1 /* 2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the OpenSSL license (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 #include <openssl/opensslconf.h> 11 #ifdef OPENSSL_NO_RSA 12 NON_EMPTY_TRANSLATION_UNIT 13 #else 14 15 # include <stdio.h> 16 # include <stdlib.h> 17 # include <string.h> 18 # include <time.h> 19 # include "apps.h" 20 # include <openssl/bio.h> 21 # include <openssl/err.h> 22 # include <openssl/rsa.h> 23 # include <openssl/evp.h> 24 # include <openssl/x509.h> 25 # include <openssl/pem.h> 26 # include <openssl/bn.h> 27 28 typedef enum OPTION_choice { 29 OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, 30 OPT_INFORM, OPT_OUTFORM, OPT_ENGINE, OPT_IN, OPT_OUT, 31 OPT_PUBIN, OPT_PUBOUT, OPT_PASSOUT, OPT_PASSIN, 32 OPT_RSAPUBKEY_IN, OPT_RSAPUBKEY_OUT, 33 /* Do not change the order here; see case statements below */ 34 OPT_PVK_NONE, OPT_PVK_WEAK, OPT_PVK_STRONG, 35 OPT_NOOUT, OPT_TEXT, OPT_MODULUS, OPT_CHECK, OPT_CIPHER 36 } OPTION_CHOICE; 37 38 OPTIONS rsa_options[] = { 39 {"help", OPT_HELP, '-', "Display this summary"}, 40 {"inform", OPT_INFORM, 'f', "Input format, one of DER NET PEM"}, 41 {"outform", OPT_OUTFORM, 'f', "Output format, one of DER NET PEM PVK"}, 42 {"in", OPT_IN, 's', "Input file"}, 43 {"out", OPT_OUT, '>', "Output file"}, 44 {"pubin", OPT_PUBIN, '-', "Expect a public key in input file"}, 45 {"pubout", OPT_PUBOUT, '-', "Output a public key"}, 46 {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, 47 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 48 {"RSAPublicKey_in", OPT_RSAPUBKEY_IN, '-', "Input is an RSAPublicKey"}, 49 {"RSAPublicKey_out", OPT_RSAPUBKEY_OUT, '-', "Output is an RSAPublicKey"}, 50 {"noout", OPT_NOOUT, '-', "Don't print key out"}, 51 {"text", OPT_TEXT, '-', "Print the key in text"}, 52 {"modulus", OPT_MODULUS, '-', "Print the RSA key modulus"}, 53 {"check", OPT_CHECK, '-', "Verify key consistency"}, 54 {"", OPT_CIPHER, '-', "Any supported cipher"}, 55 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 56 {"pvk-strong", OPT_PVK_STRONG, '-', "Enable 'Strong' PVK encoding level (default)"}, 57 {"pvk-weak", OPT_PVK_WEAK, '-', "Enable 'Weak' PVK encoding level"}, 58 {"pvk-none", OPT_PVK_NONE, '-', "Don't enforce PVK encoding"}, 59 # endif 60 # ifndef OPENSSL_NO_ENGINE 61 {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, 62 # endif 63 {NULL} 64 }; 65 66 int rsa_main(int argc, char **argv) 67 { 68 ENGINE *e = NULL; 69 BIO *out = NULL; 70 RSA *rsa = NULL; 71 const EVP_CIPHER *enc = NULL; 72 char *infile = NULL, *outfile = NULL, *prog; 73 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; 74 int i, private = 0; 75 int informat = FORMAT_PEM, outformat = FORMAT_PEM, text = 0, check = 0; 76 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; 77 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 78 int pvk_encr = 2; 79 # endif 80 OPTION_CHOICE o; 81 82 prog = opt_init(argc, argv, rsa_options); 83 while ((o = opt_next()) != OPT_EOF) { 84 switch (o) { 85 case OPT_EOF: 86 case OPT_ERR: 87 opthelp: 88 BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); 89 goto end; 90 case OPT_HELP: 91 opt_help(rsa_options); 92 ret = 0; 93 goto end; 94 case OPT_INFORM: 95 if (!opt_format(opt_arg(), OPT_FMT_ANY, &informat)) 96 goto opthelp; 97 break; 98 case OPT_IN: 99 infile = opt_arg(); 100 break; 101 case OPT_OUTFORM: 102 if (!opt_format(opt_arg(), OPT_FMT_ANY, &outformat)) 103 goto opthelp; 104 break; 105 case OPT_OUT: 106 outfile = opt_arg(); 107 break; 108 case OPT_PASSIN: 109 passinarg = opt_arg(); 110 break; 111 case OPT_PASSOUT: 112 passoutarg = opt_arg(); 113 break; 114 case OPT_ENGINE: 115 e = setup_engine(opt_arg(), 0); 116 break; 117 case OPT_PUBIN: 118 pubin = 1; 119 break; 120 case OPT_PUBOUT: 121 pubout = 1; 122 break; 123 case OPT_RSAPUBKEY_IN: 124 pubin = 2; 125 break; 126 case OPT_RSAPUBKEY_OUT: 127 pubout = 2; 128 break; 129 case OPT_PVK_STRONG: /* pvk_encr:= 2 */ 130 case OPT_PVK_WEAK: /* pvk_encr:= 1 */ 131 case OPT_PVK_NONE: /* pvk_encr:= 0 */ 132 # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) 133 pvk_encr = (o - OPT_PVK_NONE); 134 # endif 135 break; 136 case OPT_NOOUT: 137 noout = 1; 138 break; 139 case OPT_TEXT: 140 text = 1; 141 break; 142 case OPT_MODULUS: 143 modulus = 1; 144 break; 145 case OPT_CHECK: 146 check = 1; 147 break; 148 case OPT_CIPHER: 149 if (!opt_cipher(opt_unknown(), &enc)) 150 goto opthelp; 151 break; 152 } 153 } 154 argc = opt_num_rest(); 155 if (argc != 0) 156 goto opthelp; 157 158 private = (text && !pubin) || (!pubout && !noout) ? 1 : 0; 159 160 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { 161 BIO_printf(bio_err, "Error getting passwords\n"); 162 goto end; 163 } 164 if (check && pubin) { 165 BIO_printf(bio_err, "Only private keys can be checked\n"); 166 goto end; 167 } 168 169 { 170 EVP_PKEY *pkey; 171 172 if (pubin) { 173 int tmpformat = -1; 174 if (pubin == 2) { 175 if (informat == FORMAT_PEM) 176 tmpformat = FORMAT_PEMRSA; 177 else if (informat == FORMAT_ASN1) 178 tmpformat = FORMAT_ASN1RSA; 179 } else 180 tmpformat = informat; 181 182 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "Public Key"); 183 } else 184 pkey = load_key(infile, informat, 1, passin, e, "Private Key"); 185 186 if (pkey != NULL) 187 rsa = EVP_PKEY_get1_RSA(pkey); 188 EVP_PKEY_free(pkey); 189 } 190 191 if (rsa == NULL) { 192 ERR_print_errors(bio_err); 193 goto end; 194 } 195 196 out = bio_open_owner(outfile, outformat, private); 197 if (out == NULL) 198 goto end; 199 200 if (text) { 201 assert(pubin || private); 202 if (!RSA_print(out, rsa, 0)) { 203 perror(outfile); 204 ERR_print_errors(bio_err); 205 goto end; 206 } 207 } 208 209 if (modulus) { 210 const BIGNUM *n; 211 RSA_get0_key(rsa, &n, NULL, NULL); 212 BIO_printf(out, "Modulus="); 213 BN_print(out, n); 214 BIO_printf(out, "\n"); 215 } 216 217 if (check) { 218 int r = RSA_check_key_ex(rsa, NULL); 219 220 if (r == 1) 221 BIO_printf(out, "RSA key ok\n"); 222 else if (r == 0) { 223 unsigned long err; 224 225 while ((err = ERR_peek_error()) != 0 && 226 ERR_GET_LIB(err) == ERR_LIB_RSA && 227 ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY_EX && 228 ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) { 229 BIO_printf(out, "RSA key error: %s\n", 230 ERR_reason_error_string(err)); 231 ERR_get_error(); /* remove e from error stack */ 232 } 233 } else if (r == -1) { 234 ERR_print_errors(bio_err); 235 goto end; 236 } 237 } 238 239 if (noout) { 240 ret = 0; 241 goto end; 242 } 243 BIO_printf(bio_err, "writing RSA key\n"); 244 if (outformat == FORMAT_ASN1) { 245 if (pubout || pubin) { 246 if (pubout == 2) 247 i = i2d_RSAPublicKey_bio(out, rsa); 248 else 249 i = i2d_RSA_PUBKEY_bio(out, rsa); 250 } else { 251 assert(private); 252 i = i2d_RSAPrivateKey_bio(out, rsa); 253 } 254 } 255 else if (outformat == FORMAT_PEM) { 256 if (pubout || pubin) { 257 if (pubout == 2) 258 i = PEM_write_bio_RSAPublicKey(out, rsa); 259 else 260 i = PEM_write_bio_RSA_PUBKEY(out, rsa); 261 } else { 262 assert(private); 263 i = PEM_write_bio_RSAPrivateKey(out, rsa, 264 enc, NULL, 0, NULL, passout); 265 } 266 # ifndef OPENSSL_NO_DSA 267 } else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) { 268 EVP_PKEY *pk; 269 pk = EVP_PKEY_new(); 270 EVP_PKEY_set1_RSA(pk, rsa); 271 if (outformat == FORMAT_PVK) { 272 if (pubin) { 273 BIO_printf(bio_err, "PVK form impossible with public key input\n"); 274 EVP_PKEY_free(pk); 275 goto end; 276 } 277 assert(private); 278 # ifdef OPENSSL_NO_RC4 279 BIO_printf(bio_err, "PVK format not supported\n"); 280 EVP_PKEY_free(pk); 281 goto end; 282 # else 283 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 284 # endif 285 } else if (pubin || pubout) { 286 i = i2b_PublicKey_bio(out, pk); 287 } else { 288 assert(private); 289 i = i2b_PrivateKey_bio(out, pk); 290 } 291 EVP_PKEY_free(pk); 292 # endif 293 } else { 294 BIO_printf(bio_err, "bad output format specified for outfile\n"); 295 goto end; 296 } 297 if (i <= 0) { 298 BIO_printf(bio_err, "unable to write key\n"); 299 ERR_print_errors(bio_err); 300 } else 301 ret = 0; 302 end: 303 release_engine(e); 304 BIO_free_all(out); 305 RSA_free(rsa); 306 OPENSSL_free(passin); 307 OPENSSL_free(passout); 308 return (ret); 309 } 310 #endif 311