/* $Id: key.c,v 1.9 2024/05/09 06:08:11 tb Exp $ */ /* * Copyright (c) 2019 Renaud Allard * Copyright (c) 2016 Kristaps Dzonsons * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include "key.h" /* * Default number of bits when creating a new RSA key. */ #define KBITS 4096 /* * Create an RSA key with the default KBITS number of bits. */ EVP_PKEY * rsa_key_create(FILE *f, const char *fname) { EVP_PKEY_CTX *ctx = NULL; EVP_PKEY *pkey = NULL; if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL)) == NULL) { warnx("EVP_PKEY_CTX_new_id"); goto err; } if (EVP_PKEY_keygen_init(ctx) <= 0) { warnx("EVP_PKEY_keygen_init"); goto err; } if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, KBITS) <= 0) { warnx("EVP_PKEY_set_rsa_keygen_bits"); goto err; } if (EVP_PKEY_keygen(ctx, &pkey) <= 0) { warnx("EVP_PKEY_keygen"); goto err; } /* Serialise the key to the disc. */ if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { warnx("%s: PEM_write_PrivateKey", fname); goto err; } EVP_PKEY_CTX_free(ctx); return pkey; err: EVP_PKEY_free(pkey); EVP_PKEY_CTX_free(ctx); return NULL; } EVP_PKEY * ec_key_create(FILE *f, const char *fname) { EVP_PKEY_CTX *ctx = NULL; EVP_PKEY *pkey = NULL; if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL)) == NULL) { warnx("EVP_PKEY_CTX_new_id"); goto err; } if (EVP_PKEY_keygen_init(ctx) <= 0) { warnx("EVP_PKEY_keygen_init"); goto err; } if (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(ctx, NID_secp384r1) <= 0) { warnx("EVP_PKEY_CTX_set_ec_paramgen_curve_nid"); goto err; } if (EVP_PKEY_keygen(ctx, &pkey) <= 0) { warnx("EVP_PKEY_keygen"); goto err; } /* Serialise the key to the disc. */ if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { warnx("%s: PEM_write_PrivateKey", fname); goto err; } EVP_PKEY_CTX_free(ctx); return pkey; err: EVP_PKEY_free(pkey); EVP_PKEY_CTX_free(ctx); return NULL; } EVP_PKEY * key_load(FILE *f, const char *fname) { EVP_PKEY *pkey; pkey = PEM_read_PrivateKey(f, NULL, NULL, NULL); if (pkey == NULL) { warnx("%s: PEM_read_PrivateKey", fname); return NULL; } if (EVP_PKEY_base_id(pkey) == EVP_PKEY_RSA || EVP_PKEY_base_id(pkey) == EVP_PKEY_EC) return pkey; warnx("%s: unsupported key type", fname); EVP_PKEY_free(pkey); return NULL; }