1*cca6fc52SDaniel Fojt /* $OpenBSD: rsautl.c,v 1.18 2019/07/14 03:30:46 guenther Exp $ */
2f5b1c8a1SJohn Marino /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3f5b1c8a1SJohn Marino * project 2000.
4f5b1c8a1SJohn Marino */
5f5b1c8a1SJohn Marino /* ====================================================================
6f5b1c8a1SJohn Marino * Copyright (c) 2000 The OpenSSL Project. All rights reserved.
7f5b1c8a1SJohn Marino *
8f5b1c8a1SJohn Marino * Redistribution and use in source and binary forms, with or without
9f5b1c8a1SJohn Marino * modification, are permitted provided that the following conditions
10f5b1c8a1SJohn Marino * are met:
11f5b1c8a1SJohn Marino *
12f5b1c8a1SJohn Marino * 1. Redistributions of source code must retain the above copyright
13f5b1c8a1SJohn Marino * notice, this list of conditions and the following disclaimer.
14f5b1c8a1SJohn Marino *
15f5b1c8a1SJohn Marino * 2. Redistributions in binary form must reproduce the above copyright
16f5b1c8a1SJohn Marino * notice, this list of conditions and the following disclaimer in
17f5b1c8a1SJohn Marino * the documentation and/or other materials provided with the
18f5b1c8a1SJohn Marino * distribution.
19f5b1c8a1SJohn Marino *
20f5b1c8a1SJohn Marino * 3. All advertising materials mentioning features or use of this
21f5b1c8a1SJohn Marino * software must display the following acknowledgment:
22f5b1c8a1SJohn Marino * "This product includes software developed by the OpenSSL Project
23f5b1c8a1SJohn Marino * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24f5b1c8a1SJohn Marino *
25f5b1c8a1SJohn Marino * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26f5b1c8a1SJohn Marino * endorse or promote products derived from this software without
27f5b1c8a1SJohn Marino * prior written permission. For written permission, please contact
28f5b1c8a1SJohn Marino * licensing@OpenSSL.org.
29f5b1c8a1SJohn Marino *
30f5b1c8a1SJohn Marino * 5. Products derived from this software may not be called "OpenSSL"
31f5b1c8a1SJohn Marino * nor may "OpenSSL" appear in their names without prior written
32f5b1c8a1SJohn Marino * permission of the OpenSSL Project.
33f5b1c8a1SJohn Marino *
34f5b1c8a1SJohn Marino * 6. Redistributions of any form whatsoever must retain the following
35f5b1c8a1SJohn Marino * acknowledgment:
36f5b1c8a1SJohn Marino * "This product includes software developed by the OpenSSL Project
37f5b1c8a1SJohn Marino * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38f5b1c8a1SJohn Marino *
39f5b1c8a1SJohn Marino * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40f5b1c8a1SJohn Marino * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41f5b1c8a1SJohn Marino * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42f5b1c8a1SJohn Marino * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43f5b1c8a1SJohn Marino * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44f5b1c8a1SJohn Marino * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45f5b1c8a1SJohn Marino * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46f5b1c8a1SJohn Marino * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47f5b1c8a1SJohn Marino * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48f5b1c8a1SJohn Marino * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49f5b1c8a1SJohn Marino * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50f5b1c8a1SJohn Marino * OF THE POSSIBILITY OF SUCH DAMAGE.
51f5b1c8a1SJohn Marino * ====================================================================
52f5b1c8a1SJohn Marino *
53f5b1c8a1SJohn Marino * This product includes cryptographic software written by Eric Young
54f5b1c8a1SJohn Marino * (eay@cryptsoft.com). This product includes software written by Tim
55f5b1c8a1SJohn Marino * Hudson (tjh@cryptsoft.com).
56f5b1c8a1SJohn Marino *
57f5b1c8a1SJohn Marino */
58f5b1c8a1SJohn Marino
59f5b1c8a1SJohn Marino #include <openssl/opensslconf.h>
60f5b1c8a1SJohn Marino
61f5b1c8a1SJohn Marino #include <string.h>
62f5b1c8a1SJohn Marino
63f5b1c8a1SJohn Marino #include "apps.h"
64f5b1c8a1SJohn Marino
65f5b1c8a1SJohn Marino #include <openssl/err.h>
66f5b1c8a1SJohn Marino #include <openssl/pem.h>
67f5b1c8a1SJohn Marino #include <openssl/rsa.h>
68f5b1c8a1SJohn Marino
69f5b1c8a1SJohn Marino #define RSA_SIGN 1
70f5b1c8a1SJohn Marino #define RSA_VERIFY 2
71f5b1c8a1SJohn Marino #define RSA_ENCRYPT 3
72f5b1c8a1SJohn Marino #define RSA_DECRYPT 4
73f5b1c8a1SJohn Marino
74f5b1c8a1SJohn Marino #define KEY_PRIVKEY 1
75f5b1c8a1SJohn Marino #define KEY_PUBKEY 2
76f5b1c8a1SJohn Marino #define KEY_CERT 3
77f5b1c8a1SJohn Marino
7872c33676SMaxim Ag struct {
7972c33676SMaxim Ag int asn1parse;
8072c33676SMaxim Ag int hexdump;
8172c33676SMaxim Ag char *infile;
8272c33676SMaxim Ag char *keyfile;
8372c33676SMaxim Ag int keyform;
8472c33676SMaxim Ag int key_type;
8572c33676SMaxim Ag char *outfile;
8672c33676SMaxim Ag int pad;
8772c33676SMaxim Ag char *passargin;
8872c33676SMaxim Ag int rev;
8972c33676SMaxim Ag int rsa_mode;
9072c33676SMaxim Ag } rsautl_config;
9172c33676SMaxim Ag
92*cca6fc52SDaniel Fojt static const struct option rsautl_options[] = {
9372c33676SMaxim Ag {
9472c33676SMaxim Ag .name = "asn1parse",
9572c33676SMaxim Ag .desc = "ASN.1 parse the output data",
9672c33676SMaxim Ag .type = OPTION_FLAG,
9772c33676SMaxim Ag .opt.flag = &rsautl_config.asn1parse,
9872c33676SMaxim Ag },
9972c33676SMaxim Ag {
10072c33676SMaxim Ag .name = "certin",
10172c33676SMaxim Ag .desc = "Input is a certificate containing an RSA public key",
10272c33676SMaxim Ag .type = OPTION_VALUE,
10372c33676SMaxim Ag .value = KEY_CERT,
10472c33676SMaxim Ag .opt.value = &rsautl_config.key_type,
10572c33676SMaxim Ag },
10672c33676SMaxim Ag {
10772c33676SMaxim Ag .name = "decrypt",
10872c33676SMaxim Ag .desc = "Decrypt the input data using RSA private key",
10972c33676SMaxim Ag .type = OPTION_VALUE,
11072c33676SMaxim Ag .value = RSA_DECRYPT,
11172c33676SMaxim Ag .opt.value = &rsautl_config.rsa_mode,
11272c33676SMaxim Ag },
11372c33676SMaxim Ag {
11472c33676SMaxim Ag .name = "encrypt",
11572c33676SMaxim Ag .desc = "Encrypt the input data using RSA public key",
11672c33676SMaxim Ag .type = OPTION_VALUE,
11772c33676SMaxim Ag .value = RSA_ENCRYPT,
11872c33676SMaxim Ag .opt.value = &rsautl_config.rsa_mode,
11972c33676SMaxim Ag },
12072c33676SMaxim Ag {
12172c33676SMaxim Ag .name = "hexdump",
12272c33676SMaxim Ag .desc = "Hex dump the output data",
12372c33676SMaxim Ag .type = OPTION_FLAG,
12472c33676SMaxim Ag .opt.flag = &rsautl_config.hexdump,
12572c33676SMaxim Ag },
12672c33676SMaxim Ag {
12772c33676SMaxim Ag .name = "in",
12872c33676SMaxim Ag .argname = "file",
12972c33676SMaxim Ag .desc = "Input file (default stdin)",
13072c33676SMaxim Ag .type = OPTION_ARG,
13172c33676SMaxim Ag .opt.arg = &rsautl_config.infile,
13272c33676SMaxim Ag },
13372c33676SMaxim Ag {
13472c33676SMaxim Ag .name = "inkey",
13572c33676SMaxim Ag .argname = "file",
13672c33676SMaxim Ag .desc = "Input key file",
13772c33676SMaxim Ag .type = OPTION_ARG,
13872c33676SMaxim Ag .opt.arg = &rsautl_config.keyfile,
13972c33676SMaxim Ag },
14072c33676SMaxim Ag {
14172c33676SMaxim Ag .name = "keyform",
14272c33676SMaxim Ag .argname = "fmt",
14372c33676SMaxim Ag .desc = "Input key format (DER, TXT or PEM (default))",
14472c33676SMaxim Ag .type = OPTION_ARG_FORMAT,
14572c33676SMaxim Ag .opt.value = &rsautl_config.keyform,
14672c33676SMaxim Ag },
14772c33676SMaxim Ag {
14872c33676SMaxim Ag .name = "oaep",
14972c33676SMaxim Ag .desc = "Use PKCS#1 OAEP padding",
15072c33676SMaxim Ag .type = OPTION_VALUE,
15172c33676SMaxim Ag .value = RSA_PKCS1_OAEP_PADDING,
15272c33676SMaxim Ag .opt.value = &rsautl_config.pad,
15372c33676SMaxim Ag },
15472c33676SMaxim Ag {
15572c33676SMaxim Ag .name = "out",
15672c33676SMaxim Ag .argname = "file",
15772c33676SMaxim Ag .desc = "Output file (default stdout)",
15872c33676SMaxim Ag .type = OPTION_ARG,
15972c33676SMaxim Ag .opt.arg = &rsautl_config.outfile,
16072c33676SMaxim Ag },
16172c33676SMaxim Ag {
16272c33676SMaxim Ag .name = "passin",
16372c33676SMaxim Ag .argname = "arg",
16472c33676SMaxim Ag .desc = "Key password source",
16572c33676SMaxim Ag .type = OPTION_ARG,
16672c33676SMaxim Ag .opt.arg = &rsautl_config.passargin,
16772c33676SMaxim Ag },
16872c33676SMaxim Ag {
16972c33676SMaxim Ag .name = "pkcs",
17072c33676SMaxim Ag .desc = "Use PKCS#1 v1.5 padding (default)",
17172c33676SMaxim Ag .type = OPTION_VALUE,
17272c33676SMaxim Ag .value = RSA_PKCS1_PADDING,
17372c33676SMaxim Ag .opt.value = &rsautl_config.pad,
17472c33676SMaxim Ag },
17572c33676SMaxim Ag {
17672c33676SMaxim Ag .name = "pubin",
17772c33676SMaxim Ag .desc = "Input is an RSA public key",
17872c33676SMaxim Ag .type = OPTION_VALUE,
17972c33676SMaxim Ag .value = KEY_PUBKEY,
18072c33676SMaxim Ag .opt.value = &rsautl_config.key_type,
18172c33676SMaxim Ag },
18272c33676SMaxim Ag {
18372c33676SMaxim Ag .name = "raw",
18472c33676SMaxim Ag .desc = "Use no padding",
18572c33676SMaxim Ag .type = OPTION_VALUE,
18672c33676SMaxim Ag .value = RSA_NO_PADDING,
18772c33676SMaxim Ag .opt.value = &rsautl_config.pad,
18872c33676SMaxim Ag },
18972c33676SMaxim Ag {
19072c33676SMaxim Ag .name = "rev",
19172c33676SMaxim Ag .desc = "Reverse the input data",
19272c33676SMaxim Ag .type = OPTION_FLAG,
19372c33676SMaxim Ag .opt.flag = &rsautl_config.rev,
19472c33676SMaxim Ag },
19572c33676SMaxim Ag {
19672c33676SMaxim Ag .name = "sign",
19772c33676SMaxim Ag .desc = "Sign the input data using RSA private key",
19872c33676SMaxim Ag .type = OPTION_VALUE,
19972c33676SMaxim Ag .value = RSA_SIGN,
20072c33676SMaxim Ag .opt.value = &rsautl_config.rsa_mode,
20172c33676SMaxim Ag },
20272c33676SMaxim Ag {
20372c33676SMaxim Ag .name = "verify",
20472c33676SMaxim Ag .desc = "Verify the input data using RSA public key",
20572c33676SMaxim Ag .type = OPTION_VALUE,
20672c33676SMaxim Ag .value = RSA_VERIFY,
20772c33676SMaxim Ag .opt.value = &rsautl_config.rsa_mode,
20872c33676SMaxim Ag },
20972c33676SMaxim Ag {
21072c33676SMaxim Ag .name = "x931",
21172c33676SMaxim Ag .desc = "Use ANSI X9.31 padding",
21272c33676SMaxim Ag .type = OPTION_VALUE,
21372c33676SMaxim Ag .value = RSA_X931_PADDING,
21472c33676SMaxim Ag .opt.value = &rsautl_config.pad,
21572c33676SMaxim Ag },
21672c33676SMaxim Ag
21772c33676SMaxim Ag {NULL},
21872c33676SMaxim Ag };
21972c33676SMaxim Ag
22072c33676SMaxim Ag static void
rsautl_usage()22172c33676SMaxim Ag rsautl_usage()
22272c33676SMaxim Ag {
22372c33676SMaxim Ag fprintf(stderr,
22472c33676SMaxim Ag "usage: rsautl [-asn1parse] [-certin] [-decrypt] [-encrypt] "
22572c33676SMaxim Ag "[-hexdump]\n"
22672c33676SMaxim Ag " [-in file] [-inkey file] [-keyform der | pem]\n"
22772c33676SMaxim Ag " [-oaep | -pkcs | -raw | -x931] [-out file] [-passin arg]\n"
22872c33676SMaxim Ag " [-pubin] [-rev] [-sign] [-verify]\n\n");
22972c33676SMaxim Ag
23072c33676SMaxim Ag options_usage(rsautl_options);
23172c33676SMaxim Ag }
232f5b1c8a1SJohn Marino
233f5b1c8a1SJohn Marino int
rsautl_main(int argc,char ** argv)234f5b1c8a1SJohn Marino rsautl_main(int argc, char **argv)
235f5b1c8a1SJohn Marino {
236f5b1c8a1SJohn Marino BIO *in = NULL, *out = NULL;
237f5b1c8a1SJohn Marino X509 *x;
238f5b1c8a1SJohn Marino EVP_PKEY *pkey = NULL;
239f5b1c8a1SJohn Marino RSA *rsa = NULL;
24072c33676SMaxim Ag unsigned char *rsa_in = NULL, *rsa_out = NULL;
24172c33676SMaxim Ag char *passin = NULL;
242f5b1c8a1SJohn Marino int rsa_inlen, rsa_outlen = 0;
24372c33676SMaxim Ag int need_priv = 0;
244f5b1c8a1SJohn Marino int keysize;
245f5b1c8a1SJohn Marino int ret = 1;
246f5b1c8a1SJohn Marino
247f5b1c8a1SJohn Marino if (single_execution) {
24872c33676SMaxim Ag if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
249f5b1c8a1SJohn Marino perror("pledge");
250f5b1c8a1SJohn Marino exit(1);
251f5b1c8a1SJohn Marino }
252f5b1c8a1SJohn Marino }
253f5b1c8a1SJohn Marino
25472c33676SMaxim Ag memset(&rsautl_config, 0, sizeof(rsautl_config));
25572c33676SMaxim Ag rsautl_config.keyform = FORMAT_PEM;
25672c33676SMaxim Ag rsautl_config.key_type = KEY_PRIVKEY;
25772c33676SMaxim Ag rsautl_config.pad = RSA_PKCS1_PADDING;
25872c33676SMaxim Ag rsautl_config.rsa_mode = RSA_VERIFY;
259f5b1c8a1SJohn Marino
26072c33676SMaxim Ag if (options_parse(argc, argv, rsautl_options, NULL, NULL) != 0) {
26172c33676SMaxim Ag rsautl_usage();
26272c33676SMaxim Ag return (1);
263f5b1c8a1SJohn Marino }
264f5b1c8a1SJohn Marino
26572c33676SMaxim Ag if (rsautl_config.rsa_mode == RSA_SIGN ||
26672c33676SMaxim Ag rsautl_config.rsa_mode == RSA_DECRYPT)
26772c33676SMaxim Ag need_priv = 1;
26872c33676SMaxim Ag
26972c33676SMaxim Ag if (need_priv && rsautl_config.key_type != KEY_PRIVKEY) {
270f5b1c8a1SJohn Marino BIO_printf(bio_err, "A private key is needed for this operation\n");
271f5b1c8a1SJohn Marino goto end;
272f5b1c8a1SJohn Marino }
27372c33676SMaxim Ag if (!app_passwd(bio_err, rsautl_config.passargin, NULL, &passin, NULL)) {
274f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error getting password\n");
275f5b1c8a1SJohn Marino goto end;
276f5b1c8a1SJohn Marino }
277f5b1c8a1SJohn Marino
27872c33676SMaxim Ag switch (rsautl_config.key_type) {
279f5b1c8a1SJohn Marino case KEY_PRIVKEY:
28072c33676SMaxim Ag pkey = load_key(bio_err, rsautl_config.keyfile,
28172c33676SMaxim Ag rsautl_config.keyform, 0, passin, "Private Key");
282f5b1c8a1SJohn Marino break;
283f5b1c8a1SJohn Marino
284f5b1c8a1SJohn Marino case KEY_PUBKEY:
28572c33676SMaxim Ag pkey = load_pubkey(bio_err, rsautl_config.keyfile,
28672c33676SMaxim Ag rsautl_config.keyform, 0, NULL, "Public Key");
287f5b1c8a1SJohn Marino break;
288f5b1c8a1SJohn Marino
289f5b1c8a1SJohn Marino case KEY_CERT:
29072c33676SMaxim Ag x = load_cert(bio_err, rsautl_config.keyfile,
29172c33676SMaxim Ag rsautl_config.keyform, NULL, "Certificate");
292f5b1c8a1SJohn Marino if (x) {
293f5b1c8a1SJohn Marino pkey = X509_get_pubkey(x);
294f5b1c8a1SJohn Marino X509_free(x);
295f5b1c8a1SJohn Marino }
296f5b1c8a1SJohn Marino break;
297f5b1c8a1SJohn Marino }
298f5b1c8a1SJohn Marino
299f5b1c8a1SJohn Marino if (!pkey)
300f5b1c8a1SJohn Marino goto end;
301f5b1c8a1SJohn Marino
302f5b1c8a1SJohn Marino rsa = EVP_PKEY_get1_RSA(pkey);
303f5b1c8a1SJohn Marino EVP_PKEY_free(pkey);
304f5b1c8a1SJohn Marino
305f5b1c8a1SJohn Marino if (!rsa) {
306f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error getting RSA key\n");
307f5b1c8a1SJohn Marino ERR_print_errors(bio_err);
308f5b1c8a1SJohn Marino goto end;
309f5b1c8a1SJohn Marino }
31072c33676SMaxim Ag if (rsautl_config.infile) {
31172c33676SMaxim Ag if (!(in = BIO_new_file(rsautl_config.infile, "rb"))) {
312f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error Reading Input File\n");
313f5b1c8a1SJohn Marino ERR_print_errors(bio_err);
314f5b1c8a1SJohn Marino goto end;
315f5b1c8a1SJohn Marino }
316f5b1c8a1SJohn Marino } else
317f5b1c8a1SJohn Marino in = BIO_new_fp(stdin, BIO_NOCLOSE);
318f5b1c8a1SJohn Marino
31972c33676SMaxim Ag if (rsautl_config.outfile) {
32072c33676SMaxim Ag if (!(out = BIO_new_file(rsautl_config.outfile, "wb"))) {
321f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error Reading Output File\n");
322f5b1c8a1SJohn Marino ERR_print_errors(bio_err);
323f5b1c8a1SJohn Marino goto end;
324f5b1c8a1SJohn Marino }
325f5b1c8a1SJohn Marino } else {
326f5b1c8a1SJohn Marino out = BIO_new_fp(stdout, BIO_NOCLOSE);
327f5b1c8a1SJohn Marino }
328f5b1c8a1SJohn Marino
329f5b1c8a1SJohn Marino keysize = RSA_size(rsa);
330f5b1c8a1SJohn Marino
331f5b1c8a1SJohn Marino rsa_in = reallocarray(NULL, keysize, 2);
332f5b1c8a1SJohn Marino if (rsa_in == NULL) {
333f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error allocating memory for input data\n");
334f5b1c8a1SJohn Marino exit(1);
335f5b1c8a1SJohn Marino }
336f5b1c8a1SJohn Marino rsa_out = malloc(keysize);
337f5b1c8a1SJohn Marino if (rsa_out == NULL) {
338f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error allocating memory for output data\n");
339f5b1c8a1SJohn Marino exit(1);
340f5b1c8a1SJohn Marino }
341f5b1c8a1SJohn Marino
342f5b1c8a1SJohn Marino /* Read the input data */
343f5b1c8a1SJohn Marino rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
344f5b1c8a1SJohn Marino if (rsa_inlen <= 0) {
345f5b1c8a1SJohn Marino BIO_printf(bio_err, "Error reading input Data\n");
346f5b1c8a1SJohn Marino exit(1);
347f5b1c8a1SJohn Marino }
34872c33676SMaxim Ag if (rsautl_config.rev) {
349f5b1c8a1SJohn Marino int i;
350f5b1c8a1SJohn Marino unsigned char ctmp;
351f5b1c8a1SJohn Marino for (i = 0; i < rsa_inlen / 2; i++) {
352f5b1c8a1SJohn Marino ctmp = rsa_in[i];
353f5b1c8a1SJohn Marino rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
354f5b1c8a1SJohn Marino rsa_in[rsa_inlen - 1 - i] = ctmp;
355f5b1c8a1SJohn Marino }
356f5b1c8a1SJohn Marino }
357f5b1c8a1SJohn Marino
35872c33676SMaxim Ag switch (rsautl_config.rsa_mode) {
359f5b1c8a1SJohn Marino case RSA_VERIFY:
36072c33676SMaxim Ag rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out,
36172c33676SMaxim Ag rsa, rsautl_config.pad);
362f5b1c8a1SJohn Marino break;
363f5b1c8a1SJohn Marino
364f5b1c8a1SJohn Marino case RSA_SIGN:
36572c33676SMaxim Ag rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out,
36672c33676SMaxim Ag rsa, rsautl_config.pad);
367f5b1c8a1SJohn Marino break;
368f5b1c8a1SJohn Marino
369f5b1c8a1SJohn Marino case RSA_ENCRYPT:
37072c33676SMaxim Ag rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out,
37172c33676SMaxim Ag rsa, rsautl_config.pad);
372f5b1c8a1SJohn Marino break;
373f5b1c8a1SJohn Marino
374f5b1c8a1SJohn Marino case RSA_DECRYPT:
37572c33676SMaxim Ag rsa_outlen = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out,
37672c33676SMaxim Ag rsa, rsautl_config.pad);
377f5b1c8a1SJohn Marino break;
378f5b1c8a1SJohn Marino }
379f5b1c8a1SJohn Marino
380f5b1c8a1SJohn Marino if (rsa_outlen <= 0) {
381f5b1c8a1SJohn Marino BIO_printf(bio_err, "RSA operation error\n");
382f5b1c8a1SJohn Marino ERR_print_errors(bio_err);
383f5b1c8a1SJohn Marino goto end;
384f5b1c8a1SJohn Marino }
385f5b1c8a1SJohn Marino ret = 0;
38672c33676SMaxim Ag if (rsautl_config.asn1parse) {
387f5b1c8a1SJohn Marino if (!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
388f5b1c8a1SJohn Marino ERR_print_errors(bio_err);
389f5b1c8a1SJohn Marino }
39072c33676SMaxim Ag } else if (rsautl_config.hexdump)
391f5b1c8a1SJohn Marino BIO_dump(out, (char *) rsa_out, rsa_outlen);
392f5b1c8a1SJohn Marino else
393f5b1c8a1SJohn Marino BIO_write(out, rsa_out, rsa_outlen);
394f5b1c8a1SJohn Marino
395f5b1c8a1SJohn Marino end:
396f5b1c8a1SJohn Marino RSA_free(rsa);
397f5b1c8a1SJohn Marino BIO_free(in);
398f5b1c8a1SJohn Marino BIO_free_all(out);
399f5b1c8a1SJohn Marino free(rsa_in);
400f5b1c8a1SJohn Marino free(rsa_out);
401f5b1c8a1SJohn Marino free(passin);
402f5b1c8a1SJohn Marino
403f5b1c8a1SJohn Marino return ret;
404f5b1c8a1SJohn Marino }
405