xref: /freebsd/crypto/openssl/apps/pkey.c (revision e71b70530d95c4f34d8bdbd78d1242df1ba4a945)
16f9291ceSJung-uk Kim /*
2*e71b7053SJung-uk Kim  * Copyright 2006-2018 The OpenSSL Project Authors. All Rights Reserved.
3*e71b7053SJung-uk Kim  *
4*e71b7053SJung-uk Kim  * Licensed under the OpenSSL license (the "License").  You may not use
5*e71b7053SJung-uk Kim  * this file except in compliance with the License.  You can obtain a copy
6*e71b7053SJung-uk Kim  * in the file LICENSE in the source distribution or at
7*e71b7053SJung-uk Kim  * https://www.openssl.org/source/license.html
81f13597dSJung-uk Kim  */
9*e71b7053SJung-uk Kim 
101f13597dSJung-uk Kim #include <stdio.h>
111f13597dSJung-uk Kim #include <string.h>
121f13597dSJung-uk Kim #include "apps.h"
13*e71b7053SJung-uk Kim #include "progs.h"
141f13597dSJung-uk Kim #include <openssl/pem.h>
151f13597dSJung-uk Kim #include <openssl/err.h>
161f13597dSJung-uk Kim #include <openssl/evp.h>
171f13597dSJung-uk Kim 
18*e71b7053SJung-uk Kim typedef enum OPTION_choice {
19*e71b7053SJung-uk Kim     OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
20*e71b7053SJung-uk Kim     OPT_INFORM, OPT_OUTFORM, OPT_PASSIN, OPT_PASSOUT, OPT_ENGINE,
21*e71b7053SJung-uk Kim     OPT_IN, OPT_OUT, OPT_PUBIN, OPT_PUBOUT, OPT_TEXT_PUB,
22*e71b7053SJung-uk Kim     OPT_TEXT, OPT_NOOUT, OPT_MD, OPT_TRADITIONAL, OPT_CHECK, OPT_PUB_CHECK
23*e71b7053SJung-uk Kim } OPTION_CHOICE;
241f13597dSJung-uk Kim 
25*e71b7053SJung-uk Kim const OPTIONS pkey_options[] = {
26*e71b7053SJung-uk Kim     {"help", OPT_HELP, '-', "Display this summary"},
27*e71b7053SJung-uk Kim     {"inform", OPT_INFORM, 'f', "Input format (DER or PEM)"},
28*e71b7053SJung-uk Kim     {"outform", OPT_OUTFORM, 'F', "Output format (DER or PEM)"},
29*e71b7053SJung-uk Kim     {"passin", OPT_PASSIN, 's', "Input file pass phrase source"},
30*e71b7053SJung-uk Kim     {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"},
31*e71b7053SJung-uk Kim     {"in", OPT_IN, 's', "Input key"},
32*e71b7053SJung-uk Kim     {"out", OPT_OUT, '>', "Output file"},
33*e71b7053SJung-uk Kim     {"pubin", OPT_PUBIN, '-',
34*e71b7053SJung-uk Kim      "Read public key from input (default is private key)"},
35*e71b7053SJung-uk Kim     {"pubout", OPT_PUBOUT, '-', "Output public key, not private"},
36*e71b7053SJung-uk Kim     {"text_pub", OPT_TEXT_PUB, '-', "Only output public key components"},
37*e71b7053SJung-uk Kim     {"text", OPT_TEXT, '-', "Output in plaintext as well"},
38*e71b7053SJung-uk Kim     {"noout", OPT_NOOUT, '-', "Don't output the key"},
39*e71b7053SJung-uk Kim     {"", OPT_MD, '-', "Any supported cipher"},
40*e71b7053SJung-uk Kim     {"traditional", OPT_TRADITIONAL, '-',
41*e71b7053SJung-uk Kim      "Use traditional format for private keys"},
42*e71b7053SJung-uk Kim #ifndef OPENSSL_NO_ENGINE
43*e71b7053SJung-uk Kim     {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
44*e71b7053SJung-uk Kim #endif
45*e71b7053SJung-uk Kim     {"check", OPT_CHECK, '-', "Check key consistency"},
46*e71b7053SJung-uk Kim     {"pubcheck", OPT_PUB_CHECK, '-', "Check public key consistency"},
47*e71b7053SJung-uk Kim     {NULL}
48*e71b7053SJung-uk Kim };
491f13597dSJung-uk Kim 
50*e71b7053SJung-uk Kim int pkey_main(int argc, char **argv)
511f13597dSJung-uk Kim {
521f13597dSJung-uk Kim     BIO *in = NULL, *out = NULL;
53*e71b7053SJung-uk Kim     ENGINE *e = NULL;
541f13597dSJung-uk Kim     EVP_PKEY *pkey = NULL;
55*e71b7053SJung-uk Kim     const EVP_CIPHER *cipher = NULL;
56*e71b7053SJung-uk Kim     char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL;
57*e71b7053SJung-uk Kim     char *passinarg = NULL, *passoutarg = NULL, *prog;
58*e71b7053SJung-uk Kim     OPTION_CHOICE o;
59*e71b7053SJung-uk Kim     int informat = FORMAT_PEM, outformat = FORMAT_PEM;
60*e71b7053SJung-uk Kim     int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0, ret = 1;
61*e71b7053SJung-uk Kim     int private = 0, traditional = 0, check = 0, pub_check = 0;
621f13597dSJung-uk Kim 
63*e71b7053SJung-uk Kim     prog = opt_init(argc, argv, pkey_options);
64*e71b7053SJung-uk Kim     while ((o = opt_next()) != OPT_EOF) {
65*e71b7053SJung-uk Kim         switch (o) {
66*e71b7053SJung-uk Kim         case OPT_EOF:
67*e71b7053SJung-uk Kim         case OPT_ERR:
68*e71b7053SJung-uk Kim  opthelp:
69*e71b7053SJung-uk Kim             BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
701f13597dSJung-uk Kim             goto end;
71*e71b7053SJung-uk Kim         case OPT_HELP:
72*e71b7053SJung-uk Kim             opt_help(pkey_options);
73*e71b7053SJung-uk Kim             ret = 0;
74*e71b7053SJung-uk Kim             goto end;
75*e71b7053SJung-uk Kim         case OPT_INFORM:
76*e71b7053SJung-uk Kim             if (!opt_format(opt_arg(), OPT_FMT_ANY, &informat))
77*e71b7053SJung-uk Kim                 goto opthelp;
78*e71b7053SJung-uk Kim             break;
79*e71b7053SJung-uk Kim         case OPT_OUTFORM:
80*e71b7053SJung-uk Kim             if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &outformat))
81*e71b7053SJung-uk Kim                 goto opthelp;
82*e71b7053SJung-uk Kim             break;
83*e71b7053SJung-uk Kim         case OPT_PASSIN:
84*e71b7053SJung-uk Kim             passinarg = opt_arg();
85*e71b7053SJung-uk Kim             break;
86*e71b7053SJung-uk Kim         case OPT_PASSOUT:
87*e71b7053SJung-uk Kim             passoutarg = opt_arg();
88*e71b7053SJung-uk Kim             break;
89*e71b7053SJung-uk Kim         case OPT_ENGINE:
90*e71b7053SJung-uk Kim             e = setup_engine(opt_arg(), 0);
91*e71b7053SJung-uk Kim             break;
92*e71b7053SJung-uk Kim         case OPT_IN:
93*e71b7053SJung-uk Kim             infile = opt_arg();
94*e71b7053SJung-uk Kim             break;
95*e71b7053SJung-uk Kim         case OPT_OUT:
96*e71b7053SJung-uk Kim             outfile = opt_arg();
97*e71b7053SJung-uk Kim             break;
98*e71b7053SJung-uk Kim         case OPT_PUBIN:
99*e71b7053SJung-uk Kim             pubin = pubout = pubtext = 1;
100*e71b7053SJung-uk Kim             break;
101*e71b7053SJung-uk Kim         case OPT_PUBOUT:
1021f13597dSJung-uk Kim             pubout = 1;
103*e71b7053SJung-uk Kim             break;
104*e71b7053SJung-uk Kim         case OPT_TEXT_PUB:
105*e71b7053SJung-uk Kim             pubtext = text = 1;
106*e71b7053SJung-uk Kim             break;
107*e71b7053SJung-uk Kim         case OPT_TEXT:
1081f13597dSJung-uk Kim             text = 1;
109*e71b7053SJung-uk Kim             break;
110*e71b7053SJung-uk Kim         case OPT_NOOUT:
1111f13597dSJung-uk Kim             noout = 1;
112*e71b7053SJung-uk Kim             break;
113*e71b7053SJung-uk Kim         case OPT_TRADITIONAL:
114*e71b7053SJung-uk Kim             traditional = 1;
115*e71b7053SJung-uk Kim             break;
116*e71b7053SJung-uk Kim         case OPT_CHECK:
117*e71b7053SJung-uk Kim             check = 1;
118*e71b7053SJung-uk Kim             break;
119*e71b7053SJung-uk Kim         case OPT_PUB_CHECK:
120*e71b7053SJung-uk Kim             pub_check = 1;
121*e71b7053SJung-uk Kim             break;
122*e71b7053SJung-uk Kim         case OPT_MD:
123*e71b7053SJung-uk Kim             if (!opt_cipher(opt_unknown(), &cipher))
124*e71b7053SJung-uk Kim                 goto opthelp;
1251f13597dSJung-uk Kim         }
1261f13597dSJung-uk Kim     }
127*e71b7053SJung-uk Kim     argc = opt_num_rest();
128*e71b7053SJung-uk Kim     if (argc != 0)
129*e71b7053SJung-uk Kim         goto opthelp;
1301f13597dSJung-uk Kim 
131*e71b7053SJung-uk Kim     private = !noout && !pubout ? 1 : 0;
132*e71b7053SJung-uk Kim     if (text && !pubtext)
133*e71b7053SJung-uk Kim         private = 1;
1341f13597dSJung-uk Kim 
135*e71b7053SJung-uk Kim     if (!app_passwd(passinarg, passoutarg, &passin, &passout)) {
1361f13597dSJung-uk Kim         BIO_printf(bio_err, "Error getting passwords\n");
1371f13597dSJung-uk Kim         goto end;
1381f13597dSJung-uk Kim     }
1391f13597dSJung-uk Kim 
140*e71b7053SJung-uk Kim     out = bio_open_owner(outfile, outformat, private);
141*e71b7053SJung-uk Kim     if (out == NULL)
1421f13597dSJung-uk Kim         goto end;
1431f13597dSJung-uk Kim 
1441f13597dSJung-uk Kim     if (pubin)
145*e71b7053SJung-uk Kim         pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key");
1461f13597dSJung-uk Kim     else
147*e71b7053SJung-uk Kim         pkey = load_key(infile, informat, 1, passin, e, "key");
148*e71b7053SJung-uk Kim     if (pkey == NULL)
1491f13597dSJung-uk Kim         goto end;
1501f13597dSJung-uk Kim 
151*e71b7053SJung-uk Kim     if (check || pub_check) {
152*e71b7053SJung-uk Kim         int r;
153*e71b7053SJung-uk Kim         EVP_PKEY_CTX *ctx;
154*e71b7053SJung-uk Kim 
155*e71b7053SJung-uk Kim         ctx = EVP_PKEY_CTX_new(pkey, e);
156*e71b7053SJung-uk Kim         if (ctx == NULL) {
157*e71b7053SJung-uk Kim             ERR_print_errors(bio_err);
158*e71b7053SJung-uk Kim             goto end;
159*e71b7053SJung-uk Kim         }
160*e71b7053SJung-uk Kim 
161*e71b7053SJung-uk Kim         if (check)
162*e71b7053SJung-uk Kim             r = EVP_PKEY_check(ctx);
163*e71b7053SJung-uk Kim         else
164*e71b7053SJung-uk Kim             r = EVP_PKEY_public_check(ctx);
165*e71b7053SJung-uk Kim 
166*e71b7053SJung-uk Kim         if (r == 1) {
167*e71b7053SJung-uk Kim             BIO_printf(out, "Key is valid\n");
168*e71b7053SJung-uk Kim         } else {
169*e71b7053SJung-uk Kim             /*
170*e71b7053SJung-uk Kim              * Note: at least for RSA keys if this function returns
171*e71b7053SJung-uk Kim              * -1, there will be no error reasons.
172*e71b7053SJung-uk Kim              */
173*e71b7053SJung-uk Kim             unsigned long err;
174*e71b7053SJung-uk Kim 
175*e71b7053SJung-uk Kim             BIO_printf(out, "Key is invalid\n");
176*e71b7053SJung-uk Kim 
177*e71b7053SJung-uk Kim             while ((err = ERR_peek_error()) != 0) {
178*e71b7053SJung-uk Kim                 BIO_printf(out, "Detailed error: %s\n",
179*e71b7053SJung-uk Kim                            ERR_reason_error_string(err));
180*e71b7053SJung-uk Kim                 ERR_get_error(); /* remove err from error stack */
181*e71b7053SJung-uk Kim             }
182*e71b7053SJung-uk Kim         }
183*e71b7053SJung-uk Kim         EVP_PKEY_CTX_free(ctx);
184*e71b7053SJung-uk Kim     }
185*e71b7053SJung-uk Kim 
1866f9291ceSJung-uk Kim     if (!noout) {
1876f9291ceSJung-uk Kim         if (outformat == FORMAT_PEM) {
188*e71b7053SJung-uk Kim             if (pubout) {
189*e71b7053SJung-uk Kim                 if (!PEM_write_bio_PUBKEY(out, pkey))
190*e71b7053SJung-uk Kim                     goto end;
191*e71b7053SJung-uk Kim             } else {
192*e71b7053SJung-uk Kim                 assert(private);
193*e71b7053SJung-uk Kim                 if (traditional) {
194*e71b7053SJung-uk Kim                     if (!PEM_write_bio_PrivateKey_traditional(out, pkey, cipher,
195*e71b7053SJung-uk Kim                                                               NULL, 0, NULL,
196*e71b7053SJung-uk Kim                                                               passout))
197*e71b7053SJung-uk Kim                         goto end;
198*e71b7053SJung-uk Kim                 } else {
199*e71b7053SJung-uk Kim                     if (!PEM_write_bio_PrivateKey(out, pkey, cipher,
200*e71b7053SJung-uk Kim                                                   NULL, 0, NULL, passout))
201*e71b7053SJung-uk Kim                         goto end;
202*e71b7053SJung-uk Kim                 }
203*e71b7053SJung-uk Kim             }
2046f9291ceSJung-uk Kim         } else if (outformat == FORMAT_ASN1) {
205*e71b7053SJung-uk Kim             if (pubout) {
206*e71b7053SJung-uk Kim                 if (!i2d_PUBKEY_bio(out, pkey))
207*e71b7053SJung-uk Kim                     goto end;
208*e71b7053SJung-uk Kim             } else {
209*e71b7053SJung-uk Kim                 assert(private);
210*e71b7053SJung-uk Kim                 if (!i2d_PrivateKey_bio(out, pkey))
211*e71b7053SJung-uk Kim                     goto end;
212*e71b7053SJung-uk Kim             }
2136f9291ceSJung-uk Kim         } else {
2141f13597dSJung-uk Kim             BIO_printf(bio_err, "Bad format specified for key\n");
2151f13597dSJung-uk Kim             goto end;
2161f13597dSJung-uk Kim         }
2171f13597dSJung-uk Kim     }
2181f13597dSJung-uk Kim 
2196f9291ceSJung-uk Kim     if (text) {
220*e71b7053SJung-uk Kim         if (pubtext) {
221*e71b7053SJung-uk Kim             if (EVP_PKEY_print_public(out, pkey, 0, NULL) <= 0)
222*e71b7053SJung-uk Kim                 goto end;
223*e71b7053SJung-uk Kim         } else {
224*e71b7053SJung-uk Kim             assert(private);
225*e71b7053SJung-uk Kim             if (EVP_PKEY_print_private(out, pkey, 0, NULL) <= 0)
226*e71b7053SJung-uk Kim                 goto end;
227*e71b7053SJung-uk Kim         }
2281f13597dSJung-uk Kim     }
2291f13597dSJung-uk Kim 
2301f13597dSJung-uk Kim     ret = 0;
2311f13597dSJung-uk Kim 
2321f13597dSJung-uk Kim  end:
233*e71b7053SJung-uk Kim     if (ret != 0)
234*e71b7053SJung-uk Kim         ERR_print_errors(bio_err);
2351f13597dSJung-uk Kim     EVP_PKEY_free(pkey);
2366cf8931aSJung-uk Kim     release_engine(e);
2371f13597dSJung-uk Kim     BIO_free_all(out);
2381f13597dSJung-uk Kim     BIO_free(in);
2391f13597dSJung-uk Kim     OPENSSL_free(passin);
2401f13597dSJung-uk Kim     OPENSSL_free(passout);
2411f13597dSJung-uk Kim 
2421f13597dSJung-uk Kim     return ret;
2431f13597dSJung-uk Kim }
244