diff --git a/src/tools/chip-cert/CertUtils.cpp b/src/tools/chip-cert/CertUtils.cpp index 53975b7d89f020..f929e1446317e2 100644 --- a/src/tools/chip-cert/CertUtils.cpp +++ b/src/tools/chip-cert/CertUtils.cpp @@ -508,52 +508,51 @@ bool AddAuthorityKeyId(X509 * cert, X509 * caCert) return res; } +bool ReadCertPEM(const char * fileName, X509 * cert) +{ + bool res = true; + FILE * file = nullptr; + + res = OpenFile(fileName, file); + VerifyTrueOrExit(res); + + if (PEM_read_X509(file, &cert, nullptr, nullptr) == nullptr) + { + ReportOpenSSLErrorAndExit("PEM_read_X509", res = false); + } + +exit: + CloseFile(file); + return res; +} + } // namespace -bool ReadCert(const char * fileNameOrStr, X509 * cert) +bool ReadCert(const char * fileName, X509 * cert) { CertFormat origCertFmt; - return ReadCert(fileNameOrStr, cert, origCertFmt); + return ReadCert(fileName, cert, origCertFmt); } -bool ReadCert(const char * fileNameOrStr, X509 * cert, CertFormat & certFmt) +bool ReadCert(const char * fileName, X509 * cert, CertFormat & certFmt) { bool res = true; uint32_t certLen = 0; std::unique_ptr certBuf; - // If fileNameOrStr is a file name - if (access(fileNameOrStr, R_OK) == 0) - { - res = ReadFileIntoMem(fileNameOrStr, nullptr, certLen); - VerifyTrueOrExit(res); + res = ReadFileIntoMem(fileName, nullptr, certLen); + VerifyTrueOrExit(res); - certBuf = std::unique_ptr(new uint8_t[certLen]); + certBuf = std::unique_ptr(new uint8_t[certLen]); - res = ReadFileIntoMem(fileNameOrStr, certBuf.get(), certLen); - VerifyTrueOrExit(res); + res = ReadFileIntoMem(fileName, certBuf.get(), certLen); + VerifyTrueOrExit(res); - certFmt = DetectCertFormat(certBuf.get(), certLen); - if (certFmt == kCertFormat_Unknown) - { - fprintf(stderr, "Unrecognized Cert Format in File: %s\n", fileNameOrStr); - return false; - } - } - // Otherwise, treat fileNameOrStr as a pointer to the certificate string - else + certFmt = DetectCertFormat(certBuf.get(), certLen); + if (certFmt == kCertFormat_Unknown) { - certLen = static_cast(strlen(fileNameOrStr)); - - certFmt = DetectCertFormat(reinterpret_cast(fileNameOrStr), certLen); - if (certFmt == kCertFormat_Unknown) - { - fprintf(stderr, "Unrecognized Cert Format in the Input Argument: %s\n", fileNameOrStr); - return false; - } - - certBuf = std::unique_ptr(new uint8_t[certLen]); - memcpy(certBuf.get(), fileNameOrStr, certLen); + fprintf(stderr, "Unrecognized Cert Format in File: %s\n", fileName); + return false; } if ((certFmt == kCertFormat_X509_Hex) || (certFmt == kCertFormat_Chip_Hex)) @@ -566,15 +565,8 @@ bool ReadCert(const char * fileNameOrStr, X509 * cert, CertFormat & certFmt) if (certFmt == kCertFormat_X509_PEM) { - VerifyOrReturnError(chip::CanCastTo(certLen), false); - - std::unique_ptr certBIO( - BIO_new_mem_buf(static_cast(certBuf.get()), static_cast(certLen)), &BIO_free_all); - - if (PEM_read_bio_X509(certBIO.get(), &cert, nullptr, nullptr) == nullptr) - { - ReportOpenSSLErrorAndExit("PEM_read_bio_X509", res = false); - } + res = ReadCertPEM(fileName, cert); + VerifyTrueOrExit(res); } else if ((certFmt == kCertFormat_X509_DER) || (certFmt == kCertFormat_X509_Hex)) { @@ -620,12 +612,12 @@ bool ReadCert(const char * fileNameOrStr, X509 * cert, CertFormat & certFmt) return res; } -bool ReadCertDER(const char * fileNameOrStr, MutableByteSpan & cert) +bool ReadCertDERRaw(const char * fileName, MutableByteSpan & cert) { bool res = true; std::unique_ptr certX509(X509_new(), &X509_free); - VerifyOrReturnError(ReadCert(fileNameOrStr, certX509.get()), false); + VerifyOrReturnError(ReadCertPEM(fileName, certX509.get()) == true, false); uint8_t * certPtr = cert.data(); int certLen = i2d_X509(certX509.get(), &certPtr); @@ -668,14 +660,14 @@ bool X509ToChipCert(X509 * cert, MutableByteSpan & chipCert) return res; } -bool LoadChipCert(const char * fileNameOrStr, bool isTrused, ChipCertificateSet & certSet, MutableByteSpan & chipCert) +bool LoadChipCert(const char * fileName, bool isTrused, ChipCertificateSet & certSet, MutableByteSpan & chipCert) { bool res = true; CHIP_ERROR err; BitFlags decodeFlags; std::unique_ptr cert(X509_new(), &X509_free); - res = ReadCert(fileNameOrStr, cert.get()); + res = ReadCert(fileName, cert.get()); VerifyTrueOrExit(res); res = X509ToChipCert(cert.get(), chipCert); @@ -693,7 +685,7 @@ bool LoadChipCert(const char * fileNameOrStr, bool isTrused, ChipCertificateSet err = certSet.LoadCert(chipCert, decodeFlags); if (err != CHIP_NO_ERROR) { - fprintf(stderr, "Error reading %s\n%s\n", fileNameOrStr, chip::ErrorStr(err)); + fprintf(stderr, "Error reading %s\n%s\n", fileName, chip::ErrorStr(err)); ExitNow(res = false); } @@ -755,6 +747,8 @@ bool WriteCert(const char * fileName, X509 * cert, CertFormat certFmt) ExitNow(res = false); } + printf("\r\n"); + exit: OPENSSL_free(derCert); CloseFile(file); diff --git a/src/tools/chip-cert/Cmd_ConvertCert.cpp b/src/tools/chip-cert/Cmd_ConvertCert.cpp index 7eba1cc2f8868c..a1379388f02d0c 100644 --- a/src/tools/chip-cert/Cmd_ConvertCert.cpp +++ b/src/tools/chip-cert/Cmd_ConvertCert.cpp @@ -87,21 +87,21 @@ OptionSet gCmdOptions = HelpOptions gHelpOptions( CMD_NAME, - "Usage: " CMD_NAME " [ ] \n", + "Usage: " CMD_NAME " [ ] \n", CHIP_VERSION_STRING "\n" COPYRIGHT_STRING, - "Convert operational certificate between CHIP and X.509 formats.\n" + "Convert a certificate between CHIP and X509 forms.\n" "\n" "ARGUMENTS\n" "\n" - " \n" + " \n" "\n" - " File or string containing certificate to be converted.\n" - " The format of the input certificate is auto-detected and can be any of:\n" - " X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX.\n" + " The input certificate file name, or - to read from stdin. The\n" + " format of the input certificate is auto-detected and can be any\n" + " of: X.509 PEM, X.509 DER, CHIP base-64 or CHIP raw TLV.\n" "\n" - " \n" + " \n" "\n" - " The output certificate file name, or '-' to write to stdout.\n" + " The output certificate file name, or - to write to stdout.\n" "\n" ); @@ -113,9 +113,9 @@ OptionSet * gCmdOptionSets[] = }; // clang-format on -const char * gInFileNameOrStr = nullptr; -const char * gOutFileName = nullptr; -CertFormat gOutCertFormat = kCertFormat_Default; +const char * gInFileName = nullptr; +const char * gOutFileName = nullptr; +CertFormat gOutCertFormat = kCertFormat_Default; bool HandleOption(const char * progName, OptionSet * optSet, int id, const char * name, const char * arg) { @@ -151,7 +151,7 @@ bool HandleNonOptionArgs(const char * progName, int argc, char * const argv[]) { if (argc == 0) { - PrintArgError("%s: Please specify the name of the input certificate file or the certificate string.\n", progName); + PrintArgError("%s: Please specify the name of the input certificate file, or - for stdin.\n", progName); return false; } @@ -167,8 +167,8 @@ bool HandleNonOptionArgs(const char * progName, int argc, char * const argv[]) return false; } - gInFileNameOrStr = argv[0]; - gOutFileName = argv[1]; + gInFileName = argv[0]; + gOutFileName = argv[1]; return true; } @@ -192,7 +192,7 @@ bool Cmd_ConvertCert(int argc, char * argv[]) res = InitOpenSSL(); VerifyTrueOrExit(res); - res = ReadCert(gInFileNameOrStr, cert.get()); + res = ReadCert(gInFileName, cert.get()); VerifyTrueOrExit(res); res = WriteCert(gOutFileName, cert.get(), gOutCertFormat); diff --git a/src/tools/chip-cert/Cmd_ConvertKey.cpp b/src/tools/chip-cert/Cmd_ConvertKey.cpp index 0df462b45663e3..8f08c41d19ab9d 100644 --- a/src/tools/chip-cert/Cmd_ConvertKey.cpp +++ b/src/tools/chip-cert/Cmd_ConvertKey.cpp @@ -110,26 +110,21 @@ OptionSet gCmdOptions = HelpOptions gHelpOptions( CMD_NAME, - "Usage: " CMD_NAME " [ ] \n", + "Usage: " CMD_NAME " [ ] \n", CHIP_VERSION_STRING "\n" COPYRIGHT_STRING, - "Convert private/public key between CHIP and X.509 formats.\n" + "Convert a private key between CHIP and PEM/DER forms." "\n" "ARGUMENTS\n" "\n" - " \n" + " \n" "\n" - " File or string containing private/public key to be converted.\n" - " The format of the input key is auto-detected and can be any of:\n" - " X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX.\n" + " The input private key file name, or - to read from stdin. The\n" + " format of the input key is auto-detected and can be any\n" + " of: PEM, DER, CHIP base-64 or CHIP raw.\n" "\n" - " Note: the private key formats include both private and public keys, while\n" - " the public key formats include only public keys. Therefore, conversion from any\n" - " private key format to public key is supported but conversion from public key\n" - " to private CANNOT be done.\n" + " \n" "\n" - " \n" - "\n" - " The output private key file name, or '-' to write to stdout.\n" + " The output private key file name, or - to write to stdout.\n" "\n" ); @@ -141,7 +136,7 @@ OptionSet *gCmdOptionSets[] = }; // clang-ormat on -const char * gInFileNameOrStr = nullptr; +const char * gInFileName = nullptr; const char * gOutFileName = nullptr; KeyFormat gOutFormat = kKeyFormat_Chip_Base64; @@ -208,7 +203,7 @@ bool HandleNonOptionArgs(const char * progName, int argc, char * const argv[]) return false; } - gInFileNameOrStr = argv[0]; + gInFileName = argv[0]; gOutFileName = argv[1]; return true; @@ -233,7 +228,7 @@ bool Cmd_ConvertKey(int argc, char * argv[]) res = InitOpenSSL(); VerifyTrueOrExit(res); - res = ReadKey(gInFileNameOrStr, key); + res = ReadKey(gInFileName, key); VerifyTrueOrExit(res); if (IsPrivateKeyFormat(gOutFormat) && EC_KEY_get0_private_key(EVP_PKEY_get1_EC_KEY(key.get())) == nullptr) diff --git a/src/tools/chip-cert/Cmd_GenAttCert.cpp b/src/tools/chip-cert/Cmd_GenAttCert.cpp index 845344860c49cd..5425e5de6a6e7a 100644 --- a/src/tools/chip-cert/Cmd_GenAttCert.cpp +++ b/src/tools/chip-cert/Cmd_GenAttCert.cpp @@ -90,29 +90,27 @@ const char * const gCmdOptionHelp = " If not specified then by default the VID and PID fields are encoded using\n" " Matter specific OIDs.\n" "\n" - " -C, --ca-cert \n" + " -C, --ca-cert \n" "\n" - " File or string containing CA certificate to be used to sign the new certificate.\n" + " File containing CA certificate to be used to sign the new certificate.\n" "\n" - " -K, --ca-key \n" + " -K, --ca-key \n" "\n" - " File or string containing CA private key to be used to sign the new certificate.\n" + " File containing CA private key to be used to sign the new certificate.\n" "\n" - " -k, --key \n" + " -k, --key \n" "\n" - " File or string containing the public and private keys for the new certificate (in an X.509 PEM format).\n" + " File containing the public and private keys for the new certificate (in an X.509 PEM format).\n" " If not specified, a new key pair will be generated.\n" "\n" - " -o, --out \n" + " -o, --out \n" "\n" " File to contain the new certificate (in an X.509 PEM format).\n" - " If specified '-' then output is written to stdout.\n" "\n" - " -O, --out-key \n" + " -O, --out-key \n" "\n" " File to contain the public/private key for the new certificate (in an X.509 PEM format).\n" " This option must be specified if the --key option is not.\n" - " If specified '-' then output is written to stdout.\n" "\n" " -f, --valid-from --
[ :: ]\n" "\n" @@ -190,7 +188,7 @@ HelpOptions gHelpOptions( CMD_NAME, "Usage: " CMD_NAME " [ ]\n", CHIP_VERSION_STRING "\n" COPYRIGHT_STRING, - "Generate a CHIP Attestation certificate" + "Generate a CHIP certificate" ); OptionSet *gCmdOptionSets[] = @@ -201,17 +199,17 @@ OptionSet *gCmdOptionSets[] = }; // clang-format on -AttCertType gAttCertType = kAttCertType_NotSpecified; -const char * gSubjectCN = nullptr; -uint16_t gSubjectVID = VendorId::NotSpecified; -uint16_t gSubjectPID = 0; -bool gEncodeVIDandPIDasCN = false; -const char * gCACertFileNameOrStr = nullptr; -const char * gCAKeyFileNameOrStr = nullptr; -const char * gInKeyFileNameOrStr = nullptr; -const char * gOutCertFileName = nullptr; -const char * gOutKeyFileName = nullptr; -uint32_t gValidDays = kCertValidDays_Undefined; +AttCertType gAttCertType = kAttCertType_NotSpecified; +const char * gSubjectCN = nullptr; +uint16_t gSubjectVID = VendorId::NotSpecified; +uint16_t gSubjectPID = 0; +bool gEncodeVIDandPIDasCN = false; +const char * gCACertFileName = nullptr; +const char * gCAKeyFileName = nullptr; +const char * gInKeyFileName = nullptr; +const char * gOutCertFileName = nullptr; +const char * gOutKeyFileName = nullptr; +uint32_t gValidDays = kCertValidDays_Undefined; struct tm gValidFrom; CertStructConfig gCertConfig; @@ -263,13 +261,13 @@ bool HandleOption(const char * progName, OptionSet * optSet, int id, const char gEncodeVIDandPIDasCN = true; break; case 'k': - gInKeyFileNameOrStr = arg; + gInKeyFileName = arg; break; case 'C': - gCACertFileNameOrStr = arg; + gCACertFileName = arg; break; case 'K': - gCAKeyFileNameOrStr = arg; + gCAKeyFileName = arg; break; case 'o': gOutCertFileName = arg; @@ -476,19 +474,19 @@ bool Cmd_GenAttCert(int argc, char * argv[]) } } - if (gCACertFileNameOrStr == nullptr && gAttCertType != kAttCertType_PAA) + if (gCACertFileName == nullptr && gAttCertType != kAttCertType_PAA) { fprintf(stderr, "Please specify the CA certificate file name using the --ca-cert option.\n"); return false; } - if (gCACertFileNameOrStr != nullptr && gAttCertType == kAttCertType_PAA) + if (gCACertFileName != nullptr && gAttCertType == kAttCertType_PAA) { fprintf(stderr, "Please don't specify --ca-cert option for the self signed certificate. \n"); return false; } - if (gCACertFileNameOrStr != nullptr && gCAKeyFileNameOrStr == nullptr) + if (gCACertFileName != nullptr && gCAKeyFileName == nullptr) { fprintf(stderr, "Please specify the CA key file name using the --ca-key option.\n"); return false; @@ -500,7 +498,7 @@ bool Cmd_GenAttCert(int argc, char * argv[]) return false; } - if (gInKeyFileNameOrStr == nullptr && gOutKeyFileName == nullptr) + if (gInKeyFileName == nullptr && gOutKeyFileName == nullptr) { fprintf(stderr, "Please specify the file name for the new public/private key using the --out-key option.\n"); return false; @@ -533,9 +531,9 @@ bool Cmd_GenAttCert(int argc, char * argv[]) res = InitOpenSSL(); VerifyTrueOrExit(res); - if (gInKeyFileNameOrStr != nullptr) + if (gInKeyFileName != nullptr) { - res = ReadKey(gInKeyFileNameOrStr, newKey); + res = ReadKey(gInKeyFileName, newKey); VerifyTrueOrExit(res); } else @@ -563,10 +561,10 @@ bool Cmd_GenAttCert(int argc, char * argv[]) std::unique_ptr caCert(X509_new(), &X509_free); std::unique_ptr caKey(EVP_PKEY_new(), &EVP_PKEY_free); - res = ReadCert(gCACertFileNameOrStr, caCert.get()); + res = ReadCert(gCACertFileName, caCert.get()); VerifyTrueOrExit(res); - res = ReadKey(gCAKeyFileNameOrStr, caKey, gCertConfig.IsErrorTestCaseEnabled()); + res = ReadKey(gCAKeyFileName, caKey, gCertConfig.IsErrorTestCaseEnabled()); VerifyTrueOrExit(res); res = MakeAttCert(gAttCertType, gSubjectCN, gSubjectVID, gSubjectPID, gEncodeVIDandPIDasCN, caCert.get(), caKey.get(), diff --git a/src/tools/chip-cert/Cmd_GenCD.cpp b/src/tools/chip-cert/Cmd_GenCD.cpp index 36f15f1a5a8324..07d2ac2b510c83 100644 --- a/src/tools/chip-cert/Cmd_GenCD.cpp +++ b/src/tools/chip-cert/Cmd_GenCD.cpp @@ -72,20 +72,19 @@ OptionDef gCmdOptionDefs[] = }; const char * const gCmdOptionHelp = - " -K, --key \n" + " -K, --key \n" "\n" - " File or string containing private key to be used to sign the Certification Declaration.\n" + " File containing private key to be used to sign the Certification Declaration.\n" "\n" - " -C, --cert \n" + " -C, --cert \n" "\n" - " File or string containing certificate associated with the private key that is used\n" + " File containing certificate associated with the private key that is used\n" " to sign the Certification Declaration. The Subject Key Identifier in the\n" " certificate will be included in the signed Certification Declaration message.\n" "\n" - " -O, --out \n" + " -O, --out \n" "\n" " File to contain the signed Certification Declaration message.\n" - " If specified '-' then output is written to stdout.\n" "\n" " -f, --format-version \n" "\n" @@ -135,9 +134,9 @@ const char * const gCmdOptionHelp = "\n" " DAC Origin Product Id in hex.\n" "\n" - " -a, --authorized-paa-cert \n" + " -a, --authorized-paa-cert \n" "\n" - " File or string containing PAA certificate authorized to sign PAI which signs the DAC\n" + " File containing PAA certificate authorized to sign PAI which signs the DAC\n" " for a product carrying this CD. This field is optional and if present, only specified\n" " PAAs will be authorized to sign device's PAI for the lifetime of the generated CD.\n" " Maximum 10 authorized PAA certificates can be specified.\n" @@ -361,9 +360,9 @@ class CDStructConfig }; CertificationElements gCertElements; -const char * gCertFileNameOrStr = nullptr; -const char * gKeyFileNameOrStr = nullptr; -const char * gSignedCDFileName = nullptr; +const char * gCertFileName = nullptr; +const char * gKeyFileName = nullptr; +const char * gSignedCDFileName = nullptr; CDStructConfig gCDConfig; bool ExtractSKIDFromX509Cert(X509 * cert, ByteSpan & skid) @@ -381,10 +380,10 @@ bool HandleOption(const char * progName, OptionSet * optSet, int id, const char switch (id) { case 'C': - gCertFileNameOrStr = arg; + gCertFileName = arg; break; case 'K': - gKeyFileNameOrStr = arg; + gKeyFileName = arg; break; case 'O': gSignedCDFileName = arg; @@ -484,9 +483,9 @@ bool HandleOption(const char * progName, OptionSet * optSet, int id, const char return false; } { - const char * fileNameOrStr = arg; + const char * fileName = arg; std::unique_ptr cert(X509_new(), &X509_free); - VerifyOrReturnError(ReadCert(fileNameOrStr, cert.get()), false); + VerifyOrReturnError(ReadCert(fileName, cert.get()), false); ByteSpan skid; VerifyOrReturnError(ExtractSKIDFromX509Cert(cert.get(), skid), false); @@ -1099,15 +1098,15 @@ bool Cmd_GenCD(int argc, char * argv[]) "declaration.\n"); } - if (gKeyFileNameOrStr == nullptr) + if (gKeyFileName == nullptr) { - fprintf(stderr, "Please specify the signing private key using the --key option.\n"); + fprintf(stderr, "Please specify the signing private key file name using the --key option.\n"); return false; } - if (gCertFileNameOrStr == nullptr) + if (gCertFileName == nullptr) { - fprintf(stderr, "Please specify the signing certificate using the --cert option.\n"); + fprintf(stderr, "Please specify the signing certificate file name using the --cert option.\n"); return false; } @@ -1147,8 +1146,8 @@ bool Cmd_GenCD(int argc, char * argv[]) std::unique_ptr cert(X509_new(), &X509_free); std::unique_ptr key(EVP_PKEY_new(), &EVP_PKEY_free); - VerifyOrReturnError(ReadCert(gCertFileNameOrStr, cert.get()), false); - VerifyOrReturnError(ReadKey(gKeyFileNameOrStr, key), false); + VerifyOrReturnError(ReadCert(gCertFileName, cert.get()), false); + VerifyOrReturnError(ReadKey(gKeyFileName, key), false); // Extract the subject key id from the X509 certificate. ByteSpan signerKeyId; diff --git a/src/tools/chip-cert/Cmd_GenCert.cpp b/src/tools/chip-cert/Cmd_GenCert.cpp index ab0bc0c63587c6..e944bdb07733c9 100644 --- a/src/tools/chip-cert/Cmd_GenCert.cpp +++ b/src/tools/chip-cert/Cmd_GenCert.cpp @@ -110,29 +110,27 @@ const char * const gCmdOptionHelp = "\n" " NID_info_access extension to be added to the list of certificate extensions.\n" "\n" - " -C, --ca-cert \n" + " -C, --ca-cert \n" "\n" - " File or string containing CA certificate to be used to sign the new certificate.\n" + " File containing CA certificate to be used to sign the new certificate.\n" "\n" - " -K, --ca-key \n" + " -K, --ca-key \n" "\n" - " File or string containing CA private key to be used to sign the new certificate.\n" + " File containing CA private key to be used to sign the new certificate.\n" "\n" - " -k, --key \n" + " -k, --key \n" "\n" - " File or string containing the public and private keys for the new certificate.\n" + " File containing the public and private keys for the new certificate.\n" " If not specified, a new key pair will be generated.\n" "\n" - " -o, --out \n" + " -o, --out \n" "\n" " File to contain the new certificate.\n" - " If specified '-' then output is written to stdout.\n" "\n" - " -O, --out-key \n" + " -O, --out-key \n" "\n" " File to contain the public/private key for the new certificate.\n" " This option must be specified if the --key option is not.\n" - " If specified '-' then output is written to stdout.\n" "\n" " -F, --out-format \n" "\n" @@ -245,19 +243,19 @@ OptionSet *gCmdOptionSets[] = // clang-format on ToolChipDN gSubjectDN; -uint8_t gCertType = kCertType_NotSpecified; -int gPathLengthConstraint = kPathLength_NotSpecified; -bool gSelfSign = false; -const char * gCACertFileNameOrStr = nullptr; -const char * gCAKeyFileNameOrStr = nullptr; -const char * gInKeyFileNameOrStr = nullptr; -const char * gOutCertFileName = nullptr; -const char * gOutKeyFileName = nullptr; -CertFormat gOutCertFormat = kCertFormat_Default; -KeyFormat gOutKeyFormat = kKeyFormat_Default; -uint32_t gValidDays = kCertValidDays_Undefined; -FutureExtensionWithNID gFutureExtensions[3] = { { 0, nullptr } }; -uint8_t gFutureExtensionsCount = 0; +uint8_t gCertType = kCertType_NotSpecified; +int gPathLengthConstraint = kPathLength_NotSpecified; +bool gSelfSign = false; +const char * gCACertFileName = nullptr; +const char * gCAKeyFileName = nullptr; +const char * gInKeyFileName = nullptr; +const char * gOutCertFileName = nullptr; +const char * gOutKeyFileName = nullptr; +CertFormat gOutCertFormat = kCertFormat_Default; +KeyFormat gOutKeyFormat = kKeyFormat_Default; +uint32_t gValidDays = kCertValidDays_Undefined; +FutureExtension gFutureExtensions[3] = { { 0, nullptr } }; +uint8_t gFutureExtensionsCount = 0; struct tm gValidFrom; CertStructConfig gCertConfig; @@ -428,13 +426,13 @@ bool HandleOption(const char * progName, OptionSet * optSet, int id, const char gFutureExtensionsCount++; break; case 'k': - gInKeyFileNameOrStr = arg; + gInKeyFileName = arg; break; case 'C': - gCACertFileNameOrStr = arg; + gCACertFileName = arg; break; case 'K': - gCAKeyFileNameOrStr = arg; + gCAKeyFileName = arg; break; case 'o': gOutCertFileName = arg; @@ -749,18 +747,18 @@ bool Cmd_GenCert(int argc, char * argv[]) } } - if (gCACertFileNameOrStr == nullptr && !gSelfSign) + if (gCACertFileName == nullptr && !gSelfSign) { - fprintf(stderr, "Please specify the CA certificate using the --ca-cert option.\n"); + fprintf(stderr, "Please specify the CA certificate file name using the --ca-cert option.\n"); ExitNow(res = false); } - else if (gCACertFileNameOrStr != nullptr && gSelfSign) + else if (gCACertFileName != nullptr && gSelfSign) { fprintf(stderr, "Please don't specify --ca-cert option for the self signed certificate. \n"); ExitNow(res = false); } - if (gCACertFileNameOrStr != nullptr && gCAKeyFileNameOrStr == nullptr) + if (gCACertFileName != nullptr && gCAKeyFileName == nullptr) { fprintf(stderr, "Please specify the CA key file name using the --ca-key option.\n"); ExitNow(res = false); @@ -772,7 +770,7 @@ bool Cmd_GenCert(int argc, char * argv[]) ExitNow(res = false); } - if (gInKeyFileNameOrStr == nullptr && gOutKeyFileName == nullptr) + if (gInKeyFileName == nullptr && gOutKeyFileName == nullptr) { fprintf(stderr, "Please specify the file name for the new public/private key using the --out-key option.\n"); ExitNow(res = false); @@ -812,9 +810,9 @@ bool Cmd_GenCert(int argc, char * argv[]) res = InitOpenSSL(); VerifyTrueOrExit(res); - if (gInKeyFileNameOrStr != nullptr) + if (gInKeyFileName != nullptr) { - res = ReadKey(gInKeyFileNameOrStr, newKey); + res = ReadKey(gInKeyFileName, newKey); VerifyTrueOrExit(res); } else @@ -838,10 +836,10 @@ bool Cmd_GenCert(int argc, char * argv[]) } else { - res = ReadCert(gCACertFileNameOrStr, caCert.get()); + res = ReadCert(gCACertFileName, caCert.get()); VerifyTrueOrExit(res); - res = ReadKey(gCAKeyFileNameOrStr, caKey); + res = ReadKey(gCAKeyFileName, caKey); VerifyTrueOrExit(res); caCertPtr = caCert.get(); diff --git a/src/tools/chip-cert/Cmd_PrintCert.cpp b/src/tools/chip-cert/Cmd_PrintCert.cpp index 5ccc9fb536b446..2bef2ed868c2a2 100644 --- a/src/tools/chip-cert/Cmd_PrintCert.cpp +++ b/src/tools/chip-cert/Cmd_PrintCert.cpp @@ -46,10 +46,10 @@ OptionDef gCmdOptionDefs[] = }; const char * const gCmdOptionHelp = - " -o, --out \n" + " -o, --out\n" "\n" " The output printed certificate file name. If not specified\n" - " or if specified '-' then output is written to stdout.\n" + " or if specified - then output is written to stdout.\n" "\n" ; @@ -63,15 +63,15 @@ OptionSet gCmdOptions = HelpOptions gHelpOptions( CMD_NAME, - "Usage: " CMD_NAME " [] \n", + "Usage: " CMD_NAME " [] \n", CHIP_VERSION_STRING "\n" COPYRIGHT_STRING, - "Print a CHIP operational certificate.\n" + "Print a CHIP certificate.\n" "\n" "ARGUMENTS\n" "\n" - " \n" + " \n" "\n" - " File or string containing a CHIP certificate.\n" + " A file containing a CHIP certificate.\n" "\n" ); @@ -83,8 +83,8 @@ OptionSet *gCmdOptionSets[] = }; // clang-format on -const char * gInFileNameOrStr = nullptr; -const char * gOutFileName = "-"; +const char * gInFileName = nullptr; +const char * gOutFileName = "-"; bool HandleOption(const char * progName, OptionSet * optSet, int id, const char * name, const char * arg) { @@ -115,7 +115,7 @@ bool HandleNonOptionArgs(const char * progName, int argc, char * const argv[]) return false; } - gInFileNameOrStr = argv[0]; + gInFileName = argv[0]; return true; } @@ -385,7 +385,7 @@ bool Cmd_PrintCert(int argc, char * argv[]) res = ParseArgs(CMD_NAME, argc, argv, gCmdOptionSets, HandleNonOptionArgs); VerifyTrueOrExit(res); - res = ReadCert(gInFileNameOrStr, cert.get()); + res = ReadCert(gInFileName, cert.get()); VerifyTrueOrExit(res); res = PrintCert(gOutFileName, cert.get()); diff --git a/src/tools/chip-cert/Cmd_ResignCert.cpp b/src/tools/chip-cert/Cmd_ResignCert.cpp index 053b5ff917d0b9..53d33ad480f23b 100644 --- a/src/tools/chip-cert/Cmd_ResignCert.cpp +++ b/src/tools/chip-cert/Cmd_ResignCert.cpp @@ -52,22 +52,21 @@ OptionDef gCmdOptionDefs[] = }; const char * const gCmdOptionHelp = - " -c, --cert \n" + " -c, --cert \n" "\n" - " File or string containing the certificate to be re-signed.\n" + " File containing the certificate to be re-signed.\n" "\n" - " -o, --out \n" + " -o, --out \n" "\n" " File to contain the re-signed certificate.\n" - " If specified '-' then output is written to stdout.\n" "\n" - " -C, --ca-cert \n" + " -C, --ca-cert \n" "\n" - " File or string containing CA certificate to be used to re-sign the certificate.\n" + " File containing CA certificate to be used to re-sign the certificate.\n" "\n" - " -K, --ca-key \n" + " -K, --ca-key \n" "\n" - " File or string containing CA private key to be used to re-sign the certificate.\n" + " File containing CA private key to be used to re-sign the certificate.\n" "\n" " -s, --self\n" "\n" @@ -98,27 +97,27 @@ OptionSet * gCmdOptionSets[] = }; // clang-format on -const char * gInCertFileNameOrStr = nullptr; -const char * gOutCertFileName = nullptr; -const char * gCACertFileNameOrStr = nullptr; -const char * gCAKeyFileNameOrStr = nullptr; -bool gSelfSign = false; +const char * gInCertFileName = nullptr; +const char * gOutCertFileName = nullptr; +const char * gCACertFileName = nullptr; +const char * gCAKeyFileName = nullptr; +bool gSelfSign = false; bool HandleOption(const char * progName, OptionSet * optSet, int id, const char * name, const char * arg) { switch (id) { case 'c': - gInCertFileNameOrStr = arg; + gInCertFileName = arg; break; case 'o': gOutCertFileName = arg; break; case 'C': - gCACertFileNameOrStr = arg; + gCACertFileName = arg; break; case 'K': - gCAKeyFileNameOrStr = arg; + gCAKeyFileName = arg; break; case 's': gSelfSign = true; @@ -149,7 +148,7 @@ bool Cmd_ResignCert(int argc, char * argv[]) res = ParseArgs(CMD_NAME, argc, argv, gCmdOptionSets); VerifyTrueOrExit(res); - if (gInCertFileNameOrStr == nullptr) + if (gInCertFileName == nullptr) { fprintf(stderr, "Please specify certificate to be resigned using --cert option.\n"); ExitNow(res = false); @@ -161,22 +160,22 @@ bool Cmd_ResignCert(int argc, char * argv[]) ExitNow(res = false); } - if (gCACertFileNameOrStr == nullptr && !gSelfSign) + if (gCACertFileName == nullptr && !gSelfSign) { fprintf(stderr, "Please specify a CA certificate to be used to sign the new certificate (using\n" "the --ca-cert option) or --self to generate a self-signed certificate.\n"); ExitNow(res = false); } - else if (gCACertFileNameOrStr != nullptr && gSelfSign) + else if (gCACertFileName != nullptr && gSelfSign) { fprintf(stderr, "Please specify only one of --ca-cert and --self.\n"); ExitNow(res = false); } - if (gCAKeyFileNameOrStr == nullptr) + if (gCAKeyFileName == nullptr) { - fprintf(stderr, "Please specify the CA key using the --ca-key option.\n"); + fprintf(stderr, "Please specify the CA key file name using the --ca-key option.\n"); ExitNow(res = false); } @@ -192,17 +191,17 @@ bool Cmd_ResignCert(int argc, char * argv[]) res = InitOpenSSL(); VerifyTrueOrExit(res); - res = ReadCert(gInCertFileNameOrStr, cert.get(), inCertFmt); + res = ReadCert(gInCertFileName, cert.get(), inCertFmt); VerifyTrueOrExit(res); - res = ReadKey(gCAKeyFileNameOrStr, caKey); + res = ReadKey(gCAKeyFileName, caKey); VerifyTrueOrExit(res); if (!gSelfSign) { std::unique_ptr caCert(X509_new(), &X509_free); - res = ReadCert(gCACertFileNameOrStr, caCert.get()); + res = ReadCert(gCACertFileName, caCert.get()); VerifyTrueOrExit(res); res = ResignCert(cert.get(), caCert.get(), caKey.get()); diff --git a/src/tools/chip-cert/Cmd_ValidateAttCert.cpp b/src/tools/chip-cert/Cmd_ValidateAttCert.cpp index 15d33ca7bd2a5c..0d048b6898604c 100644 --- a/src/tools/chip-cert/Cmd_ValidateAttCert.cpp +++ b/src/tools/chip-cert/Cmd_ValidateAttCert.cpp @@ -49,20 +49,20 @@ OptionDef gCmdOptionDefs[] = }; const char * const gCmdOptionHelp = - " -d, --dac \n" + " -d, --dac \n" "\n" - " File or string containing Device Attestation Certificate (DAC) to be validated.\n" - " The DAC format is auto-detected and can be any of: X.509 PEM, DER or HEX formats.\n" + " A file containing Device Attestation Certificate (DAC) to be\n" + " validated. The DAC is provided in the DER encoded format.\n" "\n" - " -i, --pai \n" + " -i, --pai \n" "\n" - " File or string containing Product Attestation Intermediate (PAI) Certificate.\n" - " The PAI format is auto-detected and can be any of: X.509 PEM, DER or HEX formats.\n" + " A file containing Product Attestation Intermediate (PAI) Certificate.\n" + " The PAI is provided in the DER encoded format.\n" "\n" - " -a, --paa \n" + " -a, --paa \n" "\n" - " File or string containing trusted Product Attestation Authority (PAA) Certificate.\n" - " The PAA format is auto-detected and can be any of: X.509 PEM, DER or HEX formats.\n" + " A file containing trusted Product Attestation Authority (PAA) Certificate.\n" + " The PAA is provided in the DER encoded format.\n" "\n" ; @@ -89,22 +89,22 @@ OptionSet * gCmdOptionSets[] = }; // clang-format on -const char * gDACFileNameOrStr = nullptr; -const char * gPAIFileNameOrStr = nullptr; -const char * gPAAFileNameOrStr = nullptr; +const char * gDACFileName = nullptr; +const char * gPAIFileName = nullptr; +const char * gPAAFileName = nullptr; bool HandleOption(const char * progName, OptionSet * optSet, int id, const char * name, const char * arg) { switch (id) { case 'd': - gDACFileNameOrStr = arg; + gDACFileName = arg; break; case 'i': - gPAIFileNameOrStr = arg; + gPAIFileName = arg; break; case 'a': - gPAAFileNameOrStr = arg; + gPAAFileName = arg; break; default: PrintArgError("%s: Unhandled option: %s\n", progName, name); @@ -171,37 +171,37 @@ bool Cmd_ValidateAttCert(int argc, char * argv[]) VerifyOrReturnError(ParseArgs(CMD_NAME, argc, argv, gCmdOptionSets), false); - if (gDACFileNameOrStr == nullptr) + if (gDACFileName == nullptr) { - fprintf(stderr, "Please specify the DAC certificate using the --dac option.\n"); + fprintf(stderr, "Please specify the DAC certificate file name using the --dac option.\n"); return false; } - if (gPAIFileNameOrStr == nullptr) + if (gPAIFileName == nullptr) { - fprintf(stderr, "Please specify the PAI certificate using the --pai option.\n"); + fprintf(stderr, "Please specify the PAI certificate file name using the --pai option.\n"); return false; } - if (gPAAFileNameOrStr == nullptr) + if (gPAAFileName == nullptr) { - fprintf(stderr, "Please specify the PAA certificate using the --paa option.\n"); + fprintf(stderr, "Please specify the PAA certificate file name using the --paa option.\n"); return false; } - if (!ReadCertDER(gDACFileNameOrStr, dac)) + if (!ReadCertDERRaw(gDACFileName, dac)) { - fprintf(stderr, "Failed to read DAC Certificate: %s\n", gDACFileNameOrStr); + fprintf(stderr, "Unable to open DAC Certificate File: %s\n", gDACFileName); return false; } - if (!ReadCertDER(gPAIFileNameOrStr, pai)) + if (!ReadCertDERRaw(gPAIFileName, pai)) { - fprintf(stderr, "Failed to read PAI Certificate: %s\n", gPAIFileNameOrStr); + fprintf(stderr, "Unable to open PAI Certificate File: %s\n", gPAIFileName); return false; } - if (!ReadCertDER(gPAAFileNameOrStr, paa)) + if (!ReadCertDERRaw(gPAAFileName, paa)) { - fprintf(stderr, "Failed to read PAA Certificate: %s\n", gPAAFileNameOrStr); + fprintf(stderr, "Unable to open PAA Certificate File: %s\n", gPAAFileName); return false; } diff --git a/src/tools/chip-cert/Cmd_ValidateCert.cpp b/src/tools/chip-cert/Cmd_ValidateCert.cpp index c8d3b8c7305b31..6445207e8065da 100644 --- a/src/tools/chip-cert/Cmd_ValidateCert.cpp +++ b/src/tools/chip-cert/Cmd_ValidateCert.cpp @@ -50,15 +50,15 @@ OptionDef gCmdOptionDefs[] = }; const char * const gCmdOptionHelp = - " -c, --cert \n" + " -c, --cert \n" "\n" - " File or string containing an untrusted CHIP certificate to be used during\n" - " validation. Usually, it is Intermediate CA certificate (ICAC).\n" + " A file containing an untrusted CHIP certificate to be used during\n" + " validation. Usually, it is Intermediate CA certificate.\n" "\n" - " -t, --trusted-cert \n" + " -t, --trusted-cert \n" "\n" - " File or string containing a trusted CHIP certificate to be used during\n" - " validation. Usually, it is trust anchor root certificate (RCAC).\n" + " A file containing a trusted CHIP certificate to be used during\n" + " validation. Usually, it is trust anchor root certificate.\n" "\n" ; @@ -72,17 +72,15 @@ OptionSet gCmdOptions = HelpOptions gHelpOptions( CMD_NAME, - "Usage: " CMD_NAME " [ ] \n", + "Usage: " CMD_NAME " [ ] \n", CHIP_VERSION_STRING "\n" COPYRIGHT_STRING, "Validate a chain of CHIP certificates.\n" "\n" "ARGUMENTS\n" "\n" - " \n" + " \n" "\n" - " File or string containing the certificate to be validated.\n" - " The formats of all input certificates are auto-detected and can be any of:\n" - " X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX.\n" + " A file containing the certificate to be validated.\n" "\n" ); diff --git a/src/tools/chip-cert/KeyUtils.cpp b/src/tools/chip-cert/KeyUtils.cpp index 9cc7fc484cdc80..07cb7503701cb4 100644 --- a/src/tools/chip-cert/KeyUtils.cpp +++ b/src/tools/chip-cert/KeyUtils.cpp @@ -183,45 +183,26 @@ bool SerializeKeyPair(EVP_PKEY * key, P256SerializedKeypair & serializedKeypair) return true; } -bool ReadKey(const char * fileNameOrStr, std::unique_ptr & key, bool ignorErrorIfUnsupportedCurve) +bool ReadKey(const char * fileName, std::unique_ptr & key, bool ignorErrorIfUnsupportedCurve) { bool res = true; uint32_t keyDataLen = 0; KeyFormat keyFormat = kKeyFormat_Unknown; std::unique_ptr keyData; - // If fileNameOrStr is a file name - if (access(fileNameOrStr, R_OK) == 0) - { - res = ReadFileIntoMem(fileNameOrStr, nullptr, keyDataLen); - VerifyTrueOrExit(res); + res = ReadFileIntoMem(fileName, nullptr, keyDataLen); + VerifyTrueOrExit(res); - keyData = std::unique_ptr(new uint8_t[keyDataLen]); + keyData = std::unique_ptr(new uint8_t[keyDataLen]); - res = ReadFileIntoMem(fileNameOrStr, keyData.get(), keyDataLen); - VerifyTrueOrExit(res); + res = ReadFileIntoMem(fileName, keyData.get(), keyDataLen); + VerifyTrueOrExit(res); - keyFormat = DetectKeyFormat(keyData.get(), keyDataLen); - if (keyFormat == kKeyFormat_Unknown) - { - fprintf(stderr, "Unrecognized Key Format in File: %s\n", fileNameOrStr); - return false; - } - } - // Otherwise, treat fileNameOrStr as a pointer to the key string - else + keyFormat = DetectKeyFormat(keyData.get(), keyDataLen); + if (keyFormat == kKeyFormat_Unknown) { - keyDataLen = static_cast(strlen(fileNameOrStr)); - - keyFormat = DetectKeyFormat(reinterpret_cast(fileNameOrStr), keyDataLen); - if (keyFormat == kKeyFormat_Unknown) - { - fprintf(stderr, "Unrecognized Key Format in Input Argument: %s\n", fileNameOrStr); - return false; - } - - keyData = std::unique_ptr(new uint8_t[keyDataLen]); - memcpy(keyData.get(), fileNameOrStr, keyDataLen); + fprintf(stderr, "Unrecognized Key Format in File: %s\n", fileName); + return false; } if ((keyFormat == kKeyFormat_X509_Hex) || (keyFormat == kKeyFormat_Chip_Hex) || (keyFormat == kKeyFormat_Chip_Pubkey_Hex)) @@ -288,6 +269,13 @@ bool ReadKey(const char * fileNameOrStr, std::unique_ptr(keyBIO.get()), keyDataLen, + reinterpret_cast(keyBIO.get()), keyDataLen); + VerifyOrReturnError(2 * len == keyDataLen, false); + } + if (d2i_PrivateKey_bio(keyBIO.get(), &tmpKeyPtr) == nullptr) { ReportOpenSSLErrorAndExit("d2i_PrivateKey_bio", res = false); @@ -438,6 +426,8 @@ bool WriteKey(const char * fileName, EVP_PKEY * key, KeyFormat keyFmt) ExitNow(res = false); } + printf("\r\n"); + exit: CloseFile(file); OPENSSL_free(derKey); diff --git a/src/tools/chip-cert/README.md b/src/tools/chip-cert/README.md index 9c8ae1f8aaaf97..6d7227b593baba 100644 --- a/src/tools/chip-cert/README.md +++ b/src/tools/chip-cert/README.md @@ -84,18 +84,6 @@ Note that in the last example the generated Node certificate and private key are stored in base-64 encoded CHIP native format and not in PEM format as in the previous examples. -The following example generates Node certificate, where the CA cert/key and the -Node key are provided as a command line arguments: - -``` -./chip-cert gen-cert --type n --subject-chip-id DEDEDEDE0000001E --subject-fab-id FAB000000000001D --valid-from "2020-10-15 14:23:43" --lifetime 7305 --ca-key 30770201010420C31A9FD24F91B28F3553C6DD0BC05DFB264FB19DE4A293457FF61CF08656F795A00A06082A8648CE3D030107A144034200046909160652E60035DEAFF5EE4DCED6E451BB171D39972874193CBDEA79E2C81198A8CA5151F0FC086556B8D63610E9DDB237DA1AFAC7378838897FA46A776BE5 --ca-cert FTABCEV4XDq64xZcJAIBNwMnFAEAAADKysrKGCYE7xcbJyYFbrW5TDcGJxMEAAAAysrKyicVHQAAAAAAsPoYJAcBJAgBMAlBBGkJFgZS5gA13q/17k3O1uRRuxcdOZcodBk8vep54sgRmKjKUVHw/AhlVrjWNhDp3bI32hr6xzeIOIl/pGp3a+U3CjUBKQEkAgAYJAJgMAQUTMntCbE2MN9jRhRZ0bmiX4LtcIYwBRTwPNuYHS2KwOmYp5Apx6b9P/ztyBgwC0D8Ieqk5XNVp4h3De3CAlndmNqPzT/yGQFkgjozuBz41efPVctoPODsGq6zKv/0RIO45obJNN8X1pGQrtv/9JVSGA== --key 04F1C53AFB1761A75FF07437018E5B76BC75F852904DC7C4607839A5D953140FFE253626FB737647F1043F61D91B5EC0D3B42A7A25FA209CAB7ACD1A76CA46ECD2 --out Chip-Node02-Cert.chip-b64 --out-format chip-b64 -``` - -Note that in the last example, to illustrate the fact that multiple key/cert -formats are supported, the CA private key is in the X509 Hex format, the CA -certificate is in the CHIP TLV base64 format and the Node public key is in the -CHIP TLV Hex format. - Now the 'chip-cert' tool can be used to validate generated Node certificate: ``` @@ -240,29 +228,27 @@ COMMAND OPTIONS NID_info_access extension to be added to the list of certificate extensions. - -C, --ca-cert + -C, --ca-cert - File or string containing CA certificate to be used to sign the new certificate. + File containing CA certificate to be used to sign the new certificate. - -K, --ca-key + -K, --ca-key - File or string containing CA private key to be used to sign the new certificate. + File containing CA private key to be used to sign the new certificate. - -k, --key + -k, --key - File or string containing the public and private keys for the new certificate. + File containing the public and private keys for the new certificate. If not specified, a new key pair will be generated. - -o, --out + -o, --out File to contain the new certificate. - If specified '-' then output is written to stdout. - -O, --out-key + -O, --out-key File to contain the public/private key for the new certificate. This option must be specified if the --key option is not. - If specified '-' then output is written to stdout. -F, --out-format @@ -270,11 +256,10 @@ COMMAND OPTIONS If not specified, the default base-64 encoded CHIP format is used. Supported format parametes are: x509-pem - X.509 PEM format - x509-der - X.509 DER raw format - x509-hex - X.509 DER hex encoded format + x509-der - X.509 DER format chip - raw CHIP TLV format - chip-b64 - base-64 encoded CHIP TLV format (default) chip-hex - hex encoded CHIP TLV format + chip-b64 - base-64 encoded CHIP TLV format (default) -V, --valid-from --
[ :: ] @@ -302,19 +287,19 @@ HELP OPTIONS $ ./out/debug/standalone/chip-cert convert-cert -h Usage: chip-cert convert-cert [ ] -Convert operational certificate between CHIP and X.509 formats. +Convert a certificate between CHIP and X509 forms. ARGUMENTS - + - File or string containing certificate to be converted. - The format of the input certificate is auto-detected and can be any of: - X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX. + The input certificate file name, or - to read from stdin. The + format of the input certificate is auto-detected and can be any + of: X.509 PEM, X.509 DER, CHIP base-64 or CHIP raw TLV. - + - The output certificate file name, or '-' to write to stdout. + The output certificate file name, or - to write to stdout. COMMAND OPTIONS @@ -326,10 +311,6 @@ COMMAND OPTIONS Output certificate in X.509 DER format. - -X, --x509-hex - - Output certificate in X.509 DER hex encoded format. - -c, --chip Output certificate in raw CHIP TLV format. @@ -358,24 +339,18 @@ HELP OPTIONS $ ./out/debug/standalone/chip-cert convert-key -h Usage: chip-cert convert-key [ ] -Convert private/public key between CHIP and X.509 formats. - +Convert a private key between CHIP and PEM/DER forms. ARGUMENTS - + - File or string containing private/public key to be converted. - The format of the input key is auto-detected and can be any of: - X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX. + The input private key file name, or - to read from stdin. The + format of the input key is auto-detected and can be any + of: PEM, DER, CHIP base-64 or CHIP raw. - Note: the private key formats include both private and public keys, while - the public key formats include only public keys. Therefore, conversion from any - private key format to public key is supported but conversion from public key - to private CANNOT be done. + - - - The output private key file name, or '-' to write to stdout. + The output private key file name, or - to write to stdout. COMMAND OPTIONS @@ -387,14 +362,6 @@ COMMAND OPTIONS Output the private key in SEC1/RFC-5915 DER format. - -x, --x509-hex - - Output the private key in SEC1/RFC-5915 DER hex encoded format. - - -P, --x509-pubkey-pem - - Output the public key in SEC1/RFC-5915 PEM format. - -c, --chip Output the private key in raw CHIP serialized format. @@ -407,22 +374,6 @@ COMMAND OPTIONS Output the private key in base-64 encoded CHIP serialized format. This is the default. - -e, --chip-hex - - Output the private key in hex encoded CHIP serialized format. - - -C, --chip-pubkey - - Output the raw public key. - - -B, --chip-pubkey-b64 - - Output the public key in base-64 encoded format. - - -E, --chip-pubkey-hex - - Output the public key in hex encoded format. - HELP OPTIONS -h, --help @@ -442,22 +393,21 @@ Resign a CHIP certificate using a new CA certificate/key. COMMAND OPTIONS - -c, --cert + -c, --cert - File or string containing the certificate to be re-signed. + File containing the certificate to be re-signed. - -o, --out + -o, --out File to contain the re-signed certificate. - If specified '-' then output is written to stdout. - -C, --ca-cert + -C, --ca-cert - File or string containing CA certificate to be used to re-sign the certificate. + File containing CA certificate to be used to re-sign the certificate. - -K, --ca-key + -K, --ca-key - File or string containing CA private key to be used to re-sign the certificate. + File containing CA private key to be used to re-sign the certificate. -s, --self @@ -482,23 +432,21 @@ Validate a chain of CHIP certificates. ARGUMENTS - + - File or string containing the certificate to be validated. - The formats of all input certificates are auto-detected and can be any of: - X.509 PEM, X.509 DER, X.509 HEX, CHIP base-64, CHIP raw TLV or CHIP HEX. + A file containing the certificate to be validated. COMMAND OPTIONS - -c, --cert + -c, --cert - File or string containing an untrusted CHIP certificate to be used during - validation. Usually, it is Intermediate CA certificate (ICAC). + A file containing an untrusted CHIP certificate to be used during + validation. Usually, it is Intermediate CA certificate. - -t, --trusted-cert + -t, --trusted-cert - File or string containing a trusted CHIP certificate to be used during - validation. Usually, it is trust anchor root certificate (RCAC). + A file containing a trusted CHIP certificate to be used during + validation. Usually, it is trust anchor root certificate. HELP OPTIONS @@ -515,20 +463,20 @@ HELP OPTIONS $ ./out/debug/standalone/chip-cert print-cert -h Usage: chip-cert print-cert [] -Print a CHIP operational certificate. +Print a CHIP certificate. ARGUMENTS - + - File or string containing a CHIP certificate. + A file containing a CHIP certificate. COMMAND OPTIONS - -o, --out + -o, --out The output printed certificate file name. If not specified - or if specified '-' then output is written to stdout. + or if specified - then output is written to stdout. HELP OPTIONS @@ -545,7 +493,7 @@ HELP OPTIONS $ ./out/debug/standalone/chip-cert gen-att-cert -h Usage: chip-cert gen-att-cert [ ] -Generate a CHIP Attestation certificate +Generate a CHIP certificate COMMAND OPTIONS @@ -574,29 +522,27 @@ COMMAND OPTIONS If not specified then by default the VID and PID fields are encoded using Matter specific OIDs. - -C, --ca-cert + -C, --ca-cert - File or string containing CA certificate to be used to sign the new certificate. + File containing CA certificate to be used to sign the new certificate. - -K, --ca-key + -K, --ca-key - File or string containing CA private key to be used to sign the new certificate. + File containing CA private key to be used to sign the new certificate. - -k, --key + -k, --key - File or string containing the public and private keys for the new certificate (in an X.509 PEM format). + File containing the public and private keys for the new certificate (in an X.509 PEM format). If not specified, a new key pair will be generated. - -o, --out + -o, --out File to contain the new certificate (in an X.509 PEM format). - If specified '-' then output is written to stdout. - -O, --out-key + -O, --out-key File to contain the public/private key for the new certificate (in an X.509 PEM format). This option must be specified if the --key option is not. - If specified '-' then output is written to stdout. -f, --valid-from --
[ :: ] @@ -628,20 +574,20 @@ Validate a chain of CHIP attestation certificates COMMAND OPTIONS - -d, --dac + -d, --dac - File or string containing Device Attestation Certificate (DAC) to be validated. - The DAC format is auto-detected and can be any of: X.509 PEM, DER or HEX formats. + A file containing Device Attestation Certificate (DAC) to be + validated. The DAC is provided in the DER encoded format. - -i, --pai + -i, --pai - File or string containing Product Attestation Intermediate (PAI) Certificate. - The PAI format is auto-detected and can be any of: X.509 PEM, DER or HEX formats. + A file containing Product Attestation Intermediate (PAI) Certificate. + The PAI is provided in the DER encoded format. - -a, --paa + -a, --paa - File or string containing trusted Product Attestation Authority (PAA) Certificate. - The PAA format is auto-detected and can be any of: X.509 PEM, DER or HEX formats. + A file containing trusted Product Attestation Authority (PAA) Certificate. + The PAA is provided in the DER encoded format. HELP OPTIONS @@ -662,20 +608,19 @@ Generate CD CMS Signed Message COMMAND OPTIONS - -K, --key + -K, --key - File or string containing private key to be used to sign the Certification Declaration. + File containing private key to be used to sign the Certification Declaration. - -C, --cert + -C, --cert - File or string containing certificate associated with the private key that is used + File containing certificate associated with the private key that is used to sign the Certification Declaration. The Subject Key Identifier in the certificate will be included in the signed Certification Declaration message. - -O, --out + -O, --out File to contain the signed Certification Declaration message. - If specified '-' then output is written to stdout. -f, --format-version diff --git a/src/tools/chip-cert/chip-cert.h b/src/tools/chip-cert/chip-cert.h index 1579cb4e213ab7..6bdd41855c3a01 100644 --- a/src/tools/chip-cert/chip-cert.h +++ b/src/tools/chip-cert/chip-cert.h @@ -400,10 +400,10 @@ extern bool Cmd_ValidateCert(int argc, char * argv[]); extern bool Cmd_PrintCert(int argc, char * argv[]); extern bool Cmd_GenAttCert(int argc, char * argv[]); -extern bool ReadCert(const char * fileNameOrStr, X509 * cert); -extern bool ReadCert(const char * fileNameOrStr, X509 * cert, CertFormat & origCertFmt); -extern bool ReadCertDER(const char * fileNameOrStr, chip::MutableByteSpan & cert); -extern bool LoadChipCert(const char * fileNameOrStr, bool isTrused, chip::Credentials::ChipCertificateSet & certSet, +extern bool ReadCert(const char * fileName, X509 * cert); +extern bool ReadCert(const char * fileName, X509 * cert, CertFormat & origCertFmt); +extern bool ReadCertDERRaw(const char * fileName, chip::MutableByteSpan & cert); +extern bool LoadChipCert(const char * fileName, bool isTrused, chip::Credentials::ChipCertificateSet & certSet, chip::MutableByteSpan & chipCert); extern bool WriteCert(const char * fileName, X509 * cert, CertFormat certFmt); @@ -423,7 +423,7 @@ extern bool MakeAttCert(AttCertType attCertType, const char * subjectCN, uint16_ X509 * newCert, EVP_PKEY * newKey, CertStructConfig & certConfig); extern bool GenerateKeyPair(EVP_PKEY * key); extern bool GenerateKeyPair_Secp256k1(EVP_PKEY * key); -extern bool ReadKey(const char * fileNameOrStr, std::unique_ptr & key, +extern bool ReadKey(const char * fileName, std::unique_ptr & key, bool ignorErrorIfUnsupportedCurve = false); extern bool WriteKey(const char * fileName, EVP_PKEY * key, KeyFormat keyFmt); extern bool SerializeKeyPair(EVP_PKEY * key, chip::Crypto::P256SerializedKeypair & serializedKeypair);