os/ossrv/ssl/libssl/src/ssl_rsa.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /* ssl/ssl_rsa.c */
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     3  * All rights reserved.
     4  *
     5  * This package is an SSL implementation written
     6  * by Eric Young (eay@cryptsoft.com).
     7  * The implementation was written so as to conform with Netscapes SSL.
     8  * 
     9  * This library is free for commercial and non-commercial use as long as
    10  * the following conditions are aheared to.  The following conditions
    11  * apply to all code found in this distribution, be it the RC4, RSA,
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    13  * included with this distribution is covered by the same copyright terms
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    15  * 
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
    17  * the code are not to be removed.
    18  * If this package is used in a product, Eric Young should be given attribution
    19  * as the author of the parts of the library used.
    20  * This can be in the form of a textual message at program startup or
    21  * in documentation (online or textual) provided with the package.
    22  * 
    23  * Redistribution and use in source and binary forms, with or without
    24  * modification, are permitted provided that the following conditions
    25  * are met:
    26  * 1. Redistributions of source code must retain the copyright
    27  *    notice, this list of conditions and the following disclaimer.
    28  * 2. Redistributions in binary form must reproduce the above copyright
    29  *    notice, this list of conditions and the following disclaimer in the
    30  *    documentation and/or other materials provided with the distribution.
    31  * 3. All advertising materials mentioning features or use of this software
    32  *    must display the following acknowledgement:
    33  *    "This product includes cryptographic software written by
    34  *     Eric Young (eay@cryptsoft.com)"
    35  *    The word 'cryptographic' can be left out if the rouines from the library
    36  *    being used are not cryptographic related :-).
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
    38  *    the apps directory (application code) you must include an acknowledgement:
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    40  * 
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    51  * SUCH DAMAGE.
    52  * 
    53  * The licence and distribution terms for any publically available version or
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    55  * copied and put under another distribution licence
    56  * [including the GNU Public Licence.]
    57  */
    58 
    59 #include <stdio.h>
    60 #include "ssl_locl.h"
    61 #include <openssl/bio.h>
    62 #include <openssl/objects.h>
    63 #include <openssl/evp.h>
    64 #include <openssl/x509.h>
    65 #include <openssl/pem.h>
    66 
    67 static int ssl_set_cert(CERT *c, X509 *x509);
    68 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
    69 EXPORT_C int SSL_use_certificate(SSL *ssl, X509 *x)
    70 	{
    71 	if (x == NULL)
    72 		{
    73 		SSLerr(SSL_F_SSL_USE_CERTIFICATE,ERR_R_PASSED_NULL_PARAMETER);
    74 		return(0);
    75 		}
    76 	if (!ssl_cert_inst(&ssl->cert))
    77 		{
    78 		SSLerr(SSL_F_SSL_USE_CERTIFICATE,ERR_R_MALLOC_FAILURE);
    79 		return(0);
    80 		}
    81 	return(ssl_set_cert(ssl->cert,x));
    82 	}
    83 
    84 #ifndef OPENSSL_NO_STDIO
    85 EXPORT_C int SSL_use_certificate_file(SSL *ssl, const char *file, int type)
    86 	{
    87 	int j;
    88 	BIO *in;
    89 	int ret=0;
    90 	X509 *x=NULL;
    91 
    92 	in=BIO_new(BIO_s_file_internal());
    93 	if (in == NULL)
    94 		{
    95 		SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE,ERR_R_BUF_LIB);
    96 		goto end;
    97 		}
    98 
    99 	if (BIO_read_filename(in,file) <= 0)
   100 		{
   101 		SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE,ERR_R_SYS_LIB);
   102 		goto end;
   103 		}
   104 	if (type == SSL_FILETYPE_ASN1)
   105 		{
   106 		j=ERR_R_ASN1_LIB;
   107 		x=d2i_X509_bio(in,NULL);
   108 		}
   109 	else if (type == SSL_FILETYPE_PEM)
   110 		{
   111 		j=ERR_R_PEM_LIB;
   112 		x=PEM_read_bio_X509(in,NULL,ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_userdata);
   113 		}
   114 	else
   115 		{
   116 		SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE,SSL_R_BAD_SSL_FILETYPE);
   117 		goto end;
   118 		}
   119 
   120 	if (x == NULL)
   121 		{
   122 		SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE,j);
   123 		goto end;
   124 		}
   125 
   126 	ret=SSL_use_certificate(ssl,x);
   127 end:
   128 	if (x != NULL) X509_free(x);
   129 	if (in != NULL) BIO_free(in);
   130 	return(ret);
   131 	}
   132 #endif
   133 
   134 EXPORT_C int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len)
   135 	{
   136 	X509 *x;
   137 	int ret;
   138 
   139 	x=d2i_X509(NULL,&d,(long)len);
   140 	if (x == NULL)
   141 		{
   142 		SSLerr(SSL_F_SSL_USE_CERTIFICATE_ASN1,ERR_R_ASN1_LIB);
   143 		return(0);
   144 		}
   145 
   146 	ret=SSL_use_certificate(ssl,x);
   147 	X509_free(x);
   148 	return(ret);
   149 	}
   150 
   151 #ifndef OPENSSL_NO_RSA
   152 EXPORT_C int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa)
   153 	{
   154 	EVP_PKEY *pkey;
   155 	int ret;
   156 
   157 	if (rsa == NULL)
   158 		{
   159 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY,ERR_R_PASSED_NULL_PARAMETER);
   160 		return(0);
   161 		}
   162 	if (!ssl_cert_inst(&ssl->cert))
   163 		{
   164 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY,ERR_R_MALLOC_FAILURE);
   165 		return(0);
   166 		}
   167 	if ((pkey=EVP_PKEY_new()) == NULL)
   168 		{
   169 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY,ERR_R_EVP_LIB);
   170 		return(0);
   171 		}
   172 
   173 	RSA_up_ref(rsa);
   174 	EVP_PKEY_assign_RSA(pkey,rsa);
   175 
   176 	ret=ssl_set_pkey(ssl->cert,pkey);
   177 	EVP_PKEY_free(pkey);
   178 	return(ret);
   179 	}
   180 #endif
   181 
   182 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
   183 	{
   184 	int i;
   185 
   186 	i=ssl_cert_type(NULL,pkey);
   187 	if (i < 0)
   188 		{
   189 		SSLerr(SSL_F_SSL_SET_PKEY,SSL_R_UNKNOWN_CERTIFICATE_TYPE);
   190 		return(0);
   191 		}
   192 
   193 	if (c->pkeys[i].x509 != NULL)
   194 		{
   195 		EVP_PKEY *pktmp;
   196 		pktmp =	X509_get_pubkey(c->pkeys[i].x509);
   197 		EVP_PKEY_copy_parameters(pktmp,pkey);
   198 		EVP_PKEY_free(pktmp);
   199 		ERR_clear_error();
   200 
   201 #ifndef OPENSSL_NO_RSA
   202 		/* Don't check the public/private key, this is mostly
   203 		 * for smart cards. */
   204 		if ((pkey->type == EVP_PKEY_RSA) &&
   205 			(RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK))
   206 			;
   207 		else
   208 #endif
   209 		if (!X509_check_private_key(c->pkeys[i].x509,pkey))
   210 			{
   211 			X509_free(c->pkeys[i].x509);
   212 			c->pkeys[i].x509 = NULL;
   213 			return 0;
   214 			}
   215 		}
   216 
   217 	if (c->pkeys[i].privatekey != NULL)
   218 		EVP_PKEY_free(c->pkeys[i].privatekey);
   219 	CRYPTO_add(&pkey->references,1,CRYPTO_LOCK_EVP_PKEY);
   220 	c->pkeys[i].privatekey=pkey;
   221 	c->key= &(c->pkeys[i]);
   222 
   223 	c->valid=0;
   224 	return(1);
   225 	}
   226 
   227 #ifndef OPENSSL_NO_RSA
   228 #ifndef OPENSSL_NO_STDIO
   229 EXPORT_C int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type)
   230 	{
   231 	int j,ret=0;
   232 	BIO *in;
   233 	RSA *rsa=NULL;
   234 
   235 	in=BIO_new(BIO_s_file_internal());
   236 	if (in == NULL)
   237 		{
   238 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE,ERR_R_BUF_LIB);
   239 		goto end;
   240 		}
   241 
   242 	if (BIO_read_filename(in,file) <= 0)
   243 		{
   244 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE,ERR_R_SYS_LIB);
   245 		goto end;
   246 		}
   247 	if	(type == SSL_FILETYPE_ASN1)
   248 		{
   249 		j=ERR_R_ASN1_LIB;
   250 		rsa=d2i_RSAPrivateKey_bio(in,NULL);
   251 		}
   252 	else if (type == SSL_FILETYPE_PEM)
   253 		{
   254 		j=ERR_R_PEM_LIB;
   255 		rsa=PEM_read_bio_RSAPrivateKey(in,NULL,
   256 			ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_userdata);
   257 		}
   258 	else
   259 		{
   260 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE,SSL_R_BAD_SSL_FILETYPE);
   261 		goto end;
   262 		}
   263 	if (rsa == NULL)
   264 		{
   265 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE,j);
   266 		goto end;
   267 		}
   268 	ret=SSL_use_RSAPrivateKey(ssl,rsa);
   269 	RSA_free(rsa);
   270 end:
   271 	if (in != NULL) BIO_free(in);
   272 	return(ret);
   273 	}
   274 #endif
   275 
   276 EXPORT_C int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len)
   277 	{
   278 	int ret;
   279 	const unsigned char *p;
   280 	RSA *rsa;
   281 
   282 	p=d;
   283 	if ((rsa=d2i_RSAPrivateKey(NULL,&p,(long)len)) == NULL)
   284 		{
   285 		SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1,ERR_R_ASN1_LIB);
   286 		return(0);
   287 		}
   288 
   289 	ret=SSL_use_RSAPrivateKey(ssl,rsa);
   290 	RSA_free(rsa);
   291 	return(ret);
   292 	}
   293 #endif /* !OPENSSL_NO_RSA */
   294 
   295 EXPORT_C int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey)
   296 	{
   297 	int ret;
   298 
   299 	if (pkey == NULL)
   300 		{
   301 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY,ERR_R_PASSED_NULL_PARAMETER);
   302 		return(0);
   303 		}
   304 	if (!ssl_cert_inst(&ssl->cert))
   305 		{
   306 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY,ERR_R_MALLOC_FAILURE);
   307 		return(0);
   308 		}
   309 	ret=ssl_set_pkey(ssl->cert,pkey);
   310 	return(ret);
   311 	}
   312 
   313 #ifndef OPENSSL_NO_STDIO
   314 EXPORT_C int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type)
   315 	{
   316 	int j,ret=0;
   317 	BIO *in;
   318 	EVP_PKEY *pkey=NULL;
   319 
   320 	in=BIO_new(BIO_s_file_internal());
   321 	if (in == NULL)
   322 		{
   323 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY_FILE,ERR_R_BUF_LIB);
   324 		goto end;
   325 		}
   326 
   327 	if (BIO_read_filename(in,file) <= 0)
   328 		{
   329 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY_FILE,ERR_R_SYS_LIB);
   330 		goto end;
   331 		}
   332 	if (type == SSL_FILETYPE_PEM)
   333 		{
   334 		j=ERR_R_PEM_LIB;
   335 		pkey=PEM_read_bio_PrivateKey(in,NULL,
   336 			ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_userdata);
   337 		}
   338 	else if (type == SSL_FILETYPE_ASN1)
   339 		{
   340 		j = ERR_R_ASN1_LIB;
   341 		pkey = d2i_PrivateKey_bio(in,NULL);
   342 		}
   343 	else
   344 		{
   345 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY_FILE,SSL_R_BAD_SSL_FILETYPE);
   346 		goto end;
   347 		}
   348 	if (pkey == NULL)
   349 		{
   350 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY_FILE,j);
   351 		goto end;
   352 		}
   353 	ret=SSL_use_PrivateKey(ssl,pkey);
   354 	EVP_PKEY_free(pkey);
   355 end:
   356 	if (in != NULL) BIO_free(in);
   357 	return(ret);
   358 	}
   359 #endif
   360 
   361 EXPORT_C int SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len)
   362 	{
   363 	int ret;
   364 	const unsigned char *p;
   365 	EVP_PKEY *pkey;
   366 
   367 	p=d;
   368 	if ((pkey=d2i_PrivateKey(type,NULL,&p,(long)len)) == NULL)
   369 		{
   370 		SSLerr(SSL_F_SSL_USE_PRIVATEKEY_ASN1,ERR_R_ASN1_LIB);
   371 		return(0);
   372 		}
   373 
   374 	ret=SSL_use_PrivateKey(ssl,pkey);
   375 	EVP_PKEY_free(pkey);
   376 	return(ret);
   377 	}
   378 
   379 EXPORT_C int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x)
   380 	{
   381 	if (x == NULL)
   382 		{
   383 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE,ERR_R_PASSED_NULL_PARAMETER);
   384 		return(0);
   385 		}
   386 	if (!ssl_cert_inst(&ctx->cert))
   387 		{
   388 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE,ERR_R_MALLOC_FAILURE);
   389 		return(0);
   390 		}
   391 	return(ssl_set_cert(ctx->cert, x));
   392 	}
   393 
   394 static int ssl_set_cert(CERT *c, X509 *x)
   395 	{
   396 	EVP_PKEY *pkey;
   397 	int i;
   398 
   399 	pkey=X509_get_pubkey(x);
   400 	if (pkey == NULL)
   401 		{
   402 		SSLerr(SSL_F_SSL_SET_CERT,SSL_R_X509_LIB);
   403 		return(0);
   404 		}
   405 
   406 	i=ssl_cert_type(x,pkey);
   407 	if (i < 0)
   408 		{
   409 		SSLerr(SSL_F_SSL_SET_CERT,SSL_R_UNKNOWN_CERTIFICATE_TYPE);
   410 		EVP_PKEY_free(pkey);
   411 		return(0);
   412 		}
   413 
   414 	if (c->pkeys[i].privatekey != NULL)
   415 		{
   416 		EVP_PKEY_copy_parameters(pkey,c->pkeys[i].privatekey);
   417 		ERR_clear_error();
   418 
   419 #ifndef OPENSSL_NO_RSA
   420 		/* Don't check the public/private key, this is mostly
   421 		 * for smart cards. */
   422 		if ((c->pkeys[i].privatekey->type == EVP_PKEY_RSA) &&
   423 			(RSA_flags(c->pkeys[i].privatekey->pkey.rsa) &
   424 			 RSA_METHOD_FLAG_NO_CHECK))
   425 			 ;
   426 		else
   427 #endif /* OPENSSL_NO_RSA */
   428 		if (!X509_check_private_key(x,c->pkeys[i].privatekey))
   429 			{
   430 			/* don't fail for a cert/key mismatch, just free
   431 			 * current private key (when switching to a different
   432 			 * cert & key, first this function should be used,
   433 			 * then ssl_set_pkey */
   434 			EVP_PKEY_free(c->pkeys[i].privatekey);
   435 			c->pkeys[i].privatekey=NULL;
   436 			/* clear error queue */
   437 			ERR_clear_error();
   438 			}
   439 		}
   440 
   441 	EVP_PKEY_free(pkey);
   442 
   443 	if (c->pkeys[i].x509 != NULL)
   444 		X509_free(c->pkeys[i].x509);
   445 	CRYPTO_add(&x->references,1,CRYPTO_LOCK_X509);
   446 	c->pkeys[i].x509=x;
   447 	c->key= &(c->pkeys[i]);
   448 
   449 	c->valid=0;
   450 	return(1);
   451 	}
   452 
   453 #ifndef OPENSSL_NO_STDIO
   454 EXPORT_C int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type)
   455 	{
   456 	int j;
   457 	BIO *in;
   458 	int ret=0;
   459 	X509 *x=NULL;
   460 
   461 	in=BIO_new(BIO_s_file_internal());
   462 	if (in == NULL)
   463 		{
   464 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,ERR_R_BUF_LIB);
   465 		goto end;
   466 		}
   467 
   468 	if (BIO_read_filename(in,file) <= 0)
   469 		{
   470 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,ERR_R_SYS_LIB);
   471 		goto end;
   472 		}
   473 	if (type == SSL_FILETYPE_ASN1)
   474 		{
   475 		j=ERR_R_ASN1_LIB;
   476 		x=d2i_X509_bio(in,NULL);
   477 		}
   478 	else if (type == SSL_FILETYPE_PEM)
   479 		{
   480 		j=ERR_R_PEM_LIB;
   481 		x=PEM_read_bio_X509(in,NULL,ctx->default_passwd_callback,ctx->default_passwd_callback_userdata);
   482 		}
   483 	else
   484 		{
   485 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,SSL_R_BAD_SSL_FILETYPE);
   486 		goto end;
   487 		}
   488 
   489 	if (x == NULL)
   490 		{
   491 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,j);
   492 		goto end;
   493 		}
   494 
   495 	ret=SSL_CTX_use_certificate(ctx,x);
   496 end:
   497 	if (x != NULL) X509_free(x);
   498 	if (in != NULL) BIO_free(in);
   499 	return(ret);
   500 	}
   501 #endif
   502 
   503 EXPORT_C int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d)
   504 	{
   505 	X509 *x;
   506 	int ret;
   507 
   508 	x=d2i_X509(NULL,&d,(long)len);
   509 	if (x == NULL)
   510 		{
   511 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1,ERR_R_ASN1_LIB);
   512 		return(0);
   513 		}
   514 
   515 	ret=SSL_CTX_use_certificate(ctx,x);
   516 	X509_free(x);
   517 	return(ret);
   518 	}
   519 
   520 #ifndef OPENSSL_NO_RSA
   521 EXPORT_C int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa)
   522 	{
   523 	int ret;
   524 	EVP_PKEY *pkey;
   525 
   526 	if (rsa == NULL)
   527 		{
   528 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY,ERR_R_PASSED_NULL_PARAMETER);
   529 		return(0);
   530 		}
   531 	if (!ssl_cert_inst(&ctx->cert))
   532 		{
   533 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY,ERR_R_MALLOC_FAILURE);
   534 		return(0);
   535 		}
   536 	if ((pkey=EVP_PKEY_new()) == NULL)
   537 		{
   538 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY,ERR_R_EVP_LIB);
   539 		return(0);
   540 		}
   541 
   542 	RSA_up_ref(rsa);
   543 	EVP_PKEY_assign_RSA(pkey,rsa);
   544 
   545 	ret=ssl_set_pkey(ctx->cert, pkey);
   546 	EVP_PKEY_free(pkey);
   547 	return(ret);
   548 	}
   549 
   550 #ifndef OPENSSL_NO_STDIO
   551 EXPORT_C int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type)
   552 	{
   553 	int j,ret=0;
   554 	BIO *in;
   555 	RSA *rsa=NULL;
   556 
   557 	in=BIO_new(BIO_s_file_internal());
   558 	if (in == NULL)
   559 		{
   560 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE,ERR_R_BUF_LIB);
   561 		goto end;
   562 		}
   563 
   564 	if (BIO_read_filename(in,file) <= 0)
   565 		{
   566 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE,ERR_R_SYS_LIB);
   567 		goto end;
   568 		}
   569 	if	(type == SSL_FILETYPE_ASN1)
   570 		{
   571 		j=ERR_R_ASN1_LIB;
   572 		rsa=d2i_RSAPrivateKey_bio(in,NULL);
   573 		}
   574 	else if (type == SSL_FILETYPE_PEM)
   575 		{
   576 		j=ERR_R_PEM_LIB;
   577 		rsa=PEM_read_bio_RSAPrivateKey(in,NULL,
   578 			ctx->default_passwd_callback,ctx->default_passwd_callback_userdata);
   579 		}
   580 	else
   581 		{
   582 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE,SSL_R_BAD_SSL_FILETYPE);
   583 		goto end;
   584 		}
   585 	if (rsa == NULL)
   586 		{
   587 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE,j);
   588 		goto end;
   589 		}
   590 	ret=SSL_CTX_use_RSAPrivateKey(ctx,rsa);
   591 	RSA_free(rsa);
   592 end:
   593 	if (in != NULL) BIO_free(in);
   594 	return(ret);
   595 	}
   596 #endif
   597 
   598 EXPORT_C int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len)
   599 	{
   600 	int ret;
   601 	const unsigned char *p;
   602 	RSA *rsa;
   603 
   604 	p=d;
   605 	if ((rsa=d2i_RSAPrivateKey(NULL,&p,(long)len)) == NULL)
   606 		{
   607 		SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1,ERR_R_ASN1_LIB);
   608 		return(0);
   609 		}
   610 
   611 	ret=SSL_CTX_use_RSAPrivateKey(ctx,rsa);
   612 	RSA_free(rsa);
   613 	return(ret);
   614 	}
   615 #endif /* !OPENSSL_NO_RSA */
   616 
   617 EXPORT_C int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey)
   618 	{
   619 	if (pkey == NULL)
   620 		{
   621 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY,ERR_R_PASSED_NULL_PARAMETER);
   622 		return(0);
   623 		}
   624 	if (!ssl_cert_inst(&ctx->cert))
   625 		{
   626 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY,ERR_R_MALLOC_FAILURE);
   627 		return(0);
   628 		}
   629 	return(ssl_set_pkey(ctx->cert,pkey));
   630 	}
   631 
   632 #ifndef OPENSSL_NO_STDIO
   633 EXPORT_C SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type)
   634 	{
   635 	int j,ret=0;
   636 	BIO *in;
   637 	EVP_PKEY *pkey=NULL;
   638 
   639 	in=BIO_new(BIO_s_file_internal());
   640 	if (in == NULL)
   641 		{
   642 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE,ERR_R_BUF_LIB);
   643 		goto end;
   644 		}
   645 
   646 	if (BIO_read_filename(in,file) <= 0)
   647 		{
   648 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE,ERR_R_SYS_LIB);
   649 		goto end;
   650 		}
   651 	if (type == SSL_FILETYPE_PEM)
   652 		{
   653 		j=ERR_R_PEM_LIB;
   654 		pkey=PEM_read_bio_PrivateKey(in,NULL,
   655 			ctx->default_passwd_callback,ctx->default_passwd_callback_userdata);
   656 		}
   657 	else if (type == SSL_FILETYPE_ASN1)
   658 		{
   659 		j = ERR_R_ASN1_LIB;
   660 		pkey = d2i_PrivateKey_bio(in,NULL);
   661 		}
   662 	else
   663 		{
   664 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE,SSL_R_BAD_SSL_FILETYPE);
   665 		goto end;
   666 		}
   667 	if (pkey == NULL)
   668 		{
   669 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE,j);
   670 		goto end;
   671 		}
   672 	ret=SSL_CTX_use_PrivateKey(ctx,pkey);
   673 	EVP_PKEY_free(pkey);
   674 end:
   675 	if (in != NULL) BIO_free(in);
   676 	return(ret);
   677 	}
   678 #endif
   679 
   680 EXPORT_C int SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const unsigned char *d,
   681 	     long len)
   682 	{
   683 	int ret;
   684 	const unsigned char *p;
   685 	EVP_PKEY *pkey;
   686 
   687 	p=d;
   688 	if ((pkey=d2i_PrivateKey(type,NULL,&p,(long)len)) == NULL)
   689 		{
   690 		SSLerr(SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1,ERR_R_ASN1_LIB);
   691 		return(0);
   692 		}
   693 
   694 	ret=SSL_CTX_use_PrivateKey(ctx,pkey);
   695 	EVP_PKEY_free(pkey);
   696 	return(ret);
   697 	}
   698 
   699 
   700 #ifndef OPENSSL_NO_STDIO
   701 /* Read a file that contains our certificate in "PEM" format,
   702  * possibly followed by a sequence of CA certificates that should be
   703  * sent to the peer in the Certificate message.
   704  */
   705 EXPORT_C int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file)
   706 	{
   707 	BIO *in;
   708 	int ret=0;
   709 	X509 *x=NULL;
   710 
   711 	in=BIO_new(BIO_s_file_internal());
   712 	if (in == NULL)
   713 		{
   714 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE,ERR_R_BUF_LIB);
   715 		goto end;
   716 		}
   717 
   718 	if (BIO_read_filename(in,file) <= 0)
   719 		{
   720 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE,ERR_R_SYS_LIB);
   721 		goto end;
   722 		}
   723 
   724 	x=PEM_read_bio_X509(in,NULL,ctx->default_passwd_callback,ctx->default_passwd_callback_userdata);
   725 	if (x == NULL)
   726 		{
   727 		SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE,ERR_R_PEM_LIB);
   728 		goto end;
   729 		}
   730 
   731 	ret=SSL_CTX_use_certificate(ctx,x);
   732 	if (ERR_peek_error() != 0)
   733 		ret = 0;  /* Key/certificate mismatch doesn't imply ret==0 ... */
   734 	if (ret)
   735 		{
   736 		/* If we could set up our certificate, now proceed to
   737 		 * the CA certificates.
   738 		 */
   739 		X509 *ca;
   740 		int r;
   741 		unsigned long err;
   742 		
   743 		if (ctx->extra_certs != NULL) 
   744 			{
   745 			sk_X509_pop_free(ctx->extra_certs, X509_free);
   746 			ctx->extra_certs = NULL;
   747 			}
   748 
   749 		while ((ca = PEM_read_bio_X509(in,NULL,ctx->default_passwd_callback,ctx->default_passwd_callback_userdata))
   750 			!= NULL)
   751 			{
   752 			r = SSL_CTX_add_extra_chain_cert(ctx, ca);
   753 			if (!r) 
   754 				{
   755 				X509_free(ca);
   756 				ret = 0;
   757 				goto end;
   758 				}
   759 			/* Note that we must not free r if it was successfully
   760 			 * added to the chain (while we must free the main
   761 			 * certificate, since its reference count is increased
   762 			 * by SSL_CTX_use_certificate). */
   763 			}
   764 		/* When the while loop ends, it's usually just EOF. */
   765 		err = ERR_peek_last_error();
   766 		if (ERR_GET_LIB(err) == ERR_LIB_PEM && ERR_GET_REASON(err) == PEM_R_NO_START_LINE)
   767 			ERR_clear_error();
   768 		else 
   769 			ret = 0; /* some real error */
   770 		}
   771 
   772 end:
   773 	if (x != NULL) X509_free(x);
   774 	if (in != NULL) BIO_free(in);
   775 	return(ret);
   776 	}
   777 #endif