1 /* $OpenBSD: rsa.c,v 1.10 2018/02/07 05:47:55 jsing Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
59 #include <openssl/opensslconf.h>
69 #include <openssl/bio.h>
70 #include <openssl/bn.h>
71 #include <openssl/err.h>
72 #include <openssl/evp.h>
73 #include <openssl/pem.h>
74 #include <openssl/rsa.h>
75 #include <openssl/x509.h>
79 const EVP_CIPHER
*enc
;
96 rsa_opt_cipher(int argc
, char **argv
, int *argsused
)
103 if ((rsa_config
.enc
= EVP_get_cipherbyname(name
)) == NULL
) {
104 fprintf(stderr
, "Invalid cipher '%s'\n", name
);
112 static struct option rsa_options
[] = {
115 .desc
= "Check consistency of RSA private key",
117 .opt
.flag
= &rsa_config
.check
,
122 .desc
= "Input file (default stdin)",
124 .opt
.arg
= &rsa_config
.infile
,
129 .desc
= "Input format (DER, NET or PEM (default))",
130 .type
= OPTION_ARG_FORMAT
,
131 .opt
.value
= &rsa_config
.informat
,
135 .desc
= "Print the RSA key modulus",
137 .opt
.flag
= &rsa_config
.modulus
,
141 .desc
= "Do not print encoded version of the key",
143 .opt
.flag
= &rsa_config
.noout
,
148 .desc
= "Output file (default stdout)",
150 .opt
.arg
= &rsa_config
.outfile
,
155 .desc
= "Output format (DER, NET or PEM (default PEM))",
156 .type
= OPTION_ARG_FORMAT
,
157 .opt
.value
= &rsa_config
.outformat
,
162 .desc
= "Input file passphrase source",
164 .opt
.arg
= &rsa_config
.passargin
,
169 .desc
= "Output file passphrase source",
171 .opt
.arg
= &rsa_config
.passargout
,
175 .desc
= "Expect a public key (default private key)",
176 .type
= OPTION_VALUE
,
178 .opt
.value
= &rsa_config
.pubin
,
182 .desc
= "Output a public key (default private key)",
183 .type
= OPTION_VALUE
,
185 .opt
.value
= &rsa_config
.pubout
,
189 .type
= OPTION_VALUE
,
191 .opt
.value
= &rsa_config
.pvk_encr
,
194 .name
= "pvk-strong",
195 .type
= OPTION_VALUE
,
197 .opt
.value
= &rsa_config
.pvk_encr
,
201 .type
= OPTION_VALUE
,
203 .opt
.value
= &rsa_config
.pvk_encr
,
206 .name
= "RSAPublicKey_in",
207 .type
= OPTION_VALUE
,
209 .opt
.value
= &rsa_config
.pubin
,
212 .name
= "RSAPublicKey_out",
213 .type
= OPTION_VALUE
,
215 .opt
.value
= &rsa_config
.pubout
,
219 .desc
= "Use modified NET algorithm for IIS and SGC keys",
221 .opt
.flag
= &rsa_config
.sgckey
,
225 .desc
= "Print in plain text in addition to encoded",
227 .opt
.flag
= &rsa_config
.text
,
231 .type
= OPTION_ARGV_FUNC
,
232 .opt
.argvfunc
= rsa_opt_cipher
,
238 show_ciphers(const OBJ_NAME
*name
, void *arg
)
242 fprintf(stderr
, " -%-24s%s", name
->name
, (++n
% 3 ? "" : "\n"));
249 "usage: rsa [-ciphername] [-check] [-in file] "
251 " [-modulus] [-noout] [-out file] [-outform fmt] "
253 " [-passout src] [-pubin] [-pubout] [-sgckey] [-text]\n\n");
254 options_usage(rsa_options
);
255 fprintf(stderr
, "\n");
257 fprintf(stderr
, "Valid ciphername values:\n\n");
258 OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH
, show_ciphers
, NULL
);
259 fprintf(stderr
, "\n");
263 rsa_main(int argc
, char **argv
)
269 char *passin
= NULL
, *passout
= NULL
;
271 if (single_execution
) {
272 if (pledge("stdio cpath wpath rpath tty", NULL
) == -1) {
278 memset(&rsa_config
, 0, sizeof(rsa_config
));
279 rsa_config
.pvk_encr
= 2;
280 rsa_config
.informat
= FORMAT_PEM
;
281 rsa_config
.outformat
= FORMAT_PEM
;
283 if (options_parse(argc
, argv
, rsa_options
, NULL
, NULL
) != 0) {
288 if (!app_passwd(bio_err
, rsa_config
.passargin
, rsa_config
.passargout
,
289 &passin
, &passout
)) {
290 BIO_printf(bio_err
, "Error getting passwords\n");
293 if (rsa_config
.check
&& rsa_config
.pubin
) {
294 BIO_printf(bio_err
, "Only private keys can be checked\n");
297 out
= BIO_new(BIO_s_file());
302 if (rsa_config
.pubin
) {
304 if (rsa_config
.pubin
== 2) {
305 if (rsa_config
.informat
== FORMAT_PEM
)
306 tmpformat
= FORMAT_PEMRSA
;
307 else if (rsa_config
.informat
== FORMAT_ASN1
)
308 tmpformat
= FORMAT_ASN1RSA
;
309 } else if (rsa_config
.informat
== FORMAT_NETSCAPE
&&
311 tmpformat
= FORMAT_IISSGC
;
313 tmpformat
= rsa_config
.informat
;
315 pkey
= load_pubkey(bio_err
, rsa_config
.infile
,
316 tmpformat
, 1, passin
, "Public Key");
318 pkey
= load_key(bio_err
, rsa_config
.infile
,
319 (rsa_config
.informat
== FORMAT_NETSCAPE
&&
320 rsa_config
.sgckey
? FORMAT_IISSGC
:
321 rsa_config
.informat
), 1, passin
, "Private Key");
324 rsa
= EVP_PKEY_get1_RSA(pkey
);
329 ERR_print_errors(bio_err
);
332 if (rsa_config
.outfile
== NULL
) {
333 BIO_set_fp(out
, stdout
, BIO_NOCLOSE
);
335 if (BIO_write_filename(out
, rsa_config
.outfile
) <= 0) {
336 perror(rsa_config
.outfile
);
342 if (!RSA_print(out
, rsa
, 0)) {
343 perror(rsa_config
.outfile
);
344 ERR_print_errors(bio_err
);
347 if (rsa_config
.modulus
) {
348 BIO_printf(out
, "Modulus=");
349 BN_print(out
, rsa
->n
);
350 BIO_printf(out
, "\n");
352 if (rsa_config
.check
) {
353 int r
= RSA_check_key(rsa
);
356 BIO_printf(out
, "RSA key ok\n");
360 while ((err
= ERR_peek_error()) != 0 &&
361 ERR_GET_LIB(err
) == ERR_LIB_RSA
&&
362 ERR_GET_FUNC(err
) == RSA_F_RSA_CHECK_KEY
&&
363 ERR_GET_REASON(err
) != ERR_R_MALLOC_FAILURE
) {
364 BIO_printf(out
, "RSA key error: %s\n",
365 ERR_reason_error_string(err
));
366 ERR_get_error(); /* remove e from error
370 if (r
== -1 || ERR_peek_error() != 0) { /* should happen only if
372 ERR_print_errors(bio_err
);
376 if (rsa_config
.noout
) {
380 BIO_printf(bio_err
, "writing RSA key\n");
381 if (rsa_config
.outformat
== FORMAT_ASN1
) {
382 if (rsa_config
.pubout
|| rsa_config
.pubin
) {
383 if (rsa_config
.pubout
== 2)
384 i
= i2d_RSAPublicKey_bio(out
, rsa
);
386 i
= i2d_RSA_PUBKEY_bio(out
, rsa
);
388 i
= i2d_RSAPrivateKey_bio(out
, rsa
);
390 #ifndef OPENSSL_NO_RC4
391 else if (rsa_config
.outformat
== FORMAT_NETSCAPE
) {
392 unsigned char *p
, *pp
;
396 size
= i2d_RSA_NET(rsa
, NULL
, NULL
, rsa_config
.sgckey
);
397 if ((p
= malloc(size
)) == NULL
) {
398 BIO_printf(bio_err
, "Memory allocation failure\n");
402 i2d_RSA_NET(rsa
, &p
, NULL
, rsa_config
.sgckey
);
403 BIO_write(out
, (char *) pp
, size
);
407 else if (rsa_config
.outformat
== FORMAT_PEM
) {
408 if (rsa_config
.pubout
|| rsa_config
.pubin
) {
409 if (rsa_config
.pubout
== 2)
410 i
= PEM_write_bio_RSAPublicKey(out
, rsa
);
412 i
= PEM_write_bio_RSA_PUBKEY(out
, rsa
);
414 i
= PEM_write_bio_RSAPrivateKey(out
, rsa
,
415 rsa_config
.enc
, NULL
, 0, NULL
, passout
);
416 #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
417 } else if (rsa_config
.outformat
== FORMAT_MSBLOB
||
418 rsa_config
.outformat
== FORMAT_PVK
) {
421 EVP_PKEY_set1_RSA(pk
, rsa
);
422 if (rsa_config
.outformat
== FORMAT_PVK
)
423 i
= i2b_PVK_bio(out
, pk
, rsa_config
.pvk_encr
, 0,
425 else if (rsa_config
.pubin
|| rsa_config
.pubout
)
426 i
= i2b_PublicKey_bio(out
, pk
);
428 i
= i2b_PrivateKey_bio(out
, pk
);
433 "bad output format specified for outfile\n");
437 BIO_printf(bio_err
, "unable to write key\n");
438 ERR_print_errors(bio_err
);