1 /* pkcs8.c */ 2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL 3 * project 1999. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 #include <stdio.h> 59 #include <string.h> 60 #include "apps.h" 61 #include <openssl/pem.h> 62 #include <openssl/err.h> 63 #include <openssl/evp.h> 64 #include <openssl/pkcs12.h> 65 66 #include "apps.h" 67 #define PROG pkcs8_main 68 69 int MAIN(int, char **); 70 71 int MAIN(int argc, char **argv) 72 { 73 char **args, *infile = NULL, *outfile = NULL; 74 char *passargin = NULL, *passargout = NULL; 75 BIO *in = NULL, *out = NULL; 76 int topk8 = 0; 77 int pbe_nid = -1; 78 const EVP_CIPHER *cipher = NULL; 79 int iter = PKCS12_DEFAULT_ITER; 80 int informat, outformat; 81 int p8_broken = PKCS8_OK; 82 int nocrypt = 0; 83 X509_SIG *p8; 84 PKCS8_PRIV_KEY_INFO *p8inf; 85 EVP_PKEY *pkey; 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; 87 int badarg = 0; 88 if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE); 89 informat=FORMAT_PEM; 90 outformat=FORMAT_PEM; 91 ERR_load_crypto_strings(); 92 OpenSSL_add_all_algorithms(); 93 args = argv + 1; 94 while (!badarg && *args && *args[0] == '-') { 95 if (!strcmp(*args,"-v2")) { 96 if (args[1]) { 97 args++; 98 cipher=EVP_get_cipherbyname(*args); 99 if(!cipher) { 100 BIO_printf(bio_err, 101 "Unknown cipher %s\n", *args); 102 badarg = 1; 103 } 104 } else badarg = 1; 105 } else if (!strcmp(*args,"-v1")) { 106 if (args[1]) { 107 args++; 108 pbe_nid=OBJ_txt2nid(*args); 109 if(pbe_nid == NID_undef) { 110 BIO_printf(bio_err, 111 "Unknown PBE algorithm %s\n", *args); 112 badarg = 1; 113 } 114 } else badarg = 1; 115 } else if (!strcmp(*args,"-inform")) { 116 if (args[1]) { 117 args++; 118 informat=str2fmt(*args); 119 } else badarg = 1; 120 } else if (!strcmp(*args,"-outform")) { 121 if (args[1]) { 122 args++; 123 outformat=str2fmt(*args); 124 } else badarg = 1; 125 } else if (!strcmp (*args, "-topk8")) topk8 = 1; 126 else if (!strcmp (*args, "-noiter")) iter = 1; 127 else if (!strcmp (*args, "-nocrypt")) nocrypt = 1; 128 else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET; 129 else if (!strcmp (*args, "-nsdb")) p8_broken = PKCS8_NS_DB; 130 else if (!strcmp (*args, "-embed")) p8_broken = PKCS8_EMBEDDED_PARAM; 131 else if (!strcmp(*args,"-passin")) 132 { 133 if (!args[1]) goto bad; 134 passargin= *(++args); 135 } 136 else if (!strcmp(*args,"-passout")) 137 { 138 if (!args[1]) goto bad; 139 passargout= *(++args); 140 } 141 else if (!strcmp (*args, "-in")) { 142 if (args[1]) { 143 args++; 144 infile = *args; 145 } else badarg = 1; 146 } else if (!strcmp (*args, "-out")) { 147 if (args[1]) { 148 args++; 149 outfile = *args; 150 } else badarg = 1; 151 } else badarg = 1; 152 args++; 153 } 154 155 if (badarg) { 156 bad: 157 BIO_printf(bio_err, "Usage pkcs8 [options]\n"); 158 BIO_printf(bio_err, "where options are\n"); 159 BIO_printf(bio_err, "-in file input file\n"); 160 BIO_printf(bio_err, "-inform X input format (DER or PEM)\n"); 161 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 162 BIO_printf(bio_err, "-outform X output format (DER or PEM)\n"); 163 BIO_printf(bio_err, "-out file output file\n"); 164 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 165 BIO_printf(bio_err, "-topk8 output PKCS8 file\n"); 166 BIO_printf(bio_err, "-nooct use (nonstandard) no octet format\n"); 167 BIO_printf(bio_err, "-embed use (nonstandard) embedded DSA parameters format\n"); 168 BIO_printf(bio_err, "-nsdb use (nonstandard) DSA Netscape DB format\n"); 169 BIO_printf(bio_err, "-noiter use 1 as iteration count\n"); 170 BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n"); 171 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 172 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 173 return (1); 174 } 175 176 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 177 BIO_printf(bio_err, "Error getting passwords\n"); 178 return (1); 179 } 180 181 if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC; 182 183 if (infile) { 184 if (!(in = BIO_new_file(infile, "rb"))) { 185 BIO_printf(bio_err, 186 "Can't open input file %s\n", infile); 187 return (1); 188 } 189 } else in = BIO_new_fp (stdin, BIO_NOCLOSE); 190 191 if (outfile) { 192 if (!(out = BIO_new_file (outfile, "wb"))) { 193 BIO_printf(bio_err, 194 "Can't open output file %s\n", outfile); 195 return (1); 196 } 197 } else { 198 out = BIO_new_fp (stdout, BIO_NOCLOSE); 199 #ifdef VMS 200 { 201 BIO *tmpbio = BIO_new(BIO_f_linebuffer()); 202 out = BIO_push(tmpbio, out); 203 } 204 #endif 205 } 206 if (topk8) { 207 if(informat == FORMAT_PEM) 208 pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, passin); 209 else if(informat == FORMAT_ASN1) 210 pkey = d2i_PrivateKey_bio(in, NULL); 211 else { 212 BIO_printf(bio_err, "Bad format specified for key\n"); 213 return (1); 214 } 215 if (!pkey) { 216 BIO_printf(bio_err, "Error reading key\n", outfile); 217 ERR_print_errors(bio_err); 218 return (1); 219 } 220 BIO_free(in); 221 if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) { 222 BIO_printf(bio_err, "Error converting key\n", outfile); 223 ERR_print_errors(bio_err); 224 return (1); 225 } 226 if(nocrypt) { 227 if(outformat == FORMAT_PEM) 228 PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf); 229 else if(outformat == FORMAT_ASN1) 230 i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf); 231 else { 232 BIO_printf(bio_err, "Bad format specified for key\n"); 233 return (1); 234 } 235 } else { 236 if(passout) p8pass = passout; 237 else { 238 p8pass = pass; 239 EVP_read_pw_string(pass, 50, "Enter Encryption Password:", 1); 240 } 241 app_RAND_load_file(NULL, bio_err, 0); 242 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher, 243 p8pass, strlen(p8pass), 244 NULL, 0, iter, p8inf))) { 245 BIO_printf(bio_err, "Error encrypting key\n", 246 outfile); 247 ERR_print_errors(bio_err); 248 return (1); 249 } 250 app_RAND_write_file(NULL, bio_err); 251 if(outformat == FORMAT_PEM) 252 PEM_write_bio_PKCS8(out, p8); 253 else if(outformat == FORMAT_ASN1) 254 i2d_PKCS8_bio(out, p8); 255 else { 256 BIO_printf(bio_err, "Bad format specified for key\n"); 257 return (1); 258 } 259 X509_SIG_free(p8); 260 } 261 PKCS8_PRIV_KEY_INFO_free (p8inf); 262 EVP_PKEY_free(pkey); 263 BIO_free_all(out); 264 if(passin) OPENSSL_free(passin); 265 if(passout) OPENSSL_free(passout); 266 return (0); 267 } 268 269 if(nocrypt) { 270 if(informat == FORMAT_PEM) 271 p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL); 272 else if(informat == FORMAT_ASN1) 273 p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL); 274 else { 275 BIO_printf(bio_err, "Bad format specified for key\n"); 276 return (1); 277 } 278 } else { 279 if(informat == FORMAT_PEM) 280 p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL); 281 else if(informat == FORMAT_ASN1) 282 p8 = d2i_PKCS8_bio(in, NULL); 283 else { 284 BIO_printf(bio_err, "Bad format specified for key\n"); 285 return (1); 286 } 287 288 if (!p8) { 289 BIO_printf (bio_err, "Error reading key\n", outfile); 290 ERR_print_errors(bio_err); 291 return (1); 292 } 293 if(passin) p8pass = passin; 294 else { 295 p8pass = pass; 296 EVP_read_pw_string(pass, 50, "Enter Password:", 0); 297 } 298 p8inf = M_PKCS8_decrypt(p8, p8pass, strlen(p8pass)); 299 X509_SIG_free(p8); 300 } 301 302 if (!p8inf) { 303 BIO_printf(bio_err, "Error decrypting key\n", outfile); 304 ERR_print_errors(bio_err); 305 return (1); 306 } 307 308 if (!(pkey = EVP_PKCS82PKEY(p8inf))) { 309 BIO_printf(bio_err, "Error converting key\n", outfile); 310 ERR_print_errors(bio_err); 311 return (1); 312 } 313 314 if (p8inf->broken) { 315 BIO_printf(bio_err, "Warning: broken key encoding: "); 316 switch (p8inf->broken) { 317 case PKCS8_NO_OCTET: 318 BIO_printf(bio_err, "No Octet String in PrivateKey\n"); 319 break; 320 321 case PKCS8_EMBEDDED_PARAM: 322 BIO_printf(bio_err, "DSA parameters included in PrivateKey\n"); 323 break; 324 325 case PKCS8_NS_DB: 326 BIO_printf(bio_err, "DSA public key include in PrivateKey\n"); 327 break; 328 329 default: 330 BIO_printf(bio_err, "Unknown broken type\n"); 331 break; 332 } 333 } 334 335 PKCS8_PRIV_KEY_INFO_free(p8inf); 336 if(outformat == FORMAT_PEM) 337 PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout); 338 else if(outformat == FORMAT_ASN1) 339 i2d_PrivateKey_bio(out, pkey); 340 else { 341 BIO_printf(bio_err, "Bad format specified for key\n"); 342 return (1); 343 } 344 345 EVP_PKEY_free(pkey); 346 BIO_free_all(out); 347 BIO_free(in); 348 if(passin) OPENSSL_free(passin); 349 if(passout) OPENSSL_free(passout); 350 351 return (0); 352 } 353