/* * Copyright (c) 2015 - 2017 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #ifdef OPENSSL_NO_MACRO int EVP_PKEY_CTX_set_ec_scheme(EVP_PKEY_CTX *ctx, int scheme) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_SIGN|EVP_PKEY_OP_SIGNCTX| EVP_PKEY_OP_VERIFY|EVP_PKEY_OP_VERIFYCTX| EVP_PKEY_OP_ENCRYPT|EVP_PKEY_OP_DECRYPT| EVP_PKEY_OP_DERIVE, EVP_PKEY_CTRL_EC_SCHEME, scheme, NULL); } int EVP_PKEY_CTX_get_ec_scheme(EVP_PKEY_CTX *ctx, int scheme) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_SIGN|EVP_PKEY_OP_SIGNCTX| EVP_PKEY_OP_VERIFY|EVP_PKEY_OP_VERIFYCTX| EVP_PKEY_OP_ENCRYPT|EVP_PKEY_OP_DECRYPT| EVP_PKEY_OP_DERIVE, EVP_PKEY_CTRL_EC_SCHEME, -2, NULL); } int EVP_PKEY_CTX_set_signer_id(EVP_PKEY_CTX *ctx, const char *id) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_SIGN|EVP_PKEY_OP_SIGNCTX| EVP_PKEY_OP_VERIFY|EVP_PKEY_OP_VERIFYCTX| EVP_PKEY_OP_DERIVE, EVP_PKEY_CTRL_SIGNER_ID, 0, (void *)id); } int EVP_PKEY_CTX_get_signer_id(EVP_PKEY_CTX *ctx, const char *id) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_SIGN|EVP_PKEY_OP_SIGNCTX| EVP_PKEY_OP_VERIFY|EVP_PKEY_OP_VERIFYCTX| EVP_PKEY_OP_DERIVE, EVP_PKEY_CTRL_GET_SIGNER_ID, 0, (void *)pid) } int EVP_PKEY_CTX_get_signer_zid(EVP_PKEY_CTX *ctx, unsigned char **pzid) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_SIGN|EVP_PKEY_OP_SIGNCTX| EVP_PKEY_OP_VERIFY|EVP_PKEY_OP_VERIFYCTX| EVP_PKEY_OP_DERIVE, EVP_PKEY_CTRL_GET_SIGNER_ZID, 0, (void *)pzid); } int EVP_PKEY_CTX_set_ec_encrypt_param(EVP_PKEY_CTX *ctx, int param) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_ENCRYPT|EVP_PKEY_OP_DECRYPT, EVP_PKEY_CTRL_EC_ENCRYPT_PARAM, param, NULL); } int EVP_PKEY_CTX_get_ec_encrypt_param(EVP_PKEY_CTX *ctx) { return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_ENCRYPT|EVP_PKEY_OP_DECRYPT, EVP_PKEY_CTRL_EC_ENCRYPT_PARAM, -2, NULL); } #endif