]>
Commit | Line | Data |
---|---|---|
d1e348cf A |
1 | /* $NetBSD: plainrsa-gen.c,v 1.4 2006/09/09 16:22:10 manu Exp $ */ |
2 | ||
3 | /* Id: plainrsa-gen.c,v 1.6 2005/04/21 09:08:40 monas Exp */ | |
52b7d2ce A |
4 | /* |
5 | * Copyright (C) 2004 SuSE Linux AG, Nuernberg, Germany. | |
6 | * Contributed by: Michal Ludvig <mludvig@suse.cz>, SUSE Labs | |
7 | * All rights reserved. | |
8 | * | |
9 | * Redistribution and use in source and binary forms, with or without | |
10 | * modification, are permitted provided that the following conditions | |
11 | * are met: | |
12 | * 1. Redistributions of source code must retain the above copyright | |
13 | * notice, this list of conditions and the following disclaimer. | |
14 | * 2. Redistributions in binary form must reproduce the above copyright | |
15 | * notice, this list of conditions and the following disclaimer in the | |
16 | * documentation and/or other materials provided with the distribution. | |
17 | * 3. Neither the name of the project nor the names of its contributors | |
18 | * may be used to endorse or promote products derived from this software | |
19 | * without specific prior written permission. | |
20 | * | |
21 | * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND | |
22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE | |
25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
31 | * SUCH DAMAGE. | |
32 | */ | |
33 | ||
34 | /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */ | |
35 | ||
36 | #include "config.h" | |
37 | ||
38 | #include <stdio.h> | |
39 | #include <string.h> | |
40 | #include <errno.h> | |
41 | ||
42 | #include <sys/types.h> | |
43 | #include <sys/stat.h> | |
44 | #include <sys/socket.h> | |
45 | #include <unistd.h> | |
46 | ||
47 | #include <openssl/bio.h> | |
48 | #include <openssl/bn.h> | |
49 | #include <openssl/err.h> | |
50 | #include <openssl/objects.h> | |
51 | #include <openssl/rsa.h> | |
52 | #include <openssl/evp.h> | |
53 | #ifdef HAVE_OPENSSL_ENGINE_H | |
54 | #include <openssl/engine.h> | |
55 | #endif | |
56 | ||
57 | #include "misc.h" | |
58 | #include "vmbuf.h" | |
59 | #include "plog.h" | |
60 | #include "crypto_openssl.h" | |
61 | ||
62 | //#include "package_version.h" | |
63 | ||
64 | int print_pid = 0; | |
65 | ||
66 | void | |
67 | usage (char *argv0) | |
68 | { | |
d1e348cf | 69 | // fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING); |
52b7d2ce A |
70 | fprintf(stderr, "By Michal Ludvig (http://www.logix.cz/michal)\n"); |
71 | fprintf(stderr, "\n"); | |
72 | fprintf(stderr, "Usage: %s [options]\n", argv0); | |
73 | fprintf(stderr, "\n"); | |
74 | fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n"); | |
75 | fprintf(stderr, " -e pubexp Public exponent to use (default=0x3)\n"); | |
76 | fprintf(stderr, " -f filename Filename to store the key to (default=stdout)\n"); | |
77 | fprintf(stderr, " -h Help\n"); | |
78 | fprintf(stderr, "\n"); | |
79 | fprintf(stderr, "Report bugs to <ipsec-tools-devel@lists.sourceforge.net>\n"); | |
80 | exit(1); | |
81 | } | |
82 | ||
83 | /* | |
84 | * See RFC 2065, section 3.5 for details about the output format. | |
85 | */ | |
86 | vchar_t * | |
87 | mix_b64_pubkey(RSA *key) | |
88 | { | |
89 | char *binbuf; | |
90 | long binlen, ret; | |
91 | vchar_t *res; | |
92 | ||
93 | binlen = 1 + BN_num_bytes(key->e) + BN_num_bytes(key->n); | |
94 | binbuf = malloc(binlen); | |
95 | memset(binbuf, 0, binlen); | |
96 | binbuf[0] = BN_bn2bin(key->e, (unsigned char *) &binbuf[1]); | |
97 | ret = BN_bn2bin(key->n, (unsigned char *) (&binbuf[binbuf[0] + 1])); | |
98 | if (1 + binbuf[0] + ret != binlen) { | |
99 | plog(LLV_ERROR, LOCATION, NULL, | |
100 | "Pubkey generation failed. This is really strange...\n"); | |
101 | return NULL; | |
102 | } | |
103 | ||
104 | return base64_encode(binbuf, binlen); | |
105 | } | |
106 | ||
107 | char * | |
108 | lowercase(char *input) | |
109 | { | |
110 | char *ptr = input; | |
111 | while (*ptr) { | |
112 | if (*ptr >= 'A' && *ptr <= 'F') | |
113 | *ptr -= 'A' - 'a'; | |
114 | *ptr++; | |
115 | } | |
116 | ||
117 | return input; | |
118 | } | |
119 | ||
120 | int | |
121 | gen_rsa_key(FILE *fp, size_t bits, unsigned long exp) | |
122 | { | |
123 | RSA *key; | |
124 | vchar_t *pubkey64 = NULL; | |
125 | ||
126 | key = RSA_generate_key(bits, exp, NULL, NULL); | |
127 | if (!key) { | |
128 | fprintf(stderr, "RSA_generate_key(): %s\n", eay_strerror()); | |
129 | return -1; | |
130 | } | |
131 | ||
132 | pubkey64 = mix_b64_pubkey(key); | |
133 | if (!pubkey64) { | |
134 | fprintf(stderr, "mix_b64_pubkey(): %s\n", eay_strerror()); | |
135 | return -1; | |
136 | } | |
137 | ||
138 | fprintf(fp, "# : PUB 0s%s\n", pubkey64->v); | |
139 | fprintf(fp, ": RSA\t{\n"); | |
140 | fprintf(fp, "\t# RSA %zu bits\n", bits); | |
141 | fprintf(fp, "\t# pubkey=0s%s\n", pubkey64->v); | |
142 | fprintf(fp, "\tModulus: 0x%s\n", lowercase(BN_bn2hex(key->n))); | |
143 | fprintf(fp, "\tPublicExponent: 0x%s\n", lowercase(BN_bn2hex(key->e))); | |
144 | fprintf(fp, "\tPrivateExponent: 0x%s\n", lowercase(BN_bn2hex(key->d))); | |
145 | fprintf(fp, "\tPrime1: 0x%s\n", lowercase(BN_bn2hex(key->p))); | |
146 | fprintf(fp, "\tPrime2: 0x%s\n", lowercase(BN_bn2hex(key->q))); | |
147 | fprintf(fp, "\tExponent1: 0x%s\n", lowercase(BN_bn2hex(key->dmp1))); | |
148 | fprintf(fp, "\tExponent2: 0x%s\n", lowercase(BN_bn2hex(key->dmq1))); | |
149 | fprintf(fp, "\tCoefficient: 0x%s\n", lowercase(BN_bn2hex(key->iqmp))); | |
150 | fprintf(fp, " }\n"); | |
151 | ||
152 | vfree(pubkey64); | |
153 | ||
154 | return 0; | |
155 | } | |
156 | ||
157 | int | |
158 | main (int argc, char *argv[]) | |
159 | { | |
160 | FILE *fp = stdout; | |
161 | size_t bits = 1024; | |
162 | unsigned int pubexp = 0x3; | |
163 | struct stat st; | |
164 | extern char *optarg; | |
165 | extern int optind; | |
166 | int c; | |
167 | char *fname = NULL; | |
168 | ||
169 | while ((c = getopt(argc, argv, "e:b:f:h")) != -1) | |
170 | switch (c) { | |
171 | case 'e': | |
172 | if (strncmp(optarg, "0x", 2) == 0) | |
173 | sscanf(optarg, "0x%x", &pubexp); | |
174 | else | |
175 | pubexp = atoi(optarg); | |
176 | break; | |
177 | case 'b': | |
178 | bits = atoi(optarg); | |
179 | break; | |
180 | case 'f': | |
181 | fname = optarg; | |
182 | break; | |
183 | case 'h': | |
184 | default: | |
185 | usage(argv[0]); | |
186 | } | |
187 | ||
188 | if (fname) { | |
189 | if (stat(fname, &st) >= 0) { | |
190 | fprintf(stderr, "%s: file exists! Please use a different name.\n", fname); | |
191 | exit(1); | |
192 | } | |
193 | ||
194 | umask(0077); | |
195 | fp = fopen(fname, "w"); | |
196 | if (fp == NULL) { | |
197 | fprintf(stderr, "%s: %s\n", fname, strerror(errno)); | |
198 | exit(1); | |
199 | } | |
200 | } | |
201 | ||
202 | ploginit(); | |
203 | eay_init(); | |
204 | ||
205 | gen_rsa_key(fp, bits, pubexp); | |
206 | ||
207 | fclose(fp); | |
208 | ||
209 | return 0; | |
210 | } |