/* * Root CA reading application * * Copyright The Mbed TLS Contributors * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later */ #include "mbedtls/build_info.h" #include "mbedtls/platform.h" #if !defined(MBEDTLS_X509_CRT_PARSE_C) || !defined(MBEDTLS_FS_IO) || \ !defined(MBEDTLS_TIMING_C) int main(void) { mbedtls_printf("MBEDTLS_X509_CRT_PARSE_C and/or MBEDTLS_FS_IO and/or " "MBEDTLS_TIMING_C not defined.\n"); mbedtls_exit(0); } #else #include "mbedtls/error.h" #include "mbedtls/timing.h" #include "mbedtls/x509_crt.h" #include #include #include #define DFL_ITERATIONS 1 #define DFL_PRIME_CACHE 1 #define USAGE \ "\n usage: load_roots param=<>... [--] FILE...\n" \ "\n acceptable parameters:\n" \ " iterations=%%d Iteration count (not including cache priming); default: 1\n" \ " prime=%%d Prime the disk read cache? Default: 1 (yes)\n" \ "\n" /* * global options */ struct options { const char **filenames; /* NULL-terminated list of file names */ unsigned iterations; /* Number of iterations to time */ int prime_cache; /* Prime the disk read cache? */ } opt; static int read_certificates(const char *const *filenames) { mbedtls_x509_crt cas; int ret = 0; const char *const *cur; mbedtls_x509_crt_init(&cas); for (cur = filenames; *cur != NULL; cur++) { ret = mbedtls_x509_crt_parse_file(&cas, *cur); if (ret != 0) { #if defined(MBEDTLS_ERROR_C) || defined(MBEDTLS_ERROR_STRERROR_DUMMY) char error_message[200]; mbedtls_strerror(ret, error_message, sizeof(error_message)); printf("\n%s: -0x%04x (%s)\n", *cur, (unsigned) -ret, error_message); #else printf("\n%s: -0x%04x\n", *cur, (unsigned) -ret); #endif goto exit; } } exit: mbedtls_x509_crt_free(&cas); return ret == 0; } int main(int argc, char *argv[]) { int exit_code = MBEDTLS_EXIT_FAILURE; unsigned i, j; struct mbedtls_timing_hr_time timer; unsigned long ms; #if defined(MBEDTLS_USE_PSA_CRYPTO) psa_status_t status = psa_crypto_init(); if (status != PSA_SUCCESS) { mbedtls_fprintf(stderr, "Failed to initialize PSA Crypto implementation: %d\n", (int) status); goto exit; } #endif /* MBEDTLS_USE_PSA_CRYPTO */ if (argc <= 1) { mbedtls_printf(USAGE); goto exit; } opt.filenames = NULL; opt.iterations = DFL_ITERATIONS; opt.prime_cache = DFL_PRIME_CACHE; for (i = 1; i < (unsigned) argc; i++) { char *p = argv[i]; char *q = NULL; if (strcmp(p, "--") == 0) { break; } if ((q = strchr(p, '=')) == NULL) { break; } *q++ = '\0'; for (j = 0; p + j < q; j++) { if (argv[i][j] >= 'A' && argv[i][j] <= 'Z') { argv[i][j] |= 0x20; } } if (strcmp(p, "iterations") == 0) { opt.iterations = atoi(q); } else if (strcmp(p, "prime") == 0) { opt.iterations = atoi(q) != 0; } else { mbedtls_printf("Unknown option: %s\n", p); mbedtls_printf(USAGE); goto exit; } } opt.filenames = (const char **) argv + i; if (*opt.filenames == 0) { mbedtls_printf("Missing list of certificate files to parse\n"); goto exit; } mbedtls_printf("Parsing %u certificates", argc - i); if (opt.prime_cache) { if (!read_certificates(opt.filenames)) { goto exit; } mbedtls_printf(" "); } (void) mbedtls_timing_get_timer(&timer, 1); for (i = 1; i <= opt.iterations; i++) { if (!read_certificates(opt.filenames)) { goto exit; } mbedtls_printf("."); } ms = mbedtls_timing_get_timer(&timer, 0); mbedtls_printf("\n%u iterations -> %lu ms\n", opt.iterations, ms); exit_code = MBEDTLS_EXIT_SUCCESS; exit: #if defined(MBEDTLS_USE_PSA_CRYPTO) mbedtls_psa_crypto_free(); #endif /* MBEDTLS_USE_PSA_CRYPTO */ mbedtls_exit(exit_code); } #endif /* necessary configuration */