1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193
|
/*
* Copyright © 2025 Mobi - Com Polska Sp. z o.o.
* Author: Małgorzata Olszówka <Malgorzata.Olszowka@stunnel.org>
* All rights reserved.
*
* Elliptic Curve Ed448 key generation
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#if !defined(OPENSSL_NO_EC) && \
(OPENSSL_VERSION_NUMBER >= 0x30000000L) && \
(OPENSSL_VERSION_NUMBER < 0x40000000L)
#include <libp11.h>
#include <string.h>
#define CHECK_ERR(cond, txt, code) \
do { \
if (cond) { \
fprintf(stderr, "%s\n", (txt)); \
rc=(code); \
goto end; \
} \
} while (0)
static void error_queue(const char *name)
{
if (ERR_peek_last_error()) {
fprintf(stderr, "%s generated errors:\n", name);
ERR_print_errors_fp(stderr);
}
}
static int hex_to_bytes(const char *hex, unsigned char *out, size_t out_len)
{
size_t i;
for (i = 0; i < out_len; i++) {
if (sscanf(hex + (i * 2), "%2hhx", &out[i]) != 1) {
return -1;
}
}
return 0;
}
static void list_keys(const char *title, const PKCS11_KEY *keys,
const unsigned int nkeys) {
unsigned int i;
printf("\n%s:\n", title);
for (i = 0; i < nkeys; i++) {
printf(" #%d id=", i);
for (size_t j = 0; j < keys[i].id_len; j++) {
printf("%02x", keys[i].id[j]);
}
printf(";object=%s\n", keys[i].label);
}
}
int main(int argc, char *argv[])
{
PKCS11_CTX *ctx = NULL;
PKCS11_SLOT *slots = NULL, *slot;
PKCS11_KEY *keys;
unsigned int nslots, nkeys;
unsigned char *key_id = NULL;
size_t len, key_id_len;
const char *key_id_str;
int rc = 0;
PKCS11_params params = {.sensitive = 1, .extractable = 0};
PKCS11_EDDSA_KGEN eddsa = {.nid = NID_ED448};
PKCS11_KGEN_ATTRS eckg = {0};
if (argc < 5) {
fprintf(stderr, "usage: %s [module] [TOKEN] [KEY-LABEL] [KEY-ID] [PIN]\n", argv[0]);
return 1;
}
key_id_str = argv[4];
len = strlen(key_id_str);
CHECK_ERR(len % 2 != 0, "Invalid key ID format: odd length", 1);
/* key_id_str is a null-terminated string, but key_id is not */
key_id_len = len / 2;
key_id = OPENSSL_malloc(key_id_len);
CHECK_ERR(!key_id, "Memory allocation failed for key ID", 2);
rc = hex_to_bytes(key_id_str, key_id, key_id_len);
CHECK_ERR(rc != 0, "Invalid hex digit in key ID", 3);
ctx = PKCS11_CTX_new();
error_queue("PKCS11_CTX_new");
/* load PKCS#11 module */
rc = PKCS11_CTX_load(ctx, argv[1]);
error_queue("PKCS11_CTX_load");
CHECK_ERR(rc < 0, "loading PKCS#11 module failed", 4);
/* get information on all slots */
rc = PKCS11_enumerate_slots(ctx, &slots, &nslots);
error_queue("PKCS11_enumerate_slots");
CHECK_ERR(rc < 0, "no slots available", 5);
slot = PKCS11_find_token(ctx, slots, nslots);
error_queue("PKCS11_find_token");
while (slot) {
if (slot->token && slot->token->initialized && slot->token->label
&& strcmp(argv[2], slot->token->label) == 0)
break;
slot = PKCS11_find_next_token(ctx, slots, nslots, slot);
};
CHECK_ERR(!slot || !slot->token, "no token available", 6);
printf("Found token:\n");
printf("Slot manufacturer......: %s\n", slot->manufacturer);
printf("Slot description.......: %s\n", slot->description);
printf("Slot token label.......: %s\n", slot->token->label);
printf("Slot token serialnr....: %s\n", slot->token->serialnr);
rc = PKCS11_login(slot, 0, argv[5]);
error_queue("PKCS11_login");
CHECK_ERR(rc < 0, "PKCS11_login failed", 7);
eckg.type = EVP_PKEY_ED448;
eckg.kgen.eddsa = &eddsa;
eckg.token_label = argv[2];
eckg.key_label = argv[3];
/* key_id is a raw binary buffer of length key_id_len */
eckg.key_id = (const unsigned char *)key_id;
eckg.id_len = key_id_len;
eckg.key_params = ¶ms;
rc = PKCS11_keygen(slot->token, &eckg);
error_queue("PKCS11_keygen");
CHECK_ERR(rc < 0, "Failed to generate a key pair on the token", 8);
printf("\nEd448 keys generated\n");
/* get private keys */
rc = PKCS11_enumerate_keys(slot->token, &keys, &nkeys);
error_queue("PKCS11_enumerate_keys");
CHECK_ERR(rc < 0, "PKCS11_enumerate_keys failed", 9);
CHECK_ERR(nkeys == 0, "No private keys found", 10);
list_keys("Private keys", keys, nkeys);
end:
if (slots)
PKCS11_release_all_slots(ctx, slots, nslots);
if (ctx) {
PKCS11_CTX_unload(ctx);
PKCS11_CTX_free(ctx);
}
OPENSSL_free(key_id);
if (rc)
printf("Failed (error code %d).\n", rc);
else
printf("Success.\n");
return rc;
}
#else /* !OPENSSL_NO_EC && OpenSSL 3.x */
#include <stdio.h>
int main(void)
{
fprintf(stderr, "Skipped: requires OpenSSL 3.x built with EC support\n");
return 77;
}
#endif /* !OPENSSL_NO_EC && OpenSSL 3.x */
/* vim: set noexpandtab: */
|