#include <err.h>
#include <stdlib.h>
#include <unistd.h>
#include <openssl/evp.h>
#include <openssl/pem.h>
#include <openssl/rsa.h>
#include <openssl/ec.h>
#include <openssl/obj_mac.h>
#include "key.h"
#define KBITS 4096
EVP_PKEY *
rsa_key_create(FILE *f, const char *fname)
{
EVP_PKEY_CTX *ctx = NULL;
EVP_PKEY *pkey = NULL;
if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL)) == NULL) {
warnx("EVP_PKEY_CTX_new_id");
goto err;
}
if (EVP_PKEY_keygen_init(ctx) <= 0) {
warnx("EVP_PKEY_keygen_init");
goto err;
}
if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, KBITS) <= 0) {
warnx("EVP_PKEY_set_rsa_keygen_bits");
goto err;
}
if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
warnx("EVP_PKEY_keygen");
goto err;
}
if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) {
warnx("%s: PEM_write_PrivateKey", fname);
goto err;
}
EVP_PKEY_CTX_free(ctx);
return pkey;
err:
EVP_PKEY_free(pkey);
EVP_PKEY_CTX_free(ctx);
return NULL;
}
EVP_PKEY *
ec_key_create(FILE *f, const char *fname)
{
EVP_PKEY_CTX *ctx = NULL;
EVP_PKEY *pkey = NULL;
if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL)) == NULL) {
warnx("EVP_PKEY_CTX_new_id");
goto err;
}
if (EVP_PKEY_keygen_init(ctx) <= 0) {
warnx("EVP_PKEY_keygen_init");
goto err;
}
if (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(ctx, NID_secp384r1) <= 0) {
warnx("EVP_PKEY_CTX_set_ec_paramgen_curve_nid");
goto err;
}
if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
warnx("EVP_PKEY_keygen");
goto err;
}
if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) {
warnx("%s: PEM_write_PrivateKey", fname);
goto err;
}
EVP_PKEY_CTX_free(ctx);
return pkey;
err:
EVP_PKEY_free(pkey);
EVP_PKEY_CTX_free(ctx);
return NULL;
}
EVP_PKEY *
key_load(FILE *f, const char *fname)
{
EVP_PKEY *pkey;
pkey = PEM_read_PrivateKey(f, NULL, NULL, NULL);
if (pkey == NULL) {
warnx("%s: PEM_read_PrivateKey", fname);
return NULL;
}
if (EVP_PKEY_base_id(pkey) == EVP_PKEY_RSA ||
EVP_PKEY_base_id(pkey) == EVP_PKEY_EC)
return pkey;
warnx("%s: unsupported key type", fname);
EVP_PKEY_free(pkey);
return NULL;
}