summaryrefslogtreecommitdiff
path: root/program
diff options
context:
space:
mode:
authorfengweihao <[email protected]>2019-12-30 14:25:24 +0800
committerfengweihao <[email protected]>2019-12-30 14:25:24 +0800
commit1511bb1a4b8894db784c68019a3ebedb142f60d6 (patch)
tree9d05b077127289f2301dc46b502dccb37ef78073 /program
parent396582a01545df0264db5c416efefd3274aa48e2 (diff)
支持签发证书公钥ECC椭圆加密算发
支持椭圆曲线secp192r1、secp256r1
Diffstat (limited to 'program')
-rw-r--r--program/src/cert_session.cpp178
1 files changed, 137 insertions, 41 deletions
diff --git a/program/src/cert_session.cpp b/program/src/cert_session.cpp
index 2e22bd6..625286b 100644
--- a/program/src/cert_session.cpp
+++ b/program/src/cert_session.cpp
@@ -123,52 +123,142 @@ finish:
return;
}
-static int x509_public_str2idx(const char *public_algo)
+#define R_RSA_ALGO_1024 1024
+#define R_RSA_ALGO_2048 2048
+#define R_RSA_ALGO_4096 4096
+
+typedef struct {
+ const char *name; /* NIST Name of curve */
+ int nid; /* Curve NID */
+} x509_algo_name;
+
+static x509_algo_name algo_name[] = {
+ {"rsa1024", R_RSA_ALGO_1024},
+ {"rsa2048", R_RSA_ALGO_2048},
+ {"rsa4096", R_RSA_ALGO_4096},
+ {"secp192r1", NID_X9_62_prime192v1},
+ {"secp256r1", NID_X9_62_prime256v1},
+};
+
+static size_t x509_algo_str2idx(const char *public_algo)
{
- int bits = 1024;
+ size_t i = 0;
- if (public_algo != NULL && strcasestr(public_algo, "1024") != NULL)
- {
- bits = 1024;
- }
- if (public_algo != NULL && strcasestr(public_algo, "2048") != NULL)
+ if(public_algo == NULL)
{
- bits = 2048;
+ goto finish;
}
- if (public_algo != NULL && strcasestr(public_algo, "4096") != NULL)
+
+ for (i = 0; i < sizeof(algo_name) / sizeof(x509_algo_name); i++)
{
- bits = 4096;
+ if (0 == strcasecmp(public_algo, algo_name[i].name))
+ {
+ return algo_name[i].nid;
+ }
}
- return bits;
+finish:
+ return R_RSA_ALGO_2048;
}
-static
-int ssl_key_genrsa(EVP_PKEY** pkey, char *pubkey, char *public_algo)
+static int ssl_key_gen_rsa(EVP_PKEY** pkey, int nid)
{
RSA *rsa = NULL;
EVP_PKEY *pk = NULL;
if((pk = EVP_PKEY_new()) == NULL){
- mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "ssl_key_genrsa, gen new key failed!");
+ mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "ssl_key_gen_rsa, gen new key failed!");
goto err;
}
- rsa = RSA_generate_key(x509_public_str2idx(public_algo), RSA_F4, NULL, NULL);
+ rsa = RSA_generate_key(nid, RSA_F4, NULL, NULL);
if(!EVP_PKEY_assign_RSA(pk, rsa)){
- mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "ssl_key_genrsa, assign key failed!");
+ mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "ssl_key_gen_rsa, assign key failed!");
EVP_PKEY_free(pk);
goto err;
}
- x509_get_private_key(pk, pubkey);
- rsa = NULL;
-
- *pkey = pk;
+ rsa = NULL;
+ *pkey = pk;
return 1;
-
err:
return 0;
}
+int ssl_key_gen_ecc(EVP_PKEY** pkey, int nid)
+{
+ EC_GROUP *group = NULL;
+ EVP_PKEY *pk = NULL;
+
+ EC_KEY *eckey = EC_KEY_new();
+ if(eckey == NULL)
+ {
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "create ec key faild");
+ goto error;
+ }
+
+ /** Take an elliptic curve */
+ group = EC_GROUP_new_by_curve_name(nid);
+ if (group == NULL)
+ {
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "unable to create curve (%d)\n", nid);
+ goto error;
+ }
+ EC_GROUP_set_asn1_flag(group, OPENSSL_EC_NAMED_CURVE);
+ EC_GROUP_set_point_conversion_form(group, POINT_CONVERSION_UNCOMPRESSED);
+
+ if (EC_KEY_set_group(eckey, group) == 0)
+ goto error;
+
+ if (!EC_KEY_generate_key(eckey))
+ {
+ goto error;
+ }
+ if((pk = EVP_PKEY_new()) == NULL){
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "ssl_key_gen_ecc, gen new key failed!");
+ goto error;
+ }
+ if(!EVP_PKEY_assign_EC_KEY(pk, eckey)){
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "ssl_key_gen_ecc, assign key failed!");
+ EVP_PKEY_free(pk);
+ goto error;
+ }
+ eckey = NULL;
+ *pkey = pk;
+ return 1;
+
+error:
+ if(eckey!=NULL)
+ EC_KEY_free(eckey);
+ return 0;
+}
+
+static int ssl_key_gen(EVP_PKEY** pkey, char *pubkey, char *public_algo)
+{
+ int ret = 0, nid = 0;
+
+ nid = x509_algo_str2idx(public_algo);
+ switch(nid)
+ {
+ case R_RSA_ALGO_1024:
+ case R_RSA_ALGO_2048:
+ case R_RSA_ALGO_4096:
+ ret = ssl_key_gen_rsa(pkey, nid);
+ break;
+ case NID_X9_62_prime192v1:
+ case NID_X9_62_prime256v1:
+ ret = ssl_key_gen_ecc(pkey, nid);
+ break;
+ default:
+ break;
+ }
+
+ if (ret != 1 || pkey == NULL)
+ return 0;
+
+ x509_get_private_key(*pkey, pubkey);
+
+ return 1;
+}
+
static X509* base_load_pkcs12(BIO *in, EVP_PKEY **pkey, X509 **x, STACK_OF(X509) **ca)
{
PKCS12 *p12 = NULL;
@@ -495,17 +585,40 @@ static time_t ASN1_GetTimeT(ASN1_TIME* time)
return mktime(&t);
}
-X509 *
-ssl_x509_forge(X509 *cacrt, EVP_PKEY *cakey, X509 *origcrt, char *pkey, int *expire_time, char *crlurl, char *public_algo)
+void x509_get_private_ecc_key(EC_KEY *key1, char *pubkey)
+{
+ BIO *bp = NULL;
+ int len = 0;
+
+ if ( (bp=BIO_new(BIO_s_mem())) == NULL){
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "unable to create BIO for output");
+ goto finish;
+ }
+ PEM_write_bio_ECPrivateKey(bp, key1, NULL, NULL, 0, NULL, NULL);
+ len = BIO_read(bp, pubkey, SG_DATA_SIZE);
+ if(len <= 0){
+ mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Error reading signature file");
+ goto free_err;
+ }
+ pubkey[len] = '\0';
+
+free_err:
+ BIO_free(bp);
+finish:
+ return;
+}
+
+X509 *ssl_x509_forge(X509 *cacrt, EVP_PKEY *cakey, X509 *origcrt, char *pkey, int *expire_time, char *crlurl, char *public_algo)
{
int rv;
X509 *crt = NULL;
EVP_PKEY* key = NULL;
X509_NAME *subject = NULL, *issuer = NULL;
- if(!ssl_key_genrsa(&key, pkey, public_algo)){
+ if(!ssl_key_gen(&key, pkey, public_algo)){
goto err;
}
+
//subjectname,issuername
subject = X509_get_subject_name(origcrt);
issuer = X509_get_subject_name(cacrt);
@@ -1957,23 +2070,6 @@ static int mesa_fiel_stat_init()
return 0;
}
-static void
-x509_get_fingerprint(X509 *x509, char *finger)
-{
- int xret = -1;
- unsigned int len = 0, i = 0;
- unsigned char fdig[EVP_MAX_MD_SIZE] = {0};
-
- xret = X509_digest(x509, EVP_sha1(), fdig, &len);
- if (xret != 1)
- goto finish;
- for (i = 0; i < len ; ++i){
- sprintf(finger + i * sizeof(unsigned char) * 2, "%02x", fdig[i]);
- }
-finish:
- return;
-}
-
void keyring_table_new_cb(int __attribute__((__unused__))table_id, const char __attribute__((__unused__))*key,
const char* table_line, MAAT_PLUGIN_EX_DATA* ad, long __attribute__((__unused__))argl, void __attribute__((__unused__))* argp)
{