dsaparam.c revision 296465
1/* apps/dsaparam.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
60/*
61 * Until the key-gen callbacks are modified to use newer prototypes, we allow
62 * deprecated functions for openssl-internal code
63 */
64#ifdef OPENSSL_NO_DEPRECATED
65# undef OPENSSL_NO_DEPRECATED
66#endif
67
68#ifndef OPENSSL_NO_DSA
69# include <assert.h>
70# include <stdio.h>
71# include <stdlib.h>
72# include <time.h>
73# include <string.h>
74# include "apps.h"
75# include <openssl/bio.h>
76# include <openssl/err.h>
77# include <openssl/bn.h>
78# include <openssl/dsa.h>
79# include <openssl/x509.h>
80# include <openssl/pem.h>
81
82# undef PROG
83# define PROG    dsaparam_main
84
85/*-
86 * -inform arg  - input format - default PEM (DER or PEM)
87 * -outform arg - output format - default PEM
88 * -in arg      - input file - default stdin
89 * -out arg     - output file - default stdout
90 * -noout
91 * -text
92 * -C
93 * -noout
94 * -genkey
95 *  #ifdef GENCB_TEST
96 * -timebomb n  - interrupt keygen after <n> seconds
97 *  #endif
98 */
99
100# ifdef GENCB_TEST
101
102static int stop_keygen_flag = 0;
103
104static void timebomb_sigalarm(int foo)
105{
106    stop_keygen_flag = 1;
107}
108
109# endif
110
111static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
112
113int MAIN(int, char **);
114
115int MAIN(int argc, char **argv)
116{
117    DSA *dsa = NULL;
118    int i, badops = 0, text = 0;
119    BIO *in = NULL, *out = NULL;
120    int informat, outformat, noout = 0, C = 0, ret = 1;
121    char *infile, *outfile, *prog, *inrand = NULL;
122    int numbits = -1, num, genkey = 0;
123    int need_rand = 0;
124# ifndef OPENSSL_NO_ENGINE
125    char *engine = NULL;
126# endif
127# ifdef GENCB_TEST
128    int timebomb = 0;
129# endif
130
131    apps_startup();
132
133    if (bio_err == NULL)
134        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
135            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
136
137    if (!load_config(bio_err, NULL))
138        goto end;
139
140    infile = NULL;
141    outfile = NULL;
142    informat = FORMAT_PEM;
143    outformat = FORMAT_PEM;
144
145    prog = argv[0];
146    argc--;
147    argv++;
148    while (argc >= 1) {
149        if (strcmp(*argv, "-inform") == 0) {
150            if (--argc < 1)
151                goto bad;
152            informat = str2fmt(*(++argv));
153        } else if (strcmp(*argv, "-outform") == 0) {
154            if (--argc < 1)
155                goto bad;
156            outformat = str2fmt(*(++argv));
157        } else if (strcmp(*argv, "-in") == 0) {
158            if (--argc < 1)
159                goto bad;
160            infile = *(++argv);
161        } else if (strcmp(*argv, "-out") == 0) {
162            if (--argc < 1)
163                goto bad;
164            outfile = *(++argv);
165        }
166# ifndef OPENSSL_NO_ENGINE
167        else if (strcmp(*argv, "-engine") == 0) {
168            if (--argc < 1)
169                goto bad;
170            engine = *(++argv);
171        }
172# endif
173# ifdef GENCB_TEST
174        else if (strcmp(*argv, "-timebomb") == 0) {
175            if (--argc < 1)
176                goto bad;
177            timebomb = atoi(*(++argv));
178        }
179# endif
180        else if (strcmp(*argv, "-text") == 0)
181            text = 1;
182        else if (strcmp(*argv, "-C") == 0)
183            C = 1;
184        else if (strcmp(*argv, "-genkey") == 0) {
185            genkey = 1;
186            need_rand = 1;
187        } else if (strcmp(*argv, "-rand") == 0) {
188            if (--argc < 1)
189                goto bad;
190            inrand = *(++argv);
191            need_rand = 1;
192        } else if (strcmp(*argv, "-noout") == 0)
193            noout = 1;
194        else if (sscanf(*argv, "%d", &num) == 1) {
195            /* generate a key */
196            numbits = num;
197            need_rand = 1;
198        } else {
199            BIO_printf(bio_err, "unknown option %s\n", *argv);
200            badops = 1;
201            break;
202        }
203        argc--;
204        argv++;
205    }
206
207    if (badops) {
208 bad:
209        BIO_printf(bio_err, "%s [options] [bits] <infile >outfile\n", prog);
210        BIO_printf(bio_err, "where options are\n");
211        BIO_printf(bio_err, " -inform arg   input format - DER or PEM\n");
212        BIO_printf(bio_err, " -outform arg  output format - DER or PEM\n");
213        BIO_printf(bio_err, " -in arg       input file\n");
214        BIO_printf(bio_err, " -out arg      output file\n");
215        BIO_printf(bio_err, " -text         print as text\n");
216        BIO_printf(bio_err, " -C            Output C code\n");
217        BIO_printf(bio_err, " -noout        no output\n");
218        BIO_printf(bio_err, " -genkey       generate a DSA key\n");
219        BIO_printf(bio_err,
220                   " -rand         files to use for random number input\n");
221# ifndef OPENSSL_NO_ENGINE
222        BIO_printf(bio_err,
223                   " -engine e     use engine e, possibly a hardware device.\n");
224# endif
225# ifdef GENCB_TEST
226        BIO_printf(bio_err,
227                   " -timebomb n   interrupt keygen after <n> seconds\n");
228# endif
229        BIO_printf(bio_err,
230                   " number        number of bits to use for generating private key\n");
231        goto end;
232    }
233
234    ERR_load_crypto_strings();
235
236    in = BIO_new(BIO_s_file());
237    out = BIO_new(BIO_s_file());
238    if ((in == NULL) || (out == NULL)) {
239        ERR_print_errors(bio_err);
240        goto end;
241    }
242
243    if (infile == NULL)
244        BIO_set_fp(in, stdin, BIO_NOCLOSE);
245    else {
246        if (BIO_read_filename(in, infile) <= 0) {
247            perror(infile);
248            goto end;
249        }
250    }
251    if (outfile == NULL) {
252        BIO_set_fp(out, stdout, BIO_NOCLOSE);
253# ifdef OPENSSL_SYS_VMS
254        {
255            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
256            out = BIO_push(tmpbio, out);
257        }
258# endif
259    } else {
260        if (BIO_write_filename(out, outfile) <= 0) {
261            perror(outfile);
262            goto end;
263        }
264    }
265
266# ifndef OPENSSL_NO_ENGINE
267    setup_engine(bio_err, engine, 0);
268# endif
269
270    if (need_rand) {
271        app_RAND_load_file(NULL, bio_err, (inrand != NULL));
272        if (inrand != NULL)
273            BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
274                       app_RAND_load_files(inrand));
275    }
276
277    if (numbits > 0) {
278        BN_GENCB cb;
279        BN_GENCB_set(&cb, dsa_cb, bio_err);
280        assert(need_rand);
281        dsa = DSA_new();
282        if (!dsa) {
283            BIO_printf(bio_err, "Error allocating DSA object\n");
284            goto end;
285        }
286        BIO_printf(bio_err, "Generating DSA parameters, %d bit long prime\n",
287                   num);
288        BIO_printf(bio_err, "This could take some time\n");
289# ifdef GENCB_TEST
290        if (timebomb > 0) {
291            struct sigaction act;
292            act.sa_handler = timebomb_sigalarm;
293            act.sa_flags = 0;
294            BIO_printf(bio_err,
295                       "(though I'll stop it if not done within %d secs)\n",
296                       timebomb);
297            if (sigaction(SIGALRM, &act, NULL) != 0) {
298                BIO_printf(bio_err, "Error, couldn't set SIGALRM handler\n");
299                goto end;
300            }
301            alarm(timebomb);
302        }
303# endif
304        if (!DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, &cb)) {
305# ifdef GENCB_TEST
306            if (stop_keygen_flag) {
307                BIO_printf(bio_err, "DSA key generation time-stopped\n");
308                /* This is an asked-for behaviour! */
309                ret = 0;
310                goto end;
311            }
312# endif
313            BIO_printf(bio_err, "Error, DSA key generation failed\n");
314            goto end;
315        }
316    } else if (informat == FORMAT_ASN1)
317        dsa = d2i_DSAparams_bio(in, NULL);
318    else if (informat == FORMAT_PEM)
319        dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
320    else {
321        BIO_printf(bio_err, "bad input format specified\n");
322        goto end;
323    }
324    if (dsa == NULL) {
325        BIO_printf(bio_err, "unable to load DSA parameters\n");
326        ERR_print_errors(bio_err);
327        goto end;
328    }
329
330    if (text) {
331        DSAparams_print(out, dsa);
332    }
333
334    if (C) {
335        unsigned char *data;
336        int l, len, bits_p;
337
338        len = BN_num_bytes(dsa->p);
339        bits_p = BN_num_bits(dsa->p);
340        data = (unsigned char *)OPENSSL_malloc(len + 20);
341        if (data == NULL) {
342            perror("OPENSSL_malloc");
343            goto end;
344        }
345        l = BN_bn2bin(dsa->p, data);
346        printf("static unsigned char dsa%d_p[]={", bits_p);
347        for (i = 0; i < l; i++) {
348            if ((i % 12) == 0)
349                printf("\n\t");
350            printf("0x%02X,", data[i]);
351        }
352        printf("\n\t};\n");
353
354        l = BN_bn2bin(dsa->q, data);
355        printf("static unsigned char dsa%d_q[]={", bits_p);
356        for (i = 0; i < l; i++) {
357            if ((i % 12) == 0)
358                printf("\n\t");
359            printf("0x%02X,", data[i]);
360        }
361        printf("\n\t};\n");
362
363        l = BN_bn2bin(dsa->g, data);
364        printf("static unsigned char dsa%d_g[]={", bits_p);
365        for (i = 0; i < l; i++) {
366            if ((i % 12) == 0)
367                printf("\n\t");
368            printf("0x%02X,", data[i]);
369        }
370        printf("\n\t};\n\n");
371
372        printf("DSA *get_dsa%d()\n\t{\n", bits_p);
373        printf("\tDSA *dsa;\n\n");
374        printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
375        printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
376               bits_p, bits_p);
377        printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
378               bits_p, bits_p);
379        printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
380               bits_p, bits_p);
381        printf
382            ("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
383        printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
384        printf("\treturn(dsa);\n\t}\n");
385    }
386
387    if (!noout) {
388        if (outformat == FORMAT_ASN1)
389            i = i2d_DSAparams_bio(out, dsa);
390        else if (outformat == FORMAT_PEM)
391            i = PEM_write_bio_DSAparams(out, dsa);
392        else {
393            BIO_printf(bio_err, "bad output format specified for outfile\n");
394            goto end;
395        }
396        if (!i) {
397            BIO_printf(bio_err, "unable to write DSA parameters\n");
398            ERR_print_errors(bio_err);
399            goto end;
400        }
401    }
402    if (genkey) {
403        DSA *dsakey;
404
405        assert(need_rand);
406        if ((dsakey = DSAparams_dup(dsa)) == NULL)
407            goto end;
408        if (!DSA_generate_key(dsakey))
409            goto end;
410        if (outformat == FORMAT_ASN1)
411            i = i2d_DSAPrivateKey_bio(out, dsakey);
412        else if (outformat == FORMAT_PEM)
413            i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL,
414                                            NULL);
415        else {
416            BIO_printf(bio_err, "bad output format specified for outfile\n");
417            goto end;
418        }
419        DSA_free(dsakey);
420    }
421    if (need_rand)
422        app_RAND_write_file(NULL, bio_err);
423    ret = 0;
424 end:
425    if (in != NULL)
426        BIO_free(in);
427    if (out != NULL)
428        BIO_free_all(out);
429    if (dsa != NULL)
430        DSA_free(dsa);
431    apps_shutdown();
432    OPENSSL_EXIT(ret);
433}
434
435static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
436{
437    char c = '*';
438
439    if (p == 0)
440        c = '.';
441    if (p == 1)
442        c = '+';
443    if (p == 2)
444        c = '*';
445    if (p == 3)
446        c = '\n';
447    BIO_write(cb->arg, &c, 1);
448    (void)BIO_flush(cb->arg);
449# ifdef LINT
450    p = n;
451# endif
452# ifdef GENCB_TEST
453    if (stop_keygen_flag)
454        return 0;
455# endif
456    return 1;
457}
458#else                           /* !OPENSSL_NO_DSA */
459
460# if PEDANTIC
461static void *dummy = &dummy;
462# endif
463
464#endif
465