1a8e1175bSopenharmony_ci/* 2a8e1175bSopenharmony_ci * Certificate request generation 3a8e1175bSopenharmony_ci * 4a8e1175bSopenharmony_ci * Copyright The Mbed TLS Contributors 5a8e1175bSopenharmony_ci * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 6a8e1175bSopenharmony_ci */ 7a8e1175bSopenharmony_ci 8a8e1175bSopenharmony_ci#include "mbedtls/build_info.h" 9a8e1175bSopenharmony_ci 10a8e1175bSopenharmony_ci#include "mbedtls/platform.h" 11a8e1175bSopenharmony_ci/* md.h is included this early since MD_CAN_XXX macros are defined there. */ 12a8e1175bSopenharmony_ci#include "mbedtls/md.h" 13a8e1175bSopenharmony_ci 14a8e1175bSopenharmony_ci#if !defined(MBEDTLS_X509_CSR_WRITE_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) || \ 15a8e1175bSopenharmony_ci !defined(MBEDTLS_PK_PARSE_C) || !defined(MBEDTLS_MD_CAN_SHA256) || \ 16a8e1175bSopenharmony_ci !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_CTR_DRBG_C) || \ 17a8e1175bSopenharmony_ci !defined(MBEDTLS_PEM_WRITE_C) || !defined(MBEDTLS_FS_IO) || \ 18a8e1175bSopenharmony_ci !defined(MBEDTLS_MD_C) 19a8e1175bSopenharmony_ciint main(void) 20a8e1175bSopenharmony_ci{ 21a8e1175bSopenharmony_ci mbedtls_printf("MBEDTLS_X509_CSR_WRITE_C and/or MBEDTLS_FS_IO and/or " 22a8e1175bSopenharmony_ci "MBEDTLS_PK_PARSE_C and/or MBEDTLS_MD_CAN_SHA256 and/or " 23a8e1175bSopenharmony_ci "MBEDTLS_ENTROPY_C and/or MBEDTLS_CTR_DRBG_C " 24a8e1175bSopenharmony_ci "not defined.\n"); 25a8e1175bSopenharmony_ci mbedtls_exit(0); 26a8e1175bSopenharmony_ci} 27a8e1175bSopenharmony_ci#else 28a8e1175bSopenharmony_ci 29a8e1175bSopenharmony_ci#include "mbedtls/x509_csr.h" 30a8e1175bSopenharmony_ci#include "mbedtls/entropy.h" 31a8e1175bSopenharmony_ci#include "mbedtls/ctr_drbg.h" 32a8e1175bSopenharmony_ci#include "mbedtls/error.h" 33a8e1175bSopenharmony_ci 34a8e1175bSopenharmony_ci#include <stdio.h> 35a8e1175bSopenharmony_ci#include <stdlib.h> 36a8e1175bSopenharmony_ci#include <string.h> 37a8e1175bSopenharmony_ci 38a8e1175bSopenharmony_ci#define DFL_FILENAME "keyfile.key" 39a8e1175bSopenharmony_ci#define DFL_PASSWORD NULL 40a8e1175bSopenharmony_ci#define DFL_DEBUG_LEVEL 0 41a8e1175bSopenharmony_ci#define DFL_OUTPUT_FILENAME "cert.req" 42a8e1175bSopenharmony_ci#define DFL_SUBJECT_NAME "CN=Cert,O=mbed TLS,C=UK" 43a8e1175bSopenharmony_ci#define DFL_KEY_USAGE 0 44a8e1175bSopenharmony_ci#define DFL_FORCE_KEY_USAGE 0 45a8e1175bSopenharmony_ci#define DFL_NS_CERT_TYPE 0 46a8e1175bSopenharmony_ci#define DFL_FORCE_NS_CERT_TYPE 0 47a8e1175bSopenharmony_ci#define DFL_MD_ALG MBEDTLS_MD_SHA256 48a8e1175bSopenharmony_ci 49a8e1175bSopenharmony_ci#define USAGE \ 50a8e1175bSopenharmony_ci "\n usage: cert_req param=<>...\n" \ 51a8e1175bSopenharmony_ci "\n acceptable parameters:\n" \ 52a8e1175bSopenharmony_ci " filename=%%s default: keyfile.key\n" \ 53a8e1175bSopenharmony_ci " password=%%s default: NULL\n" \ 54a8e1175bSopenharmony_ci " debug_level=%%d default: 0 (disabled)\n" \ 55a8e1175bSopenharmony_ci " output_file=%%s default: cert.req\n" \ 56a8e1175bSopenharmony_ci " subject_name=%%s default: CN=Cert,O=mbed TLS,C=UK\n" \ 57a8e1175bSopenharmony_ci " san=%%s default: (none)\n" \ 58a8e1175bSopenharmony_ci " Semicolon-separated-list of values:\n" \ 59a8e1175bSopenharmony_ci " DNS:value\n" \ 60a8e1175bSopenharmony_ci " URI:value\n" \ 61a8e1175bSopenharmony_ci " RFC822:value\n" \ 62a8e1175bSopenharmony_ci " IP:value (Only IPv4 is supported)\n" \ 63a8e1175bSopenharmony_ci " DN:list of comma separated key=value pairs\n" \ 64a8e1175bSopenharmony_ci " key_usage=%%s default: (empty)\n" \ 65a8e1175bSopenharmony_ci " Comma-separated-list of values:\n" \ 66a8e1175bSopenharmony_ci " digital_signature\n" \ 67a8e1175bSopenharmony_ci " non_repudiation\n" \ 68a8e1175bSopenharmony_ci " key_encipherment\n" \ 69a8e1175bSopenharmony_ci " data_encipherment\n" \ 70a8e1175bSopenharmony_ci " key_agreement\n" \ 71a8e1175bSopenharmony_ci " key_cert_sign\n" \ 72a8e1175bSopenharmony_ci " crl_sign\n" \ 73a8e1175bSopenharmony_ci " force_key_usage=0/1 default: off\n" \ 74a8e1175bSopenharmony_ci " Add KeyUsage even if it is empty\n" \ 75a8e1175bSopenharmony_ci " ns_cert_type=%%s default: (empty)\n" \ 76a8e1175bSopenharmony_ci " Comma-separated-list of values:\n" \ 77a8e1175bSopenharmony_ci " ssl_client\n" \ 78a8e1175bSopenharmony_ci " ssl_server\n" \ 79a8e1175bSopenharmony_ci " email\n" \ 80a8e1175bSopenharmony_ci " object_signing\n" \ 81a8e1175bSopenharmony_ci " ssl_ca\n" \ 82a8e1175bSopenharmony_ci " email_ca\n" \ 83a8e1175bSopenharmony_ci " object_signing_ca\n" \ 84a8e1175bSopenharmony_ci " force_ns_cert_type=0/1 default: off\n" \ 85a8e1175bSopenharmony_ci " Add NsCertType even if it is empty\n" \ 86a8e1175bSopenharmony_ci " md=%%s default: SHA256\n" \ 87a8e1175bSopenharmony_ci " possible values:\n" \ 88a8e1175bSopenharmony_ci " MD5, RIPEMD160, SHA1,\n" \ 89a8e1175bSopenharmony_ci " SHA224, SHA256, SHA384, SHA512\n" \ 90a8e1175bSopenharmony_ci "\n" 91a8e1175bSopenharmony_ci 92a8e1175bSopenharmony_ci 93a8e1175bSopenharmony_ci/* 94a8e1175bSopenharmony_ci * global options 95a8e1175bSopenharmony_ci */ 96a8e1175bSopenharmony_cistruct options { 97a8e1175bSopenharmony_ci const char *filename; /* filename of the key file */ 98a8e1175bSopenharmony_ci const char *password; /* password for the key file */ 99a8e1175bSopenharmony_ci int debug_level; /* level of debugging */ 100a8e1175bSopenharmony_ci const char *output_file; /* where to store the constructed key file */ 101a8e1175bSopenharmony_ci const char *subject_name; /* subject name for certificate request */ 102a8e1175bSopenharmony_ci mbedtls_x509_san_list *san_list; /* subjectAltName for certificate request */ 103a8e1175bSopenharmony_ci unsigned char key_usage; /* key usage flags */ 104a8e1175bSopenharmony_ci int force_key_usage; /* Force adding the KeyUsage extension */ 105a8e1175bSopenharmony_ci unsigned char ns_cert_type; /* NS cert type */ 106a8e1175bSopenharmony_ci int force_ns_cert_type; /* Force adding NsCertType extension */ 107a8e1175bSopenharmony_ci mbedtls_md_type_t md_alg; /* Hash algorithm used for signature. */ 108a8e1175bSopenharmony_ci} opt; 109a8e1175bSopenharmony_ci 110a8e1175bSopenharmony_ciint write_certificate_request(mbedtls_x509write_csr *req, const char *output_file, 111a8e1175bSopenharmony_ci int (*f_rng)(void *, unsigned char *, size_t), 112a8e1175bSopenharmony_ci void *p_rng) 113a8e1175bSopenharmony_ci{ 114a8e1175bSopenharmony_ci int ret; 115a8e1175bSopenharmony_ci FILE *f; 116a8e1175bSopenharmony_ci unsigned char output_buf[4096]; 117a8e1175bSopenharmony_ci size_t len = 0; 118a8e1175bSopenharmony_ci 119a8e1175bSopenharmony_ci memset(output_buf, 0, 4096); 120a8e1175bSopenharmony_ci if ((ret = mbedtls_x509write_csr_pem(req, output_buf, 4096, f_rng, p_rng)) < 0) { 121a8e1175bSopenharmony_ci return ret; 122a8e1175bSopenharmony_ci } 123a8e1175bSopenharmony_ci 124a8e1175bSopenharmony_ci len = strlen((char *) output_buf); 125a8e1175bSopenharmony_ci 126a8e1175bSopenharmony_ci if ((f = fopen(output_file, "w")) == NULL) { 127a8e1175bSopenharmony_ci return -1; 128a8e1175bSopenharmony_ci } 129a8e1175bSopenharmony_ci 130a8e1175bSopenharmony_ci if (fwrite(output_buf, 1, len, f) != len) { 131a8e1175bSopenharmony_ci fclose(f); 132a8e1175bSopenharmony_ci return -1; 133a8e1175bSopenharmony_ci } 134a8e1175bSopenharmony_ci 135a8e1175bSopenharmony_ci fclose(f); 136a8e1175bSopenharmony_ci 137a8e1175bSopenharmony_ci return 0; 138a8e1175bSopenharmony_ci} 139a8e1175bSopenharmony_ci 140a8e1175bSopenharmony_ciint main(int argc, char *argv[]) 141a8e1175bSopenharmony_ci{ 142a8e1175bSopenharmony_ci int ret = 1; 143a8e1175bSopenharmony_ci int exit_code = MBEDTLS_EXIT_FAILURE; 144a8e1175bSopenharmony_ci mbedtls_pk_context key; 145a8e1175bSopenharmony_ci char buf[1024]; 146a8e1175bSopenharmony_ci int i; 147a8e1175bSopenharmony_ci char *p, *q, *r; 148a8e1175bSopenharmony_ci mbedtls_x509write_csr req; 149a8e1175bSopenharmony_ci mbedtls_entropy_context entropy; 150a8e1175bSopenharmony_ci mbedtls_ctr_drbg_context ctr_drbg; 151a8e1175bSopenharmony_ci const char *pers = "csr example app"; 152a8e1175bSopenharmony_ci mbedtls_x509_san_list *cur, *prev; 153a8e1175bSopenharmony_ci mbedtls_asn1_named_data *ext_san_dirname = NULL; 154a8e1175bSopenharmony_ci#if defined(MBEDTLS_X509_CRT_PARSE_C) 155a8e1175bSopenharmony_ci uint8_t ip[4] = { 0 }; 156a8e1175bSopenharmony_ci#endif 157a8e1175bSopenharmony_ci /* 158a8e1175bSopenharmony_ci * Set to sane values 159a8e1175bSopenharmony_ci */ 160a8e1175bSopenharmony_ci mbedtls_x509write_csr_init(&req); 161a8e1175bSopenharmony_ci mbedtls_pk_init(&key); 162a8e1175bSopenharmony_ci mbedtls_ctr_drbg_init(&ctr_drbg); 163a8e1175bSopenharmony_ci memset(buf, 0, sizeof(buf)); 164a8e1175bSopenharmony_ci mbedtls_entropy_init(&entropy); 165a8e1175bSopenharmony_ci 166a8e1175bSopenharmony_ci#if defined(MBEDTLS_USE_PSA_CRYPTO) 167a8e1175bSopenharmony_ci psa_status_t status = psa_crypto_init(); 168a8e1175bSopenharmony_ci if (status != PSA_SUCCESS) { 169a8e1175bSopenharmony_ci mbedtls_fprintf(stderr, "Failed to initialize PSA Crypto implementation: %d\n", 170a8e1175bSopenharmony_ci (int) status); 171a8e1175bSopenharmony_ci goto exit; 172a8e1175bSopenharmony_ci } 173a8e1175bSopenharmony_ci#endif /* MBEDTLS_USE_PSA_CRYPTO */ 174a8e1175bSopenharmony_ci 175a8e1175bSopenharmony_ci if (argc < 2) { 176a8e1175bSopenharmony_ciusage: 177a8e1175bSopenharmony_ci mbedtls_printf(USAGE); 178a8e1175bSopenharmony_ci goto exit; 179a8e1175bSopenharmony_ci } 180a8e1175bSopenharmony_ci 181a8e1175bSopenharmony_ci opt.filename = DFL_FILENAME; 182a8e1175bSopenharmony_ci opt.password = DFL_PASSWORD; 183a8e1175bSopenharmony_ci opt.debug_level = DFL_DEBUG_LEVEL; 184a8e1175bSopenharmony_ci opt.output_file = DFL_OUTPUT_FILENAME; 185a8e1175bSopenharmony_ci opt.subject_name = DFL_SUBJECT_NAME; 186a8e1175bSopenharmony_ci opt.key_usage = DFL_KEY_USAGE; 187a8e1175bSopenharmony_ci opt.force_key_usage = DFL_FORCE_KEY_USAGE; 188a8e1175bSopenharmony_ci opt.ns_cert_type = DFL_NS_CERT_TYPE; 189a8e1175bSopenharmony_ci opt.force_ns_cert_type = DFL_FORCE_NS_CERT_TYPE; 190a8e1175bSopenharmony_ci opt.md_alg = DFL_MD_ALG; 191a8e1175bSopenharmony_ci opt.san_list = NULL; 192a8e1175bSopenharmony_ci 193a8e1175bSopenharmony_ci for (i = 1; i < argc; i++) { 194a8e1175bSopenharmony_ci p = argv[i]; 195a8e1175bSopenharmony_ci if ((q = strchr(p, '=')) == NULL) { 196a8e1175bSopenharmony_ci goto usage; 197a8e1175bSopenharmony_ci } 198a8e1175bSopenharmony_ci *q++ = '\0'; 199a8e1175bSopenharmony_ci if (strcmp(p, "filename") == 0) { 200a8e1175bSopenharmony_ci opt.filename = q; 201a8e1175bSopenharmony_ci } else if (strcmp(p, "password") == 0) { 202a8e1175bSopenharmony_ci opt.password = q; 203a8e1175bSopenharmony_ci } else if (strcmp(p, "output_file") == 0) { 204a8e1175bSopenharmony_ci opt.output_file = q; 205a8e1175bSopenharmony_ci } else if (strcmp(p, "debug_level") == 0) { 206a8e1175bSopenharmony_ci opt.debug_level = atoi(q); 207a8e1175bSopenharmony_ci if (opt.debug_level < 0 || opt.debug_level > 65535) { 208a8e1175bSopenharmony_ci goto usage; 209a8e1175bSopenharmony_ci } 210a8e1175bSopenharmony_ci } else if (strcmp(p, "subject_name") == 0) { 211a8e1175bSopenharmony_ci opt.subject_name = q; 212a8e1175bSopenharmony_ci } else if (strcmp(p, "san") == 0) { 213a8e1175bSopenharmony_ci char *subtype_value; 214a8e1175bSopenharmony_ci prev = NULL; 215a8e1175bSopenharmony_ci 216a8e1175bSopenharmony_ci while (q != NULL) { 217a8e1175bSopenharmony_ci char *semicolon; 218a8e1175bSopenharmony_ci r = q; 219a8e1175bSopenharmony_ci 220a8e1175bSopenharmony_ci /* Find the first non-escaped ; occurrence and remove escaped ones */ 221a8e1175bSopenharmony_ci do { 222a8e1175bSopenharmony_ci if ((semicolon = strchr(r, ';')) != NULL) { 223a8e1175bSopenharmony_ci if (*(semicolon-1) != '\\') { 224a8e1175bSopenharmony_ci r = semicolon; 225a8e1175bSopenharmony_ci break; 226a8e1175bSopenharmony_ci } 227a8e1175bSopenharmony_ci /* Remove the escape character */ 228a8e1175bSopenharmony_ci size_t size_left = strlen(semicolon); 229a8e1175bSopenharmony_ci memmove(semicolon-1, semicolon, size_left); 230a8e1175bSopenharmony_ci *(semicolon + size_left - 1) = '\0'; 231a8e1175bSopenharmony_ci /* r will now point at the character after the semicolon */ 232a8e1175bSopenharmony_ci r = semicolon; 233a8e1175bSopenharmony_ci } 234a8e1175bSopenharmony_ci 235a8e1175bSopenharmony_ci } while (semicolon != NULL); 236a8e1175bSopenharmony_ci 237a8e1175bSopenharmony_ci if (semicolon != NULL) { 238a8e1175bSopenharmony_ci *r++ = '\0'; 239a8e1175bSopenharmony_ci } else { 240a8e1175bSopenharmony_ci r = NULL; 241a8e1175bSopenharmony_ci } 242a8e1175bSopenharmony_ci 243a8e1175bSopenharmony_ci cur = mbedtls_calloc(1, sizeof(mbedtls_x509_san_list)); 244a8e1175bSopenharmony_ci if (cur == NULL) { 245a8e1175bSopenharmony_ci mbedtls_printf("Not enough memory for subjectAltName list\n"); 246a8e1175bSopenharmony_ci goto usage; 247a8e1175bSopenharmony_ci } 248a8e1175bSopenharmony_ci 249a8e1175bSopenharmony_ci cur->next = NULL; 250a8e1175bSopenharmony_ci 251a8e1175bSopenharmony_ci if ((subtype_value = strchr(q, ':')) != NULL) { 252a8e1175bSopenharmony_ci *subtype_value++ = '\0'; 253a8e1175bSopenharmony_ci } else { 254a8e1175bSopenharmony_ci mbedtls_printf( 255a8e1175bSopenharmony_ci "Invalid argument for option SAN: Entry must be of the form TYPE:value\n"); 256a8e1175bSopenharmony_ci goto usage; 257a8e1175bSopenharmony_ci } 258a8e1175bSopenharmony_ci if (strcmp(q, "RFC822") == 0) { 259a8e1175bSopenharmony_ci cur->node.type = MBEDTLS_X509_SAN_RFC822_NAME; 260a8e1175bSopenharmony_ci } else if (strcmp(q, "URI") == 0) { 261a8e1175bSopenharmony_ci cur->node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER; 262a8e1175bSopenharmony_ci } else if (strcmp(q, "DNS") == 0) { 263a8e1175bSopenharmony_ci cur->node.type = MBEDTLS_X509_SAN_DNS_NAME; 264a8e1175bSopenharmony_ci } else if (strcmp(q, "IP") == 0) { 265a8e1175bSopenharmony_ci size_t ip_addr_len = 0; 266a8e1175bSopenharmony_ci cur->node.type = MBEDTLS_X509_SAN_IP_ADDRESS; 267a8e1175bSopenharmony_ci ip_addr_len = mbedtls_x509_crt_parse_cn_inet_pton(subtype_value, ip); 268a8e1175bSopenharmony_ci if (ip_addr_len == 0) { 269a8e1175bSopenharmony_ci mbedtls_printf("mbedtls_x509_crt_parse_cn_inet_pton failed to parse %s\n", 270a8e1175bSopenharmony_ci subtype_value); 271a8e1175bSopenharmony_ci goto exit; 272a8e1175bSopenharmony_ci } 273a8e1175bSopenharmony_ci cur->node.san.unstructured_name.p = (unsigned char *) ip; 274a8e1175bSopenharmony_ci cur->node.san.unstructured_name.len = sizeof(ip); 275a8e1175bSopenharmony_ci } else if (strcmp(q, "DN") == 0) { 276a8e1175bSopenharmony_ci cur->node.type = MBEDTLS_X509_SAN_DIRECTORY_NAME; 277a8e1175bSopenharmony_ci if ((ret = mbedtls_x509_string_to_names(&ext_san_dirname, 278a8e1175bSopenharmony_ci subtype_value)) != 0) { 279a8e1175bSopenharmony_ci mbedtls_strerror(ret, buf, sizeof(buf)); 280a8e1175bSopenharmony_ci mbedtls_printf( 281a8e1175bSopenharmony_ci " failed\n ! mbedtls_x509_string_to_names " 282a8e1175bSopenharmony_ci "returned -0x%04x - %s\n\n", 283a8e1175bSopenharmony_ci (unsigned int) -ret, buf); 284a8e1175bSopenharmony_ci goto exit; 285a8e1175bSopenharmony_ci } 286a8e1175bSopenharmony_ci cur->node.san.directory_name = *ext_san_dirname; 287a8e1175bSopenharmony_ci } else { 288a8e1175bSopenharmony_ci mbedtls_free(cur); 289a8e1175bSopenharmony_ci goto usage; 290a8e1175bSopenharmony_ci } 291a8e1175bSopenharmony_ci 292a8e1175bSopenharmony_ci if (cur->node.type == MBEDTLS_X509_SAN_RFC822_NAME || 293a8e1175bSopenharmony_ci cur->node.type == MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER || 294a8e1175bSopenharmony_ci cur->node.type == MBEDTLS_X509_SAN_DNS_NAME) { 295a8e1175bSopenharmony_ci q = subtype_value; 296a8e1175bSopenharmony_ci cur->node.san.unstructured_name.p = (unsigned char *) q; 297a8e1175bSopenharmony_ci cur->node.san.unstructured_name.len = strlen(q); 298a8e1175bSopenharmony_ci } 299a8e1175bSopenharmony_ci 300a8e1175bSopenharmony_ci if (prev == NULL) { 301a8e1175bSopenharmony_ci opt.san_list = cur; 302a8e1175bSopenharmony_ci } else { 303a8e1175bSopenharmony_ci prev->next = cur; 304a8e1175bSopenharmony_ci } 305a8e1175bSopenharmony_ci 306a8e1175bSopenharmony_ci prev = cur; 307a8e1175bSopenharmony_ci q = r; 308a8e1175bSopenharmony_ci } 309a8e1175bSopenharmony_ci } else if (strcmp(p, "md") == 0) { 310a8e1175bSopenharmony_ci const mbedtls_md_info_t *md_info = 311a8e1175bSopenharmony_ci mbedtls_md_info_from_string(q); 312a8e1175bSopenharmony_ci if (md_info == NULL) { 313a8e1175bSopenharmony_ci mbedtls_printf("Invalid argument for option %s\n", p); 314a8e1175bSopenharmony_ci goto usage; 315a8e1175bSopenharmony_ci } 316a8e1175bSopenharmony_ci opt.md_alg = mbedtls_md_get_type(md_info); 317a8e1175bSopenharmony_ci } else if (strcmp(p, "key_usage") == 0) { 318a8e1175bSopenharmony_ci while (q != NULL) { 319a8e1175bSopenharmony_ci if ((r = strchr(q, ',')) != NULL) { 320a8e1175bSopenharmony_ci *r++ = '\0'; 321a8e1175bSopenharmony_ci } 322a8e1175bSopenharmony_ci 323a8e1175bSopenharmony_ci if (strcmp(q, "digital_signature") == 0) { 324a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; 325a8e1175bSopenharmony_ci } else if (strcmp(q, "non_repudiation") == 0) { 326a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; 327a8e1175bSopenharmony_ci } else if (strcmp(q, "key_encipherment") == 0) { 328a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; 329a8e1175bSopenharmony_ci } else if (strcmp(q, "data_encipherment") == 0) { 330a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; 331a8e1175bSopenharmony_ci } else if (strcmp(q, "key_agreement") == 0) { 332a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; 333a8e1175bSopenharmony_ci } else if (strcmp(q, "key_cert_sign") == 0) { 334a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; 335a8e1175bSopenharmony_ci } else if (strcmp(q, "crl_sign") == 0) { 336a8e1175bSopenharmony_ci opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; 337a8e1175bSopenharmony_ci } else { 338a8e1175bSopenharmony_ci goto usage; 339a8e1175bSopenharmony_ci } 340a8e1175bSopenharmony_ci 341a8e1175bSopenharmony_ci q = r; 342a8e1175bSopenharmony_ci } 343a8e1175bSopenharmony_ci } else if (strcmp(p, "force_key_usage") == 0) { 344a8e1175bSopenharmony_ci switch (atoi(q)) { 345a8e1175bSopenharmony_ci case 0: opt.force_key_usage = 0; break; 346a8e1175bSopenharmony_ci case 1: opt.force_key_usage = 1; break; 347a8e1175bSopenharmony_ci default: goto usage; 348a8e1175bSopenharmony_ci } 349a8e1175bSopenharmony_ci } else if (strcmp(p, "ns_cert_type") == 0) { 350a8e1175bSopenharmony_ci while (q != NULL) { 351a8e1175bSopenharmony_ci if ((r = strchr(q, ',')) != NULL) { 352a8e1175bSopenharmony_ci *r++ = '\0'; 353a8e1175bSopenharmony_ci } 354a8e1175bSopenharmony_ci 355a8e1175bSopenharmony_ci if (strcmp(q, "ssl_client") == 0) { 356a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT; 357a8e1175bSopenharmony_ci } else if (strcmp(q, "ssl_server") == 0) { 358a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER; 359a8e1175bSopenharmony_ci } else if (strcmp(q, "email") == 0) { 360a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_EMAIL; 361a8e1175bSopenharmony_ci } else if (strcmp(q, "object_signing") == 0) { 362a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING; 363a8e1175bSopenharmony_ci } else if (strcmp(q, "ssl_ca") == 0) { 364a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_SSL_CA; 365a8e1175bSopenharmony_ci } else if (strcmp(q, "email_ca") == 0) { 366a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_EMAIL_CA; 367a8e1175bSopenharmony_ci } else if (strcmp(q, "object_signing_ca") == 0) { 368a8e1175bSopenharmony_ci opt.ns_cert_type |= MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING_CA; 369a8e1175bSopenharmony_ci } else { 370a8e1175bSopenharmony_ci goto usage; 371a8e1175bSopenharmony_ci } 372a8e1175bSopenharmony_ci 373a8e1175bSopenharmony_ci q = r; 374a8e1175bSopenharmony_ci } 375a8e1175bSopenharmony_ci } else if (strcmp(p, "force_ns_cert_type") == 0) { 376a8e1175bSopenharmony_ci switch (atoi(q)) { 377a8e1175bSopenharmony_ci case 0: opt.force_ns_cert_type = 0; break; 378a8e1175bSopenharmony_ci case 1: opt.force_ns_cert_type = 1; break; 379a8e1175bSopenharmony_ci default: goto usage; 380a8e1175bSopenharmony_ci } 381a8e1175bSopenharmony_ci } else { 382a8e1175bSopenharmony_ci goto usage; 383a8e1175bSopenharmony_ci } 384a8e1175bSopenharmony_ci } 385a8e1175bSopenharmony_ci 386a8e1175bSopenharmony_ci /* Set the MD algorithm to use for the signature in the CSR */ 387a8e1175bSopenharmony_ci mbedtls_x509write_csr_set_md_alg(&req, opt.md_alg); 388a8e1175bSopenharmony_ci 389a8e1175bSopenharmony_ci /* Set the Key Usage Extension flags in the CSR */ 390a8e1175bSopenharmony_ci if (opt.key_usage || opt.force_key_usage == 1) { 391a8e1175bSopenharmony_ci ret = mbedtls_x509write_csr_set_key_usage(&req, opt.key_usage); 392a8e1175bSopenharmony_ci 393a8e1175bSopenharmony_ci if (ret != 0) { 394a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! mbedtls_x509write_csr_set_key_usage returned %d", ret); 395a8e1175bSopenharmony_ci goto exit; 396a8e1175bSopenharmony_ci } 397a8e1175bSopenharmony_ci } 398a8e1175bSopenharmony_ci 399a8e1175bSopenharmony_ci /* Set the Cert Type flags in the CSR */ 400a8e1175bSopenharmony_ci if (opt.ns_cert_type || opt.force_ns_cert_type == 1) { 401a8e1175bSopenharmony_ci ret = mbedtls_x509write_csr_set_ns_cert_type(&req, opt.ns_cert_type); 402a8e1175bSopenharmony_ci 403a8e1175bSopenharmony_ci if (ret != 0) { 404a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! mbedtls_x509write_csr_set_ns_cert_type returned %d", ret); 405a8e1175bSopenharmony_ci goto exit; 406a8e1175bSopenharmony_ci } 407a8e1175bSopenharmony_ci } 408a8e1175bSopenharmony_ci 409a8e1175bSopenharmony_ci /* Set the SubjectAltName in the CSR */ 410a8e1175bSopenharmony_ci if (opt.san_list != NULL) { 411a8e1175bSopenharmony_ci ret = mbedtls_x509write_csr_set_subject_alternative_name(&req, opt.san_list); 412a8e1175bSopenharmony_ci 413a8e1175bSopenharmony_ci if (ret != 0) { 414a8e1175bSopenharmony_ci mbedtls_printf( 415a8e1175bSopenharmony_ci " failed\n ! mbedtls_x509write_csr_set_subject_alternative_name returned %d", 416a8e1175bSopenharmony_ci ret); 417a8e1175bSopenharmony_ci goto exit; 418a8e1175bSopenharmony_ci } 419a8e1175bSopenharmony_ci } 420a8e1175bSopenharmony_ci 421a8e1175bSopenharmony_ci /* 422a8e1175bSopenharmony_ci * 0. Seed the PRNG 423a8e1175bSopenharmony_ci */ 424a8e1175bSopenharmony_ci mbedtls_printf(" . Seeding the random number generator..."); 425a8e1175bSopenharmony_ci fflush(stdout); 426a8e1175bSopenharmony_ci 427a8e1175bSopenharmony_ci if ((ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, 428a8e1175bSopenharmony_ci (const unsigned char *) pers, 429a8e1175bSopenharmony_ci strlen(pers))) != 0) { 430a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! mbedtls_ctr_drbg_seed returned %d", ret); 431a8e1175bSopenharmony_ci goto exit; 432a8e1175bSopenharmony_ci } 433a8e1175bSopenharmony_ci 434a8e1175bSopenharmony_ci mbedtls_printf(" ok\n"); 435a8e1175bSopenharmony_ci 436a8e1175bSopenharmony_ci /* 437a8e1175bSopenharmony_ci * 1.0. Check the subject name for validity 438a8e1175bSopenharmony_ci */ 439a8e1175bSopenharmony_ci mbedtls_printf(" . Checking subject name..."); 440a8e1175bSopenharmony_ci fflush(stdout); 441a8e1175bSopenharmony_ci 442a8e1175bSopenharmony_ci if ((ret = mbedtls_x509write_csr_set_subject_name(&req, opt.subject_name)) != 0) { 443a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! mbedtls_x509write_csr_set_subject_name returned %d", ret); 444a8e1175bSopenharmony_ci goto exit; 445a8e1175bSopenharmony_ci } 446a8e1175bSopenharmony_ci 447a8e1175bSopenharmony_ci mbedtls_printf(" ok\n"); 448a8e1175bSopenharmony_ci 449a8e1175bSopenharmony_ci /* 450a8e1175bSopenharmony_ci * 1.1. Load the key 451a8e1175bSopenharmony_ci */ 452a8e1175bSopenharmony_ci mbedtls_printf(" . Loading the private key ..."); 453a8e1175bSopenharmony_ci fflush(stdout); 454a8e1175bSopenharmony_ci 455a8e1175bSopenharmony_ci ret = mbedtls_pk_parse_keyfile(&key, opt.filename, opt.password, 456a8e1175bSopenharmony_ci mbedtls_ctr_drbg_random, &ctr_drbg); 457a8e1175bSopenharmony_ci 458a8e1175bSopenharmony_ci if (ret != 0) { 459a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! mbedtls_pk_parse_keyfile returned %d", ret); 460a8e1175bSopenharmony_ci goto exit; 461a8e1175bSopenharmony_ci } 462a8e1175bSopenharmony_ci 463a8e1175bSopenharmony_ci mbedtls_x509write_csr_set_key(&req, &key); 464a8e1175bSopenharmony_ci 465a8e1175bSopenharmony_ci mbedtls_printf(" ok\n"); 466a8e1175bSopenharmony_ci 467a8e1175bSopenharmony_ci /* 468a8e1175bSopenharmony_ci * 1.2. Writing the request 469a8e1175bSopenharmony_ci */ 470a8e1175bSopenharmony_ci mbedtls_printf(" . Writing the certificate request ..."); 471a8e1175bSopenharmony_ci fflush(stdout); 472a8e1175bSopenharmony_ci 473a8e1175bSopenharmony_ci if ((ret = write_certificate_request(&req, opt.output_file, 474a8e1175bSopenharmony_ci mbedtls_ctr_drbg_random, &ctr_drbg)) != 0) { 475a8e1175bSopenharmony_ci mbedtls_printf(" failed\n ! write_certificate_request %d", ret); 476a8e1175bSopenharmony_ci goto exit; 477a8e1175bSopenharmony_ci } 478a8e1175bSopenharmony_ci 479a8e1175bSopenharmony_ci mbedtls_printf(" ok\n"); 480a8e1175bSopenharmony_ci 481a8e1175bSopenharmony_ci exit_code = MBEDTLS_EXIT_SUCCESS; 482a8e1175bSopenharmony_ci 483a8e1175bSopenharmony_ciexit: 484a8e1175bSopenharmony_ci 485a8e1175bSopenharmony_ci if (exit_code != MBEDTLS_EXIT_SUCCESS) { 486a8e1175bSopenharmony_ci#ifdef MBEDTLS_ERROR_C 487a8e1175bSopenharmony_ci mbedtls_strerror(ret, buf, sizeof(buf)); 488a8e1175bSopenharmony_ci mbedtls_printf(" - %s\n", buf); 489a8e1175bSopenharmony_ci#else 490a8e1175bSopenharmony_ci mbedtls_printf("\n"); 491a8e1175bSopenharmony_ci#endif 492a8e1175bSopenharmony_ci } 493a8e1175bSopenharmony_ci 494a8e1175bSopenharmony_ci mbedtls_x509write_csr_free(&req); 495a8e1175bSopenharmony_ci mbedtls_asn1_free_named_data_list(&ext_san_dirname); 496a8e1175bSopenharmony_ci mbedtls_pk_free(&key); 497a8e1175bSopenharmony_ci mbedtls_ctr_drbg_free(&ctr_drbg); 498a8e1175bSopenharmony_ci mbedtls_entropy_free(&entropy); 499a8e1175bSopenharmony_ci#if defined(MBEDTLS_USE_PSA_CRYPTO) 500a8e1175bSopenharmony_ci mbedtls_psa_crypto_free(); 501a8e1175bSopenharmony_ci#endif /* MBEDTLS_USE_PSA_CRYPTO */ 502a8e1175bSopenharmony_ci 503a8e1175bSopenharmony_ci cur = opt.san_list; 504a8e1175bSopenharmony_ci while (cur != NULL) { 505a8e1175bSopenharmony_ci prev = cur; 506a8e1175bSopenharmony_ci cur = cur->next; 507a8e1175bSopenharmony_ci mbedtls_free(prev); 508a8e1175bSopenharmony_ci } 509a8e1175bSopenharmony_ci 510a8e1175bSopenharmony_ci 511a8e1175bSopenharmony_ci mbedtls_exit(exit_code); 512a8e1175bSopenharmony_ci} 513a8e1175bSopenharmony_ci#endif /* MBEDTLS_X509_CSR_WRITE_C && MBEDTLS_PK_PARSE_C && MBEDTLS_FS_IO && 514a8e1175bSopenharmony_ci MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C && MBEDTLS_PEM_WRITE_C */ 515