1 /* 2 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 /* 11 * RSA low level APIs are deprecated for public use, but still ok for 12 * internal use. 13 */ 14 #include "internal/deprecated.h" 15 16 #include <string.h> 17 18 #include <openssl/core_dispatch.h> 19 #include <openssl/core_names.h> 20 #include <openssl/core_object.h> 21 #include <openssl/crypto.h> 22 #include <openssl/err.h> 23 #include <openssl/params.h> 24 #include <openssl/pem.h> 25 #include <openssl/proverr.h> 26 #include "internal/nelem.h" 27 #include "internal/sizes.h" 28 #include "prov/bio.h" 29 #include "prov/decoders.h" 30 #include "prov/implementations.h" 31 #include "endecoder_local.h" 32 33 static int read_pem(PROV_CTX *provctx, OSSL_CORE_BIO *cin, 34 char **pem_name, char **pem_header, 35 unsigned char **data, long *len) 36 { 37 BIO *in = ossl_bio_new_from_core_bio(provctx, cin); 38 int ok; 39 40 if (in == NULL) 41 return 0; 42 ok = (PEM_read_bio(in, pem_name, pem_header, data, len) > 0); 43 44 BIO_free(in); 45 return ok; 46 } 47 48 static OSSL_FUNC_decoder_newctx_fn pem2der_newctx; 49 static OSSL_FUNC_decoder_freectx_fn pem2der_freectx; 50 static OSSL_FUNC_decoder_decode_fn pem2der_decode; 51 52 /* 53 * Context used for PEM to DER decoding. 54 */ 55 struct pem2der_ctx_st { 56 PROV_CTX *provctx; 57 char data_structure[OSSL_MAX_CODEC_STRUCT_SIZE]; 58 char propq[OSSL_MAX_PROPQUERY_SIZE]; 59 }; 60 61 static void *pem2der_newctx(void *provctx) 62 { 63 struct pem2der_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx)); 64 65 if (ctx != NULL) 66 ctx->provctx = provctx; 67 return ctx; 68 } 69 70 static void pem2der_freectx(void *vctx) 71 { 72 struct pem2der_ctx_st *ctx = vctx; 73 74 OPENSSL_free(ctx); 75 } 76 77 static const OSSL_PARAM *pem2der_settable_ctx_params(ossl_unused void *provctx) 78 { 79 static const OSSL_PARAM settables[] = { 80 OSSL_PARAM_utf8_string(OSSL_DECODER_PARAM_PROPERTIES, NULL, 0), 81 OSSL_PARAM_utf8_string(OSSL_OBJECT_PARAM_DATA_STRUCTURE, NULL, 0), 82 OSSL_PARAM_END 83 }; 84 return settables; 85 } 86 87 static int pem2der_set_ctx_params(void *vctx, const OSSL_PARAM params[]) 88 { 89 struct pem2der_ctx_st *ctx = vctx; 90 const OSSL_PARAM *p; 91 char *str; 92 93 p = OSSL_PARAM_locate_const(params, OSSL_DECODER_PARAM_PROPERTIES); 94 str = ctx->propq; 95 if (p != NULL 96 && !OSSL_PARAM_get_utf8_string(p, &str, sizeof(ctx->propq))) 97 return 0; 98 99 p = OSSL_PARAM_locate_const(params, OSSL_OBJECT_PARAM_DATA_STRUCTURE); 100 str = ctx->data_structure; 101 if (p != NULL 102 && !OSSL_PARAM_get_utf8_string(p, &str, sizeof(ctx->data_structure))) 103 return 0; 104 105 return 1; 106 } 107 108 /* pem_password_cb compatible function */ 109 struct pem2der_pass_data_st { 110 OSSL_PASSPHRASE_CALLBACK *cb; 111 void *cbarg; 112 }; 113 114 static int pem2der_pass_helper(char *buf, int num, int w, void *data) 115 { 116 struct pem2der_pass_data_st *pass_data = data; 117 size_t plen; 118 119 if (pass_data == NULL 120 || pass_data->cb == NULL 121 || !pass_data->cb(buf, num, &plen, NULL, pass_data->cbarg)) 122 return -1; 123 return (int)plen; 124 } 125 126 static int pem2der_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, 127 OSSL_CALLBACK *data_cb, void *data_cbarg, 128 OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) 129 { 130 /* 131 * PEM names we recognise. Other PEM names should be recognised by 132 * other decoder implementations. 133 */ 134 static struct pem_name_map_st { 135 const char *pem_name; 136 int object_type; 137 const char *data_type; 138 const char *data_structure; 139 } pem_name_map[] = { 140 /* PKCS#8 and SubjectPublicKeyInfo */ 141 { PEM_STRING_PKCS8, OSSL_OBJECT_PKEY, NULL, "EncryptedPrivateKeyInfo" }, 142 { PEM_STRING_PKCS8INF, OSSL_OBJECT_PKEY, NULL, "PrivateKeyInfo" }, 143 #define PKCS8_LAST_IDX 1 144 { PEM_STRING_PUBLIC, OSSL_OBJECT_PKEY, NULL, "SubjectPublicKeyInfo" }, 145 #define SPKI_LAST_IDX 2 146 /* Our set of type specific PEM types */ 147 { PEM_STRING_DHPARAMS, OSSL_OBJECT_PKEY, "DH", "type-specific" }, 148 { PEM_STRING_DHXPARAMS, OSSL_OBJECT_PKEY, "X9.42 DH", "type-specific" }, 149 { PEM_STRING_DSA, OSSL_OBJECT_PKEY, "DSA", "type-specific" }, 150 { PEM_STRING_DSA_PUBLIC, OSSL_OBJECT_PKEY, "DSA", "type-specific" }, 151 { PEM_STRING_DSAPARAMS, OSSL_OBJECT_PKEY, "DSA", "type-specific" }, 152 { PEM_STRING_ECPRIVATEKEY, OSSL_OBJECT_PKEY, "EC", "type-specific" }, 153 { PEM_STRING_ECPARAMETERS, OSSL_OBJECT_PKEY, "EC", "type-specific" }, 154 { PEM_STRING_SM2PRIVATEKEY, OSSL_OBJECT_PKEY, "SM2", "type-specific" }, 155 { PEM_STRING_SM2PARAMETERS, OSSL_OBJECT_PKEY, "SM2", "type-specific" }, 156 { PEM_STRING_RSA, OSSL_OBJECT_PKEY, "RSA", "type-specific" }, 157 { PEM_STRING_RSA_PUBLIC, OSSL_OBJECT_PKEY, "RSA", "type-specific" }, 158 159 /* 160 * A few others that there is at least have an object type for, even 161 * though there is no provider interface to handle such objects, yet. 162 * However, this is beneficial for the OSSL_STORE result handler. 163 */ 164 { PEM_STRING_X509, OSSL_OBJECT_CERT, NULL, "Certificate" }, 165 { PEM_STRING_X509_TRUSTED, OSSL_OBJECT_CERT, NULL, "Certificate" }, 166 { PEM_STRING_X509_OLD, OSSL_OBJECT_CERT, NULL, "Certificate" }, 167 { PEM_STRING_X509_CRL, OSSL_OBJECT_CRL, NULL, "CertificateList" } 168 }; 169 struct pem2der_ctx_st *ctx = vctx; 170 char *pem_name = NULL, *pem_header = NULL; 171 size_t i; 172 unsigned char *der = NULL; 173 long der_len = 0; 174 int ok = 0; 175 int objtype = OSSL_OBJECT_UNKNOWN; 176 177 ok = read_pem(ctx->provctx, cin, &pem_name, &pem_header, 178 &der, &der_len) > 0; 179 /* We return "empty handed". This is not an error. */ 180 if (!ok) 181 return 1; 182 183 /* 184 * 10 is the number of characters in "Proc-Type:", which 185 * PEM_get_EVP_CIPHER_INFO() requires to be present. 186 * If the PEM header has less characters than that, it's 187 * not worth spending cycles on it. 188 */ 189 if (strlen(pem_header) > 10) { 190 EVP_CIPHER_INFO cipher; 191 struct pem2der_pass_data_st pass_data; 192 193 ok = 0; /* Assume that we fail */ 194 pass_data.cb = pw_cb; 195 pass_data.cbarg = pw_cbarg; 196 if (!PEM_get_EVP_CIPHER_INFO(pem_header, &cipher) 197 || !PEM_do_header(&cipher, der, &der_len, 198 pem2der_pass_helper, &pass_data)) 199 goto end; 200 } 201 202 /* 203 * Indicated that we successfully decoded something, or not at all. 204 * Ending up "empty handed" is not an error. 205 */ 206 ok = 1; 207 208 /* Have a look to see if we recognise anything */ 209 for (i = 0; i < OSSL_NELEM(pem_name_map); i++) 210 if (strcmp(pem_name, pem_name_map[i].pem_name) == 0) 211 break; 212 213 if (i < OSSL_NELEM(pem_name_map)) { 214 OSSL_PARAM params[5], *p = params; 215 /* We expect these to be read only so casting away the const is ok */ 216 char *data_type = (char *)pem_name_map[i].data_type; 217 char *data_structure = (char *)pem_name_map[i].data_structure; 218 219 /* 220 * Since this may perform decryption, we need to check the selection to 221 * avoid password prompts for objects of no interest. 222 */ 223 if (i <= PKCS8_LAST_IDX 224 && ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) 225 || OPENSSL_strcasecmp(ctx->data_structure, "EncryptedPrivateKeyInfo") == 0 226 || OPENSSL_strcasecmp(ctx->data_structure, "PrivateKeyInfo") == 0)) { 227 ok = ossl_epki2pki_der_decode(der, der_len, selection, data_cb, 228 data_cbarg, pw_cb, pw_cbarg, 229 PROV_LIBCTX_OF(ctx->provctx), 230 ctx->propq); 231 goto end; 232 } 233 234 if (i <= SPKI_LAST_IDX 235 && ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) 236 || OPENSSL_strcasecmp(ctx->data_structure, "SubjectPublicKeyInfo") == 0)) { 237 ok = ossl_spki2typespki_der_decode(der, der_len, selection, data_cb, 238 data_cbarg, pw_cb, pw_cbarg, 239 PROV_LIBCTX_OF(ctx->provctx), 240 ctx->propq); 241 goto end; 242 } 243 244 objtype = pem_name_map[i].object_type; 245 if (data_type != NULL) 246 *p++ = 247 OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE, 248 data_type, 0); 249 250 /* We expect this to be read only so casting away the const is ok */ 251 if (data_structure != NULL) 252 *p++ = 253 OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_STRUCTURE, 254 data_structure, 0); 255 *p++ = 256 OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_DATA, 257 der, der_len); 258 *p++ = 259 OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &objtype); 260 261 *p = OSSL_PARAM_construct_end(); 262 263 ok = data_cb(params, data_cbarg); 264 } 265 266 end: 267 OPENSSL_free(pem_name); 268 OPENSSL_free(pem_header); 269 OPENSSL_free(der); 270 return ok; 271 } 272 273 const OSSL_DISPATCH ossl_pem_to_der_decoder_functions[] = { 274 { OSSL_FUNC_DECODER_NEWCTX, (void (*)(void))pem2der_newctx }, 275 { OSSL_FUNC_DECODER_FREECTX, (void (*)(void))pem2der_freectx }, 276 { OSSL_FUNC_DECODER_DECODE, (void (*)(void))pem2der_decode }, 277 { OSSL_FUNC_DECODER_SETTABLE_CTX_PARAMS, 278 (void (*)(void))pem2der_settable_ctx_params }, 279 { OSSL_FUNC_DECODER_SET_CTX_PARAMS, 280 (void (*)(void))pem2der_set_ctx_params }, 281 OSSL_DISPATCH_END 282 }; 283