[BACK]Return to rsautl.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / openssl

Annotation of src/usr.bin/openssl/rsautl.c, Revision 1.4

1.4     ! lteo        1: /* $OpenBSD: rsautl.c,v 1.3 2014/08/28 14:25:48 jsing Exp $ */
1.1       jsing       2: /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
                      3:  * project 2000.
                      4:  */
                      5: /* ====================================================================
                      6:  * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
                      7:  *
                      8:  * Redistribution and use in source and binary forms, with or without
                      9:  * modification, are permitted provided that the following conditions
                     10:  * are met:
                     11:  *
                     12:  * 1. Redistributions of source code must retain the above copyright
                     13:  *    notice, this list of conditions and the following disclaimer.
                     14:  *
                     15:  * 2. Redistributions in binary form must reproduce the above copyright
                     16:  *    notice, this list of conditions and the following disclaimer in
                     17:  *    the documentation and/or other materials provided with the
                     18:  *    distribution.
                     19:  *
                     20:  * 3. All advertising materials mentioning features or use of this
                     21:  *    software must display the following acknowledgment:
                     22:  *    "This product includes software developed by the OpenSSL Project
                     23:  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
                     24:  *
                     25:  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
                     26:  *    endorse or promote products derived from this software without
                     27:  *    prior written permission. For written permission, please contact
                     28:  *    licensing@OpenSSL.org.
                     29:  *
                     30:  * 5. Products derived from this software may not be called "OpenSSL"
                     31:  *    nor may "OpenSSL" appear in their names without prior written
                     32:  *    permission of the OpenSSL Project.
                     33:  *
                     34:  * 6. Redistributions of any form whatsoever must retain the following
                     35:  *    acknowledgment:
                     36:  *    "This product includes software developed by the OpenSSL Project
                     37:  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
                     38:  *
                     39:  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
                     40:  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     41:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
                     42:  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
                     43:  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
                     44:  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     45:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
                     46:  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     47:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
                     48:  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
                     49:  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
                     50:  * OF THE POSSIBILITY OF SUCH DAMAGE.
                     51:  * ====================================================================
                     52:  *
                     53:  * This product includes cryptographic software written by Eric Young
                     54:  * (eay@cryptsoft.com).  This product includes software written by Tim
                     55:  * Hudson (tjh@cryptsoft.com).
                     56:  *
                     57:  */
                     58:
                     59: #include <openssl/opensslconf.h>
                     60:
                     61:
                     62: #include <string.h>
                     63:
                     64: #include "apps.h"
                     65:
                     66: #include <openssl/err.h>
                     67: #include <openssl/pem.h>
                     68: #include <openssl/rsa.h>
                     69:
                     70: #define RSA_SIGN       1
                     71: #define RSA_VERIFY     2
                     72: #define RSA_ENCRYPT    3
                     73: #define RSA_DECRYPT    4
                     74:
                     75: #define KEY_PRIVKEY    1
                     76: #define KEY_PUBKEY     2
                     77: #define KEY_CERT       3
                     78:
                     79: static void usage(void);
                     80:
                     81: int rsautl_main(int argc, char **);
                     82:
                     83: int
                     84: rsautl_main(int argc, char **argv)
                     85: {
                     86:        ENGINE *e = NULL;
                     87:        BIO *in = NULL, *out = NULL;
                     88:        char *infile = NULL, *outfile = NULL;
                     89: #ifndef OPENSSL_NO_ENGINE
                     90:        char *engine = NULL;
                     91: #endif
                     92:        char *keyfile = NULL;
                     93:        char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
                     94:        int keyform = FORMAT_PEM;
                     95:        char need_priv = 0, badarg = 0, rev = 0;
                     96:        char hexdump = 0, asn1parse = 0;
                     97:        X509 *x;
                     98:        EVP_PKEY *pkey = NULL;
                     99:        RSA *rsa = NULL;
                    100:        unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
                    101:        char *passargin = NULL, *passin = NULL;
                    102:        int rsa_inlen, rsa_outlen = 0;
                    103:        int keysize;
                    104:
                    105:        int ret = 1;
                    106:
                    107:        argc--;
                    108:        argv++;
                    109:
                    110:        pad = RSA_PKCS1_PADDING;
                    111:
                    112:        while (argc >= 1) {
                    113:                if (!strcmp(*argv, "-in")) {
                    114:                        if (--argc < 1)
                    115:                                badarg = 1;
                    116:                        else
                    117:                                infile = *(++argv);
                    118:                } else if (!strcmp(*argv, "-out")) {
                    119:                        if (--argc < 1)
                    120:                                badarg = 1;
                    121:                        else
                    122:                                outfile = *(++argv);
                    123:                } else if (!strcmp(*argv, "-inkey")) {
                    124:                        if (--argc < 1)
                    125:                                badarg = 1;
                    126:                        else
                    127:                                keyfile = *(++argv);
                    128:                } else if (!strcmp(*argv, "-passin")) {
                    129:                        if (--argc < 1)
                    130:                                badarg = 1;
                    131:                        else
                    132:                                passargin = *(++argv);
                    133:                } else if (strcmp(*argv, "-keyform") == 0) {
                    134:                        if (--argc < 1)
                    135:                                badarg = 1;
                    136:                        else
                    137:                                keyform = str2fmt(*(++argv));
                    138: #ifndef OPENSSL_NO_ENGINE
                    139:                } else if (!strcmp(*argv, "-engine")) {
                    140:                        if (--argc < 1)
                    141:                                badarg = 1;
                    142:                        else
                    143:                                engine = *(++argv);
                    144: #endif
                    145:                } else if (!strcmp(*argv, "-pubin")) {
                    146:                        key_type = KEY_PUBKEY;
                    147:                } else if (!strcmp(*argv, "-certin")) {
                    148:                        key_type = KEY_CERT;
                    149:                } else if (!strcmp(*argv, "-asn1parse"))
                    150:                        asn1parse = 1;
                    151:                else if (!strcmp(*argv, "-hexdump"))
                    152:                        hexdump = 1;
                    153:                else if (!strcmp(*argv, "-raw"))
                    154:                        pad = RSA_NO_PADDING;
                    155:                else if (!strcmp(*argv, "-oaep"))
                    156:                        pad = RSA_PKCS1_OAEP_PADDING;
                    157:                else if (!strcmp(*argv, "-ssl"))
                    158:                        pad = RSA_SSLV23_PADDING;
                    159:                else if (!strcmp(*argv, "-pkcs"))
                    160:                        pad = RSA_PKCS1_PADDING;
                    161:                else if (!strcmp(*argv, "-x931"))
                    162:                        pad = RSA_X931_PADDING;
                    163:                else if (!strcmp(*argv, "-sign")) {
                    164:                        rsa_mode = RSA_SIGN;
                    165:                        need_priv = 1;
                    166:                } else if (!strcmp(*argv, "-verify"))
                    167:                        rsa_mode = RSA_VERIFY;
                    168:                else if (!strcmp(*argv, "-rev"))
                    169:                        rev = 1;
                    170:                else if (!strcmp(*argv, "-encrypt"))
                    171:                        rsa_mode = RSA_ENCRYPT;
                    172:                else if (!strcmp(*argv, "-decrypt")) {
                    173:                        rsa_mode = RSA_DECRYPT;
                    174:                        need_priv = 1;
                    175:                } else
                    176:                        badarg = 1;
                    177:                if (badarg) {
                    178:                        usage();
                    179:                        goto end;
                    180:                }
                    181:                argc--;
                    182:                argv++;
                    183:        }
                    184:
                    185:        if (need_priv && (key_type != KEY_PRIVKEY)) {
                    186:                BIO_printf(bio_err, "A private key is needed for this operation\n");
                    187:                goto end;
                    188:        }
                    189: #ifndef OPENSSL_NO_ENGINE
                    190:        e = setup_engine(bio_err, engine, 0);
                    191: #endif
                    192:        if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
                    193:                BIO_printf(bio_err, "Error getting password\n");
                    194:                goto end;
                    195:        }
                    196:
                    197:        switch (key_type) {
                    198:        case KEY_PRIVKEY:
                    199:                pkey = load_key(bio_err, keyfile, keyform, 0,
                    200:                    passin, e, "Private Key");
                    201:                break;
                    202:
                    203:        case KEY_PUBKEY:
                    204:                pkey = load_pubkey(bio_err, keyfile, keyform, 0,
                    205:                    NULL, e, "Public Key");
                    206:                break;
                    207:
                    208:        case KEY_CERT:
                    209:                x = load_cert(bio_err, keyfile, keyform,
                    210:                    NULL, e, "Certificate");
                    211:                if (x) {
                    212:                        pkey = X509_get_pubkey(x);
                    213:                        X509_free(x);
                    214:                }
                    215:                break;
                    216:        }
                    217:
                    218:        if (!pkey) {
                    219:                return 1;
                    220:        }
                    221:        rsa = EVP_PKEY_get1_RSA(pkey);
                    222:        EVP_PKEY_free(pkey);
                    223:
                    224:        if (!rsa) {
                    225:                BIO_printf(bio_err, "Error getting RSA key\n");
                    226:                ERR_print_errors(bio_err);
                    227:                goto end;
                    228:        }
                    229:        if (infile) {
                    230:                if (!(in = BIO_new_file(infile, "rb"))) {
                    231:                        BIO_printf(bio_err, "Error Reading Input File\n");
                    232:                        ERR_print_errors(bio_err);
                    233:                        goto end;
                    234:                }
                    235:        } else
                    236:                in = BIO_new_fp(stdin, BIO_NOCLOSE);
                    237:
                    238:        if (outfile) {
                    239:                if (!(out = BIO_new_file(outfile, "wb"))) {
                    240:                        BIO_printf(bio_err, "Error Reading Output File\n");
                    241:                        ERR_print_errors(bio_err);
                    242:                        goto end;
                    243:                }
                    244:        } else {
                    245:                out = BIO_new_fp(stdout, BIO_NOCLOSE);
                    246:        }
                    247:
                    248:        keysize = RSA_size(rsa);
                    249:
                    250:        rsa_in = reallocarray(NULL, keysize, 2);
1.4     ! lteo      251:        if (rsa_in == NULL) {
        !           252:                BIO_printf(bio_err, "Error allocating memory for input data\n");
        !           253:                exit(1);
        !           254:        }
1.1       jsing     255:        rsa_out = malloc(keysize);
1.4     ! lteo      256:        if (rsa_out == NULL) {
        !           257:                BIO_printf(bio_err, "Error allocating memory for output data\n");
        !           258:                exit(1);
        !           259:        }
1.1       jsing     260:
                    261:        /* Read the input data */
                    262:        rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
                    263:        if (rsa_inlen <= 0) {
                    264:                BIO_printf(bio_err, "Error reading input Data\n");
                    265:                exit(1);
                    266:        }
                    267:        if (rev) {
                    268:                int i;
                    269:                unsigned char ctmp;
                    270:                for (i = 0; i < rsa_inlen / 2; i++) {
                    271:                        ctmp = rsa_in[i];
                    272:                        rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
                    273:                        rsa_in[rsa_inlen - 1 - i] = ctmp;
                    274:                }
                    275:        }
                    276:        switch (rsa_mode) {
                    277:
                    278:        case RSA_VERIFY:
                    279:                rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
                    280:                break;
                    281:
                    282:        case RSA_SIGN:
                    283:                rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
                    284:                break;
                    285:
                    286:        case RSA_ENCRYPT:
                    287:                rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
                    288:                break;
                    289:
                    290:        case RSA_DECRYPT:
                    291:                rsa_outlen = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
                    292:                break;
                    293:
                    294:        }
                    295:
                    296:        if (rsa_outlen <= 0) {
                    297:                BIO_printf(bio_err, "RSA operation error\n");
                    298:                ERR_print_errors(bio_err);
                    299:                goto end;
                    300:        }
                    301:        ret = 0;
                    302:        if (asn1parse) {
                    303:                if (!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
                    304:                        ERR_print_errors(bio_err);
                    305:                }
                    306:        } else if (hexdump)
                    307:                BIO_dump(out, (char *) rsa_out, rsa_outlen);
                    308:        else
                    309:                BIO_write(out, rsa_out, rsa_outlen);
                    310:
                    311: end:
                    312:        RSA_free(rsa);
                    313:        BIO_free(in);
                    314:        BIO_free_all(out);
                    315:        free(rsa_in);
                    316:        free(rsa_out);
                    317:        free(passin);
                    318:
                    319:        return ret;
                    320: }
                    321:
                    322: static void
                    323: usage()
                    324: {
                    325:        BIO_printf(bio_err, "Usage: rsautl [options]\n");
                    326:        BIO_printf(bio_err, "-in file        input file\n");
                    327:        BIO_printf(bio_err, "-out file       output file\n");
                    328:        BIO_printf(bio_err, "-inkey file     input key\n");
                    329:        BIO_printf(bio_err, "-keyform arg    private key format - default PEM\n");
                    330:        BIO_printf(bio_err, "-pubin          input is an RSA public\n");
                    331:        BIO_printf(bio_err, "-certin         input is a certificate carrying an RSA public key\n");
                    332:        BIO_printf(bio_err, "-ssl            use SSL v2 padding\n");
                    333:        BIO_printf(bio_err, "-raw            use no padding\n");
                    334:        BIO_printf(bio_err, "-pkcs           use PKCS#1 v1.5 padding (default)\n");
                    335:        BIO_printf(bio_err, "-oaep           use PKCS#1 OAEP\n");
                    336:        BIO_printf(bio_err, "-sign           sign with private key\n");
                    337:        BIO_printf(bio_err, "-verify         verify with public key\n");
                    338:        BIO_printf(bio_err, "-encrypt        encrypt with public key\n");
                    339:        BIO_printf(bio_err, "-decrypt        decrypt with private key\n");
                    340:        BIO_printf(bio_err, "-hexdump        hex dump output\n");
                    341: #ifndef OPENSSL_NO_ENGINE
                    342:        BIO_printf(bio_err, "-engine e       use engine e, possibly a hardware device.\n");
                    343:        BIO_printf(bio_err, "-passin arg    pass phrase source\n");
                    344: #endif
                    345:
                    346: }
                    347: