src/usr.bin/openssl/x509.c

1676 lines
39 KiB
C

/* $OpenBSD: x509.c,v 1.39 2024/05/27 16:12:55 tb Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@cryptsoft.com).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
#include <assert.h>
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "apps.h"
#include <openssl/asn1.h>
#include <openssl/bio.h>
#include <openssl/bn.h>
#include <openssl/dsa.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/objects.h>
#include <openssl/pem.h>
#include <openssl/rsa.h>
#include <openssl/x509.h>
#include <openssl/x509v3.h>
#define POSTFIX ".srl"
#define DEF_DAYS 30
static int callb(int ok, X509_STORE_CTX *ctx);
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext,
const EVP_MD *digest, CONF *conf, char *section, X509_NAME *issuer,
char *force_pubkey);
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
X509 *x, X509 *xca, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *sigopts,
char *serial, int create, int days, int clrext, CONF *conf, char *section,
ASN1_INTEGER *sno, X509_NAME *issuer);
static int purpose_print(BIO *bio, X509 *cert, const X509_PURPOSE *pt);
static struct {
char *alias;
int aliasout;
int badops;
int C;
int CA_createserial;
int CA_flag;
char *CAfile;
int CAformat;
char *CAkeyfile;
int CAkeyformat;
char *CAserial;
unsigned long certflag;
int checkend;
int checkoffset;
unsigned long chtype;
int clrext;
int clrreject;
int clrtrust;
int days;
const EVP_MD *digest;
int email;
int enddate;
char *extfile;
char *extsect;
int fingerprint;
char *force_pubkey;
char *infile;
int informat;
int issuer;
int issuer_hash;
#ifndef OPENSSL_NO_MD5
int issuer_hash_old;
#endif
char *keyfile;
int keyformat;
const EVP_MD *md_alg;
int modulus;
int multirdn;
int new;
int next_serial;
unsigned long nmflag;
int noout;
int num;
int ocspid;
ASN1_OBJECT *objtmp;
int ocsp_uri;
char *outfile;
int outformat;
char *passargin;
int pprint;
int pubkey;
STACK_OF(ASN1_OBJECT) *reject;
int reqfile;
int serial;
char *set_issuer;
char *set_subject;
int sign_flag;
STACK_OF(OPENSSL_STRING) *sigopts;
ASN1_INTEGER *sno;
int startdate;
int subject;
int subject_hash;
#ifndef OPENSSL_NO_MD5
int subject_hash_old;
#endif
int text;
STACK_OF(ASN1_OBJECT) *trust;
int trustout;
int x509req;
} cfg;
static int
x509_opt_addreject(char *arg)
{
if ((cfg.objtmp = OBJ_txt2obj(arg, 0)) == NULL) {
BIO_printf(bio_err, "Invalid reject object value %s\n", arg);
return (1);
}
if (cfg.reject == NULL &&
(cfg.reject = sk_ASN1_OBJECT_new_null()) == NULL)
return (1);
if (!sk_ASN1_OBJECT_push(cfg.reject, cfg.objtmp))
return (1);
cfg.trustout = 1;
return (0);
}
static int
x509_opt_addtrust(char *arg)
{
if ((cfg.objtmp = OBJ_txt2obj(arg, 0)) == NULL) {
BIO_printf(bio_err, "Invalid trust object value %s\n", arg);
return (1);
}
if (cfg.trust == NULL &&
(cfg.trust = sk_ASN1_OBJECT_new_null()) == NULL)
return (1);
if (!sk_ASN1_OBJECT_push(cfg.trust, cfg.objtmp))
return (1);
cfg.trustout = 1;
return (0);
}
static int
x509_opt_ca(char *arg)
{
cfg.CAfile = arg;
cfg.CA_flag = ++cfg.num;
return (0);
}
static int
x509_opt_certopt(char *arg)
{
if (!set_cert_ex(&cfg.certflag, arg))
return (1);
return (0);
}
static int
x509_opt_checkend(char *arg)
{
const char *errstr;
cfg.checkoffset = strtonum(arg, 0, INT_MAX, &errstr);
if (errstr != NULL) {
BIO_printf(bio_err, "checkend unusable: %s\n", errstr);
return (1);
}
cfg.checkend = 1;
return (0);
}
static int
x509_opt_dates(void)
{
cfg.startdate = ++cfg.num;
cfg.enddate = ++cfg.num;
return (0);
}
static int
x509_opt_days(char *arg)
{
const char *errstr;
cfg.days = strtonum(arg, 1, INT_MAX, &errstr);
if (errstr != NULL) {
BIO_printf(bio_err, "bad number of days: %s\n", errstr);
return (1);
}
return (0);
}
static int
x509_opt_digest(int argc, char **argv, int *argsused)
{
char *name = argv[0];
if (*name++ != '-')
return (1);
if ((cfg.md_alg = EVP_get_digestbyname(name)) != NULL) {
cfg.digest = cfg.md_alg;
} else {
BIO_printf(bio_err, "unknown option %s\n", *argv);
cfg.badops = 1;
return (1);
}
*argsused = 1;
return (0);
}
static int
x509_opt_nameopt(char *arg)
{
if (!set_name_ex(&cfg.nmflag, arg))
return (1);
return (0);
}
static int
x509_opt_set_serial(char *arg)
{
ASN1_INTEGER_free(cfg.sno);
if ((cfg.sno = s2i_ASN1_INTEGER(NULL, arg)) == NULL)
return (1);
return (0);
}
static int
x509_opt_setalias(char *arg)
{
cfg.alias = arg;
cfg.trustout = 1;
return (0);
}
static int
x509_opt_signkey(char *arg)
{
cfg.keyfile = arg;
cfg.sign_flag = ++cfg.num;
return (0);
}
static int
x509_opt_sigopt(char *arg)
{
if (cfg.sigopts == NULL &&
(cfg.sigopts = sk_OPENSSL_STRING_new_null()) == NULL)
return (1);
if (!sk_OPENSSL_STRING_push(cfg.sigopts, arg))
return (1);
return (0);
}
static int
x509_opt_utf8(void)
{
cfg.chtype = MBSTRING_UTF8;
return (0);
}
static const struct option x509_options[] = {
{
.name = "C",
.desc = "Convert the certificate into C code",
.type = OPTION_ORDER,
.opt.order = &cfg.C,
.order = &cfg.num,
},
{
.name = "addreject",
.argname = "arg",
.desc = "Reject certificate for a given purpose",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_addreject,
},
{
.name = "addtrust",
.argname = "arg",
.desc = "Trust certificate for a given purpose",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_addtrust,
},
{
.name = "alias",
.desc = "Output certificate alias",
.type = OPTION_ORDER,
.opt.order = &cfg.aliasout,
.order = &cfg.num,
},
{
.name = "CA",
.argname = "file",
.desc = "CA certificate in PEM format unless -CAform is specified",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_ca,
},
{
.name = "CAcreateserial",
.desc = "Create serial number file if it does not exist",
.type = OPTION_ORDER,
.opt.order = &cfg.CA_createserial,
.order = &cfg.num,
},
{
.name = "CAform",
.argname = "fmt",
.desc = "CA format - default PEM",
.type = OPTION_ARG_FORMAT,
.opt.value = &cfg.CAformat,
},
{
.name = "CAkey",
.argname = "file",
.desc = "CA key in PEM format unless -CAkeyform is specified\n"
"if omitted, the key is assumed to be in the CA file",
.type = OPTION_ARG,
.opt.arg = &cfg.CAkeyfile,
},
{
.name = "CAkeyform",
.argname = "fmt",
.desc = "CA key format - default PEM",
.type = OPTION_ARG_FORMAT,
.opt.value = &cfg.CAkeyformat,
},
{
.name = "CAserial",
.argname = "file",
.desc = "Serial file",
.type = OPTION_ARG,
.opt.arg = &cfg.CAserial,
},
{
.name = "certopt",
.argname = "option",
.desc = "Various certificate text options",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_certopt,
},
{
.name = "checkend",
.argname = "arg",
.desc = "Check whether the cert expires in the next arg seconds\n"
"exit 1 if so, 0 if not",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_checkend,
},
{
.name = "clrext",
.desc = "Clear all extensions",
.type = OPTION_FLAG,
.opt.flag = &cfg.clrext,
},
{
.name = "clrreject",
.desc = "Clear all rejected purposes",
.type = OPTION_ORDER,
.opt.order = &cfg.clrreject,
.order = &cfg.num,
},
{
.name = "clrtrust",
.desc = "Clear all trusted purposes",
.type = OPTION_ORDER,
.opt.order = &cfg.clrtrust,
.order = &cfg.num,
},
{
.name = "dates",
.desc = "Both Before and After dates",
.type = OPTION_FUNC,
.opt.func = x509_opt_dates,
},
{
.name = "days",
.argname = "arg",
.desc = "How long till expiry of a signed certificate - def 30 days",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_days,
},
{
.name = "email",
.desc = "Print email address(es)",
.type = OPTION_ORDER,
.opt.order = &cfg.email,
.order = &cfg.num,
},
{
.name = "enddate",
.desc = "Print notAfter field",
.type = OPTION_ORDER,
.opt.order = &cfg.enddate,
.order = &cfg.num,
},
{
.name = "extensions",
.argname = "section",
.desc = "Section from config file with X509V3 extensions to add",
.type = OPTION_ARG,
.opt.arg = &cfg.extsect,
},
{
.name = "extfile",
.argname = "file",
.desc = "Configuration file with X509V3 extensions to add",
.type = OPTION_ARG,
.opt.arg = &cfg.extfile,
},
{
.name = "fingerprint",
.desc = "Print the certificate fingerprint",
.type = OPTION_ORDER,
.opt.order = &cfg.fingerprint,
.order = &cfg.num,
},
{
.name = "force_pubkey",
.argname = "key",
.desc = "Force the public key to be put in the certificate",
.type = OPTION_ARG,
.opt.arg = &cfg.force_pubkey,
},
{
.name = "hash",
.desc = "Synonym for -subject_hash",
.type = OPTION_ORDER,
.opt.order = &cfg.subject_hash,
.order = &cfg.num,
},
{
.name = "in",
.argname = "file",
.desc = "Input file - default stdin",
.type = OPTION_ARG,
.opt.arg = &cfg.infile,
},
{
.name = "inform",
.argname = "fmt",
.desc = "Input format - default PEM (one of DER, NET or PEM)",
.type = OPTION_ARG_FORMAT,
.opt.value = &cfg.informat,
},
{
.name = "issuer",
.desc = "Print issuer name",
.type = OPTION_ORDER,
.opt.order = &cfg.issuer,
.order = &cfg.num,
},
{
.name = "issuer_hash",
.desc = "Print issuer hash value",
.type = OPTION_ORDER,
.opt.order = &cfg.issuer_hash,
.order = &cfg.num,
},
#ifndef OPENSSL_NO_MD5
{
.name = "issuer_hash_old",
.desc = "Print old-style (MD5) issuer hash value",
.type = OPTION_ORDER,
.opt.order = &cfg.issuer_hash_old,
.order = &cfg.num,
},
#endif
{
.name = "key",
.argname = "file",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_signkey,
},
{
.name = "keyform",
.argname = "fmt",
.desc = "Private key format - default PEM",
.type = OPTION_ARG_FORMAT,
.opt.value = &cfg.keyformat,
},
{
.name = "modulus",
.desc = "Print the RSA key modulus",
.type = OPTION_ORDER,
.opt.order = &cfg.modulus,
.order = &cfg.num,
},
{
.name = "multivalue-rdn",
.desc = "Enable support for multivalued RDNs",
.type = OPTION_FLAG,
.opt.flag = &cfg.multirdn,
},
{
.name = "nameopt",
.argname = "option",
.desc = "Various certificate name options",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_nameopt,
},
{
.name = "new",
.desc = "Generate a new certificate",
.type = OPTION_FLAG,
.opt.flag = &cfg.new,
},
{
.name = "next_serial",
.desc = "Print the next serial number",
.type = OPTION_ORDER,
.opt.order = &cfg.next_serial,
.order = &cfg.num,
},
{
.name = "noout",
.desc = "No certificate output",
.type = OPTION_ORDER,
.opt.order = &cfg.noout,
.order = &cfg.num,
},
{
.name = "ocsp_uri",
.desc = "Print OCSP Responder URL(s)",
.type = OPTION_ORDER,
.opt.order = &cfg.ocsp_uri,
.order = &cfg.num,
},
{
.name = "ocspid",
.desc = "Print OCSP hash values for the subject name and public key",
.type = OPTION_ORDER,
.opt.order = &cfg.ocspid,
.order = &cfg.num,
},
{
.name = "out",
.argname = "file",
.desc = "Output file - default stdout",
.type = OPTION_ARG,
.opt.arg = &cfg.outfile,
},
{
.name = "outform",
.argname = "fmt",
.desc = "Output format - default PEM (one of DER, NET or PEM)",
.type = OPTION_ARG_FORMAT,
.opt.value = &cfg.outformat,
},
{
.name = "passin",
.argname = "src",
.desc = "Private key password source",
.type = OPTION_ARG,
.opt.arg = &cfg.passargin,
},
{
.name = "pubkey",
.desc = "Output the public key",
.type = OPTION_ORDER,
.opt.order = &cfg.pubkey,
.order = &cfg.num,
},
{
.name = "purpose",
.desc = "Print out certificate purposes",
.type = OPTION_ORDER,
.opt.order = &cfg.pprint,
.order = &cfg.num,
},
{
.name = "req",
.desc = "Input is a certificate request, sign and output",
.type = OPTION_FLAG,
.opt.flag = &cfg.reqfile,
},
{
.name = "serial",
.desc = "Print serial number value",
.type = OPTION_ORDER,
.opt.order = &cfg.serial,
.order = &cfg.num,
},
{
.name = "set_issuer",
.argname = "name",
.desc = "Set the issuer name",
.type = OPTION_ARG,
.opt.arg = &cfg.set_issuer,
},
{
.name = "set_serial",
.argname = "n",
.desc = "Serial number to use",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_set_serial,
},
{
.name = "set_subject",
.argname = "name",
.desc = "Set the subject name",
.type = OPTION_ARG,
.opt.arg = &cfg.set_subject,
},
{
.name = "setalias",
.argname = "arg",
.desc = "Set certificate alias",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_setalias,
},
{
.name = "signkey",
.argname = "file",
.desc = "Self sign cert with arg",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_signkey,
},
{
.name = "sigopt",
.argname = "nm:v",
.desc = "Various signature algorithm options",
.type = OPTION_ARG_FUNC,
.opt.argfunc = x509_opt_sigopt,
},
{
.name = "startdate",
.desc = "Print notBefore field",
.type = OPTION_ORDER,
.opt.order = &cfg.startdate,
.order = &cfg.num,
},
{
.name = "subj",
.type = OPTION_ARG,
.opt.arg = &cfg.set_subject,
},
{
.name = "subject",
.desc = "Print subject name",
.type = OPTION_ORDER,
.opt.order = &cfg.subject,
.order = &cfg.num,
},
{
.name = "subject_hash",
.desc = "Print subject hash value",
.type = OPTION_ORDER,
.opt.order = &cfg.subject_hash,
.order = &cfg.num,
},
#ifndef OPENSSL_NO_MD5
{
.name = "subject_hash_old",
.desc = "Print old-style (MD5) subject hash value",
.type = OPTION_ORDER,
.opt.order = &cfg.subject_hash_old,
.order = &cfg.num,
},
#endif
{
.name = "text",
.desc = "Print the certificate in text form",
.type = OPTION_ORDER,
.opt.order = &cfg.text,
.order = &cfg.num,
},
{
.name = "trustout",
.desc = "Output a trusted certificate",
.type = OPTION_FLAG,
.opt.flag = &cfg.trustout,
},
{
.name = "utf8",
.desc = "Input characters are in UTF-8 (default ASCII)",
.type = OPTION_FUNC,
.opt.func = x509_opt_utf8,
},
{
.name = "x509toreq",
.desc = "Output a certification request object",
.type = OPTION_ORDER,
.opt.order = &cfg.x509req,
.order = &cfg.num,
},
{
.name = NULL,
.desc = "",
.type = OPTION_ARGV_FUNC,
.opt.argvfunc = x509_opt_digest,
},
{ NULL },
};
static void
x509_usage(void)
{
fprintf(stderr, "usage: x509 "
"[-C] [-addreject arg] [-addtrust arg] [-alias] [-CA file]\n"
" [-CAcreateserial] [-CAform der | pem] [-CAkey file]\n"
" [-CAkeyform der | pem] [-CAserial file] [-certopt option]\n"
" [-checkend arg] [-clrext] [-clrreject] [-clrtrust] [-dates]\n"
" [-days arg] [-email] [-enddate] [-extensions section]\n"
" [-extfile file] [-fingerprint] [-force_pubkey key] [-hash]\n"
" [-in file] [-inform der | net | pem] [-issuer]\n"
" [-issuer_hash] [-issuer_hash_old] [-keyform der | pem]\n"
" [-md5 | -sha1] [-modulus] [-multivalue-rdn]\n"
" [-nameopt option] [-new] [-next_serial] [-noout] [-ocsp_uri]\n"
" [-ocspid] [-out file] [-outform der | net | pem]\n"
" [-passin arg] [-pubkey] [-purpose] [-req] [-serial]\n"
" [-set_issuer name] [-set_serial n] [-set_subject name]\n"
" [-setalias arg] [-signkey file] [-sigopt nm:v] [-startdate]\n"
" [-subject] [-subject_hash] [-subject_hash_old] [-text]\n"
" [-trustout] [-utf8] [-x509toreq]\n");
fprintf(stderr, "\n");
options_usage(x509_options);
fprintf(stderr, "\n");
}
int
x509_main(int argc, char **argv)
{
int ret = 1;
X509_REQ *req = NULL;
X509 *x = NULL, *xca = NULL;
X509_NAME *iname = NULL, *sname = NULL;
EVP_PKEY *Fpkey = NULL, *Upkey = NULL, *CApkey = NULL;
EVP_PKEY *pkey;
int i;
BIO *out = NULL;
BIO *STDout = NULL;
X509_STORE *ctx = NULL;
X509_REQ *rq = NULL;
char buf[256];
CONF *extconf = NULL;
char *passin = NULL;
if (pledge("stdio cpath wpath rpath tty", NULL) == -1) {
perror("pledge");
exit(1);
}
memset(&cfg, 0, sizeof(cfg));
cfg.chtype = MBSTRING_ASC;
cfg.days = DEF_DAYS;
cfg.informat = FORMAT_PEM;
cfg.outformat = FORMAT_PEM;
cfg.keyformat = FORMAT_PEM;
cfg.CAformat = FORMAT_PEM;
cfg.CAkeyformat = FORMAT_PEM;
STDout = BIO_new_fp(stdout, BIO_NOCLOSE);
ctx = X509_STORE_new();
if (ctx == NULL)
goto end;
X509_STORE_set_verify_cb(ctx, callb);
if (options_parse(argc, argv, x509_options, NULL, NULL) != 0)
goto bad;
if (cfg.badops) {
bad:
x509_usage();
goto end;
}
if (!app_passwd(bio_err, cfg.passargin, NULL, &passin, NULL)) {
BIO_printf(bio_err, "Error getting password\n");
goto end;
}
if (!X509_STORE_set_default_paths(ctx)) {
ERR_print_errors(bio_err);
goto end;
}
if (cfg.CAkeyfile == NULL && cfg.CA_flag && cfg.CAformat == FORMAT_PEM) {
cfg.CAkeyfile = cfg.CAfile;
} else if (cfg.CA_flag && cfg.CAkeyfile == NULL) {
BIO_printf(bio_err,
"need to specify a CAkey if using the CA command\n");
goto end;
}
if (cfg.extfile != NULL) {
long errorline = -1;
X509V3_CTX ctx2;
extconf = NCONF_new(NULL);
if (!NCONF_load(extconf, cfg.extfile, &errorline)) {
if (errorline <= 0)
BIO_printf(bio_err,
"error loading the config file '%s'\n",
cfg.extfile);
else
BIO_printf(bio_err,
"error on line %ld of config file '%s'\n",
errorline, cfg.extfile);
goto end;
}
if (cfg.extsect == NULL) {
cfg.extsect = NCONF_get_string(extconf, "default",
"extensions");
if (cfg.extsect == NULL) {
ERR_clear_error();
cfg.extsect = "default";
}
}
X509V3_set_ctx_test(&ctx2);
X509V3_set_nconf(&ctx2, extconf);
if (!X509V3_EXT_add_nconf(extconf, &ctx2, cfg.extsect, NULL)) {
BIO_printf(bio_err,
"Error Loading extension section %s\n", cfg.extsect);
ERR_print_errors(bio_err);
goto end;
}
}
if (cfg.force_pubkey != NULL) {
if ((Fpkey = load_pubkey(bio_err, cfg.force_pubkey,
cfg.keyformat, 0, NULL, "Forced key")) == NULL)
goto end;
}
if (cfg.new) {
if (cfg.infile != NULL) {
BIO_printf(bio_err, "Can't combine -new and -in\n");
goto end;
}
if (cfg.reqfile) {
BIO_printf(bio_err, "Can't combine -new and -req\n");
goto end;
}
if (cfg.set_subject == NULL) {
BIO_printf(bio_err, "Must use -set_subject with -new\n");
goto end;
}
if (cfg.keyfile == NULL) {
BIO_printf(bio_err, "Must use -signkey with -new\n");
goto end;
}
if ((Upkey = load_key(bio_err, cfg.keyfile, cfg.keyformat, 0,
passin, "Private key")) == NULL)
goto end;
}
if (cfg.reqfile) {
BIO *in;
if (!cfg.sign_flag && !cfg.CA_flag) {
BIO_printf(bio_err,
"We need a private key to sign with\n");
goto end;
}
in = BIO_new(BIO_s_file());
if (in == NULL) {
ERR_print_errors(bio_err);
goto end;
}
if (cfg.infile == NULL)
BIO_set_fp(in, stdin, BIO_NOCLOSE | BIO_FP_TEXT);
else {
if (BIO_read_filename(in, cfg.infile) <= 0) {
perror(cfg.infile);
BIO_free(in);
goto end;
}
}
req = PEM_read_bio_X509_REQ(in, NULL, NULL, NULL);
BIO_free(in);
if (req == NULL) {
ERR_print_errors(bio_err);
goto end;
}
if ((pkey = X509_REQ_get0_pubkey(req)) == NULL) {
BIO_printf(bio_err, "error unpacking public key\n");
goto end;
}
i = X509_REQ_verify(req, pkey);
if (i < 0) {
BIO_printf(bio_err, "Signature verification error\n");
ERR_print_errors(bio_err);
goto end;
}
if (i == 0) {
BIO_printf(bio_err,
"Signature did not match the certificate request\n");
goto end;
} else
BIO_printf(bio_err, "Signature ok\n");
print_name(bio_err, "subject=", X509_REQ_get_subject_name(req),
cfg.nmflag);
}
if (cfg.reqfile || cfg.new) {
if ((x = X509_new()) == NULL)
goto end;
if (cfg.sno == NULL) {
cfg.sno = ASN1_INTEGER_new();
if (cfg.sno == NULL || !rand_serial(NULL, cfg.sno))
goto end;
if (!X509_set_serialNumber(x, cfg.sno))
goto end;
ASN1_INTEGER_free(cfg.sno);
cfg.sno = NULL;
} else if (!X509_set_serialNumber(x, cfg.sno))
goto end;
if (cfg.set_issuer != NULL) {
iname = parse_name(cfg.set_issuer, cfg.chtype,
cfg.multirdn);
if (iname == NULL)
goto end;
}
if (cfg.set_subject != NULL)
sname = parse_name(cfg.set_subject, cfg.chtype,
cfg.multirdn);
else
sname = X509_NAME_dup(X509_REQ_get_subject_name(req));
if (sname == NULL)
goto end;
if (!X509_set_subject_name(x, sname))
goto end;
if (X509_gmtime_adj(X509_get_notBefore(x), 0) == NULL)
goto end;
if (X509_time_adj_ex(X509_get_notAfter(x), cfg.days, 0,
NULL) == NULL)
goto end;
if ((pkey = Fpkey) == NULL)
pkey = X509_REQ_get0_pubkey(req);
if (pkey == NULL)
pkey = Upkey;
if (pkey == NULL)
goto end;
if (!X509_set_pubkey(x, pkey))
goto end;
} else {
x = load_cert(bio_err, cfg.infile, cfg.informat, NULL,
"Certificate");
}
if (x == NULL)
goto end;
if (cfg.CA_flag) {
xca = load_cert(bio_err, cfg.CAfile, cfg.CAformat, NULL,
"CA Certificate");
if (xca == NULL)
goto end;
}
if (!cfg.noout || cfg.text || cfg.next_serial) {
OBJ_create("2.99999.3", "SET.ex3", "SET x509v3 extension 3");
out = BIO_new(BIO_s_file());
if (out == NULL) {
ERR_print_errors(bio_err);
goto end;
}
if (cfg.outfile == NULL) {
BIO_set_fp(out, stdout, BIO_NOCLOSE);
} else {
if (BIO_write_filename(out, cfg.outfile) <= 0) {
perror(cfg.outfile);
goto end;
}
}
}
if (cfg.alias != NULL) {
if (!X509_alias_set1(x, (unsigned char *)cfg.alias, -1))
goto end;
}
if (cfg.clrtrust)
X509_trust_clear(x);
if (cfg.clrreject)
X509_reject_clear(x);
if (cfg.trust != NULL) {
for (i = 0; i < sk_ASN1_OBJECT_num(cfg.trust); i++) {
cfg.objtmp = sk_ASN1_OBJECT_value(cfg.trust, i);
if (!X509_add1_trust_object(x, cfg.objtmp))
goto end;
}
}
if (cfg.reject != NULL) {
for (i = 0; i < sk_ASN1_OBJECT_num(cfg.reject); i++) {
cfg.objtmp = sk_ASN1_OBJECT_value(cfg.reject, i);
if (!X509_add1_reject_object(x, cfg.objtmp))
goto end;
}
}
if (cfg.num) {
for (i = 1; i <= cfg.num; i++) {
if (cfg.issuer == i) {
print_name(STDout, "issuer= ",
X509_get_issuer_name(x), cfg.nmflag);
} else if (cfg.subject == i) {
print_name(STDout, "subject= ",
X509_get_subject_name(x), cfg.nmflag);
} else if (cfg.serial == i) {
BIO_printf(STDout, "serial=");
i2a_ASN1_INTEGER(STDout,
X509_get_serialNumber(x));
BIO_printf(STDout, "\n");
} else if (cfg.next_serial == i) {
BIGNUM *bnser;
ASN1_INTEGER *ser;
ser = X509_get_serialNumber(x);
if (ser == NULL)
goto end;
bnser = ASN1_INTEGER_to_BN(ser, NULL);
if (bnser == NULL)
goto end;
if (!BN_add_word(bnser, 1)) {
BN_free(bnser);
goto end;
}
ser = BN_to_ASN1_INTEGER(bnser, NULL);
if (ser == NULL) {
BN_free(bnser);
goto end;
}
BN_free(bnser);
i2a_ASN1_INTEGER(out, ser);
ASN1_INTEGER_free(ser);
BIO_puts(out, "\n");
} else if (cfg.email == i || cfg.ocsp_uri == i) {
STACK_OF(OPENSSL_STRING) *emlst;
int j;
if (cfg.email == i)
emlst = X509_get1_email(x);
else
emlst = X509_get1_ocsp(x);
for (j = 0; j < sk_OPENSSL_STRING_num(emlst); j++)
BIO_printf(STDout, "%s\n",
sk_OPENSSL_STRING_value(emlst, j));
X509_email_free(emlst);
} else if (cfg.aliasout == i) {
unsigned char *albuf;
int buflen;
albuf = X509_alias_get0(x, &buflen);
if (albuf != NULL)
BIO_printf(STDout, "%.*s\n",
buflen, albuf);
else
BIO_puts(STDout, "<No Alias>\n");
} else if (cfg.subject_hash == i) {
BIO_printf(STDout, "%08lx\n",
X509_subject_name_hash(x));
}
#ifndef OPENSSL_NO_MD5
else if (cfg.subject_hash_old == i) {
BIO_printf(STDout, "%08lx\n",
X509_subject_name_hash_old(x));
}
#endif
else if (cfg.issuer_hash == i) {
BIO_printf(STDout, "%08lx\n",
X509_issuer_name_hash(x));
}
#ifndef OPENSSL_NO_MD5
else if (cfg.issuer_hash_old == i) {
BIO_printf(STDout, "%08lx\n",
X509_issuer_name_hash_old(x));
}
#endif
else if (cfg.pprint == i) {
const X509_PURPOSE *ptmp;
int j;
BIO_printf(STDout, "Certificate purposes:\n");
for (j = 0; j < X509_PURPOSE_get_count(); j++) {
ptmp = X509_PURPOSE_get0(j);
purpose_print(STDout, x, ptmp);
}
} else if (cfg.modulus == i) {
EVP_PKEY *pubkey;
if ((pubkey = X509_get0_pubkey(x)) == NULL) {
BIO_printf(bio_err,
"Modulus=unavailable\n");
ERR_print_errors(bio_err);
goto end;
}
BIO_printf(STDout, "Modulus=");
if (EVP_PKEY_id(pubkey) == EVP_PKEY_RSA) {
RSA *rsa = EVP_PKEY_get0_RSA(pubkey);
const BIGNUM *n = NULL;
RSA_get0_key(rsa, &n, NULL, NULL);
BN_print(STDout, n);
} else if (EVP_PKEY_id(pubkey) == EVP_PKEY_DSA) {
DSA *dsa = EVP_PKEY_get0_DSA(pubkey);
const BIGNUM *dsa_pub_key = NULL;
DSA_get0_key(dsa, &dsa_pub_key, NULL);
BN_print(STDout, dsa_pub_key);
} else
BIO_printf(STDout,
"Wrong Algorithm type");
BIO_printf(STDout, "\n");
} else if (cfg.pubkey == i) {
EVP_PKEY *pubkey;
if ((pubkey = X509_get0_pubkey(x)) == NULL) {
BIO_printf(bio_err,
"Error getting public key\n");
ERR_print_errors(bio_err);
goto end;
}
PEM_write_bio_PUBKEY(STDout, pubkey);
} else if (cfg.C == i) {
unsigned char *d;
char *m;
int y, z;
m = X509_NAME_oneline(X509_get_subject_name(x),
buf, sizeof buf);
if (m == NULL)
goto end;
BIO_printf(STDout, "/* subject:%s */\n", buf);
m = X509_NAME_oneline(X509_get_issuer_name(x),
buf, sizeof buf);
if (m == NULL)
goto end;
BIO_printf(STDout, "/* issuer :%s */\n", buf);
z = i2d_X509(x, NULL);
if (z < 0)
goto end;
m = malloc(z);
if (m == NULL) {
BIO_printf(bio_err, "out of mem\n");
goto end;
}
d = (unsigned char *) m;
z = i2d_X509_NAME(X509_get_subject_name(x), &d);
if (z < 0) {
free(m);
goto end;
}
BIO_printf(STDout,
"unsigned char XXX_subject_name[%d]={\n", z);
d = (unsigned char *) m;
for (y = 0; y < z; y++) {
BIO_printf(STDout, "0x%02X,", d[y]);
if ((y & 0x0f) == 0x0f)
BIO_printf(STDout, "\n");
}
if (y % 16 != 0)
BIO_printf(STDout, "\n");
BIO_printf(STDout, "};\n");
z = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(x), &d);
if (z < 0) {
free(m);
goto end;
}
BIO_printf(STDout,
"unsigned char XXX_public_key[%d]={\n", z);
d = (unsigned char *) m;
for (y = 0; y < z; y++) {
BIO_printf(STDout, "0x%02X,", d[y]);
if ((y & 0x0f) == 0x0f)
BIO_printf(STDout, "\n");
}
if (y % 16 != 0)
BIO_printf(STDout, "\n");
BIO_printf(STDout, "};\n");
z = i2d_X509(x, &d);
if (z < 0) {
free(m);
goto end;
}
BIO_printf(STDout,
"unsigned char XXX_certificate[%d]={\n", z);
d = (unsigned char *) m;
for (y = 0; y < z; y++) {
BIO_printf(STDout, "0x%02X,", d[y]);
if ((y & 0x0f) == 0x0f)
BIO_printf(STDout, "\n");
}
if (y % 16 != 0)
BIO_printf(STDout, "\n");
BIO_printf(STDout, "};\n");
free(m);
} else if (cfg.text == i) {
if(!X509_print_ex(STDout, x, cfg.nmflag,
cfg.certflag))
goto end;
} else if (cfg.startdate == i) {
ASN1_TIME *nB = X509_get_notBefore(x);
BIO_puts(STDout, "notBefore=");
if (!ASN1_TIME_to_tm(nB, NULL))
BIO_puts(STDout,
"INVALID RFC5280 TIME");
else
ASN1_TIME_print(STDout, nB);
BIO_puts(STDout, "\n");
} else if (cfg.enddate == i) {
ASN1_TIME *nA = X509_get_notAfter(x);
BIO_puts(STDout, "notAfter=");
if (!ASN1_TIME_to_tm(nA, NULL))
BIO_puts(STDout,
"INVALID RFC5280 TIME");
else
ASN1_TIME_print(STDout, nA);
BIO_puts(STDout, "\n");
} else if (cfg.fingerprint == i) {
int j;
unsigned int n;
unsigned char md[EVP_MAX_MD_SIZE];
const EVP_MD *fdig = cfg.digest;
if (fdig == NULL)
fdig = EVP_sha256();
if (!X509_digest(x, fdig, md, &n)) {
BIO_printf(bio_err, "out of memory\n");
goto end;
}
BIO_printf(STDout, "%s Fingerprint=",
OBJ_nid2sn(EVP_MD_type(fdig)));
for (j = 0; j < (int) n; j++) {
BIO_printf(STDout, "%02X%c", md[j],
(j + 1 == (int)n) ? '\n' : ':');
}
} else if (cfg.sign_flag == i && cfg.x509req == 0) {
if (Upkey == NULL) {
Upkey = load_key(bio_err, cfg.keyfile,
cfg.keyformat, 0, passin,
"Private key");
if (Upkey == NULL)
goto end;
}
if (!sign(x, Upkey, cfg.days,
cfg.clrext, cfg.digest,
extconf, cfg.extsect, iname,
cfg.force_pubkey))
goto end;
} else if (cfg.CA_flag == i) {
if (cfg.CAkeyfile != NULL) {
CApkey = load_key(bio_err, cfg.CAkeyfile,
cfg.CAkeyformat, 0, passin,
"CA Private Key");
if (CApkey == NULL)
goto end;
}
if (!x509_certify(ctx, cfg.CAfile, cfg.digest,
x, xca, CApkey, cfg.sigopts, cfg.CAserial,
cfg.CA_createserial, cfg.days, cfg.clrext,
extconf, cfg.extsect, cfg.sno, iname))
goto end;
} else if (cfg.x509req == i) {
EVP_PKEY *pk;
BIO_printf(bio_err,
"Getting request Private Key\n");
if (cfg.keyfile == NULL) {
BIO_printf(bio_err,
"no request key file specified\n");
goto end;
} else {
pk = load_key(bio_err, cfg.keyfile,
cfg.keyformat, 0, passin,
"request key");
if (pk == NULL)
goto end;
}
BIO_printf(bio_err,
"Generating certificate request\n");
rq = X509_to_X509_REQ(x, pk, cfg.digest);
EVP_PKEY_free(pk);
if (rq == NULL) {
ERR_print_errors(bio_err);
goto end;
}
if (!cfg.noout) {
if (!X509_REQ_print(out, rq))
goto end;
if (!PEM_write_bio_X509_REQ(out, rq))
goto end;
}
cfg.noout = 1;
} else if (cfg.ocspid == i) {
if (!X509_ocspid_print(out, x))
goto end;
}
}
}
if (cfg.checkend) {
time_t tcheck = time(NULL) + cfg.checkoffset;
int timecheck = X509_cmp_time(X509_get_notAfter(x), &tcheck);
if (timecheck == 0) {
BIO_printf(out, "Certificate expiry time is invalid\n");
ret = 1;
} else if (timecheck < 0) {
BIO_printf(out, "Certificate will expire\n");
ret = 1;
} else {
BIO_printf(out, "Certificate will not expire\n");
ret = 0;
}
goto end;
}
if (cfg.noout) {
ret = 0;
goto end;
}
if (cfg.outformat == FORMAT_ASN1)
i = i2d_X509_bio(out, x);
else if (cfg.outformat == FORMAT_PEM) {
if (cfg.trustout)
i = PEM_write_bio_X509_AUX(out, x);
else
i = PEM_write_bio_X509(out, x);
} else {
BIO_printf(bio_err,
"bad output format specified for outfile\n");
goto end;
}
if (!i) {
BIO_printf(bio_err, "unable to write certificate\n");
ERR_print_errors(bio_err);
goto end;
}
ret = 0;
end:
OBJ_cleanup();
NCONF_free(extconf);
BIO_free_all(out);
BIO_free_all(STDout);
X509_NAME_free(iname);
X509_NAME_free(sname);
X509_STORE_free(ctx);
X509_REQ_free(req);
X509_free(x);
X509_free(xca);
EVP_PKEY_free(Fpkey);
EVP_PKEY_free(Upkey);
EVP_PKEY_free(CApkey);
sk_OPENSSL_STRING_free(cfg.sigopts);
X509_REQ_free(rq);
ASN1_INTEGER_free(cfg.sno);
sk_ASN1_OBJECT_pop_free(cfg.trust, ASN1_OBJECT_free);
sk_ASN1_OBJECT_pop_free(cfg.reject, ASN1_OBJECT_free);
free(passin);
return (ret);
}
static ASN1_INTEGER *
x509_load_serial(char *CAfile, char *serialfile, int create)
{
char *buf = NULL, *p;
ASN1_INTEGER *bs = NULL;
BIGNUM *serial = NULL;
size_t len;
len = ((serialfile == NULL) ? (strlen(CAfile) + strlen(POSTFIX) + 1) :
(strlen(serialfile))) + 1;
buf = malloc(len);
if (buf == NULL) {
BIO_printf(bio_err, "out of mem\n");
goto end;
}
if (serialfile == NULL) {
strlcpy(buf, CAfile, len);
for (p = buf; *p; p++)
if (*p == '.') {
*p = '\0';
break;
}
strlcat(buf, POSTFIX, len);
} else
strlcpy(buf, serialfile, len);
serial = load_serial(buf, create, NULL);
if (serial == NULL)
goto end;
if (!BN_add_word(serial, 1)) {
BIO_printf(bio_err, "add_word failure\n");
goto end;
}
if (!save_serial(buf, NULL, serial, &bs))
goto end;
end:
free(buf);
BN_free(serial);
return bs;
}
static int
x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, X509 *x,
X509 *xca, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *sigopts,
char *serialfile, int create, int days, int clrext, CONF *conf,
char *section, ASN1_INTEGER *sno, X509_NAME *issuer)
{
int ret = 0;
ASN1_INTEGER *bs = NULL;
X509_STORE_CTX *xsc = NULL;
EVP_PKEY *upkey;
upkey = X509_get0_pubkey(xca);
if (upkey == NULL)
goto end;
EVP_PKEY_copy_parameters(upkey, pkey);
if ((xsc = X509_STORE_CTX_new()) == NULL)
goto end;
if (!X509_STORE_CTX_init(xsc, ctx, x, NULL)) {
BIO_printf(bio_err, "Error initialising X509 store\n");
goto end;
}
if (sno != NULL)
bs = sno;
else if ((bs = x509_load_serial(CAfile, serialfile, create)) == NULL)
goto end;
/* if (!X509_STORE_add_cert(ctx,x)) goto end;*/
/*
* NOTE: this certificate can/should be self signed, unless it was a
* certificate request in which case it is not.
*/
X509_STORE_CTX_set_cert(xsc, x);
X509_STORE_CTX_set_flags(xsc, X509_V_FLAG_CHECK_SS_SIGNATURE);
if (!cfg.reqfile && X509_verify_cert(xsc) <= 0)
goto end;
if (!X509_check_private_key(xca, pkey)) {
BIO_printf(bio_err,
"CA certificate and CA private key do not match\n");
goto end;
}
if (issuer == NULL)
issuer = X509_get_subject_name(xca);
if (issuer == NULL)
goto end;
if (!X509_set_issuer_name(x, issuer))
goto end;
if (!X509_set_serialNumber(x, bs))
goto end;
if (X509_gmtime_adj(X509_get_notBefore(x), 0L) == NULL)
goto end;
/* hardwired expired */
if (X509_time_adj_ex(X509_get_notAfter(x), days, 0, NULL) == NULL)
goto end;
if (clrext) {
while (X509_get_ext_count(x) > 0) {
if (X509_delete_ext(x, 0) == NULL)
goto end;
}
}
if (conf != NULL) {
X509V3_CTX ctx2;
if (!X509_set_version(x, 2)) /* version 3 certificate */
goto end;
X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
X509V3_set_nconf(&ctx2, conf);
if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x))
goto end;
}
if (!do_X509_sign(bio_err, x, pkey, digest, sigopts))
goto end;
ret = 1;
end:
X509_STORE_CTX_free(xsc);
if (!ret)
ERR_print_errors(bio_err);
if (sno == NULL)
ASN1_INTEGER_free(bs);
return ret;
}
static int
callb(int ok, X509_STORE_CTX *ctx)
{
int err;
X509 *err_cert;
/*
* it is ok to use a self signed certificate This case will catch
* both the initial ok == 0 and the final ok == 1 calls to this
* function
*/
err = X509_STORE_CTX_get_error(ctx);
if (err == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
return 1;
/*
* BAD we should have gotten an error. Normally if everything worked
* X509_STORE_CTX_get_error(ctx) will still be set to
* DEPTH_ZERO_SELF_....
*/
if (ok) {
BIO_printf(bio_err,
"error with certificate to be certified - should be self signed\n");
return 0;
} else {
err_cert = X509_STORE_CTX_get_current_cert(ctx);
print_name(bio_err, NULL, X509_get_subject_name(err_cert), 0);
BIO_printf(bio_err,
"error with certificate - error %d at depth %d\n%s\n",
err, X509_STORE_CTX_get_error_depth(ctx),
X509_verify_cert_error_string(err));
return 1;
}
}
/* self sign */
static int
sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest,
CONF *conf, char *section, X509_NAME *issuer, char *force_pubkey)
{
EVP_PKEY *pktmp;
pktmp = X509_get0_pubkey(x);
if (pktmp == NULL)
goto err;
EVP_PKEY_copy_parameters(pktmp, pkey);
EVP_PKEY_save_parameters(pktmp, 1);
if (issuer == NULL)
issuer = X509_get_subject_name(x);
if (issuer == NULL)
goto err;
if (!X509_set_issuer_name(x, issuer))
goto err;
if (X509_gmtime_adj(X509_get_notBefore(x), 0) == NULL)
goto err;
/* Lets just make it 12:00am GMT, Jan 1 1970 */
/* memcpy(x->cert_info->validity->notBefore,"700101120000Z",13); */
/* 28 days to be certified */
if (X509_gmtime_adj(X509_get_notAfter(x),
(long) 60 * 60 * 24 * days) == NULL)
goto err;
if (force_pubkey == NULL) {
if (!X509_set_pubkey(x, pkey))
goto err;
}
if (clrext) {
while (X509_get_ext_count(x) > 0) {
if (X509_delete_ext(x, 0) == NULL)
goto err;
}
}
if (conf != NULL) {
X509V3_CTX ctx;
if (!X509_set_version(x, 2)) /* version 3 certificate */
goto err;
X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
X509V3_set_nconf(&ctx, conf);
if (!X509V3_EXT_add_nconf(conf, &ctx, section, x))
goto err;
}
if (!X509_sign(x, pkey, digest))
goto err;
return 1;
err:
ERR_print_errors(bio_err);
return 0;
}
static int
purpose_print(BIO *bio, X509 *cert, const X509_PURPOSE *pt)
{
int id, i, idret;
const char *pname;
id = X509_PURPOSE_get_id(pt);
pname = X509_PURPOSE_get0_name(pt);
for (i = 0; i < 2; i++) {
idret = X509_check_purpose(cert, id, i);
BIO_printf(bio, "%s%s : ", pname, i ? " CA" : "");
if (idret == 1)
BIO_printf(bio, "Yes\n");
else if (idret == 0)
BIO_printf(bio, "No\n");
else
BIO_printf(bio, "Yes (WARNING code=%d)\n", idret);
}
return 1;
}