Added API to save and restore session parameters (for controllable session resumption...
[BearSSL] / tools / keys.c
1 /*
2 * Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining
5 * a copy of this software and associated documentation files (the
6 * "Software"), to deal in the Software without restriction, including
7 * without limitation the rights to use, copy, modify, merge, publish,
8 * distribute, sublicense, and/or sell copies of the Software, and to
9 * permit persons to whom the Software is furnished to do so, subject to
10 * the following conditions:
11 *
12 * The above copyright notice and this permission notice shall be
13 * included in all copies or substantial portions of the Software.
14 *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22 * SOFTWARE.
23 */
24
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <stdint.h>
29 #include <errno.h>
30
31 #include "brssl.h"
32 #include "bearssl.h"
33
34 static private_key *
35 decode_key(const unsigned char *buf, size_t len)
36 {
37 br_skey_decoder_context dc;
38 int err;
39 private_key *sk;
40
41 br_skey_decoder_init(&dc);
42 br_skey_decoder_push(&dc, buf, len);
43 err = br_skey_decoder_last_error(&dc);
44 if (err != 0) {
45 const char *errname, *errmsg;
46
47 fprintf(stderr, "ERROR (decoding): err=%d\n", err);
48 errname = find_error_name(err, &errmsg);
49 if (errname != NULL) {
50 fprintf(stderr, " %s: %s\n", errname, errmsg);
51 } else {
52 fprintf(stderr, " (unknown)\n");
53 }
54 return NULL;
55 }
56 switch (br_skey_decoder_key_type(&dc)) {
57 const br_rsa_private_key *rk;
58 const br_ec_private_key *ek;
59
60 case BR_KEYTYPE_RSA:
61 rk = br_skey_decoder_get_rsa(&dc);
62 sk = xmalloc(sizeof *sk);
63 sk->key_type = BR_KEYTYPE_RSA;
64 sk->key.rsa.n_bitlen = rk->n_bitlen;
65 sk->key.rsa.p = xblobdup(rk->p, rk->plen);
66 sk->key.rsa.plen = rk->plen;
67 sk->key.rsa.q = xblobdup(rk->q, rk->qlen);
68 sk->key.rsa.qlen = rk->qlen;
69 sk->key.rsa.dp = xblobdup(rk->dp, rk->dplen);
70 sk->key.rsa.dplen = rk->dplen;
71 sk->key.rsa.dq = xblobdup(rk->dq, rk->dqlen);
72 sk->key.rsa.dqlen = rk->dqlen;
73 sk->key.rsa.iq = xblobdup(rk->iq, rk->iqlen);
74 sk->key.rsa.iqlen = rk->iqlen;
75 break;
76
77 case BR_KEYTYPE_EC:
78 ek = br_skey_decoder_get_ec(&dc);
79 sk = xmalloc(sizeof *sk);
80 sk->key_type = BR_KEYTYPE_EC;
81 sk->key.ec.curve = ek->curve;
82 sk->key.ec.x = xblobdup(ek->x, ek->xlen);
83 sk->key.ec.xlen = ek->xlen;
84 break;
85
86 default:
87 fprintf(stderr, "Unknown key type: %d\n",
88 br_skey_decoder_key_type(&dc));
89 sk = NULL;
90 break;
91 }
92
93 return sk;
94 }
95
96 /* see brssl.h */
97 private_key *
98 read_private_key(const char *fname)
99 {
100 unsigned char *buf;
101 size_t len;
102 private_key *sk;
103 pem_object *pos;
104 size_t num, u;
105
106 buf = NULL;
107 pos = NULL;
108 sk = NULL;
109 buf = read_file(fname, &len);
110 if (buf == NULL) {
111 goto deckey_exit;
112 }
113 if (looks_like_DER(buf, len)) {
114 sk = decode_key(buf, len);
115 goto deckey_exit;
116 } else {
117 pos = decode_pem(buf, len, &num);
118 if (pos == NULL) {
119 goto deckey_exit;
120 }
121 for (u = 0; pos[u].name; u ++) {
122 const char *name;
123
124 name = pos[u].name;
125 if (eqstr(name, "RSA PRIVATE KEY")
126 || eqstr(name, "EC PRIVATE KEY")
127 || eqstr(name, "PRIVATE KEY"))
128 {
129 sk = decode_key(pos[u].data, pos[u].data_len);
130 goto deckey_exit;
131 }
132 }
133 fprintf(stderr, "ERROR: no private key in file '%s'\n", fname);
134 goto deckey_exit;
135 }
136
137 deckey_exit:
138 if (buf != NULL) {
139 xfree(buf);
140 }
141 if (pos != NULL) {
142 for (u = 0; pos[u].name; u ++) {
143 free_pem_object_contents(&pos[u]);
144 }
145 xfree(pos);
146 }
147 return sk;
148 }
149
150 /* see brssl.h */
151 void
152 free_private_key(private_key *sk)
153 {
154 if (sk == NULL) {
155 return;
156 }
157 switch (sk->key_type) {
158 case BR_KEYTYPE_RSA:
159 xfree(sk->key.rsa.p);
160 xfree(sk->key.rsa.q);
161 xfree(sk->key.rsa.dp);
162 xfree(sk->key.rsa.dq);
163 xfree(sk->key.rsa.iq);
164 break;
165 case BR_KEYTYPE_EC:
166 xfree(sk->key.ec.x);
167 break;
168 }
169 xfree(sk);
170 }