xref: /freebsd/contrib/bearssl/tools/skey.c (revision b9f654b163bce26de79705e77b872427c9f2afa1)
1 /*
2  * Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining
5  * a copy of this software and associated documentation files (the
6  * "Software"), to deal in the Software without restriction, including
7  * without limitation the rights to use, copy, modify, merge, publish,
8  * distribute, sublicense, and/or sell copies of the Software, and to
9  * permit persons to whom the Software is furnished to do so, subject to
10  * the following conditions:
11  *
12  * The above copyright notice and this permission notice shall be
13  * included in all copies or substantial portions of the Software.
14  *
15  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22  * SOFTWARE.
23  */
24 
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <stdint.h>
29 #include <errno.h>
30 
31 #include "brssl.h"
32 #include "bearssl.h"
33 
34 typedef struct {
35 	int print_text;
36 	int print_C;
37 	const char *rawder;
38 	const char *rawpem;
39 	const char *pk8der;
40 	const char *pk8pem;
41 } outspec;
42 
43 static void
44 print_int_text(const char *name, const unsigned char *buf, size_t len)
45 {
46 	size_t u;
47 
48 	printf("%s = ", name);
49 	for (u = 0; u < len; u ++) {
50 		printf("%02X", buf[u]);
51 	}
52 	printf("\n");
53 }
54 
55 static void
56 print_int_C(const char *name, const unsigned char *buf, size_t len)
57 {
58 	size_t u;
59 
60 	printf("\nstatic const unsigned char %s[] = {", name);
61 	for (u = 0; u < len; u ++) {
62 		if (u != 0) {
63 			printf(",");
64 		}
65 		if (u % 12 == 0) {
66 			printf("\n\t");
67 		} else {
68 			printf(" ");
69 		}
70 		printf("0x%02X", buf[u]);
71 	}
72 	printf("\n};\n");
73 }
74 
75 static int
76 write_to_file(const char *name, const void *data, size_t len)
77 {
78 	FILE *f;
79 
80 	f = fopen(name, "wb");
81 	if (f == NULL) {
82 		fprintf(stderr,
83 			"ERROR: cannot open file '%s' for writing\n",
84 			name);
85 		return 0;
86 	}
87 	if (fwrite(data, 1, len, f) != len) {
88 		fclose(f);
89 		fprintf(stderr,
90 			"ERROR: cannot write to file '%s'\n",
91 			name);
92 		return 0;
93 	}
94 	fclose(f);
95 	return 1;
96 }
97 
98 static int
99 write_to_pem_file(const char *name,
100 	const void *data, size_t len, const char *banner)
101 {
102 	void *pem;
103 	size_t pemlen;
104 	int r;
105 
106 	pemlen = br_pem_encode(NULL, NULL, len, banner, 0);
107 	pem = xmalloc(pemlen + 1);
108 	br_pem_encode(pem, data, len, banner, 0);
109 	r = write_to_file(name, pem, pemlen);
110 	xfree(pem);
111 	return r;
112 }
113 
114 static int
115 print_rsa(const br_rsa_private_key *sk, outspec *os)
116 {
117 	int ret;
118 	unsigned char *n, *d, *buf;
119 	uint32_t e;
120 	size_t nlen, dlen, len;
121 	br_rsa_compute_modulus cm;
122 	br_rsa_compute_pubexp ce;
123 	br_rsa_compute_privexp cd;
124 	br_rsa_public_key pk;
125 	unsigned char ebuf[4];
126 
127 	n = NULL;
128 	d = NULL;
129 	buf = NULL;
130 	ret = 1;
131 	if (os->print_text) {
132 		print_int_text("p ", sk->p, sk->plen);
133 		print_int_text("q ", sk->q, sk->qlen);
134 		print_int_text("dp", sk->dp, sk->dplen);
135 		print_int_text("dq", sk->dq, sk->dqlen);
136 		print_int_text("iq", sk->iq, sk->iqlen);
137 	}
138 	if (os->print_C) {
139 		print_int_C("RSA_P", sk->p, sk->plen);
140 		print_int_C("RSA_Q", sk->q, sk->qlen);
141 		print_int_C("RSA_DP", sk->dp, sk->dplen);
142 		print_int_C("RSA_DQ", sk->dq, sk->dqlen);
143 		print_int_C("RSA_IQ", sk->iq, sk->iqlen);
144 		printf("\nstatic const br_rsa_private_key RSA = {\n");
145 		printf("\t%lu,\n", (unsigned long)sk->n_bitlen);
146 		printf("\t(unsigned char *)RSA_P, sizeof RSA_P,\n");
147 		printf("\t(unsigned char *)RSA_Q, sizeof RSA_Q,\n");
148 		printf("\t(unsigned char *)RSA_DP, sizeof RSA_DP,\n");
149 		printf("\t(unsigned char *)RSA_DQ, sizeof RSA_DQ,\n");
150 		printf("\t(unsigned char *)RSA_IQ, sizeof RSA_IQ\n");
151 		printf("};\n");
152 	}
153 
154 	if (os->rawder == NULL && os->rawpem == NULL
155 		&& os->pk8der == NULL && os->pk8pem == NULL)
156 	{
157 		return ret;
158 	}
159 
160 	cm = br_rsa_compute_modulus_get_default();
161 	ce = br_rsa_compute_pubexp_get_default();
162 	cd = br_rsa_compute_privexp_get_default();
163 	nlen = cm(NULL, sk);
164 	if (nlen == 0) {
165 		goto print_RSA_error;
166 	}
167 	n = xmalloc(nlen);
168 	if (cm(n, sk) != nlen) {
169 		goto print_RSA_error;
170 	}
171 	e = ce(sk);
172 	if (e == 0) {
173 		goto print_RSA_error;
174 	}
175 	dlen = cd(NULL, sk, e);
176 	if (dlen == 0) {
177 		goto print_RSA_error;
178 	}
179 	d = xmalloc(dlen);
180 	if (cd(d, sk, e) != dlen) {
181 		goto print_RSA_error;
182 	}
183 	ebuf[0] = e >> 24;
184 	ebuf[1] = e >> 16;
185 	ebuf[2] = e >> 8;
186 	ebuf[3] = e;
187 	pk.n = n;
188 	pk.nlen = nlen;
189 	pk.e = ebuf;
190 	pk.elen = sizeof ebuf;
191 
192 	if (os->rawder != NULL || os->rawpem != NULL) {
193 		len = br_encode_rsa_raw_der(NULL, sk, &pk, d, dlen);
194 		if (len == 0) {
195 			goto print_RSA_error;
196 		}
197 		buf = xmalloc(len);
198 		if (br_encode_rsa_raw_der(buf, sk, &pk, d, dlen) != len) {
199 			goto print_RSA_error;
200 		}
201 		if (os->rawder != NULL) {
202 			ret &= write_to_file(os->rawder, buf, len);
203 		}
204 		if (os->rawpem != NULL) {
205 			ret &= write_to_pem_file(os->rawpem,
206 				buf, len, "RSA PRIVATE KEY");
207 		}
208 		xfree(buf);
209 		buf = NULL;
210 	}
211 
212 	if (os->pk8der != NULL || os->pk8pem != NULL) {
213 		len = br_encode_rsa_pkcs8_der(NULL, sk, &pk, d, dlen);
214 		if (len == 0) {
215 			goto print_RSA_error;
216 		}
217 		buf = xmalloc(len);
218 		if (br_encode_rsa_pkcs8_der(buf, sk, &pk, d, dlen) != len) {
219 			goto print_RSA_error;
220 		}
221 		if (os->pk8der != NULL) {
222 			ret &= write_to_file(os->pk8der, buf, len);
223 		}
224 		if (os->pk8pem != NULL) {
225 			ret &= write_to_pem_file(os->pk8pem,
226 				buf, len, "PRIVATE KEY");
227 		}
228 		xfree(buf);
229 		buf = NULL;
230 	}
231 
232 print_RSA_exit:
233 	xfree(n);
234 	xfree(d);
235 	xfree(buf);
236 	return ret;
237 
238 print_RSA_error:
239 	fprintf(stderr, "ERROR: cannot encode RSA key\n");
240 	ret = 0;
241 	goto print_RSA_exit;
242 }
243 
244 static int
245 print_ec(const br_ec_private_key *sk, outspec *os)
246 {
247 	br_ec_public_key pk;
248 	unsigned kbuf[BR_EC_KBUF_PUB_MAX_SIZE];
249 	unsigned char *buf;
250 	size_t len;
251 	int r;
252 
253 	if (os->print_text) {
254 		print_int_text("x", sk->x, sk->xlen);
255 	}
256 	if (os->print_C) {
257 		print_int_C("EC_X", sk->x, sk->xlen);
258 		printf("\nstatic const br_ec_private_key EC = {\n");
259 		printf("\t%d,\n", sk->curve);
260 		printf("\t(unsigned char *)EC_X, sizeof EC_X\n");
261 		printf("};\n");
262 	}
263 
264 	if (os->rawder == NULL && os->rawpem == NULL
265 		&& os->pk8der == NULL && os->pk8pem == NULL)
266 	{
267 		return 1;
268 	}
269 	if (br_ec_compute_pub(br_ec_get_default(), &pk, kbuf, sk) == 0) {
270 		fprintf(stderr,
271 			"ERROR: cannot re-encode (unsupported curve)\n");
272 		return 0;
273 	}
274 
275 	r = 1;
276 	if (os->rawder != NULL || os->rawpem != NULL) {
277 		len = br_encode_ec_raw_der(NULL, sk, &pk);
278 		if (len == 0) {
279 			fprintf(stderr, "ERROR: cannot re-encode"
280 				" (unsupported curve)\n");
281 			return 0;
282 		}
283 		buf = xmalloc(len);
284 		if (br_encode_ec_raw_der(buf, sk, &pk) != len) {
285 			fprintf(stderr, "ERROR: re-encode failure\n");
286 			xfree(buf);
287 			return 0;
288 		}
289 		if (os->rawder != NULL) {
290 			r &= write_to_file(os->rawder, buf, len);
291 		}
292 		if (os->rawpem != NULL) {
293 			r &= write_to_pem_file(os->rawpem,
294 				buf, len, "EC PRIVATE KEY");
295 		}
296 		xfree(buf);
297 	}
298 	if (os->pk8der != NULL || os->pk8pem != NULL) {
299 		len = br_encode_ec_pkcs8_der(NULL, sk, &pk);
300 		if (len == 0) {
301 			fprintf(stderr, "ERROR: cannot re-encode"
302 				" (unsupported curve)\n");
303 			return 0;
304 		}
305 		buf = xmalloc(len);
306 		if (br_encode_ec_pkcs8_der(buf, sk, &pk) != len) {
307 			fprintf(stderr, "ERROR: re-encode failure\n");
308 			xfree(buf);
309 			return 0;
310 		}
311 		if (os->pk8der != NULL) {
312 			r &= write_to_file(os->pk8der, buf, len);
313 		}
314 		if (os->pk8pem != NULL) {
315 			r &= write_to_pem_file(os->pk8pem,
316 				buf, len, "PRIVATE KEY");
317 		}
318 		xfree(buf);
319 	}
320 	return r;
321 }
322 
323 static int
324 parse_rsa_spec(const char *kgen_spec, unsigned *size, uint32_t *pubexp)
325 {
326 	const char *p;
327 	char *end;
328 	unsigned long ul;
329 
330 	p = kgen_spec;
331 	if (*p != 'r' && *p != 'R') {
332 		return 0;
333 	}
334 	p ++;
335 	if (*p != 's' && *p != 'S') {
336 		return 0;
337 	}
338 	p ++;
339 	if (*p != 'a' && *p != 'A') {
340 		return 0;
341 	}
342 	p ++;
343 	if (*p == 0) {
344 		*size = 2048;
345 		*pubexp = 3;
346 		return 1;
347 	} else if (*p != ':') {
348 		return 0;
349 	}
350 	p ++;
351 	ul = strtoul(p, &end, 10);
352 	if (ul < 512 || ul > 32768) {
353 		return 0;
354 	}
355 	*size = ul;
356 	p = end;
357 	if (*p == 0) {
358 		*pubexp = 3;
359 		return 1;
360 	} else if (*p != ':') {
361 		return 0;
362 	}
363 	p ++;
364 	ul = strtoul(p, &end, 10);
365 	if ((ul & 1) == 0 || ul == 1 || ((ul >> 30) >> 2) != 0) {
366 		return 0;
367 	}
368 	*pubexp = ul;
369 	if (*end != 0) {
370 		return 0;
371 	}
372 	return 1;
373 }
374 
375 static int
376 keygen_rsa(unsigned size, uint32_t pubexp, outspec *os)
377 {
378 	br_hmac_drbg_context rng;
379 	br_prng_seeder seeder;
380 	br_rsa_keygen kg;
381 	br_rsa_private_key sk;
382 	unsigned char *kbuf_priv;
383 	uint32_t r;
384 
385 	seeder = br_prng_seeder_system(NULL);
386 	if (seeder == 0) {
387 		fprintf(stderr, "ERROR: no system source of randomness\n");
388 		return 0;
389 	}
390 	br_hmac_drbg_init(&rng, &br_sha256_vtable, NULL, 0);
391 	if (!seeder(&rng.vtable)) {
392 		fprintf(stderr, "ERROR: system source of randomness failed\n");
393 		return 0;
394 	}
395 	kbuf_priv = xmalloc(BR_RSA_KBUF_PRIV_SIZE(size));
396 	kg = br_rsa_keygen_get_default();
397 	r = kg(&rng.vtable, &sk, kbuf_priv, NULL, NULL, size, pubexp);
398 	if (!r) {
399 		fprintf(stderr, "ERROR: RSA key pair generation failed\n");
400 	} else {
401 		r = print_rsa(&sk, os);
402 	}
403 	xfree(kbuf_priv);
404 	return r;
405 }
406 
407 static int
408 parse_ec_spec(const char *kgen_spec, int *curve)
409 {
410 	const char *p;
411 
412 	*curve = 0;
413 	p = kgen_spec;
414 	if (*p != 'e' && *p != 'E') {
415 		return 0;
416 	}
417 	p ++;
418 	if (*p != 'c' && *p != 'C') {
419 		return 0;
420 	}
421 	p ++;
422 	if (*p == 0) {
423 		*curve = BR_EC_secp256r1;
424 		return 1;
425 	}
426 	if (*p != ':') {
427 		return 0;
428 	}
429 	*curve = get_curve_by_name(p);
430 	return *curve > 0;
431 }
432 
433 static int
434 keygen_ec(int curve, outspec *os)
435 {
436 	br_hmac_drbg_context rng;
437 	br_prng_seeder seeder;
438 	const br_ec_impl *impl;
439 	br_ec_private_key sk;
440 	unsigned char kbuf_priv[BR_EC_KBUF_PRIV_MAX_SIZE];
441 	size_t len;
442 
443 	seeder = br_prng_seeder_system(NULL);
444 	if (seeder == 0) {
445 		fprintf(stderr, "ERROR: no system source of randomness\n");
446 		return 0;
447 	}
448 	br_hmac_drbg_init(&rng, &br_sha256_vtable, NULL, 0);
449 	if (!seeder(&rng.vtable)) {
450 		fprintf(stderr, "ERROR: system source of randomness failed\n");
451 		return 0;
452 	}
453 	impl = br_ec_get_default();
454 	len = br_ec_keygen(&rng.vtable, impl, &sk, kbuf_priv, curve);
455 	if (len == 0) {
456 		fprintf(stderr, "ERROR: curve is not supported\n");
457 		return 0;
458 	}
459 	return print_ec(&sk, os);
460 }
461 
462 static int
463 decode_key(const unsigned char *buf, size_t len, outspec *os)
464 {
465 	br_skey_decoder_context dc;
466 	int err, ret;
467 
468 	br_skey_decoder_init(&dc);
469 	br_skey_decoder_push(&dc, buf, len);
470 	err = br_skey_decoder_last_error(&dc);
471 	if (err != 0) {
472 		const char *errname, *errmsg;
473 
474 		fprintf(stderr, "ERROR (decoding): err=%d\n", err);
475 		errname = find_error_name(err, &errmsg);
476 		if (errname != NULL) {
477 			fprintf(stderr, "  %s: %s\n", errname, errmsg);
478 		} else {
479 			fprintf(stderr, "  (unknown)\n");
480 		}
481 		return 0;
482 	}
483 	ret = 1;
484 	switch (br_skey_decoder_key_type(&dc)) {
485 		const br_rsa_private_key *rk;
486 		const br_ec_private_key *ek;
487 
488 	case BR_KEYTYPE_RSA:
489 		rk = br_skey_decoder_get_rsa(&dc);
490 		printf("RSA key (%lu bits)\n", (unsigned long)rk->n_bitlen);
491 		ret = print_rsa(rk, os);
492 		break;
493 
494 	case BR_KEYTYPE_EC:
495 		ek = br_skey_decoder_get_ec(&dc);
496 		printf("EC key (curve = %d: %s)\n",
497 			ek->curve, ec_curve_name(ek->curve));
498 		ret = print_ec(ek, os);
499 		break;
500 
501 	default:
502 		fprintf(stderr, "Unknown key type: %d\n",
503 			br_skey_decoder_key_type(&dc));
504 		ret = 0;
505 		break;
506 	}
507 
508 	return ret;
509 }
510 
511 static void
512 usage_skey(void)
513 {
514 	fprintf(stderr,
515 "usage: brssl skey [ options ] file...\n");
516 	fprintf(stderr,
517 "options:\n");
518 	fprintf(stderr,
519 "   -q             suppress verbose messages\n");
520 	fprintf(stderr,
521 "   -text          print private key details (human-readable)\n");
522 	fprintf(stderr,
523 "   -C             print private key details (C code)\n");
524 	fprintf(stderr,
525 "   -rawder file   save private key in 'file' (raw format, DER)\n");
526 	fprintf(stderr,
527 "   -rawpem file   save private key in 'file' (raw format, PEM)\n");
528 	fprintf(stderr,
529 "   -pk8der file   save private key in 'file' (PKCS#8 format, DER)\n");
530 	fprintf(stderr,
531 "   -pk8pem file   save private key in 'file' (PKCS#8 format, PEM)\n");
532 	fprintf(stderr,
533 "   -gen spec      generate a new key using the provided key specification\n");
534 	fprintf(stderr,
535 "   -list          list known elliptic curve names\n");
536 	fprintf(stderr,
537 "Key specification begins with a key type, followed by optional parameters\n");
538 	fprintf(stderr,
539 "that depend on the key type, separated by colon characters:\n");
540 	fprintf(stderr,
541 "   rsa[:size[:pubexep]]   RSA key (defaults: size = 2048, pubexp = 3)\n");
542 	fprintf(stderr,
543 "   ec[:curvename]         EC key (default curve: secp256r1)\n");
544 }
545 
546 /* see brssl.h */
547 int
548 do_skey(int argc, char *argv[])
549 {
550 	int retcode;
551 	int verbose;
552 	int i, num_files;
553 	outspec os;
554 	unsigned char *buf;
555 	size_t len;
556 	pem_object *pos;
557 	const char *kgen_spec;
558 
559 	retcode = 0;
560 	verbose = 1;
561 	os.print_text = 0;
562 	os.print_C = 0;
563 	os.rawder = NULL;
564 	os.rawpem = NULL;
565 	os.pk8der = NULL;
566 	os.pk8pem = NULL;
567 	num_files = 0;
568 	buf = NULL;
569 	pos = NULL;
570 	kgen_spec = NULL;
571 	for (i = 0; i < argc; i ++) {
572 		const char *arg;
573 
574 		arg = argv[i];
575 		if (arg[0] != '-') {
576 			num_files ++;
577 			continue;
578 		}
579 		argv[i] = NULL;
580 		if (eqstr(arg, "-v") || eqstr(arg, "-verbose")) {
581 			verbose = 1;
582 		} else if (eqstr(arg, "-q") || eqstr(arg, "-quiet")) {
583 			verbose = 0;
584 		} else if (eqstr(arg, "-text")) {
585 			os.print_text = 1;
586 		} else if (eqstr(arg, "-C")) {
587 			os.print_C = 1;
588 		} else if (eqstr(arg, "-rawder")) {
589 			if (++ i >= argc) {
590 				fprintf(stderr,
591 					"ERROR: no argument for '-rawder'\n");
592 				usage_skey();
593 				goto skey_exit_error;
594 			}
595 			if (os.rawder != NULL) {
596 				fprintf(stderr,
597 					"ERROR: multiple '-rawder' options\n");
598 				usage_skey();
599 				goto skey_exit_error;
600 			}
601 			os.rawder = argv[i];
602 			argv[i] = NULL;
603 		} else if (eqstr(arg, "-rawpem")) {
604 			if (++ i >= argc) {
605 				fprintf(stderr,
606 					"ERROR: no argument for '-rawpem'\n");
607 				usage_skey();
608 				goto skey_exit_error;
609 			}
610 			if (os.rawpem != NULL) {
611 				fprintf(stderr,
612 					"ERROR: multiple '-rawpem' options\n");
613 				usage_skey();
614 				goto skey_exit_error;
615 			}
616 			os.rawpem = argv[i];
617 			argv[i] = NULL;
618 		} else if (eqstr(arg, "-pk8der")) {
619 			if (++ i >= argc) {
620 				fprintf(stderr,
621 					"ERROR: no argument for '-pk8der'\n");
622 				usage_skey();
623 				goto skey_exit_error;
624 			}
625 			if (os.pk8der != NULL) {
626 				fprintf(stderr,
627 					"ERROR: multiple '-pk8der' options\n");
628 				usage_skey();
629 				goto skey_exit_error;
630 			}
631 			os.pk8der = argv[i];
632 			argv[i] = NULL;
633 		} else if (eqstr(arg, "-pk8pem")) {
634 			if (++ i >= argc) {
635 				fprintf(stderr,
636 					"ERROR: no argument for '-pk8pem'\n");
637 				usage_skey();
638 				goto skey_exit_error;
639 			}
640 			if (os.pk8pem != NULL) {
641 				fprintf(stderr,
642 					"ERROR: multiple '-pk8pem' options\n");
643 				usage_skey();
644 				goto skey_exit_error;
645 			}
646 			os.pk8pem = argv[i];
647 			argv[i] = NULL;
648 		} else if (eqstr(arg, "-gen")) {
649 			if (++ i >= argc) {
650 				fprintf(stderr,
651 					"ERROR: no argument for '-gen'\n");
652 				usage_skey();
653 				goto skey_exit_error;
654 			}
655 			if (kgen_spec != NULL) {
656 				fprintf(stderr,
657 					"ERROR: multiple '-gen' options\n");
658 				usage_skey();
659 				goto skey_exit_error;
660 			}
661 			kgen_spec = argv[i];
662 			argv[i] = NULL;
663 		} else if (eqstr(arg, "-list")) {
664 			list_curves();
665 			goto skey_exit;
666 		} else {
667 			fprintf(stderr, "ERROR: unknown option: '%s'\n", arg);
668 			usage_skey();
669 			goto skey_exit_error;
670 		}
671 	}
672 	if (kgen_spec != NULL) {
673 		unsigned rsa_size;
674 		uint32_t rsa_pubexp;
675 		int curve;
676 
677 		if (num_files != 0) {
678 			fprintf(stderr,
679 				"ERROR: key files provided while generating\n");
680 			usage_skey();
681 			goto skey_exit_error;
682 		}
683 
684 		if (parse_rsa_spec(kgen_spec, &rsa_size, &rsa_pubexp)) {
685 			if (!keygen_rsa(rsa_size, rsa_pubexp, &os)) {
686 				goto skey_exit_error;
687 			}
688 		} else if (parse_ec_spec(kgen_spec, &curve)) {
689 			if (!keygen_ec(curve, &os)) {
690 				goto skey_exit_error;
691 			}
692 		} else {
693 			fprintf(stderr,
694 				"ERROR: unknown key specification: '%s'\n",
695 				kgen_spec);
696 			usage_skey();
697 			goto skey_exit_error;
698 		}
699 	} else if (num_files == 0) {
700 		fprintf(stderr, "ERROR: no private key provided\n");
701 		usage_skey();
702 		goto skey_exit_error;
703 	}
704 
705 	for (i = 0; i < argc; i ++) {
706 		const char *fname;
707 
708 		fname = argv[i];
709 		if (fname == NULL) {
710 			continue;
711 		}
712 		buf = read_file(fname, &len);
713 		if (buf == NULL) {
714 			goto skey_exit_error;
715 		}
716 		if (looks_like_DER(buf, len)) {
717 			if (verbose) {
718 				fprintf(stderr, "File '%s': ASN.1/DER object\n",
719 					fname);
720 			}
721 			if (!decode_key(buf, len, &os)) {
722 				goto skey_exit_error;
723 			}
724 		} else {
725 			size_t u, num;
726 
727 			if (verbose) {
728 				fprintf(stderr, "File '%s': decoding as PEM\n",
729 					fname);
730 			}
731 			pos = decode_pem(buf, len, &num);
732 			if (pos == NULL) {
733 				goto skey_exit_error;
734 			}
735 			for (u = 0; pos[u].name; u ++) {
736 				const char *name;
737 
738 				name = pos[u].name;
739 				if (eqstr(name, "RSA PRIVATE KEY")
740 					|| eqstr(name, "EC PRIVATE KEY")
741 					|| eqstr(name, "PRIVATE KEY"))
742 				{
743 					if (!decode_key(pos[u].data,
744 						pos[u].data_len, &os))
745 					{
746 						goto skey_exit_error;
747 					}
748 				} else {
749 					if (verbose) {
750 						fprintf(stderr,
751 							"(skipping '%s')\n",
752 							name);
753 					}
754 				}
755 			}
756 			for (u = 0; pos[u].name; u ++) {
757 				free_pem_object_contents(&pos[u]);
758 			}
759 			xfree(pos);
760 			pos = NULL;
761 		}
762 		xfree(buf);
763 		buf = NULL;
764 	}
765 
766 	/*
767 	 * Release allocated structures.
768 	 */
769 skey_exit:
770 	xfree(buf);
771 	if (pos != NULL) {
772 		size_t u;
773 
774 		for (u = 0; pos[u].name; u ++) {
775 			free_pem_object_contents(&pos[u]);
776 		}
777 		xfree(pos);
778 	}
779 	return retcode;
780 
781 skey_exit_error:
782 	retcode = -1;
783 	goto skey_exit;
784 }
785