Annotation of embedaddon/ipsec-tools/src/racoon/plainrsa-gen.c, revision 1.1

1.1     ! misho       1: /*     $NetBSD: plainrsa-gen.c,v 1.6 2011/02/11 10:07:19 tteras Exp $  */
        !             2: 
        !             3: /* Id: plainrsa-gen.c,v 1.6 2005/04/21 09:08:40 monas Exp */
        !             4: /*
        !             5:  * Copyright (C) 2004 SuSE Linux AG, Nuernberg, Germany.
        !             6:  * Contributed by: Michal Ludvig <mludvig@suse.cz>, SUSE Labs
        !             7:  * All rights reserved.
        !             8:  *
        !             9:  * Redistribution and use in source and binary forms, with or without
        !            10:  * modification, are permitted provided that the following conditions
        !            11:  * are met:
        !            12:  * 1. Redistributions of source code must retain the above copyright
        !            13:  *    notice, this list of conditions and the following disclaimer.
        !            14:  * 2. Redistributions in binary form must reproduce the above copyright
        !            15:  *    notice, this list of conditions and the following disclaimer in the
        !            16:  *    documentation and/or other materials provided with the distribution.
        !            17:  * 3. Neither the name of the project nor the names of its contributors
        !            18:  *    may be used to endorse or promote products derived from this software
        !            19:  *    without specific prior written permission.
        !            20:  *
        !            21:  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
        !            22:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
        !            23:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
        !            24:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
        !            25:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
        !            26:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
        !            27:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
        !            28:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
        !            29:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
        !            30:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
        !            31:  * SUCH DAMAGE.
        !            32:  */
        !            33: 
        !            34: /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */
        !            35: 
        !            36: #include "config.h"
        !            37: 
        !            38: #include <stdio.h>
        !            39: #include <string.h>
        !            40: #include <errno.h>
        !            41: 
        !            42: #include <sys/types.h>
        !            43: #include <sys/stat.h>
        !            44: #include <sys/socket.h>
        !            45: #include <unistd.h>
        !            46: #include <fcntl.h>
        !            47: 
        !            48: #include <openssl/bio.h>
        !            49: #include <openssl/bn.h>
        !            50: #include <openssl/err.h>
        !            51: #include <openssl/objects.h>
        !            52: #include <openssl/pem.h>
        !            53: #include <openssl/rsa.h>
        !            54: #include <openssl/evp.h>
        !            55: #ifdef HAVE_OPENSSL_ENGINE_H
        !            56: #include <openssl/engine.h>
        !            57: #endif
        !            58: 
        !            59: #include "misc.h"
        !            60: #include "vmbuf.h"
        !            61: #include "plog.h"
        !            62: #include "crypto_openssl.h"
        !            63: 
        !            64: #include "package_version.h"
        !            65: 
        !            66: void
        !            67: usage (char *argv0)
        !            68: {
        !            69:        fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING);
        !            70:        fprintf(stderr, "By Michal Ludvig (http://www.logix.cz/michal)\n");
        !            71:        fprintf(stderr, "\n");
        !            72:        fprintf(stderr, "Usage: %s [options]\n", argv0);
        !            73:        fprintf(stderr, "\n");
        !            74:        fprintf(stderr, "  -b bits       Generate <bits> long RSA key (default=1024)\n");
        !            75:        fprintf(stderr, "  -e pubexp     Public exponent to use (default=0x3)\n");
        !            76:        fprintf(stderr, "  -f filename   Filename to store the key to (default=stdout)\n");
        !            77:        fprintf(stderr, "  -i filename   Input source for format conversion\n");
        !            78:        fprintf(stderr, "  -h            Help\n");
        !            79:        fprintf(stderr, "\n");
        !            80:        fprintf(stderr, "Report bugs to <ipsec-tools-devel@lists.sourceforge.net>\n");
        !            81:        exit(1);
        !            82: }
        !            83: 
        !            84: /*
        !            85:  * See RFC 2065, section 3.5 for details about the output format.
        !            86:  */
        !            87: vchar_t *
        !            88: mix_b64_pubkey(const RSA *key)
        !            89: {
        !            90:        char *binbuf;
        !            91:        long binlen, ret;
        !            92:        vchar_t *res;
        !            93:        
        !            94:        binlen = 1 + BN_num_bytes(key->e) + BN_num_bytes(key->n);
        !            95:        binbuf = malloc(binlen);
        !            96:        memset(binbuf, 0, binlen);
        !            97:        binbuf[0] = BN_bn2bin(key->e, (unsigned char *) &binbuf[1]);
        !            98:        ret = BN_bn2bin(key->n, (unsigned char *) (&binbuf[binbuf[0] + 1]));
        !            99:        if (1 + binbuf[0] + ret != binlen) {
        !           100:                plog(LLV_ERROR, LOCATION, NULL,
        !           101:                     "Pubkey generation failed. This is really strange...\n");
        !           102:                return NULL;
        !           103:        }
        !           104: 
        !           105:        return base64_encode(binbuf, binlen);
        !           106: }
        !           107: 
        !           108: char *
        !           109: lowercase(char *input)
        !           110: {
        !           111:        char *ptr = input;
        !           112:        while (*ptr) {
        !           113:                if (*ptr >= 'A' && *ptr <= 'F')
        !           114:                        *ptr -= 'A' - 'a';
        !           115:                *ptr++;
        !           116:        }
        !           117: 
        !           118:        return input;
        !           119: }
        !           120: 
        !           121: int
        !           122: print_rsa_key(FILE *fp, const RSA *key)
        !           123: {
        !           124:        vchar_t *pubkey64 = NULL;
        !           125: 
        !           126:        pubkey64 = mix_b64_pubkey(key);
        !           127:        if (!pubkey64) {
        !           128:                fprintf(stderr, "mix_b64_pubkey(): %s\n", eay_strerror());
        !           129:                return -1;
        !           130:        }
        !           131:        
        !           132:        fprintf(fp, "# : PUB 0s%s\n", pubkey64->v);
        !           133:        fprintf(fp, ": RSA\t{\n");
        !           134:        fprintf(fp, "\t# RSA %d bits\n", BN_num_bits(key->n));
        !           135:        fprintf(fp, "\t# pubkey=0s%s\n", pubkey64->v);
        !           136:        fprintf(fp, "\tModulus: 0x%s\n", lowercase(BN_bn2hex(key->n)));
        !           137:        fprintf(fp, "\tPublicExponent: 0x%s\n", lowercase(BN_bn2hex(key->e)));
        !           138:        fprintf(fp, "\tPrivateExponent: 0x%s\n", lowercase(BN_bn2hex(key->d)));
        !           139:        fprintf(fp, "\tPrime1: 0x%s\n", lowercase(BN_bn2hex(key->p)));
        !           140:        fprintf(fp, "\tPrime2: 0x%s\n", lowercase(BN_bn2hex(key->q)));
        !           141:        fprintf(fp, "\tExponent1: 0x%s\n", lowercase(BN_bn2hex(key->dmp1)));
        !           142:        fprintf(fp, "\tExponent2: 0x%s\n", lowercase(BN_bn2hex(key->dmq1)));
        !           143:        fprintf(fp, "\tCoefficient: 0x%s\n", lowercase(BN_bn2hex(key->iqmp)));
        !           144:        fprintf(fp, "  }\n");
        !           145: 
        !           146:        vfree(pubkey64);
        !           147:        return 0;
        !           148: }
        !           149: 
        !           150: int
        !           151: print_public_rsa_key(FILE *fp, const RSA *key)
        !           152: {
        !           153:        vchar_t *pubkey64 = NULL;
        !           154: 
        !           155:        pubkey64 = mix_b64_pubkey(key);
        !           156:        if (!pubkey64) {
        !           157:                fprintf(stderr, "mix_b64_pubkey(): %s\n", eay_strerror());
        !           158:                return -1;
        !           159:        }
        !           160:        
        !           161:        fprintf(fp, ": PUB 0s%s\n", pubkey64->v);
        !           162: 
        !           163:        vfree(pubkey64);
        !           164:        return 0;
        !           165: }
        !           166: 
        !           167: int
        !           168: convert_rsa_key(FILE *fpout, FILE *fpin)
        !           169: {
        !           170:        int ret;
        !           171:        RSA *key = NULL;
        !           172: 
        !           173:        key = PEM_read_RSAPrivateKey(fpin, NULL, NULL, NULL);
        !           174:        if (key) {
        !           175:                ret = print_rsa_key(fpout, key);
        !           176:                RSA_free(key);
        !           177: 
        !           178:                return ret;
        !           179:        }
        !           180:        
        !           181:        rewind(fpin);
        !           182: 
        !           183:        key = PEM_read_RSA_PUBKEY(fpin, NULL, NULL, NULL);
        !           184:        if (key) {
        !           185:                ret = print_public_rsa_key(fpout, key);
        !           186:                RSA_free(key);
        !           187: 
        !           188:                return ret;
        !           189:        }
        !           190: 
        !           191:        /* Implement parsing of input stream containing
        !           192:         * private or public "plainrsa" formatted text.
        !           193:         * Convert the result to PEM formatted output.
        !           194:         *
        !           195:         * This seemingly needs manual use of prsaparse().
        !           196:         * An expert ought to do this. */
        !           197: 
        !           198:        fprintf(stderr, "convert_rsa_key: %s\n", "Only conversion from PEM at this time");
        !           199:        return -1;
        !           200: }
        !           201: 
        !           202: int
        !           203: gen_rsa_key(FILE *fp, size_t bits, unsigned long exp)
        !           204: {
        !           205:        int ret;
        !           206:        RSA *key;
        !           207: 
        !           208:        key = RSA_generate_key(bits, exp, NULL, NULL);
        !           209:        if (!key) {
        !           210:                fprintf(stderr, "RSA_generate_key(): %s\n", eay_strerror());
        !           211:                return -1;
        !           212:        }
        !           213:        
        !           214:        ret = print_rsa_key(fp, key);
        !           215:        RSA_free(key);
        !           216: 
        !           217:        return ret;
        !           218: }
        !           219: 
        !           220: int
        !           221: main (int argc, char *argv[])
        !           222: {
        !           223:        FILE *fp = stdout, *fpin = NULL;
        !           224:        size_t bits = 1024;
        !           225:        unsigned int pubexp = 0x3;
        !           226:        struct stat st;
        !           227:        extern char *optarg;
        !           228:        extern int optind;
        !           229:        int c, fd = -1, fdin = -1;
        !           230:        char *fname = NULL, *finput = NULL;
        !           231: 
        !           232:        while ((c = getopt(argc, argv, "e:b:f:i:h")) != -1)
        !           233:                switch (c) {
        !           234:                        case 'e':
        !           235:                                if (strncmp(optarg, "0x", 2) == 0)
        !           236:                                        sscanf(optarg, "0x%x", &pubexp);
        !           237:                                else
        !           238:                                        pubexp = atoi(optarg);
        !           239:                                break;
        !           240:                        case 'b':
        !           241:                                bits = atoi(optarg);
        !           242:                                break;
        !           243:                        case 'f':
        !           244:                                fname = optarg;
        !           245:                                break;
        !           246:                        case 'i':
        !           247:                                finput = optarg;
        !           248:                                break;
        !           249:                        case 'h':
        !           250:                        default:
        !           251:                                usage(argv[0]);
        !           252:                }
        !           253: 
        !           254:        if (fname) {
        !           255:                umask(0077);
        !           256:                /* Restrictive access due to private key material. */
        !           257:                fd = open(fname, O_WRONLY | O_CREAT | O_EXCL | O_NOFOLLOW, S_IRUSR | S_IWUSR);
        !           258:                if (fd < 0) {
        !           259:                        if (errno == EEXIST)
        !           260:                                fprintf(stderr, "%s: file exists! Please use a different name.\n", fname);
        !           261:                        else
        !           262:                                fprintf(stderr, "%s: %s\n", fname, strerror(errno));
        !           263:                        exit(1);
        !           264:                }
        !           265:                fp = fdopen(fd, "w");
        !           266:                if (fp == NULL) {
        !           267:                        fprintf(stderr, "%s: %s\n", fname, strerror(errno));
        !           268:                        close(fd);
        !           269:                        exit(1);
        !           270:                }
        !           271:        }
        !           272: 
        !           273:        if (finput) {
        !           274:                /* Restrictive access once more. Do not be fooled by a link. */
        !           275:                fdin = open(finput, O_RDONLY | O_NOFOLLOW);
        !           276:                if (fdin < 0) {
        !           277:                        if (errno == ELOOP)
        !           278:                                fprintf(stderr, "%s: file is a link. Discarded for security.\n", fname);
        !           279:                        if (fp)
        !           280:                                fclose(fp);
        !           281:                        exit(1);
        !           282:                }
        !           283:                fpin = fdopen(fdin, "r");
        !           284:                if (fpin == NULL) {
        !           285:                        fprintf(stderr, "%s: %s\n", fname, strerror(errno));
        !           286:                        close(fdin);
        !           287:                        if (fp)
        !           288:                                fclose(fp);
        !           289:                        exit(1);
        !           290:                }
        !           291: 
        !           292:        }
        !           293: 
        !           294:        ploginit();
        !           295:        eay_init();
        !           296: 
        !           297:        if (fpin)
        !           298:                convert_rsa_key(fp, fpin);
        !           299:        else
        !           300:                gen_rsa_key(fp, bits, pubexp);
        !           301: 
        !           302:        fclose(fp);
        !           303:        if (fpin)
        !           304:                fclose(fpin);
        !           305: 
        !           306:        return 0;
        !           307: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>