mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
20432eae41
that can automatically determine the type of a DER encoded "traditional" format private key and change some of the d2i functions to use it instead of requiring the application to work out the key type.
344 lines
10 KiB
C
344 lines
10 KiB
C
/* pkcs8.c */
|
|
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
|
* project 1999.
|
|
*/
|
|
/* ====================================================================
|
|
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
*
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
* endorse or promote products derived from this software without
|
|
* prior written permission. For written permission, please contact
|
|
* licensing@OpenSSL.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
* permission of the OpenSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
* This product includes cryptographic software written by Eric Young
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
* Hudson (tjh@cryptsoft.com).
|
|
*
|
|
*/
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "apps.h"
|
|
#include <openssl/pem.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/pkcs12.h>
|
|
|
|
#include "apps.h"
|
|
#define PROG pkcs8_main
|
|
|
|
|
|
int MAIN(int argc, char **argv)
|
|
{
|
|
char **args, *infile = NULL, *outfile = NULL;
|
|
BIO *in = NULL, *out = NULL;
|
|
int topk8 = 0;
|
|
int pbe_nid = -1;
|
|
const EVP_CIPHER *cipher = NULL;
|
|
int iter = PKCS12_DEFAULT_ITER;
|
|
int informat, outformat;
|
|
int p8_broken = PKCS8_OK;
|
|
int nocrypt = 0;
|
|
X509_SIG *p8;
|
|
PKCS8_PRIV_KEY_INFO *p8inf;
|
|
EVP_PKEY *pkey;
|
|
char pass[50], *passin = NULL, *passout = NULL;
|
|
int badarg = 0;
|
|
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
|
informat=FORMAT_PEM;
|
|
outformat=FORMAT_PEM;
|
|
ERR_load_crypto_strings();
|
|
SSLeay_add_all_algorithms();
|
|
args = argv + 1;
|
|
while (!badarg && *args && *args[0] == '-') {
|
|
if (!strcmp(*args,"-v2")) {
|
|
if (args[1]) {
|
|
args++;
|
|
cipher=EVP_get_cipherbyname(*args);
|
|
if(!cipher) {
|
|
BIO_printf(bio_err,
|
|
"Unknown cipher %s\n", *args);
|
|
badarg = 1;
|
|
}
|
|
} else badarg = 1;
|
|
} else if (!strcmp(*args,"-v1")) {
|
|
if (args[1]) {
|
|
args++;
|
|
pbe_nid=OBJ_txt2nid(*args);
|
|
if(pbe_nid == NID_undef) {
|
|
BIO_printf(bio_err,
|
|
"Unknown PBE algorithm %s\n", *args);
|
|
badarg = 1;
|
|
}
|
|
} else badarg = 1;
|
|
} else if (!strcmp(*args,"-inform")) {
|
|
if (args[1]) {
|
|
args++;
|
|
informat=str2fmt(*args);
|
|
} else badarg = 1;
|
|
} else if (!strcmp(*args,"-outform")) {
|
|
if (args[1]) {
|
|
args++;
|
|
outformat=str2fmt(*args);
|
|
} else badarg = 1;
|
|
} else if (!strcmp (*args, "-topk8")) topk8 = 1;
|
|
else if (!strcmp (*args, "-noiter")) iter = 1;
|
|
else if (!strcmp (*args, "-nocrypt")) nocrypt = 1;
|
|
else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET;
|
|
else if (!strcmp(*args,"-passin"))
|
|
{
|
|
if (!args[1]) goto bad;
|
|
passin= *(++args);
|
|
}
|
|
else if (!strcmp(*args,"-envpassin"))
|
|
{
|
|
if (!args[1]) goto bad;
|
|
if(!(passin= getenv(*(++args))))
|
|
{
|
|
BIO_printf(bio_err,
|
|
"Can't read environment variable %s\n",
|
|
*args);
|
|
badarg = 1;
|
|
}
|
|
}
|
|
else if (strcmp(*args,"-envpassout") == 0)
|
|
{
|
|
if (!args[1]) goto bad;
|
|
if(!(passout= getenv(*(++args))))
|
|
{
|
|
BIO_printf(bio_err,
|
|
"Can't read environment variable %s\n",
|
|
*args);
|
|
badarg = 1;
|
|
}
|
|
}
|
|
else if (!strcmp(*args,"-passout"))
|
|
{
|
|
if (!args[1]) goto bad;
|
|
passout= *(++args);
|
|
}
|
|
else if (!strcmp (*args, "-in")) {
|
|
if (args[1]) {
|
|
args++;
|
|
infile = *args;
|
|
} else badarg = 1;
|
|
} else if (!strcmp (*args, "-out")) {
|
|
if (args[1]) {
|
|
args++;
|
|
outfile = *args;
|
|
} else badarg = 1;
|
|
} else badarg = 1;
|
|
args++;
|
|
}
|
|
|
|
if (badarg) {
|
|
bad:
|
|
BIO_printf(bio_err, "Usage pkcs8 [options]\n");
|
|
BIO_printf(bio_err, "where options are\n");
|
|
BIO_printf(bio_err, "-in file input file\n");
|
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
|
BIO_printf(bio_err, "-passin arg input file pass phrase\n");
|
|
BIO_printf(bio_err, "-envpassin arg environment variable containing input file pass phrase\n");
|
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
|
BIO_printf(bio_err, "-out file output file\n");
|
|
BIO_printf(bio_err, "-passout arg input file pass phrase\n");
|
|
BIO_printf(bio_err, "-envpassout arg environment variable containing input file pass phrase\n");
|
|
BIO_printf(bio_err, "-topk8 output PKCS8 file\n");
|
|
BIO_printf(bio_err, "-nooct use (broken) no octet form\n");
|
|
BIO_printf(bio_err, "-noiter use 1 as iteration count\n");
|
|
BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n");
|
|
BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
|
|
BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
|
return (1);
|
|
}
|
|
|
|
if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC;
|
|
|
|
if (infile) {
|
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
|
BIO_printf(bio_err,
|
|
"Can't open input file %s\n", infile);
|
|
return (1);
|
|
}
|
|
} else in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
|
|
|
if (outfile) {
|
|
if (!(out = BIO_new_file (outfile, "wb"))) {
|
|
BIO_printf(bio_err,
|
|
"Can't open output file %s\n", outfile);
|
|
return (1);
|
|
}
|
|
} else out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
|
|
if (topk8) {
|
|
if(informat == FORMAT_PEM)
|
|
pkey = PEM_read_bio_PrivateKey(in, NULL, PEM_cb, passin);
|
|
else if(informat == FORMAT_ASN1)
|
|
pkey = d2i_PrivateKey_bio(in, NULL);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
if (!pkey) {
|
|
BIO_printf(bio_err, "Error reading key\n", outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
BIO_free(in);
|
|
if (!(p8inf = EVP_PKEY2PKCS8(pkey))) {
|
|
BIO_printf(bio_err, "Error converting key\n", outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
PKCS8_set_broken(p8inf, p8_broken);
|
|
if(nocrypt) {
|
|
if(outformat == FORMAT_PEM)
|
|
PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
|
|
else if(outformat == FORMAT_ASN1)
|
|
i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
} else {
|
|
if(!passout) {
|
|
passout = pass;
|
|
EVP_read_pw_string(pass, 50, "Enter Encryption Password:", 1);
|
|
}
|
|
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
|
passout, strlen(passout),
|
|
NULL, 0, iter, p8inf))) {
|
|
BIO_printf(bio_err, "Error encrypting key\n",
|
|
outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
if(outformat == FORMAT_PEM)
|
|
PEM_write_bio_PKCS8(out, p8);
|
|
else if(outformat == FORMAT_ASN1)
|
|
i2d_PKCS8_bio(out, p8);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
X509_SIG_free(p8);
|
|
}
|
|
PKCS8_PRIV_KEY_INFO_free (p8inf);
|
|
EVP_PKEY_free(pkey);
|
|
BIO_free(out);
|
|
return (0);
|
|
}
|
|
|
|
if(nocrypt) {
|
|
if(informat == FORMAT_PEM)
|
|
p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL);
|
|
else if(informat == FORMAT_ASN1)
|
|
p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
} else {
|
|
if(informat == FORMAT_PEM)
|
|
p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
|
|
else if(informat == FORMAT_ASN1)
|
|
p8 = d2i_PKCS8_bio(in, NULL);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
|
|
if (!p8) {
|
|
BIO_printf (bio_err, "Error reading key\n", outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
if(!passin) {
|
|
passin = pass;
|
|
EVP_read_pw_string(pass, 50, "Enter Password:", 0);
|
|
}
|
|
p8inf = M_PKCS8_decrypt(p8, passin, strlen(passin));
|
|
X509_SIG_free(p8);
|
|
}
|
|
|
|
if (!p8inf) {
|
|
BIO_printf(bio_err, "Error decrypting key\n", outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
|
|
if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
|
|
BIO_printf(bio_err, "Error converting key\n", outfile);
|
|
ERR_print_errors(bio_err);
|
|
return (1);
|
|
}
|
|
|
|
if (p8inf->broken) {
|
|
BIO_printf(bio_err, "Warning: broken key encoding: ");
|
|
switch (p8inf->broken) {
|
|
case PKCS8_NO_OCTET:
|
|
BIO_printf(bio_err, "No Octet String\n");
|
|
break;
|
|
|
|
default:
|
|
BIO_printf(bio_err, "Unknown broken type\n");
|
|
break;
|
|
}
|
|
}
|
|
|
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
|
if(outformat == FORMAT_PEM)
|
|
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, PEM_cb, passout);
|
|
else if(outformat == FORMAT_ASN1)
|
|
i2d_PrivateKey_bio(out, pkey);
|
|
else {
|
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
return (1);
|
|
}
|
|
|
|
EVP_PKEY_free(pkey);
|
|
BIO_free(out);
|
|
BIO_free(in);
|
|
|
|
return (0);
|
|
}
|