blob: d694015e4b1a6af9271fb851522ef3571cab1ea2 [file] [log] [blame]
Paul Bakkerd1a983f2013-09-16 22:26:53 +02001/**
2 * \file compat-1.2.h
3 *
4 * \brief Backwards compatibility header for PolarSSL-1.2 from PolarSSL-1.3
5 *
Manuel Pégourié-Gonnarde6581762015-03-20 17:21:21 +00006 * \deprecated Use native PolarSSL 1.3 functions instead.
7 *
Manuel Pégourié-Gonnarda658a402015-01-23 09:45:19 +00008 * Copyright (C) 2006-2013, ARM Limited, All Rights Reserved
Paul Bakkerd1a983f2013-09-16 22:26:53 +02009 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000010 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerd1a983f2013-09-16 22:26:53 +020011 *
Paul Bakkerd1a983f2013-09-16 22:26:53 +020012 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along
23 * with this program; if not, write to the Free Software Foundation, Inc.,
24 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
25 */
Manuel Pégourié-Gonnarda1e32412015-04-15 11:03:43 +020026#if ! defined(POLARSSL_DEPRECATED_REMOVED)
Manuel Pégourié-Gonnard8c3f0f42015-04-09 14:10:26 +020027
Manuel Pégourié-Gonnarda1e32412015-04-15 11:03:43 +020028#if defined(POLARSSL_DEPRECATED_WARNING)
Manuel Pégourié-Gonnard8c3f0f42015-04-09 14:10:26 +020029#warning "Including compat-1.2.h is deprecated"
30#endif
31
Paul Bakkerd1a983f2013-09-16 22:26:53 +020032#ifndef POLARSSL_COMPAT_1_2_H
33#define POLARSSL_COMPAT_1_2_H
34
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020035#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakkerd1a983f2013-09-16 22:26:53 +020036#include "config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020037#else
38#include POLARSSL_CONFIG_FILE
39#endif
Paul Bakkerd1a983f2013-09-16 22:26:53 +020040
Paul Bakker51876562013-09-17 14:36:05 +020041// Comment out to disable prototype change warnings
Paul Bakkerd1a983f2013-09-16 22:26:53 +020042#define SHOW_PROTOTYPE_CHANGE_WARNINGS
43
Paul Bakkerfa6a6202013-10-28 18:48:30 +010044#if defined(_MSC_VER) && !defined(inline)
45#define inline _inline
46#else
47#if defined(__ARMCC_VERSION) && !defined(inline)
48#define inline __inline
49#endif /* __ARMCC_VERSION */
Paul Bakkerd46a9f12013-10-31 14:34:19 +010050#endif /* _MSC_VER */
Paul Bakkerfa6a6202013-10-28 18:48:30 +010051
52#if defined(_MSC_VER)
Paul Bakker4aa40d42013-10-11 10:49:24 +020053// MSVC does not support #warning
54#undef SHOW_PROTOTYPE_CHANGE_WARNINGS
55#endif
56
Paul Bakker51876562013-09-17 14:36:05 +020057#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
58#warning "You can disable these warnings by commenting SHOW_PROTOTYPE_CHANGE_WARNINGS in compat-1.2.h"
59#endif
60
Paul Bakkerd1a983f2013-09-16 22:26:53 +020061#if defined(POLARSSL_SHA256_C)
62#define POLARSSL_SHA2_C
63#include "sha256.h"
64
65/*
66 * SHA-2 -> SHA-256
67 */
68typedef sha256_context sha2_context;
69
Steffan Karger44cf68f2013-11-12 10:34:55 +010070static inline void sha2_starts( sha256_context *ctx, int is224 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020071 sha256_starts( ctx, is224 );
72}
Steffan Karger44cf68f2013-11-12 10:34:55 +010073static inline void sha2_update( sha256_context *ctx, const unsigned char *input,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020074 size_t ilen ) {
75 sha256_update( ctx, input, ilen );
76}
Steffan Karger44cf68f2013-11-12 10:34:55 +010077static inline void sha2_finish( sha256_context *ctx, unsigned char output[32] ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +020078 sha256_finish( ctx, output );
Paul Bakkerd1a983f2013-09-16 22:26:53 +020079}
Steffan Karger44cf68f2013-11-12 10:34:55 +010080static inline int sha2_file( const char *path, unsigned char output[32], int is224 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020081 return sha256_file( path, output, is224 );
82}
Steffan Karger44cf68f2013-11-12 10:34:55 +010083static inline void sha2( const unsigned char *input, size_t ilen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020084 unsigned char output[32], int is224 ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +020085 sha256( input, ilen, output, is224 );
Paul Bakkerd1a983f2013-09-16 22:26:53 +020086}
Steffan Karger44cf68f2013-11-12 10:34:55 +010087static inline void sha2_hmac_starts( sha256_context *ctx, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020088 size_t keylen, int is224 ) {
89 sha256_hmac_starts( ctx, key, keylen, is224 );
90}
Steffan Karger44cf68f2013-11-12 10:34:55 +010091static inline void sha2_hmac_update( sha256_context *ctx, const unsigned char *input, size_t ilen ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020092 sha256_hmac_update( ctx, input, ilen );
93}
Steffan Karger44cf68f2013-11-12 10:34:55 +010094static inline void sha2_hmac_finish( sha256_context *ctx, unsigned char output[32] ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020095 sha256_hmac_finish( ctx, output );
96}
Steffan Karger44cf68f2013-11-12 10:34:55 +010097static inline void sha2_hmac_reset( sha256_context *ctx ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020098 sha256_hmac_reset( ctx );
99}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100100static inline void sha2_hmac( const unsigned char *key, size_t keylen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200101 const unsigned char *input, size_t ilen,
102 unsigned char output[32], int is224 ) {
103 sha256_hmac( key, keylen, input, ilen, output, is224 );
104}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100105static inline int sha2_self_test( int verbose ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200106 return sha256_self_test( verbose );
107}
108#endif /* POLARSSL_SHA256_C */
109
110#if defined(POLARSSL_SHA512_C)
111#define POLARSSL_SHA4_C
112#include "sha512.h"
113
114/*
115 * SHA-4 -> SHA-512
116 */
117typedef sha512_context sha4_context;
118
Steffan Karger44cf68f2013-11-12 10:34:55 +0100119static inline void sha4_starts( sha512_context *ctx, int is384 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200120 sha512_starts( ctx, is384 );
121}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100122static inline void sha4_update( sha512_context *ctx, const unsigned char *input,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200123 size_t ilen ) {
124 sha512_update( ctx, input, ilen );
125}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100126static inline void sha4_finish( sha512_context *ctx, unsigned char output[64] ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200127 sha512_finish( ctx, output );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200128}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100129static inline int sha4_file( const char *path, unsigned char output[64], int is384 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200130 return sha512_file( path, output, is384 );
131}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100132static inline void sha4( const unsigned char *input, size_t ilen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200133 unsigned char output[32], int is384 ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200134 sha512( input, ilen, output, is384 );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200135}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100136static inline void sha4_hmac_starts( sha512_context *ctx, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200137 size_t keylen, int is384 ) {
138 sha512_hmac_starts( ctx, key, keylen, is384 );
139}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100140static inline void sha4_hmac_update( sha512_context *ctx, const unsigned char *input, size_t ilen ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200141 sha512_hmac_update( ctx, input, ilen );
142}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100143static inline void sha4_hmac_finish( sha512_context *ctx, unsigned char output[64] ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200144 sha512_hmac_finish( ctx, output );
145}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100146static inline void sha4_hmac_reset( sha512_context *ctx ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200147 sha512_hmac_reset( ctx );
148}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100149static inline void sha4_hmac( const unsigned char *key, size_t keylen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200150 const unsigned char *input, size_t ilen,
151 unsigned char output[64], int is384 ) {
152 sha512_hmac( key, keylen, input, ilen, output, is384 );
153}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100154static inline int sha4_self_test( int verbose ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200155 return sha512_self_test( verbose );
156}
157#endif /* POLARSSL_SHA512_C */
158
159#if defined(POLARSSL_CIPHER_C)
160#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
161#warning "cipher_reset() prototype changed. Manual change required if used"
162#endif
163#endif
164
165#if defined(POLARSSL_RSA_C)
166#define SIG_RSA_RAW POLARSSL_MD_NONE
167#define SIG_RSA_MD2 POLARSSL_MD_MD2
168#define SIG_RSA_MD4 POLARSSL_MD_MD4
169#define SIG_RSA_MD5 POLARSSL_MD_MD5
170#define SIG_RSA_SHA1 POLARSSL_MD_SHA1
171#define SIG_RSA_SHA224 POLARSSL_MD_SHA224
172#define SIG_RSA_SHA256 POLARSSL_MD_SHA256
173#define SIG_RSA_SHA384 POLARSSL_MD_SHA384
174#define SIG_RSA_SHA512 POLARSSL_MD_SHA512
175#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
176#warning "rsa_pkcs1_verify() prototype changed. Manual change required if used"
177#warning "rsa_pkcs1_decrypt() prototype changed. Manual change required if used"
178#endif
Paul Bakker9af723c2014-05-01 13:03:14 +0200179#endif /* POLARSSL_RSA_C */
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200180
181#if defined(POLARSSL_DHM_C)
182#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
183#warning "dhm_calc_secret() prototype changed. Manual change required if used"
184#endif
185#endif
186
187#if defined(POLARSSL_GCM_C)
188#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
189#warning "gcm_init() prototype changed. Manual change required if used"
190#endif
191#endif
192
193#if defined(POLARSSL_SSL_CLI_C)
194#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
195#warning "ssl_set_own_cert() prototype changed. Change to ssl_set_own_cert_rsa(). Manual change required if used"
196#endif
197#endif
198
Paul Bakker51876562013-09-17 14:36:05 +0200199#if defined(POLARSSL_X509_USE_C) || defined(POLARSSL_X509_CREATE_C)
Paul Bakker86d0c192013-09-18 11:11:02 +0200200#include "x509.h"
201
Paul Bakker51876562013-09-17 14:36:05 +0200202#define POLARSSL_ERR_X509_CERT_INVALID_FORMAT POLARSSL_ERR_X509_INVALID_FORMAT
203#define POLARSSL_ERR_X509_CERT_INVALID_VERSION POLARSSL_ERR_X509_INVALID_VERSION
204#define POLARSSL_ERR_X509_CERT_INVALID_ALG POLARSSL_ERR_X509_INVALID_ALG
205#define POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG POLARSSL_ERR_X509_UNKNOWN_SIG_ALG
206#define POLARSSL_ERR_X509_CERT_INVALID_NAME POLARSSL_ERR_X509_INVALID_NAME
207#define POLARSSL_ERR_X509_CERT_INVALID_DATE POLARSSL_ERR_X509_INVALID_DATE
208#define POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS POLARSSL_ERR_X509_INVALID_EXTENSIONS
209#define POLARSSL_ERR_X509_CERT_SIG_MISMATCH POLARSSL_ERR_X509_SIG_MISMATCH
210#define POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE POLARSSL_ERR_X509_INVALID_SIGNATURE
211#define POLARSSL_ERR_X509_CERT_INVALID_SERIAL POLARSSL_ERR_X509_INVALID_SERIAL
212#define POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION POLARSSL_ERR_X509_UNKNOWN_VERSION
Paul Bakker86d0c192013-09-18 11:11:02 +0200213
Steffan Karger44cf68f2013-11-12 10:34:55 +0100214static inline int x509parse_serial_gets( char *buf, size_t size, const x509_buf *serial ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200215 return x509_serial_gets( buf, size, serial );
216}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100217static inline int x509parse_dn_gets( char *buf, size_t size, const x509_name *dn ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200218 return x509_dn_gets( buf, size, dn );
219}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100220static inline int x509parse_time_expired( const x509_time *time ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200221 return x509_time_expired( time );
222}
Paul Bakker51876562013-09-17 14:36:05 +0200223#endif /* POLARSSL_X509_USE_C || POLARSSL_X509_CREATE_C */
224
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200225#if defined(POLARSSL_X509_CRT_PARSE_C)
226#define POLARSSL_X509_PARSE_C
227#include "x509_crt.h"
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200228typedef x509_crt x509_cert;
229
Steffan Karger44cf68f2013-11-12 10:34:55 +0100230static inline int x509parse_crt_der( x509_cert *chain, const unsigned char *buf,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200231 size_t buflen ) {
232 return x509_crt_parse_der( chain, buf, buflen );
233}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100234static inline int x509parse_crt( x509_cert *chain, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200235 return x509_crt_parse( chain, buf, buflen );
236}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100237static inline int x509parse_crtfile( x509_cert *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200238 return x509_crt_parse_file( chain, path );
239}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100240static inline int x509parse_crtpath( x509_cert *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200241 return x509_crt_parse_path( chain, path );
242}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100243static inline int x509parse_cert_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200244 const x509_cert *crt ) {
245 return x509_crt_info( buf, size, prefix, crt );
246}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100247static inline int x509parse_verify( x509_cert *crt, x509_cert *trust_ca,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200248 x509_crl *ca_crl, const char *cn, int *flags,
249 int (*f_vrfy)(void *, x509_cert *, int, int *),
250 void *p_vrfy ) {
251 return x509_crt_verify( crt, trust_ca, ca_crl, cn, flags, f_vrfy, p_vrfy );
252}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100253static inline int x509parse_revoked( const x509_cert *crt, const x509_crl *crl ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200254 return x509_crt_revoked( crt, crl );
255}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100256static inline void x509_free( x509_cert *crt ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200257 x509_crt_free( crt );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200258}
259#endif /* POLARSSL_X509_CRT_PARSE_C */
260
Paul Bakkerddf26b42013-09-18 13:46:23 +0200261#if defined(POLARSSL_X509_CRL_PARSE_C)
262#define POLARSSL_X509_PARSE_C
263#include "x509_crl.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100264static inline int x509parse_crl( x509_crl *chain, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200265 return x509_crl_parse( chain, buf, buflen );
266}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100267static inline int x509parse_crlfile( x509_crl *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200268 return x509_crl_parse_file( chain, path );
269}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100270static inline int x509parse_crl_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200271 const x509_crl *crl ) {
272 return x509_crl_info( buf, size, prefix, crl );
273}
274#endif /* POLARSSL_X509_CRL_PARSE_C */
275
276#if defined(POLARSSL_X509_CSR_PARSE_C)
277#define POLARSSL_X509_PARSE_C
278#include "x509_csr.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100279static inline int x509parse_csr( x509_csr *csr, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200280 return x509_csr_parse( csr, buf, buflen );
281}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100282static inline int x509parse_csrfile( x509_csr *csr, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200283 return x509_csr_parse_file( csr, path );
284}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100285static inline int x509parse_csr_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200286 const x509_csr *csr ) {
287 return x509_csr_info( buf, size, prefix, csr );
288}
289#endif /* POLARSSL_X509_CSR_PARSE_C */
290
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200291#if defined(POLARSSL_SSL_TLS_C)
292#include "ssl_ciphersuites.h"
293
294#define ssl_default_ciphersuites ssl_list_ciphersuites()
295#endif
296
297#if defined(POLARSSL_PK_PARSE_C) && defined(POLARSSL_RSA_C)
298#include "rsa.h"
299#include "pk.h"
300
301#define POLARSSL_ERR_X509_PASSWORD_MISMATCH POLARSSL_ERR_PK_PASSWORD_MISMATCH
302#define POLARSSL_ERR_X509_KEY_INVALID_FORMAT POLARSSL_ERR_PK_KEY_INVALID_FORMAT
303#define POLARSSL_ERR_X509_UNKNOWN_PK_ALG POLARSSL_ERR_PK_UNKNOWN_PK_ALG
304#define POLARSSL_ERR_X509_CERT_INVALID_PUBKEY POLARSSL_ERR_PK_INVALID_PUBKEY
305
306#if defined(POLARSSL_FS_IO)
Steffan Karger44cf68f2013-11-12 10:34:55 +0100307static inline int x509parse_keyfile( rsa_context *rsa, const char *path,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200308 const char *pwd ) {
309 int ret;
310 pk_context pk;
311 pk_init( &pk );
312 ret = pk_parse_keyfile( &pk, path, pwd );
313 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
314 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
315 if( ret == 0 )
316 rsa_copy( rsa, pk_rsa( pk ) );
317 else
318 rsa_free( rsa );
319 pk_free( &pk );
320 return( ret );
321}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100322static inline int x509parse_public_keyfile( rsa_context *rsa, const char *path ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200323 int ret;
324 pk_context pk;
325 pk_init( &pk );
326 ret = pk_parse_public_keyfile( &pk, path );
327 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
328 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
329 if( ret == 0 )
330 rsa_copy( rsa, pk_rsa( pk ) );
331 else
332 rsa_free( rsa );
333 pk_free( &pk );
334 return( ret );
335}
336#endif /* POLARSSL_FS_IO */
337
Steffan Karger44cf68f2013-11-12 10:34:55 +0100338static inline int x509parse_key( rsa_context *rsa, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200339 size_t keylen,
340 const unsigned char *pwd, size_t pwdlen ) {
341 int ret;
342 pk_context pk;
343 pk_init( &pk );
344 ret = pk_parse_key( &pk, key, keylen, pwd, pwdlen );
345 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
346 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
347 if( ret == 0 )
348 rsa_copy( rsa, pk_rsa( pk ) );
349 else
350 rsa_free( rsa );
351 pk_free( &pk );
352 return( ret );
353}
354
Steffan Karger44cf68f2013-11-12 10:34:55 +0100355static inline int x509parse_public_key( rsa_context *rsa,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200356 const unsigned char *key, size_t keylen )
357{
358 int ret;
359 pk_context pk;
360 pk_init( &pk );
361 ret = pk_parse_public_key( &pk, key, keylen );
362 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
363 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
364 if( ret == 0 )
365 rsa_copy( rsa, pk_rsa( pk ) );
366 else
367 rsa_free( rsa );
368 pk_free( &pk );
369 return( ret );
370}
371#endif /* POLARSSL_PK_PARSE_C && POLARSSL_RSA_C */
372
373#if defined(POLARSSL_PK_WRITE_C) && defined(POLARSSL_RSA_C)
374#include "pk.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100375static inline int x509_write_pubkey_der( unsigned char *buf, size_t len, rsa_context *rsa ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200376 int ret;
377 pk_context ctx;
378 if( ( ret = pk_init_ctx( &ctx, pk_info_from_type( POLARSSL_PK_RSA ) ) ) != 0 ) return( ret );
Paul Bakker4aa40d42013-10-11 10:49:24 +0200379 if( ( ret = rsa_copy( pk_rsa( ctx ), rsa ) ) != 0 ) return( ret );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200380 ret = pk_write_pubkey_der( &ctx, buf, len );
381 pk_free( &ctx );
382 return( ret );
383}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100384static inline int x509_write_key_der( unsigned char *buf, size_t len, rsa_context *rsa ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200385 int ret;
386 pk_context ctx;
387 if( ( ret = pk_init_ctx( &ctx, pk_info_from_type( POLARSSL_PK_RSA ) ) ) != 0 ) return( ret );
Paul Bakker4aa40d42013-10-11 10:49:24 +0200388 if( ( ret = rsa_copy( pk_rsa( ctx ), rsa ) ) != 0 ) return( ret );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200389 ret = pk_write_key_der( &ctx, buf, len );
390 pk_free( &ctx );
391 return( ret );
392}
393#endif /* POLARSSL_PK_WRITE_C && POLARSSL_RSA_C */
394#endif /* compat-1.2.h */
Manuel Pégourié-Gonnarda1e32412015-04-15 11:03:43 +0200395#endif /* POLARSSL_DEPRECATED_REMOVED */