| 1 | //! # rustls-pemfile |
| 2 | //! A basic parser for .pem files containing cryptographic keys and certificates. |
| 3 | //! |
| 4 | //! The input to this crate is a .pem file containing potentially many sections, |
| 5 | //! and the output is those sections as alleged DER-encodings. This crate does |
| 6 | //! not decode the actual DER-encoded keys/certificates. |
| 7 | //! |
| 8 | //! ## Quick start |
| 9 | //! Starting with an `io::BufRead` containing the file to be read: |
| 10 | //! - Use `read_all()` to ingest the whole file, then work through the contents in-memory, or, |
| 11 | //! - Use `read_one()` to stream through the file, processing the items as found, or, |
| 12 | //! - Use `certs()` to extract just the certificates (silently discarding other sections), and |
| 13 | //! similarly for `rsa_private_keys()` and `pkcs8_private_keys()`. |
| 14 | //! |
| 15 | //! # no-std support |
| 16 | //! |
| 17 | //! The opt-out "std" Cargo feature can be disabled to put this crate in no-std mode. |
| 18 | //! |
| 19 | //! In no-std mode, the `read_one_from_slice` API can be used to parse a .pem file that has already |
| 20 | //! been loaded into memory. |
| 21 | //! |
| 22 | //! ## Example code |
| 23 | #![cfg_attr (feature = "std" , doc = "```" )] |
| 24 | #![cfg_attr (not(feature = "std" ), doc = "```ignore" )] |
| 25 | //! use std::iter; |
| 26 | //! use rustls_pemfile::{Item, read_one}; |
| 27 | //! # let mut reader = std::io::BufReader::new(&b"junk \n-----BEGIN RSA PRIVATE KEY----- \nqw \n-----END RSA PRIVATE KEY----- \n" [..]); |
| 28 | //! // Assume `reader` is any std::io::BufRead implementor |
| 29 | //! for item in iter::from_fn(|| read_one(&mut reader).transpose()) { |
| 30 | //! match item.unwrap() { |
| 31 | //! Item::X509Certificate(cert) => println!("certificate {:?}" , cert), |
| 32 | //! Item::Crl(crl) => println!("certificate revocation list: {:?}" , crl), |
| 33 | //! Item::Csr(csr) => println!("certificate signing request: {:?}" , csr), |
| 34 | //! Item::Pkcs1Key(key) => println!("rsa pkcs1 key {:?}" , key), |
| 35 | //! Item::Pkcs8Key(key) => println!("pkcs8 key {:?}" , key), |
| 36 | //! Item::Sec1Key(key) => println!("sec1 ec key {:?}" , key), |
| 37 | //! _ => println!("unhandled item" ), |
| 38 | //! } |
| 39 | //! } |
| 40 | //! ``` |
| 41 | |
| 42 | // Require docs for public APIs, deny unsafe code, etc. |
| 43 | #![forbid (unsafe_code, unused_must_use, unstable_features)] |
| 44 | #![deny ( |
| 45 | trivial_casts, |
| 46 | trivial_numeric_casts, |
| 47 | missing_docs, |
| 48 | unused_import_braces, |
| 49 | unused_extern_crates, |
| 50 | unused_qualifications |
| 51 | )] |
| 52 | #![no_std ] |
| 53 | |
| 54 | extern crate alloc; |
| 55 | #[cfg (any(feature = "std" , test))] |
| 56 | extern crate std; |
| 57 | |
| 58 | #[cfg (test)] |
| 59 | #[cfg (feature = "std" )] |
| 60 | mod tests; |
| 61 | |
| 62 | mod pemfile; |
| 63 | #[cfg (feature = "std" )] |
| 64 | use core::iter; |
| 65 | /// --- Legacy APIs: |
| 66 | #[cfg (feature = "std" )] |
| 67 | use std::io; |
| 68 | |
| 69 | #[cfg (feature = "std" )] |
| 70 | pub use pemfile::{read_all, read_one}; |
| 71 | pub use pemfile::{read_one_from_slice, Error, Item}; |
| 72 | #[cfg (feature = "std" )] |
| 73 | use pki_types::PrivateKeyDer; |
| 74 | #[cfg (feature = "std" )] |
| 75 | use pki_types::{ |
| 76 | CertificateDer, CertificateRevocationListDer, CertificateSigningRequestDer, PrivatePkcs1KeyDer, |
| 77 | PrivatePkcs8KeyDer, PrivateSec1KeyDer, SubjectPublicKeyInfoDer, |
| 78 | }; |
| 79 | |
| 80 | /// Return an iterator over certificates from `rd`. |
| 81 | /// |
| 82 | /// Filters out any PEM sections that are not certificates and yields errors if a problem |
| 83 | /// occurs while trying to extract a certificate. |
| 84 | #[cfg (feature = "std" )] |
| 85 | pub fn certs( |
| 86 | rd: &mut dyn io::BufRead, |
| 87 | ) -> impl Iterator<Item = Result<CertificateDer<'static>, io::Error>> + '_ { |
| 88 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 89 | Ok(Item::X509Certificate(cert: CertificateDer<'static>)) => Some(Ok(cert)), |
| 90 | Err(err: Error) => Some(Err(err)), |
| 91 | _ => None, |
| 92 | }) |
| 93 | } |
| 94 | |
| 95 | /// Return the first private key found in `rd`. |
| 96 | /// |
| 97 | /// Yields the first PEM section describing a private key (of any type), or an error if a |
| 98 | /// problem occurs while trying to read PEM sections. |
| 99 | #[cfg (feature = "std" )] |
| 100 | pub fn private_key(rd: &mut dyn io::BufRead) -> Result<Option<PrivateKeyDer<'static>>, io::Error> { |
| 101 | for result: Result in iter::from_fn(move || read_one(rd).transpose()) { |
| 102 | match result? { |
| 103 | Item::Pkcs1Key(key: PrivatePkcs1KeyDer<'static>) => return Ok(Some(key.into())), |
| 104 | Item::Pkcs8Key(key: PrivatePkcs8KeyDer<'static>) => return Ok(Some(key.into())), |
| 105 | Item::Sec1Key(key: PrivateSec1KeyDer<'static>) => return Ok(Some(key.into())), |
| 106 | Item::X509Certificate(_) |
| 107 | | Item::SubjectPublicKeyInfo(_) |
| 108 | | Item::Crl(_) |
| 109 | | Item::Csr(_) => continue, |
| 110 | } |
| 111 | } |
| 112 | |
| 113 | Ok(None) |
| 114 | } |
| 115 | |
| 116 | /// Return the first certificate signing request (CSR) found in `rd`. |
| 117 | /// |
| 118 | /// Yields the first PEM section describing a certificate signing request, or an error if a |
| 119 | /// problem occurs while trying to read PEM sections. |
| 120 | #[cfg (feature = "std" )] |
| 121 | pub fn csr( |
| 122 | rd: &mut dyn io::BufRead, |
| 123 | ) -> Result<Option<CertificateSigningRequestDer<'static>>, io::Error> { |
| 124 | for result: Result in iter::from_fn(move || read_one(rd).transpose()) { |
| 125 | match result? { |
| 126 | Item::Csr(csr: CertificateSigningRequestDer<'static>) => return Ok(Some(csr)), |
| 127 | Item::Pkcs1Key(_) |
| 128 | | Item::Pkcs8Key(_) |
| 129 | | Item::Sec1Key(_) |
| 130 | | Item::X509Certificate(_) |
| 131 | | Item::SubjectPublicKeyInfo(_) |
| 132 | | Item::Crl(_) => continue, |
| 133 | } |
| 134 | } |
| 135 | |
| 136 | Ok(None) |
| 137 | } |
| 138 | |
| 139 | /// Return an iterator certificate revocation lists (CRLs) from `rd`. |
| 140 | /// |
| 141 | /// Filters out any PEM sections that are not CRLs and yields errors if a problem occurs |
| 142 | /// while trying to extract a CRL. |
| 143 | #[cfg (feature = "std" )] |
| 144 | pub fn crls( |
| 145 | rd: &mut dyn io::BufRead, |
| 146 | ) -> impl Iterator<Item = Result<CertificateRevocationListDer<'static>, io::Error>> + '_ { |
| 147 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 148 | Ok(Item::Crl(crl: CertificateRevocationListDer<'static>)) => Some(Ok(crl)), |
| 149 | Err(err: Error) => Some(Err(err)), |
| 150 | _ => None, |
| 151 | }) |
| 152 | } |
| 153 | |
| 154 | /// Return an iterator over RSA private keys from `rd`. |
| 155 | /// |
| 156 | /// Filters out any PEM sections that are not RSA private keys and yields errors if a problem |
| 157 | /// occurs while trying to extract an RSA private key. |
| 158 | #[cfg (feature = "std" )] |
| 159 | pub fn rsa_private_keys( |
| 160 | rd: &mut dyn io::BufRead, |
| 161 | ) -> impl Iterator<Item = Result<PrivatePkcs1KeyDer<'static>, io::Error>> + '_ { |
| 162 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 163 | Ok(Item::Pkcs1Key(key: PrivatePkcs1KeyDer<'static>)) => Some(Ok(key)), |
| 164 | Err(err: Error) => Some(Err(err)), |
| 165 | _ => None, |
| 166 | }) |
| 167 | } |
| 168 | |
| 169 | /// Return an iterator over PKCS8-encoded private keys from `rd`. |
| 170 | /// |
| 171 | /// Filters out any PEM sections that are not PKCS8-encoded private keys and yields errors if a |
| 172 | /// problem occurs while trying to extract an RSA private key. |
| 173 | #[cfg (feature = "std" )] |
| 174 | pub fn pkcs8_private_keys( |
| 175 | rd: &mut dyn io::BufRead, |
| 176 | ) -> impl Iterator<Item = Result<PrivatePkcs8KeyDer<'static>, io::Error>> + '_ { |
| 177 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 178 | Ok(Item::Pkcs8Key(key: PrivatePkcs8KeyDer<'static>)) => Some(Ok(key)), |
| 179 | Err(err: Error) => Some(Err(err)), |
| 180 | _ => None, |
| 181 | }) |
| 182 | } |
| 183 | |
| 184 | /// Return an iterator over SEC1-encoded EC private keys from `rd`. |
| 185 | /// |
| 186 | /// Filters out any PEM sections that are not SEC1-encoded EC private keys and yields errors if a |
| 187 | /// problem occurs while trying to extract a SEC1-encoded EC private key. |
| 188 | #[cfg (feature = "std" )] |
| 189 | pub fn ec_private_keys( |
| 190 | rd: &mut dyn io::BufRead, |
| 191 | ) -> impl Iterator<Item = Result<PrivateSec1KeyDer<'static>, io::Error>> + '_ { |
| 192 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 193 | Ok(Item::Sec1Key(key: PrivateSec1KeyDer<'static>)) => Some(Ok(key)), |
| 194 | Err(err: Error) => Some(Err(err)), |
| 195 | _ => None, |
| 196 | }) |
| 197 | } |
| 198 | |
| 199 | /// Return an iterator over SPKI-encoded keys from `rd`. |
| 200 | /// |
| 201 | /// Filters out any PEM sections that are not SPKI-encoded public keys and yields errors if a |
| 202 | /// problem occurs while trying to extract a SPKI-encoded public key. |
| 203 | #[cfg (feature = "std" )] |
| 204 | pub fn public_keys( |
| 205 | rd: &mut dyn io::BufRead, |
| 206 | ) -> impl Iterator<Item = Result<SubjectPublicKeyInfoDer<'static>, io::Error>> + '_ { |
| 207 | iter::from_fn(move || read_one(rd).transpose()).filter_map(|item: Result | match item { |
| 208 | Ok(Item::SubjectPublicKeyInfo(key: SubjectPublicKeyInfoDer<'static>)) => Some(Ok(key)), |
| 209 | Err(err: Error) => Some(Err(err)), |
| 210 | _ => None, |
| 211 | }) |
| 212 | } |
| 213 | |