1 /*
2  * Copyright 2002-2023 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 #include <string.h>
11 #include <openssl/opensslconf.h>
12 #include <openssl/evp.h>
13 #include <openssl/encoder.h>
14 #include <openssl/decoder.h>
15 #include <openssl/core_names.h>
16 #include <openssl/core_dispatch.h>
17 #include <openssl/params.h>
18 #include <openssl/err.h>
19 
20 #include "apps.h"
21 #include "progs.h"
22 #include "ec_common.h"
23 
24 typedef enum OPTION_choice {
25     OPT_COMMON,
26     OPT_INFORM, OPT_OUTFORM, OPT_ENGINE, OPT_IN, OPT_OUT,
27     OPT_NOOUT, OPT_TEXT, OPT_PARAM_OUT, OPT_PUBIN, OPT_PUBOUT,
28     OPT_PASSIN, OPT_PASSOUT, OPT_PARAM_ENC, OPT_CONV_FORM, OPT_CIPHER,
29     OPT_NO_PUBLIC, OPT_CHECK, OPT_PROV_ENUM
30 } OPTION_CHOICE;
31 
32 const OPTIONS ec_options[] = {
33     OPT_SECTION("General"),
34     {"help", OPT_HELP, '-', "Display this summary"},
35 #ifndef OPENSSL_NO_ENGINE
36     {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
37 #endif
38 
39     OPT_SECTION("Input"),
40     {"in", OPT_IN, 's', "Input file"},
41     {"inform", OPT_INFORM, 'f', "Input format (DER/PEM/P12/ENGINE)"},
42     {"pubin", OPT_PUBIN, '-', "Expect a public key in input file"},
43     {"passin", OPT_PASSIN, 's', "Input file pass phrase source"},
44     {"check", OPT_CHECK, '-', "check key consistency"},
45     {"", OPT_CIPHER, '-', "Any supported cipher"},
46     {"param_enc", OPT_PARAM_ENC, 's',
47      "Specifies the way the ec parameters are encoded"},
48     {"conv_form", OPT_CONV_FORM, 's', "Specifies the point conversion form "},
49 
50     OPT_SECTION("Output"),
51     {"out", OPT_OUT, '>', "Output file"},
52     {"outform", OPT_OUTFORM, 'F', "Output format - DER or PEM"},
53     {"noout", OPT_NOOUT, '-', "Don't print key out"},
54     {"text", OPT_TEXT, '-', "Print the key"},
55     {"param_out", OPT_PARAM_OUT, '-', "Print the elliptic curve parameters"},
56     {"pubout", OPT_PUBOUT, '-', "Output public key, not private"},
57     {"no_public", OPT_NO_PUBLIC, '-', "exclude public key from private key"},
58     {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"},
59 
60     OPT_PROV_OPTIONS,
61     {NULL}
62 };
63 
ec_main(int argc,char ** argv)64 int ec_main(int argc, char **argv)
65 {
66     OSSL_ENCODER_CTX *ectx = NULL;
67     OSSL_DECODER_CTX *dctx = NULL;
68     EVP_PKEY_CTX *pctx = NULL;
69     EVP_PKEY *eckey = NULL;
70     BIO *out = NULL;
71     ENGINE *e = NULL;
72     EVP_CIPHER *enc = NULL;
73     char *infile = NULL, *outfile = NULL, *ciphername = NULL, *prog;
74     char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL;
75     OPTION_CHOICE o;
76     int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0;
77     int pubin = 0, pubout = 0, param_out = 0, ret = 1, private = 0;
78     int check = 0;
79     char *asn1_encoding = NULL;
80     char *point_format = NULL;
81     int no_public = 0;
82 
83     opt_set_unknown_name("cipher");
84     prog = opt_init(argc, argv, ec_options);
85     while ((o = opt_next()) != OPT_EOF) {
86         switch (o) {
87         case OPT_EOF:
88         case OPT_ERR:
89  opthelp:
90             BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
91             goto end;
92         case OPT_HELP:
93             opt_help(ec_options);
94             ret = 0;
95             goto end;
96         case OPT_INFORM:
97             if (!opt_format(opt_arg(), OPT_FMT_ANY, &informat))
98                 goto opthelp;
99             break;
100         case OPT_IN:
101             infile = opt_arg();
102             break;
103         case OPT_OUTFORM:
104             if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &outformat))
105                 goto opthelp;
106             break;
107         case OPT_OUT:
108             outfile = opt_arg();
109             break;
110         case OPT_NOOUT:
111             noout = 1;
112             break;
113         case OPT_TEXT:
114             text = 1;
115             break;
116         case OPT_PARAM_OUT:
117             param_out = 1;
118             break;
119         case OPT_PUBIN:
120             pubin = 1;
121             break;
122         case OPT_PUBOUT:
123             pubout = 1;
124             break;
125         case OPT_PASSIN:
126             passinarg = opt_arg();
127             break;
128         case OPT_PASSOUT:
129             passoutarg = opt_arg();
130             break;
131         case OPT_ENGINE:
132             e = setup_engine(opt_arg(), 0);
133             break;
134         case OPT_CIPHER:
135             ciphername = opt_unknown();
136             break;
137         case OPT_CONV_FORM:
138             point_format = opt_arg();
139             if (!opt_string(point_format, point_format_options))
140                 goto opthelp;
141             break;
142         case OPT_PARAM_ENC:
143             asn1_encoding = opt_arg();
144             if (!opt_string(asn1_encoding, asn1_encoding_options))
145                 goto opthelp;
146             break;
147         case OPT_NO_PUBLIC:
148             no_public = 1;
149             break;
150         case OPT_CHECK:
151             check = 1;
152             break;
153         case OPT_PROV_CASES:
154             if (!opt_provider(o))
155                 goto end;
156             break;
157         }
158     }
159 
160     /* No extra arguments. */
161     if (!opt_check_rest_arg(NULL))
162         goto opthelp;
163 
164     if (!opt_cipher(ciphername, &enc))
165         goto opthelp;
166     private = !pubin && (text || (!param_out && !pubout));
167 
168     if (!app_passwd(passinarg, passoutarg, &passin, &passout)) {
169         BIO_printf(bio_err, "Error getting passwords\n");
170         goto end;
171     }
172 
173     if (pubin)
174         eckey = load_pubkey(infile, informat, 1, passin, e, "public key");
175     else
176         eckey = load_key(infile, informat, 1, passin, e, "private key");
177 
178     if (eckey == NULL) {
179         BIO_printf(bio_err, "unable to load Key\n");
180         goto end;
181     }
182 
183     out = bio_open_owner(outfile, outformat, private);
184     if (out == NULL)
185         goto end;
186 
187     if (point_format
188         && !EVP_PKEY_set_utf8_string_param(
189                 eckey, OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT,
190                 point_format)) {
191         BIO_printf(bio_err, "unable to set point conversion format\n");
192         goto end;
193     }
194 
195     if (asn1_encoding != NULL
196         && !EVP_PKEY_set_utf8_string_param(
197                 eckey, OSSL_PKEY_PARAM_EC_ENCODING, asn1_encoding)) {
198         BIO_printf(bio_err, "unable to set asn1 encoding format\n");
199         goto end;
200     }
201 
202     if (no_public) {
203         if (!EVP_PKEY_set_int_param(eckey, OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC, 0)) {
204             BIO_printf(bio_err, "unable to disable public key encoding\n");
205             goto end;
206         }
207     } else {
208         if (!EVP_PKEY_set_int_param(eckey, OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC, 1)) {
209             BIO_printf(bio_err, "unable to enable public key encoding\n");
210             goto end;
211         }
212     }
213 
214     if (text) {
215         assert(pubin || private);
216         if ((pubin && EVP_PKEY_print_public(out, eckey, 0, NULL) <= 0)
217             || (!pubin && EVP_PKEY_print_private(out, eckey, 0, NULL) <= 0)) {
218             BIO_printf(bio_err, "unable to print EC key\n");
219             goto end;
220         }
221     }
222 
223     if (check) {
224         pctx = EVP_PKEY_CTX_new_from_pkey(NULL, eckey, NULL);
225         if (pctx == NULL) {
226             BIO_printf(bio_err, "unable to check EC key\n");
227             goto end;
228         }
229         if (EVP_PKEY_check(pctx) <= 0)
230             BIO_printf(bio_err, "EC Key Invalid!\n");
231         else
232             BIO_printf(bio_err, "EC Key valid.\n");
233         ERR_print_errors(bio_err);
234     }
235 
236     if (!noout) {
237         int selection;
238         const char *output_type = outformat == FORMAT_ASN1 ? "DER" : "PEM";
239         const char *output_structure = "type-specific";
240 
241         if (param_out) {
242             selection = OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS;
243         } else if (pubin || pubout) {
244             selection = OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS
245                 | OSSL_KEYMGMT_SELECT_PUBLIC_KEY;
246             output_structure = "SubjectPublicKeyInfo";
247         } else {
248             selection = OSSL_KEYMGMT_SELECT_ALL;
249             assert(private);
250         }
251 
252         ectx = OSSL_ENCODER_CTX_new_for_pkey(eckey, selection,
253                                              output_type, output_structure,
254                                              NULL);
255         if (enc != NULL) {
256             OSSL_ENCODER_CTX_set_cipher(ectx, EVP_CIPHER_get0_name(enc), NULL);
257             /* Default passphrase prompter */
258             OSSL_ENCODER_CTX_set_passphrase_ui(ectx, get_ui_method(), NULL);
259             if (passout != NULL)
260                 /* When passout given, override the passphrase prompter */
261                 OSSL_ENCODER_CTX_set_passphrase(ectx,
262                                                 (const unsigned char *)passout,
263                                                 strlen(passout));
264         }
265         if (!OSSL_ENCODER_to_bio(ectx, out)) {
266             BIO_printf(bio_err, "unable to write EC key\n");
267             goto end;
268         }
269     }
270 
271     ret = 0;
272 end:
273     if (ret != 0)
274         ERR_print_errors(bio_err);
275     BIO_free_all(out);
276     EVP_PKEY_free(eckey);
277     EVP_CIPHER_free(enc);
278     OSSL_ENCODER_CTX_free(ectx);
279     OSSL_DECODER_CTX_free(dctx);
280     EVP_PKEY_CTX_free(pctx);
281     release_engine(e);
282     if (passin != NULL)
283         OPENSSL_clear_free(passin, strlen(passin));
284     if (passout != NULL)
285         OPENSSL_clear_free(passout, strlen(passout));
286     return ret;
287 }
288