blob: e229757564c07da0a64a60efd4ecd5229d7febf8 [file] [log] [blame]
Jean-Paul Calderone897bc252008-02-18 20:50:23 -05001/*
2 * pkey.c
3 *
Jean-Paul Calderone8671c852011-03-02 19:26:20 -05004 * Copyright (C) AB Strakt
5 * Copyright (C) Jean-Paul Calderone
6 * See LICENSE for details.
Jean-Paul Calderone897bc252008-02-18 20:50:23 -05007 *
8 * Public/rivate key handling code, mostly thin wrappers around OpenSSL.
9 * See the file RATIONALE for a short explanation of why this module was written.
10 *
11 */
12#include <Python.h>
13#define crypto_MODULE
14#include "crypto.h"
15
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050016/*
17 * This is done every time something fails, so turning it into a macro is
18 * really nice.
19 *
20 * Arguments: None
21 * Returns: Doesn't return
22 */
23#define FAIL() \
24do { \
Rick Deand369c932009-07-08 11:48:33 -050025 exception_from_error_queue(crypto_Error); \
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050026 return NULL; \
27} while (0)
28
29
30static char crypto_PKey_generate_key_doc[] = "\n\
31Generate a key of a given type, with a given number of a bits\n\
32\n\
Jean-Paul Calderone54bcc832009-05-27 14:06:48 -040033@param type: The key type (TYPE_RSA or TYPE_DSA)\n\
34@param bits: The number of bits\n\
35@return: None\n\
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050036";
37
38static PyObject *
39crypto_PKey_generate_key(crypto_PKeyObj *self, PyObject *args)
40{
41 int type, bits;
42 RSA *rsa;
43 DSA *dsa;
44
45 if (!PyArg_ParseTuple(args, "ii:generate_key", &type, &bits))
46 return NULL;
47
48 switch (type)
49 {
50 case crypto_TYPE_RSA:
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -050051 if (bits <= 0) {
52 PyErr_SetString(PyExc_ValueError, "Invalid number of bits");
53 return NULL;
54 }
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050055 if ((rsa = RSA_generate_key(bits, 0x10001, NULL, NULL)) == NULL)
56 FAIL();
57 if (!EVP_PKEY_assign_RSA(self->pkey, rsa))
58 FAIL();
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -040059 break;
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050060
61 case crypto_TYPE_DSA:
62 if ((dsa = DSA_generate_parameters(bits, NULL, 0, NULL, NULL, NULL, NULL)) == NULL)
63 FAIL();
64 if (!DSA_generate_key(dsa))
65 FAIL();
66 if (!EVP_PKEY_assign_DSA(self->pkey, dsa))
67 FAIL();
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -040068 break;
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050069
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -040070 default:
71 PyErr_SetString(crypto_Error, "No such key type");
72 return NULL;
73
74 }
75 self->initialized = 1;
76 Py_INCREF(Py_None);
77 return Py_None;
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050078}
79
80static char crypto_PKey_bits_doc[] = "\n\
81Returns the number of bits of the key\n\
82\n\
Jean-Paul Calderone54bcc832009-05-27 14:06:48 -040083@return: The number of bits of the key.\n\
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050084";
85
86static PyObject *
87crypto_PKey_bits(crypto_PKeyObj *self, PyObject *args)
88{
89 if (!PyArg_ParseTuple(args, ":bits"))
90 return NULL;
91
Jean-Paul Calderone2f6c66f2010-08-11 19:53:43 -040092 return PyLong_FromLong(EVP_PKEY_bits(self->pkey));
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050093}
94
95static char crypto_PKey_type_doc[] = "\n\
96Returns the type of the key\n\
97\n\
Jean-Paul Calderone54bcc832009-05-27 14:06:48 -040098@return: The type of the key.\n\
Jean-Paul Calderone897bc252008-02-18 20:50:23 -050099";
100
101static PyObject *
102crypto_PKey_type(crypto_PKeyObj *self, PyObject *args)
103{
104 if (!PyArg_ParseTuple(args, ":type"))
105 return NULL;
106
Jean-Paul Calderone2f6c66f2010-08-11 19:53:43 -0400107 return PyLong_FromLong(self->pkey->type);
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500108}
109
Jean-Paul Calderone8e6ce972009-05-13 12:32:49 -0400110static char crypto_PKey_check_doc[] = "\n\
111Check the consistency of an RSA private key.\n\
112\n\
113Arguments: self - The PKey object\n\
114 args - The Python argument tuple, should be empty\n\
115Returns: True if key is consistent. False if not.\n\
116";
117
118static PyObject *
119crypto_PKey_check(crypto_PKeyObj *self, PyObject *args)
120{
121 int r;
122 EVP_PKEY *pkey;
123
124 if (!PyArg_ParseTuple(args, ":check"))
125 return NULL;
Jean-Paul Calderone8e6ce972009-05-13 12:32:49 -0400126
Jean-Paul Calderonede207e72009-05-13 14:19:05 -0400127 if(self->pkey->type == EVP_PKEY_RSA) {
Jean-Paul Calderone8e6ce972009-05-13 12:32:49 -0400128 RSA *rsa;
Jean-Paul Calderonede207e72009-05-13 14:19:05 -0400129 rsa = EVP_PKEY_get1_RSA(self->pkey);
Jean-Paul Calderone8e6ce972009-05-13 12:32:49 -0400130 r = RSA_check_key(rsa);
131 if (r == 1)
132 return PyInt_FromLong(1L);
133 else
134 return PyInt_FromLong(0L);
135 } else {
136 PyErr_SetString( PyExc_TypeError, "key type unsupported");
137 return NULL;
138 }
139}
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500140
141/*
142 * ADD_METHOD(name) expands to a correct PyMethodDef declaration
143 * { 'name', (PyCFunction)crypto_PKey_name, METH_VARARGS }
144 * for convenience
145 */
146#define ADD_METHOD(name) \
147 { #name, (PyCFunction)crypto_PKey_##name, METH_VARARGS, crypto_PKey_##name##_doc }
148static PyMethodDef crypto_PKey_methods[] =
149{
150 ADD_METHOD(generate_key),
151 ADD_METHOD(bits),
152 ADD_METHOD(type),
Jean-Paul Calderone8e6ce972009-05-13 12:32:49 -0400153 ADD_METHOD(check),
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500154 { NULL, NULL }
155};
156#undef ADD_METHOD
157
158
159/*
160 * Constructor for PKey objects, never called by Python code directly
161 *
162 * Arguments: pkey - A "real" EVP_PKEY object
163 * dealloc - Boolean value to specify whether the destructor should
164 * free the "real" EVP_PKEY object
165 * Returns: The newly created PKey object
166 */
167crypto_PKeyObj *
168crypto_PKey_New(EVP_PKEY *pkey, int dealloc)
169{
170 crypto_PKeyObj *self;
171
172 self = PyObject_New(crypto_PKeyObj, &crypto_PKey_Type);
173
174 if (self == NULL)
175 return NULL;
176
177 self->pkey = pkey;
178 self->dealloc = dealloc;
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400179 self->only_public = 0;
180
181 /*
182 * Heuristic. Most call-sites pass an initialized EVP_PKEY. Not
183 * necessarily the case that they will, though. That's part of why this is
184 * a hack. -exarkun
185 */
186 self->initialized = 1;
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500187
188 return self;
189}
190
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400191static char crypto_PKey_doc[] = "\n\
192PKey() -> PKey instance\n\
193\n\
194Create a new PKey object.\n\
195\n\
196@return: The PKey object\n\
197";
198static PyObject*
199crypto_PKey_new(PyTypeObject *subtype, PyObject *args, PyObject *kwargs) {
200 crypto_PKeyObj *self;
201
202 if (!PyArg_ParseTuple(args, ":PKey")) {
203 return NULL;
204 }
205
206 self = crypto_PKey_New(EVP_PKEY_new(), 1);
207 if (self) {
208 self->initialized = 0;
209 }
210
211 return (PyObject *)self;
212}
213
214
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500215/*
216 * Deallocate the memory used by the PKey object
217 *
218 * Arguments: self - The PKey object
219 * Returns: None
220 */
221static void
222crypto_PKey_dealloc(crypto_PKeyObj *self)
223{
224 /* Sometimes we don't have to dealloc the "real" EVP_PKEY pointer ourselves */
225 if (self->dealloc)
226 EVP_PKEY_free(self->pkey);
227
228 PyObject_Del(self);
229}
230
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500231PyTypeObject crypto_PKey_Type = {
Jean-Paul Calderone3fe7f672010-08-11 23:55:10 -0400232 PyOpenSSL_HEAD_INIT(&PyType_Type, 0)
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400233 "OpenSSL.crypto.PKey",
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500234 sizeof(crypto_PKeyObj),
235 0,
236 (destructor)crypto_PKey_dealloc,
237 NULL, /* print */
Jean-Paul Calderone2f6c66f2010-08-11 19:53:43 -0400238 NULL, /* getattr */
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500239 NULL, /* setattr */
240 NULL, /* compare */
241 NULL, /* repr */
242 NULL, /* as_number */
243 NULL, /* as_sequence */
244 NULL, /* as_mapping */
245 NULL, /* hash */
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400246 NULL, /* call */
247 NULL, /* str */
248 NULL, /* getattro */
249 NULL, /* setattro */
250 NULL, /* as_buffer */
Jean-Paul Calderone09654fe2009-06-27 10:54:48 -0400251 Py_TPFLAGS_DEFAULT,
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400252 crypto_PKey_doc, /* doc */
253 NULL, /* traverse */
254 NULL, /* clear */
255 NULL, /* tp_richcompare */
256 0, /* tp_weaklistoffset */
257 NULL, /* tp_iter */
258 NULL, /* tp_iternext */
259 crypto_PKey_methods, /* tp_methods */
260 NULL, /* tp_members */
261 NULL, /* tp_getset */
262 NULL, /* tp_base */
263 NULL, /* tp_dict */
264 NULL, /* tp_descr_get */
265 NULL, /* tp_descr_set */
266 0, /* tp_dictoffset */
267 NULL, /* tp_init */
268 NULL, /* tp_alloc */
269 crypto_PKey_new, /* tp_new */
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500270};
271
272
273/*
274 * Initialize the PKey part of the crypto sub module
275 *
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400276 * Arguments: module - The crypto module
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500277 * Returns: None
278 */
279int
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400280init_crypto_pkey(PyObject *module)
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500281{
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400282 if (PyType_Ready(&crypto_PKey_Type) < 0) {
283 return 0;
284 }
285
Jean-Paul Calderone86ad7112010-05-11 16:08:45 -0400286 /* PyModule_AddObject steals a reference.
287 */
288 Py_INCREF((PyObject *)&crypto_PKey_Type);
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400289 if (PyModule_AddObject(module, "PKey", (PyObject *)&crypto_PKey_Type) != 0) {
290 return 0;
291 }
292
Jean-Paul Calderoneaed23582011-03-12 22:45:02 -0500293 /* PyModule_AddObject steals a reference.
294 */
295 Py_INCREF((PyObject *)&crypto_PKey_Type);
Jean-Paul Calderone2e1da572009-06-27 10:44:00 -0400296 if (PyModule_AddObject(module, "PKeyType", (PyObject *)&crypto_PKey_Type) != 0) {
297 return 0;
298 }
299
Jean-Paul Calderone897bc252008-02-18 20:50:23 -0500300 return 1;
301}
302