1 /* 2 * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the OpenSSL license (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 #include <openssl/opensslconf.h> 11 #ifdef OPENSSL_NO_RSA 12 NON_EMPTY_TRANSLATION_UNIT 13 #else 14 15 # include <stdio.h> 16 # include <stdlib.h> 17 # include <string.h> 18 # include <time.h> 19 # include "apps.h" 20 # include "progs.h" 21 # include <openssl/bio.h> 22 # include <openssl/err.h> 23 # include <openssl/rsa.h> 24 # include <openssl/evp.h> 25 # include <openssl/x509.h> 26 # include <openssl/pem.h> 27 # include <openssl/bn.h> 28 29 typedef enum OPTION_choice { 30 OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, 31 OPT_INFORM, OPT_OUTFORM, OPT_ENGINE, OPT_IN, OPT_OUT, 32 OPT_PUBIN, OPT_PUBOUT, OPT_PASSOUT, OPT_PASSIN, 33 OPT_RSAPUBKEY_IN, OPT_RSAPUBKEY_OUT, 34 /* Do not change the order here; see case statements below */ 35 OPT_PVK_NONE, OPT_PVK_WEAK, OPT_PVK_STRONG, 36 OPT_NOOUT, OPT_TEXT, OPT_MODULUS, OPT_CHECK, OPT_CIPHER 37 } OPTION_CHOICE; 38 39 const OPTIONS rsa_options[] = { 40 {"help", OPT_HELP, '-', "Display this summary"}, 41 {"inform", OPT_INFORM, 'f', "Input format, one of DER NET PEM"}, 42 {"outform", OPT_OUTFORM, 'f', "Output format, one of DER NET PEM PVK"}, 43 {"in", OPT_IN, 's', "Input file"}, 44 {"out", OPT_OUT, '>', "Output file"}, 45 {"pubin", OPT_PUBIN, '-', "Expect a public key in input file"}, 46 {"pubout", OPT_PUBOUT, '-', "Output a public key"}, 47 {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, 48 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 49 {"RSAPublicKey_in", OPT_RSAPUBKEY_IN, '-', "Input is an RSAPublicKey"}, 50 {"RSAPublicKey_out", OPT_RSAPUBKEY_OUT, '-', "Output is an RSAPublicKey"}, 51 {"noout", OPT_NOOUT, '-', "Don't print key out"}, 52 {"text", OPT_TEXT, '-', "Print the key in text"}, 53 {"modulus", OPT_MODULUS, '-', "Print the RSA key modulus"}, 54 {"check", OPT_CHECK, '-', "Verify key consistency"}, 55 {"", OPT_CIPHER, '-', "Any supported cipher"}, 56 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 57 {"pvk-strong", OPT_PVK_STRONG, '-', "Enable 'Strong' PVK encoding level (default)"}, 58 {"pvk-weak", OPT_PVK_WEAK, '-', "Enable 'Weak' PVK encoding level"}, 59 {"pvk-none", OPT_PVK_NONE, '-', "Don't enforce PVK encoding"}, 60 # endif 61 # ifndef OPENSSL_NO_ENGINE 62 {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, 63 # endif 64 {NULL} 65 }; 66 67 int rsa_main(int argc, char **argv) 68 { 69 ENGINE *e = NULL; 70 BIO *out = NULL; 71 RSA *rsa = NULL; 72 const EVP_CIPHER *enc = NULL; 73 char *infile = NULL, *outfile = NULL, *prog; 74 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; 75 int i, private = 0; 76 int informat = FORMAT_PEM, outformat = FORMAT_PEM, text = 0, check = 0; 77 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; 78 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 79 int pvk_encr = 2; 80 # endif 81 OPTION_CHOICE o; 82 83 prog = opt_init(argc, argv, rsa_options); 84 while ((o = opt_next()) != OPT_EOF) { 85 switch (o) { 86 case OPT_EOF: 87 case OPT_ERR: 88 opthelp: 89 BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); 90 goto end; 91 case OPT_HELP: 92 opt_help(rsa_options); 93 ret = 0; 94 goto end; 95 case OPT_INFORM: 96 if (!opt_format(opt_arg(), OPT_FMT_ANY, &informat)) 97 goto opthelp; 98 break; 99 case OPT_IN: 100 infile = opt_arg(); 101 break; 102 case OPT_OUTFORM: 103 if (!opt_format(opt_arg(), OPT_FMT_ANY, &outformat)) 104 goto opthelp; 105 break; 106 case OPT_OUT: 107 outfile = opt_arg(); 108 break; 109 case OPT_PASSIN: 110 passinarg = opt_arg(); 111 break; 112 case OPT_PASSOUT: 113 passoutarg = opt_arg(); 114 break; 115 case OPT_ENGINE: 116 e = setup_engine(opt_arg(), 0); 117 break; 118 case OPT_PUBIN: 119 pubin = 1; 120 break; 121 case OPT_PUBOUT: 122 pubout = 1; 123 break; 124 case OPT_RSAPUBKEY_IN: 125 pubin = 2; 126 break; 127 case OPT_RSAPUBKEY_OUT: 128 pubout = 2; 129 break; 130 case OPT_PVK_STRONG: /* pvk_encr:= 2 */ 131 case OPT_PVK_WEAK: /* pvk_encr:= 1 */ 132 case OPT_PVK_NONE: /* pvk_encr:= 0 */ 133 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 134 pvk_encr = (o - OPT_PVK_NONE); 135 # endif 136 break; 137 case OPT_NOOUT: 138 noout = 1; 139 break; 140 case OPT_TEXT: 141 text = 1; 142 break; 143 case OPT_MODULUS: 144 modulus = 1; 145 break; 146 case OPT_CHECK: 147 check = 1; 148 break; 149 case OPT_CIPHER: 150 if (!opt_cipher(opt_unknown(), &enc)) 151 goto opthelp; 152 break; 153 } 154 } 155 argc = opt_num_rest(); 156 if (argc != 0) 157 goto opthelp; 158 159 private = (text && !pubin) || (!pubout && !noout) ? 1 : 0; 160 161 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { 162 BIO_printf(bio_err, "Error getting passwords\n"); 163 goto end; 164 } 165 if (check && pubin) { 166 BIO_printf(bio_err, "Only private keys can be checked\n"); 167 goto end; 168 } 169 170 { 171 EVP_PKEY *pkey; 172 173 if (pubin) { 174 int tmpformat = -1; 175 if (pubin == 2) { 176 if (informat == FORMAT_PEM) 177 tmpformat = FORMAT_PEMRSA; 178 else if (informat == FORMAT_ASN1) 179 tmpformat = FORMAT_ASN1RSA; 180 } else { 181 tmpformat = informat; 182 } 183 184 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "Public Key"); 185 } else { 186 pkey = load_key(infile, informat, 1, passin, e, "Private Key"); 187 } 188 189 if (pkey != NULL) 190 rsa = EVP_PKEY_get1_RSA(pkey); 191 EVP_PKEY_free(pkey); 192 } 193 194 if (rsa == NULL) { 195 ERR_print_errors(bio_err); 196 goto end; 197 } 198 199 out = bio_open_owner(outfile, outformat, private); 200 if (out == NULL) 201 goto end; 202 203 if (text) { 204 assert(pubin || private); 205 if (!RSA_print(out, rsa, 0)) { 206 perror(outfile); 207 ERR_print_errors(bio_err); 208 goto end; 209 } 210 } 211 212 if (modulus) { 213 const BIGNUM *n; 214 RSA_get0_key(rsa, &n, NULL, NULL); 215 BIO_printf(out, "Modulus="); 216 BN_print(out, n); 217 BIO_printf(out, "\n"); 218 } 219 220 if (check) { 221 int r = RSA_check_key_ex(rsa, NULL); 222 223 if (r == 1) { 224 BIO_printf(out, "RSA key ok\n"); 225 } else if (r == 0) { 226 unsigned long err; 227 228 while ((err = ERR_peek_error()) != 0 && 229 ERR_GET_LIB(err) == ERR_LIB_RSA && 230 ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY_EX && 231 ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) { 232 BIO_printf(out, "RSA key error: %s\n", 233 ERR_reason_error_string(err)); 234 ERR_get_error(); /* remove err from error stack */ 235 } 236 } else if (r == -1) { 237 ERR_print_errors(bio_err); 238 goto end; 239 } 240 } 241 242 if (noout) { 243 ret = 0; 244 goto end; 245 } 246 BIO_printf(bio_err, "writing RSA key\n"); 247 if (outformat == FORMAT_ASN1) { 248 if (pubout || pubin) { 249 if (pubout == 2) 250 i = i2d_RSAPublicKey_bio(out, rsa); 251 else 252 i = i2d_RSA_PUBKEY_bio(out, rsa); 253 } else { 254 assert(private); 255 i = i2d_RSAPrivateKey_bio(out, rsa); 256 } 257 } else if (outformat == FORMAT_PEM) { 258 if (pubout || pubin) { 259 if (pubout == 2) 260 i = PEM_write_bio_RSAPublicKey(out, rsa); 261 else 262 i = PEM_write_bio_RSA_PUBKEY(out, rsa); 263 } else { 264 assert(private); 265 i = PEM_write_bio_RSAPrivateKey(out, rsa, 266 enc, NULL, 0, NULL, passout); 267 } 268 # ifndef OPENSSL_NO_DSA 269 } else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) { 270 EVP_PKEY *pk; 271 pk = EVP_PKEY_new(); 272 EVP_PKEY_set1_RSA(pk, rsa); 273 if (outformat == FORMAT_PVK) { 274 if (pubin) { 275 BIO_printf(bio_err, "PVK form impossible with public key input\n"); 276 EVP_PKEY_free(pk); 277 goto end; 278 } 279 assert(private); 280 # ifdef OPENSSL_NO_RC4 281 BIO_printf(bio_err, "PVK format not supported\n"); 282 EVP_PKEY_free(pk); 283 goto end; 284 # else 285 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 286 # endif 287 } else if (pubin || pubout) { 288 i = i2b_PublicKey_bio(out, pk); 289 } else { 290 assert(private); 291 i = i2b_PrivateKey_bio(out, pk); 292 } 293 EVP_PKEY_free(pk); 294 # endif 295 } else { 296 BIO_printf(bio_err, "bad output format specified for outfile\n"); 297 goto end; 298 } 299 if (i <= 0) { 300 BIO_printf(bio_err, "unable to write key\n"); 301 ERR_print_errors(bio_err); 302 } else { 303 ret = 0; 304 } 305 end: 306 release_engine(e); 307 BIO_free_all(out); 308 RSA_free(rsa); 309 OPENSSL_free(passin); 310 OPENSSL_free(passout); 311 return ret; 312 } 313 #endif 314