]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* crypto/pem/pem_all.c */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
8 | * | |
9 | * This library is free for commercial and non-commercial use as long as | |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 | * | |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
22 | * | |
23 | * Redistribution and use in source and binary forms, with or without | |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 | * the apps directory (application code) you must include an acknowledgement: | |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 | * | |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
52 | * | |
53 | * The licence and distribution terms for any publically available version or | |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
4d94ae00 BM |
58 | /* ==================================================================== |
59 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | |
60 | * | |
61 | * Redistribution and use in source and binary forms, with or without | |
62 | * modification, are permitted provided that the following conditions | |
63 | * are met: | |
64 | * | |
65 | * 1. Redistributions of source code must retain the above copyright | |
66 | * notice, this list of conditions and the following disclaimer. | |
67 | * | |
68 | * 2. Redistributions in binary form must reproduce the above copyright | |
69 | * notice, this list of conditions and the following disclaimer in | |
70 | * the documentation and/or other materials provided with the | |
71 | * distribution. | |
72 | * | |
73 | * 3. All advertising materials mentioning features or use of this | |
74 | * software must display the following acknowledgment: | |
75 | * "This product includes software developed by the OpenSSL Project | |
76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
77 | * | |
78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
79 | * endorse or promote products derived from this software without | |
80 | * prior written permission. For written permission, please contact | |
81 | * openssl-core@openssl.org. | |
82 | * | |
83 | * 5. Products derived from this software may not be called "OpenSSL" | |
84 | * nor may "OpenSSL" appear in their names without prior written | |
85 | * permission of the OpenSSL Project. | |
86 | * | |
87 | * 6. Redistributions of any form whatsoever must retain the following | |
88 | * acknowledgment: | |
89 | * "This product includes software developed by the OpenSSL Project | |
90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
91 | * | |
92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
104 | * ==================================================================== | |
105 | * | |
106 | * This product includes cryptographic software written by Eric Young | |
107 | * (eay@cryptsoft.com). This product includes software written by Tim | |
108 | * Hudson (tjh@cryptsoft.com). | |
109 | * | |
110 | */ | |
d02b48c6 RE |
111 | |
112 | #include <stdio.h> | |
113 | #undef SSLEAY_MACROS | |
58964a49 | 114 | #include "cryptlib.h" |
ec577822 BM |
115 | #include <openssl/bio.h> |
116 | #include <openssl/evp.h> | |
117 | #include <openssl/x509.h> | |
118 | #include <openssl/pkcs7.h> | |
119 | #include <openssl/pem.h> | |
d02b48c6 | 120 | |
cf1b7d96 | 121 | #ifndef OPENSSL_NO_RSA |
52664f50 | 122 | static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); |
12aefe78 | 123 | #endif |
cf1b7d96 | 124 | #ifndef OPENSSL_NO_DSA |
52664f50 | 125 | static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); |
12aefe78 | 126 | #endif |
52664f50 | 127 | |
4d94ae00 BM |
128 | #ifndef OPENSSL_NO_ECDSA |
129 | static ECDSA *pkey_get_ecdsa(EVP_PKEY *key, ECDSA **ecdsa); | |
130 | #endif | |
131 | ||
f62676b9 | 132 | IMPLEMENT_PEM_rw(X509_REQ, X509_REQ, PEM_STRING_X509_REQ, X509_REQ) |
d02b48c6 | 133 | |
8a208cba DSH |
134 | IMPLEMENT_PEM_write(X509_REQ_NEW, X509_REQ, PEM_STRING_X509_REQ_OLD, X509_REQ) |
135 | ||
f62676b9 | 136 | IMPLEMENT_PEM_rw(X509_CRL, X509_CRL, PEM_STRING_X509_CRL, X509_CRL) |
d02b48c6 | 137 | |
f62676b9 | 138 | IMPLEMENT_PEM_rw(PKCS7, PKCS7, PEM_STRING_PKCS7, PKCS7) |
d02b48c6 | 139 | |
f62676b9 DSH |
140 | IMPLEMENT_PEM_rw(NETSCAPE_CERT_SEQUENCE, NETSCAPE_CERT_SEQUENCE, |
141 | PEM_STRING_X509, NETSCAPE_CERT_SEQUENCE) | |
d02b48c6 | 142 | |
d02b48c6 | 143 | |
cf1b7d96 | 144 | #ifndef OPENSSL_NO_RSA |
d02b48c6 | 145 | |
52664f50 DSH |
146 | /* We treat RSA or DSA private keys as a special case. |
147 | * | |
148 | * For private keys we read in an EVP_PKEY structure with | |
149 | * PEM_read_bio_PrivateKey() and extract the relevant private | |
150 | * key: this means can handle "traditional" and PKCS#8 formats | |
151 | * transparently. | |
152 | */ | |
153 | ||
154 | static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) | |
155 | { | |
156 | RSA *rtmp; | |
157 | if(!key) return NULL; | |
c7cb16a8 | 158 | rtmp = EVP_PKEY_get1_RSA(key); |
52664f50 DSH |
159 | EVP_PKEY_free(key); |
160 | if(!rtmp) return NULL; | |
161 | if(rsa) { | |
162 | RSA_free(*rsa); | |
163 | *rsa = rtmp; | |
164 | } | |
165 | return rtmp; | |
166 | } | |
167 | ||
168 | RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, | |
169 | void *u) | |
170 | { | |
171 | EVP_PKEY *pktmp; | |
172 | pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); | |
173 | return pkey_get_rsa(pktmp, rsa); | |
174 | } | |
175 | ||
cf1b7d96 | 176 | #ifndef OPENSSL_NO_FP_API |
52664f50 DSH |
177 | |
178 | RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, | |
179 | void *u) | |
180 | { | |
181 | EVP_PKEY *pktmp; | |
182 | pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); | |
183 | return pkey_get_rsa(pktmp, rsa); | |
184 | } | |
d02b48c6 | 185 | |
52664f50 DSH |
186 | #endif |
187 | ||
188 | IMPLEMENT_PEM_write_cb(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey) | |
f62676b9 | 189 | IMPLEMENT_PEM_rw(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey) |
52664f50 | 190 | IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) |
d02b48c6 | 191 | |
d02b48c6 RE |
192 | #endif |
193 | ||
cf1b7d96 | 194 | #ifndef OPENSSL_NO_DSA |
d02b48c6 | 195 | |
52664f50 DSH |
196 | static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) |
197 | { | |
198 | DSA *dtmp; | |
199 | if(!key) return NULL; | |
c7cb16a8 | 200 | dtmp = EVP_PKEY_get1_DSA(key); |
52664f50 DSH |
201 | EVP_PKEY_free(key); |
202 | if(!dtmp) return NULL; | |
203 | if(dsa) { | |
204 | DSA_free(*dsa); | |
205 | *dsa = dtmp; | |
206 | } | |
207 | return dtmp; | |
208 | } | |
209 | ||
210 | DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, | |
211 | void *u) | |
212 | { | |
213 | EVP_PKEY *pktmp; | |
214 | pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); | |
215 | return pkey_get_dsa(pktmp, dsa); | |
216 | } | |
217 | ||
218 | IMPLEMENT_PEM_write_cb(DSAPrivateKey, DSA, PEM_STRING_DSA, DSAPrivateKey) | |
219 | IMPLEMENT_PEM_rw(DSA_PUBKEY, DSA, PEM_STRING_PUBLIC, DSA_PUBKEY) | |
220 | ||
cf1b7d96 | 221 | #ifndef OPENSSL_NO_FP_API |
52664f50 DSH |
222 | |
223 | DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb, | |
224 | void *u) | |
225 | { | |
226 | EVP_PKEY *pktmp; | |
227 | pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); | |
228 | return pkey_get_dsa(pktmp, dsa); | |
229 | } | |
d02b48c6 | 230 | |
52664f50 | 231 | #endif |
3ea23631 | 232 | |
f62676b9 | 233 | IMPLEMENT_PEM_rw(DSAparams, DSA, PEM_STRING_DSAPARAMS, DSAparams) |
d02b48c6 | 234 | |
d02b48c6 RE |
235 | #endif |
236 | ||
4d94ae00 BM |
237 | #ifndef OPENSSL_NO_ECDSA |
238 | ||
239 | static ECDSA *pkey_get_ecdsa(EVP_PKEY *key, ECDSA **ecdsa) | |
240 | { | |
241 | ECDSA *dtmp; | |
242 | if(!key) return NULL; | |
243 | dtmp = EVP_PKEY_get1_ECDSA(key); | |
244 | EVP_PKEY_free(key); | |
245 | if(!dtmp) return NULL; | |
246 | if(ecdsa) | |
247 | { | |
248 | ECDSA_free(*ecdsa); | |
249 | *ecdsa = dtmp; | |
250 | } | |
251 | return dtmp; | |
252 | } | |
253 | ||
254 | ECDSA *PEM_read_bio_ECDSAPrivateKey(BIO *bp, ECDSA **ecdsa, pem_password_cb *cb, | |
255 | void *u) | |
256 | { | |
257 | EVP_PKEY *pktmp; | |
258 | pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); | |
259 | return pkey_get_ecdsa(pktmp, ecdsa); | |
260 | } | |
261 | ||
262 | IMPLEMENT_PEM_write_cb(ECDSAPrivateKey, ECDSA, PEM_STRING_ECDSA, ECDSAPrivateKey) | |
263 | IMPLEMENT_PEM_rw(ECDSA_PUBKEY, ECDSA, PEM_STRING_PUBLIC, ECDSA_PUBKEY) | |
264 | ||
265 | #ifndef OPENSSL_NO_FP_API | |
266 | ||
267 | ECDSA *PEM_read_ECDSAPrivateKey(FILE *fp, ECDSA **ecdsa, pem_password_cb *cb, | |
268 | void *u) | |
269 | { | |
270 | EVP_PKEY *pktmp; | |
271 | pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); | |
272 | return pkey_get_ecdsa(pktmp, ecdsa); | |
273 | } | |
274 | ||
275 | #endif | |
276 | ||
5dbd3efc | 277 | #endif |
4d94ae00 | 278 | |
5dbd3efc BM |
279 | #ifndef OPENSSL_NO_EC |
280 | IMPLEMENT_PEM_rw(ECPKParameters, EC_GROUP, PEM_STRING_ECPARAMETERS, ECPKParameters) | |
4d94ae00 BM |
281 | #endif |
282 | ||
cf1b7d96 | 283 | #ifndef OPENSSL_NO_DH |
92c046ca | 284 | |
f62676b9 | 285 | IMPLEMENT_PEM_rw(DHparams, DH, PEM_STRING_DHPARAMS, DHparams) |
92c046ca | 286 | |
b0c6fb80 DSH |
287 | #endif |
288 | ||
e7871ffa | 289 | |
0b977773 BM |
290 | /* The PrivateKey case is not that straightforward. |
291 | * IMPLEMENT_PEM_rw_cb(PrivateKey, EVP_PKEY, PEM_STRING_EVP_PKEY, PrivateKey) | |
292 | * does not work, RSA and DSA keys have specific strings. | |
293 | * (When reading, parameter PEM_STRING_EVP_PKEY is a wildcard for anything | |
294 | * appropriate.) | |
295 | */ | |
4d94ae00 BM |
296 | IMPLEMENT_PEM_write_cb(PrivateKey, EVP_PKEY, ((x->type == EVP_PKEY_DSA)?PEM_STRING_DSA:\ |
297 | (x->type == EVP_PKEY_RSA)?PEM_STRING_RSA:PEM_STRING_ECDSA), PrivateKey) | |
52664f50 | 298 | |
d4cec6a1 | 299 | IMPLEMENT_PEM_rw(PUBKEY, EVP_PKEY, PEM_STRING_PUBLIC, PUBKEY) |
19da1300 | 300 |