1 /* pkcs8.c */ 2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL 3 * project 1999. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 #include <stdio.h> 59 #include <string.h> 60 #include "apps.h" 61 #include <openssl/pem.h> 62 #include <openssl/err.h> 63 #include <openssl/evp.h> 64 #include <openssl/pkcs12.h> 65 66 #include "apps.h" 67 #define PROG pkcs8_main 68 69 int MAIN(int, char **); 70 71 int MAIN(int argc, char **argv) 72 { 73 char **args, *infile = NULL, *outfile = NULL; 74 char *passargin = NULL, *passargout = NULL; 75 BIO *in = NULL, *out = NULL; 76 int topk8 = 0; 77 int pbe_nid = -1; 78 const EVP_CIPHER *cipher = NULL; 79 int iter = PKCS12_DEFAULT_ITER; 80 int informat, outformat; 81 int p8_broken = PKCS8_OK; 82 int nocrypt = 0; 83 X509_SIG *p8; 84 PKCS8_PRIV_KEY_INFO *p8inf; 85 EVP_PKEY *pkey; 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; 87 int badarg = 0; 88 if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE); 89 informat=FORMAT_PEM; 90 outformat=FORMAT_PEM; 91 ERR_load_crypto_strings(); 92 OpenSSL_add_all_algorithms(); 93 args = argv + 1; 94 while (!badarg && *args && *args[0] == '-') { 95 if (!strcmp(*args,"-v2")) { 96 if (args[1]) { 97 args++; 98 cipher=EVP_get_cipherbyname(*args); 99 if(!cipher) { 100 BIO_printf(bio_err, 101 "Unknown cipher %s\n", *args); 102 badarg = 1; 103 } 104 } else badarg = 1; 105 } else if (!strcmp(*args,"-v1")) { 106 if (args[1]) { 107 args++; 108 pbe_nid=OBJ_txt2nid(*args); 109 if(pbe_nid == NID_undef) { 110 BIO_printf(bio_err, 111 "Unknown PBE algorithm %s\n", *args); 112 badarg = 1; 113 } 114 } else badarg = 1; 115 } else if (!strcmp(*args,"-inform")) { 116 if (args[1]) { 117 args++; 118 informat=str2fmt(*args); 119 } else badarg = 1; 120 } else if (!strcmp(*args,"-outform")) { 121 if (args[1]) { 122 args++; 123 outformat=str2fmt(*args); 124 } else badarg = 1; 125 } else if (!strcmp (*args, "-topk8")) topk8 = 1; 126 else if (!strcmp (*args, "-noiter")) iter = 1; 127 else if (!strcmp (*args, "-nocrypt")) nocrypt = 1; 128 else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET; 129 else if (!strcmp (*args, "-nsdb")) p8_broken = PKCS8_NS_DB; 130 else if (!strcmp (*args, "-embed")) p8_broken = PKCS8_EMBEDDED_PARAM; 131 else if (!strcmp(*args,"-passin")) 132 { 133 if (!args[1]) goto bad; 134 passargin= *(++args); 135 } 136 else if (!strcmp(*args,"-passout")) 137 { 138 if (!args[1]) goto bad; 139 passargout= *(++args); 140 } 141 else if (!strcmp (*args, "-in")) { 142 if (args[1]) { 143 args++; 144 infile = *args; 145 } else badarg = 1; 146 } else if (!strcmp (*args, "-out")) { 147 if (args[1]) { 148 args++; 149 outfile = *args; 150 } else badarg = 1; 151 } else badarg = 1; 152 args++; 153 } 154 155 if (badarg) { 156 bad: 157 BIO_printf(bio_err, "Usage pkcs8 [options]\n"); 158 BIO_printf(bio_err, "where options are\n"); 159 BIO_printf(bio_err, "-in file input file\n"); 160 BIO_printf(bio_err, "-inform X input format (DER or PEM)\n"); 161 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 162 BIO_printf(bio_err, "-outform X output format (DER or PEM)\n"); 163 BIO_printf(bio_err, "-out file output file\n"); 164 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 165 BIO_printf(bio_err, "-topk8 output PKCS8 file\n"); 166 BIO_printf(bio_err, "-nooct use (nonstandard) no octet format\n"); 167 BIO_printf(bio_err, "-embed use (nonstandard) embedded DSA parameters format\n"); 168 BIO_printf(bio_err, "-nsdb use (nonstandard) DSA Netscape DB format\n"); 169 BIO_printf(bio_err, "-noiter use 1 as iteration count\n"); 170 BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n"); 171 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 172 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 173 return (1); 174 } 175 176 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 177 BIO_printf(bio_err, "Error getting passwords\n"); 178 return (1); 179 } 180 181 if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC; 182 183 if (infile) { 184 if (!(in = BIO_new_file(infile, "rb"))) { 185 BIO_printf(bio_err, 186 "Can't open input file %s\n", infile); 187 return (1); 188 } 189 } else in = BIO_new_fp (stdin, BIO_NOCLOSE); 190 191 if (outfile) { 192 if (!(out = BIO_new_file (outfile, "wb"))) { 193 BIO_printf(bio_err, 194 "Can't open output file %s\n", outfile); 195 return (1); 196 } 197 } else out = BIO_new_fp (stdout, BIO_NOCLOSE); 198 199 if (topk8) { 200 if(informat == FORMAT_PEM) 201 pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, passin); 202 else if(informat == FORMAT_ASN1) 203 pkey = d2i_PrivateKey_bio(in, NULL); 204 else { 205 BIO_printf(bio_err, "Bad format specified for key\n"); 206 return (1); 207 } 208 if (!pkey) { 209 BIO_printf(bio_err, "Error reading key\n", outfile); 210 ERR_print_errors(bio_err); 211 return (1); 212 } 213 BIO_free(in); 214 if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) { 215 BIO_printf(bio_err, "Error converting key\n", outfile); 216 ERR_print_errors(bio_err); 217 return (1); 218 } 219 if(nocrypt) { 220 if(outformat == FORMAT_PEM) 221 PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf); 222 else if(outformat == FORMAT_ASN1) 223 i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf); 224 else { 225 BIO_printf(bio_err, "Bad format specified for key\n"); 226 return (1); 227 } 228 } else { 229 if(passout) p8pass = passout; 230 else { 231 p8pass = pass; 232 EVP_read_pw_string(pass, 50, "Enter Encryption Password:", 1); 233 } 234 app_RAND_load_file(NULL, bio_err, 0); 235 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher, 236 p8pass, strlen(p8pass), 237 NULL, 0, iter, p8inf))) { 238 BIO_printf(bio_err, "Error encrypting key\n", 239 outfile); 240 ERR_print_errors(bio_err); 241 return (1); 242 } 243 app_RAND_write_file(NULL, bio_err); 244 if(outformat == FORMAT_PEM) 245 PEM_write_bio_PKCS8(out, p8); 246 else if(outformat == FORMAT_ASN1) 247 i2d_PKCS8_bio(out, p8); 248 else { 249 BIO_printf(bio_err, "Bad format specified for key\n"); 250 return (1); 251 } 252 X509_SIG_free(p8); 253 } 254 PKCS8_PRIV_KEY_INFO_free (p8inf); 255 EVP_PKEY_free(pkey); 256 BIO_free(out); 257 if(passin) Free(passin); 258 if(passout) Free(passout); 259 return (0); 260 } 261 262 if(nocrypt) { 263 if(informat == FORMAT_PEM) 264 p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL); 265 else if(informat == FORMAT_ASN1) 266 p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL); 267 else { 268 BIO_printf(bio_err, "Bad format specified for key\n"); 269 return (1); 270 } 271 } else { 272 if(informat == FORMAT_PEM) 273 p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL); 274 else if(informat == FORMAT_ASN1) 275 p8 = d2i_PKCS8_bio(in, NULL); 276 else { 277 BIO_printf(bio_err, "Bad format specified for key\n"); 278 return (1); 279 } 280 281 if (!p8) { 282 BIO_printf (bio_err, "Error reading key\n", outfile); 283 ERR_print_errors(bio_err); 284 return (1); 285 } 286 if(passin) p8pass = passin; 287 else { 288 p8pass = pass; 289 EVP_read_pw_string(pass, 50, "Enter Password:", 0); 290 } 291 p8inf = M_PKCS8_decrypt(p8, p8pass, strlen(p8pass)); 292 X509_SIG_free(p8); 293 } 294 295 if (!p8inf) { 296 BIO_printf(bio_err, "Error decrypting key\n", outfile); 297 ERR_print_errors(bio_err); 298 return (1); 299 } 300 301 if (!(pkey = EVP_PKCS82PKEY(p8inf))) { 302 BIO_printf(bio_err, "Error converting key\n", outfile); 303 ERR_print_errors(bio_err); 304 return (1); 305 } 306 307 if (p8inf->broken) { 308 BIO_printf(bio_err, "Warning: broken key encoding: "); 309 switch (p8inf->broken) { 310 case PKCS8_NO_OCTET: 311 BIO_printf(bio_err, "No Octet String in PrivateKey\n"); 312 break; 313 314 case PKCS8_EMBEDDED_PARAM: 315 BIO_printf(bio_err, "DSA parameters included in PrivateKey\n"); 316 break; 317 318 case PKCS8_NS_DB: 319 BIO_printf(bio_err, "DSA public key include in PrivateKey\n"); 320 break; 321 322 default: 323 BIO_printf(bio_err, "Unknown broken type\n"); 324 break; 325 } 326 } 327 328 PKCS8_PRIV_KEY_INFO_free(p8inf); 329 if(outformat == FORMAT_PEM) 330 PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout); 331 else if(outformat == FORMAT_ASN1) 332 i2d_PrivateKey_bio(out, pkey); 333 else { 334 BIO_printf(bio_err, "Bad format specified for key\n"); 335 return (1); 336 } 337 338 EVP_PKEY_free(pkey); 339 BIO_free(out); 340 BIO_free(in); 341 if(passin) Free(passin); 342 if(passout) Free(passout); 343 344 return (0); 345 } 346