Two new functions to write out PKCS#8 private keys. Also fixes for some of
[openssl.git] / crypto / pem / pem_lib.c
1 /* crypto/pem/pem_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/buffer.h>
62 #include <openssl/objects.h>
63 #include <openssl/evp.h>
64 #include <openssl/rand.h>
65 #include <openssl/x509.h>
66 #include <openssl/pem.h>
67 #include <openssl/pkcs12.h>
68 #ifndef NO_DES
69 #include <openssl/des.h>
70 #endif
71
72 const char *PEM_version="PEM" OPENSSL_VERSION_PTEXT;
73
74 #define MIN_LENGTH      4
75
76 static int def_callback(char *buf, int num, int w);
77 static int load_iv(unsigned char **fromp,unsigned char *to, int num);
78 static int def_callback(char *buf, int num, int w)
79         {
80 #ifdef NO_FP_API
81         /* We should not ever call the default callback routine from
82          * windows. */
83         PEMerr(PEM_F_DEF_CALLBACK,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
84         return(-1);
85 #else
86         int i,j;
87         const char *prompt;
88
89         prompt=EVP_get_pw_prompt();
90         if (prompt == NULL)
91                 prompt="Enter PEM pass phrase:";
92
93         for (;;)
94                 {
95                 i=EVP_read_pw_string(buf,num,prompt,w);
96                 if (i != 0)
97                         {
98                         PEMerr(PEM_F_DEF_CALLBACK,PEM_R_PROBLEMS_GETTING_PASSWORD);
99                         memset(buf,0,(unsigned int)num);
100                         return(-1);
101                         }
102                 j=strlen(buf);
103                 if (j < MIN_LENGTH)
104                         {
105                         fprintf(stderr,"phrase is too short, needs to be at least %d chars\n",MIN_LENGTH);
106                         }
107                 else
108                         break;
109                 }
110         return(j);
111 #endif
112         }
113
114 void PEM_proc_type(char *buf, int type)
115         {
116         const char *str;
117
118         if (type == PEM_TYPE_ENCRYPTED)
119                 str="ENCRYPTED";
120         else if (type == PEM_TYPE_MIC_CLEAR)
121                 str="MIC-CLEAR";
122         else if (type == PEM_TYPE_MIC_ONLY)
123                 str="MIC-ONLY";
124         else
125                 str="BAD-TYPE";
126                 
127         strcat(buf,"Proc-Type: 4,");
128         strcat(buf,str);
129         strcat(buf,"\n");
130         }
131
132 void PEM_dek_info(char *buf, const char *type, int len, char *str)
133         {
134         static unsigned char map[17]="0123456789ABCDEF";
135         long i;
136         int j;
137
138         strcat(buf,"DEK-Info: ");
139         strcat(buf,type);
140         strcat(buf,",");
141         j=strlen(buf);
142         for (i=0; i<len; i++)
143                 {
144                 buf[j+i*2]  =map[(str[i]>>4)&0x0f];
145                 buf[j+i*2+1]=map[(str[i]   )&0x0f];
146                 }
147         buf[j+i*2]='\n';
148         buf[j+i*2+1]='\0';
149         }
150
151 #ifndef NO_FP_API
152 char *PEM_ASN1_read(char *(*d2i)(), const char *name, FILE *fp, char **x,
153              pem_password_cb *cb)
154         {
155         BIO *b;
156         char *ret;
157
158         if ((b=BIO_new(BIO_s_file())) == NULL)
159                 {
160                 PEMerr(PEM_F_PEM_ASN1_READ,ERR_R_BUF_LIB);
161                 return(0);
162                 }
163         BIO_set_fp(b,fp,BIO_NOCLOSE);
164         ret=PEM_ASN1_read_bio(d2i,name,b,x,cb);
165         BIO_free(b);
166         return(ret);
167         }
168 #endif
169
170 char *PEM_ASN1_read_bio(char *(*d2i)(), const char *name, BIO *bp, char **x,
171              pem_password_cb *cb)
172         {
173         EVP_CIPHER_INFO cipher;
174         char *nm=NULL,*header=NULL;
175         unsigned char *p=NULL,*data=NULL;
176         long len;
177         char *ret=NULL;
178
179         for (;;)
180                 {
181                 if (!PEM_read_bio(bp,&nm,&header,&data,&len)) return(NULL);
182                 if (    (strcmp(nm,name) == 0) ||
183                         ((strcmp(nm,PEM_STRING_RSA) == 0) &&
184                          (strcmp(name,PEM_STRING_EVP_PKEY) == 0)) ||
185                         ((strcmp(nm,PEM_STRING_DSA) == 0) &&
186                          (strcmp(name,PEM_STRING_EVP_PKEY) == 0)) ||
187                         ((strcmp(nm,PEM_STRING_PKCS8) == 0) &&
188                          (strcmp(name,PEM_STRING_EVP_PKEY) == 0)) ||
189                         ((strcmp(nm,PEM_STRING_PKCS8INF) == 0) &&
190                          (strcmp(name,PEM_STRING_EVP_PKEY) == 0)) ||
191                         ((strcmp(nm,PEM_STRING_X509_OLD) == 0) &&
192                          (strcmp(name,PEM_STRING_X509) == 0)) ||
193                         ((strcmp(nm,PEM_STRING_X509_REQ_OLD) == 0) &&
194                          (strcmp(name,PEM_STRING_X509_REQ) == 0)) 
195                         )
196                         break;
197                 Free(nm);
198                 Free(header);
199                 Free(data);
200                 }
201         if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
202         if (!PEM_do_header(&cipher,data,&len,cb)) goto err;
203         p=data;
204         if (strcmp(name,PEM_STRING_EVP_PKEY) == 0) {
205                 if (strcmp(nm,PEM_STRING_RSA) == 0)
206                         ret=d2i(EVP_PKEY_RSA,x,&p,len);
207                 else if (strcmp(nm,PEM_STRING_DSA) == 0)
208                         ret=d2i(EVP_PKEY_DSA,x,&p,len);
209                 else if (strcmp(nm,PEM_STRING_PKCS8INF) == 0) {
210                         PKCS8_PRIV_KEY_INFO *p8inf;
211                         p8inf=d2i_PKCS8_PRIV_KEY_INFO(
212                                         (PKCS8_PRIV_KEY_INFO **) x, &p, len);
213                         ret = (char *)EVP_PKCS82PKEY(p8inf);
214                         PKCS8_PRIV_KEY_INFO_free(p8inf);
215                 } else if (strcmp(nm,PEM_STRING_PKCS8) == 0) {
216                         PKCS8_PRIV_KEY_INFO *p8inf;
217                         X509_SIG *p8;
218                         int klen;
219                         char psbuf[PEM_BUFSIZE];
220                         p8 = d2i_X509_SIG((X509_SIG **)x, &p, len);
221                         if(!p8) goto p8err;
222                         if (cb) klen=cb(psbuf,PEM_BUFSIZE,0);
223                         else klen=def_callback(psbuf,PEM_BUFSIZE,0);
224                         if (klen <= 0) {
225                                 PEMerr(PEM_F_PEM_ASN1_READ_BIO,
226                                                 PEM_R_BAD_PASSWORD_READ);
227                                 goto err;
228                         }
229                         p8inf = M_PKCS8_decrypt(p8, psbuf, klen);
230                         X509_SIG_free(p8);
231                         if(!p8inf) goto p8err;
232                         ret = (char *)EVP_PKCS82PKEY(p8inf);
233                         PKCS8_PRIV_KEY_INFO_free(p8inf);
234                 }
235         } else  ret=d2i(x,&p,len);
236 p8err:
237         if (ret == NULL)
238                 PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB);
239 err:
240         Free(nm);
241         Free(header);
242         Free(data);
243         return(ret);
244         }
245
246 #ifndef NO_FP_API
247 int PEM_ASN1_write(int (*i2d)(), const char *name, FILE *fp, char *x,
248              const EVP_CIPHER *enc, unsigned char *kstr, int klen,
249              pem_password_cb *callback)
250         {
251         BIO *b;
252         int ret;
253
254         if ((b=BIO_new(BIO_s_file())) == NULL)
255                 {
256                 PEMerr(PEM_F_PEM_ASN1_WRITE,ERR_R_BUF_LIB);
257                 return(0);
258                 }
259         BIO_set_fp(b,fp,BIO_NOCLOSE);
260         ret=PEM_ASN1_write_bio(i2d,name,b,x,enc,kstr,klen,callback);
261         BIO_free(b);
262         return(ret);
263         }
264 #endif
265
266 int PEM_ASN1_write_bio(int (*i2d)(), const char *name, BIO *bp, char *x,
267              const EVP_CIPHER *enc, unsigned char *kstr, int klen,
268              pem_password_cb *callback)
269         {
270         EVP_CIPHER_CTX ctx;
271         int dsize=0,i,j,ret=0;
272         unsigned char *p,*data=NULL;
273         const char *objstr=NULL;
274         char buf[PEM_BUFSIZE];
275         unsigned char key[EVP_MAX_KEY_LENGTH];
276         unsigned char iv[EVP_MAX_IV_LENGTH];
277         
278         if (enc != NULL)
279                 {
280                 objstr=OBJ_nid2sn(EVP_CIPHER_nid(enc));
281                 if (objstr == NULL)
282                         {
283                         PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,PEM_R_UNSUPPORTED_CIPHER);
284                         goto err;
285                         }
286                 }
287
288         if ((dsize=i2d(x,NULL)) < 0)
289                 {
290                 PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE);
291                 dsize=0;
292                 goto err;
293                 }
294         /* dzise + 8 bytes are needed */
295         data=(unsigned char *)Malloc((unsigned int)dsize+20);
296         if (data == NULL)
297                 {
298                 PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE);
299                 goto err;
300                 }
301         p=data;
302         i=i2d(x,&p);
303
304         if (enc != NULL)
305                 {
306                 if (kstr == NULL)
307                         {
308                         if (callback == NULL)
309                                 klen=def_callback(buf,PEM_BUFSIZE,1);
310                         else
311                                 klen=(*callback)(buf,PEM_BUFSIZE,1);
312                         if (klen <= 0)
313                                 {
314                                 PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,PEM_R_READ_KEY);
315                                 goto err;
316                                 }
317 #ifdef CHARSET_EBCDIC
318                         /* Convert the pass phrase from EBCDIC */
319                         ebcdic2ascii(buf, buf, klen);
320 #endif
321                         kstr=(unsigned char *)buf;
322                         }
323                 RAND_seed(data,i);/* put in the RSA key. */
324                 RAND_bytes(iv,8);       /* Generate a salt */
325                 /* The 'iv' is used as the iv and as a salt.  It is
326                  * NOT taken from the BytesToKey function */
327                 EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL);
328
329                 if (kstr == (unsigned char *)buf) memset(buf,0,PEM_BUFSIZE);
330
331                 buf[0]='\0';
332                 PEM_proc_type(buf,PEM_TYPE_ENCRYPTED);
333                 PEM_dek_info(buf,objstr,8,(char *)iv);
334                 /* k=strlen(buf); */
335         
336                 EVP_EncryptInit(&ctx,enc,key,iv);
337                 EVP_EncryptUpdate(&ctx,data,&j,data,i);
338                 EVP_EncryptFinal(&ctx,&(data[j]),&i);
339                 i+=j;
340                 ret=1;
341                 }
342         else
343                 {
344                 ret=1;
345                 buf[0]='\0';
346                 }
347         i=PEM_write_bio(bp,name,buf,data,i);
348         if (i <= 0) ret=0;
349 err:
350         memset(key,0,sizeof(key));
351         memset(iv,0,sizeof(iv));
352         memset((char *)&ctx,0,sizeof(ctx));
353         memset(buf,0,PEM_BUFSIZE);
354         memset(data,0,(unsigned int)dsize);
355         Free(data);
356         return(ret);
357         }
358
359 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
360              pem_password_cb *callback)
361         {
362         int i,j,o,klen;
363         long len;
364         EVP_CIPHER_CTX ctx;
365         unsigned char key[EVP_MAX_KEY_LENGTH];
366         char buf[PEM_BUFSIZE];
367
368         len= *plen;
369
370         if (cipher->cipher == NULL) return(1);
371         if (callback == NULL)
372                 klen=def_callback(buf,PEM_BUFSIZE,0);
373         else
374                 klen=callback(buf,PEM_BUFSIZE,0);
375         if (klen <= 0)
376                 {
377                 PEMerr(PEM_F_PEM_DO_HEADER,PEM_R_BAD_PASSWORD_READ);
378                 return(0);
379                 }
380 #ifdef CHARSET_EBCDIC
381         /* Convert the pass phrase from EBCDIC */
382         ebcdic2ascii(buf, buf, klen);
383 #endif
384
385         EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]),
386                 (unsigned char *)buf,klen,1,key,NULL);
387
388         j=(int)len;
389         EVP_DecryptInit(&ctx,cipher->cipher,key,&(cipher->iv[0]));
390         EVP_DecryptUpdate(&ctx,data,&i,data,j);
391         o=EVP_DecryptFinal(&ctx,&(data[i]),&j);
392         EVP_CIPHER_CTX_cleanup(&ctx);
393         memset((char *)buf,0,sizeof(buf));
394         memset((char *)key,0,sizeof(key));
395         j+=i;
396         if (!o)
397                 {
398                 PEMerr(PEM_F_PEM_DO_HEADER,PEM_R_BAD_DECRYPT);
399                 return(0);
400                 }
401         *plen=j;
402         return(1);
403         }
404
405 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher)
406         {
407         int o;
408         const EVP_CIPHER *enc=NULL;
409         char *p,c;
410
411         cipher->cipher=NULL;
412         if ((header == NULL) || (*header == '\0') || (*header == '\n'))
413                 return(1);
414         if (strncmp(header,"Proc-Type: ",11) != 0)
415                 { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO,PEM_R_NOT_PROC_TYPE); return(0); }
416         header+=11;
417         if (*header != '4') return(0); header++;
418         if (*header != ',') return(0); header++;
419         if (strncmp(header,"ENCRYPTED",9) != 0)
420                 { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO,PEM_R_NOT_ENCRYPTED); return(0); }
421         for (; (*header != '\n') && (*header != '\0'); header++)
422                 ;
423         if (*header == '\0')
424                 { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO,PEM_R_SHORT_HEADER); return(0); }
425         header++;
426         if (strncmp(header,"DEK-Info: ",10) != 0)
427                 { PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO,PEM_R_NOT_DEK_INFO); return(0); }
428         header+=10;
429
430         p=header;
431         for (;;)
432                 {
433                 c= *header;
434 #ifndef CHARSET_EBCDIC
435                 if (!(  ((c >= 'A') && (c <= 'Z')) || (c == '-') ||
436                         ((c >= '0') && (c <= '9'))))
437                         break;
438 #else
439                 if (!(  isupper(c) || (c == '-') ||
440                         isdigit(c)))
441                         break;
442 #endif
443                 header++;
444                 }
445         *header='\0';
446         o=OBJ_sn2nid(p);
447         cipher->cipher=enc=EVP_get_cipherbyname(p);
448         *header=c;
449         header++;
450
451         if (enc == NULL)
452                 {
453                 PEMerr(PEM_F_PEM_GET_EVP_CIPHER_INFO,PEM_R_UNSUPPORTED_ENCRYPTION);
454                 return(0);
455                 }
456         if (!load_iv((unsigned char **)&header,&(cipher->iv[0]),8)) return(0);
457
458         return(1);
459         }
460
461 static int load_iv(unsigned char **fromp, unsigned char *to, int num)
462         {
463         int v,i;
464         unsigned char *from;
465
466         from= *fromp;
467         for (i=0; i<num; i++) to[i]=0;
468         num*=2;
469         for (i=0; i<num; i++)
470                 {
471                 if ((*from >= '0') && (*from <= '9'))
472                         v= *from-'0';
473                 else if ((*from >= 'A') && (*from <= 'F'))
474                         v= *from-'A'+10;
475                 else if ((*from >= 'a') && (*from <= 'f'))
476                         v= *from-'a'+10;
477                 else
478                         {
479                         PEMerr(PEM_F_LOAD_IV,PEM_R_BAD_IV_CHARS);
480                         return(0);
481                         }
482                 from++;
483                 to[i/2]|=v<<(long)((!(i&1))*4);
484                 }
485
486         *fromp=from;
487         return(1);
488         }
489
490 #ifndef NO_FP_API
491 int PEM_write(FILE *fp, char *name, char *header, unsigned char *data,
492              long len)
493         {
494         BIO *b;
495         int ret;
496
497         if ((b=BIO_new(BIO_s_file())) == NULL)
498                 {
499                 PEMerr(PEM_F_PEM_WRITE,ERR_R_BUF_LIB);
500                 return(0);
501                 }
502         BIO_set_fp(b,fp,BIO_NOCLOSE);
503         ret=PEM_write_bio(b, name, header, data,len);
504         BIO_free(b);
505         return(ret);
506         }
507 #endif
508
509 int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data,
510              long len)
511         {
512         int nlen,n,i,j,outl;
513         unsigned char *buf;
514         EVP_ENCODE_CTX ctx;
515         int reason=ERR_R_BUF_LIB;
516         
517         EVP_EncodeInit(&ctx);
518         nlen=strlen(name);
519
520         if (    (BIO_write(bp,"-----BEGIN ",11) != 11) ||
521                 (BIO_write(bp,name,nlen) != nlen) ||
522                 (BIO_write(bp,"-----\n",6) != 6))
523                 goto err;
524                 
525         i=strlen(header);
526         if (i > 0)
527                 {
528                 if (    (BIO_write(bp,header,i) != i) ||
529                         (BIO_write(bp,"\n",1) != 1))
530                         goto err;
531                 }
532
533         buf=(unsigned char *)Malloc(PEM_BUFSIZE*8);
534         if (buf == NULL)
535                 {
536                 reason=ERR_R_MALLOC_FAILURE;
537                 goto err;
538                 }
539
540         i=j=0;
541         while (len > 0)
542                 {
543                 n=(int)((len>(PEM_BUFSIZE*5))?(PEM_BUFSIZE*5):len);
544                 EVP_EncodeUpdate(&ctx,buf,&outl,&(data[j]),n);
545                 if ((outl) && (BIO_write(bp,(char *)buf,outl) != outl))
546                         goto err;
547                 i+=outl;
548                 len-=n;
549                 j+=n;
550                 }
551         EVP_EncodeFinal(&ctx,buf,&outl);
552         if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err;
553         Free(buf);
554         if (    (BIO_write(bp,"-----END ",9) != 9) ||
555                 (BIO_write(bp,name,nlen) != nlen) ||
556                 (BIO_write(bp,"-----\n",6) != 6))
557                 goto err;
558         return(i+outl);
559 err:
560         PEMerr(PEM_F_PEM_WRITE_BIO,reason);
561         return(0);
562         }
563
564 #ifndef NO_FP_API
565 int PEM_read(FILE *fp, char **name, char **header, unsigned char **data,
566              long *len)
567         {
568         BIO *b;
569         int ret;
570
571         if ((b=BIO_new(BIO_s_file())) == NULL)
572                 {
573                 PEMerr(PEM_F_PEM_READ,ERR_R_BUF_LIB);
574                 return(0);
575                 }
576         BIO_set_fp(b,fp,BIO_NOCLOSE);
577         ret=PEM_read_bio(b, name, header, data,len);
578         BIO_free(b);
579         return(ret);
580         }
581 #endif
582
583 int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data,
584              long *len)
585         {
586         EVP_ENCODE_CTX ctx;
587         int end=0,i,k,bl=0,hl=0,nohead=0;
588         char buf[256];
589         BUF_MEM *nameB;
590         BUF_MEM *headerB;
591         BUF_MEM *dataB,*tmpB;
592         
593         nameB=BUF_MEM_new();
594         headerB=BUF_MEM_new();
595         dataB=BUF_MEM_new();
596         if ((nameB == NULL) || (headerB == NULL) || (dataB == NULL))
597                 {
598                 PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE);
599                 return(0);
600                 }
601
602         buf[254]='\0';
603         for (;;)
604                 {
605                 i=BIO_gets(bp,buf,254);
606
607                 if (i <= 0)
608                         {
609                         PEMerr(PEM_F_PEM_READ_BIO,PEM_R_NO_START_LINE);
610                         goto err;
611                         }
612
613                 while ((i >= 0) && (buf[i] <= ' ')) i--;
614                 buf[++i]='\n'; buf[++i]='\0';
615
616                 if (strncmp(buf,"-----BEGIN ",11) == 0)
617                         {
618                         i=strlen(&(buf[11]));
619
620                         if (strncmp(&(buf[11+i-6]),"-----\n",6) != 0)
621                                 continue;
622                         if (!BUF_MEM_grow(nameB,i+9))
623                                 {
624                                 PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE);
625                                 goto err;
626                                 }
627                         memcpy(nameB->data,&(buf[11]),i-6);
628                         nameB->data[i-6]='\0';
629                         break;
630                         }
631                 }
632         hl=0;
633         if (!BUF_MEM_grow(headerB,256))
634                 { PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE); goto err; }
635         headerB->data[0]='\0';
636         for (;;)
637                 {
638                 i=BIO_gets(bp,buf,254);
639                 if (i <= 0) break;
640
641                 while ((i >= 0) && (buf[i] <= ' ')) i--;
642                 buf[++i]='\n'; buf[++i]='\0';
643
644                 if (buf[0] == '\n') break;
645                 if (!BUF_MEM_grow(headerB,hl+i+9))
646                         { PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE); goto err; }
647                 if (strncmp(buf,"-----END ",9) == 0)
648                         {
649                         nohead=1;
650                         break;
651                         }
652                 memcpy(&(headerB->data[hl]),buf,i);
653                 headerB->data[hl+i]='\0';
654                 hl+=i;
655                 }
656
657         bl=0;
658         if (!BUF_MEM_grow(dataB,1024))
659                 { PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE); goto err; }
660         dataB->data[0]='\0';
661         if (!nohead)
662                 {
663                 for (;;)
664                         {
665                         i=BIO_gets(bp,buf,254);
666                         if (i <= 0) break;
667
668                         while ((i >= 0) && (buf[i] <= ' ')) i--;
669                         buf[++i]='\n'; buf[++i]='\0';
670
671                         if (i != 65) end=1;
672                         if (strncmp(buf,"-----END ",9) == 0)
673                                 break;
674                         if (i > 65) break;
675                         if (!BUF_MEM_grow(dataB,i+bl+9))
676                                 {
677                                 PEMerr(PEM_F_PEM_READ_BIO,ERR_R_MALLOC_FAILURE);
678                                 goto err;
679                                 }
680                         memcpy(&(dataB->data[bl]),buf,i);
681                         dataB->data[bl+i]='\0';
682                         bl+=i;
683                         if (end)
684                                 {
685                                 buf[0]='\0';
686                                 i=BIO_gets(bp,buf,254);
687                                 if (i <= 0) break;
688
689                                 while ((i >= 0) && (buf[i] <= ' ')) i--;
690                                 buf[++i]='\n'; buf[++i]='\0';
691
692                                 break;
693                                 }
694                         }
695                 }
696         else
697                 {
698                 tmpB=headerB;
699                 headerB=dataB;
700                 dataB=tmpB;
701                 bl=hl;
702                 }
703         i=strlen(nameB->data);
704         if (    (strncmp(buf,"-----END ",9) != 0) ||
705                 (strncmp(nameB->data,&(buf[9]),i) != 0) ||
706                 (strncmp(&(buf[9+i]),"-----\n",6) != 0))
707                 {
708                 PEMerr(PEM_F_PEM_READ_BIO,PEM_R_BAD_END_LINE);
709                 goto err;
710                 }
711
712         EVP_DecodeInit(&ctx);
713         i=EVP_DecodeUpdate(&ctx,
714                 (unsigned char *)dataB->data,&bl,
715                 (unsigned char *)dataB->data,bl);
716         if (i < 0)
717                 {
718                 PEMerr(PEM_F_PEM_READ_BIO,PEM_R_BAD_BASE64_DECODE);
719                 goto err;
720                 }
721         i=EVP_DecodeFinal(&ctx,(unsigned char *)&(dataB->data[bl]),&k);
722         if (i < 0)
723                 {
724                 PEMerr(PEM_F_PEM_READ_BIO,PEM_R_BAD_BASE64_DECODE);
725                 goto err;
726                 }
727         bl+=k;
728
729         if (bl == 0) goto err;
730         *name=nameB->data;
731         *header=headerB->data;
732         *data=(unsigned char *)dataB->data;
733         *len=bl;
734         Free(nameB);
735         Free(headerB);
736         Free(dataB);
737         return(1);
738 err:
739         BUF_MEM_free(nameB);
740         BUF_MEM_free(headerB);
741         BUF_MEM_free(dataB);
742         return(0);
743         }
744
745 /* This function writes a private key in PKCS#8 format: it is a "drop in"
746  * replacement for PEM_write_bio_PrivateKey(). As usual if 'enc' is NULL then
747  * it uses the unencrypted private key form. It uses PKCS#5 v2.0 password based
748  * encryption algorithms.
749  */
750
751 int PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc,
752              unsigned char *kstr, int klen, pem_password_cb *cb)
753 {
754         X509_SIG *p8;
755         PKCS8_PRIV_KEY_INFO *p8inf;
756         char buf[PEM_BUFSIZE];
757         int ret;
758         if(!(p8inf = EVP_PKEY2PKCS8(x))) {
759                 PEMerr(PEM_F_PEM_WRITE_BIO_PKCS8PRIVATEKEY,
760                                         PEM_R_ERROR_CONVERTING_PRIVATE_KEY);
761                 return 0;
762         }
763         if(enc) {
764                 if(!kstr) {
765                         if(!cb) klen = def_callback(buf, PEM_BUFSIZE, 1);
766                         else klen = cb(buf, PEM_BUFSIZE, 1);
767                         if(klen <= 0) {
768                                 PEMerr(PEM_F_PEM_WRITE_BIO_PKCS8PRIVATEKEY,
769                                                                 PEM_R_READ_KEY);
770                                 PKCS8_PRIV_KEY_INFO_free(p8inf);
771                                 return 0;
772                         }
773                                 
774                         kstr = buf;
775                 }
776                 p8 = PKCS8_encrypt(-1, enc, kstr, klen, NULL, 0, 0, p8inf);
777                 if(kstr == (unsigned char *)buf) memset(buf, 0, klen);
778                 PKCS8_PRIV_KEY_INFO_free(p8inf);
779                 ret = PEM_write_bio_PKCS8(bp, p8);
780                 X509_SIG_free(p8);
781                 return ret;
782         } else {
783                 ret = PEM_write_bio_PKCS8_PRIV_KEY_INFO(bp, p8inf);
784                 PKCS8_PRIV_KEY_INFO_free(p8inf);
785                 return ret;
786         }
787 }
788
789 int PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
790              unsigned char *kstr, int klen, pem_password_cb *cb)
791 {
792         BIO *bp;
793         int ret;
794         if(!(bp = BIO_new_fp(fp, BIO_NOCLOSE))) {
795                 PEMerr(PEM_F_PEM_F_PEM_WRITE_PKCS8PRIVATEKEY,ERR_R_BUF_LIB);
796                 return(0);
797         }
798         ret = PEM_write_bio_PKCS8PrivateKey(bp, x, enc, kstr, klen, cb);
799         BIO_free(bp);
800         return ret;
801 }