Make tls1_check_chain return a set of flags indicating checks passed
[openssl.git] / apps / pkeyutl.c
index 5db0a362d17931c6e875884c9230a136d9178363..7eb3f5c544ddd0a3c0b59ee8c7be54559376c70c 100644 (file)
@@ -1,4 +1,4 @@
-/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
+/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
  * project 2006.
  */
 /* ====================================================================
@@ -74,27 +74,35 @@ static void usage(void);
 
 static EVP_PKEY_CTX *init_ctx(int *pkeysize,
                                char *keyfile, int keyform, int key_type,
-                               char *passargin, int pkey_op, char *engine);
+                               char *passargin, int pkey_op, ENGINE *e);
+
+static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
+                                                       const char *file);
+
+static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
+               unsigned char *out, size_t *poutlen,
+               unsigned char *in, size_t inlen);
 
 int MAIN(int argc, char **);
 
 int MAIN(int argc, char **argv)
 {
        BIO *in = NULL, *out = NULL;
-       char *infile = NULL, *outfile = NULL;
-       char *engine = NULL;
+       char *infile = NULL, *outfile = NULL, *sigfile = NULL;
+       ENGINE *e = NULL;
        int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
-       int keyform = FORMAT_PEM;
+       int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
        char badarg = 0, rev = 0;
        char hexdump = 0, asn1parse = 0;
        EVP_PKEY_CTX *ctx = NULL;
        char *passargin = NULL;
-       int keysize;
+       int keysize = -1;
 
-       unsigned char *buf_in = NULL, *buf_out = NULL;
-       int buf_inlen, buf_outlen;
+       unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
+       size_t buf_outlen;
+       int buf_inlen = 0, siglen = -1;
 
-       int ret = 1, rv;
+       int ret = 1, rv = -1;
 
        argc--;
        argv++;
@@ -111,12 +119,17 @@ int MAIN(int argc, char **argv)
                if (!strcmp(*argv,"-in"))
                        {
                        if (--argc < 1) badarg = 1;
-                        infile= *(++argv);
+                        else infile= *(++argv);
                        }
                else if (!strcmp(*argv,"-out"))
                        {
                        if (--argc < 1) badarg = 1;
-                       outfile= *(++argv);
+                       else outfile= *(++argv);
+                       }
+               else if (!strcmp(*argv,"-sigfile"))
+                       {
+                       if (--argc < 1) badarg = 1;
+                       else sigfile= *(++argv);
                        }
                else if(!strcmp(*argv, "-inkey"))
                        {
@@ -126,7 +139,7 @@ int MAIN(int argc, char **argv)
                                {
                                ctx = init_ctx(&keysize,
                                                *(++argv), keyform, key_type,
-                                               passargin, pkey_op, engine);
+                                               passargin, pkey_op, e);
                                if (!ctx)
                                        {
                                        BIO_puts(bio_err,
@@ -136,21 +149,35 @@ int MAIN(int argc, char **argv)
                                        }
                                }
                        }
+               else if (!strcmp(*argv,"-peerkey"))
+                       {
+                       if (--argc < 1)
+                               badarg = 1;
+                       else if (!setup_peer(bio_err, ctx, peerform, *(++argv)))
+                               badarg = 1;
+                       }
                else if (!strcmp(*argv,"-passin"))
                        {
                        if (--argc < 1) badarg = 1;
-                       passargin= *(++argv);
+                       else passargin= *(++argv);
+                       }
+               else if (strcmp(*argv,"-peerform") == 0)
+                       {
+                       if (--argc < 1) badarg = 1;
+                       else peerform=str2fmt(*(++argv));
                        }
                else if (strcmp(*argv,"-keyform") == 0)
                        {
                        if (--argc < 1) badarg = 1;
-                       keyform=str2fmt(*(++argv));
+                       else keyform=str2fmt(*(++argv));
                        }
 #ifndef OPENSSL_NO_ENGINE
                else if(!strcmp(*argv, "-engine"))
                        {
-                       if (--argc < 1) badarg = 1;
-                       engine = *(++argv);
+                       if (--argc < 1)
+                               badarg = 1;
+                       else
+                               e = setup_engine(bio_err, *(++argv), 0);
                        }
 #endif
                else if(!strcmp(*argv, "-pubin"))
@@ -163,6 +190,8 @@ int MAIN(int argc, char **argv)
                        hexdump = 1;
                else if(!strcmp(*argv, "-sign"))
                        pkey_op = EVP_PKEY_OP_SIGN;
+               else if(!strcmp(*argv, "-verify"))
+                       pkey_op = EVP_PKEY_OP_VERIFY;
                else if(!strcmp(*argv, "-verifyrecover"))
                        pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
                else if(!strcmp(*argv, "-rev"))
@@ -171,6 +200,25 @@ int MAIN(int argc, char **argv)
                        pkey_op = EVP_PKEY_OP_ENCRYPT;
                else if(!strcmp(*argv, "-decrypt"))
                        pkey_op = EVP_PKEY_OP_DECRYPT;
+               else if(!strcmp(*argv, "-derive"))
+                       pkey_op = EVP_PKEY_OP_DERIVE;
+               else if (strcmp(*argv,"-pkeyopt") == 0)
+                       {
+                       if (--argc < 1)
+                               badarg = 1;
+                       else if (!ctx)
+                               {
+                               BIO_puts(bio_err,
+                                       "-pkeyopt command before -inkey\n");
+                               badarg = 1;
+                               }
+                       else if (pkey_ctrl_string(ctx, *(++argv)) <= 0)
+                               {
+                               BIO_puts(bio_err, "parameter setting error\n");
+                               ERR_print_errors(bio_err);
+                               goto end;
+                               }
+                       }
                else badarg = 1;
                if(badarg)
                        {
@@ -187,24 +235,48 @@ int MAIN(int argc, char **argv)
                goto end;
                }
 
+       if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY))
+               {
+               BIO_puts(bio_err, "Signature file specified for non verify\n");
+               goto end;
+               }
+
+       if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY))
+               {
+               BIO_puts(bio_err, "No signature file specified for verify\n");
+               goto end;
+               }
+
 /* FIXME: seed PRNG only if needed */
        app_RAND_load_file(NULL, bio_err, 0);
 
-       if(infile) {
-               if(!(in = BIO_new_file(infile, "rb"))) {
-                       BIO_printf(bio_err, "Error Reading Input File\n");
-                       ERR_print_errors(bio_err);      
-                       goto end;
+       if (pkey_op != EVP_PKEY_OP_DERIVE)
+               {
+               if(infile)
+                       {
+                       if(!(in = BIO_new_file(infile, "rb")))
+                               {
+                               BIO_puts(bio_err,
+                                       "Error Opening Input File\n");
+                               ERR_print_errors(bio_err);      
+                               goto end;
+                               }
+                       }
+               else
+                       in = BIO_new_fp(stdin, BIO_NOCLOSE);
                }
-       } else in = BIO_new_fp(stdin, BIO_NOCLOSE);
 
-       if(outfile) {
-               if(!(out = BIO_new_file(outfile, "wb"))) {
-                       BIO_printf(bio_err, "Error Reading Output File\n");
+       if(outfile)
+               {
+               if(!(out = BIO_new_file(outfile, "wb")))
+                       {
+                       BIO_printf(bio_err, "Error Creating Output File\n");
                        ERR_print_errors(bio_err);      
                        goto end;
+                       }
                }
-       } else {
+       else
+               {
                out = BIO_new_fp(stdout, BIO_NOCLOSE);
 #ifdef OPENSSL_SYS_VMS
                {
@@ -214,68 +286,102 @@ int MAIN(int argc, char **argv)
 #endif
        }
 
-       buf_in = OPENSSL_malloc(keysize * 2);
-       buf_out = OPENSSL_malloc(keysize);
-
-       /* Read the input data */
-       buf_inlen = BIO_read(in, buf_in, keysize * 2);
-       if(buf_inlen <= 0) {
-               BIO_printf(bio_err, "Error reading input Data\n");
-               exit(1);
-       }
-       if(rev) {
-               int i;
-               unsigned char ctmp;
-               for(i = 0; i < buf_inlen/2; i++) {
-                       ctmp = buf_in[i];
-                       buf_in[i] = buf_in[buf_inlen - 1 - i];
-                       buf_in[buf_inlen - 1 - i] = ctmp;
+       if (sigfile)
+               {
+               BIO *sigbio = BIO_new_file(sigfile, "rb");
+               if (!sigbio)
+                       {
+                       BIO_printf(bio_err, "Can't open signature file %s\n",
+                                                               sigfile);
+                       goto end;
+                       }
+               siglen = bio_to_mem(&sig, keysize * 10, sigbio);
+               BIO_free(sigbio);
+               if (siglen <= 0)
+                       {
+                       BIO_printf(bio_err, "Error reading signature data\n");
+                       goto end;
+                       }
                }
-       }
-       switch(pkey_op)
+       
+       if (in)
                {
-               case EVP_PKEY_OP_VERIFYRECOVER:
-               rv  = EVP_PKEY_verify_recover(ctx, buf_out, &buf_outlen,
-                                                       buf_in, buf_inlen);
-               break;
-
-               case EVP_PKEY_OP_SIGN:
-               rv  = EVP_PKEY_sign(ctx, buf_out, &buf_outlen,
-                                                       buf_in, buf_inlen);
-               break;
-
-               case EVP_PKEY_OP_ENCRYPT:
-               rv  = EVP_PKEY_encrypt(ctx, buf_out, &buf_outlen,
-                                                       buf_in, buf_inlen);
-               break;
-
-               case EVP_PKEY_OP_DECRYPT:
-               rv  = EVP_PKEY_decrypt(ctx, buf_out, &buf_outlen,
-                                                       buf_in, buf_inlen);
-               break;
+               /* Read the input data */
+               buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
+               if(buf_inlen <= 0)
+                       {
+                       BIO_printf(bio_err, "Error reading input Data\n");
+                       exit(1);
+                       }
+               if(rev)
+                       {
+                       size_t i;
+                       unsigned char ctmp;
+                       size_t l = (size_t)buf_inlen;
+                       for(i = 0; i < l/2; i++)
+                               {
+                               ctmp = buf_in[i];
+                               buf_in[i] = buf_in[l - 1 - i];
+                               buf_in[l - 1 - i] = ctmp;
+                               }
+                       }
+               }
 
+       if(pkey_op == EVP_PKEY_OP_VERIFY)
+               {
+               rv  = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
+                                     buf_in, (size_t)buf_inlen);
+               if (rv == 0)
+                       BIO_puts(out, "Signature Verification Failure\n");
+               else if (rv == 1)
+                       BIO_puts(out, "Signature Verified Successfully\n");
+               if (rv >= 0)
+                       goto end;
+               }
+       else
+               {       
+               rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
+                             buf_in, (size_t)buf_inlen);
+               if (rv > 0)
+                       {
+                       buf_out = OPENSSL_malloc(buf_outlen);
+                       if (!buf_out)
+                               rv = -1;
+                       else
+                               rv = do_keyop(ctx, pkey_op,
+                                               buf_out, (size_t *)&buf_outlen,
+                                               buf_in, (size_t)buf_inlen);
+                       }
                }
 
-       if(rv <= 0) {
+       if(rv <= 0)
+               {
                BIO_printf(bio_err, "Public Key operation error\n");
                ERR_print_errors(bio_err);
                goto end;
-       }
+               }
        ret = 0;
-       if(asn1parse) {
-               if(!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1)) {
+       if(asn1parse)
+               {
+               if(!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
                        ERR_print_errors(bio_err);
                }
-       } else if(hexdump) BIO_dump(out, (char *)buf_out, buf_outlen);
-       else BIO_write(out, buf_out, buf_outlen);
+       else if(hexdump)
+               BIO_dump(out, (char *)buf_out, buf_outlen);
+       else
+               BIO_write(out, buf_out, buf_outlen);
 
        end:
        if (ctx)
                EVP_PKEY_CTX_free(ctx);
        BIO_free(in);
        BIO_free_all(out);
-       if(buf_in) OPENSSL_free(buf_in);
-       if(buf_out) OPENSSL_free(buf_out);
+       if (buf_in)
+               OPENSSL_free(buf_in);
+       if (buf_out)
+               OPENSSL_free(buf_out);
+       if (sig)
+               OPENSSL_free(sig);
        return ret;
 }
 
@@ -284,34 +390,37 @@ static void usage()
        BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
        BIO_printf(bio_err, "-in file        input file\n");
        BIO_printf(bio_err, "-out file       output file\n");
+       BIO_printf(bio_err, "-sigfile file signature file (verify operation only)\n");
        BIO_printf(bio_err, "-inkey file     input key\n");
        BIO_printf(bio_err, "-keyform arg    private key format - default PEM\n");
-       BIO_printf(bio_err, "-pubin          input is an RSA public\n");
-       BIO_printf(bio_err, "-certin         input is a certificate carrying an RSA public key\n");
-       BIO_printf(bio_err, "-ctrl X:Y       control parameters\n");
+       BIO_printf(bio_err, "-pubin          input is a public key\n");
+       BIO_printf(bio_err, "-certin         input is a certificate carrying a public key\n");
+       BIO_printf(bio_err, "-pkeyopt X:Y    public key options\n");
        BIO_printf(bio_err, "-sign           sign with private key\n");
        BIO_printf(bio_err, "-verify         verify with public key\n");
+       BIO_printf(bio_err, "-verifyrecover  verify with public key, recover original data\n");
        BIO_printf(bio_err, "-encrypt        encrypt with public key\n");
        BIO_printf(bio_err, "-decrypt        decrypt with private key\n");
+       BIO_printf(bio_err, "-derive         derive shared secret\n");
        BIO_printf(bio_err, "-hexdump        hex dump output\n");
 #ifndef OPENSSL_NO_ENGINE
        BIO_printf(bio_err, "-engine e       use engine e, possibly a hardware device.\n");
-       BIO_printf(bio_err, "-passin arg     pass phrase source\n");
 #endif
+       BIO_printf(bio_err, "-passin arg     pass phrase source\n");
 
 }
 
 static EVP_PKEY_CTX *init_ctx(int *pkeysize,
                                char *keyfile, int keyform, int key_type,
-                               char *passargin, int pkey_op, char *engine)
+                               char *passargin, int pkey_op, ENGINE *e)
        {
-       ENGINE *e = NULL;
        EVP_PKEY *pkey = NULL;
        EVP_PKEY_CTX *ctx = NULL;
        char *passin = NULL;
-       int rv;
+       int rv = -1;
        X509 *x;
-       if(((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT))
+       if(((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT) 
+               || (pkey_op == EVP_PKEY_OP_DERIVE))
                && (key_type != KEY_PRIVKEY))
                {
                BIO_printf(bio_err, "A private key is needed for this operation\n");
@@ -351,7 +460,7 @@ static EVP_PKEY_CTX *init_ctx(int *pkeysize,
        if (!pkey)
                goto end;
 
-       ctx = EVP_PKEY_CTX_new(pkey);
+       ctx = EVP_PKEY_CTX_new(pkey, e);
 
        EVP_PKEY_free(pkey);
 
@@ -379,6 +488,10 @@ static EVP_PKEY_CTX *init_ctx(int *pkeysize,
                case EVP_PKEY_OP_DECRYPT:
                rv = EVP_PKEY_decrypt_init(ctx);
                break;
+
+               case EVP_PKEY_OP_DERIVE:
+               rv = EVP_PKEY_derive_init(ctx);
+               break;
                }
 
        if (rv <= 0)
@@ -397,3 +510,61 @@ static EVP_PKEY_CTX *init_ctx(int *pkeysize,
 
        }
 
+static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
+                                                       const char *file)
+       {
+       EVP_PKEY *peer = NULL;
+       int ret;
+       if (!ctx)
+               {
+               BIO_puts(err, "-peerkey command before -inkey\n");
+               return 0;
+               }
+               
+       peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
+
+       if (!peer)
+               {
+               BIO_printf(bio_err, "Error reading peer key %s\n", file);
+               ERR_print_errors(err);
+               return 0;
+               }
+
+       ret = EVP_PKEY_derive_set_peer(ctx, peer);
+
+       EVP_PKEY_free(peer);
+       if (ret <= 0)
+               ERR_print_errors(err);
+       return ret;
+       }
+
+static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
+               unsigned char *out, size_t *poutlen,
+               unsigned char *in, size_t inlen)
+       {
+       int rv = 0;
+       switch(pkey_op)
+               {
+               case EVP_PKEY_OP_VERIFYRECOVER:
+               rv  = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
+               break;
+
+               case EVP_PKEY_OP_SIGN:
+               rv  = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
+               break;
+
+               case EVP_PKEY_OP_ENCRYPT:
+               rv  = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
+               break;
+
+               case EVP_PKEY_OP_DECRYPT:
+               rv  = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
+               break; 
+
+               case EVP_PKEY_OP_DERIVE:
+               rv  = EVP_PKEY_derive(ctx, out, poutlen);
+               break;
+
+               }
+       return rv;
+       }