1676 lines
39 KiB
C
1676 lines
39 KiB
C
/* $OpenBSD: x509.c,v 1.39 2024/05/27 16:12:55 tb Exp $ */
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
* All rights reserved.
|
|
*
|
|
* This package is an SSL implementation written
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
*
|
|
* This library is free for commercial and non-commercial use as long as
|
|
* the following conditions are aheared to. The following conditions
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
* included with this distribution is covered by the same copyright terms
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
*
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
* the code are not to be removed.
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
* as the author of the parts of the library used.
|
|
* This can be in the form of a textual message at program startup or
|
|
* in documentation (online or textual) provided with the package.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* "This product includes cryptographic software written by
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
* being used are not cryptographic related :-).
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* The licence and distribution terms for any publically available version or
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
* copied and put under another distribution licence
|
|
* [including the GNU Public Licence.]
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <limits.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "apps.h"
|
|
|
|
#include <openssl/asn1.h>
|
|
#include <openssl/bio.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/dsa.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/x509.h>
|
|
#include <openssl/x509v3.h>
|
|
|
|
#define POSTFIX ".srl"
|
|
#define DEF_DAYS 30
|
|
|
|
static int callb(int ok, X509_STORE_CTX *ctx);
|
|
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
|
|
const EVP_MD *digest, CONF *conf, char *section, X509_NAME *issuer,
|
|
char *force_pubkey);
|
|
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
|
X509 *x, X509 *xca, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *sigopts,
|
|
char *serial, int create, int days, int clrext, CONF *conf, char *section,
|
|
ASN1_INTEGER *sno, X509_NAME *issuer);
|
|
static int purpose_print(BIO *bio, X509 *cert, const X509_PURPOSE *pt);
|
|
|
|
static struct {
|
|
char *alias;
|
|
int aliasout;
|
|
int badops;
|
|
int C;
|
|
int CA_createserial;
|
|
int CA_flag;
|
|
char *CAfile;
|
|
int CAformat;
|
|
char *CAkeyfile;
|
|
int CAkeyformat;
|
|
char *CAserial;
|
|
unsigned long certflag;
|
|
int checkend;
|
|
int checkoffset;
|
|
unsigned long chtype;
|
|
int clrext;
|
|
int clrreject;
|
|
int clrtrust;
|
|
int days;
|
|
const EVP_MD *digest;
|
|
int email;
|
|
int enddate;
|
|
char *extfile;
|
|
char *extsect;
|
|
int fingerprint;
|
|
char *force_pubkey;
|
|
char *infile;
|
|
int informat;
|
|
int issuer;
|
|
int issuer_hash;
|
|
#ifndef OPENSSL_NO_MD5
|
|
int issuer_hash_old;
|
|
#endif
|
|
char *keyfile;
|
|
int keyformat;
|
|
const EVP_MD *md_alg;
|
|
int modulus;
|
|
int multirdn;
|
|
int new;
|
|
int next_serial;
|
|
unsigned long nmflag;
|
|
int noout;
|
|
int num;
|
|
int ocspid;
|
|
ASN1_OBJECT *objtmp;
|
|
int ocsp_uri;
|
|
char *outfile;
|
|
int outformat;
|
|
char *passargin;
|
|
int pprint;
|
|
int pubkey;
|
|
STACK_OF(ASN1_OBJECT) *reject;
|
|
int reqfile;
|
|
int serial;
|
|
char *set_issuer;
|
|
char *set_subject;
|
|
int sign_flag;
|
|
STACK_OF(OPENSSL_STRING) *sigopts;
|
|
ASN1_INTEGER *sno;
|
|
int startdate;
|
|
int subject;
|
|
int subject_hash;
|
|
#ifndef OPENSSL_NO_MD5
|
|
int subject_hash_old;
|
|
#endif
|
|
int text;
|
|
STACK_OF(ASN1_OBJECT) *trust;
|
|
int trustout;
|
|
int x509req;
|
|
} cfg;
|
|
|
|
static int
|
|
x509_opt_addreject(char *arg)
|
|
{
|
|
if ((cfg.objtmp = OBJ_txt2obj(arg, 0)) == NULL) {
|
|
BIO_printf(bio_err, "Invalid reject object value %s\n", arg);
|
|
return (1);
|
|
}
|
|
|
|
if (cfg.reject == NULL &&
|
|
(cfg.reject = sk_ASN1_OBJECT_new_null()) == NULL)
|
|
return (1);
|
|
|
|
if (!sk_ASN1_OBJECT_push(cfg.reject, cfg.objtmp))
|
|
return (1);
|
|
|
|
cfg.trustout = 1;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_addtrust(char *arg)
|
|
{
|
|
if ((cfg.objtmp = OBJ_txt2obj(arg, 0)) == NULL) {
|
|
BIO_printf(bio_err, "Invalid trust object value %s\n", arg);
|
|
return (1);
|
|
}
|
|
|
|
if (cfg.trust == NULL &&
|
|
(cfg.trust = sk_ASN1_OBJECT_new_null()) == NULL)
|
|
return (1);
|
|
|
|
if (!sk_ASN1_OBJECT_push(cfg.trust, cfg.objtmp))
|
|
return (1);
|
|
|
|
cfg.trustout = 1;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_ca(char *arg)
|
|
{
|
|
cfg.CAfile = arg;
|
|
cfg.CA_flag = ++cfg.num;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_certopt(char *arg)
|
|
{
|
|
if (!set_cert_ex(&cfg.certflag, arg))
|
|
return (1);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_checkend(char *arg)
|
|
{
|
|
const char *errstr;
|
|
|
|
cfg.checkoffset = strtonum(arg, 0, INT_MAX, &errstr);
|
|
if (errstr != NULL) {
|
|
BIO_printf(bio_err, "checkend unusable: %s\n", errstr);
|
|
return (1);
|
|
}
|
|
cfg.checkend = 1;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_dates(void)
|
|
{
|
|
cfg.startdate = ++cfg.num;
|
|
cfg.enddate = ++cfg.num;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_days(char *arg)
|
|
{
|
|
const char *errstr;
|
|
|
|
cfg.days = strtonum(arg, 1, INT_MAX, &errstr);
|
|
if (errstr != NULL) {
|
|
BIO_printf(bio_err, "bad number of days: %s\n", errstr);
|
|
return (1);
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_digest(int argc, char **argv, int *argsused)
|
|
{
|
|
char *name = argv[0];
|
|
|
|
if (*name++ != '-')
|
|
return (1);
|
|
|
|
if ((cfg.md_alg = EVP_get_digestbyname(name)) != NULL) {
|
|
cfg.digest = cfg.md_alg;
|
|
} else {
|
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
|
cfg.badops = 1;
|
|
return (1);
|
|
}
|
|
|
|
*argsused = 1;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_nameopt(char *arg)
|
|
{
|
|
if (!set_name_ex(&cfg.nmflag, arg))
|
|
return (1);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_set_serial(char *arg)
|
|
{
|
|
ASN1_INTEGER_free(cfg.sno);
|
|
if ((cfg.sno = s2i_ASN1_INTEGER(NULL, arg)) == NULL)
|
|
return (1);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_setalias(char *arg)
|
|
{
|
|
cfg.alias = arg;
|
|
cfg.trustout = 1;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_signkey(char *arg)
|
|
{
|
|
cfg.keyfile = arg;
|
|
cfg.sign_flag = ++cfg.num;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_sigopt(char *arg)
|
|
{
|
|
if (cfg.sigopts == NULL &&
|
|
(cfg.sigopts = sk_OPENSSL_STRING_new_null()) == NULL)
|
|
return (1);
|
|
|
|
if (!sk_OPENSSL_STRING_push(cfg.sigopts, arg))
|
|
return (1);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
x509_opt_utf8(void)
|
|
{
|
|
cfg.chtype = MBSTRING_UTF8;
|
|
return (0);
|
|
}
|
|
|
|
static const struct option x509_options[] = {
|
|
{
|
|
.name = "C",
|
|
.desc = "Convert the certificate into C code",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.C,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "addreject",
|
|
.argname = "arg",
|
|
.desc = "Reject certificate for a given purpose",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_addreject,
|
|
},
|
|
{
|
|
.name = "addtrust",
|
|
.argname = "arg",
|
|
.desc = "Trust certificate for a given purpose",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_addtrust,
|
|
},
|
|
{
|
|
.name = "alias",
|
|
.desc = "Output certificate alias",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.aliasout,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "CA",
|
|
.argname = "file",
|
|
.desc = "CA certificate in PEM format unless -CAform is specified",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_ca,
|
|
},
|
|
{
|
|
.name = "CAcreateserial",
|
|
.desc = "Create serial number file if it does not exist",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.CA_createserial,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "CAform",
|
|
.argname = "fmt",
|
|
.desc = "CA format - default PEM",
|
|
.type = OPTION_ARG_FORMAT,
|
|
.opt.value = &cfg.CAformat,
|
|
},
|
|
{
|
|
.name = "CAkey",
|
|
.argname = "file",
|
|
.desc = "CA key in PEM format unless -CAkeyform is specified\n"
|
|
"if omitted, the key is assumed to be in the CA file",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.CAkeyfile,
|
|
},
|
|
{
|
|
.name = "CAkeyform",
|
|
.argname = "fmt",
|
|
.desc = "CA key format - default PEM",
|
|
.type = OPTION_ARG_FORMAT,
|
|
.opt.value = &cfg.CAkeyformat,
|
|
},
|
|
{
|
|
.name = "CAserial",
|
|
.argname = "file",
|
|
.desc = "Serial file",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.CAserial,
|
|
},
|
|
{
|
|
.name = "certopt",
|
|
.argname = "option",
|
|
.desc = "Various certificate text options",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_certopt,
|
|
},
|
|
{
|
|
.name = "checkend",
|
|
.argname = "arg",
|
|
.desc = "Check whether the cert expires in the next arg seconds\n"
|
|
"exit 1 if so, 0 if not",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_checkend,
|
|
},
|
|
{
|
|
.name = "clrext",
|
|
.desc = "Clear all extensions",
|
|
.type = OPTION_FLAG,
|
|
.opt.flag = &cfg.clrext,
|
|
},
|
|
{
|
|
.name = "clrreject",
|
|
.desc = "Clear all rejected purposes",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.clrreject,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "clrtrust",
|
|
.desc = "Clear all trusted purposes",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.clrtrust,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "dates",
|
|
.desc = "Both Before and After dates",
|
|
.type = OPTION_FUNC,
|
|
.opt.func = x509_opt_dates,
|
|
},
|
|
{
|
|
.name = "days",
|
|
.argname = "arg",
|
|
.desc = "How long till expiry of a signed certificate - def 30 days",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_days,
|
|
},
|
|
{
|
|
.name = "email",
|
|
.desc = "Print email address(es)",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.email,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "enddate",
|
|
.desc = "Print notAfter field",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.enddate,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "extensions",
|
|
.argname = "section",
|
|
.desc = "Section from config file with X509V3 extensions to add",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.extsect,
|
|
},
|
|
{
|
|
.name = "extfile",
|
|
.argname = "file",
|
|
.desc = "Configuration file with X509V3 extensions to add",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.extfile,
|
|
},
|
|
{
|
|
.name = "fingerprint",
|
|
.desc = "Print the certificate fingerprint",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.fingerprint,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "force_pubkey",
|
|
.argname = "key",
|
|
.desc = "Force the public key to be put in the certificate",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.force_pubkey,
|
|
},
|
|
{
|
|
.name = "hash",
|
|
.desc = "Synonym for -subject_hash",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.subject_hash,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "in",
|
|
.argname = "file",
|
|
.desc = "Input file - default stdin",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.infile,
|
|
},
|
|
{
|
|
.name = "inform",
|
|
.argname = "fmt",
|
|
.desc = "Input format - default PEM (one of DER, NET or PEM)",
|
|
.type = OPTION_ARG_FORMAT,
|
|
.opt.value = &cfg.informat,
|
|
},
|
|
{
|
|
.name = "issuer",
|
|
.desc = "Print issuer name",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.issuer,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "issuer_hash",
|
|
.desc = "Print issuer hash value",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.issuer_hash,
|
|
.order = &cfg.num,
|
|
},
|
|
#ifndef OPENSSL_NO_MD5
|
|
{
|
|
.name = "issuer_hash_old",
|
|
.desc = "Print old-style (MD5) issuer hash value",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.issuer_hash_old,
|
|
.order = &cfg.num,
|
|
},
|
|
#endif
|
|
{
|
|
.name = "key",
|
|
.argname = "file",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_signkey,
|
|
},
|
|
{
|
|
.name = "keyform",
|
|
.argname = "fmt",
|
|
.desc = "Private key format - default PEM",
|
|
.type = OPTION_ARG_FORMAT,
|
|
.opt.value = &cfg.keyformat,
|
|
},
|
|
{
|
|
.name = "modulus",
|
|
.desc = "Print the RSA key modulus",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.modulus,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "multivalue-rdn",
|
|
.desc = "Enable support for multivalued RDNs",
|
|
.type = OPTION_FLAG,
|
|
.opt.flag = &cfg.multirdn,
|
|
},
|
|
{
|
|
.name = "nameopt",
|
|
.argname = "option",
|
|
.desc = "Various certificate name options",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_nameopt,
|
|
},
|
|
{
|
|
.name = "new",
|
|
.desc = "Generate a new certificate",
|
|
.type = OPTION_FLAG,
|
|
.opt.flag = &cfg.new,
|
|
},
|
|
{
|
|
.name = "next_serial",
|
|
.desc = "Print the next serial number",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.next_serial,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "noout",
|
|
.desc = "No certificate output",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.noout,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "ocsp_uri",
|
|
.desc = "Print OCSP Responder URL(s)",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.ocsp_uri,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "ocspid",
|
|
.desc = "Print OCSP hash values for the subject name and public key",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.ocspid,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "out",
|
|
.argname = "file",
|
|
.desc = "Output file - default stdout",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.outfile,
|
|
},
|
|
{
|
|
.name = "outform",
|
|
.argname = "fmt",
|
|
.desc = "Output format - default PEM (one of DER, NET or PEM)",
|
|
.type = OPTION_ARG_FORMAT,
|
|
.opt.value = &cfg.outformat,
|
|
},
|
|
{
|
|
.name = "passin",
|
|
.argname = "src",
|
|
.desc = "Private key password source",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.passargin,
|
|
},
|
|
{
|
|
.name = "pubkey",
|
|
.desc = "Output the public key",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.pubkey,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "purpose",
|
|
.desc = "Print out certificate purposes",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.pprint,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "req",
|
|
.desc = "Input is a certificate request, sign and output",
|
|
.type = OPTION_FLAG,
|
|
.opt.flag = &cfg.reqfile,
|
|
},
|
|
{
|
|
.name = "serial",
|
|
.desc = "Print serial number value",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.serial,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "set_issuer",
|
|
.argname = "name",
|
|
.desc = "Set the issuer name",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.set_issuer,
|
|
},
|
|
{
|
|
.name = "set_serial",
|
|
.argname = "n",
|
|
.desc = "Serial number to use",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_set_serial,
|
|
},
|
|
{
|
|
.name = "set_subject",
|
|
.argname = "name",
|
|
.desc = "Set the subject name",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.set_subject,
|
|
},
|
|
{
|
|
.name = "setalias",
|
|
.argname = "arg",
|
|
.desc = "Set certificate alias",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_setalias,
|
|
},
|
|
{
|
|
.name = "signkey",
|
|
.argname = "file",
|
|
.desc = "Self sign cert with arg",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_signkey,
|
|
},
|
|
{
|
|
.name = "sigopt",
|
|
.argname = "nm:v",
|
|
.desc = "Various signature algorithm options",
|
|
.type = OPTION_ARG_FUNC,
|
|
.opt.argfunc = x509_opt_sigopt,
|
|
},
|
|
{
|
|
.name = "startdate",
|
|
.desc = "Print notBefore field",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.startdate,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "subj",
|
|
.type = OPTION_ARG,
|
|
.opt.arg = &cfg.set_subject,
|
|
},
|
|
{
|
|
.name = "subject",
|
|
.desc = "Print subject name",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.subject,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "subject_hash",
|
|
.desc = "Print subject hash value",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.subject_hash,
|
|
.order = &cfg.num,
|
|
},
|
|
#ifndef OPENSSL_NO_MD5
|
|
{
|
|
.name = "subject_hash_old",
|
|
.desc = "Print old-style (MD5) subject hash value",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.subject_hash_old,
|
|
.order = &cfg.num,
|
|
},
|
|
#endif
|
|
{
|
|
.name = "text",
|
|
.desc = "Print the certificate in text form",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.text,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = "trustout",
|
|
.desc = "Output a trusted certificate",
|
|
.type = OPTION_FLAG,
|
|
.opt.flag = &cfg.trustout,
|
|
},
|
|
{
|
|
.name = "utf8",
|
|
.desc = "Input characters are in UTF-8 (default ASCII)",
|
|
.type = OPTION_FUNC,
|
|
.opt.func = x509_opt_utf8,
|
|
},
|
|
{
|
|
.name = "x509toreq",
|
|
.desc = "Output a certification request object",
|
|
.type = OPTION_ORDER,
|
|
.opt.order = &cfg.x509req,
|
|
.order = &cfg.num,
|
|
},
|
|
{
|
|
.name = NULL,
|
|
.desc = "",
|
|
.type = OPTION_ARGV_FUNC,
|
|
.opt.argvfunc = x509_opt_digest,
|
|
},
|
|
{ NULL },
|
|
};
|
|
|
|
static void
|
|
x509_usage(void)
|
|
{
|
|
fprintf(stderr, "usage: x509 "
|
|
"[-C] [-addreject arg] [-addtrust arg] [-alias] [-CA file]\n"
|
|
" [-CAcreateserial] [-CAform der | pem] [-CAkey file]\n"
|
|
" [-CAkeyform der | pem] [-CAserial file] [-certopt option]\n"
|
|
" [-checkend arg] [-clrext] [-clrreject] [-clrtrust] [-dates]\n"
|
|
" [-days arg] [-email] [-enddate] [-extensions section]\n"
|
|
" [-extfile file] [-fingerprint] [-force_pubkey key] [-hash]\n"
|
|
" [-in file] [-inform der | net | pem] [-issuer]\n"
|
|
" [-issuer_hash] [-issuer_hash_old] [-keyform der | pem]\n"
|
|
" [-md5 | -sha1] [-modulus] [-multivalue-rdn]\n"
|
|
" [-nameopt option] [-new] [-next_serial] [-noout] [-ocsp_uri]\n"
|
|
" [-ocspid] [-out file] [-outform der | net | pem]\n"
|
|
" [-passin arg] [-pubkey] [-purpose] [-req] [-serial]\n"
|
|
" [-set_issuer name] [-set_serial n] [-set_subject name]\n"
|
|
" [-setalias arg] [-signkey file] [-sigopt nm:v] [-startdate]\n"
|
|
" [-subject] [-subject_hash] [-subject_hash_old] [-text]\n"
|
|
" [-trustout] [-utf8] [-x509toreq]\n");
|
|
fprintf(stderr, "\n");
|
|
options_usage(x509_options);
|
|
fprintf(stderr, "\n");
|
|
}
|
|
|
|
int
|
|
x509_main(int argc, char **argv)
|
|
{
|
|
int ret = 1;
|
|
X509_REQ *req = NULL;
|
|
X509 *x = NULL, *xca = NULL;
|
|
X509_NAME *iname = NULL, *sname = NULL;
|
|
EVP_PKEY *Fpkey = NULL, *Upkey = NULL, *CApkey = NULL;
|
|
EVP_PKEY *pkey;
|
|
int i;
|
|
BIO *out = NULL;
|
|
BIO *STDout = NULL;
|
|
X509_STORE *ctx = NULL;
|
|
X509_REQ *rq = NULL;
|
|
char buf[256];
|
|
CONF *extconf = NULL;
|
|
char *passin = NULL;
|
|
|
|
if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
|
|
perror("pledge");
|
|
exit(1);
|
|
}
|
|
|
|
memset(&cfg, 0, sizeof(cfg));
|
|
cfg.chtype = MBSTRING_ASC;
|
|
cfg.days = DEF_DAYS;
|
|
cfg.informat = FORMAT_PEM;
|
|
cfg.outformat = FORMAT_PEM;
|
|
cfg.keyformat = FORMAT_PEM;
|
|
cfg.CAformat = FORMAT_PEM;
|
|
cfg.CAkeyformat = FORMAT_PEM;
|
|
|
|
STDout = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
|
|
ctx = X509_STORE_new();
|
|
if (ctx == NULL)
|
|
goto end;
|
|
X509_STORE_set_verify_cb(ctx, callb);
|
|
|
|
if (options_parse(argc, argv, x509_options, NULL, NULL) != 0)
|
|
goto bad;
|
|
|
|
if (cfg.badops) {
|
|
bad:
|
|
x509_usage();
|
|
goto end;
|
|
}
|
|
|
|
if (!app_passwd(bio_err, cfg.passargin, NULL, &passin, NULL)) {
|
|
BIO_printf(bio_err, "Error getting password\n");
|
|
goto end;
|
|
}
|
|
if (!X509_STORE_set_default_paths(ctx)) {
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (cfg.CAkeyfile == NULL && cfg.CA_flag && cfg.CAformat == FORMAT_PEM) {
|
|
cfg.CAkeyfile = cfg.CAfile;
|
|
} else if (cfg.CA_flag && cfg.CAkeyfile == NULL) {
|
|
BIO_printf(bio_err,
|
|
"need to specify a CAkey if using the CA command\n");
|
|
goto end;
|
|
}
|
|
if (cfg.extfile != NULL) {
|
|
long errorline = -1;
|
|
X509V3_CTX ctx2;
|
|
extconf = NCONF_new(NULL);
|
|
if (!NCONF_load(extconf, cfg.extfile, &errorline)) {
|
|
if (errorline <= 0)
|
|
BIO_printf(bio_err,
|
|
"error loading the config file '%s'\n",
|
|
cfg.extfile);
|
|
else
|
|
BIO_printf(bio_err,
|
|
"error on line %ld of config file '%s'\n",
|
|
errorline, cfg.extfile);
|
|
goto end;
|
|
}
|
|
if (cfg.extsect == NULL) {
|
|
cfg.extsect = NCONF_get_string(extconf, "default",
|
|
"extensions");
|
|
if (cfg.extsect == NULL) {
|
|
ERR_clear_error();
|
|
cfg.extsect = "default";
|
|
}
|
|
}
|
|
X509V3_set_ctx_test(&ctx2);
|
|
X509V3_set_nconf(&ctx2, extconf);
|
|
if (!X509V3_EXT_add_nconf(extconf, &ctx2, cfg.extsect, NULL)) {
|
|
BIO_printf(bio_err,
|
|
"Error Loading extension section %s\n", cfg.extsect);
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
}
|
|
if (cfg.force_pubkey != NULL) {
|
|
if ((Fpkey = load_pubkey(bio_err, cfg.force_pubkey,
|
|
cfg.keyformat, 0, NULL, "Forced key")) == NULL)
|
|
goto end;
|
|
}
|
|
if (cfg.new) {
|
|
if (cfg.infile != NULL) {
|
|
BIO_printf(bio_err, "Can't combine -new and -in\n");
|
|
goto end;
|
|
}
|
|
if (cfg.reqfile) {
|
|
BIO_printf(bio_err, "Can't combine -new and -req\n");
|
|
goto end;
|
|
}
|
|
if (cfg.set_subject == NULL) {
|
|
BIO_printf(bio_err, "Must use -set_subject with -new\n");
|
|
goto end;
|
|
}
|
|
if (cfg.keyfile == NULL) {
|
|
BIO_printf(bio_err, "Must use -signkey with -new\n");
|
|
goto end;
|
|
}
|
|
if ((Upkey = load_key(bio_err, cfg.keyfile, cfg.keyformat, 0,
|
|
passin, "Private key")) == NULL)
|
|
goto end;
|
|
}
|
|
if (cfg.reqfile) {
|
|
BIO *in;
|
|
|
|
if (!cfg.sign_flag && !cfg.CA_flag) {
|
|
BIO_printf(bio_err,
|
|
"We need a private key to sign with\n");
|
|
goto end;
|
|
}
|
|
in = BIO_new(BIO_s_file());
|
|
if (in == NULL) {
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (cfg.infile == NULL)
|
|
BIO_set_fp(in, stdin, BIO_NOCLOSE | BIO_FP_TEXT);
|
|
else {
|
|
if (BIO_read_filename(in, cfg.infile) <= 0) {
|
|
perror(cfg.infile);
|
|
BIO_free(in);
|
|
goto end;
|
|
}
|
|
}
|
|
req = PEM_read_bio_X509_REQ(in, NULL, NULL, NULL);
|
|
BIO_free(in);
|
|
|
|
if (req == NULL) {
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if ((pkey = X509_REQ_get0_pubkey(req)) == NULL) {
|
|
BIO_printf(bio_err, "error unpacking public key\n");
|
|
goto end;
|
|
}
|
|
i = X509_REQ_verify(req, pkey);
|
|
if (i < 0) {
|
|
BIO_printf(bio_err, "Signature verification error\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (i == 0) {
|
|
BIO_printf(bio_err,
|
|
"Signature did not match the certificate request\n");
|
|
goto end;
|
|
} else
|
|
BIO_printf(bio_err, "Signature ok\n");
|
|
|
|
print_name(bio_err, "subject=", X509_REQ_get_subject_name(req),
|
|
cfg.nmflag);
|
|
|
|
}
|
|
if (cfg.reqfile || cfg.new) {
|
|
if ((x = X509_new()) == NULL)
|
|
goto end;
|
|
|
|
if (cfg.sno == NULL) {
|
|
cfg.sno = ASN1_INTEGER_new();
|
|
if (cfg.sno == NULL || !rand_serial(NULL, cfg.sno))
|
|
goto end;
|
|
if (!X509_set_serialNumber(x, cfg.sno))
|
|
goto end;
|
|
ASN1_INTEGER_free(cfg.sno);
|
|
cfg.sno = NULL;
|
|
} else if (!X509_set_serialNumber(x, cfg.sno))
|
|
goto end;
|
|
|
|
if (cfg.set_issuer != NULL) {
|
|
iname = parse_name(cfg.set_issuer, cfg.chtype,
|
|
cfg.multirdn);
|
|
if (iname == NULL)
|
|
goto end;
|
|
}
|
|
|
|
if (cfg.set_subject != NULL)
|
|
sname = parse_name(cfg.set_subject, cfg.chtype,
|
|
cfg.multirdn);
|
|
else
|
|
sname = X509_NAME_dup(X509_REQ_get_subject_name(req));
|
|
if (sname == NULL)
|
|
goto end;
|
|
if (!X509_set_subject_name(x, sname))
|
|
goto end;
|
|
|
|
if (X509_gmtime_adj(X509_get_notBefore(x), 0) == NULL)
|
|
goto end;
|
|
if (X509_time_adj_ex(X509_get_notAfter(x), cfg.days, 0,
|
|
NULL) == NULL)
|
|
goto end;
|
|
|
|
if ((pkey = Fpkey) == NULL)
|
|
pkey = X509_REQ_get0_pubkey(req);
|
|
if (pkey == NULL)
|
|
pkey = Upkey;
|
|
if (pkey == NULL)
|
|
goto end;
|
|
if (!X509_set_pubkey(x, pkey))
|
|
goto end;
|
|
} else {
|
|
x = load_cert(bio_err, cfg.infile, cfg.informat, NULL,
|
|
"Certificate");
|
|
}
|
|
if (x == NULL)
|
|
goto end;
|
|
|
|
if (cfg.CA_flag) {
|
|
xca = load_cert(bio_err, cfg.CAfile, cfg.CAformat, NULL,
|
|
"CA Certificate");
|
|
if (xca == NULL)
|
|
goto end;
|
|
}
|
|
if (!cfg.noout || cfg.text || cfg.next_serial) {
|
|
OBJ_create("2.99999.3", "SET.ex3", "SET x509v3 extension 3");
|
|
|
|
out = BIO_new(BIO_s_file());
|
|
if (out == NULL) {
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (cfg.outfile == NULL) {
|
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
|
} else {
|
|
if (BIO_write_filename(out, cfg.outfile) <= 0) {
|
|
perror(cfg.outfile);
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
if (cfg.alias != NULL) {
|
|
if (!X509_alias_set1(x, (unsigned char *)cfg.alias, -1))
|
|
goto end;
|
|
}
|
|
|
|
if (cfg.clrtrust)
|
|
X509_trust_clear(x);
|
|
if (cfg.clrreject)
|
|
X509_reject_clear(x);
|
|
|
|
if (cfg.trust != NULL) {
|
|
for (i = 0; i < sk_ASN1_OBJECT_num(cfg.trust); i++) {
|
|
cfg.objtmp = sk_ASN1_OBJECT_value(cfg.trust, i);
|
|
if (!X509_add1_trust_object(x, cfg.objtmp))
|
|
goto end;
|
|
}
|
|
}
|
|
if (cfg.reject != NULL) {
|
|
for (i = 0; i < sk_ASN1_OBJECT_num(cfg.reject); i++) {
|
|
cfg.objtmp = sk_ASN1_OBJECT_value(cfg.reject, i);
|
|
if (!X509_add1_reject_object(x, cfg.objtmp))
|
|
goto end;
|
|
}
|
|
}
|
|
if (cfg.num) {
|
|
for (i = 1; i <= cfg.num; i++) {
|
|
if (cfg.issuer == i) {
|
|
print_name(STDout, "issuer= ",
|
|
X509_get_issuer_name(x), cfg.nmflag);
|
|
} else if (cfg.subject == i) {
|
|
print_name(STDout, "subject= ",
|
|
X509_get_subject_name(x), cfg.nmflag);
|
|
} else if (cfg.serial == i) {
|
|
BIO_printf(STDout, "serial=");
|
|
i2a_ASN1_INTEGER(STDout,
|
|
X509_get_serialNumber(x));
|
|
BIO_printf(STDout, "\n");
|
|
} else if (cfg.next_serial == i) {
|
|
BIGNUM *bnser;
|
|
ASN1_INTEGER *ser;
|
|
|
|
ser = X509_get_serialNumber(x);
|
|
if (ser == NULL)
|
|
goto end;
|
|
bnser = ASN1_INTEGER_to_BN(ser, NULL);
|
|
if (bnser == NULL)
|
|
goto end;
|
|
if (!BN_add_word(bnser, 1)) {
|
|
BN_free(bnser);
|
|
goto end;
|
|
}
|
|
ser = BN_to_ASN1_INTEGER(bnser, NULL);
|
|
if (ser == NULL) {
|
|
BN_free(bnser);
|
|
goto end;
|
|
}
|
|
BN_free(bnser);
|
|
i2a_ASN1_INTEGER(out, ser);
|
|
ASN1_INTEGER_free(ser);
|
|
BIO_puts(out, "\n");
|
|
} else if (cfg.email == i || cfg.ocsp_uri == i) {
|
|
STACK_OF(OPENSSL_STRING) *emlst;
|
|
int j;
|
|
|
|
if (cfg.email == i)
|
|
emlst = X509_get1_email(x);
|
|
else
|
|
emlst = X509_get1_ocsp(x);
|
|
for (j = 0; j < sk_OPENSSL_STRING_num(emlst); j++)
|
|
BIO_printf(STDout, "%s\n",
|
|
sk_OPENSSL_STRING_value(emlst, j));
|
|
X509_email_free(emlst);
|
|
} else if (cfg.aliasout == i) {
|
|
unsigned char *albuf;
|
|
int buflen;
|
|
albuf = X509_alias_get0(x, &buflen);
|
|
if (albuf != NULL)
|
|
BIO_printf(STDout, "%.*s\n",
|
|
buflen, albuf);
|
|
else
|
|
BIO_puts(STDout, "<No Alias>\n");
|
|
} else if (cfg.subject_hash == i) {
|
|
BIO_printf(STDout, "%08lx\n",
|
|
X509_subject_name_hash(x));
|
|
}
|
|
#ifndef OPENSSL_NO_MD5
|
|
else if (cfg.subject_hash_old == i) {
|
|
BIO_printf(STDout, "%08lx\n",
|
|
X509_subject_name_hash_old(x));
|
|
}
|
|
#endif
|
|
else if (cfg.issuer_hash == i) {
|
|
BIO_printf(STDout, "%08lx\n",
|
|
X509_issuer_name_hash(x));
|
|
}
|
|
#ifndef OPENSSL_NO_MD5
|
|
else if (cfg.issuer_hash_old == i) {
|
|
BIO_printf(STDout, "%08lx\n",
|
|
X509_issuer_name_hash_old(x));
|
|
}
|
|
#endif
|
|
else if (cfg.pprint == i) {
|
|
const X509_PURPOSE *ptmp;
|
|
int j;
|
|
|
|
BIO_printf(STDout, "Certificate purposes:\n");
|
|
for (j = 0; j < X509_PURPOSE_get_count(); j++) {
|
|
ptmp = X509_PURPOSE_get0(j);
|
|
purpose_print(STDout, x, ptmp);
|
|
}
|
|
} else if (cfg.modulus == i) {
|
|
EVP_PKEY *pubkey;
|
|
|
|
if ((pubkey = X509_get0_pubkey(x)) == NULL) {
|
|
BIO_printf(bio_err,
|
|
"Modulus=unavailable\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout, "Modulus=");
|
|
if (EVP_PKEY_id(pubkey) == EVP_PKEY_RSA) {
|
|
RSA *rsa = EVP_PKEY_get0_RSA(pubkey);
|
|
const BIGNUM *n = NULL;
|
|
|
|
RSA_get0_key(rsa, &n, NULL, NULL);
|
|
BN_print(STDout, n);
|
|
} else if (EVP_PKEY_id(pubkey) == EVP_PKEY_DSA) {
|
|
DSA *dsa = EVP_PKEY_get0_DSA(pubkey);
|
|
const BIGNUM *dsa_pub_key = NULL;
|
|
|
|
DSA_get0_key(dsa, &dsa_pub_key, NULL);
|
|
|
|
BN_print(STDout, dsa_pub_key);
|
|
} else
|
|
BIO_printf(STDout,
|
|
"Wrong Algorithm type");
|
|
BIO_printf(STDout, "\n");
|
|
} else if (cfg.pubkey == i) {
|
|
EVP_PKEY *pubkey;
|
|
|
|
if ((pubkey = X509_get0_pubkey(x)) == NULL) {
|
|
BIO_printf(bio_err,
|
|
"Error getting public key\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
PEM_write_bio_PUBKEY(STDout, pubkey);
|
|
} else if (cfg.C == i) {
|
|
unsigned char *d;
|
|
char *m;
|
|
int y, z;
|
|
|
|
m = X509_NAME_oneline(X509_get_subject_name(x),
|
|
buf, sizeof buf);
|
|
if (m == NULL)
|
|
goto end;
|
|
BIO_printf(STDout, "/* subject:%s */\n", buf);
|
|
m = X509_NAME_oneline(X509_get_issuer_name(x),
|
|
buf, sizeof buf);
|
|
if (m == NULL)
|
|
goto end;
|
|
BIO_printf(STDout, "/* issuer :%s */\n", buf);
|
|
|
|
z = i2d_X509(x, NULL);
|
|
if (z < 0)
|
|
goto end;
|
|
|
|
m = malloc(z);
|
|
if (m == NULL) {
|
|
BIO_printf(bio_err, "out of mem\n");
|
|
goto end;
|
|
}
|
|
|
|
d = (unsigned char *) m;
|
|
z = i2d_X509_NAME(X509_get_subject_name(x), &d);
|
|
if (z < 0) {
|
|
free(m);
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout,
|
|
"unsigned char XXX_subject_name[%d]={\n", z);
|
|
d = (unsigned char *) m;
|
|
for (y = 0; y < z; y++) {
|
|
BIO_printf(STDout, "0x%02X,", d[y]);
|
|
if ((y & 0x0f) == 0x0f)
|
|
BIO_printf(STDout, "\n");
|
|
}
|
|
if (y % 16 != 0)
|
|
BIO_printf(STDout, "\n");
|
|
BIO_printf(STDout, "};\n");
|
|
|
|
z = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(x), &d);
|
|
if (z < 0) {
|
|
free(m);
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout,
|
|
"unsigned char XXX_public_key[%d]={\n", z);
|
|
d = (unsigned char *) m;
|
|
for (y = 0; y < z; y++) {
|
|
BIO_printf(STDout, "0x%02X,", d[y]);
|
|
if ((y & 0x0f) == 0x0f)
|
|
BIO_printf(STDout, "\n");
|
|
}
|
|
if (y % 16 != 0)
|
|
BIO_printf(STDout, "\n");
|
|
BIO_printf(STDout, "};\n");
|
|
|
|
z = i2d_X509(x, &d);
|
|
if (z < 0) {
|
|
free(m);
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout,
|
|
"unsigned char XXX_certificate[%d]={\n", z);
|
|
d = (unsigned char *) m;
|
|
for (y = 0; y < z; y++) {
|
|
BIO_printf(STDout, "0x%02X,", d[y]);
|
|
if ((y & 0x0f) == 0x0f)
|
|
BIO_printf(STDout, "\n");
|
|
}
|
|
if (y % 16 != 0)
|
|
BIO_printf(STDout, "\n");
|
|
BIO_printf(STDout, "};\n");
|
|
|
|
free(m);
|
|
} else if (cfg.text == i) {
|
|
if(!X509_print_ex(STDout, x, cfg.nmflag,
|
|
cfg.certflag))
|
|
goto end;
|
|
} else if (cfg.startdate == i) {
|
|
ASN1_TIME *nB = X509_get_notBefore(x);
|
|
|
|
BIO_puts(STDout, "notBefore=");
|
|
if (!ASN1_TIME_to_tm(nB, NULL))
|
|
BIO_puts(STDout,
|
|
"INVALID RFC5280 TIME");
|
|
else
|
|
ASN1_TIME_print(STDout, nB);
|
|
BIO_puts(STDout, "\n");
|
|
} else if (cfg.enddate == i) {
|
|
ASN1_TIME *nA = X509_get_notAfter(x);
|
|
|
|
BIO_puts(STDout, "notAfter=");
|
|
if (!ASN1_TIME_to_tm(nA, NULL))
|
|
BIO_puts(STDout,
|
|
"INVALID RFC5280 TIME");
|
|
else
|
|
ASN1_TIME_print(STDout, nA);
|
|
BIO_puts(STDout, "\n");
|
|
} else if (cfg.fingerprint == i) {
|
|
int j;
|
|
unsigned int n;
|
|
unsigned char md[EVP_MAX_MD_SIZE];
|
|
const EVP_MD *fdig = cfg.digest;
|
|
|
|
if (fdig == NULL)
|
|
fdig = EVP_sha256();
|
|
|
|
if (!X509_digest(x, fdig, md, &n)) {
|
|
BIO_printf(bio_err, "out of memory\n");
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout, "%s Fingerprint=",
|
|
OBJ_nid2sn(EVP_MD_type(fdig)));
|
|
for (j = 0; j < (int) n; j++) {
|
|
BIO_printf(STDout, "%02X%c", md[j],
|
|
(j + 1 == (int)n) ? '\n' : ':');
|
|
}
|
|
} else if (cfg.sign_flag == i && cfg.x509req == 0) {
|
|
if (Upkey == NULL) {
|
|
Upkey = load_key(bio_err, cfg.keyfile,
|
|
cfg.keyformat, 0, passin,
|
|
"Private key");
|
|
if (Upkey == NULL)
|
|
goto end;
|
|
}
|
|
if (!sign(x, Upkey, cfg.days,
|
|
cfg.clrext, cfg.digest,
|
|
extconf, cfg.extsect, iname,
|
|
cfg.force_pubkey))
|
|
goto end;
|
|
} else if (cfg.CA_flag == i) {
|
|
if (cfg.CAkeyfile != NULL) {
|
|
CApkey = load_key(bio_err, cfg.CAkeyfile,
|
|
cfg.CAkeyformat, 0, passin,
|
|
"CA Private Key");
|
|
if (CApkey == NULL)
|
|
goto end;
|
|
}
|
|
if (!x509_certify(ctx, cfg.CAfile, cfg.digest,
|
|
x, xca, CApkey, cfg.sigopts, cfg.CAserial,
|
|
cfg.CA_createserial, cfg.days, cfg.clrext,
|
|
extconf, cfg.extsect, cfg.sno, iname))
|
|
goto end;
|
|
} else if (cfg.x509req == i) {
|
|
EVP_PKEY *pk;
|
|
|
|
BIO_printf(bio_err,
|
|
"Getting request Private Key\n");
|
|
if (cfg.keyfile == NULL) {
|
|
BIO_printf(bio_err,
|
|
"no request key file specified\n");
|
|
goto end;
|
|
} else {
|
|
pk = load_key(bio_err, cfg.keyfile,
|
|
cfg.keyformat, 0, passin,
|
|
"request key");
|
|
if (pk == NULL)
|
|
goto end;
|
|
}
|
|
|
|
BIO_printf(bio_err,
|
|
"Generating certificate request\n");
|
|
|
|
rq = X509_to_X509_REQ(x, pk, cfg.digest);
|
|
EVP_PKEY_free(pk);
|
|
if (rq == NULL) {
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (!cfg.noout) {
|
|
if (!X509_REQ_print(out, rq))
|
|
goto end;
|
|
if (!PEM_write_bio_X509_REQ(out, rq))
|
|
goto end;
|
|
}
|
|
cfg.noout = 1;
|
|
} else if (cfg.ocspid == i) {
|
|
if (!X509_ocspid_print(out, x))
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
if (cfg.checkend) {
|
|
time_t tcheck = time(NULL) + cfg.checkoffset;
|
|
int timecheck = X509_cmp_time(X509_get_notAfter(x), &tcheck);
|
|
if (timecheck == 0) {
|
|
BIO_printf(out, "Certificate expiry time is invalid\n");
|
|
ret = 1;
|
|
} else if (timecheck < 0) {
|
|
BIO_printf(out, "Certificate will expire\n");
|
|
ret = 1;
|
|
} else {
|
|
BIO_printf(out, "Certificate will not expire\n");
|
|
ret = 0;
|
|
}
|
|
goto end;
|
|
}
|
|
if (cfg.noout) {
|
|
ret = 0;
|
|
goto end;
|
|
}
|
|
if (cfg.outformat == FORMAT_ASN1)
|
|
i = i2d_X509_bio(out, x);
|
|
else if (cfg.outformat == FORMAT_PEM) {
|
|
if (cfg.trustout)
|
|
i = PEM_write_bio_X509_AUX(out, x);
|
|
else
|
|
i = PEM_write_bio_X509(out, x);
|
|
} else {
|
|
BIO_printf(bio_err,
|
|
"bad output format specified for outfile\n");
|
|
goto end;
|
|
}
|
|
if (!i) {
|
|
BIO_printf(bio_err, "unable to write certificate\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
ret = 0;
|
|
|
|
end:
|
|
OBJ_cleanup();
|
|
NCONF_free(extconf);
|
|
BIO_free_all(out);
|
|
BIO_free_all(STDout);
|
|
X509_NAME_free(iname);
|
|
X509_NAME_free(sname);
|
|
X509_STORE_free(ctx);
|
|
X509_REQ_free(req);
|
|
X509_free(x);
|
|
X509_free(xca);
|
|
EVP_PKEY_free(Fpkey);
|
|
EVP_PKEY_free(Upkey);
|
|
EVP_PKEY_free(CApkey);
|
|
sk_OPENSSL_STRING_free(cfg.sigopts);
|
|
X509_REQ_free(rq);
|
|
ASN1_INTEGER_free(cfg.sno);
|
|
sk_ASN1_OBJECT_pop_free(cfg.trust, ASN1_OBJECT_free);
|
|
sk_ASN1_OBJECT_pop_free(cfg.reject, ASN1_OBJECT_free);
|
|
free(passin);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
static ASN1_INTEGER *
|
|
x509_load_serial(char *CAfile, char *serialfile, int create)
|
|
{
|
|
char *buf = NULL, *p;
|
|
ASN1_INTEGER *bs = NULL;
|
|
BIGNUM *serial = NULL;
|
|
size_t len;
|
|
|
|
len = ((serialfile == NULL) ? (strlen(CAfile) + strlen(POSTFIX) + 1) :
|
|
(strlen(serialfile))) + 1;
|
|
buf = malloc(len);
|
|
if (buf == NULL) {
|
|
BIO_printf(bio_err, "out of mem\n");
|
|
goto end;
|
|
}
|
|
if (serialfile == NULL) {
|
|
strlcpy(buf, CAfile, len);
|
|
for (p = buf; *p; p++)
|
|
if (*p == '.') {
|
|
*p = '\0';
|
|
break;
|
|
}
|
|
strlcat(buf, POSTFIX, len);
|
|
} else
|
|
strlcpy(buf, serialfile, len);
|
|
|
|
serial = load_serial(buf, create, NULL);
|
|
if (serial == NULL)
|
|
goto end;
|
|
|
|
if (!BN_add_word(serial, 1)) {
|
|
BIO_printf(bio_err, "add_word failure\n");
|
|
goto end;
|
|
}
|
|
if (!save_serial(buf, NULL, serial, &bs))
|
|
goto end;
|
|
|
|
end:
|
|
free(buf);
|
|
BN_free(serial);
|
|
|
|
return bs;
|
|
}
|
|
|
|
static int
|
|
x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, X509 *x,
|
|
X509 *xca, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *sigopts,
|
|
char *serialfile, int create, int days, int clrext, CONF *conf,
|
|
char *section, ASN1_INTEGER *sno, X509_NAME *issuer)
|
|
{
|
|
int ret = 0;
|
|
ASN1_INTEGER *bs = NULL;
|
|
X509_STORE_CTX *xsc = NULL;
|
|
EVP_PKEY *upkey;
|
|
|
|
upkey = X509_get0_pubkey(xca);
|
|
if (upkey == NULL)
|
|
goto end;
|
|
EVP_PKEY_copy_parameters(upkey, pkey);
|
|
|
|
if ((xsc = X509_STORE_CTX_new()) == NULL)
|
|
goto end;
|
|
if (!X509_STORE_CTX_init(xsc, ctx, x, NULL)) {
|
|
BIO_printf(bio_err, "Error initialising X509 store\n");
|
|
goto end;
|
|
}
|
|
if (sno != NULL)
|
|
bs = sno;
|
|
else if ((bs = x509_load_serial(CAfile, serialfile, create)) == NULL)
|
|
goto end;
|
|
|
|
/* if (!X509_STORE_add_cert(ctx,x)) goto end;*/
|
|
|
|
/*
|
|
* NOTE: this certificate can/should be self signed, unless it was a
|
|
* certificate request in which case it is not.
|
|
*/
|
|
X509_STORE_CTX_set_cert(xsc, x);
|
|
X509_STORE_CTX_set_flags(xsc, X509_V_FLAG_CHECK_SS_SIGNATURE);
|
|
if (!cfg.reqfile && X509_verify_cert(xsc) <= 0)
|
|
goto end;
|
|
|
|
if (!X509_check_private_key(xca, pkey)) {
|
|
BIO_printf(bio_err,
|
|
"CA certificate and CA private key do not match\n");
|
|
goto end;
|
|
}
|
|
|
|
if (issuer == NULL)
|
|
issuer = X509_get_subject_name(xca);
|
|
if (issuer == NULL)
|
|
goto end;
|
|
if (!X509_set_issuer_name(x, issuer))
|
|
goto end;
|
|
|
|
if (!X509_set_serialNumber(x, bs))
|
|
goto end;
|
|
|
|
if (X509_gmtime_adj(X509_get_notBefore(x), 0L) == NULL)
|
|
goto end;
|
|
|
|
/* hardwired expired */
|
|
if (X509_time_adj_ex(X509_get_notAfter(x), days, 0, NULL) == NULL)
|
|
goto end;
|
|
|
|
if (clrext) {
|
|
while (X509_get_ext_count(x) > 0) {
|
|
if (X509_delete_ext(x, 0) == NULL)
|
|
goto end;
|
|
}
|
|
}
|
|
if (conf != NULL) {
|
|
X509V3_CTX ctx2;
|
|
if (!X509_set_version(x, 2)) /* version 3 certificate */
|
|
goto end;
|
|
X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
|
|
X509V3_set_nconf(&ctx2, conf);
|
|
if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x))
|
|
goto end;
|
|
}
|
|
if (!do_X509_sign(bio_err, x, pkey, digest, sigopts))
|
|
goto end;
|
|
|
|
ret = 1;
|
|
end:
|
|
X509_STORE_CTX_free(xsc);
|
|
if (!ret)
|
|
ERR_print_errors(bio_err);
|
|
if (sno == NULL)
|
|
ASN1_INTEGER_free(bs);
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
callb(int ok, X509_STORE_CTX *ctx)
|
|
{
|
|
int err;
|
|
X509 *err_cert;
|
|
|
|
/*
|
|
* it is ok to use a self signed certificate This case will catch
|
|
* both the initial ok == 0 and the final ok == 1 calls to this
|
|
* function
|
|
*/
|
|
err = X509_STORE_CTX_get_error(ctx);
|
|
if (err == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
|
|
return 1;
|
|
|
|
/*
|
|
* BAD we should have gotten an error. Normally if everything worked
|
|
* X509_STORE_CTX_get_error(ctx) will still be set to
|
|
* DEPTH_ZERO_SELF_....
|
|
*/
|
|
if (ok) {
|
|
BIO_printf(bio_err,
|
|
"error with certificate to be certified - should be self signed\n");
|
|
return 0;
|
|
} else {
|
|
err_cert = X509_STORE_CTX_get_current_cert(ctx);
|
|
print_name(bio_err, NULL, X509_get_subject_name(err_cert), 0);
|
|
BIO_printf(bio_err,
|
|
"error with certificate - error %d at depth %d\n%s\n",
|
|
err, X509_STORE_CTX_get_error_depth(ctx),
|
|
X509_verify_cert_error_string(err));
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* self sign */
|
|
static int
|
|
sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest,
|
|
CONF *conf, char *section, X509_NAME *issuer, char *force_pubkey)
|
|
{
|
|
EVP_PKEY *pktmp;
|
|
|
|
pktmp = X509_get0_pubkey(x);
|
|
if (pktmp == NULL)
|
|
goto err;
|
|
EVP_PKEY_copy_parameters(pktmp, pkey);
|
|
EVP_PKEY_save_parameters(pktmp, 1);
|
|
|
|
if (issuer == NULL)
|
|
issuer = X509_get_subject_name(x);
|
|
if (issuer == NULL)
|
|
goto err;
|
|
if (!X509_set_issuer_name(x, issuer))
|
|
goto err;
|
|
if (X509_gmtime_adj(X509_get_notBefore(x), 0) == NULL)
|
|
goto err;
|
|
|
|
/* Lets just make it 12:00am GMT, Jan 1 1970 */
|
|
/* memcpy(x->cert_info->validity->notBefore,"700101120000Z",13); */
|
|
/* 28 days to be certified */
|
|
|
|
if (X509_gmtime_adj(X509_get_notAfter(x),
|
|
(long) 60 * 60 * 24 * days) == NULL)
|
|
goto err;
|
|
|
|
if (force_pubkey == NULL) {
|
|
if (!X509_set_pubkey(x, pkey))
|
|
goto err;
|
|
}
|
|
if (clrext) {
|
|
while (X509_get_ext_count(x) > 0) {
|
|
if (X509_delete_ext(x, 0) == NULL)
|
|
goto err;
|
|
}
|
|
}
|
|
if (conf != NULL) {
|
|
X509V3_CTX ctx;
|
|
if (!X509_set_version(x, 2)) /* version 3 certificate */
|
|
goto err;
|
|
X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
|
|
X509V3_set_nconf(&ctx, conf);
|
|
if (!X509V3_EXT_add_nconf(conf, &ctx, section, x))
|
|
goto err;
|
|
}
|
|
if (!X509_sign(x, pkey, digest))
|
|
goto err;
|
|
|
|
return 1;
|
|
|
|
err:
|
|
ERR_print_errors(bio_err);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
purpose_print(BIO *bio, X509 *cert, const X509_PURPOSE *pt)
|
|
{
|
|
int id, i, idret;
|
|
const char *pname;
|
|
|
|
id = X509_PURPOSE_get_id(pt);
|
|
pname = X509_PURPOSE_get0_name(pt);
|
|
for (i = 0; i < 2; i++) {
|
|
idret = X509_check_purpose(cert, id, i);
|
|
BIO_printf(bio, "%s%s : ", pname, i ? " CA" : "");
|
|
if (idret == 1)
|
|
BIO_printf(bio, "Yes\n");
|
|
else if (idret == 0)
|
|
BIO_printf(bio, "No\n");
|
|
else
|
|
BIO_printf(bio, "Yes (WARNING code=%d)\n", idret);
|
|
}
|
|
return 1;
|
|
}
|