Deleted Added
full compact
rsautl.c (109998) rsautl.c (111147)
1/* rsautl.c */
2/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3 * project 2000.
4 */
5/* ====================================================================
6 * Copyright (c) 2000 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without

--- 71 unchanged lines hidden (view full) ---

80
81int MAIN(int argc, char **);
82
83int MAIN(int argc, char **argv)
84{
85 ENGINE *e = NULL;
86 BIO *in = NULL, *out = NULL;
87 char *infile = NULL, *outfile = NULL;
1/* rsautl.c */
2/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3 * project 2000.
4 */
5/* ====================================================================
6 * Copyright (c) 2000 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without

--- 71 unchanged lines hidden (view full) ---

80
81int MAIN(int argc, char **);
82
83int MAIN(int argc, char **argv)
84{
85 ENGINE *e = NULL;
86 BIO *in = NULL, *out = NULL;
87 char *infile = NULL, *outfile = NULL;
88#ifndef OPENSSL_NO_ENGINE
88 char *engine = NULL;
89 char *engine = NULL;
90#endif
89 char *keyfile = NULL;
90 char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
91 int keyform = FORMAT_PEM;
92 char need_priv = 0, badarg = 0, rev = 0;
93 char hexdump = 0, asn1parse = 0;
94 X509 *x;
95 EVP_PKEY *pkey = NULL;
96 RSA *rsa = NULL;

--- 23 unchanged lines hidden (view full) ---

120 if (--argc < 1) badarg = 1;
121 outfile= *(++argv);
122 } else if(!strcmp(*argv, "-inkey")) {
123 if (--argc < 1) badarg = 1;
124 keyfile = *(++argv);
125 } else if (strcmp(*argv,"-keyform") == 0) {
126 if (--argc < 1) badarg = 1;
127 keyform=str2fmt(*(++argv));
91 char *keyfile = NULL;
92 char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
93 int keyform = FORMAT_PEM;
94 char need_priv = 0, badarg = 0, rev = 0;
95 char hexdump = 0, asn1parse = 0;
96 X509 *x;
97 EVP_PKEY *pkey = NULL;
98 RSA *rsa = NULL;

--- 23 unchanged lines hidden (view full) ---

122 if (--argc < 1) badarg = 1;
123 outfile= *(++argv);
124 } else if(!strcmp(*argv, "-inkey")) {
125 if (--argc < 1) badarg = 1;
126 keyfile = *(++argv);
127 } else if (strcmp(*argv,"-keyform") == 0) {
128 if (--argc < 1) badarg = 1;
129 keyform=str2fmt(*(++argv));
130#ifndef OPENSSL_NO_ENGINE
128 } else if(!strcmp(*argv, "-engine")) {
129 if (--argc < 1) badarg = 1;
130 engine = *(++argv);
131 } else if(!strcmp(*argv, "-engine")) {
132 if (--argc < 1) badarg = 1;
133 engine = *(++argv);
134#endif
131 } else if(!strcmp(*argv, "-pubin")) {
132 key_type = KEY_PUBKEY;
133 } else if(!strcmp(*argv, "-certin")) {
134 key_type = KEY_CERT;
135 }
136 else if(!strcmp(*argv, "-asn1parse")) asn1parse = 1;
137 else if(!strcmp(*argv, "-hexdump")) hexdump = 1;
138 else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING;

--- 18 unchanged lines hidden (view full) ---

157 argv++;
158 }
159
160 if(need_priv && (key_type != KEY_PRIVKEY)) {
161 BIO_printf(bio_err, "A private key is needed for this operation\n");
162 goto end;
163 }
164
135 } else if(!strcmp(*argv, "-pubin")) {
136 key_type = KEY_PUBKEY;
137 } else if(!strcmp(*argv, "-certin")) {
138 key_type = KEY_CERT;
139 }
140 else if(!strcmp(*argv, "-asn1parse")) asn1parse = 1;
141 else if(!strcmp(*argv, "-hexdump")) hexdump = 1;
142 else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING;

--- 18 unchanged lines hidden (view full) ---

161 argv++;
162 }
163
164 if(need_priv && (key_type != KEY_PRIVKEY)) {
165 BIO_printf(bio_err, "A private key is needed for this operation\n");
166 goto end;
167 }
168
169#ifndef OPENSSL_NO_ENGINE
165 e = setup_engine(bio_err, engine, 0);
170 e = setup_engine(bio_err, engine, 0);
171#endif
166
167/* FIXME: seed PRNG only if needed */
168 app_RAND_load_file(NULL, bio_err, 0);
169
170 switch(key_type) {
171 case KEY_PRIVKEY:
172 pkey = load_key(bio_err, keyfile, keyform, 0,
173 NULL, e, "Private Key");

--- 126 unchanged lines hidden (view full) ---

300 BIO_printf(bio_err, "-raw use no padding\n");
301 BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
302 BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
303 BIO_printf(bio_err, "-sign sign with private key\n");
304 BIO_printf(bio_err, "-verify verify with public key\n");
305 BIO_printf(bio_err, "-encrypt encrypt with public key\n");
306 BIO_printf(bio_err, "-decrypt decrypt with private key\n");
307 BIO_printf(bio_err, "-hexdump hex dump output\n");
172
173/* FIXME: seed PRNG only if needed */
174 app_RAND_load_file(NULL, bio_err, 0);
175
176 switch(key_type) {
177 case KEY_PRIVKEY:
178 pkey = load_key(bio_err, keyfile, keyform, 0,
179 NULL, e, "Private Key");

--- 126 unchanged lines hidden (view full) ---

306 BIO_printf(bio_err, "-raw use no padding\n");
307 BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
308 BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
309 BIO_printf(bio_err, "-sign sign with private key\n");
310 BIO_printf(bio_err, "-verify verify with public key\n");
311 BIO_printf(bio_err, "-encrypt encrypt with public key\n");
312 BIO_printf(bio_err, "-decrypt decrypt with private key\n");
313 BIO_printf(bio_err, "-hexdump hex dump output\n");
314#ifndef OPENSSL_NO_ENGINE
308 BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
315 BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
316#endif
309
310}
311
312#endif
317
318}
319
320#endif