|  | /* | 
|  | * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved. | 
|  | * | 
|  | * Licensed under the OpenSSL license (the "License").  You may not use | 
|  | * this file except in compliance with the License.  You can obtain a copy | 
|  | * in the file LICENSE in the source distribution or at | 
|  | * https://www.openssl.org/source/license.html | 
|  | */ | 
|  |  | 
|  | #include <openssl/opensslconf.h> | 
|  | #ifdef OPENSSL_NO_RSA | 
|  | NON_EMPTY_TRANSLATION_UNIT | 
|  | #else | 
|  |  | 
|  | # include <stdio.h> | 
|  | # include <stdlib.h> | 
|  | # include <string.h> | 
|  | # include <time.h> | 
|  | # include "apps.h" | 
|  | # include <openssl/bio.h> | 
|  | # include <openssl/err.h> | 
|  | # include <openssl/rsa.h> | 
|  | # include <openssl/evp.h> | 
|  | # include <openssl/x509.h> | 
|  | # include <openssl/pem.h> | 
|  | # include <openssl/bn.h> | 
|  |  | 
|  | typedef enum OPTION_choice { | 
|  | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | 
|  | OPT_INFORM, OPT_OUTFORM, OPT_ENGINE, OPT_IN, OPT_OUT, | 
|  | OPT_PUBIN, OPT_PUBOUT, OPT_PASSOUT, OPT_PASSIN, | 
|  | OPT_RSAPUBKEY_IN, OPT_RSAPUBKEY_OUT, | 
|  | /* Do not change the order here; see case statements below */ | 
|  | OPT_PVK_NONE, OPT_PVK_WEAK, OPT_PVK_STRONG, | 
|  | OPT_NOOUT, OPT_TEXT, OPT_MODULUS, OPT_CHECK, OPT_CIPHER | 
|  | } OPTION_CHOICE; | 
|  |  | 
|  | const OPTIONS rsa_options[] = { | 
|  | {"help", OPT_HELP, '-', "Display this summary"}, | 
|  | {"inform", OPT_INFORM, 'f', "Input format, one of DER NET PEM"}, | 
|  | {"outform", OPT_OUTFORM, 'f', "Output format, one of DER NET PEM PVK"}, | 
|  | {"in", OPT_IN, 's', "Input file"}, | 
|  | {"out", OPT_OUT, '>', "Output file"}, | 
|  | {"pubin", OPT_PUBIN, '-', "Expect a public key in input file"}, | 
|  | {"pubout", OPT_PUBOUT, '-', "Output a public key"}, | 
|  | {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, | 
|  | {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, | 
|  | {"RSAPublicKey_in", OPT_RSAPUBKEY_IN, '-', "Input is an RSAPublicKey"}, | 
|  | {"RSAPublicKey_out", OPT_RSAPUBKEY_OUT, '-', "Output is an RSAPublicKey"}, | 
|  | {"noout", OPT_NOOUT, '-', "Don't print key out"}, | 
|  | {"text", OPT_TEXT, '-', "Print the key in text"}, | 
|  | {"modulus", OPT_MODULUS, '-', "Print the RSA key modulus"}, | 
|  | {"check", OPT_CHECK, '-', "Verify key consistency"}, | 
|  | {"", OPT_CIPHER, '-', "Any supported cipher"}, | 
|  | # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) | 
|  | {"pvk-strong", OPT_PVK_STRONG, '-', "Enable 'Strong' PVK encoding level (default)"}, | 
|  | {"pvk-weak", OPT_PVK_WEAK, '-', "Enable 'Weak' PVK encoding level"}, | 
|  | {"pvk-none", OPT_PVK_NONE, '-', "Don't enforce PVK encoding"}, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_ENGINE | 
|  | {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, | 
|  | # endif | 
|  | {NULL} | 
|  | }; | 
|  |  | 
|  | int rsa_main(int argc, char **argv) | 
|  | { | 
|  | ENGINE *e = NULL; | 
|  | BIO *out = NULL; | 
|  | RSA *rsa = NULL; | 
|  | const EVP_CIPHER *enc = NULL; | 
|  | char *infile = NULL, *outfile = NULL, *prog; | 
|  | char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; | 
|  | int i, private = 0; | 
|  | int informat = FORMAT_PEM, outformat = FORMAT_PEM, text = 0, check = 0; | 
|  | int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; | 
|  | # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) | 
|  | int pvk_encr = 2; | 
|  | # endif | 
|  | OPTION_CHOICE o; | 
|  |  | 
|  | prog = opt_init(argc, argv, rsa_options); | 
|  | while ((o = opt_next()) != OPT_EOF) { | 
|  | switch (o) { | 
|  | case OPT_EOF: | 
|  | case OPT_ERR: | 
|  | opthelp: | 
|  | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | 
|  | goto end; | 
|  | case OPT_HELP: | 
|  | opt_help(rsa_options); | 
|  | ret = 0; | 
|  | goto end; | 
|  | case OPT_INFORM: | 
|  | if (!opt_format(opt_arg(), OPT_FMT_ANY, &informat)) | 
|  | goto opthelp; | 
|  | break; | 
|  | case OPT_IN: | 
|  | infile = opt_arg(); | 
|  | break; | 
|  | case OPT_OUTFORM: | 
|  | if (!opt_format(opt_arg(), OPT_FMT_ANY, &outformat)) | 
|  | goto opthelp; | 
|  | break; | 
|  | case OPT_OUT: | 
|  | outfile = opt_arg(); | 
|  | break; | 
|  | case OPT_PASSIN: | 
|  | passinarg = opt_arg(); | 
|  | break; | 
|  | case OPT_PASSOUT: | 
|  | passoutarg = opt_arg(); | 
|  | break; | 
|  | case OPT_ENGINE: | 
|  | e = setup_engine(opt_arg(), 0); | 
|  | break; | 
|  | case OPT_PUBIN: | 
|  | pubin = 1; | 
|  | break; | 
|  | case OPT_PUBOUT: | 
|  | pubout = 1; | 
|  | break; | 
|  | case OPT_RSAPUBKEY_IN: | 
|  | pubin = 2; | 
|  | break; | 
|  | case OPT_RSAPUBKEY_OUT: | 
|  | pubout = 2; | 
|  | break; | 
|  | case OPT_PVK_STRONG:    /* pvk_encr:= 2 */ | 
|  | case OPT_PVK_WEAK:      /* pvk_encr:= 1 */ | 
|  | case OPT_PVK_NONE:      /* pvk_encr:= 0 */ | 
|  | # if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) | 
|  | pvk_encr = (o - OPT_PVK_NONE); | 
|  | # endif | 
|  | break; | 
|  | case OPT_NOOUT: | 
|  | noout = 1; | 
|  | break; | 
|  | case OPT_TEXT: | 
|  | text = 1; | 
|  | break; | 
|  | case OPT_MODULUS: | 
|  | modulus = 1; | 
|  | break; | 
|  | case OPT_CHECK: | 
|  | check = 1; | 
|  | break; | 
|  | case OPT_CIPHER: | 
|  | if (!opt_cipher(opt_unknown(), &enc)) | 
|  | goto opthelp; | 
|  | break; | 
|  | } | 
|  | } | 
|  | argc = opt_num_rest(); | 
|  | if (argc != 0) | 
|  | goto opthelp; | 
|  |  | 
|  | private = (text && !pubin) || (!pubout && !noout) ? 1 : 0; | 
|  |  | 
|  | if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { | 
|  | BIO_printf(bio_err, "Error getting passwords\n"); | 
|  | goto end; | 
|  | } | 
|  | if (check && pubin) { | 
|  | BIO_printf(bio_err, "Only private keys can be checked\n"); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | { | 
|  | EVP_PKEY *pkey; | 
|  |  | 
|  | if (pubin) { | 
|  | int tmpformat = -1; | 
|  | if (pubin == 2) { | 
|  | if (informat == FORMAT_PEM) | 
|  | tmpformat = FORMAT_PEMRSA; | 
|  | else if (informat == FORMAT_ASN1) | 
|  | tmpformat = FORMAT_ASN1RSA; | 
|  | } else { | 
|  | tmpformat = informat; | 
|  | } | 
|  |  | 
|  | pkey = load_pubkey(infile, tmpformat, 1, passin, e, "Public Key"); | 
|  | } else { | 
|  | pkey = load_key(infile, informat, 1, passin, e, "Private Key"); | 
|  | } | 
|  |  | 
|  | if (pkey != NULL) | 
|  | rsa = EVP_PKEY_get1_RSA(pkey); | 
|  | EVP_PKEY_free(pkey); | 
|  | } | 
|  |  | 
|  | if (rsa == NULL) { | 
|  | ERR_print_errors(bio_err); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | out = bio_open_owner(outfile, outformat, private); | 
|  | if (out == NULL) | 
|  | goto end; | 
|  |  | 
|  | if (text) { | 
|  | assert(pubin || private); | 
|  | if (!RSA_print(out, rsa, 0)) { | 
|  | perror(outfile); | 
|  | ERR_print_errors(bio_err); | 
|  | goto end; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (modulus) { | 
|  | const BIGNUM *n; | 
|  | RSA_get0_key(rsa, &n, NULL, NULL); | 
|  | BIO_printf(out, "Modulus="); | 
|  | BN_print(out, n); | 
|  | BIO_printf(out, "\n"); | 
|  | } | 
|  |  | 
|  | if (check) { | 
|  | int r = RSA_check_key_ex(rsa, NULL); | 
|  |  | 
|  | if (r == 1) { | 
|  | BIO_printf(out, "RSA key ok\n"); | 
|  | } else if (r == 0) { | 
|  | unsigned long err; | 
|  |  | 
|  | while ((err = ERR_peek_error()) != 0 && | 
|  | ERR_GET_LIB(err) == ERR_LIB_RSA && | 
|  | ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY_EX && | 
|  | ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) { | 
|  | BIO_printf(out, "RSA key error: %s\n", | 
|  | ERR_reason_error_string(err)); | 
|  | ERR_get_error(); /* remove e from error stack */ | 
|  | } | 
|  | } else if (r == -1) { | 
|  | ERR_print_errors(bio_err); | 
|  | goto end; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (noout) { | 
|  | ret = 0; | 
|  | goto end; | 
|  | } | 
|  | BIO_printf(bio_err, "writing RSA key\n"); | 
|  | if (outformat == FORMAT_ASN1) { | 
|  | if (pubout || pubin) { | 
|  | if (pubout == 2) | 
|  | i = i2d_RSAPublicKey_bio(out, rsa); | 
|  | else | 
|  | i = i2d_RSA_PUBKEY_bio(out, rsa); | 
|  | } else { | 
|  | assert(private); | 
|  | i = i2d_RSAPrivateKey_bio(out, rsa); | 
|  | } | 
|  | } else if (outformat == FORMAT_PEM) { | 
|  | if (pubout || pubin) { | 
|  | if (pubout == 2) | 
|  | i = PEM_write_bio_RSAPublicKey(out, rsa); | 
|  | else | 
|  | i = PEM_write_bio_RSA_PUBKEY(out, rsa); | 
|  | } else { | 
|  | assert(private); | 
|  | i = PEM_write_bio_RSAPrivateKey(out, rsa, | 
|  | enc, NULL, 0, NULL, passout); | 
|  | } | 
|  | # ifndef OPENSSL_NO_DSA | 
|  | } else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) { | 
|  | EVP_PKEY *pk; | 
|  | pk = EVP_PKEY_new(); | 
|  | EVP_PKEY_set1_RSA(pk, rsa); | 
|  | if (outformat == FORMAT_PVK) { | 
|  | if (pubin) { | 
|  | BIO_printf(bio_err, "PVK form impossible with public key input\n"); | 
|  | EVP_PKEY_free(pk); | 
|  | goto end; | 
|  | } | 
|  | assert(private); | 
|  | #  ifdef OPENSSL_NO_RC4 | 
|  | BIO_printf(bio_err, "PVK format not supported\n"); | 
|  | EVP_PKEY_free(pk); | 
|  | goto end; | 
|  | #  else | 
|  | i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); | 
|  | #  endif | 
|  | } else if (pubin || pubout) { | 
|  | i = i2b_PublicKey_bio(out, pk); | 
|  | } else { | 
|  | assert(private); | 
|  | i = i2b_PrivateKey_bio(out, pk); | 
|  | } | 
|  | EVP_PKEY_free(pk); | 
|  | # endif | 
|  | } else { | 
|  | BIO_printf(bio_err, "bad output format specified for outfile\n"); | 
|  | goto end; | 
|  | } | 
|  | if (i <= 0) { | 
|  | BIO_printf(bio_err, "unable to write key\n"); | 
|  | ERR_print_errors(bio_err); | 
|  | } else { | 
|  | ret = 0; | 
|  | } | 
|  | end: | 
|  | release_engine(e); | 
|  | BIO_free_all(out); | 
|  | RSA_free(rsa); | 
|  | OPENSSL_free(passin); | 
|  | OPENSSL_free(passout); | 
|  | return ret; | 
|  | } | 
|  | #endif |