1 /* $OpenBSD: rsautl.c,v 1.13 2018/02/07 05:47:55 jsing Exp $ */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
5 /* ====================================================================
6 * Copyright (c) 2000 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
59 #include <openssl/opensslconf.h>
66 #include <openssl/err.h>
67 #include <openssl/pem.h>
68 #include <openssl/rsa.h>
79 static void usage(void);
82 rsautl_main(int argc
, char **argv
)
84 BIO
*in
= NULL
, *out
= NULL
;
85 char *infile
= NULL
, *outfile
= NULL
;
87 char rsa_mode
= RSA_VERIFY
, key_type
= KEY_PRIVKEY
;
88 int keyform
= FORMAT_PEM
;
89 char need_priv
= 0, badarg
= 0, rev
= 0;
90 char hexdump
= 0, asn1parse
= 0;
92 EVP_PKEY
*pkey
= NULL
;
94 unsigned char *rsa_in
= NULL
, *rsa_out
= NULL
, pad
;
95 char *passargin
= NULL
, *passin
= NULL
;
96 int rsa_inlen
, rsa_outlen
= 0;
101 if (single_execution
) {
102 if (pledge("stdio cpath wpath rpath tty", NULL
) == -1) {
111 pad
= RSA_PKCS1_PADDING
;
114 if (!strcmp(*argv
, "-in")) {
119 } else if (!strcmp(*argv
, "-out")) {
124 } else if (!strcmp(*argv
, "-inkey")) {
129 } else if (!strcmp(*argv
, "-passin")) {
133 passargin
= *(++argv
);
134 } else if (strcmp(*argv
, "-keyform") == 0) {
138 keyform
= str2fmt(*(++argv
));
139 } else if (!strcmp(*argv
, "-pubin")) {
140 key_type
= KEY_PUBKEY
;
141 } else if (!strcmp(*argv
, "-certin")) {
143 } else if (!strcmp(*argv
, "-asn1parse"))
145 else if (!strcmp(*argv
, "-hexdump"))
147 else if (!strcmp(*argv
, "-raw"))
148 pad
= RSA_NO_PADDING
;
149 else if (!strcmp(*argv
, "-oaep"))
150 pad
= RSA_PKCS1_OAEP_PADDING
;
151 else if (!strcmp(*argv
, "-pkcs"))
152 pad
= RSA_PKCS1_PADDING
;
153 else if (!strcmp(*argv
, "-x931"))
154 pad
= RSA_X931_PADDING
;
155 else if (!strcmp(*argv
, "-sign")) {
158 } else if (!strcmp(*argv
, "-verify"))
159 rsa_mode
= RSA_VERIFY
;
160 else if (!strcmp(*argv
, "-rev"))
162 else if (!strcmp(*argv
, "-encrypt"))
163 rsa_mode
= RSA_ENCRYPT
;
164 else if (!strcmp(*argv
, "-decrypt")) {
165 rsa_mode
= RSA_DECRYPT
;
177 if (need_priv
&& (key_type
!= KEY_PRIVKEY
)) {
178 BIO_printf(bio_err
, "A private key is needed for this operation\n");
181 if (!app_passwd(bio_err
, passargin
, NULL
, &passin
, NULL
)) {
182 BIO_printf(bio_err
, "Error getting password\n");
188 pkey
= load_key(bio_err
, keyfile
, keyform
, 0,
189 passin
, "Private Key");
193 pkey
= load_pubkey(bio_err
, keyfile
, keyform
, 0,
198 x
= load_cert(bio_err
, keyfile
, keyform
,
199 NULL
, "Certificate");
201 pkey
= X509_get_pubkey(x
);
210 rsa
= EVP_PKEY_get1_RSA(pkey
);
214 BIO_printf(bio_err
, "Error getting RSA key\n");
215 ERR_print_errors(bio_err
);
219 if (!(in
= BIO_new_file(infile
, "rb"))) {
220 BIO_printf(bio_err
, "Error Reading Input File\n");
221 ERR_print_errors(bio_err
);
225 in
= BIO_new_fp(stdin
, BIO_NOCLOSE
);
228 if (!(out
= BIO_new_file(outfile
, "wb"))) {
229 BIO_printf(bio_err
, "Error Reading Output File\n");
230 ERR_print_errors(bio_err
);
234 out
= BIO_new_fp(stdout
, BIO_NOCLOSE
);
237 keysize
= RSA_size(rsa
);
239 rsa_in
= reallocarray(NULL
, keysize
, 2);
240 if (rsa_in
== NULL
) {
241 BIO_printf(bio_err
, "Error allocating memory for input data\n");
244 rsa_out
= malloc(keysize
);
245 if (rsa_out
== NULL
) {
246 BIO_printf(bio_err
, "Error allocating memory for output data\n");
250 /* Read the input data */
251 rsa_inlen
= BIO_read(in
, rsa_in
, keysize
* 2);
252 if (rsa_inlen
<= 0) {
253 BIO_printf(bio_err
, "Error reading input Data\n");
259 for (i
= 0; i
< rsa_inlen
/ 2; i
++) {
261 rsa_in
[i
] = rsa_in
[rsa_inlen
- 1 - i
];
262 rsa_in
[rsa_inlen
- 1 - i
] = ctmp
;
268 rsa_outlen
= RSA_public_decrypt(rsa_inlen
, rsa_in
, rsa_out
, rsa
, pad
);
272 rsa_outlen
= RSA_private_encrypt(rsa_inlen
, rsa_in
, rsa_out
, rsa
, pad
);
276 rsa_outlen
= RSA_public_encrypt(rsa_inlen
, rsa_in
, rsa_out
, rsa
, pad
);
280 rsa_outlen
= RSA_private_decrypt(rsa_inlen
, rsa_in
, rsa_out
, rsa
, pad
);
285 if (rsa_outlen
<= 0) {
286 BIO_printf(bio_err
, "RSA operation error\n");
287 ERR_print_errors(bio_err
);
292 if (!ASN1_parse_dump(out
, rsa_out
, rsa_outlen
, 1, -1)) {
293 ERR_print_errors(bio_err
);
296 BIO_dump(out
, (char *) rsa_out
, rsa_outlen
);
298 BIO_write(out
, rsa_out
, rsa_outlen
);
314 BIO_printf(bio_err
, "Usage: rsautl [options]\n");
315 BIO_printf(bio_err
, "-in file input file\n");
316 BIO_printf(bio_err
, "-out file output file\n");
317 BIO_printf(bio_err
, "-inkey file input key\n");
318 BIO_printf(bio_err
, "-keyform arg private key format - default PEM\n");
319 BIO_printf(bio_err
, "-pubin input is an RSA public\n");
320 BIO_printf(bio_err
, "-certin input is a certificate carrying an RSA public key\n");
321 BIO_printf(bio_err
, "-ssl use SSL v2 padding\n");
322 BIO_printf(bio_err
, "-raw use no padding\n");
323 BIO_printf(bio_err
, "-pkcs use PKCS#1 v1.5 padding (default)\n");
324 BIO_printf(bio_err
, "-oaep use PKCS#1 OAEP\n");
325 BIO_printf(bio_err
, "-sign sign with private key\n");
326 BIO_printf(bio_err
, "-verify verify with public key\n");
327 BIO_printf(bio_err
, "-encrypt encrypt with public key\n");
328 BIO_printf(bio_err
, "-decrypt decrypt with private key\n");
329 BIO_printf(bio_err
, "-hexdump hex dump output\n");