| /* |
| * Copyright (c) 2010 .SE (The Internet Infrastructure Foundation) |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE |
| * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER |
| * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR |
| * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN |
| * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| /***************************************************************************** |
| softhsm2-keyconv-ossl.cpp |
| |
| Code specific for OpenSSL |
| *****************************************************************************/ |
| |
| #include <config.h> |
| #define KEYCONV_OSSL |
| #include "softhsm2-keyconv.h" |
| #include "OSSLComp.h" |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <iostream> |
| #include <fstream> |
| |
| #include <openssl/pem.h> |
| #include <openssl/evp.h> |
| #include <openssl/err.h> |
| #include <openssl/pkcs12.h> |
| #include <openssl/dsa.h> |
| #include <openssl/rsa.h> |
| |
| // Init OpenSSL |
| void crypto_init() |
| { |
| OpenSSL_add_all_algorithms(); |
| #ifdef WITH_FIPS |
| if (!FIPS_mode_set(1)) |
| { |
| fprintf(stderr, "ERROR: can't enter into FIPS mode.\n"); |
| exit(0); |
| } |
| #endif |
| } |
| |
| // Final OpenSSL |
| void crypto_final() |
| { |
| EVP_cleanup(); |
| CRYPTO_cleanup_all_ex_data(); |
| } |
| |
| // Save the RSA key as a PKCS#8 file |
| int save_rsa_pkcs8(char* out_path, char* file_pin, key_material_t* pkey) |
| { |
| RSA* rsa = NULL; |
| EVP_PKEY* ossl_pkey = NULL; |
| PKCS8_PRIV_KEY_INFO* p8inf = NULL; |
| BIO* out = NULL; |
| X509_SIG* p8 = NULL; |
| int result = 0; |
| |
| // See if the key material was found. |
| if |
| ( |
| pkey[TAG_MODULUS].size <= 0 || |
| pkey[TAG_PUBEXP].size <= 0 || |
| pkey[TAG_PRIVEXP].size <= 0 || |
| pkey[TAG_PRIME1].size <= 0 || |
| pkey[TAG_PRIME2].size <= 0 || |
| pkey[TAG_EXP1].size <= 0 || |
| pkey[TAG_EXP2].size <= 0 || |
| pkey[TAG_COEFF].size <= 0 |
| ) |
| { |
| fprintf(stderr, "ERROR: Some parts of the key material is missing in the input file.\n"); |
| return 1; |
| } |
| |
| rsa = RSA_new(); |
| BIGNUM* bn_p = BN_bin2bn((unsigned char*)pkey[TAG_PRIME1].big, pkey[TAG_PRIME1].size, NULL); |
| BIGNUM* bn_q = BN_bin2bn((unsigned char*)pkey[TAG_PRIME2].big, pkey[TAG_PRIME2].size, NULL); |
| BIGNUM* bn_d = BN_bin2bn((unsigned char*)pkey[TAG_PRIVEXP].big, pkey[TAG_PRIVEXP].size, NULL); |
| BIGNUM* bn_n = BN_bin2bn((unsigned char*)pkey[TAG_MODULUS].big, pkey[TAG_MODULUS].size, NULL); |
| BIGNUM* bn_e = BN_bin2bn((unsigned char*)pkey[TAG_PUBEXP].big, pkey[TAG_PUBEXP].size, NULL); |
| BIGNUM* bn_dmp1 = BN_bin2bn((unsigned char*)pkey[TAG_EXP1].big, pkey[TAG_EXP1].size, NULL); |
| BIGNUM* bn_dmq1 = BN_bin2bn((unsigned char*)pkey[TAG_EXP2].big, pkey[TAG_EXP2].size, NULL); |
| BIGNUM* bn_iqmp = BN_bin2bn((unsigned char*)pkey[TAG_COEFF].big, pkey[TAG_COEFF].size, NULL); |
| RSA_set0_factors(rsa, bn_p, bn_q); |
| RSA_set0_crt_params(rsa, bn_dmp1, bn_dmq1, bn_iqmp); |
| RSA_set0_key(rsa, bn_n, bn_e, bn_d); |
| |
| ossl_pkey = EVP_PKEY_new(); |
| |
| // Convert RSA to EVP_PKEY |
| if (!EVP_PKEY_set1_RSA(ossl_pkey, rsa)) |
| { |
| fprintf(stderr, "ERROR: Could not convert RSA key to EVP_PKEY.\n"); |
| RSA_free(rsa); |
| EVP_PKEY_free(ossl_pkey); |
| return 1; |
| } |
| RSA_free(rsa); |
| |
| // Convert EVP_PKEY to PKCS#8 |
| if (!(p8inf = EVP_PKEY2PKCS8(ossl_pkey))) |
| { |
| fprintf(stderr, "ERROR: Could not convert EVP_PKEY to PKCS#8.\n"); |
| EVP_PKEY_free(ossl_pkey); |
| return 1; |
| } |
| EVP_PKEY_free(ossl_pkey); |
| |
| // Open output file |
| if (!(out = BIO_new_file (out_path, "wb"))) |
| { |
| fprintf(stderr, "ERROR: Could not open the output file.\n"); |
| PKCS8_PRIV_KEY_INFO_free(p8inf); |
| return 1; |
| } |
| |
| // Write to disk |
| if (file_pin == NULL) |
| { |
| PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf); |
| printf("The key has been written to %s\n", out_path); |
| } |
| else |
| { |
| // Encrypt p8 |
| if (!(p8 = PKCS8_encrypt(NID_pbeWithMD5AndDES_CBC, NULL, |
| file_pin, strlen(file_pin), NULL, |
| 0, PKCS12_DEFAULT_ITER, p8inf))) |
| { |
| fprintf(stderr, "ERROR: Could not encrypt the PKCS#8 file\n"); |
| result = 1; |
| } |
| else |
| { |
| PEM_write_bio_PKCS8(out, p8); |
| X509_SIG_free(p8); |
| printf("The key has been written to %s\n", out_path); |
| } |
| } |
| |
| PKCS8_PRIV_KEY_INFO_free(p8inf); |
| BIO_free_all(out); |
| |
| return result; |
| } |
| |
| // Save the DSA key as a PKCS#8 file |
| int save_dsa_pkcs8(char* out_path, char* file_pin, key_material_t* pkey) |
| { |
| DSA* dsa = NULL; |
| EVP_PKEY* ossl_pkey = NULL; |
| PKCS8_PRIV_KEY_INFO* p8inf = NULL; |
| BIO* out = NULL; |
| X509_SIG* p8 = NULL; |
| int result = 0; |
| |
| // See if the key material was found. |
| if |
| ( |
| pkey[TAG_PRIME].size <= 0 || |
| pkey[TAG_SUBPRIME].size <= 0 || |
| pkey[TAG_BASE].size <= 0 || |
| pkey[TAG_PRIVVAL].size <= 0 || |
| pkey[TAG_PUBVAL].size <= 0 |
| ) |
| { |
| fprintf(stderr, "ERROR: Some parts of the key material is missing in the input file.\n"); |
| return 1; |
| } |
| |
| dsa = DSA_new(); |
| BIGNUM* bn_p = BN_bin2bn((unsigned char*)pkey[TAG_PRIME].big, pkey[TAG_PRIME].size, NULL); |
| BIGNUM* bn_q = BN_bin2bn((unsigned char*)pkey[TAG_SUBPRIME].big, pkey[TAG_SUBPRIME].size, NULL); |
| BIGNUM* bn_g = BN_bin2bn((unsigned char*)pkey[TAG_BASE].big, pkey[TAG_BASE].size, NULL); |
| BIGNUM* bn_priv_key = BN_bin2bn((unsigned char*)pkey[TAG_PRIVVAL].big, pkey[TAG_PRIVVAL].size, NULL); |
| BIGNUM* bn_pub_key = BN_bin2bn((unsigned char*)pkey[TAG_PUBVAL].big, pkey[TAG_PUBVAL].size, NULL); |
| |
| DSA_set0_pqg(dsa, bn_p, bn_q, bn_g); |
| DSA_set0_key(dsa, bn_pub_key, bn_priv_key); |
| |
| ossl_pkey = EVP_PKEY_new(); |
| |
| // Convert DSA to EVP_PKEY |
| if (!EVP_PKEY_set1_DSA(ossl_pkey, dsa)) |
| { |
| fprintf(stderr, "ERROR: Could not convert DSA key to EVP_PKEY.\n"); |
| DSA_free(dsa); |
| EVP_PKEY_free(ossl_pkey); |
| return 1; |
| } |
| DSA_free(dsa); |
| |
| // Convert EVP_PKEY to PKCS#8 |
| if (!(p8inf = EVP_PKEY2PKCS8(ossl_pkey))) |
| { |
| fprintf(stderr, "ERROR: Could not convert EVP_PKEY to PKCS#8.\n"); |
| EVP_PKEY_free(ossl_pkey); |
| return 1; |
| } |
| EVP_PKEY_free(ossl_pkey); |
| |
| // Open output file |
| if (!(out = BIO_new_file (out_path, "wb"))) |
| { |
| fprintf(stderr, "ERROR: Could not open the output file.\n"); |
| PKCS8_PRIV_KEY_INFO_free(p8inf); |
| return 1; |
| } |
| |
| // Write to disk |
| if (file_pin == NULL) |
| { |
| PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf); |
| printf("The key has been written to %s\n", out_path); |
| } |
| else |
| { |
| // Encrypt p8 |
| if (!(p8 = PKCS8_encrypt(NID_pbeWithMD5AndDES_CBC, NULL, |
| file_pin, strlen(file_pin), NULL, |
| 0, PKCS12_DEFAULT_ITER, p8inf))) |
| { |
| fprintf(stderr, "ERROR: Could not encrypt the PKCS#8 file\n"); |
| result = 1; |
| } |
| else |
| { |
| PEM_write_bio_PKCS8(out, p8); |
| X509_SIG_free(p8); |
| printf("The key has been written to %s\n", out_path); |
| } |
| } |
| |
| PKCS8_PRIV_KEY_INFO_free(p8inf); |
| BIO_free_all(out); |
| |
| return result; |
| } |