root/usr.bin/openssl/pkcs12.c
/* $OpenBSD: pkcs12.c,v 1.31 2025/11/27 08:26:32 tb Exp $ */
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 * project.
 */
/* ====================================================================
 * Copyright (c) 1999-2006 The OpenSSL Project.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 *
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in
 *    the documentation and/or other materials provided with the
 *    distribution.
 *
 * 3. All advertising materials mentioning features or use of this
 *    software must display the following acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 *
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 *    endorse or promote products derived from this software without
 *    prior written permission. For written permission, please contact
 *    licensing@OpenSSL.org.
 *
 * 5. Products derived from this software may not be called "OpenSSL"
 *    nor may "OpenSSL" appear in their names without prior written
 *    permission of the OpenSSL Project.
 *
 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 * ====================================================================
 *
 * This product includes cryptographic software written by Eric Young
 * (eay@cryptsoft.com).  This product includes software written by Tim
 * Hudson (tjh@cryptsoft.com).
 *
 */

#include <openssl/opensslconf.h>

#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#include "apps.h"

#include <openssl/crypto.h>
#include <openssl/err.h>
#include <openssl/pem.h>
#include <openssl/pkcs12.h>
#include <openssl/x509.h>

#define NOKEYS          0x1
#define NOCERTS         0x2
#define INFO            0x4
#define CLCERTS         0x8
#define CACERTS         0x10

static int get_cert_chain(X509 *cert, X509_STORE *store,
    STACK_OF(X509) **chain);
static int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
    int options, char *pempass);
static int dump_certs_pkeys_bags(BIO *out, const STACK_OF(PKCS12_SAFEBAG) *bags,
    char *pass, int passlen, int options, char *pempass);
static int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass,
    int passlen, int options, char *pempass);
static int print_attribs(BIO *out, const STACK_OF(X509_ATTRIBUTE) *attrlst,
    const char *name);
static int alg_print(BIO *x, const X509_ALGOR *alg);
static int set_pbe(BIO *err, int *ppbe, const char *str);

static struct {
        char *CAfile;
        STACK_OF(OPENSSL_STRING) *canames;
        char *CApath;
        int cert_pbe;
        char *certfile;
        int chain;
        const EVP_CIPHER *enc;
        int export_cert;
        int key_pbe;
        char *keyname;
        int keytype;
        char *infile;
        int iter;
        char *macalg;
        int maciter;
        int macver;
        char *name;
        int noprompt;
        int options;
        char *outfile;
        char *passarg;
        char *passargin;
        char *passargout;
        int twopass;
} cfg;

static int
pkcs12_opt_canames(char *arg)
{
        if (cfg.canames == NULL &&
            (cfg.canames = sk_OPENSSL_STRING_new_null()) == NULL)
                return (1);

        if (!sk_OPENSSL_STRING_push(cfg.canames, arg))
                return (1);

        return (0);
}

static int
pkcs12_opt_cert_pbe(char *arg)
{
        return (!set_pbe(bio_err, &cfg.cert_pbe, arg));
}

static int
pkcs12_opt_key_pbe(char *arg)
{
        return (!set_pbe(bio_err, &cfg.key_pbe, arg));
}

static int
pkcs12_opt_passarg(char *arg)
{
        cfg.passarg = arg;
        cfg.noprompt = 1;
        return (0);
}

static const EVP_CIPHER *
get_cipher_by_name(char *name)
{
        if (name == NULL || strcmp(name, "") == 0)
                return (NULL);
#ifndef OPENSSL_NO_AES
        else if (strcmp(name, "aes128") == 0)
                return EVP_aes_128_cbc();
        else if (strcmp(name, "aes192") == 0)
                return EVP_aes_192_cbc();
        else if (strcmp(name, "aes256") == 0)
                return EVP_aes_256_cbc();
#endif
#ifndef OPENSSL_NO_CAMELLIA
        else if (strcmp(name, "camellia128") == 0)
                return EVP_camellia_128_cbc();
        else if (strcmp(name, "camellia192") == 0)
                return EVP_camellia_192_cbc();
        else if (strcmp(name, "camellia256") == 0)
                return EVP_camellia_256_cbc();
#endif
#ifndef OPENSSL_NO_DES
        else if (strcmp(name, "des") == 0)
                return EVP_des_cbc();
        else if (strcmp(name, "des3") == 0)
                return EVP_des_ede3_cbc();
#endif
#ifndef OPENSSL_NO_IDEA
        else if (strcmp(name, "idea") == 0)
                return EVP_idea_cbc();
#endif
        else
                return (NULL);
}

static int
pkcs12_opt_enc(int argc, char **argv, int *argsused)
{
        char *name = argv[0];

        if (*name++ != '-')
                return (1);

        if (strcmp(name, "nodes") == 0)
                cfg.enc = NULL;
        else if ((cfg.enc = get_cipher_by_name(name)) == NULL)
                return (1);

        *argsused = 1;
        return (0);
}

static const struct option pkcs12_options[] = {
#ifndef OPENSSL_NO_AES
        {
                .name = "aes128",
                .desc = "Encrypt PEM output with CBC AES",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "aes192",
                .desc = "Encrypt PEM output with CBC AES",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "aes256",
                .desc = "Encrypt PEM output with CBC AES",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
#endif
#ifndef OPENSSL_NO_CAMELLIA
        {
                .name = "camellia128",
                .desc = "Encrypt PEM output with CBC Camellia",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "camellia192",
                .desc = "Encrypt PEM output with CBC Camellia",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "camellia256",
                .desc = "Encrypt PEM output with CBC Camellia",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
#endif
        {
                .name = "des",
                .desc = "Encrypt private keys with DES",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "des3",
                .desc = "Encrypt private keys with triple DES (default)",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
#ifndef OPENSSL_NO_IDEA
        {
                .name = "idea",
                .desc = "Encrypt private keys with IDEA",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
#endif
        {
                .name = "cacerts",
                .desc = "Only output CA certificates",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = CACERTS,
        },
        {
                .name = "CAfile",
                .argname = "file",
                .desc = "PEM format file of CA certificates",
                .type = OPTION_ARG,
                .opt.arg = &cfg.CAfile,
        },
        {
                .name = "caname",
                .argname = "name",
                .desc = "Use name as CA friendly name (can be used more than once)",
                .type = OPTION_ARG_FUNC,
                .opt.argfunc = pkcs12_opt_canames,
        },
        {
                .name = "CApath",
                .argname = "directory",
                .desc = "PEM format directory of CA certificates",
                .type = OPTION_ARG,
                .opt.arg = &cfg.CApath,
        },
        {
                .name = "certfile",
                .argname = "file",
                .desc = "Add all certs in file",
                .type = OPTION_ARG,
                .opt.arg = &cfg.certfile,
        },
        {
                .name = "certpbe",
                .argname = "alg",
                .desc = "Specify certificate PBE algorithm (default RC2-40)",
                .type = OPTION_ARG_FUNC,
                .opt.argfunc = pkcs12_opt_cert_pbe,
        },
        {
                .name = "chain",
                .desc = "Add certificate chain",
                .type = OPTION_FLAG,
                .opt.flag = &cfg.chain,
        },
        {
                .name = "clcerts",
                .desc = "Only output client certificates",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = CLCERTS,
        },
        {
                .name = "descert",
                .desc = "Encrypt PKCS#12 certificates with triple DES (default RC2-40)",
                .type = OPTION_VALUE,
                .opt.value = &cfg.cert_pbe,
                .value = NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
        },
        {
                .name = "export",
                .desc = "Output PKCS#12 file",
                .type = OPTION_FLAG,
                .opt.flag = &cfg.export_cert,
        },
        {
                .name = "in",
                .argname = "file",
                .desc = "Input filename",
                .type = OPTION_ARG,
                .opt.arg = &cfg.infile,
        },
        {
                .name = "info",
                .desc = "Give info about PKCS#12 structure",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = INFO,
        },
        {
                .name = "inkey",
                .argname = "file",
                .desc = "Private key if not infile",
                .type = OPTION_ARG,
                .opt.arg = &cfg.keyname,
        },
        {
                .name = "keyex",
                .desc = "Set MS key exchange type",
                .type = OPTION_VALUE,
                .opt.value = &cfg.keytype,
                .value = KEY_EX,
        },
        {
                .name = "keypbe",
                .argname = "alg",
                .desc = "Specify private key PBE algorithm (default 3DES)",
                .type = OPTION_ARG_FUNC,
                .opt.argfunc = pkcs12_opt_key_pbe,
        },
        {
                .name = "keysig",
                .desc = "Set MS key signature type",
                .type = OPTION_VALUE,
                .opt.value = &cfg.keytype,
                .value = KEY_SIG,
        },
        {
                .name = "macalg",
                .argname = "alg",
                .desc = "Digest algorithm used in MAC (default SHA1)",
                .type = OPTION_ARG,
                .opt.arg = &cfg.macalg,
        },
        {
                .name = "maciter",
                .desc = "Use MAC iteration",
                .type = OPTION_VALUE,
                .opt.value = &cfg.maciter,
                .value = PKCS12_DEFAULT_ITER,
        },
        {
                .name = "name",
                .argname = "name",
                .desc = "Use name as friendly name",
                .type = OPTION_ARG,
                .opt.arg = &cfg.name,
        },
        {
                .name = "nocerts",
                .desc = "Don't output certificates",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = NOCERTS,
        },
        {
                .name = "nodes",
                .desc = "Don't encrypt private keys",
                .type = OPTION_ARGV_FUNC,
                .opt.argvfunc = pkcs12_opt_enc,
        },
        {
                .name = "noiter",
                .desc = "Don't use encryption iteration",
                .type = OPTION_VALUE,
                .opt.value = &cfg.iter,
                .value = 1,
        },
        {
                .name = "nokeys",
                .desc = "Don't output private keys",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = NOKEYS,
        },
        {
                .name = "nomac",
                .desc = "Don't generate MAC",
                .type = OPTION_VALUE,
                .opt.value = &cfg.maciter,
                .value = -1,
        },
        {
                .name = "nomaciter",
                .desc = "Don't use MAC iteration",
                .type = OPTION_VALUE,
                .opt.value = &cfg.maciter,
                .value = 1,
        },
        {
                .name = "nomacver",
                .desc = "Don't verify MAC",
                .type = OPTION_VALUE,
                .opt.value = &cfg.macver,
                .value = 0,
        },
        {
                .name = "noout",
                .desc = "Don't output anything, just verify",
                .type = OPTION_VALUE_OR,
                .opt.value = &cfg.options,
                .value = (NOKEYS | NOCERTS),
        },
        {
                .name = "out",
                .argname = "file",
                .desc = "Output filename",
                .type = OPTION_ARG,
                .opt.arg = &cfg.outfile,
        },
        {
                .name = "passin",
                .argname = "arg",
                .desc = "Input file passphrase source",
                .type = OPTION_ARG,
                .opt.arg = &cfg.passargin,
        },
        {
                .name = "passout",
                .argname = "arg",
                .desc = "Output file passphrase source",
                .type = OPTION_ARG,
                .opt.arg = &cfg.passargout,
        },
        {
                .name = "password",
                .argname = "arg",
                .desc = "Set import/export password source",
                .type = OPTION_ARG_FUNC,
                .opt.argfunc = pkcs12_opt_passarg,
        },
        {
                .name = "twopass",
                .desc = "Separate MAC, encryption passwords",
                .type = OPTION_FLAG,
                .opt.flag = &cfg.twopass,
        },
        { NULL },
};

static void
pkcs12_usage(void)
{
        fprintf(stderr, "usage: pkcs12 [-aes128 | -aes192 | -aes256 |");
        fprintf(stderr, " -camellia128 |\n");
        fprintf(stderr, "    -camellia192 | -camellia256 | -des | -des3 |");
        fprintf(stderr, " -idea]\n");
        fprintf(stderr, "    [-cacerts] [-CAfile file] [-caname name]\n");
        fprintf(stderr, "    [-CApath directory] [-certfile file]");
        fprintf(stderr, " [-certpbe alg]\n");
        fprintf(stderr, "    [-chain] [-clcerts] [-CSP name] [-descert]");
        fprintf(stderr, " [-export]\n");
        fprintf(stderr, "    [-in file] [-info] [-inkey file] [-keyex]");
        fprintf(stderr, " [-keypbe alg]\n");
        fprintf(stderr, "    [-keysig] [-LMK] [-macalg alg] [-maciter]");
        fprintf(stderr, " [-name name]\n");
        fprintf(stderr, "    [-nocerts] [-nodes] [-noiter] [-nokeys]");
        fprintf(stderr, " [-nomac]\n");
        fprintf(stderr, "    [-nomaciter] [-nomacver] [-noout] [-out file]\n");
        fprintf(stderr, "    [-passin arg] [-passout arg] [-password arg]");
        fprintf(stderr, " [-twopass]\n\n");
        options_usage(pkcs12_options);
        fprintf(stderr, "\n");
}

int
pkcs12_main(int argc, char **argv)
{
        BIO *in = NULL, *out = NULL;
        PKCS12 *p12 = NULL;
        char pass[50], macpass[50];
        int ret = 1;
        char *cpass = NULL, *mpass = NULL;
        char *passin = NULL, *passout = NULL;

        if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
                perror("pledge");
                exit(1);
        }

        memset(&cfg, 0, sizeof(cfg));
        cfg.cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
        cfg.enc = EVP_des_ede3_cbc();
        cfg.iter = PKCS12_DEFAULT_ITER;
        cfg.key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
        cfg.maciter = PKCS12_DEFAULT_ITER;
        cfg.macver = 1;

        if (options_parse(argc, argv, pkcs12_options, NULL, NULL) != 0) {
                pkcs12_usage();
                goto end;
        }

        if (cfg.passarg != NULL) {
                if (cfg.export_cert)
                        cfg.passargout = cfg.passarg;
                else
                        cfg.passargin = cfg.passarg;
        }
        if (!app_passwd(bio_err, cfg.passargin,
            cfg.passargout, &passin, &passout)) {
                BIO_printf(bio_err, "Error getting passwords\n");
                goto end;
        }
        if (cpass == NULL) {
                if (cfg.export_cert)
                        cpass = passout;
                else
                        cpass = passin;
        }
        if (cpass != NULL) {
                mpass = cpass;
                cfg.noprompt = 1;
        } else {
                cpass = pass;
                mpass = macpass;
        }

        if (cfg.infile == NULL)
                in = BIO_new_fp(stdin, BIO_NOCLOSE);
        else
                in = BIO_new_file(cfg.infile, "rb");
        if (in == NULL) {
                BIO_printf(bio_err, "Error opening input file %s\n",
                    cfg.infile ? cfg.infile : "<stdin>");
                perror(cfg.infile);
                goto end;
        }

        if (cfg.outfile == NULL) {
                out = BIO_new_fp(stdout, BIO_NOCLOSE);
        } else
                out = BIO_new_file(cfg.outfile, "wb");
        if (out == NULL) {
                BIO_printf(bio_err, "Error opening output file %s\n",
                    cfg.outfile ? cfg.outfile : "<stdout>");
                perror(cfg.outfile);
                goto end;
        }
        if (cfg.twopass) {
                if (EVP_read_pw_string(macpass, sizeof macpass,
                    "Enter MAC Password:", cfg.export_cert)) {
                        BIO_printf(bio_err, "Can't read Password\n");
                        goto end;
                }
        }
        if (cfg.export_cert) {
                EVP_PKEY *key = NULL;
                X509 *ucert = NULL, *x = NULL;
                STACK_OF(X509) *certs = NULL;
                const EVP_MD *macmd = NULL;
                unsigned char *catmp = NULL;
                int i;

                if ((cfg.options & (NOCERTS | NOKEYS)) ==
                    (NOCERTS | NOKEYS)) {
                        BIO_printf(bio_err, "Nothing to do!\n");
                        goto export_end;
                }
                if (cfg.options & NOCERTS)
                        cfg.chain = 0;

                if (!(cfg.options & NOKEYS)) {
                        key = load_key(bio_err, cfg.keyname ?
                            cfg.keyname : cfg.infile,
                            FORMAT_PEM, 1, passin, "private key");
                        if (!key)
                                goto export_end;
                }

                /* Load in all certs in input file */
                if (!(cfg.options & NOCERTS)) {
                        certs = load_certs(bio_err, cfg.infile,
                            FORMAT_PEM, NULL, "certificates");
                        if (certs == NULL)
                                goto export_end;

                        if (key != NULL) {
                                /* Look for matching private key */
                                for (i = 0; i < sk_X509_num(certs); i++) {
                                        x = sk_X509_value(certs, i);
                                        if (X509_check_private_key(x, key)) {
                                                ucert = x;
                                                /* Zero keyid and alias */
                                                X509_keyid_set1(ucert, NULL, 0);
                                                X509_alias_set1(ucert, NULL, 0);
                                                /* Remove from list */
                                                (void) sk_X509_delete(certs, i);
                                                break;
                                        }
                                }
                                if (ucert == NULL) {
                                        BIO_printf(bio_err,
                                            "No certificate matches private key\n");
                                        goto export_end;
                                }
                        }
                }

                /* Add any more certificates asked for */
                if (cfg.certfile != NULL) {
                        STACK_OF(X509) *morecerts = NULL;
                        if ((morecerts = load_certs(bio_err,
                            cfg.certfile, FORMAT_PEM, NULL,
                            "certificates from certfile")) == NULL)
                                goto export_end;
                        while (sk_X509_num(morecerts) > 0) {
                                X509 *cert = sk_X509_shift(morecerts);

                                if (!sk_X509_push(certs, cert)) {
                                        X509_free(cert);
                                        sk_X509_pop_free(morecerts, X509_free);
                                        goto export_end;
                                }
                        }

                        sk_X509_free(morecerts);
                }


                /* If chaining get chain from user cert */
                if (cfg.chain) {
                        int vret;
                        STACK_OF(X509) *chain2;
                        X509_STORE *store = X509_STORE_new();
                        if (store == NULL) {
                                BIO_printf(bio_err,
                                    "Memory allocation error\n");
                                goto export_end;
                        }
                        if (!X509_STORE_load_locations(store,
                            cfg.CAfile, cfg.CApath))
                                X509_STORE_set_default_paths(store);

                        vret = get_cert_chain(ucert, store, &chain2);
                        X509_STORE_free(store);

                        if (vret == X509_V_OK) {
                                /* Exclude verified certificate */
                                X509_free(sk_X509_shift(chain2));

                                while (sk_X509_num(chain2) > 0) {
                                        X509 *cert = sk_X509_shift(chain2);

                                        if (!sk_X509_push(certs, cert)) {
                                                X509_free(cert);
                                                sk_X509_pop_free(chain2,
                                                    X509_free);
                                                goto export_end;
                                        }
                                }
                                sk_X509_free(chain2);
                        } else {
                                if (vret != X509_V_ERR_UNSPECIFIED)
                                        BIO_printf(bio_err,
                                            "Error %s getting chain.\n",
                                            X509_verify_cert_error_string(
                                            vret));
                                else
                                        ERR_print_errors(bio_err);
                                sk_X509_pop_free(chain2, X509_free);
                                goto export_end;
                        }
                }
                /* Add any CA names */

                for (i = 0; i < sk_OPENSSL_STRING_num(cfg.canames);
                    i++) {
                        catmp = (unsigned char *) sk_OPENSSL_STRING_value(
                            cfg.canames, i);
                        X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
                }

                if (!cfg.noprompt &&
                    EVP_read_pw_string(pass, sizeof pass,
                    "Enter Export Password:", 1)) {
                        BIO_printf(bio_err, "Can't read Password\n");
                        goto export_end;
                }
                if (!cfg.twopass)
                        strlcpy(macpass, pass, sizeof macpass);


                p12 = PKCS12_create(cpass, cfg.name, key, ucert,
                    certs, cfg.key_pbe, cfg.cert_pbe,
                    cfg.iter, -1, cfg.keytype);

                if (p12 == NULL) {
                        ERR_print_errors(bio_err);
                        goto export_end;
                }
                if (cfg.macalg != NULL) {
                        macmd = EVP_get_digestbyname(cfg.macalg);
                        if (macmd == NULL) {
                                BIO_printf(bio_err,
                                    "Unknown digest algorithm %s\n",
                                    cfg.macalg);
                        }
                }
                if (cfg.maciter != -1)
                        PKCS12_set_mac(p12, mpass, -1, NULL, 0,
                            cfg.maciter, macmd);

                i2d_PKCS12_bio(out, p12);

                ret = 0;

 export_end:
                EVP_PKEY_free(key);
                sk_X509_pop_free(certs, X509_free);
                X509_free(ucert);

                goto end;

        }
        if ((p12 = d2i_PKCS12_bio(in, NULL)) == NULL) {
                ERR_print_errors(bio_err);
                goto end;
        }
        if (!cfg.noprompt && EVP_read_pw_string(pass, sizeof pass,
            "Enter Import Password:", 0)) {
                BIO_printf(bio_err, "Can't read Password\n");
                goto end;
        }

        if (!cfg.twopass)
                strlcpy(macpass, pass, sizeof macpass);

        if ((cfg.options & INFO) != 0 && PKCS12_mac_present(p12)) {
                const ASN1_INTEGER *iter;

                PKCS12_get0_mac(NULL, NULL, NULL, &iter, p12);
                BIO_printf(bio_err, "MAC Iteration %ld\n",
                    iter != NULL ? ASN1_INTEGER_get(iter) : 1);
        }
        if (cfg.macver) {
                /* If we enter empty password try no password first */
                if (!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) {
                        /* If mac and crypto pass the same set it to NULL too */
                        if (!cfg.twopass)
                                cpass = NULL;
                } else if (!PKCS12_verify_mac(p12, mpass, -1)) {
                        BIO_printf(bio_err,
                            "Mac verify error: invalid password?\n");
                        ERR_print_errors(bio_err);
                        goto end;
                }
                BIO_printf(bio_err, "MAC verified OK\n");
        }
        if (!dump_certs_keys_p12(out, p12, cpass, -1, cfg.options,
            passout)) {
                BIO_printf(bio_err, "Error outputting keys and certificates\n");
                ERR_print_errors(bio_err);
                goto end;
        }
        ret = 0;
 end:
        PKCS12_free(p12);
        BIO_free(in);
        BIO_free_all(out);
        sk_OPENSSL_STRING_free(cfg.canames);
        free(passin);
        free(passout);

        return (ret);
}

static int
dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options,
    char *pempass)
{
        STACK_OF(PKCS7) *asafes = NULL;
        STACK_OF(PKCS12_SAFEBAG) *bags;
        int i, bagnid;
        int ret = 0;
        PKCS7 *p7;

        if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
                return 0;
        for (i = 0; i < sk_PKCS7_num(asafes); i++) {
                p7 = sk_PKCS7_value(asafes, i);
                bagnid = OBJ_obj2nid(p7->type);
                if (bagnid == NID_pkcs7_data) {
                        bags = PKCS12_unpack_p7data(p7);
                        if (options & INFO)
                                BIO_printf(bio_err, "PKCS7 Data\n");
                } else if (bagnid == NID_pkcs7_encrypted) {
                        if (options & INFO) {
                                BIO_printf(bio_err, "PKCS7 Encrypted data: ");
                                alg_print(bio_err,
                                    p7->d.encrypted->enc_data->algorithm);
                        }
                        bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
                } else
                        continue;
                if (bags == NULL)
                        goto err;
                if (!dump_certs_pkeys_bags(out, bags, pass, passlen,
                        options, pempass)) {
                        sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
                        goto err;
                }
                sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
                bags = NULL;
        }
        ret = 1;

 err:
        sk_PKCS7_pop_free(asafes, PKCS7_free);
        return ret;
}

static int
dump_certs_pkeys_bags(BIO *out, const STACK_OF(PKCS12_SAFEBAG) *bags,
    char *pass, int passlen, int options, char *pempass)
{
        int i;

        for (i = 0; i < sk_PKCS12_SAFEBAG_num(bags); i++) {
                if (!dump_certs_pkeys_bag(out,
                        sk_PKCS12_SAFEBAG_value(bags, i),
                        pass, passlen,
                        options, pempass))
                        return 0;
        }
        return 1;
}

static int
dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen,
    int options, char *pempass)
{
        EVP_PKEY *pkey;
        const STACK_OF(X509_ATTRIBUTE) *attrs;
        X509 *x509;

        attrs = PKCS12_SAFEBAG_get0_attrs(bag);

        switch (PKCS12_SAFEBAG_get_nid(bag)) {
        case NID_keyBag:
            {
                const PKCS8_PRIV_KEY_INFO *p8;

                if (options & INFO)
                        BIO_printf(bio_err, "Key bag\n");
                if (options & NOKEYS)
                        return 1;
                print_attribs(out, attrs, "Bag Attributes");
                if ((p8 = PKCS12_SAFEBAG_get0_p8inf(bag)) == NULL)
                        return 0;
                if ((pkey = EVP_PKCS82PKEY(p8)) == NULL)
                        return 0;
                print_attribs(out, PKCS8_pkey_get0_attrs(p8), "Key Attributes");
                PEM_write_bio_PrivateKey(out, pkey, cfg.enc, NULL, 0,
                    NULL, pempass);
                EVP_PKEY_free(pkey);
                break;
            }

        case NID_pkcs8ShroudedKeyBag:
            {
                PKCS8_PRIV_KEY_INFO *p8;

                if (options & INFO) {
                        const X509_SIG *tp8;
                        const X509_ALGOR *tp8alg;

                        BIO_printf(bio_err, "Shrouded Keybag: ");
                        if ((tp8 = PKCS12_SAFEBAG_get0_pkcs8(bag)) == NULL)
                                return 0;
                        X509_SIG_get0(tp8, &tp8alg, NULL);
                        alg_print(bio_err, tp8alg);
                }
                if (options & NOKEYS)
                        return 1;
                print_attribs(out, attrs, "Bag Attributes");
                if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL)
                        return 0;
                if ((pkey = EVP_PKCS82PKEY(p8)) == NULL) {
                        PKCS8_PRIV_KEY_INFO_free(p8);
                        return 0;
                }
                print_attribs(out, PKCS8_pkey_get0_attrs(p8), "Key Attributes");
                PKCS8_PRIV_KEY_INFO_free(p8);
                PEM_write_bio_PrivateKey(out, pkey, cfg.enc, NULL, 0,
                    NULL, pempass);
                EVP_PKEY_free(pkey);
                break;
            }

        case NID_certBag:
                if (options & INFO)
                        BIO_printf(bio_err, "Certificate bag\n");
                if (options & NOCERTS)
                        return 1;
                if (PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID) != NULL) {
                        if (options & CACERTS)
                                return 1;
                } else if (options & CLCERTS)
                        return 1;
                print_attribs(out, attrs, "Bag Attributes");
                if (PKCS12_SAFEBAG_get_bag_nid(bag) != NID_x509Certificate)
                        return 1;
                if ((x509 = PKCS12_certbag2x509(bag)) == NULL)
                        return 0;
                dump_cert_text(out, x509);
                PEM_write_bio_X509(out, x509);
                X509_free(x509);
                break;

        case NID_safeContentsBag:
                if (options & INFO)
                        BIO_printf(bio_err, "Safe Contents bag\n");
                print_attribs(out, attrs, "Bag Attributes");
                return dump_certs_pkeys_bags(out, PKCS12_SAFEBAG_get0_safes(bag),
                    pass, passlen, options, pempass);

        default:
                BIO_printf(bio_err, "Warning unsupported bag type: ");
                i2a_ASN1_OBJECT(bio_err, PKCS12_SAFEBAG_get0_type(bag));
                BIO_printf(bio_err, "\n");
                return 1;
                break;
        }
        return 1;
}

/* Given a single certificate return a verified chain or NULL if error */
static int
get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **out_chain)
{
        X509_STORE_CTX *store_ctx = NULL;
        STACK_OF(X509) *chain = NULL;
        int ret = X509_V_ERR_UNSPECIFIED;

        if ((store_ctx = X509_STORE_CTX_new()) == NULL)
                goto err;
        if (!X509_STORE_CTX_init(store_ctx, store, cert, NULL))
                goto err;

        if (X509_verify_cert(store_ctx) > 0) {
                if ((chain = X509_STORE_CTX_get1_chain(store_ctx)) == NULL)
                        goto err;
        }
        ret = X509_STORE_CTX_get_error(store_ctx);

 err:
        X509_STORE_CTX_free(store_ctx);
        *out_chain = chain;

        return ret;
}

static int
alg_print(BIO *x, const X509_ALGOR *alg)
{
        PBEPARAM *pbe = NULL;
        const ASN1_OBJECT *aobj;
        int param_type;
        const void *param;

        X509_ALGOR_get0(&aobj, &param_type, &param, alg);
        if (param_type == V_ASN1_SEQUENCE)
                pbe = ASN1_item_unpack(param, &PBEPARAM_it);
        if (pbe == NULL)
                return 1;
        BIO_printf(bio_err, "%s, Iteration %ld\n",
            OBJ_nid2ln(OBJ_obj2nid(aobj)),
            ASN1_INTEGER_get(pbe->iter));
        ASN1_item_free((ASN1_VALUE *)pbe, &PBEPARAM_it);
        return 1;
}

static void
hex_print(BIO *out, const ASN1_STRING *str)
{
        const unsigned char *buf = ASN1_STRING_get0_data(str);
        int len = ASN1_STRING_length(str);
        int i;

        for (i = 0; i < len; i++)
                BIO_printf(out, "%02X ", buf[i]);
}

/* Generalised attribute print: handle PKCS#8 and bag attributes */
static void
print_attribute(BIO *out, const ASN1_TYPE *av)
{
        char *value;

        switch (av->type) {
        case V_ASN1_BMPSTRING:
                value = OPENSSL_uni2asc(
                    ASN1_STRING_get0_data(av->value.bmpstring),
                    ASN1_STRING_length(av->value.bmpstring));
                BIO_printf(out, "%s\n", value != NULL ? value : "(null)");
                free(value);
                break;

        case V_ASN1_OCTET_STRING:
                hex_print(out, av->value.octet_string);
                BIO_printf(out, "\n");
                break;

        case V_ASN1_BIT_STRING:
                hex_print(out, av->value.bit_string);
                BIO_printf(out, "\n");
                break;

        default:
                BIO_printf(out, "<Unsupported tag %d>\n",
                    av->type);
                break;
        }
}

static int
print_attribs(BIO *out, const STACK_OF(X509_ATTRIBUTE) *attrlst,
    const char *name)
{
        X509_ATTRIBUTE *attr;
        ASN1_TYPE *av;
        int i, j, attr_nid;

        if (attrlst == NULL) {
                BIO_printf(out, "%s: <No Attributes>\n", name);
                return 1;
        }
        if (!sk_X509_ATTRIBUTE_num(attrlst)) {
                BIO_printf(out, "%s: <Empty Attributes>\n", name);
                return 1;
        }
        BIO_printf(out, "%s\n", name);
        for (i = 0; i < sk_X509_ATTRIBUTE_num(attrlst); i++) {
                ASN1_OBJECT *obj;

                attr = sk_X509_ATTRIBUTE_value(attrlst, i);
                obj = X509_ATTRIBUTE_get0_object(attr);
                attr_nid = OBJ_obj2nid(X509_ATTRIBUTE_get0_object(attr));
                BIO_printf(out, "    ");
                if (attr_nid == NID_undef) {
                        i2a_ASN1_OBJECT(out, obj);
                        BIO_printf(out, ": ");
                } else
                        BIO_printf(out, "%s: ", OBJ_nid2ln(attr_nid));

                if (X509_ATTRIBUTE_count(attr)) {
                        for (j = 0; j < X509_ATTRIBUTE_count(attr); j++) {
                                av = X509_ATTRIBUTE_get0_type(attr, j);
                                print_attribute(out, av);
                        }
                } else
                        BIO_printf(out, "<No Values>\n");
        }
        return 1;
}

static int
set_pbe(BIO *err, int *ppbe, const char *str)
{
        if (str == NULL)
                return 0;
        if (strcmp(str, "NONE") == 0) {
                *ppbe = -1;
                return 1;
        }
        *ppbe = OBJ_txt2nid(str);
        if (*ppbe == NID_undef) {
                BIO_printf(bio_err, "Unknown PBE algorithm %s\n", str);
                return 0;
        }
        return 1;
}

#endif