os/ossrv/ssl/libcrypto/src/crypto/pem/pem_pk8.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* crypto/pem/pem_pkey.c */
sl@0
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
     3
 * All rights reserved.
sl@0
     4
 *
sl@0
     5
 * This package is an SSL implementation written
sl@0
     6
 * by Eric Young (eay@cryptsoft.com).
sl@0
     7
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
     8
 * 
sl@0
     9
 * This library is free for commercial and non-commercial use as long as
sl@0
    10
 * the following conditions are aheared to.  The following conditions
sl@0
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    13
 * included with this distribution is covered by the same copyright terms
sl@0
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    15
 * 
sl@0
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    17
 * the code are not to be removed.
sl@0
    18
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    19
 * as the author of the parts of the library used.
sl@0
    20
 * This can be in the form of a textual message at program startup or
sl@0
    21
 * in documentation (online or textual) provided with the package.
sl@0
    22
 * 
sl@0
    23
 * Redistribution and use in source and binary forms, with or without
sl@0
    24
 * modification, are permitted provided that the following conditions
sl@0
    25
 * are met:
sl@0
    26
 * 1. Redistributions of source code must retain the copyright
sl@0
    27
 *    notice, this list of conditions and the following disclaimer.
sl@0
    28
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    29
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    30
 *    documentation and/or other materials provided with the distribution.
sl@0
    31
 * 3. All advertising materials mentioning features or use of this software
sl@0
    32
 *    must display the following acknowledgement:
sl@0
    33
 *    "This product includes cryptographic software written by
sl@0
    34
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    36
 *    being used are not cryptographic related :-).
sl@0
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    38
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    40
 * 
sl@0
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    51
 * SUCH DAMAGE.
sl@0
    52
 * 
sl@0
    53
 * The licence and distribution terms for any publically available version or
sl@0
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    55
 * copied and put under another distribution licence
sl@0
    56
 * [including the GNU Public Licence.]
sl@0
    57
 */
sl@0
    58
sl@0
    59
#include <stdio.h>
sl@0
    60
#include "cryptlib.h"
sl@0
    61
#include <openssl/buffer.h>
sl@0
    62
#include <openssl/objects.h>
sl@0
    63
#include <openssl/evp.h>
sl@0
    64
#include <openssl/rand.h>
sl@0
    65
#include <openssl/x509.h>
sl@0
    66
#include <openssl/pkcs12.h>
sl@0
    67
#include <openssl/pem.h>
sl@0
    68
sl@0
    69
static int do_pk8pkey(BIO *bp, EVP_PKEY *x, int isder,
sl@0
    70
				int nid, const EVP_CIPHER *enc,
sl@0
    71
				char *kstr, int klen,
sl@0
    72
				pem_password_cb *cb, void *u);
sl@0
    73
static int do_pk8pkey_fp(FILE *bp, EVP_PKEY *x, int isder,
sl@0
    74
				int nid, const EVP_CIPHER *enc,
sl@0
    75
				char *kstr, int klen,
sl@0
    76
				pem_password_cb *cb, void *u);
sl@0
    77
sl@0
    78
/* These functions write a private key in PKCS#8 format: it is a "drop in"
sl@0
    79
 * replacement for PEM_write_bio_PrivateKey() and friends. As usual if 'enc'
sl@0
    80
 * is NULL then it uses the unencrypted private key form. The 'nid' versions
sl@0
    81
 * uses PKCS#5 v1.5 PBE algorithms whereas the others use PKCS#5 v2.0.
sl@0
    82
 */
sl@0
    83
sl@0
    84
EXPORT_C int PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, EVP_PKEY *x, int nid,
sl@0
    85
				  char *kstr, int klen,
sl@0
    86
				  pem_password_cb *cb, void *u)
sl@0
    87
{
sl@0
    88
	return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u);
sl@0
    89
}
sl@0
    90
sl@0
    91
EXPORT_C int PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc,
sl@0
    92
				  char *kstr, int klen,
sl@0
    93
				  pem_password_cb *cb, void *u)
sl@0
    94
{
sl@0
    95
	return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u);
sl@0
    96
}
sl@0
    97
sl@0
    98
EXPORT_C int i2d_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc,
sl@0
    99
				  char *kstr, int klen,
sl@0
   100
				  pem_password_cb *cb, void *u)
sl@0
   101
{
sl@0
   102
	return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u);
sl@0
   103
}
sl@0
   104
sl@0
   105
EXPORT_C int i2d_PKCS8PrivateKey_nid_bio(BIO *bp, EVP_PKEY *x, int nid,
sl@0
   106
				  char *kstr, int klen,
sl@0
   107
				  pem_password_cb *cb, void *u)
sl@0
   108
{
sl@0
   109
	return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, u);
sl@0
   110
}
sl@0
   111
sl@0
   112
static int do_pk8pkey(BIO *bp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc,
sl@0
   113
				  char *kstr, int klen,
sl@0
   114
				  pem_password_cb *cb, void *u)
sl@0
   115
{
sl@0
   116
	X509_SIG *p8;
sl@0
   117
	PKCS8_PRIV_KEY_INFO *p8inf;
sl@0
   118
	char buf[PEM_BUFSIZE];
sl@0
   119
	int ret;
sl@0
   120
	if(!(p8inf = EVP_PKEY2PKCS8(x))) {
sl@0
   121
		PEMerr(PEM_F_DO_PK8PKEY,
sl@0
   122
					PEM_R_ERROR_CONVERTING_PRIVATE_KEY);
sl@0
   123
		return 0;
sl@0
   124
	}
sl@0
   125
	if(enc || (nid != -1)) {
sl@0
   126
		if(!kstr) {
sl@0
   127
			if(!cb) klen = PEM_def_callback(buf, PEM_BUFSIZE, 1, u);
sl@0
   128
			else klen = cb(buf, PEM_BUFSIZE, 1, u);
sl@0
   129
			if(klen <= 0) {
sl@0
   130
				PEMerr(PEM_F_DO_PK8PKEY,PEM_R_READ_KEY);
sl@0
   131
				PKCS8_PRIV_KEY_INFO_free(p8inf);
sl@0
   132
				return 0;
sl@0
   133
			}
sl@0
   134
				
sl@0
   135
			kstr = buf;
sl@0
   136
		}
sl@0
   137
		p8 = PKCS8_encrypt(nid, enc, kstr, klen, NULL, 0, 0, p8inf);
sl@0
   138
		if(kstr == buf) OPENSSL_cleanse(buf, klen);
sl@0
   139
		PKCS8_PRIV_KEY_INFO_free(p8inf);
sl@0
   140
		if(isder) ret = i2d_PKCS8_bio(bp, p8);
sl@0
   141
		else ret = PEM_write_bio_PKCS8(bp, p8);
sl@0
   142
		X509_SIG_free(p8);
sl@0
   143
		return ret;
sl@0
   144
	} else {
sl@0
   145
		if(isder) ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf);
sl@0
   146
		else ret = PEM_write_bio_PKCS8_PRIV_KEY_INFO(bp, p8inf);
sl@0
   147
		PKCS8_PRIV_KEY_INFO_free(p8inf);
sl@0
   148
		return ret;
sl@0
   149
	}
sl@0
   150
}
sl@0
   151
sl@0
   152
EXPORT_C EVP_PKEY *d2i_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u)
sl@0
   153
{
sl@0
   154
	PKCS8_PRIV_KEY_INFO *p8inf = NULL;
sl@0
   155
	X509_SIG *p8 = NULL;
sl@0
   156
	int klen;
sl@0
   157
	EVP_PKEY *ret;
sl@0
   158
	char psbuf[PEM_BUFSIZE];
sl@0
   159
	p8 = d2i_PKCS8_bio(bp, NULL);
sl@0
   160
sl@0
   161
/* NOTE!!!!! - 12/2/09
sl@0
   162
 *
sl@0
   163
 * Not sure this is bug or intentional in the code to enforce the key storage in file should be password protected.
sl@0
   164
 * Be carefull while merging this code with any latest OpenSSL streams in the future. 
sl@0
   165
 * -Madhu
sl@0
   166
*/
sl@0
   167
#if 0 //bug fix, unencryted private key read - START - 12/2/09
sl@0
   168
	if(!p8) return NULL;
sl@0
   169
	if (cb) klen=cb(psbuf,PEM_BUFSIZE,0,u);
sl@0
   170
	else klen=PEM_def_callback(psbuf,PEM_BUFSIZE,0,u);
sl@0
   171
	if (klen <= 0) {
sl@0
   172
		PEMerr(PEM_F_D2I_PKCS8PRIVATEKEY_BIO, PEM_R_BAD_PASSWORD_READ);
sl@0
   173
#endif //bug fix, unencryted private key read - END - 12/2/09		
sl@0
   174
sl@0
   175
		if (!p8) {
sl@0
   176
       /* try unencrypted */
sl@0
   177
       BIO_reset(bp);
sl@0
   178
       p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(bp, NULL);
sl@0
   179
		} else {
sl@0
   180
       if (cb) klen=cb(psbuf,PEM_BUFSIZE,0,u);
sl@0
   181
       else klen=PEM_def_callback(psbuf,PEM_BUFSIZE,0,u);
sl@0
   182
       if (klen <= 0) {
sl@0
   183
               PEMerr(PEM_F_D2I_PKCS8PRIVATEKEY_BIO, PEM_R_BAD_PASSWORD_READ);
sl@0
   184
               X509_SIG_free(p8);
sl@0
   185
               return NULL;
sl@0
   186
       }
sl@0
   187
      p8inf = PKCS8_decrypt(p8, psbuf, klen);
sl@0
   188
    }
sl@0
   189
			X509_SIG_free(p8);
sl@0
   190
//			return NULL;	//bug fix, unencryted private key read - 12/2/09               
sl@0
   191
#if 0 //bug fix, unencryted private key read - START - 12/2/09               
sl@0
   192
		p8inf = PKCS8_decrypt(p8, psbuf, klen);
sl@0
   193
	  X509_SIG_free(p8); 
sl@0
   194
#endif 	//bug fix, unencryted private key read - END - 12/2/09               
sl@0
   195
	if(!p8inf) return NULL;
sl@0
   196
	ret = EVP_PKCS82PKEY(p8inf);
sl@0
   197
	PKCS8_PRIV_KEY_INFO_free(p8inf);
sl@0
   198
	if(!ret) return NULL;
sl@0
   199
	if(x) {
sl@0
   200
		if(*x) EVP_PKEY_free(*x);
sl@0
   201
		*x = ret;
sl@0
   202
	}
sl@0
   203
	return ret;
sl@0
   204
}
sl@0
   205
sl@0
   206
#ifndef OPENSSL_NO_FP_API
sl@0
   207
sl@0
   208
EXPORT_C int i2d_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
sl@0
   209
				  char *kstr, int klen,
sl@0
   210
				  pem_password_cb *cb, void *u)
sl@0
   211
{
sl@0
   212
	return do_pk8pkey_fp(fp, x, 1, -1, enc, kstr, klen, cb, u);
sl@0
   213
}
sl@0
   214
sl@0
   215
EXPORT_C int i2d_PKCS8PrivateKey_nid_fp(FILE *fp, EVP_PKEY *x, int nid,
sl@0
   216
				  char *kstr, int klen,
sl@0
   217
				  pem_password_cb *cb, void *u)
sl@0
   218
{
sl@0
   219
	return do_pk8pkey_fp(fp, x, 1, nid, NULL, kstr, klen, cb, u);
sl@0
   220
}
sl@0
   221
sl@0
   222
EXPORT_C int PEM_write_PKCS8PrivateKey_nid(FILE *fp, EVP_PKEY *x, int nid,
sl@0
   223
				  char *kstr, int klen,
sl@0
   224
				  pem_password_cb *cb, void *u)
sl@0
   225
{
sl@0
   226
	return do_pk8pkey_fp(fp, x, 0, nid, NULL, kstr, klen, cb, u);
sl@0
   227
}
sl@0
   228
sl@0
   229
EXPORT_C int PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
sl@0
   230
			      char *kstr, int klen, pem_password_cb *cb, void *u)
sl@0
   231
{
sl@0
   232
	return do_pk8pkey_fp(fp, x, 0, -1, enc, kstr, klen, cb, u);
sl@0
   233
}
sl@0
   234
sl@0
   235
static int do_pk8pkey_fp(FILE *fp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc,
sl@0
   236
				  char *kstr, int klen,
sl@0
   237
				  pem_password_cb *cb, void *u)
sl@0
   238
{
sl@0
   239
	BIO *bp;
sl@0
   240
	int ret;
sl@0
   241
	if(!(bp = BIO_new_fp(fp, BIO_NOCLOSE))) {
sl@0
   242
		PEMerr(PEM_F_DO_PK8PKEY_FP,ERR_R_BUF_LIB);
sl@0
   243
                return(0);
sl@0
   244
	}
sl@0
   245
	ret = do_pk8pkey(bp, x, isder, nid, enc, kstr, klen, cb, u);
sl@0
   246
	BIO_free(bp);
sl@0
   247
	return ret;
sl@0
   248
}
sl@0
   249
sl@0
   250
EXPORT_C EVP_PKEY *d2i_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u)
sl@0
   251
{
sl@0
   252
	BIO *bp;
sl@0
   253
	EVP_PKEY *ret;
sl@0
   254
	if(!(bp = BIO_new_fp(fp, BIO_NOCLOSE))) {
sl@0
   255
		PEMerr(PEM_F_D2I_PKCS8PRIVATEKEY_FP,ERR_R_BUF_LIB);
sl@0
   256
                return NULL;
sl@0
   257
	}
sl@0
   258
	ret = d2i_PKCS8PrivateKey_bio(bp, x, cb, u);
sl@0
   259
	BIO_free(bp);
sl@0
   260
	return ret;
sl@0
   261
}
sl@0
   262
sl@0
   263
#endif
sl@0
   264
sl@0
   265
IMPLEMENT_PEM_rw(PKCS8, X509_SIG, PEM_STRING_PKCS8, X509_SIG)
sl@0
   266
IMPLEMENT_PEM_rw(PKCS8_PRIV_KEY_INFO, PKCS8_PRIV_KEY_INFO, PEM_STRING_PKCS8INF,
sl@0
   267
							 PKCS8_PRIV_KEY_INFO)