xref: /freebsd/crypto/openssl/apps/rsa.c (revision 1f13597d10e771d5546d31839150812bde8e4a56)
174664626SKris Kennaway /* apps/rsa.c */
274664626SKris Kennaway /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
374664626SKris Kennaway  * All rights reserved.
474664626SKris Kennaway  *
574664626SKris Kennaway  * This package is an SSL implementation written
674664626SKris Kennaway  * by Eric Young (eay@cryptsoft.com).
774664626SKris Kennaway  * The implementation was written so as to conform with Netscapes SSL.
874664626SKris Kennaway  *
974664626SKris Kennaway  * This library is free for commercial and non-commercial use as long as
1074664626SKris Kennaway  * the following conditions are aheared to.  The following conditions
1174664626SKris Kennaway  * apply to all code found in this distribution, be it the RC4, RSA,
1274664626SKris Kennaway  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
1374664626SKris Kennaway  * included with this distribution is covered by the same copyright terms
1474664626SKris Kennaway  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
1574664626SKris Kennaway  *
1674664626SKris Kennaway  * Copyright remains Eric Young's, and as such any Copyright notices in
1774664626SKris Kennaway  * the code are not to be removed.
1874664626SKris Kennaway  * If this package is used in a product, Eric Young should be given attribution
1974664626SKris Kennaway  * as the author of the parts of the library used.
2074664626SKris Kennaway  * This can be in the form of a textual message at program startup or
2174664626SKris Kennaway  * in documentation (online or textual) provided with the package.
2274664626SKris Kennaway  *
2374664626SKris Kennaway  * Redistribution and use in source and binary forms, with or without
2474664626SKris Kennaway  * modification, are permitted provided that the following conditions
2574664626SKris Kennaway  * are met:
2674664626SKris Kennaway  * 1. Redistributions of source code must retain the copyright
2774664626SKris Kennaway  *    notice, this list of conditions and the following disclaimer.
2874664626SKris Kennaway  * 2. Redistributions in binary form must reproduce the above copyright
2974664626SKris Kennaway  *    notice, this list of conditions and the following disclaimer in the
3074664626SKris Kennaway  *    documentation and/or other materials provided with the distribution.
3174664626SKris Kennaway  * 3. All advertising materials mentioning features or use of this software
3274664626SKris Kennaway  *    must display the following acknowledgement:
3374664626SKris Kennaway  *    "This product includes cryptographic software written by
3474664626SKris Kennaway  *     Eric Young (eay@cryptsoft.com)"
3574664626SKris Kennaway  *    The word 'cryptographic' can be left out if the rouines from the library
3674664626SKris Kennaway  *    being used are not cryptographic related :-).
3774664626SKris Kennaway  * 4. If you include any Windows specific code (or a derivative thereof) from
3874664626SKris Kennaway  *    the apps directory (application code) you must include an acknowledgement:
3974664626SKris Kennaway  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
4074664626SKris Kennaway  *
4174664626SKris Kennaway  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
4274664626SKris Kennaway  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4374664626SKris Kennaway  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
4474664626SKris Kennaway  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
4574664626SKris Kennaway  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
4674664626SKris Kennaway  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
4774664626SKris Kennaway  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
4874664626SKris Kennaway  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
4974664626SKris Kennaway  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5074664626SKris Kennaway  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5174664626SKris Kennaway  * SUCH DAMAGE.
5274664626SKris Kennaway  *
5374664626SKris Kennaway  * The licence and distribution terms for any publically available version or
5474664626SKris Kennaway  * derivative of this code cannot be changed.  i.e. this code cannot simply be
5574664626SKris Kennaway  * copied and put under another distribution licence
5674664626SKris Kennaway  * [including the GNU Public Licence.]
5774664626SKris Kennaway  */
5874664626SKris Kennaway 
593b4e3dcbSSimon L. B. Nielsen #include <openssl/opensslconf.h>
605c87c606SMark Murray #ifndef OPENSSL_NO_RSA
6174664626SKris Kennaway #include <stdio.h>
6274664626SKris Kennaway #include <stdlib.h>
6374664626SKris Kennaway #include <string.h>
6474664626SKris Kennaway #include <time.h>
6574664626SKris Kennaway #include "apps.h"
6674664626SKris Kennaway #include <openssl/bio.h>
6774664626SKris Kennaway #include <openssl/err.h>
6874664626SKris Kennaway #include <openssl/rsa.h>
6974664626SKris Kennaway #include <openssl/evp.h>
7074664626SKris Kennaway #include <openssl/x509.h>
7174664626SKris Kennaway #include <openssl/pem.h>
723b4e3dcbSSimon L. B. Nielsen #include <openssl/bn.h>
7374664626SKris Kennaway 
7474664626SKris Kennaway #undef PROG
7574664626SKris Kennaway #define PROG	rsa_main
7674664626SKris Kennaway 
7774664626SKris Kennaway /* -inform arg	- input format - default PEM (one of DER, NET or PEM)
7874664626SKris Kennaway  * -outform arg - output format - default PEM
7974664626SKris Kennaway  * -in arg	- input file - default stdin
8074664626SKris Kennaway  * -out arg	- output file - default stdout
8174664626SKris Kennaway  * -des		- encrypt output if PEM format with DES in cbc mode
8274664626SKris Kennaway  * -des3	- encrypt output if PEM format
8374664626SKris Kennaway  * -idea	- encrypt output if PEM format
84db522d3aSSimon L. B. Nielsen  * -seed	- encrypt output if PEM format
855c87c606SMark Murray  * -aes128	- encrypt output if PEM format
865c87c606SMark Murray  * -aes192	- encrypt output if PEM format
875c87c606SMark Murray  * -aes256	- encrypt output if PEM format
88ed5d4f9aSSimon L. B. Nielsen  * -camellia128 - encrypt output if PEM format
89ed5d4f9aSSimon L. B. Nielsen  * -camellia192 - encrypt output if PEM format
90ed5d4f9aSSimon L. B. Nielsen  * -camellia256 - encrypt output if PEM format
9174664626SKris Kennaway  * -text	- print a text version
9274664626SKris Kennaway  * -modulus	- print the RSA key modulus
9374664626SKris Kennaway  * -check	- verify key consistency
94f579bf8eSKris Kennaway  * -pubin	- Expect a public key in input file.
95f579bf8eSKris Kennaway  * -pubout	- Output a public key.
9674664626SKris Kennaway  */
9774664626SKris Kennaway 
98f579bf8eSKris Kennaway int MAIN(int, char **);
99f579bf8eSKris Kennaway 
10074664626SKris Kennaway int MAIN(int argc, char **argv)
10174664626SKris Kennaway 	{
1025c87c606SMark Murray 	ENGINE *e = NULL;
10374664626SKris Kennaway 	int ret=1;
10474664626SKris Kennaway 	RSA *rsa=NULL;
105ddd58736SKris Kennaway 	int i,badops=0, sgckey=0;
10674664626SKris Kennaway 	const EVP_CIPHER *enc=NULL;
1075c87c606SMark Murray 	BIO *out=NULL;
10874664626SKris Kennaway 	int informat,outformat,text=0,check=0,noout=0;
109f579bf8eSKris Kennaway 	int pubin = 0, pubout = 0;
11074664626SKris Kennaway 	char *infile,*outfile,*prog;
111f579bf8eSKris Kennaway 	char *passargin = NULL, *passargout = NULL;
112f579bf8eSKris Kennaway 	char *passin = NULL, *passout = NULL;
113fceca8a3SJacques Vidrine #ifndef OPENSSL_NO_ENGINE
1145c87c606SMark Murray 	char *engine=NULL;
115fceca8a3SJacques Vidrine #endif
11674664626SKris Kennaway 	int modulus=0;
11774664626SKris Kennaway 
118*1f13597dSJung-uk Kim 	int pvk_encr = 2;
119*1f13597dSJung-uk Kim 
12074664626SKris Kennaway 	apps_startup();
12174664626SKris Kennaway 
12274664626SKris Kennaway 	if (bio_err == NULL)
12374664626SKris Kennaway 		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
12474664626SKris Kennaway 			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
12574664626SKris Kennaway 
1265c87c606SMark Murray 	if (!load_config(bio_err, NULL))
1275c87c606SMark Murray 		goto end;
1285c87c606SMark Murray 
12974664626SKris Kennaway 	infile=NULL;
13074664626SKris Kennaway 	outfile=NULL;
13174664626SKris Kennaway 	informat=FORMAT_PEM;
13274664626SKris Kennaway 	outformat=FORMAT_PEM;
13374664626SKris Kennaway 
13474664626SKris Kennaway 	prog=argv[0];
13574664626SKris Kennaway 	argc--;
13674664626SKris Kennaway 	argv++;
13774664626SKris Kennaway 	while (argc >= 1)
13874664626SKris Kennaway 		{
13974664626SKris Kennaway 		if 	(strcmp(*argv,"-inform") == 0)
14074664626SKris Kennaway 			{
14174664626SKris Kennaway 			if (--argc < 1) goto bad;
14274664626SKris Kennaway 			informat=str2fmt(*(++argv));
14374664626SKris Kennaway 			}
14474664626SKris Kennaway 		else if (strcmp(*argv,"-outform") == 0)
14574664626SKris Kennaway 			{
14674664626SKris Kennaway 			if (--argc < 1) goto bad;
14774664626SKris Kennaway 			outformat=str2fmt(*(++argv));
14874664626SKris Kennaway 			}
14974664626SKris Kennaway 		else if (strcmp(*argv,"-in") == 0)
15074664626SKris Kennaway 			{
15174664626SKris Kennaway 			if (--argc < 1) goto bad;
15274664626SKris Kennaway 			infile= *(++argv);
15374664626SKris Kennaway 			}
15474664626SKris Kennaway 		else if (strcmp(*argv,"-out") == 0)
15574664626SKris Kennaway 			{
15674664626SKris Kennaway 			if (--argc < 1) goto bad;
15774664626SKris Kennaway 			outfile= *(++argv);
15874664626SKris Kennaway 			}
159f579bf8eSKris Kennaway 		else if (strcmp(*argv,"-passin") == 0)
160f579bf8eSKris Kennaway 			{
161f579bf8eSKris Kennaway 			if (--argc < 1) goto bad;
162f579bf8eSKris Kennaway 			passargin= *(++argv);
163f579bf8eSKris Kennaway 			}
164f579bf8eSKris Kennaway 		else if (strcmp(*argv,"-passout") == 0)
165f579bf8eSKris Kennaway 			{
166f579bf8eSKris Kennaway 			if (--argc < 1) goto bad;
167f579bf8eSKris Kennaway 			passargout= *(++argv);
168f579bf8eSKris Kennaway 			}
169fceca8a3SJacques Vidrine #ifndef OPENSSL_NO_ENGINE
1705c87c606SMark Murray 		else if (strcmp(*argv,"-engine") == 0)
1715c87c606SMark Murray 			{
1725c87c606SMark Murray 			if (--argc < 1) goto bad;
1735c87c606SMark Murray 			engine= *(++argv);
1745c87c606SMark Murray 			}
175fceca8a3SJacques Vidrine #endif
176ddd58736SKris Kennaway 		else if (strcmp(*argv,"-sgckey") == 0)
177ddd58736SKris Kennaway 			sgckey=1;
178f579bf8eSKris Kennaway 		else if (strcmp(*argv,"-pubin") == 0)
179f579bf8eSKris Kennaway 			pubin=1;
180f579bf8eSKris Kennaway 		else if (strcmp(*argv,"-pubout") == 0)
181f579bf8eSKris Kennaway 			pubout=1;
182*1f13597dSJung-uk Kim 		else if (strcmp(*argv,"-RSAPublicKey_in") == 0)
183*1f13597dSJung-uk Kim 			pubin = 2;
184*1f13597dSJung-uk Kim 		else if (strcmp(*argv,"-RSAPublicKey_out") == 0)
185*1f13597dSJung-uk Kim 			pubout = 2;
186*1f13597dSJung-uk Kim 		else if (strcmp(*argv,"-pvk-strong") == 0)
187*1f13597dSJung-uk Kim 			pvk_encr=2;
188*1f13597dSJung-uk Kim 		else if (strcmp(*argv,"-pvk-weak") == 0)
189*1f13597dSJung-uk Kim 			pvk_encr=1;
190*1f13597dSJung-uk Kim 		else if (strcmp(*argv,"-pvk-none") == 0)
191*1f13597dSJung-uk Kim 			pvk_encr=0;
19274664626SKris Kennaway 		else if (strcmp(*argv,"-noout") == 0)
19374664626SKris Kennaway 			noout=1;
19474664626SKris Kennaway 		else if (strcmp(*argv,"-text") == 0)
19574664626SKris Kennaway 			text=1;
19674664626SKris Kennaway 		else if (strcmp(*argv,"-modulus") == 0)
19774664626SKris Kennaway 			modulus=1;
19874664626SKris Kennaway 		else if (strcmp(*argv,"-check") == 0)
19974664626SKris Kennaway 			check=1;
20074664626SKris Kennaway 		else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
20174664626SKris Kennaway 			{
20274664626SKris Kennaway 			BIO_printf(bio_err,"unknown option %s\n",*argv);
20374664626SKris Kennaway 			badops=1;
20474664626SKris Kennaway 			break;
20574664626SKris Kennaway 			}
20674664626SKris Kennaway 		argc--;
20774664626SKris Kennaway 		argv++;
20874664626SKris Kennaway 		}
20974664626SKris Kennaway 
21074664626SKris Kennaway 	if (badops)
21174664626SKris Kennaway 		{
21274664626SKris Kennaway bad:
21374664626SKris Kennaway 		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
21474664626SKris Kennaway 		BIO_printf(bio_err,"where options are\n");
21574664626SKris Kennaway 		BIO_printf(bio_err," -inform arg     input format - one of DER NET PEM\n");
21674664626SKris Kennaway 		BIO_printf(bio_err," -outform arg    output format - one of DER NET PEM\n");
21774664626SKris Kennaway 		BIO_printf(bio_err," -in arg         input file\n");
218ddd58736SKris Kennaway 		BIO_printf(bio_err," -sgckey         Use IIS SGC key format\n");
219f579bf8eSKris Kennaway 		BIO_printf(bio_err," -passin arg     input file pass phrase source\n");
22074664626SKris Kennaway 		BIO_printf(bio_err," -out arg        output file\n");
221f579bf8eSKris Kennaway 		BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
22274664626SKris Kennaway 		BIO_printf(bio_err," -des            encrypt PEM output with cbc des\n");
22374664626SKris Kennaway 		BIO_printf(bio_err," -des3           encrypt PEM output with ede cbc des using 168 bit key\n");
2245c87c606SMark Murray #ifndef OPENSSL_NO_IDEA
22574664626SKris Kennaway 		BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
22674664626SKris Kennaway #endif
227db522d3aSSimon L. B. Nielsen #ifndef OPENSSL_NO_SEED
228db522d3aSSimon L. B. Nielsen 		BIO_printf(bio_err," -seed           encrypt PEM output with cbc seed\n");
229db522d3aSSimon L. B. Nielsen #endif
2305c87c606SMark Murray #ifndef OPENSSL_NO_AES
2315c87c606SMark Murray 		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
2325c87c606SMark Murray 		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
2335c87c606SMark Murray #endif
234ed5d4f9aSSimon L. B. Nielsen #ifndef OPENSSL_NO_CAMELLIA
235ed5d4f9aSSimon L. B. Nielsen 		BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
236ed5d4f9aSSimon L. B. Nielsen 		BIO_printf(bio_err,"                 encrypt PEM output with cbc camellia\n");
237ed5d4f9aSSimon L. B. Nielsen #endif
23874664626SKris Kennaway 		BIO_printf(bio_err," -text           print the key in text\n");
23974664626SKris Kennaway 		BIO_printf(bio_err," -noout          don't print key out\n");
24074664626SKris Kennaway 		BIO_printf(bio_err," -modulus        print the RSA key modulus\n");
24174664626SKris Kennaway 		BIO_printf(bio_err," -check          verify key consistency\n");
242f579bf8eSKris Kennaway 		BIO_printf(bio_err," -pubin          expect a public key in input file\n");
243f579bf8eSKris Kennaway 		BIO_printf(bio_err," -pubout         output a public key\n");
244fceca8a3SJacques Vidrine #ifndef OPENSSL_NO_ENGINE
2455c87c606SMark Murray 		BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
246fceca8a3SJacques Vidrine #endif
24774664626SKris Kennaway 		goto end;
24874664626SKris Kennaway 		}
24974664626SKris Kennaway 
25074664626SKris Kennaway 	ERR_load_crypto_strings();
25174664626SKris Kennaway 
252fceca8a3SJacques Vidrine #ifndef OPENSSL_NO_ENGINE
2535c87c606SMark Murray         e = setup_engine(bio_err, engine, 0);
254fceca8a3SJacques Vidrine #endif
2555c87c606SMark Murray 
256f579bf8eSKris Kennaway 	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
257f579bf8eSKris Kennaway 		BIO_printf(bio_err, "Error getting passwords\n");
258f579bf8eSKris Kennaway 		goto end;
259f579bf8eSKris Kennaway 	}
260f579bf8eSKris Kennaway 
261f579bf8eSKris Kennaway 	if(check && pubin) {
262f579bf8eSKris Kennaway 		BIO_printf(bio_err, "Only private keys can be checked\n");
263f579bf8eSKris Kennaway 		goto end;
264f579bf8eSKris Kennaway 	}
265f579bf8eSKris Kennaway 
26674664626SKris Kennaway 	out=BIO_new(BIO_s_file());
26774664626SKris Kennaway 
2685c87c606SMark Murray 	{
2695c87c606SMark Murray 		EVP_PKEY	*pkey;
2705c87c606SMark Murray 
2715c87c606SMark Murray 		if (pubin)
272*1f13597dSJung-uk Kim 			{
273*1f13597dSJung-uk Kim 			int tmpformat=-1;
274*1f13597dSJung-uk Kim 			if (pubin == 2)
275*1f13597dSJung-uk Kim 				{
276*1f13597dSJung-uk Kim 				if (informat == FORMAT_PEM)
277*1f13597dSJung-uk Kim 					tmpformat = FORMAT_PEMRSA;
278*1f13597dSJung-uk Kim 				else if (informat == FORMAT_ASN1)
279*1f13597dSJung-uk Kim 					tmpformat = FORMAT_ASN1RSA;
280*1f13597dSJung-uk Kim 				}
281*1f13597dSJung-uk Kim 			else if (informat == FORMAT_NETSCAPE && sgckey)
282*1f13597dSJung-uk Kim 				tmpformat = FORMAT_IISSGC;
283*1f13597dSJung-uk Kim 			else
284*1f13597dSJung-uk Kim 				tmpformat = informat;
285*1f13597dSJung-uk Kim 
286*1f13597dSJung-uk Kim 			pkey = load_pubkey(bio_err, infile, tmpformat, 1,
2875c87c606SMark Murray 				passin, e, "Public Key");
288*1f13597dSJung-uk Kim 			}
28974664626SKris Kennaway 		else
2905c87c606SMark Murray 			pkey = load_key(bio_err, infile,
2915c87c606SMark Murray 				(informat == FORMAT_NETSCAPE && sgckey ?
2925c87c606SMark Murray 					FORMAT_IISSGC : informat), 1,
2935c87c606SMark Murray 				passin, e, "Private Key");
2945c87c606SMark Murray 
2955c87c606SMark Murray 		if (pkey != NULL)
296*1f13597dSJung-uk Kim 			rsa = EVP_PKEY_get1_RSA(pkey);
2975c87c606SMark Murray 		EVP_PKEY_free(pkey);
29874664626SKris Kennaway 	}
29974664626SKris Kennaway 
30074664626SKris Kennaway 	if (rsa == NULL)
30174664626SKris Kennaway 		{
30274664626SKris Kennaway 		ERR_print_errors(bio_err);
30374664626SKris Kennaway 		goto end;
30474664626SKris Kennaway 		}
30574664626SKris Kennaway 
30674664626SKris Kennaway 	if (outfile == NULL)
307ddd58736SKris Kennaway 		{
30874664626SKris Kennaway 		BIO_set_fp(out,stdout,BIO_NOCLOSE);
3095c87c606SMark Murray #ifdef OPENSSL_SYS_VMS
310ddd58736SKris Kennaway 		{
311ddd58736SKris Kennaway 		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
312ddd58736SKris Kennaway 		out = BIO_push(tmpbio, out);
313ddd58736SKris Kennaway 		}
314ddd58736SKris Kennaway #endif
315ddd58736SKris Kennaway 		}
31674664626SKris Kennaway 	else
31774664626SKris Kennaway 		{
31874664626SKris Kennaway 		if (BIO_write_filename(out,outfile) <= 0)
31974664626SKris Kennaway 			{
32074664626SKris Kennaway 			perror(outfile);
32174664626SKris Kennaway 			goto end;
32274664626SKris Kennaway 			}
32374664626SKris Kennaway 		}
32474664626SKris Kennaway 
32574664626SKris Kennaway 	if (text)
32674664626SKris Kennaway 		if (!RSA_print(out,rsa,0))
32774664626SKris Kennaway 			{
32874664626SKris Kennaway 			perror(outfile);
32974664626SKris Kennaway 			ERR_print_errors(bio_err);
33074664626SKris Kennaway 			goto end;
33174664626SKris Kennaway 			}
33274664626SKris Kennaway 
33374664626SKris Kennaway 	if (modulus)
33474664626SKris Kennaway 		{
335f579bf8eSKris Kennaway 		BIO_printf(out,"Modulus=");
33674664626SKris Kennaway 		BN_print(out,rsa->n);
337f579bf8eSKris Kennaway 		BIO_printf(out,"\n");
33874664626SKris Kennaway 		}
33974664626SKris Kennaway 
34074664626SKris Kennaway 	if (check)
34174664626SKris Kennaway 		{
34274664626SKris Kennaway 		int r = RSA_check_key(rsa);
34374664626SKris Kennaway 
34474664626SKris Kennaway 		if (r == 1)
34574664626SKris Kennaway 			BIO_printf(out,"RSA key ok\n");
34674664626SKris Kennaway 		else if (r == 0)
34774664626SKris Kennaway 			{
3483b4e3dcbSSimon L. B. Nielsen 			unsigned long err;
34974664626SKris Kennaway 
3505c87c606SMark Murray 			while ((err = ERR_peek_error()) != 0 &&
3515c87c606SMark Murray 				ERR_GET_LIB(err) == ERR_LIB_RSA &&
3525c87c606SMark Murray 				ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
3535c87c606SMark Murray 				ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE)
35474664626SKris Kennaway 				{
3555c87c606SMark Murray 				BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(err));
35674664626SKris Kennaway 				ERR_get_error(); /* remove e from error stack */
35774664626SKris Kennaway 				}
35874664626SKris Kennaway 			}
35974664626SKris Kennaway 
36074664626SKris Kennaway 		if (r == -1 || ERR_peek_error() != 0) /* should happen only if r == -1 */
36174664626SKris Kennaway 			{
36274664626SKris Kennaway 			ERR_print_errors(bio_err);
36374664626SKris Kennaway 			goto end;
36474664626SKris Kennaway 			}
36574664626SKris Kennaway 		}
36674664626SKris Kennaway 
367f579bf8eSKris Kennaway 	if (noout)
368f579bf8eSKris Kennaway 		{
369f579bf8eSKris Kennaway 		ret = 0;
370f579bf8eSKris Kennaway 		goto end;
371f579bf8eSKris Kennaway 		}
372f579bf8eSKris Kennaway 	BIO_printf(bio_err,"writing RSA key\n");
373f579bf8eSKris Kennaway 	if 	(outformat == FORMAT_ASN1) {
374*1f13597dSJung-uk Kim 		if(pubout || pubin)
375*1f13597dSJung-uk Kim 			{
376*1f13597dSJung-uk Kim 			if (pubout == 2)
377*1f13597dSJung-uk Kim 				i=i2d_RSAPublicKey_bio(out,rsa);
378*1f13597dSJung-uk Kim 			else
379*1f13597dSJung-uk Kim 				i=i2d_RSA_PUBKEY_bio(out,rsa);
380*1f13597dSJung-uk Kim 			}
381f579bf8eSKris Kennaway 		else i=i2d_RSAPrivateKey_bio(out,rsa);
382f579bf8eSKris Kennaway 	}
3835c87c606SMark Murray #ifndef OPENSSL_NO_RC4
38474664626SKris Kennaway 	else if (outformat == FORMAT_NETSCAPE)
38574664626SKris Kennaway 		{
38674664626SKris Kennaway 		unsigned char *p,*pp;
38774664626SKris Kennaway 		int size;
38874664626SKris Kennaway 
38974664626SKris Kennaway 		i=1;
390ddd58736SKris Kennaway 		size=i2d_RSA_NET(rsa,NULL,NULL, sgckey);
391ddd58736SKris Kennaway 		if ((p=(unsigned char *)OPENSSL_malloc(size)) == NULL)
39274664626SKris Kennaway 			{
393ddd58736SKris Kennaway 			BIO_printf(bio_err,"Memory allocation failure\n");
39474664626SKris Kennaway 			goto end;
39574664626SKris Kennaway 			}
39674664626SKris Kennaway 		pp=p;
397ddd58736SKris Kennaway 		i2d_RSA_NET(rsa,&p,NULL, sgckey);
39874664626SKris Kennaway 		BIO_write(out,(char *)pp,size);
399ddd58736SKris Kennaway 		OPENSSL_free(pp);
40074664626SKris Kennaway 		}
40174664626SKris Kennaway #endif
402f579bf8eSKris Kennaway 	else if (outformat == FORMAT_PEM) {
403f579bf8eSKris Kennaway 		if(pubout || pubin)
404*1f13597dSJung-uk Kim 			{
405*1f13597dSJung-uk Kim 			if (pubout == 2)
406*1f13597dSJung-uk Kim 		    		i=PEM_write_bio_RSAPublicKey(out,rsa);
407*1f13597dSJung-uk Kim 			else
408f579bf8eSKris Kennaway 		    		i=PEM_write_bio_RSA_PUBKEY(out,rsa);
409*1f13597dSJung-uk Kim 			}
410f579bf8eSKris Kennaway 		else i=PEM_write_bio_RSAPrivateKey(out,rsa,
411f579bf8eSKris Kennaway 						enc,NULL,0,NULL,passout);
412*1f13597dSJung-uk Kim #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
413*1f13597dSJung-uk Kim 	} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
414*1f13597dSJung-uk Kim 		EVP_PKEY *pk;
415*1f13597dSJung-uk Kim 		pk = EVP_PKEY_new();
416*1f13597dSJung-uk Kim 		EVP_PKEY_set1_RSA(pk, rsa);
417*1f13597dSJung-uk Kim 		if (outformat == FORMAT_PVK)
418*1f13597dSJung-uk Kim 			i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
419*1f13597dSJung-uk Kim 		else if (pubin || pubout)
420*1f13597dSJung-uk Kim 			i = i2b_PublicKey_bio(out, pk);
421*1f13597dSJung-uk Kim 		else
422*1f13597dSJung-uk Kim 			i = i2b_PrivateKey_bio(out, pk);
423*1f13597dSJung-uk Kim 		EVP_PKEY_free(pk);
424*1f13597dSJung-uk Kim #endif
425f579bf8eSKris Kennaway 	} else	{
42674664626SKris Kennaway 		BIO_printf(bio_err,"bad output format specified for outfile\n");
42774664626SKris Kennaway 		goto end;
42874664626SKris Kennaway 		}
429*1f13597dSJung-uk Kim 	if (i <= 0)
43074664626SKris Kennaway 		{
431f579bf8eSKris Kennaway 		BIO_printf(bio_err,"unable to write key\n");
43274664626SKris Kennaway 		ERR_print_errors(bio_err);
43374664626SKris Kennaway 		}
43474664626SKris Kennaway 	else
43574664626SKris Kennaway 		ret=0;
43674664626SKris Kennaway end:
437ddd58736SKris Kennaway 	if(out != NULL) BIO_free_all(out);
43874664626SKris Kennaway 	if(rsa != NULL) RSA_free(rsa);
439ddd58736SKris Kennaway 	if(passin) OPENSSL_free(passin);
440ddd58736SKris Kennaway 	if(passout) OPENSSL_free(passout);
4415c87c606SMark Murray 	apps_shutdown();
4425c87c606SMark Murray 	OPENSSL_EXIT(ret);
44374664626SKris Kennaway 	}
4445c87c606SMark Murray #else /* !OPENSSL_NO_RSA */
445f579bf8eSKris Kennaway 
446f579bf8eSKris Kennaway # if PEDANTIC
447f579bf8eSKris Kennaway static void *dummy=&dummy;
448f579bf8eSKris Kennaway # endif
449f579bf8eSKris Kennaway 
45074664626SKris Kennaway #endif
451