xref: /titanic_51/usr/src/cmd/cmd-crypto/pktool/export.c (revision 25c28e83beb90e7c80452a7c818c5e6f73a07dc8)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  *
21  * Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
22  * Copyright 2012 Milan Jurik. All rights reserved.
23  */
24 
25 /*
26  * This file implements the export operation for this tool.
27  * The basic flow of the process is to find the soft token,
28  * log into it, find the PKCS#11 objects in the soft token
29  * to be exported matching keys with their certificates, export
30  * them to the PKCS#12 file encrypting them with a file password
31  * if desired, and log out.
32  */
33 
34 #include <stdio.h>
35 #include <stdlib.h>
36 #include <string.h>
37 #include <errno.h>
38 #include <fcntl.h>
39 #include "common.h"
40 
41 #include <kmfapi.h>
42 
43 static KMF_RETURN
44 pk_find_export_cert(KMF_HANDLE_T kmfhandle, KMF_ATTRIBUTE *attrlist,
45 	int numattr, KMF_X509_DER_CERT *cert)
46 {
47 	KMF_RETURN rv = KMF_OK;
48 	uint32_t numcerts = 0;
49 
50 	numcerts = 0;
51 	(void) memset(cert, 0, sizeof (KMF_X509_DER_CERT));
52 
53 	kmf_set_attr_at_index(attrlist, numattr, KMF_COUNT_ATTR,
54 	    &numcerts, sizeof (uint32_t));
55 	numattr++;
56 
57 	rv = kmf_find_cert(kmfhandle, numattr, attrlist);
58 	if (rv != KMF_OK) {
59 		return (rv);
60 	}
61 	if (numcerts == 0) {
62 		cryptoerror(LOG_STDERR,
63 		    gettext("No matching certificates found."));
64 		return (KMF_ERR_CERT_NOT_FOUND);
65 
66 	} else if (numcerts == 1) {
67 		kmf_set_attr_at_index(attrlist, numattr,
68 		    KMF_X509_DER_CERT_ATTR, cert,
69 		    sizeof (KMF_X509_DER_CERT));
70 		numattr++;
71 		rv = kmf_find_cert(kmfhandle, numattr, attrlist);
72 
73 	} else if (numcerts > 1) {
74 		cryptoerror(LOG_STDERR,
75 		    gettext("%d certificates found, refine the "
76 		    "search parameters to eliminate ambiguity\n"),
77 		    numcerts);
78 		return (KMF_ERR_BAD_PARAMETER);
79 	}
80 	return (rv);
81 }
82 
83 static KMF_RETURN
84 pk_export_file_objects(KMF_HANDLE_T kmfhandle, int oclass,
85 	char *issuer, char *subject, KMF_BIGINT *serial,
86 	char *infile, char *filename)
87 {
88 	KMF_RETURN rv = KMF_OK;
89 	KMF_X509_DER_CERT kmfcert;
90 	KMF_KEYSTORE_TYPE kstype = KMF_KEYSTORE_OPENSSL;
91 	int numattr = 0;
92 	KMF_ATTRIBUTE attrlist[16];
93 
94 	/* If searching for public objects or certificates, find certs now */
95 	if (oclass & (PK_CERT_OBJ | PK_PUBLIC_OBJ)) {
96 		kmf_set_attr_at_index(attrlist, numattr,
97 		    KMF_KEYSTORE_TYPE_ATTR, &kstype,
98 		    sizeof (kstype));
99 		numattr++;
100 
101 		if (issuer != NULL) {
102 			kmf_set_attr_at_index(attrlist, numattr,
103 			    KMF_ISSUER_NAME_ATTR, issuer,
104 			    strlen(issuer));
105 			numattr++;
106 		}
107 
108 		if (subject != NULL) {
109 			kmf_set_attr_at_index(attrlist, numattr,
110 			    KMF_SUBJECT_NAME_ATTR, subject,
111 			    strlen(subject));
112 			numattr++;
113 		}
114 
115 		if (serial != NULL) {
116 			kmf_set_attr_at_index(attrlist, numattr,
117 			    KMF_BIGINT_ATTR, serial,
118 			    sizeof (KMF_BIGINT));
119 			numattr++;
120 		}
121 
122 		if (infile != NULL) {
123 			kmf_set_attr_at_index(attrlist, numattr,
124 			    KMF_CERT_FILENAME_ATTR, infile,
125 			    strlen(infile));
126 			numattr++;
127 		}
128 
129 		rv = pk_find_export_cert(kmfhandle, attrlist, numattr,
130 		    &kmfcert);
131 		if (rv == KMF_OK) {
132 			kstype = KMF_KEYSTORE_OPENSSL;
133 			numattr = 0;
134 
135 			kmf_set_attr_at_index(attrlist, numattr,
136 			    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
137 			numattr++;
138 
139 			kmf_set_attr_at_index(attrlist, numattr,
140 			    KMF_CERT_DATA_ATTR, &kmfcert.certificate,
141 			    sizeof (KMF_DATA));
142 			numattr++;
143 
144 			kmf_set_attr_at_index(attrlist, numattr,
145 			    KMF_CERT_FILENAME_ATTR, filename,
146 			    strlen(filename));
147 			numattr++;
148 
149 			rv = kmf_store_cert(kmfhandle, numattr,
150 			    attrlist);
151 
152 			kmf_free_kmf_cert(kmfhandle, &kmfcert);
153 		}
154 	}
155 	return (rv);
156 }
157 
158 static KMF_RETURN
159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle,
160 	char *token_spec, char *dir, char *prefix,
161 	char *certlabel, char *issuer, char *subject,
162 	KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred,
163 	char *filename)
164 {
165 	KMF_RETURN rv = KMF_OK;
166 	KMF_KEYSTORE_TYPE kstype;
167 	KMF_CREDENTIAL p12cred = { NULL, 0};
168 	KMF_ATTRIBUTE attrlist[16];
169 	int numattr = 0;
170 
171 	rv = configure_nss(kmfhandle, dir, prefix);
172 	if (rv != KMF_OK)
173 		return (rv);
174 
175 	if (token_spec == NULL)
176 		token_spec = DEFAULT_NSS_TOKEN;
177 
178 	kstype = KMF_KEYSTORE_NSS;
179 	kmf_set_attr_at_index(attrlist, numattr,
180 	    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
181 	numattr++;
182 
183 	if (certlabel != NULL) {
184 		kmf_set_attr_at_index(attrlist, numattr,
185 		    KMF_CERT_LABEL_ATTR, certlabel, strlen(certlabel));
186 		numattr++;
187 	}
188 
189 	if (issuer != NULL) {
190 		kmf_set_attr_at_index(attrlist, numattr,
191 		    KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer));
192 		numattr++;
193 	}
194 
195 	if (subject != NULL) {
196 		kmf_set_attr_at_index(attrlist, numattr,
197 		    KMF_SUBJECT_NAME_ATTR, subject, strlen(subject));
198 		numattr++;
199 	}
200 
201 	if (serial != NULL) {
202 		kmf_set_attr_at_index(attrlist, numattr,
203 		    KMF_BIGINT_ATTR, serial, sizeof (KMF_BIGINT));
204 		numattr++;
205 	}
206 
207 	if (tokencred != NULL) {
208 		kmf_set_attr_at_index(attrlist, numattr,
209 		    KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL));
210 		numattr++;
211 	}
212 
213 	kmf_set_attr_at_index(attrlist, numattr, KMF_TOKEN_LABEL_ATTR,
214 	    token_spec, strlen(token_spec));
215 	numattr++;
216 
217 	(void) get_pk12_password(&p12cred);
218 	kmf_set_attr_at_index(attrlist, numattr,
219 	    KMF_PK12CRED_ATTR, &p12cred, sizeof (KMF_CREDENTIAL));
220 	numattr++;
221 
222 	kmf_set_attr_at_index(attrlist, numattr,
223 	    KMF_OUTPUT_FILENAME_ATTR, filename, strlen(filename));
224 	numattr++;
225 
226 	rv = kmf_export_pk12(kmfhandle, numattr, attrlist);
227 
228 	if (p12cred.cred)
229 		free(p12cred.cred);
230 
231 	return (rv);
232 }
233 
234 static KMF_RETURN
235 pk_export_pk12_files(KMF_HANDLE_T kmfhandle,
236 	char *certfile, char *keyfile,
237 	char *outfile)
238 {
239 	KMF_RETURN rv;
240 	KMF_KEYSTORE_TYPE kstype;
241 	KMF_CREDENTIAL p12cred = { NULL, 0};
242 	KMF_ATTRIBUTE attrlist[16];
243 	int numattr = 0;
244 
245 	kstype = KMF_KEYSTORE_OPENSSL;
246 	kmf_set_attr_at_index(attrlist, numattr,
247 	    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
248 	numattr++;
249 
250 	if (certfile != NULL) {
251 		kmf_set_attr_at_index(attrlist, numattr,
252 		    KMF_CERT_FILENAME_ATTR, certfile, strlen(certfile));
253 		numattr++;
254 	}
255 
256 	if (keyfile != NULL) {
257 		kmf_set_attr_at_index(attrlist, numattr,
258 		    KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile));
259 		numattr++;
260 	}
261 
262 	(void) get_pk12_password(&p12cred);
263 	kmf_set_attr_at_index(attrlist, numattr,
264 	    KMF_PK12CRED_ATTR, &p12cred, sizeof (KMF_CREDENTIAL));
265 	numattr++;
266 
267 	kmf_set_attr_at_index(attrlist, numattr,
268 	    KMF_OUTPUT_FILENAME_ATTR, outfile, strlen(outfile));
269 	numattr++;
270 
271 	rv = kmf_export_pk12(kmfhandle, numattr, attrlist);
272 
273 	if (p12cred.cred)
274 		free(p12cred.cred);
275 
276 	return (rv);
277 }
278 
279 static KMF_RETURN
280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec,
281 	int oclass, char *certlabel, char *issuer, char *subject,
282 	KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *dir,
283 	char *prefix, char *filename)
284 {
285 	KMF_RETURN rv = KMF_OK;
286 	KMF_X509_DER_CERT kmfcert;
287 	KMF_KEYSTORE_TYPE kstype = KMF_KEYSTORE_NSS;
288 	KMF_ATTRIBUTE attrlist[16];
289 	int numattr = 0;
290 
291 	rv = configure_nss(kmfhandle, dir, prefix);
292 	if (rv != KMF_OK)
293 		return (rv);
294 
295 	/* If searching for public objects or certificates, find certs now */
296 	if (oclass & (PK_CERT_OBJ | PK_PUBLIC_OBJ)) {
297 		kmf_set_attr_at_index(attrlist, numattr,
298 		    KMF_KEYSTORE_TYPE_ATTR, &kstype,
299 		    sizeof (kstype));
300 		numattr++;
301 
302 		if (certlabel != NULL) {
303 			kmf_set_attr_at_index(attrlist, numattr,
304 			    KMF_CERT_LABEL_ATTR, certlabel,
305 			    strlen(certlabel));
306 			numattr++;
307 		}
308 
309 		if (issuer != NULL) {
310 			kmf_set_attr_at_index(attrlist, numattr,
311 			    KMF_ISSUER_NAME_ATTR, issuer,
312 			    strlen(issuer));
313 			numattr++;
314 		}
315 
316 		if (subject != NULL) {
317 			kmf_set_attr_at_index(attrlist, numattr,
318 			    KMF_SUBJECT_NAME_ATTR, subject,
319 			    strlen(subject));
320 			numattr++;
321 		}
322 
323 		if (serial != NULL) {
324 			kmf_set_attr_at_index(attrlist, numattr,
325 			    KMF_BIGINT_ATTR, serial,
326 			    sizeof (KMF_BIGINT));
327 			numattr++;
328 		}
329 
330 		if (token_spec != NULL) {
331 			kmf_set_attr_at_index(attrlist, numattr,
332 			    KMF_TOKEN_LABEL_ATTR, token_spec,
333 			    strlen(token_spec));
334 			numattr++;
335 		}
336 
337 		rv = pk_find_export_cert(kmfhandle, attrlist, numattr,
338 		    &kmfcert);
339 		if (rv == KMF_OK) {
340 			kstype = KMF_KEYSTORE_OPENSSL;
341 			numattr = 0;
342 
343 			kmf_set_attr_at_index(attrlist, numattr,
344 			    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
345 			numattr++;
346 
347 			kmf_set_attr_at_index(attrlist, numattr,
348 			    KMF_CERT_DATA_ATTR, &kmfcert.certificate,
349 			    sizeof (KMF_DATA));
350 			numattr++;
351 
352 			kmf_set_attr_at_index(attrlist, numattr,
353 			    KMF_CERT_FILENAME_ATTR, filename,
354 			    strlen(filename));
355 			numattr++;
356 
357 			kmf_set_attr_at_index(attrlist, numattr,
358 			    KMF_ENCODE_FORMAT_ATTR, &kfmt, sizeof (kfmt));
359 			numattr++;
360 
361 			rv = kmf_store_cert(kmfhandle, numattr, attrlist);
362 
363 			kmf_free_kmf_cert(kmfhandle, &kmfcert);
364 		}
365 	}
366 	return (rv);
367 }
368 
369 static KMF_RETURN
370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec,
371 	char *certlabel, char *issuer, char *subject,
372 	KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename)
373 {
374 	KMF_RETURN rv = KMF_OK;
375 	KMF_KEYSTORE_TYPE kstype;
376 	KMF_CREDENTIAL p12cred = { NULL, 0};
377 	KMF_ATTRIBUTE attrlist[16];
378 	int numattr = 0;
379 
380 	rv = select_token(kmfhandle, token_spec, TRUE);
381 	if (rv != KMF_OK) {
382 		return (rv);
383 	}
384 
385 	kstype = KMF_KEYSTORE_PK11TOKEN;
386 	kmf_set_attr_at_index(attrlist, numattr,
387 	    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
388 	numattr++;
389 
390 	if (certlabel != NULL) {
391 		kmf_set_attr_at_index(attrlist, numattr,
392 		    KMF_CERT_LABEL_ATTR, certlabel, strlen(certlabel));
393 		numattr++;
394 	}
395 
396 	if (issuer != NULL) {
397 		kmf_set_attr_at_index(attrlist, numattr,
398 		    KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer));
399 		numattr++;
400 	}
401 
402 	if (subject != NULL) {
403 		kmf_set_attr_at_index(attrlist, numattr,
404 		    KMF_SUBJECT_NAME_ATTR, subject, strlen(subject));
405 		numattr++;
406 	}
407 
408 	if (serial != NULL) {
409 		kmf_set_attr_at_index(attrlist, numattr,
410 		    KMF_BIGINT_ATTR, serial, sizeof (KMF_BIGINT));
411 		numattr++;
412 	}
413 
414 	if (tokencred != NULL) {
415 		kmf_set_attr_at_index(attrlist, numattr,
416 		    KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL));
417 		numattr++;
418 	}
419 
420 	(void) get_pk12_password(&p12cred);
421 	kmf_set_attr_at_index(attrlist, numattr,
422 	    KMF_PK12CRED_ATTR, &p12cred, sizeof (KMF_CREDENTIAL));
423 	numattr++;
424 
425 	kmf_set_attr_at_index(attrlist, numattr,
426 	    KMF_OUTPUT_FILENAME_ATTR, filename, strlen(filename));
427 	numattr++;
428 
429 	rv = kmf_export_pk12(kmfhandle, numattr, attrlist);
430 
431 	if (p12cred.cred)
432 		free(p12cred.cred);
433 
434 	return (rv);
435 }
436 
437 static KMF_RETURN
438 pk_export_pk11_keys(KMF_HANDLE_T kmfhandle, char *token,
439 	KMF_CREDENTIAL *cred, KMF_ENCODE_FORMAT format,
440 	char *label, char *filename, int oclass)
441 {
442 	KMF_RETURN rv = KMF_OK;
443 	KMF_KEYSTORE_TYPE kstype = KMF_KEYSTORE_PK11TOKEN;
444 	KMF_KEY_CLASS kclass = KMF_KEYCLASS_NONE;
445 	int numattr = 0;
446 	uint32_t numkeys = 1;
447 	KMF_ATTRIBUTE attrlist[16];
448 	KMF_KEY_HANDLE key;
449 	boolean_t is_token = B_TRUE;
450 
451 	if (EMPTYSTRING(label)) {
452 		cryptoerror(LOG_STDERR, gettext("A label "
453 		    "must be specified to export a key."));
454 		return (KMF_ERR_BAD_PARAMETER);
455 	}
456 
457 	rv = select_token(kmfhandle, token, TRUE);
458 	if (rv != KMF_OK) {
459 		return (rv);
460 	}
461 
462 	kmf_set_attr_at_index(attrlist, numattr, KMF_KEYSTORE_TYPE_ATTR,
463 	    &kstype, sizeof (kstype));
464 	numattr++;
465 
466 	if (cred != NULL) {
467 		kmf_set_attr_at_index(attrlist, numattr, KMF_CREDENTIAL_ATTR,
468 		    cred, sizeof (KMF_CREDENTIAL));
469 		numattr++;
470 	}
471 
472 	kmf_set_attr_at_index(attrlist, numattr, KMF_KEYLABEL_ATTR,
473 	    label, strlen(label));
474 	numattr++;
475 
476 	kmf_set_attr_at_index(attrlist, numattr, KMF_COUNT_ATTR,
477 	    &numkeys, sizeof (numkeys));
478 	numattr++;
479 
480 	kmf_set_attr_at_index(attrlist, numattr, KMF_KEY_HANDLE_ATTR,
481 	    &key, sizeof (key));
482 	numattr++;
483 
484 	kmf_set_attr_at_index(attrlist, numattr, KMF_TOKEN_BOOL_ATTR,
485 	    &is_token, sizeof (is_token));
486 	numattr++;
487 
488 	kmf_set_attr_at_index(attrlist, numattr, KMF_ENCODE_FORMAT_ATTR,
489 	    &format, sizeof (format));
490 	numattr++;
491 
492 	/* Check to see if we are exporting private or public only */
493 	if ((oclass & PK_KEY_OBJ) == PK_PRIKEY_OBJ)
494 		kclass = KMF_ASYM_PRI;
495 	else if ((oclass & PK_KEY_OBJ) == PK_PUBKEY_OBJ)
496 		kclass = KMF_ASYM_PUB;
497 	else if ((oclass & PK_KEY_OBJ) == PK_SYMKEY_OBJ)
498 		kclass = KMF_SYMMETRIC;
499 	else /* only 1 key at a time can be exported here, so default to pri */
500 		kclass = KMF_ASYM_PRI;
501 
502 	kmf_set_attr_at_index(attrlist, numattr, KMF_KEYCLASS_ATTR,
503 	    &kclass, sizeof (kclass));
504 	numattr++;
505 
506 	rv = kmf_find_key(kmfhandle, numattr, attrlist);
507 	/*
508 	 * If nothing found but caller wanted ALL keys, try symmetric
509 	 * this time.
510 	 */
511 	if (rv == KMF_ERR_KEY_NOT_FOUND && (oclass == PK_KEY_OBJ)) {
512 		kclass = KMF_SYMMETRIC;
513 		rv = kmf_find_key(kmfhandle, numattr, attrlist);
514 	}
515 	/*
516 	 * If nothing found but caller wanted ALL keys, try asymmetric
517 	 * public this time.
518 	 */
519 	if (rv == KMF_ERR_KEY_NOT_FOUND && (oclass == PK_KEY_OBJ)) {
520 		kclass = KMF_ASYM_PUB;
521 		rv = kmf_find_key(kmfhandle, numattr, attrlist);
522 	}
523 	if (rv == KMF_OK && key.keyclass == KMF_SYMMETRIC) {
524 		KMF_RAW_SYM_KEY rkey;
525 
526 		(void) memset(&rkey, 0, sizeof (KMF_RAW_SYM_KEY));
527 		rv = kmf_get_sym_key_value(kmfhandle, &key, &rkey);
528 		if (rv == KMF_OK) {
529 			int fd, n, total = 0;
530 
531 			fd = open(filename, O_CREAT | O_RDWR |O_TRUNC, 0600);
532 			if (fd == -1) {
533 				rv = KMF_ERR_OPEN_FILE;
534 				goto done;
535 			}
536 			do {
537 				n = write(fd, rkey.keydata.val + total,
538 				    rkey.keydata.len - total);
539 				if (n < 0) {
540 					if (errno == EINTR)
541 						continue;
542 					(void) close(fd);
543 					rv = KMF_ERR_WRITE_FILE;
544 					goto done;
545 				}
546 				total += n;
547 
548 			} while (total < rkey.keydata.len);
549 			(void) close(fd);
550 		}
551 done:
552 		kmf_free_bigint(&rkey.keydata);
553 		kmf_free_kmf_key(kmfhandle, &key);
554 	} else if (rv == KMF_OK) {
555 		KMF_KEYSTORE_TYPE sslks = KMF_KEYSTORE_OPENSSL;
556 		(void) printf(gettext("Found %d asymmetric keys\n"), numkeys);
557 
558 		numattr = 0;
559 		kmf_set_attr_at_index(attrlist, numattr, KMF_KEYSTORE_TYPE_ATTR,
560 		    &sslks, sizeof (sslks));
561 		numattr++;
562 
563 		kmf_set_attr_at_index(attrlist, numattr, KMF_RAW_KEY_ATTR,
564 		    key.keyp, sizeof (KMF_RAW_KEY_DATA));
565 		numattr++;
566 
567 		kmf_set_attr_at_index(attrlist, numattr, KMF_ENCODE_FORMAT_ATTR,
568 		    &format, sizeof (format));
569 		numattr++;
570 
571 		kmf_set_attr_at_index(attrlist, numattr, KMF_KEY_FILENAME_ATTR,
572 		    filename, strlen(filename));
573 		numattr++;
574 
575 		kmf_set_attr_at_index(attrlist, numattr, KMF_KEYCLASS_ATTR,
576 		    &key.keyclass, sizeof (KMF_KEY_CLASS));
577 		numattr++;
578 
579 		rv = kmf_store_key(kmfhandle, numattr, attrlist);
580 		kmf_free_kmf_key(kmfhandle, &key);
581 	}
582 
583 	return (rv);
584 }
585 
586 static KMF_RETURN
587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec,
588 	KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject,
589 	KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt,
590 	char *filename)
591 {
592 	KMF_RETURN rv = KMF_OK;
593 	KMF_X509_DER_CERT kmfcert;
594 	KMF_KEYSTORE_TYPE kstype = KMF_KEYSTORE_PK11TOKEN;
595 	int numattr = 0;
596 	KMF_ATTRIBUTE attrlist[16];
597 
598 	rv = select_token(kmfhandle, token_spec, TRUE);
599 
600 	if (rv != KMF_OK)
601 		return (rv);
602 
603 	kmf_set_attr_at_index(attrlist, numattr, KMF_KEYSTORE_TYPE_ATTR,
604 	    &kstype, sizeof (kstype));
605 	numattr++;
606 
607 	if (cred != NULL) {
608 		kmf_set_attr_at_index(attrlist, numattr, KMF_CREDENTIAL_ATTR,
609 		    cred, sizeof (KMF_CREDENTIAL));
610 		numattr++;
611 	}
612 	if (certlabel != NULL) {
613 		kmf_set_attr_at_index(attrlist, numattr,
614 		    KMF_CERT_LABEL_ATTR, certlabel,
615 		    strlen(certlabel));
616 		numattr++;
617 	}
618 
619 	if (issuer != NULL) {
620 		kmf_set_attr_at_index(attrlist, numattr,
621 		    KMF_ISSUER_NAME_ATTR, issuer,
622 		    strlen(issuer));
623 		numattr++;
624 	}
625 
626 	if (subject != NULL) {
627 		kmf_set_attr_at_index(attrlist, numattr,
628 		    KMF_SUBJECT_NAME_ATTR, subject,
629 		    strlen(subject));
630 		numattr++;
631 	}
632 
633 	if (serial != NULL) {
634 		kmf_set_attr_at_index(attrlist, numattr,
635 		    KMF_BIGINT_ATTR, serial,
636 		    sizeof (KMF_BIGINT));
637 		numattr++;
638 	}
639 
640 	rv = pk_find_export_cert(kmfhandle, attrlist, numattr, &kmfcert);
641 
642 	if (rv == KMF_OK) {
643 		kstype = KMF_KEYSTORE_OPENSSL;
644 		numattr = 0;
645 
646 		kmf_set_attr_at_index(attrlist, numattr,
647 		    KMF_KEYSTORE_TYPE_ATTR, &kstype, sizeof (kstype));
648 		numattr++;
649 
650 		kmf_set_attr_at_index(attrlist, numattr,
651 		    KMF_CERT_DATA_ATTR, &kmfcert.certificate,
652 		    sizeof (KMF_DATA));
653 		numattr++;
654 
655 		kmf_set_attr_at_index(attrlist, numattr,
656 		    KMF_CERT_FILENAME_ATTR, filename, strlen(filename));
657 		numattr++;
658 
659 		kmf_set_attr_at_index(attrlist, numattr,
660 		    KMF_ENCODE_FORMAT_ATTR, &kfmt, sizeof (kfmt));
661 		numattr++;
662 
663 		rv = kmf_store_cert(kmfhandle, numattr, attrlist);
664 
665 		kmf_free_kmf_cert(kmfhandle, &kmfcert);
666 	}
667 	return (rv);
668 }
669 
670 /*
671  * Export objects from one keystore to a file.
672  */
673 int
674 pk_export(int argc, char *argv[])
675 {
676 	int		opt;
677 	extern int	optind_av;
678 	extern char	*optarg_av;
679 	char		*token_spec = NULL;
680 	char		*filename = NULL;
681 	char		*dir = NULL;
682 	char		*prefix = NULL;
683 	char		*certlabel = NULL;
684 	char		*subject = NULL;
685 	char		*issuer = NULL;
686 	char		*infile = NULL;
687 	char		*keyfile = NULL;
688 	char		*certfile = NULL;
689 	char		*serstr = NULL;
690 	KMF_KEYSTORE_TYPE	kstype = 0;
691 	KMF_ENCODE_FORMAT	kfmt = KMF_FORMAT_PKCS12;
692 	KMF_RETURN		rv = KMF_OK;
693 	int		oclass = PK_CERT_OBJ;
694 	KMF_BIGINT	serial = { NULL, 0 };
695 	KMF_HANDLE_T	kmfhandle = NULL;
696 	KMF_CREDENTIAL	tokencred = {NULL, 0};
697 
698 	/* Parse command line options.  Do NOT i18n/l10n. */
699 	while ((opt = getopt_av(argc, argv,
700 	    "k:(keystore)y:(objtype)T:(token)"
701 	    "d:(dir)p:(prefix)"
702 	    "l:(label)n:(nickname)s:(subject)"
703 	    "i:(issuer)S:(serial)"
704 	    "K:(keyfile)c:(certfile)"
705 	    "F:(outformat)"
706 	    "I:(infile)o:(outfile)")) != EOF) {
707 		if (EMPTYSTRING(optarg_av))
708 			return (PK_ERR_USAGE);
709 		switch (opt) {
710 		case 'k':
711 			kstype = KS2Int(optarg_av);
712 			if (kstype == 0)
713 				return (PK_ERR_USAGE);
714 			break;
715 		case 'y':
716 			oclass = OT2Int(optarg_av);
717 			if (oclass == -1)
718 				return (PK_ERR_USAGE);
719 			break;
720 		case 'T':	/* token specifier */
721 			if (token_spec)
722 				return (PK_ERR_USAGE);
723 			token_spec = optarg_av;
724 			break;
725 		case 'd':
726 			if (dir)
727 				return (PK_ERR_USAGE);
728 			dir = optarg_av;
729 			break;
730 		case 'p':
731 			if (prefix)
732 				return (PK_ERR_USAGE);
733 			prefix = optarg_av;
734 			break;
735 		case 'n':
736 		case 'l':
737 			if (certlabel)
738 				return (PK_ERR_USAGE);
739 			certlabel = optarg_av;
740 			break;
741 		case 's':
742 			if (subject)
743 				return (PK_ERR_USAGE);
744 			subject = optarg_av;
745 			break;
746 		case 'i':
747 			if (issuer)
748 				return (PK_ERR_USAGE);
749 			issuer = optarg_av;
750 			break;
751 		case 'S':
752 			serstr = optarg_av;
753 			break;
754 		case 'F':
755 			kfmt = Str2Format(optarg_av);
756 			if (kfmt == KMF_FORMAT_UNDEF)
757 				return (PK_ERR_USAGE);
758 			break;
759 		case 'I':	/* output file name */
760 			if (infile)
761 				return (PK_ERR_USAGE);
762 			infile = optarg_av;
763 			break;
764 		case 'o':	/* output file name */
765 			if (filename)
766 				return (PK_ERR_USAGE);
767 			filename = optarg_av;
768 			break;
769 		case 'c':	/* input cert file name */
770 			if (certfile)
771 				return (PK_ERR_USAGE);
772 			certfile = optarg_av;
773 			break;
774 		case 'K':	/* input key file name */
775 			if (keyfile)
776 				return (PK_ERR_USAGE);
777 			keyfile = optarg_av;
778 			break;
779 		default:
780 			return (PK_ERR_USAGE);
781 		}
782 	}
783 
784 	/* Assume keystore = PKCS#11 if not specified */
785 	if (kstype == 0)
786 		kstype = KMF_KEYSTORE_PK11TOKEN;
787 
788 	/* Filename arg is required. */
789 	if (EMPTYSTRING(filename)) {
790 		cryptoerror(LOG_STDERR, gettext("You must specify "
791 		    "an 'outfile' parameter when exporting.\n"));
792 		return (PK_ERR_USAGE);
793 	}
794 
795 	/* No additional args allowed. */
796 	argc -= optind_av;
797 	argv += optind_av;
798 	if (argc)
799 		return (PK_ERR_USAGE);
800 
801 	DIR_OPTION_CHECK(kstype, dir);
802 
803 	/* if PUBLIC or PRIVATE obj was given, the old syntax was used. */
804 	if ((oclass & (PK_PUBLIC_OBJ | PK_PRIVATE_OBJ)) &&
805 	    kstype != KMF_KEYSTORE_PK11TOKEN) {
806 
807 		(void) fprintf(stderr, gettext("The objtype parameter "
808 		    "is only relevant if keystore=pkcs11\n"));
809 		return (PK_ERR_USAGE);
810 	}
811 
812 	if (kstype == KMF_KEYSTORE_PK11TOKEN && EMPTYSTRING(token_spec))
813 		token_spec = PK_DEFAULT_PK11TOKEN;
814 	else if (kstype == KMF_KEYSTORE_NSS && EMPTYSTRING(token_spec))
815 		token_spec = DEFAULT_NSS_TOKEN;
816 
817 	if (kstype == KMF_KEYSTORE_OPENSSL) {
818 		if (kfmt != KMF_FORMAT_PKCS12) {
819 			cryptoerror(LOG_STDERR, gettext("PKCS12 "
820 			    "is the only export format "
821 			    "supported for the 'file' "
822 			    "keystore.\n"));
823 			return (PK_ERR_USAGE);
824 		}
825 		if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) {
826 			cryptoerror(LOG_STDERR, gettext("A cert file"
827 			    "and a key file must be specified "
828 			    "when exporting to PKCS12 from the "
829 			    "'file' keystore.\n"));
830 			return (PK_ERR_USAGE);
831 		}
832 	}
833 
834 	/* Check if the file exists */
835 	if (verify_file(filename) != KMF_OK) {
836 		cryptoerror(LOG_STDERR,
837 		    gettext("Warning: file \"%s\" exists, "
838 		    "will be overwritten."), filename);
839 		if (yesno(gettext("Continue with export? "),
840 		    gettext("Respond with yes or no.\n"), B_FALSE) == B_FALSE) {
841 			return (0);
842 		} else {
843 			/* remove the file */
844 			(void) unlink(filename);
845 		}
846 	}
847 
848 	if (serstr != NULL) {
849 		uchar_t *bytes = NULL;
850 		size_t bytelen;
851 
852 		rv = kmf_hexstr_to_bytes((uchar_t *)serstr, &bytes, &bytelen);
853 		if (rv != KMF_OK || bytes == NULL) {
854 			(void) fprintf(stderr, gettext("serial number "
855 			    "must be specified as a hex number "
856 			    "(ex: 0x0102030405ffeeddee)\n"));
857 			return (PK_ERR_USAGE);
858 		}
859 		serial.val = bytes;
860 		serial.len = bytelen;
861 	}
862 
863 	/*
864 	 * We need a password in the following situations:
865 	 * 1.  When accessing PKCS11 token
866 	 * 2.  If NSS keystore, when making a PKCS12 file or when
867 	 * accessing any private object or key.
868 	 */
869 	if (kstype == KMF_KEYSTORE_PK11TOKEN ||
870 	    ((kstype == KMF_KEYSTORE_NSS) &&
871 	    ((oclass & (PK_KEY_OBJ | PK_PRIVATE_OBJ)) ||
872 	    (kfmt == KMF_FORMAT_PKCS12)))) {
873 			(void) get_token_password(kstype, token_spec,
874 			    &tokencred);
875 	}
876 
877 	if ((rv = kmf_initialize(&kmfhandle, NULL, NULL)) != KMF_OK) {
878 		cryptoerror(LOG_STDERR, gettext("Error initializing "
879 		    "KMF: 0x%02x\n"), rv);
880 		return (rv);
881 	}
882 
883 	switch (kstype) {
884 		case KMF_KEYSTORE_PK11TOKEN:
885 			if (kfmt == KMF_FORMAT_PKCS12)
886 				rv = pk_export_pk12_pk11(kmfhandle,
887 				    token_spec, certlabel,
888 				    issuer, subject,
889 				    &serial, &tokencred,
890 				    filename);
891 			else if ((oclass & PK_KEY_OBJ) ||
892 			    kfmt == KMF_FORMAT_RAWKEY)
893 				rv = pk_export_pk11_keys(kmfhandle,
894 				    token_spec, &tokencred, kfmt,
895 				    certlabel, filename, oclass);
896 			else
897 				rv = pk_export_pk11_objects(kmfhandle,
898 				    token_spec, &tokencred, certlabel,
899 				    issuer, subject, &serial, kfmt,
900 				    filename);
901 			break;
902 		case KMF_KEYSTORE_NSS:
903 			if (dir == NULL)
904 				dir = PK_DEFAULT_DIRECTORY;
905 			if (kfmt == KMF_FORMAT_PKCS12)
906 				rv = pk_export_pk12_nss(kmfhandle,
907 				    token_spec, dir, prefix,
908 				    certlabel, issuer,
909 				    subject, &serial,
910 				    &tokencred, filename);
911 			else
912 				rv = pk_export_nss_objects(kmfhandle,
913 				    token_spec,
914 				    oclass, certlabel, issuer, subject,
915 				    &serial, kfmt, dir, prefix, filename);
916 			break;
917 		case KMF_KEYSTORE_OPENSSL:
918 			if (kfmt == KMF_FORMAT_PKCS12)
919 				rv = pk_export_pk12_files(kmfhandle,
920 				    certfile, keyfile, filename);
921 			else
922 				rv = pk_export_file_objects(kmfhandle, oclass,
923 				    issuer, subject, &serial,
924 				    infile, filename);
925 			break;
926 		default:
927 			rv = PK_ERR_USAGE;
928 			break;
929 	}
930 
931 	if (rv != KMF_OK) {
932 		display_error(kmfhandle, rv,
933 		    gettext("Error exporting objects"));
934 	}
935 
936 	if (serial.val != NULL)
937 		free(serial.val);
938 
939 	(void) kmf_finalize(kmfhandle);
940 
941 	return (rv);
942 }
943