pkcs8/
private_key_info.rs1use crate::{AlgorithmIdentifierRef, Error, Result, Version};
4use core::fmt;
5use der::{
6 asn1::{AnyRef, BitStringRef, ContextSpecific, OctetStringRef},
7 Decode, DecodeValue, Encode, EncodeValue, Header, Length, Reader, Sequence, TagMode, TagNumber,
8 Writer,
9};
10
11#[cfg(feature = "alloc")]
12use der::SecretDocument;
13
14#[cfg(feature = "encryption")]
15use {
16 crate::EncryptedPrivateKeyInfo,
17 der::zeroize::Zeroizing,
18 pkcs5::pbes2,
19 rand_core::{CryptoRng, RngCore},
20};
21
22#[cfg(feature = "pem")]
23use der::pem::PemLabel;
24
25#[cfg(feature = "subtle")]
26use subtle::{Choice, ConstantTimeEq};
27
28const PUBLIC_KEY_TAG: TagNumber = TagNumber::N1;
30
31#[derive(Clone)]
93pub struct PrivateKeyInfo<'a> {
94 pub algorithm: AlgorithmIdentifierRef<'a>,
96
97 pub private_key: &'a [u8],
99
100 pub public_key: Option<&'a [u8]>,
102}
103
104impl<'a> PrivateKeyInfo<'a> {
105 pub fn new(algorithm: AlgorithmIdentifierRef<'a>, private_key: &'a [u8]) -> Self {
110 Self {
111 algorithm,
112 private_key,
113 public_key: None,
114 }
115 }
116
117 pub fn version(&self) -> Version {
121 if self.public_key.is_some() {
122 Version::V2
123 } else {
124 Version::V1
125 }
126 }
127
128 #[cfg(feature = "encryption")]
138 pub fn encrypt(
139 &self,
140 rng: impl CryptoRng + RngCore,
141 password: impl AsRef<[u8]>,
142 ) -> Result<SecretDocument> {
143 let der = Zeroizing::new(self.to_der()?);
144 EncryptedPrivateKeyInfo::encrypt(rng, password, der.as_ref())
145 }
146
147 #[cfg(feature = "encryption")]
150 pub fn encrypt_with_params(
151 &self,
152 pbes2_params: pbes2::Parameters<'_>,
153 password: impl AsRef<[u8]>,
154 ) -> Result<SecretDocument> {
155 let der = Zeroizing::new(self.to_der()?);
156 EncryptedPrivateKeyInfo::encrypt_with(pbes2_params, password, der.as_ref())
157 }
158
159 fn public_key_bit_string(&self) -> der::Result<Option<ContextSpecific<BitStringRef<'a>>>> {
161 self.public_key
162 .map(|pk| {
163 BitStringRef::from_bytes(pk).map(|value| ContextSpecific {
164 tag_number: PUBLIC_KEY_TAG,
165 tag_mode: TagMode::Implicit,
166 value,
167 })
168 })
169 .transpose()
170 }
171}
172
173impl<'a> DecodeValue<'a> for PrivateKeyInfo<'a> {
174 fn decode_value<R: Reader<'a>>(
175 reader: &mut R,
176 header: Header,
177 ) -> der::Result<PrivateKeyInfo<'a>> {
178 reader.read_nested(header.length, |reader| {
179 let version = Version::decode(reader)?;
181 let algorithm = reader.decode()?;
182 let private_key = OctetStringRef::decode(reader)?.into();
183 let public_key = reader
184 .context_specific::<BitStringRef<'_>>(PUBLIC_KEY_TAG, TagMode::Implicit)?
185 .map(|bs| {
186 bs.as_bytes()
187 .ok_or_else(|| der::Tag::BitString.value_error())
188 })
189 .transpose()?;
190
191 if version.has_public_key() != public_key.is_some() {
192 return Err(reader.error(
193 der::Tag::ContextSpecific {
194 constructed: true,
195 number: PUBLIC_KEY_TAG,
196 }
197 .value_error()
198 .kind(),
199 ));
200 }
201
202 while !reader.is_finished() {
204 reader.decode::<ContextSpecific<AnyRef<'_>>>()?;
205 }
206
207 Ok(Self {
208 algorithm,
209 private_key,
210 public_key,
211 })
212 })
213 }
214}
215
216impl EncodeValue for PrivateKeyInfo<'_> {
217 fn value_len(&self) -> der::Result<Length> {
218 self.version().encoded_len()?
219 + self.algorithm.encoded_len()?
220 + OctetStringRef::new(self.private_key)?.encoded_len()?
221 + self.public_key_bit_string()?.encoded_len()?
222 }
223
224 fn encode_value(&self, writer: &mut impl Writer) -> der::Result<()> {
225 self.version().encode(writer)?;
226 self.algorithm.encode(writer)?;
227 OctetStringRef::new(self.private_key)?.encode(writer)?;
228 self.public_key_bit_string()?.encode(writer)?;
229 Ok(())
230 }
231}
232
233impl<'a> Sequence<'a> for PrivateKeyInfo<'a> {}
234
235impl<'a> TryFrom<&'a [u8]> for PrivateKeyInfo<'a> {
236 type Error = Error;
237
238 fn try_from(bytes: &'a [u8]) -> Result<Self> {
239 Ok(Self::from_der(bytes)?)
240 }
241}
242
243impl<'a> fmt::Debug for PrivateKeyInfo<'a> {
244 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
245 f.debug_struct("PrivateKeyInfo")
246 .field("version", &self.version())
247 .field("algorithm", &self.algorithm)
248 .field("public_key", &self.public_key)
249 .finish_non_exhaustive()
250 }
251}
252
253#[cfg(feature = "alloc")]
254impl TryFrom<PrivateKeyInfo<'_>> for SecretDocument {
255 type Error = Error;
256
257 fn try_from(private_key: PrivateKeyInfo<'_>) -> Result<SecretDocument> {
258 SecretDocument::try_from(&private_key)
259 }
260}
261
262#[cfg(feature = "alloc")]
263impl TryFrom<&PrivateKeyInfo<'_>> for SecretDocument {
264 type Error = Error;
265
266 fn try_from(private_key: &PrivateKeyInfo<'_>) -> Result<SecretDocument> {
267 Ok(Self::encode_msg(private_key)?)
268 }
269}
270
271#[cfg(feature = "pem")]
272impl PemLabel for PrivateKeyInfo<'_> {
273 const PEM_LABEL: &'static str = "PRIVATE KEY";
274}
275
276#[cfg(feature = "subtle")]
277impl<'a> ConstantTimeEq for PrivateKeyInfo<'a> {
278 fn ct_eq(&self, other: &Self) -> Choice {
279 let public_fields_eq =
281 self.algorithm == other.algorithm && self.public_key == other.public_key;
282
283 self.private_key.ct_eq(other.private_key) & Choice::from(public_fields_eq as u8)
284 }
285}
286
287#[cfg(feature = "subtle")]
288impl<'a> Eq for PrivateKeyInfo<'a> {}
289
290#[cfg(feature = "subtle")]
291impl<'a> PartialEq for PrivateKeyInfo<'a> {
292 fn eq(&self, other: &Self) -> bool {
293 self.ct_eq(other).into()
294 }
295}