key.c 4.33 KB
Newer Older
1
/*
2
 * Copyright (c) 2015-2021, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
7
8
9
10
11
12
13
14
15
16
 */

#include <getopt.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#include <openssl/conf.h>
#include <openssl/evp.h>
#include <openssl/pem.h>

#include "cert.h"
17
#include "cmd_opt.h"
18
19
20
21
22
23
#include "debug.h"
#include "key.h"
#include "sha.h"

#define MAX_FILENAME_LEN		1024

24
25
26
key_t *keys;
unsigned int num_keys;

27
/*
28
 * Create a new key container
29
 */
30
int key_new(key_t *key)
31
32
{
	/* Create key pair container */
33
34
	key->key = EVP_PKEY_new();
	if (key->key == NULL) {
35
36
37
		return 0;
	}

38
39
40
	return 1;
}

41
static int key_create_rsa(key_t *key, int key_bits)
42
{
43
44
	BIGNUM *e;
	RSA *rsa = NULL;
45

46
47
48
49
50
51
52
53
54
55
56
57
	e = BN_new();
	if (e == NULL) {
		printf("Cannot create RSA exponent\n");
		goto err;
	}

	if (!BN_set_word(e, RSA_F4)) {
		printf("Cannot assign RSA exponent\n");
		goto err;
	}

	rsa = RSA_new();
58
59
	if (rsa == NULL) {
		printf("Cannot create RSA key\n");
60
		goto err;
61
	}
62

63
	if (!RSA_generate_key_ex(rsa, key_bits, e, NULL)) {
64
65
66
67
		printf("Cannot generate RSA key\n");
		goto err;
	}

68
69
	if (!EVP_PKEY_assign_RSA(key->key, rsa)) {
		printf("Cannot assign RSA key\n");
70
71
72
		goto err;
	}

73
	BN_free(e);
74
75
76
	return 1;
err:
	RSA_free(rsa);
77
	BN_free(e);
78
79
80
81
	return 0;
}

#ifndef OPENSSL_NO_EC
82
static int key_create_ecdsa(key_t *key, int key_bits)
83
{
84
	EC_KEY *ec;
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103

	ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
	if (ec == NULL) {
		printf("Cannot create EC key\n");
		goto err;
	}
	if (!EC_KEY_generate_key(ec)) {
		printf("Cannot generate EC key\n");
		goto err;
	}
	EC_KEY_set_flags(ec, EC_PKEY_NO_PARAMETERS);
	EC_KEY_set_asn1_flag(ec, OPENSSL_EC_NAMED_CURVE);
	if (!EVP_PKEY_assign_EC_KEY(key->key, ec)) {
		printf("Cannot assign EC key\n");
		goto err;
	}

	return 1;
err:
104
	EC_KEY_free(ec);
105
106
107
108
	return 0;
}
#endif /* OPENSSL_NO_EC */

109
typedef int (*key_create_fn_t)(key_t *key, int key_bits);
110
static const key_create_fn_t key_create_fn[KEY_ALG_MAX_NUM] = {
111
	key_create_rsa, 	/* KEY_ALG_RSA */
112
#ifndef OPENSSL_NO_EC
113
	key_create_ecdsa, 	/* KEY_ALG_ECDSA */
114
115
116
#endif /* OPENSSL_NO_EC */
};

117
int key_create(key_t *key, int type, int key_bits)
118
119
120
121
122
123
124
{
	if (type >= KEY_ALG_MAX_NUM) {
		printf("Invalid key type\n");
		return 0;
	}

	if (key_create_fn[type]) {
125
		return key_create_fn[type](key, key_bits);
126
	}
127

128
129
130
	return 0;
}

131
int key_load(key_t *key, unsigned int *err_code)
132
{
133
134
	FILE *fp;
	EVP_PKEY *k;
135
136
137
138
139

	if (key->fn) {
		/* Load key from file */
		fp = fopen(key->fn, "r");
		if (fp) {
140
			k = PEM_read_PrivateKey(fp, &key->key, NULL, NULL);
141
142
			fclose(fp);
			if (k) {
143
				*err_code = KEY_ERR_NONE;
144
145
				return 1;
			} else {
146
147
				ERROR("Cannot load key from %s\n", key->fn);
				*err_code = KEY_ERR_LOAD;
148
149
			}
		} else {
150
151
			WARN("Cannot open file %s\n", key->fn);
			*err_code = KEY_ERR_OPEN;
152
153
		}
	} else {
154
155
		WARN("Key filename not specified\n");
		*err_code = KEY_ERR_FILENAME;
156
157
158
159
160
161
162
	}

	return 0;
}

int key_store(key_t *key)
{
163
	FILE *fp;
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180

	if (key->fn) {
		fp = fopen(key->fn, "w");
		if (fp) {
			PEM_write_PrivateKey(fp, key->key,
					NULL, NULL, 0, NULL, NULL);
			fclose(fp);
			return 1;
		} else {
			ERROR("Cannot create file %s\n", key->fn);
		}
	} else {
		ERROR("Key filename not specified\n");
	}

	return 0;
}
181
182
183

int key_init(void)
{
184
	cmd_opt_t cmd_opt;
185
186
187
	key_t *key;
	unsigned int i;

188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
	keys = malloc((num_def_keys * sizeof(def_keys[0]))
#ifdef PDEF_KEYS
		      + (num_pdef_keys * sizeof(pdef_keys[0]))
#endif
		      );

	if (keys == NULL) {
		ERROR("%s:%d Failed to allocate memory.\n", __func__, __LINE__);
		return 1;
	}

	memcpy(&keys[0], &def_keys[0], (num_def_keys * sizeof(def_keys[0])));
#ifdef PDEF_KEYS
	memcpy(&keys[num_def_keys], &pdef_keys[0],
		(num_pdef_keys * sizeof(pdef_keys[0])));

	num_keys = num_def_keys + num_pdef_keys;
#else
	num_keys = num_def_keys;
#endif
		   ;

210
211
212
	for (i = 0; i < num_keys; i++) {
		key = &keys[i];
		if (key->opt != NULL) {
213
214
215
216
217
218
			cmd_opt.long_opt.name = key->opt;
			cmd_opt.long_opt.has_arg = required_argument;
			cmd_opt.long_opt.flag = NULL;
			cmd_opt.long_opt.val = CMD_OPT_KEY;
			cmd_opt.help_msg = key->help_msg;
			cmd_opt_add(&cmd_opt);
219
220
221
		}
	}

222
	return 0;
223
224
225
226
}

key_t *key_get_by_opt(const char *opt)
{
227
	key_t *key;
228
229
230
231
232
233
234
235
236
237
238
239
240
	unsigned int i;

	/* Sequential search. This is not a performance concern since the number
	 * of keys is bounded and the code runs on a host machine */
	for (i = 0; i < num_keys; i++) {
		key = &keys[i];
		if (0 == strcmp(key->opt, opt)) {
			return key;
		}
	}

	return NULL;
}