diff options
Diffstat (limited to '')
| -rw-r--r-- | src/usr.bin/openssl/rsa.c | 108 |
1 files changed, 54 insertions, 54 deletions
diff --git a/src/usr.bin/openssl/rsa.c b/src/usr.bin/openssl/rsa.c index bdd263ce7c..953daaacf7 100644 --- a/src/usr.bin/openssl/rsa.c +++ b/src/usr.bin/openssl/rsa.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rsa.c,v 1.17 2022/11/11 17:07:39 joshua Exp $ */ | 1 | /* $OpenBSD: rsa.c,v 1.18 2023/03/06 14:32:06 tb Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -89,7 +89,7 @@ static struct { | |||
| 89 | int pubout; | 89 | int pubout; |
| 90 | int pvk_encr; | 90 | int pvk_encr; |
| 91 | int text; | 91 | int text; |
| 92 | } rsa_config; | 92 | } cfg; |
| 93 | 93 | ||
| 94 | static int | 94 | static int |
| 95 | rsa_opt_cipher(int argc, char **argv, int *argsused) | 95 | rsa_opt_cipher(int argc, char **argv, int *argsused) |
| @@ -99,7 +99,7 @@ rsa_opt_cipher(int argc, char **argv, int *argsused) | |||
| 99 | if (*name++ != '-') | 99 | if (*name++ != '-') |
| 100 | return (1); | 100 | return (1); |
| 101 | 101 | ||
| 102 | if ((rsa_config.enc = EVP_get_cipherbyname(name)) == NULL) { | 102 | if ((cfg.enc = EVP_get_cipherbyname(name)) == NULL) { |
| 103 | fprintf(stderr, "Invalid cipher '%s'\n", name); | 103 | fprintf(stderr, "Invalid cipher '%s'\n", name); |
| 104 | return (1); | 104 | return (1); |
| 105 | } | 105 | } |
| @@ -113,111 +113,111 @@ static const struct option rsa_options[] = { | |||
| 113 | .name = "check", | 113 | .name = "check", |
| 114 | .desc = "Check consistency of RSA private key", | 114 | .desc = "Check consistency of RSA private key", |
| 115 | .type = OPTION_FLAG, | 115 | .type = OPTION_FLAG, |
| 116 | .opt.flag = &rsa_config.check, | 116 | .opt.flag = &cfg.check, |
| 117 | }, | 117 | }, |
| 118 | { | 118 | { |
| 119 | .name = "in", | 119 | .name = "in", |
| 120 | .argname = "file", | 120 | .argname = "file", |
| 121 | .desc = "Input file (default stdin)", | 121 | .desc = "Input file (default stdin)", |
| 122 | .type = OPTION_ARG, | 122 | .type = OPTION_ARG, |
| 123 | .opt.arg = &rsa_config.infile, | 123 | .opt.arg = &cfg.infile, |
| 124 | }, | 124 | }, |
| 125 | { | 125 | { |
| 126 | .name = "inform", | 126 | .name = "inform", |
| 127 | .argname = "format", | 127 | .argname = "format", |
| 128 | .desc = "Input format (DER, NET or PEM (default))", | 128 | .desc = "Input format (DER, NET or PEM (default))", |
| 129 | .type = OPTION_ARG_FORMAT, | 129 | .type = OPTION_ARG_FORMAT, |
| 130 | .opt.value = &rsa_config.informat, | 130 | .opt.value = &cfg.informat, |
| 131 | }, | 131 | }, |
| 132 | { | 132 | { |
| 133 | .name = "modulus", | 133 | .name = "modulus", |
| 134 | .desc = "Print the RSA key modulus", | 134 | .desc = "Print the RSA key modulus", |
| 135 | .type = OPTION_FLAG, | 135 | .type = OPTION_FLAG, |
| 136 | .opt.flag = &rsa_config.modulus, | 136 | .opt.flag = &cfg.modulus, |
| 137 | }, | 137 | }, |
| 138 | { | 138 | { |
| 139 | .name = "noout", | 139 | .name = "noout", |
| 140 | .desc = "Do not print encoded version of the key", | 140 | .desc = "Do not print encoded version of the key", |
| 141 | .type = OPTION_FLAG, | 141 | .type = OPTION_FLAG, |
| 142 | .opt.flag = &rsa_config.noout, | 142 | .opt.flag = &cfg.noout, |
| 143 | }, | 143 | }, |
| 144 | { | 144 | { |
| 145 | .name = "out", | 145 | .name = "out", |
| 146 | .argname = "file", | 146 | .argname = "file", |
| 147 | .desc = "Output file (default stdout)", | 147 | .desc = "Output file (default stdout)", |
| 148 | .type = OPTION_ARG, | 148 | .type = OPTION_ARG, |
| 149 | .opt.arg = &rsa_config.outfile, | 149 | .opt.arg = &cfg.outfile, |
| 150 | }, | 150 | }, |
| 151 | { | 151 | { |
| 152 | .name = "outform", | 152 | .name = "outform", |
| 153 | .argname = "format", | 153 | .argname = "format", |
| 154 | .desc = "Output format (DER, NET or PEM (default PEM))", | 154 | .desc = "Output format (DER, NET or PEM (default PEM))", |
| 155 | .type = OPTION_ARG_FORMAT, | 155 | .type = OPTION_ARG_FORMAT, |
| 156 | .opt.value = &rsa_config.outformat, | 156 | .opt.value = &cfg.outformat, |
| 157 | }, | 157 | }, |
| 158 | { | 158 | { |
| 159 | .name = "passin", | 159 | .name = "passin", |
| 160 | .argname = "src", | 160 | .argname = "src", |
| 161 | .desc = "Input file passphrase source", | 161 | .desc = "Input file passphrase source", |
| 162 | .type = OPTION_ARG, | 162 | .type = OPTION_ARG, |
| 163 | .opt.arg = &rsa_config.passargin, | 163 | .opt.arg = &cfg.passargin, |
| 164 | }, | 164 | }, |
| 165 | { | 165 | { |
| 166 | .name = "passout", | 166 | .name = "passout", |
| 167 | .argname = "src", | 167 | .argname = "src", |
| 168 | .desc = "Output file passphrase source", | 168 | .desc = "Output file passphrase source", |
| 169 | .type = OPTION_ARG, | 169 | .type = OPTION_ARG, |
| 170 | .opt.arg = &rsa_config.passargout, | 170 | .opt.arg = &cfg.passargout, |
| 171 | }, | 171 | }, |
| 172 | { | 172 | { |
| 173 | .name = "pubin", | 173 | .name = "pubin", |
| 174 | .desc = "Expect a public key (default private key)", | 174 | .desc = "Expect a public key (default private key)", |
| 175 | .type = OPTION_VALUE, | 175 | .type = OPTION_VALUE, |
| 176 | .value = 1, | 176 | .value = 1, |
| 177 | .opt.value = &rsa_config.pubin, | 177 | .opt.value = &cfg.pubin, |
| 178 | }, | 178 | }, |
| 179 | { | 179 | { |
| 180 | .name = "pubout", | 180 | .name = "pubout", |
| 181 | .desc = "Output a public key (default private key)", | 181 | .desc = "Output a public key (default private key)", |
| 182 | .type = OPTION_VALUE, | 182 | .type = OPTION_VALUE, |
| 183 | .value = 1, | 183 | .value = 1, |
| 184 | .opt.value = &rsa_config.pubout, | 184 | .opt.value = &cfg.pubout, |
| 185 | }, | 185 | }, |
| 186 | { | 186 | { |
| 187 | .name = "pvk-none", | 187 | .name = "pvk-none", |
| 188 | .type = OPTION_VALUE, | 188 | .type = OPTION_VALUE, |
| 189 | .value = 0, | 189 | .value = 0, |
| 190 | .opt.value = &rsa_config.pvk_encr, | 190 | .opt.value = &cfg.pvk_encr, |
| 191 | }, | 191 | }, |
| 192 | { | 192 | { |
| 193 | .name = "pvk-strong", | 193 | .name = "pvk-strong", |
| 194 | .type = OPTION_VALUE, | 194 | .type = OPTION_VALUE, |
| 195 | .value = 2, | 195 | .value = 2, |
| 196 | .opt.value = &rsa_config.pvk_encr, | 196 | .opt.value = &cfg.pvk_encr, |
| 197 | }, | 197 | }, |
| 198 | { | 198 | { |
| 199 | .name = "pvk-weak", | 199 | .name = "pvk-weak", |
| 200 | .type = OPTION_VALUE, | 200 | .type = OPTION_VALUE, |
| 201 | .value = 1, | 201 | .value = 1, |
| 202 | .opt.value = &rsa_config.pvk_encr, | 202 | .opt.value = &cfg.pvk_encr, |
| 203 | }, | 203 | }, |
| 204 | { | 204 | { |
| 205 | .name = "RSAPublicKey_in", | 205 | .name = "RSAPublicKey_in", |
| 206 | .type = OPTION_VALUE, | 206 | .type = OPTION_VALUE, |
| 207 | .value = 2, | 207 | .value = 2, |
| 208 | .opt.value = &rsa_config.pubin, | 208 | .opt.value = &cfg.pubin, |
| 209 | }, | 209 | }, |
| 210 | { | 210 | { |
| 211 | .name = "RSAPublicKey_out", | 211 | .name = "RSAPublicKey_out", |
| 212 | .type = OPTION_VALUE, | 212 | .type = OPTION_VALUE, |
| 213 | .value = 2, | 213 | .value = 2, |
| 214 | .opt.value = &rsa_config.pubout, | 214 | .opt.value = &cfg.pubout, |
| 215 | }, | 215 | }, |
| 216 | { | 216 | { |
| 217 | .name = "text", | 217 | .name = "text", |
| 218 | .desc = "Print in plain text in addition to encoded", | 218 | .desc = "Print in plain text in addition to encoded", |
| 219 | .type = OPTION_FLAG, | 219 | .type = OPTION_FLAG, |
| 220 | .opt.flag = &rsa_config.text, | 220 | .opt.flag = &cfg.text, |
| 221 | }, | 221 | }, |
| 222 | { | 222 | { |
| 223 | .name = NULL, | 223 | .name = NULL, |
| @@ -260,22 +260,22 @@ rsa_main(int argc, char **argv) | |||
| 260 | exit(1); | 260 | exit(1); |
| 261 | } | 261 | } |
| 262 | 262 | ||
| 263 | memset(&rsa_config, 0, sizeof(rsa_config)); | 263 | memset(&cfg, 0, sizeof(cfg)); |
| 264 | rsa_config.pvk_encr = 2; | 264 | cfg.pvk_encr = 2; |
| 265 | rsa_config.informat = FORMAT_PEM; | 265 | cfg.informat = FORMAT_PEM; |
| 266 | rsa_config.outformat = FORMAT_PEM; | 266 | cfg.outformat = FORMAT_PEM; |
| 267 | 267 | ||
| 268 | if (options_parse(argc, argv, rsa_options, NULL, NULL) != 0) { | 268 | if (options_parse(argc, argv, rsa_options, NULL, NULL) != 0) { |
| 269 | rsa_usage(); | 269 | rsa_usage(); |
| 270 | goto end; | 270 | goto end; |
| 271 | } | 271 | } |
| 272 | 272 | ||
| 273 | if (!app_passwd(bio_err, rsa_config.passargin, rsa_config.passargout, | 273 | if (!app_passwd(bio_err, cfg.passargin, cfg.passargout, |
| 274 | &passin, &passout)) { | 274 | &passin, &passout)) { |
| 275 | BIO_printf(bio_err, "Error getting passwords\n"); | 275 | BIO_printf(bio_err, "Error getting passwords\n"); |
| 276 | goto end; | 276 | goto end; |
| 277 | } | 277 | } |
| 278 | if (rsa_config.check && rsa_config.pubin) { | 278 | if (cfg.check && cfg.pubin) { |
| 279 | BIO_printf(bio_err, "Only private keys can be checked\n"); | 279 | BIO_printf(bio_err, "Only private keys can be checked\n"); |
| 280 | goto end; | 280 | goto end; |
| 281 | } | 281 | } |
| @@ -284,21 +284,21 @@ rsa_main(int argc, char **argv) | |||
| 284 | { | 284 | { |
| 285 | EVP_PKEY *pkey; | 285 | EVP_PKEY *pkey; |
| 286 | 286 | ||
| 287 | if (rsa_config.pubin) { | 287 | if (cfg.pubin) { |
| 288 | int tmpformat = -1; | 288 | int tmpformat = -1; |
| 289 | if (rsa_config.pubin == 2) { | 289 | if (cfg.pubin == 2) { |
| 290 | if (rsa_config.informat == FORMAT_PEM) | 290 | if (cfg.informat == FORMAT_PEM) |
| 291 | tmpformat = FORMAT_PEMRSA; | 291 | tmpformat = FORMAT_PEMRSA; |
| 292 | else if (rsa_config.informat == FORMAT_ASN1) | 292 | else if (cfg.informat == FORMAT_ASN1) |
| 293 | tmpformat = FORMAT_ASN1RSA; | 293 | tmpformat = FORMAT_ASN1RSA; |
| 294 | } else | 294 | } else |
| 295 | tmpformat = rsa_config.informat; | 295 | tmpformat = cfg.informat; |
| 296 | 296 | ||
| 297 | pkey = load_pubkey(bio_err, rsa_config.infile, | 297 | pkey = load_pubkey(bio_err, cfg.infile, |
| 298 | tmpformat, 1, passin, "Public Key"); | 298 | tmpformat, 1, passin, "Public Key"); |
| 299 | } else | 299 | } else |
| 300 | pkey = load_key(bio_err, rsa_config.infile, | 300 | pkey = load_key(bio_err, cfg.infile, |
| 301 | rsa_config.informat, 1, passin, "Private Key"); | 301 | cfg.informat, 1, passin, "Private Key"); |
| 302 | 302 | ||
| 303 | if (pkey != NULL) | 303 | if (pkey != NULL) |
| 304 | rsa = EVP_PKEY_get1_RSA(pkey); | 304 | rsa = EVP_PKEY_get1_RSA(pkey); |
| @@ -309,27 +309,27 @@ rsa_main(int argc, char **argv) | |||
| 309 | ERR_print_errors(bio_err); | 309 | ERR_print_errors(bio_err); |
| 310 | goto end; | 310 | goto end; |
| 311 | } | 311 | } |
| 312 | if (rsa_config.outfile == NULL) { | 312 | if (cfg.outfile == NULL) { |
| 313 | BIO_set_fp(out, stdout, BIO_NOCLOSE); | 313 | BIO_set_fp(out, stdout, BIO_NOCLOSE); |
| 314 | } else { | 314 | } else { |
| 315 | if (BIO_write_filename(out, rsa_config.outfile) <= 0) { | 315 | if (BIO_write_filename(out, cfg.outfile) <= 0) { |
| 316 | perror(rsa_config.outfile); | 316 | perror(cfg.outfile); |
| 317 | goto end; | 317 | goto end; |
| 318 | } | 318 | } |
| 319 | } | 319 | } |
| 320 | 320 | ||
| 321 | if (rsa_config.text) | 321 | if (cfg.text) |
| 322 | if (!RSA_print(out, rsa, 0)) { | 322 | if (!RSA_print(out, rsa, 0)) { |
| 323 | perror(rsa_config.outfile); | 323 | perror(cfg.outfile); |
| 324 | ERR_print_errors(bio_err); | 324 | ERR_print_errors(bio_err); |
| 325 | goto end; | 325 | goto end; |
| 326 | } | 326 | } |
| 327 | if (rsa_config.modulus) { | 327 | if (cfg.modulus) { |
| 328 | BIO_printf(out, "Modulus="); | 328 | BIO_printf(out, "Modulus="); |
| 329 | BN_print(out, RSA_get0_n(rsa)); | 329 | BN_print(out, RSA_get0_n(rsa)); |
| 330 | BIO_printf(out, "\n"); | 330 | BIO_printf(out, "\n"); |
| 331 | } | 331 | } |
| 332 | if (rsa_config.check) { | 332 | if (cfg.check) { |
| 333 | int r = RSA_check_key(rsa); | 333 | int r = RSA_check_key(rsa); |
| 334 | 334 | ||
| 335 | if (r == 1) | 335 | if (r == 1) |
| @@ -353,38 +353,38 @@ rsa_main(int argc, char **argv) | |||
| 353 | goto end; | 353 | goto end; |
| 354 | } | 354 | } |
| 355 | } | 355 | } |
| 356 | if (rsa_config.noout) { | 356 | if (cfg.noout) { |
| 357 | ret = 0; | 357 | ret = 0; |
| 358 | goto end; | 358 | goto end; |
| 359 | } | 359 | } |
| 360 | BIO_printf(bio_err, "writing RSA key\n"); | 360 | BIO_printf(bio_err, "writing RSA key\n"); |
| 361 | if (rsa_config.outformat == FORMAT_ASN1) { | 361 | if (cfg.outformat == FORMAT_ASN1) { |
| 362 | if (rsa_config.pubout || rsa_config.pubin) { | 362 | if (cfg.pubout || cfg.pubin) { |
| 363 | if (rsa_config.pubout == 2) | 363 | if (cfg.pubout == 2) |
| 364 | i = i2d_RSAPublicKey_bio(out, rsa); | 364 | i = i2d_RSAPublicKey_bio(out, rsa); |
| 365 | else | 365 | else |
| 366 | i = i2d_RSA_PUBKEY_bio(out, rsa); | 366 | i = i2d_RSA_PUBKEY_bio(out, rsa); |
| 367 | } else | 367 | } else |
| 368 | i = i2d_RSAPrivateKey_bio(out, rsa); | 368 | i = i2d_RSAPrivateKey_bio(out, rsa); |
| 369 | } else if (rsa_config.outformat == FORMAT_PEM) { | 369 | } else if (cfg.outformat == FORMAT_PEM) { |
| 370 | if (rsa_config.pubout || rsa_config.pubin) { | 370 | if (cfg.pubout || cfg.pubin) { |
| 371 | if (rsa_config.pubout == 2) | 371 | if (cfg.pubout == 2) |
| 372 | i = PEM_write_bio_RSAPublicKey(out, rsa); | 372 | i = PEM_write_bio_RSAPublicKey(out, rsa); |
| 373 | else | 373 | else |
| 374 | i = PEM_write_bio_RSA_PUBKEY(out, rsa); | 374 | i = PEM_write_bio_RSA_PUBKEY(out, rsa); |
| 375 | } else | 375 | } else |
| 376 | i = PEM_write_bio_RSAPrivateKey(out, rsa, | 376 | i = PEM_write_bio_RSAPrivateKey(out, rsa, |
| 377 | rsa_config.enc, NULL, 0, NULL, passout); | 377 | cfg.enc, NULL, 0, NULL, passout); |
| 378 | #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) | 378 | #if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4) |
| 379 | } else if (rsa_config.outformat == FORMAT_MSBLOB || | 379 | } else if (cfg.outformat == FORMAT_MSBLOB || |
| 380 | rsa_config.outformat == FORMAT_PVK) { | 380 | cfg.outformat == FORMAT_PVK) { |
| 381 | EVP_PKEY *pk; | 381 | EVP_PKEY *pk; |
| 382 | pk = EVP_PKEY_new(); | 382 | pk = EVP_PKEY_new(); |
| 383 | EVP_PKEY_set1_RSA(pk, rsa); | 383 | EVP_PKEY_set1_RSA(pk, rsa); |
| 384 | if (rsa_config.outformat == FORMAT_PVK) | 384 | if (cfg.outformat == FORMAT_PVK) |
| 385 | i = i2b_PVK_bio(out, pk, rsa_config.pvk_encr, 0, | 385 | i = i2b_PVK_bio(out, pk, cfg.pvk_encr, 0, |
| 386 | passout); | 386 | passout); |
| 387 | else if (rsa_config.pubin || rsa_config.pubout) | 387 | else if (cfg.pubin || cfg.pubout) |
| 388 | i = i2b_PublicKey_bio(out, pk); | 388 | i = i2b_PublicKey_bio(out, pk); |
| 389 | else | 389 | else |
| 390 | i = i2b_PrivateKey_bio(out, pk); | 390 | i = i2b_PrivateKey_bio(out, pk); |
