Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 1 | /* |
| 2 | * Certificate generation and signing |
| 3 | * |
Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 4 | * Copyright The Mbed TLS Contributors |
Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 5 | * SPDX-License-Identifier: Apache-2.0 |
| 6 | * |
| 7 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 8 | * not use this file except in compliance with the License. |
| 9 | * You may obtain a copy of the License at |
| 10 | * |
| 11 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | * |
| 13 | * Unless required by applicable law or agreed to in writing, software |
| 14 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 15 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | * See the License for the specific language governing permissions and |
| 17 | * limitations under the License. |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 18 | */ |
| 19 | |
Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 20 | #include "mbedtls/build_info.h" |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 21 | |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 22 | #include "mbedtls/platform.h" |
Rich Evans | f90016a | 2015-01-19 14:26:37 +0000 | [diff] [blame] | 23 | |
Simon Butcher | 203a693 | 2016-10-07 15:00:17 +0100 | [diff] [blame] | 24 | #if !defined(MBEDTLS_X509_CRT_WRITE_C) || \ |
| 25 | !defined(MBEDTLS_X509_CRT_PARSE_C) || !defined(MBEDTLS_FS_IO) || \ |
| 26 | !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_CTR_DRBG_C) || \ |
| 27 | !defined(MBEDTLS_ERROR_C) || !defined(MBEDTLS_SHA256_C) || \ |
| 28 | !defined(MBEDTLS_PEM_WRITE_C) |
Manuel Pégourié-Gonnard | 8d649c6 | 2015-03-31 15:10:03 +0200 | [diff] [blame] | 29 | int main( void ) |
| 30 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 31 | mbedtls_printf( "MBEDTLS_X509_CRT_WRITE_C and/or MBEDTLS_X509_CRT_PARSE_C and/or " |
Manuel Pégourié-Gonnard | d738965 | 2015-08-06 18:22:26 +0200 | [diff] [blame] | 32 | "MBEDTLS_FS_IO and/or MBEDTLS_SHA256_C and/or " |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 33 | "MBEDTLS_ENTROPY_C and/or MBEDTLS_CTR_DRBG_C and/or " |
| 34 | "MBEDTLS_ERROR_C not defined.\n"); |
Krzysztof Stachowiak | 5e1b195 | 2019-04-24 14:24:46 +0200 | [diff] [blame] | 35 | mbedtls_exit( 0 ); |
Manuel Pégourié-Gonnard | 8d649c6 | 2015-03-31 15:10:03 +0200 | [diff] [blame] | 36 | } |
| 37 | #else |
| 38 | |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 39 | #include "mbedtls/x509_crt.h" |
| 40 | #include "mbedtls/x509_csr.h" |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 41 | #include "mbedtls/oid.h" |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 42 | #include "mbedtls/entropy.h" |
| 43 | #include "mbedtls/ctr_drbg.h" |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 44 | #include "mbedtls/md.h" |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 45 | #include "mbedtls/error.h" |
Manuel Pégourié-Gonnard | 7831b0c | 2013-09-20 12:29:56 +0200 | [diff] [blame] | 46 | |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 47 | #include <stdio.h> |
| 48 | #include <stdlib.h> |
| 49 | #include <string.h> |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 50 | |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 51 | #define SET_OID(x, oid) \ |
| 52 | do { x.len = MBEDTLS_OID_SIZE(oid); x.p = (unsigned char*)oid; } while( 0 ) |
| 53 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 54 | #if defined(MBEDTLS_X509_CSR_PARSE_C) |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 55 | #define USAGE_CSR \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 56 | " request_file=%%s default: (empty)\n" \ |
| 57 | " If request_file is specified, subject_key,\n" \ |
| 58 | " subject_pwd and subject_name are ignored!\n" |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 59 | #else |
| 60 | #define USAGE_CSR "" |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 61 | #endif /* MBEDTLS_X509_CSR_PARSE_C */ |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 62 | |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 63 | #define FORMAT_PEM 0 |
| 64 | #define FORMAT_DER 1 |
| 65 | |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 66 | #define DFL_ISSUER_CRT "" |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 67 | #define DFL_REQUEST_FILE "" |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 68 | #define DFL_SUBJECT_KEY "subject.key" |
| 69 | #define DFL_ISSUER_KEY "ca.key" |
| 70 | #define DFL_SUBJECT_PWD "" |
| 71 | #define DFL_ISSUER_PWD "" |
| 72 | #define DFL_OUTPUT_FILENAME "cert.crt" |
Manuel Pégourié-Gonnard | 9169921 | 2015-01-22 16:26:39 +0000 | [diff] [blame] | 73 | #define DFL_SUBJECT_NAME "CN=Cert,O=mbed TLS,C=UK" |
| 74 | #define DFL_ISSUER_NAME "CN=CA,O=mbed TLS,C=UK" |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 75 | #define DFL_NOT_BEFORE "20010101000000" |
| 76 | #define DFL_NOT_AFTER "20301231235959" |
| 77 | #define DFL_SERIAL "1" |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 78 | #define DFL_SELFSIGN 0 |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 79 | #define DFL_IS_CA 0 |
| 80 | #define DFL_MAX_PATHLEN -1 |
Nicholas Wilson | 99a96b1 | 2015-09-10 18:28:01 +0100 | [diff] [blame] | 81 | #define DFL_SIG_ALG MBEDTLS_MD_SHA256 |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 82 | #define DFL_KEY_USAGE 0 |
Dave Rodgman | 1577c54 | 2022-09-09 10:22:15 +0100 | [diff] [blame] | 83 | #define DFL_EXT_KEY_USAGE NULL |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 84 | #define DFL_NS_CERT_TYPE 0 |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 85 | #define DFL_VERSION 3 |
| 86 | #define DFL_AUTH_IDENT 1 |
| 87 | #define DFL_SUBJ_IDENT 1 |
| 88 | #define DFL_CONSTRAINTS 1 |
| 89 | #define DFL_DIGEST MBEDTLS_MD_SHA256 |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 90 | #define DFL_FORMAT FORMAT_PEM |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 91 | |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 92 | #define USAGE \ |
| 93 | "\n usage: cert_write param=<>...\n" \ |
| 94 | "\n acceptable parameters:\n" \ |
| 95 | USAGE_CSR \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 96 | " subject_key=%%s default: subject.key\n" \ |
| 97 | " subject_pwd=%%s default: (empty)\n" \ |
| 98 | " subject_name=%%s default: CN=Cert,O=mbed TLS,C=UK\n" \ |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 99 | "\n" \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 100 | " issuer_crt=%%s default: (empty)\n" \ |
| 101 | " If issuer_crt is specified, issuer_name is\n" \ |
| 102 | " ignored!\n" \ |
| 103 | " issuer_name=%%s default: CN=CA,O=mbed TLS,C=UK\n" \ |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 104 | "\n" \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 105 | " selfsign=%%d default: 0 (false)\n" \ |
| 106 | " If selfsign is enabled, issuer_name and\n" \ |
| 107 | " issuer_key are required (issuer_crt and\n" \ |
| 108 | " subject_* are ignored\n" \ |
| 109 | " issuer_key=%%s default: ca.key\n" \ |
| 110 | " issuer_pwd=%%s default: (empty)\n" \ |
| 111 | " output_file=%%s default: cert.crt\n" \ |
| 112 | " serial=%%s default: 1\n" \ |
| 113 | " not_before=%%s default: 20010101000000\n"\ |
| 114 | " not_after=%%s default: 20301231235959\n"\ |
| 115 | " is_ca=%%d default: 0 (disabled)\n" \ |
| 116 | " max_pathlen=%%d default: -1 (none)\n" \ |
| 117 | " md=%%s default: SHA256\n" \ |
Gilles Peskine | 18292fe | 2020-08-21 20:42:32 +0200 | [diff] [blame] | 118 | " Supported values (if enabled):\n" \ |
TRodziewicz | 10e8cf5 | 2021-05-31 17:58:57 +0200 | [diff] [blame] | 119 | " MD5, RIPEMD160, SHA1,\n" \ |
Gilles Peskine | 18292fe | 2020-08-21 20:42:32 +0200 | [diff] [blame] | 120 | " SHA224, SHA256, SHA384, SHA512\n" \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 121 | " version=%%d default: 3\n" \ |
| 122 | " Possible values: 1, 2, 3\n"\ |
| 123 | " subject_identifier=%%s default: 1\n" \ |
| 124 | " Possible values: 0, 1\n" \ |
| 125 | " (Considered for v3 only)\n"\ |
| 126 | " authority_identifier=%%s default: 1\n" \ |
| 127 | " Possible values: 0, 1\n" \ |
| 128 | " (Considered for v3 only)\n"\ |
| 129 | " basic_constraints=%%d default: 1\n" \ |
| 130 | " Possible values: 0, 1\n" \ |
| 131 | " (Considered for v3 only)\n"\ |
| 132 | " key_usage=%%s default: (empty)\n" \ |
| 133 | " Comma-separated-list of values:\n" \ |
| 134 | " digital_signature\n" \ |
| 135 | " non_repudiation\n" \ |
| 136 | " key_encipherment\n" \ |
| 137 | " data_encipherment\n" \ |
| 138 | " key_agreement\n" \ |
| 139 | " key_cert_sign\n" \ |
| 140 | " crl_sign\n" \ |
| 141 | " (Considered for v3 only)\n"\ |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 142 | " ext_key_usage=%%s default: (empty)\n" \ |
| 143 | " Comma-separated-list of values:\n" \ |
| 144 | " serverAuth\n" \ |
| 145 | " clientAuth\n" \ |
| 146 | " codeSigning\n" \ |
| 147 | " emailProtection\n" \ |
| 148 | " timeStamping\n" \ |
| 149 | " OCSPSigning\n" \ |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 150 | " ns_cert_type=%%s default: (empty)\n" \ |
| 151 | " Comma-separated-list of values:\n" \ |
| 152 | " ssl_client\n" \ |
| 153 | " ssl_server\n" \ |
| 154 | " email\n" \ |
| 155 | " object_signing\n" \ |
| 156 | " ssl_ca\n" \ |
| 157 | " email_ca\n" \ |
| 158 | " object_signing_ca\n" \ |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 159 | " format=pem|der default: pem\n" \ |
Rich Evans | 18b78c7 | 2015-02-11 14:06:19 +0000 | [diff] [blame] | 160 | "\n" |
Manuel Pégourié-Gonnard | 6c5abfa | 2015-02-13 14:12:07 +0000 | [diff] [blame] | 161 | |
Simon Butcher | 63cb97e | 2018-12-06 17:43:31 +0000 | [diff] [blame] | 162 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 163 | /* |
| 164 | * global options |
| 165 | */ |
| 166 | struct options |
| 167 | { |
Paul Bakker | 8fc30b1 | 2013-11-25 13:29:43 +0100 | [diff] [blame] | 168 | const char *issuer_crt; /* filename of the issuer certificate */ |
| 169 | const char *request_file; /* filename of the certificate request */ |
| 170 | const char *subject_key; /* filename of the subject key file */ |
| 171 | const char *issuer_key; /* filename of the issuer key file */ |
| 172 | const char *subject_pwd; /* password for the subject key file */ |
| 173 | const char *issuer_pwd; /* password for the issuer key file */ |
Hanno Becker | 25d882b | 2018-08-23 15:26:06 +0100 | [diff] [blame] | 174 | const char *output_file; /* where to store the constructed CRT */ |
Paul Bakker | 8fc30b1 | 2013-11-25 13:29:43 +0100 | [diff] [blame] | 175 | const char *subject_name; /* subject name for certificate */ |
| 176 | const char *issuer_name; /* issuer name for certificate */ |
| 177 | const char *not_before; /* validity period not before */ |
| 178 | const char *not_after; /* validity period not after */ |
| 179 | const char *serial; /* serial number string */ |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 180 | int selfsign; /* selfsign the certificate */ |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 181 | int is_ca; /* is a CA certificate */ |
| 182 | int max_pathlen; /* maximum CA path length */ |
Hanno Becker | e1b1d0a | 2017-09-22 15:35:16 +0100 | [diff] [blame] | 183 | int authority_identifier; /* add authority identifier to CRT */ |
| 184 | int subject_identifier; /* add subject identifier to CRT */ |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 185 | int basic_constraints; /* add basic constraints ext to CRT */ |
| 186 | int version; /* CRT version */ |
| 187 | mbedtls_md_type_t md; /* Hash used for signing */ |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 188 | unsigned char key_usage; /* key usage flags */ |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 189 | mbedtls_asn1_sequence *ext_key_usage; /* extended key usages */ |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 190 | unsigned char ns_cert_type; /* NS cert type */ |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 191 | int format; /* format */ |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 192 | } opt; |
| 193 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 194 | int write_certificate( mbedtls_x509write_cert *crt, const char *output_file, |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 195 | int (*f_rng)(void *, unsigned char *, size_t), |
| 196 | void *p_rng ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 197 | { |
| 198 | int ret; |
| 199 | FILE *f; |
| 200 | unsigned char output_buf[4096]; |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 201 | unsigned char *output_start; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 202 | size_t len = 0; |
| 203 | |
| 204 | memset( output_buf, 0, 4096 ); |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 205 | if ( opt.format == FORMAT_DER ) |
| 206 | { |
| 207 | ret = mbedtls_x509write_crt_der( crt, output_buf, 4096, |
| 208 | f_rng, p_rng ); |
| 209 | if( ret < 0 ) |
| 210 | return( ret ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 211 | |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 212 | len = ret; |
| 213 | output_start = output_buf + 4096 - len; |
| 214 | } else { |
| 215 | ret = mbedtls_x509write_crt_pem( crt, output_buf, 4096, |
| 216 | f_rng, p_rng ); |
| 217 | if( ret < 0 ) |
| 218 | return( ret ); |
| 219 | |
| 220 | len = strlen( (char *) output_buf ); |
| 221 | output_start = output_buf; |
| 222 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 223 | |
| 224 | if( ( f = fopen( output_file, "w" ) ) == NULL ) |
| 225 | return( -1 ); |
| 226 | |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 227 | if( fwrite( output_start, 1, len, f ) != len ) |
Paul Bakker | 0c22610 | 2014-04-17 16:02:36 +0200 | [diff] [blame] | 228 | { |
| 229 | fclose( f ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 230 | return( -1 ); |
Paul Bakker | 0c22610 | 2014-04-17 16:02:36 +0200 | [diff] [blame] | 231 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 232 | |
Paul Bakker | 0c22610 | 2014-04-17 16:02:36 +0200 | [diff] [blame] | 233 | fclose( f ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 234 | |
| 235 | return( 0 ); |
| 236 | } |
| 237 | |
Valerio Setti | 3b02dd6 | 2023-01-09 17:19:26 +0100 | [diff] [blame^] | 238 | /* |
| 239 | * Convert the input "in_buff" string to a raw byte array "out_buff". The amount |
| 240 | * of converted data is returned on "written_data". |
| 241 | */ |
| 242 | static int parse_serial( const char* in_buff, size_t in_buff_len, |
| 243 | unsigned char* out_buff, size_t out_buff_len, |
| 244 | size_t *written_data ) |
| 245 | { |
| 246 | char c; |
| 247 | unsigned char val; |
| 248 | int i; |
| 249 | |
| 250 | if( out_buff_len < in_buff_len ) |
| 251 | return( -1 ); |
| 252 | |
| 253 | *written_data = 0; |
| 254 | |
| 255 | for( i = 0; i < (int) in_buff_len; i++, (*written_data)++ ) |
| 256 | { |
| 257 | c = in_buff[i]; |
| 258 | if( c >= 0x30 && c <= 0x39 ) |
| 259 | val = c - 0x30; |
| 260 | else if( c >= 0x41 && c <= 0x46 ) |
| 261 | val = c - 0x37; |
| 262 | else if( c >= 0x61 && c <= 0x66 ) |
| 263 | val = c - 0x57; |
| 264 | else |
| 265 | return( -1 ); |
| 266 | |
| 267 | out_buff[i] = val; |
| 268 | } |
| 269 | |
| 270 | return( 0 ); |
| 271 | } |
| 272 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 273 | int main( int argc, char *argv[] ) |
| 274 | { |
Andres Amaya Garcia | f9a54d3 | 2018-04-29 21:42:45 +0100 | [diff] [blame] | 275 | int ret = 1; |
| 276 | int exit_code = MBEDTLS_EXIT_FAILURE; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 277 | mbedtls_x509_crt issuer_crt; |
| 278 | mbedtls_pk_context loaded_issuer_key, loaded_subject_key; |
| 279 | mbedtls_pk_context *issuer_key = &loaded_issuer_key, |
Manuel Pégourié-Gonnard | f38e71a | 2013-09-12 05:21:54 +0200 | [diff] [blame] | 280 | *subject_key = &loaded_subject_key; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 281 | char buf[1024]; |
Jonathan Leroy | bbc75d9 | 2015-10-10 21:58:07 +0200 | [diff] [blame] | 282 | char issuer_name[256]; |
Paul Bakker | c97f9f6 | 2013-11-30 15:13:02 +0100 | [diff] [blame] | 283 | int i; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 284 | char *p, *q, *r; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 285 | #if defined(MBEDTLS_X509_CSR_PARSE_C) |
Jonathan Leroy | bbc75d9 | 2015-10-10 21:58:07 +0200 | [diff] [blame] | 286 | char subject_name[256]; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 287 | mbedtls_x509_csr csr; |
Paul Bakker | 7fc7fa6 | 2013-09-17 14:44:00 +0200 | [diff] [blame] | 288 | #endif |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 289 | mbedtls_x509write_cert crt; |
Valerio Setti | 3b02dd6 | 2023-01-09 17:19:26 +0100 | [diff] [blame^] | 290 | unsigned char serial[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN]; |
| 291 | size_t serial_len; |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 292 | mbedtls_asn1_sequence *ext_key_usage; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 293 | mbedtls_entropy_context entropy; |
| 294 | mbedtls_ctr_drbg_context ctr_drbg; |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 295 | const char *pers = "crt example app"; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 296 | |
| 297 | /* |
| 298 | * Set to sane values |
| 299 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 300 | mbedtls_x509write_crt_init( &crt ); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 301 | mbedtls_pk_init( &loaded_issuer_key ); |
| 302 | mbedtls_pk_init( &loaded_subject_key ); |
Manuel Pégourié-Gonnard | ec160c0 | 2015-04-28 22:52:30 +0200 | [diff] [blame] | 303 | mbedtls_ctr_drbg_init( &ctr_drbg ); |
Hanno Becker | 30a9510 | 2018-10-05 09:49:33 +0100 | [diff] [blame] | 304 | mbedtls_entropy_init( &entropy ); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 305 | #if defined(MBEDTLS_X509_CSR_PARSE_C) |
| 306 | mbedtls_x509_csr_init( &csr ); |
Paul Bakker | 7fc7fa6 | 2013-09-17 14:44:00 +0200 | [diff] [blame] | 307 | #endif |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 308 | mbedtls_x509_crt_init( &issuer_crt ); |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 309 | memset( buf, 0, sizeof(buf) ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 310 | |
| 311 | if( argc == 0 ) |
| 312 | { |
| 313 | usage: |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 314 | mbedtls_printf( USAGE ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 315 | goto exit; |
| 316 | } |
| 317 | |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 318 | opt.issuer_crt = DFL_ISSUER_CRT; |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 319 | opt.request_file = DFL_REQUEST_FILE; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 320 | opt.subject_key = DFL_SUBJECT_KEY; |
| 321 | opt.issuer_key = DFL_ISSUER_KEY; |
| 322 | opt.subject_pwd = DFL_SUBJECT_PWD; |
| 323 | opt.issuer_pwd = DFL_ISSUER_PWD; |
| 324 | opt.output_file = DFL_OUTPUT_FILENAME; |
| 325 | opt.subject_name = DFL_SUBJECT_NAME; |
| 326 | opt.issuer_name = DFL_ISSUER_NAME; |
| 327 | opt.not_before = DFL_NOT_BEFORE; |
| 328 | opt.not_after = DFL_NOT_AFTER; |
| 329 | opt.serial = DFL_SERIAL; |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 330 | opt.selfsign = DFL_SELFSIGN; |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 331 | opt.is_ca = DFL_IS_CA; |
| 332 | opt.max_pathlen = DFL_MAX_PATHLEN; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 333 | opt.key_usage = DFL_KEY_USAGE; |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 334 | opt.ext_key_usage = DFL_EXT_KEY_USAGE; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 335 | opt.ns_cert_type = DFL_NS_CERT_TYPE; |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 336 | opt.version = DFL_VERSION - 1; |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 337 | opt.md = DFL_DIGEST; |
| 338 | opt.subject_identifier = DFL_SUBJ_IDENT; |
| 339 | opt.authority_identifier = DFL_AUTH_IDENT; |
| 340 | opt.basic_constraints = DFL_CONSTRAINTS; |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 341 | opt.format = DFL_FORMAT; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 342 | |
| 343 | for( i = 1; i < argc; i++ ) |
| 344 | { |
| 345 | |
| 346 | p = argv[i]; |
| 347 | if( ( q = strchr( p, '=' ) ) == NULL ) |
| 348 | goto usage; |
| 349 | *q++ = '\0'; |
| 350 | |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 351 | if( strcmp( p, "request_file" ) == 0 ) |
| 352 | opt.request_file = q; |
| 353 | else if( strcmp( p, "subject_key" ) == 0 ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 354 | opt.subject_key = q; |
| 355 | else if( strcmp( p, "issuer_key" ) == 0 ) |
| 356 | opt.issuer_key = q; |
| 357 | else if( strcmp( p, "subject_pwd" ) == 0 ) |
| 358 | opt.subject_pwd = q; |
| 359 | else if( strcmp( p, "issuer_pwd" ) == 0 ) |
| 360 | opt.issuer_pwd = q; |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 361 | else if( strcmp( p, "issuer_crt" ) == 0 ) |
| 362 | opt.issuer_crt = q; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 363 | else if( strcmp( p, "output_file" ) == 0 ) |
| 364 | opt.output_file = q; |
| 365 | else if( strcmp( p, "subject_name" ) == 0 ) |
| 366 | { |
| 367 | opt.subject_name = q; |
| 368 | } |
| 369 | else if( strcmp( p, "issuer_name" ) == 0 ) |
| 370 | { |
| 371 | opt.issuer_name = q; |
| 372 | } |
| 373 | else if( strcmp( p, "not_before" ) == 0 ) |
| 374 | { |
| 375 | opt.not_before = q; |
| 376 | } |
| 377 | else if( strcmp( p, "not_after" ) == 0 ) |
| 378 | { |
| 379 | opt.not_after = q; |
| 380 | } |
| 381 | else if( strcmp( p, "serial" ) == 0 ) |
| 382 | { |
| 383 | opt.serial = q; |
| 384 | } |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 385 | else if( strcmp( p, "authority_identifier" ) == 0 ) |
| 386 | { |
| 387 | opt.authority_identifier = atoi( q ); |
| 388 | if( opt.authority_identifier != 0 && |
| 389 | opt.authority_identifier != 1 ) |
| 390 | { |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 391 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 392 | goto usage; |
| 393 | } |
| 394 | } |
| 395 | else if( strcmp( p, "subject_identifier" ) == 0 ) |
| 396 | { |
| 397 | opt.subject_identifier = atoi( q ); |
| 398 | if( opt.subject_identifier != 0 && |
| 399 | opt.subject_identifier != 1 ) |
| 400 | { |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 401 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 402 | goto usage; |
| 403 | } |
| 404 | } |
| 405 | else if( strcmp( p, "basic_constraints" ) == 0 ) |
| 406 | { |
| 407 | opt.basic_constraints = atoi( q ); |
| 408 | if( opt.basic_constraints != 0 && |
| 409 | opt.basic_constraints != 1 ) |
| 410 | { |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 411 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 412 | goto usage; |
| 413 | } |
| 414 | } |
| 415 | else if( strcmp( p, "md" ) == 0 ) |
| 416 | { |
Gilles Peskine | 18292fe | 2020-08-21 20:42:32 +0200 | [diff] [blame] | 417 | const mbedtls_md_info_t *md_info = |
| 418 | mbedtls_md_info_from_string( q ); |
| 419 | if( md_info == NULL ) |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 420 | { |
| 421 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 422 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 423 | } |
Gilles Peskine | 18292fe | 2020-08-21 20:42:32 +0200 | [diff] [blame] | 424 | opt.md = mbedtls_md_get_type( md_info ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 425 | } |
| 426 | else if( strcmp( p, "version" ) == 0 ) |
| 427 | { |
| 428 | opt.version = atoi( q ); |
| 429 | if( opt.version < 1 || opt.version > 3 ) |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 430 | { |
| 431 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 432 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 433 | } |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 434 | opt.version--; |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 435 | } |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 436 | else if( strcmp( p, "selfsign" ) == 0 ) |
| 437 | { |
| 438 | opt.selfsign = atoi( q ); |
| 439 | if( opt.selfsign < 0 || opt.selfsign > 1 ) |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 440 | { |
| 441 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 442 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 443 | } |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 444 | } |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 445 | else if( strcmp( p, "is_ca" ) == 0 ) |
| 446 | { |
| 447 | opt.is_ca = atoi( q ); |
| 448 | if( opt.is_ca < 0 || opt.is_ca > 1 ) |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 449 | { |
| 450 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 451 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 452 | } |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 453 | } |
| 454 | else if( strcmp( p, "max_pathlen" ) == 0 ) |
| 455 | { |
| 456 | opt.max_pathlen = atoi( q ); |
| 457 | if( opt.max_pathlen < -1 || opt.max_pathlen > 127 ) |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 458 | { |
| 459 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 460 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 461 | } |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 462 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 463 | else if( strcmp( p, "key_usage" ) == 0 ) |
| 464 | { |
| 465 | while( q != NULL ) |
| 466 | { |
| 467 | if( ( r = strchr( q, ',' ) ) != NULL ) |
| 468 | *r++ = '\0'; |
| 469 | |
| 470 | if( strcmp( q, "digital_signature" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 471 | opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 472 | else if( strcmp( q, "non_repudiation" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 473 | opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 474 | else if( strcmp( q, "key_encipherment" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 475 | opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 476 | else if( strcmp( q, "data_encipherment" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 477 | opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 478 | else if( strcmp( q, "key_agreement" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 479 | opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 480 | else if( strcmp( q, "key_cert_sign" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 481 | opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 482 | else if( strcmp( q, "crl_sign" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 483 | opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 484 | else |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 485 | { |
| 486 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 487 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 488 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 489 | |
| 490 | q = r; |
| 491 | } |
| 492 | } |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 493 | else if( strcmp( p, "ext_key_usage" ) == 0 ) |
| 494 | { |
Dave Rodgman | 6493785 | 2022-08-15 14:12:25 +0100 | [diff] [blame] | 495 | mbedtls_asn1_sequence **tail = &opt.ext_key_usage; |
| 496 | |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 497 | while( q != NULL ) |
| 498 | { |
| 499 | if( ( r = strchr( q, ',' ) ) != NULL ) |
| 500 | *r++ = '\0'; |
| 501 | |
| 502 | ext_key_usage = mbedtls_calloc( 1, sizeof(mbedtls_asn1_sequence) ); |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 503 | ext_key_usage->buf.tag = MBEDTLS_ASN1_OID; |
| 504 | if( strcmp( q, "serverAuth" ) == 0 ) |
| 505 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_SERVER_AUTH ); |
| 506 | else if( strcmp( q, "clientAuth" ) == 0 ) |
| 507 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_CLIENT_AUTH ); |
| 508 | else if( strcmp( q, "codeSigning" ) == 0 ) |
| 509 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_CODE_SIGNING ); |
| 510 | else if( strcmp( q, "emailProtection" ) == 0 ) |
| 511 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_EMAIL_PROTECTION ); |
| 512 | else if( strcmp( q, "timeStamping" ) == 0 ) |
| 513 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_TIME_STAMPING ); |
| 514 | else if( strcmp( q, "OCSPSigning" ) == 0 ) |
| 515 | SET_OID( ext_key_usage->buf, MBEDTLS_OID_OCSP_SIGNING ); |
| 516 | else |
Dave Rodgman | c5e0a8a | 2022-08-15 14:24:22 +0100 | [diff] [blame] | 517 | { |
| 518 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 519 | goto usage; |
Dave Rodgman | c5e0a8a | 2022-08-15 14:24:22 +0100 | [diff] [blame] | 520 | } |
Dave Rodgman | 6493785 | 2022-08-15 14:12:25 +0100 | [diff] [blame] | 521 | |
| 522 | *tail = ext_key_usage; |
| 523 | tail = &ext_key_usage->next; |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 524 | |
| 525 | q = r; |
| 526 | } |
| 527 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 528 | else if( strcmp( p, "ns_cert_type" ) == 0 ) |
| 529 | { |
| 530 | while( q != NULL ) |
| 531 | { |
| 532 | if( ( r = strchr( q, ',' ) ) != NULL ) |
| 533 | *r++ = '\0'; |
| 534 | |
| 535 | if( strcmp( q, "ssl_client" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 536 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 537 | else if( strcmp( q, "ssl_server" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 538 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 539 | else if( strcmp( q, "email" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 540 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_EMAIL; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 541 | else if( strcmp( q, "object_signing" ) == 0 ) |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 542 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 543 | else if( strcmp( q, "ssl_ca" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 544 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_CA; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 545 | else if( strcmp( q, "email_ca" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 546 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_EMAIL_CA; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 547 | else if( strcmp( q, "object_signing_ca" ) == 0 ) |
Manuel Pégourié-Gonnard | e6028c9 | 2015-04-20 12:19:02 +0100 | [diff] [blame] | 548 | opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING_CA; |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 549 | else |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 550 | { |
| 551 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 552 | goto usage; |
Hanno Becker | 17c3276 | 2017-10-03 14:56:04 +0100 | [diff] [blame] | 553 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 554 | |
| 555 | q = r; |
| 556 | } |
| 557 | } |
Dave Rodgman | 66e0550 | 2022-10-27 16:29:38 +0100 | [diff] [blame] | 558 | else if( strcmp( p, "format" ) == 0 ) |
| 559 | { |
| 560 | if ( strcmp(q, "der" ) == 0 ) opt.format = FORMAT_DER; |
| 561 | else if ( strcmp(q, "pem" ) == 0 ) opt.format = FORMAT_PEM; |
| 562 | else |
| 563 | { |
| 564 | mbedtls_printf( "Invalid argument for option %s\n", p ); |
| 565 | goto usage; |
| 566 | } |
| 567 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 568 | else |
| 569 | goto usage; |
| 570 | } |
| 571 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 572 | mbedtls_printf("\n"); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 573 | |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 574 | /* |
| 575 | * 0. Seed the PRNG |
| 576 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 577 | mbedtls_printf( " . Seeding the random number generator..." ); |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 578 | fflush( stdout ); |
| 579 | |
Manuel Pégourié-Gonnard | ec160c0 | 2015-04-28 22:52:30 +0200 | [diff] [blame] | 580 | if( ( ret = mbedtls_ctr_drbg_seed( &ctr_drbg, mbedtls_entropy_func, &entropy, |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 581 | (const unsigned char *) pers, |
| 582 | strlen( pers ) ) ) != 0 ) |
| 583 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 584 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 585 | mbedtls_printf( " failed\n ! mbedtls_ctr_drbg_seed returned %d - %s\n", |
| 586 | ret, buf ); |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 587 | goto exit; |
| 588 | } |
| 589 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 590 | mbedtls_printf( " ok\n" ); |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 591 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 592 | // Parse serial to MPI |
| 593 | // |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 594 | mbedtls_printf( " . Reading serial number..." ); |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 595 | fflush( stdout ); |
| 596 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 597 | mbedtls_printf( " ok\n" ); |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 598 | |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 599 | // Parse issuer certificate if present |
| 600 | // |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 601 | if( !opt.selfsign && strlen( opt.issuer_crt ) ) |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 602 | { |
| 603 | /* |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 604 | * 1.0.a. Load the certificates |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 605 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 606 | mbedtls_printf( " . Loading the issuer certificate ..." ); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 607 | fflush( stdout ); |
| 608 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 609 | if( ( ret = mbedtls_x509_crt_parse_file( &issuer_crt, opt.issuer_crt ) ) != 0 ) |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 610 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 611 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 612 | mbedtls_printf( " failed\n ! mbedtls_x509_crt_parse_file " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 613 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 614 | goto exit; |
| 615 | } |
| 616 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 617 | ret = mbedtls_x509_dn_gets( issuer_name, sizeof(issuer_name), |
Gilles Peskine | 842edf4 | 2021-08-04 21:56:10 +0200 | [diff] [blame] | 618 | &issuer_crt.subject ); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 619 | if( ret < 0 ) |
| 620 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 621 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 622 | mbedtls_printf( " failed\n ! mbedtls_x509_dn_gets " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 623 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 624 | goto exit; |
| 625 | } |
| 626 | |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 627 | opt.issuer_name = issuer_name; |
| 628 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 629 | mbedtls_printf( " ok\n" ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 630 | } |
| 631 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 632 | #if defined(MBEDTLS_X509_CSR_PARSE_C) |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 633 | // Parse certificate request if present |
| 634 | // |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 635 | if( !opt.selfsign && strlen( opt.request_file ) ) |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 636 | { |
| 637 | /* |
| 638 | * 1.0.b. Load the CSR |
| 639 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 640 | mbedtls_printf( " . Loading the certificate request ..." ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 641 | fflush( stdout ); |
| 642 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 643 | if( ( ret = mbedtls_x509_csr_parse_file( &csr, opt.request_file ) ) != 0 ) |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 644 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 645 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 646 | mbedtls_printf( " failed\n ! mbedtls_x509_csr_parse_file " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 647 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 648 | goto exit; |
| 649 | } |
| 650 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 651 | ret = mbedtls_x509_dn_gets( subject_name, sizeof(subject_name), |
Gilles Peskine | 842edf4 | 2021-08-04 21:56:10 +0200 | [diff] [blame] | 652 | &csr.subject ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 653 | if( ret < 0 ) |
| 654 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 655 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 656 | mbedtls_printf( " failed\n ! mbedtls_x509_dn_gets " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 657 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 658 | goto exit; |
| 659 | } |
| 660 | |
| 661 | opt.subject_name = subject_name; |
Gilles Peskine | 842edf4 | 2021-08-04 21:56:10 +0200 | [diff] [blame] | 662 | subject_key = &csr.pk; |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 663 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 664 | mbedtls_printf( " ok\n" ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 665 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 666 | #endif /* MBEDTLS_X509_CSR_PARSE_C */ |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 667 | |
| 668 | /* |
| 669 | * 1.1. Load the keys |
| 670 | */ |
| 671 | if( !opt.selfsign && !strlen( opt.request_file ) ) |
| 672 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 673 | mbedtls_printf( " . Loading the subject key ..." ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 674 | fflush( stdout ); |
| 675 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 676 | ret = mbedtls_pk_parse_keyfile( &loaded_subject_key, opt.subject_key, |
Manuel Pégourié-Gonnard | 84dea01 | 2021-06-15 11:29:26 +0200 | [diff] [blame] | 677 | opt.subject_pwd, mbedtls_ctr_drbg_random, &ctr_drbg ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 678 | if( ret != 0 ) |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 679 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 680 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 681 | mbedtls_printf( " failed\n ! mbedtls_pk_parse_keyfile " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 682 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | e2673fb | 2013-09-09 15:52:07 +0200 | [diff] [blame] | 683 | goto exit; |
| 684 | } |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 685 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 686 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 1014e95 | 2013-09-09 13:59:42 +0200 | [diff] [blame] | 687 | } |
| 688 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 689 | mbedtls_printf( " . Loading the issuer key ..." ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 690 | fflush( stdout ); |
| 691 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 692 | ret = mbedtls_pk_parse_keyfile( &loaded_issuer_key, opt.issuer_key, |
Manuel Pégourié-Gonnard | 84dea01 | 2021-06-15 11:29:26 +0200 | [diff] [blame] | 693 | opt.issuer_pwd, mbedtls_ctr_drbg_random, &ctr_drbg ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 694 | if( ret != 0 ) |
| 695 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 696 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 697 | mbedtls_printf( " failed\n ! mbedtls_pk_parse_keyfile " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 698 | "returned -x%02x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 699 | goto exit; |
| 700 | } |
| 701 | |
| 702 | // Check if key and issuer certificate match |
| 703 | // |
| 704 | if( strlen( opt.issuer_crt ) ) |
| 705 | { |
Gilles Peskine | 842edf4 | 2021-08-04 21:56:10 +0200 | [diff] [blame] | 706 | if( mbedtls_pk_check_pair( &issuer_crt.pk, issuer_key, |
Manuel Pégourié-Gonnard | 39be141 | 2021-06-15 11:29:26 +0200 | [diff] [blame] | 707 | mbedtls_ctr_drbg_random, &ctr_drbg ) != 0 ) |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 708 | { |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 709 | mbedtls_printf( " failed\n ! issuer_key does not match " |
| 710 | "issuer certificate\n\n" ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 711 | goto exit; |
| 712 | } |
| 713 | } |
| 714 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 715 | mbedtls_printf( " ok\n" ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 716 | |
| 717 | if( opt.selfsign ) |
| 718 | { |
Paul Bakker | 93c6aa4 | 2013-10-28 22:28:09 +0100 | [diff] [blame] | 719 | opt.subject_name = opt.issuer_name; |
Manuel Pégourié-Gonnard | f38e71a | 2013-09-12 05:21:54 +0200 | [diff] [blame] | 720 | subject_key = issuer_key; |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 721 | } |
| 722 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 723 | mbedtls_x509write_crt_set_subject_key( &crt, subject_key ); |
| 724 | mbedtls_x509write_crt_set_issuer_key( &crt, issuer_key ); |
Paul Bakker | b2d7f23 | 2013-09-09 16:24:18 +0200 | [diff] [blame] | 725 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 726 | /* |
| 727 | * 1.0. Check the names for validity |
| 728 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 729 | if( ( ret = mbedtls_x509write_crt_set_subject_name( &crt, opt.subject_name ) ) != 0 ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 730 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 731 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 732 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_subject_name " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 733 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 734 | goto exit; |
| 735 | } |
| 736 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 737 | if( ( ret = mbedtls_x509write_crt_set_issuer_name( &crt, opt.issuer_name ) ) != 0 ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 738 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 739 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 740 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_issuer_name " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 741 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 742 | goto exit; |
| 743 | } |
| 744 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 745 | mbedtls_printf( " . Setting certificate values ..." ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 746 | fflush( stdout ); |
| 747 | |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 748 | mbedtls_x509write_crt_set_version( &crt, opt.version ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 749 | mbedtls_x509write_crt_set_md_alg( &crt, opt.md ); |
| 750 | |
Valerio Setti | 3b02dd6 | 2023-01-09 17:19:26 +0100 | [diff] [blame^] | 751 | if( parse_serial( opt.serial, strlen( opt.serial ), |
| 752 | serial, sizeof( serial ), &serial_len ) < 0 ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 753 | { |
Valerio Setti | 3b02dd6 | 2023-01-09 17:19:26 +0100 | [diff] [blame^] | 754 | mbedtls_printf( " failed\n ! Unable to parse serial\n\n" ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 755 | goto exit; |
| 756 | } |
Valerio Setti | 3b02dd6 | 2023-01-09 17:19:26 +0100 | [diff] [blame^] | 757 | ret = mbedtls_x509write_crt_set_serial_new( &crt, serial, serial_len ); |
Valerio Setti | e888c17 | 2023-01-05 16:46:59 +0100 | [diff] [blame] | 758 | if( ret != 0 ) |
| 759 | { |
| 760 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
| 761 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_serial_new " |
| 762 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
| 763 | goto exit; |
| 764 | } |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 765 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 766 | ret = mbedtls_x509write_crt_set_validity( &crt, opt.not_before, opt.not_after ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 767 | if( ret != 0 ) |
| 768 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 769 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 770 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_validity " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 771 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 772 | goto exit; |
| 773 | } |
| 774 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 775 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 776 | |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 777 | if( opt.version == MBEDTLS_X509_CRT_VERSION_3 && |
| 778 | opt.basic_constraints != 0 ) |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 779 | { |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 780 | mbedtls_printf( " . Adding the Basic Constraints extension ..." ); |
| 781 | fflush( stdout ); |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 782 | |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 783 | ret = mbedtls_x509write_crt_set_basic_constraints( &crt, opt.is_ca, |
| 784 | opt.max_pathlen ); |
| 785 | if( ret != 0 ) |
| 786 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 787 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Tom Cosgrove | 1797b05 | 2022-12-04 17:19:59 +0000 | [diff] [blame] | 788 | mbedtls_printf( " failed\n ! x509write_crt_set_basic_constraints " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 789 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 790 | goto exit; |
| 791 | } |
| 792 | |
| 793 | mbedtls_printf( " ok\n" ); |
| 794 | } |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 795 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 796 | #if defined(MBEDTLS_SHA1_C) |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 797 | if( opt.version == MBEDTLS_X509_CRT_VERSION_3 && |
| 798 | opt.subject_identifier != 0 ) |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 799 | { |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 800 | mbedtls_printf( " . Adding the Subject Key Identifier ..." ); |
| 801 | fflush( stdout ); |
| 802 | |
| 803 | ret = mbedtls_x509write_crt_set_subject_key_identifier( &crt ); |
| 804 | if( ret != 0 ) |
| 805 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 806 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 807 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_subject" |
Hanno Becker | 7f3652d | 2017-09-22 15:39:02 +0100 | [diff] [blame] | 808 | "_key_identifier returned -0x%04x - %s\n\n", |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 809 | (unsigned int) -ret, buf ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 810 | goto exit; |
| 811 | } |
| 812 | |
| 813 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 814 | } |
| 815 | |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 816 | if( opt.version == MBEDTLS_X509_CRT_VERSION_3 && |
| 817 | opt.authority_identifier != 0 ) |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 818 | { |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 819 | mbedtls_printf( " . Adding the Authority Key Identifier ..." ); |
| 820 | fflush( stdout ); |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 821 | |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 822 | ret = mbedtls_x509write_crt_set_authority_key_identifier( &crt ); |
| 823 | if( ret != 0 ) |
| 824 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 825 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 826 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_authority_" |
Hanno Becker | 7f3652d | 2017-09-22 15:39:02 +0100 | [diff] [blame] | 827 | "key_identifier returned -0x%04x - %s\n\n", |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 828 | (unsigned int) -ret, buf ); |
Hanno Becker | 6c13d37 | 2017-09-13 12:49:22 +0100 | [diff] [blame] | 829 | goto exit; |
| 830 | } |
| 831 | |
| 832 | mbedtls_printf( " ok\n" ); |
| 833 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 834 | #endif /* MBEDTLS_SHA1_C */ |
Paul Bakker | 15162a0 | 2013-09-06 19:27:21 +0200 | [diff] [blame] | 835 | |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 836 | if( opt.version == MBEDTLS_X509_CRT_VERSION_3 && |
| 837 | opt.key_usage != 0 ) |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 838 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 839 | mbedtls_printf( " . Adding the Key Usage extension ..." ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 840 | fflush( stdout ); |
| 841 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 842 | ret = mbedtls_x509write_crt_set_key_usage( &crt, opt.key_usage ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 843 | if( ret != 0 ) |
| 844 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 845 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 846 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_key_usage " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 847 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 848 | goto exit; |
| 849 | } |
| 850 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 851 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 852 | } |
| 853 | |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 854 | if( opt.ext_key_usage ) |
| 855 | { |
| 856 | mbedtls_printf( " . Adding the Extended Key Usage extension ..." ); |
| 857 | fflush( stdout ); |
| 858 | |
| 859 | ret = mbedtls_x509write_crt_set_ext_key_usage( &crt, opt.ext_key_usage ); |
| 860 | if( ret != 0 ) |
| 861 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 862 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Dave Rodgman | ec9f6b4 | 2022-07-27 14:34:58 +0100 | [diff] [blame] | 863 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_ext_key_usage returned -0x%02x - %s\n\n", (unsigned int) -ret, buf ); |
Nicholas Wilson | 8e5bdfb | 2015-09-09 19:03:34 +0100 | [diff] [blame] | 864 | goto exit; |
| 865 | } |
| 866 | |
| 867 | mbedtls_printf( " ok\n" ); |
| 868 | } |
| 869 | |
Hanno Becker | 38eff43 | 2017-09-22 15:38:20 +0100 | [diff] [blame] | 870 | if( opt.version == MBEDTLS_X509_CRT_VERSION_3 && |
| 871 | opt.ns_cert_type != 0 ) |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 872 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 873 | mbedtls_printf( " . Adding the NS Cert Type extension ..." ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 874 | fflush( stdout ); |
| 875 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 876 | ret = mbedtls_x509write_crt_set_ns_cert_type( &crt, opt.ns_cert_type ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 877 | if( ret != 0 ) |
| 878 | { |
Dave Rodgman | 5f3f0d0 | 2022-08-11 14:38:26 +0100 | [diff] [blame] | 879 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 81535d0 | 2017-09-13 15:39:59 +0100 | [diff] [blame] | 880 | mbedtls_printf( " failed\n ! mbedtls_x509write_crt_set_ns_cert_type " |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 881 | "returned -0x%04x - %s\n\n", (unsigned int) -ret, buf ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 882 | goto exit; |
| 883 | } |
| 884 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 885 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 52be08c | 2013-09-09 12:37:54 +0200 | [diff] [blame] | 886 | } |
| 887 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 888 | /* |
Hanno Becker | 25d882b | 2018-08-23 15:26:06 +0100 | [diff] [blame] | 889 | * 1.2. Writing the certificate |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 890 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 891 | mbedtls_printf( " . Writing the certificate..." ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 892 | fflush( stdout ); |
| 893 | |
Manuel Pégourié-Gonnard | 31e5940 | 2013-09-12 05:59:05 +0200 | [diff] [blame] | 894 | if( ( ret = write_certificate( &crt, opt.output_file, |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 895 | mbedtls_ctr_drbg_random, &ctr_drbg ) ) != 0 ) |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 896 | { |
Dave Rodgman | 2ee7bbd | 2022-08-11 16:23:17 +0100 | [diff] [blame] | 897 | mbedtls_strerror( ret, buf, sizeof(buf) ); |
Hanno Becker | 7f3652d | 2017-09-22 15:39:02 +0100 | [diff] [blame] | 898 | mbedtls_printf( " failed\n ! write_certificate -0x%04x - %s\n\n", |
Kenneth Soerensen | 518d435 | 2020-04-01 17:22:45 +0200 | [diff] [blame] | 899 | (unsigned int) -ret, buf ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 900 | goto exit; |
| 901 | } |
| 902 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 903 | mbedtls_printf( " ok\n" ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 904 | |
Andres Amaya Garcia | f9a54d3 | 2018-04-29 21:42:45 +0100 | [diff] [blame] | 905 | exit_code = MBEDTLS_EXIT_SUCCESS; |
| 906 | |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 907 | exit: |
Hanno Becker | 30a9510 | 2018-10-05 09:49:33 +0100 | [diff] [blame] | 908 | #if defined(MBEDTLS_X509_CSR_PARSE_C) |
| 909 | mbedtls_x509_csr_free( &csr ); |
| 910 | #endif /* MBEDTLS_X509_CSR_PARSE_C */ |
| 911 | mbedtls_x509_crt_free( &issuer_crt ); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 912 | mbedtls_x509write_crt_free( &crt ); |
| 913 | mbedtls_pk_free( &loaded_subject_key ); |
| 914 | mbedtls_pk_free( &loaded_issuer_key ); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 915 | mbedtls_ctr_drbg_free( &ctr_drbg ); |
| 916 | mbedtls_entropy_free( &entropy ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 917 | |
Krzysztof Stachowiak | 5e1b195 | 2019-04-24 14:24:46 +0200 | [diff] [blame] | 918 | mbedtls_exit( exit_code ); |
Paul Bakker | 9397dcb | 2013-09-06 09:55:26 +0200 | [diff] [blame] | 919 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 920 | #endif /* MBEDTLS_X509_CRT_WRITE_C && MBEDTLS_X509_CRT_PARSE_C && |
| 921 | MBEDTLS_FS_IO && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C && |
Simon Butcher | 203a693 | 2016-10-07 15:00:17 +0100 | [diff] [blame] | 922 | MBEDTLS_ERROR_C && MBEDTLS_PEM_WRITE_C */ |