REDACTED-rig/src/base/net/tls/TlsGen.cpp

144 lines
3.3 KiB
C++

/* XMRig
* Copyright 2018-2020 SChernykh <https://github.com/SChernykh>
* Copyright 2016-2020 XMRig <https://github.com/xmrig>, <support@xmrig.com>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "base/net/tls/TlsGen.h"
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <stdexcept>
#include <fstream>
namespace xmrig {
static const char *kLocalhost = "localhost";
static EVP_PKEY *generate_pkey()
{
auto pkey = EVP_PKEY_new();
if (!pkey) {
return nullptr;
}
auto exponent = BN_new();
auto rsa = RSA_new();
if (!exponent || !rsa || !BN_set_word(exponent, RSA_F4) || !RSA_generate_key_ex(rsa, 2048, exponent, nullptr) || !EVP_PKEY_assign_RSA(pkey, rsa)) {
EVP_PKEY_free(pkey);
BN_free(exponent);
RSA_free(rsa);
return nullptr;
}
BN_free(exponent);
return pkey;
}
bool isFileExist(const char *fileName)
{
std::ifstream in(fileName);
return in.good();
}
} // namespace xmrig
xmrig::TlsGen::~TlsGen()
{
EVP_PKEY_free(m_pkey);
X509_free(m_x509);
}
void xmrig::TlsGen::generate(const char *commonName)
{
if (isFileExist(m_cert) && isFileExist(m_certKey)) {
return;
}
m_pkey = generate_pkey();
if (!m_pkey) {
throw std::runtime_error("RSA key generation failed.");
}
if (!generate_x509(commonName == nullptr || strlen(commonName) == 0 ? kLocalhost : commonName)) {
throw std::runtime_error("x509 certificate generation failed.");
}
if (!write()) {
throw std::runtime_error("unable to write certificate to disk.");
}
}
bool xmrig::TlsGen::generate_x509(const char *commonName)
{
m_x509 = X509_new();
if (!m_x509) {
return false;
}
if (!X509_set_pubkey(m_x509, m_pkey)) {
return false;
}
ASN1_INTEGER_set(X509_get_serialNumber(m_x509), 1);
X509_gmtime_adj(X509_get_notBefore(m_x509), 0);
X509_gmtime_adj(X509_get_notAfter(m_x509), 315360000L);
auto name = X509_get_subject_name(m_x509);
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, reinterpret_cast<const uint8_t *>(commonName), -1, -1, 0);
X509_set_issuer_name(m_x509, name);
return X509_sign(m_x509, m_pkey, EVP_sha256());
}
bool xmrig::TlsGen::write()
{
auto pkey_file = fopen(m_certKey, "wb");
if (!pkey_file) {
return false;
}
bool ret = PEM_write_PrivateKey(pkey_file, m_pkey, nullptr, nullptr, 0, nullptr, nullptr);
fclose(pkey_file);
if (!ret) {
return false;
}
auto x509_file = fopen(m_cert, "wb");
if (!x509_file) {
return false;
}
ret = PEM_write_X509(x509_file, m_x509);
fclose(x509_file);
return ret;
}