Added synchronous and asynchronous PKCS calls.
[crypto.git] / lib / silccrypt / silcpkcs.c
index 457deb806cdcfca81a6f9c9818ee756844882e61..d32f92fe3a95542df5f690cb611cd3383f90fa19 100644 (file)
@@ -4,7 +4,7 @@
 
   Author: Pekka Riikonen <priikone@silcnet.org>
 
-  Copyright (C) 1997 - 2007 Pekka Riikonen
+  Copyright (C) 1997 - 2008 Pekka Riikonen
 
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   GNU General Public License for more details.
 
 */
-/* $Id$ */
 
-#include "silc.h"
+#include "silccrypto.h"
 #include "silcpk_i.h"
 #include "silcpkcs1_i.h"
+#include "dsa.h"
+#ifdef SILC_DIST_SSH
+#include "silcssh_pkcs.h"
+#endif /* SILC_DIST_SSH */
+#ifdef SILC_DIST_PGP
+#include "silcpgp_pkcs.h"
+#endif /* SILC_DIST_PGP */
 
 #ifndef SILC_SYMBIAN
 /* Dynamically registered list of PKCS. */
@@ -60,6 +66,58 @@ const SilcPKCSObject silc_default_pkcs[] =
     silc_pkcs_silc_verify,
   },
 
+#ifdef SILC_DIST_SSH
+  /* SSH2 PKCS */
+  {
+    SILC_PKCS_SSH2,
+    silc_pkcs_ssh_get_algorithm,
+    silc_pkcs_ssh_import_public_key_file,
+    silc_pkcs_ssh_import_public_key,
+    silc_pkcs_ssh_export_public_key_file,
+    silc_pkcs_ssh_export_public_key,
+    silc_pkcs_ssh_public_key_bitlen,
+    silc_pkcs_ssh_public_key_copy,
+    silc_pkcs_ssh_public_key_compare,
+    silc_pkcs_ssh_public_key_free,
+    silc_pkcs_ssh_import_private_key_file,
+    silc_pkcs_ssh_import_private_key,
+    silc_pkcs_ssh_export_private_key_file,
+    silc_pkcs_ssh_export_private_key,
+    silc_pkcs_ssh_private_key_bitlen,
+    silc_pkcs_ssh_private_key_free,
+    silc_pkcs_ssh_encrypt,
+    silc_pkcs_ssh_decrypt,
+    silc_pkcs_ssh_sign,
+    silc_pkcs_ssh_verify,
+  },
+#endif /* SILC_DIST_SSH */
+
+#ifdef SILC_DIST_PGP
+  /* OpenPGP PKCS */
+  {
+    SILC_PKCS_OPENPGP,
+    silc_pkcs_pgp_get_algorithm,
+    silc_pkcs_pgp_import_public_key_file,
+    silc_pkcs_pgp_import_public_key,
+    silc_pkcs_pgp_export_public_key_file,
+    silc_pkcs_pgp_export_public_key,
+    silc_pkcs_pgp_public_key_bitlen,
+    silc_pkcs_pgp_public_key_copy,
+    silc_pkcs_pgp_public_key_compare,
+    silc_pkcs_pgp_public_key_free,
+    silc_pkcs_pgp_import_private_key_file,
+    silc_pkcs_pgp_import_private_key,
+    silc_pkcs_pgp_export_private_key_file,
+    silc_pkcs_pgp_export_private_key,
+    silc_pkcs_pgp_private_key_bitlen,
+    silc_pkcs_pgp_private_key_free,
+    silc_pkcs_pgp_encrypt,
+    silc_pkcs_pgp_decrypt,
+    silc_pkcs_pgp_sign,
+    silc_pkcs_pgp_verify,
+  },
+#endif /* SILC_DIST_PGP */
+
   {
     0, NULL, NULL, NULL, NULL, NULL,
        NULL, NULL, NULL, NULL, NULL
@@ -113,6 +171,142 @@ const SilcPKCSAlgorithm silc_default_pkcs_alg[] =
     silc_pkcs1_verify
   },
 
+  /* DSS, FIPS186-3 */
+  {
+    "dsa",
+    "dss",
+    "sha1",
+    silc_dsa_generate_key,
+    silc_dsa_import_public_key,
+    silc_dsa_export_public_key,
+    silc_dsa_public_key_bitlen,
+    silc_dsa_public_key_copy,
+    silc_dsa_public_key_compare,
+    silc_dsa_public_key_free,
+    silc_dsa_import_private_key,
+    silc_dsa_export_private_key,
+    silc_dsa_private_key_bitlen,
+    silc_dsa_private_key_free,
+    silc_dsa_encrypt,
+    silc_dsa_decrypt,
+    silc_dsa_sign,
+    silc_dsa_verify
+  },
+
+  /* DSS, FIPS186-2 */
+  {
+    "dsa",
+    "dss-fips186-2",
+    "sha1",
+    silc_dsa_generate_key,
+    silc_dsa_import_public_key,
+    silc_dsa_export_public_key,
+    silc_dsa_public_key_bitlen,
+    silc_dsa_public_key_copy,
+    silc_dsa_public_key_compare,
+    silc_dsa_public_key_free,
+    silc_dsa_import_private_key,
+    silc_dsa_export_private_key,
+    silc_dsa_private_key_bitlen,
+    silc_dsa_private_key_free,
+    silc_dsa_encrypt,
+    silc_dsa_decrypt,
+    silc_dsa_sign,
+    silc_dsa_verify
+  },
+
+#ifdef SILC_DIST_SSH
+  /* PKCS #1, SSH2 style public keys */
+  {
+    "rsa",
+    "ssh",
+    "sha1",
+    silc_pkcs1_generate_key,
+    silc_ssh_rsa_import_public_key,
+    silc_ssh_rsa_export_public_key,
+    silc_pkcs1_public_key_bitlen,
+    silc_pkcs1_public_key_copy,
+    silc_pkcs1_public_key_compare,
+    silc_pkcs1_public_key_free,
+    silc_pkcs1_import_private_key,
+    silc_pkcs1_export_private_key,
+    silc_pkcs1_private_key_bitlen,
+    silc_pkcs1_private_key_free,
+    silc_pkcs1_encrypt,
+    silc_pkcs1_decrypt,
+    silc_pkcs1_sign,
+    silc_pkcs1_verify
+  },
+
+  /* DSS FIPS186-2, SSH2 style public keys */
+  {
+    "dsa",
+    "ssh",
+    "sha1,sha224,sha256,sha384,sha512",
+    silc_dsa_fips186_2_generate_key,
+    silc_ssh_dsa_import_public_key,
+    silc_ssh_dsa_export_public_key,
+    silc_dsa_public_key_bitlen,
+    silc_dsa_public_key_copy,
+    silc_dsa_public_key_compare,
+    silc_dsa_public_key_free,
+    silc_dsa_import_private_key,
+    silc_dsa_export_private_key,
+    silc_dsa_private_key_bitlen,
+    silc_dsa_private_key_free,
+    silc_dsa_encrypt,
+    silc_dsa_decrypt,
+    silc_dsa_sign,
+    silc_dsa_verify
+  },
+#endif /* SILC_DIST_SSH */
+
+#ifdef SILC_DIST_PGP
+  /* PKCS #1, OpenPGP style public keys */
+  {
+    "rsa",
+    "openpgp",
+    "sha1",
+    silc_pkcs1_generate_key,
+    silc_pgp_rsa_import_public_key,
+    silc_pgp_rsa_export_public_key,
+    silc_pkcs1_public_key_bitlen,
+    silc_pkcs1_public_key_copy,
+    silc_pkcs1_public_key_compare,
+    silc_pkcs1_public_key_free,
+    silc_pgp_rsa_import_private_key,
+    silc_pgp_rsa_export_private_key,
+    silc_pkcs1_private_key_bitlen,
+    silc_pkcs1_private_key_free,
+    silc_pkcs1_encrypt,
+    silc_pkcs1_decrypt,
+    silc_pkcs1_sign,
+    silc_pkcs1_verify
+  },
+
+  /* DSS, OpenPGP style public keys */
+  {
+    "dsa",
+    "openpgp",
+    "sha1,sha224,sha256,sha384,sha512",
+    silc_dsa_generate_key,
+    silc_pgp_dsa_import_public_key,
+    silc_pgp_dsa_export_public_key,
+    silc_dsa_public_key_bitlen,
+    silc_dsa_public_key_copy,
+    silc_dsa_public_key_compare,
+    silc_dsa_public_key_free,
+    silc_pgp_dsa_import_private_key,
+    silc_pgp_dsa_export_private_key,
+    silc_dsa_private_key_bitlen,
+    silc_dsa_private_key_free,
+    silc_dsa_encrypt,
+    silc_dsa_decrypt,
+    silc_dsa_sign,
+    silc_dsa_verify
+  },
+#endif /* SILC_DIST_PGP */
+
   {
     NULL, NULL, NULL, NULL,
     NULL, NULL, NULL, NULL,
@@ -121,7 +315,7 @@ const SilcPKCSAlgorithm silc_default_pkcs_alg[] =
   }
 };
 
-/* Register a new PKCS into SILC. */
+/* Register a new PKCS */
 
 SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs)
 {
@@ -154,7 +348,7 @@ SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs)
   return TRUE;
 }
 
-/* Unregister a PKCS from the SILC. */
+/* Unregister a PKCS */
 
 SilcBool silc_pkcs_unregister(SilcPKCSObject *pkcs)
 {
@@ -271,19 +465,12 @@ SilcBool silc_pkcs_algorithm_unregister(SilcPKCSAlgorithm *pkcs)
 
 SilcBool silc_pkcs_register_default(void)
 {
-#ifndef SILC_SYMBIAN
-  int i;
-
-  for (i = 0; silc_default_pkcs[i].type; i++)
-    silc_pkcs_register(&(silc_default_pkcs[i]));
-
-  for (i = 0; silc_default_pkcs_alg[i].name; i++)
-    silc_pkcs_algorithm_register(&(silc_default_pkcs_alg[i]));
-
-#endif /* SILC_SYMBIAN */
+  /* We use builtin PKCS and algorithms */
   return TRUE;
 }
 
+/* Unregister all PKCS and algorithms */
+
 SilcBool silc_pkcs_unregister_all(void)
 {
 #ifndef SILC_SYMBIAN
@@ -316,9 +503,9 @@ SilcBool silc_pkcs_unregister_all(void)
 
 char *silc_pkcs_get_supported(void)
 {
-  SilcPKCSAlgorithm *entry;
+  SilcPKCSAlgorithm *entry, *entry2;
   char *list = NULL;
-  int len = 0;
+  int i, len = 0;
 
 #ifndef SILC_SYMBIAN
   if (silc_pkcs_alg_list) {
@@ -335,23 +522,31 @@ char *silc_pkcs_get_supported(void)
       len++;
     }
   }
-#else
-  {
-    int i;
-    for (i = 0; silc_default_pkcs_alg[i].name; i++) {
-      entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
-      len += strlen(entry->name);
-      list = silc_realloc(list, len + 1);
-      if (!list)
-       return NULL;
+#endif /* SILC_SYMBIAN */
 
-      memcpy(list + (len - strlen(entry->name)),
-            entry->name, strlen(entry->name));
-      memcpy(list + len, ",", 1);
-      len++;
+  for (i = 0; silc_default_pkcs_alg[i].name; i++) {
+    entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
+
+    if (silc_pkcs_alg_list) {
+      silc_dlist_start(silc_pkcs_alg_list);
+      while ((entry2 = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) {
+       if (!strcmp(entry2->name, entry->name))
+         break;
+      }
+      if (entry2)
+       continue;
     }
+
+    len += strlen(entry->name);
+    list = silc_realloc(list, len + 1);
+    if (!list)
+      return NULL;
+
+    memcpy(list + (len - strlen(entry->name)),
+          entry->name, strlen(entry->name));
+    memcpy(list + len, ",", 1);
+    len++;
   }
-#endif /* SILC_SYMBIAN */
 
   list[len - 1] = 0;
 
@@ -363,6 +558,7 @@ char *silc_pkcs_get_supported(void)
 const SilcPKCSObject *silc_pkcs_find_pkcs(SilcPKCSType type)
 {
   SilcPKCSObject *entry;
+  int i;
 
 #ifndef SILC_SYMBIAN
   if (silc_pkcs_list) {
@@ -372,17 +568,14 @@ const SilcPKCSObject *silc_pkcs_find_pkcs(SilcPKCSType type)
        return (const SilcPKCSObject *)entry;
     }
   }
-#else
-  {
-    int i;
-    for (i = 0; silc_default_pkcs[i].type; i++) {
-      entry = (SilcPKCSObject *)&(silc_default_pkcs[i]);
-      if (entry->type == type)
-       return (const SilcPKCSObject *)entry;
-    }
-  }
 #endif /* SILC_SYMBIAN */
 
+  for (i = 0; silc_default_pkcs[i].type; i++) {
+    entry = (SilcPKCSObject *)&(silc_default_pkcs[i]);
+    if (entry->type == type)
+      return (const SilcPKCSObject *)entry;
+  }
+
   return NULL;
 }
 
@@ -392,6 +585,7 @@ const SilcPKCSAlgorithm *silc_pkcs_find_algorithm(const char *algorithm,
                                                  const char *scheme)
 {
   SilcPKCSAlgorithm *entry;
+  int i;
 
 #ifndef SILC_SYMBIAN
   if (silc_pkcs_alg_list) {
@@ -402,18 +596,15 @@ const SilcPKCSAlgorithm *silc_pkcs_find_algorithm(const char *algorithm,
        return (const SilcPKCSAlgorithm *)entry;
     }
   }
-#else
-  {
-    int i;
-    for (i = 0; silc_default_pkcs_alg[i].name; i++) {
-      entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
-      if (!strcmp(entry->name, algorithm) &&
-         (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme)))
-       return (const SilcPKCSAlgorithm *)entry;
-    }
-  }
 #endif /* SILC_SYMBIAN */
 
+  for (i = 0; silc_default_pkcs_alg[i].name; i++) {
+    entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
+    if (!strcmp(entry->name, algorithm) &&
+       (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme)))
+      return (const SilcPKCSAlgorithm *)entry;
+  }
+
   return NULL;
 }
 
@@ -430,7 +621,7 @@ const SilcPKCSObject *silc_pkcs_get_pkcs(void *key)
 const SilcPKCSAlgorithm *silc_pkcs_get_algorithm(void *key)
 {
   SilcPublicKey public_key = key;
-  return public_key->pkcs->get_algorithm(public_key->public_key);
+  return public_key->alg;
 }
 
 /* Return algorithm name */
@@ -467,55 +658,88 @@ SilcBool silc_pkcs_public_key_alloc(SilcPKCSType type,
   if (!public_key)
     return FALSE;
 
-  public_key->pkcs = pkcs = silc_pkcs_find_pkcs(type);
-  if (!public_key->pkcs) {
-    silc_free(public_key);
-    return FALSE;
-  }
+  if (type == SILC_PKCS_ANY) {
+    /* Try loading all types until one succeeds. */
+    for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
+      pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+      if (!pkcs)
+       continue;
+
+      /* Import the PKCS public key */
+      if (pkcs->import_public_key(pkcs, NULL, key, key_len,
+                                 &public_key->public_key,
+                                 &public_key->alg)) {
+       public_key->pkcs = (SilcPKCSObject *)pkcs;
+       *ret_public_key = public_key;
+       return TRUE;
+      }
+    }
+  } else {
+    pkcs = silc_pkcs_find_pkcs(type);
+    public_key->pkcs = (SilcPKCSObject *)pkcs;
+    if (!public_key->pkcs) {
+      silc_free(public_key);
+      return FALSE;
+    }
 
-  /* Import the PKCS public key */
-  if (!pkcs->import_public_key(key, key_len, &public_key->public_key)) {
-    silc_free(public_key);
-    return FALSE;
+    /* Import the PKCS public key */
+    if (pkcs->import_public_key(pkcs, NULL, key, key_len,
+                               &public_key->public_key,
+                               &public_key->alg)) {
+      *ret_public_key = public_key;
+      return TRUE;
+    }
   }
 
-  *ret_public_key = public_key;
-
-  return TRUE;
+  silc_free(public_key);
+  return FALSE;
 }
 
 /* Frees the public key */
 
 void silc_pkcs_public_key_free(SilcPublicKey public_key)
 {
-  public_key->pkcs->public_key_free(public_key->public_key);
+  public_key->pkcs->public_key_free(public_key->pkcs, public_key->public_key);
+  silc_free(public_key);
 }
 
 /* Exports public key */
 
-unsigned char *silc_pkcs_public_key_encode(SilcPublicKey public_key,
+unsigned char *silc_pkcs_public_key_encode(SilcStack stack,
+                                          SilcPublicKey public_key,
                                           SilcUInt32 *ret_len)
 {
-  return public_key->pkcs->export_public_key(public_key->public_key,
-                                            ret_len);
+  return public_key->pkcs->export_public_key(public_key->pkcs, stack,
+                                            public_key->public_key, ret_len);
 }
 
 /* Return key length */
 
 SilcUInt32 silc_pkcs_public_key_get_len(SilcPublicKey public_key)
 {
-  return public_key->pkcs->public_key_bitlen(public_key->public_key);
+  return public_key->pkcs->public_key_bitlen(public_key->pkcs,
+                                            public_key->public_key);
 }
 
 /* Returns internal PKCS public key context */
 
-void *silc_pkcs_get_context(SilcPKCSType type, SilcPublicKey public_key)
+void *silc_pkcs_public_key_get_pkcs(SilcPKCSType type,
+                                   SilcPublicKey public_key)
 {
   if (public_key->pkcs->type != type)
-    return FALSE;
+    return NULL;
   return public_key->public_key;
 }
 
+/* Returns internal PKCS private key context */
+
+void *silc_pkcs_private_key_get_pkcs(SilcPKCSType type,
+                                    SilcPrivateKey private_key)
+{
+  if (private_key->pkcs->type != type)
+    return NULL;
+  return private_key->private_key;
+}
 
 /* Allocates new private key from key data */
 
@@ -535,14 +759,17 @@ SilcBool silc_pkcs_private_key_alloc(SilcPKCSType type,
   if (!private_key)
     return FALSE;
 
-  private_key->pkcs = pkcs = silc_pkcs_find_pkcs(type);
+  pkcs = silc_pkcs_find_pkcs(type);
+  private_key->pkcs = (SilcPKCSObject *)pkcs;
   if (!private_key->pkcs) {
     silc_free(private_key);
     return FALSE;
   }
 
   /* Import the PKCS private key */
-  if (!pkcs->import_private_key(key, key_len, &private_key->private_key)) {
+  if (!pkcs->import_private_key(pkcs, NULL, NULL, 0, key, key_len,
+                               &private_key->private_key,
+                               &private_key->alg)) {
     silc_free(private_key);
     return FALSE;
   }
@@ -556,14 +783,56 @@ SilcBool silc_pkcs_private_key_alloc(SilcPKCSType type,
 
 SilcUInt32 silc_pkcs_private_key_get_len(SilcPrivateKey private_key)
 {
-  return private_key->pkcs->private_key_bitlen(private_key->private_key);
+  return private_key->pkcs->private_key_bitlen(private_key->pkcs,
+                                              private_key->private_key);
 }
 
 /* Frees the private key */
 
 void silc_pkcs_private_key_free(SilcPrivateKey private_key)
 {
-  private_key->pkcs->private_key_free(private_key->private_key);
+  private_key->pkcs->private_key_free(private_key->pkcs,
+                                     private_key->private_key);
+  silc_free(private_key);
+}
+
+/* PKCS operation context */
+typedef struct {
+  unsigned char *dst;
+  SilcUInt32 *dst_len;
+  SilcUInt32 dst_size;
+  SilcBool result;
+} SilcPKCSOperation;
+
+/* Encrypt, decrypt, sign callback */
+
+static void silc_pkcs_op_cb(SilcBool success,
+                           const unsigned char *data,
+                           SilcUInt32 data_len, void *context)
+{
+  SilcPKCSOperation *ctx = context;
+
+  ctx->result = success;
+
+  if (!success)
+    return;
+
+  if (data_len > ctx->dst_size) {
+    ctx->result = FALSE;
+    return;
+  }
+
+  memcpy(ctx->dst, data, data_len);
+  if (ctx->dst_len)
+    *ctx->dst_len = data_len;
+}
+
+/* Verify callback */
+
+static void silc_pkcs_verify_cb(SilcBool success, void *context)
+{
+  SilcPKCSOperation *ctx = context;
+  ctx->result = success;
 }
 
 /* Encrypts */
@@ -573,8 +842,31 @@ SilcBool silc_pkcs_encrypt(SilcPublicKey public_key,
                           unsigned char *dst, SilcUInt32 dst_size,
                           SilcUInt32 *dst_len, SilcRng rng)
 {
-  return public_key->pkcs->encrypt(public_key->public_key, src, src_len,
-                                  dst, dst_size, dst_len, rng);
+  SilcPKCSOperation ctx;
+
+  ctx.dst = dst;
+  ctx.dst_size = dst_size;
+  ctx.dst_len = dst_len;
+
+  public_key->pkcs->encrypt(public_key->pkcs,
+                           public_key->public_key, src, src_len,
+                           rng, silc_pkcs_op_cb, &ctx);
+
+  return ctx.result;
+}
+
+/* Encrypts, async */
+
+SilcAsyncOperation
+silc_pkcs_encrypt_async(SilcPublicKey public_key,
+                       unsigned char *src, SilcUInt32 src_len,
+                       SilcRng rng,
+                       SilcPKCSEncryptCb encrypt_cb,
+                       void *context)
+{
+  return public_key->pkcs->encrypt(public_key->pkcs,
+                                  public_key->public_key, src, src_len,
+                                  rng, encrypt_cb, context);
 }
 
 /* Decrypts */
@@ -584,8 +876,30 @@ SilcBool silc_pkcs_decrypt(SilcPrivateKey private_key,
                           unsigned char *dst, SilcUInt32 dst_size,
                           SilcUInt32 *dst_len)
 {
-  return private_key->pkcs->decrypt(private_key->private_key, src, src_len,
-                                   dst, dst_size, dst_len);
+  SilcPKCSOperation ctx;
+
+  ctx.dst = dst;
+  ctx.dst_size = dst_size;
+  ctx.dst_len = dst_len;
+
+  private_key->pkcs->decrypt(private_key->pkcs,
+                            private_key->private_key, src, src_len,
+                            silc_pkcs_op_cb, &ctx);
+
+  return ctx.result;
+}
+
+/* Decrypts, async */
+
+SilcAsyncOperation
+silc_pkcs_decrypt_async(SilcPrivateKey private_key,
+                       unsigned char *src, SilcUInt32 src_len,
+                       SilcPKCSDecryptCb decrypt_cb,
+                       void *context)
+{
+  return private_key->pkcs->decrypt(private_key->pkcs,
+                                   private_key->private_key, src, src_len,
+                                   decrypt_cb, context);
 }
 
 /* Generates signature */
@@ -593,10 +907,37 @@ SilcBool silc_pkcs_decrypt(SilcPrivateKey private_key,
 SilcBool silc_pkcs_sign(SilcPrivateKey private_key,
                        unsigned char *src, SilcUInt32 src_len,
                        unsigned char *dst, SilcUInt32 dst_size,
-                       SilcUInt32 *dst_len, SilcHash hash)
+                       SilcUInt32 *dst_len, SilcBool compute_hash,
+                       SilcHash hash, SilcRng rng)
+{
+  SilcPKCSOperation ctx;
+
+  ctx.dst = dst;
+  ctx.dst_size = dst_size;
+  ctx.dst_len = dst_len;
+
+  private_key->pkcs->sign(private_key->pkcs,
+                         private_key->private_key, src, src_len,
+                         compute_hash, hash, rng,
+                         silc_pkcs_op_cb, &ctx);
+
+  return ctx.result;
+}
+
+/* Generates signature, async */
+
+SilcAsyncOperation silc_pkcs_sign_async(SilcPrivateKey private_key,
+                                       unsigned char *src,
+                                       SilcUInt32 src_len,
+                                       SilcBool compute_hash,
+                                       SilcHash hash,
+                                       SilcRng rng,
+                                       SilcPKCSSignCb sign_cb,
+                                       void *context)
 {
-  return private_key->pkcs->sign(private_key->private_key, src, src_len,
-                                dst, dst_size, dst_len, hash);
+  return private_key->pkcs->sign(private_key->pkcs,
+                                private_key->private_key, src, src_len,
+                                compute_hash, hash, rng, sign_cb, context);
 }
 
 /* Verifies signature */
@@ -605,10 +946,38 @@ SilcBool silc_pkcs_verify(SilcPublicKey public_key,
                          unsigned char *signature,
                          SilcUInt32 signature_len,
                          unsigned char *data,
-                         SilcUInt32 data_len, SilcHash hash)
+                         SilcUInt32 data_len,
+                         SilcBool compute_hash,
+                         SilcHash hash)
 {
-  return public_key->pkcs->verify(public_key->public_key, signature,
-                                 signature_len, data, data_len, hash);
+  SilcPKCSOperation ctx;
+
+  public_key->pkcs->verify(public_key->pkcs,
+                          public_key->public_key, signature,
+                          signature_len, data, data_len,
+                          compute_hash, hash, NULL,
+                          silc_pkcs_verify_cb, &ctx);
+
+  return ctx.result;
+}
+
+/* Verifies signature, async */
+
+SilcAsyncOperation silc_pkcs_verify_async(SilcPublicKey public_key,
+                                         unsigned char *signature,
+                                         SilcUInt32 signature_len,
+                                         unsigned char *data,
+                                         SilcUInt32 data_len,
+                                         SilcBool compute_hash,
+                                         SilcHash hash,
+                                         SilcPKCSVerifyCb verify_cb,
+                                         void *context)
+{
+  return public_key->pkcs->verify(public_key->pkcs,
+                                 public_key->public_key, signature,
+                                 signature_len, data, data_len,
+                                 compute_hash, hash, NULL,
+                                 verify_cb, context);
 }
 
 /* Compares two public keys and returns TRUE if they are same key, and
@@ -619,7 +988,8 @@ SilcBool silc_pkcs_public_key_compare(SilcPublicKey key1, SilcPublicKey key2)
   if (key1->pkcs->type != key2->pkcs->type)
     return FALSE;
 
-  return key1->pkcs->public_key_compare(key1->public_key, key2->public_key);
+  return key1->pkcs->public_key_compare(key1->pkcs,
+                                       key1->public_key, key2->public_key);
 }
 
 /* Copies the public key indicated by `public_key' and returns new allocated
@@ -632,7 +1002,8 @@ SilcPublicKey silc_pkcs_public_key_copy(SilcPublicKey public_key)
     return NULL;
 
   key->pkcs = public_key->pkcs;
-  key->public_key = public_key->pkcs->public_key_copy(public_key->public_key);
+  key->public_key = public_key->pkcs->public_key_copy(public_key->pkcs,
+                                                     public_key->public_key);
   if (!key->public_key) {
     silc_free(key);
     return NULL;
@@ -644,21 +1015,23 @@ SilcPublicKey silc_pkcs_public_key_copy(SilcPublicKey public_key)
 /* Loads any kind of public key */
 
 SilcBool silc_pkcs_load_public_key(const char *filename,
+                                  SilcPKCSType type,
                                   SilcPublicKey *ret_public_key)
 {
   unsigned char *data;
   SilcUInt32 data_len;
   SilcPublicKey public_key;
-  SilcPKCSType type;
 
   SILC_LOG_DEBUG(("Loading public key file '%s'", filename));
 
   if (!ret_public_key)
     return FALSE;
 
-  data = silc_file_readfile(filename, &data_len);
-  if (!data)
+  data = silc_file_readfile(filename, &data_len, NULL);
+  if (!data) {
+    SILC_LOG_ERROR(("No such file: %s", filename));
     return FALSE;
+  }
 
   /* Allocate public key context */
   *ret_public_key = public_key = silc_calloc(1, sizeof(*public_key));
@@ -667,22 +1040,56 @@ SilcBool silc_pkcs_load_public_key(const char *filename,
     return FALSE;
   }
 
-  /* Try loading all types until one succeeds. */
-  for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
-    public_key->pkcs = silc_pkcs_find_pkcs(type);
-    if (!public_key->pkcs)
-      continue;
+  if (type == SILC_PKCS_ANY) {
+    /* Try loading all types until one succeeds. */
+    for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
+      public_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+      if (!public_key->pkcs)
+       continue;
+
+      if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+                                                  data, data_len,
+                                                  SILC_PKCS_FILE_BASE64,
+                                                  &public_key->public_key,
+                                                  &public_key->alg)) {
+       silc_free(data);
+       return TRUE;
+      }
 
-    if (public_key->pkcs->import_public_key_file(data, data_len,
+      if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+                                                  data, data_len,
+                                                  SILC_PKCS_FILE_BIN,
+                                                  &public_key->public_key,
+                                                  &public_key->alg)) {
+       silc_free(data);
+       return TRUE;
+      }
+    }
+  } else {
+    /* Load specific type */
+    public_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+    if (!public_key->pkcs) {
+      silc_free(data);
+      silc_free(public_key);
+      *ret_public_key = NULL;
+      SILC_LOG_ERROR(("Unsupported public key type"));
+      return FALSE;
+    }
+
+    if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+                                                data, data_len,
                                                 SILC_PKCS_FILE_BASE64,
-                                                &public_key->public_key)) {
+                                                &public_key->public_key,
+                                                &public_key->alg)) {
       silc_free(data);
       return TRUE;
     }
 
-    if (public_key->pkcs->import_public_key_file(data, data_len,
+    if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+                                                data, data_len,
                                                 SILC_PKCS_FILE_BIN,
-                                                &public_key->public_key)) {
+                                                &public_key->public_key,
+                                                &public_key->alg)) {
       silc_free(data);
       return TRUE;
     }
@@ -690,6 +1097,8 @@ SilcBool silc_pkcs_load_public_key(const char *filename,
 
   silc_free(data);
   silc_free(public_key);
+  *ret_public_key = NULL;
+  SILC_LOG_ERROR(("Unsupported public key type"));
   return FALSE;
 }
 
@@ -701,20 +1110,29 @@ SilcBool silc_pkcs_save_public_key(const char *filename,
 {
   unsigned char *data;
   SilcUInt32 data_len;
+  SilcStack stack;
+
+  stack = silc_stack_alloc(2048, silc_crypto_stack());
 
   /* Export the public key file */
-  data = public_key->pkcs->export_public_key_file(public_key->public_key,
+  data = public_key->pkcs->export_public_key_file(public_key->pkcs,
+                                                 stack,
+                                                 public_key->public_key,
                                                  encoding, &data_len);
-  if (!data)
+  if (!data) {
+    silc_stack_free(stack);
     return FALSE;
+  }
 
   /* Write to file */
   if (silc_file_writefile(filename, data, data_len)) {
-    silc_free(data);
+    silc_sfree(stack, data);
+    silc_stack_free(stack);
     return FALSE;
   }
 
-  silc_free(data);
+  silc_sfree(stack, data);
+  silc_stack_free(stack);
   return TRUE;
 }
 
@@ -723,21 +1141,23 @@ SilcBool silc_pkcs_save_public_key(const char *filename,
 SilcBool silc_pkcs_load_private_key(const char *filename,
                                    const unsigned char *passphrase,
                                    SilcUInt32 passphrase_len,
+                                   SilcPKCSType type,
                                    SilcPrivateKey *ret_private_key)
 {
   unsigned char *data;
   SilcUInt32 data_len;
   SilcPrivateKey private_key;
-  SilcPKCSType type;
 
   SILC_LOG_DEBUG(("Loading private key file '%s'", filename));
 
   if (!ret_private_key)
     return FALSE;
 
-  data = silc_file_readfile(filename, &data_len);
-  if (!data)
+  data = silc_file_readfile(filename, &data_len, NULL);
+  if (!data) {
+    SILC_LOG_ERROR(("No such file: %s", filename));
     return FALSE;
+  }
 
   /* Allocate private key context */
   *ret_private_key = private_key = silc_calloc(1, sizeof(*private_key));
@@ -746,28 +1166,68 @@ SilcBool silc_pkcs_load_private_key(const char *filename,
     return FALSE;
   }
 
-  /* Try loading all types until one succeeds. */
-  for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
-    private_key->pkcs = silc_pkcs_find_pkcs(type);
-    if (!private_key->pkcs)
-      continue;
+  if (type == SILC_PKCS_ANY) {
+    /* Try loading all types until one succeeds. */
+    for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
+      private_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+      if (!private_key->pkcs)
+       continue;
+
+      if (private_key->pkcs->import_private_key_file(
+                                             private_key->pkcs,
+                                             data, data_len,
+                                             passphrase,
+                                             passphrase_len,
+                                             SILC_PKCS_FILE_BIN,
+                                             &private_key->private_key,
+                                             &private_key->alg)) {
+       silc_free(data);
+       return TRUE;
+      }
+
+      if (private_key->pkcs->import_private_key_file(
+                                             private_key->pkcs,
+                                             data, data_len,
+                                             passphrase,
+                                             passphrase_len,
+                                             SILC_PKCS_FILE_BASE64,
+                                             &private_key->private_key,
+                                             &private_key->alg)) {
+       silc_free(data);
+       return TRUE;
+      }
+    }
+  } else {
+    /* Load specific type */
+    private_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+    if (!private_key->pkcs) {
+      silc_free(data);
+      silc_free(private_key);
+      *ret_private_key = NULL;
+      SILC_LOG_ERROR(("Unsupported private key type"));
+      return FALSE;
+    }
 
     if (private_key->pkcs->import_private_key_file(
+                                             private_key->pkcs,
                                              data, data_len,
                                              passphrase,
                                              passphrase_len,
                                              SILC_PKCS_FILE_BIN,
-                                             &private_key->private_key)) {
+                                             &private_key->private_key,
+                                             &private_key->alg)) {
       silc_free(data);
       return TRUE;
     }
 
     if (private_key->pkcs->import_private_key_file(
+                                             private_key->pkcs,
                                              data, data_len,
                                              passphrase,
                                              passphrase_len,
                                              SILC_PKCS_FILE_BASE64,
-                                             &private_key->private_key)) {
+                                             &private_key->private_key,
+                                             &private_key->alg)) {
       silc_free(data);
       return TRUE;
     }
@@ -775,6 +1235,7 @@ SilcBool silc_pkcs_load_private_key(const char *filename,
 
   silc_free(data);
   silc_free(private_key);
+  *ret_private_key = NULL;
   return FALSE;
 }
 
@@ -789,21 +1250,65 @@ SilcBool silc_pkcs_save_private_key(const char *filename,
 {
   unsigned char *data;
   SilcUInt32 data_len;
+  SilcStack stack;
+
+  stack = silc_stack_alloc(2048, silc_crypto_stack());
 
   /* Export the private key file */
-  data = private_key->pkcs->export_private_key_file(private_key->private_key,
+  data = private_key->pkcs->export_private_key_file(private_key->pkcs, stack,
+                                                   private_key->private_key,
                                                    passphrase,
                                                    passphrase_len,
                                                    encoding, rng, &data_len);
-  if (!data)
+  if (!data) {
+    silc_stack_free(stack);
     return FALSE;
+  }
 
   /* Write to file */
   if (silc_file_writefile(filename, data, data_len)) {
-    silc_free(data);
+    silc_sfree(stack, data);
+    silc_stack_free(stack);
     return FALSE;
   }
 
-  silc_free(data);
+  silc_sfree(stack, data);
+  silc_stack_free(stack);
   return TRUE;
 }
+
+/* Hash public key of any type. */
+
+SilcUInt32 silc_hash_public_key(void *key, void *user_context)
+{
+  SilcPublicKey public_key = key;
+  unsigned char *pk;
+  SilcUInt32 pk_len;
+  SilcUInt32 hash = 0;
+  SilcStack stack = NULL;
+
+  if (silc_crypto_stack())
+    stack = silc_stack_alloc(2048, silc_crypto_stack());
+
+  pk = silc_pkcs_public_key_encode(stack, public_key, &pk_len);
+  if (!pk) {
+    silc_stack_free(stack);
+    return hash;
+  }
+
+  hash = silc_hash_data(pk, SILC_32_TO_PTR(pk_len));
+
+  silc_sfree(stack, pk);
+  silc_stack_free(stack);
+
+  return hash;
+}
+
+/* Compares two SILC Public keys. It may be used as SilcHashTable
+   comparison function. */
+
+SilcBool silc_hash_public_key_compare(void *key1, void *key2,
+                                     void *user_context)
+{
+  return silc_pkcs_public_key_compare(key1, key2);
+}