blob: 586616b9284063315b7a9ebdff4aedc8adfb5eb0 [file] [log] [blame]
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001/*
Paul Bakkerf3df61a2013-08-26 17:22:23 +02002 * Key writing application
Paul Bakkerbdb912d2012-02-13 23:11:30 +00003 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02004 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Bence Szépkútif744bd72020-06-05 13:02:18 +02005 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6 *
7 * This file is provided under the Apache License 2.0, or the
8 * GNU General Public License v2.0 or later.
9 *
10 * **********
11 * Apache License 2.0:
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020012 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Paul Bakkerbdb912d2012-02-13 23:11:30 +000024 *
Bence Szépkútif744bd72020-06-05 13:02:18 +020025 * **********
26 *
27 * **********
28 * GNU General Public License v2.0 or later:
29 *
30 * This program is free software; you can redistribute it and/or modify
31 * it under the terms of the GNU General Public License as published by
32 * the Free Software Foundation; either version 2 of the License, or
33 * (at your option) any later version.
34 *
35 * This program is distributed in the hope that it will be useful,
36 * but WITHOUT ANY WARRANTY; without even the implied warranty of
37 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
38 * GNU General Public License for more details.
39 *
40 * You should have received a copy of the GNU General Public License along
41 * with this program; if not, write to the Free Software Foundation, Inc.,
42 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
43 *
44 * **********
45 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000046 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerbdb912d2012-02-13 23:11:30 +000047 */
48
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000050#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020051#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020053#endif
Paul Bakkerbdb912d2012-02-13 23:11:30 +000054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000056#include "mbedtls/platform.h"
Rich Evansf90016a2015-01-19 14:26:37 +000057#else
Rich Evans18b78c72015-02-11 14:06:19 +000058#include <stdio.h>
Andres Amaya Garciaed684882018-04-29 20:07:30 +010059#include <stdlib.h>
60#define mbedtls_printf printf
Manuel Pégourié-Gonnard3ef6a6d2018-12-10 14:31:45 +010061#define mbedtls_exit exit
Andres Amaya Garcia7d429652018-04-30 22:42:33 +010062#define MBEDTLS_EXIT_SUCCESS EXIT_SUCCESS
Andres Amaya Garciaed684882018-04-29 20:07:30 +010063#define MBEDTLS_EXIT_FAILURE EXIT_FAILURE
64#endif /* MBEDTLS_PLATFORM_C */
Rich Evansf90016a2015-01-19 14:26:37 +000065
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066#if defined(MBEDTLS_PK_WRITE_C) && defined(MBEDTLS_FS_IO)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000067#include "mbedtls/error.h"
68#include "mbedtls/pk.h"
69#include "mbedtls/error.h"
Paul Bakkerbdb912d2012-02-13 23:11:30 +000070
Rich Evans18b78c72015-02-11 14:06:19 +000071#include <stdio.h>
72#include <string.h>
73#endif
Paul Bakkered27a042013-04-18 22:46:23 +020074
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020075#if defined(MBEDTLS_PEM_WRITE_C)
Rich Evans18b78c72015-02-11 14:06:19 +000076#define USAGE_OUT \
77 " output_file=%%s default: keyfile.pem\n" \
78 " output_format=pem|der default: pem\n"
Paul Bakkered27a042013-04-18 22:46:23 +020079#else
Rich Evans18b78c72015-02-11 14:06:19 +000080#define USAGE_OUT \
81 " output_file=%%s default: keyfile.der\n" \
82 " output_format=der default: der\n"
83#endif
84
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#if defined(MBEDTLS_PEM_WRITE_C)
Rich Evans18b78c72015-02-11 14:06:19 +000086#define DFL_OUTPUT_FILENAME "keyfile.pem"
87#define DFL_OUTPUT_FORMAT OUTPUT_FORMAT_PEM
88#else
89#define DFL_OUTPUT_FILENAME "keyfile.der"
90#define DFL_OUTPUT_FORMAT OUTPUT_FORMAT_DER
91#endif
92
93#define DFL_MODE MODE_NONE
94#define DFL_FILENAME "keyfile.key"
95#define DFL_DEBUG_LEVEL 0
96#define DFL_OUTPUT_MODE OUTPUT_MODE_NONE
Paul Bakkered27a042013-04-18 22:46:23 +020097
Paul Bakkerbdb912d2012-02-13 23:11:30 +000098#define MODE_NONE 0
99#define MODE_PRIVATE 1
100#define MODE_PUBLIC 2
101
102#define OUTPUT_MODE_NONE 0
103#define OUTPUT_MODE_PRIVATE 1
104#define OUTPUT_MODE_PUBLIC 2
105
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200106#define OUTPUT_FORMAT_PEM 0
107#define OUTPUT_FORMAT_DER 1
108
Rich Evans18b78c72015-02-11 14:06:19 +0000109#define USAGE \
Hanno Becker40371ec2017-08-23 06:46:17 +0100110 "\n usage: key_app_writer param=<>...\n" \
Rich Evans18b78c72015-02-11 14:06:19 +0000111 "\n acceptable parameters:\n" \
112 " mode=private|public default: none\n" \
113 " filename=%%s default: keyfile.key\n" \
114 " output_mode=private|public default: none\n" \
115 USAGE_OUT \
116 "\n"
Manuel Pégourié-Gonnard6c5abfa2015-02-13 14:12:07 +0000117
Hanno Beckerb14c3312018-10-16 13:45:22 +0100118#if !defined(MBEDTLS_PK_PARSE_C) || \
119 !defined(MBEDTLS_PK_WRITE_C) || \
120 !defined(MBEDTLS_FS_IO)
Rich Evans85b05ec2015-02-12 11:37:29 +0000121int main( void )
Rich Evans18b78c72015-02-11 14:06:19 +0000122{
Hanno Beckerb14c3312018-10-16 13:45:22 +0100123 mbedtls_printf( "MBEDTLS_PK_PARSE_C and/or MBEDTLS_PK_WRITE_C and/or MBEDTLS_FS_IO not defined.\n" );
Krzysztof Stachowiak3b0c4302019-04-24 14:24:46 +0200124 mbedtls_exit( 0 );
Rich Evans18b78c72015-02-11 14:06:19 +0000125}
126#else
Simon Butcher63cb97e2018-12-06 17:43:31 +0000127
Simon Butcher63cb97e2018-12-06 17:43:31 +0000128
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000129/*
130 * global options
131 */
132struct options
133{
134 int mode; /* the mode to run the application in */
Paul Bakkeref3f8c72013-06-24 13:01:08 +0200135 const char *filename; /* filename of the key file */
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000136 int output_mode; /* the output mode to use */
Paul Bakkeref3f8c72013-06-24 13:01:08 +0200137 const char *output_file; /* where to store the constructed key file */
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200138 int output_format; /* the output format to use */
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000139} opt;
140
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200141static int write_public_key( mbedtls_pk_context *key, const char *output_file )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000142{
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200143 int ret;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000144 FILE *f;
Paul Bakker1d569582012-10-03 20:35:44 +0000145 unsigned char output_buf[16000];
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200146 unsigned char *c = output_buf;
147 size_t len = 0;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000148
Paul Bakker1d569582012-10-03 20:35:44 +0000149 memset(output_buf, 0, 16000);
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000150
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200151#if defined(MBEDTLS_PEM_WRITE_C)
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200152 if( opt.output_format == OUTPUT_FORMAT_PEM )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000153 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200154 if( ( ret = mbedtls_pk_write_pubkey_pem( key, output_buf, 16000 ) ) != 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200155 return( ret );
156
157 len = strlen( (char *) output_buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000158 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200159 else
Manuel Pégourié-Gonnardf9378d82014-06-24 13:11:25 +0200160#endif
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200161 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200162 if( ( ret = mbedtls_pk_write_pubkey_der( key, output_buf, 16000 ) ) < 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200163 return( ret );
164
165 len = ret;
Ron Eldorbb51cb32018-01-07 18:10:43 +0200166 c = output_buf + sizeof(output_buf) - len;
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200167 }
168
169 if( ( f = fopen( output_file, "w" ) ) == NULL )
170 return( -1 );
171
172 if( fwrite( c, 1, len, f ) != len )
Paul Bakker0c226102014-04-17 16:02:36 +0200173 {
174 fclose( f );
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200175 return( -1 );
Paul Bakker0c226102014-04-17 16:02:36 +0200176 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200177
Paul Bakker0c226102014-04-17 16:02:36 +0200178 fclose( f );
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200179
180 return( 0 );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000181}
182
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183static int write_private_key( mbedtls_pk_context *key, const char *output_file )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000184{
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200185 int ret;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000186 FILE *f;
Paul Bakker1d569582012-10-03 20:35:44 +0000187 unsigned char output_buf[16000];
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200188 unsigned char *c = output_buf;
189 size_t len = 0;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000190
Paul Bakker1d569582012-10-03 20:35:44 +0000191 memset(output_buf, 0, 16000);
Manuel Pégourié-Gonnardf9378d82014-06-24 13:11:25 +0200192
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200193#if defined(MBEDTLS_PEM_WRITE_C)
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200194 if( opt.output_format == OUTPUT_FORMAT_PEM )
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000195 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196 if( ( ret = mbedtls_pk_write_key_pem( key, output_buf, 16000 ) ) != 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200197 return( ret );
198
199 len = strlen( (char *) output_buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000200 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200201 else
Manuel Pégourié-Gonnardf9378d82014-06-24 13:11:25 +0200202#endif
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200203 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200204 if( ( ret = mbedtls_pk_write_key_der( key, output_buf, 16000 ) ) < 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200205 return( ret );
206
207 len = ret;
Christian Walther38c919b2018-11-28 13:32:27 +0100208 c = output_buf + sizeof(output_buf) - len;
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200209 }
210
211 if( ( f = fopen( output_file, "w" ) ) == NULL )
212 return( -1 );
213
214 if( fwrite( c, 1, len, f ) != len )
Paul Bakker0c226102014-04-17 16:02:36 +0200215 {
216 fclose( f );
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200217 return( -1 );
Paul Bakker0c226102014-04-17 16:02:36 +0200218 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200219
Paul Bakker0c226102014-04-17 16:02:36 +0200220 fclose( f );
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200221
222 return( 0 );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000223}
224
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000225int main( int argc, char *argv[] )
226{
Andres Amaya Garciaed684882018-04-29 20:07:30 +0100227 int ret = 1;
228 int exit_code = MBEDTLS_EXIT_FAILURE;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000229 char buf[1024];
Paul Bakker1d569582012-10-03 20:35:44 +0000230 int i;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000231 char *p, *q;
232
Hanno Becker40371ec2017-08-23 06:46:17 +0100233 mbedtls_pk_context key;
234 mbedtls_mpi N, P, Q, D, E, DP, DQ, QP;
235
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000236 /*
237 * Set to sane values
238 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200239 mbedtls_pk_init( &key );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200240 memset( buf, 0, sizeof( buf ) );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000241
Hanno Becker40371ec2017-08-23 06:46:17 +0100242 mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P ); mbedtls_mpi_init( &Q );
243 mbedtls_mpi_init( &D ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &DP );
244 mbedtls_mpi_init( &DQ ); mbedtls_mpi_init( &QP );
245
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000246 if( argc == 0 )
247 {
248 usage:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200249 mbedtls_printf( USAGE );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000250 goto exit;
251 }
252
253 opt.mode = DFL_MODE;
254 opt.filename = DFL_FILENAME;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000255 opt.output_mode = DFL_OUTPUT_MODE;
256 opt.output_file = DFL_OUTPUT_FILENAME;
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200257 opt.output_format = DFL_OUTPUT_FORMAT;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000258
259 for( i = 1; i < argc; i++ )
260 {
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000261 p = argv[i];
262 if( ( q = strchr( p, '=' ) ) == NULL )
263 goto usage;
264 *q++ = '\0';
265
266 if( strcmp( p, "mode" ) == 0 )
267 {
268 if( strcmp( q, "private" ) == 0 )
269 opt.mode = MODE_PRIVATE;
270 else if( strcmp( q, "public" ) == 0 )
271 opt.mode = MODE_PUBLIC;
272 else
273 goto usage;
274 }
275 else if( strcmp( p, "output_mode" ) == 0 )
276 {
277 if( strcmp( q, "private" ) == 0 )
278 opt.output_mode = OUTPUT_MODE_PRIVATE;
279 else if( strcmp( q, "public" ) == 0 )
280 opt.output_mode = OUTPUT_MODE_PUBLIC;
281 else
282 goto usage;
283 }
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200284 else if( strcmp( p, "output_format" ) == 0 )
285 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200286#if defined(MBEDTLS_PEM_WRITE_C)
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200287 if( strcmp( q, "pem" ) == 0 )
288 opt.output_format = OUTPUT_FORMAT_PEM;
Manuel Pégourié-Gonnardf9378d82014-06-24 13:11:25 +0200289 else
290#endif
291 if( strcmp( q, "der" ) == 0 )
Paul Bakkerf3df61a2013-08-26 17:22:23 +0200292 opt.output_format = OUTPUT_FORMAT_DER;
293 else
294 goto usage;
295 }
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000296 else if( strcmp( p, "filename" ) == 0 )
297 opt.filename = q;
298 else if( strcmp( p, "output_file" ) == 0 )
299 opt.output_file = q;
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000300 else
301 goto usage;
302 }
303
304 if( opt.mode == MODE_NONE && opt.output_mode != OUTPUT_MODE_NONE )
305 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200306 mbedtls_printf( "\nCannot output a key without reading one.\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000307 goto exit;
308 }
309
310 if( opt.mode == MODE_PUBLIC && opt.output_mode == OUTPUT_MODE_PRIVATE )
311 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200312 mbedtls_printf( "\nCannot output a private key from a public key.\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000313 goto exit;
314 }
315
316 if( opt.mode == MODE_PRIVATE )
317 {
318 /*
319 * 1.1. Load the key
320 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200321 mbedtls_printf( "\n . Loading the private key ..." );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000322 fflush( stdout );
323
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200324 ret = mbedtls_pk_parse_keyfile( &key, opt.filename, NULL );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000325
326 if( ret != 0 )
327 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200328 mbedtls_strerror( ret, (char *) buf, sizeof(buf) );
329 mbedtls_printf( " failed\n ! mbedtls_pk_parse_keyfile returned -0x%04x - %s\n\n", -ret, buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000330 goto exit;
331 }
332
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200333 mbedtls_printf( " ok\n" );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000334
335 /*
336 * 1.2 Print the key
337 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200338 mbedtls_printf( " . Key information ...\n" );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200339
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200340#if defined(MBEDTLS_RSA_C)
341 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA )
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200342 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200343 mbedtls_rsa_context *rsa = mbedtls_pk_rsa( key );
Hanno Becker40371ec2017-08-23 06:46:17 +0100344
345 if( ( ret = mbedtls_rsa_export ( rsa, &N, &P, &Q, &D, &E ) ) != 0 ||
346 ( ret = mbedtls_rsa_export_crt( rsa, &DP, &DQ, &QP ) ) != 0 )
347 {
348 mbedtls_printf( " failed\n ! could not export RSA parameters\n\n" );
349 goto exit;
350 }
351
352 mbedtls_mpi_write_file( "N: ", &N, 16, NULL );
353 mbedtls_mpi_write_file( "E: ", &E, 16, NULL );
354 mbedtls_mpi_write_file( "D: ", &D, 16, NULL );
355 mbedtls_mpi_write_file( "P: ", &P, 16, NULL );
356 mbedtls_mpi_write_file( "Q: ", &Q, 16, NULL );
357 mbedtls_mpi_write_file( "DP: ", &DP, 16, NULL );
358 mbedtls_mpi_write_file( "DQ: ", &DQ, 16, NULL );
359 mbedtls_mpi_write_file( "QP: ", &QP, 16, NULL );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200360 }
361 else
362#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200363#if defined(MBEDTLS_ECP_C)
364 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_ECKEY )
Paul Bakker2e24ca72013-09-18 15:21:27 +0200365 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200366 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key );
367 mbedtls_mpi_write_file( "Q(X): ", &ecp->Q.X, 16, NULL );
368 mbedtls_mpi_write_file( "Q(Y): ", &ecp->Q.Y, 16, NULL );
369 mbedtls_mpi_write_file( "Q(Z): ", &ecp->Q.Z, 16, NULL );
370 mbedtls_mpi_write_file( "D : ", &ecp->d , 16, NULL );
Paul Bakker2e24ca72013-09-18 15:21:27 +0200371 }
372 else
373#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200374 mbedtls_printf("key type not supported yet\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000375
376 }
377 else if( opt.mode == MODE_PUBLIC )
378 {
379 /*
380 * 1.1. Load the key
381 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200382 mbedtls_printf( "\n . Loading the public key ..." );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000383 fflush( stdout );
384
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200385 ret = mbedtls_pk_parse_public_keyfile( &key, opt.filename );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000386
387 if( ret != 0 )
388 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200389 mbedtls_strerror( ret, (char *) buf, sizeof(buf) );
390 mbedtls_printf( " failed\n ! mbedtls_pk_parse_public_key returned -0x%04x - %s\n\n", -ret, buf );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000391 goto exit;
392 }
393
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200394 mbedtls_printf( " ok\n" );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000395
396 /*
397 * 1.2 Print the key
398 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200399 mbedtls_printf( " . Key information ...\n" );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200400
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200401#if defined(MBEDTLS_RSA_C)
402 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA )
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200403 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200404 mbedtls_rsa_context *rsa = mbedtls_pk_rsa( key );
Hanno Becker40371ec2017-08-23 06:46:17 +0100405
406 if( ( ret = mbedtls_rsa_export( rsa, &N, NULL, NULL,
407 NULL, &E ) ) != 0 )
408 {
409 mbedtls_printf( " failed\n ! could not export RSA parameters\n\n" );
410 goto exit;
411 }
412 mbedtls_mpi_write_file( "N: ", &N, 16, NULL );
413 mbedtls_mpi_write_file( "E: ", &E, 16, NULL );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200414 }
415 else
416#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200417#if defined(MBEDTLS_ECP_C)
418 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_ECKEY )
Paul Bakker2e24ca72013-09-18 15:21:27 +0200419 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200420 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key );
421 mbedtls_mpi_write_file( "Q(X): ", &ecp->Q.X, 16, NULL );
422 mbedtls_mpi_write_file( "Q(Y): ", &ecp->Q.Y, 16, NULL );
423 mbedtls_mpi_write_file( "Q(Z): ", &ecp->Q.Z, 16, NULL );
Paul Bakker2e24ca72013-09-18 15:21:27 +0200424 }
425 else
426#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200427 mbedtls_printf("key type not supported yet\n");
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000428 }
429 else
430 goto usage;
431
432 if( opt.output_mode == OUTPUT_MODE_PUBLIC )
433 {
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200434 write_public_key( &key, opt.output_file );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000435 }
436 if( opt.output_mode == OUTPUT_MODE_PRIVATE )
437 {
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200438 write_private_key( &key, opt.output_file );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000439 }
440
Andres Amaya Garciaed684882018-04-29 20:07:30 +0100441 exit_code = MBEDTLS_EXIT_SUCCESS;
442
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000443exit:
444
Andres Amaya Garciaed684882018-04-29 20:07:30 +0100445 if( exit_code != MBEDTLS_EXIT_SUCCESS )
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200446 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200447#ifdef MBEDTLS_ERROR_C
448 mbedtls_strerror( ret, buf, sizeof( buf ) );
449 mbedtls_printf( " - %s\n", buf );
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200450#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200451 mbedtls_printf("\n");
Manuel Pégourié-Gonnard26b4d452013-09-12 06:56:06 +0200452#endif
453 }
454
Hanno Becker40371ec2017-08-23 06:46:17 +0100455 mbedtls_mpi_free( &N ); mbedtls_mpi_free( &P ); mbedtls_mpi_free( &Q );
456 mbedtls_mpi_free( &D ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &DP );
457 mbedtls_mpi_free( &DQ ); mbedtls_mpi_free( &QP );
458
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200459 mbedtls_pk_free( &key );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000460
461#if defined(_WIN32)
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200462 mbedtls_printf( " + Press Enter to exit this program.\n" );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000463 fflush( stdout ); getchar();
464#endif
465
Krzysztof Stachowiak3b0c4302019-04-24 14:24:46 +0200466 mbedtls_exit( exit_code );
Paul Bakkerbdb912d2012-02-13 23:11:30 +0000467}
Hanno Beckerb14c3312018-10-16 13:45:22 +0100468#endif /* MBEDTLS_PK_PARSE_C && MBEDTLS_PK_WRITE_C && MBEDTLS_FS_IO */