#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
#if !defined(WOLFSSL_SSL_API_PK_INCLUDED)
#ifndef WOLFSSL_IGNORE_FILE_WARN
#warning ssl_api_pk.c is not compiled separately from ssl.c
#endif
#else
#ifndef NO_CERTS
#ifndef NO_CHECK_PRIVATE_KEY
#ifdef WOLF_PRIVATE_KEY_ID
static int check_cert_key_dev(word32 keyOID, byte* privKey, word32 privSz,
const byte* pubKey, word32 pubSz, int label, int id, void* heap, int devId)
{
int ret = 0;
int type = 0;
void *pkey = NULL;
if (privKey == NULL) {
ret = MISSING_KEY;
}
else {
switch (keyOID) {
#ifndef NO_RSA
case RSAk:
#ifdef WC_RSA_PSS
case RSAPSSk:
#endif
type = DYNAMIC_TYPE_RSA;
break;
#endif
#ifdef HAVE_ECC
case ECDSAk:
type = DYNAMIC_TYPE_ECC;
break;
#endif
#if defined(HAVE_DILITHIUM)
case ML_DSA_LEVEL2k:
case ML_DSA_LEVEL3k:
case ML_DSA_LEVEL5k:
#ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
case DILITHIUM_LEVEL2k:
case DILITHIUM_LEVEL3k:
case DILITHIUM_LEVEL5k:
#endif
type = DYNAMIC_TYPE_DILITHIUM;
break;
#endif
#if defined(HAVE_FALCON)
case FALCON_LEVEL1k:
case FALCON_LEVEL5k:
type = DYNAMIC_TYPE_FALCON;
break;
#endif
}
ret = CreateDevPrivateKey(&pkey, privKey, privSz, type, label, id, heap,
devId);
}
#ifdef WOLF_CRYPTO_CB
if (ret == 0) {
switch (keyOID) {
#ifndef NO_RSA
case RSAk:
#ifdef WC_RSA_PSS
case RSAPSSk:
#endif
ret = wc_CryptoCb_RsaCheckPrivKey((RsaKey*)pkey, pubKey, pubSz);
break;
#endif
#ifdef HAVE_ECC
case ECDSAk:
ret = wc_CryptoCb_EccCheckPrivKey((ecc_key*)pkey, pubKey,
pubSz);
break;
#endif
#if defined(HAVE_DILITHIUM)
case ML_DSA_LEVEL2k:
case ML_DSA_LEVEL3k:
case ML_DSA_LEVEL5k:
#ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
case DILITHIUM_LEVEL2k:
case DILITHIUM_LEVEL3k:
case DILITHIUM_LEVEL5k:
#endif
ret = wc_CryptoCb_PqcSignatureCheckPrivKey(pkey,
WC_PQC_SIG_TYPE_DILITHIUM, pubKey, pubSz);
break;
#endif
#if defined(HAVE_FALCON)
case FALCON_LEVEL1k:
case FALCON_LEVEL5k:
ret = wc_CryptoCb_PqcSignatureCheckPrivKey(pkey,
WC_PQC_SIG_TYPE_FALCON, pubKey, pubSz);
break;
#endif
default:
ret = 0;
}
}
#else
(void) pubKey;
(void) pubSz;
#endif
switch (keyOID) {
#ifndef NO_RSA
case RSAk:
#ifdef WC_RSA_PSS
case RSAPSSk:
#endif
wc_FreeRsaKey((RsaKey*)pkey);
break;
#endif
#ifdef HAVE_ECC
case ECDSAk:
wc_ecc_free((ecc_key*)pkey);
break;
#endif
#if defined(HAVE_DILITHIUM)
case ML_DSA_LEVEL2k:
case ML_DSA_LEVEL3k:
case ML_DSA_LEVEL5k:
#ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
case DILITHIUM_LEVEL2k:
case DILITHIUM_LEVEL3k:
case DILITHIUM_LEVEL5k:
#endif
wc_dilithium_free((dilithium_key*)pkey);
break;
#endif
#if defined(HAVE_FALCON)
case FALCON_LEVEL1k:
case FALCON_LEVEL5k:
wc_falcon_free((falcon_key*)pkey);
break;
#endif
default:
WC_DO_NOTHING;
}
XFREE(pkey, heap, type);
return ret;
}
#endif
static int check_cert_key(const DerBuffer* cert, const DerBuffer* key,
const DerBuffer* altKey, void* heap, int devId, int isKeyLabel, int isKeyId,
int altDevId, int isAltKeyLabel, int isAltKeyId)
{
WC_DECLARE_VAR(der, DecodedCert, 1, 0);
word32 size;
byte* buff;
int ret = 1;
WOLFSSL_ENTER("check_cert_key");
if ((cert == NULL) || (key == NULL)) {
return 0;
}
if (ret == 1) {
WC_ALLOC_VAR_EX(der, DecodedCert, 1, heap, DYNAMIC_TYPE_DCERT,
return MEMORY_E);
}
if (ret == 1) {
InitDecodedCert_ex(der, cert->buffer, cert->length, heap, devId);
if (ParseCertRelative(der, CERT_TYPE, NO_VERIFY, NULL, NULL) != 0) {
ret = 0;
}
}
if (ret == 1) {
buff = key->buffer;
size = key->length;
#ifdef WOLF_PRIVATE_KEY_ID
if (devId != INVALID_DEVID) {
ret = check_cert_key_dev(der->keyOID, buff, size, der->publicKey,
der->pubKeySize, isKeyLabel, isKeyId, heap, devId);
if (ret != WC_NO_ERR_TRACE(CRYPTOCB_UNAVAILABLE)) {
ret = (ret == 0) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
}
}
else {
ret = CRYPTOCB_UNAVAILABLE;
}
if (ret == WC_NO_ERR_TRACE(CRYPTOCB_UNAVAILABLE))
#endif
{
ret = wc_CheckPrivateKeyCert(buff, size, der, 0, heap);
if (ret != 1) {
ret = 0;
}
}
#ifdef WOLFSSL_DUAL_ALG_CERTS
if ((ret == 1) && der->extSapkiSet && (der->sapkiDer != NULL)) {
if (altKey == NULL) {
ret = MISSING_KEY;
buff = NULL;
size = 0;
}
else {
size = altKey->length;
buff = altKey->buffer;
}
#ifdef WOLF_PRIVATE_KEY_ID
if (altDevId != INVALID_DEVID) {
word32 pubKeyLen = MAX_PUBLIC_KEY_SZ;
byte* decodedPubKey = (byte*)XMALLOC(pubKeyLen, heap,
DYNAMIC_TYPE_PUBLIC_KEY);
if (decodedPubKey == NULL) {
ret = MEMORY_E;
}
if (ret == WOLFSSL_SUCCESS) {
if ((der->sapkiOID == RSAk) || (der->sapkiOID == ECDSAk)) {
XMEMCPY(decodedPubKey, der->sapkiDer, der->sapkiLen);
pubKeyLen = der->sapkiLen;
ret = 0;
}
else {
#if defined(WC_ENABLE_ASYM_KEY_IMPORT)
word32 idx = 0;
ret = DecodeAsymKeyPublic(der->sapkiDer, &idx,
der->sapkiLen, decodedPubKey,
&pubKeyLen, der->sapkiOID);
#else
ret = NOT_COMPILED_IN;
#endif
}
}
if (ret == 0) {
ret = check_cert_key_dev(der->sapkiOID, buff, size,
decodedPubKey, pubKeyLen, isAltKeyLabel, isAltKeyId,
heap, altDevId);
}
XFREE(decodedPubKey, heap, DYNAMIC_TYPE_PUBLIC_KEY);
if (ret != WC_NO_ERR_TRACE(CRYPTOCB_UNAVAILABLE)) {
ret = (ret == 0) ? 1: 0;
}
}
else {
ret = CRYPTOCB_UNAVAILABLE;
}
if (ret == WC_NO_ERR_TRACE(CRYPTOCB_UNAVAILABLE))
#else
if (ret == 1)
#endif
{
ret = wc_CheckPrivateKeyCert(buff, size, der, 1, heap);
if (ret != 1) {
ret = 0;
}
}
}
#endif
}
FreeDecodedCert(der);
WC_FREE_VAR_EX(der, heap, DYNAMIC_TYPE_DCERT);
(void)devId;
(void)isKeyLabel;
(void)isKeyId;
(void)altKey;
(void)altDevId;
(void)isAltKeyLabel;
(void)isAltKeyId;
return ret;
}
int wolfSSL_CTX_check_private_key(const WOLFSSL_CTX* ctx)
{
int res = 1;
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
DerBuffer *privateKey;
#ifdef WOLFSSL_DUAL_ALG_CERTS
DerBuffer *altPrivateKey;
#endif
#else
const DerBuffer *privateKey;
#ifdef WOLFSSL_DUAL_ALG_CERTS
const DerBuffer *altPrivateKey;
#endif
#endif
if (ctx == NULL) {
res = 0;
}
else {
#ifdef WOLFSSL_DUAL_ALG_CERTS
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
privateKey = wolfssl_priv_der_unblind(ctx->privateKey,
ctx->privateKeyMask);
if (privateKey == NULL) {
res = 0;
}
if (ctx->altPrivateKey != NULL) {
altPrivateKey = wolfssl_priv_der_unblind(ctx->altPrivateKey,
ctx->altPrivateKeyMask);
if (altPrivateKey == NULL) {
res = 0;
}
}
else {
altPrivateKey = NULL;
}
#else
privateKey = ctx->privateKey;
altPrivateKey = ctx->altPrivateKey;
#endif
if (res == 1) {
res = check_cert_key(ctx->certificate, privateKey, altPrivateKey,
ctx->heap, ctx->privateKeyDevId, ctx->privateKeyLabel,
ctx->privateKeyId, ctx->altPrivateKeyDevId,
ctx->altPrivateKeyLabel, ctx->altPrivateKeyId) != 0;
}
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
wolfssl_priv_der_unblind_free(privateKey);
wolfssl_priv_der_unblind_free(altPrivateKey);
#endif
#else
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
privateKey = wolfssl_priv_der_unblind(ctx->privateKey,
ctx->privateKeyMask);
if (privateKey == NULL) {
res = 0;
}
#else
privateKey = ctx->privateKey;
#endif
if (res == WOLFSSL_SUCCESS) {
res = check_cert_key(ctx->certificate, privateKey, NULL, ctx->heap,
ctx->privateKeyDevId, ctx->privateKeyLabel, ctx->privateKeyId,
INVALID_DEVID, 0, 0);
}
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
wolfssl_priv_der_unblind_free(privateKey);
#endif
#endif
}
if (res != 1) {
WOLFSSL_ERROR(WC_KEY_MISMATCH_E);
}
return res;
}
#ifdef OPENSSL_EXTRA
int wolfSSL_check_private_key(const WOLFSSL* ssl)
{
int res = 1;
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
DerBuffer *privateKey;
#ifdef WOLFSSL_DUAL_ALG_CERTS
DerBuffer *altPrivateKey;
#endif
#else
const DerBuffer *privateKey;
#ifdef WOLFSSL_DUAL_ALG_CERTS
const DerBuffer *altPrivateKey;
#endif
#endif
if (ssl == NULL) {
res = 0;
}
else {
#ifdef WOLFSSL_DUAL_ALG_CERTS
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
privateKey = wolfssl_priv_der_unblind(ssl->buffers.key,
ssl->buffers.keyMask);
if (privateKey == NULL) {
res = 0;
}
if (ssl->buffers.altKey != NULL) {
altPrivateKey = wolfssl_priv_der_unblind(ssl->buffers.altKey,
ssl->buffers.altKeyMask);
if (altPrivateKey == NULL) {
res = 0;
}
}
else {
altPrivateKey = NULL;
}
#else
privateKey = ssl->buffers.key;
altPrivateKey = ssl->buffers.altKey;
#endif
if (res == 1) {
res = check_cert_key(ssl->buffers.certificate, privateKey,
altPrivateKey, ssl->heap, ssl->buffers.keyDevId,
ssl->buffers.keyLabel, ssl->buffers.keyId,
ssl->buffers.altKeyDevId, ssl->buffers.altKeyLabel,
ssl->buffers.altKeyId);
}
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
wolfssl_priv_der_unblind_free(privateKey);
wolfssl_priv_der_unblind_free(altPrivateKey);
#endif
#else
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
privateKey = wolfssl_priv_der_unblind(ssl->buffers.key,
ssl->buffers.keyMask);
if (privateKey == NULL) {
res = 0;
}
#else
privateKey = ssl->buffers.key;
#endif
if (res == 1) {
res = check_cert_key(ssl->buffers.certificate, privateKey, NULL,
ssl->heap, ssl->buffers.keyDevId, ssl->buffers.keyLabel,
ssl->buffers.keyId, INVALID_DEVID, 0, 0);
}
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
wolfssl_priv_der_unblind_free(privateKey);
#endif
#endif
}
return res;
}
#endif
#endif
#ifdef OPENSSL_ALL
WOLFSSL_EVP_PKEY* wolfSSL_CTX_get0_privatekey(const WOLFSSL_CTX* ctx)
{
WOLFSSL_EVP_PKEY* res = NULL;
const unsigned char *key;
int type = WC_EVP_PKEY_NONE;
WOLFSSL_ENTER("wolfSSL_CTX_get0_privatekey");
if ((ctx == NULL) || (ctx->privateKey == NULL) ||
(ctx->privateKey->buffer == NULL)) {
WOLFSSL_MSG("Bad parameter or key not set");
}
else {
switch (ctx->privateKeyType) {
#ifndef NO_RSA
case rsa_sa_algo:
type = WC_EVP_PKEY_RSA;
break;
#endif
#ifdef HAVE_ECC
case ecc_dsa_sa_algo:
type = WC_EVP_PKEY_EC;
break;
#endif
#ifdef WOLFSSL_SM2
case sm2_sa_algo:
type = WC_EVP_PKEY_EC;
break;
#endif
default:
WOLFSSL_MSG("Unsupported key type");
}
}
if (type != WC_EVP_PKEY_NONE) {
if (ctx->privateKeyPKey != NULL) {
res = ctx->privateKeyPKey;
}
else {
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
DerBuffer* unblinded_privateKey = wolfssl_priv_der_unblind(
ctx->privateKey, ctx->privateKeyMask);
if (unblinded_privateKey != NULL) {
key = unblinded_privateKey->buffer;
}
else {
key = NULL;
}
#else
key = ctx->privateKey->buffer;
#endif
if (key != NULL) {
res = wolfSSL_d2i_PrivateKey(type, NULL, &key,
(long)ctx->privateKey->length);
#ifdef WOLFSSL_BLIND_PRIVATE_KEY
wolfssl_priv_der_unblind_free(unblinded_privateKey);
#endif
}
if (res != NULL) {
#ifdef WOLFSSL_ATOMIC_OPS
WOLFSSL_EVP_PKEY *current_pkey = NULL;
if (!wolfSSL_Atomic_Ptr_CompareExchange(
(void * volatile *)&ctx->privateKeyPKey,
(void **)¤t_pkey, res)) {
wolfSSL_EVP_PKEY_free(res);
res = current_pkey;
}
#else
((WOLFSSL_CTX *)ctx)->privateKeyPKey = res;
#endif
}
}
}
return res;
}
#endif
#ifdef HAVE_ECC
int wolfSSL_CTX_SetTmpEC_DHE_Sz(WOLFSSL_CTX* ctx, word16 sz)
{
int ret = 0;
WOLFSSL_ENTER("wolfSSL_CTX_SetTmpEC_DHE_Sz");
if (ctx == NULL) {
ret = BAD_FUNC_ARG;
}
else if (sz == 0) {
if (ctx->privateKeyType != ecc_dsa_sa_algo) {
ret = 1;
}
else if (ctx->privateKeySz == 0) {
WOLFSSL_MSG("Must set private key/cert first");
ret = BAD_FUNC_ARG;
}
else {
sz = (word16)ctx->privateKeySz;
}
}
if (ret == 0) {
#if ECC_MIN_KEY_SZ > 0
if (sz < ECC_MINSIZE) {
ret = BAD_FUNC_ARG;
}
else
#endif
if (sz > ECC_MAXSIZE) {
ret = BAD_FUNC_ARG;
}
else {
ctx->eccTempKeySz = sz;
ret = 1;
}
}
return ret;
}
int wolfSSL_SetTmpEC_DHE_Sz(WOLFSSL* ssl, word16 sz)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_SetTmpEC_DHE_Sz");
if (ssl == NULL) {
ret = BAD_FUNC_ARG;
}
#if ECC_MIN_KEY_SZ > 0
else if (sz < ECC_MINSIZE) {
ret = BAD_FUNC_ARG;
}
#endif
else if (sz > ECC_MAXSIZE) {
ret = BAD_FUNC_ARG;
}
else {
ssl->eccTempKeySz = sz;
}
return ret;
}
#endif
#ifdef HAVE_PK_CALLBACKS
#ifdef HAVE_ECC
void wolfSSL_CTX_SetEccKeyGenCb(WOLFSSL_CTX* ctx, CallbackEccKeyGen cb)
{
if (ctx != NULL) {
ctx->EccKeyGenCb = cb;
}
}
void wolfSSL_SetEccKeyGenCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->EccKeyGenCtx = ctx;
}
}
void* wolfSSL_GetEccKeyGenCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->EccKeyGenCtx;
}
return ret;
}
void wolfSSL_CTX_SetEccSignCtx(WOLFSSL_CTX* ctx, void *userCtx)
{
if (ctx != NULL) {
ctx->EccSignCtx = userCtx;
}
}
void* wolfSSL_CTX_GetEccSignCtx(WOLFSSL_CTX* ctx)
{
void* ret;
if (ctx == NULL) {
ret = NULL;
}
else {
ret = ctx->EccSignCtx;
}
return ret;
}
WOLFSSL_ABI void wolfSSL_CTX_SetEccSignCb(WOLFSSL_CTX* ctx, CallbackEccSign cb)
{
if (ctx != NULL) {
ctx->EccSignCb = cb;
}
}
void wolfSSL_SetEccSignCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->EccSignCtx = ctx;
}
}
void* wolfSSL_GetEccSignCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->EccSignCtx;
}
return ret;
}
void wolfSSL_CTX_SetEccVerifyCb(WOLFSSL_CTX* ctx, CallbackEccVerify cb)
{
if (ctx != NULL) {
ctx->EccVerifyCb = cb;
}
}
void wolfSSL_SetEccVerifyCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->EccVerifyCtx = ctx;
}
}
void* wolfSSL_GetEccVerifyCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->EccVerifyCtx;
}
return ret;
}
void wolfSSL_CTX_SetEccSharedSecretCb(WOLFSSL_CTX* ctx,
CallbackEccSharedSecret cb)
{
if (ctx != NULL) {
ctx->EccSharedSecretCb = cb;
}
}
void wolfSSL_SetEccSharedSecretCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->EccSharedSecretCtx = ctx;
}
}
void* wolfSSL_GetEccSharedSecretCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->EccSharedSecretCtx;
}
return ret;
}
#endif
#ifdef HAVE_ED25519
void wolfSSL_CTX_SetEd25519SignCb(WOLFSSL_CTX* ctx, CallbackEd25519Sign cb)
{
if (ctx != NULL) {
ctx->Ed25519SignCb = cb;
}
}
void wolfSSL_SetEd25519SignCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->Ed25519SignCtx = ctx;
}
}
void* wolfSSL_GetEd25519SignCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->Ed25519SignCtx;
}
return ret;
}
void wolfSSL_CTX_SetEd25519VerifyCb(WOLFSSL_CTX* ctx, CallbackEd25519Verify cb)
{
if (ctx != NULL) {
ctx->Ed25519VerifyCb = cb;
}
}
void wolfSSL_SetEd25519VerifyCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->Ed25519VerifyCtx = ctx;
}
}
void* wolfSSL_GetEd25519VerifyCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->Ed25519VerifyCtx;
}
return ret;
}
#endif
#ifdef HAVE_CURVE25519
void wolfSSL_CTX_SetX25519KeyGenCb(WOLFSSL_CTX* ctx, CallbackX25519KeyGen cb)
{
if (ctx != NULL) {
ctx->X25519KeyGenCb = cb;
}
}
void wolfSSL_SetX25519KeyGenCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->X25519KeyGenCtx = ctx;
}
}
void* wolfSSL_GetX25519KeyGenCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->X25519KeyGenCtx;
}
return ret;
}
void wolfSSL_CTX_SetX25519SharedSecretCb(WOLFSSL_CTX* ctx,
CallbackX25519SharedSecret cb)
{
if (ctx != NULL) {
ctx->X25519SharedSecretCb = cb;
}
}
void wolfSSL_SetX25519SharedSecretCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->X25519SharedSecretCtx = ctx;
}
}
void* wolfSSL_GetX25519SharedSecretCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->X25519SharedSecretCtx;
}
return ret;
}
#endif
#ifdef HAVE_ED448
void wolfSSL_CTX_SetEd448SignCb(WOLFSSL_CTX* ctx, CallbackEd448Sign cb)
{
if (ctx != NULL) {
ctx->Ed448SignCb = cb;
}
}
void wolfSSL_SetEd448SignCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->Ed448SignCtx = ctx;
}
}
void* wolfSSL_GetEd448SignCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->Ed448SignCtx;
}
return ret;
}
void wolfSSL_CTX_SetEd448VerifyCb(WOLFSSL_CTX* ctx, CallbackEd448Verify cb)
{
if (ctx != NULL) {
ctx->Ed448VerifyCb = cb;
}
}
void wolfSSL_SetEd448VerifyCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->Ed448VerifyCtx = ctx;
}
}
void* wolfSSL_GetEd448VerifyCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->Ed448VerifyCtx;
}
return ret;
}
#endif
#ifdef HAVE_CURVE448
void wolfSSL_CTX_SetX448KeyGenCb(WOLFSSL_CTX* ctx,
CallbackX448KeyGen cb)
{
if (ctx != NULL) {
ctx->X448KeyGenCb = cb;
}
}
void wolfSSL_SetX448KeyGenCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->X448KeyGenCtx = ctx;
}
}
void* wolfSSL_GetX448KeyGenCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->X448KeyGenCtx;
}
return ret;
}
void wolfSSL_CTX_SetX448SharedSecretCb(WOLFSSL_CTX* ctx,
CallbackX448SharedSecret cb)
{
if (ctx != NULL) {
ctx->X448SharedSecretCb = cb;
}
}
void wolfSSL_SetX448SharedSecretCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->X448SharedSecretCtx = ctx;
}
}
void* wolfSSL_GetX448SharedSecretCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->X448SharedSecretCtx;
}
return ret;
}
#endif
#ifndef NO_RSA
void wolfSSL_CTX_SetRsaSignCb(WOLFSSL_CTX* ctx, CallbackRsaSign cb)
{
if (ctx != NULL) {
ctx->RsaSignCb = cb;
}
}
void wolfSSL_CTX_SetRsaSignCheckCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb)
{
if (ctx != NULL) {
ctx->RsaSignCheckCb = cb;
}
}
void wolfSSL_SetRsaSignCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaSignCtx = ctx;
}
}
void* wolfSSL_GetRsaSignCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaSignCtx;
}
return ret;
}
void wolfSSL_CTX_SetRsaVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb)
{
if (ctx != NULL) {
ctx->RsaVerifyCb = cb;
}
}
void wolfSSL_SetRsaVerifyCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaVerifyCtx = ctx;
}
}
void* wolfSSL_GetRsaVerifyCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaVerifyCtx;
}
return ret;
}
#ifdef WC_RSA_PSS
void wolfSSL_CTX_SetRsaPssSignCb(WOLFSSL_CTX* ctx, CallbackRsaPssSign cb)
{
if (ctx != NULL) {
ctx->RsaPssSignCb = cb;
}
}
void wolfSSL_CTX_SetRsaPssSignCheckCb(WOLFSSL_CTX* ctx,
CallbackRsaPssVerify cb)
{
if (ctx != NULL) {
ctx->RsaPssSignCheckCb = cb;
}
}
void wolfSSL_SetRsaPssSignCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaPssSignCtx = ctx;
}
}
void* wolfSSL_GetRsaPssSignCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaPssSignCtx;
}
return ret;
}
void wolfSSL_CTX_SetRsaPssVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaPssVerify cb)
{
if (ctx != NULL) {
ctx->RsaPssVerifyCb = cb;
}
}
void wolfSSL_SetRsaPssVerifyCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaPssVerifyCtx = ctx;
}
}
void* wolfSSL_GetRsaPssVerifyCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaPssVerifyCtx;
}
return ret;
}
#endif
void wolfSSL_CTX_SetRsaEncCb(WOLFSSL_CTX* ctx, CallbackRsaEnc cb)
{
if (ctx != NULL) {
ctx->RsaEncCb = cb;
}
}
void wolfSSL_SetRsaEncCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaEncCtx = ctx;
}
}
void* wolfSSL_GetRsaEncCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaEncCtx;
}
return ret;
}
void wolfSSL_CTX_SetRsaDecCb(WOLFSSL_CTX* ctx, CallbackRsaDec cb)
{
if (ctx != NULL) {
ctx->RsaDecCb = cb;
}
}
void wolfSSL_SetRsaDecCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->RsaDecCtx = ctx;
}
}
void* wolfSSL_GetRsaDecCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->RsaDecCtx;
}
return ret;
}
#endif
#endif
#endif
#if defined(HAVE_PK_CALLBACKS) && !defined(NO_DH)
void wolfSSL_CTX_SetDhGenerateKeyPair(WOLFSSL_CTX* ctx,
CallbackDhGenerateKeyPair cb)
{
if (ctx != NULL) {
ctx->DhGenerateKeyPairCb = cb;
}
}
void wolfSSL_CTX_SetDhAgreeCb(WOLFSSL_CTX* ctx, CallbackDhAgree cb)
{
if (ctx != NULL) {
ctx->DhAgreeCb = cb;
}
}
void wolfSSL_SetDhAgreeCtx(WOLFSSL* ssl, void *ctx)
{
if (ssl != NULL) {
ssl->DhAgreeCtx = ctx;
}
}
void* wolfSSL_GetDhAgreeCtx(WOLFSSL* ssl)
{
void* ret;
if (ssl == NULL) {
ret = NULL;
}
else {
ret = ssl->DhAgreeCtx;
}
return ret;
}
#endif
#endif