blob: 3c6a28d98d95b93bbbd1f7601a59cc3642a56268 [file] [log] [blame]
Paul Bakker96743fc2011-02-12 14:30:57 +00001/**
2 * \file pem.h
3 *
4 * \brief Privacy Enhanced Mail (PEM) decoding
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00008 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker96743fc2011-02-12 14:30:57 +00009 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020010#ifndef MBEDTLS_PEM_H
11#define MBEDTLS_PEM_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020012#include "mbedtls/private_access.h"
Paul Bakker96743fc2011-02-12 14:30:57 +000013
Bence Szépkútic662b362021-05-27 11:25:03 +020014#include "mbedtls/build_info.h"
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050015
Rich Evans00ab4702015-02-06 13:43:58 +000016#include <stddef.h>
Paul Bakker23986e52011-04-24 08:57:21 +000017
Paul Bakker96743fc2011-02-12 14:30:57 +000018/**
19 * \name PEM Error codes
20 * These error codes are returned in case of errors reading the
21 * PEM data.
22 * \{
23 */
Gilles Peskined2971572021-07-26 18:48:10 +020024/** No PEM header or footer found. */
25#define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080
26/** PEM string is not as expected. */
27#define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100
28/** Failed to allocate memory. */
29#define MBEDTLS_ERR_PEM_ALLOC_FAILED -0x1180
30/** RSA IV is not in hex-format. */
31#define MBEDTLS_ERR_PEM_INVALID_ENC_IV -0x1200
32/** Unsupported key encryption algorithm. */
33#define MBEDTLS_ERR_PEM_UNKNOWN_ENC_ALG -0x1280
34/** Private key password can't be empty. */
35#define MBEDTLS_ERR_PEM_PASSWORD_REQUIRED -0x1300
36/** Given private key password does not allow for correct decryption. */
37#define MBEDTLS_ERR_PEM_PASSWORD_MISMATCH -0x1380
38/** Unavailable feature, e.g. hashing/encryption combination. */
39#define MBEDTLS_ERR_PEM_FEATURE_UNAVAILABLE -0x1400
40/** Bad input parameters to function. */
41#define MBEDTLS_ERR_PEM_BAD_INPUT_DATA -0x1480
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +010042/** \} name PEM Error codes */
Paul Bakker96743fc2011-02-12 14:30:57 +000043
Paul Bakker407a0da2013-06-27 14:29:21 +020044#ifdef __cplusplus
45extern "C" {
46#endif
47
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020048#if defined(MBEDTLS_PEM_PARSE_C)
Paul Bakker96743fc2011-02-12 14:30:57 +000049/**
50 * \brief PEM context structure
51 */
Gilles Peskine449bd832023-01-11 14:50:10 +010052typedef struct mbedtls_pem_context {
Mateusz Starzyk846f0212021-05-19 19:44:07 +020053 unsigned char *MBEDTLS_PRIVATE(buf); /*!< buffer for decoded data */
54 size_t MBEDTLS_PRIVATE(buflen); /*!< length of the buffer */
55 unsigned char *MBEDTLS_PRIVATE(info); /*!< buffer for extra header information */
Paul Bakker96743fc2011-02-12 14:30:57 +000056}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020057mbedtls_pem_context;
Paul Bakker96743fc2011-02-12 14:30:57 +000058
Paul Bakker96743fc2011-02-12 14:30:57 +000059/**
60 * \brief PEM context setup
61 *
62 * \param ctx context to be initialized
63 */
Gilles Peskine449bd832023-01-11 14:50:10 +010064void mbedtls_pem_init(mbedtls_pem_context *ctx);
Paul Bakker96743fc2011-02-12 14:30:57 +000065
66/**
67 * \brief Read a buffer for PEM information and store the resulting
68 * data into the specified context buffers.
69 *
70 * \param ctx context to use
71 * \param header header string to seek and expect
72 * \param footer footer string to seek and expect
Manuel Pégourié-Gonnard43b37cb2015-05-12 11:20:10 +020073 * \param data source data to look in (must be nul-terminated)
Paul Bakker96743fc2011-02-12 14:30:57 +000074 * \param pwd password for decryption (can be NULL)
75 * \param pwdlen length of password
Valerio Setti2653e922024-02-08 17:51:00 +010076 * \param use_len destination for total length used from data buffer. It is
77 * set after header is correctly read, so unless you get
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020078 * MBEDTLS_ERR_PEM_BAD_INPUT_DATA or
79 * MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT, use_len is
Valerio Setti2653e922024-02-08 17:51:00 +010080 * the length to skip.
Paul Bakker96743fc2011-02-12 14:30:57 +000081 *
Manuel Pégourié-Gonnard7d4e5b72013-07-09 16:35:23 +020082 * \note Attempts to check password correctness by verifying if
83 * the decrypted text starts with an ASN.1 sequence of
84 * appropriate length
Manuel Pégourié-Gonnardf8648d52013-07-03 21:01:35 +020085 *
Glenn Strauss72bd4e42022-02-04 10:32:17 -050086 * \note \c mbedtls_pem_free must be called on PEM context before
87 * the PEM context can be reused in another call to
88 * \c mbedtls_pem_read_buffer
89 *
Paul Bakker77e23fb2013-09-15 20:03:26 +020090 * \return 0 on success, or a specific PEM error code
Paul Bakker96743fc2011-02-12 14:30:57 +000091 */
Gilles Peskine449bd832023-01-11 14:50:10 +010092int mbedtls_pem_read_buffer(mbedtls_pem_context *ctx, const char *header, const char *footer,
93 const unsigned char *data,
94 const unsigned char *pwd,
95 size_t pwdlen, size_t *use_len);
Paul Bakker96743fc2011-02-12 14:30:57 +000096
97/**
Glenn Strauss72bd4e42022-02-04 10:32:17 -050098 * \brief Get the pointer to the decoded binary data in a PEM context.
99 *
100 * \param ctx PEM context to access.
101 * \param buflen On success, this will contain the length of the binary data.
102 * This must be a valid (non-null) pointer.
103 *
104 * \return A pointer to the decoded binary data.
105 *
106 * \note The returned pointer remains valid only until \p ctx is
107 modified or freed.
108 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100109static inline const unsigned char *mbedtls_pem_get_buffer(mbedtls_pem_context *ctx, size_t *buflen)
Glenn Strauss72bd4e42022-02-04 10:32:17 -0500110{
111 *buflen = ctx->MBEDTLS_PRIVATE(buflen);
Gilles Peskine449bd832023-01-11 14:50:10 +0100112 return ctx->MBEDTLS_PRIVATE(buf);
Glenn Strauss72bd4e42022-02-04 10:32:17 -0500113}
114
115
116/**
Paul Bakkercff68422013-09-15 20:43:33 +0200117 * \brief PEM context memory freeing
118 *
119 * \param ctx context to be freed
120 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100121void mbedtls_pem_free(mbedtls_pem_context *ctx);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#endif /* MBEDTLS_PEM_PARSE_C */
Paul Bakkercff68422013-09-15 20:43:33 +0200123
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200124#if defined(MBEDTLS_PEM_WRITE_C)
Paul Bakkercff68422013-09-15 20:43:33 +0200125/**
Paul Bakker77e23fb2013-09-15 20:03:26 +0200126 * \brief Write a buffer of PEM information from a DER encoded
127 * buffer.
128 *
Hanno Becker4063ad22019-05-04 08:12:47 +0100129 * \param header The header string to write.
130 * \param footer The footer string to write.
131 * \param der_data The DER data to encode.
132 * \param der_len The length of the DER data \p der_data in Bytes.
133 * \param buf The buffer to write to.
134 * \param buf_len The length of the output buffer \p buf in Bytes.
135 * \param olen The address at which to store the total length written
136 * or required (if \p buf_len is not enough).
Paul Bakker77e23fb2013-09-15 20:03:26 +0200137 *
Hanno Becker4063ad22019-05-04 08:12:47 +0100138 * \note You may pass \c NULL for \p buf and \c 0 for \p buf_len
139 * to request the length of the resulting PEM buffer in
140 * `*olen`.
141 *
142 * \note This function may be called with overlapping \p der_data
143 * and \p buf buffers.
144 *
145 * \return \c 0 on success.
146 * \return #MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL if \p buf isn't large
147 * enough to hold the PEM buffer. In this case, `*olen` holds
148 * the required minimum size of \p buf.
149 * \return Another PEM or BASE64 error code on other kinds of failure.
Paul Bakker77e23fb2013-09-15 20:03:26 +0200150 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100151int mbedtls_pem_write_buffer(const char *header, const char *footer,
152 const unsigned char *der_data, size_t der_len,
153 unsigned char *buf, size_t buf_len, size_t *olen);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200154#endif /* MBEDTLS_PEM_WRITE_C */
Paul Bakker96743fc2011-02-12 14:30:57 +0000155
156#ifdef __cplusplus
157}
158#endif
159
160#endif /* pem.h */