Coverage Report

Created: 2025-11-16 06:40

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl32/providers/implementations/encode_decode/decode_pem2der.c
Line
Count
Source
1
/*
2
 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * RSA low level APIs are deprecated for public use, but still ok for
12
 * internal use.
13
 */
14
#include "internal/deprecated.h"
15
16
#include <string.h>
17
18
#include <openssl/core_dispatch.h>
19
#include <openssl/core_names.h>
20
#include <openssl/core_object.h>
21
#include <openssl/crypto.h>
22
#include <openssl/err.h>
23
#include <openssl/params.h>
24
#include <openssl/pem.h>
25
#include <openssl/proverr.h>
26
#include "internal/nelem.h"
27
#include "prov/bio.h"
28
#include "prov/implementations.h"
29
#include "endecoder_local.h"
30
31
static int read_pem(PROV_CTX *provctx, OSSL_CORE_BIO *cin,
32
                    char **pem_name, char **pem_header,
33
                    unsigned char **data, long *len)
34
145k
{
35
145k
    BIO *in = ossl_bio_new_from_core_bio(provctx, cin);
36
145k
    int ok;
37
38
145k
    if (in == NULL)
39
0
        return 0;
40
145k
    ok = (PEM_read_bio(in, pem_name, pem_header, data, len) > 0);
41
42
145k
    BIO_free(in);
43
145k
    return ok;
44
145k
}
45
46
static OSSL_FUNC_decoder_newctx_fn pem2der_newctx;
47
static OSSL_FUNC_decoder_freectx_fn pem2der_freectx;
48
static OSSL_FUNC_decoder_decode_fn pem2der_decode;
49
50
/*
51
 * Context used for PEM to DER decoding.
52
 */
53
struct pem2der_ctx_st {
54
    PROV_CTX *provctx;
55
};
56
57
static void *pem2der_newctx(void *provctx)
58
2.38M
{
59
2.38M
    struct pem2der_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx));
60
61
2.38M
    if (ctx != NULL)
62
2.38M
        ctx->provctx = provctx;
63
2.38M
    return ctx;
64
2.38M
}
65
66
static void pem2der_freectx(void *vctx)
67
2.38M
{
68
2.38M
    struct pem2der_ctx_st *ctx = vctx;
69
70
2.38M
    OPENSSL_free(ctx);
71
2.38M
}
72
73
/* pem_password_cb compatible function */
74
struct pem2der_pass_data_st {
75
    OSSL_PASSPHRASE_CALLBACK *cb;
76
    void *cbarg;
77
};
78
79
static int pem2der_pass_helper(char *buf, int num, int w, void *data)
80
2
{
81
2
    struct pem2der_pass_data_st *pass_data = data;
82
2
    size_t plen;
83
84
2
    if (pass_data == NULL
85
2
        || pass_data->cb == NULL
86
2
        || !pass_data->cb(buf, num, &plen, NULL, pass_data->cbarg))
87
2
        return -1;
88
0
    return (int)plen;
89
2
}
90
91
/*
92
 * The selection parameter in pem2der_decode() is not used by this function
93
 * because it's not relevant just to decode PEM to DER.
94
 */
95
static int pem2der_decode(void *vctx, OSSL_CORE_BIO *cin, int selection,
96
                          OSSL_CALLBACK *data_cb, void *data_cbarg,
97
                          OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg)
98
85.7k
{
99
    /*
100
     * PEM names we recognise.  Other PEM names should be recognised by
101
     * other decoder implementations.
102
     */
103
85.7k
    static struct pem_name_map_st {
104
85.7k
        const char *pem_name;
105
85.7k
        int object_type;
106
85.7k
        const char *data_type;
107
85.7k
        const char *data_structure;
108
85.7k
    } pem_name_map[] = {
109
        /* PKCS#8 and SubjectPublicKeyInfo */
110
85.7k
        { PEM_STRING_PKCS8, OSSL_OBJECT_PKEY, NULL, "EncryptedPrivateKeyInfo" },
111
85.7k
        { PEM_STRING_PKCS8INF, OSSL_OBJECT_PKEY, NULL, "PrivateKeyInfo" },
112
85.7k
        { PEM_STRING_PUBLIC, OSSL_OBJECT_PKEY, NULL, "SubjectPublicKeyInfo" },
113
114
        /* Our set of type specific PEM types */
115
85.7k
        { PEM_STRING_DHPARAMS, OSSL_OBJECT_PKEY, "DH", "type-specific" },
116
85.7k
        { PEM_STRING_DHXPARAMS, OSSL_OBJECT_PKEY, "X9.42 DH", "type-specific" },
117
85.7k
        { PEM_STRING_DSA, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
118
85.7k
        { PEM_STRING_DSA_PUBLIC, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
119
85.7k
        { PEM_STRING_DSAPARAMS, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
120
85.7k
        { PEM_STRING_ECPRIVATEKEY, OSSL_OBJECT_PKEY, "EC", "type-specific" },
121
85.7k
        { PEM_STRING_ECPARAMETERS, OSSL_OBJECT_PKEY, "EC", "type-specific" },
122
85.7k
        { PEM_STRING_SM2PRIVATEKEY, OSSL_OBJECT_PKEY, "SM2", "type-specific" },
123
85.7k
        { PEM_STRING_SM2PARAMETERS, OSSL_OBJECT_PKEY, "SM2", "type-specific" },
124
85.7k
        { PEM_STRING_RSA, OSSL_OBJECT_PKEY, "RSA", "type-specific" },
125
85.7k
        { PEM_STRING_RSA_PUBLIC, OSSL_OBJECT_PKEY, "RSA", "type-specific" },
126
127
        /*
128
         * A few others that there is at least have an object type for, even
129
         * though there is no provider interface to handle such objects, yet.
130
         * However, this is beneficial for the OSSL_STORE result handler.
131
         */
132
85.7k
        { PEM_STRING_X509, OSSL_OBJECT_CERT, NULL, "Certificate" },
133
85.7k
        { PEM_STRING_X509_TRUSTED, OSSL_OBJECT_CERT, NULL, "Certificate" },
134
85.7k
        { PEM_STRING_X509_OLD, OSSL_OBJECT_CERT, NULL, "Certificate" },
135
85.7k
        { PEM_STRING_X509_CRL, OSSL_OBJECT_CRL, NULL, "CertificateList" }
136
85.7k
    };
137
85.7k
    struct pem2der_ctx_st *ctx = vctx;
138
85.7k
    char *pem_name = NULL, *pem_header = NULL;
139
85.7k
    size_t i;
140
85.7k
    unsigned char *der = NULL;
141
85.7k
    long der_len = 0;
142
85.7k
    int ok = 0;
143
85.7k
    int objtype = OSSL_OBJECT_UNKNOWN;
144
145
85.7k
    ok = read_pem(ctx->provctx, cin, &pem_name, &pem_header,
146
85.7k
                  &der, &der_len) > 0;
147
    /* We return "empty handed".  This is not an error. */
148
85.7k
    if (!ok)
149
22.2k
        return 1;
150
151
    /*
152
     * 10 is the number of characters in "Proc-Type:", which
153
     * PEM_get_EVP_CIPHER_INFO() requires to be present.
154
     * If the PEM header has less characters than that, it's
155
     * not worth spending cycles on it.
156
     */
157
63.5k
    if (strlen(pem_header) > 10) {
158
254
        EVP_CIPHER_INFO cipher;
159
254
        struct pem2der_pass_data_st pass_data;
160
161
254
        ok = 0;                  /* Assume that we fail */
162
254
        pass_data.cb = pw_cb;
163
254
        pass_data.cbarg = pw_cbarg;
164
254
        if (!PEM_get_EVP_CIPHER_INFO(pem_header, &cipher)
165
0
            || !PEM_do_header(&cipher, der, &der_len,
166
0
                              pem2der_pass_helper, &pass_data))
167
254
            goto end;
168
254
    }
169
170
    /*
171
     * Indicated that we successfully decoded something, or not at all.
172
     * Ending up "empty handed" is not an error.
173
     */
174
63.3k
    ok = 1;
175
176
    /* Have a look to see if we recognise anything */
177
430k
    for (i = 0; i < OSSL_NELEM(pem_name_map); i++)
178
430k
        if (strcmp(pem_name, pem_name_map[i].pem_name) == 0)
179
63.2k
            break;
180
181
63.3k
    if (i < OSSL_NELEM(pem_name_map)) {
182
63.2k
        OSSL_PARAM params[5], *p = params;
183
        /* We expect these to be read only so casting away the const is ok */
184
63.2k
        char *data_type = (char *)pem_name_map[i].data_type;
185
63.2k
        char *data_structure = (char *)pem_name_map[i].data_structure;
186
187
63.2k
        objtype = pem_name_map[i].object_type;
188
63.2k
        if (data_type != NULL)
189
54.8k
            *p++ =
190
54.8k
                OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE,
191
54.8k
                                                 data_type, 0);
192
193
        /* We expect this to be read only so casting away the const is ok */
194
63.2k
        if (data_structure != NULL)
195
63.2k
            *p++ =
196
63.2k
                OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_STRUCTURE,
197
63.2k
                                                 data_structure, 0);
198
63.2k
        *p++ =
199
63.2k
            OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_DATA,
200
63.2k
                                              der, der_len);
201
63.2k
        *p++ =
202
63.2k
            OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &objtype);
203
204
63.2k
        *p = OSSL_PARAM_construct_end();
205
206
63.2k
        ok = data_cb(params, data_cbarg);
207
63.2k
    }
208
209
63.5k
 end:
210
63.5k
    OPENSSL_free(pem_name);
211
63.5k
    OPENSSL_free(pem_header);
212
63.5k
    OPENSSL_free(der);
213
63.5k
    return ok;
214
63.3k
}
215
216
const OSSL_DISPATCH ossl_pem_to_der_decoder_functions[] = {
217
    { OSSL_FUNC_DECODER_NEWCTX, (void (*)(void))pem2der_newctx },
218
    { OSSL_FUNC_DECODER_FREECTX, (void (*)(void))pem2der_freectx },
219
    { OSSL_FUNC_DECODER_DECODE, (void (*)(void))pem2der_decode },
220
    OSSL_DISPATCH_END
221
};