1 #include <u.h> 2 #include <libc.h> 3 #include <bio.h> 4 #include <auth.h> 5 #include <mp.h> 6 #include <libsec.h> 7 #include "rsa2any.h" 8 9 RSApriv* 10 getkey(int argc, char **argv, int needprivate, Attr **pa) 11 { 12 char *file, *s, *p; 13 int sz; 14 RSApriv *key; 15 Biobuf *b; 16 int regen; 17 Attr *a; 18 19 if(argc == 0) 20 file = "#d/0"; 21 else 22 file = argv[0]; 23 24 key = mallocz(sizeof(RSApriv), 1); 25 if(key == nil) 26 return nil; 27 28 if((b = Bopen(file, OREAD)) == nil){ 29 werrstr("open %s: %r", file); 30 return nil; 31 } 32 s = Brdstr(b, '\n', 1); 33 if(s == nil){ 34 werrstr("read %s: %r", file); 35 return nil; 36 } 37 if(strncmp(s, "key ", 4) != 0){ 38 werrstr("bad key format"); 39 return nil; 40 } 41 42 regen = 0; 43 a = _parseattr(s+4); 44 if(a == nil){ 45 werrstr("empty key"); 46 return nil; 47 } 48 if((p = _strfindattr(a, "proto")) == nil){ 49 werrstr("no proto"); 50 return nil; 51 } 52 if(strcmp(p, "rsa") != 0){ 53 werrstr("proto not rsa"); 54 return nil; 55 } 56 if((p = _strfindattr(a, "ek")) == nil){ 57 werrstr("no ek"); 58 return nil; 59 } 60 if((key->pub.ek = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 61 werrstr("bad ek"); 62 return nil; 63 } 64 if((p = _strfindattr(a, "n")) == nil){ 65 werrstr("no n"); 66 return nil; 67 } 68 if((key->pub.n = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 69 werrstr("bad n"); 70 return nil; 71 } 72 if((p = _strfindattr(a, "size")) == nil) 73 fprint(2, "rsa2any: warning: missing size; will add\n"); 74 else if((sz = strtol(p, &p, 10)) == 0 || *p != 0) 75 fprint(2, "rsa2any: warning: bad size; will correct\n"); 76 else if(sz != mpsignif(key->pub.n)) 77 fprint(2, "rsa2any: warning: wrong size (got %d, expected %d); will correct\n", 78 sz, mpsignif(key->pub.n)); 79 if(!needprivate) 80 goto call; 81 if((p = _strfindattr(a, "!dk")) == nil){ 82 werrstr("no !dk"); 83 return nil; 84 } 85 if((key->dk = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 86 werrstr("bad !dk"); 87 return nil; 88 } 89 if((p = _strfindattr(a, "!p")) == nil){ 90 werrstr("no !p"); 91 return nil; 92 } 93 if((key->p = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 94 werrstr("bad !p"); 95 return nil; 96 } 97 if((p = _strfindattr(a, "!q")) == nil){ 98 werrstr("no !q"); 99 return nil; 100 } 101 if((key->q = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 102 werrstr("bad !q"); 103 return nil; 104 } 105 if((p = _strfindattr(a, "!kp")) == nil){ 106 fprint(2, "rsa2any: warning: no !kp\n"); 107 regen = 1; 108 goto regen; 109 } 110 if((key->kp = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 111 fprint(2, "rsa2any: warning: bad !kp\n"); 112 regen = 1; 113 goto regen; 114 } 115 if((p = _strfindattr(a, "!kq")) == nil){ 116 fprint(2, "rsa2any: warning: no !kq\n"); 117 regen = 1; 118 goto regen; 119 } 120 if((key->kq = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 121 fprint(2, "rsa2any: warning: bad !kq\n"); 122 regen = 1; 123 goto regen; 124 } 125 if((p = _strfindattr(a, "!c2")) == nil){ 126 fprint(2, "rsa2any: warning: no !c2\n"); 127 regen = 1; 128 goto regen; 129 } 130 if((key->c2 = strtomp(p, &p, 16, nil)) == nil || *p != 0){ 131 fprint(2, "rsa2any: warning: bad !c2\n"); 132 regen = 1; 133 goto regen; 134 } 135 regen: 136 if(regen){ 137 RSApriv *k2; 138 139 k2 = rsafill(key->pub.n, key->pub.ek, key->dk, key->p, key->q); 140 if(k2 == nil){ 141 werrstr("regenerating chinese-remainder parts failed: %r"); 142 return nil; 143 } 144 key = k2; 145 } 146 call: 147 a = _delattr(a, "ek"); 148 a = _delattr(a, "n"); 149 a = _delattr(a, "size"); 150 a = _delattr(a, "!dk"); 151 a = _delattr(a, "!p"); 152 a = _delattr(a, "!q"); 153 a = _delattr(a, "!c2"); 154 a = _delattr(a, "!kp"); 155 a = _delattr(a, "!kq"); 156 if(pa) 157 *pa = a; 158 return key; 159 } 160 161