freebsd-skq/crypto/openssl/apps/pkeyparam.c

143 lines
3.7 KiB
C
Raw Normal View History

2015-03-20 15:28:40 +00:00
/*
2018-09-13 19:18:07 +00:00
* Copyright 2006-2018 The OpenSSL Project Authors. All Rights Reserved.
2009-06-07 19:56:18 +00:00
*
2018-09-13 19:18:07 +00:00
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
* in the file LICENSE in the source distribution or at
* https://www.openssl.org/source/license.html
2009-06-07 19:56:18 +00:00
*/
2018-09-13 19:18:07 +00:00
#include <stdio.h>
2009-06-07 19:56:18 +00:00
#include <string.h>
#include "apps.h"
2018-09-13 19:18:07 +00:00
#include "progs.h"
#include <openssl/pem.h>
2009-06-07 19:56:18 +00:00
#include <openssl/err.h>
#include <openssl/evp.h>
2009-06-07 19:56:18 +00:00
2018-09-13 19:18:07 +00:00
typedef enum OPTION_choice {
OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
OPT_IN, OPT_OUT, OPT_TEXT, OPT_NOOUT,
OPT_ENGINE, OPT_CHECK
} OPTION_CHOICE;
const OPTIONS pkeyparam_options[] = {
{"help", OPT_HELP, '-', "Display this summary"},
{"in", OPT_IN, '<', "Input file"},
{"out", OPT_OUT, '>', "Output file"},
{"text", OPT_TEXT, '-', "Print parameters as text"},
{"noout", OPT_NOOUT, '-', "Don't output encoded parameters"},
#ifndef OPENSSL_NO_ENGINE
{"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
#endif
{"check", OPT_CHECK, '-', "Check key param consistency"},
{NULL}
};
2009-06-07 19:56:18 +00:00
2018-09-13 19:18:07 +00:00
int pkeyparam_main(int argc, char **argv)
2015-03-20 15:28:40 +00:00
{
2018-09-13 19:18:07 +00:00
ENGINE *e = NULL;
2015-03-20 15:28:40 +00:00
BIO *in = NULL, *out = NULL;
EVP_PKEY *pkey = NULL;
2018-09-13 19:18:07 +00:00
int text = 0, noout = 0, ret = 1, check = 0;
OPTION_CHOICE o;
char *infile = NULL, *outfile = NULL, *prog;
prog = opt_init(argc, argv, pkeyparam_options);
while ((o = opt_next()) != OPT_EOF) {
switch (o) {
case OPT_EOF:
case OPT_ERR:
opthelp:
BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
goto end;
case OPT_HELP:
opt_help(pkeyparam_options);
ret = 0;
goto end;
case OPT_IN:
infile = opt_arg();
break;
case OPT_OUT:
outfile = opt_arg();
break;
case OPT_ENGINE:
e = setup_engine(opt_arg(), 0);
break;
case OPT_TEXT:
2015-03-20 15:28:40 +00:00
text = 1;
2018-09-13 19:18:07 +00:00
break;
case OPT_NOOUT:
2015-03-20 15:28:40 +00:00
noout = 1;
2018-09-13 19:18:07 +00:00
break;
case OPT_CHECK:
check = 1;
break;
}
2015-03-20 15:28:40 +00:00
}
2018-09-13 19:18:07 +00:00
argc = opt_num_rest();
if (argc != 0)
goto opthelp;
2009-06-07 19:56:18 +00:00
2018-09-13 19:18:07 +00:00
in = bio_open_default(infile, 'r', FORMAT_PEM);
if (in == NULL)
goto end;
out = bio_open_default(outfile, 'w', FORMAT_PEM);
if (out == NULL)
goto end;
pkey = PEM_read_bio_Parameters(in, NULL);
if (pkey == NULL) {
BIO_printf(bio_err, "Error reading parameters\n");
ERR_print_errors(bio_err);
goto end;
2015-03-20 15:28:40 +00:00
}
2018-09-13 19:18:07 +00:00
if (check) {
int r;
EVP_PKEY_CTX *ctx;
2015-03-20 15:28:40 +00:00
2018-09-13 19:18:07 +00:00
ctx = EVP_PKEY_CTX_new(pkey, e);
if (ctx == NULL) {
ERR_print_errors(bio_err);
2015-03-20 15:28:40 +00:00
goto end;
}
2018-09-13 19:18:07 +00:00
r = EVP_PKEY_param_check(ctx);
if (r == 1) {
BIO_printf(out, "Parameters are valid\n");
} else {
/*
* Note: at least for RSA keys if this function returns
* -1, there will be no error reasons.
*/
unsigned long err;
BIO_printf(out, "Parameters are invalid\n");
while ((err = ERR_peek_error()) != 0) {
BIO_printf(out, "Detailed error: %s\n",
ERR_reason_error_string(err));
ERR_get_error(); /* remove err from error stack */
}
}
EVP_PKEY_CTX_free(ctx);
2015-03-20 15:28:40 +00:00
}
2015-03-20 15:28:40 +00:00
if (!noout)
PEM_write_bio_Parameters(out, pkey);
2015-03-20 15:28:40 +00:00
if (text)
EVP_PKEY_print_params(out, pkey, 0, NULL);
2015-03-20 15:28:40 +00:00
ret = 0;
2015-03-20 15:28:40 +00:00
end:
EVP_PKEY_free(pkey);
2017-01-26 18:32:12 +00:00
release_engine(e);
2015-03-20 15:28:40 +00:00
BIO_free_all(out);
BIO_free(in);
2015-03-20 15:28:40 +00:00
return ret;
}