blob: a118fbbb816fb2d3e318ccbb91bdd46c457b0d94 [file] [log] [blame]
Juan Castillo11abdcd2014-10-21 11:30:42 +01001/*
2 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Juan Castillo11abdcd2014-10-21 11:30:42 +01005 */
6
7#include <getopt.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11
12#include <openssl/conf.h>
13#include <openssl/evp.h>
14#include <openssl/pem.h>
15
16#include "cert.h"
Juan Castillo1218dd52015-07-03 16:23:16 +010017#include "cmd_opt.h"
Juan Castillo11abdcd2014-10-21 11:30:42 +010018#include "debug.h"
19#include "key.h"
20#include "platform_oid.h"
21#include "sha.h"
22
23#define MAX_FILENAME_LEN 1024
24
25/*
Juan Castillof9f39c32015-06-01 16:34:23 +010026 * Create a new key container
Juan Castillo11abdcd2014-10-21 11:30:42 +010027 */
Masahiro Yamadabccb1092017-02-06 21:15:01 +090028int key_new(key_t *key)
Juan Castillo11abdcd2014-10-21 11:30:42 +010029{
Juan Castillo11abdcd2014-10-21 11:30:42 +010030 /* Create key pair container */
Juan Castillof9f39c32015-06-01 16:34:23 +010031 key->key = EVP_PKEY_new();
32 if (key->key == NULL) {
Juan Castillo11abdcd2014-10-21 11:30:42 +010033 return 0;
34 }
35
Juan Castillof9f39c32015-06-01 16:34:23 +010036 return 1;
37}
38
Juan Castilloa2224ab2015-06-30 13:36:57 +010039static int key_create_rsa(key_t *key)
Juan Castillof9f39c32015-06-01 16:34:23 +010040{
Masahiro Yamada48cb5e52017-02-06 19:47:44 +090041 RSA *rsa;
Juan Castillof9f39c32015-06-01 16:34:23 +010042
Juan Castilloa2224ab2015-06-30 13:36:57 +010043 rsa = RSA_generate_key(RSA_KEY_BITS, RSA_F4, NULL, NULL);
44 if (rsa == NULL) {
45 printf("Cannot create RSA key\n");
Juan Castillof9f39c32015-06-01 16:34:23 +010046 goto err;
47 }
Juan Castilloa2224ab2015-06-30 13:36:57 +010048 if (!EVP_PKEY_assign_RSA(key->key, rsa)) {
49 printf("Cannot assign RSA key\n");
Juan Castillof9f39c32015-06-01 16:34:23 +010050 goto err;
Juan Castillo11abdcd2014-10-21 11:30:42 +010051 }
52
Juan Castillof9f39c32015-06-01 16:34:23 +010053 return 1;
Juan Castillof9f39c32015-06-01 16:34:23 +010054err:
55 RSA_free(rsa);
Juan Castilloa2224ab2015-06-30 13:36:57 +010056 return 0;
57}
58
59#ifndef OPENSSL_NO_EC
60static int key_create_ecdsa(key_t *key)
61{
Masahiro Yamada48cb5e52017-02-06 19:47:44 +090062 EC_KEY *ec;
Juan Castilloa2224ab2015-06-30 13:36:57 +010063
64 ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
65 if (ec == NULL) {
66 printf("Cannot create EC key\n");
67 goto err;
68 }
69 if (!EC_KEY_generate_key(ec)) {
70 printf("Cannot generate EC key\n");
71 goto err;
72 }
73 EC_KEY_set_flags(ec, EC_PKEY_NO_PARAMETERS);
74 EC_KEY_set_asn1_flag(ec, OPENSSL_EC_NAMED_CURVE);
75 if (!EVP_PKEY_assign_EC_KEY(key->key, ec)) {
76 printf("Cannot assign EC key\n");
77 goto err;
78 }
79
80 return 1;
81err:
Juan Castillof9f39c32015-06-01 16:34:23 +010082 EC_KEY_free(ec);
Juan Castilloa2224ab2015-06-30 13:36:57 +010083 return 0;
84}
85#endif /* OPENSSL_NO_EC */
86
87typedef int (*key_create_fn_t)(key_t *key);
88static const key_create_fn_t key_create_fn[KEY_ALG_MAX_NUM] = {
89 key_create_rsa,
90#ifndef OPENSSL_NO_EC
91 key_create_ecdsa,
92#endif /* OPENSSL_NO_EC */
93};
94
95int key_create(key_t *key, int type)
96{
97 if (type >= KEY_ALG_MAX_NUM) {
98 printf("Invalid key type\n");
99 return 0;
100 }
101
Juan Castilloa2224ab2015-06-30 13:36:57 +0100102 if (key_create_fn[type]) {
103 return key_create_fn[type](key);
104 }
Juan Castillof9f39c32015-06-01 16:34:23 +0100105
Juan Castillo11abdcd2014-10-21 11:30:42 +0100106 return 0;
107}
108
Juan Castillof9f39c32015-06-01 16:34:23 +0100109int key_load(key_t *key, unsigned int *err_code)
Juan Castillo11abdcd2014-10-21 11:30:42 +0100110{
Masahiro Yamada48cb5e52017-02-06 19:47:44 +0900111 FILE *fp;
112 EVP_PKEY *k;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100113
Juan Castillo11abdcd2014-10-21 11:30:42 +0100114 if (key->fn) {
115 /* Load key from file */
116 fp = fopen(key->fn, "r");
117 if (fp) {
Juan Castillof9f39c32015-06-01 16:34:23 +0100118 k = PEM_read_PrivateKey(fp, &key->key, NULL, NULL);
Juan Castillo11abdcd2014-10-21 11:30:42 +0100119 fclose(fp);
120 if (k) {
Juan Castillof9f39c32015-06-01 16:34:23 +0100121 *err_code = KEY_ERR_NONE;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100122 return 1;
123 } else {
Juan Castillof9f39c32015-06-01 16:34:23 +0100124 ERROR("Cannot load key from %s\n", key->fn);
125 *err_code = KEY_ERR_LOAD;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100126 }
127 } else {
Juan Castillof9f39c32015-06-01 16:34:23 +0100128 WARN("Cannot open file %s\n", key->fn);
129 *err_code = KEY_ERR_OPEN;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100130 }
131 } else {
Juan Castillof9f39c32015-06-01 16:34:23 +0100132 WARN("Key filename not specified\n");
133 *err_code = KEY_ERR_FILENAME;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100134 }
135
Juan Castillo11abdcd2014-10-21 11:30:42 +0100136 return 0;
137}
138
139int key_store(key_t *key)
140{
Masahiro Yamada48cb5e52017-02-06 19:47:44 +0900141 FILE *fp;
Juan Castillo11abdcd2014-10-21 11:30:42 +0100142
143 if (key->fn) {
144 fp = fopen(key->fn, "w");
145 if (fp) {
146 PEM_write_PrivateKey(fp, key->key,
147 NULL, NULL, 0, NULL, NULL);
148 fclose(fp);
149 return 1;
150 } else {
151 ERROR("Cannot create file %s\n", key->fn);
152 }
153 } else {
154 ERROR("Key filename not specified\n");
155 }
156
157 return 0;
158}
Juan Castillo1218dd52015-07-03 16:23:16 +0100159
160int key_init(void)
161{
Juan Castillo212f7382015-12-15 16:37:57 +0000162 cmd_opt_t cmd_opt;
Juan Castillo1218dd52015-07-03 16:23:16 +0100163 key_t *key;
Juan Castillo1218dd52015-07-03 16:23:16 +0100164 unsigned int i;
165
166 for (i = 0; i < num_keys; i++) {
167 key = &keys[i];
168 if (key->opt != NULL) {
Juan Castillo212f7382015-12-15 16:37:57 +0000169 cmd_opt.long_opt.name = key->opt;
170 cmd_opt.long_opt.has_arg = required_argument;
171 cmd_opt.long_opt.flag = NULL;
172 cmd_opt.long_opt.val = CMD_OPT_KEY;
173 cmd_opt.help_msg = key->help_msg;
174 cmd_opt_add(&cmd_opt);
Juan Castillo1218dd52015-07-03 16:23:16 +0100175 }
176 }
177
Masahiro Yamada48cb5e52017-02-06 19:47:44 +0900178 return 0;
Juan Castillo1218dd52015-07-03 16:23:16 +0100179}
180
181key_t *key_get_by_opt(const char *opt)
182{
Masahiro Yamada48cb5e52017-02-06 19:47:44 +0900183 key_t *key;
Juan Castillo1218dd52015-07-03 16:23:16 +0100184 unsigned int i;
185
186 /* Sequential search. This is not a performance concern since the number
187 * of keys is bounded and the code runs on a host machine */
188 for (i = 0; i < num_keys; i++) {
189 key = &keys[i];
190 if (0 == strcmp(key->opt, opt)) {
191 return key;
192 }
193 }
194
195 return NULL;
196}