- Added support for PKCS#8 wrapper on reading private keys (Fixes ticket #20)
This commit is contained in:
parent
3783d6d812
commit
ed56b224de
10 changed files with 427 additions and 3 deletions
|
@ -66,7 +66,7 @@
|
||||||
#define POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS -0x2580 /**< The extension tag or value is invalid. */
|
#define POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS -0x2580 /**< The extension tag or value is invalid. */
|
||||||
#define POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION -0x2600 /**< Certificate or CRL has an unsupported version number. */
|
#define POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION -0x2600 /**< Certificate or CRL has an unsupported version number. */
|
||||||
#define POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG -0x2680 /**< Signature algorithm (oid) is unsupported. */
|
#define POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG -0x2680 /**< Signature algorithm (oid) is unsupported. */
|
||||||
#define POLARSSL_ERR_X509_CERT_UNKNOWN_PK_ALG -0x2700 /**< Public key algorithm is unsupported (only RSA is supported). */
|
#define POLARSSL_ERR_X509_UNKNOWN_PK_ALG -0x2700 /**< Key algorithm is unsupported (only RSA is supported). */
|
||||||
#define POLARSSL_ERR_X509_CERT_SIG_MISMATCH -0x2780 /**< Certificate signature algorithms do not match. (see \c ::x509_cert sig_oid) */
|
#define POLARSSL_ERR_X509_CERT_SIG_MISMATCH -0x2780 /**< Certificate signature algorithms do not match. (see \c ::x509_cert sig_oid) */
|
||||||
#define POLARSSL_ERR_X509_CERT_VERIFY_FAILED -0x2800 /**< Certificate verification failed, e.g. CRL, CA or signature check failed. */
|
#define POLARSSL_ERR_X509_CERT_VERIFY_FAILED -0x2800 /**< Certificate verification failed, e.g. CRL, CA or signature check failed. */
|
||||||
#define POLARSSL_ERR_X509_KEY_INVALID_VERSION -0x2880 /**< Unsupported RSA key version */
|
#define POLARSSL_ERR_X509_KEY_INVALID_VERSION -0x2880 /**< Unsupported RSA key version */
|
||||||
|
|
|
@ -622,7 +622,7 @@ static int x509_get_pubkey( unsigned char **p,
|
||||||
can_handle = 1;
|
can_handle = 1;
|
||||||
|
|
||||||
if( can_handle == 0 )
|
if( can_handle == 0 )
|
||||||
return( POLARSSL_ERR_X509_CERT_UNKNOWN_PK_ALG );
|
return( POLARSSL_ERR_X509_UNKNOWN_PK_ALG );
|
||||||
|
|
||||||
if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
|
if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
|
||||||
return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY + ret );
|
return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY + ret );
|
||||||
|
@ -1870,6 +1870,9 @@ int x509parse_key( rsa_context *rsa, const unsigned char *key, size_t keylen,
|
||||||
int ret;
|
int ret;
|
||||||
size_t len;
|
size_t len;
|
||||||
unsigned char *p, *end;
|
unsigned char *p, *end;
|
||||||
|
unsigned char *p_alt;
|
||||||
|
x509_buf pk_alg_oid;
|
||||||
|
|
||||||
#if defined(POLARSSL_PEM_C)
|
#if defined(POLARSSL_PEM_C)
|
||||||
pem_context pem;
|
pem_context pem;
|
||||||
|
|
||||||
|
@ -1879,6 +1882,14 @@ int x509parse_key( rsa_context *rsa, const unsigned char *key, size_t keylen,
|
||||||
"-----END RSA PRIVATE KEY-----",
|
"-----END RSA PRIVATE KEY-----",
|
||||||
key, pwd, pwdlen, &len );
|
key, pwd, pwdlen, &len );
|
||||||
|
|
||||||
|
if( ret == POLARSSL_ERR_PEM_NO_HEADER_PRESENT )
|
||||||
|
{
|
||||||
|
ret = pem_read_buffer( &pem,
|
||||||
|
"-----BEGIN PRIVATE KEY-----",
|
||||||
|
"-----END PRIVATE KEY-----",
|
||||||
|
key, pwd, pwdlen, &len );
|
||||||
|
}
|
||||||
|
|
||||||
if( ret == 0 )
|
if( ret == 0 )
|
||||||
{
|
{
|
||||||
/*
|
/*
|
||||||
|
@ -1901,6 +1912,19 @@ int x509parse_key( rsa_context *rsa, const unsigned char *key, size_t keylen,
|
||||||
end = p + keylen;
|
end = p + keylen;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
* Note: Depending on the type of private key file one can expect either a
|
||||||
|
* PrivatKeyInfo object (PKCS#8) or a RSAPrivateKey (PKCS#1) directly.
|
||||||
|
*
|
||||||
|
* PrivateKeyInfo ::= SEQUENCE {
|
||||||
|
* algorithm AlgorithmIdentifier,
|
||||||
|
* PrivateKey BIT STRING
|
||||||
|
* }
|
||||||
|
*
|
||||||
|
* AlgorithmIdentifier ::= SEQUENCE {
|
||||||
|
* algorithm OBJECT IDENTIFIER,
|
||||||
|
* parameters ANY DEFINED BY algorithm OPTIONAL
|
||||||
|
* }
|
||||||
|
*
|
||||||
* RSAPrivateKey ::= SEQUENCE {
|
* RSAPrivateKey ::= SEQUENCE {
|
||||||
* version Version,
|
* version Version,
|
||||||
* modulus INTEGER, -- n
|
* modulus INTEGER, -- n
|
||||||
|
@ -1944,6 +1968,110 @@ int x509parse_key( rsa_context *rsa, const unsigned char *key, size_t keylen,
|
||||||
return( POLARSSL_ERR_X509_KEY_INVALID_VERSION + ret );
|
return( POLARSSL_ERR_X509_KEY_INVALID_VERSION + ret );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
p_alt = p;
|
||||||
|
|
||||||
|
if( ( ret = x509_get_alg( &p_alt, end, &pk_alg_oid ) ) != 0 )
|
||||||
|
{
|
||||||
|
// Assume that we have the PKCS#1 format if wrong
|
||||||
|
// tag was encountered
|
||||||
|
//
|
||||||
|
if( ret != POLARSSL_ERR_X509_CERT_INVALID_ALG +
|
||||||
|
POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
int can_handle;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* only RSA keys handled at this time
|
||||||
|
*/
|
||||||
|
can_handle = 0;
|
||||||
|
|
||||||
|
if( pk_alg_oid.len == 9 &&
|
||||||
|
memcmp( pk_alg_oid.p, OID_PKCS1_RSA, 9 ) == 0 )
|
||||||
|
can_handle = 1;
|
||||||
|
|
||||||
|
if( pk_alg_oid.len == 9 &&
|
||||||
|
memcmp( pk_alg_oid.p, OID_PKCS1, 8 ) == 0 )
|
||||||
|
{
|
||||||
|
if( pk_alg_oid.p[8] >= 2 && pk_alg_oid.p[8] <= 5 )
|
||||||
|
can_handle = 1;
|
||||||
|
|
||||||
|
if ( pk_alg_oid.p[8] >= 11 && pk_alg_oid.p[8] <= 14 )
|
||||||
|
can_handle = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if( pk_alg_oid.len == 5 &&
|
||||||
|
memcmp( pk_alg_oid.p, OID_RSA_SHA_OBS, 5 ) == 0 )
|
||||||
|
can_handle = 1;
|
||||||
|
|
||||||
|
if( can_handle == 0 )
|
||||||
|
return( POLARSSL_ERR_X509_UNKNOWN_PK_ALG );
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Parse the PKCS#8 format
|
||||||
|
*/
|
||||||
|
|
||||||
|
p = p_alt;
|
||||||
|
if( ( ret = asn1_get_tag( &p, end, &len, ASN1_OCTET_STRING ) ) != 0 )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT + ret );
|
||||||
|
}
|
||||||
|
|
||||||
|
if( ( end - p ) < 1 )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT +
|
||||||
|
POLARSSL_ERR_ASN1_OUT_OF_DATA );
|
||||||
|
}
|
||||||
|
|
||||||
|
end = p + len;
|
||||||
|
|
||||||
|
if( ( ret = asn1_get_tag( &p, end, &len,
|
||||||
|
ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT + ret );
|
||||||
|
}
|
||||||
|
|
||||||
|
end = p + len;
|
||||||
|
|
||||||
|
if( ( ret = asn1_get_int( &p, end, &rsa->ver ) ) != 0 )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT + ret );
|
||||||
|
}
|
||||||
|
|
||||||
|
if( rsa->ver != 0 )
|
||||||
|
{
|
||||||
|
#if defined(POLARSSL_PEM_C)
|
||||||
|
pem_free( &pem );
|
||||||
|
#endif
|
||||||
|
rsa_free( rsa );
|
||||||
|
return( POLARSSL_ERR_X509_KEY_INVALID_VERSION + ret );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if( ( ret = asn1_get_mpi( &p, end, &rsa->N ) ) != 0 ||
|
if( ( ret = asn1_get_mpi( &p, end, &rsa->N ) ) != 0 ||
|
||||||
( ret = asn1_get_mpi( &p, end, &rsa->E ) ) != 0 ||
|
( ret = asn1_get_mpi( &p, end, &rsa->E ) ) != 0 ||
|
||||||
( ret = asn1_get_mpi( &p, end, &rsa->D ) ) != 0 ||
|
( ret = asn1_get_mpi( &p, end, &rsa->D ) ) != 0 ||
|
||||||
|
|
|
@ -12,6 +12,7 @@ APPS = aes/aescrypt2 aes/crypt_and_hash \
|
||||||
hash/md5sum hash/sha1sum \
|
hash/md5sum hash/sha1sum \
|
||||||
hash/sha2sum pkey/dh_client \
|
hash/sha2sum pkey/dh_client \
|
||||||
pkey/dh_genprime pkey/dh_server \
|
pkey/dh_genprime pkey/dh_server \
|
||||||
|
pkey/key_app \
|
||||||
pkey/mpi_demo pkey/rsa_genkey \
|
pkey/mpi_demo pkey/rsa_genkey \
|
||||||
pkey/rsa_sign pkey/rsa_verify \
|
pkey/rsa_sign pkey/rsa_verify \
|
||||||
pkey/rsa_sign_pss pkey/rsa_verify_pss \
|
pkey/rsa_sign_pss pkey/rsa_verify_pss \
|
||||||
|
@ -66,6 +67,10 @@ pkey/dh_server: pkey/dh_server.c ../library/libpolarssl.a
|
||||||
echo " CC pkey/dh_server.c"
|
echo " CC pkey/dh_server.c"
|
||||||
$(CC) $(CFLAGS) $(OFLAGS) pkey/dh_server.c $(LDFLAGS) -o $@
|
$(CC) $(CFLAGS) $(OFLAGS) pkey/dh_server.c $(LDFLAGS) -o $@
|
||||||
|
|
||||||
|
pkey/key_app: pkey/key_app.c ../library/libpolarssl.a
|
||||||
|
echo " CC pkey/key_app.c"
|
||||||
|
$(CC) $(CFLAGS) $(OFLAGS) pkey/key_app.c $(LDFLAGS) -o $@
|
||||||
|
|
||||||
pkey/mpi_demo: pkey/mpi_demo.c ../library/libpolarssl.a
|
pkey/mpi_demo: pkey/mpi_demo.c ../library/libpolarssl.a
|
||||||
echo " CC pkey/mpi_demo.c"
|
echo " CC pkey/mpi_demo.c"
|
||||||
$(CC) $(CFLAGS) $(OFLAGS) pkey/mpi_demo.c $(LDFLAGS) -o $@
|
$(CC) $(CFLAGS) $(OFLAGS) pkey/mpi_demo.c $(LDFLAGS) -o $@
|
||||||
|
|
|
@ -7,6 +7,9 @@ target_link_libraries(dh_genprime polarssl)
|
||||||
add_executable(dh_server dh_server.c)
|
add_executable(dh_server dh_server.c)
|
||||||
target_link_libraries(dh_server polarssl)
|
target_link_libraries(dh_server polarssl)
|
||||||
|
|
||||||
|
add_executable(key_app key_app.c)
|
||||||
|
target_link_libraries(key_app polarssl)
|
||||||
|
|
||||||
add_executable(mpi_demo mpi_demo.c)
|
add_executable(mpi_demo mpi_demo.c)
|
||||||
target_link_libraries(mpi_demo polarssl)
|
target_link_libraries(mpi_demo polarssl)
|
||||||
|
|
||||||
|
@ -25,6 +28,6 @@ target_link_libraries(rsa_sign_pss polarssl)
|
||||||
add_executable(rsa_verify_pss rsa_verify_pss.c)
|
add_executable(rsa_verify_pss rsa_verify_pss.c)
|
||||||
target_link_libraries(rsa_verify_pss polarssl)
|
target_link_libraries(rsa_verify_pss polarssl)
|
||||||
|
|
||||||
INSTALL(TARGETS dh_client dh_genprime dh_server mpi_demo rsa_genkey rsa_sign rsa_verify
|
INSTALL(TARGETS dh_client dh_genprime dh_server key_app mpi_demo rsa_genkey rsa_sign rsa_verify
|
||||||
DESTINATION "bin"
|
DESTINATION "bin"
|
||||||
PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE)
|
PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE)
|
||||||
|
|
224
programs/pkey/key_app.c
Normal file
224
programs/pkey/key_app.c
Normal file
|
@ -0,0 +1,224 @@
|
||||||
|
/*
|
||||||
|
* Key reading application
|
||||||
|
*
|
||||||
|
* Copyright (C) 2006-2010, Brainspark B.V.
|
||||||
|
*
|
||||||
|
* This file is part of PolarSSL (http://www.polarssl.org)
|
||||||
|
* Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
|
||||||
|
*
|
||||||
|
* All rights reserved.
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation; either version 2 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License along
|
||||||
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
||||||
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef _CRT_SECURE_NO_DEPRECATE
|
||||||
|
#define _CRT_SECURE_NO_DEPRECATE 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#include <string.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
|
||||||
|
#include "polarssl/config.h"
|
||||||
|
|
||||||
|
#include "polarssl/error.h"
|
||||||
|
#include "polarssl/rsa.h"
|
||||||
|
#include "polarssl/x509.h"
|
||||||
|
|
||||||
|
#define MODE_NONE 0
|
||||||
|
#define MODE_PRIVATE 1
|
||||||
|
#define MODE_PUBLIC 2
|
||||||
|
|
||||||
|
#define DFL_MODE MODE_NONE
|
||||||
|
#define DFL_FILENAME "keyfile.key"
|
||||||
|
#define DFL_DEBUG_LEVEL 0
|
||||||
|
|
||||||
|
/*
|
||||||
|
* global options
|
||||||
|
*/
|
||||||
|
struct options
|
||||||
|
{
|
||||||
|
int mode; /* the mode to run the application in */
|
||||||
|
char *filename; /* filename of the key file */
|
||||||
|
int debug_level; /* level of debugging */
|
||||||
|
} opt;
|
||||||
|
|
||||||
|
void my_debug( void *ctx, int level, const char *str )
|
||||||
|
{
|
||||||
|
if( level < opt.debug_level )
|
||||||
|
{
|
||||||
|
fprintf( (FILE *) ctx, "%s", str );
|
||||||
|
fflush( (FILE *) ctx );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#define USAGE \
|
||||||
|
"\n usage: key_app param=<>...\n" \
|
||||||
|
"\n acceptable parameters:\n" \
|
||||||
|
" mode=private|public default: none\n" \
|
||||||
|
" filename=%%s default: keyfile.key\n" \
|
||||||
|
" debug_level=%%d default: 0 (disabled)\n" \
|
||||||
|
"\n"
|
||||||
|
|
||||||
|
#if !defined(POLARSSL_BIGNUM_C) || !defined(POLARSSL_RSA_C) || \
|
||||||
|
!defined(POLARSSL_X509_PARSE_C) || !defined(POLARSSL_FS_IO)
|
||||||
|
int main( void )
|
||||||
|
{
|
||||||
|
printf("POLARSSL_BIGNUM_C and/or POLARSSL_RSA_C and/or "
|
||||||
|
"POLARSSL_X509_PARSE_C and/or POLARSSL_FS_IO not defined.\n");
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
int main( int argc, char *argv[] )
|
||||||
|
{
|
||||||
|
int ret = 0;
|
||||||
|
rsa_context rsa;
|
||||||
|
char buf[1024];
|
||||||
|
int i, j, n;
|
||||||
|
char *p, *q;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Set to sane values
|
||||||
|
*/
|
||||||
|
memset( &rsa, 0, sizeof( rsa_context ) );
|
||||||
|
memset( buf, 0, 1024 );
|
||||||
|
|
||||||
|
if( argc == 0 )
|
||||||
|
{
|
||||||
|
usage:
|
||||||
|
printf( USAGE );
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
opt.mode = DFL_MODE;
|
||||||
|
opt.filename = DFL_FILENAME;
|
||||||
|
opt.debug_level = DFL_DEBUG_LEVEL;
|
||||||
|
|
||||||
|
for( i = 1; i < argc; i++ )
|
||||||
|
{
|
||||||
|
n = strlen( argv[i] );
|
||||||
|
|
||||||
|
for( j = 0; j < n; j++ )
|
||||||
|
{
|
||||||
|
if( argv[i][j] >= 'A' && argv[i][j] <= 'Z' )
|
||||||
|
argv[i][j] |= 0x20;
|
||||||
|
}
|
||||||
|
|
||||||
|
p = argv[i];
|
||||||
|
if( ( q = strchr( p, '=' ) ) == NULL )
|
||||||
|
goto usage;
|
||||||
|
*q++ = '\0';
|
||||||
|
|
||||||
|
if( strcmp( p, "mode" ) == 0 )
|
||||||
|
{
|
||||||
|
if( strcmp( q, "private" ) == 0 )
|
||||||
|
opt.mode = MODE_PRIVATE;
|
||||||
|
else if( strcmp( q, "public" ) == 0 )
|
||||||
|
opt.mode = MODE_PUBLIC;
|
||||||
|
else
|
||||||
|
goto usage;
|
||||||
|
}
|
||||||
|
else if( strcmp( p, "filename" ) == 0 )
|
||||||
|
opt.filename = q;
|
||||||
|
else if( strcmp( p, "debug_level" ) == 0 )
|
||||||
|
{
|
||||||
|
opt.debug_level = atoi( q );
|
||||||
|
if( opt.debug_level < 0 || opt.debug_level > 65535 )
|
||||||
|
goto usage;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
goto usage;
|
||||||
|
}
|
||||||
|
|
||||||
|
if( opt.mode == MODE_PRIVATE )
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* 1.1. Load the key
|
||||||
|
*/
|
||||||
|
printf( "\n . Loading the private key ..." );
|
||||||
|
fflush( stdout );
|
||||||
|
|
||||||
|
ret = x509parse_keyfile( &rsa, opt.filename, NULL );
|
||||||
|
|
||||||
|
if( ret != 0 )
|
||||||
|
{
|
||||||
|
#ifdef POLARSSL_ERROR_C
|
||||||
|
error_strerror( ret, buf, 1024 );
|
||||||
|
#endif
|
||||||
|
printf( " failed\n ! x509parse_key returned %d - %s\n\n", ret, buf );
|
||||||
|
rsa_free( &rsa );
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
printf( " ok\n" );
|
||||||
|
|
||||||
|
/*
|
||||||
|
* 1.2 Print the key
|
||||||
|
*/
|
||||||
|
printf( " . Key information ...\n" );
|
||||||
|
mpi_write_file( "N: ", &rsa.N, 16, NULL );
|
||||||
|
mpi_write_file( "E: ", &rsa.E, 16, NULL );
|
||||||
|
mpi_write_file( "D: ", &rsa.D, 16, NULL );
|
||||||
|
mpi_write_file( "P: ", &rsa.P, 16, NULL );
|
||||||
|
mpi_write_file( "Q: ", &rsa.Q, 16, NULL );
|
||||||
|
mpi_write_file( "DP: ", &rsa.DP, 16, NULL );
|
||||||
|
mpi_write_file( "DQ: ", &rsa.DQ, 16, NULL );
|
||||||
|
mpi_write_file( "QP: ", &rsa.QP, 16, NULL );
|
||||||
|
}
|
||||||
|
else if( opt.mode == MODE_PUBLIC )
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* 1.1. Load the key
|
||||||
|
*/
|
||||||
|
printf( "\n . Loading the public key ..." );
|
||||||
|
fflush( stdout );
|
||||||
|
|
||||||
|
ret = x509parse_public_keyfile( &rsa, opt.filename );
|
||||||
|
|
||||||
|
if( ret != 0 )
|
||||||
|
{
|
||||||
|
#ifdef POLARSSL_ERROR_C
|
||||||
|
error_strerror( ret, buf, 1024 );
|
||||||
|
#endif
|
||||||
|
printf( " failed\n ! x509parse_public_key returned %d - %s\n\n", ret, buf );
|
||||||
|
rsa_free( &rsa );
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
printf( " ok\n" );
|
||||||
|
|
||||||
|
/*
|
||||||
|
* 1.2 Print the key
|
||||||
|
*/
|
||||||
|
printf( " . Key information ...\n" );
|
||||||
|
mpi_write_file( "N: ", &rsa.N, 16, NULL );
|
||||||
|
mpi_write_file( "E: ", &rsa.E, 16, NULL );
|
||||||
|
}
|
||||||
|
else
|
||||||
|
goto usage;
|
||||||
|
|
||||||
|
exit:
|
||||||
|
|
||||||
|
rsa_free( &rsa );
|
||||||
|
|
||||||
|
#ifdef WIN32
|
||||||
|
printf( " + Press Enter to exit this program.\n" );
|
||||||
|
fflush( stdout ); getchar();
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
|
#endif /* POLARSSL_BIGNUM_C && POLARSSL_RSA_C &&
|
||||||
|
POLARSSL_X509_PARSE_C && POLARSSL_FS_IO */
|
16
tests/data_files/format_gen.key
Normal file
16
tests/data_files/format_gen.key
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAMDRSzONESX4mSVT
|
||||||
|
J69o3x9vQanXcPNviljcwKgkrXkFah6hQUAhW+4jQLxtGb+LU47gE321JGtGNb5L
|
||||||
|
z1htjLULvc9SAplJ6OOcQUDhyFxI4o6FmUzorv49ytzH6x2IO7UOF44MyJIWGjG3
|
||||||
|
4fohS8EQaQjkBYW7kwM/vCVT8Bl9AgMBAAECgYBTqj0cSEi5li41kOh2Z2XxiOAQ
|
||||||
|
J0h+iNaaCmeaThfrnFrYoZXjktYF9cwANsLmZzlBlJ9Ae5oq5hMp2FFHCHn1z1U/
|
||||||
|
BiE3yF2AXNslL0p8lMO4qGxmt2iYdE3Z8comfkyttUJ5k9thLQzU/NWATP8EZGng
|
||||||
|
iTdEDFOW35cG26ccDQJBAPPoaiveAVN0JYxe2tYR8xb5qta89QGU6HDdTRiClap1
|
||||||
|
5rfph5d30MQggqf1tBTiDRKOSk7uN39xwGbMzz11+NcCQQDKYHXWAsN3QlmFQKTX
|
||||||
|
nm4G5xpl57P9U25wSC+NYOmFEieomD7YlbaBKBc0V5JNj2IqUt0EvXNh3LA5czd9
|
||||||
|
3pHLAkAioVgZvF6h07bVFE6r4EaMd4xbCt8ah2LtS2570WagmjbU2/JlfhyFDDyg
|
||||||
|
zlDwOhwzC0LfrBDzJlpz/hZamppnAkBswjIRdSK+sLWTWw47ojTXGNOi+EZOWcv8
|
||||||
|
I48Kl45nqT4O6OK9WpfeCUGPK5DAhdHnlOiaZ4Xejc9W0Ih96GLJAkBOzJE8nUU5
|
||||||
|
giUjLAxJoYepKlWh5tZsNDoGFg46+bHn9l1O6fX7tau0+jEz4tC6aA8R3HtUOrYv
|
||||||
|
hJ61gH8x3U5J
|
||||||
|
-----END PRIVATE KEY-----
|
6
tests/data_files/format_gen.pub
Normal file
6
tests/data_files/format_gen.pub
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDA0UszjREl+JklUyevaN8fb0Gp
|
||||||
|
13Dzb4pY3MCoJK15BWoeoUFAIVvuI0C8bRm/i1OO4BN9tSRrRjW+S89YbYy1C73P
|
||||||
|
UgKZSejjnEFA4chcSOKOhZlM6K7+Pcrcx+sdiDu1DheODMiSFhoxt+H6IUvBEGkI
|
||||||
|
5AWFu5MDP7wlU/AZfQIDAQAB
|
||||||
|
-----END PUBLIC KEY-----
|
BIN
tests/data_files/format_pkcs12.fmt
Normal file
BIN
tests/data_files/format_pkcs12.fmt
Normal file
Binary file not shown.
15
tests/data_files/format_rsa.key
Normal file
15
tests/data_files/format_rsa.key
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIICWwIBAAKBgQDA0UszjREl+JklUyevaN8fb0Gp13Dzb4pY3MCoJK15BWoeoUFA
|
||||||
|
IVvuI0C8bRm/i1OO4BN9tSRrRjW+S89YbYy1C73PUgKZSejjnEFA4chcSOKOhZlM
|
||||||
|
6K7+Pcrcx+sdiDu1DheODMiSFhoxt+H6IUvBEGkI5AWFu5MDP7wlU/AZfQIDAQAB
|
||||||
|
AoGAU6o9HEhIuZYuNZDodmdl8YjgECdIfojWmgpnmk4X65xa2KGV45LWBfXMADbC
|
||||||
|
5mc5QZSfQHuaKuYTKdhRRwh59c9VPwYhN8hdgFzbJS9KfJTDuKhsZrdomHRN2fHK
|
||||||
|
Jn5MrbVCeZPbYS0M1PzVgEz/BGRp4Ik3RAxTlt+XBtunHA0CQQDz6Gor3gFTdCWM
|
||||||
|
XtrWEfMW+arWvPUBlOhw3U0YgpWqdea36YeXd9DEIIKn9bQU4g0SjkpO7jd/ccBm
|
||||||
|
zM89dfjXAkEAymB11gLDd0JZhUCk155uBucaZeez/VNucEgvjWDphRInqJg+2JW2
|
||||||
|
gSgXNFeSTY9iKlLdBL1zYdywOXM3fd6RywJAIqFYGbxeodO21RROq+BGjHeMWwrf
|
||||||
|
Godi7Utue9FmoJo21NvyZX4chQw8oM5Q8DocMwtC36wQ8yZac/4WWpqaZwJAbMIy
|
||||||
|
EXUivrC1k1sOO6I01xjTovhGTlnL/COPCpeOZ6k+DujivVqX3glBjyuQwIXR55To
|
||||||
|
mmeF3o3PVtCIfehiyQJATsyRPJ1FOYIlIywMSaGHqSpVoebWbDQ6BhYOOvmx5/Zd
|
||||||
|
Tun1+7WrtPoxM+LQumgPEdx7VDq2L4SetYB/Md1OSQ==
|
||||||
|
-----END RSA PRIVATE KEY-----
|
27
tests/data_files/server2.key
Normal file
27
tests/data_files/server2.key
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEpAIBAAKCAQEAwU2j3efNHdEE10lyuJmsDnjkOjxKzzoTFtBa5M2jAIin7h5r
|
||||||
|
lqdStJDvLXJ6PiSa/LY0rCT1d+AmZIycsCh9odrqjObJHJa8/sEEUrM21KP64bF2
|
||||||
|
2JDBYbRmUjaiJlOqq3ReB30Zgtsq2B+g2Q0cLUlm91slc0boC4pPaQy1AJDh2oIQ
|
||||||
|
Zn2uVCuLZXmRoeJhw81ASQjuaAzxi4bSRr/QuKoRAx5/VqgaHkQYDw+Fi9qLRF7i
|
||||||
|
GMZiL8dmjfpd2H3zJ4kpAcWQDj8n8TDISg7v1t7HxydrxwU9esQCPJodPg/oNJhb
|
||||||
|
y3NLUpbYEaIsgIhpOVrTD7DeWS8Rx/fqEgEwlwIDAQABAoIBAQCXR0S8EIHFGORZ
|
||||||
|
++AtOg6eENxD+xVs0f1IeGz57Tjo3QnXX7VBZNdj+p1ECvhCE/G7XnkgU5hLZX+G
|
||||||
|
Z0jkz/tqJOI0vRSdLBbipHnWouyBQ4e/A1yIJdlBtqXxJ1KE/ituHRbNc4j4kL8Z
|
||||||
|
/r6pvwnTI0PSx2Eqs048YdS92LT6qAv4flbNDxMn2uY7s4ycS4Q8w1JXnCeaAnYm
|
||||||
|
WYI5wxO+bvRELR2Mcz5DmVnL8jRyml6l6582bSv5oufReFIbyPZbQWlXgYnpu6He
|
||||||
|
GTc7E1zKYQGG/9+DQUl/1vQuCPqQwny0tQoX2w5tdYpdMdVm+zkLtbajzdTviJJa
|
||||||
|
TWzL6lt5AoGBAN86+SVeJDcmQJcv4Eq6UhtRr4QGMiQMz0Sod6ettYxYzMgxtw28
|
||||||
|
CIrgpozCc+UaZJLo7UxvC6an85r1b2nKPCLQFaggJ0H4Q0J/sZOhBIXaoBzWxveK
|
||||||
|
nupceKdVxGsFi8CDy86DBfiyFivfBj+47BbaQzPBj7C4rK7UlLjab2rDAoGBAN2u
|
||||||
|
AM2gchoFiu4v1HFL8D7lweEpi6ZnMJjnEu/dEgGQJFjwdpLnPbsj4c75odQ4Gz8g
|
||||||
|
sw9lao9VVzbusoRE/JGI4aTdO0pATXyG7eG1Qu+5Yc1YGXcCrliA2xM9xx+d7f+s
|
||||||
|
mPzN+WIEg5GJDYZDjAzHG5BNvi/FfM1C9dOtjv2dAoGAF0t5KmwbjWHBhcVqO4Ic
|
||||||
|
BVvN3BIlc1ue2YRXEDlxY5b0r8N4XceMgKmW18OHApZxfl8uPDauWZLXOgl4uepv
|
||||||
|
whZC3EuWrSyyICNhLY21Ah7hbIEBPF3L3ZsOwC+UErL+dXWLdB56Jgy3gZaBeW7b
|
||||||
|
vDrEnocJbqCm7IukhXHOBK8CgYEAwqdHB0hqyNSzIOGY7v9abzB6pUdA3BZiQvEs
|
||||||
|
3LjHVd4HPJ2x0N8CgrBIWOE0q8+0hSMmeE96WW/7jD3fPWwCR5zlXknxBQsfv0gP
|
||||||
|
3BC5PR0Qdypz+d+9zfMf625kyit4T/hzwhDveZUzHnk1Cf+IG7Q+TOEnLnWAWBED
|
||||||
|
ISOWmrUCgYAFEmRxgwAc/u+D6t0syCwAYh6POtscq9Y0i9GyWk89NzgC4NdwwbBH
|
||||||
|
4AgahOxIxXx2gxJnq3yfkJfIjwf0s2DyP0kY2y6Ua1OeomPeY9mrIS4tCuDQ6LrE
|
||||||
|
TB6l9VGoxJL4fyHnZb8L5gGvnB1bbD8cL6YPaDiOhcRseC9vBiEuVg==
|
||||||
|
-----END RSA PRIVATE KEY-----
|
Loading…
Reference in a new issue