dsaparam.c revision 312826
1/* apps/dsaparam.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
60/*
61 * Until the key-gen callbacks are modified to use newer prototypes, we allow
62 * deprecated functions for openssl-internal code
63 */
64#ifdef OPENSSL_NO_DEPRECATED
65# undef OPENSSL_NO_DEPRECATED
66#endif
67
68#ifndef OPENSSL_NO_DSA
69# include <assert.h>
70# include <stdio.h>
71# include <stdlib.h>
72# include <time.h>
73# include <string.h>
74# include "apps.h"
75# include <openssl/bio.h>
76# include <openssl/err.h>
77# include <openssl/bn.h>
78# include <openssl/dsa.h>
79# include <openssl/x509.h>
80# include <openssl/pem.h>
81
82# undef PROG
83# define PROG    dsaparam_main
84
85/*-
86 * -inform arg  - input format - default PEM (DER or PEM)
87 * -outform arg - output format - default PEM
88 * -in arg      - input file - default stdin
89 * -out arg     - output file - default stdout
90 * -noout
91 * -text
92 * -C
93 * -noout
94 * -genkey
95 *  #ifdef GENCB_TEST
96 * -timebomb n  - interrupt keygen after <n> seconds
97 *  #endif
98 */
99
100# ifdef GENCB_TEST
101
102static int stop_keygen_flag = 0;
103
104static void timebomb_sigalarm(int foo)
105{
106    stop_keygen_flag = 1;
107}
108
109# endif
110
111static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
112
113int MAIN(int, char **);
114
115int MAIN(int argc, char **argv)
116{
117    DSA *dsa = NULL;
118    int i, badops = 0, text = 0;
119    BIO *in = NULL, *out = NULL;
120    int informat, outformat, noout = 0, C = 0, ret = 1;
121    char *infile, *outfile, *prog, *inrand = NULL;
122    int numbits = -1, num, genkey = 0;
123    int need_rand = 0;
124    char *engine = NULL;
125    ENGINE *e = NULL;
126# ifdef GENCB_TEST
127    int timebomb = 0;
128# endif
129
130    apps_startup();
131
132    if (bio_err == NULL)
133        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
134            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
135
136    if (!load_config(bio_err, NULL))
137        goto end;
138
139    infile = NULL;
140    outfile = NULL;
141    informat = FORMAT_PEM;
142    outformat = FORMAT_PEM;
143
144    prog = argv[0];
145    argc--;
146    argv++;
147    while (argc >= 1) {
148        if (strcmp(*argv, "-inform") == 0) {
149            if (--argc < 1)
150                goto bad;
151            informat = str2fmt(*(++argv));
152        } else if (strcmp(*argv, "-outform") == 0) {
153            if (--argc < 1)
154                goto bad;
155            outformat = str2fmt(*(++argv));
156        } else if (strcmp(*argv, "-in") == 0) {
157            if (--argc < 1)
158                goto bad;
159            infile = *(++argv);
160        } else if (strcmp(*argv, "-out") == 0) {
161            if (--argc < 1)
162                goto bad;
163            outfile = *(++argv);
164        }
165# ifndef OPENSSL_NO_ENGINE
166        else if (strcmp(*argv, "-engine") == 0) {
167            if (--argc < 1)
168                goto bad;
169            engine = *(++argv);
170        }
171# endif
172# ifdef GENCB_TEST
173        else if (strcmp(*argv, "-timebomb") == 0) {
174            if (--argc < 1)
175                goto bad;
176            timebomb = atoi(*(++argv));
177        }
178# endif
179        else if (strcmp(*argv, "-text") == 0)
180            text = 1;
181        else if (strcmp(*argv, "-C") == 0)
182            C = 1;
183        else if (strcmp(*argv, "-genkey") == 0) {
184            genkey = 1;
185            need_rand = 1;
186        } else if (strcmp(*argv, "-rand") == 0) {
187            if (--argc < 1)
188                goto bad;
189            inrand = *(++argv);
190            need_rand = 1;
191        } else if (strcmp(*argv, "-noout") == 0)
192            noout = 1;
193        else if (sscanf(*argv, "%d", &num) == 1) {
194            /* generate a key */
195            numbits = num;
196            need_rand = 1;
197        } else {
198            BIO_printf(bio_err, "unknown option %s\n", *argv);
199            badops = 1;
200            break;
201        }
202        argc--;
203        argv++;
204    }
205
206    if (badops) {
207 bad:
208        BIO_printf(bio_err, "%s [options] [bits] <infile >outfile\n", prog);
209        BIO_printf(bio_err, "where options are\n");
210        BIO_printf(bio_err, " -inform arg   input format - DER or PEM\n");
211        BIO_printf(bio_err, " -outform arg  output format - DER or PEM\n");
212        BIO_printf(bio_err, " -in arg       input file\n");
213        BIO_printf(bio_err, " -out arg      output file\n");
214        BIO_printf(bio_err, " -text         print as text\n");
215        BIO_printf(bio_err, " -C            Output C code\n");
216        BIO_printf(bio_err, " -noout        no output\n");
217        BIO_printf(bio_err, " -genkey       generate a DSA key\n");
218        BIO_printf(bio_err,
219                   " -rand         files to use for random number input\n");
220# ifndef OPENSSL_NO_ENGINE
221        BIO_printf(bio_err,
222                   " -engine e     use engine e, possibly a hardware device.\n");
223# endif
224# ifdef GENCB_TEST
225        BIO_printf(bio_err,
226                   " -timebomb n   interrupt keygen after <n> seconds\n");
227# endif
228        BIO_printf(bio_err,
229                   " number        number of bits to use for generating private key\n");
230        goto end;
231    }
232
233    ERR_load_crypto_strings();
234
235    in = BIO_new(BIO_s_file());
236    out = BIO_new(BIO_s_file());
237    if ((in == NULL) || (out == NULL)) {
238        ERR_print_errors(bio_err);
239        goto end;
240    }
241
242    if (infile == NULL)
243        BIO_set_fp(in, stdin, BIO_NOCLOSE);
244    else {
245        if (BIO_read_filename(in, infile) <= 0) {
246            perror(infile);
247            goto end;
248        }
249    }
250    if (outfile == NULL) {
251        BIO_set_fp(out, stdout, BIO_NOCLOSE);
252# ifdef OPENSSL_SYS_VMS
253        {
254            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
255            out = BIO_push(tmpbio, out);
256        }
257# endif
258    } else {
259        if (BIO_write_filename(out, outfile) <= 0) {
260            perror(outfile);
261            goto end;
262        }
263    }
264
265    e = setup_engine(bio_err, engine, 0);
266
267    if (need_rand) {
268        app_RAND_load_file(NULL, bio_err, (inrand != NULL));
269        if (inrand != NULL)
270            BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
271                       app_RAND_load_files(inrand));
272    }
273
274    if (numbits > 0) {
275        BN_GENCB cb;
276        BN_GENCB_set(&cb, dsa_cb, bio_err);
277        assert(need_rand);
278        dsa = DSA_new();
279        if (!dsa) {
280            BIO_printf(bio_err, "Error allocating DSA object\n");
281            goto end;
282        }
283        BIO_printf(bio_err, "Generating DSA parameters, %d bit long prime\n",
284                   num);
285        BIO_printf(bio_err, "This could take some time\n");
286# ifdef GENCB_TEST
287        if (timebomb > 0) {
288            struct sigaction act;
289            act.sa_handler = timebomb_sigalarm;
290            act.sa_flags = 0;
291            BIO_printf(bio_err,
292                       "(though I'll stop it if not done within %d secs)\n",
293                       timebomb);
294            if (sigaction(SIGALRM, &act, NULL) != 0) {
295                BIO_printf(bio_err, "Error, couldn't set SIGALRM handler\n");
296                goto end;
297            }
298            alarm(timebomb);
299        }
300# endif
301        if (!DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, &cb)) {
302# ifdef GENCB_TEST
303            if (stop_keygen_flag) {
304                BIO_printf(bio_err, "DSA key generation time-stopped\n");
305                /* This is an asked-for behaviour! */
306                ret = 0;
307                goto end;
308            }
309# endif
310            ERR_print_errors(bio_err);
311            BIO_printf(bio_err, "Error, DSA key generation failed\n");
312            goto end;
313        }
314    } else if (informat == FORMAT_ASN1)
315        dsa = d2i_DSAparams_bio(in, NULL);
316    else if (informat == FORMAT_PEM)
317        dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
318    else {
319        BIO_printf(bio_err, "bad input format specified\n");
320        goto end;
321    }
322    if (dsa == NULL) {
323        BIO_printf(bio_err, "unable to load DSA parameters\n");
324        ERR_print_errors(bio_err);
325        goto end;
326    }
327
328    if (text) {
329        DSAparams_print(out, dsa);
330    }
331
332    if (C) {
333        unsigned char *data;
334        int l, len, bits_p;
335
336        len = BN_num_bytes(dsa->p);
337        bits_p = BN_num_bits(dsa->p);
338        data = (unsigned char *)OPENSSL_malloc(len + 20);
339        if (data == NULL) {
340            perror("OPENSSL_malloc");
341            goto end;
342        }
343        l = BN_bn2bin(dsa->p, data);
344        printf("static unsigned char dsa%d_p[]={", bits_p);
345        for (i = 0; i < l; i++) {
346            if ((i % 12) == 0)
347                printf("\n\t");
348            printf("0x%02X,", data[i]);
349        }
350        printf("\n\t};\n");
351
352        l = BN_bn2bin(dsa->q, data);
353        printf("static unsigned char dsa%d_q[]={", bits_p);
354        for (i = 0; i < l; i++) {
355            if ((i % 12) == 0)
356                printf("\n\t");
357            printf("0x%02X,", data[i]);
358        }
359        printf("\n\t};\n");
360
361        l = BN_bn2bin(dsa->g, data);
362        printf("static unsigned char dsa%d_g[]={", bits_p);
363        for (i = 0; i < l; i++) {
364            if ((i % 12) == 0)
365                printf("\n\t");
366            printf("0x%02X,", data[i]);
367        }
368        printf("\n\t};\n\n");
369
370        printf("DSA *get_dsa%d()\n\t{\n", bits_p);
371        printf("\tDSA *dsa;\n\n");
372        printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
373        printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
374               bits_p, bits_p);
375        printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
376               bits_p, bits_p);
377        printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
378               bits_p, bits_p);
379        printf
380            ("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
381        printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
382        printf("\treturn(dsa);\n\t}\n");
383    }
384
385    if (!noout) {
386        if (outformat == FORMAT_ASN1)
387            i = i2d_DSAparams_bio(out, dsa);
388        else if (outformat == FORMAT_PEM)
389            i = PEM_write_bio_DSAparams(out, dsa);
390        else {
391            BIO_printf(bio_err, "bad output format specified for outfile\n");
392            goto end;
393        }
394        if (!i) {
395            BIO_printf(bio_err, "unable to write DSA parameters\n");
396            ERR_print_errors(bio_err);
397            goto end;
398        }
399    }
400    if (genkey) {
401        DSA *dsakey;
402
403        assert(need_rand);
404        if ((dsakey = DSAparams_dup(dsa)) == NULL)
405            goto end;
406        if (!DSA_generate_key(dsakey)) {
407            ERR_print_errors(bio_err);
408            DSA_free(dsakey);
409            goto end;
410        }
411        if (outformat == FORMAT_ASN1)
412            i = i2d_DSAPrivateKey_bio(out, dsakey);
413        else if (outformat == FORMAT_PEM)
414            i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL,
415                                            NULL);
416        else {
417            BIO_printf(bio_err, "bad output format specified for outfile\n");
418            DSA_free(dsakey);
419            goto end;
420        }
421        DSA_free(dsakey);
422    }
423    if (need_rand)
424        app_RAND_write_file(NULL, bio_err);
425    ret = 0;
426 end:
427    if (in != NULL)
428        BIO_free(in);
429    if (out != NULL)
430        BIO_free_all(out);
431    if (dsa != NULL)
432        DSA_free(dsa);
433    release_engine(e);
434    apps_shutdown();
435    OPENSSL_EXIT(ret);
436}
437
438static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
439{
440    char c = '*';
441
442    if (p == 0)
443        c = '.';
444    if (p == 1)
445        c = '+';
446    if (p == 2)
447        c = '*';
448    if (p == 3)
449        c = '\n';
450    BIO_write(cb->arg, &c, 1);
451    (void)BIO_flush(cb->arg);
452# ifdef LINT
453    p = n;
454# endif
455# ifdef GENCB_TEST
456    if (stop_keygen_flag)
457        return 0;
458# endif
459    return 1;
460}
461#else                           /* !OPENSSL_NO_DSA */
462
463# if PEDANTIC
464static void *dummy = &dummy;
465# endif
466
467#endif
468