sl@0: /* apps/rsa.c */ sl@0: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) sl@0: * All rights reserved. sl@0: * sl@0: * This package is an SSL implementation written sl@0: * by Eric Young (eay@cryptsoft.com). sl@0: * The implementation was written so as to conform with Netscapes SSL. sl@0: * sl@0: * This library is free for commercial and non-commercial use as long as sl@0: * the following conditions are aheared to. The following conditions sl@0: * apply to all code found in this distribution, be it the RC4, RSA, sl@0: * lhash, DES, etc., code; not just the SSL code. The SSL documentation sl@0: * included with this distribution is covered by the same copyright terms sl@0: * except that the holder is Tim Hudson (tjh@cryptsoft.com). sl@0: * sl@0: * Copyright remains Eric Young's, and as such any Copyright notices in sl@0: * the code are not to be removed. sl@0: * If this package is used in a product, Eric Young should be given attribution sl@0: * as the author of the parts of the library used. sl@0: * This can be in the form of a textual message at program startup or sl@0: * in documentation (online or textual) provided with the package. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * 1. Redistributions of source code must retain the copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in the sl@0: * documentation and/or other materials provided with the distribution. sl@0: * 3. All advertising materials mentioning features or use of this software sl@0: * must display the following acknowledgement: sl@0: * "This product includes cryptographic software written by sl@0: * Eric Young (eay@cryptsoft.com)" sl@0: * The word 'cryptographic' can be left out if the rouines from the library sl@0: * being used are not cryptographic related :-). sl@0: * 4. If you include any Windows specific code (or a derivative thereof) from sl@0: * the apps directory (application code) you must include an acknowledgement: sl@0: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND sl@0: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE sl@0: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE sl@0: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL sl@0: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS sl@0: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT sl@0: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY sl@0: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF sl@0: * SUCH DAMAGE. sl@0: * sl@0: * The licence and distribution terms for any publically available version or sl@0: * derivative of this code cannot be changed. i.e. this code cannot simply be sl@0: * copied and put under another distribution licence sl@0: * [including the GNU Public Licence.] sl@0: */ sl@0: sl@0: #include sl@0: #ifndef OPENSSL_NO_RSA sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include "apps.h" sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: #undef PROG sl@0: #define PROG rsa_main sl@0: sl@0: /* -inform arg - input format - default PEM (one of DER, NET or PEM) sl@0: * -outform arg - output format - default PEM sl@0: * -in arg - input file - default stdin sl@0: * -out arg - output file - default stdout sl@0: * -des - encrypt output if PEM format with DES in cbc mode sl@0: * -des3 - encrypt output if PEM format sl@0: * -idea - encrypt output if PEM format sl@0: * -seed - encrypt output if PEM format sl@0: * -aes128 - encrypt output if PEM format sl@0: * -aes192 - encrypt output if PEM format sl@0: * -aes256 - encrypt output if PEM format sl@0: * -text - print a text version sl@0: * -modulus - print the RSA key modulus sl@0: * -check - verify key consistency sl@0: * -pubin - Expect a public key in input file. sl@0: * -pubout - Output a public key. sl@0: */ sl@0: sl@0: sl@0: int MAIN(int, char **); sl@0: sl@0: int MAIN(int argc, char **argv) sl@0: { sl@0: ENGINE *e = NULL; sl@0: int ret=1; sl@0: RSA *rsa=NULL; sl@0: int i,badops=0, sgckey=0; sl@0: const EVP_CIPHER *enc=NULL; sl@0: BIO *out=NULL; sl@0: int informat,outformat,text=0,check=0,noout=0; sl@0: int pubin = 0, pubout = 0; sl@0: char *infile,*outfile,*prog; sl@0: char *passargin = NULL, *passargout = NULL; sl@0: char *passin = NULL, *passout = NULL; sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: char *engine=NULL; sl@0: #endif sl@0: int modulus=0; sl@0: sl@0: apps_startup(); sl@0: sl@0: if (bio_err == NULL) sl@0: if ((bio_err=BIO_new(BIO_s_file())) != NULL) sl@0: BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT); sl@0: if (!load_config(bio_err, NULL)) sl@0: goto end; sl@0: sl@0: infile=NULL; sl@0: outfile=NULL; sl@0: informat=FORMAT_PEM; sl@0: outformat=FORMAT_PEM; sl@0: sl@0: prog=argv[0]; sl@0: argc--; sl@0: argv++; sl@0: while (argc >= 1) sl@0: { sl@0: if (strcmp(*argv,"-inform") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: informat=str2fmt(*(++argv)); sl@0: } sl@0: else if (strcmp(*argv,"-outform") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: outformat=str2fmt(*(++argv)); sl@0: } sl@0: else if (strcmp(*argv,"-in") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: infile= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-out") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: outfile= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-passin") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: passargin= *(++argv); sl@0: } sl@0: else if (strcmp(*argv,"-passout") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: passargout= *(++argv); sl@0: } sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: else if (strcmp(*argv,"-engine") == 0) sl@0: { sl@0: if (--argc < 1) goto bad; sl@0: engine= *(++argv); sl@0: } sl@0: #endif sl@0: else if (strcmp(*argv,"-sgckey") == 0) sl@0: sgckey=1; sl@0: else if (strcmp(*argv,"-pubin") == 0) sl@0: pubin=1; sl@0: else if (strcmp(*argv,"-pubout") == 0) sl@0: pubout=1; sl@0: else if (strcmp(*argv,"-noout") == 0) sl@0: noout=1; sl@0: else if (strcmp(*argv,"-text") == 0) sl@0: text=1; sl@0: else if (strcmp(*argv,"-modulus") == 0) sl@0: modulus=1; sl@0: else if (strcmp(*argv,"-check") == 0) sl@0: check=1; sl@0: else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL) sl@0: { sl@0: BIO_printf(bio_err,"unknown option %s\n",*argv); sl@0: badops=1; sl@0: break; sl@0: } sl@0: argc--; sl@0: argv++; sl@0: } sl@0: sl@0: if (badops) sl@0: { sl@0: bad: sl@0: BIO_printf(bio_err,"%s [options] outfile\n",prog); sl@0: BIO_printf(bio_err,"where options are\n"); sl@0: BIO_printf(bio_err," -inform arg input format - one of DER NET PEM\n"); sl@0: BIO_printf(bio_err," -outform arg output format - one of DER NET PEM\n"); sl@0: BIO_printf(bio_err," -in arg input file\n"); sl@0: BIO_printf(bio_err," -sgckey Use IIS SGC key format\n"); sl@0: BIO_printf(bio_err," -passin arg input file pass phrase source\n"); sl@0: BIO_printf(bio_err," -out arg output file\n"); sl@0: BIO_printf(bio_err," -passout arg output file pass phrase source\n"); sl@0: BIO_printf(bio_err," -des encrypt PEM output with cbc des\n"); sl@0: BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n"); sl@0: #ifndef OPENSSL_NO_IDEA sl@0: BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n"); sl@0: #endif sl@0: #ifndef OPENSSL_NO_SEED sl@0: BIO_printf(bio_err," -seed encrypt PEM output with cbc seed\n"); sl@0: #endif sl@0: #ifndef OPENSSL_NO_AES sl@0: BIO_printf(bio_err," -aes128, -aes192, -aes256\n"); sl@0: BIO_printf(bio_err," encrypt PEM output with cbc aes\n"); sl@0: #endif sl@0: BIO_printf(bio_err," -text print the key in text\n"); sl@0: BIO_printf(bio_err," -noout don't print key out\n"); sl@0: BIO_printf(bio_err," -modulus print the RSA key modulus\n"); sl@0: BIO_printf(bio_err," -check verify key consistency\n"); sl@0: BIO_printf(bio_err," -pubin expect a public key in input file\n"); sl@0: BIO_printf(bio_err," -pubout output a public key\n"); sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n"); sl@0: #endif sl@0: goto end; sl@0: } sl@0: sl@0: ERR_load_crypto_strings(); sl@0: sl@0: #ifndef OPENSSL_NO_ENGINE sl@0: e = setup_engine(bio_err, engine, 0); sl@0: #endif sl@0: sl@0: if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { sl@0: BIO_printf(bio_err, "Error getting passwords\n"); sl@0: goto end; sl@0: } sl@0: sl@0: if(check && pubin) { sl@0: BIO_printf(bio_err, "Only private keys can be checked\n"); sl@0: goto end; sl@0: } sl@0: sl@0: out=BIO_new(BIO_s_file()); sl@0: sl@0: { sl@0: EVP_PKEY *pkey; sl@0: sl@0: if (pubin) sl@0: pkey = load_pubkey(bio_err, infile, sl@0: (informat == FORMAT_NETSCAPE && sgckey ? sl@0: FORMAT_IISSGC : informat), 1, sl@0: passin, e, "Public Key"); sl@0: else sl@0: pkey = load_key(bio_err, infile, sl@0: (informat == FORMAT_NETSCAPE && sgckey ? sl@0: FORMAT_IISSGC : informat), 1, sl@0: passin, e, "Private Key"); sl@0: sl@0: if (pkey != NULL) sl@0: rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey); sl@0: EVP_PKEY_free(pkey); sl@0: } sl@0: sl@0: if (rsa == NULL) sl@0: { sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: sl@0: if (outfile == NULL) sl@0: { sl@0: BIO_set_fp(out,stdout,BIO_NOCLOSE); sl@0: #ifdef OPENSSL_SYS_VMS sl@0: { sl@0: BIO *tmpbio = BIO_new(BIO_f_linebuffer()); sl@0: out = BIO_push(tmpbio, out); sl@0: } sl@0: #endif sl@0: } sl@0: else sl@0: { sl@0: if (BIO_write_filename(out,outfile) <= 0) sl@0: { sl@0: perror(outfile); sl@0: goto end; sl@0: } sl@0: } sl@0: sl@0: if (text) sl@0: if (!RSA_print(out,rsa,0)) sl@0: { sl@0: perror(outfile); sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: sl@0: if (modulus) sl@0: { sl@0: BIO_printf(out,"Modulus="); sl@0: BN_print(out,rsa->n); sl@0: BIO_printf(out,"\n"); sl@0: } sl@0: sl@0: if (check) sl@0: { sl@0: int r = RSA_check_key(rsa); sl@0: sl@0: if (r == 1) sl@0: BIO_printf(out,"RSA key ok\n"); sl@0: else if (r == 0) sl@0: { sl@0: unsigned long err; sl@0: sl@0: while ((err = ERR_peek_error()) != 0 && sl@0: ERR_GET_LIB(err) == ERR_LIB_RSA && sl@0: ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY && sl@0: ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) sl@0: { sl@0: BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(err)); sl@0: ERR_get_error(); /* remove e from error stack */ sl@0: } sl@0: } sl@0: sl@0: if (r == -1 || ERR_peek_error() != 0) /* should happen only if r == -1 */ sl@0: { sl@0: ERR_print_errors(bio_err); sl@0: goto end; sl@0: } sl@0: } sl@0: sl@0: if (noout) sl@0: { sl@0: ret = 0; sl@0: goto end; sl@0: } sl@0: BIO_printf(bio_err,"writing RSA key\n"); sl@0: if (outformat == FORMAT_ASN1) { sl@0: if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa); sl@0: else i=i2d_RSAPrivateKey_bio(out,rsa); sl@0: } sl@0: #ifndef OPENSSL_NO_RC4 sl@0: else if (outformat == FORMAT_NETSCAPE) sl@0: { sl@0: unsigned char *p,*pp; sl@0: int size; sl@0: sl@0: i=1; sl@0: size=i2d_RSA_NET(rsa,NULL,NULL, sgckey); sl@0: if ((p=(unsigned char *)OPENSSL_malloc(size)) == NULL) sl@0: { sl@0: BIO_printf(bio_err,"Memory allocation failure\n"); sl@0: goto end; sl@0: } sl@0: pp=p; sl@0: i2d_RSA_NET(rsa,&p,NULL, sgckey); sl@0: BIO_write(out,(char *)pp,size); sl@0: OPENSSL_free(pp); sl@0: } sl@0: #endif sl@0: else if (outformat == FORMAT_PEM) { sl@0: if(pubout || pubin) sl@0: i=PEM_write_bio_RSA_PUBKEY(out,rsa); sl@0: else i=PEM_write_bio_RSAPrivateKey(out,rsa, sl@0: enc,NULL,0,NULL,passout); sl@0: } else { sl@0: BIO_printf(bio_err,"bad output format specified for outfile\n"); sl@0: goto end; sl@0: } sl@0: if (!i) sl@0: { sl@0: BIO_printf(bio_err,"unable to write key\n"); sl@0: ERR_print_errors(bio_err); sl@0: } sl@0: else sl@0: ret=0; sl@0: end: sl@0: if(out != NULL) BIO_free_all(out); sl@0: if(rsa != NULL) RSA_free(rsa); sl@0: if(passin) OPENSSL_free(passin); sl@0: if(passout) OPENSSL_free(passout); sl@0: apps_shutdown(); sl@0: OPENSSL_EXIT(ret); sl@0: } sl@0: #else /* !OPENSSL_NO_RSA */ sl@0: sl@0: # if PEDANTIC sl@0: static void *dummy=&dummy; sl@0: # endif sl@0: sl@0: #endif