2001-03-12 04:29:28 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-07-09 00:55:45 +08:00
|
|
|
pem_password_cb,
|
2020-09-14 17:30:14 +08:00
|
|
|
PEM_read_bio_PrivateKey_ex, PEM_read_bio_PrivateKey,
|
|
|
|
PEM_read_PrivateKey_ex, PEM_read_PrivateKey,
|
|
|
|
PEM_write_bio_PrivateKey_ex, PEM_write_bio_PrivateKey,
|
|
|
|
PEM_write_bio_PrivateKey_traditional,
|
|
|
|
PEM_write_PrivateKey_ex, PEM_write_PrivateKey,
|
2016-05-17 21:15:20 +08:00
|
|
|
PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey,
|
2015-05-28 22:45:57 +08:00
|
|
|
PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid,
|
2020-09-14 17:30:14 +08:00
|
|
|
PEM_read_bio_PUBKEY_ex, PEM_read_bio_PUBKEY,
|
|
|
|
PEM_read_PUBKEY_ex, PEM_read_PUBKEY,
|
|
|
|
PEM_write_bio_PUBKEY_ex, PEM_write_bio_PUBKEY,
|
|
|
|
PEM_write_PUBKEY_ex, PEM_write_PUBKEY,
|
2015-05-28 22:45:57 +08:00
|
|
|
PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey,
|
|
|
|
PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey,
|
|
|
|
PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey,
|
|
|
|
PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY,
|
|
|
|
PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey,
|
|
|
|
PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey,
|
|
|
|
PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY,
|
2020-08-19 03:38:56 +08:00
|
|
|
PEM_write_DSA_PUBKEY, PEM_read_bio_Parameters_ex, PEM_read_bio_Parameters,
|
|
|
|
PEM_write_bio_Parameters, PEM_read_bio_DSAparams, PEM_read_DSAparams,
|
2015-05-28 22:45:57 +08:00
|
|
|
PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams,
|
|
|
|
PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams,
|
|
|
|
PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509,
|
|
|
|
PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX,
|
|
|
|
PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ,
|
|
|
|
PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW,
|
|
|
|
PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL,
|
|
|
|
PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7,
|
2016-02-02 04:15:06 +08:00
|
|
|
PEM_write_bio_PKCS7, PEM_write_PKCS7 - PEM routines
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/pem.h>
|
|
|
|
|
2017-10-09 18:55:27 +08:00
|
|
|
typedef int pem_password_cb(char *buf, int size, int rwflag, void *u);
|
2016-07-09 00:55:45 +08:00
|
|
|
|
2020-09-14 17:30:14 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_PrivateKey_ex(BIO *bp, EVP_PKEY **x,
|
|
|
|
pem_password_cb *cb, void *u,
|
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_PrivateKey(BIO *bp, EVP_PKEY **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2020-04-08 18:54:53 +08:00
|
|
|
EVP_PKEY *PEM_read_PrivateKey_ex(FILE *fp, EVP_PKEY **x, pem_password_cb *cb,
|
2020-10-15 17:55:50 +08:00
|
|
|
void *u, OSSL_LIB_CTX *libctx,
|
2020-04-08 18:54:53 +08:00
|
|
|
const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
EVP_PKEY *PEM_read_PrivateKey(FILE *fp, EVP_PKEY **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2020-09-14 17:30:14 +08:00
|
|
|
int PEM_write_bio_PrivateKey_ex(BIO *bp, const EVP_PKEY *x,
|
|
|
|
const EVP_CIPHER *enc,
|
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u,
|
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2019-01-16 04:51:25 +08:00
|
|
|
int PEM_write_bio_PrivateKey(BIO *bp, const EVP_PKEY *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2016-05-17 21:15:20 +08:00
|
|
|
int PEM_write_bio_PrivateKey_traditional(BIO *bp, EVP_PKEY *x,
|
|
|
|
const EVP_CIPHER *enc,
|
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2020-09-14 17:30:14 +08:00
|
|
|
int PEM_write_PrivateKey_ex(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
|
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u,
|
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2019-01-16 04:51:25 +08:00
|
|
|
int PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, const EVP_PKEY *x, int nid,
|
2016-02-02 04:15:06 +08:00
|
|
|
char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2019-01-16 04:51:25 +08:00
|
|
|
int PEM_write_PKCS8PrivateKey_nid(FILE *fp, const EVP_PKEY *x, int nid,
|
2016-02-02 04:15:06 +08:00
|
|
|
char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
|
2020-08-19 03:38:56 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_PUBKEY_ex(BIO *bp, EVP_PKEY **x,
|
|
|
|
pem_password_cb *cb, void *u,
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_PUBKEY(BIO *bp, EVP_PKEY **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2020-08-19 03:38:56 +08:00
|
|
|
EVP_PKEY *PEM_read_PUBKEY_ex(FILE *fp, EVP_PKEY **x,
|
|
|
|
pem_password_cb *cb, void *u,
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
EVP_PKEY *PEM_read_PUBKEY(FILE *fp, EVP_PKEY **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2020-09-14 17:30:14 +08:00
|
|
|
int PEM_write_bio_PUBKEY_ex(BIO *bp, EVP_PKEY *x,
|
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_PUBKEY(BIO *bp, EVP_PKEY *x);
|
2020-09-14 17:30:14 +08:00
|
|
|
int PEM_write_PUBKEY_ex(FILE *fp, EVP_PKEY *x,
|
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_PUBKEY(FILE *fp, EVP_PKEY *x);
|
|
|
|
|
|
|
|
RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
RSA *PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
RSA *PEM_read_RSAPublicKey(FILE *fp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_RSAPublicKey(BIO *bp, RSA *x);
|
|
|
|
int PEM_write_RSAPublicKey(FILE *fp, RSA *x);
|
|
|
|
|
|
|
|
RSA *PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
RSA *PEM_read_RSA_PUBKEY(FILE *fp, RSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_RSA_PUBKEY(BIO *bp, RSA *x);
|
|
|
|
int PEM_write_RSA_PUBKEY(FILE *fp, RSA *x);
|
|
|
|
|
|
|
|
DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
DSA *PEM_read_DSAPrivateKey(FILE *fp, DSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
|
2016-02-02 04:15:06 +08:00
|
|
|
unsigned char *kstr, int klen,
|
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
DSA *PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
DSA *PEM_read_DSA_PUBKEY(FILE *fp, DSA **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x);
|
|
|
|
int PEM_write_DSA_PUBKEY(FILE *fp, DSA *x);
|
|
|
|
|
2020-08-19 03:38:56 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_Parameters_ex(BIO *bp, EVP_PKEY **x,
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX *libctx, const char *propq);
|
2019-10-07 13:23:32 +08:00
|
|
|
EVP_PKEY *PEM_read_bio_Parameters(BIO *bp, EVP_PKEY **x);
|
|
|
|
int PEM_write_bio_Parameters(BIO *bp, const EVP_PKEY *x);
|
|
|
|
|
2001-03-12 04:29:28 +08:00
|
|
|
DSA *PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u);
|
|
|
|
DSA *PEM_read_DSAparams(FILE *fp, DSA **x, pem_password_cb *cb, void *u);
|
|
|
|
int PEM_write_bio_DSAparams(BIO *bp, DSA *x);
|
|
|
|
int PEM_write_DSAparams(FILE *fp, DSA *x);
|
|
|
|
|
|
|
|
DH *PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u);
|
|
|
|
DH *PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u);
|
|
|
|
int PEM_write_bio_DHparams(BIO *bp, DH *x);
|
|
|
|
int PEM_write_DHparams(FILE *fp, DH *x);
|
|
|
|
|
|
|
|
X509 *PEM_read_bio_X509(BIO *bp, X509 **x, pem_password_cb *cb, void *u);
|
|
|
|
X509 *PEM_read_X509(FILE *fp, X509 **x, pem_password_cb *cb, void *u);
|
|
|
|
int PEM_write_bio_X509(BIO *bp, X509 *x);
|
|
|
|
int PEM_write_X509(FILE *fp, X509 *x);
|
|
|
|
|
|
|
|
X509 *PEM_read_bio_X509_AUX(BIO *bp, X509 **x, pem_password_cb *cb, void *u);
|
|
|
|
X509 *PEM_read_X509_AUX(FILE *fp, X509 **x, pem_password_cb *cb, void *u);
|
|
|
|
int PEM_write_bio_X509_AUX(BIO *bp, X509 *x);
|
|
|
|
int PEM_write_X509_AUX(FILE *fp, X509 *x);
|
|
|
|
|
|
|
|
X509_REQ *PEM_read_bio_X509_REQ(BIO *bp, X509_REQ **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
X509_REQ *PEM_read_X509_REQ(FILE *fp, X509_REQ **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_X509_REQ(BIO *bp, X509_REQ *x);
|
|
|
|
int PEM_write_X509_REQ(FILE *fp, X509_REQ *x);
|
|
|
|
int PEM_write_bio_X509_REQ_NEW(BIO *bp, X509_REQ *x);
|
|
|
|
int PEM_write_X509_REQ_NEW(FILE *fp, X509_REQ *x);
|
|
|
|
|
|
|
|
X509_CRL *PEM_read_bio_X509_CRL(BIO *bp, X509_CRL **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
X509_CRL *PEM_read_X509_CRL(FILE *fp, X509_CRL **x,
|
2016-02-02 04:15:06 +08:00
|
|
|
pem_password_cb *cb, void *u);
|
2001-03-12 04:29:28 +08:00
|
|
|
int PEM_write_bio_X509_CRL(BIO *bp, X509_CRL *x);
|
|
|
|
int PEM_write_X509_CRL(FILE *fp, X509_CRL *x);
|
|
|
|
|
|
|
|
PKCS7 *PEM_read_bio_PKCS7(BIO *bp, PKCS7 **x, pem_password_cb *cb, void *u);
|
|
|
|
PKCS7 *PEM_read_PKCS7(FILE *fp, PKCS7 **x, pem_password_cb *cb, void *u);
|
|
|
|
int PEM_write_bio_PKCS7(BIO *bp, PKCS7 *x);
|
|
|
|
int PEM_write_PKCS7(FILE *fp, PKCS7 *x);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The PEM functions read or write structures in PEM format. In
|
|
|
|
this sense PEM format is simply base64 encoded data surrounded
|
|
|
|
by header lines.
|
|
|
|
|
|
|
|
For more details about the meaning of arguments see the
|
|
|
|
B<PEM FUNCTION ARGUMENTS> section.
|
|
|
|
|
|
|
|
Each operation has four functions associated with it. For
|
2019-09-28 13:33:38 +08:00
|
|
|
brevity the term "B<I<TYPE>> functions" will be used below to collectively
|
|
|
|
refer to the B<PEM_read_bio_I<TYPE>>(), B<PEM_read_I<TYPE>>(),
|
|
|
|
B<PEM_write_bio_I<TYPE>>(), and B<PEM_write_I<TYPE>>() functions.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
2020-04-08 18:54:53 +08:00
|
|
|
Some operations have additional variants that take a library context I<libctx>
|
|
|
|
and a property query string I<propq>.
|
|
|
|
|
2020-09-14 17:30:14 +08:00
|
|
|
The B<PrivateKey> functions read or write a private key in PEM format using
|
|
|
|
an EVP_PKEY structure. The write routines use PKCS#8 private key format and are
|
|
|
|
equivalent to PEM_write_bio_PKCS8PrivateKey(). The read functions transparently
|
2016-05-17 21:15:20 +08:00
|
|
|
handle traditional and PKCS#8 format encrypted and unencrypted keys.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
2017-07-03 00:16:38 +08:00
|
|
|
PEM_write_bio_PrivateKey_traditional() writes out a private key in the
|
|
|
|
"traditional" format with a simple private key marker and should only
|
|
|
|
be used for compatibility with legacy programs.
|
2016-05-17 21:15:20 +08:00
|
|
|
|
|
|
|
PEM_write_bio_PKCS8PrivateKey() and PEM_write_PKCS8PrivateKey() write a private
|
|
|
|
key in an EVP_PKEY structure in PKCS#8 EncryptedPrivateKeyInfo format using
|
2019-09-28 13:33:38 +08:00
|
|
|
PKCS#5 v2.0 password based encryption algorithms. The I<cipher> argument
|
2016-05-17 21:15:20 +08:00
|
|
|
specifies the encryption algorithm to use: unlike some other PEM routines the
|
|
|
|
encryption is applied at the PKCS#8 level and not in the PEM headers. If
|
2019-09-28 13:33:38 +08:00
|
|
|
I<cipher> is NULL then no encryption is used and a PKCS#8 PrivateKeyInfo
|
2016-05-17 21:15:20 +08:00
|
|
|
structure is used instead.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
PEM_write_bio_PKCS8PrivateKey_nid() and PEM_write_PKCS8PrivateKey_nid()
|
|
|
|
also write out a private key as a PKCS#8 EncryptedPrivateKeyInfo however
|
|
|
|
it uses PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. The algorithm
|
2019-09-28 13:33:38 +08:00
|
|
|
to use is specified in the I<nid> parameter and should be the NID of the
|
2001-03-12 04:29:28 +08:00
|
|
|
corresponding OBJECT IDENTIFIER (see NOTES section).
|
|
|
|
|
|
|
|
The B<PUBKEY> functions process a public key using an EVP_PKEY
|
|
|
|
structure. The public key is encoded as a SubjectPublicKeyInfo
|
|
|
|
structure.
|
|
|
|
|
|
|
|
The B<RSAPrivateKey> functions process an RSA private key using an
|
2016-05-17 21:15:20 +08:00
|
|
|
RSA structure. The write routines uses traditional format. The read
|
|
|
|
routines handles the same formats as the B<PrivateKey>
|
2001-03-12 04:29:28 +08:00
|
|
|
functions but an error occurs if the private key is not RSA.
|
|
|
|
|
|
|
|
The B<RSAPublicKey> functions process an RSA public key using an
|
|
|
|
RSA structure. The public key is encoded using a PKCS#1 RSAPublicKey
|
|
|
|
structure.
|
|
|
|
|
|
|
|
The B<RSA_PUBKEY> functions also process an RSA public key using
|
2020-06-30 03:13:07 +08:00
|
|
|
an RSA structure. However, the public key is encoded using a
|
2001-03-12 04:29:28 +08:00
|
|
|
SubjectPublicKeyInfo structure and an error occurs if the public
|
|
|
|
key is not RSA.
|
|
|
|
|
|
|
|
The B<DSAPrivateKey> functions process a DSA private key using a
|
2016-05-17 21:15:20 +08:00
|
|
|
DSA structure. The write routines uses traditional format. The read
|
|
|
|
routines handles the same formats as the B<PrivateKey>
|
2001-03-12 04:29:28 +08:00
|
|
|
functions but an error occurs if the private key is not DSA.
|
|
|
|
|
|
|
|
The B<DSA_PUBKEY> functions process a DSA public key using
|
|
|
|
a DSA structure. The public key is encoded using a
|
|
|
|
SubjectPublicKeyInfo structure and an error occurs if the public
|
|
|
|
key is not DSA.
|
|
|
|
|
2019-10-07 13:23:32 +08:00
|
|
|
The B<Parameters> functions read or write key parameters in PEM format using
|
|
|
|
an EVP_PKEY structure. The encoding depends on the type of key; for DSA key
|
|
|
|
parameters, it will be a Dss-Parms structure as defined in RFC2459, and for DH
|
|
|
|
key parameters, it will be a PKCS#3 DHparameter structure. I<These functions
|
|
|
|
only exist for the B<BIO> type>.
|
|
|
|
|
2001-03-12 04:29:28 +08:00
|
|
|
The B<DSAparams> functions process DSA parameters using a DSA
|
2015-05-28 22:45:57 +08:00
|
|
|
structure. The parameters are encoded using a Dss-Parms structure
|
|
|
|
as defined in RFC2459.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
The B<DHparams> functions process DH parameters using a DH
|
|
|
|
structure. The parameters are encoded using a PKCS#3 DHparameter
|
|
|
|
structure.
|
|
|
|
|
|
|
|
The B<X509> functions process an X509 certificate using an X509
|
|
|
|
structure. They will also process a trusted X509 certificate but
|
|
|
|
any trust settings are discarded.
|
|
|
|
|
|
|
|
The B<X509_AUX> functions process a trusted X509 certificate using
|
2016-05-20 20:11:46 +08:00
|
|
|
an X509 structure.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
The B<X509_REQ> and B<X509_REQ_NEW> functions process a PKCS#10
|
|
|
|
certificate request using an X509_REQ structure. The B<X509_REQ>
|
|
|
|
write functions use B<CERTIFICATE REQUEST> in the header whereas
|
|
|
|
the B<X509_REQ_NEW> functions use B<NEW CERTIFICATE REQUEST>
|
|
|
|
(as required by some CAs). The B<X509_REQ> read functions will
|
|
|
|
handle either form so there are no B<X509_REQ_NEW> read functions.
|
|
|
|
|
|
|
|
The B<X509_CRL> functions process an X509 CRL using an X509_CRL
|
|
|
|
structure.
|
|
|
|
|
|
|
|
The B<PKCS7> functions process a PKCS#7 ContentInfo using a PKCS7
|
|
|
|
structure.
|
|
|
|
|
|
|
|
=head1 PEM FUNCTION ARGUMENTS
|
|
|
|
|
|
|
|
The PEM functions have many common arguments.
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The I<bp> BIO parameter (if present) specifies the BIO to read from
|
2001-03-12 04:29:28 +08:00
|
|
|
or write to.
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The I<fp> FILE parameter (if present) specifies the FILE pointer to
|
2001-03-12 04:29:28 +08:00
|
|
|
read from or write to.
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The PEM read functions all take an argument I<B<TYPE> **x> and return
|
|
|
|
a I<B<TYPE> *> pointer. Where I<B<TYPE>> is whatever structure the function
|
|
|
|
uses. If I<x> is NULL then the parameter is ignored. If I<x> is not
|
|
|
|
NULL but I<*x> is NULL then the structure returned will be written
|
|
|
|
to I<*x>. If neither I<x> nor I<*x> is NULL then an attempt is made
|
|
|
|
to reuse the structure at I<*x> (but see BUGS and EXAMPLES sections).
|
|
|
|
Irrespective of the value of I<x> a pointer to the structure is always
|
2001-03-12 04:29:28 +08:00
|
|
|
returned (or NULL if an error occurred).
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The PEM functions which write private keys take an I<enc> parameter
|
2001-03-12 04:29:28 +08:00
|
|
|
which specifies the encryption algorithm to use, encryption is done
|
|
|
|
at the PEM level. If this parameter is set to NULL then the private
|
|
|
|
key is written in unencrypted form.
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The I<cb> argument is the callback to use when querying for the pass
|
2001-03-12 04:29:28 +08:00
|
|
|
phrase used for encrypted PEM structures (normally only private keys).
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
For the PEM write routines if the I<kstr> parameter is not NULL then
|
|
|
|
I<klen> bytes at I<kstr> are used as the passphrase and I<cb> is
|
2001-03-12 04:29:28 +08:00
|
|
|
ignored.
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
If the I<cb> parameters is set to NULL and the I<u> parameter is not
|
|
|
|
NULL then the I<u> parameter is interpreted as a null terminated string
|
|
|
|
to use as the passphrase. If both I<cb> and I<u> are NULL then the
|
2001-03-12 04:29:28 +08:00
|
|
|
default callback routine is used which will typically prompt for the
|
|
|
|
passphrase on the current terminal with echoing turned off.
|
|
|
|
|
|
|
|
The default passphrase callback is sometimes inappropriate (for example
|
|
|
|
in a GUI application) so an alternative can be supplied. The callback
|
|
|
|
routine has the following form:
|
|
|
|
|
|
|
|
int cb(char *buf, int size, int rwflag, void *u);
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
I<buf> is the buffer to write the passphrase to. I<size> is the maximum
|
|
|
|
length of the passphrase (i.e. the size of buf). I<rwflag> is a flag
|
2001-03-12 04:29:28 +08:00
|
|
|
which is set to 0 when reading and 1 when writing. A typical routine
|
|
|
|
will ask the user to verify the passphrase (for example by prompting
|
2019-09-28 13:33:38 +08:00
|
|
|
for it twice) if I<rwflag> is 1. The I<u> parameter has the same
|
|
|
|
value as the I<u> parameter passed to the PEM routine. It allows
|
2001-03-12 04:29:28 +08:00
|
|
|
arbitrary data to be passed to the callback by the application
|
|
|
|
(for example a window handle in a GUI application). The callback
|
2019-09-28 13:33:38 +08:00
|
|
|
I<must> return the number of characters in the passphrase or -1 if
|
2001-03-12 04:29:28 +08:00
|
|
|
an error occurred.
|
|
|
|
|
2020-04-08 18:54:53 +08:00
|
|
|
Some implementations may need to use cryptographic algorithms during their
|
|
|
|
operation. If this is the case and I<libctx> and I<propq> parameters have been
|
|
|
|
passed then any algorithm fetches will use that library context and property
|
|
|
|
query string. Otherwise the default library context and property query string
|
|
|
|
will be used.
|
|
|
|
|
2001-03-12 04:29:28 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The old B<PrivateKey> write routines are retained for compatibility.
|
|
|
|
New applications should write private keys using the
|
|
|
|
PEM_write_bio_PKCS8PrivateKey() or PEM_write_PKCS8PrivateKey() routines
|
|
|
|
because they are more secure (they use an iteration count of 2048 whereas
|
|
|
|
the traditional routines use a count of 1) unless compatibility with older
|
|
|
|
versions of OpenSSL is important.
|
|
|
|
|
|
|
|
The B<PrivateKey> read routines can be used in all applications because
|
|
|
|
they handle all formats transparently.
|
|
|
|
|
|
|
|
A frequent cause of problems is attempting to use the PEM routines like
|
|
|
|
this:
|
|
|
|
|
|
|
|
X509 *x;
|
2017-01-21 02:58:49 +08:00
|
|
|
|
2001-03-12 04:29:28 +08:00
|
|
|
PEM_read_bio_X509(bp, &x, 0, NULL);
|
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
this is a bug because an attempt will be made to reuse the data at I<x>
|
2001-03-12 04:29:28 +08:00
|
|
|
which is an uninitialised pointer.
|
|
|
|
|
2018-05-13 17:35:14 +08:00
|
|
|
These functions make no assumption regarding the pass phrase received from the
|
|
|
|
password callback.
|
|
|
|
It will simply be treated as a byte sequence.
|
|
|
|
|
2002-01-04 21:35:37 +08:00
|
|
|
=head1 PEM ENCRYPTION FORMAT
|
|
|
|
|
2016-02-02 04:15:06 +08:00
|
|
|
These old B<PrivateKey> routines use a non standard technique for encryption.
|
2002-01-04 21:35:37 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
The private key (or other data) takes the following form:
|
2002-01-04 21:35:37 +08:00
|
|
|
|
|
|
|
-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
Proc-Type: 4,ENCRYPTED
|
|
|
|
DEK-Info: DES-EDE3-CBC,3F17F5316E2BAC89
|
|
|
|
|
|
|
|
...base64 encoded data...
|
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
|
2016-02-02 04:15:06 +08:00
|
|
|
The line beginning with I<Proc-Type> contains the version and the
|
|
|
|
protection on the encapsulated data. The line beginning I<DEK-Info>
|
|
|
|
contains two comma separated values: the encryption algorithm name as
|
|
|
|
used by EVP_get_cipherbyname() and an initialization vector used by the
|
|
|
|
cipher encoded as a set of hexadecimal digits. After those two lines is
|
|
|
|
the base64-encoded encrypted data.
|
2002-01-04 21:35:37 +08:00
|
|
|
|
2016-02-02 04:15:06 +08:00
|
|
|
The encryption key is derived using EVP_BytesToKey(). The cipher's
|
2019-09-28 13:33:38 +08:00
|
|
|
initialization vector is passed to EVP_BytesToKey() as the I<salt>
|
2016-02-02 04:15:06 +08:00
|
|
|
parameter. Internally, B<PKCS5_SALT_LEN> bytes of the salt are used
|
|
|
|
(regardless of the size of the initialization vector). The user's
|
2019-09-28 13:33:38 +08:00
|
|
|
password is passed to EVP_BytesToKey() using the I<data> and I<datal>
|
2016-02-02 04:15:06 +08:00
|
|
|
parameters. Finally, the library uses an iteration count of 1 for
|
|
|
|
EVP_BytesToKey().
|
2002-01-04 21:35:37 +08:00
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
The I<key> derived by EVP_BytesToKey() along with the original initialization
|
|
|
|
vector is then used to decrypt the encrypted data. The I<iv> produced by
|
2016-02-02 04:15:06 +08:00
|
|
|
EVP_BytesToKey() is not utilized or needed, and NULL should be passed to
|
|
|
|
the function.
|
|
|
|
|
|
|
|
The pseudo code to derive the key would look similar to:
|
|
|
|
|
|
|
|
EVP_CIPHER* cipher = EVP_des_ede3_cbc();
|
|
|
|
EVP_MD* md = EVP_md5();
|
|
|
|
|
|
|
|
unsigned int nkey = EVP_CIPHER_key_length(cipher);
|
|
|
|
unsigned int niv = EVP_CIPHER_iv_length(cipher);
|
|
|
|
unsigned char key[nkey];
|
|
|
|
unsigned char iv[niv];
|
|
|
|
|
|
|
|
memcpy(iv, HexToBin("3F17F5316E2BAC89"), niv);
|
|
|
|
rc = EVP_BytesToKey(cipher, md, iv /*salt*/, pword, plen, 1, key, NULL /*iv*/);
|
2016-11-19 07:10:05 +08:00
|
|
|
if (rc != nkey)
|
2016-02-02 04:15:06 +08:00
|
|
|
/* Error */
|
|
|
|
|
|
|
|
/* On success, use key and iv to initialize the cipher */
|
2002-01-04 21:35:37 +08:00
|
|
|
|
2001-03-12 04:29:28 +08:00
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
The PEM read routines in some versions of OpenSSL will not correctly reuse
|
2020-06-30 03:13:07 +08:00
|
|
|
an existing structure. Therefore, the following:
|
2001-03-12 04:29:28 +08:00
|
|
|
|
2003-12-21 06:48:21 +08:00
|
|
|
PEM_read_bio_X509(bp, &x, 0, NULL);
|
2001-03-12 04:29:28 +08:00
|
|
|
|
2019-09-28 13:33:38 +08:00
|
|
|
where I<x> already contains a valid certificate, may not work, whereas:
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
X509_free(x);
|
2003-12-21 06:48:21 +08:00
|
|
|
x = PEM_read_bio_X509(bp, NULL, 0, NULL);
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
is guaranteed to work.
|
|
|
|
|
2017-12-25 17:50:39 +08:00
|
|
|
=head1 RETURN VALUES
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
The read routines return either a pointer to the structure read or NULL
|
2004-03-22 07:03:52 +08:00
|
|
|
if an error occurred.
|
2001-03-12 04:29:28 +08:00
|
|
|
|
|
|
|
The write routines return 1 for success or 0 for failure.
|
2014-07-17 18:25:02 +08:00
|
|
|
|
2019-02-26 13:11:10 +08:00
|
|
|
=head1 EXAMPLES
|
|
|
|
|
|
|
|
Although the PEM routines take several arguments in almost all applications
|
|
|
|
most of them are set to 0 or NULL.
|
|
|
|
|
2020-07-24 20:53:27 +08:00
|
|
|
To read a certificate with a library context in PEM format from a BIO:
|
|
|
|
|
2020-09-24 17:42:23 +08:00
|
|
|
X509 *x = X509_new_ex(libctx, NULL);
|
2020-07-24 20:53:27 +08:00
|
|
|
|
|
|
|
if (x == NULL)
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
if (PEM_read_bio_X509(bp, &x, 0, NULL) == NULL)
|
|
|
|
/* Error */
|
|
|
|
|
2019-02-26 13:11:10 +08:00
|
|
|
Read a certificate in PEM format from a BIO:
|
|
|
|
|
|
|
|
X509 *x;
|
|
|
|
|
|
|
|
x = PEM_read_bio_X509(bp, NULL, 0, NULL);
|
|
|
|
if (x == NULL)
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Alternative method:
|
|
|
|
|
|
|
|
X509 *x = NULL;
|
|
|
|
|
|
|
|
if (!PEM_read_bio_X509(bp, &x, 0, NULL))
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Write a certificate to a BIO:
|
|
|
|
|
|
|
|
if (!PEM_write_bio_X509(bp, x))
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Write a private key (using traditional format) to a BIO using
|
|
|
|
triple DES encryption, the pass phrase is prompted for:
|
|
|
|
|
|
|
|
if (!PEM_write_bio_PrivateKey(bp, key, EVP_des_ede3_cbc(), NULL, 0, 0, NULL))
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Write a private key (using PKCS#8 format) to a BIO using triple
|
|
|
|
DES encryption, using the pass phrase "hello":
|
|
|
|
|
|
|
|
if (!PEM_write_bio_PKCS8PrivateKey(bp, key, EVP_des_ede3_cbc(),
|
|
|
|
NULL, 0, 0, "hello"))
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Read a private key from a BIO using a pass phrase callback:
|
|
|
|
|
|
|
|
key = PEM_read_bio_PrivateKey(bp, NULL, pass_cb, "My Private Key");
|
|
|
|
if (key == NULL)
|
|
|
|
/* Error */
|
|
|
|
|
|
|
|
Skeleton pass phrase callback:
|
|
|
|
|
|
|
|
int pass_cb(char *buf, int size, int rwflag, void *u)
|
|
|
|
{
|
|
|
|
|
|
|
|
/* We'd probably do something else if 'rwflag' is 1 */
|
|
|
|
printf("Enter pass phrase for \"%s\"\n", (char *)u);
|
|
|
|
|
|
|
|
/* get pass phrase, length 'len' into 'tmp' */
|
|
|
|
char *tmp = "hello";
|
|
|
|
if (tmp == NULL) /* An error occurred */
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
size_t len = strlen(tmp);
|
|
|
|
|
|
|
|
if (len > size)
|
|
|
|
len = size;
|
|
|
|
memcpy(buf, tmp, len);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2019-04-09 22:13:55 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<EVP_EncryptInit(3)>, L<EVP_BytesToKey(3)>,
|
|
|
|
L<passphrase-encoding(7)>
|
|
|
|
|
2016-02-02 04:15:06 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The old Netscape certificate sequences were no longer documented
|
2017-07-03 00:16:38 +08:00
|
|
|
in OpenSSL 1.1.0; applications should use the PKCS7 standard instead
|
2016-02-02 04:15:06 +08:00
|
|
|
as they will be formally deprecated in a future releases.
|
|
|
|
|
2020-08-19 03:38:56 +08:00
|
|
|
PEM_read_bio_PrivateKey_ex(), PEM_read_PrivateKey_ex(),
|
|
|
|
PEM_read_bio_PUBKEY_ex(), PEM_read_PUBKEY_ex() and
|
|
|
|
PEM_read_bio_Parameters_ex() were introduced in OpenSSL 3.0.
|
2020-04-08 18:54:53 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|