mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-22 18:19:42 +00:00
This commit converts the license handling to adhere to the REUSE specification. It specifically: 1. Adds used licnses to LICENSES/ directory 2. Add "isc" template for adding the copyright boilerplate 3. Changes all source files to include copyright and SPDX license header, this includes all the C sources, documentation, zone files, configuration files. There are notes in the doc/dev/copyrights file on how to add correct headers to the new files. 4. Handle the rest that can't be modified via .reuse/dep5 file. The binary (or otherwise unmodifiable) files could have license places next to them in <foo>.license file, but this would lead to cluttered repository and most of the files handled in the .reuse/dep5 file are system test files.
253 lines
4.7 KiB
C
253 lines
4.7 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
#include "openssl_shim.h"
|
|
|
|
#if !HAVE_RSA_SET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
/* From OpenSSL 1.1.0 */
|
|
int
|
|
RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) {
|
|
/*
|
|
* If the fields n and e in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL for n and e. d may be
|
|
* left NULL (in case only the public key is used).
|
|
*/
|
|
if ((r->n == NULL && n == NULL) || (r->e == NULL && e == NULL)) {
|
|
return (0);
|
|
}
|
|
|
|
if (n != NULL) {
|
|
BN_free(r->n);
|
|
r->n = n;
|
|
}
|
|
if (e != NULL) {
|
|
BN_free(r->e);
|
|
r->e = e;
|
|
}
|
|
if (d != NULL) {
|
|
BN_clear_free(r->d);
|
|
r->d = d;
|
|
}
|
|
|
|
return (1);
|
|
}
|
|
|
|
int
|
|
RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q) {
|
|
/*
|
|
* If the fields p and q in r are NULL, the corresponding input
|
|
* parameters MUST be non-NULL.
|
|
*/
|
|
if ((r->p == NULL && p == NULL) || (r->q == NULL && q == NULL)) {
|
|
return (0);
|
|
}
|
|
|
|
if (p != NULL) {
|
|
BN_clear_free(r->p);
|
|
r->p = p;
|
|
}
|
|
if (q != NULL) {
|
|
BN_clear_free(r->q);
|
|
r->q = q;
|
|
}
|
|
|
|
return (1);
|
|
}
|
|
|
|
int
|
|
RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp) {
|
|
/*
|
|
* If the fields dmp1, dmq1 and iqmp in r are NULL, the
|
|
* corresponding input parameters MUST be non-NULL.
|
|
*/
|
|
if ((r->dmp1 == NULL && dmp1 == NULL) ||
|
|
(r->dmq1 == NULL && dmq1 == NULL) ||
|
|
(r->iqmp == NULL && iqmp == NULL))
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
if (dmp1 != NULL) {
|
|
BN_clear_free(r->dmp1);
|
|
r->dmp1 = dmp1;
|
|
}
|
|
if (dmq1 != NULL) {
|
|
BN_clear_free(r->dmq1);
|
|
r->dmq1 = dmq1;
|
|
}
|
|
if (iqmp != NULL) {
|
|
BN_clear_free(r->iqmp);
|
|
r->iqmp = iqmp;
|
|
}
|
|
|
|
return (1);
|
|
}
|
|
|
|
void
|
|
RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e,
|
|
const BIGNUM **d) {
|
|
if (n != NULL) {
|
|
*n = r->n;
|
|
}
|
|
if (e != NULL) {
|
|
*e = r->e;
|
|
}
|
|
if (d != NULL) {
|
|
*d = r->d;
|
|
}
|
|
}
|
|
|
|
void
|
|
RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q) {
|
|
if (p != NULL) {
|
|
*p = r->p;
|
|
}
|
|
if (q != NULL) {
|
|
*q = r->q;
|
|
}
|
|
}
|
|
|
|
void
|
|
RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1,
|
|
const BIGNUM **iqmp) {
|
|
if (dmp1 != NULL) {
|
|
*dmp1 = r->dmp1;
|
|
}
|
|
if (dmq1 != NULL) {
|
|
*dmq1 = r->dmq1;
|
|
}
|
|
if (iqmp != NULL) {
|
|
*iqmp = r->iqmp;
|
|
}
|
|
}
|
|
|
|
int
|
|
RSA_test_flags(const RSA *r, int flags) {
|
|
return (r->flags & flags);
|
|
}
|
|
#endif /* !HAVE_RSA_SET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L */
|
|
|
|
#if !HAVE_ECDSA_SIG_GET0
|
|
/* From OpenSSL 1.1 */
|
|
void
|
|
ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps) {
|
|
if (pr != NULL) {
|
|
*pr = sig->r;
|
|
}
|
|
if (ps != NULL) {
|
|
*ps = sig->s;
|
|
}
|
|
}
|
|
|
|
int
|
|
ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s) {
|
|
if (r == NULL || s == NULL) {
|
|
return (0);
|
|
}
|
|
|
|
BN_clear_free(sig->r);
|
|
BN_clear_free(sig->s);
|
|
sig->r = r;
|
|
sig->s = s;
|
|
|
|
return (1);
|
|
}
|
|
#endif /* !HAVE_ECDSA_SIG_GET0 */
|
|
|
|
#if !HAVE_DH_GET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
/*
|
|
* DH_get0_key, DH_set0_key, DH_get0_pqg and DH_set0_pqg
|
|
* are from OpenSSL 1.1.0.
|
|
*/
|
|
void
|
|
DH_get0_key(const DH *dh, const BIGNUM **pub_key, const BIGNUM **priv_key) {
|
|
if (pub_key != NULL) {
|
|
*pub_key = dh->pub_key;
|
|
}
|
|
if (priv_key != NULL) {
|
|
*priv_key = dh->priv_key;
|
|
}
|
|
}
|
|
|
|
int
|
|
DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key) {
|
|
if (pub_key != NULL) {
|
|
BN_free(dh->pub_key);
|
|
dh->pub_key = pub_key;
|
|
}
|
|
|
|
if (priv_key != NULL) {
|
|
BN_free(dh->priv_key);
|
|
dh->priv_key = priv_key;
|
|
}
|
|
|
|
return (1);
|
|
}
|
|
|
|
void
|
|
DH_get0_pqg(const DH *dh, const BIGNUM **p, const BIGNUM **q,
|
|
const BIGNUM **g) {
|
|
if (p != NULL) {
|
|
*p = dh->p;
|
|
}
|
|
if (q != NULL) {
|
|
*q = dh->q;
|
|
}
|
|
if (g != NULL) {
|
|
*g = dh->g;
|
|
}
|
|
}
|
|
|
|
int
|
|
DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) {
|
|
/* If the fields p and g in d are NULL, the corresponding input
|
|
* parameters MUST be non-NULL. q may remain NULL.
|
|
*/
|
|
if ((dh->p == NULL && p == NULL) || (dh->g == NULL && g == NULL)) {
|
|
return (0);
|
|
}
|
|
|
|
if (p != NULL) {
|
|
BN_free(dh->p);
|
|
dh->p = p;
|
|
}
|
|
if (q != NULL) {
|
|
BN_free(dh->q);
|
|
dh->q = q;
|
|
}
|
|
if (g != NULL) {
|
|
BN_free(dh->g);
|
|
dh->g = g;
|
|
}
|
|
|
|
if (q != NULL) {
|
|
dh->length = BN_num_bits(q);
|
|
}
|
|
|
|
return (1);
|
|
}
|
|
#endif /* !HAVE_DH_GET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L */
|
|
|
|
#if !HAVE_ERR_GET_ERROR_ALL
|
|
static const char err_empty_string = '\0';
|
|
|
|
unsigned long
|
|
ERR_get_error_all(const char **file, int *line, const char **func,
|
|
const char **data, int *flags) {
|
|
if (func != NULL) {
|
|
*func = &err_empty_string;
|
|
}
|
|
return (ERR_get_error_line_data(file, line, data, flags));
|
|
}
|
|
#endif /* if !HAVE_ERR_GET_ERROR_ALL */
|