| /* |
| * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project |
| * 1999. Based on an original idea by Massimiliano Pala (madwolf@openca.org). |
| */ |
| /* ==================================================================== |
| * Copyright (c) 1999 The OpenSSL Project. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
| * |
| * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * licensing@OpenSSL.org. |
| * |
| * 5. Products derived from this software may not be called "OpenSSL" |
| * nor may "OpenSSL" appear in their names without prior written |
| * permission of the OpenSSL Project. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| * ==================================================================== |
| * |
| * This product includes cryptographic software written by Eric Young |
| * (eay@cryptsoft.com). This product includes software written by Tim |
| * Hudson (tjh@cryptsoft.com). |
| * |
| */ |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <time.h> |
| #include "apps.h" |
| #include <openssl/bio.h> |
| #include <openssl/conf.h> |
| #include <openssl/err.h> |
| #include <openssl/evp.h> |
| #include <openssl/lhash.h> |
| #include <openssl/x509.h> |
| #include <openssl/pem.h> |
| |
| typedef enum OPTION_choice { |
| OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, |
| OPT_NOOUT, OPT_PUBKEY, OPT_VERIFY, OPT_IN, OPT_OUT, |
| OPT_ENGINE, OPT_KEY, OPT_CHALLENGE, OPT_PASSIN, OPT_SPKAC, |
| OPT_SPKSECT |
| } OPTION_CHOICE; |
| |
| OPTIONS spkac_options[] = { |
| {"help", OPT_HELP, '-', "Display this summary"}, |
| {"in", OPT_IN, '<', "Input file"}, |
| {"out", OPT_OUT, '>', "Output file"}, |
| {"key", OPT_KEY, '<', "Create SPKAC using private key"}, |
| {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, |
| {"challenge", OPT_CHALLENGE, 's', "Challenge string"}, |
| {"spkac", OPT_SPKAC, 's', "Alternative SPKAC name"}, |
| {"noout", OPT_NOOUT, '-', "Don't print SPKAC"}, |
| {"pubkey", OPT_PUBKEY, '-', "Output public key"}, |
| {"verify", OPT_VERIFY, '-', "Verify SPKAC signature"}, |
| {"spksect", OPT_SPKSECT, 's'}, |
| #ifndef OPENSSL_NO_ENGINE |
| {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, |
| #endif |
| {NULL} |
| }; |
| |
| int spkac_main(int argc, char **argv) |
| { |
| BIO *out = NULL; |
| CONF *conf = NULL; |
| ENGINE *e = NULL; |
| EVP_PKEY *pkey = NULL; |
| NETSCAPE_SPKI *spki = NULL; |
| char *challenge = NULL, *keyfile = NULL; |
| char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; |
| char *spkstr = NULL, *prog; |
| const char *spkac = "SPKAC", *spksect = "default"; |
| int i, ret = 1, verify = 0, noout = 0, pubkey = 0; |
| OPTION_CHOICE o; |
| |
| prog = opt_init(argc, argv, spkac_options); |
| while ((o = opt_next()) != OPT_EOF) { |
| switch (o) { |
| case OPT_EOF: |
| case OPT_ERR: |
| BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); |
| goto end; |
| case OPT_HELP: |
| opt_help(spkac_options); |
| ret = 0; |
| goto end; |
| case OPT_IN: |
| infile = opt_arg(); |
| break; |
| case OPT_OUT: |
| outfile = opt_arg(); |
| break; |
| case OPT_NOOUT: |
| noout = 1; |
| break; |
| case OPT_PUBKEY: |
| pubkey = 1; |
| break; |
| case OPT_VERIFY: |
| verify = 1; |
| break; |
| case OPT_PASSIN: |
| passinarg = opt_arg(); |
| break; |
| case OPT_KEY: |
| keyfile = opt_arg(); |
| break; |
| case OPT_CHALLENGE: |
| challenge = opt_arg(); |
| break; |
| case OPT_SPKAC: |
| spkac = opt_arg(); |
| break; |
| case OPT_SPKSECT: |
| spksect = opt_arg(); |
| break; |
| case OPT_ENGINE: |
| e = setup_engine(opt_arg(), 0); |
| break; |
| } |
| } |
| argc = opt_num_rest(); |
| argv = opt_rest(); |
| |
| if (!app_passwd(passinarg, NULL, &passin, NULL)) { |
| BIO_printf(bio_err, "Error getting password\n"); |
| goto end; |
| } |
| |
| if (keyfile) { |
| pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, |
| FORMAT_PEM, 1, passin, e, "private key"); |
| if (!pkey) { |
| goto end; |
| } |
| spki = NETSCAPE_SPKI_new(); |
| if (challenge) |
| ASN1_STRING_set(spki->spkac->challenge, |
| challenge, (int)strlen(challenge)); |
| NETSCAPE_SPKI_set_pubkey(spki, pkey); |
| NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); |
| spkstr = NETSCAPE_SPKI_b64_encode(spki); |
| |
| out = bio_open_default(outfile, 'w', FORMAT_TEXT); |
| if (out == NULL) |
| goto end; |
| BIO_printf(out, "SPKAC=%s\n", spkstr); |
| OPENSSL_free(spkstr); |
| ret = 0; |
| goto end; |
| } |
| |
| if ((conf = app_load_config(infile)) == NULL) |
| goto end; |
| |
| spkstr = NCONF_get_string(conf, spksect, spkac); |
| |
| if (spkstr == NULL) { |
| BIO_printf(bio_err, "Can't find SPKAC called \"%s\"\n", spkac); |
| ERR_print_errors(bio_err); |
| goto end; |
| } |
| |
| spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); |
| |
| if (!spki) { |
| BIO_printf(bio_err, "Error loading SPKAC\n"); |
| ERR_print_errors(bio_err); |
| goto end; |
| } |
| |
| out = bio_open_default(outfile, 'w', FORMAT_TEXT); |
| if (out == NULL) |
| goto end; |
| |
| if (!noout) |
| NETSCAPE_SPKI_print(out, spki); |
| pkey = NETSCAPE_SPKI_get_pubkey(spki); |
| if (verify) { |
| i = NETSCAPE_SPKI_verify(spki, pkey); |
| if (i > 0) |
| BIO_printf(bio_err, "Signature OK\n"); |
| else { |
| BIO_printf(bio_err, "Signature Failure\n"); |
| ERR_print_errors(bio_err); |
| goto end; |
| } |
| } |
| if (pubkey) |
| PEM_write_bio_PUBKEY(out, pkey); |
| |
| ret = 0; |
| |
| end: |
| NCONF_free(conf); |
| NETSCAPE_SPKI_free(spki); |
| BIO_free_all(out); |
| EVP_PKEY_free(pkey); |
| OPENSSL_free(passin); |
| return (ret); |
| } |