inpcb: Use netisr_ncpus for listing inpcbs.
[dragonfly.git] / sbin / hammer2 / cmd_rsa.c
blob40ed685074fd6385adb4f2b32bbb413d60255500
1 /*
2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved.
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@dragonflybsd.org>
6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
17 * distribution.
18 * 3. Neither the name of The DragonFly Project nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific, prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
36 #include "hammer2.h"
38 #include <openssl/rsa.h> /* public/private key functions */
39 #include <openssl/pem.h> /* public/private key file load */
40 #include <openssl/err.h>
43 * Should be run as root. Creates /etc/hammer2/rsa.{pub,prv} using
44 * an openssl command.
46 int
47 cmd_rsainit(const char *dir_path)
49 struct stat st;
50 int ecode;
51 char *str1;
52 char *str2;
53 char *cmd;
54 mode_t old_umask;
57 * Create the directory if necessary
59 if (stat(dir_path, &st) < 0) {
60 str1 = strdup(dir_path);
61 str2 = str1 - 1;
63 while ((str2 = strchr(str2 + 1, '/')) != NULL) {
64 *str2 = 0;
65 mkdir(str1, 0755);
66 *str2 = '/';
68 mkdir(str1, 0700);
69 free(str1);
71 asprintf(&str1, "%s/rsa.prv", dir_path);
72 asprintf(&str2, "%s/rsa.pub", dir_path);
74 old_umask = umask(077);
75 if (stat(str1, &st) < 0) {
76 asprintf(&cmd, "openssl genrsa -out %s 2048", str1);
77 ecode = system(cmd);
78 free(cmd);
79 chmod(str1, 0400);
80 if (ecode) {
81 fprintf(stderr,
82 "hammer2 rsainit: private key gen failed\n");
83 free(str2);
84 free(str1);
85 umask(old_umask);
86 return 1;
88 printf("hammer2 rsainit: created %s\n", str1);
89 remove(str2);
90 } else {
91 printf("hammer2 rsainit: Using existing private key in %s\n",
92 str1);
94 if (stat(str2, &st) < 0) {
95 asprintf(&cmd, "openssl rsa -in %s -out %s -pubout",
96 str1, str2);
97 ecode = system(cmd);
98 free(cmd);
99 if (ecode) {
100 fprintf(stderr,
101 "hammer2 rsainit: public key gen failed\n");
102 free(str2);
103 free(str1);
104 umask(old_umask);
105 return 1;
107 printf("hammer2 rsainit: created %s\n", str2);
108 } else {
109 printf("hammer2 rsainit: both keys already exist\n");
111 umask(old_umask);
112 free(str2);
113 free(str1);
115 return 0;
119 cmd_rsaenc(const char **keyfiles, int nkeys)
121 RSA **keys = calloc(nkeys, sizeof(RSA *));
122 int *ispub = calloc(nkeys, sizeof(int));
123 int ecode = 0;
124 int blksize = 0;
125 int i;
126 int off;
127 int n;
128 unsigned char *data_in;
129 unsigned char *data_out;
131 for (i = 0; i < nkeys; ++i) {
132 FILE *fp;
133 const char *sfx;
135 sfx = strrchr(keyfiles[i], '.');
136 if (sfx && strcmp(sfx, ".pub") == 0) {
137 fp = fopen(keyfiles[i], "r");
138 if (fp == NULL) {
139 fprintf(stderr, "hammer2 rsaenc: unable to "
140 "open %s\n", keyfiles[i]);
141 ecode = 1;
142 goto done;
144 keys[i] = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL);
145 ispub[i] = 1;
146 fclose(fp);
147 if (keys[i] == NULL) {
148 fprintf(stderr, "hammer2 rsaenc: unable to "
149 "parse public key from %s\n",
150 keyfiles[i]);
151 ecode = 1;
152 goto done;
154 } else if (sfx && strcmp(sfx, ".prv") == 0) {
155 fp = fopen(keyfiles[i], "r");
156 if (fp == NULL) {
157 fprintf(stderr, "hammer2 rsaenc: unable to "
158 "open %s\n", keyfiles[i]);
159 ecode = 1;
160 goto done;
162 keys[i] = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL);
163 fclose(fp);
164 if (keys[i] == NULL) {
165 fprintf(stderr, "hammer2 rsaenc: unable to "
166 "parse private key from %s\n",
167 keyfiles[i]);
168 ecode = 1;
169 goto done;
171 } else {
172 fprintf(stderr, "hammer2: rsaenc: key files must end "
173 "in .pub or .prv\n");
174 ecode = 1;
175 goto done;
177 if (i == 0)
178 blksize = RSA_size(keys[i]);
179 else
180 assert(blksize == RSA_size(keys[i]));
182 fprintf(stderr, "blksize %d\n", blksize);
187 data_in = malloc(blksize);
188 data_out = malloc(blksize);
189 off = 0;
190 while ((n = read(0, data_in + off, blksize - off)) > 0) {
191 off += n;
192 if (off == blksize) {
193 for (i = 0; i < nkeys; ++i) {
194 if (ispub[i])
195 RSA_public_encrypt(blksize,
196 data_in, data_out,
197 keys[i],
198 RSA_NO_PADDING);
199 else
200 RSA_private_encrypt(blksize,
201 data_in, data_out,
202 keys[i],
203 RSA_NO_PADDING);
204 if (i + 1 != nkeys)
205 bcopy(data_out, data_in, blksize);
207 if (write(1, data_out, blksize) != blksize) {
208 perror("write");
209 ecode = 1;
210 break;
212 off = 0;
215 if (off && ecode == 0) {
216 if (off < blksize)
217 bzero(data_in + off, blksize - off);
218 for (i = 0; i < nkeys; ++i) {
219 if (ispub[i])
220 RSA_public_encrypt(blksize,
221 data_in, data_out,
222 keys[i],
223 RSA_NO_PADDING);
224 else
225 RSA_private_encrypt(blksize,
226 data_in, data_out,
227 keys[i],
228 RSA_NO_PADDING);
229 if (i + 1 != nkeys)
230 bcopy(data_out, data_in, blksize);
232 if (write(1, data_out, blksize) != blksize) {
233 perror("write");
234 ecode = 1;
237 if (n < 0) {
238 perror("read");
239 ecode = 1;
241 free(data_out);
242 free(data_in);
243 done:
244 for (i = 0; i < nkeys; ++i) {
245 if (keys[i])
246 RSA_free(keys[i]);
248 free(keys);
249 free(ispub);
250 return (ecode);
254 cmd_rsadec(const char **keyfiles, int nkeys)
256 RSA **keys = calloc(nkeys, sizeof(RSA *));
257 int *ispub = calloc(nkeys, sizeof(int));
258 int ecode = 0;
259 int blksize = 0;
260 int i;
261 int off;
262 int n;
263 unsigned char *data_in;
264 unsigned char *data_out;
266 for (i = 0; i < nkeys; ++i) {
267 FILE *fp;
268 const char *sfx;
270 sfx = strrchr(keyfiles[i], '.');
271 if (sfx && strcmp(sfx, ".pub") == 0) {
272 fp = fopen(keyfiles[i], "r");
273 if (fp == NULL) {
274 fprintf(stderr, "hammer2 rsaenc: unable to "
275 "open %s\n", keyfiles[i]);
276 ecode = 1;
277 goto done;
279 keys[i] = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL);
280 ispub[i] = 1;
281 fclose(fp);
282 if (keys[i] == NULL) {
283 fprintf(stderr, "hammer2 rsaenc: unable to "
284 "parse public key from %s\n",
285 keyfiles[i]);
286 ecode = 1;
287 goto done;
289 } else if (sfx && strcmp(sfx, ".prv") == 0) {
290 fp = fopen(keyfiles[i], "r");
291 if (fp == NULL) {
292 fprintf(stderr, "hammer2 rsaenc: unable to "
293 "open %s\n", keyfiles[i]);
294 ecode = 1;
295 goto done;
297 keys[i] = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL);
298 fclose(fp);
299 if (keys[i] == NULL) {
300 fprintf(stderr, "hammer2 rsaenc: unable to "
301 "parse private key from %s\n",
302 keyfiles[i]);
303 ecode = 1;
304 goto done;
306 } else {
307 fprintf(stderr, "hammer2: rsaenc: key files must end "
308 "in .pub or .prv\n");
309 ecode = 1;
310 goto done;
312 if (i == 0)
313 blksize = RSA_size(keys[i]);
314 else
315 assert(blksize == RSA_size(keys[i]));
321 data_in = malloc(blksize);
322 data_out = malloc(blksize);
323 off = 0;
324 while ((n = read(0, data_in + off, blksize - off)) > 0) {
325 off += n;
326 if (off == blksize) {
327 for (i = 0; i < nkeys; ++i) {
328 if (ispub[i])
329 RSA_public_decrypt(blksize,
330 data_in, data_out,
331 keys[i],
332 RSA_NO_PADDING);
333 else
334 RSA_private_decrypt(blksize,
335 data_in, data_out,
336 keys[i],
337 RSA_NO_PADDING);
338 if (i + 1 != nkeys)
339 bcopy(data_out, data_in, blksize);
341 if (write(1, data_out, blksize) != blksize) {
342 perror("write");
343 ecode = 1;
344 break;
346 off = 0;
349 if (off) {
350 if (off < blksize)
351 bzero(data_in + off, blksize - off);
352 for (i = 0; i < nkeys; ++i) {
353 if (ispub[i])
354 RSA_public_decrypt(blksize,
355 data_in, data_out,
356 keys[i],
357 RSA_NO_PADDING);
358 else
359 RSA_private_decrypt(blksize,
360 data_in, data_out,
361 keys[i],
362 RSA_NO_PADDING);
363 if (i + 1 != nkeys)
364 bcopy(data_out, data_in, blksize);
366 if (write(1, data_out, blksize) != blksize) {
367 perror("write");
368 ecode = 1;
371 if (n < 0) {
372 perror("read");
373 ecode = 1;
375 free(data_out);
376 free(data_in);
377 done:
378 for (i = 0; i < nkeys; ++i) {
379 if (keys[i])
380 RSA_free(keys[i]);
382 free(keys);
383 free(ispub);
384 return (ecode);