16f971622SJuan Castillo /* 2bb41eb7aSMasahiro Yamada * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved. 36f971622SJuan Castillo * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 56f971622SJuan Castillo */ 66f971622SJuan Castillo 76f971622SJuan Castillo #include <stdio.h> 86f971622SJuan Castillo #include <stdlib.h> 96f971622SJuan Castillo #include <string.h> 106f971622SJuan Castillo 116f971622SJuan Castillo #include <openssl/conf.h> 126f971622SJuan Castillo #include <openssl/err.h> 131f33ad4eSSoby Mathew #include <openssl/opensslv.h> 146f971622SJuan Castillo #include <openssl/pem.h> 156f971622SJuan Castillo #include <openssl/sha.h> 166f971622SJuan Castillo #include <openssl/x509v3.h> 176f971622SJuan Castillo 18bb41eb7aSMasahiro Yamada #if USE_TBBR_DEFS 19bb41eb7aSMasahiro Yamada #include <tbbr_oid.h> 20bb41eb7aSMasahiro Yamada #else 21bb41eb7aSMasahiro Yamada #include <platform_oid.h> 22bb41eb7aSMasahiro Yamada #endif 23bb41eb7aSMasahiro Yamada 246f971622SJuan Castillo #include "cert.h" 25ad2c1a9aSJuan Castillo #include "cmd_opt.h" 266f971622SJuan Castillo #include "debug.h" 276f971622SJuan Castillo #include "key.h" 286f971622SJuan Castillo #include "sha.h" 296f971622SJuan Castillo 306f971622SJuan Castillo #define SERIAL_RAND_BITS 64 311f33ad4eSSoby Mathew #define RSA_SALT_LEN 32 326f971622SJuan Castillo 336f971622SJuan Castillo int rand_serial(BIGNUM *b, ASN1_INTEGER *ai) 346f971622SJuan Castillo { 356f971622SJuan Castillo BIGNUM *btmp; 366f971622SJuan Castillo int ret = 0; 376f971622SJuan Castillo if (b) 386f971622SJuan Castillo btmp = b; 396f971622SJuan Castillo else 406f971622SJuan Castillo btmp = BN_new(); 416f971622SJuan Castillo 426f971622SJuan Castillo if (!btmp) 436f971622SJuan Castillo return 0; 446f971622SJuan Castillo 456f971622SJuan Castillo if (!BN_pseudo_rand(btmp, SERIAL_RAND_BITS, 0, 0)) 466f971622SJuan Castillo goto error; 476f971622SJuan Castillo if (ai && !BN_to_ASN1_INTEGER(btmp, ai)) 486f971622SJuan Castillo goto error; 496f971622SJuan Castillo 506f971622SJuan Castillo ret = 1; 516f971622SJuan Castillo 526f971622SJuan Castillo error: 536f971622SJuan Castillo 546f971622SJuan Castillo if (!b) 556f971622SJuan Castillo BN_free(btmp); 566f971622SJuan Castillo 576f971622SJuan Castillo return ret; 586f971622SJuan Castillo } 596f971622SJuan Castillo 606f971622SJuan Castillo int cert_add_ext(X509 *issuer, X509 *subject, int nid, char *value) 616f971622SJuan Castillo { 626f971622SJuan Castillo X509_EXTENSION *ex; 636f971622SJuan Castillo X509V3_CTX ctx; 646f971622SJuan Castillo 656f971622SJuan Castillo /* No configuration database */ 666f971622SJuan Castillo X509V3_set_ctx_nodb(&ctx); 676f971622SJuan Castillo 686f971622SJuan Castillo /* Set issuer and subject certificates in the context */ 696f971622SJuan Castillo X509V3_set_ctx(&ctx, issuer, subject, NULL, NULL, 0); 706f971622SJuan Castillo ex = X509V3_EXT_conf_nid(NULL, &ctx, nid, value); 716f971622SJuan Castillo if (!ex) { 726f971622SJuan Castillo ERR_print_errors_fp(stdout); 736f971622SJuan Castillo return 0; 746f971622SJuan Castillo } 756f971622SJuan Castillo 766f971622SJuan Castillo X509_add_ext(subject, ex, -1); 776f971622SJuan Castillo X509_EXTENSION_free(ex); 786f971622SJuan Castillo 796f971622SJuan Castillo return 1; 806f971622SJuan Castillo } 816f971622SJuan Castillo 82*a8eb286aSSoby Mathew int cert_new(int key_alg, cert_t *cert, int days, int ca, STACK_OF(X509_EXTENSION) * sk) 836f971622SJuan Castillo { 8455e291a4SJuan Castillo EVP_PKEY *pkey = keys[cert->key].key; 8555e291a4SJuan Castillo cert_t *issuer_cert = &certs[cert->issuer]; 8655e291a4SJuan Castillo EVP_PKEY *ikey = keys[issuer_cert->key].key; 8755e291a4SJuan Castillo X509 *issuer = issuer_cert->x; 88c893c733SMasahiro Yamada X509 *x; 89c893c733SMasahiro Yamada X509_EXTENSION *ex; 90c893c733SMasahiro Yamada X509_NAME *name; 91c893c733SMasahiro Yamada ASN1_INTEGER *sno; 921f33ad4eSSoby Mathew int i, num, rc = 0; 931f33ad4eSSoby Mathew EVP_MD_CTX mdCtx; 941f33ad4eSSoby Mathew EVP_PKEY_CTX *pKeyCtx = NULL; 956f971622SJuan Castillo 966f971622SJuan Castillo /* Create the certificate structure */ 976f971622SJuan Castillo x = X509_new(); 986f971622SJuan Castillo if (!x) { 996f971622SJuan Castillo return 0; 1006f971622SJuan Castillo } 1016f971622SJuan Castillo 1026f971622SJuan Castillo /* If we do not have a key, use the issuer key (the certificate will 1036f971622SJuan Castillo * become self signed). This happens in content certificates. */ 1046f971622SJuan Castillo if (!pkey) { 1056f971622SJuan Castillo pkey = ikey; 1066f971622SJuan Castillo } 1076f971622SJuan Castillo 1086f971622SJuan Castillo /* If we do not have an issuer certificate, use our own (the certificate 1096f971622SJuan Castillo * will become self signed) */ 1106f971622SJuan Castillo if (!issuer) { 1116f971622SJuan Castillo issuer = x; 1126f971622SJuan Castillo } 1136f971622SJuan Castillo 1141f33ad4eSSoby Mathew EVP_MD_CTX_init(&mdCtx); 115*a8eb286aSSoby Mathew 116*a8eb286aSSoby Mathew /* Sign the certificate with the issuer key */ 1171f33ad4eSSoby Mathew if (!EVP_DigestSignInit(&mdCtx, &pKeyCtx, EVP_sha256(), NULL, ikey)) { 1181f33ad4eSSoby Mathew ERR_print_errors_fp(stdout); 1191f33ad4eSSoby Mathew goto END; 1201f33ad4eSSoby Mathew } 1211f33ad4eSSoby Mathew 122*a8eb286aSSoby Mathew /* 123*a8eb286aSSoby Mathew * Set additional parameters if algorithm is RSA PSS. This is not 124*a8eb286aSSoby Mathew * required for RSA 1.5 or ECDSA. 125*a8eb286aSSoby Mathew */ 126*a8eb286aSSoby Mathew if (key_alg == KEY_ALG_RSA) { 1271f33ad4eSSoby Mathew if (!EVP_PKEY_CTX_set_rsa_padding(pKeyCtx, RSA_PKCS1_PSS_PADDING)) { 1281f33ad4eSSoby Mathew ERR_print_errors_fp(stdout); 1291f33ad4eSSoby Mathew goto END; 1301f33ad4eSSoby Mathew } 1311f33ad4eSSoby Mathew 1321f33ad4eSSoby Mathew if (!EVP_PKEY_CTX_set_rsa_pss_saltlen(pKeyCtx, RSA_SALT_LEN)) { 1331f33ad4eSSoby Mathew ERR_print_errors_fp(stdout); 1341f33ad4eSSoby Mathew goto END; 1351f33ad4eSSoby Mathew } 1361f33ad4eSSoby Mathew 1371f33ad4eSSoby Mathew if (!EVP_PKEY_CTX_set_rsa_mgf1_md(pKeyCtx, EVP_sha256())) { 1381f33ad4eSSoby Mathew ERR_print_errors_fp(stdout); 1391f33ad4eSSoby Mathew goto END; 1401f33ad4eSSoby Mathew } 141*a8eb286aSSoby Mathew } 1421f33ad4eSSoby Mathew 1436f971622SJuan Castillo /* x509.v3 */ 1446f971622SJuan Castillo X509_set_version(x, 2); 1456f971622SJuan Castillo 1466f971622SJuan Castillo /* Random serial number */ 1476f971622SJuan Castillo sno = ASN1_INTEGER_new(); 1486f971622SJuan Castillo rand_serial(NULL, sno); 1496f971622SJuan Castillo X509_set_serialNumber(x, sno); 1506f971622SJuan Castillo ASN1_INTEGER_free(sno); 1516f971622SJuan Castillo 1526f971622SJuan Castillo X509_gmtime_adj(X509_get_notBefore(x), 0); 1536f971622SJuan Castillo X509_gmtime_adj(X509_get_notAfter(x), (long)60*60*24*days); 1546f971622SJuan Castillo X509_set_pubkey(x, pkey); 1556f971622SJuan Castillo 1566f971622SJuan Castillo /* Subject name */ 1576f971622SJuan Castillo name = X509_get_subject_name(x); 1586f971622SJuan Castillo X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, 1596f971622SJuan Castillo (const unsigned char *)cert->cn, -1, -1, 0); 1606f971622SJuan Castillo X509_set_subject_name(x, name); 1616f971622SJuan Castillo 1626f971622SJuan Castillo /* Issuer name */ 1636f971622SJuan Castillo name = X509_get_issuer_name(x); 1646f971622SJuan Castillo X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, 16555e291a4SJuan Castillo (const unsigned char *)issuer_cert->cn, -1, -1, 0); 1666f971622SJuan Castillo X509_set_issuer_name(x, name); 1676f971622SJuan Castillo 1686f971622SJuan Castillo /* Add various extensions: standard extensions */ 1696f971622SJuan Castillo cert_add_ext(issuer, x, NID_subject_key_identifier, "hash"); 1706f971622SJuan Castillo cert_add_ext(issuer, x, NID_authority_key_identifier, "keyid:always"); 1716f971622SJuan Castillo if (ca) { 1726f971622SJuan Castillo cert_add_ext(issuer, x, NID_basic_constraints, "CA:TRUE"); 1736f971622SJuan Castillo cert_add_ext(issuer, x, NID_key_usage, "keyCertSign"); 1746f971622SJuan Castillo } else { 1756f971622SJuan Castillo cert_add_ext(issuer, x, NID_basic_constraints, "CA:FALSE"); 1766f971622SJuan Castillo } 1776f971622SJuan Castillo 1786f971622SJuan Castillo /* Add custom extensions */ 1796f971622SJuan Castillo if (sk != NULL) { 1806f971622SJuan Castillo num = sk_X509_EXTENSION_num(sk); 1816f971622SJuan Castillo for (i = 0; i < num; i++) { 1826f971622SJuan Castillo ex = sk_X509_EXTENSION_value(sk, i); 1836f971622SJuan Castillo X509_add_ext(x, ex, -1); 1846f971622SJuan Castillo } 1856f971622SJuan Castillo } 1866f971622SJuan Castillo 1871f33ad4eSSoby Mathew if (!X509_sign_ctx(x, &mdCtx)) { 1886f971622SJuan Castillo ERR_print_errors_fp(stdout); 1891f33ad4eSSoby Mathew goto END; 1906f971622SJuan Castillo } 1916f971622SJuan Castillo 1921f33ad4eSSoby Mathew /* X509 certificate signed successfully */ 1931f33ad4eSSoby Mathew rc = 1; 1946f971622SJuan Castillo cert->x = x; 1951f33ad4eSSoby Mathew 1961f33ad4eSSoby Mathew END: 1971f33ad4eSSoby Mathew EVP_MD_CTX_cleanup(&mdCtx); 1981f33ad4eSSoby Mathew return rc; 1996f971622SJuan Castillo } 200ad2c1a9aSJuan Castillo 201ad2c1a9aSJuan Castillo int cert_init(void) 202ad2c1a9aSJuan Castillo { 203159807e2SJuan Castillo cmd_opt_t cmd_opt; 204ad2c1a9aSJuan Castillo cert_t *cert; 205ad2c1a9aSJuan Castillo unsigned int i; 206ad2c1a9aSJuan Castillo 207ad2c1a9aSJuan Castillo for (i = 0; i < num_certs; i++) { 208ad2c1a9aSJuan Castillo cert = &certs[i]; 209159807e2SJuan Castillo cmd_opt.long_opt.name = cert->opt; 210159807e2SJuan Castillo cmd_opt.long_opt.has_arg = required_argument; 211159807e2SJuan Castillo cmd_opt.long_opt.flag = NULL; 212159807e2SJuan Castillo cmd_opt.long_opt.val = CMD_OPT_CERT; 213159807e2SJuan Castillo cmd_opt.help_msg = cert->help_msg; 214159807e2SJuan Castillo cmd_opt_add(&cmd_opt); 215ad2c1a9aSJuan Castillo } 216ad2c1a9aSJuan Castillo 217159807e2SJuan Castillo return 0; 218ad2c1a9aSJuan Castillo } 219ad2c1a9aSJuan Castillo 220ad2c1a9aSJuan Castillo cert_t *cert_get_by_opt(const char *opt) 221ad2c1a9aSJuan Castillo { 222c893c733SMasahiro Yamada cert_t *cert; 223ad2c1a9aSJuan Castillo unsigned int i; 224ad2c1a9aSJuan Castillo 225ad2c1a9aSJuan Castillo for (i = 0; i < num_certs; i++) { 226ad2c1a9aSJuan Castillo cert = &certs[i]; 227ad2c1a9aSJuan Castillo if (0 == strcmp(cert->opt, opt)) { 228ad2c1a9aSJuan Castillo return cert; 229ad2c1a9aSJuan Castillo } 230ad2c1a9aSJuan Castillo } 231ad2c1a9aSJuan Castillo 232ad2c1a9aSJuan Castillo return NULL; 233ad2c1a9aSJuan Castillo } 234