xref: /dflybsd-src/crypto/libressl/apps/openssl/rsa.c (revision 961e30ea7dc61d1112b778ea4981eac68129fb86)
1*de0e0e4dSAntonio Huete Jimenez /* $OpenBSD: rsa.c,v 1.16 2022/01/14 09:26:41 tb Exp $ */
2f5b1c8a1SJohn Marino /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3f5b1c8a1SJohn Marino  * All rights reserved.
4f5b1c8a1SJohn Marino  *
5f5b1c8a1SJohn Marino  * This package is an SSL implementation written
6f5b1c8a1SJohn Marino  * by Eric Young (eay@cryptsoft.com).
7f5b1c8a1SJohn Marino  * The implementation was written so as to conform with Netscapes SSL.
8f5b1c8a1SJohn Marino  *
9f5b1c8a1SJohn Marino  * This library is free for commercial and non-commercial use as long as
10f5b1c8a1SJohn Marino  * the following conditions are aheared to.  The following conditions
11f5b1c8a1SJohn Marino  * apply to all code found in this distribution, be it the RC4, RSA,
12f5b1c8a1SJohn Marino  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13f5b1c8a1SJohn Marino  * included with this distribution is covered by the same copyright terms
14f5b1c8a1SJohn Marino  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15f5b1c8a1SJohn Marino  *
16f5b1c8a1SJohn Marino  * Copyright remains Eric Young's, and as such any Copyright notices in
17f5b1c8a1SJohn Marino  * the code are not to be removed.
18f5b1c8a1SJohn Marino  * If this package is used in a product, Eric Young should be given attribution
19f5b1c8a1SJohn Marino  * as the author of the parts of the library used.
20f5b1c8a1SJohn Marino  * This can be in the form of a textual message at program startup or
21f5b1c8a1SJohn Marino  * in documentation (online or textual) provided with the package.
22f5b1c8a1SJohn Marino  *
23f5b1c8a1SJohn Marino  * Redistribution and use in source and binary forms, with or without
24f5b1c8a1SJohn Marino  * modification, are permitted provided that the following conditions
25f5b1c8a1SJohn Marino  * are met:
26f5b1c8a1SJohn Marino  * 1. Redistributions of source code must retain the copyright
27f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer.
28f5b1c8a1SJohn Marino  * 2. Redistributions in binary form must reproduce the above copyright
29f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer in the
30f5b1c8a1SJohn Marino  *    documentation and/or other materials provided with the distribution.
31f5b1c8a1SJohn Marino  * 3. All advertising materials mentioning features or use of this software
32f5b1c8a1SJohn Marino  *    must display the following acknowledgement:
33f5b1c8a1SJohn Marino  *    "This product includes cryptographic software written by
34f5b1c8a1SJohn Marino  *     Eric Young (eay@cryptsoft.com)"
35f5b1c8a1SJohn Marino  *    The word 'cryptographic' can be left out if the rouines from the library
36f5b1c8a1SJohn Marino  *    being used are not cryptographic related :-).
37f5b1c8a1SJohn Marino  * 4. If you include any Windows specific code (or a derivative thereof) from
38f5b1c8a1SJohn Marino  *    the apps directory (application code) you must include an acknowledgement:
39f5b1c8a1SJohn Marino  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40f5b1c8a1SJohn Marino  *
41f5b1c8a1SJohn Marino  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42f5b1c8a1SJohn Marino  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43f5b1c8a1SJohn Marino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44f5b1c8a1SJohn Marino  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45f5b1c8a1SJohn Marino  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46f5b1c8a1SJohn Marino  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47f5b1c8a1SJohn Marino  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48f5b1c8a1SJohn Marino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49f5b1c8a1SJohn Marino  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50f5b1c8a1SJohn Marino  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51f5b1c8a1SJohn Marino  * SUCH DAMAGE.
52f5b1c8a1SJohn Marino  *
53f5b1c8a1SJohn Marino  * The licence and distribution terms for any publically available version or
54f5b1c8a1SJohn Marino  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55f5b1c8a1SJohn Marino  * copied and put under another distribution licence
56f5b1c8a1SJohn Marino  * [including the GNU Public Licence.]
57f5b1c8a1SJohn Marino  */
58f5b1c8a1SJohn Marino 
59f5b1c8a1SJohn Marino #include <openssl/opensslconf.h>
60f5b1c8a1SJohn Marino 
61f5b1c8a1SJohn Marino #include <stdio.h>
62f5b1c8a1SJohn Marino #include <stdlib.h>
63f5b1c8a1SJohn Marino #include <string.h>
64f5b1c8a1SJohn Marino #include <time.h>
65f5b1c8a1SJohn Marino 
66f5b1c8a1SJohn Marino #include "apps.h"
67f5b1c8a1SJohn Marino #include "progs.h"
68f5b1c8a1SJohn Marino 
69f5b1c8a1SJohn Marino #include <openssl/bio.h>
70f5b1c8a1SJohn Marino #include <openssl/bn.h>
71f5b1c8a1SJohn Marino #include <openssl/err.h>
72f5b1c8a1SJohn Marino #include <openssl/evp.h>
73f5b1c8a1SJohn Marino #include <openssl/pem.h>
74f5b1c8a1SJohn Marino #include <openssl/rsa.h>
75f5b1c8a1SJohn Marino #include <openssl/x509.h>
76f5b1c8a1SJohn Marino 
77f5b1c8a1SJohn Marino static struct {
78f5b1c8a1SJohn Marino 	int check;
79f5b1c8a1SJohn Marino 	const EVP_CIPHER *enc;
80f5b1c8a1SJohn Marino 	char *infile;
81f5b1c8a1SJohn Marino 	int informat;
82f5b1c8a1SJohn Marino 	int modulus;
83f5b1c8a1SJohn Marino 	int noout;
84f5b1c8a1SJohn Marino 	char *outfile;
85f5b1c8a1SJohn Marino 	int outformat;
86f5b1c8a1SJohn Marino 	char *passargin;
87f5b1c8a1SJohn Marino 	char *passargout;
88f5b1c8a1SJohn Marino 	int pubin;
89f5b1c8a1SJohn Marino 	int pubout;
90f5b1c8a1SJohn Marino 	int pvk_encr;
91f5b1c8a1SJohn Marino 	int text;
92f5b1c8a1SJohn Marino } rsa_config;
93f5b1c8a1SJohn Marino 
94f5b1c8a1SJohn Marino static int
rsa_opt_cipher(int argc,char ** argv,int * argsused)95f5b1c8a1SJohn Marino rsa_opt_cipher(int argc, char **argv, int *argsused)
96f5b1c8a1SJohn Marino {
97f5b1c8a1SJohn Marino 	char *name = argv[0];
98f5b1c8a1SJohn Marino 
99f5b1c8a1SJohn Marino 	if (*name++ != '-')
100f5b1c8a1SJohn Marino 		return (1);
101f5b1c8a1SJohn Marino 
102f5b1c8a1SJohn Marino 	if ((rsa_config.enc = EVP_get_cipherbyname(name)) == NULL) {
103f5b1c8a1SJohn Marino 		fprintf(stderr, "Invalid cipher '%s'\n", name);
104f5b1c8a1SJohn Marino 		return (1);
105f5b1c8a1SJohn Marino 	}
106f5b1c8a1SJohn Marino 
107f5b1c8a1SJohn Marino 	*argsused = 1;
108f5b1c8a1SJohn Marino 	return (0);
109f5b1c8a1SJohn Marino }
110f5b1c8a1SJohn Marino 
111cca6fc52SDaniel Fojt static const struct option rsa_options[] = {
112f5b1c8a1SJohn Marino 	{
113f5b1c8a1SJohn Marino 		.name = "check",
114f5b1c8a1SJohn Marino 		.desc = "Check consistency of RSA private key",
115f5b1c8a1SJohn Marino 		.type = OPTION_FLAG,
116f5b1c8a1SJohn Marino 		.opt.flag = &rsa_config.check,
117f5b1c8a1SJohn Marino 	},
118f5b1c8a1SJohn Marino 	{
119f5b1c8a1SJohn Marino 		.name = "in",
120f5b1c8a1SJohn Marino 		.argname = "file",
121f5b1c8a1SJohn Marino 		.desc = "Input file (default stdin)",
122f5b1c8a1SJohn Marino 		.type = OPTION_ARG,
123f5b1c8a1SJohn Marino 		.opt.arg = &rsa_config.infile,
124f5b1c8a1SJohn Marino 	},
125f5b1c8a1SJohn Marino 	{
126f5b1c8a1SJohn Marino 		.name = "inform",
127f5b1c8a1SJohn Marino 		.argname = "format",
128f5b1c8a1SJohn Marino 		.desc = "Input format (DER, NET or PEM (default))",
129f5b1c8a1SJohn Marino 		.type = OPTION_ARG_FORMAT,
130f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.informat,
131f5b1c8a1SJohn Marino 	},
132f5b1c8a1SJohn Marino 	{
133f5b1c8a1SJohn Marino 		.name = "modulus",
134f5b1c8a1SJohn Marino 		.desc = "Print the RSA key modulus",
135f5b1c8a1SJohn Marino 		.type = OPTION_FLAG,
136f5b1c8a1SJohn Marino 		.opt.flag = &rsa_config.modulus,
137f5b1c8a1SJohn Marino 	},
138f5b1c8a1SJohn Marino 	{
139f5b1c8a1SJohn Marino 		.name = "noout",
140f5b1c8a1SJohn Marino 		.desc = "Do not print encoded version of the key",
141f5b1c8a1SJohn Marino 		.type = OPTION_FLAG,
142f5b1c8a1SJohn Marino 		.opt.flag = &rsa_config.noout,
143f5b1c8a1SJohn Marino 	},
144f5b1c8a1SJohn Marino 	{
145f5b1c8a1SJohn Marino 		.name = "out",
146f5b1c8a1SJohn Marino 		.argname = "file",
147f5b1c8a1SJohn Marino 		.desc = "Output file (default stdout)",
148f5b1c8a1SJohn Marino 		.type = OPTION_ARG,
149f5b1c8a1SJohn Marino 		.opt.arg = &rsa_config.outfile,
150f5b1c8a1SJohn Marino 	},
151f5b1c8a1SJohn Marino 	{
152f5b1c8a1SJohn Marino 		.name = "outform",
153f5b1c8a1SJohn Marino 		.argname = "format",
154f5b1c8a1SJohn Marino 		.desc = "Output format (DER, NET or PEM (default PEM))",
155f5b1c8a1SJohn Marino 		.type = OPTION_ARG_FORMAT,
156f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.outformat,
157f5b1c8a1SJohn Marino 	},
158f5b1c8a1SJohn Marino 	{
159f5b1c8a1SJohn Marino 		.name = "passin",
160f5b1c8a1SJohn Marino 		.argname = "src",
161f5b1c8a1SJohn Marino 		.desc = "Input file passphrase source",
162f5b1c8a1SJohn Marino 		.type = OPTION_ARG,
163f5b1c8a1SJohn Marino 		.opt.arg = &rsa_config.passargin,
164f5b1c8a1SJohn Marino 	},
165f5b1c8a1SJohn Marino 	{
166f5b1c8a1SJohn Marino 		.name = "passout",
167f5b1c8a1SJohn Marino 		.argname = "src",
168f5b1c8a1SJohn Marino 		.desc = "Output file passphrase source",
169f5b1c8a1SJohn Marino 		.type = OPTION_ARG,
170f5b1c8a1SJohn Marino 		.opt.arg = &rsa_config.passargout,
171f5b1c8a1SJohn Marino 	},
172f5b1c8a1SJohn Marino 	{
173f5b1c8a1SJohn Marino 		.name = "pubin",
174f5b1c8a1SJohn Marino 		.desc = "Expect a public key (default private key)",
175f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
176f5b1c8a1SJohn Marino 		.value = 1,
177f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pubin,
178f5b1c8a1SJohn Marino 	},
179f5b1c8a1SJohn Marino 	{
180f5b1c8a1SJohn Marino 		.name = "pubout",
181f5b1c8a1SJohn Marino 		.desc = "Output a public key (default private key)",
182f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
183f5b1c8a1SJohn Marino 		.value = 1,
184f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pubout,
185f5b1c8a1SJohn Marino 	},
186f5b1c8a1SJohn Marino 	{
187f5b1c8a1SJohn Marino 		.name = "pvk-none",
188f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
189f5b1c8a1SJohn Marino 		.value = 0,
190f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pvk_encr,
191f5b1c8a1SJohn Marino 	},
192f5b1c8a1SJohn Marino 	{
193f5b1c8a1SJohn Marino 		.name = "pvk-strong",
194f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
195f5b1c8a1SJohn Marino 		.value = 2,
196f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pvk_encr,
197f5b1c8a1SJohn Marino 	},
198f5b1c8a1SJohn Marino 	{
199f5b1c8a1SJohn Marino 		.name = "pvk-weak",
200f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
201f5b1c8a1SJohn Marino 		.value = 1,
202f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pvk_encr,
203f5b1c8a1SJohn Marino 	},
204f5b1c8a1SJohn Marino 	{
205f5b1c8a1SJohn Marino 		.name = "RSAPublicKey_in",
206f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
207f5b1c8a1SJohn Marino 		.value = 2,
208f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pubin,
209f5b1c8a1SJohn Marino 	},
210f5b1c8a1SJohn Marino 	{
211f5b1c8a1SJohn Marino 		.name = "RSAPublicKey_out",
212f5b1c8a1SJohn Marino 		.type = OPTION_VALUE,
213f5b1c8a1SJohn Marino 		.value = 2,
214f5b1c8a1SJohn Marino 		.opt.value = &rsa_config.pubout,
215f5b1c8a1SJohn Marino 	},
216f5b1c8a1SJohn Marino 	{
217f5b1c8a1SJohn Marino 		.name = "text",
218f5b1c8a1SJohn Marino 		.desc = "Print in plain text in addition to encoded",
219f5b1c8a1SJohn Marino 		.type = OPTION_FLAG,
220f5b1c8a1SJohn Marino 		.opt.flag = &rsa_config.text,
221f5b1c8a1SJohn Marino 	},
222f5b1c8a1SJohn Marino 	{
223f5b1c8a1SJohn Marino 		.name = NULL,
224f5b1c8a1SJohn Marino 		.type = OPTION_ARGV_FUNC,
225f5b1c8a1SJohn Marino 		.opt.argvfunc = rsa_opt_cipher,
226f5b1c8a1SJohn Marino 	},
227f5b1c8a1SJohn Marino 	{ NULL }
228f5b1c8a1SJohn Marino };
229f5b1c8a1SJohn Marino 
230f5b1c8a1SJohn Marino static void
rsa_usage()231f5b1c8a1SJohn Marino rsa_usage()
232f5b1c8a1SJohn Marino {
23372c33676SMaxim Ag 	int n = 0;
23472c33676SMaxim Ag 
235f5b1c8a1SJohn Marino 	fprintf(stderr,
236f5b1c8a1SJohn Marino 	    "usage: rsa [-ciphername] [-check] [-in file] "
237f5b1c8a1SJohn Marino 	    "[-inform fmt]\n"
238f5b1c8a1SJohn Marino 	    "    [-modulus] [-noout] [-out file] [-outform fmt] "
239f5b1c8a1SJohn Marino 	    "[-passin src]\n"
240*de0e0e4dSAntonio Huete Jimenez 	    "    [-passout src] [-pubin] [-pubout] [-text]\n\n");
241f5b1c8a1SJohn Marino 	options_usage(rsa_options);
242f5b1c8a1SJohn Marino 	fprintf(stderr, "\n");
243f5b1c8a1SJohn Marino 
244f5b1c8a1SJohn Marino 	fprintf(stderr, "Valid ciphername values:\n\n");
24572c33676SMaxim Ag 	OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH, show_cipher, &n);
246f5b1c8a1SJohn Marino 	fprintf(stderr, "\n");
247f5b1c8a1SJohn Marino }
248f5b1c8a1SJohn Marino 
249f5b1c8a1SJohn Marino int
rsa_main(int argc,char ** argv)250f5b1c8a1SJohn Marino rsa_main(int argc, char **argv)
251f5b1c8a1SJohn Marino {
252f5b1c8a1SJohn Marino 	int ret = 1;
253f5b1c8a1SJohn Marino 	RSA *rsa = NULL;
254f5b1c8a1SJohn Marino 	int i;
255f5b1c8a1SJohn Marino 	BIO *out = NULL;
256f5b1c8a1SJohn Marino 	char *passin = NULL, *passout = NULL;
257f5b1c8a1SJohn Marino 
258f5b1c8a1SJohn Marino 	if (single_execution) {
25972c33676SMaxim Ag 		if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
260f5b1c8a1SJohn Marino 			perror("pledge");
261f5b1c8a1SJohn Marino 			exit(1);
262f5b1c8a1SJohn Marino 		}
263f5b1c8a1SJohn Marino 	}
264f5b1c8a1SJohn Marino 
265f5b1c8a1SJohn Marino 	memset(&rsa_config, 0, sizeof(rsa_config));
266f5b1c8a1SJohn Marino 	rsa_config.pvk_encr = 2;
267f5b1c8a1SJohn Marino 	rsa_config.informat = FORMAT_PEM;
268f5b1c8a1SJohn Marino 	rsa_config.outformat = FORMAT_PEM;
269f5b1c8a1SJohn Marino 
270f5b1c8a1SJohn Marino 	if (options_parse(argc, argv, rsa_options, NULL, NULL) != 0) {
271f5b1c8a1SJohn Marino 		rsa_usage();
272f5b1c8a1SJohn Marino 		goto end;
273f5b1c8a1SJohn Marino 	}
274f5b1c8a1SJohn Marino 
275f5b1c8a1SJohn Marino 	if (!app_passwd(bio_err, rsa_config.passargin, rsa_config.passargout,
276f5b1c8a1SJohn Marino 	    &passin, &passout)) {
277f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error getting passwords\n");
278f5b1c8a1SJohn Marino 		goto end;
279f5b1c8a1SJohn Marino 	}
280f5b1c8a1SJohn Marino 	if (rsa_config.check && rsa_config.pubin) {
281f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Only private keys can be checked\n");
282f5b1c8a1SJohn Marino 		goto end;
283f5b1c8a1SJohn Marino 	}
284f5b1c8a1SJohn Marino 	out = BIO_new(BIO_s_file());
285f5b1c8a1SJohn Marino 
286f5b1c8a1SJohn Marino 	{
287f5b1c8a1SJohn Marino 		EVP_PKEY *pkey;
288f5b1c8a1SJohn Marino 
289f5b1c8a1SJohn Marino 		if (rsa_config.pubin) {
290f5b1c8a1SJohn Marino 			int tmpformat = -1;
291f5b1c8a1SJohn Marino 			if (rsa_config.pubin == 2) {
292f5b1c8a1SJohn Marino 				if (rsa_config.informat == FORMAT_PEM)
293f5b1c8a1SJohn Marino 					tmpformat = FORMAT_PEMRSA;
294f5b1c8a1SJohn Marino 				else if (rsa_config.informat == FORMAT_ASN1)
295f5b1c8a1SJohn Marino 					tmpformat = FORMAT_ASN1RSA;
296*de0e0e4dSAntonio Huete Jimenez 			} else
297f5b1c8a1SJohn Marino 				tmpformat = rsa_config.informat;
298f5b1c8a1SJohn Marino 
299f5b1c8a1SJohn Marino 			pkey = load_pubkey(bio_err, rsa_config.infile,
300f5b1c8a1SJohn Marino 			    tmpformat, 1, passin, "Public Key");
301f5b1c8a1SJohn Marino 		} else
302f5b1c8a1SJohn Marino 			pkey = load_key(bio_err, rsa_config.infile,
303*de0e0e4dSAntonio Huete Jimenez 			    rsa_config.informat, 1, passin, "Private Key");
304f5b1c8a1SJohn Marino 
305f5b1c8a1SJohn Marino 		if (pkey != NULL)
306f5b1c8a1SJohn Marino 			rsa = EVP_PKEY_get1_RSA(pkey);
307f5b1c8a1SJohn Marino 		EVP_PKEY_free(pkey);
308f5b1c8a1SJohn Marino 	}
309f5b1c8a1SJohn Marino 
310f5b1c8a1SJohn Marino 	if (rsa == NULL) {
311f5b1c8a1SJohn Marino 		ERR_print_errors(bio_err);
312f5b1c8a1SJohn Marino 		goto end;
313f5b1c8a1SJohn Marino 	}
314f5b1c8a1SJohn Marino 	if (rsa_config.outfile == NULL) {
315f5b1c8a1SJohn Marino 		BIO_set_fp(out, stdout, BIO_NOCLOSE);
316f5b1c8a1SJohn Marino 	} else {
317f5b1c8a1SJohn Marino 		if (BIO_write_filename(out, rsa_config.outfile) <= 0) {
318f5b1c8a1SJohn Marino 			perror(rsa_config.outfile);
319f5b1c8a1SJohn Marino 			goto end;
320f5b1c8a1SJohn Marino 		}
321f5b1c8a1SJohn Marino 	}
322f5b1c8a1SJohn Marino 
323f5b1c8a1SJohn Marino 	if (rsa_config.text)
324f5b1c8a1SJohn Marino 		if (!RSA_print(out, rsa, 0)) {
325f5b1c8a1SJohn Marino 			perror(rsa_config.outfile);
326f5b1c8a1SJohn Marino 			ERR_print_errors(bio_err);
327f5b1c8a1SJohn Marino 			goto end;
328f5b1c8a1SJohn Marino 		}
329f5b1c8a1SJohn Marino 	if (rsa_config.modulus) {
330f5b1c8a1SJohn Marino 		BIO_printf(out, "Modulus=");
331*de0e0e4dSAntonio Huete Jimenez 		BN_print(out, RSA_get0_n(rsa));
332f5b1c8a1SJohn Marino 		BIO_printf(out, "\n");
333f5b1c8a1SJohn Marino 	}
334f5b1c8a1SJohn Marino 	if (rsa_config.check) {
335f5b1c8a1SJohn Marino 		int r = RSA_check_key(rsa);
336f5b1c8a1SJohn Marino 
337f5b1c8a1SJohn Marino 		if (r == 1)
338f5b1c8a1SJohn Marino 			BIO_printf(out, "RSA key ok\n");
339f5b1c8a1SJohn Marino 		else if (r == 0) {
340f5b1c8a1SJohn Marino 			unsigned long err;
341f5b1c8a1SJohn Marino 
342f5b1c8a1SJohn Marino 			while ((err = ERR_peek_error()) != 0 &&
343f5b1c8a1SJohn Marino 			    ERR_GET_LIB(err) == ERR_LIB_RSA &&
344f5b1c8a1SJohn Marino 			    ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
345f5b1c8a1SJohn Marino 			    ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) {
346f5b1c8a1SJohn Marino 				BIO_printf(out, "RSA key error: %s\n",
347f5b1c8a1SJohn Marino 				    ERR_reason_error_string(err));
348f5b1c8a1SJohn Marino 				ERR_get_error();	/* remove e from error
349f5b1c8a1SJohn Marino 							 * stack */
350f5b1c8a1SJohn Marino 			}
351f5b1c8a1SJohn Marino 		}
352f5b1c8a1SJohn Marino 		if (r == -1 || ERR_peek_error() != 0) {	/* should happen only if
353f5b1c8a1SJohn Marino 							 * r == -1 */
354f5b1c8a1SJohn Marino 			ERR_print_errors(bio_err);
355f5b1c8a1SJohn Marino 			goto end;
356f5b1c8a1SJohn Marino 		}
357f5b1c8a1SJohn Marino 	}
358f5b1c8a1SJohn Marino 	if (rsa_config.noout) {
359f5b1c8a1SJohn Marino 		ret = 0;
360f5b1c8a1SJohn Marino 		goto end;
361f5b1c8a1SJohn Marino 	}
362f5b1c8a1SJohn Marino 	BIO_printf(bio_err, "writing RSA key\n");
363f5b1c8a1SJohn Marino 	if (rsa_config.outformat == FORMAT_ASN1) {
364f5b1c8a1SJohn Marino 		if (rsa_config.pubout || rsa_config.pubin) {
365f5b1c8a1SJohn Marino 			if (rsa_config.pubout == 2)
366f5b1c8a1SJohn Marino 				i = i2d_RSAPublicKey_bio(out, rsa);
367f5b1c8a1SJohn Marino 			else
368f5b1c8a1SJohn Marino 				i = i2d_RSA_PUBKEY_bio(out, rsa);
369f5b1c8a1SJohn Marino 		} else
370f5b1c8a1SJohn Marino 			i = i2d_RSAPrivateKey_bio(out, rsa);
371*de0e0e4dSAntonio Huete Jimenez 	} else if (rsa_config.outformat == FORMAT_PEM) {
372f5b1c8a1SJohn Marino 		if (rsa_config.pubout || rsa_config.pubin) {
373f5b1c8a1SJohn Marino 			if (rsa_config.pubout == 2)
374f5b1c8a1SJohn Marino 				i = PEM_write_bio_RSAPublicKey(out, rsa);
375f5b1c8a1SJohn Marino 			else
376f5b1c8a1SJohn Marino 				i = PEM_write_bio_RSA_PUBKEY(out, rsa);
377f5b1c8a1SJohn Marino 		} else
378f5b1c8a1SJohn Marino 			i = PEM_write_bio_RSAPrivateKey(out, rsa,
379f5b1c8a1SJohn Marino 			    rsa_config.enc, NULL, 0, NULL, passout);
380f5b1c8a1SJohn Marino #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
381f5b1c8a1SJohn Marino 	} else if (rsa_config.outformat == FORMAT_MSBLOB ||
382f5b1c8a1SJohn Marino 	    rsa_config.outformat == FORMAT_PVK) {
383f5b1c8a1SJohn Marino 		EVP_PKEY *pk;
384f5b1c8a1SJohn Marino 		pk = EVP_PKEY_new();
385f5b1c8a1SJohn Marino 		EVP_PKEY_set1_RSA(pk, rsa);
386f5b1c8a1SJohn Marino 		if (rsa_config.outformat == FORMAT_PVK)
387f5b1c8a1SJohn Marino 			i = i2b_PVK_bio(out, pk, rsa_config.pvk_encr, 0,
388f5b1c8a1SJohn Marino 			    passout);
389f5b1c8a1SJohn Marino 		else if (rsa_config.pubin || rsa_config.pubout)
390f5b1c8a1SJohn Marino 			i = i2b_PublicKey_bio(out, pk);
391f5b1c8a1SJohn Marino 		else
392f5b1c8a1SJohn Marino 			i = i2b_PrivateKey_bio(out, pk);
393f5b1c8a1SJohn Marino 		EVP_PKEY_free(pk);
394f5b1c8a1SJohn Marino #endif
395f5b1c8a1SJohn Marino 	} else {
396f5b1c8a1SJohn Marino 		BIO_printf(bio_err,
397f5b1c8a1SJohn Marino 		    "bad output format specified for outfile\n");
398f5b1c8a1SJohn Marino 		goto end;
399f5b1c8a1SJohn Marino 	}
400f5b1c8a1SJohn Marino 	if (i <= 0) {
401f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "unable to write key\n");
402f5b1c8a1SJohn Marino 		ERR_print_errors(bio_err);
403f5b1c8a1SJohn Marino 	} else
404f5b1c8a1SJohn Marino 		ret = 0;
405f5b1c8a1SJohn Marino 
406f5b1c8a1SJohn Marino  end:
407f5b1c8a1SJohn Marino 	BIO_free_all(out);
408f5b1c8a1SJohn Marino 	RSA_free(rsa);
409f5b1c8a1SJohn Marino 	free(passin);
410f5b1c8a1SJohn Marino 	free(passout);
411f5b1c8a1SJohn Marino 
412f5b1c8a1SJohn Marino 	return (ret);
413f5b1c8a1SJohn Marino }
414