xref: /dflybsd-src/crypto/libressl/apps/openssl/rsautl.c (revision cca6fc5243d2098262ea81f83ad5b28d3b800f4a)
1*cca6fc52SDaniel Fojt /* $OpenBSD: rsautl.c,v 1.18 2019/07/14 03:30:46 guenther Exp $ */
2f5b1c8a1SJohn Marino /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3f5b1c8a1SJohn Marino  * project 2000.
4f5b1c8a1SJohn Marino  */
5f5b1c8a1SJohn Marino /* ====================================================================
6f5b1c8a1SJohn Marino  * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
7f5b1c8a1SJohn Marino  *
8f5b1c8a1SJohn Marino  * Redistribution and use in source and binary forms, with or without
9f5b1c8a1SJohn Marino  * modification, are permitted provided that the following conditions
10f5b1c8a1SJohn Marino  * are met:
11f5b1c8a1SJohn Marino  *
12f5b1c8a1SJohn Marino  * 1. Redistributions of source code must retain the above copyright
13f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer.
14f5b1c8a1SJohn Marino  *
15f5b1c8a1SJohn Marino  * 2. Redistributions in binary form must reproduce the above copyright
16f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer in
17f5b1c8a1SJohn Marino  *    the documentation and/or other materials provided with the
18f5b1c8a1SJohn Marino  *    distribution.
19f5b1c8a1SJohn Marino  *
20f5b1c8a1SJohn Marino  * 3. All advertising materials mentioning features or use of this
21f5b1c8a1SJohn Marino  *    software must display the following acknowledgment:
22f5b1c8a1SJohn Marino  *    "This product includes software developed by the OpenSSL Project
23f5b1c8a1SJohn Marino  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24f5b1c8a1SJohn Marino  *
25f5b1c8a1SJohn Marino  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26f5b1c8a1SJohn Marino  *    endorse or promote products derived from this software without
27f5b1c8a1SJohn Marino  *    prior written permission. For written permission, please contact
28f5b1c8a1SJohn Marino  *    licensing@OpenSSL.org.
29f5b1c8a1SJohn Marino  *
30f5b1c8a1SJohn Marino  * 5. Products derived from this software may not be called "OpenSSL"
31f5b1c8a1SJohn Marino  *    nor may "OpenSSL" appear in their names without prior written
32f5b1c8a1SJohn Marino  *    permission of the OpenSSL Project.
33f5b1c8a1SJohn Marino  *
34f5b1c8a1SJohn Marino  * 6. Redistributions of any form whatsoever must retain the following
35f5b1c8a1SJohn Marino  *    acknowledgment:
36f5b1c8a1SJohn Marino  *    "This product includes software developed by the OpenSSL Project
37f5b1c8a1SJohn Marino  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38f5b1c8a1SJohn Marino  *
39f5b1c8a1SJohn Marino  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40f5b1c8a1SJohn Marino  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41f5b1c8a1SJohn Marino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42f5b1c8a1SJohn Marino  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43f5b1c8a1SJohn Marino  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44f5b1c8a1SJohn Marino  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45f5b1c8a1SJohn Marino  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46f5b1c8a1SJohn Marino  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47f5b1c8a1SJohn Marino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48f5b1c8a1SJohn Marino  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49f5b1c8a1SJohn Marino  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50f5b1c8a1SJohn Marino  * OF THE POSSIBILITY OF SUCH DAMAGE.
51f5b1c8a1SJohn Marino  * ====================================================================
52f5b1c8a1SJohn Marino  *
53f5b1c8a1SJohn Marino  * This product includes cryptographic software written by Eric Young
54f5b1c8a1SJohn Marino  * (eay@cryptsoft.com).  This product includes software written by Tim
55f5b1c8a1SJohn Marino  * Hudson (tjh@cryptsoft.com).
56f5b1c8a1SJohn Marino  *
57f5b1c8a1SJohn Marino  */
58f5b1c8a1SJohn Marino 
59f5b1c8a1SJohn Marino #include <openssl/opensslconf.h>
60f5b1c8a1SJohn Marino 
61f5b1c8a1SJohn Marino #include <string.h>
62f5b1c8a1SJohn Marino 
63f5b1c8a1SJohn Marino #include "apps.h"
64f5b1c8a1SJohn Marino 
65f5b1c8a1SJohn Marino #include <openssl/err.h>
66f5b1c8a1SJohn Marino #include <openssl/pem.h>
67f5b1c8a1SJohn Marino #include <openssl/rsa.h>
68f5b1c8a1SJohn Marino 
69f5b1c8a1SJohn Marino #define RSA_SIGN	1
70f5b1c8a1SJohn Marino #define RSA_VERIFY	2
71f5b1c8a1SJohn Marino #define RSA_ENCRYPT	3
72f5b1c8a1SJohn Marino #define RSA_DECRYPT	4
73f5b1c8a1SJohn Marino 
74f5b1c8a1SJohn Marino #define KEY_PRIVKEY	1
75f5b1c8a1SJohn Marino #define KEY_PUBKEY	2
76f5b1c8a1SJohn Marino #define KEY_CERT	3
77f5b1c8a1SJohn Marino 
7872c33676SMaxim Ag struct {
7972c33676SMaxim Ag 	int asn1parse;
8072c33676SMaxim Ag 	int hexdump;
8172c33676SMaxim Ag 	char *infile;
8272c33676SMaxim Ag 	char *keyfile;
8372c33676SMaxim Ag 	int keyform;
8472c33676SMaxim Ag 	int key_type;
8572c33676SMaxim Ag 	char *outfile;
8672c33676SMaxim Ag 	int pad;
8772c33676SMaxim Ag 	char *passargin;
8872c33676SMaxim Ag 	int rev;
8972c33676SMaxim Ag 	int rsa_mode;
9072c33676SMaxim Ag } rsautl_config;
9172c33676SMaxim Ag 
92*cca6fc52SDaniel Fojt static const struct option rsautl_options[] = {
9372c33676SMaxim Ag 	{
9472c33676SMaxim Ag 		.name = "asn1parse",
9572c33676SMaxim Ag 		.desc = "ASN.1 parse the output data",
9672c33676SMaxim Ag 		.type = OPTION_FLAG,
9772c33676SMaxim Ag 		.opt.flag = &rsautl_config.asn1parse,
9872c33676SMaxim Ag 	},
9972c33676SMaxim Ag 	{
10072c33676SMaxim Ag 		.name = "certin",
10172c33676SMaxim Ag 		.desc = "Input is a certificate containing an RSA public key",
10272c33676SMaxim Ag 		.type = OPTION_VALUE,
10372c33676SMaxim Ag 		.value = KEY_CERT,
10472c33676SMaxim Ag 		.opt.value = &rsautl_config.key_type,
10572c33676SMaxim Ag 	},
10672c33676SMaxim Ag 	{
10772c33676SMaxim Ag 		.name = "decrypt",
10872c33676SMaxim Ag 		.desc = "Decrypt the input data using RSA private key",
10972c33676SMaxim Ag 		.type = OPTION_VALUE,
11072c33676SMaxim Ag 		.value = RSA_DECRYPT,
11172c33676SMaxim Ag 		.opt.value = &rsautl_config.rsa_mode,
11272c33676SMaxim Ag 	},
11372c33676SMaxim Ag 	{
11472c33676SMaxim Ag 		.name = "encrypt",
11572c33676SMaxim Ag 		.desc = "Encrypt the input data using RSA public key",
11672c33676SMaxim Ag 		.type = OPTION_VALUE,
11772c33676SMaxim Ag 		.value = RSA_ENCRYPT,
11872c33676SMaxim Ag 		.opt.value = &rsautl_config.rsa_mode,
11972c33676SMaxim Ag 	},
12072c33676SMaxim Ag 	{
12172c33676SMaxim Ag 		.name = "hexdump",
12272c33676SMaxim Ag 		.desc = "Hex dump the output data",
12372c33676SMaxim Ag 		.type = OPTION_FLAG,
12472c33676SMaxim Ag 		.opt.flag = &rsautl_config.hexdump,
12572c33676SMaxim Ag 	},
12672c33676SMaxim Ag 	{
12772c33676SMaxim Ag 		.name = "in",
12872c33676SMaxim Ag 		.argname = "file",
12972c33676SMaxim Ag 		.desc = "Input file (default stdin)",
13072c33676SMaxim Ag 		.type = OPTION_ARG,
13172c33676SMaxim Ag 		.opt.arg = &rsautl_config.infile,
13272c33676SMaxim Ag 	},
13372c33676SMaxim Ag 	{
13472c33676SMaxim Ag 		.name = "inkey",
13572c33676SMaxim Ag 		.argname = "file",
13672c33676SMaxim Ag 		.desc = "Input key file",
13772c33676SMaxim Ag 		.type = OPTION_ARG,
13872c33676SMaxim Ag 		.opt.arg = &rsautl_config.keyfile,
13972c33676SMaxim Ag 	},
14072c33676SMaxim Ag 	{
14172c33676SMaxim Ag 		.name = "keyform",
14272c33676SMaxim Ag 		.argname = "fmt",
14372c33676SMaxim Ag 		.desc = "Input key format (DER, TXT or PEM (default))",
14472c33676SMaxim Ag 		.type = OPTION_ARG_FORMAT,
14572c33676SMaxim Ag 		.opt.value = &rsautl_config.keyform,
14672c33676SMaxim Ag 	},
14772c33676SMaxim Ag 	{
14872c33676SMaxim Ag 		.name = "oaep",
14972c33676SMaxim Ag 		.desc = "Use PKCS#1 OAEP padding",
15072c33676SMaxim Ag 		.type = OPTION_VALUE,
15172c33676SMaxim Ag 		.value = RSA_PKCS1_OAEP_PADDING,
15272c33676SMaxim Ag 		.opt.value = &rsautl_config.pad,
15372c33676SMaxim Ag 	},
15472c33676SMaxim Ag 	{
15572c33676SMaxim Ag 		.name = "out",
15672c33676SMaxim Ag 		.argname = "file",
15772c33676SMaxim Ag 		.desc = "Output file (default stdout)",
15872c33676SMaxim Ag 		.type = OPTION_ARG,
15972c33676SMaxim Ag 		.opt.arg = &rsautl_config.outfile,
16072c33676SMaxim Ag 	},
16172c33676SMaxim Ag 	{
16272c33676SMaxim Ag 		.name = "passin",
16372c33676SMaxim Ag 		.argname = "arg",
16472c33676SMaxim Ag 		.desc = "Key password source",
16572c33676SMaxim Ag 		.type = OPTION_ARG,
16672c33676SMaxim Ag 		.opt.arg = &rsautl_config.passargin,
16772c33676SMaxim Ag 	},
16872c33676SMaxim Ag 	{
16972c33676SMaxim Ag 		.name = "pkcs",
17072c33676SMaxim Ag 		.desc = "Use PKCS#1 v1.5 padding (default)",
17172c33676SMaxim Ag 		.type = OPTION_VALUE,
17272c33676SMaxim Ag 		.value = RSA_PKCS1_PADDING,
17372c33676SMaxim Ag 		.opt.value = &rsautl_config.pad,
17472c33676SMaxim Ag 	},
17572c33676SMaxim Ag 	{
17672c33676SMaxim Ag 		.name = "pubin",
17772c33676SMaxim Ag 		.desc = "Input is an RSA public key",
17872c33676SMaxim Ag 		.type = OPTION_VALUE,
17972c33676SMaxim Ag 		.value = KEY_PUBKEY,
18072c33676SMaxim Ag 		.opt.value = &rsautl_config.key_type,
18172c33676SMaxim Ag 	},
18272c33676SMaxim Ag 	{
18372c33676SMaxim Ag 		.name = "raw",
18472c33676SMaxim Ag 		.desc = "Use no padding",
18572c33676SMaxim Ag 		.type = OPTION_VALUE,
18672c33676SMaxim Ag 		.value = RSA_NO_PADDING,
18772c33676SMaxim Ag 		.opt.value = &rsautl_config.pad,
18872c33676SMaxim Ag 	},
18972c33676SMaxim Ag 	{
19072c33676SMaxim Ag 		.name = "rev",
19172c33676SMaxim Ag 		.desc = "Reverse the input data",
19272c33676SMaxim Ag 		.type = OPTION_FLAG,
19372c33676SMaxim Ag 		.opt.flag = &rsautl_config.rev,
19472c33676SMaxim Ag 	},
19572c33676SMaxim Ag 	{
19672c33676SMaxim Ag 		.name = "sign",
19772c33676SMaxim Ag 		.desc = "Sign the input data using RSA private key",
19872c33676SMaxim Ag 		.type = OPTION_VALUE,
19972c33676SMaxim Ag 		.value = RSA_SIGN,
20072c33676SMaxim Ag 		.opt.value = &rsautl_config.rsa_mode,
20172c33676SMaxim Ag 	},
20272c33676SMaxim Ag 	{
20372c33676SMaxim Ag 		.name = "verify",
20472c33676SMaxim Ag 		.desc = "Verify the input data using RSA public key",
20572c33676SMaxim Ag 		.type = OPTION_VALUE,
20672c33676SMaxim Ag 		.value = RSA_VERIFY,
20772c33676SMaxim Ag 		.opt.value = &rsautl_config.rsa_mode,
20872c33676SMaxim Ag 	},
20972c33676SMaxim Ag 	{
21072c33676SMaxim Ag 		.name = "x931",
21172c33676SMaxim Ag 		.desc = "Use ANSI X9.31 padding",
21272c33676SMaxim Ag 		.type = OPTION_VALUE,
21372c33676SMaxim Ag 		.value = RSA_X931_PADDING,
21472c33676SMaxim Ag 		.opt.value = &rsautl_config.pad,
21572c33676SMaxim Ag 	},
21672c33676SMaxim Ag 
21772c33676SMaxim Ag 	{NULL},
21872c33676SMaxim Ag };
21972c33676SMaxim Ag 
22072c33676SMaxim Ag static void
rsautl_usage()22172c33676SMaxim Ag rsautl_usage()
22272c33676SMaxim Ag {
22372c33676SMaxim Ag 	fprintf(stderr,
22472c33676SMaxim Ag 	    "usage: rsautl [-asn1parse] [-certin] [-decrypt] [-encrypt] "
22572c33676SMaxim Ag 	    "[-hexdump]\n"
22672c33676SMaxim Ag 	    "    [-in file] [-inkey file] [-keyform der | pem]\n"
22772c33676SMaxim Ag 	    "    [-oaep | -pkcs | -raw | -x931] [-out file] [-passin arg]\n"
22872c33676SMaxim Ag 	    "    [-pubin] [-rev] [-sign] [-verify]\n\n");
22972c33676SMaxim Ag 
23072c33676SMaxim Ag 	options_usage(rsautl_options);
23172c33676SMaxim Ag }
232f5b1c8a1SJohn Marino 
233f5b1c8a1SJohn Marino int
rsautl_main(int argc,char ** argv)234f5b1c8a1SJohn Marino rsautl_main(int argc, char **argv)
235f5b1c8a1SJohn Marino {
236f5b1c8a1SJohn Marino 	BIO *in = NULL, *out = NULL;
237f5b1c8a1SJohn Marino 	X509 *x;
238f5b1c8a1SJohn Marino 	EVP_PKEY *pkey = NULL;
239f5b1c8a1SJohn Marino 	RSA *rsa = NULL;
24072c33676SMaxim Ag 	unsigned char *rsa_in = NULL, *rsa_out = NULL;
24172c33676SMaxim Ag 	char *passin = NULL;
242f5b1c8a1SJohn Marino 	int rsa_inlen, rsa_outlen = 0;
24372c33676SMaxim Ag 	int need_priv = 0;
244f5b1c8a1SJohn Marino 	int keysize;
245f5b1c8a1SJohn Marino 	int ret = 1;
246f5b1c8a1SJohn Marino 
247f5b1c8a1SJohn Marino 	if (single_execution) {
24872c33676SMaxim Ag 		if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
249f5b1c8a1SJohn Marino 			perror("pledge");
250f5b1c8a1SJohn Marino 			exit(1);
251f5b1c8a1SJohn Marino 		}
252f5b1c8a1SJohn Marino 	}
253f5b1c8a1SJohn Marino 
25472c33676SMaxim Ag 	memset(&rsautl_config, 0, sizeof(rsautl_config));
25572c33676SMaxim Ag 	rsautl_config.keyform = FORMAT_PEM;
25672c33676SMaxim Ag 	rsautl_config.key_type = KEY_PRIVKEY;
25772c33676SMaxim Ag 	rsautl_config.pad = RSA_PKCS1_PADDING;
25872c33676SMaxim Ag 	rsautl_config.rsa_mode = RSA_VERIFY;
259f5b1c8a1SJohn Marino 
26072c33676SMaxim Ag 	if (options_parse(argc, argv, rsautl_options, NULL, NULL) != 0) {
26172c33676SMaxim Ag 		rsautl_usage();
26272c33676SMaxim Ag 		return (1);
263f5b1c8a1SJohn Marino 	}
264f5b1c8a1SJohn Marino 
26572c33676SMaxim Ag 	if (rsautl_config.rsa_mode == RSA_SIGN ||
26672c33676SMaxim Ag 	    rsautl_config.rsa_mode == RSA_DECRYPT)
26772c33676SMaxim Ag 		need_priv = 1;
26872c33676SMaxim Ag 
26972c33676SMaxim Ag 	if (need_priv && rsautl_config.key_type != KEY_PRIVKEY) {
270f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "A private key is needed for this operation\n");
271f5b1c8a1SJohn Marino 		goto end;
272f5b1c8a1SJohn Marino 	}
27372c33676SMaxim Ag 	if (!app_passwd(bio_err, rsautl_config.passargin, NULL, &passin, NULL)) {
274f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error getting password\n");
275f5b1c8a1SJohn Marino 		goto end;
276f5b1c8a1SJohn Marino 	}
277f5b1c8a1SJohn Marino 
27872c33676SMaxim Ag 	switch (rsautl_config.key_type) {
279f5b1c8a1SJohn Marino 	case KEY_PRIVKEY:
28072c33676SMaxim Ag 		pkey = load_key(bio_err, rsautl_config.keyfile,
28172c33676SMaxim Ag 		    rsautl_config.keyform, 0, passin, "Private Key");
282f5b1c8a1SJohn Marino 		break;
283f5b1c8a1SJohn Marino 
284f5b1c8a1SJohn Marino 	case KEY_PUBKEY:
28572c33676SMaxim Ag 		pkey = load_pubkey(bio_err, rsautl_config.keyfile,
28672c33676SMaxim Ag 		    rsautl_config.keyform, 0, NULL, "Public Key");
287f5b1c8a1SJohn Marino 		break;
288f5b1c8a1SJohn Marino 
289f5b1c8a1SJohn Marino 	case KEY_CERT:
29072c33676SMaxim Ag 		x = load_cert(bio_err, rsautl_config.keyfile,
29172c33676SMaxim Ag 		    rsautl_config.keyform, NULL, "Certificate");
292f5b1c8a1SJohn Marino 		if (x) {
293f5b1c8a1SJohn Marino 			pkey = X509_get_pubkey(x);
294f5b1c8a1SJohn Marino 			X509_free(x);
295f5b1c8a1SJohn Marino 		}
296f5b1c8a1SJohn Marino 		break;
297f5b1c8a1SJohn Marino 	}
298f5b1c8a1SJohn Marino 
299f5b1c8a1SJohn Marino 	if (!pkey)
300f5b1c8a1SJohn Marino 		goto end;
301f5b1c8a1SJohn Marino 
302f5b1c8a1SJohn Marino 	rsa = EVP_PKEY_get1_RSA(pkey);
303f5b1c8a1SJohn Marino 	EVP_PKEY_free(pkey);
304f5b1c8a1SJohn Marino 
305f5b1c8a1SJohn Marino 	if (!rsa) {
306f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error getting RSA key\n");
307f5b1c8a1SJohn Marino 		ERR_print_errors(bio_err);
308f5b1c8a1SJohn Marino 		goto end;
309f5b1c8a1SJohn Marino 	}
31072c33676SMaxim Ag 	if (rsautl_config.infile) {
31172c33676SMaxim Ag 		if (!(in = BIO_new_file(rsautl_config.infile, "rb"))) {
312f5b1c8a1SJohn Marino 			BIO_printf(bio_err, "Error Reading Input File\n");
313f5b1c8a1SJohn Marino 			ERR_print_errors(bio_err);
314f5b1c8a1SJohn Marino 			goto end;
315f5b1c8a1SJohn Marino 		}
316f5b1c8a1SJohn Marino 	} else
317f5b1c8a1SJohn Marino 		in = BIO_new_fp(stdin, BIO_NOCLOSE);
318f5b1c8a1SJohn Marino 
31972c33676SMaxim Ag 	if (rsautl_config.outfile) {
32072c33676SMaxim Ag 		if (!(out = BIO_new_file(rsautl_config.outfile, "wb"))) {
321f5b1c8a1SJohn Marino 			BIO_printf(bio_err, "Error Reading Output File\n");
322f5b1c8a1SJohn Marino 			ERR_print_errors(bio_err);
323f5b1c8a1SJohn Marino 			goto end;
324f5b1c8a1SJohn Marino 		}
325f5b1c8a1SJohn Marino 	} else {
326f5b1c8a1SJohn Marino 		out = BIO_new_fp(stdout, BIO_NOCLOSE);
327f5b1c8a1SJohn Marino 	}
328f5b1c8a1SJohn Marino 
329f5b1c8a1SJohn Marino 	keysize = RSA_size(rsa);
330f5b1c8a1SJohn Marino 
331f5b1c8a1SJohn Marino 	rsa_in = reallocarray(NULL, keysize, 2);
332f5b1c8a1SJohn Marino 	if (rsa_in == NULL) {
333f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error allocating memory for input data\n");
334f5b1c8a1SJohn Marino 		exit(1);
335f5b1c8a1SJohn Marino 	}
336f5b1c8a1SJohn Marino 	rsa_out = malloc(keysize);
337f5b1c8a1SJohn Marino 	if (rsa_out == NULL) {
338f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error allocating memory for output data\n");
339f5b1c8a1SJohn Marino 		exit(1);
340f5b1c8a1SJohn Marino 	}
341f5b1c8a1SJohn Marino 
342f5b1c8a1SJohn Marino 	/* Read the input data */
343f5b1c8a1SJohn Marino 	rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
344f5b1c8a1SJohn Marino 	if (rsa_inlen <= 0) {
345f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "Error reading input Data\n");
346f5b1c8a1SJohn Marino 		exit(1);
347f5b1c8a1SJohn Marino 	}
34872c33676SMaxim Ag 	if (rsautl_config.rev) {
349f5b1c8a1SJohn Marino 		int i;
350f5b1c8a1SJohn Marino 		unsigned char ctmp;
351f5b1c8a1SJohn Marino 		for (i = 0; i < rsa_inlen / 2; i++) {
352f5b1c8a1SJohn Marino 			ctmp = rsa_in[i];
353f5b1c8a1SJohn Marino 			rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
354f5b1c8a1SJohn Marino 			rsa_in[rsa_inlen - 1 - i] = ctmp;
355f5b1c8a1SJohn Marino 		}
356f5b1c8a1SJohn Marino 	}
357f5b1c8a1SJohn Marino 
35872c33676SMaxim Ag 	switch (rsautl_config.rsa_mode) {
359f5b1c8a1SJohn Marino 	case RSA_VERIFY:
36072c33676SMaxim Ag 		rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out,
36172c33676SMaxim Ag 		    rsa, rsautl_config.pad);
362f5b1c8a1SJohn Marino 		break;
363f5b1c8a1SJohn Marino 
364f5b1c8a1SJohn Marino 	case RSA_SIGN:
36572c33676SMaxim Ag 		rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out,
36672c33676SMaxim Ag 		    rsa, rsautl_config.pad);
367f5b1c8a1SJohn Marino 		break;
368f5b1c8a1SJohn Marino 
369f5b1c8a1SJohn Marino 	case RSA_ENCRYPT:
37072c33676SMaxim Ag 		rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out,
37172c33676SMaxim Ag 		    rsa, rsautl_config.pad);
372f5b1c8a1SJohn Marino 		break;
373f5b1c8a1SJohn Marino 
374f5b1c8a1SJohn Marino 	case RSA_DECRYPT:
37572c33676SMaxim Ag 		rsa_outlen = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out,
37672c33676SMaxim Ag 		    rsa, rsautl_config.pad);
377f5b1c8a1SJohn Marino 		break;
378f5b1c8a1SJohn Marino 	}
379f5b1c8a1SJohn Marino 
380f5b1c8a1SJohn Marino 	if (rsa_outlen <= 0) {
381f5b1c8a1SJohn Marino 		BIO_printf(bio_err, "RSA operation error\n");
382f5b1c8a1SJohn Marino 		ERR_print_errors(bio_err);
383f5b1c8a1SJohn Marino 		goto end;
384f5b1c8a1SJohn Marino 	}
385f5b1c8a1SJohn Marino 	ret = 0;
38672c33676SMaxim Ag 	if (rsautl_config.asn1parse) {
387f5b1c8a1SJohn Marino 		if (!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
388f5b1c8a1SJohn Marino 			ERR_print_errors(bio_err);
389f5b1c8a1SJohn Marino 		}
39072c33676SMaxim Ag 	} else if (rsautl_config.hexdump)
391f5b1c8a1SJohn Marino 		BIO_dump(out, (char *) rsa_out, rsa_outlen);
392f5b1c8a1SJohn Marino 	else
393f5b1c8a1SJohn Marino 		BIO_write(out, rsa_out, rsa_outlen);
394f5b1c8a1SJohn Marino 
395f5b1c8a1SJohn Marino  end:
396f5b1c8a1SJohn Marino 	RSA_free(rsa);
397f5b1c8a1SJohn Marino 	BIO_free(in);
398f5b1c8a1SJohn Marino 	BIO_free_all(out);
399f5b1c8a1SJohn Marino 	free(rsa_in);
400f5b1c8a1SJohn Marino 	free(rsa_out);
401f5b1c8a1SJohn Marino 	free(passin);
402f5b1c8a1SJohn Marino 
403f5b1c8a1SJohn Marino 	return ret;
404f5b1c8a1SJohn Marino }
405