tinc: Add clean sources of 1.1pre10.
[tomato.git] / release / src / router / tinc / src / openssl / rsa.c
blob20bfb65a072b2926e26a1e21191c32dcd3c0aa2b
1 /*
2 rsa.c -- RSA key handling
3 Copyright (C) 2007-2013 Guus Sliepen <guus@tinc-vpn.org>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License along
16 with this program; if not, write to the Free Software Foundation, Inc.,
17 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 #include "../system.h"
22 #include <openssl/pem.h>
23 #include <openssl/err.h>
25 #define __TINC_RSA_INTERNAL__
26 typedef RSA rsa_t;
28 #include "../logger.h"
29 #include "../rsa.h"
31 // Set RSA keys
33 rsa_t *rsa_set_hex_public_key(char *n, char *e) {
34 rsa_t *rsa = RSA_new();
35 if(!rsa)
36 return NULL;
38 if(BN_hex2bn(&rsa->n, n) != strlen(n) || BN_hex2bn(&rsa->e, e) != strlen(e)) {
39 RSA_free(rsa);
40 return false;
43 return rsa;
46 rsa_t *rsa_set_hex_private_key(char *n, char *e, char *d) {
47 rsa_t *rsa = RSA_new();
48 if(!rsa)
49 return NULL;
51 if(BN_hex2bn(&rsa->n, n) != strlen(n) || BN_hex2bn(&rsa->e, e) != strlen(e) || BN_hex2bn(&rsa->d, d) != strlen(d)) {
52 RSA_free(rsa);
53 return false;
56 return rsa;
59 // Read PEM RSA keys
61 rsa_t *rsa_read_pem_public_key(FILE *fp) {
62 rsa_t *rsa = PEM_read_RSAPublicKey(fp, NULL, NULL, NULL);
64 if(!rsa)
65 rsa = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL);
67 if(!rsa)
68 logger(DEBUG_ALWAYS, LOG_ERR, "Unable to read RSA public key: %s", ERR_error_string(ERR_get_error(), NULL));
70 return rsa;
73 rsa_t *rsa_read_pem_private_key(FILE *fp) {
74 rsa_t *rsa = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL);
76 if(!rsa)
77 logger(DEBUG_ALWAYS, LOG_ERR, "Unable to read RSA private key: %s", ERR_error_string(ERR_get_error(), NULL));
79 return rsa;
82 size_t rsa_size(rsa_t *rsa) {
83 return RSA_size(rsa);
86 bool rsa_public_encrypt(rsa_t *rsa, void *in, size_t len, void *out) {
87 if(RSA_public_encrypt(len, in, out, rsa, RSA_NO_PADDING) == len)
88 return true;
90 logger(DEBUG_ALWAYS, LOG_ERR, "Unable to perform RSA encryption: %s", ERR_error_string(ERR_get_error(), NULL));
91 return false;
94 bool rsa_private_decrypt(rsa_t *rsa, void *in, size_t len, void *out) {
95 if(RSA_private_decrypt(len, in, out, rsa, RSA_NO_PADDING) == len)
96 return true;
98 logger(DEBUG_ALWAYS, LOG_ERR, "Unable to perform RSA decryption: %s", ERR_error_string(ERR_get_error(), NULL));
99 return false;
102 bool rsa_active(rsa_t *rsa) {
103 return rsa;
106 void rsa_free(rsa_t *rsa) {
107 if(rsa)
108 RSA_free(rsa);