blob: 4cf489bb8498952a8d8ad7dffdb3bc3d6d4ec45b [file] [log] [blame]
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001/*
Paul Bakkerf3df61a2013-08-26 17:22:23 +02002 * Key writing application
Paul Bakkerbdb912d2012-02-13 23:11:30 +00003 *
Paul Bakker3c5ef712013-06-25 16:37:45 +02004 * Copyright (C) 2006-2013, Brainspark B.V.
Paul Bakkerbdb912d2012-02-13 23:11:30 +00005 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
7 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
8 *
9 * All rights reserved.
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
Manuel Pégourié-Gonnardabd6e022013-09-20 13:30:43 +020026#include "polarssl/config.h"
Paul Bakkerbdb912d2012-02-13 23:11:30 +000027
28#include <string.h>
29#include <stdlib.h>
30#include <stdio.h>
31
Paul Bakker2e24ca72013-09-18 15:21:27 +020032#include "polarssl/error.h"
Paul Bakker7c6b2c32013-09-16 13:49:26 +020033#include "polarssl/pk.h"
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +020034#include "polarssl/error.h"
Paul Bakkerbdb912d2012-02-13 23:11:30 +000035
Paul Bakker7c6b2c32013-09-16 13:49:26 +020036#if !defined(POLARSSL_PK_WRITE_C) || !defined(POLARSSL_FS_IO)
Paul Bakkered27a042013-04-18 22:46:23 +020037int main( int argc, char *argv[] )
38{
39 ((void) argc);
40 ((void) argv);
41
Paul Bakker7c6b2c32013-09-16 13:49:26 +020042 printf( "POLARSSL_PK_WRITE_C and/or POLARSSL_FS_IO not defined.\n" );
Paul Bakkered27a042013-04-18 22:46:23 +020043 return( 0 );
44}
45#else
46
Paul Bakkerbdb912d2012-02-13 23:11:30 +000047#define MODE_NONE 0
48#define MODE_PRIVATE 1
49#define MODE_PUBLIC 2
50
51#define OUTPUT_MODE_NONE 0
52#define OUTPUT_MODE_PRIVATE 1
53#define OUTPUT_MODE_PUBLIC 2
54
Paul Bakkerf3df61a2013-08-26 17:22:23 +020055#define OUTPUT_FORMAT_PEM 0
56#define OUTPUT_FORMAT_DER 1
57
Paul Bakkerbdb912d2012-02-13 23:11:30 +000058#define DFL_MODE MODE_NONE
59#define DFL_FILENAME "keyfile.key"
60#define DFL_DEBUG_LEVEL 0
Paul Bakkerf3df61a2013-08-26 17:22:23 +020061#define DFL_OUTPUT_MODE OUTPUT_MODE_NONE
Paul Bakkerbdb912d2012-02-13 23:11:30 +000062#define DFL_OUTPUT_FILENAME "keyfile.pem"
Paul Bakkerf3df61a2013-08-26 17:22:23 +020063#define DFL_OUTPUT_FORMAT OUTPUT_FORMAT_PEM
Paul Bakkerbdb912d2012-02-13 23:11:30 +000064
65/*
66 * global options
67 */
68struct options
69{
70 int mode; /* the mode to run the application in */
Paul Bakkeref3f8c72013-06-24 13:01:08 +020071 const char *filename; /* filename of the key file */
Paul Bakkerbdb912d2012-02-13 23:11:30 +000072 int output_mode; /* the output mode to use */
Paul Bakkeref3f8c72013-06-24 13:01:08 +020073 const char *output_file; /* where to store the constructed key file */
Paul Bakkerf3df61a2013-08-26 17:22:23 +020074 int output_format; /* the output format to use */
Paul Bakkerbdb912d2012-02-13 23:11:30 +000075} opt;
76
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +020077static int write_public_key( pk_context *key, const char *output_file )
Paul Bakkerbdb912d2012-02-13 23:11:30 +000078{
Paul Bakkerf3df61a2013-08-26 17:22:23 +020079 int ret;
Paul Bakkerbdb912d2012-02-13 23:11:30 +000080 FILE *f;
Paul Bakker1d569582012-10-03 20:35:44 +000081 unsigned char output_buf[16000];
Paul Bakkerf3df61a2013-08-26 17:22:23 +020082 unsigned char *c = output_buf;
83 size_t len = 0;
Paul Bakkerbdb912d2012-02-13 23:11:30 +000084
Paul Bakker1d569582012-10-03 20:35:44 +000085 memset(output_buf, 0, 16000);
Paul Bakkerbdb912d2012-02-13 23:11:30 +000086
Paul Bakkerf3df61a2013-08-26 17:22:23 +020087 if( opt.output_format == OUTPUT_FORMAT_PEM )
Paul Bakkerbdb912d2012-02-13 23:11:30 +000088 {
Paul Bakkerc7bb02b2013-09-15 14:54:56 +020089 if( ( ret = pk_write_pubkey_pem( key, output_buf, 16000 ) ) != 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +020090 return( ret );
91
92 len = strlen( (char *) output_buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +000093 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +020094 else
95 {
Paul Bakkerc7bb02b2013-09-15 14:54:56 +020096 if( ( ret = pk_write_pubkey_der( key, output_buf, 16000 ) ) < 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +020097 return( ret );
98
99 len = ret;
100 c = output_buf + sizeof(output_buf) - len - 1;
101 }
102
103 if( ( f = fopen( output_file, "w" ) ) == NULL )
104 return( -1 );
105
106 if( fwrite( c, 1, len, f ) != len )
107 return( -1 );
108
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000109 fclose(f);
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200110
111 return( 0 );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000112}
113
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200114static int write_private_key( pk_context *key, const char *output_file )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000115{
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200116 int ret;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000117 FILE *f;
Paul Bakker1d569582012-10-03 20:35:44 +0000118 unsigned char output_buf[16000];
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200119 unsigned char *c = output_buf;
120 size_t len = 0;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000121
Paul Bakker1d569582012-10-03 20:35:44 +0000122 memset(output_buf, 0, 16000);
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200123 if( opt.output_format == OUTPUT_FORMAT_PEM )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000124 {
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200125 if( ( ret = pk_write_key_pem( key, output_buf, 16000 ) ) != 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200126 return( ret );
127
128 len = strlen( (char *) output_buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000129 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200130 else
131 {
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200132 if( ( ret = pk_write_key_der( key, output_buf, 16000 ) ) < 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200133 return( ret );
134
135 len = ret;
136 c = output_buf + sizeof(output_buf) - len - 1;
137 }
138
139 if( ( f = fopen( output_file, "w" ) ) == NULL )
140 return( -1 );
141
142 if( fwrite( c, 1, len, f ) != len )
143 return( -1 );
144
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000145 fclose(f);
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200146
147 return( 0 );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000148}
149
150#define USAGE \
151 "\n usage: key_app param=<>...\n" \
152 "\n acceptable parameters:\n" \
153 " mode=private|public default: none\n" \
154 " filename=%%s default: keyfile.key\n" \
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000155 " output_mode=private|public default: none\n" \
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200156 " output_file=%%s default: keyfile.pem\n" \
157 " output_format=pem|der default: pem\n" \
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000158 "\n"
159
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000160int main( int argc, char *argv[] )
161{
162 int ret = 0;
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200163 pk_context key;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000164 char buf[1024];
Paul Bakker1d569582012-10-03 20:35:44 +0000165 int i;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000166 char *p, *q;
167
168 /*
169 * Set to sane values
170 */
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200171 pk_init( &key );
172 memset( buf, 0, sizeof( buf ) );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000173
174 if( argc == 0 )
175 {
176 usage:
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200177 ret = 1;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000178 printf( USAGE );
179 goto exit;
180 }
181
182 opt.mode = DFL_MODE;
183 opt.filename = DFL_FILENAME;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000184 opt.output_mode = DFL_OUTPUT_MODE;
185 opt.output_file = DFL_OUTPUT_FILENAME;
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200186 opt.output_format = DFL_OUTPUT_FORMAT;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000187
188 for( i = 1; i < argc; i++ )
189 {
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000190 p = argv[i];
191 if( ( q = strchr( p, '=' ) ) == NULL )
192 goto usage;
193 *q++ = '\0';
194
195 if( strcmp( p, "mode" ) == 0 )
196 {
197 if( strcmp( q, "private" ) == 0 )
198 opt.mode = MODE_PRIVATE;
199 else if( strcmp( q, "public" ) == 0 )
200 opt.mode = MODE_PUBLIC;
201 else
202 goto usage;
203 }
204 else if( strcmp( p, "output_mode" ) == 0 )
205 {
206 if( strcmp( q, "private" ) == 0 )
207 opt.output_mode = OUTPUT_MODE_PRIVATE;
208 else if( strcmp( q, "public" ) == 0 )
209 opt.output_mode = OUTPUT_MODE_PUBLIC;
210 else
211 goto usage;
212 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200213 else if( strcmp( p, "output_format" ) == 0 )
214 {
215 if( strcmp( q, "pem" ) == 0 )
216 opt.output_format = OUTPUT_FORMAT_PEM;
217 else if( strcmp( q, "der" ) == 0 )
218 opt.output_format = OUTPUT_FORMAT_DER;
219 else
220 goto usage;
221 }
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000222 else if( strcmp( p, "filename" ) == 0 )
223 opt.filename = q;
224 else if( strcmp( p, "output_file" ) == 0 )
225 opt.output_file = q;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000226 else
227 goto usage;
228 }
229
230 if( opt.mode == MODE_NONE && opt.output_mode != OUTPUT_MODE_NONE )
231 {
232 printf( "\nCannot output a key without reading one.\n");
233 goto exit;
234 }
235
236 if( opt.mode == MODE_PUBLIC && opt.output_mode == OUTPUT_MODE_PRIVATE )
237 {
238 printf( "\nCannot output a private key from a public key.\n");
239 goto exit;
240 }
241
242 if( opt.mode == MODE_PRIVATE )
243 {
244 /*
245 * 1.1. Load the key
246 */
247 printf( "\n . Loading the private key ..." );
248 fflush( stdout );
249
Paul Bakker1a7550a2013-09-15 13:01:22 +0200250 ret = pk_parse_keyfile( &key, opt.filename, NULL );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000251
252 if( ret != 0 )
253 {
Paul Bakker2e24ca72013-09-18 15:21:27 +0200254 polarssl_strerror( ret, (char *) buf, sizeof(buf) );
255 printf( " failed\n ! pk_parse_keyfile returned -0x%04x - %s\n\n", -ret, buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000256 goto exit;
257 }
258
259 printf( " ok\n" );
260
261 /*
262 * 1.2 Print the key
263 */
264 printf( " . Key information ...\n" );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200265
266#if defined(POLARSSL_RSA_C)
267 if( pk_get_type( &key ) == POLARSSL_PK_RSA )
268 {
269 rsa_context *rsa = pk_rsa( key );
270 mpi_write_file( "N: ", &rsa->N, 16, NULL );
271 mpi_write_file( "E: ", &rsa->E, 16, NULL );
272 mpi_write_file( "D: ", &rsa->D, 16, NULL );
273 mpi_write_file( "P: ", &rsa->P, 16, NULL );
274 mpi_write_file( "Q: ", &rsa->Q, 16, NULL );
275 mpi_write_file( "DP: ", &rsa->DP, 16, NULL );
276 mpi_write_file( "DQ: ", &rsa->DQ, 16, NULL );
277 mpi_write_file( "QP: ", &rsa->QP, 16, NULL );
278 }
279 else
280#endif
Paul Bakker2e24ca72013-09-18 15:21:27 +0200281#if defined(POLARSSL_ECP_C)
282 if( pk_get_type( &key ) == POLARSSL_PK_ECKEY )
283 {
284 ecp_keypair *ecp = pk_ec( key );
285 mpi_write_file( "Q(X): ", &ecp->Q.X, 16, NULL );
286 mpi_write_file( "Q(Y): ", &ecp->Q.Y, 16, NULL );
287 mpi_write_file( "Q(Z): ", &ecp->Q.Z, 16, NULL );
288 mpi_write_file( "D : ", &ecp->d , 16, NULL );
289 }
290 else
291#endif
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200292 printf("key type not supported yet\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000293
294 }
295 else if( opt.mode == MODE_PUBLIC )
296 {
297 /*
298 * 1.1. Load the key
299 */
300 printf( "\n . Loading the public key ..." );
301 fflush( stdout );
302
Paul Bakker1a7550a2013-09-15 13:01:22 +0200303 ret = pk_parse_public_keyfile( &key, opt.filename );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000304
305 if( ret != 0 )
306 {
Paul Bakker2e24ca72013-09-18 15:21:27 +0200307 polarssl_strerror( ret, (char *) buf, sizeof(buf) );
308 printf( " failed\n ! pk_parse_public_key returned -0x%04x - %s\n\n", -ret, buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000309 goto exit;
310 }
311
312 printf( " ok\n" );
313
314 /*
315 * 1.2 Print the key
316 */
317 printf( " . Key information ...\n" );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200318
319#if defined(POLARSSL_RSA_C)
320 if( pk_get_type( &key ) == POLARSSL_PK_RSA )
321 {
322 rsa_context *rsa = pk_rsa( key );
323 mpi_write_file( "N: ", &rsa->N, 16, NULL );
324 mpi_write_file( "E: ", &rsa->E, 16, NULL );
325 }
326 else
327#endif
Paul Bakker2e24ca72013-09-18 15:21:27 +0200328#if defined(POLARSSL_ECP_C)
329 if( pk_get_type( &key ) == POLARSSL_PK_ECKEY )
330 {
331 ecp_keypair *ecp = pk_ec( key );
332 mpi_write_file( "Q(X): ", &ecp->Q.X, 16, NULL );
333 mpi_write_file( "Q(Y): ", &ecp->Q.Y, 16, NULL );
334 mpi_write_file( "Q(Z): ", &ecp->Q.Z, 16, NULL );
335 }
336 else
337#endif
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200338 printf("key type not supported yet\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000339 }
340 else
341 goto usage;
342
343 if( opt.output_mode == OUTPUT_MODE_PUBLIC )
344 {
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200345 write_public_key( &key, opt.output_file );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000346 }
347 if( opt.output_mode == OUTPUT_MODE_PRIVATE )
348 {
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200349 write_private_key( &key, opt.output_file );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000350 }
351
352exit:
353
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200354 if( ret != 0 && ret != 1)
355 {
356#ifdef POLARSSL_ERROR_C
357 polarssl_strerror( ret, buf, sizeof( buf ) );
358 printf( " - %s\n", buf );
359#else
360 printf("\n");
361#endif
362 }
363
364 pk_free( &key );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000365
366#if defined(_WIN32)
367 printf( " + Press Enter to exit this program.\n" );
368 fflush( stdout ); getchar();
369#endif
370
371 return( ret );
372}
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200373#endif /* POLARSSL_X509_WRITE_C && POLARSSL_FS_IO */