Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.
 
 
 
 
 
 

443 rader
13 KiB

  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.]
  56. */
  57. /* ====================================================================
  58. * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
  59. *
  60. * Redistribution and use in source and binary forms, with or without
  61. * modification, are permitted provided that the following conditions
  62. * are met:
  63. *
  64. * 1. Redistributions of source code must retain the above copyright
  65. * notice, this list of conditions and the following disclaimer.
  66. *
  67. * 2. Redistributions in binary form must reproduce the above copyright
  68. * notice, this list of conditions and the following disclaimer in
  69. * the documentation and/or other materials provided with the
  70. * distribution.
  71. *
  72. * 3. All advertising materials mentioning features or use of this
  73. * software must display the following acknowledgment:
  74. * "This product includes software developed by the OpenSSL Project
  75. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  76. *
  77. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  78. * endorse or promote products derived from this software without
  79. * prior written permission. For written permission, please contact
  80. * openssl-core@openssl.org.
  81. *
  82. * 5. Products derived from this software may not be called "OpenSSL"
  83. * nor may "OpenSSL" appear in their names without prior written
  84. * permission of the OpenSSL Project.
  85. *
  86. * 6. Redistributions of any form whatsoever must retain the following
  87. * acknowledgment:
  88. * "This product includes software developed by the OpenSSL Project
  89. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  90. *
  91. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  92. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  93. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  94. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  95. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  96. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  97. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  98. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  99. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  100. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  101. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  102. * OF THE POSSIBILITY OF SUCH DAMAGE.
  103. * ====================================================================
  104. *
  105. * This product includes cryptographic software written by Eric Young
  106. * (eay@cryptsoft.com). This product includes software written by Tim
  107. * Hudson (tjh@cryptsoft.com). */
  108. #include <stdio.h>
  109. #include <openssl/bio.h>
  110. #include <openssl/dh.h>
  111. #include <openssl/dsa.h>
  112. #include <openssl/evp.h>
  113. #include <openssl/pem.h>
  114. /*#include <openssl/pkcs7.h> */
  115. #include <openssl/rsa.h>
  116. #include <openssl/x509.h>
  117. static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
  118. static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
  119. static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
  120. IMPLEMENT_PEM_rw(X509_REQ, X509_REQ, PEM_STRING_X509_REQ, X509_REQ)
  121. IMPLEMENT_PEM_write(X509_REQ_NEW, X509_REQ, PEM_STRING_X509_REQ_OLD, X509_REQ)
  122. IMPLEMENT_PEM_rw(X509_CRL, X509_CRL, PEM_STRING_X509_CRL, X509_CRL)
  123. #ifndef OPENSSL_NO_RSA
  124. /* We treat RSA or DSA private keys as a special case.
  125. *
  126. * For private keys we read in an EVP_PKEY structure with
  127. * PEM_read_bio_PrivateKey() and extract the relevant private
  128. * key: this means can handle "traditional" and PKCS#8 formats
  129. * transparently.
  130. */
  131. static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
  132. {
  133. RSA *rtmp;
  134. if(!key) return NULL;
  135. rtmp = EVP_PKEY_get1_RSA(key);
  136. EVP_PKEY_free(key);
  137. if(!rtmp) return NULL;
  138. if(rsa) {
  139. RSA_free(*rsa);
  140. *rsa = rtmp;
  141. }
  142. return rtmp;
  143. }
  144. RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb,
  145. void *u)
  146. {
  147. EVP_PKEY *pktmp;
  148. pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
  149. return pkey_get_rsa(pktmp, rsa);
  150. }
  151. #ifndef OPENSSL_NO_FP_API
  152. RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb,
  153. void *u)
  154. {
  155. EVP_PKEY *pktmp;
  156. pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
  157. return pkey_get_rsa(pktmp, rsa);
  158. }
  159. #endif
  160. #ifdef OPENSSL_FIPS
  161. int PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, const EVP_CIPHER *enc,
  162. unsigned char *kstr, int klen,
  163. pem_password_cb *cb, void *u)
  164. {
  165. if (FIPS_mode())
  166. {
  167. EVP_PKEY *k;
  168. int ret;
  169. k = EVP_PKEY_new();
  170. if (!k)
  171. return 0;
  172. EVP_PKEY_set1_RSA(k, x);
  173. ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
  174. EVP_PKEY_free(k);
  175. return ret;
  176. }
  177. else
  178. return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPrivateKey,
  179. PEM_STRING_RSA,bp,x,enc,kstr,klen,cb,u);
  180. }
  181. #ifndef OPENSSL_NO_FP_API
  182. int PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
  183. unsigned char *kstr, int klen,
  184. pem_password_cb *cb, void *u)
  185. {
  186. if (FIPS_mode())
  187. {
  188. EVP_PKEY *k;
  189. int ret;
  190. k = EVP_PKEY_new();
  191. if (!k)
  192. return 0;
  193. EVP_PKEY_set1_RSA(k, x);
  194. ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
  195. EVP_PKEY_free(k);
  196. return ret;
  197. }
  198. else
  199. return PEM_ASN1_write((i2d_of_void *)i2d_RSAPrivateKey,
  200. PEM_STRING_RSA,fp,x,enc,kstr,klen,cb,u);
  201. }
  202. #endif
  203. #else
  204. IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey)
  205. #endif
  206. IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey)
  207. IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY)
  208. #endif
  209. #ifndef OPENSSL_NO_DSA
  210. static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
  211. {
  212. DSA *dtmp;
  213. if(!key) return NULL;
  214. dtmp = EVP_PKEY_get1_DSA(key);
  215. EVP_PKEY_free(key);
  216. if(!dtmp) return NULL;
  217. if(dsa) {
  218. DSA_free(*dsa);
  219. *dsa = dtmp;
  220. }
  221. return dtmp;
  222. }
  223. DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb,
  224. void *u)
  225. {
  226. EVP_PKEY *pktmp;
  227. pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
  228. return pkey_get_dsa(pktmp, dsa); /* will free pktmp */
  229. }
  230. #ifdef OPENSSL_FIPS
  231. int PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc,
  232. unsigned char *kstr, int klen,
  233. pem_password_cb *cb, void *u)
  234. {
  235. if (FIPS_mode())
  236. {
  237. EVP_PKEY *k;
  238. int ret;
  239. k = EVP_PKEY_new();
  240. if (!k)
  241. return 0;
  242. EVP_PKEY_set1_DSA(k, x);
  243. ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
  244. EVP_PKEY_free(k);
  245. return ret;
  246. }
  247. else
  248. return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAPrivateKey,
  249. PEM_STRING_DSA,bp,x,enc,kstr,klen,cb,u);
  250. }
  251. #ifndef OPENSSL_NO_FP_API
  252. int PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
  253. unsigned char *kstr, int klen,
  254. pem_password_cb *cb, void *u)
  255. {
  256. if (FIPS_mode())
  257. {
  258. EVP_PKEY *k;
  259. int ret;
  260. k = EVP_PKEY_new();
  261. if (!k)
  262. return 0;
  263. EVP_PKEY_set1_DSA(k, x);
  264. ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
  265. EVP_PKEY_free(k);
  266. return ret;
  267. }
  268. else
  269. return PEM_ASN1_write((i2d_of_void *)i2d_DSAPrivateKey,
  270. PEM_STRING_DSA,fp,x,enc,kstr,klen,cb,u);
  271. }
  272. #endif
  273. #else
  274. IMPLEMENT_PEM_write_cb_const(DSAPrivateKey, DSA, PEM_STRING_DSA, DSAPrivateKey)
  275. #endif
  276. IMPLEMENT_PEM_rw(DSA_PUBKEY, DSA, PEM_STRING_PUBLIC, DSA_PUBKEY)
  277. #ifndef OPENSSL_NO_FP_API
  278. DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb,
  279. void *u)
  280. {
  281. EVP_PKEY *pktmp;
  282. pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
  283. return pkey_get_dsa(pktmp, dsa); /* will free pktmp */
  284. }
  285. #endif
  286. IMPLEMENT_PEM_rw_const(DSAparams, DSA, PEM_STRING_DSAPARAMS, DSAparams)
  287. #endif
  288. #ifndef OPENSSL_NO_EC
  289. static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
  290. {
  291. EC_KEY *dtmp;
  292. if(!key) return NULL;
  293. dtmp = EVP_PKEY_get1_EC_KEY(key);
  294. EVP_PKEY_free(key);
  295. if(!dtmp) return NULL;
  296. if(eckey)
  297. {
  298. EC_KEY_free(*eckey);
  299. *eckey = dtmp;
  300. }
  301. return dtmp;
  302. }
  303. EC_KEY *PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb,
  304. void *u)
  305. {
  306. EVP_PKEY *pktmp;
  307. pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
  308. return pkey_get_eckey(pktmp, key); /* will free pktmp */
  309. }
  310. /* TODO(fork): remove this code? */
  311. /* IMPLEMENT_PEM_rw_const(ECPKParameters, EC_GROUP, PEM_STRING_ECPARAMETERS, ECPKParameters) */
  312. #ifdef OPENSSL_FIPS
  313. int PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x, const EVP_CIPHER *enc,
  314. unsigned char *kstr, int klen,
  315. pem_password_cb *cb, void *u)
  316. {
  317. if (FIPS_mode())
  318. {
  319. EVP_PKEY *k;
  320. int ret;
  321. k = EVP_PKEY_new();
  322. if (!k)
  323. return 0;
  324. EVP_PKEY_set1_EC_KEY(k, x);
  325. ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u);
  326. EVP_PKEY_free(k);
  327. return ret;
  328. }
  329. else
  330. return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPrivateKey,
  331. PEM_STRING_ECPRIVATEKEY,
  332. bp,x,enc,kstr,klen,cb,u);
  333. }
  334. #ifndef OPENSSL_NO_FP_API
  335. int PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc,
  336. unsigned char *kstr, int klen,
  337. pem_password_cb *cb, void *u)
  338. {
  339. if (FIPS_mode())
  340. {
  341. EVP_PKEY *k;
  342. int ret;
  343. k = EVP_PKEY_new();
  344. if (!k)
  345. return 0;
  346. EVP_PKEY_set1_EC_KEY(k, x);
  347. ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u);
  348. EVP_PKEY_free(k);
  349. return ret;
  350. }
  351. else
  352. return PEM_ASN1_write((i2d_of_void *)i2d_ECPrivateKey,
  353. PEM_STRING_ECPRIVATEKEY,
  354. fp,x,enc,kstr,klen,cb,u);
  355. }
  356. #endif
  357. #else
  358. IMPLEMENT_PEM_write_cb(ECPrivateKey, EC_KEY, PEM_STRING_ECPRIVATEKEY, ECPrivateKey)
  359. #endif
  360. IMPLEMENT_PEM_rw(EC_PUBKEY, EC_KEY, PEM_STRING_PUBLIC, EC_PUBKEY)
  361. #ifndef OPENSSL_NO_FP_API
  362. EC_KEY *PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb,
  363. void *u)
  364. {
  365. EVP_PKEY *pktmp;
  366. pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
  367. return pkey_get_eckey(pktmp, eckey); /* will free pktmp */
  368. }
  369. #endif
  370. #endif
  371. #ifndef OPENSSL_NO_DH
  372. IMPLEMENT_PEM_write_const(DHparams, DH, PEM_STRING_DHPARAMS, DHparams)
  373. /* TODO(fork): remove this code? */
  374. /* IMPLEMENT_PEM_write_const(DHxparams, DH, PEM_STRING_DHXPARAMS, DHxparams) */
  375. #endif
  376. IMPLEMENT_PEM_rw(PUBKEY, EVP_PKEY, PEM_STRING_PUBLIC, PUBKEY)