1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145
|
%% ``The contents of this file are subject to the Erlang Public License,
%% Version 1.1, (the "License"); you may not use this file except in
%% compliance with the License. You should have received a copy of the
%% Erlang Public License along with this software. If not, it can be
%% retrieved via the world wide web at http://www.erlang.org/.
%%
%% Software distributed under the License is distributed on an "AS IS"
%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
%% the License for the specific language governing rights and limitations
%% under the License.
%%
%% The Initial Developer of the Original Code is Ericsson Utvecklings AB.
%% Portions created by Ericsson are Copyright 1999, Ericsson Utvecklings
%% AB. All Rights Reserved.''
%%
%% $Id$
%%
-module(ssl_pem).
%%% Purpose: Reading and writing of PEM type encoded files for SSL.
%% NB write_file/2 is only preliminary.
%% PEM encoded files have the following structure:
%%
%% <text>
%% -----BEGIN SOMETHING-----<CR><LF>
%% <Base64 encoding line><CR><LF>
%% <Base64 encoding line><CR><LF>
%% ...
%% -----END SOMETHING-----<CR><LF>
%% <text>
%%
%% A file can contain several BEGIN/END blocks. Text lines between
%% blocks are ignored.
-export([read_file/1, read_file/2, write_file/2]).
%% Read a PEM file and return each decoding as a binary.
read_file(File) ->
read_file(File, no_passwd).
read_file(File, Passwd) ->
{ok, Fd} = file:open(File, [read]),
Result = decode_file(Fd, Passwd),
file:close(Fd),
Result.
decode_file(Fd, Passwd) ->
decode_file(Fd, [], [], notag, [Passwd]).
decode_file(Fd, _RLs, Ens, notag, Info) ->
case io:get_line(Fd, "") of
"-----BEGIN CERTIFICATE REQUEST-----" ++ _ ->
decode_file(Fd, [], Ens, cert_req, Info);
"-----BEGIN CERTIFICATE-----" ++ _ ->
decode_file(Fd, [], Ens, cert, Info);
"-----BEGIN RSA PRIVATE KEY-----" ++ _ ->
decode_file(Fd, [], Ens, rsa_private_key, Info);
eof ->
{ok, lists:reverse(Ens)};
_ ->
decode_file(Fd, [], Ens, notag, Info)
end;
decode_file(Fd, RLs, Ens, Tag, Info0) ->
case io:get_line(Fd, "") of
"Proc-Type: 4,ENCRYPTED"++_ ->
Info = dek_info(Fd, Info0),
decode_file(Fd, RLs, Ens, Tag, Info);
"-----END" ++ _ -> % XXX sloppy
Cs = lists:flatten(lists:reverse(RLs)),
Bin = ssl_base64:join_decode(Cs),
case Info0 of
[Password, Cipher, SaltHex | Info1] ->
Decoded = decode_key(Bin, Password, Cipher, unhex(SaltHex)),
decode_file(Fd, [], [{Tag, Decoded}| Ens], notag, Info1);
_ ->
decode_file(Fd, [], [{Tag, Bin}| Ens], notag, Info0)
end;
eof ->
{ok, lists:reverse(Ens)};
L ->
decode_file(Fd, [L|RLs], Ens, Tag, Info0)
end.
dek_info(Fd, Info) ->
Line = io:get_line(Fd, ""),
[_, DekInfo0] = string:tokens(Line, ": "),
DekInfo1 = string:tokens(DekInfo0, ",\n"),
Info ++ DekInfo1.
unhex(S) ->
unhex(S, []).
unhex("", Acc) ->
lists:reverse(Acc);
unhex([D1, D2 | Rest], Acc) ->
unhex(Rest, [erlang:list_to_integer([D1, D2], 16) | Acc]).
decode_key(Data, Password, "DES-CBC", Salt) ->
Key = password_to_key(Password, Salt, 8),
IV = Salt,
crypto:des_cbc_decrypt(Key, IV, Data);
decode_key(Data, Password, "DES-EDE3-CBC", Salt) ->
Key = password_to_key(Password, Salt, 24),
IV = Salt,
<<Key1:8/binary, Key2:8/binary, Key3:8/binary>> = Key,
crypto:des_ede3_cbc_decrypt(Key1, Key2, Key3, IV, Data).
write_file(File, Ds) ->
file:write_file(File, encode_file(Ds)).
encode_file(Ds) ->
lists:map(
fun({cert, Bin}) ->
%% PKIX (X.509)
["-----BEGIN CERTIFICATE-----\n",
ssl_base64:encode_split(Bin),
"-----END CERTIFICATE-----\n\n"];
({cert_req, Bin}) ->
%% PKCS#10
["-----BEGIN CERTIFICATE REQUEST-----\n",
ssl_base64:encode_split(Bin),
"-----END CERTIFICATE REQUEST-----\n\n"];
({rsa_private_key, Bin}) ->
%% PKCS#?
["XXX Following key assumed not encrypted\n",
"-----BEGIN RSA PRIVATE KEY-----\n",
ssl_base64:encode_split(Bin),
"-----END RSA PRIVATE KEY-----\n\n"]
end, Ds).
password_to_key(Data, Salt, KeyLen) ->
<<Key:KeyLen/binary, _/binary>> =
password_to_key(<<>>, Data, Salt, KeyLen, <<>>),
Key.
password_to_key(_, _, _, Len, Acc) when Len =< 0 ->
Acc;
password_to_key(Prev, Data, Salt, Len, Acc) ->
M = crypto:md5([Prev, Data, Salt]),
password_to_key(M, Data, Salt, Len - size(M), <<Acc/binary, M/binary>>).
|