px5g-wolfssl.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372
  1. // Copyright 2020 Paul Spooren <[email protected]>
  2. //
  3. // SPDX-License-Identifier: GPL-2.0-or-later
  4. #define _GNU_SOURCE
  5. #include <stdbool.h>
  6. #include <stdint.h>
  7. #include <stdio.h>
  8. #include <string.h>
  9. #include <wolfssl/options.h>
  10. #include <wolfssl/wolfcrypt/asn.h>
  11. #include <wolfssl/wolfcrypt/asn_public.h>
  12. #include <wolfssl/wolfcrypt/ecc.h>
  13. #include <wolfssl/wolfcrypt/error-crypt.h>
  14. #include <wolfssl/wolfcrypt/rsa.h>
  15. #include <wolfssl/wolfcrypt/settings.h>
  16. #define HEAP_HINT NULL
  17. #define FOURK_SZ 4096
  18. #define WOLFSSL_MIN_RSA_BITS 2048
  19. enum {
  20. EC_KEY_TYPE = 0,
  21. RSA_KEY_TYPE = 1,
  22. };
  23. int write_file(byte *buf, int bufSz, char *path) {
  24. int ret;
  25. FILE *file;
  26. if (path) {
  27. file = fopen(path, "wb");
  28. if (file == NULL) {
  29. perror("Error opening file");
  30. exit(1);
  31. }
  32. } else {
  33. file = stdout;
  34. }
  35. ret = (int)fwrite(buf, 1, bufSz, file);
  36. if (path) {
  37. fclose(file);
  38. }
  39. if (ret > 0) {
  40. /* ret > 0 indicates a successful file write, set to zero for return */
  41. ret = 0;
  42. }
  43. return ret;
  44. }
  45. int write_key(ecc_key *ecKey, RsaKey *rsaKey, int type, int keySz, char *fName,
  46. bool write_pem) {
  47. int ret;
  48. byte der[FOURK_SZ] = {};
  49. byte pem[FOURK_SZ] = {};
  50. int derSz, pemSz;
  51. if (type == EC_KEY_TYPE) {
  52. ret = wc_EccKeyToDer(ecKey, der, sizeof(der));
  53. } else {
  54. ret = wc_RsaKeyToDer(rsaKey, der, sizeof(der));
  55. }
  56. if (ret <= 0) {
  57. fprintf(stderr, "Key To DER failed: %d\n", ret);
  58. }
  59. derSz = ret;
  60. if (write_pem) {
  61. if (type == EC_KEY_TYPE) {
  62. ret = wc_DerToPem(der, derSz, pem, sizeof(pem), ECC_PRIVATEKEY_TYPE);
  63. } else {
  64. ret = wc_DerToPem(der, derSz, pem, sizeof(pem), PRIVATEKEY_TYPE);
  65. }
  66. if (ret <= 0) {
  67. fprintf(stderr, "DER to PEM failed: %d\n", ret);
  68. }
  69. pemSz = ret;
  70. ret = write_file(pem, pemSz, fName);
  71. } else {
  72. ret = write_file(der, derSz, fName);
  73. }
  74. return ret;
  75. }
  76. int gen_key(WC_RNG *rng, ecc_key *ecKey, RsaKey *rsaKey, int type, int keySz,
  77. long exp, int curve) {
  78. int ret;
  79. if (type == EC_KEY_TYPE) {
  80. ret = wc_ecc_init(ecKey);
  81. (void)rsaKey;
  82. } else {
  83. ret = wc_InitRsaKey(rsaKey, NULL);
  84. (void)ecKey;
  85. }
  86. if (ret != 0) {
  87. fprintf(stderr, "Key initialization failed: %d\n", ret);
  88. return ret;
  89. }
  90. if (type == EC_KEY_TYPE) {
  91. fprintf(stderr, "Generating EC private key\n");
  92. ret = wc_ecc_make_key_ex(rng, 32, ecKey, curve);
  93. } else {
  94. fprintf(stderr, "Generating RSA private key, %i bit long modulus\n", keySz);
  95. ret = wc_MakeRsaKey(rsaKey, keySz, WC_RSA_EXPONENT, rng);
  96. }
  97. if (ret != 0) {
  98. fprintf(stderr, "Key generation failed: %d\n", ret);
  99. }
  100. return ret;
  101. }
  102. int selfsigned(WC_RNG *rng, char **arg) {
  103. ecc_key ecKey;
  104. RsaKey rsaKey;
  105. int ret;
  106. char *subject = "";
  107. int keySz = WOLFSSL_MIN_RSA_BITS;
  108. int type = EC_KEY_TYPE;
  109. int exp = WC_RSA_EXPONENT;
  110. int curve = ECC_SECP256R1;
  111. unsigned int days = 3653; // 10 years
  112. char *keypath = NULL, *certpath = NULL;
  113. char fstr[20], tstr[20];
  114. bool pem = true;
  115. Cert newCert;
  116. #ifdef __USE_TIME_BITS64
  117. time_t to, from = time(NULL);
  118. #else
  119. unsigned long to, from = time(NULL);
  120. #endif
  121. byte derBuf[FOURK_SZ] = {};
  122. byte pemBuf[FOURK_SZ] = {};
  123. int pemSz = -1;
  124. int derSz = -1;
  125. char *key, *val, *tmp;
  126. ret = wc_InitCert(&newCert);
  127. if (ret != 0) {
  128. fprintf(stderr, "Init Cert failed: %d\n", ret);
  129. return ret;
  130. }
  131. newCert.isCA = 0;
  132. while (*arg && **arg == '-') {
  133. if (!strcmp(*arg, "-der")) {
  134. pem = false;
  135. } else if (!strcmp(*arg, "-newkey") && arg[1]) {
  136. if (!strncmp(arg[1], "rsa:", 4)) {
  137. type = RSA_KEY_TYPE;
  138. keySz = atoi(arg[1] + 4);
  139. } else if (!strcmp(arg[1], "ec")) {
  140. type = EC_KEY_TYPE;
  141. } else {
  142. fprintf(stderr, "error: invalid algorithm\n");
  143. return 1;
  144. }
  145. arg++;
  146. } else if (!strcmp(*arg, "-days") && arg[1]) {
  147. days = (unsigned int)atoi(arg[1]);
  148. arg++;
  149. } else if (!strcmp(*arg, "-pkeyopt") && arg[1]) {
  150. if (strncmp(arg[1], "ec_paramgen_curve:", 18)) {
  151. fprintf(stderr, "error: invalid pkey option: %s\n", arg[1]);
  152. return 1;
  153. }
  154. if (!strcmp(arg[1] + 18, "P-256")) {
  155. curve = ECC_SECP256R1;
  156. } else if (!strcmp(arg[1] + 18, "P-384")) {
  157. curve = ECC_SECP384R1;
  158. } else if (!strcmp(arg[1] + 18, "P-521")) {
  159. curve = ECC_SECP521R1;
  160. } else {
  161. fprintf(stderr, "error: invalid curve name: %s\n", arg[1] + 18);
  162. return 1;
  163. }
  164. arg++;
  165. } else if (!strcmp(*arg, "-keyout") && arg[1]) {
  166. keypath = arg[1];
  167. arg++;
  168. } else if (!strcmp(*arg, "-out") && arg[1]) {
  169. certpath = arg[1];
  170. arg++;
  171. } else if (!strcmp(*arg, "-subj") && arg[1]) {
  172. subject = strdupa(arg[1]);
  173. key = arg[1];
  174. do {
  175. tmp = strchr(key, '/');
  176. if (tmp)
  177. *tmp = '\0';
  178. val = strchr(key, '=');
  179. if (val) {
  180. *val = '\0';
  181. ++val;
  182. if (!strcmp(key, "C"))
  183. strncpy(newCert.subject.country, val, CTC_NAME_SIZE);
  184. else if (!strcmp(key, "ST"))
  185. strncpy(newCert.subject.state, val, CTC_NAME_SIZE);
  186. else if (!strcmp(key, "L"))
  187. strncpy(newCert.subject.locality, val, CTC_NAME_SIZE);
  188. else if (!strcmp(key, "O"))
  189. strncpy(newCert.subject.org, val, CTC_NAME_SIZE);
  190. else if (!strcmp(key, "OU"))
  191. strncpy(newCert.subject.unit, val, CTC_NAME_SIZE);
  192. else if (!strcmp(key, "CN")) {
  193. strncpy(newCert.subject.commonName, val, CTC_NAME_SIZE);
  194. #ifdef WOLFSSL_ALT_NAMES
  195. if(strlen(val) + 2 > 256) {
  196. fprintf(stderr, "error: CN is too long: %s\n", val);
  197. return 1;
  198. }
  199. newCert.altNames[0] = 0x30; //Sequence with one element
  200. newCert.altNames[1] = strlen(val) + 2; // Length of entire sequence
  201. newCert.altNames[2] = 0x82; //8 - String, 2 - DNS Name
  202. newCert.altNames[3] = strlen(val); //DNS Name length
  203. memcpy(newCert.altNames + 4, val, strlen(val)); //DNS Name
  204. newCert.altNamesSz = strlen(val) + 4;
  205. #endif
  206. }
  207. else if (!strcmp(key, "EMAIL"))
  208. strncpy(newCert.subject.email, val, CTC_NAME_SIZE);
  209. else
  210. printf("warning: unknown attribute %s=%s\n", key, val);
  211. }
  212. } while (tmp && (key = ++tmp));
  213. }
  214. arg++;
  215. }
  216. newCert.daysValid = days;
  217. newCert.keyUsage = KEYUSE_DIGITAL_SIG | KEYUSE_CONTENT_COMMIT | KEYUSE_KEY_ENCIPHER;
  218. newCert.extKeyUsage = EXTKEYUSE_SERVER_AUTH;
  219. gen_key(rng, &ecKey, &rsaKey, type, keySz, exp, curve);
  220. write_key(&ecKey, &rsaKey, type, keySz, keypath, pem);
  221. from = (from < 1000000000) ? 1000000000 : from;
  222. strftime(fstr, sizeof(fstr), "%Y%m%d%H%M%S", gmtime(&from));
  223. to = from + 60 * 60 * 24 * days;
  224. if (to < from)
  225. to = INT_MAX;
  226. strftime(tstr, sizeof(tstr), "%Y%m%d%H%M%S", gmtime(&to));
  227. fprintf(stderr,
  228. "Generating selfsigned certificate with subject '%s'"
  229. " and validity %s-%s\n",
  230. subject, fstr, tstr);
  231. if (type == EC_KEY_TYPE) {
  232. newCert.sigType = CTC_SHA256wECDSA;
  233. ret = wc_MakeCert(&newCert, derBuf, sizeof(derBuf), NULL, &ecKey, rng);
  234. } else {
  235. newCert.sigType = CTC_SHA256wRSA;
  236. ret = wc_MakeCert(&newCert, derBuf, sizeof(derBuf), &rsaKey, NULL, rng);
  237. }
  238. if (ret <= 0) {
  239. fprintf(stderr, "Make Cert failed: %d\n", ret);
  240. return ret;
  241. }
  242. if (type == EC_KEY_TYPE) {
  243. ret = wc_SignCert(newCert.bodySz, newCert.sigType, derBuf, sizeof(derBuf),
  244. NULL, &ecKey, rng);
  245. } else {
  246. ret = wc_SignCert(newCert.bodySz, newCert.sigType, derBuf, sizeof(derBuf),
  247. &rsaKey, NULL, rng);
  248. }
  249. if (ret <= 0) {
  250. fprintf(stderr, "Sign Cert failed: %d\n", ret);
  251. return ret;
  252. }
  253. derSz = ret;
  254. ret = wc_DerToPem(derBuf, derSz, pemBuf, sizeof(pemBuf), CERT_TYPE);
  255. if (ret <= 0) {
  256. fprintf(stderr, "DER to PEM failed: %d\n", ret);
  257. return ret;
  258. }
  259. pemSz = ret;
  260. ret = write_file(pemBuf, pemSz, certpath);
  261. if (ret != 0) {
  262. fprintf(stderr, "Write Cert failed: %d\n", ret);
  263. return ret;
  264. }
  265. if (type == EC_KEY_TYPE) {
  266. wc_ecc_free(&ecKey);
  267. } else {
  268. wc_FreeRsaKey(&rsaKey);
  269. }
  270. return 0;
  271. }
  272. int dokey(WC_RNG *rng, int type, char **arg) {
  273. ecc_key ecKey;
  274. RsaKey rsaKey;
  275. int ret;
  276. int curve = ECC_SECP256R1;
  277. int keySz = WOLFSSL_MIN_RSA_BITS;
  278. int exp = WC_RSA_EXPONENT;
  279. char *path = NULL;
  280. bool pem = true;
  281. while (*arg && **arg == '-') {
  282. if (!strcmp(*arg, "-out") && arg[1]) {
  283. path = arg[1];
  284. arg++;
  285. } else if (!strcmp(*arg, "-3")) {
  286. exp = 3;
  287. } else if (!strcmp(*arg, "-der")) {
  288. pem = false;
  289. }
  290. arg++;
  291. }
  292. if (*arg && type == RSA_KEY_TYPE) {
  293. keySz = atoi(*arg);
  294. } else if (*arg) {
  295. if (!strcmp(*arg, "P-256")) {
  296. curve = ECC_SECP256R1;
  297. } else if (!strcmp(*arg, "P-384")) {
  298. curve = ECC_SECP384R1;
  299. } else if (!strcmp(*arg, "P-521")) {
  300. curve = ECC_SECP521R1;
  301. } else {
  302. fprintf(stderr, "Invalid Curve Name: %s\n", *arg);
  303. return 1;
  304. }
  305. }
  306. ret = gen_key(rng, &ecKey, &rsaKey, type, keySz, exp, curve);
  307. if (ret != 0)
  308. return ret;
  309. ret = write_key(&ecKey, &rsaKey, type, keySz, path, pem);
  310. if (type == EC_KEY_TYPE) {
  311. wc_ecc_free(&ecKey);
  312. } else {
  313. wc_FreeRsaKey(&rsaKey);
  314. }
  315. return ret;
  316. }
  317. int main(int argc, char *argv[]) {
  318. int ret;
  319. WC_RNG rng;
  320. ret = wc_InitRng(&rng);
  321. if (ret != 0) {
  322. fprintf(stderr, "Init Rng failed: %d\n", ret);
  323. return ret;
  324. }
  325. if (argv[1]) {
  326. if (!strcmp(argv[1], "eckey"))
  327. return dokey(&rng, EC_KEY_TYPE, argv + 2);
  328. if (!strcmp(argv[1], "rsakey"))
  329. return dokey(&rng, RSA_KEY_TYPE, argv + 2);
  330. if (!strcmp(argv[1], "selfsigned"))
  331. return selfsigned(&rng, argv + 2);
  332. }
  333. fprintf(stderr, "PX5G X.509 Certificate Generator Utilit using WolfSSL\n\n");
  334. fprintf(stderr, "Usage: [eckey|rsakey|selfsigned]\n");
  335. return 1;
  336. }