This repository has been archived by the owner on Dec 1, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 21
/
rsa.c
119 lines (102 loc) · 2.83 KB
/
rsa.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
/* $Id$ */
/*
* Copyright (c) 2016 Kristaps Dzonsons <[email protected]>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#include <err.h>
#include <stdlib.h>
#include <unistd.h>
#include <openssl/evp.h>
#include <openssl/pem.h>
#include <openssl/rsa.h>
#include "rsa.h"
/*
* Default number of bits when creating a new key.
*/
#define KBITS 4096
/*
* Create an RSA key with the default KBITS number of bits.
*/
EVP_PKEY *
rsa_key_create(FILE *f, const char *fname)
{
EVP_PKEY_CTX *ctx = NULL;
EVP_PKEY *pkey = NULL;
/* First, create the context and the key. */
if (NULL == (ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL))) {
warnx("EVP_PKEY_CTX_new_id");
goto err;
} else if (EVP_PKEY_keygen_init(ctx) <= 0) {
warnx("EVP_PKEY_keygen_init");
goto err;
} else if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, KBITS) <= 0) {
warnx("EVP_PKEY_set_rsa_keygen_bits");
goto err;
} else if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
warnx("EVP_PKEY_keygen");
goto err;
}
/* Serialise the key to the disc. */
if (PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL))
goto out;
warnx("%s: PEM_write_PrivateKey", fname);
err:
if (NULL != pkey)
EVP_PKEY_free(pkey);
pkey = NULL;
out:
if (NULL != ctx)
EVP_PKEY_CTX_free(ctx);
return (pkey);
}
/*
* Load an RSA key into a public-key envelope.
* See key_load().
*/
EVP_PKEY *
rsa_key_load(FILE *f, const char *fname)
{
EVP_PKEY *pkey;
pkey = PEM_read_PrivateKey(f, NULL, NULL, NULL);
if (NULL == pkey) {
warnx("%s: PEM_read_PrivateKey", fname);
return (NULL);
} else if (EVP_PKEY_RSA == EVP_PKEY_type(pkey->type))
return (pkey);
warnx("%s: unsupported key type", fname);
EVP_PKEY_free(pkey);
return (NULL);
}
/*
* Load an RSA or ECSDA key into a public-key envelope.
*/
EVP_PKEY *
key_load(FILE *f, const char *fname)
{
EVP_PKEY *pkey;
pkey = PEM_read_PrivateKey(f, NULL, NULL, NULL);
if (NULL == pkey) {
warnx("%s: PEM_read_PrivateKey", fname);
return (NULL);
}
if (EVP_PKEY_RSA == EVP_PKEY_type(pkey->type) ||
EVP_PKEY_EC == EVP_PKEY_type(pkey->type))
return (pkey);
warnx("%s: unsupported key type", fname);
EVP_PKEY_free(pkey);
return (NULL);
}