1*b077aed3SPierre Pronchery /* 2*b077aed3SPierre Pronchery * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. 3*b077aed3SPierre Pronchery * 4*b077aed3SPierre Pronchery * Licensed under the Apache License 2.0 (the "License"). You may not use 5*b077aed3SPierre Pronchery * this file except in compliance with the License. You can obtain a copy 6*b077aed3SPierre Pronchery * in the file LICENSE in the source distribution or at 7*b077aed3SPierre Pronchery * https://www.openssl.org/source/license.html 8*b077aed3SPierre Pronchery */ 9*b077aed3SPierre Pronchery 10*b077aed3SPierre Pronchery /* 11*b077aed3SPierre Pronchery * low level APIs are deprecated for public use, but still ok for 12*b077aed3SPierre Pronchery * internal use. 13*b077aed3SPierre Pronchery */ 14*b077aed3SPierre Pronchery #include "internal/deprecated.h" 15*b077aed3SPierre Pronchery 16*b077aed3SPierre Pronchery #include <string.h> 17*b077aed3SPierre Pronchery 18*b077aed3SPierre Pronchery #include <openssl/core_dispatch.h> 19*b077aed3SPierre Pronchery #include <openssl/core_names.h> 20*b077aed3SPierre Pronchery #include <openssl/core_object.h> 21*b077aed3SPierre Pronchery #include <openssl/crypto.h> 22*b077aed3SPierre Pronchery #include <openssl/params.h> 23*b077aed3SPierre Pronchery #include <openssl/err.h> 24*b077aed3SPierre Pronchery #include <openssl/pem.h> /* For public PVK functions */ 25*b077aed3SPierre Pronchery #include <openssl/x509.h> 26*b077aed3SPierre Pronchery #include "internal/passphrase.h" 27*b077aed3SPierre Pronchery #include "crypto/pem.h" /* For internal PVK and "blob" headers */ 28*b077aed3SPierre Pronchery #include "crypto/rsa.h" 29*b077aed3SPierre Pronchery #include "prov/bio.h" 30*b077aed3SPierre Pronchery #include "prov/implementations.h" 31*b077aed3SPierre Pronchery #include "endecoder_local.h" 32*b077aed3SPierre Pronchery 33*b077aed3SPierre Pronchery struct pvk2key_ctx_st; /* Forward declaration */ 34*b077aed3SPierre Pronchery typedef int check_key_fn(void *, struct pvk2key_ctx_st *ctx); 35*b077aed3SPierre Pronchery typedef void adjust_key_fn(void *, struct pvk2key_ctx_st *ctx); 36*b077aed3SPierre Pronchery typedef void *b2i_PVK_of_bio_pw_fn(BIO *in, pem_password_cb *cb, void *u, 37*b077aed3SPierre Pronchery OSSL_LIB_CTX *libctx, const char *propq); 38*b077aed3SPierre Pronchery typedef void free_key_fn(void *); 39*b077aed3SPierre Pronchery struct keytype_desc_st { 40*b077aed3SPierre Pronchery int type; /* EVP key type */ 41*b077aed3SPierre Pronchery const char *name; /* Keytype */ 42*b077aed3SPierre Pronchery const OSSL_DISPATCH *fns; /* Keymgmt (to pilfer functions from) */ 43*b077aed3SPierre Pronchery 44*b077aed3SPierre Pronchery b2i_PVK_of_bio_pw_fn *read_private_key; 45*b077aed3SPierre Pronchery adjust_key_fn *adjust_key; 46*b077aed3SPierre Pronchery free_key_fn *free_key; 47*b077aed3SPierre Pronchery }; 48*b077aed3SPierre Pronchery 49*b077aed3SPierre Pronchery static OSSL_FUNC_decoder_freectx_fn pvk2key_freectx; 50*b077aed3SPierre Pronchery static OSSL_FUNC_decoder_decode_fn pvk2key_decode; 51*b077aed3SPierre Pronchery static OSSL_FUNC_decoder_export_object_fn pvk2key_export_object; 52*b077aed3SPierre Pronchery 53*b077aed3SPierre Pronchery /* 54*b077aed3SPierre Pronchery * Context used for DER to key decoding. 55*b077aed3SPierre Pronchery */ 56*b077aed3SPierre Pronchery struct pvk2key_ctx_st { 57*b077aed3SPierre Pronchery PROV_CTX *provctx; 58*b077aed3SPierre Pronchery const struct keytype_desc_st *desc; 59*b077aed3SPierre Pronchery /* The selection that is passed to der2key_decode() */ 60*b077aed3SPierre Pronchery int selection; 61*b077aed3SPierre Pronchery }; 62*b077aed3SPierre Pronchery 63*b077aed3SPierre Pronchery static struct pvk2key_ctx_st * 64*b077aed3SPierre Pronchery pvk2key_newctx(void *provctx, const struct keytype_desc_st *desc) 65*b077aed3SPierre Pronchery { 66*b077aed3SPierre Pronchery struct pvk2key_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx)); 67*b077aed3SPierre Pronchery 68*b077aed3SPierre Pronchery if (ctx != NULL) { 69*b077aed3SPierre Pronchery ctx->provctx = provctx; 70*b077aed3SPierre Pronchery ctx->desc = desc; 71*b077aed3SPierre Pronchery } 72*b077aed3SPierre Pronchery return ctx; 73*b077aed3SPierre Pronchery } 74*b077aed3SPierre Pronchery 75*b077aed3SPierre Pronchery static void pvk2key_freectx(void *vctx) 76*b077aed3SPierre Pronchery { 77*b077aed3SPierre Pronchery struct pvk2key_ctx_st *ctx = vctx; 78*b077aed3SPierre Pronchery 79*b077aed3SPierre Pronchery OPENSSL_free(ctx); 80*b077aed3SPierre Pronchery } 81*b077aed3SPierre Pronchery 82*b077aed3SPierre Pronchery static int pvk2key_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, 83*b077aed3SPierre Pronchery OSSL_CALLBACK *data_cb, void *data_cbarg, 84*b077aed3SPierre Pronchery OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) 85*b077aed3SPierre Pronchery { 86*b077aed3SPierre Pronchery struct pvk2key_ctx_st *ctx = vctx; 87*b077aed3SPierre Pronchery BIO *in = ossl_bio_new_from_core_bio(ctx->provctx, cin); 88*b077aed3SPierre Pronchery void *key = NULL; 89*b077aed3SPierre Pronchery int ok = 0; 90*b077aed3SPierre Pronchery 91*b077aed3SPierre Pronchery if (in == NULL) 92*b077aed3SPierre Pronchery return 0; 93*b077aed3SPierre Pronchery 94*b077aed3SPierre Pronchery ctx->selection = selection; 95*b077aed3SPierre Pronchery 96*b077aed3SPierre Pronchery if ((selection == 0 97*b077aed3SPierre Pronchery || (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) 98*b077aed3SPierre Pronchery && ctx->desc->read_private_key != NULL) { 99*b077aed3SPierre Pronchery struct ossl_passphrase_data_st pwdata; 100*b077aed3SPierre Pronchery int err, lib, reason; 101*b077aed3SPierre Pronchery 102*b077aed3SPierre Pronchery memset(&pwdata, 0, sizeof(pwdata)); 103*b077aed3SPierre Pronchery if (!ossl_pw_set_ossl_passphrase_cb(&pwdata, pw_cb, pw_cbarg)) 104*b077aed3SPierre Pronchery goto end; 105*b077aed3SPierre Pronchery 106*b077aed3SPierre Pronchery key = ctx->desc->read_private_key(in, ossl_pw_pvk_password, &pwdata, 107*b077aed3SPierre Pronchery PROV_LIBCTX_OF(ctx->provctx), NULL); 108*b077aed3SPierre Pronchery 109*b077aed3SPierre Pronchery /* 110*b077aed3SPierre Pronchery * Because the PVK API doesn't have a separate decrypt call, we need 111*b077aed3SPierre Pronchery * to check the error queue for certain well known errors that are 112*b077aed3SPierre Pronchery * considered fatal and which we pass through, while the rest gets 113*b077aed3SPierre Pronchery * thrown away. 114*b077aed3SPierre Pronchery */ 115*b077aed3SPierre Pronchery err = ERR_peek_last_error(); 116*b077aed3SPierre Pronchery lib = ERR_GET_LIB(err); 117*b077aed3SPierre Pronchery reason = ERR_GET_REASON(err); 118*b077aed3SPierre Pronchery if (lib == ERR_LIB_PEM 119*b077aed3SPierre Pronchery && (reason == PEM_R_BAD_PASSWORD_READ 120*b077aed3SPierre Pronchery || reason == PEM_R_BAD_DECRYPT)) { 121*b077aed3SPierre Pronchery ERR_clear_last_mark(); 122*b077aed3SPierre Pronchery goto end; 123*b077aed3SPierre Pronchery } 124*b077aed3SPierre Pronchery 125*b077aed3SPierre Pronchery if (selection != 0 && key == NULL) 126*b077aed3SPierre Pronchery goto next; 127*b077aed3SPierre Pronchery } 128*b077aed3SPierre Pronchery 129*b077aed3SPierre Pronchery if (key != NULL && ctx->desc->adjust_key != NULL) 130*b077aed3SPierre Pronchery ctx->desc->adjust_key(key, ctx); 131*b077aed3SPierre Pronchery 132*b077aed3SPierre Pronchery next: 133*b077aed3SPierre Pronchery /* 134*b077aed3SPierre Pronchery * Indicated that we successfully decoded something, or not at all. 135*b077aed3SPierre Pronchery * Ending up "empty handed" is not an error. 136*b077aed3SPierre Pronchery */ 137*b077aed3SPierre Pronchery ok = 1; 138*b077aed3SPierre Pronchery 139*b077aed3SPierre Pronchery /* 140*b077aed3SPierre Pronchery * We free resources here so it's not held up during the callback, because 141*b077aed3SPierre Pronchery * we know the process is recursive and the allocated chunks of memory 142*b077aed3SPierre Pronchery * add up. 143*b077aed3SPierre Pronchery */ 144*b077aed3SPierre Pronchery BIO_free(in); 145*b077aed3SPierre Pronchery in = NULL; 146*b077aed3SPierre Pronchery 147*b077aed3SPierre Pronchery if (key != NULL) { 148*b077aed3SPierre Pronchery OSSL_PARAM params[4]; 149*b077aed3SPierre Pronchery int object_type = OSSL_OBJECT_PKEY; 150*b077aed3SPierre Pronchery 151*b077aed3SPierre Pronchery params[0] = 152*b077aed3SPierre Pronchery OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &object_type); 153*b077aed3SPierre Pronchery params[1] = 154*b077aed3SPierre Pronchery OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE, 155*b077aed3SPierre Pronchery (char *)ctx->desc->name, 0); 156*b077aed3SPierre Pronchery /* The address of the key becomes the octet string */ 157*b077aed3SPierre Pronchery params[2] = 158*b077aed3SPierre Pronchery OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE, 159*b077aed3SPierre Pronchery &key, sizeof(key)); 160*b077aed3SPierre Pronchery params[3] = OSSL_PARAM_construct_end(); 161*b077aed3SPierre Pronchery 162*b077aed3SPierre Pronchery ok = data_cb(params, data_cbarg); 163*b077aed3SPierre Pronchery } 164*b077aed3SPierre Pronchery 165*b077aed3SPierre Pronchery end: 166*b077aed3SPierre Pronchery BIO_free(in); 167*b077aed3SPierre Pronchery ctx->desc->free_key(key); 168*b077aed3SPierre Pronchery 169*b077aed3SPierre Pronchery return ok; 170*b077aed3SPierre Pronchery } 171*b077aed3SPierre Pronchery 172*b077aed3SPierre Pronchery static int pvk2key_export_object(void *vctx, 173*b077aed3SPierre Pronchery const void *reference, size_t reference_sz, 174*b077aed3SPierre Pronchery OSSL_CALLBACK *export_cb, void *export_cbarg) 175*b077aed3SPierre Pronchery { 176*b077aed3SPierre Pronchery struct pvk2key_ctx_st *ctx = vctx; 177*b077aed3SPierre Pronchery OSSL_FUNC_keymgmt_export_fn *export = 178*b077aed3SPierre Pronchery ossl_prov_get_keymgmt_export(ctx->desc->fns); 179*b077aed3SPierre Pronchery void *keydata; 180*b077aed3SPierre Pronchery 181*b077aed3SPierre Pronchery if (reference_sz == sizeof(keydata) && export != NULL) { 182*b077aed3SPierre Pronchery /* The contents of the reference is the address to our object */ 183*b077aed3SPierre Pronchery keydata = *(void **)reference; 184*b077aed3SPierre Pronchery 185*b077aed3SPierre Pronchery return export(keydata, ctx->selection, export_cb, export_cbarg); 186*b077aed3SPierre Pronchery } 187*b077aed3SPierre Pronchery return 0; 188*b077aed3SPierre Pronchery } 189*b077aed3SPierre Pronchery 190*b077aed3SPierre Pronchery /* ---------------------------------------------------------------------- */ 191*b077aed3SPierre Pronchery 192*b077aed3SPierre Pronchery #define dsa_private_key_bio (b2i_PVK_of_bio_pw_fn *)b2i_DSA_PVK_bio_ex 193*b077aed3SPierre Pronchery #define dsa_adjust NULL 194*b077aed3SPierre Pronchery #define dsa_free (void (*)(void *))DSA_free 195*b077aed3SPierre Pronchery 196*b077aed3SPierre Pronchery /* ---------------------------------------------------------------------- */ 197*b077aed3SPierre Pronchery 198*b077aed3SPierre Pronchery #define rsa_private_key_bio (b2i_PVK_of_bio_pw_fn *)b2i_RSA_PVK_bio_ex 199*b077aed3SPierre Pronchery 200*b077aed3SPierre Pronchery static void rsa_adjust(void *key, struct pvk2key_ctx_st *ctx) 201*b077aed3SPierre Pronchery { 202*b077aed3SPierre Pronchery ossl_rsa_set0_libctx(key, PROV_LIBCTX_OF(ctx->provctx)); 203*b077aed3SPierre Pronchery } 204*b077aed3SPierre Pronchery 205*b077aed3SPierre Pronchery #define rsa_free (void (*)(void *))RSA_free 206*b077aed3SPierre Pronchery 207*b077aed3SPierre Pronchery /* ---------------------------------------------------------------------- */ 208*b077aed3SPierre Pronchery 209*b077aed3SPierre Pronchery #define IMPLEMENT_MS(KEYTYPE, keytype) \ 210*b077aed3SPierre Pronchery static const struct keytype_desc_st \ 211*b077aed3SPierre Pronchery pvk2##keytype##_desc = { \ 212*b077aed3SPierre Pronchery EVP_PKEY_##KEYTYPE, #KEYTYPE, \ 213*b077aed3SPierre Pronchery ossl_##keytype##_keymgmt_functions, \ 214*b077aed3SPierre Pronchery keytype##_private_key_bio, \ 215*b077aed3SPierre Pronchery keytype##_adjust, \ 216*b077aed3SPierre Pronchery keytype##_free \ 217*b077aed3SPierre Pronchery }; \ 218*b077aed3SPierre Pronchery static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 219*b077aed3SPierre Pronchery static void *pvk2##keytype##_newctx(void *provctx) \ 220*b077aed3SPierre Pronchery { \ 221*b077aed3SPierre Pronchery return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \ 222*b077aed3SPierre Pronchery } \ 223*b077aed3SPierre Pronchery const OSSL_DISPATCH \ 224*b077aed3SPierre Pronchery ossl_##pvk_to_##keytype##_decoder_functions[] = { \ 225*b077aed3SPierre Pronchery { OSSL_FUNC_DECODER_NEWCTX, \ 226*b077aed3SPierre Pronchery (void (*)(void))pvk2##keytype##_newctx }, \ 227*b077aed3SPierre Pronchery { OSSL_FUNC_DECODER_FREECTX, \ 228*b077aed3SPierre Pronchery (void (*)(void))pvk2key_freectx }, \ 229*b077aed3SPierre Pronchery { OSSL_FUNC_DECODER_DECODE, \ 230*b077aed3SPierre Pronchery (void (*)(void))pvk2key_decode }, \ 231*b077aed3SPierre Pronchery { OSSL_FUNC_DECODER_EXPORT_OBJECT, \ 232*b077aed3SPierre Pronchery (void (*)(void))pvk2key_export_object }, \ 233*b077aed3SPierre Pronchery { 0, NULL } \ 234*b077aed3SPierre Pronchery } 235*b077aed3SPierre Pronchery 236*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_DSA 237*b077aed3SPierre Pronchery IMPLEMENT_MS(DSA, dsa); 238*b077aed3SPierre Pronchery #endif 239*b077aed3SPierre Pronchery IMPLEMENT_MS(RSA, rsa); 240