Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl35/providers/implementations/encode_decode/decode_pem2der.c
Line
Count
Source
1
/*
2
 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/*
11
 * RSA low level APIs are deprecated for public use, but still ok for
12
 * internal use.
13
 */
14
#include "internal/deprecated.h"
15
16
#include <string.h>
17
18
#include <openssl/core_dispatch.h>
19
#include <openssl/core_names.h>
20
#include <openssl/core_object.h>
21
#include <openssl/crypto.h>
22
#include <openssl/err.h>
23
#include <openssl/params.h>
24
#include <openssl/pem.h>
25
#include <openssl/proverr.h>
26
#include "internal/nelem.h"
27
#include "internal/sizes.h"
28
#include "prov/bio.h"
29
#include "prov/decoders.h"
30
#include "prov/implementations.h"
31
#include "endecoder_local.h"
32
33
static int read_pem(PROV_CTX *provctx, OSSL_CORE_BIO *cin,
34
    char **pem_name, char **pem_header,
35
    unsigned char **data, long *len)
36
164k
{
37
164k
    BIO *in = ossl_bio_new_from_core_bio(provctx, cin);
38
164k
    int ok;
39
40
164k
    if (in == NULL)
41
0
        return 0;
42
164k
    ok = (PEM_read_bio(in, pem_name, pem_header, data, len) > 0);
43
44
164k
    BIO_free(in);
45
164k
    return ok;
46
164k
}
47
48
static OSSL_FUNC_decoder_newctx_fn pem2der_newctx;
49
static OSSL_FUNC_decoder_freectx_fn pem2der_freectx;
50
static OSSL_FUNC_decoder_decode_fn pem2der_decode;
51
52
/*
53
 * Context used for PEM to DER decoding.
54
 */
55
struct pem2der_ctx_st {
56
    PROV_CTX *provctx;
57
    char data_structure[OSSL_MAX_CODEC_STRUCT_SIZE];
58
    char propq[OSSL_MAX_PROPQUERY_SIZE];
59
};
60
61
static void *pem2der_newctx(void *provctx)
62
2.46M
{
63
2.46M
    struct pem2der_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx));
64
65
2.46M
    if (ctx != NULL)
66
2.46M
        ctx->provctx = provctx;
67
2.46M
    return ctx;
68
2.46M
}
69
70
static void pem2der_freectx(void *vctx)
71
2.46M
{
72
2.46M
    struct pem2der_ctx_st *ctx = vctx;
73
74
2.46M
    OPENSSL_free(ctx);
75
2.46M
}
76
77
static const OSSL_PARAM *pem2der_settable_ctx_params(ossl_unused void *provctx)
78
0
{
79
0
    static const OSSL_PARAM settables[] = {
80
0
        OSSL_PARAM_utf8_string(OSSL_DECODER_PARAM_PROPERTIES, NULL, 0),
81
0
        OSSL_PARAM_utf8_string(OSSL_OBJECT_PARAM_DATA_STRUCTURE, NULL, 0),
82
0
        OSSL_PARAM_END
83
0
    };
84
0
    return settables;
85
0
}
86
87
static int pem2der_set_ctx_params(void *vctx, const OSSL_PARAM params[])
88
569
{
89
569
    struct pem2der_ctx_st *ctx = vctx;
90
569
    const OSSL_PARAM *p;
91
569
    char *str;
92
93
569
    p = OSSL_PARAM_locate_const(params, OSSL_DECODER_PARAM_PROPERTIES);
94
569
    str = ctx->propq;
95
569
    if (p != NULL
96
0
        && !OSSL_PARAM_get_utf8_string(p, &str, sizeof(ctx->propq)))
97
0
        return 0;
98
99
569
    p = OSSL_PARAM_locate_const(params, OSSL_OBJECT_PARAM_DATA_STRUCTURE);
100
569
    str = ctx->data_structure;
101
569
    if (p != NULL
102
569
        && !OSSL_PARAM_get_utf8_string(p, &str, sizeof(ctx->data_structure)))
103
0
        return 0;
104
105
569
    return 1;
106
569
}
107
108
/* pem_password_cb compatible function */
109
struct pem2der_pass_data_st {
110
    OSSL_PASSPHRASE_CALLBACK *cb;
111
    void *cbarg;
112
};
113
114
static int pem2der_pass_helper(char *buf, int num, int w, void *data)
115
2
{
116
2
    struct pem2der_pass_data_st *pass_data = data;
117
2
    size_t plen;
118
119
2
    if (pass_data == NULL
120
2
        || pass_data->cb == NULL
121
2
        || !pass_data->cb(buf, num, &plen, NULL, pass_data->cbarg))
122
2
        return -1;
123
0
    return (int)plen;
124
2
}
125
126
static int pem2der_decode(void *vctx, OSSL_CORE_BIO *cin, int selection,
127
    OSSL_CALLBACK *data_cb, void *data_cbarg,
128
    OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg)
129
91.7k
{
130
    /*
131
     * PEM names we recognise.  Other PEM names should be recognised by
132
     * other decoder implementations.
133
     */
134
91.7k
    static struct pem_name_map_st {
135
91.7k
        const char *pem_name;
136
91.7k
        int object_type;
137
91.7k
        const char *data_type;
138
91.7k
        const char *data_structure;
139
91.7k
    } pem_name_map[] = {
140
        /* PKCS#8 and SubjectPublicKeyInfo */
141
91.7k
        { PEM_STRING_PKCS8, OSSL_OBJECT_PKEY, NULL, "EncryptedPrivateKeyInfo" },
142
91.7k
        { PEM_STRING_PKCS8INF, OSSL_OBJECT_PKEY, NULL, "PrivateKeyInfo" },
143
136k
#define PKCS8_LAST_IDX 1
144
91.7k
        { PEM_STRING_PUBLIC, OSSL_OBJECT_PKEY, NULL, "SubjectPublicKeyInfo" },
145
110k
#define SPKI_LAST_IDX 2
146
        /* Our set of type specific PEM types */
147
91.7k
        { PEM_STRING_DHPARAMS, OSSL_OBJECT_PKEY, "DH", "type-specific" },
148
91.7k
        { PEM_STRING_DHXPARAMS, OSSL_OBJECT_PKEY, "X9.42 DH", "type-specific" },
149
91.7k
        { PEM_STRING_DSA, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
150
91.7k
        { PEM_STRING_DSA_PUBLIC, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
151
91.7k
        { PEM_STRING_DSAPARAMS, OSSL_OBJECT_PKEY, "DSA", "type-specific" },
152
91.7k
        { PEM_STRING_ECPRIVATEKEY, OSSL_OBJECT_PKEY, "EC", "type-specific" },
153
91.7k
        { PEM_STRING_ECPARAMETERS, OSSL_OBJECT_PKEY, "EC", "type-specific" },
154
91.7k
        { PEM_STRING_SM2PRIVATEKEY, OSSL_OBJECT_PKEY, "SM2", "type-specific" },
155
91.7k
        { PEM_STRING_SM2PARAMETERS, OSSL_OBJECT_PKEY, "SM2", "type-specific" },
156
91.7k
        { PEM_STRING_RSA, OSSL_OBJECT_PKEY, "RSA", "type-specific" },
157
91.7k
        { PEM_STRING_RSA_PUBLIC, OSSL_OBJECT_PKEY, "RSA", "type-specific" },
158
159
        /*
160
         * A few others that there is at least have an object type for, even
161
         * though there is no provider interface to handle such objects, yet.
162
         * However, this is beneficial for the OSSL_STORE result handler.
163
         */
164
91.7k
        { PEM_STRING_X509, OSSL_OBJECT_CERT, NULL, "Certificate" },
165
91.7k
        { PEM_STRING_X509_TRUSTED, OSSL_OBJECT_CERT, NULL, "Certificate" },
166
91.7k
        { PEM_STRING_X509_OLD, OSSL_OBJECT_CERT, NULL, "Certificate" },
167
91.7k
        { PEM_STRING_X509_CRL, OSSL_OBJECT_CRL, NULL, "CertificateList" }
168
91.7k
    };
169
91.7k
    struct pem2der_ctx_st *ctx = vctx;
170
91.7k
    char *pem_name = NULL, *pem_header = NULL;
171
91.7k
    size_t i;
172
91.7k
    unsigned char *der = NULL;
173
91.7k
    long der_len = 0;
174
91.7k
    int ok = 0;
175
91.7k
    int objtype = OSSL_OBJECT_UNKNOWN;
176
177
91.7k
    ok = read_pem(ctx->provctx, cin, &pem_name, &pem_header,
178
91.7k
             &der, &der_len)
179
91.7k
        > 0;
180
    /* We return "empty handed".  This is not an error. */
181
91.7k
    if (!ok)
182
23.1k
        return 1;
183
184
    /*
185
     * 10 is the number of characters in "Proc-Type:", which
186
     * PEM_get_EVP_CIPHER_INFO() requires to be present.
187
     * If the PEM header has less characters than that, it's
188
     * not worth spending cycles on it.
189
     */
190
68.5k
    if (strlen(pem_header) > 10) {
191
431
        EVP_CIPHER_INFO cipher;
192
431
        struct pem2der_pass_data_st pass_data;
193
194
431
        ok = 0; /* Assume that we fail */
195
431
        pass_data.cb = pw_cb;
196
431
        pass_data.cbarg = pw_cbarg;
197
431
        if (!PEM_get_EVP_CIPHER_INFO(pem_header, &cipher)
198
1
            || !PEM_do_header(&cipher, der, &der_len,
199
1
                pem2der_pass_helper, &pass_data))
200
431
            goto end;
201
431
    }
202
203
    /*
204
     * Indicated that we successfully decoded something, or not at all.
205
     * Ending up "empty handed" is not an error.
206
     */
207
68.1k
    ok = 1;
208
209
    /* Have a look to see if we recognise anything */
210
444k
    for (i = 0; i < OSSL_NELEM(pem_name_map); i++)
211
443k
        if (strcmp(pem_name, pem_name_map[i].pem_name) == 0)
212
68.0k
            break;
213
214
68.1k
    if (i < OSSL_NELEM(pem_name_map)) {
215
68.0k
        OSSL_PARAM params[5], *p = params;
216
        /* We expect these to be read only so casting away the const is ok */
217
68.0k
        char *data_type = (char *)pem_name_map[i].data_type;
218
68.0k
        char *data_structure = (char *)pem_name_map[i].data_structure;
219
220
        /*
221
         * Since this may perform decryption, we need to check the selection to
222
         * avoid password prompts for objects of no interest.
223
         */
224
68.0k
        if (i <= PKCS8_LAST_IDX
225
12.5k
            && ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY)
226
15
                || OPENSSL_strcasecmp(ctx->data_structure, "EncryptedPrivateKeyInfo") == 0
227
12.5k
                || OPENSSL_strcasecmp(ctx->data_structure, "PrivateKeyInfo") == 0)) {
228
12.5k
            ok = ossl_epki2pki_der_decode(der, der_len, selection, data_cb,
229
12.5k
                data_cbarg, pw_cb, pw_cbarg,
230
12.5k
                PROV_LIBCTX_OF(ctx->provctx),
231
12.5k
                ctx->propq);
232
12.5k
            goto end;
233
12.5k
        }
234
235
55.4k
        if (i <= SPKI_LAST_IDX
236
23
            && ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY)
237
23
                || OPENSSL_strcasecmp(ctx->data_structure, "SubjectPublicKeyInfo") == 0)) {
238
0
            ok = ossl_spki2typespki_der_decode(der, der_len, selection, data_cb,
239
0
                data_cbarg, pw_cb, pw_cbarg,
240
0
                PROV_LIBCTX_OF(ctx->provctx),
241
0
                ctx->propq);
242
0
            goto end;
243
0
        }
244
245
55.4k
        objtype = pem_name_map[i].object_type;
246
55.4k
        if (data_type != NULL)
247
55.4k
            *p++ = OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE,
248
55.4k
                data_type, 0);
249
250
        /* We expect this to be read only so casting away the const is ok */
251
55.4k
        if (data_structure != NULL)
252
55.4k
            *p++ = OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_STRUCTURE,
253
55.4k
                data_structure, 0);
254
55.4k
        *p++ = OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_DATA,
255
55.4k
            der, der_len);
256
55.4k
        *p++ = OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &objtype);
257
258
55.4k
        *p = OSSL_PARAM_construct_end();
259
260
55.4k
        ok = data_cb(params, data_cbarg);
261
55.4k
    }
262
263
68.5k
end:
264
68.5k
    OPENSSL_free(pem_name);
265
68.5k
    OPENSSL_free(pem_header);
266
68.5k
    OPENSSL_free(der);
267
68.5k
    return ok;
268
68.1k
}
269
270
const OSSL_DISPATCH ossl_pem_to_der_decoder_functions[] = {
271
    { OSSL_FUNC_DECODER_NEWCTX, (void (*)(void))pem2der_newctx },
272
    { OSSL_FUNC_DECODER_FREECTX, (void (*)(void))pem2der_freectx },
273
    { OSSL_FUNC_DECODER_DECODE, (void (*)(void))pem2der_decode },
274
    { OSSL_FUNC_DECODER_SETTABLE_CTX_PARAMS,
275
        (void (*)(void))pem2der_settable_ctx_params },
276
    { OSSL_FUNC_DECODER_SET_CTX_PARAMS,
277
        (void (*)(void))pem2der_set_ctx_params },
278
    OSSL_DISPATCH_END
279
};