@@@ keys.retire-recov
[distorted-keys] / ktype.openssl
1 ### -*-sh-*-
2 ###
3 ### Key type for OpenSSL
4 ###
5 ### (c) 2015 Mark Wooding
6 ###
7
8 ###----- Licensing notice ---------------------------------------------------
9 ###
10 ### This file is part of the distorted.org.uk key management suite.
11 ###
12 ### distorted-keys is free software; you can redistribute it and/or modify
13 ### it under the terms of the GNU General Public License as published by
14 ### the Free Software Foundation; either version 2 of the License, or
15 ### (at your option) any later version.
16 ###
17 ### distorted-keys is distributed in the hope that it will be useful,
18 ### but WITHOUT ANY WARRANTY; without even the implied warranty of
19 ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 ### GNU General Public License for more details.
21 ###
22 ### You should have received a copy of the GNU General Public License
23 ### along with distorted-keys; if not, write to the Free Software Foundation,
24 ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25
26 R_OPT="$R_IDENT:$R_IDENT"
27 R_OPTSEQ="$R_OPT\([[:space:]][[:space:]]*$R_OPT\)*"
28
29 R_TYPE="[$R_IDENTCHARS[:space:]][$R_IDENTCHARS[:space:]]*"
30 R_BASE64="[a-zA-Z0-9+/]*=*"
31 R_PARAMS="$R_TYPE:$R_BASE64"
32
33 defprops k_props <<EOF
34 algorithm t $R_WORD
35 opts t $R_OPTSEQ
36 params t $R_PARAMS
37 fresh_params_p t $R_IDENT
38 cipher t $R_WORD
39 sig_opts t $R_OPTSEQ
40 enc_opts t $R_OPTSEQ
41 EOF
42
43 : ${kprop_cipher=aes-256-cbc}
44 : ${kprop_fresh_params_p=nil}; boolify kprop_fresh_params_p
45 have_opts_p=${kprop_opts+t}${kprop_opts-nil}
46 have_params_p=${kprop_params+t}${kprop_params-nil}
47 have_alg_p=${kprop_algorithm+t}${kprop_algorithm-nil}
48
49 pem_to_line () {
50 ## Read an OpenSSL PEM file from stdin and write a condensed one-line
51 ## version to stdout.
52 sed '/^-----BEGIN \(.*\)-----$/s//\1:/; /^-----END .*-----$/d' |
53 tr -d '\n'
54 }
55
56 line_to_pem () {
57 line=$1
58 ## Write to stdout an OpenSSL PEM file corresponding to LINE.
59
60 ty=${line%%:*}
61 echo "-----BEGIN $ty-----"
62 echo "${line#*:}" | fold -w64
63 echo "-----END $ty-----";
64 }
65
66 intersperse_opts () {
67 flag=$1 opts=$2
68
69 args= sep=
70 for i in $opts; do args="$args$sep$flag $i" sep=" "; done
71 echo "$args"
72 }
73
74 k_generate() {
75 base=$1 nub=$2
76
77 ## Convert the options into OpenSSL command-line options.
78 opts=$(intersperse_opts -pkeyopt "$kprop_opts")
79
80 ## Prepare our ducks, ensuring that they're collinear.
81 case $have_params_p,$have_alg_p,$kprop_fresh_params_p,$have_opts_p in
82 t,nil,nil,nil)
83 line_to_pem "$kprop_params" >$TMP/param
84 args="-paramfile $TMP/param"
85 ;;
86 nil,t,t,*)
87 openssl genpkey -genparam -algorithm $kprop_algorithm $opts >$TMP/param
88 args="-paramfile $TMP/param"
89 ;;
90 nil,t,nil,*)
91 args="-algorithm $kprop_algorithm $opts"
92 ;;
93 *)
94 echo >&2 "$quis: invalid combination of properties"
95 exit 1
96 ;;
97 esac
98
99 ## Generate the private key.
100 openssl -cipher $kprop_cipher -pass file:"$nub" -out "$base/priv"
101
102 ## Extract the public key.
103 openssl -passin file:"$nub" -in "$base/priv" -pubout "$base/pub"
104 }
105
106 k_encrypt () {
107 base=$1
108
109 openssl pkeyutl -encrypt -pubin -inkey "$base/pub" \
110 $(intersperse_opts -pkeyopt "$kprop_enc_opts")
111 }
112
113 k_decrypt () {
114 base=$1 nub=$2
115
116 openssl pkeyutl -decrypt -passin file:"$nub" -inkey "$base/priv"
117 }
118
119 k_sign () {
120 base=$1 nub=$2
121
122 openssl pkeyutl -sign -passin file:"$nub" -inkey "$base/priv" \
123 $(intersperse_opts -pkeyopt "$kprop_sig_opts") >$TMP/sig
124 pem_to_line <$TMP/sig
125 }
126
127 k_verify () {
128 base=$1 sig=$3
129
130 line_to_pem "$3" >$TMP/sig
131 openssl pkeyutl -verify -pubin -inkey "$base/pub" -sigfile $TMP/sig
132 }
133
134 ###----- That's all, folks --------------------------------------------------