blob: 3013e9b55c1a5e32c54df55a05b02f91f38bd129 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * X.509 certificate and private key decoding
3 *
Paul Bakker77b385e2009-07-28 17:23:11 +00004 * Copyright (C) 2006-2009, Paul Bakker <polarssl_maintainer at polarssl.org>
5 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00006 *
Paul Bakker77b385e2009-07-28 17:23:11 +00007 * Joined copyright on original XySSL code with: Christophe Devine
Paul Bakker5121ce52009-01-03 21:22:43 +00008 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, write to the Free Software Foundation, Inc.,
21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
22 */
23/*
24 * The ITU-T X.509 standard defines a certificat format for PKI.
25 *
26 * http://www.ietf.org/rfc/rfc2459.txt
27 * http://www.ietf.org/rfc/rfc3279.txt
28 *
29 * ftp://ftp.rsasecurity.com/pub/pkcs/ascii/pkcs-1v2.asc
30 *
31 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf
32 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf
33 */
34
Paul Bakker40e46942009-01-03 21:51:57 +000035#include "polarssl/config.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000036
Paul Bakker40e46942009-01-03 21:51:57 +000037#if defined(POLARSSL_X509_PARSE_C)
Paul Bakker5121ce52009-01-03 21:22:43 +000038
Paul Bakker40e46942009-01-03 21:51:57 +000039#include "polarssl/x509.h"
40#include "polarssl/base64.h"
41#include "polarssl/des.h"
42#include "polarssl/md2.h"
43#include "polarssl/md4.h"
44#include "polarssl/md5.h"
45#include "polarssl/sha1.h"
Paul Bakker026c03b2009-03-28 17:53:03 +000046#include "polarssl/sha2.h"
47#include "polarssl/sha4.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000048
49#include <string.h>
50#include <stdlib.h>
51#include <stdio.h>
52#include <time.h>
53
54/*
55 * ASN.1 DER decoding routines
56 */
57static int asn1_get_len( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +000058 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +000059 int *len )
60{
61 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +000062 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000063
64 if( ( **p & 0x80 ) == 0 )
65 *len = *(*p)++;
66 else
67 {
68 switch( **p & 0x7F )
69 {
70 case 1:
71 if( ( end - *p ) < 2 )
Paul Bakker40e46942009-01-03 21:51:57 +000072 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000073
74 *len = (*p)[1];
75 (*p) += 2;
76 break;
77
78 case 2:
79 if( ( end - *p ) < 3 )
Paul Bakker40e46942009-01-03 21:51:57 +000080 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000081
82 *len = ( (*p)[1] << 8 ) | (*p)[2];
83 (*p) += 3;
84 break;
85
86 default:
Paul Bakker40e46942009-01-03 21:51:57 +000087 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +000088 break;
89 }
90 }
91
92 if( *len > (int) ( end - *p ) )
Paul Bakker40e46942009-01-03 21:51:57 +000093 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000094
95 return( 0 );
96}
97
98static int asn1_get_tag( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +000099 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000100 int *len, int tag )
101{
102 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000103 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000104
105 if( **p != tag )
Paul Bakker40e46942009-01-03 21:51:57 +0000106 return( POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000107
108 (*p)++;
109
110 return( asn1_get_len( p, end, len ) );
111}
112
113static int asn1_get_bool( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000114 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000115 int *val )
116{
117 int ret, len;
118
119 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BOOLEAN ) ) != 0 )
120 return( ret );
121
122 if( len != 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000123 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000124
125 *val = ( **p != 0 ) ? 1 : 0;
126 (*p)++;
127
128 return( 0 );
129}
130
131static int asn1_get_int( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000132 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000133 int *val )
134{
135 int ret, len;
136
137 if( ( ret = asn1_get_tag( p, end, &len, ASN1_INTEGER ) ) != 0 )
138 return( ret );
139
140 if( len > (int) sizeof( int ) || ( **p & 0x80 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000141 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000142
143 *val = 0;
144
145 while( len-- > 0 )
146 {
147 *val = ( *val << 8 ) | **p;
148 (*p)++;
149 }
150
151 return( 0 );
152}
153
154static int asn1_get_mpi( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000155 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000156 mpi *X )
157{
158 int ret, len;
159
160 if( ( ret = asn1_get_tag( p, end, &len, ASN1_INTEGER ) ) != 0 )
161 return( ret );
162
163 ret = mpi_read_binary( X, *p, len );
164
165 *p += len;
166
167 return( ret );
168}
169
170/*
171 * Version ::= INTEGER { v1(0), v2(1), v3(2) }
172 */
173static int x509_get_version( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000174 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000175 int *ver )
176{
177 int ret, len;
178
179 if( ( ret = asn1_get_tag( p, end, &len,
180 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 0 ) ) != 0 )
181 {
Paul Bakker40e46942009-01-03 21:51:57 +0000182 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakker5121ce52009-01-03 21:22:43 +0000183 return( *ver = 0 );
184
185 return( ret );
186 }
187
188 end = *p + len;
189
190 if( ( ret = asn1_get_int( p, end, ver ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000191 return( POLARSSL_ERR_X509_CERT_INVALID_VERSION | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000192
193 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000194 return( POLARSSL_ERR_X509_CERT_INVALID_VERSION |
195 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000196
197 return( 0 );
198}
199
200/*
201 * CertificateSerialNumber ::= INTEGER
202 */
203static int x509_get_serial( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000204 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000205 x509_buf *serial )
206{
207 int ret;
208
209 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000210 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL |
211 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000212
213 if( **p != ( ASN1_CONTEXT_SPECIFIC | ASN1_PRIMITIVE | 2 ) &&
214 **p != ASN1_INTEGER )
Paul Bakker40e46942009-01-03 21:51:57 +0000215 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL |
216 POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000217
218 serial->tag = *(*p)++;
219
220 if( ( ret = asn1_get_len( p, end, &serial->len ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000221 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000222
223 serial->p = *p;
224 *p += serial->len;
225
226 return( 0 );
227}
228
229/*
230 * AlgorithmIdentifier ::= SEQUENCE {
231 * algorithm OBJECT IDENTIFIER,
232 * parameters ANY DEFINED BY algorithm OPTIONAL }
233 */
234static int x509_get_alg( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000235 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000236 x509_buf *alg )
237{
238 int ret, len;
239
240 if( ( ret = asn1_get_tag( p, end, &len,
241 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000242 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000243
244 end = *p + len;
245 alg->tag = **p;
246
247 if( ( ret = asn1_get_tag( p, end, &alg->len, ASN1_OID ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000248 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000249
250 alg->p = *p;
251 *p += alg->len;
252
253 if( *p == end )
254 return( 0 );
255
256 /*
257 * assume the algorithm parameters must be NULL
258 */
259 if( ( ret = asn1_get_tag( p, end, &len, ASN1_NULL ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000260 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000261
262 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000263 return( POLARSSL_ERR_X509_CERT_INVALID_ALG |
264 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000265
266 return( 0 );
267}
268
269/*
270 * RelativeDistinguishedName ::=
271 * SET OF AttributeTypeAndValue
272 *
273 * AttributeTypeAndValue ::= SEQUENCE {
274 * type AttributeType,
275 * value AttributeValue }
276 *
277 * AttributeType ::= OBJECT IDENTIFIER
278 *
279 * AttributeValue ::= ANY DEFINED BY AttributeType
280 */
281static int x509_get_name( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000282 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000283 x509_name *cur )
284{
285 int ret, len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000286 const unsigned char *end2;
Paul Bakker5121ce52009-01-03 21:22:43 +0000287 x509_buf *oid;
288 x509_buf *val;
289
290 if( ( ret = asn1_get_tag( p, end, &len,
291 ASN1_CONSTRUCTED | ASN1_SET ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000292 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000293
294 end2 = end;
295 end = *p + len;
296
297 if( ( ret = asn1_get_tag( p, end, &len,
298 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000299 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000300
301 if( *p + len != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000302 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
303 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000304
305 oid = &cur->oid;
306 oid->tag = **p;
307
308 if( ( ret = asn1_get_tag( p, end, &oid->len, ASN1_OID ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000309 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000310
311 oid->p = *p;
312 *p += oid->len;
313
314 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000315 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
316 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000317
318 if( **p != ASN1_BMP_STRING && **p != ASN1_UTF8_STRING &&
319 **p != ASN1_T61_STRING && **p != ASN1_PRINTABLE_STRING &&
320 **p != ASN1_IA5_STRING && **p != ASN1_UNIVERSAL_STRING )
Paul Bakker40e46942009-01-03 21:51:57 +0000321 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
322 POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000323
324 val = &cur->val;
325 val->tag = *(*p)++;
326
327 if( ( ret = asn1_get_len( p, end, &val->len ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000328 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000329
330 val->p = *p;
331 *p += val->len;
332
333 cur->next = NULL;
334
335 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000336 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
337 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000338
339 /*
340 * recurse until end of SEQUENCE is reached
341 */
342 if( *p == end2 )
343 return( 0 );
344
345 cur->next = (x509_name *) malloc(
346 sizeof( x509_name ) );
347
348 if( cur->next == NULL )
349 return( 1 );
350
351 return( x509_get_name( p, end2, cur->next ) );
352}
353
354/*
Paul Bakker5121ce52009-01-03 21:22:43 +0000355 * Time ::= CHOICE {
356 * utcTime UTCTime,
357 * generalTime GeneralizedTime }
358 */
Paul Bakker91200182010-02-18 21:26:15 +0000359static int x509_get_time( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000360 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000361 x509_time *time )
362{
363 int ret, len;
364 char date[64];
Paul Bakker91200182010-02-18 21:26:15 +0000365 unsigned char tag;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000366
Paul Bakker91200182010-02-18 21:26:15 +0000367 if( ( end - *p ) < 1 )
368 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000369
Paul Bakker91200182010-02-18 21:26:15 +0000370 tag = **p;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000371
Paul Bakker91200182010-02-18 21:26:15 +0000372 if ( tag == ASN1_UTC_TIME )
373 {
374 (*p)++;
375 ret = asn1_get_len( p, end, &len );
376
377 if( ret != 0 )
378 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000379
Paul Bakker91200182010-02-18 21:26:15 +0000380 memset( date, 0, sizeof( date ) );
381 memcpy( date, *p, ( len < (int) sizeof( date ) - 1 ) ?
382 len : (int) sizeof( date ) - 1 );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000383
Paul Bakker91200182010-02-18 21:26:15 +0000384 if( sscanf( date, "%2d%2d%2d%2d%2d%2d",
385 &time->year, &time->mon, &time->day,
386 &time->hour, &time->min, &time->sec ) < 5 )
387 return( POLARSSL_ERR_X509_CERT_INVALID_DATE );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000388
Paul Bakker91200182010-02-18 21:26:15 +0000389 time->year += 100 * ( time->year < 90 );
390 time->year += 1900;
391
392 *p += len;
393
394 return( 0 );
395 }
396 else if ( tag == ASN1_GENERALIZED_TIME )
397 {
398 (*p)++;
399 ret = asn1_get_len( p, end, &len );
400
401 if( ret != 0 )
402 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
403
404 memset( date, 0, sizeof( date ) );
405 memcpy( date, *p, ( len < (int) sizeof( date ) - 1 ) ?
406 len : (int) sizeof( date ) - 1 );
407
408 if( sscanf( date, "%4d%2d%2d%2d%2d%2d",
409 &time->year, &time->mon, &time->day,
410 &time->hour, &time->min, &time->sec ) < 5 )
411 return( POLARSSL_ERR_X509_CERT_INVALID_DATE );
412
413 *p += len;
414
415 return( 0 );
416 }
417 else
418 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000419}
420
421
422/*
423 * Validity ::= SEQUENCE {
424 * notBefore Time,
425 * notAfter Time }
426 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000427static int x509_get_dates( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000428 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000429 x509_time *from,
430 x509_time *to )
431{
432 int ret, len;
Paul Bakker5121ce52009-01-03 21:22:43 +0000433
434 if( ( ret = asn1_get_tag( p, end, &len,
435 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000436 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000437
438 end = *p + len;
439
Paul Bakker91200182010-02-18 21:26:15 +0000440 if( ( ret = x509_get_time( p, end, from ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000441 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000442
Paul Bakker91200182010-02-18 21:26:15 +0000443 if( ( ret = x509_get_time( p, end, to ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000444 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000445
446 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000447 return( POLARSSL_ERR_X509_CERT_INVALID_DATE |
448 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000449
450 return( 0 );
451}
452
453/*
454 * SubjectPublicKeyInfo ::= SEQUENCE {
455 * algorithm AlgorithmIdentifier,
456 * subjectPublicKey BIT STRING }
457 */
458static int x509_get_pubkey( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000459 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000460 x509_buf *pk_alg_oid,
461 mpi *N, mpi *E )
462{
463 int ret, len;
464 unsigned char *end2;
465
466 if( ( ret = x509_get_alg( p, end, pk_alg_oid ) ) != 0 )
467 return( ret );
468
469 /*
470 * only RSA public keys handled at this time
471 */
472 if( pk_alg_oid->len != 9 ||
473 memcmp( pk_alg_oid->p, OID_PKCS1_RSA, 9 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000474 return( POLARSSL_ERR_X509_CERT_UNKNOWN_PK_ALG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000475
476 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000477 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000478
479 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000480 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
481 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000482
483 end2 = *p + len;
484
485 if( *(*p)++ != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000486 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY );
Paul Bakker5121ce52009-01-03 21:22:43 +0000487
488 /*
489 * RSAPublicKey ::= SEQUENCE {
490 * modulus INTEGER, -- n
491 * publicExponent INTEGER -- e
492 * }
493 */
494 if( ( ret = asn1_get_tag( p, end2, &len,
495 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000496 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000497
498 if( *p + len != end2 )
Paul Bakker40e46942009-01-03 21:51:57 +0000499 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
500 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000501
502 if( ( ret = asn1_get_mpi( p, end2, N ) ) != 0 ||
503 ( ret = asn1_get_mpi( p, end2, E ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000504 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000505
506 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000507 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
508 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000509
510 return( 0 );
511}
512
513static int x509_get_sig( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000514 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000515 x509_buf *sig )
516{
517 int ret, len;
518
519 sig->tag = **p;
520
521 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000522 return( POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000523
524 if( --len < 1 || *(*p)++ != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000525 return( POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE );
Paul Bakker5121ce52009-01-03 21:22:43 +0000526
527 sig->len = len;
528 sig->p = *p;
529
530 *p += len;
531
532 return( 0 );
533}
534
535/*
536 * X.509 v2/v3 unique identifier (not parsed)
537 */
538static int x509_get_uid( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000539 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000540 x509_buf *uid, int n )
541{
542 int ret;
543
544 if( *p == end )
545 return( 0 );
546
547 uid->tag = **p;
548
549 if( ( ret = asn1_get_tag( p, end, &uid->len,
550 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | n ) ) != 0 )
551 {
Paul Bakker40e46942009-01-03 21:51:57 +0000552 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakker5121ce52009-01-03 21:22:43 +0000553 return( 0 );
554
555 return( ret );
556 }
557
558 uid->p = *p;
559 *p += uid->len;
560
561 return( 0 );
562}
563
564/*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000565 * X.509 Extensions (No parsing of extensions, pointer should
566 * be either manually updated or extensions should be parsed!
Paul Bakker5121ce52009-01-03 21:22:43 +0000567 */
568static int x509_get_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000569 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000570 x509_buf *ext )
Paul Bakker5121ce52009-01-03 21:22:43 +0000571{
572 int ret, len;
Paul Bakker5121ce52009-01-03 21:22:43 +0000573
574 if( *p == end )
575 return( 0 );
576
577 ext->tag = **p;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000578
Paul Bakker5121ce52009-01-03 21:22:43 +0000579 if( ( ret = asn1_get_tag( p, end, &ext->len,
580 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 3 ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000581 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000582
583 ext->p = *p;
584 end = *p + ext->len;
585
586 /*
587 * Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
588 *
589 * Extension ::= SEQUENCE {
590 * extnID OBJECT IDENTIFIER,
591 * critical BOOLEAN DEFAULT FALSE,
592 * extnValue OCTET STRING }
593 */
594 if( ( ret = asn1_get_tag( p, end, &len,
595 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000596 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000597
598 if( end != *p + len )
Paul Bakker40e46942009-01-03 21:51:57 +0000599 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
600 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000601
Paul Bakkerd98030e2009-05-02 15:13:40 +0000602 return( 0 );
603}
604
605/*
606 * X.509 CRL v2 extensions (no extensions parsed yet.)
607 */
608static int x509_get_crl_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000609 const unsigned char *end,
610 x509_buf *ext )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000611{
612 int ret, len;
613
614 if( ( ret = x509_get_ext( p, end, ext ) ) != 0 )
615 {
616 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
617 return( 0 );
618
619 return( ret );
620 }
621
622 while( *p < end )
623 {
624 if( ( ret = asn1_get_tag( p, end, &len,
625 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
626 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
627
628 *p += len;
629 }
630
631 if( *p != end )
632 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
633 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
634
635 return( 0 );
636}
637
638/*
639 * X.509 v3 extensions (only BasicConstraints are parsed)
640 */
641static int x509_get_crt_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000642 const unsigned char *end,
643 x509_buf *ext,
644 int *ca_istrue,
645 int *max_pathlen )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000646{
647 int ret, len;
648 int is_critical = 1;
649 int is_cacert = 0;
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000650 unsigned char *end_ext_data, *end_ext_octet;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000651
652 if( ( ret = x509_get_ext( p, end, ext ) ) != 0 )
653 {
654 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
655 return( 0 );
656
657 return( ret );
658 }
659
Paul Bakker5121ce52009-01-03 21:22:43 +0000660 while( *p < end )
661 {
662 if( ( ret = asn1_get_tag( p, end, &len,
663 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000664 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000665
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000666 end_ext_data = *p + len;
667
Paul Bakker5121ce52009-01-03 21:22:43 +0000668 if( memcmp( *p, "\x06\x03\x55\x1D\x13", 5 ) != 0 )
669 {
670 *p += len;
671 continue;
672 }
673
674 *p += 5;
675
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000676 if( ( ret = asn1_get_bool( p, end_ext_data, &is_critical ) ) != 0 &&
Paul Bakker40e46942009-01-03 21:51:57 +0000677 ( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) )
678 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000679
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000680 if( ( ret = asn1_get_tag( p, end_ext_data, &len,
Paul Bakker5121ce52009-01-03 21:22:43 +0000681 ASN1_OCTET_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000682 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000683
684 /*
685 * BasicConstraints ::= SEQUENCE {
686 * cA BOOLEAN DEFAULT FALSE,
687 * pathLenConstraint INTEGER (0..MAX) OPTIONAL }
688 */
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000689 end_ext_octet = *p + len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000690
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000691 if( end_ext_octet != end_ext_data )
692 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
693 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000694
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000695 if( ( ret = asn1_get_tag( p, end_ext_octet, &len,
Paul Bakker5121ce52009-01-03 21:22:43 +0000696 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000697 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000698
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000699 if( *p == end_ext_octet )
Paul Bakker5121ce52009-01-03 21:22:43 +0000700 continue;
701
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000702 if( ( ret = asn1_get_bool( p, end_ext_octet, &is_cacert ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000703 {
Paul Bakker40e46942009-01-03 21:51:57 +0000704 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000705 ret = asn1_get_int( p, end_ext_octet, &is_cacert );
Paul Bakker5121ce52009-01-03 21:22:43 +0000706
707 if( ret != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000708 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000709
710 if( is_cacert != 0 )
711 is_cacert = 1;
712 }
713
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000714 if( *p == end_ext_octet )
Paul Bakker5121ce52009-01-03 21:22:43 +0000715 continue;
716
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000717 if( ( ret = asn1_get_int( p, end_ext_octet, max_pathlen ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000718 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000719
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000720 if( *p != end_ext_octet )
Paul Bakker40e46942009-01-03 21:51:57 +0000721 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
722 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000723
724 max_pathlen++;
725 }
726
727 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000728 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
729 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000730
731 *ca_istrue = is_critical & is_cacert;
732
733 return( 0 );
734}
735
736/*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000737 * X.509 CRL Entries
738 */
739static int x509_get_entries( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000740 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000741 x509_crl_entry *entry )
742{
Paul Bakker9be19372009-07-27 20:21:53 +0000743 int ret, entry_len;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000744 x509_crl_entry *cur_entry = entry;
745
746 if( *p == end )
747 return( 0 );
748
Paul Bakker9be19372009-07-27 20:21:53 +0000749 if( ( ret = asn1_get_tag( p, end, &entry_len,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000750 ASN1_SEQUENCE | ASN1_CONSTRUCTED ) ) != 0 )
751 {
752 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
753 return( 0 );
754
755 return( ret );
756 }
757
Paul Bakker9be19372009-07-27 20:21:53 +0000758 end = *p + entry_len;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000759
760 while( *p < end )
761 {
762 int len2;
763
764 if( ( ret = asn1_get_tag( p, end, &len2,
765 ASN1_SEQUENCE | ASN1_CONSTRUCTED ) ) != 0 )
766 {
Paul Bakkerd98030e2009-05-02 15:13:40 +0000767 return( ret );
768 }
769
Paul Bakker9be19372009-07-27 20:21:53 +0000770 cur_entry->raw.tag = **p;
771 cur_entry->raw.p = *p;
772 cur_entry->raw.len = len2;
773
Paul Bakkerd98030e2009-05-02 15:13:40 +0000774 if( ( ret = x509_get_serial( p, end, &cur_entry->serial ) ) != 0 )
775 return( ret );
776
Paul Bakker91200182010-02-18 21:26:15 +0000777 if( ( ret = x509_get_time( p, end, &cur_entry->revocation_date ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000778 return( ret );
779
780 if( ( ret = x509_get_crl_ext( p, end, &cur_entry->entry_ext ) ) != 0 )
781 return( ret );
782
783 if ( *p < end ) {
784 cur_entry->next = malloc( sizeof( x509_crl_entry ) );
785 cur_entry = cur_entry->next;
786 memset( cur_entry, 0, sizeof( x509_crl_entry ) );
787 }
788 }
789
790 return( 0 );
791}
792
Paul Bakker27d66162010-03-17 06:56:01 +0000793static int x509_get_sig_alg( const x509_buf *sig_oid, int *sig_alg )
794{
795 if( sig_oid->len == 9 &&
796 memcmp( sig_oid->p, OID_PKCS1, 8 ) == 0 )
797 {
798 if( sig_oid->p[8] >= 2 && sig_oid->p[8] <= 5 )
799 {
800 *sig_alg = sig_oid->p[8];
801 return( 0 );
802 }
803
804 if ( sig_oid->p[8] >= 11 && sig_oid->p[8] <= 14 )
805 {
806 *sig_alg = sig_oid->p[8];
807 return( 0 );
808 }
809
810 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
811 }
812
813 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
814}
815
Paul Bakkerd98030e2009-05-02 15:13:40 +0000816/*
Paul Bakker5121ce52009-01-03 21:22:43 +0000817 * Parse one or more certificates and add them to the chained list
818 */
Paul Bakkerff60ee62010-03-16 21:09:09 +0000819int x509parse_crt( x509_cert *chain, const unsigned char *buf, int buflen )
Paul Bakker5121ce52009-01-03 21:22:43 +0000820{
821 int ret, len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000822 const unsigned char *s1, *s2;
Paul Bakker5121ce52009-01-03 21:22:43 +0000823 unsigned char *p, *end;
824 x509_cert *crt;
825
826 crt = chain;
827
Paul Bakker320a4b52009-03-28 18:52:39 +0000828 /*
829 * Check for valid input
830 */
831 if( crt == NULL || buf == NULL )
832 return( 1 );
833
Paul Bakkere9581d62009-03-28 20:29:25 +0000834 while( crt->version != 0 && crt->next != NULL )
Paul Bakker5121ce52009-01-03 21:22:43 +0000835 crt = crt->next;
836
837 /*
Paul Bakker320a4b52009-03-28 18:52:39 +0000838 * Add new certificate on the end of the chain if needed.
839 */
Paul Bakkere9581d62009-03-28 20:29:25 +0000840 if ( crt->version != 0 && crt->next == NULL)
Paul Bakker320a4b52009-03-28 18:52:39 +0000841 {
842 crt->next = (x509_cert *) malloc( sizeof( x509_cert ) );
843
Paul Bakker7d06ad22009-05-02 15:53:56 +0000844 if( crt->next == NULL )
845 {
Paul Bakker320a4b52009-03-28 18:52:39 +0000846 x509_free( crt );
Paul Bakker7d06ad22009-05-02 15:53:56 +0000847 return( 1 );
848 }
Paul Bakker320a4b52009-03-28 18:52:39 +0000849
Paul Bakker7d06ad22009-05-02 15:53:56 +0000850 crt = crt->next;
851 memset( crt, 0, sizeof( x509_cert ) );
Paul Bakker320a4b52009-03-28 18:52:39 +0000852 }
853
854 /*
Paul Bakker5121ce52009-01-03 21:22:43 +0000855 * check if the certificate is encoded in base64
856 */
857 s1 = (unsigned char *) strstr( (char *) buf,
858 "-----BEGIN CERTIFICATE-----" );
859
860 if( s1 != NULL )
861 {
862 s2 = (unsigned char *) strstr( (char *) buf,
863 "-----END CERTIFICATE-----" );
864
865 if( s2 == NULL || s2 <= s1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000866 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000867
868 s1 += 27;
869 if( *s1 == '\r' ) s1++;
870 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +0000871 else return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000872
873 /*
874 * get the DER data length and decode the buffer
875 */
876 len = 0;
877 ret = base64_decode( NULL, &len, s1, s2 - s1 );
878
Paul Bakker40e46942009-01-03 21:51:57 +0000879 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
880 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000881
882 if( ( p = (unsigned char *) malloc( len ) ) == NULL )
883 return( 1 );
884
885 if( ( ret = base64_decode( p, &len, s1, s2 - s1 ) ) != 0 )
886 {
887 free( p );
Paul Bakker40e46942009-01-03 21:51:57 +0000888 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000889 }
890
891 /*
892 * update the buffer size and offset
893 */
894 s2 += 25;
895 if( *s2 == '\r' ) s2++;
896 if( *s2 == '\n' ) s2++;
897 else
898 {
899 free( p );
Paul Bakker40e46942009-01-03 21:51:57 +0000900 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000901 }
902
903 buflen -= s2 - buf;
904 buf = s2;
905 }
906 else
907 {
908 /*
909 * nope, copy the raw DER data
910 */
911 p = (unsigned char *) malloc( len = buflen );
912
913 if( p == NULL )
914 return( 1 );
915
916 memcpy( p, buf, buflen );
917
918 buflen = 0;
919 }
920
921 crt->raw.p = p;
922 crt->raw.len = len;
923 end = p + len;
924
925 /*
926 * Certificate ::= SEQUENCE {
927 * tbsCertificate TBSCertificate,
928 * signatureAlgorithm AlgorithmIdentifier,
929 * signatureValue BIT STRING }
930 */
931 if( ( ret = asn1_get_tag( &p, end, &len,
932 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
933 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000934 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000935 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT );
Paul Bakker5121ce52009-01-03 21:22:43 +0000936 }
937
938 if( len != (int) ( end - p ) )
939 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000940 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000941 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
942 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000943 }
944
945 /*
946 * TBSCertificate ::= SEQUENCE {
947 */
948 crt->tbs.p = p;
949
950 if( ( ret = asn1_get_tag( &p, end, &len,
951 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
952 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000953 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000954 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000955 }
956
957 end = p + len;
958 crt->tbs.len = end - crt->tbs.p;
959
960 /*
961 * Version ::= INTEGER { v1(0), v2(1), v3(2) }
962 *
963 * CertificateSerialNumber ::= INTEGER
964 *
965 * signature AlgorithmIdentifier
966 */
967 if( ( ret = x509_get_version( &p, end, &crt->version ) ) != 0 ||
968 ( ret = x509_get_serial( &p, end, &crt->serial ) ) != 0 ||
969 ( ret = x509_get_alg( &p, end, &crt->sig_oid1 ) ) != 0 )
970 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000971 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +0000972 return( ret );
973 }
974
975 crt->version++;
976
977 if( crt->version > 3 )
978 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000979 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000980 return( POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION );
Paul Bakker5121ce52009-01-03 21:22:43 +0000981 }
982
Paul Bakker27d66162010-03-17 06:56:01 +0000983 if( ( ret = x509_get_sig_alg( &crt->sig_oid1, &crt->sig_alg ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000984 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000985 x509_free( crt );
Paul Bakker27d66162010-03-17 06:56:01 +0000986 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000987 }
988
989 /*
990 * issuer Name
991 */
992 crt->issuer_raw.p = p;
993
994 if( ( ret = asn1_get_tag( &p, end, &len,
995 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
996 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000997 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000998 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000999 }
1000
1001 if( ( ret = x509_get_name( &p, p + len, &crt->issuer ) ) != 0 )
1002 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001003 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001004 return( ret );
1005 }
1006
1007 crt->issuer_raw.len = p - crt->issuer_raw.p;
1008
1009 /*
1010 * Validity ::= SEQUENCE {
1011 * notBefore Time,
1012 * notAfter Time }
1013 *
1014 */
1015 if( ( ret = x509_get_dates( &p, end, &crt->valid_from,
1016 &crt->valid_to ) ) != 0 )
1017 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001018 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001019 return( ret );
1020 }
1021
1022 /*
1023 * subject Name
1024 */
1025 crt->subject_raw.p = p;
1026
1027 if( ( ret = asn1_get_tag( &p, end, &len,
1028 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1029 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001030 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001031 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001032 }
1033
1034 if( ( ret = x509_get_name( &p, p + len, &crt->subject ) ) != 0 )
1035 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001036 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001037 return( ret );
1038 }
1039
1040 crt->subject_raw.len = p - crt->subject_raw.p;
1041
1042 /*
1043 * SubjectPublicKeyInfo ::= SEQUENCE
1044 * algorithm AlgorithmIdentifier,
1045 * subjectPublicKey BIT STRING }
1046 */
1047 if( ( ret = asn1_get_tag( &p, end, &len,
1048 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1049 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001050 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001051 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001052 }
1053
1054 if( ( ret = x509_get_pubkey( &p, p + len, &crt->pk_oid,
1055 &crt->rsa.N, &crt->rsa.E ) ) != 0 )
1056 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001057 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001058 return( ret );
1059 }
1060
1061 if( ( ret = rsa_check_pubkey( &crt->rsa ) ) != 0 )
1062 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001063 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001064 return( ret );
1065 }
1066
1067 crt->rsa.len = mpi_size( &crt->rsa.N );
1068
1069 /*
1070 * issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
1071 * -- If present, version shall be v2 or v3
1072 * subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
1073 * -- If present, version shall be v2 or v3
1074 * extensions [3] EXPLICIT Extensions OPTIONAL
1075 * -- If present, version shall be v3
1076 */
1077 if( crt->version == 2 || crt->version == 3 )
1078 {
1079 ret = x509_get_uid( &p, end, &crt->issuer_id, 1 );
1080 if( ret != 0 )
1081 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001082 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001083 return( ret );
1084 }
1085 }
1086
1087 if( crt->version == 2 || crt->version == 3 )
1088 {
1089 ret = x509_get_uid( &p, end, &crt->subject_id, 2 );
1090 if( ret != 0 )
1091 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001092 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001093 return( ret );
1094 }
1095 }
1096
1097 if( crt->version == 3 )
1098 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001099 ret = x509_get_crt_ext( &p, end, &crt->v3_ext,
Paul Bakker5121ce52009-01-03 21:22:43 +00001100 &crt->ca_istrue, &crt->max_pathlen );
1101 if( ret != 0 )
1102 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001103 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001104 return( ret );
1105 }
1106 }
1107
1108 if( p != end )
1109 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001110 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001111 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1112 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001113 }
1114
1115 end = crt->raw.p + crt->raw.len;
1116
1117 /*
1118 * signatureAlgorithm AlgorithmIdentifier,
1119 * signatureValue BIT STRING
1120 */
1121 if( ( ret = x509_get_alg( &p, end, &crt->sig_oid2 ) ) != 0 )
1122 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001123 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001124 return( ret );
1125 }
1126
Paul Bakker320a4b52009-03-28 18:52:39 +00001127 if( memcmp( crt->sig_oid1.p, crt->sig_oid2.p, crt->sig_oid1.len ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00001128 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001129 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001130 return( POLARSSL_ERR_X509_CERT_SIG_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001131 }
1132
1133 if( ( ret = x509_get_sig( &p, end, &crt->sig ) ) != 0 )
1134 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001135 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001136 return( ret );
1137 }
1138
1139 if( p != end )
1140 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001141 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001142 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1143 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001144 }
1145
Paul Bakker5121ce52009-01-03 21:22:43 +00001146 if( buflen > 0 )
Paul Bakker320a4b52009-03-28 18:52:39 +00001147 {
1148 crt->next = (x509_cert *) malloc( sizeof( x509_cert ) );
1149
Paul Bakker7d06ad22009-05-02 15:53:56 +00001150 if( crt->next == NULL )
1151 {
Paul Bakker320a4b52009-03-28 18:52:39 +00001152 x509_free( crt );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001153 return( 1 );
1154 }
Paul Bakker320a4b52009-03-28 18:52:39 +00001155
Paul Bakker7d06ad22009-05-02 15:53:56 +00001156 crt = crt->next;
1157 memset( crt, 0, sizeof( x509_cert ) );
Paul Bakker320a4b52009-03-28 18:52:39 +00001158
Paul Bakker5121ce52009-01-03 21:22:43 +00001159 return( x509parse_crt( crt, buf, buflen ) );
Paul Bakker320a4b52009-03-28 18:52:39 +00001160 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001161
1162 return( 0 );
1163}
1164
1165/*
Paul Bakkerd98030e2009-05-02 15:13:40 +00001166 * Parse one or more CRLs and add them to the chained list
1167 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001168int x509parse_crl( x509_crl *chain, const unsigned char *buf, int buflen )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001169{
1170 int ret, len;
1171 unsigned char *s1, *s2;
1172 unsigned char *p, *end;
1173 x509_crl *crl;
1174
1175 crl = chain;
1176
1177 /*
1178 * Check for valid input
1179 */
1180 if( crl == NULL || buf == NULL )
1181 return( 1 );
1182
1183 while( crl->version != 0 && crl->next != NULL )
1184 crl = crl->next;
1185
1186 /*
1187 * Add new CRL on the end of the chain if needed.
1188 */
1189 if ( crl->version != 0 && crl->next == NULL)
1190 {
1191 crl->next = (x509_crl *) malloc( sizeof( x509_crl ) );
1192
Paul Bakker7d06ad22009-05-02 15:53:56 +00001193 if( crl->next == NULL )
1194 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001195 x509_crl_free( crl );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001196 return( 1 );
1197 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001198
Paul Bakker7d06ad22009-05-02 15:53:56 +00001199 crl = crl->next;
1200 memset( crl, 0, sizeof( x509_crl ) );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001201 }
1202
1203 /*
1204 * check if the CRL is encoded in base64
1205 */
1206 s1 = (unsigned char *) strstr( (char *) buf,
1207 "-----BEGIN X509 CRL-----" );
1208
1209 if( s1 != NULL )
1210 {
1211 s2 = (unsigned char *) strstr( (char *) buf,
1212 "-----END X509 CRL-----" );
1213
1214 if( s2 == NULL || s2 <= s1 )
1215 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1216
1217 s1 += 24;
1218 if( *s1 == '\r' ) s1++;
1219 if( *s1 == '\n' ) s1++;
1220 else return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1221
1222 /*
1223 * get the DER data length and decode the buffer
1224 */
1225 len = 0;
1226 ret = base64_decode( NULL, &len, s1, s2 - s1 );
1227
1228 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
1229 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
1230
1231 if( ( p = (unsigned char *) malloc( len ) ) == NULL )
1232 return( 1 );
1233
1234 if( ( ret = base64_decode( p, &len, s1, s2 - s1 ) ) != 0 )
1235 {
1236 free( p );
1237 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
1238 }
1239
1240 /*
1241 * update the buffer size and offset
1242 */
1243 s2 += 22;
1244 if( *s2 == '\r' ) s2++;
1245 if( *s2 == '\n' ) s2++;
1246 else
1247 {
1248 free( p );
1249 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1250 }
1251
1252 buflen -= s2 - buf;
1253 buf = s2;
1254 }
1255 else
1256 {
1257 /*
1258 * nope, copy the raw DER data
1259 */
1260 p = (unsigned char *) malloc( len = buflen );
1261
1262 if( p == NULL )
1263 return( 1 );
1264
1265 memcpy( p, buf, buflen );
1266
1267 buflen = 0;
1268 }
1269
1270 crl->raw.p = p;
1271 crl->raw.len = len;
1272 end = p + len;
1273
1274 /*
1275 * CertificateList ::= SEQUENCE {
1276 * tbsCertList TBSCertList,
1277 * signatureAlgorithm AlgorithmIdentifier,
1278 * signatureValue BIT STRING }
1279 */
1280 if( ( ret = asn1_get_tag( &p, end, &len,
1281 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1282 {
1283 x509_crl_free( crl );
1284 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT );
1285 }
1286
1287 if( len != (int) ( end - p ) )
1288 {
1289 x509_crl_free( crl );
1290 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1291 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1292 }
1293
1294 /*
1295 * TBSCertList ::= SEQUENCE {
1296 */
1297 crl->tbs.p = p;
1298
1299 if( ( ret = asn1_get_tag( &p, end, &len,
1300 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1301 {
1302 x509_crl_free( crl );
1303 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
1304 }
1305
1306 end = p + len;
1307 crl->tbs.len = end - crl->tbs.p;
1308
1309 /*
1310 * Version ::= INTEGER OPTIONAL { v1(0), v2(1) }
1311 * -- if present, MUST be v2
1312 *
1313 * signature AlgorithmIdentifier
1314 */
1315 if( ( ret = x509_get_version( &p, end, &crl->version ) ) != 0 ||
1316 ( ret = x509_get_alg( &p, end, &crl->sig_oid1 ) ) != 0 )
1317 {
1318 x509_crl_free( crl );
1319 return( ret );
1320 }
1321
1322 crl->version++;
1323
1324 if( crl->version > 2 )
1325 {
1326 x509_crl_free( crl );
1327 return( POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION );
1328 }
1329
Paul Bakker27d66162010-03-17 06:56:01 +00001330 if( ( ret = x509_get_sig_alg( &crl->sig_oid1, &crl->sig_alg ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001331 {
1332 x509_crl_free( crl );
1333 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
1334 }
1335
1336 /*
1337 * issuer Name
1338 */
1339 crl->issuer_raw.p = p;
1340
1341 if( ( ret = asn1_get_tag( &p, end, &len,
1342 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1343 {
1344 x509_crl_free( crl );
1345 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
1346 }
1347
1348 if( ( ret = x509_get_name( &p, p + len, &crl->issuer ) ) != 0 )
1349 {
1350 x509_crl_free( crl );
1351 return( ret );
1352 }
1353
1354 crl->issuer_raw.len = p - crl->issuer_raw.p;
1355
1356 /*
1357 * thisUpdate Time
1358 * nextUpdate Time OPTIONAL
1359 */
Paul Bakker91200182010-02-18 21:26:15 +00001360 if( ( ret = x509_get_time( &p, end, &crl->this_update ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001361 {
1362 x509_crl_free( crl );
1363 return( ret );
1364 }
1365
Paul Bakker91200182010-02-18 21:26:15 +00001366 if( ( ret = x509_get_time( &p, end, &crl->next_update ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001367 {
Paul Bakker635f4b42009-07-20 20:34:41 +00001368 if ( ret != ( POLARSSL_ERR_X509_CERT_INVALID_DATE |
Paul Bakker9be19372009-07-27 20:21:53 +00001369 POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) &&
1370 ret != ( POLARSSL_ERR_X509_CERT_INVALID_DATE |
1371 POLARSSL_ERR_ASN1_OUT_OF_DATA ) )
Paul Bakker635f4b42009-07-20 20:34:41 +00001372 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001373 x509_crl_free( crl );
1374 return( ret );
1375 }
1376 }
1377
1378 /*
1379 * revokedCertificates SEQUENCE OF SEQUENCE {
1380 * userCertificate CertificateSerialNumber,
1381 * revocationDate Time,
1382 * crlEntryExtensions Extensions OPTIONAL
1383 * -- if present, MUST be v2
1384 * } OPTIONAL
1385 */
1386 if( ( ret = x509_get_entries( &p, end, &crl->entry ) ) != 0 )
1387 {
1388 x509_crl_free( crl );
1389 return( ret );
1390 }
1391
1392 /*
1393 * crlExtensions EXPLICIT Extensions OPTIONAL
1394 * -- if present, MUST be v2
1395 */
1396 if( crl->version == 2 )
1397 {
1398 ret = x509_get_crl_ext( &p, end, &crl->crl_ext );
1399
1400 if( ret != 0 )
1401 {
1402 x509_crl_free( crl );
1403 return( ret );
1404 }
1405 }
1406
1407 if( p != end )
1408 {
1409 x509_crl_free( crl );
1410 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1411 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1412 }
1413
1414 end = crl->raw.p + crl->raw.len;
1415
1416 /*
1417 * signatureAlgorithm AlgorithmIdentifier,
1418 * signatureValue BIT STRING
1419 */
1420 if( ( ret = x509_get_alg( &p, end, &crl->sig_oid2 ) ) != 0 )
1421 {
1422 x509_crl_free( crl );
1423 return( ret );
1424 }
1425
1426 if( memcmp( crl->sig_oid1.p, crl->sig_oid2.p, crl->sig_oid1.len ) != 0 )
1427 {
1428 x509_crl_free( crl );
1429 return( POLARSSL_ERR_X509_CERT_SIG_MISMATCH );
1430 }
1431
1432 if( ( ret = x509_get_sig( &p, end, &crl->sig ) ) != 0 )
1433 {
1434 x509_crl_free( crl );
1435 return( ret );
1436 }
1437
1438 if( p != end )
1439 {
1440 x509_crl_free( crl );
1441 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1442 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1443 }
1444
1445 if( buflen > 0 )
1446 {
1447 crl->next = (x509_crl *) malloc( sizeof( x509_crl ) );
1448
Paul Bakker7d06ad22009-05-02 15:53:56 +00001449 if( crl->next == NULL )
1450 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001451 x509_crl_free( crl );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001452 return( 1 );
1453 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001454
Paul Bakker7d06ad22009-05-02 15:53:56 +00001455 crl = crl->next;
1456 memset( crl, 0, sizeof( x509_crl ) );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001457
1458 return( x509parse_crl( crl, buf, buflen ) );
1459 }
1460
1461 return( 0 );
1462}
1463
1464/*
Paul Bakker2b245eb2009-04-19 18:44:26 +00001465 * Load all data from a file into a given buffer.
1466 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001467int load_file( const char *path, unsigned char **buf, size_t *n )
Paul Bakker2b245eb2009-04-19 18:44:26 +00001468{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001469 FILE *f;
Paul Bakker2b245eb2009-04-19 18:44:26 +00001470
Paul Bakkerd98030e2009-05-02 15:13:40 +00001471 if( ( f = fopen( path, "rb" ) ) == NULL )
1472 return( 1 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001473
Paul Bakkerd98030e2009-05-02 15:13:40 +00001474 fseek( f, 0, SEEK_END );
1475 *n = (size_t) ftell( f );
1476 fseek( f, 0, SEEK_SET );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001477
Paul Bakkerd98030e2009-05-02 15:13:40 +00001478 if( ( *buf = (unsigned char *) malloc( *n + 1 ) ) == NULL )
1479 return( 1 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001480
Paul Bakkerd98030e2009-05-02 15:13:40 +00001481 if( fread( *buf, 1, *n, f ) != *n )
1482 {
1483 fclose( f );
1484 free( *buf );
1485 return( 1 );
1486 }
Paul Bakker2b245eb2009-04-19 18:44:26 +00001487
Paul Bakkerd98030e2009-05-02 15:13:40 +00001488 fclose( f );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001489
Paul Bakkerd98030e2009-05-02 15:13:40 +00001490 (*buf)[*n] = '\0';
Paul Bakker2b245eb2009-04-19 18:44:26 +00001491
Paul Bakkerd98030e2009-05-02 15:13:40 +00001492 return( 0 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001493}
1494
1495/*
Paul Bakker5121ce52009-01-03 21:22:43 +00001496 * Load one or more certificates and add them to the chained list
1497 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001498int x509parse_crtfile( x509_cert *chain, const char *path )
Paul Bakker5121ce52009-01-03 21:22:43 +00001499{
1500 int ret;
Paul Bakker5121ce52009-01-03 21:22:43 +00001501 size_t n;
1502 unsigned char *buf;
1503
Paul Bakker2b245eb2009-04-19 18:44:26 +00001504 if ( load_file( path, &buf, &n ) )
Paul Bakker5121ce52009-01-03 21:22:43 +00001505 return( 1 );
1506
Paul Bakker5121ce52009-01-03 21:22:43 +00001507 ret = x509parse_crt( chain, buf, (int) n );
1508
1509 memset( buf, 0, n + 1 );
1510 free( buf );
Paul Bakker5121ce52009-01-03 21:22:43 +00001511
1512 return( ret );
1513}
1514
Paul Bakkerd98030e2009-05-02 15:13:40 +00001515/*
1516 * Load one or more CRLs and add them to the chained list
1517 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001518int x509parse_crlfile( x509_crl *chain, const char *path )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001519{
1520 int ret;
1521 size_t n;
1522 unsigned char *buf;
1523
1524 if ( load_file( path, &buf, &n ) )
1525 return( 1 );
1526
1527 ret = x509parse_crl( chain, buf, (int) n );
1528
1529 memset( buf, 0, n + 1 );
1530 free( buf );
1531
1532 return( ret );
1533}
1534
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001535#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001536/*
1537 * Read a 16-byte hex string and convert it to binary
1538 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001539static int x509_get_iv( const unsigned char *s, unsigned char iv[8] )
Paul Bakker5121ce52009-01-03 21:22:43 +00001540{
1541 int i, j, k;
1542
1543 memset( iv, 0, 8 );
1544
1545 for( i = 0; i < 16; i++, s++ )
1546 {
1547 if( *s >= '0' && *s <= '9' ) j = *s - '0'; else
1548 if( *s >= 'A' && *s <= 'F' ) j = *s - '7'; else
1549 if( *s >= 'a' && *s <= 'f' ) j = *s - 'W'; else
Paul Bakker40e46942009-01-03 21:51:57 +00001550 return( POLARSSL_ERR_X509_KEY_INVALID_ENC_IV );
Paul Bakker5121ce52009-01-03 21:22:43 +00001551
1552 k = ( ( i & 1 ) != 0 ) ? j : j << 4;
1553
1554 iv[i >> 1] = (unsigned char)( iv[i >> 1] | k );
1555 }
1556
1557 return( 0 );
1558}
1559
1560/*
1561 * Decrypt with 3DES-CBC, using PBKDF1 for key derivation
1562 */
1563static void x509_des3_decrypt( unsigned char des3_iv[8],
1564 unsigned char *buf, int buflen,
Paul Bakkerff60ee62010-03-16 21:09:09 +00001565 const unsigned char *pwd, int pwdlen )
Paul Bakker5121ce52009-01-03 21:22:43 +00001566{
1567 md5_context md5_ctx;
1568 des3_context des3_ctx;
1569 unsigned char md5sum[16];
1570 unsigned char des3_key[24];
1571
1572 /*
1573 * 3DES key[ 0..15] = MD5(pwd || IV)
1574 * key[16..23] = MD5(pwd || IV || 3DES key[ 0..15])
1575 */
1576 md5_starts( &md5_ctx );
1577 md5_update( &md5_ctx, pwd, pwdlen );
1578 md5_update( &md5_ctx, des3_iv, 8 );
1579 md5_finish( &md5_ctx, md5sum );
1580 memcpy( des3_key, md5sum, 16 );
1581
1582 md5_starts( &md5_ctx );
1583 md5_update( &md5_ctx, md5sum, 16 );
1584 md5_update( &md5_ctx, pwd, pwdlen );
1585 md5_update( &md5_ctx, des3_iv, 8 );
1586 md5_finish( &md5_ctx, md5sum );
1587 memcpy( des3_key + 16, md5sum, 8 );
1588
1589 des3_set3key_dec( &des3_ctx, des3_key );
1590 des3_crypt_cbc( &des3_ctx, DES_DECRYPT, buflen,
1591 des3_iv, buf, buf );
1592
1593 memset( &md5_ctx, 0, sizeof( md5_ctx ) );
1594 memset( &des3_ctx, 0, sizeof( des3_ctx ) );
1595 memset( md5sum, 0, 16 );
1596 memset( des3_key, 0, 24 );
1597}
1598#endif
1599
1600/*
1601 * Parse a private RSA key
1602 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001603int x509parse_key( rsa_context *rsa, const unsigned char *key, int keylen,
1604 const unsigned char *pwd, int pwdlen )
Paul Bakker5121ce52009-01-03 21:22:43 +00001605{
1606 int ret, len, enc;
Paul Bakkerff60ee62010-03-16 21:09:09 +00001607 unsigned char *buf, *s1, *s2;
Paul Bakker5121ce52009-01-03 21:22:43 +00001608 unsigned char *p, *end;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001609#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001610 unsigned char des3_iv[8];
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001611#else
1612 ((void) pwd);
1613 ((void) pwdlen);
1614#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00001615
Paul Bakkerff60ee62010-03-16 21:09:09 +00001616 s1 = (unsigned char *) strstr( (char *) key,
Paul Bakker5121ce52009-01-03 21:22:43 +00001617 "-----BEGIN RSA PRIVATE KEY-----" );
1618
1619 if( s1 != NULL )
1620 {
Paul Bakkerff60ee62010-03-16 21:09:09 +00001621 s2 = (unsigned char *) strstr( (char *) key,
Paul Bakker5121ce52009-01-03 21:22:43 +00001622 "-----END RSA PRIVATE KEY-----" );
1623
1624 if( s2 == NULL || s2 <= s1 )
Paul Bakker40e46942009-01-03 21:51:57 +00001625 return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001626
1627 s1 += 31;
1628 if( *s1 == '\r' ) s1++;
1629 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001630 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001631
1632 enc = 0;
1633
1634 if( memcmp( s1, "Proc-Type: 4,ENCRYPTED", 22 ) == 0 )
1635 {
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001636#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001637 enc++;
1638
1639 s1 += 22;
1640 if( *s1 == '\r' ) s1++;
1641 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001642 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001643
1644 if( memcmp( s1, "DEK-Info: DES-EDE3-CBC,", 23 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00001645 return( POLARSSL_ERR_X509_KEY_UNKNOWN_ENC_ALG );
Paul Bakker5121ce52009-01-03 21:22:43 +00001646
1647 s1 += 23;
1648 if( x509_get_iv( s1, des3_iv ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00001649 return( POLARSSL_ERR_X509_KEY_INVALID_ENC_IV );
Paul Bakker5121ce52009-01-03 21:22:43 +00001650
1651 s1 += 16;
1652 if( *s1 == '\r' ) s1++;
1653 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001654 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001655#else
Paul Bakker40e46942009-01-03 21:51:57 +00001656 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
Paul Bakker5121ce52009-01-03 21:22:43 +00001657#endif
1658 }
1659
1660 len = 0;
1661 ret = base64_decode( NULL, &len, s1, s2 - s1 );
1662
Paul Bakker40e46942009-01-03 21:51:57 +00001663 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
1664 return( ret | POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001665
1666 if( ( buf = (unsigned char *) malloc( len ) ) == NULL )
1667 return( 1 );
1668
1669 if( ( ret = base64_decode( buf, &len, s1, s2 - s1 ) ) != 0 )
1670 {
1671 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001672 return( ret | POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001673 }
1674
Paul Bakkerff60ee62010-03-16 21:09:09 +00001675 keylen = len;
Paul Bakker5121ce52009-01-03 21:22:43 +00001676
1677 if( enc != 0 )
1678 {
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001679#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001680 if( pwd == NULL )
1681 {
1682 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001683 return( POLARSSL_ERR_X509_KEY_PASSWORD_REQUIRED );
Paul Bakker5121ce52009-01-03 21:22:43 +00001684 }
1685
Paul Bakkerff60ee62010-03-16 21:09:09 +00001686 x509_des3_decrypt( des3_iv, buf, keylen, pwd, pwdlen );
Paul Bakker5121ce52009-01-03 21:22:43 +00001687
1688 if( buf[0] != 0x30 || buf[1] != 0x82 ||
1689 buf[4] != 0x02 || buf[5] != 0x01 )
1690 {
1691 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001692 return( POLARSSL_ERR_X509_KEY_PASSWORD_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001693 }
1694#else
Paul Bakker40e46942009-01-03 21:51:57 +00001695 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
Paul Bakker5121ce52009-01-03 21:22:43 +00001696#endif
1697 }
1698 }
Paul Bakkerff60ee62010-03-16 21:09:09 +00001699 else
1700 {
1701 buf = NULL;
1702 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001703
1704 memset( rsa, 0, sizeof( rsa_context ) );
1705
Paul Bakkerff60ee62010-03-16 21:09:09 +00001706 p = ( s1 != NULL ) ? buf : (unsigned char *) key;
1707 end = p + keylen;
Paul Bakker5121ce52009-01-03 21:22:43 +00001708
1709 /*
1710 * RSAPrivateKey ::= SEQUENCE {
1711 * version Version,
1712 * modulus INTEGER, -- n
1713 * publicExponent INTEGER, -- e
1714 * privateExponent INTEGER, -- d
1715 * prime1 INTEGER, -- p
1716 * prime2 INTEGER, -- q
1717 * exponent1 INTEGER, -- d mod (p-1)
1718 * exponent2 INTEGER, -- d mod (q-1)
1719 * coefficient INTEGER, -- (inverse of q) mod p
1720 * otherPrimeInfos OtherPrimeInfos OPTIONAL
1721 * }
1722 */
1723 if( ( ret = asn1_get_tag( &p, end, &len,
1724 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1725 {
1726 if( s1 != NULL )
1727 free( buf );
1728
1729 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001730 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001731 }
1732
1733 end = p + len;
1734
1735 if( ( ret = asn1_get_int( &p, end, &rsa->ver ) ) != 0 )
1736 {
1737 if( s1 != NULL )
1738 free( buf );
1739
1740 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001741 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001742 }
1743
1744 if( rsa->ver != 0 )
1745 {
1746 if( s1 != NULL )
1747 free( buf );
1748
1749 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001750 return( ret | POLARSSL_ERR_X509_KEY_INVALID_VERSION );
Paul Bakker5121ce52009-01-03 21:22:43 +00001751 }
1752
1753 if( ( ret = asn1_get_mpi( &p, end, &rsa->N ) ) != 0 ||
1754 ( ret = asn1_get_mpi( &p, end, &rsa->E ) ) != 0 ||
1755 ( ret = asn1_get_mpi( &p, end, &rsa->D ) ) != 0 ||
1756 ( ret = asn1_get_mpi( &p, end, &rsa->P ) ) != 0 ||
1757 ( ret = asn1_get_mpi( &p, end, &rsa->Q ) ) != 0 ||
1758 ( ret = asn1_get_mpi( &p, end, &rsa->DP ) ) != 0 ||
1759 ( ret = asn1_get_mpi( &p, end, &rsa->DQ ) ) != 0 ||
1760 ( ret = asn1_get_mpi( &p, end, &rsa->QP ) ) != 0 )
1761 {
1762 if( s1 != NULL )
1763 free( buf );
1764
1765 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001766 return( ret | POLARSSL_ERR_X509_KEY_INVALID_FORMAT );
Paul Bakker5121ce52009-01-03 21:22:43 +00001767 }
1768
1769 rsa->len = mpi_size( &rsa->N );
1770
1771 if( p != end )
1772 {
1773 if( s1 != NULL )
1774 free( buf );
1775
1776 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001777 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT |
1778 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001779 }
1780
1781 if( ( ret = rsa_check_privkey( rsa ) ) != 0 )
1782 {
1783 if( s1 != NULL )
1784 free( buf );
1785
1786 rsa_free( rsa );
1787 return( ret );
1788 }
1789
1790 if( s1 != NULL )
1791 free( buf );
1792
1793 return( 0 );
1794}
1795
1796/*
1797 * Load and parse a private RSA key
1798 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001799int x509parse_keyfile( rsa_context *rsa, const char *path, const char *pwd )
Paul Bakker5121ce52009-01-03 21:22:43 +00001800{
1801 int ret;
Paul Bakker5121ce52009-01-03 21:22:43 +00001802 size_t n;
1803 unsigned char *buf;
1804
Paul Bakker2b245eb2009-04-19 18:44:26 +00001805 if ( load_file( path, &buf, &n ) )
Paul Bakker5121ce52009-01-03 21:22:43 +00001806 return( 1 );
1807
Paul Bakker5121ce52009-01-03 21:22:43 +00001808 if( pwd == NULL )
1809 ret = x509parse_key( rsa, buf, (int) n, NULL, 0 );
1810 else
1811 ret = x509parse_key( rsa, buf, (int) n,
1812 (unsigned char *) pwd, strlen( pwd ) );
1813
1814 memset( buf, 0, n + 1 );
1815 free( buf );
Paul Bakker5121ce52009-01-03 21:22:43 +00001816
1817 return( ret );
1818}
1819
1820#if defined _MSC_VER && !defined snprintf
Paul Bakkerd98030e2009-05-02 15:13:40 +00001821#include <stdarg.h>
1822
1823#if !defined vsnprintf
1824#define vsnprintf _vsnprintf
1825#endif // vsnprintf
1826
1827/*
1828 * Windows _snprintf and _vsnprintf are not compatible to linux versions.
1829 * Result value is not size of buffer needed, but -1 if no fit is possible.
1830 *
1831 * This fuction tries to 'fix' this by at least suggesting enlarging the
1832 * size by 20.
1833 */
1834int compat_snprintf(char *str, size_t size, const char *format, ...)
1835{
1836 va_list ap;
1837 int res = -1;
1838
1839 va_start( ap, format );
1840
1841 res = vsnprintf( str, size, format, ap );
1842
1843 va_end( ap );
1844
1845 // No quick fix possible
1846 if ( res < 0 )
1847 return( size + 20 );
1848
1849 return res;
1850}
1851
1852#define snprintf compat_snprintf
Paul Bakker5121ce52009-01-03 21:22:43 +00001853#endif
1854
Paul Bakkerd98030e2009-05-02 15:13:40 +00001855#define POLARSSL_ERR_DEBUG_BUF_TOO_SMALL -2
1856
1857#define SAFE_SNPRINTF() \
1858{ \
1859 if( ret == -1 ) \
1860 return( -1 ); \
1861 \
1862 if ( ret > n ) { \
1863 p[n - 1] = '\0'; \
1864 return POLARSSL_ERR_DEBUG_BUF_TOO_SMALL;\
1865 } \
1866 \
1867 n -= ret; \
1868 p += ret; \
1869}
1870
Paul Bakker5121ce52009-01-03 21:22:43 +00001871/*
1872 * Store the name in printable form into buf; no more
Paul Bakkerd98030e2009-05-02 15:13:40 +00001873 * than size characters will be written
Paul Bakker5121ce52009-01-03 21:22:43 +00001874 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001875int x509parse_dn_gets( char *buf, size_t size, const x509_name *dn )
Paul Bakker5121ce52009-01-03 21:22:43 +00001876{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001877 int i, ret, n;
Paul Bakker5121ce52009-01-03 21:22:43 +00001878 unsigned char c;
Paul Bakkerff60ee62010-03-16 21:09:09 +00001879 const x509_name *name;
Paul Bakker5121ce52009-01-03 21:22:43 +00001880 char s[128], *p;
1881
1882 memset( s, 0, sizeof( s ) );
1883
1884 name = dn;
1885 p = buf;
Paul Bakkerd98030e2009-05-02 15:13:40 +00001886 n = size;
Paul Bakker5121ce52009-01-03 21:22:43 +00001887
1888 while( name != NULL )
1889 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001890 if( name != dn ) {
1891 ret = snprintf( p, n, ", " );
1892 SAFE_SNPRINTF();
1893 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001894
1895 if( memcmp( name->oid.p, OID_X520, 2 ) == 0 )
1896 {
1897 switch( name->oid.p[2] )
1898 {
1899 case X520_COMMON_NAME:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001900 ret = snprintf( p, n, "CN=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001901
1902 case X520_COUNTRY:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001903 ret = snprintf( p, n, "C=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001904
1905 case X520_LOCALITY:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001906 ret = snprintf( p, n, "L=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001907
1908 case X520_STATE:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001909 ret = snprintf( p, n, "ST=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001910
1911 case X520_ORGANIZATION:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001912 ret = snprintf( p, n, "O=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001913
1914 case X520_ORG_UNIT:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001915 ret = snprintf( p, n, "OU=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001916
1917 default:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001918 ret = snprintf( p, n, "0x%02X=",
Paul Bakker5121ce52009-01-03 21:22:43 +00001919 name->oid.p[2] );
1920 break;
1921 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001922 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001923 }
1924 else if( memcmp( name->oid.p, OID_PKCS9, 8 ) == 0 )
1925 {
1926 switch( name->oid.p[8] )
1927 {
1928 case PKCS9_EMAIL:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001929 ret = snprintf( p, n, "emailAddress=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001930
1931 default:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001932 ret = snprintf( p, n, "0x%02X=",
Paul Bakker5121ce52009-01-03 21:22:43 +00001933 name->oid.p[8] );
1934 break;
1935 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001936 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001937 }
1938 else
Paul Bakkerd98030e2009-05-02 15:13:40 +00001939 {
1940 ret = snprintf( p, n, "\?\?=" );
1941 SAFE_SNPRINTF();
1942 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001943
1944 for( i = 0; i < name->val.len; i++ )
1945 {
1946 if( i >= (int) sizeof( s ) - 1 )
1947 break;
1948
1949 c = name->val.p[i];
1950 if( c < 32 || c == 127 || ( c > 128 && c < 160 ) )
1951 s[i] = '?';
1952 else s[i] = c;
1953 }
1954 s[i] = '\0';
Paul Bakkerd98030e2009-05-02 15:13:40 +00001955 ret = snprintf( p, n, "%s", s );
1956 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001957 name = name->next;
1958 }
1959
Paul Bakkerd98030e2009-05-02 15:13:40 +00001960 return( size - n );
Paul Bakker5121ce52009-01-03 21:22:43 +00001961}
1962
1963/*
Paul Bakkerd98030e2009-05-02 15:13:40 +00001964 * Return an informational string about the certificate.
Paul Bakker5121ce52009-01-03 21:22:43 +00001965 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001966int x509parse_cert_info( char *buf, size_t size, const char *prefix,
1967 const x509_cert *crt )
Paul Bakker5121ce52009-01-03 21:22:43 +00001968{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001969 int i, n, nr, ret;
1970 char *p;
Paul Bakker5121ce52009-01-03 21:22:43 +00001971
1972 p = buf;
Paul Bakkerd98030e2009-05-02 15:13:40 +00001973 n = size;
Paul Bakker5121ce52009-01-03 21:22:43 +00001974
Paul Bakkerd98030e2009-05-02 15:13:40 +00001975 ret = snprintf( p, n, "%scert. version : %d\n",
Paul Bakker5121ce52009-01-03 21:22:43 +00001976 prefix, crt->version );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001977 SAFE_SNPRINTF();
1978 ret = snprintf( p, n, "%sserial number : ",
Paul Bakker5121ce52009-01-03 21:22:43 +00001979 prefix );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001980 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001981
Paul Bakkerd98030e2009-05-02 15:13:40 +00001982 nr = ( crt->serial.len <= 32 )
Paul Bakker5121ce52009-01-03 21:22:43 +00001983 ? crt->serial.len : 32;
1984
Paul Bakkerd98030e2009-05-02 15:13:40 +00001985 for( i = 0; i < nr; i++ )
1986 {
1987 ret = snprintf( p, n, "%02X%s",
1988 crt->serial.p[i], ( i < nr - 1 ) ? ":" : "" );
1989 SAFE_SNPRINTF();
1990 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001991
Paul Bakkerd98030e2009-05-02 15:13:40 +00001992 ret = snprintf( p, n, "\n%sissuer name : ", prefix );
1993 SAFE_SNPRINTF();
1994 ret = x509parse_dn_gets( p, n, &crt->issuer );
1995 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001996
Paul Bakkerd98030e2009-05-02 15:13:40 +00001997 ret = snprintf( p, n, "\n%ssubject name : ", prefix );
1998 SAFE_SNPRINTF();
1999 ret = x509parse_dn_gets( p, n, &crt->subject );
2000 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002001
Paul Bakkerd98030e2009-05-02 15:13:40 +00002002 ret = snprintf( p, n, "\n%sissued on : " \
Paul Bakker5121ce52009-01-03 21:22:43 +00002003 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2004 crt->valid_from.year, crt->valid_from.mon,
2005 crt->valid_from.day, crt->valid_from.hour,
2006 crt->valid_from.min, crt->valid_from.sec );
Paul Bakkerd98030e2009-05-02 15:13:40 +00002007 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002008
Paul Bakkerd98030e2009-05-02 15:13:40 +00002009 ret = snprintf( p, n, "\n%sexpires on : " \
Paul Bakker5121ce52009-01-03 21:22:43 +00002010 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2011 crt->valid_to.year, crt->valid_to.mon,
2012 crt->valid_to.day, crt->valid_to.hour,
2013 crt->valid_to.min, crt->valid_to.sec );
Paul Bakkerd98030e2009-05-02 15:13:40 +00002014 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002015
Paul Bakkerd98030e2009-05-02 15:13:40 +00002016 ret = snprintf( p, n, "\n%ssigned using : RSA+", prefix );
2017 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002018
Paul Bakker27d66162010-03-17 06:56:01 +00002019 switch( crt->sig_alg )
Paul Bakker5121ce52009-01-03 21:22:43 +00002020 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00002021 case SIG_RSA_MD2 : ret = snprintf( p, n, "MD2" ); break;
2022 case SIG_RSA_MD4 : ret = snprintf( p, n, "MD4" ); break;
2023 case SIG_RSA_MD5 : ret = snprintf( p, n, "MD5" ); break;
2024 case SIG_RSA_SHA1 : ret = snprintf( p, n, "SHA1" ); break;
2025 case SIG_RSA_SHA224 : ret = snprintf( p, n, "SHA224" ); break;
2026 case SIG_RSA_SHA256 : ret = snprintf( p, n, "SHA256" ); break;
2027 case SIG_RSA_SHA384 : ret = snprintf( p, n, "SHA384" ); break;
2028 case SIG_RSA_SHA512 : ret = snprintf( p, n, "SHA512" ); break;
2029 default: ret = snprintf( p, n, "???" ); break;
2030 }
2031 SAFE_SNPRINTF();
2032
2033 ret = snprintf( p, n, "\n%sRSA key size : %d bits\n", prefix,
2034 crt->rsa.N.n * (int) sizeof( unsigned long ) * 8 );
2035 SAFE_SNPRINTF();
2036
2037 return( size - n );
2038}
2039
2040/*
2041 * Return an informational string about the CRL.
2042 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002043int x509parse_crl_info( char *buf, size_t size, const char *prefix,
2044 const x509_crl *crl )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002045{
2046 int i, n, nr, ret;
2047 char *p;
Paul Bakkerff60ee62010-03-16 21:09:09 +00002048 const x509_crl_entry *entry;
Paul Bakkerd98030e2009-05-02 15:13:40 +00002049
2050 p = buf;
2051 n = size;
2052
2053 ret = snprintf( p, n, "%sCRL version : %d",
2054 prefix, crl->version );
2055 SAFE_SNPRINTF();
2056
2057 ret = snprintf( p, n, "\n%sissuer name : ", prefix );
2058 SAFE_SNPRINTF();
2059 ret = x509parse_dn_gets( p, n, &crl->issuer );
2060 SAFE_SNPRINTF();
2061
2062 ret = snprintf( p, n, "\n%sthis update : " \
2063 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2064 crl->this_update.year, crl->this_update.mon,
2065 crl->this_update.day, crl->this_update.hour,
2066 crl->this_update.min, crl->this_update.sec );
2067 SAFE_SNPRINTF();
2068
2069 ret = snprintf( p, n, "\n%snext update : " \
2070 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2071 crl->next_update.year, crl->next_update.mon,
2072 crl->next_update.day, crl->next_update.hour,
2073 crl->next_update.min, crl->next_update.sec );
2074 SAFE_SNPRINTF();
2075
2076 entry = &crl->entry;
2077
2078 ret = snprintf( p, n, "\n%sRevoked certificates:",
2079 prefix );
2080 SAFE_SNPRINTF();
2081
Paul Bakker9be19372009-07-27 20:21:53 +00002082 while( entry != NULL && entry->raw.len != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002083 {
2084 ret = snprintf( p, n, "\n%sserial number: ",
2085 prefix );
2086 SAFE_SNPRINTF();
2087
2088 nr = ( entry->serial.len <= 32 )
2089 ? entry->serial.len : 32;
2090
2091 for( i = 0; i < nr; i++ ) {
2092 ret = snprintf( p, n, "%02X%s",
2093 entry->serial.p[i], ( i < nr - 1 ) ? ":" : "" );
2094 SAFE_SNPRINTF();
2095 }
2096
2097 ret = snprintf( p, n, " revocation date: " \
2098 "%04d-%02d-%02d %02d:%02d:%02d",
2099 entry->revocation_date.year, entry->revocation_date.mon,
2100 entry->revocation_date.day, entry->revocation_date.hour,
2101 entry->revocation_date.min, entry->revocation_date.sec );
2102 SAFE_SNPRINTF();
2103
2104 entry = entry->next;
Paul Bakker5121ce52009-01-03 21:22:43 +00002105 }
2106
Paul Bakkerd98030e2009-05-02 15:13:40 +00002107 ret = snprintf( p, n, "\n%ssigned using : RSA+", prefix );
2108 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002109
Paul Bakker27d66162010-03-17 06:56:01 +00002110 switch( crl->sig_alg )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002111 {
2112 case SIG_RSA_MD2 : ret = snprintf( p, n, "MD2" ); break;
2113 case SIG_RSA_MD4 : ret = snprintf( p, n, "MD4" ); break;
2114 case SIG_RSA_MD5 : ret = snprintf( p, n, "MD5" ); break;
2115 case SIG_RSA_SHA1 : ret = snprintf( p, n, "SHA1" ); break;
2116 case SIG_RSA_SHA224 : ret = snprintf( p, n, "SHA224" ); break;
2117 case SIG_RSA_SHA256 : ret = snprintf( p, n, "SHA256" ); break;
2118 case SIG_RSA_SHA384 : ret = snprintf( p, n, "SHA384" ); break;
2119 case SIG_RSA_SHA512 : ret = snprintf( p, n, "SHA512" ); break;
2120 default: ret = snprintf( p, n, "???" ); break;
2121 }
2122 SAFE_SNPRINTF();
2123
Paul Bakker1e27bb22009-07-19 20:25:25 +00002124 ret = snprintf( p, n, "\n" );
2125 SAFE_SNPRINTF();
2126
Paul Bakkerd98030e2009-05-02 15:13:40 +00002127 return( size - n );
Paul Bakker5121ce52009-01-03 21:22:43 +00002128}
2129
2130/*
Paul Bakker40ea7de2009-05-03 10:18:48 +00002131 * Return 0 if the x509_time is still valid, or 1 otherwise.
Paul Bakker5121ce52009-01-03 21:22:43 +00002132 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002133int x509parse_time_expired( const x509_time *to )
Paul Bakker5121ce52009-01-03 21:22:43 +00002134{
2135 struct tm *lt;
2136 time_t tt;
2137
2138 tt = time( NULL );
2139 lt = localtime( &tt );
2140
Paul Bakker40ea7de2009-05-03 10:18:48 +00002141 if( lt->tm_year > to->year - 1900 )
2142 return( 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002143
Paul Bakker40ea7de2009-05-03 10:18:48 +00002144 if( lt->tm_year == to->year - 1900 &&
2145 lt->tm_mon > to->mon - 1 )
2146 return( 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002147
Paul Bakker40ea7de2009-05-03 10:18:48 +00002148 if( lt->tm_year == to->year - 1900 &&
2149 lt->tm_mon == to->mon - 1 &&
2150 lt->tm_mday > to->day )
2151 return( 1 );
2152
2153 return( 0 );
2154}
2155
2156/*
2157 * Return 1 if the certificate is revoked, or 0 otherwise.
2158 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002159int x509parse_revoked( const x509_cert *crt, const x509_crl *crl )
Paul Bakker40ea7de2009-05-03 10:18:48 +00002160{
Paul Bakkerff60ee62010-03-16 21:09:09 +00002161 const x509_crl_entry *cur = &crl->entry;
Paul Bakker40ea7de2009-05-03 10:18:48 +00002162
2163 while( cur != NULL && cur->serial.len != 0 )
2164 {
2165 if( memcmp( crt->serial.p, cur->serial.p, crt->serial.len ) == 0 )
2166 {
2167 if( x509parse_time_expired( &cur->revocation_date ) )
2168 return( 1 );
2169 }
2170
2171 cur = cur->next;
2172 }
Paul Bakker5121ce52009-01-03 21:22:43 +00002173
2174 return( 0 );
2175}
2176
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002177/*
2178 * Wrapper for x509 hashes.
2179 *
2180 * @param out Buffer to receive the hash (Should be at least 64 bytes)
2181 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002182static void x509_hash( const unsigned char *in, int len, int alg,
Paul Bakker5121ce52009-01-03 21:22:43 +00002183 unsigned char *out )
2184{
2185 switch( alg )
2186 {
Paul Bakker40e46942009-01-03 21:51:57 +00002187#if defined(POLARSSL_MD2_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002188 case SIG_RSA_MD2 : md2( in, len, out ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00002189#endif
Paul Bakker40e46942009-01-03 21:51:57 +00002190#if defined(POLARSSL_MD4_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002191 case SIG_RSA_MD4 : md4( in, len, out ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00002192#endif
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002193#if defined(POLARSSL_MD5_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002194 case SIG_RSA_MD5 : md5( in, len, out ); break;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002195#endif
2196#if defined(POLARSSL_SHA1_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002197 case SIG_RSA_SHA1 : sha1( in, len, out ); break;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002198#endif
Paul Bakker4593aea2009-02-09 22:32:35 +00002199#if defined(POLARSSL_SHA2_C)
2200 case SIG_RSA_SHA224 : sha2( in, len, out, 1 ); break;
2201 case SIG_RSA_SHA256 : sha2( in, len, out, 0 ); break;
2202#endif
Paul Bakkerfe1aea72009-10-03 20:09:14 +00002203#if defined(POLARSSL_SHA4_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002204 case SIG_RSA_SHA384 : sha4( in, len, out, 1 ); break;
2205 case SIG_RSA_SHA512 : sha4( in, len, out, 0 ); break;
2206#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00002207 default:
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002208 memset( out, '\xFF', 64 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002209 break;
2210 }
2211}
2212
2213/*
2214 * Verify the certificate validity
2215 */
2216int x509parse_verify( x509_cert *crt,
2217 x509_cert *trust_ca,
Paul Bakker40ea7de2009-05-03 10:18:48 +00002218 x509_crl *ca_crl,
Paul Bakkerff60ee62010-03-16 21:09:09 +00002219 const char *cn, int *flags )
Paul Bakker5121ce52009-01-03 21:22:43 +00002220{
2221 int cn_len;
2222 int hash_id;
2223 int pathlen;
2224 x509_cert *cur;
2225 x509_name *name;
Paul Bakker4593aea2009-02-09 22:32:35 +00002226 unsigned char hash[64];
Paul Bakker5121ce52009-01-03 21:22:43 +00002227
Paul Bakker40ea7de2009-05-03 10:18:48 +00002228 *flags = 0;
2229
2230 if( x509parse_time_expired( &crt->valid_to ) )
2231 *flags = BADCERT_EXPIRED;
Paul Bakker5121ce52009-01-03 21:22:43 +00002232
2233 if( cn != NULL )
2234 {
2235 name = &crt->subject;
2236 cn_len = strlen( cn );
2237
2238 while( name != NULL )
2239 {
2240 if( memcmp( name->oid.p, OID_CN, 3 ) == 0 &&
2241 memcmp( name->val.p, cn, cn_len ) == 0 &&
2242 name->val.len == cn_len )
2243 break;
2244
2245 name = name->next;
2246 }
2247
2248 if( name == NULL )
2249 *flags |= BADCERT_CN_MISMATCH;
2250 }
2251
2252 *flags |= BADCERT_NOT_TRUSTED;
2253
2254 /*
2255 * Iterate upwards in the given cert chain,
2256 * ignoring any upper cert with CA != TRUE.
2257 */
2258 cur = crt->next;
2259
2260 pathlen = 1;
2261
Paul Bakker7c6d4a42009-03-28 20:35:47 +00002262 while( cur != NULL && cur->version != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00002263 {
2264 if( cur->ca_istrue == 0 ||
2265 crt->issuer_raw.len != cur->subject_raw.len ||
2266 memcmp( crt->issuer_raw.p, cur->subject_raw.p,
2267 crt->issuer_raw.len ) != 0 )
2268 {
2269 cur = cur->next;
2270 continue;
2271 }
2272
Paul Bakker27d66162010-03-17 06:56:01 +00002273 hash_id = crt->sig_alg;
Paul Bakker5121ce52009-01-03 21:22:43 +00002274
2275 x509_hash( crt->tbs.p, crt->tbs.len, hash_id, hash );
2276
2277 if( rsa_pkcs1_verify( &cur->rsa, RSA_PUBLIC, hash_id,
2278 0, hash, crt->sig.p ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00002279 return( POLARSSL_ERR_X509_CERT_VERIFY_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +00002280
2281 pathlen++;
2282
2283 crt = cur;
2284 cur = crt->next;
2285 }
2286
2287 /*
2288 * Atempt to validate topmost cert with our CA chain.
2289 */
Paul Bakker7c6d4a42009-03-28 20:35:47 +00002290 while( trust_ca != NULL && trust_ca->version != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00002291 {
2292 if( crt->issuer_raw.len != trust_ca->subject_raw.len ||
2293 memcmp( crt->issuer_raw.p, trust_ca->subject_raw.p,
2294 crt->issuer_raw.len ) != 0 )
2295 {
2296 trust_ca = trust_ca->next;
2297 continue;
2298 }
2299
2300 if( trust_ca->max_pathlen > 0 &&
2301 trust_ca->max_pathlen < pathlen )
2302 break;
2303
Paul Bakker27d66162010-03-17 06:56:01 +00002304 hash_id = crt->sig_alg;
Paul Bakker5121ce52009-01-03 21:22:43 +00002305
2306 x509_hash( crt->tbs.p, crt->tbs.len, hash_id, hash );
2307
2308 if( rsa_pkcs1_verify( &trust_ca->rsa, RSA_PUBLIC, hash_id,
2309 0, hash, crt->sig.p ) == 0 )
2310 {
2311 /*
2312 * cert. is signed by a trusted CA
2313 */
2314 *flags &= ~BADCERT_NOT_TRUSTED;
2315 break;
2316 }
2317
2318 trust_ca = trust_ca->next;
2319 }
2320
Paul Bakker40ea7de2009-05-03 10:18:48 +00002321 /*
2322 * TODO: What happens if no CRL is present?
2323 * Suggestion: Revocation state should be unknown if no CRL is present.
2324 * For backwards compatibility this is not yet implemented.
2325 */
2326
2327 /*
2328 * Check if the topmost certificate is revoked if the trusted CA is
2329 * determined.
2330 */
2331 while( trust_ca != NULL && ca_crl != NULL && ca_crl->version != 0 )
2332 {
2333 if( ca_crl->issuer_raw.len != trust_ca->subject_raw.len ||
2334 memcmp( ca_crl->issuer_raw.p, trust_ca->subject_raw.p,
2335 ca_crl->issuer_raw.len ) != 0 )
2336 {
2337 ca_crl = ca_crl->next;
2338 continue;
2339 }
2340
2341 /*
2342 * Check if CRL is correctry signed by the trusted CA
2343 */
Paul Bakker27d66162010-03-17 06:56:01 +00002344 hash_id = ca_crl->sig_alg;
Paul Bakker40ea7de2009-05-03 10:18:48 +00002345
2346 x509_hash( ca_crl->tbs.p, ca_crl->tbs.len, hash_id, hash );
2347
2348 if( !rsa_pkcs1_verify( &trust_ca->rsa, RSA_PUBLIC, hash_id,
2349 0, hash, ca_crl->sig.p ) == 0 )
2350 {
2351 /*
2352 * CRL is not trusted
2353 */
2354 *flags |= BADCRL_NOT_TRUSTED;
2355 break;
2356 }
2357
2358 /*
2359 * Check for validity of CRL (Do not drop out)
2360 */
2361 if( x509parse_time_expired( &ca_crl->next_update ) )
2362 *flags |= BADCRL_EXPIRED;
2363
2364 /*
2365 * Check if certificate is revoked
2366 */
2367 if( x509parse_revoked(crt, ca_crl) )
2368 {
2369 *flags |= BADCERT_REVOKED;
2370 break;
2371 }
2372
2373 ca_crl = ca_crl->next;
2374 }
2375
Paul Bakker5121ce52009-01-03 21:22:43 +00002376 if( *flags != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00002377 return( POLARSSL_ERR_X509_CERT_VERIFY_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +00002378
2379 return( 0 );
2380}
2381
2382/*
2383 * Unallocate all certificate data
2384 */
2385void x509_free( x509_cert *crt )
2386{
2387 x509_cert *cert_cur = crt;
2388 x509_cert *cert_prv;
2389 x509_name *name_cur;
2390 x509_name *name_prv;
2391
2392 if( crt == NULL )
2393 return;
2394
2395 do
2396 {
2397 rsa_free( &cert_cur->rsa );
2398
2399 name_cur = cert_cur->issuer.next;
2400 while( name_cur != NULL )
2401 {
2402 name_prv = name_cur;
2403 name_cur = name_cur->next;
2404 memset( name_prv, 0, sizeof( x509_name ) );
2405 free( name_prv );
2406 }
2407
2408 name_cur = cert_cur->subject.next;
2409 while( name_cur != NULL )
2410 {
2411 name_prv = name_cur;
2412 name_cur = name_cur->next;
2413 memset( name_prv, 0, sizeof( x509_name ) );
2414 free( name_prv );
2415 }
2416
2417 if( cert_cur->raw.p != NULL )
2418 {
2419 memset( cert_cur->raw.p, 0, cert_cur->raw.len );
2420 free( cert_cur->raw.p );
2421 }
2422
2423 cert_cur = cert_cur->next;
2424 }
2425 while( cert_cur != NULL );
2426
2427 cert_cur = crt;
2428 do
2429 {
2430 cert_prv = cert_cur;
2431 cert_cur = cert_cur->next;
2432
2433 memset( cert_prv, 0, sizeof( x509_cert ) );
2434 if( cert_prv != crt )
2435 free( cert_prv );
2436 }
2437 while( cert_cur != NULL );
2438}
2439
Paul Bakkerd98030e2009-05-02 15:13:40 +00002440/*
2441 * Unallocate all CRL data
2442 */
2443void x509_crl_free( x509_crl *crl )
2444{
2445 x509_crl *crl_cur = crl;
2446 x509_crl *crl_prv;
2447 x509_name *name_cur;
2448 x509_name *name_prv;
2449 x509_crl_entry *entry_cur;
2450 x509_crl_entry *entry_prv;
2451
2452 if( crl == NULL )
2453 return;
2454
2455 do
2456 {
2457 name_cur = crl_cur->issuer.next;
2458 while( name_cur != NULL )
2459 {
2460 name_prv = name_cur;
2461 name_cur = name_cur->next;
2462 memset( name_prv, 0, sizeof( x509_name ) );
2463 free( name_prv );
2464 }
2465
2466 entry_cur = crl_cur->entry.next;
2467 while( entry_cur != NULL )
2468 {
2469 entry_prv = entry_cur;
2470 entry_cur = entry_cur->next;
2471 memset( entry_prv, 0, sizeof( x509_crl_entry ) );
2472 free( entry_prv );
2473 }
2474
2475 if( crl_cur->raw.p != NULL )
2476 {
2477 memset( crl_cur->raw.p, 0, crl_cur->raw.len );
2478 free( crl_cur->raw.p );
2479 }
2480
2481 crl_cur = crl_cur->next;
2482 }
2483 while( crl_cur != NULL );
2484
2485 crl_cur = crl;
2486 do
2487 {
2488 crl_prv = crl_cur;
2489 crl_cur = crl_cur->next;
2490
2491 memset( crl_prv, 0, sizeof( x509_crl ) );
2492 if( crl_prv != crl )
2493 free( crl_prv );
2494 }
2495 while( crl_cur != NULL );
2496}
2497
Paul Bakker40e46942009-01-03 21:51:57 +00002498#if defined(POLARSSL_SELF_TEST)
Paul Bakker5121ce52009-01-03 21:22:43 +00002499
Paul Bakker40e46942009-01-03 21:51:57 +00002500#include "polarssl/certs.h"
Paul Bakker5121ce52009-01-03 21:22:43 +00002501
2502/*
2503 * Checkup routine
2504 */
2505int x509_self_test( int verbose )
2506{
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002507#if defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00002508 int ret, i, j;
2509 x509_cert cacert;
2510 x509_cert clicert;
2511 rsa_context rsa;
2512
2513 if( verbose != 0 )
2514 printf( " X.509 certificate load: " );
2515
2516 memset( &clicert, 0, sizeof( x509_cert ) );
2517
2518 ret = x509parse_crt( &clicert, (unsigned char *) test_cli_crt,
2519 strlen( test_cli_crt ) );
2520 if( ret != 0 )
2521 {
2522 if( verbose != 0 )
2523 printf( "failed\n" );
2524
2525 return( ret );
2526 }
2527
2528 memset( &cacert, 0, sizeof( x509_cert ) );
2529
2530 ret = x509parse_crt( &cacert, (unsigned char *) test_ca_crt,
2531 strlen( test_ca_crt ) );
2532 if( ret != 0 )
2533 {
2534 if( verbose != 0 )
2535 printf( "failed\n" );
2536
2537 return( ret );
2538 }
2539
2540 if( verbose != 0 )
2541 printf( "passed\n X.509 private key load: " );
2542
2543 i = strlen( test_ca_key );
2544 j = strlen( test_ca_pwd );
2545
2546 if( ( ret = x509parse_key( &rsa,
2547 (unsigned char *) test_ca_key, i,
2548 (unsigned char *) test_ca_pwd, j ) ) != 0 )
2549 {
2550 if( verbose != 0 )
2551 printf( "failed\n" );
2552
2553 return( ret );
2554 }
2555
2556 if( verbose != 0 )
2557 printf( "passed\n X.509 signature verify: ");
2558
Paul Bakker1973e4c2009-07-10 22:32:40 +00002559 ret = x509parse_verify( &clicert, &cacert, NULL, "PolarSSL Client 2", &i );
Paul Bakker5121ce52009-01-03 21:22:43 +00002560 if( ret != 0 )
2561 {
2562 if( verbose != 0 )
2563 printf( "failed\n" );
2564
2565 return( ret );
2566 }
2567
2568 if( verbose != 0 )
2569 printf( "passed\n\n" );
2570
2571 x509_free( &cacert );
2572 x509_free( &clicert );
2573 rsa_free( &rsa );
2574
2575 return( 0 );
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002576#else
2577 ((void) verbose);
2578 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
2579#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00002580}
2581
2582#endif
2583
2584#endif