645749ef98
record-oriented fashion. That means that every write() will write a separate record, which will be read separately by the programs trying to read from it. This can be very confusing. The solution is to put a BIO filter in the way that will buffer text until a linefeed is reached, and then write everything a line at a time, so every record written will be an actual line, not chunks of lines and not (usually doesn't happen, but I've seen it once) several lines in one record. Voila, BIO_f_linebuffer() is born. Since we're so close to release time, I'm making this VMS-only for now, just to make sure no code is needlessly broken by this. After the release, this BIO method will be enabled on all other platforms as well.
1206 lines
30 KiB
C
1206 lines
30 KiB
C
/* apps/x509.c */
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
* All rights reserved.
|
|
*
|
|
* This package is an SSL implementation written
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
*
|
|
* This library is free for commercial and non-commercial use as long as
|
|
* the following conditions are aheared to. The following conditions
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
* included with this distribution is covered by the same copyright terms
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
*
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
* the code are not to be removed.
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
* as the author of the parts of the library used.
|
|
* This can be in the form of a textual message at program startup or
|
|
* in documentation (online or textual) provided with the package.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* "This product includes cryptographic software written by
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
* being used are not cryptographic related :-).
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* The licence and distribution terms for any publically available version or
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
* copied and put under another distribution licence
|
|
* [including the GNU Public Licence.]
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#ifdef NO_STDIO
|
|
#define APPS_WIN16
|
|
#endif
|
|
#include "apps.h"
|
|
#include <openssl/bio.h>
|
|
#include <openssl/asn1.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/x509.h>
|
|
#include <openssl/x509v3.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/pem.h>
|
|
|
|
#undef PROG
|
|
#define PROG x509_main
|
|
|
|
#undef POSTFIX
|
|
#define POSTFIX ".srl"
|
|
#define DEF_DAYS 30
|
|
|
|
static char *x509_usage[]={
|
|
"usage: x509 args\n",
|
|
" -inform arg - input format - default PEM (one of DER, NET or PEM)\n",
|
|
" -outform arg - output format - default PEM (one of DER, NET or PEM)\n",
|
|
" -keyform arg - private key format - default PEM\n",
|
|
" -CAform arg - CA format - default PEM\n",
|
|
" -CAkeyform arg - CA key format - default PEM\n",
|
|
" -in arg - input file - default stdin\n",
|
|
" -out arg - output file - default stdout\n",
|
|
" -passin arg - private key password source\n",
|
|
" -serial - print serial number value\n",
|
|
" -hash - print hash value\n",
|
|
" -subject - print subject DN\n",
|
|
" -issuer - print issuer DN\n",
|
|
" -email - print email address(es)\n",
|
|
" -startdate - notBefore field\n",
|
|
" -enddate - notAfter field\n",
|
|
" -purpose - print out certificate purposes\n",
|
|
" -dates - both Before and After dates\n",
|
|
" -modulus - print the RSA key modulus\n",
|
|
" -pubkey - output the public key\n",
|
|
" -fingerprint - print the certificate fingerprint\n",
|
|
" -alias - output certificate alias\n",
|
|
" -noout - no certificate output\n",
|
|
" -trustout - output a \"trusted\" certificate\n",
|
|
" -clrtrust - clear all trusted purposes\n",
|
|
" -clrreject - clear all rejected purposes\n",
|
|
" -addtrust arg - trust certificate for a given purpose\n",
|
|
" -addreject arg - reject certificate for a given purpose\n",
|
|
" -setalias arg - set certificate alias\n",
|
|
" -days arg - How long till expiry of a signed certificate - def 30 days\n",
|
|
" -checkend arg - check whether the cert expires in the next arg seconds\n",
|
|
" exit 1 if so, 0 if not\n",
|
|
" -signkey arg - self sign cert with arg\n",
|
|
" -x509toreq - output a certification request object\n",
|
|
" -req - input is a certificate request, sign and output.\n",
|
|
" -CA arg - set the CA certificate, must be PEM format.\n",
|
|
" -CAkey arg - set the CA key, must be PEM format\n",
|
|
" missing, it is assumed to be in the CA file.\n",
|
|
" -CAcreateserial - create serial number file if it does not exist\n",
|
|
" -CAserial - serial file\n",
|
|
" -text - print the certificate in text form\n",
|
|
" -C - print out C code forms\n",
|
|
" -md2/-md5/-sha1/-mdc2 - digest to use\n",
|
|
" -extfile - configuration file with X509V3 extensions to add\n",
|
|
" -extensions - section from config file with X509V3 extensions to add\n",
|
|
" -clrext - delete extensions before signing and input certificate\n",
|
|
" -nameopt arg - various certificate name options\n",
|
|
NULL
|
|
};
|
|
|
|
static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
|
|
static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
|
|
LHASH *conf, char *section);
|
|
static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
|
|
X509 *x,X509 *xca,EVP_PKEY *pkey,char *serial,
|
|
int create,int days, int clrext, LHASH *conf, char *section);
|
|
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
|
|
static int reqfile=0;
|
|
|
|
int MAIN(int, char **);
|
|
|
|
int MAIN(int argc, char **argv)
|
|
{
|
|
int ret=1;
|
|
X509_REQ *req=NULL;
|
|
X509 *x=NULL,*xca=NULL;
|
|
ASN1_OBJECT *objtmp;
|
|
EVP_PKEY *Upkey=NULL,*CApkey=NULL;
|
|
int i,num,badops=0;
|
|
BIO *out=NULL;
|
|
BIO *STDout=NULL;
|
|
STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL;
|
|
int informat,outformat,keyformat,CAformat,CAkeyformat;
|
|
char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL;
|
|
char *CAkeyfile=NULL,*CAserial=NULL;
|
|
char *alias=NULL;
|
|
int text=0,serial=0,hash=0,subject=0,issuer=0,startdate=0,enddate=0;
|
|
int noout=0,sign_flag=0,CA_flag=0,CA_createserial=0,email=0;
|
|
int trustout=0,clrtrust=0,clrreject=0,aliasout=0,clrext=0;
|
|
int C=0;
|
|
int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0;
|
|
int pprint = 0;
|
|
char **pp;
|
|
X509_STORE *ctx=NULL;
|
|
X509_REQ *rq=NULL;
|
|
int fingerprint=0;
|
|
char buf[256];
|
|
const EVP_MD *md_alg,*digest=EVP_md5();
|
|
LHASH *extconf = NULL;
|
|
char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
|
|
int need_rand = 0;
|
|
int checkend=0,checkoffset=0;
|
|
unsigned long nmflag = 0;
|
|
|
|
reqfile=0;
|
|
|
|
apps_startup();
|
|
|
|
if (bio_err == NULL)
|
|
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
|
STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
#ifdef VMS
|
|
{
|
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
STDout = BIO_push(tmpbio, STDout);
|
|
}
|
|
#endif
|
|
|
|
informat=FORMAT_PEM;
|
|
outformat=FORMAT_PEM;
|
|
keyformat=FORMAT_PEM;
|
|
CAformat=FORMAT_PEM;
|
|
CAkeyformat=FORMAT_PEM;
|
|
|
|
ctx=X509_STORE_new();
|
|
if (ctx == NULL) goto end;
|
|
X509_STORE_set_verify_cb_func(ctx,callb);
|
|
|
|
argc--;
|
|
argv++;
|
|
num=0;
|
|
while (argc >= 1)
|
|
{
|
|
if (strcmp(*argv,"-inform") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
informat=str2fmt(*(++argv));
|
|
}
|
|
else if (strcmp(*argv,"-outform") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
outformat=str2fmt(*(++argv));
|
|
}
|
|
else if (strcmp(*argv,"-keyform") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
keyformat=str2fmt(*(++argv));
|
|
}
|
|
else if (strcmp(*argv,"-req") == 0)
|
|
{
|
|
reqfile=1;
|
|
need_rand = 1;
|
|
}
|
|
else if (strcmp(*argv,"-CAform") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
CAformat=str2fmt(*(++argv));
|
|
}
|
|
else if (strcmp(*argv,"-CAkeyform") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
CAformat=str2fmt(*(++argv));
|
|
}
|
|
else if (strcmp(*argv,"-days") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
days=atoi(*(++argv));
|
|
if (days == 0)
|
|
{
|
|
BIO_printf(STDout,"bad number of days\n");
|
|
goto bad;
|
|
}
|
|
}
|
|
else if (strcmp(*argv,"-passin") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
passargin= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-extfile") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
extfile= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-extensions") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
extsect= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-in") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
infile= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-out") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
outfile= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-signkey") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
keyfile= *(++argv);
|
|
sign_flag= ++num;
|
|
need_rand = 1;
|
|
}
|
|
else if (strcmp(*argv,"-CA") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
CAfile= *(++argv);
|
|
CA_flag= ++num;
|
|
need_rand = 1;
|
|
}
|
|
else if (strcmp(*argv,"-CAkey") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
CAkeyfile= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-CAserial") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
CAserial= *(++argv);
|
|
}
|
|
else if (strcmp(*argv,"-addtrust") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
if (!(objtmp = OBJ_txt2obj(*(++argv), 0)))
|
|
{
|
|
BIO_printf(bio_err,
|
|
"Invalid trust object value %s\n", *argv);
|
|
goto bad;
|
|
}
|
|
if (!trust) trust = sk_ASN1_OBJECT_new_null();
|
|
sk_ASN1_OBJECT_push(trust, objtmp);
|
|
trustout = 1;
|
|
}
|
|
else if (strcmp(*argv,"-addreject") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
if (!(objtmp = OBJ_txt2obj(*(++argv), 0)))
|
|
{
|
|
BIO_printf(bio_err,
|
|
"Invalid reject object value %s\n", *argv);
|
|
goto bad;
|
|
}
|
|
if (!reject) reject = sk_ASN1_OBJECT_new_null();
|
|
sk_ASN1_OBJECT_push(reject, objtmp);
|
|
trustout = 1;
|
|
}
|
|
else if (strcmp(*argv,"-setalias") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
alias= *(++argv);
|
|
trustout = 1;
|
|
}
|
|
else if (strcmp(*argv,"-nameopt") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
if (!set_name_ex(&nmflag, *(++argv))) goto bad;
|
|
}
|
|
else if (strcmp(*argv,"-setalias") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
alias= *(++argv);
|
|
trustout = 1;
|
|
}
|
|
else if (strcmp(*argv,"-C") == 0)
|
|
C= ++num;
|
|
else if (strcmp(*argv,"-email") == 0)
|
|
email= ++num;
|
|
else if (strcmp(*argv,"-serial") == 0)
|
|
serial= ++num;
|
|
else if (strcmp(*argv,"-modulus") == 0)
|
|
modulus= ++num;
|
|
else if (strcmp(*argv,"-pubkey") == 0)
|
|
pubkey= ++num;
|
|
else if (strcmp(*argv,"-x509toreq") == 0)
|
|
x509req= ++num;
|
|
else if (strcmp(*argv,"-text") == 0)
|
|
text= ++num;
|
|
else if (strcmp(*argv,"-hash") == 0)
|
|
hash= ++num;
|
|
else if (strcmp(*argv,"-subject") == 0)
|
|
subject= ++num;
|
|
else if (strcmp(*argv,"-issuer") == 0)
|
|
issuer= ++num;
|
|
else if (strcmp(*argv,"-fingerprint") == 0)
|
|
fingerprint= ++num;
|
|
else if (strcmp(*argv,"-dates") == 0)
|
|
{
|
|
startdate= ++num;
|
|
enddate= ++num;
|
|
}
|
|
else if (strcmp(*argv,"-purpose") == 0)
|
|
pprint= ++num;
|
|
else if (strcmp(*argv,"-startdate") == 0)
|
|
startdate= ++num;
|
|
else if (strcmp(*argv,"-enddate") == 0)
|
|
enddate= ++num;
|
|
else if (strcmp(*argv,"-checkend") == 0)
|
|
{
|
|
if (--argc < 1) goto bad;
|
|
checkoffset=atoi(*(++argv));
|
|
checkend=1;
|
|
}
|
|
else if (strcmp(*argv,"-noout") == 0)
|
|
noout= ++num;
|
|
else if (strcmp(*argv,"-trustout") == 0)
|
|
trustout= 1;
|
|
else if (strcmp(*argv,"-clrtrust") == 0)
|
|
clrtrust= ++num;
|
|
else if (strcmp(*argv,"-clrreject") == 0)
|
|
clrreject= ++num;
|
|
else if (strcmp(*argv,"-alias") == 0)
|
|
aliasout= ++num;
|
|
else if (strcmp(*argv,"-CAcreateserial") == 0)
|
|
CA_createserial= ++num;
|
|
else if (strcmp(*argv,"-clrext") == 0)
|
|
clrext = 1;
|
|
#if 1 /* stay backwards-compatible with 0.9.5; this should go away soon */
|
|
else if (strcmp(*argv,"-crlext") == 0)
|
|
{
|
|
BIO_printf(bio_err,"use -clrext instead of -crlext\n");
|
|
clrext = 1;
|
|
}
|
|
#endif
|
|
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
|
{
|
|
/* ok */
|
|
digest=md_alg;
|
|
}
|
|
else
|
|
{
|
|
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
badops=1;
|
|
break;
|
|
}
|
|
argc--;
|
|
argv++;
|
|
}
|
|
|
|
if (badops)
|
|
{
|
|
bad:
|
|
for (pp=x509_usage; (*pp != NULL); pp++)
|
|
BIO_printf(bio_err,*pp);
|
|
goto end;
|
|
}
|
|
|
|
if (need_rand)
|
|
app_RAND_load_file(NULL, bio_err, 0);
|
|
|
|
ERR_load_crypto_strings();
|
|
|
|
if (!app_passwd(bio_err, passargin, NULL, &passin, NULL))
|
|
{
|
|
BIO_printf(bio_err, "Error getting password\n");
|
|
goto end;
|
|
}
|
|
|
|
if (!X509_STORE_set_default_paths(ctx))
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
|
|
if ((CAkeyfile == NULL) && (CA_flag) && (CAformat == FORMAT_PEM))
|
|
{ CAkeyfile=CAfile; }
|
|
else if ((CA_flag) && (CAkeyfile == NULL))
|
|
{
|
|
BIO_printf(bio_err,"need to specify a CAkey if using the CA command\n");
|
|
goto end;
|
|
}
|
|
|
|
if (extfile)
|
|
{
|
|
long errorline;
|
|
X509V3_CTX ctx2;
|
|
if (!(extconf=CONF_load(NULL,extfile,&errorline)))
|
|
{
|
|
if (errorline <= 0)
|
|
BIO_printf(bio_err,
|
|
"error loading the config file '%s'\n",
|
|
extfile);
|
|
else
|
|
BIO_printf(bio_err,
|
|
"error on line %ld of config file '%s'\n"
|
|
,errorline,extfile);
|
|
goto end;
|
|
}
|
|
if (!extsect && !(extsect = CONF_get_string(extconf, "default",
|
|
"extensions"))) extsect = "default";
|
|
X509V3_set_ctx_test(&ctx2);
|
|
X509V3_set_conf_lhash(&ctx2, extconf);
|
|
if (!X509V3_EXT_add_conf(extconf, &ctx2, extsect, NULL))
|
|
{
|
|
BIO_printf(bio_err,
|
|
"Error Loading extension section %s\n",
|
|
extsect);
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
}
|
|
|
|
|
|
if (reqfile)
|
|
{
|
|
EVP_PKEY *pkey;
|
|
X509_CINF *ci;
|
|
BIO *in;
|
|
|
|
if (!sign_flag && !CA_flag)
|
|
{
|
|
BIO_printf(bio_err,"We need a private key to sign with\n");
|
|
goto end;
|
|
}
|
|
in=BIO_new(BIO_s_file());
|
|
if (in == NULL)
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
|
|
if (infile == NULL)
|
|
BIO_set_fp(in,stdin,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
else
|
|
{
|
|
if (BIO_read_filename(in,infile) <= 0)
|
|
{
|
|
perror(infile);
|
|
BIO_free(in);
|
|
goto end;
|
|
}
|
|
}
|
|
req=PEM_read_bio_X509_REQ(in,NULL,NULL,NULL);
|
|
BIO_free(in);
|
|
|
|
if (req == NULL)
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
|
|
if ( (req->req_info == NULL) ||
|
|
(req->req_info->pubkey == NULL) ||
|
|
(req->req_info->pubkey->public_key == NULL) ||
|
|
(req->req_info->pubkey->public_key->data == NULL))
|
|
{
|
|
BIO_printf(bio_err,"The certificate request appears to corrupted\n");
|
|
BIO_printf(bio_err,"It does not contain a public key\n");
|
|
goto end;
|
|
}
|
|
if ((pkey=X509_REQ_get_pubkey(req)) == NULL)
|
|
{
|
|
BIO_printf(bio_err,"error unpacking public key\n");
|
|
goto end;
|
|
}
|
|
i=X509_REQ_verify(req,pkey);
|
|
EVP_PKEY_free(pkey);
|
|
if (i < 0)
|
|
{
|
|
BIO_printf(bio_err,"Signature verification error\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (i == 0)
|
|
{
|
|
BIO_printf(bio_err,"Signature did not match the certificate request\n");
|
|
goto end;
|
|
}
|
|
else
|
|
BIO_printf(bio_err,"Signature ok\n");
|
|
|
|
print_name(bio_err, "subject=", X509_REQ_get_subject_name(req), nmflag);
|
|
|
|
if ((x=X509_new()) == NULL) goto end;
|
|
ci=x->cert_info;
|
|
|
|
if (!ASN1_INTEGER_set(X509_get_serialNumber(x),0)) goto end;
|
|
if (!X509_set_issuer_name(x,req->req_info->subject)) goto end;
|
|
if (!X509_set_subject_name(x,req->req_info->subject)) goto end;
|
|
|
|
X509_gmtime_adj(X509_get_notBefore(x),0);
|
|
X509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days);
|
|
|
|
pkey = X509_REQ_get_pubkey(req);
|
|
X509_set_pubkey(x,pkey);
|
|
EVP_PKEY_free(pkey);
|
|
}
|
|
else
|
|
x=load_cert(bio_err,infile,informat);
|
|
|
|
if (x == NULL) goto end;
|
|
if (CA_flag)
|
|
{
|
|
xca=load_cert(bio_err,CAfile,CAformat);
|
|
if (xca == NULL) goto end;
|
|
}
|
|
|
|
if (!noout || text)
|
|
{
|
|
OBJ_create("2.99999.3",
|
|
"SET.ex3","SET x509v3 extension 3");
|
|
|
|
out=BIO_new(BIO_s_file());
|
|
if (out == NULL)
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (outfile == NULL)
|
|
{
|
|
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
#ifdef VMS
|
|
{
|
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
out = BIO_push(tmpbio, out);
|
|
}
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
if (BIO_write_filename(out,outfile) <= 0)
|
|
{
|
|
perror(outfile);
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (alias) X509_alias_set1(x, (unsigned char *)alias, -1);
|
|
|
|
if (clrtrust) X509_trust_clear(x);
|
|
if (clrreject) X509_reject_clear(x);
|
|
|
|
if (trust)
|
|
{
|
|
for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++)
|
|
{
|
|
objtmp = sk_ASN1_OBJECT_value(trust, i);
|
|
X509_add1_trust_object(x, objtmp);
|
|
}
|
|
}
|
|
|
|
if (reject)
|
|
{
|
|
for (i = 0; i < sk_ASN1_OBJECT_num(reject); i++)
|
|
{
|
|
objtmp = sk_ASN1_OBJECT_value(reject, i);
|
|
X509_add1_reject_object(x, objtmp);
|
|
}
|
|
}
|
|
|
|
if (num)
|
|
{
|
|
for (i=1; i<=num; i++)
|
|
{
|
|
if (issuer == i)
|
|
{
|
|
print_name(STDout, "issuer= ",
|
|
X509_get_issuer_name(x), nmflag);
|
|
}
|
|
else if (subject == i)
|
|
{
|
|
print_name(STDout, "subject= ",
|
|
X509_get_subject_name(x), nmflag);
|
|
}
|
|
else if (serial == i)
|
|
{
|
|
BIO_printf(STDout,"serial=");
|
|
i2a_ASN1_INTEGER(STDout,x->cert_info->serialNumber);
|
|
BIO_printf(STDout,"\n");
|
|
}
|
|
else if (email == i)
|
|
{
|
|
int j;
|
|
STACK *emlst;
|
|
emlst = X509_get1_email(x);
|
|
for (j = 0; j < sk_num(emlst); j++)
|
|
BIO_printf(STDout, "%s\n", sk_value(emlst, j));
|
|
X509_email_free(emlst);
|
|
}
|
|
else if (aliasout == i)
|
|
{
|
|
unsigned char *alstr;
|
|
alstr = X509_alias_get0(x, NULL);
|
|
if (alstr) BIO_printf(STDout,"%s\n", alstr);
|
|
else BIO_puts(STDout,"<No Alias>\n");
|
|
}
|
|
else if (hash == i)
|
|
{
|
|
BIO_printf(STDout,"%08lx\n",X509_subject_name_hash(x));
|
|
}
|
|
else if (pprint == i)
|
|
{
|
|
X509_PURPOSE *ptmp;
|
|
int j;
|
|
BIO_printf(STDout, "Certificate purposes:\n");
|
|
for (j = 0; j < X509_PURPOSE_get_count(); j++)
|
|
{
|
|
ptmp = X509_PURPOSE_get0(j);
|
|
purpose_print(STDout, x, ptmp);
|
|
}
|
|
}
|
|
else
|
|
if (modulus == i)
|
|
{
|
|
EVP_PKEY *pkey;
|
|
|
|
pkey=X509_get_pubkey(x);
|
|
if (pkey == NULL)
|
|
{
|
|
BIO_printf(bio_err,"Modulus=unavailable\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout,"Modulus=");
|
|
#ifndef NO_RSA
|
|
if (pkey->type == EVP_PKEY_RSA)
|
|
BN_print(STDout,pkey->pkey.rsa->n);
|
|
else
|
|
#endif
|
|
#ifndef NO_DSA
|
|
if (pkey->type == EVP_PKEY_DSA)
|
|
BN_print(STDout,pkey->pkey.dsa->pub_key);
|
|
else
|
|
#endif
|
|
BIO_printf(STDout,"Wrong Algorithm type");
|
|
BIO_printf(STDout,"\n");
|
|
EVP_PKEY_free(pkey);
|
|
}
|
|
else
|
|
if (pubkey == i)
|
|
{
|
|
EVP_PKEY *pkey;
|
|
|
|
pkey=X509_get_pubkey(x);
|
|
if (pkey == NULL)
|
|
{
|
|
BIO_printf(bio_err,"Error getting public key\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
PEM_write_bio_PUBKEY(STDout, pkey);
|
|
EVP_PKEY_free(pkey);
|
|
}
|
|
else
|
|
if (C == i)
|
|
{
|
|
unsigned char *d;
|
|
char *m;
|
|
int y,z;
|
|
|
|
X509_NAME_oneline(X509_get_subject_name(x),
|
|
buf,256);
|
|
BIO_printf(STDout,"/* subject:%s */\n",buf);
|
|
m=X509_NAME_oneline(
|
|
X509_get_issuer_name(x),buf,256);
|
|
BIO_printf(STDout,"/* issuer :%s */\n",buf);
|
|
|
|
z=i2d_X509(x,NULL);
|
|
m=OPENSSL_malloc(z);
|
|
|
|
d=(unsigned char *)m;
|
|
z=i2d_X509_NAME(X509_get_subject_name(x),&d);
|
|
BIO_printf(STDout,"unsigned char XXX_subject_name[%d]={\n",z);
|
|
d=(unsigned char *)m;
|
|
for (y=0; y<z; y++)
|
|
{
|
|
BIO_printf(STDout,"0x%02X,",d[y]);
|
|
if ((y & 0x0f) == 0x0f) BIO_printf(STDout,"\n");
|
|
}
|
|
if (y%16 != 0) BIO_printf(STDout,"\n");
|
|
BIO_printf(STDout,"};\n");
|
|
|
|
z=i2d_X509_PUBKEY(X509_get_X509_PUBKEY(x),&d);
|
|
BIO_printf(STDout,"unsigned char XXX_public_key[%d]={\n",z);
|
|
d=(unsigned char *)m;
|
|
for (y=0; y<z; y++)
|
|
{
|
|
BIO_printf(STDout,"0x%02X,",d[y]);
|
|
if ((y & 0x0f) == 0x0f)
|
|
BIO_printf(STDout,"\n");
|
|
}
|
|
if (y%16 != 0) BIO_printf(STDout,"\n");
|
|
BIO_printf(STDout,"};\n");
|
|
|
|
z=i2d_X509(x,&d);
|
|
BIO_printf(STDout,"unsigned char XXX_certificate[%d]={\n",z);
|
|
d=(unsigned char *)m;
|
|
for (y=0; y<z; y++)
|
|
{
|
|
BIO_printf(STDout,"0x%02X,",d[y]);
|
|
if ((y & 0x0f) == 0x0f)
|
|
BIO_printf(STDout,"\n");
|
|
}
|
|
if (y%16 != 0) BIO_printf(STDout,"\n");
|
|
BIO_printf(STDout,"};\n");
|
|
|
|
OPENSSL_free(m);
|
|
}
|
|
else if (text == i)
|
|
{
|
|
X509_print(out,x);
|
|
}
|
|
else if (startdate == i)
|
|
{
|
|
BIO_puts(STDout,"notBefore=");
|
|
ASN1_TIME_print(STDout,X509_get_notBefore(x));
|
|
BIO_puts(STDout,"\n");
|
|
}
|
|
else if (enddate == i)
|
|
{
|
|
BIO_puts(STDout,"notAfter=");
|
|
ASN1_TIME_print(STDout,X509_get_notAfter(x));
|
|
BIO_puts(STDout,"\n");
|
|
}
|
|
else if (fingerprint == i)
|
|
{
|
|
int j;
|
|
unsigned int n;
|
|
unsigned char md[EVP_MAX_MD_SIZE];
|
|
|
|
if (!X509_digest(x,digest,md,&n))
|
|
{
|
|
BIO_printf(bio_err,"out of memory\n");
|
|
goto end;
|
|
}
|
|
BIO_printf(STDout,"%s Fingerprint=",
|
|
OBJ_nid2sn(EVP_MD_type(digest)));
|
|
for (j=0; j<(int)n; j++)
|
|
{
|
|
BIO_printf(STDout,"%02X%c",md[j],
|
|
(j+1 == (int)n)
|
|
?'\n':':');
|
|
}
|
|
}
|
|
|
|
/* should be in the library */
|
|
else if ((sign_flag == i) && (x509req == 0))
|
|
{
|
|
BIO_printf(bio_err,"Getting Private key\n");
|
|
if (Upkey == NULL)
|
|
{
|
|
Upkey=load_key(bio_err,
|
|
keyfile,keyformat, passin);
|
|
if (Upkey == NULL) goto end;
|
|
}
|
|
#ifndef NO_DSA
|
|
if (Upkey->type == EVP_PKEY_DSA)
|
|
digest=EVP_dss1();
|
|
#endif
|
|
|
|
assert(need_rand);
|
|
if (!sign(x,Upkey,days,clrext,digest,
|
|
extconf, extsect)) goto end;
|
|
}
|
|
else if (CA_flag == i)
|
|
{
|
|
BIO_printf(bio_err,"Getting CA Private Key\n");
|
|
if (CAkeyfile != NULL)
|
|
{
|
|
CApkey=load_key(bio_err,
|
|
CAkeyfile,CAkeyformat, passin);
|
|
if (CApkey == NULL) goto end;
|
|
}
|
|
#ifndef NO_DSA
|
|
if (CApkey->type == EVP_PKEY_DSA)
|
|
digest=EVP_dss1();
|
|
#endif
|
|
|
|
assert(need_rand);
|
|
if (!x509_certify(ctx,CAfile,digest,x,xca,
|
|
CApkey, CAserial,CA_createserial,days, clrext,
|
|
extconf, extsect))
|
|
goto end;
|
|
}
|
|
else if (x509req == i)
|
|
{
|
|
EVP_PKEY *pk;
|
|
|
|
BIO_printf(bio_err,"Getting request Private Key\n");
|
|
if (keyfile == NULL)
|
|
{
|
|
BIO_printf(bio_err,"no request key file specified\n");
|
|
goto end;
|
|
}
|
|
else
|
|
{
|
|
pk=load_key(bio_err,
|
|
keyfile,FORMAT_PEM, passin);
|
|
if (pk == NULL) goto end;
|
|
}
|
|
|
|
BIO_printf(bio_err,"Generating certificate request\n");
|
|
|
|
if (pk->type == EVP_PKEY_DSA)
|
|
digest=EVP_dss1();
|
|
|
|
rq=X509_to_X509_REQ(x,pk,digest);
|
|
EVP_PKEY_free(pk);
|
|
if (rq == NULL)
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
if (!noout)
|
|
{
|
|
X509_REQ_print(out,rq);
|
|
PEM_write_bio_X509_REQ(out,rq);
|
|
}
|
|
noout=1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (checkend)
|
|
{
|
|
time_t tnow=time(NULL);
|
|
|
|
if (ASN1_UTCTIME_cmp_time_t(X509_get_notAfter(x), tnow+checkoffset) == -1)
|
|
{
|
|
BIO_printf(out,"Certificate will expire\n");
|
|
ret=1;
|
|
}
|
|
else
|
|
{
|
|
BIO_printf(out,"Certificate will not expire\n");
|
|
ret=0;
|
|
}
|
|
goto end;
|
|
}
|
|
|
|
if (noout)
|
|
{
|
|
ret=0;
|
|
goto end;
|
|
}
|
|
|
|
if (outformat == FORMAT_ASN1)
|
|
i=i2d_X509_bio(out,x);
|
|
else if (outformat == FORMAT_PEM)
|
|
{
|
|
if (trustout) i=PEM_write_bio_X509_AUX(out,x);
|
|
else i=PEM_write_bio_X509(out,x);
|
|
}
|
|
else if (outformat == FORMAT_NETSCAPE)
|
|
{
|
|
ASN1_HEADER ah;
|
|
ASN1_OCTET_STRING os;
|
|
|
|
os.data=(unsigned char *)NETSCAPE_CERT_HDR;
|
|
os.length=strlen(NETSCAPE_CERT_HDR);
|
|
ah.header= &os;
|
|
ah.data=(char *)x;
|
|
ah.meth=X509_asn1_meth();
|
|
|
|
/* no macro for this one yet */
|
|
i=ASN1_i2d_bio(i2d_ASN1_HEADER,out,(unsigned char *)&ah);
|
|
}
|
|
else {
|
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
goto end;
|
|
}
|
|
if (!i)
|
|
{
|
|
BIO_printf(bio_err,"unable to write certificate\n");
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
ret=0;
|
|
end:
|
|
if (need_rand)
|
|
app_RAND_write_file(NULL, bio_err);
|
|
OBJ_cleanup();
|
|
CONF_free(extconf);
|
|
BIO_free_all(out);
|
|
BIO_free_all(STDout);
|
|
X509_STORE_free(ctx);
|
|
X509_REQ_free(req);
|
|
X509_free(x);
|
|
X509_free(xca);
|
|
EVP_PKEY_free(Upkey);
|
|
EVP_PKEY_free(CApkey);
|
|
X509_REQ_free(rq);
|
|
sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
|
|
sk_ASN1_OBJECT_pop_free(reject, ASN1_OBJECT_free);
|
|
if (passin) OPENSSL_free(passin);
|
|
EXIT(ret);
|
|
}
|
|
|
|
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
|
X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create,
|
|
int days, int clrext, LHASH *conf, char *section)
|
|
{
|
|
int ret=0;
|
|
BIO *io=NULL;
|
|
MS_STATIC char buf2[1024];
|
|
char *buf=NULL,*p;
|
|
BIGNUM *serial=NULL;
|
|
ASN1_INTEGER *bs=NULL,bs2;
|
|
X509_STORE_CTX xsc;
|
|
EVP_PKEY *upkey;
|
|
|
|
upkey = X509_get_pubkey(xca);
|
|
EVP_PKEY_copy_parameters(upkey,pkey);
|
|
EVP_PKEY_free(upkey);
|
|
|
|
X509_STORE_CTX_init(&xsc,ctx,x,NULL);
|
|
buf=OPENSSL_malloc(EVP_PKEY_size(pkey)*2+
|
|
((serialfile == NULL)
|
|
?(strlen(CAfile)+strlen(POSTFIX)+1)
|
|
:(strlen(serialfile)))+1);
|
|
if (buf == NULL) { BIO_printf(bio_err,"out of mem\n"); goto end; }
|
|
if (serialfile == NULL)
|
|
{
|
|
strcpy(buf,CAfile);
|
|
for (p=buf; *p; p++)
|
|
if (*p == '.')
|
|
{
|
|
*p='\0';
|
|
break;
|
|
}
|
|
strcat(buf,POSTFIX);
|
|
}
|
|
else
|
|
strcpy(buf,serialfile);
|
|
serial=BN_new();
|
|
bs=ASN1_INTEGER_new();
|
|
if ((serial == NULL) || (bs == NULL))
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
|
|
io=BIO_new(BIO_s_file());
|
|
if (io == NULL)
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
|
|
if (BIO_read_filename(io,buf) <= 0)
|
|
{
|
|
if (!create)
|
|
{
|
|
perror(buf);
|
|
goto end;
|
|
}
|
|
else
|
|
{
|
|
ASN1_INTEGER_set(bs,1);
|
|
BN_one(serial);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (!a2i_ASN1_INTEGER(io,bs,buf2,1024))
|
|
{
|
|
BIO_printf(bio_err,"unable to load serial number from %s\n",buf);
|
|
ERR_print_errors(bio_err);
|
|
goto end;
|
|
}
|
|
else
|
|
{
|
|
serial=BN_bin2bn(bs->data,bs->length,serial);
|
|
if (serial == NULL)
|
|
{
|
|
BIO_printf(bio_err,"error converting bin 2 bn");
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!BN_add_word(serial,1))
|
|
{ BIO_printf(bio_err,"add_word failure\n"); goto end; }
|
|
bs2.data=(unsigned char *)buf2;
|
|
bs2.length=BN_bn2bin(serial,bs2.data);
|
|
|
|
if (BIO_write_filename(io,buf) <= 0)
|
|
{
|
|
BIO_printf(bio_err,"error attempting to write serial number file\n");
|
|
perror(buf);
|
|
goto end;
|
|
}
|
|
i2a_ASN1_INTEGER(io,&bs2);
|
|
BIO_puts(io,"\n");
|
|
BIO_free(io);
|
|
io=NULL;
|
|
|
|
if (!X509_STORE_add_cert(ctx,x)) goto end;
|
|
|
|
/* NOTE: this certificate can/should be self signed, unless it was
|
|
* a certificate request in which case it is not. */
|
|
X509_STORE_CTX_set_cert(&xsc,x);
|
|
if (!reqfile && !X509_verify_cert(&xsc))
|
|
goto end;
|
|
|
|
if (!X509_check_private_key(xca,pkey))
|
|
{
|
|
BIO_printf(bio_err,"CA certificate and CA private key do not match\n");
|
|
goto end;
|
|
}
|
|
|
|
if (!X509_set_issuer_name(x,X509_get_subject_name(xca))) goto end;
|
|
if (!X509_set_serialNumber(x,bs)) goto end;
|
|
|
|
if (X509_gmtime_adj(X509_get_notBefore(x),0L) == NULL)
|
|
goto end;
|
|
|
|
/* hardwired expired */
|
|
if (X509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days) == NULL)
|
|
goto end;
|
|
|
|
if (clrext)
|
|
{
|
|
while (X509_get_ext_count(x) > 0) X509_delete_ext(x, 0);
|
|
}
|
|
|
|
if (conf)
|
|
{
|
|
X509V3_CTX ctx2;
|
|
X509_set_version(x,2); /* version 3 certificate */
|
|
X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
|
|
X509V3_set_conf_lhash(&ctx2, conf);
|
|
if (!X509V3_EXT_add_conf(conf, &ctx2, section, x)) goto end;
|
|
}
|
|
|
|
if (!X509_sign(x,pkey,digest)) goto end;
|
|
ret=1;
|
|
end:
|
|
X509_STORE_CTX_cleanup(&xsc);
|
|
if (!ret)
|
|
ERR_print_errors(bio_err);
|
|
if (buf != NULL) OPENSSL_free(buf);
|
|
if (bs != NULL) ASN1_INTEGER_free(bs);
|
|
if (io != NULL) BIO_free(io);
|
|
if (serial != NULL) BN_free(serial);
|
|
return ret;
|
|
}
|
|
|
|
static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx)
|
|
{
|
|
int err;
|
|
X509 *err_cert;
|
|
|
|
/* it is ok to use a self signed certificate
|
|
* This case will catch both the initial ok == 0 and the
|
|
* final ok == 1 calls to this function */
|
|
err=X509_STORE_CTX_get_error(ctx);
|
|
if (err == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
|
|
return 1;
|
|
|
|
/* BAD we should have gotten an error. Normally if everything
|
|
* worked X509_STORE_CTX_get_error(ctx) will still be set to
|
|
* DEPTH_ZERO_SELF_.... */
|
|
if (ok)
|
|
{
|
|
BIO_printf(bio_err,"error with certificate to be certified - should be self signed\n");
|
|
return 0;
|
|
}
|
|
else
|
|
{
|
|
err_cert=X509_STORE_CTX_get_current_cert(ctx);
|
|
print_name(bio_err, NULL, X509_get_subject_name(err_cert),0);
|
|
BIO_printf(bio_err,"error with certificate - error %d at depth %d\n%s\n",
|
|
err,X509_STORE_CTX_get_error_depth(ctx),
|
|
X509_verify_cert_error_string(err));
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* self sign */
|
|
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest,
|
|
LHASH *conf, char *section)
|
|
{
|
|
|
|
EVP_PKEY *pktmp;
|
|
|
|
pktmp = X509_get_pubkey(x);
|
|
EVP_PKEY_copy_parameters(pktmp,pkey);
|
|
EVP_PKEY_save_parameters(pktmp,1);
|
|
EVP_PKEY_free(pktmp);
|
|
|
|
if (!X509_set_issuer_name(x,X509_get_subject_name(x))) goto err;
|
|
if (X509_gmtime_adj(X509_get_notBefore(x),0) == NULL) goto err;
|
|
|
|
/* Lets just make it 12:00am GMT, Jan 1 1970 */
|
|
/* memcpy(x->cert_info->validity->notBefore,"700101120000Z",13); */
|
|
/* 28 days to be certified */
|
|
|
|
if (X509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days) == NULL)
|
|
goto err;
|
|
|
|
if (!X509_set_pubkey(x,pkey)) goto err;
|
|
if (clrext)
|
|
{
|
|
while (X509_get_ext_count(x) > 0) X509_delete_ext(x, 0);
|
|
}
|
|
if (conf)
|
|
{
|
|
X509V3_CTX ctx;
|
|
X509_set_version(x,2); /* version 3 certificate */
|
|
X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
|
|
X509V3_set_conf_lhash(&ctx, conf);
|
|
if (!X509V3_EXT_add_conf(conf, &ctx, section, x)) goto err;
|
|
}
|
|
if (!X509_sign(x,pkey,digest)) goto err;
|
|
return 1;
|
|
err:
|
|
ERR_print_errors(bio_err);
|
|
return 0;
|
|
}
|
|
|
|
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt)
|
|
{
|
|
int id, i, idret;
|
|
char *pname;
|
|
id = X509_PURPOSE_get_id(pt);
|
|
pname = X509_PURPOSE_get0_name(pt);
|
|
for (i = 0; i < 2; i++)
|
|
{
|
|
idret = X509_check_purpose(cert, id, i);
|
|
BIO_printf(bio, "%s%s : ", pname, i ? " CA" : "");
|
|
if (idret == 1) BIO_printf(bio, "Yes\n");
|
|
else if (idret == 0) BIO_printf(bio, "No\n");
|
|
else BIO_printf(bio, "Yes (WARNING code=%d)\n", idret);
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
|
|
|