xref: /freebsd/crypto/openssl/crypto/pem/pem_all.c (revision aa0a1e58)
1 /* crypto/pem/pem_all.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 /* ====================================================================
59  * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
60  *
61  * Redistribution and use in source and binary forms, with or without
62  * modification, are permitted provided that the following conditions
63  * are met:
64  *
65  * 1. Redistributions of source code must retain the above copyright
66  *    notice, this list of conditions and the following disclaimer.
67  *
68  * 2. Redistributions in binary form must reproduce the above copyright
69  *    notice, this list of conditions and the following disclaimer in
70  *    the documentation and/or other materials provided with the
71  *    distribution.
72  *
73  * 3. All advertising materials mentioning features or use of this
74  *    software must display the following acknowledgment:
75  *    "This product includes software developed by the OpenSSL Project
76  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77  *
78  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79  *    endorse or promote products derived from this software without
80  *    prior written permission. For written permission, please contact
81  *    openssl-core@openssl.org.
82  *
83  * 5. Products derived from this software may not be called "OpenSSL"
84  *    nor may "OpenSSL" appear in their names without prior written
85  *    permission of the OpenSSL Project.
86  *
87  * 6. Redistributions of any form whatsoever must retain the following
88  *    acknowledgment:
89  *    "This product includes software developed by the OpenSSL Project
90  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91  *
92  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103  * OF THE POSSIBILITY OF SUCH DAMAGE.
104  * ====================================================================
105  *
106  * This product includes cryptographic software written by Eric Young
107  * (eay@cryptsoft.com).  This product includes software written by Tim
108  * Hudson (tjh@cryptsoft.com).
109  *
110  */
111 
112 #include <stdio.h>
113 #undef SSLEAY_MACROS
114 #include "cryptlib.h"
115 #include <openssl/bio.h>
116 #include <openssl/evp.h>
117 #include <openssl/x509.h>
118 #include <openssl/pkcs7.h>
119 #include <openssl/pem.h>
120 #ifndef OPENSSL_NO_RSA
121 #include <openssl/rsa.h>
122 #endif
123 #ifndef OPENSSL_NO_DSA
124 #include <openssl/dsa.h>
125 #endif
126 #ifndef OPENSSL_NO_DH
127 #include <openssl/dh.h>
128 #endif
129 
130 #ifndef OPENSSL_NO_RSA
131 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
132 #endif
133 #ifndef OPENSSL_NO_DSA
134 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
135 #endif
136 
137 #ifndef OPENSSL_NO_EC
138 static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
139 #endif
140 
141 IMPLEMENT_PEM_rw(X509_REQ, X509_REQ, PEM_STRING_X509_REQ, X509_REQ)
142 
143 IMPLEMENT_PEM_write(X509_REQ_NEW, X509_REQ, PEM_STRING_X509_REQ_OLD, X509_REQ)
144 
145 IMPLEMENT_PEM_rw(X509_CRL, X509_CRL, PEM_STRING_X509_CRL, X509_CRL)
146 
147 IMPLEMENT_PEM_rw(PKCS7, PKCS7, PEM_STRING_PKCS7, PKCS7)
148 
149 IMPLEMENT_PEM_rw(NETSCAPE_CERT_SEQUENCE, NETSCAPE_CERT_SEQUENCE,
150 					PEM_STRING_X509, NETSCAPE_CERT_SEQUENCE)
151 
152 
153 #ifndef OPENSSL_NO_RSA
154 
155 /* We treat RSA or DSA private keys as a special case.
156  *
157  * For private keys we read in an EVP_PKEY structure with
158  * PEM_read_bio_PrivateKey() and extract the relevant private
159  * key: this means can handle "traditional" and PKCS#8 formats
160  * transparently.
161  */
162 
163 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
164 {
165 	RSA *rtmp;
166 	if(!key) return NULL;
167 	rtmp = EVP_PKEY_get1_RSA(key);
168 	EVP_PKEY_free(key);
169 	if(!rtmp) return NULL;
170 	if(rsa) {
171 		RSA_free(*rsa);
172 		*rsa = rtmp;
173 	}
174 	return rtmp;
175 }
176 
177 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb,
178 								void *u)
179 {
180 	EVP_PKEY *pktmp;
181 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
182 	return pkey_get_rsa(pktmp, rsa);
183 }
184 
185 #ifndef OPENSSL_NO_FP_API
186 
187 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb,
188 								void *u)
189 {
190 	EVP_PKEY *pktmp;
191 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
192 	return pkey_get_rsa(pktmp, rsa);
193 }
194 
195 #endif
196 
197 #ifdef OPENSSL_FIPS
198 
199 int PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, const EVP_CIPHER *enc,
200                                                unsigned char *kstr, int klen,
201                                                pem_password_cb *cb, void *u)
202 {
203 	EVP_PKEY *k;
204 	int ret;
205 	k = EVP_PKEY_new();
206 	if (!k)
207 		return 0;
208 	EVP_PKEY_set1_RSA(k, x);
209 
210 	ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
211 	EVP_PKEY_free(k);
212 	return ret;
213 }
214 
215 #ifndef OPENSSL_NO_FP_API
216 int PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
217                                                unsigned char *kstr, int klen,
218                                                pem_password_cb *cb, void *u)
219 {
220 	EVP_PKEY *k;
221 	int ret;
222 	k = EVP_PKEY_new();
223 	if (!k)
224 		return 0;
225 
226 	EVP_PKEY_set1_RSA(k, x);
227 
228 	ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
229 	EVP_PKEY_free(k);
230 	return ret;
231 }
232 #endif
233 
234 #else
235 
236 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey)
237 
238 #endif
239 
240 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey)
241 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY)
242 
243 #endif
244 
245 #ifndef OPENSSL_NO_DSA
246 
247 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
248 {
249 	DSA *dtmp;
250 	if(!key) return NULL;
251 	dtmp = EVP_PKEY_get1_DSA(key);
252 	EVP_PKEY_free(key);
253 	if(!dtmp) return NULL;
254 	if(dsa) {
255 		DSA_free(*dsa);
256 		*dsa = dtmp;
257 	}
258 	return dtmp;
259 }
260 
261 DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb,
262 								void *u)
263 {
264 	EVP_PKEY *pktmp;
265 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
266 	return pkey_get_dsa(pktmp, dsa);
267 }
268 
269 #ifdef OPENSSL_FIPS
270 
271 int PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc,
272                                                unsigned char *kstr, int klen,
273                                                pem_password_cb *cb, void *u)
274 {
275 	EVP_PKEY *k;
276 	int ret;
277 	k = EVP_PKEY_new();
278 	if (!k)
279 		return 0;
280 	EVP_PKEY_set1_DSA(k, x);
281 
282 	ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
283 	EVP_PKEY_free(k);
284 	return ret;
285 }
286 
287 #ifndef OPENSSL_NO_FP_API
288 int PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
289                                                unsigned char *kstr, int klen,
290                                                pem_password_cb *cb, void *u)
291 {
292 	EVP_PKEY *k;
293 	int ret;
294 	k = EVP_PKEY_new();
295 	if (!k)
296 		return 0;
297 	EVP_PKEY_set1_DSA(k, x);
298 	ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
299 	EVP_PKEY_free(k);
300 	return ret;
301 }
302 #endif
303 
304 #else
305 
306 IMPLEMENT_PEM_write_cb_const(DSAPrivateKey, DSA, PEM_STRING_DSA, DSAPrivateKey)
307 
308 #endif
309 
310 IMPLEMENT_PEM_rw(DSA_PUBKEY, DSA, PEM_STRING_PUBLIC, DSA_PUBKEY)
311 
312 #ifndef OPENSSL_NO_FP_API
313 
314 DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb,
315 								void *u)
316 {
317 	EVP_PKEY *pktmp;
318 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
319 	return pkey_get_dsa(pktmp, dsa);
320 }
321 
322 #endif
323 
324 IMPLEMENT_PEM_rw_const(DSAparams, DSA, PEM_STRING_DSAPARAMS, DSAparams)
325 
326 #endif
327 
328 
329 #ifndef OPENSSL_NO_EC
330 static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
331 {
332 	EC_KEY *dtmp;
333 	if(!key) return NULL;
334 	dtmp = EVP_PKEY_get1_EC_KEY(key);
335 	EVP_PKEY_free(key);
336 	if(!dtmp) return NULL;
337 	if(eckey)
338 	{
339  		EC_KEY_free(*eckey);
340 		*eckey = dtmp;
341 	}
342 	return dtmp;
343 }
344 
345 EC_KEY *PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb,
346 							void *u)
347 {
348 	EVP_PKEY *pktmp;
349 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
350 	return pkey_get_eckey(pktmp, key);
351 }
352 
353 IMPLEMENT_PEM_rw_const(ECPKParameters, EC_GROUP, PEM_STRING_ECPARAMETERS, ECPKParameters)
354 
355 
356 
357 #ifdef OPENSSL_FIPS
358 
359 int PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x, const EVP_CIPHER *enc,
360                                                unsigned char *kstr, int klen,
361                                                pem_password_cb *cb, void *u)
362 {
363 	EVP_PKEY *k;
364 	int ret;
365 	k = EVP_PKEY_new();
366 	if (!k)
367 		return 0;
368 	EVP_PKEY_set1_EC_KEY(k, x);
369 
370 	ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
371 	EVP_PKEY_free(k);
372 	return ret;
373 }
374 
375 #ifndef OPENSSL_NO_FP_API
376 int PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc,
377                                                unsigned char *kstr, int klen,
378                                                pem_password_cb *cb, void *u)
379 {
380 	EVP_PKEY *k;
381 	int ret;
382 	k = EVP_PKEY_new();
383 	if (!k)
384 		return 0;
385 	EVP_PKEY_set1_EC_KEY(k, x);
386 	ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
387 	EVP_PKEY_free(k);
388 	return ret;
389 }
390 #endif
391 
392 #else
393 
394 IMPLEMENT_PEM_write_cb(ECPrivateKey, EC_KEY, PEM_STRING_ECPRIVATEKEY, ECPrivateKey)
395 
396 #endif
397 
398 IMPLEMENT_PEM_rw(EC_PUBKEY, EC_KEY, PEM_STRING_PUBLIC, EC_PUBKEY)
399 
400 #ifndef OPENSSL_NO_FP_API
401 
402 EC_KEY *PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb,
403  								void *u)
404 {
405 	EVP_PKEY *pktmp;
406 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
407 	return pkey_get_eckey(pktmp, eckey);
408 }
409 
410 #endif
411 
412 #endif
413 
414 #ifndef OPENSSL_NO_DH
415 
416 IMPLEMENT_PEM_rw_const(DHparams, DH, PEM_STRING_DHPARAMS, DHparams)
417 
418 #endif
419 
420 
421 /* The PrivateKey case is not that straightforward.
422  *   IMPLEMENT_PEM_rw_cb(PrivateKey, EVP_PKEY, PEM_STRING_EVP_PKEY, PrivateKey)
423  * does not work, RSA and DSA keys have specific strings.
424  * (When reading, parameter PEM_STRING_EVP_PKEY is a wildcard for anything
425  * appropriate.)
426  */
427 
428 #ifdef OPENSSL_FIPS
429 
430 static const char *pkey_str(EVP_PKEY *x)
431 	{
432 	switch (x->type)
433 		{
434 		case EVP_PKEY_RSA:
435 		return PEM_STRING_RSA;
436 
437 		case EVP_PKEY_DSA:
438 		return PEM_STRING_DSA;
439 
440 		case EVP_PKEY_EC:
441 		return PEM_STRING_ECPRIVATEKEY;
442 
443 		default:
444 		return NULL;
445 		}
446 	}
447 
448 
449 int PEM_write_bio_PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc,
450                                                unsigned char *kstr, int klen,
451                                                pem_password_cb *cb, void *u)
452 	{
453 		if (FIPS_mode())
454 			return PEM_write_bio_PKCS8PrivateKey(bp, x, enc,
455 						(char *)kstr, klen, cb, u);
456 		else
457                 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_PrivateKey,
458 			pkey_str(x), bp,(char *)x,enc,kstr,klen,cb,u);
459 	}
460 
461 #ifndef OPENSSL_NO_FP_API
462 int PEM_write_PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
463                                                unsigned char *kstr, int klen,
464                                                pem_password_cb *cb, void *u)
465 	{
466 		if (FIPS_mode())
467 			return PEM_write_PKCS8PrivateKey(fp, x, enc,
468 						(char *)kstr, klen, cb, u);
469 		else
470                 	return PEM_ASN1_write((i2d_of_void *)i2d_PrivateKey,
471 			pkey_str(x), fp,(char *)x,enc,kstr,klen,cb,u);
472 	}
473 #endif
474 
475 #else
476 IMPLEMENT_PEM_write_cb(PrivateKey, EVP_PKEY, ((x->type == EVP_PKEY_DSA)?PEM_STRING_DSA:\
477 			(x->type == EVP_PKEY_RSA)?PEM_STRING_RSA:PEM_STRING_ECPRIVATEKEY), PrivateKey)
478 
479 #endif
480 
481 IMPLEMENT_PEM_rw(PUBKEY, EVP_PKEY, PEM_STRING_PUBLIC, PUBKEY)
482 
483