Loading crypto/pem/pem_lib.c +98 −59 Original line number Diff line number Diff line Loading @@ -9,6 +9,7 @@ #include <stdio.h> #include <ctype.h> #include <string.h> #include "internal/cryptlib.h" #include <openssl/buffer.h> #include <openssl/objects.h> Loading Loading @@ -389,115 +390,153 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, pem_password_cb *callback, void *u) { int i = 0, j, o, klen; long len; int ok; int keylen; long len = *plen; int ilen = (int) len; /* EVP_DecryptUpdate etc. take int lengths */ EVP_CIPHER_CTX *ctx; unsigned char key[EVP_MAX_KEY_LENGTH]; char buf[PEM_BUFSIZE]; len = *plen; #if LONG_MAX > INT_MAX /* Check that we did not truncate the length */ if (len > INT_MAX) { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_HEADER_TOO_LONG); return 0; } #endif if (cipher->cipher == NULL) return (1); return 1; if (callback == NULL) klen = PEM_def_callback(buf, PEM_BUFSIZE, 0, u); keylen = PEM_def_callback(buf, PEM_BUFSIZE, 0, u); else klen = callback(buf, PEM_BUFSIZE, 0, u); if (klen <= 0) { keylen = callback(buf, PEM_BUFSIZE, 0, u); if (keylen <= 0) { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_PASSWORD_READ); return (0); return 0; } #ifdef CHARSET_EBCDIC /* Convert the pass phrase from EBCDIC */ ebcdic2ascii(buf, buf, klen); ebcdic2ascii(buf, buf, keylen); #endif if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher->iv[0]), (unsigned char *)buf, klen, 1, key, NULL)) (unsigned char *)buf, keylen, 1, key, NULL)) return 0; j = (int)len; ctx = EVP_CIPHER_CTX_new(); if (ctx == NULL) return 0; o = EVP_DecryptInit_ex(ctx, cipher->cipher, NULL, key, &(cipher->iv[0])); if (o) o = EVP_DecryptUpdate(ctx, data, &i, data, j); if (o) o = EVP_DecryptFinal_ex(ctx, &(data[i]), &j); ok = EVP_DecryptInit_ex(ctx, cipher->cipher, NULL, key, &(cipher->iv[0])); if (ok) ok = EVP_DecryptUpdate(ctx, data, &ilen, data, ilen); if (ok) { /* Squirrel away the length of data decrypted so far. */ *plen = ilen; ok = EVP_DecryptFinal_ex(ctx, &(data[ilen]), &ilen); } if (ok) *plen += ilen; else PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_DECRYPT); EVP_CIPHER_CTX_free(ctx); OPENSSL_cleanse((char *)buf, sizeof(buf)); OPENSSL_cleanse((char *)key, sizeof(key)); if (o) j += i; else { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_DECRYPT); return (0); } *plen = j; return (1); return ok; } /* * This implements a very limited PEM header parser that does not support the * full grammar of rfc1421. In particular, folded headers are not supported, * nor is additional whitespace. * * A robust implementation would make use of a library that turns the headers * into a BIO from which one folded line is read at a time, and is then split * into a header label and content. We would then parse the content of the * headers we care about. This is overkill for just this limited use-case, but * presumably we also parse rfc822-style headers for S/MIME, so a common * abstraction might well be more generally useful. */ int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) { static const char ProcType[] = "Proc-Type:"; static const char ENCRYPTED[] = "ENCRYPTED"; static const char DEKInfo[] = "DEK-Info:"; const EVP_CIPHER *enc = NULL; int ivlen; char *dekinfostart, c; cipher->cipher = NULL; if ((header == NULL) || (*header == '\0') || (*header == '\n')) return (1); if (strncmp(header, "Proc-Type: ", 11) != 0) { return 1; if (strncmp(header, ProcType, sizeof(ProcType)-1) != 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_PROC_TYPE); return (0); return 0; } header += 11; if (*header != '4') return (0); header++; if (*header != ',') return (0); header++; if (strncmp(header, "ENCRYPTED", 9) != 0) { header += sizeof(ProcType)-1; header += strspn(header, " \t"); if (*header++ != '4' || *header++ != ',') return 0; header += strspn(header, " \t"); /* We expect "ENCRYPTED" followed by optional white-space + line break */ if (strncmp(header, ENCRYPTED, sizeof(ENCRYPTED)-1) != 0 || strspn(header+sizeof(ENCRYPTED)-1, " \t\r\n") == 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_ENCRYPTED); return (0); return 0; } for (; (*header != '\n') && (*header != '\0'); header++) ; if (*header == '\0') { header += sizeof(ENCRYPTED)-1; header += strspn(header, " \t\r"); if (*header++ != '\n') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_SHORT_HEADER); return (0); return 0; } header++; if (strncmp(header, "DEK-Info: ", 10) != 0) { /*- * https://tools.ietf.org/html/rfc1421#section-4.6.1.3 * We expect "DEK-Info: algo[,hex-parameters]" */ if (strncmp(header, DEKInfo, sizeof(DEKInfo)-1) != 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_DEK_INFO); return (0); return 0; } header += 10; header += sizeof(DEKInfo)-1; header += strspn(header, " \t"); /* * DEK-INFO is a comma-separated combination of algorithm name and optional * parameters. */ dekinfostart = header; for (;;) { header += strcspn(header, " \t,"); c = *header; #ifndef CHARSET_EBCDIC if (!(((c >= 'A') && (c <= 'Z')) || (c == '-') || ((c >= '0') && (c <= '9')))) break; #else if (!(isupper(c) || (c == '-') || isdigit(c))) break; #endif header++; } *header = '\0'; cipher->cipher = enc = EVP_get_cipherbyname(dekinfostart); *header++ = c; *header = c; header += strspn(header, " \t"); if (enc == NULL) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_UNSUPPORTED_ENCRYPTION); return (0); return 0; } ivlen = EVP_CIPHER_iv_length(enc); if (ivlen > 0 && *header++ != ',') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_MISSING_DEK_IV); return 0; } else if (ivlen == 0 && *header == ',') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_UNEXPECTED_DEK_IV); return 0; } if (!load_iv(&header, cipher->iv, EVP_CIPHER_iv_length(enc))) return (0); return 0; return (1); return 1; } static int load_iv(char **fromp, unsigned char *to, int num) Loading doc/crypto/pem_read.pod 0 → 100644 +90 −0 Original line number Diff line number Diff line =pod =head1 NAME PEM_read, PEM_read_bio, PEM_do_header - low-level PEM routines =head1 SYNOPSIS #include <openssl/pem.h> int PEM_read(FILE *fp, char **name, char **header, unsigned char **data, long *len); int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data, long *len); int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); int PEM_do_header(EVP_CIPHER_INFO *cinfo, unsigned char *data, long *len, pem_password_cb *cb, void *u); =head1 DESCRIPTION These functions read and decode PEM-encoded objects, returning the PEM type B<name>, any encapsulation B<header> and the decoded B<data> of length B<len>. PEM_read() reads from the stdio file handle B<fp>, while PEM_read_bio() reads from the BIO B<bio>. Both skip any non-PEM data that precedes the start of the next PEM object. When an object is successfuly retrieved, the type name from the "----BEGIN <type>-----" is returned via the B<name> argument, any encapsulation headers are returned in B<header> and the base64-decoded content and its length are returned via B<data> and B<len> respectively. The B<name>, B<header> and B<data> pointers are allocated via OPENSSL_malloc() and should be freed by the caller via OPENSSL_free() when no longer needed. PEM_get_EVP_CIPHER_INFO() can be used to determine the B<data> returned by PEM_read() or PEM_read_bio() is encrypted and to retrieve the associated cipher and IV. The caller passes a pointer to structure of type B<EVP_CIPHER_INFO> via the B<cinfo> argument and the B<header> returned via PEM_read() or PEM_read_bio(). If the call is succesful 1 is retured and the cipher and IV are stored at the address pointed to by B<cinfo>. When the header is malformed, or not supported or when the cipher is unknown or some internal error happens 0 is returned. This function is deprecated, see B<NOTES> below. PEM_do_header() can then be used to decrypt the data if the header indicates encryption. The B<cinfo> argument is a pointer to the structure initialized by the previous call to PEM_get_EVP_CIPHER_INFO(). The B<data> and B<len> arguments are those returned by the previous call to PEM_read() or PEM_read_bio(). The B<cb> and B<u> arguments make it possible to override the default password prompt function as described in L<pem(3)>. On successful completion the B<data> is decrypted in place, and B<len> is updated to indicate the plaintext length. This function is deprecated, see B<NOTES> below. If the data is a priori known to not be encrypted, then neither PEM_do_header() nor PEM_get_EVP_CIPHER_INFO() need be called. The final B<data> buffer is typically an ASN.1 object which can be decoded with the B<d2i> function appropriate to the type B<name>. =head1 RETURN VALUES PEM_read() and PEM_read_bio() return 1 on success and 0 on failure, the latter includes the case when no more PEM objects remain in the input file. To distinguish end of file from more serious errors the caller must peek at the error stack and check for B<PEM_R_NO_START_LINE>, which indicates that no more PEM objects were found. See L<ERR_peek_last_error(3)>, L<ERR_GET_REASON(3)>. PEM_get_EVP_CIPHER_INFO() and PEM_do_header() return 1 on success, and 0 on failure. The B<data> is likely meaningless if these functions fail. =head1 NOTES The PEM_get_EVP_CIPHER_INFO() and PEM_do_header() functions are deprecated. This is because the underlying PEM encryption format is obsolete, and should be avoided. It uses an encryption format with an OpenSSL-specific key-derivation function, which employs MD5 with an iteration count of 1! Instead, private keys should be stored in PKCS#8 form, with a strong PKCS#5 v2.0 PBE. See L<pkcs8(1)> and L<pem(3)> and L<d2i_PKCS8PrivateKey_bio(3)>. =head1 SEE ALSO L<pem(3)>, L<ERR_peek_last_error(3)>, L<ERR_GET_LIB(3)>, L<pkcs8(1)>, L<d2i_PKCS8PrivateKey_bio(3)>. Loading
crypto/pem/pem_lib.c +98 −59 Original line number Diff line number Diff line Loading @@ -9,6 +9,7 @@ #include <stdio.h> #include <ctype.h> #include <string.h> #include "internal/cryptlib.h" #include <openssl/buffer.h> #include <openssl/objects.h> Loading Loading @@ -389,115 +390,153 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, pem_password_cb *callback, void *u) { int i = 0, j, o, klen; long len; int ok; int keylen; long len = *plen; int ilen = (int) len; /* EVP_DecryptUpdate etc. take int lengths */ EVP_CIPHER_CTX *ctx; unsigned char key[EVP_MAX_KEY_LENGTH]; char buf[PEM_BUFSIZE]; len = *plen; #if LONG_MAX > INT_MAX /* Check that we did not truncate the length */ if (len > INT_MAX) { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_HEADER_TOO_LONG); return 0; } #endif if (cipher->cipher == NULL) return (1); return 1; if (callback == NULL) klen = PEM_def_callback(buf, PEM_BUFSIZE, 0, u); keylen = PEM_def_callback(buf, PEM_BUFSIZE, 0, u); else klen = callback(buf, PEM_BUFSIZE, 0, u); if (klen <= 0) { keylen = callback(buf, PEM_BUFSIZE, 0, u); if (keylen <= 0) { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_PASSWORD_READ); return (0); return 0; } #ifdef CHARSET_EBCDIC /* Convert the pass phrase from EBCDIC */ ebcdic2ascii(buf, buf, klen); ebcdic2ascii(buf, buf, keylen); #endif if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher->iv[0]), (unsigned char *)buf, klen, 1, key, NULL)) (unsigned char *)buf, keylen, 1, key, NULL)) return 0; j = (int)len; ctx = EVP_CIPHER_CTX_new(); if (ctx == NULL) return 0; o = EVP_DecryptInit_ex(ctx, cipher->cipher, NULL, key, &(cipher->iv[0])); if (o) o = EVP_DecryptUpdate(ctx, data, &i, data, j); if (o) o = EVP_DecryptFinal_ex(ctx, &(data[i]), &j); ok = EVP_DecryptInit_ex(ctx, cipher->cipher, NULL, key, &(cipher->iv[0])); if (ok) ok = EVP_DecryptUpdate(ctx, data, &ilen, data, ilen); if (ok) { /* Squirrel away the length of data decrypted so far. */ *plen = ilen; ok = EVP_DecryptFinal_ex(ctx, &(data[ilen]), &ilen); } if (ok) *plen += ilen; else PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_DECRYPT); EVP_CIPHER_CTX_free(ctx); OPENSSL_cleanse((char *)buf, sizeof(buf)); OPENSSL_cleanse((char *)key, sizeof(key)); if (o) j += i; else { PEMerr(PEM_F_PEM_DO_HEADER, PEM_R_BAD_DECRYPT); return (0); } *plen = j; return (1); return ok; } /* * This implements a very limited PEM header parser that does not support the * full grammar of rfc1421. In particular, folded headers are not supported, * nor is additional whitespace. * * A robust implementation would make use of a library that turns the headers * into a BIO from which one folded line is read at a time, and is then split * into a header label and content. We would then parse the content of the * headers we care about. This is overkill for just this limited use-case, but * presumably we also parse rfc822-style headers for S/MIME, so a common * abstraction might well be more generally useful. */ int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) { static const char ProcType[] = "Proc-Type:"; static const char ENCRYPTED[] = "ENCRYPTED"; static const char DEKInfo[] = "DEK-Info:"; const EVP_CIPHER *enc = NULL; int ivlen; char *dekinfostart, c; cipher->cipher = NULL; if ((header == NULL) || (*header == '\0') || (*header == '\n')) return (1); if (strncmp(header, "Proc-Type: ", 11) != 0) { return 1; if (strncmp(header, ProcType, sizeof(ProcType)-1) != 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_PROC_TYPE); return (0); return 0; } header += 11; if (*header != '4') return (0); header++; if (*header != ',') return (0); header++; if (strncmp(header, "ENCRYPTED", 9) != 0) { header += sizeof(ProcType)-1; header += strspn(header, " \t"); if (*header++ != '4' || *header++ != ',') return 0; header += strspn(header, " \t"); /* We expect "ENCRYPTED" followed by optional white-space + line break */ if (strncmp(header, ENCRYPTED, sizeof(ENCRYPTED)-1) != 0 || strspn(header+sizeof(ENCRYPTED)-1, " \t\r\n") == 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_ENCRYPTED); return (0); return 0; } for (; (*header != '\n') && (*header != '\0'); header++) ; if (*header == '\0') { header += sizeof(ENCRYPTED)-1; header += strspn(header, " \t\r"); if (*header++ != '\n') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_SHORT_HEADER); return (0); return 0; } header++; if (strncmp(header, "DEK-Info: ", 10) != 0) { /*- * https://tools.ietf.org/html/rfc1421#section-4.6.1.3 * We expect "DEK-Info: algo[,hex-parameters]" */ if (strncmp(header, DEKInfo, sizeof(DEKInfo)-1) != 0) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_NOT_DEK_INFO); return (0); return 0; } header += 10; header += sizeof(DEKInfo)-1; header += strspn(header, " \t"); /* * DEK-INFO is a comma-separated combination of algorithm name and optional * parameters. */ dekinfostart = header; for (;;) { header += strcspn(header, " \t,"); c = *header; #ifndef CHARSET_EBCDIC if (!(((c >= 'A') && (c <= 'Z')) || (c == '-') || ((c >= '0') && (c <= '9')))) break; #else if (!(isupper(c) || (c == '-') || isdigit(c))) break; #endif header++; } *header = '\0'; cipher->cipher = enc = EVP_get_cipherbyname(dekinfostart); *header++ = c; *header = c; header += strspn(header, " \t"); if (enc == NULL) { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_UNSUPPORTED_ENCRYPTION); return (0); return 0; } ivlen = EVP_CIPHER_iv_length(enc); if (ivlen > 0 && *header++ != ',') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_MISSING_DEK_IV); return 0; } else if (ivlen == 0 && *header == ',') { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO, PEM_R_UNEXPECTED_DEK_IV); return 0; } if (!load_iv(&header, cipher->iv, EVP_CIPHER_iv_length(enc))) return (0); return 0; return (1); return 1; } static int load_iv(char **fromp, unsigned char *to, int num) Loading
doc/crypto/pem_read.pod 0 → 100644 +90 −0 Original line number Diff line number Diff line =pod =head1 NAME PEM_read, PEM_read_bio, PEM_do_header - low-level PEM routines =head1 SYNOPSIS #include <openssl/pem.h> int PEM_read(FILE *fp, char **name, char **header, unsigned char **data, long *len); int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data, long *len); int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); int PEM_do_header(EVP_CIPHER_INFO *cinfo, unsigned char *data, long *len, pem_password_cb *cb, void *u); =head1 DESCRIPTION These functions read and decode PEM-encoded objects, returning the PEM type B<name>, any encapsulation B<header> and the decoded B<data> of length B<len>. PEM_read() reads from the stdio file handle B<fp>, while PEM_read_bio() reads from the BIO B<bio>. Both skip any non-PEM data that precedes the start of the next PEM object. When an object is successfuly retrieved, the type name from the "----BEGIN <type>-----" is returned via the B<name> argument, any encapsulation headers are returned in B<header> and the base64-decoded content and its length are returned via B<data> and B<len> respectively. The B<name>, B<header> and B<data> pointers are allocated via OPENSSL_malloc() and should be freed by the caller via OPENSSL_free() when no longer needed. PEM_get_EVP_CIPHER_INFO() can be used to determine the B<data> returned by PEM_read() or PEM_read_bio() is encrypted and to retrieve the associated cipher and IV. The caller passes a pointer to structure of type B<EVP_CIPHER_INFO> via the B<cinfo> argument and the B<header> returned via PEM_read() or PEM_read_bio(). If the call is succesful 1 is retured and the cipher and IV are stored at the address pointed to by B<cinfo>. When the header is malformed, or not supported or when the cipher is unknown or some internal error happens 0 is returned. This function is deprecated, see B<NOTES> below. PEM_do_header() can then be used to decrypt the data if the header indicates encryption. The B<cinfo> argument is a pointer to the structure initialized by the previous call to PEM_get_EVP_CIPHER_INFO(). The B<data> and B<len> arguments are those returned by the previous call to PEM_read() or PEM_read_bio(). The B<cb> and B<u> arguments make it possible to override the default password prompt function as described in L<pem(3)>. On successful completion the B<data> is decrypted in place, and B<len> is updated to indicate the plaintext length. This function is deprecated, see B<NOTES> below. If the data is a priori known to not be encrypted, then neither PEM_do_header() nor PEM_get_EVP_CIPHER_INFO() need be called. The final B<data> buffer is typically an ASN.1 object which can be decoded with the B<d2i> function appropriate to the type B<name>. =head1 RETURN VALUES PEM_read() and PEM_read_bio() return 1 on success and 0 on failure, the latter includes the case when no more PEM objects remain in the input file. To distinguish end of file from more serious errors the caller must peek at the error stack and check for B<PEM_R_NO_START_LINE>, which indicates that no more PEM objects were found. See L<ERR_peek_last_error(3)>, L<ERR_GET_REASON(3)>. PEM_get_EVP_CIPHER_INFO() and PEM_do_header() return 1 on success, and 0 on failure. The B<data> is likely meaningless if these functions fail. =head1 NOTES The PEM_get_EVP_CIPHER_INFO() and PEM_do_header() functions are deprecated. This is because the underlying PEM encryption format is obsolete, and should be avoided. It uses an encryption format with an OpenSSL-specific key-derivation function, which employs MD5 with an iteration count of 1! Instead, private keys should be stored in PKCS#8 form, with a strong PKCS#5 v2.0 PBE. See L<pkcs8(1)> and L<pem(3)> and L<d2i_PKCS8PrivateKey_bio(3)>. =head1 SEE ALSO L<pem(3)>, L<ERR_peek_last_error(3)>, L<ERR_GET_LIB(3)>, L<pkcs8(1)>, L<d2i_PKCS8PrivateKey_bio(3)>.