]>
Commit | Line | Data |
---|---|---|
846e33c7 | 1 | /* |
6738bf14 | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. |
d02b48c6 | 3 | * |
dffa7520 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
846e33c7 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
d02b48c6 RE |
8 | */ |
9 | ||
effaf4de RS |
10 | #include <openssl/opensslconf.h> |
11 | #ifdef OPENSSL_NO_DSA | |
12 | NON_EMPTY_TRANSLATION_UNIT | |
13 | #else | |
14 | ||
0f113f3e MC |
15 | # include <stdio.h> |
16 | # include <string.h> | |
17 | # include <sys/types.h> | |
18 | # include <sys/stat.h> | |
19 | # include "apps.h" | |
dab2cd68 | 20 | # include "progs.h" |
0f113f3e MC |
21 | # include <openssl/bio.h> |
22 | # include <openssl/err.h> | |
23 | # include <openssl/bn.h> | |
24 | # include <openssl/dsa.h> | |
25 | # include <openssl/x509.h> | |
26 | # include <openssl/pem.h> | |
d02b48c6 | 27 | |
7e1b7485 RS |
28 | typedef enum OPTION_choice { |
29 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | |
3ee1eac2 RS |
30 | OPT_OUT, OPT_PASSOUT, OPT_ENGINE, OPT_CIPHER, |
31 | OPT_R_ENUM | |
7e1b7485 RS |
32 | } OPTION_CHOICE; |
33 | ||
44c83ebd | 34 | const OPTIONS gendsa_options[] = { |
7e1b7485 RS |
35 | {OPT_HELP_STR, 1, '-', "Usage: %s [args] dsaparam-file\n"}, |
36 | {OPT_HELP_STR, 1, '-', "Valid options are:\n"}, | |
37 | {"help", OPT_HELP, '-', "Display this summary"}, | |
38 | {"out", OPT_OUT, '>', "Output the key to the specified file"}, | |
12d56b29 | 39 | {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, |
3ee1eac2 | 40 | OPT_R_OPTIONS, |
9c3bcfa0 | 41 | {"", OPT_CIPHER, '-', "Encrypt the output with any supported cipher"}, |
7e1b7485 RS |
42 | # ifndef OPENSSL_NO_ENGINE |
43 | {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, | |
44 | # endif | |
7e1b7485 RS |
45 | {NULL} |
46 | }; | |
667ac4ec | 47 | |
7e1b7485 | 48 | int gendsa_main(int argc, char **argv) |
0f113f3e | 49 | { |
dd1abd44 | 50 | ENGINE *e = NULL; |
0f113f3e | 51 | BIO *out = NULL, *in = NULL; |
7e1b7485 | 52 | DSA *dsa = NULL; |
0f113f3e | 53 | const EVP_CIPHER *enc = NULL; |
3ee1eac2 | 54 | char *dsaparams = NULL; |
7e1b7485 RS |
55 | char *outfile = NULL, *passoutarg = NULL, *passout = NULL, *prog; |
56 | OPTION_CHOICE o; | |
3b061a00 | 57 | int ret = 1, private = 0; |
2ac6115d | 58 | const BIGNUM *p = NULL; |
d02b48c6 | 59 | |
7e1b7485 RS |
60 | prog = opt_init(argc, argv, gendsa_options); |
61 | while ((o = opt_next()) != OPT_EOF) { | |
62 | switch (o) { | |
63 | case OPT_EOF: | |
64 | case OPT_ERR: | |
65 | opthelp: | |
66 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | |
67 | goto end; | |
68 | case OPT_HELP: | |
69 | ret = 0; | |
70 | opt_help(gendsa_options); | |
71 | goto end; | |
72 | case OPT_OUT: | |
73 | outfile = opt_arg(); | |
74 | break; | |
75 | case OPT_PASSOUT: | |
76 | passoutarg = opt_arg(); | |
77 | break; | |
78 | case OPT_ENGINE: | |
dd1abd44 | 79 | e = setup_engine(opt_arg(), 0); |
7e1b7485 | 80 | break; |
3ee1eac2 RS |
81 | case OPT_R_CASES: |
82 | if (!opt_rand(o)) | |
83 | goto end; | |
7e1b7485 RS |
84 | break; |
85 | case OPT_CIPHER: | |
86 | if (!opt_cipher(opt_unknown(), &enc)) | |
87 | goto end; | |
0f113f3e | 88 | break; |
0f113f3e | 89 | } |
0f113f3e | 90 | } |
7e1b7485 RS |
91 | argc = opt_num_rest(); |
92 | argv = opt_rest(); | |
3b061a00 | 93 | private = 1; |
7e1b7485 RS |
94 | |
95 | if (argc != 1) | |
96 | goto opthelp; | |
97 | dsaparams = *argv; | |
d02b48c6 | 98 | |
7e1b7485 | 99 | if (!app_passwd(NULL, passoutarg, NULL, &passout)) { |
0f113f3e MC |
100 | BIO_printf(bio_err, "Error getting password\n"); |
101 | goto end; | |
102 | } | |
a3fe382e | 103 | |
bdd58d98 | 104 | in = bio_open_default(dsaparams, 'r', FORMAT_PEM); |
7e1b7485 RS |
105 | if (in == NULL) |
106 | goto end2; | |
a3fe382e | 107 | |
0f113f3e MC |
108 | if ((dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) { |
109 | BIO_printf(bio_err, "unable to load DSA parameter file\n"); | |
110 | goto end; | |
111 | } | |
112 | BIO_free(in); | |
113 | in = NULL; | |
d02b48c6 | 114 | |
bdd58d98 | 115 | out = bio_open_owner(outfile, FORMAT_PEM, private); |
0f113f3e | 116 | if (out == NULL) |
7e1b7485 | 117 | goto end2; |
d02b48c6 | 118 | |
6e9fa57c | 119 | DSA_get0_pqg(dsa, &p, NULL, NULL); |
0336df2f GS |
120 | |
121 | if (BN_num_bits(p) > OPENSSL_DSA_MAX_MODULUS_BITS) | |
122 | BIO_printf(bio_err, | |
123 | "Warning: It is not recommended to use more than %d bit for DSA keys.\n" | |
124 | " Your key size is %d! Larger key size may behave not as expected.\n", | |
125 | OPENSSL_DSA_MAX_MODULUS_BITS, BN_num_bits(p)); | |
126 | ||
6e9fa57c | 127 | BIO_printf(bio_err, "Generating DSA key, %d bits\n", BN_num_bits(p)); |
0f113f3e MC |
128 | if (!DSA_generate_key(dsa)) |
129 | goto end; | |
d02b48c6 | 130 | |
3b061a00 | 131 | assert(private); |
0f113f3e MC |
132 | if (!PEM_write_bio_DSAPrivateKey(out, dsa, enc, NULL, 0, NULL, passout)) |
133 | goto end; | |
134 | ret = 0; | |
135 | end: | |
136 | if (ret != 0) | |
137 | ERR_print_errors(bio_err); | |
7e1b7485 | 138 | end2: |
ca3a82c3 RS |
139 | BIO_free(in); |
140 | BIO_free_all(out); | |
d6407083 | 141 | DSA_free(dsa); |
dd1abd44 | 142 | release_engine(e); |
b548a1f1 | 143 | OPENSSL_free(passout); |
26a7d938 | 144 | return ret; |
0f113f3e | 145 | } |
f5d7a031 | 146 | #endif |