);
1584 ldns_key_list_free(ldns_key_list *key_list)
1587 for (i = 0; i < ldns_key_list_key_count(key_list); i++) {
1588 ldns_key_deep_free(ldns_key_list_key(key_list, i));
1590 LDNS_FREE(key_list->_keys);
1591 LDNS_FREE(key_list);
1595 ldns_read_anchor_file(const char *filename)
1598 /*char line[LDNS_MAX_PACKETLEN];*/
1599 char *line = LDNS_XMALLOC(char, LDNS_MAX_PACKETLEN);
1608 fp = fopen(filename, "r");
1610 fprintf(stderr, "Unable to open %s: %s\n", filename, strerror(errno));
1615 while ((c = fgetc(fp)) && i+1 < LDNS_MAX_PACKETLEN && c != EOF) {
1624 fprintf(stderr, "nothing read from %s", filename);
1628 status = ldns_rr_new_frm_str(&r, line, 0, NULL, NULL);
1629 if (status == LDNS_STATUS_OK && (ldns_rr_get_type(r) == LDNS_RR_TYPE_DNSKEY || ldns_rr_get_type(r) == LDNS_RR_TYPE_DS)) {
1633 fprintf(stderr, "Error creating DNSKEY or DS rr from %s: %s\n", filename, ldns_get_errorstr_by_id(status));
1641 ldns_key_get_file_base_name(ldns_key *key)
1643 ldns_buffer *buffer;
1644 char *file_base_name;
1646 buffer = ldns_buffer_new(255);
1647 ldns_buffer_printf(buffer, "K");
1648 (void)ldns_rdf2buffer_str_dname(buffer, ldns_key_pubkey_owner(key));
1649 ldns_buffer_printf(buffer,
1651 ldns_key_algorithm(key),
1652 ldns_key_keytag(key));
1653 file_base_name = ldns_buffer_export(buffer);
1654 ldns_buffer_free(buffer);
1655 return file_base_name;
1658 int ldns_key_algo_supported(int algo)
1660 ldns_lookup_table *lt = ldns_signing_algorithms;
1669 ldns_signing_algorithm ldns_get_signing_algorithm_by_name(const char* name)
1671 /* list of (signing algorithm id, alias_name) */
1672 ldns_lookup_table aliases[] = {
1673 /* from bind dnssec-keygen */
1674 {LDNS_SIGN_HMACMD5, "HMAC-MD5"},
1675 {LDNS_SIGN_DSA_NSEC3, "NSEC3DSA"},
1676 {LDNS_SIGN_RSASHA1_NSEC3, "NSEC3RSASHA1"},
1677 /* old ldns usage, now RFC names */
1678 {LDNS_SIGN_DSA_NSEC3, "DSA_NSEC3" },
1679 {LDNS_SIGN_RSASHA1_NSEC3, "RSASHA1_NSEC3" },
1681 {LDNS_SIGN_ECC_GOST, "GOST"},
1683 /* compat with possible output */
1686 {LDNS_INDIRECT, "INDIRECT"},
1687 {LDNS_PRIVATEDNS, "PRIVATEDNS"},
1688 {LDNS_PRIVATEOID, "PRIVATEOID"},
1690 ldns_lookup_table* lt = ldns_signing_algorithms;
1692 if(strcasecmp(lt->name, name) == 0)
1698 if(strcasecmp(lt->name, name) == 0)