1 /* 2 * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the OpenSSL license (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 #include <openssl/opensslconf.h> 11 #ifdef OPENSSL_NO_DSA 12 NON_EMPTY_TRANSLATION_UNIT 13 #else 14 15 # include <stdio.h> 16 # include <stdlib.h> 17 # include <time.h> 18 # include <string.h> 19 # include "apps.h" 20 # include <openssl/bio.h> 21 # include <openssl/err.h> 22 # include <openssl/bn.h> 23 # include <openssl/dsa.h> 24 # include <openssl/x509.h> 25 # include <openssl/pem.h> 26 27 # ifdef GENCB_TEST 28 29 static int stop_keygen_flag = 0; 30 31 static void timebomb_sigalarm(int foo) 32 { 33 stop_keygen_flag = 1; 34 } 35 36 # endif 37 38 static int dsa_cb(int p, int n, BN_GENCB *cb); 39 40 typedef enum OPTION_choice { 41 OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, 42 OPT_INFORM, OPT_OUTFORM, OPT_IN, OPT_OUT, OPT_TEXT, OPT_C, 43 OPT_NOOUT, OPT_GENKEY, OPT_RAND, OPT_ENGINE, 44 OPT_TIMEBOMB 45 } OPTION_CHOICE; 46 47 OPTIONS dsaparam_options[] = { 48 {"help", OPT_HELP, '-', "Display this summary"}, 49 {"inform", OPT_INFORM, 'F', "Input format - DER or PEM"}, 50 {"in", OPT_IN, '<', "Input file"}, 51 {"outform", OPT_OUTFORM, 'F', "Output format - DER or PEM"}, 52 {"out", OPT_OUT, '>', "Output file"}, 53 {"text", OPT_TEXT, '-', "Print as text"}, 54 {"C", OPT_C, '-', "Output C code"}, 55 {"noout", OPT_NOOUT, '-', "No output"}, 56 {"genkey", OPT_GENKEY, '-', "Generate a DSA key"}, 57 {"rand", OPT_RAND, 's', "Files to use for random number input"}, 58 # ifdef GENCB_TEST 59 {"timebomb", OPT_TIMEBOMB, 'p', "Interrupt keygen after 'pnum' seconds"}, 60 # endif 61 # ifndef OPENSSL_NO_ENGINE 62 {"engine", OPT_ENGINE, 's', "Use engine e, possibly a hardware device"}, 63 # endif 64 {NULL} 65 }; 66 67 int dsaparam_main(int argc, char **argv) 68 { 69 ENGINE *e = NULL; 70 DSA *dsa = NULL; 71 BIO *in = NULL, *out = NULL; 72 BN_GENCB *cb = NULL; 73 int numbits = -1, num = 0, genkey = 0, need_rand = 0; 74 int informat = FORMAT_PEM, outformat = FORMAT_PEM, noout = 0, C = 0; 75 int ret = 1, i, text = 0, private = 0; 76 # ifdef GENCB_TEST 77 int timebomb = 0; 78 # endif 79 char *infile = NULL, *outfile = NULL, *prog, *inrand = NULL; 80 OPTION_CHOICE o; 81 82 prog = opt_init(argc, argv, dsaparam_options); 83 while ((o = opt_next()) != OPT_EOF) { 84 switch (o) { 85 case OPT_EOF: 86 case OPT_ERR: 87 opthelp: 88 BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); 89 goto end; 90 case OPT_HELP: 91 opt_help(dsaparam_options); 92 ret = 0; 93 goto end; 94 case OPT_INFORM: 95 if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) 96 goto opthelp; 97 break; 98 case OPT_IN: 99 infile = opt_arg(); 100 break; 101 case OPT_OUTFORM: 102 if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &outformat)) 103 goto opthelp; 104 break; 105 case OPT_OUT: 106 outfile = opt_arg(); 107 break; 108 case OPT_ENGINE: 109 e = setup_engine(opt_arg(), 0); 110 break; 111 case OPT_TIMEBOMB: 112 # ifdef GENCB_TEST 113 timebomb = atoi(opt_arg()); 114 break; 115 # endif 116 case OPT_TEXT: 117 text = 1; 118 break; 119 case OPT_C: 120 C = 1; 121 break; 122 case OPT_GENKEY: 123 genkey = need_rand = 1; 124 break; 125 case OPT_RAND: 126 inrand = opt_arg(); 127 need_rand = 1; 128 break; 129 case OPT_NOOUT: 130 noout = 1; 131 break; 132 } 133 } 134 argc = opt_num_rest(); 135 argv = opt_rest(); 136 137 if (argc == 1) { 138 if (!opt_int(argv[0], &num) || num < 0) 139 goto end; 140 /* generate a key */ 141 numbits = num; 142 need_rand = 1; 143 } 144 private = genkey ? 1 : 0; 145 146 in = bio_open_default(infile, 'r', informat); 147 if (in == NULL) 148 goto end; 149 out = bio_open_owner(outfile, outformat, private); 150 if (out == NULL) 151 goto end; 152 153 if (need_rand) { 154 app_RAND_load_file(NULL, (inrand != NULL)); 155 if (inrand != NULL) 156 BIO_printf(bio_err, "%ld semi-random bytes loaded\n", 157 app_RAND_load_files(inrand)); 158 } 159 160 if (numbits > 0) { 161 cb = BN_GENCB_new(); 162 if (cb == NULL) { 163 BIO_printf(bio_err, "Error allocating BN_GENCB object\n"); 164 goto end; 165 } 166 BN_GENCB_set(cb, dsa_cb, bio_err); 167 assert(need_rand); 168 dsa = DSA_new(); 169 if (dsa == NULL) { 170 BIO_printf(bio_err, "Error allocating DSA object\n"); 171 goto end; 172 } 173 BIO_printf(bio_err, "Generating DSA parameters, %d bit long prime\n", 174 num); 175 BIO_printf(bio_err, "This could take some time\n"); 176 # ifdef GENCB_TEST 177 if (timebomb > 0) { 178 struct sigaction act; 179 act.sa_handler = timebomb_sigalarm; 180 act.sa_flags = 0; 181 BIO_printf(bio_err, 182 "(though I'll stop it if not done within %d secs)\n", 183 timebomb); 184 if (sigaction(SIGALRM, &act, NULL) != 0) { 185 BIO_printf(bio_err, "Error, couldn't set SIGALRM handler\n"); 186 goto end; 187 } 188 alarm(timebomb); 189 } 190 # endif 191 if (!DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, cb)) { 192 # ifdef GENCB_TEST 193 if (stop_keygen_flag) { 194 BIO_printf(bio_err, "DSA key generation time-stopped\n"); 195 /* This is an asked-for behaviour! */ 196 ret = 0; 197 goto end; 198 } 199 # endif 200 ERR_print_errors(bio_err); 201 BIO_printf(bio_err, "Error, DSA key generation failed\n"); 202 goto end; 203 } 204 } else if (informat == FORMAT_ASN1) 205 dsa = d2i_DSAparams_bio(in, NULL); 206 else 207 dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL); 208 if (dsa == NULL) { 209 BIO_printf(bio_err, "unable to load DSA parameters\n"); 210 ERR_print_errors(bio_err); 211 goto end; 212 } 213 214 if (text) { 215 DSAparams_print(out, dsa); 216 } 217 218 if (C) { 219 const BIGNUM *p = NULL, *q = NULL, *g = NULL; 220 unsigned char *data; 221 int len, bits_p; 222 223 DSA_get0_pqg(dsa, &p, &q, &g); 224 len = BN_num_bytes(p); 225 bits_p = BN_num_bits(p); 226 227 data = app_malloc(len + 20, "BN space"); 228 229 BIO_printf(bio_out, "DSA *get_dsa%d()\n{\n", bits_p); 230 print_bignum_var(bio_out, p, "dsap", len, data); 231 print_bignum_var(bio_out, q, "dsaq", len, data); 232 print_bignum_var(bio_out, g, "dsag", len, data); 233 BIO_printf(bio_out, " DSA *dsa = DSA_new();\n" 234 "\n"); 235 BIO_printf(bio_out, " if (dsa == NULL)\n" 236 " return NULL;\n"); 237 BIO_printf(bio_out, " dsa->p = BN_bin2bn(dsap_%d, sizeof(dsap_%d), NULL);\n", 238 bits_p, bits_p); 239 BIO_printf(bio_out, " dsa->q = BN_bin2bn(dsaq_%d, sizeof(dsaq_%d), NULL);\n", 240 bits_p, bits_p); 241 BIO_printf(bio_out, " dsa->g = BN_bin2bn(dsag_%d, sizeof(dsag_%d), NULL);\n", 242 bits_p, bits_p); 243 BIO_printf(bio_out, " if (!dsa->p || !dsa->q || !dsa->g) {\n" 244 " DSA_free(dsa);\n" 245 " return NULL;\n" 246 " }\n" 247 " return(dsa);\n}\n"); 248 OPENSSL_free(data); 249 } 250 251 if (outformat == FORMAT_ASN1 && genkey) 252 noout = 1; 253 254 if (!noout) { 255 if (outformat == FORMAT_ASN1) 256 i = i2d_DSAparams_bio(out, dsa); 257 else 258 i = PEM_write_bio_DSAparams(out, dsa); 259 if (!i) { 260 BIO_printf(bio_err, "unable to write DSA parameters\n"); 261 ERR_print_errors(bio_err); 262 goto end; 263 } 264 } 265 if (genkey) { 266 DSA *dsakey; 267 268 assert(need_rand); 269 if ((dsakey = DSAparams_dup(dsa)) == NULL) 270 goto end; 271 if (!DSA_generate_key(dsakey)) { 272 ERR_print_errors(bio_err); 273 DSA_free(dsakey); 274 goto end; 275 } 276 assert(private); 277 if (outformat == FORMAT_ASN1) 278 i = i2d_DSAPrivateKey_bio(out, dsakey); 279 else 280 i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL, 281 NULL); 282 DSA_free(dsakey); 283 } 284 if (need_rand) 285 app_RAND_write_file(NULL); 286 ret = 0; 287 end: 288 BN_GENCB_free(cb); 289 BIO_free(in); 290 BIO_free_all(out); 291 DSA_free(dsa); 292 release_engine(e); 293 return (ret); 294 } 295 296 static int dsa_cb(int p, int n, BN_GENCB *cb) 297 { 298 char c = '*'; 299 300 if (p == 0) 301 c = '.'; 302 if (p == 1) 303 c = '+'; 304 if (p == 2) 305 c = '*'; 306 if (p == 3) 307 c = '\n'; 308 BIO_write(BN_GENCB_get_arg(cb), &c, 1); 309 (void)BIO_flush(BN_GENCB_get_arg(cb)); 310 # ifdef GENCB_TEST 311 if (stop_keygen_flag) 312 return 0; 313 # endif 314 return 1; 315 } 316 #endif 317