os/ossrv/ssl/tsrc/topenssl/src/dsaparam.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /* apps/dsaparam.c */
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     3  * All rights reserved.
     4  *
     5  * This package is an SSL implementation written
     6  * by Eric Young (eay@cryptsoft.com).
     7  * The implementation was written so as to conform with Netscapes SSL.
     8  * 
     9  * This library is free for commercial and non-commercial use as long as
    10  * the following conditions are aheared to.  The following conditions
    11  * apply to all code found in this distribution, be it the RC4, RSA,
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    13  * included with this distribution is covered by the same copyright terms
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    15  * 
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
    17  * the code are not to be removed.
    18  * If this package is used in a product, Eric Young should be given attribution
    19  * as the author of the parts of the library used.
    20  * This can be in the form of a textual message at program startup or
    21  * in documentation (online or textual) provided with the package.
    22  * 
    23  * Redistribution and use in source and binary forms, with or without
    24  * modification, are permitted provided that the following conditions
    25  * are met:
    26  * 1. Redistributions of source code must retain the copyright
    27  *    notice, this list of conditions and the following disclaimer.
    28  * 2. Redistributions in binary form must reproduce the above copyright
    29  *    notice, this list of conditions and the following disclaimer in the
    30  *    documentation and/or other materials provided with the distribution.
    31  * 3. All advertising materials mentioning features or use of this software
    32  *    must display the following acknowledgement:
    33  *    "This product includes cryptographic software written by
    34  *     Eric Young (eay@cryptsoft.com)"
    35  *    The word 'cryptographic' can be left out if the rouines from the library
    36  *    being used are not cryptographic related :-).
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
    38  *    the apps directory (application code) you must include an acknowledgement:
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    40  * 
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    51  * SUCH DAMAGE.
    52  * 
    53  * The licence and distribution terms for any publically available version or
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    55  * copied and put under another distribution licence
    56  * [including the GNU Public Licence.]
    57  */
    58 
    59 #include <openssl/opensslconf.h>	/* for OPENSSL_NO_DSA */
    60 /* Until the key-gen callbacks are modified to use newer prototypes, we allow
    61  * deprecated functions for openssl-internal code */
    62 #ifdef OPENSSL_NO_DEPRECATED
    63 #undef OPENSSL_NO_DEPRECATED
    64 #endif
    65 
    66 #ifndef OPENSSL_NO_DSA
    67 #include <assert.h>
    68 #include <stdio.h>
    69 #include <stdlib.h>
    70 #include <time.h>
    71 #include <string.h>
    72 #include "apps.h"
    73 #include <openssl/bio.h>
    74 #include <openssl/err.h>
    75 #include <openssl/bn.h>
    76 #include <openssl/dsa.h>
    77 #include <openssl/x509.h>
    78 #include <openssl/pem.h>
    79 
    80 #undef PROG
    81 #define PROG	dsaparam_main
    82 
    83 /* -inform arg	- input format - default PEM (DER or PEM)
    84  * -outform arg - output format - default PEM
    85  * -in arg	- input file - default stdin
    86  * -out arg	- output file - default stdout
    87  * -noout
    88  * -text
    89  * -C
    90  * -noout
    91  * -genkey
    92  *  #ifdef GENCB_TEST
    93  * -timebomb n  - interrupt keygen after <n> seconds
    94  *  #endif
    95  */
    96 
    97 #ifdef GENCB_TEST
    98 
    99 static int stop_keygen_flag = 0;
   100 
   101 static void timebomb_sigalarm(int foo)
   102 	{
   103 	stop_keygen_flag = 1;
   104 	}
   105 
   106 #endif
   107 
   108 static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
   109 
   110 
   111 
   112 int MAIN(int, char **);
   113 
   114 int MAIN(int argc, char **argv)
   115 	{
   116 #ifndef OPENSSL_NO_ENGINE
   117 	ENGINE *e = NULL;
   118 #endif
   119 	DSA *dsa=NULL;
   120 	int i,badops=0,text=0;
   121 	BIO *in=NULL,*out=NULL;
   122 	int informat,outformat,noout=0,C=0,ret=1;
   123 	char *infile,*outfile,*prog,*inrand=NULL;
   124 	int numbits= -1,num,genkey=0;
   125 	int need_rand=0;
   126 #ifndef OPENSSL_NO_ENGINE
   127 	char *engine=NULL;
   128 #endif
   129 #ifdef GENCB_TEST
   130 	int timebomb=0;
   131 #endif
   132 
   133 	apps_startup();
   134 
   135 	if (bio_err == NULL)
   136 		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
   137 			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
   138 
   139 
   140 	if (!load_config(bio_err, NULL))
   141 		goto end;
   142 
   143 	infile=NULL;
   144 	outfile=NULL;
   145 	informat=FORMAT_PEM;
   146 	outformat=FORMAT_PEM;
   147 
   148 	prog=argv[0];
   149 	argc--;
   150 	argv++;
   151 	while (argc >= 1)
   152 		{
   153 		if 	(strcmp(*argv,"-inform") == 0)
   154 			{
   155 			if (--argc < 1) goto bad;
   156 			informat=str2fmt(*(++argv));
   157 			}
   158 		else if (strcmp(*argv,"-outform") == 0)
   159 			{
   160 			if (--argc < 1) goto bad;
   161 			outformat=str2fmt(*(++argv));
   162 			}
   163 		else if (strcmp(*argv,"-in") == 0)
   164 			{
   165 			if (--argc < 1) goto bad;
   166 			infile= *(++argv);
   167 			}
   168 		else if (strcmp(*argv,"-out") == 0)
   169 			{
   170 			if (--argc < 1) goto bad;
   171 			outfile= *(++argv);
   172 			}
   173 #ifndef OPENSSL_NO_ENGINE
   174 		else if(strcmp(*argv, "-engine") == 0)
   175 			{
   176 			if (--argc < 1) goto bad;
   177 			engine = *(++argv);
   178 			}
   179 #endif
   180 #ifdef GENCB_TEST
   181 		else if(strcmp(*argv, "-timebomb") == 0)
   182 			{
   183 			if (--argc < 1) goto bad;
   184 			timebomb = atoi(*(++argv));
   185 			}
   186 #endif
   187 		else if (strcmp(*argv,"-text") == 0)
   188 			text=1;
   189 		else if (strcmp(*argv,"-C") == 0)
   190 			C=1;
   191 		else if (strcmp(*argv,"-genkey") == 0)
   192 			{
   193 			genkey=1;
   194 			need_rand=1;
   195 			}
   196 		else if (strcmp(*argv,"-rand") == 0)
   197 			{
   198 			if (--argc < 1) goto bad;
   199 			inrand= *(++argv);
   200 			need_rand=1;
   201 			}
   202 		else if (strcmp(*argv,"-noout") == 0)
   203 			noout=1;
   204 		else if (sscanf(*argv,"%d",&num) == 1)
   205 			{
   206 			/* generate a key */
   207 			numbits=num;
   208 			need_rand=1;
   209 			}
   210 		else
   211 			{
   212 			BIO_printf(bio_err,"unknown option %s\n",*argv);
   213 			badops=1;
   214 			break;
   215 			}
   216 		argc--;
   217 		argv++;
   218 		}
   219 
   220 	if (badops)
   221 		{
   222 bad:
   223 		BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
   224 		BIO_printf(bio_err,"where options are\n");
   225 		BIO_printf(bio_err," -inform arg   input format - DER or PEM\n");
   226 		BIO_printf(bio_err," -outform arg  output format - DER or PEM\n");
   227 		BIO_printf(bio_err," -in arg       input file\n");
   228 		BIO_printf(bio_err," -out arg      output file\n");
   229 		BIO_printf(bio_err," -text         print as text\n");
   230 		BIO_printf(bio_err," -C            Output C code\n");
   231 		BIO_printf(bio_err," -noout        no output\n");
   232 		BIO_printf(bio_err," -genkey       generate a DSA key\n");
   233 		BIO_printf(bio_err," -rand         files to use for random number input\n");
   234 #ifndef OPENSSL_NO_ENGINE
   235 		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
   236 #endif
   237 #ifdef GENCB_TEST
   238 		BIO_printf(bio_err," -timebomb n   interrupt keygen after <n> seconds\n");
   239 #endif
   240 		BIO_printf(bio_err," number        number of bits to use for generating private key\n");
   241 		goto end;
   242 		}
   243 
   244 	ERR_load_crypto_strings();
   245 
   246 	in=BIO_new(BIO_s_file());
   247 	out=BIO_new(BIO_s_file());
   248 	if ((in == NULL) || (out == NULL))
   249 		{
   250 		ERR_print_errors(bio_err);
   251 		goto end;
   252 		}
   253 
   254 	if (infile == NULL)
   255 		BIO_set_fp(in,stdin,BIO_NOCLOSE);
   256 
   257 	else
   258 		{
   259 		if (BIO_read_filename(in,infile) <= 0)
   260 			{
   261 			perror(infile);
   262 			goto end;
   263 			}
   264 		}
   265 	if (outfile == NULL)
   266 		{
   267 		BIO_set_fp(out,stdout,BIO_NOCLOSE);
   268 		
   269 #ifdef OPENSSL_SYS_VMS
   270 		{
   271 		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
   272 		out = BIO_push(tmpbio, out);
   273 		}
   274 #endif
   275 		}
   276 	else
   277 		{
   278 		if (BIO_write_filename(out,outfile) <= 0)
   279 			{
   280 			perror(outfile);
   281 			goto end;
   282 			}
   283 		}
   284 
   285 #ifndef OPENSSL_NO_ENGINE
   286         e = setup_engine(bio_err, engine, 0);
   287 #endif
   288 
   289 	if (need_rand)
   290 		{
   291 		app_RAND_load_file(NULL, bio_err, (inrand != NULL));
   292 		if (inrand != NULL)
   293 			BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
   294 				app_RAND_load_files(inrand));
   295 		}
   296 
   297 	if (numbits > 0)
   298 		{
   299 		BN_GENCB cb;
   300 		BN_GENCB_set(&cb, dsa_cb, bio_err);
   301 		assert(need_rand);
   302 		dsa = DSA_new();
   303 		if(!dsa)
   304 			{
   305 			BIO_printf(bio_err,"Error allocating DSA object\n");
   306 			goto end;
   307 			}
   308 		BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
   309 	        BIO_printf(bio_err,"This could take some time\n");
   310 #ifdef GENCB_TEST
   311 		if(timebomb > 0)
   312 	{
   313 		struct sigaction act;
   314 		act.sa_handler = timebomb_sigalarm;
   315 		act.sa_flags = 0;
   316 		BIO_printf(bio_err,"(though I'll stop it if not done within %d secs)\n",
   317 				timebomb);
   318 		if(sigaction(SIGALRM, &act, NULL) != 0)
   319 			{
   320 			BIO_printf(bio_err,"Error, couldn't set SIGALRM handler\n");
   321 			goto end;
   322 			}
   323 		alarm(timebomb);
   324 	}
   325 #endif
   326 	        if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb))
   327 			{
   328 #ifdef GENCB_TEST
   329 			if(stop_keygen_flag)
   330 				{
   331 				BIO_printf(bio_err,"DSA key generation time-stopped\n");
   332 				/* This is an asked-for behaviour! */
   333 				ret = 0;
   334 				goto end;
   335 				}
   336 #endif
   337 			BIO_printf(bio_err,"Error, DSA key generation failed\n");
   338 			goto end;
   339 			}
   340 		}
   341 	else if	(informat == FORMAT_ASN1)
   342 		dsa=d2i_DSAparams_bio(in,NULL);
   343 	else if (informat == FORMAT_PEM)
   344 		dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
   345 	else
   346 		{
   347 		BIO_printf(bio_err,"bad input format specified\n");
   348 		goto end;
   349 		}
   350 	if (dsa == NULL)
   351 		{
   352 		BIO_printf(bio_err,"unable to load DSA parameters\n");
   353 		ERR_print_errors(bio_err);
   354 		goto end;
   355 		}
   356 
   357 	if (text)
   358 		{
   359 		DSAparams_print(out,dsa);
   360 		}
   361 	
   362 	if (C)
   363 		{
   364 		unsigned char *data;
   365 		int l,len,bits_p,bits_q,bits_g;
   366 
   367 		len=BN_num_bytes(dsa->p);
   368 		bits_p=BN_num_bits(dsa->p);
   369 		bits_q=BN_num_bits(dsa->q);
   370 		bits_g=BN_num_bits(dsa->g);
   371 		data=(unsigned char *)OPENSSL_malloc(len+20);
   372 		if (data == NULL)
   373 			{
   374 			perror("OPENSSL_malloc");
   375 			goto end;
   376 			}
   377 		l=BN_bn2bin(dsa->p,data);
   378 		printf("static unsigned char dsa%d_p[]={",bits_p);
   379 		for (i=0; i<l; i++)
   380 			{
   381 			if ((i%12) == 0) printf("\n\t");
   382 			printf("0x%02X,",data[i]);
   383 			}
   384 		printf("\n\t};\n");
   385 
   386 		l=BN_bn2bin(dsa->q,data);
   387 		printf("static unsigned char dsa%d_q[]={",bits_p);
   388 		for (i=0; i<l; i++)
   389 			{
   390 			if ((i%12) == 0) printf("\n\t");
   391 			printf("0x%02X,",data[i]);
   392 			}
   393 		printf("\n\t};\n");
   394 
   395 		l=BN_bn2bin(dsa->g,data);
   396 		printf("static unsigned char dsa%d_g[]={",bits_p);
   397 		for (i=0; i<l; i++)
   398 			{
   399 			if ((i%12) == 0) printf("\n\t");
   400 			printf("0x%02X,",data[i]);
   401 			}
   402 		printf("\n\t};\n\n");
   403 
   404 		printf("DSA *get_dsa%d()\n\t{\n",bits_p);
   405 		printf("\tDSA *dsa;\n\n");
   406 		printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
   407 		printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
   408 			bits_p,bits_p);
   409 		printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
   410 			bits_p,bits_p);
   411 		printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
   412 			bits_p,bits_p);
   413 		printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
   414 		printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
   415 		printf("\treturn(dsa);\n\t}\n");
   416 	    
   417 		}
   418 
   419 
   420 	if (!noout)
   421 		{
   422 		if 	(outformat == FORMAT_ASN1)
   423 			i=i2d_DSAparams_bio(out,dsa);
   424 		else if (outformat == FORMAT_PEM)
   425 			i=PEM_write_bio_DSAparams(out,dsa);
   426 		else	{
   427 			BIO_printf(bio_err,"bad output format specified for outfile\n");
   428 			goto end;
   429 			}
   430 		if (!i)
   431 			{
   432 			BIO_printf(bio_err,"unable to write DSA parameters\n");
   433 			ERR_print_errors(bio_err);
   434 			goto end;
   435 			}
   436 		}
   437 	if (genkey)
   438 		{
   439 		DSA *dsakey;
   440 
   441 		assert(need_rand);
   442 		if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
   443 		if (!DSA_generate_key(dsakey)) goto end;
   444 		if 	(outformat == FORMAT_ASN1)
   445 			i=i2d_DSAPrivateKey_bio(out,dsakey);
   446 		else if (outformat == FORMAT_PEM)
   447 			i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
   448 		else	{
   449 			BIO_printf(bio_err,"bad output format specified for outfile\n");
   450 			goto end;
   451 			}
   452 		DSA_free(dsakey);
   453 		}
   454 	if (need_rand)
   455 		app_RAND_write_file(NULL, bio_err);
   456 	ret=0;
   457 end:
   458 	if (in != NULL) BIO_free(in);
   459 	if (out != NULL) BIO_free_all(out);
   460 	if (dsa != NULL) DSA_free(dsa);
   461 	apps_shutdown();
   462 	OPENSSL_EXIT(ret);
   463 	}
   464 
   465 static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
   466 	{
   467 	char c='*';
   468 
   469 	if (p == 0) c='.';
   470 	if (p == 1) c='+';
   471 	if (p == 2) c='*';
   472 	if (p == 3) c='\n';
   473 	BIO_write(cb->arg,&c,1);
   474 	(void)BIO_flush(cb->arg);
   475 #ifdef LINT
   476 	p=n;
   477 #endif
   478 #ifdef GENCB_TEST
   479 	if(stop_keygen_flag)
   480 		return 0;
   481 #endif
   482 	return 1;
   483 	}
   484 #endif