1 /* 2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved. 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions are met: 6 * 7 * Redistributions of source code must retain the above copyright notice, this 8 * list of conditions and the following disclaimer. 9 * 10 * Redistributions in binary form must reproduce the above copyright notice, 11 * this list of conditions and the following disclaimer in the documentation 12 * and/or other materials provided with the distribution. 13 * 14 * Neither the name of ARM nor the names of its contributors may be used 15 * to endorse or promote products derived from this software without specific 16 * prior written permission. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28 * POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31 #include <getopt.h> 32 #include <stdio.h> 33 #include <stdlib.h> 34 #include <string.h> 35 36 #include <openssl/conf.h> 37 #include <openssl/evp.h> 38 #include <openssl/pem.h> 39 40 #include "cert.h" 41 #include "cmd_opt.h" 42 #include "debug.h" 43 #include "key.h" 44 #include "platform_oid.h" 45 #include "sha.h" 46 47 #define MAX_FILENAME_LEN 1024 48 49 /* 50 * Create a new key container 51 */ 52 static int key_new(key_t *key) 53 { 54 /* Create key pair container */ 55 key->key = EVP_PKEY_new(); 56 if (key->key == NULL) { 57 return 0; 58 } 59 60 return 1; 61 } 62 63 static int key_create_rsa(key_t *key) 64 { 65 RSA *rsa = NULL; 66 67 rsa = RSA_generate_key(RSA_KEY_BITS, RSA_F4, NULL, NULL); 68 if (rsa == NULL) { 69 printf("Cannot create RSA key\n"); 70 goto err; 71 } 72 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { 73 printf("Cannot assign RSA key\n"); 74 goto err; 75 } 76 77 return 1; 78 err: 79 RSA_free(rsa); 80 return 0; 81 } 82 83 #ifndef OPENSSL_NO_EC 84 static int key_create_ecdsa(key_t *key) 85 { 86 EC_KEY *ec = NULL; 87 88 ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1); 89 if (ec == NULL) { 90 printf("Cannot create EC key\n"); 91 goto err; 92 } 93 if (!EC_KEY_generate_key(ec)) { 94 printf("Cannot generate EC key\n"); 95 goto err; 96 } 97 EC_KEY_set_flags(ec, EC_PKEY_NO_PARAMETERS); 98 EC_KEY_set_asn1_flag(ec, OPENSSL_EC_NAMED_CURVE); 99 if (!EVP_PKEY_assign_EC_KEY(key->key, ec)) { 100 printf("Cannot assign EC key\n"); 101 goto err; 102 } 103 104 return 1; 105 err: 106 EC_KEY_free(ec); 107 return 0; 108 } 109 #endif /* OPENSSL_NO_EC */ 110 111 typedef int (*key_create_fn_t)(key_t *key); 112 static const key_create_fn_t key_create_fn[KEY_ALG_MAX_NUM] = { 113 key_create_rsa, 114 #ifndef OPENSSL_NO_EC 115 key_create_ecdsa, 116 #endif /* OPENSSL_NO_EC */ 117 }; 118 119 int key_create(key_t *key, int type) 120 { 121 if (type >= KEY_ALG_MAX_NUM) { 122 printf("Invalid key type\n"); 123 return 0; 124 } 125 126 /* Create OpenSSL key container */ 127 if (!key_new(key)) { 128 return 0; 129 } 130 131 if (key_create_fn[type]) { 132 return key_create_fn[type](key); 133 } 134 135 return 0; 136 } 137 138 int key_load(key_t *key, unsigned int *err_code) 139 { 140 FILE *fp = NULL; 141 EVP_PKEY *k = NULL; 142 143 /* Create OpenSSL key container */ 144 if (!key_new(key)) { 145 *err_code = KEY_ERR_MALLOC; 146 return 0; 147 } 148 149 if (key->fn) { 150 /* Load key from file */ 151 fp = fopen(key->fn, "r"); 152 if (fp) { 153 k = PEM_read_PrivateKey(fp, &key->key, NULL, NULL); 154 fclose(fp); 155 if (k) { 156 *err_code = KEY_ERR_NONE; 157 return 1; 158 } else { 159 ERROR("Cannot load key from %s\n", key->fn); 160 *err_code = KEY_ERR_LOAD; 161 } 162 } else { 163 WARN("Cannot open file %s\n", key->fn); 164 *err_code = KEY_ERR_OPEN; 165 } 166 } else { 167 WARN("Key filename not specified\n"); 168 *err_code = KEY_ERR_FILENAME; 169 } 170 171 return 0; 172 } 173 174 int key_store(key_t *key) 175 { 176 FILE *fp = NULL; 177 178 if (key->fn) { 179 fp = fopen(key->fn, "w"); 180 if (fp) { 181 PEM_write_PrivateKey(fp, key->key, 182 NULL, NULL, 0, NULL, NULL); 183 fclose(fp); 184 return 1; 185 } else { 186 ERROR("Cannot create file %s\n", key->fn); 187 } 188 } else { 189 ERROR("Key filename not specified\n"); 190 } 191 192 return 0; 193 } 194 195 int key_init(void) 196 { 197 cmd_opt_t cmd_opt; 198 key_t *key; 199 int rc = 0; 200 unsigned int i; 201 202 for (i = 0; i < num_keys; i++) { 203 key = &keys[i]; 204 if (key->opt != NULL) { 205 cmd_opt.long_opt.name = key->opt; 206 cmd_opt.long_opt.has_arg = required_argument; 207 cmd_opt.long_opt.flag = NULL; 208 cmd_opt.long_opt.val = CMD_OPT_KEY; 209 cmd_opt.help_msg = key->help_msg; 210 cmd_opt_add(&cmd_opt); 211 } 212 } 213 214 return rc; 215 } 216 217 key_t *key_get_by_opt(const char *opt) 218 { 219 key_t *key = NULL; 220 unsigned int i; 221 222 /* Sequential search. This is not a performance concern since the number 223 * of keys is bounded and the code runs on a host machine */ 224 for (i = 0; i < num_keys; i++) { 225 key = &keys[i]; 226 if (0 == strcmp(key->opt, opt)) { 227 return key; 228 } 229 } 230 231 return NULL; 232 } 233