blob: 1403261528375d59baf3e839dd208db868a0ca04 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * X.509 certificate and private key decoding
3 *
Paul Bakker84f12b72010-07-18 10:13:04 +00004 * Copyright (C) 2006-2010, Brainspark B.V.
5 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakker77b385e2009-07-28 17:23:11 +00006 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00007 *
Paul Bakker5121ce52009-01-03 21:22:43 +00008 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License along
19 * with this program; if not, write to the Free Software Foundation, Inc.,
20 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22/*
23 * The ITU-T X.509 standard defines a certificat format for PKI.
24 *
25 * http://www.ietf.org/rfc/rfc2459.txt
26 * http://www.ietf.org/rfc/rfc3279.txt
27 *
28 * ftp://ftp.rsasecurity.com/pub/pkcs/ascii/pkcs-1v2.asc
29 *
30 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf
31 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf
32 */
33
Paul Bakker40e46942009-01-03 21:51:57 +000034#include "polarssl/config.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000035
Paul Bakker40e46942009-01-03 21:51:57 +000036#if defined(POLARSSL_X509_PARSE_C)
Paul Bakker5121ce52009-01-03 21:22:43 +000037
Paul Bakker40e46942009-01-03 21:51:57 +000038#include "polarssl/x509.h"
39#include "polarssl/base64.h"
40#include "polarssl/des.h"
41#include "polarssl/md2.h"
42#include "polarssl/md4.h"
43#include "polarssl/md5.h"
44#include "polarssl/sha1.h"
Paul Bakker026c03b2009-03-28 17:53:03 +000045#include "polarssl/sha2.h"
46#include "polarssl/sha4.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000047
48#include <string.h>
49#include <stdlib.h>
50#include <stdio.h>
51#include <time.h>
52
53/*
54 * ASN.1 DER decoding routines
55 */
56static int asn1_get_len( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +000057 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +000058 int *len )
59{
60 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +000061 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000062
63 if( ( **p & 0x80 ) == 0 )
64 *len = *(*p)++;
65 else
66 {
67 switch( **p & 0x7F )
68 {
69 case 1:
70 if( ( end - *p ) < 2 )
Paul Bakker40e46942009-01-03 21:51:57 +000071 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000072
73 *len = (*p)[1];
74 (*p) += 2;
75 break;
76
77 case 2:
78 if( ( end - *p ) < 3 )
Paul Bakker40e46942009-01-03 21:51:57 +000079 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000080
81 *len = ( (*p)[1] << 8 ) | (*p)[2];
82 (*p) += 3;
83 break;
84
85 default:
Paul Bakker40e46942009-01-03 21:51:57 +000086 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +000087 break;
88 }
89 }
90
91 if( *len > (int) ( end - *p ) )
Paul Bakker40e46942009-01-03 21:51:57 +000092 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +000093
94 return( 0 );
95}
96
97static int asn1_get_tag( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +000098 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +000099 int *len, int tag )
100{
101 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000102 return( POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000103
104 if( **p != tag )
Paul Bakker40e46942009-01-03 21:51:57 +0000105 return( POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000106
107 (*p)++;
108
109 return( asn1_get_len( p, end, len ) );
110}
111
112static int asn1_get_bool( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000113 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000114 int *val )
115{
116 int ret, len;
117
118 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BOOLEAN ) ) != 0 )
119 return( ret );
120
121 if( len != 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000122 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000123
124 *val = ( **p != 0 ) ? 1 : 0;
125 (*p)++;
126
127 return( 0 );
128}
129
130static int asn1_get_int( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000131 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000132 int *val )
133{
134 int ret, len;
135
136 if( ( ret = asn1_get_tag( p, end, &len, ASN1_INTEGER ) ) != 0 )
137 return( ret );
138
139 if( len > (int) sizeof( int ) || ( **p & 0x80 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000140 return( POLARSSL_ERR_ASN1_INVALID_LENGTH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000141
142 *val = 0;
143
144 while( len-- > 0 )
145 {
146 *val = ( *val << 8 ) | **p;
147 (*p)++;
148 }
149
150 return( 0 );
151}
152
153static int asn1_get_mpi( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000154 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000155 mpi *X )
156{
157 int ret, len;
158
159 if( ( ret = asn1_get_tag( p, end, &len, ASN1_INTEGER ) ) != 0 )
160 return( ret );
161
162 ret = mpi_read_binary( X, *p, len );
163
164 *p += len;
165
166 return( ret );
167}
168
169/*
170 * Version ::= INTEGER { v1(0), v2(1), v3(2) }
171 */
172static int x509_get_version( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000173 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000174 int *ver )
175{
176 int ret, len;
177
178 if( ( ret = asn1_get_tag( p, end, &len,
179 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 0 ) ) != 0 )
180 {
Paul Bakker40e46942009-01-03 21:51:57 +0000181 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakker5121ce52009-01-03 21:22:43 +0000182 return( *ver = 0 );
183
184 return( ret );
185 }
186
187 end = *p + len;
188
189 if( ( ret = asn1_get_int( p, end, ver ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000190 return( POLARSSL_ERR_X509_CERT_INVALID_VERSION | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000191
192 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000193 return( POLARSSL_ERR_X509_CERT_INVALID_VERSION |
194 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000195
196 return( 0 );
197}
198
199/*
200 * CertificateSerialNumber ::= INTEGER
201 */
202static int x509_get_serial( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000203 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000204 x509_buf *serial )
205{
206 int ret;
207
208 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000209 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL |
210 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000211
212 if( **p != ( ASN1_CONTEXT_SPECIFIC | ASN1_PRIMITIVE | 2 ) &&
213 **p != ASN1_INTEGER )
Paul Bakker40e46942009-01-03 21:51:57 +0000214 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL |
215 POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000216
217 serial->tag = *(*p)++;
218
219 if( ( ret = asn1_get_len( p, end, &serial->len ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000220 return( POLARSSL_ERR_X509_CERT_INVALID_SERIAL | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000221
222 serial->p = *p;
223 *p += serial->len;
224
225 return( 0 );
226}
227
228/*
229 * AlgorithmIdentifier ::= SEQUENCE {
230 * algorithm OBJECT IDENTIFIER,
231 * parameters ANY DEFINED BY algorithm OPTIONAL }
232 */
233static int x509_get_alg( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000234 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000235 x509_buf *alg )
236{
237 int ret, len;
238
239 if( ( ret = asn1_get_tag( p, end, &len,
240 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000241 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000242
243 end = *p + len;
244 alg->tag = **p;
245
246 if( ( ret = asn1_get_tag( p, end, &alg->len, ASN1_OID ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000247 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000248
249 alg->p = *p;
250 *p += alg->len;
251
252 if( *p == end )
253 return( 0 );
254
255 /*
256 * assume the algorithm parameters must be NULL
257 */
258 if( ( ret = asn1_get_tag( p, end, &len, ASN1_NULL ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000259 return( POLARSSL_ERR_X509_CERT_INVALID_ALG | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000260
261 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000262 return( POLARSSL_ERR_X509_CERT_INVALID_ALG |
263 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000264
265 return( 0 );
266}
267
268/*
269 * RelativeDistinguishedName ::=
270 * SET OF AttributeTypeAndValue
271 *
272 * AttributeTypeAndValue ::= SEQUENCE {
273 * type AttributeType,
274 * value AttributeValue }
275 *
276 * AttributeType ::= OBJECT IDENTIFIER
277 *
278 * AttributeValue ::= ANY DEFINED BY AttributeType
279 */
280static int x509_get_name( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000281 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000282 x509_name *cur )
283{
284 int ret, len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000285 const unsigned char *end2;
Paul Bakker5121ce52009-01-03 21:22:43 +0000286 x509_buf *oid;
287 x509_buf *val;
288
289 if( ( ret = asn1_get_tag( p, end, &len,
290 ASN1_CONSTRUCTED | ASN1_SET ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000291 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000292
293 end2 = end;
294 end = *p + len;
295
296 if( ( ret = asn1_get_tag( p, end, &len,
297 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000298 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000299
300 if( *p + len != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000301 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
302 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000303
304 oid = &cur->oid;
305 oid->tag = **p;
306
307 if( ( ret = asn1_get_tag( p, end, &oid->len, ASN1_OID ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000308 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000309
310 oid->p = *p;
311 *p += oid->len;
312
313 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000314 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
315 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000316
317 if( **p != ASN1_BMP_STRING && **p != ASN1_UTF8_STRING &&
318 **p != ASN1_T61_STRING && **p != ASN1_PRINTABLE_STRING &&
319 **p != ASN1_IA5_STRING && **p != ASN1_UNIVERSAL_STRING )
Paul Bakker40e46942009-01-03 21:51:57 +0000320 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
321 POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000322
323 val = &cur->val;
324 val->tag = *(*p)++;
325
326 if( ( ret = asn1_get_len( p, end, &val->len ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000327 return( POLARSSL_ERR_X509_CERT_INVALID_NAME | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000328
329 val->p = *p;
330 *p += val->len;
331
332 cur->next = NULL;
333
334 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000335 return( POLARSSL_ERR_X509_CERT_INVALID_NAME |
336 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000337
338 /*
339 * recurse until end of SEQUENCE is reached
340 */
341 if( *p == end2 )
342 return( 0 );
343
344 cur->next = (x509_name *) malloc(
345 sizeof( x509_name ) );
346
347 if( cur->next == NULL )
348 return( 1 );
349
350 return( x509_get_name( p, end2, cur->next ) );
351}
352
353/*
Paul Bakker5121ce52009-01-03 21:22:43 +0000354 * Time ::= CHOICE {
355 * utcTime UTCTime,
356 * generalTime GeneralizedTime }
357 */
Paul Bakker91200182010-02-18 21:26:15 +0000358static int x509_get_time( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000359 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000360 x509_time *time )
361{
362 int ret, len;
363 char date[64];
Paul Bakker91200182010-02-18 21:26:15 +0000364 unsigned char tag;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000365
Paul Bakker91200182010-02-18 21:26:15 +0000366 if( ( end - *p ) < 1 )
367 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000368
Paul Bakker91200182010-02-18 21:26:15 +0000369 tag = **p;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000370
Paul Bakker91200182010-02-18 21:26:15 +0000371 if ( tag == ASN1_UTC_TIME )
372 {
373 (*p)++;
374 ret = asn1_get_len( p, end, &len );
375
376 if( ret != 0 )
377 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000378
Paul Bakker91200182010-02-18 21:26:15 +0000379 memset( date, 0, sizeof( date ) );
380 memcpy( date, *p, ( len < (int) sizeof( date ) - 1 ) ?
381 len : (int) sizeof( date ) - 1 );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000382
Paul Bakker91200182010-02-18 21:26:15 +0000383 if( sscanf( date, "%2d%2d%2d%2d%2d%2d",
384 &time->year, &time->mon, &time->day,
385 &time->hour, &time->min, &time->sec ) < 5 )
386 return( POLARSSL_ERR_X509_CERT_INVALID_DATE );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000387
Paul Bakker91200182010-02-18 21:26:15 +0000388 time->year += 100 * ( time->year < 90 );
389 time->year += 1900;
390
391 *p += len;
392
393 return( 0 );
394 }
395 else if ( tag == ASN1_GENERALIZED_TIME )
396 {
397 (*p)++;
398 ret = asn1_get_len( p, end, &len );
399
400 if( ret != 0 )
401 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
402
403 memset( date, 0, sizeof( date ) );
404 memcpy( date, *p, ( len < (int) sizeof( date ) - 1 ) ?
405 len : (int) sizeof( date ) - 1 );
406
407 if( sscanf( date, "%4d%2d%2d%2d%2d%2d",
408 &time->year, &time->mon, &time->day,
409 &time->hour, &time->min, &time->sec ) < 5 )
410 return( POLARSSL_ERR_X509_CERT_INVALID_DATE );
411
412 *p += len;
413
414 return( 0 );
415 }
416 else
417 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | POLARSSL_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakkerd98030e2009-05-02 15:13:40 +0000418}
419
420
421/*
422 * Validity ::= SEQUENCE {
423 * notBefore Time,
424 * notAfter Time }
425 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000426static int x509_get_dates( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000427 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000428 x509_time *from,
429 x509_time *to )
430{
431 int ret, len;
Paul Bakker5121ce52009-01-03 21:22:43 +0000432
433 if( ( ret = asn1_get_tag( p, end, &len,
434 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000435 return( POLARSSL_ERR_X509_CERT_INVALID_DATE | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000436
437 end = *p + len;
438
Paul Bakker91200182010-02-18 21:26:15 +0000439 if( ( ret = x509_get_time( p, end, from ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000440 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000441
Paul Bakker91200182010-02-18 21:26:15 +0000442 if( ( ret = x509_get_time( p, end, to ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000443 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000444
445 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000446 return( POLARSSL_ERR_X509_CERT_INVALID_DATE |
447 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000448
449 return( 0 );
450}
451
452/*
453 * SubjectPublicKeyInfo ::= SEQUENCE {
454 * algorithm AlgorithmIdentifier,
455 * subjectPublicKey BIT STRING }
456 */
457static int x509_get_pubkey( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000458 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000459 x509_buf *pk_alg_oid,
460 mpi *N, mpi *E )
461{
462 int ret, len;
463 unsigned char *end2;
464
465 if( ( ret = x509_get_alg( p, end, pk_alg_oid ) ) != 0 )
466 return( ret );
467
468 /*
469 * only RSA public keys handled at this time
470 */
471 if( pk_alg_oid->len != 9 ||
472 memcmp( pk_alg_oid->p, OID_PKCS1_RSA, 9 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000473 return( POLARSSL_ERR_X509_CERT_UNKNOWN_PK_ALG );
Paul Bakker5121ce52009-01-03 21:22:43 +0000474
475 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000476 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000477
478 if( ( end - *p ) < 1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000479 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
480 POLARSSL_ERR_ASN1_OUT_OF_DATA );
Paul Bakker5121ce52009-01-03 21:22:43 +0000481
482 end2 = *p + len;
483
484 if( *(*p)++ != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000485 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY );
Paul Bakker5121ce52009-01-03 21:22:43 +0000486
487 /*
488 * RSAPublicKey ::= SEQUENCE {
489 * modulus INTEGER, -- n
490 * publicExponent INTEGER -- e
491 * }
492 */
493 if( ( ret = asn1_get_tag( p, end2, &len,
494 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000495 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000496
497 if( *p + len != end2 )
Paul Bakker40e46942009-01-03 21:51:57 +0000498 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
499 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000500
501 if( ( ret = asn1_get_mpi( p, end2, N ) ) != 0 ||
502 ( ret = asn1_get_mpi( p, end2, E ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000503 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000504
505 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000506 return( POLARSSL_ERR_X509_CERT_INVALID_PUBKEY |
507 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000508
509 return( 0 );
510}
511
512static int x509_get_sig( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000513 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000514 x509_buf *sig )
515{
516 int ret, len;
517
518 sig->tag = **p;
519
520 if( ( ret = asn1_get_tag( p, end, &len, ASN1_BIT_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000521 return( POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000522
523 if( --len < 1 || *(*p)++ != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000524 return( POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE );
Paul Bakker5121ce52009-01-03 21:22:43 +0000525
526 sig->len = len;
527 sig->p = *p;
528
529 *p += len;
530
531 return( 0 );
532}
533
534/*
535 * X.509 v2/v3 unique identifier (not parsed)
536 */
537static int x509_get_uid( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000538 const unsigned char *end,
Paul Bakker5121ce52009-01-03 21:22:43 +0000539 x509_buf *uid, int n )
540{
541 int ret;
542
543 if( *p == end )
544 return( 0 );
545
546 uid->tag = **p;
547
548 if( ( ret = asn1_get_tag( p, end, &uid->len,
549 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | n ) ) != 0 )
550 {
Paul Bakker40e46942009-01-03 21:51:57 +0000551 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakker5121ce52009-01-03 21:22:43 +0000552 return( 0 );
553
554 return( ret );
555 }
556
557 uid->p = *p;
558 *p += uid->len;
559
560 return( 0 );
561}
562
563/*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000564 * X.509 Extensions (No parsing of extensions, pointer should
565 * be either manually updated or extensions should be parsed!
Paul Bakker5121ce52009-01-03 21:22:43 +0000566 */
567static int x509_get_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000568 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000569 x509_buf *ext )
Paul Bakker5121ce52009-01-03 21:22:43 +0000570{
571 int ret, len;
Paul Bakker5121ce52009-01-03 21:22:43 +0000572
573 if( *p == end )
574 return( 0 );
575
576 ext->tag = **p;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000577
Paul Bakker5121ce52009-01-03 21:22:43 +0000578 if( ( ret = asn1_get_tag( p, end, &ext->len,
579 ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 3 ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000580 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000581
582 ext->p = *p;
583 end = *p + ext->len;
584
585 /*
586 * Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
587 *
588 * Extension ::= SEQUENCE {
589 * extnID OBJECT IDENTIFIER,
590 * critical BOOLEAN DEFAULT FALSE,
591 * extnValue OCTET STRING }
592 */
593 if( ( ret = asn1_get_tag( p, end, &len,
594 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000595 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000596
597 if( end != *p + len )
Paul Bakker40e46942009-01-03 21:51:57 +0000598 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
599 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000600
Paul Bakkerd98030e2009-05-02 15:13:40 +0000601 return( 0 );
602}
603
604/*
605 * X.509 CRL v2 extensions (no extensions parsed yet.)
606 */
607static int x509_get_crl_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000608 const unsigned char *end,
609 x509_buf *ext )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000610{
611 int ret, len;
612
613 if( ( ret = x509_get_ext( p, end, ext ) ) != 0 )
614 {
615 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
616 return( 0 );
617
618 return( ret );
619 }
620
621 while( *p < end )
622 {
623 if( ( ret = asn1_get_tag( p, end, &len,
624 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
625 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
626
627 *p += len;
628 }
629
630 if( *p != end )
631 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
632 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
633
634 return( 0 );
635}
636
637/*
638 * X.509 v3 extensions (only BasicConstraints are parsed)
639 */
640static int x509_get_crt_ext( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000641 const unsigned char *end,
642 x509_buf *ext,
643 int *ca_istrue,
644 int *max_pathlen )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000645{
646 int ret, len;
647 int is_critical = 1;
648 int is_cacert = 0;
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000649 unsigned char *end_ext_data, *end_ext_octet;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000650
651 if( ( ret = x509_get_ext( p, end, ext ) ) != 0 )
652 {
653 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
654 return( 0 );
655
656 return( ret );
657 }
658
Paul Bakker5121ce52009-01-03 21:22:43 +0000659 while( *p < end )
660 {
661 if( ( ret = asn1_get_tag( p, end, &len,
662 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000663 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000664
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000665 end_ext_data = *p + len;
666
Paul Bakker5121ce52009-01-03 21:22:43 +0000667 if( memcmp( *p, "\x06\x03\x55\x1D\x13", 5 ) != 0 )
668 {
669 *p += len;
670 continue;
671 }
672
673 *p += 5;
674
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000675 if( ( ret = asn1_get_bool( p, end_ext_data, &is_critical ) ) != 0 &&
Paul Bakker40e46942009-01-03 21:51:57 +0000676 ( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) )
677 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000678
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000679 if( ( ret = asn1_get_tag( p, end_ext_data, &len,
Paul Bakker5121ce52009-01-03 21:22:43 +0000680 ASN1_OCTET_STRING ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000681 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000682
683 /*
684 * BasicConstraints ::= SEQUENCE {
685 * cA BOOLEAN DEFAULT FALSE,
686 * pathLenConstraint INTEGER (0..MAX) OPTIONAL }
687 */
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000688 end_ext_octet = *p + len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000689
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000690 if( end_ext_octet != end_ext_data )
691 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
692 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000693
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000694 if( ( ret = asn1_get_tag( p, end_ext_octet, &len,
Paul Bakker5121ce52009-01-03 21:22:43 +0000695 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000696 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000697
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000698 if( *p == end_ext_octet )
Paul Bakker5121ce52009-01-03 21:22:43 +0000699 continue;
700
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000701 if( ( ret = asn1_get_bool( p, end_ext_octet, &is_cacert ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000702 {
Paul Bakker40e46942009-01-03 21:51:57 +0000703 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000704 ret = asn1_get_int( p, end_ext_octet, &is_cacert );
Paul Bakker5121ce52009-01-03 21:22:43 +0000705
706 if( ret != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000707 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000708
709 if( is_cacert != 0 )
710 is_cacert = 1;
711 }
712
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000713 if( *p == end_ext_octet )
Paul Bakker5121ce52009-01-03 21:22:43 +0000714 continue;
715
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000716 if( ( ret = asn1_get_int( p, end_ext_octet, max_pathlen ) ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +0000717 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000718
Paul Bakkerc6ce8382009-07-27 21:34:45 +0000719 if( *p != end_ext_octet )
Paul Bakker40e46942009-01-03 21:51:57 +0000720 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
721 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000722
723 max_pathlen++;
724 }
725
726 if( *p != end )
Paul Bakker40e46942009-01-03 21:51:57 +0000727 return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS |
728 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000729
730 *ca_istrue = is_critical & is_cacert;
731
732 return( 0 );
733}
734
735/*
Paul Bakkerd98030e2009-05-02 15:13:40 +0000736 * X.509 CRL Entries
737 */
738static int x509_get_entries( unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000739 const unsigned char *end,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000740 x509_crl_entry *entry )
741{
Paul Bakker9be19372009-07-27 20:21:53 +0000742 int ret, entry_len;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000743 x509_crl_entry *cur_entry = entry;
744
745 if( *p == end )
746 return( 0 );
747
Paul Bakker9be19372009-07-27 20:21:53 +0000748 if( ( ret = asn1_get_tag( p, end, &entry_len,
Paul Bakkerd98030e2009-05-02 15:13:40 +0000749 ASN1_SEQUENCE | ASN1_CONSTRUCTED ) ) != 0 )
750 {
751 if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG )
752 return( 0 );
753
754 return( ret );
755 }
756
Paul Bakker9be19372009-07-27 20:21:53 +0000757 end = *p + entry_len;
Paul Bakkerd98030e2009-05-02 15:13:40 +0000758
759 while( *p < end )
760 {
761 int len2;
762
763 if( ( ret = asn1_get_tag( p, end, &len2,
764 ASN1_SEQUENCE | ASN1_CONSTRUCTED ) ) != 0 )
765 {
Paul Bakkerd98030e2009-05-02 15:13:40 +0000766 return( ret );
767 }
768
Paul Bakker9be19372009-07-27 20:21:53 +0000769 cur_entry->raw.tag = **p;
770 cur_entry->raw.p = *p;
771 cur_entry->raw.len = len2;
772
Paul Bakkerd98030e2009-05-02 15:13:40 +0000773 if( ( ret = x509_get_serial( p, end, &cur_entry->serial ) ) != 0 )
774 return( ret );
775
Paul Bakker91200182010-02-18 21:26:15 +0000776 if( ( ret = x509_get_time( p, end, &cur_entry->revocation_date ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +0000777 return( ret );
778
779 if( ( ret = x509_get_crl_ext( p, end, &cur_entry->entry_ext ) ) != 0 )
780 return( ret );
781
782 if ( *p < end ) {
783 cur_entry->next = malloc( sizeof( x509_crl_entry ) );
784 cur_entry = cur_entry->next;
785 memset( cur_entry, 0, sizeof( x509_crl_entry ) );
786 }
787 }
788
789 return( 0 );
790}
791
Paul Bakker27d66162010-03-17 06:56:01 +0000792static int x509_get_sig_alg( const x509_buf *sig_oid, int *sig_alg )
793{
794 if( sig_oid->len == 9 &&
795 memcmp( sig_oid->p, OID_PKCS1, 8 ) == 0 )
796 {
797 if( sig_oid->p[8] >= 2 && sig_oid->p[8] <= 5 )
798 {
799 *sig_alg = sig_oid->p[8];
800 return( 0 );
801 }
802
803 if ( sig_oid->p[8] >= 11 && sig_oid->p[8] <= 14 )
804 {
805 *sig_alg = sig_oid->p[8];
806 return( 0 );
807 }
808
809 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
810 }
811
812 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
813}
814
Paul Bakkerd98030e2009-05-02 15:13:40 +0000815/*
Paul Bakker5121ce52009-01-03 21:22:43 +0000816 * Parse one or more certificates and add them to the chained list
817 */
Paul Bakkerff60ee62010-03-16 21:09:09 +0000818int x509parse_crt( x509_cert *chain, const unsigned char *buf, int buflen )
Paul Bakker5121ce52009-01-03 21:22:43 +0000819{
820 int ret, len;
Paul Bakkerff60ee62010-03-16 21:09:09 +0000821 const unsigned char *s1, *s2;
Paul Bakker5121ce52009-01-03 21:22:43 +0000822 unsigned char *p, *end;
823 x509_cert *crt;
824
825 crt = chain;
826
Paul Bakker320a4b52009-03-28 18:52:39 +0000827 /*
828 * Check for valid input
829 */
830 if( crt == NULL || buf == NULL )
831 return( 1 );
832
Paul Bakkere9581d62009-03-28 20:29:25 +0000833 while( crt->version != 0 && crt->next != NULL )
Paul Bakker5121ce52009-01-03 21:22:43 +0000834 crt = crt->next;
835
836 /*
Paul Bakker320a4b52009-03-28 18:52:39 +0000837 * Add new certificate on the end of the chain if needed.
838 */
Paul Bakkere9581d62009-03-28 20:29:25 +0000839 if ( crt->version != 0 && crt->next == NULL)
Paul Bakker320a4b52009-03-28 18:52:39 +0000840 {
841 crt->next = (x509_cert *) malloc( sizeof( x509_cert ) );
842
Paul Bakker7d06ad22009-05-02 15:53:56 +0000843 if( crt->next == NULL )
844 {
Paul Bakker320a4b52009-03-28 18:52:39 +0000845 x509_free( crt );
Paul Bakker7d06ad22009-05-02 15:53:56 +0000846 return( 1 );
847 }
Paul Bakker320a4b52009-03-28 18:52:39 +0000848
Paul Bakker7d06ad22009-05-02 15:53:56 +0000849 crt = crt->next;
850 memset( crt, 0, sizeof( x509_cert ) );
Paul Bakker320a4b52009-03-28 18:52:39 +0000851 }
852
853 /*
Paul Bakker5121ce52009-01-03 21:22:43 +0000854 * check if the certificate is encoded in base64
855 */
856 s1 = (unsigned char *) strstr( (char *) buf,
857 "-----BEGIN CERTIFICATE-----" );
858
859 if( s1 != NULL )
860 {
861 s2 = (unsigned char *) strstr( (char *) buf,
862 "-----END CERTIFICATE-----" );
863
864 if( s2 == NULL || s2 <= s1 )
Paul Bakker40e46942009-01-03 21:51:57 +0000865 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000866
867 s1 += 27;
868 if( *s1 == '\r' ) s1++;
869 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +0000870 else return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000871
872 /*
873 * get the DER data length and decode the buffer
874 */
875 len = 0;
876 ret = base64_decode( NULL, &len, s1, s2 - s1 );
877
Paul Bakker40e46942009-01-03 21:51:57 +0000878 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
879 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000880
881 if( ( p = (unsigned char *) malloc( len ) ) == NULL )
882 return( 1 );
883
884 if( ( ret = base64_decode( p, &len, s1, s2 - s1 ) ) != 0 )
885 {
886 free( p );
Paul Bakker40e46942009-01-03 21:51:57 +0000887 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000888 }
889
890 /*
891 * update the buffer size and offset
892 */
893 s2 += 25;
894 if( *s2 == '\r' ) s2++;
895 if( *s2 == '\n' ) s2++;
896 else
897 {
898 free( p );
Paul Bakker40e46942009-01-03 21:51:57 +0000899 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +0000900 }
901
902 buflen -= s2 - buf;
903 buf = s2;
904 }
905 else
906 {
907 /*
908 * nope, copy the raw DER data
909 */
910 p = (unsigned char *) malloc( len = buflen );
911
912 if( p == NULL )
913 return( 1 );
914
915 memcpy( p, buf, buflen );
916
917 buflen = 0;
918 }
919
920 crt->raw.p = p;
921 crt->raw.len = len;
922 end = p + len;
923
924 /*
925 * Certificate ::= SEQUENCE {
926 * tbsCertificate TBSCertificate,
927 * signatureAlgorithm AlgorithmIdentifier,
928 * signatureValue BIT STRING }
929 */
930 if( ( ret = asn1_get_tag( &p, end, &len,
931 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
932 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000933 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000934 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT );
Paul Bakker5121ce52009-01-03 21:22:43 +0000935 }
936
937 if( len != (int) ( end - p ) )
938 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000939 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000940 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
941 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +0000942 }
943
944 /*
945 * TBSCertificate ::= SEQUENCE {
946 */
947 crt->tbs.p = p;
948
949 if( ( ret = asn1_get_tag( &p, end, &len,
950 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
951 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000952 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000953 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000954 }
955
956 end = p + len;
957 crt->tbs.len = end - crt->tbs.p;
958
959 /*
960 * Version ::= INTEGER { v1(0), v2(1), v3(2) }
961 *
962 * CertificateSerialNumber ::= INTEGER
963 *
964 * signature AlgorithmIdentifier
965 */
966 if( ( ret = x509_get_version( &p, end, &crt->version ) ) != 0 ||
967 ( ret = x509_get_serial( &p, end, &crt->serial ) ) != 0 ||
968 ( ret = x509_get_alg( &p, end, &crt->sig_oid1 ) ) != 0 )
969 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000970 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +0000971 return( ret );
972 }
973
974 crt->version++;
975
976 if( crt->version > 3 )
977 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000978 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000979 return( POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION );
Paul Bakker5121ce52009-01-03 21:22:43 +0000980 }
981
Paul Bakker27d66162010-03-17 06:56:01 +0000982 if( ( ret = x509_get_sig_alg( &crt->sig_oid1, &crt->sig_alg ) ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000983 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000984 x509_free( crt );
Paul Bakker27d66162010-03-17 06:56:01 +0000985 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000986 }
987
988 /*
989 * issuer Name
990 */
991 crt->issuer_raw.p = p;
992
993 if( ( ret = asn1_get_tag( &p, end, &len,
994 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
995 {
Paul Bakker7d06ad22009-05-02 15:53:56 +0000996 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +0000997 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000998 }
999
1000 if( ( ret = x509_get_name( &p, p + len, &crt->issuer ) ) != 0 )
1001 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001002 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001003 return( ret );
1004 }
1005
1006 crt->issuer_raw.len = p - crt->issuer_raw.p;
1007
1008 /*
1009 * Validity ::= SEQUENCE {
1010 * notBefore Time,
1011 * notAfter Time }
1012 *
1013 */
1014 if( ( ret = x509_get_dates( &p, end, &crt->valid_from,
1015 &crt->valid_to ) ) != 0 )
1016 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001017 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001018 return( ret );
1019 }
1020
1021 /*
1022 * subject Name
1023 */
1024 crt->subject_raw.p = p;
1025
1026 if( ( ret = asn1_get_tag( &p, end, &len,
1027 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1028 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001029 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001030 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001031 }
1032
1033 if( ( ret = x509_get_name( &p, p + len, &crt->subject ) ) != 0 )
1034 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001035 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001036 return( ret );
1037 }
1038
1039 crt->subject_raw.len = p - crt->subject_raw.p;
1040
1041 /*
1042 * SubjectPublicKeyInfo ::= SEQUENCE
1043 * algorithm AlgorithmIdentifier,
1044 * subjectPublicKey BIT STRING }
1045 */
1046 if( ( ret = asn1_get_tag( &p, end, &len,
1047 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1048 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001049 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001050 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001051 }
1052
1053 if( ( ret = x509_get_pubkey( &p, p + len, &crt->pk_oid,
1054 &crt->rsa.N, &crt->rsa.E ) ) != 0 )
1055 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001056 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001057 return( ret );
1058 }
1059
1060 if( ( ret = rsa_check_pubkey( &crt->rsa ) ) != 0 )
1061 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001062 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001063 return( ret );
1064 }
1065
1066 crt->rsa.len = mpi_size( &crt->rsa.N );
1067
1068 /*
1069 * issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
1070 * -- If present, version shall be v2 or v3
1071 * subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
1072 * -- If present, version shall be v2 or v3
1073 * extensions [3] EXPLICIT Extensions OPTIONAL
1074 * -- If present, version shall be v3
1075 */
1076 if( crt->version == 2 || crt->version == 3 )
1077 {
1078 ret = x509_get_uid( &p, end, &crt->issuer_id, 1 );
1079 if( ret != 0 )
1080 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001081 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001082 return( ret );
1083 }
1084 }
1085
1086 if( crt->version == 2 || crt->version == 3 )
1087 {
1088 ret = x509_get_uid( &p, end, &crt->subject_id, 2 );
1089 if( ret != 0 )
1090 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001091 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001092 return( ret );
1093 }
1094 }
1095
1096 if( crt->version == 3 )
1097 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001098 ret = x509_get_crt_ext( &p, end, &crt->v3_ext,
Paul Bakker5121ce52009-01-03 21:22:43 +00001099 &crt->ca_istrue, &crt->max_pathlen );
1100 if( ret != 0 )
1101 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001102 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001103 return( ret );
1104 }
1105 }
1106
1107 if( p != end )
1108 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001109 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001110 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1111 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001112 }
1113
1114 end = crt->raw.p + crt->raw.len;
1115
1116 /*
1117 * signatureAlgorithm AlgorithmIdentifier,
1118 * signatureValue BIT STRING
1119 */
1120 if( ( ret = x509_get_alg( &p, end, &crt->sig_oid2 ) ) != 0 )
1121 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001122 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001123 return( ret );
1124 }
1125
Paul Bakker320a4b52009-03-28 18:52:39 +00001126 if( memcmp( crt->sig_oid1.p, crt->sig_oid2.p, crt->sig_oid1.len ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00001127 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001128 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001129 return( POLARSSL_ERR_X509_CERT_SIG_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001130 }
1131
1132 if( ( ret = x509_get_sig( &p, end, &crt->sig ) ) != 0 )
1133 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001134 x509_free( crt );
Paul Bakker5121ce52009-01-03 21:22:43 +00001135 return( ret );
1136 }
1137
1138 if( p != end )
1139 {
Paul Bakker7d06ad22009-05-02 15:53:56 +00001140 x509_free( crt );
Paul Bakker40e46942009-01-03 21:51:57 +00001141 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1142 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001143 }
1144
Paul Bakker5121ce52009-01-03 21:22:43 +00001145 if( buflen > 0 )
Paul Bakker320a4b52009-03-28 18:52:39 +00001146 {
1147 crt->next = (x509_cert *) malloc( sizeof( x509_cert ) );
1148
Paul Bakker7d06ad22009-05-02 15:53:56 +00001149 if( crt->next == NULL )
1150 {
Paul Bakker320a4b52009-03-28 18:52:39 +00001151 x509_free( crt );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001152 return( 1 );
1153 }
Paul Bakker320a4b52009-03-28 18:52:39 +00001154
Paul Bakker7d06ad22009-05-02 15:53:56 +00001155 crt = crt->next;
1156 memset( crt, 0, sizeof( x509_cert ) );
Paul Bakker320a4b52009-03-28 18:52:39 +00001157
Paul Bakker5121ce52009-01-03 21:22:43 +00001158 return( x509parse_crt( crt, buf, buflen ) );
Paul Bakker320a4b52009-03-28 18:52:39 +00001159 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001160
1161 return( 0 );
1162}
1163
1164/*
Paul Bakkerd98030e2009-05-02 15:13:40 +00001165 * Parse one or more CRLs and add them to the chained list
1166 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001167int x509parse_crl( x509_crl *chain, const unsigned char *buf, int buflen )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001168{
1169 int ret, len;
1170 unsigned char *s1, *s2;
1171 unsigned char *p, *end;
1172 x509_crl *crl;
1173
1174 crl = chain;
1175
1176 /*
1177 * Check for valid input
1178 */
1179 if( crl == NULL || buf == NULL )
1180 return( 1 );
1181
1182 while( crl->version != 0 && crl->next != NULL )
1183 crl = crl->next;
1184
1185 /*
1186 * Add new CRL on the end of the chain if needed.
1187 */
1188 if ( crl->version != 0 && crl->next == NULL)
1189 {
1190 crl->next = (x509_crl *) malloc( sizeof( x509_crl ) );
1191
Paul Bakker7d06ad22009-05-02 15:53:56 +00001192 if( crl->next == NULL )
1193 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001194 x509_crl_free( crl );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001195 return( 1 );
1196 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001197
Paul Bakker7d06ad22009-05-02 15:53:56 +00001198 crl = crl->next;
1199 memset( crl, 0, sizeof( x509_crl ) );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001200 }
1201
1202 /*
1203 * check if the CRL is encoded in base64
1204 */
1205 s1 = (unsigned char *) strstr( (char *) buf,
1206 "-----BEGIN X509 CRL-----" );
1207
1208 if( s1 != NULL )
1209 {
1210 s2 = (unsigned char *) strstr( (char *) buf,
1211 "-----END X509 CRL-----" );
1212
1213 if( s2 == NULL || s2 <= s1 )
1214 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1215
1216 s1 += 24;
1217 if( *s1 == '\r' ) s1++;
1218 if( *s1 == '\n' ) s1++;
1219 else return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1220
1221 /*
1222 * get the DER data length and decode the buffer
1223 */
1224 len = 0;
1225 ret = base64_decode( NULL, &len, s1, s2 - s1 );
1226
1227 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
1228 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
1229
1230 if( ( p = (unsigned char *) malloc( len ) ) == NULL )
1231 return( 1 );
1232
1233 if( ( ret = base64_decode( p, &len, s1, s2 - s1 ) ) != 0 )
1234 {
1235 free( p );
1236 return( POLARSSL_ERR_X509_CERT_INVALID_PEM | ret );
1237 }
1238
1239 /*
1240 * update the buffer size and offset
1241 */
1242 s2 += 22;
1243 if( *s2 == '\r' ) s2++;
1244 if( *s2 == '\n' ) s2++;
1245 else
1246 {
1247 free( p );
1248 return( POLARSSL_ERR_X509_CERT_INVALID_PEM );
1249 }
1250
1251 buflen -= s2 - buf;
1252 buf = s2;
1253 }
1254 else
1255 {
1256 /*
1257 * nope, copy the raw DER data
1258 */
1259 p = (unsigned char *) malloc( len = buflen );
1260
1261 if( p == NULL )
1262 return( 1 );
1263
1264 memcpy( p, buf, buflen );
1265
1266 buflen = 0;
1267 }
1268
1269 crl->raw.p = p;
1270 crl->raw.len = len;
1271 end = p + len;
1272
1273 /*
1274 * CertificateList ::= SEQUENCE {
1275 * tbsCertList TBSCertList,
1276 * signatureAlgorithm AlgorithmIdentifier,
1277 * signatureValue BIT STRING }
1278 */
1279 if( ( ret = asn1_get_tag( &p, end, &len,
1280 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1281 {
1282 x509_crl_free( crl );
1283 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT );
1284 }
1285
1286 if( len != (int) ( end - p ) )
1287 {
1288 x509_crl_free( crl );
1289 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1290 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1291 }
1292
1293 /*
1294 * TBSCertList ::= SEQUENCE {
1295 */
1296 crl->tbs.p = p;
1297
1298 if( ( ret = asn1_get_tag( &p, end, &len,
1299 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1300 {
1301 x509_crl_free( crl );
1302 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
1303 }
1304
1305 end = p + len;
1306 crl->tbs.len = end - crl->tbs.p;
1307
1308 /*
1309 * Version ::= INTEGER OPTIONAL { v1(0), v2(1) }
1310 * -- if present, MUST be v2
1311 *
1312 * signature AlgorithmIdentifier
1313 */
1314 if( ( ret = x509_get_version( &p, end, &crl->version ) ) != 0 ||
1315 ( ret = x509_get_alg( &p, end, &crl->sig_oid1 ) ) != 0 )
1316 {
1317 x509_crl_free( crl );
1318 return( ret );
1319 }
1320
1321 crl->version++;
1322
1323 if( crl->version > 2 )
1324 {
1325 x509_crl_free( crl );
1326 return( POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION );
1327 }
1328
Paul Bakker27d66162010-03-17 06:56:01 +00001329 if( ( ret = x509_get_sig_alg( &crl->sig_oid1, &crl->sig_alg ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001330 {
1331 x509_crl_free( crl );
1332 return( POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG );
1333 }
1334
1335 /*
1336 * issuer Name
1337 */
1338 crl->issuer_raw.p = p;
1339
1340 if( ( ret = asn1_get_tag( &p, end, &len,
1341 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1342 {
1343 x509_crl_free( crl );
1344 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT | ret );
1345 }
1346
1347 if( ( ret = x509_get_name( &p, p + len, &crl->issuer ) ) != 0 )
1348 {
1349 x509_crl_free( crl );
1350 return( ret );
1351 }
1352
1353 crl->issuer_raw.len = p - crl->issuer_raw.p;
1354
1355 /*
1356 * thisUpdate Time
1357 * nextUpdate Time OPTIONAL
1358 */
Paul Bakker91200182010-02-18 21:26:15 +00001359 if( ( ret = x509_get_time( &p, end, &crl->this_update ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001360 {
1361 x509_crl_free( crl );
1362 return( ret );
1363 }
1364
Paul Bakker91200182010-02-18 21:26:15 +00001365 if( ( ret = x509_get_time( &p, end, &crl->next_update ) ) != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001366 {
Paul Bakker635f4b42009-07-20 20:34:41 +00001367 if ( ret != ( POLARSSL_ERR_X509_CERT_INVALID_DATE |
Paul Bakker9be19372009-07-27 20:21:53 +00001368 POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) &&
1369 ret != ( POLARSSL_ERR_X509_CERT_INVALID_DATE |
1370 POLARSSL_ERR_ASN1_OUT_OF_DATA ) )
Paul Bakker635f4b42009-07-20 20:34:41 +00001371 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001372 x509_crl_free( crl );
1373 return( ret );
1374 }
1375 }
1376
1377 /*
1378 * revokedCertificates SEQUENCE OF SEQUENCE {
1379 * userCertificate CertificateSerialNumber,
1380 * revocationDate Time,
1381 * crlEntryExtensions Extensions OPTIONAL
1382 * -- if present, MUST be v2
1383 * } OPTIONAL
1384 */
1385 if( ( ret = x509_get_entries( &p, end, &crl->entry ) ) != 0 )
1386 {
1387 x509_crl_free( crl );
1388 return( ret );
1389 }
1390
1391 /*
1392 * crlExtensions EXPLICIT Extensions OPTIONAL
1393 * -- if present, MUST be v2
1394 */
1395 if( crl->version == 2 )
1396 {
1397 ret = x509_get_crl_ext( &p, end, &crl->crl_ext );
1398
1399 if( ret != 0 )
1400 {
1401 x509_crl_free( crl );
1402 return( ret );
1403 }
1404 }
1405
1406 if( p != end )
1407 {
1408 x509_crl_free( crl );
1409 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1410 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1411 }
1412
1413 end = crl->raw.p + crl->raw.len;
1414
1415 /*
1416 * signatureAlgorithm AlgorithmIdentifier,
1417 * signatureValue BIT STRING
1418 */
1419 if( ( ret = x509_get_alg( &p, end, &crl->sig_oid2 ) ) != 0 )
1420 {
1421 x509_crl_free( crl );
1422 return( ret );
1423 }
1424
1425 if( memcmp( crl->sig_oid1.p, crl->sig_oid2.p, crl->sig_oid1.len ) != 0 )
1426 {
1427 x509_crl_free( crl );
1428 return( POLARSSL_ERR_X509_CERT_SIG_MISMATCH );
1429 }
1430
1431 if( ( ret = x509_get_sig( &p, end, &crl->sig ) ) != 0 )
1432 {
1433 x509_crl_free( crl );
1434 return( ret );
1435 }
1436
1437 if( p != end )
1438 {
1439 x509_crl_free( crl );
1440 return( POLARSSL_ERR_X509_CERT_INVALID_FORMAT |
1441 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
1442 }
1443
1444 if( buflen > 0 )
1445 {
1446 crl->next = (x509_crl *) malloc( sizeof( x509_crl ) );
1447
Paul Bakker7d06ad22009-05-02 15:53:56 +00001448 if( crl->next == NULL )
1449 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001450 x509_crl_free( crl );
Paul Bakker7d06ad22009-05-02 15:53:56 +00001451 return( 1 );
1452 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001453
Paul Bakker7d06ad22009-05-02 15:53:56 +00001454 crl = crl->next;
1455 memset( crl, 0, sizeof( x509_crl ) );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001456
1457 return( x509parse_crl( crl, buf, buflen ) );
1458 }
1459
1460 return( 0 );
1461}
1462
1463/*
Paul Bakker2b245eb2009-04-19 18:44:26 +00001464 * Load all data from a file into a given buffer.
1465 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001466int load_file( const char *path, unsigned char **buf, size_t *n )
Paul Bakker2b245eb2009-04-19 18:44:26 +00001467{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001468 FILE *f;
Paul Bakker2b245eb2009-04-19 18:44:26 +00001469
Paul Bakkerd98030e2009-05-02 15:13:40 +00001470 if( ( f = fopen( path, "rb" ) ) == NULL )
1471 return( 1 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001472
Paul Bakkerd98030e2009-05-02 15:13:40 +00001473 fseek( f, 0, SEEK_END );
1474 *n = (size_t) ftell( f );
1475 fseek( f, 0, SEEK_SET );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001476
Paul Bakkerd98030e2009-05-02 15:13:40 +00001477 if( ( *buf = (unsigned char *) malloc( *n + 1 ) ) == NULL )
1478 return( 1 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001479
Paul Bakkerd98030e2009-05-02 15:13:40 +00001480 if( fread( *buf, 1, *n, f ) != *n )
1481 {
1482 fclose( f );
1483 free( *buf );
1484 return( 1 );
1485 }
Paul Bakker2b245eb2009-04-19 18:44:26 +00001486
Paul Bakkerd98030e2009-05-02 15:13:40 +00001487 fclose( f );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001488
Paul Bakkerd98030e2009-05-02 15:13:40 +00001489 (*buf)[*n] = '\0';
Paul Bakker2b245eb2009-04-19 18:44:26 +00001490
Paul Bakkerd98030e2009-05-02 15:13:40 +00001491 return( 0 );
Paul Bakker2b245eb2009-04-19 18:44:26 +00001492}
1493
1494/*
Paul Bakker5121ce52009-01-03 21:22:43 +00001495 * Load one or more certificates and add them to the chained list
1496 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001497int x509parse_crtfile( x509_cert *chain, const char *path )
Paul Bakker5121ce52009-01-03 21:22:43 +00001498{
1499 int ret;
Paul Bakker5121ce52009-01-03 21:22:43 +00001500 size_t n;
1501 unsigned char *buf;
1502
Paul Bakker2b245eb2009-04-19 18:44:26 +00001503 if ( load_file( path, &buf, &n ) )
Paul Bakker5121ce52009-01-03 21:22:43 +00001504 return( 1 );
1505
Paul Bakker5121ce52009-01-03 21:22:43 +00001506 ret = x509parse_crt( chain, buf, (int) n );
1507
1508 memset( buf, 0, n + 1 );
1509 free( buf );
Paul Bakker5121ce52009-01-03 21:22:43 +00001510
1511 return( ret );
1512}
1513
Paul Bakkerd98030e2009-05-02 15:13:40 +00001514/*
1515 * Load one or more CRLs and add them to the chained list
1516 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001517int x509parse_crlfile( x509_crl *chain, const char *path )
Paul Bakkerd98030e2009-05-02 15:13:40 +00001518{
1519 int ret;
1520 size_t n;
1521 unsigned char *buf;
1522
1523 if ( load_file( path, &buf, &n ) )
1524 return( 1 );
1525
1526 ret = x509parse_crl( chain, buf, (int) n );
1527
1528 memset( buf, 0, n + 1 );
1529 free( buf );
1530
1531 return( ret );
1532}
1533
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001534#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001535/*
1536 * Read a 16-byte hex string and convert it to binary
1537 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001538static int x509_get_iv( const unsigned char *s, unsigned char iv[8] )
Paul Bakker5121ce52009-01-03 21:22:43 +00001539{
1540 int i, j, k;
1541
1542 memset( iv, 0, 8 );
1543
1544 for( i = 0; i < 16; i++, s++ )
1545 {
1546 if( *s >= '0' && *s <= '9' ) j = *s - '0'; else
1547 if( *s >= 'A' && *s <= 'F' ) j = *s - '7'; else
1548 if( *s >= 'a' && *s <= 'f' ) j = *s - 'W'; else
Paul Bakker40e46942009-01-03 21:51:57 +00001549 return( POLARSSL_ERR_X509_KEY_INVALID_ENC_IV );
Paul Bakker5121ce52009-01-03 21:22:43 +00001550
1551 k = ( ( i & 1 ) != 0 ) ? j : j << 4;
1552
1553 iv[i >> 1] = (unsigned char)( iv[i >> 1] | k );
1554 }
1555
1556 return( 0 );
1557}
1558
1559/*
1560 * Decrypt with 3DES-CBC, using PBKDF1 for key derivation
1561 */
1562static void x509_des3_decrypt( unsigned char des3_iv[8],
1563 unsigned char *buf, int buflen,
Paul Bakkerff60ee62010-03-16 21:09:09 +00001564 const unsigned char *pwd, int pwdlen )
Paul Bakker5121ce52009-01-03 21:22:43 +00001565{
1566 md5_context md5_ctx;
1567 des3_context des3_ctx;
1568 unsigned char md5sum[16];
1569 unsigned char des3_key[24];
1570
1571 /*
1572 * 3DES key[ 0..15] = MD5(pwd || IV)
1573 * key[16..23] = MD5(pwd || IV || 3DES key[ 0..15])
1574 */
1575 md5_starts( &md5_ctx );
1576 md5_update( &md5_ctx, pwd, pwdlen );
1577 md5_update( &md5_ctx, des3_iv, 8 );
1578 md5_finish( &md5_ctx, md5sum );
1579 memcpy( des3_key, md5sum, 16 );
1580
1581 md5_starts( &md5_ctx );
1582 md5_update( &md5_ctx, md5sum, 16 );
1583 md5_update( &md5_ctx, pwd, pwdlen );
1584 md5_update( &md5_ctx, des3_iv, 8 );
1585 md5_finish( &md5_ctx, md5sum );
1586 memcpy( des3_key + 16, md5sum, 8 );
1587
1588 des3_set3key_dec( &des3_ctx, des3_key );
1589 des3_crypt_cbc( &des3_ctx, DES_DECRYPT, buflen,
1590 des3_iv, buf, buf );
1591
1592 memset( &md5_ctx, 0, sizeof( md5_ctx ) );
1593 memset( &des3_ctx, 0, sizeof( des3_ctx ) );
1594 memset( md5sum, 0, 16 );
1595 memset( des3_key, 0, 24 );
1596}
1597#endif
1598
1599/*
1600 * Parse a private RSA key
1601 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001602int x509parse_key( rsa_context *rsa, const unsigned char *key, int keylen,
1603 const unsigned char *pwd, int pwdlen )
Paul Bakker5121ce52009-01-03 21:22:43 +00001604{
1605 int ret, len, enc;
Paul Bakkerff60ee62010-03-16 21:09:09 +00001606 unsigned char *buf, *s1, *s2;
Paul Bakker5121ce52009-01-03 21:22:43 +00001607 unsigned char *p, *end;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001608#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001609 unsigned char des3_iv[8];
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001610#else
1611 ((void) pwd);
1612 ((void) pwdlen);
1613#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00001614
Paul Bakkerff60ee62010-03-16 21:09:09 +00001615 s1 = (unsigned char *) strstr( (char *) key,
Paul Bakker5121ce52009-01-03 21:22:43 +00001616 "-----BEGIN RSA PRIVATE KEY-----" );
1617
1618 if( s1 != NULL )
1619 {
Paul Bakkerff60ee62010-03-16 21:09:09 +00001620 s2 = (unsigned char *) strstr( (char *) key,
Paul Bakker5121ce52009-01-03 21:22:43 +00001621 "-----END RSA PRIVATE KEY-----" );
1622
1623 if( s2 == NULL || s2 <= s1 )
Paul Bakker40e46942009-01-03 21:51:57 +00001624 return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001625
1626 s1 += 31;
1627 if( *s1 == '\r' ) s1++;
1628 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001629 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001630
1631 enc = 0;
1632
1633 if( memcmp( s1, "Proc-Type: 4,ENCRYPTED", 22 ) == 0 )
1634 {
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001635#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001636 enc++;
1637
1638 s1 += 22;
1639 if( *s1 == '\r' ) s1++;
1640 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001641 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001642
1643 if( memcmp( s1, "DEK-Info: DES-EDE3-CBC,", 23 ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00001644 return( POLARSSL_ERR_X509_KEY_UNKNOWN_ENC_ALG );
Paul Bakker5121ce52009-01-03 21:22:43 +00001645
1646 s1 += 23;
1647 if( x509_get_iv( s1, des3_iv ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00001648 return( POLARSSL_ERR_X509_KEY_INVALID_ENC_IV );
Paul Bakker5121ce52009-01-03 21:22:43 +00001649
1650 s1 += 16;
1651 if( *s1 == '\r' ) s1++;
1652 if( *s1 == '\n' ) s1++;
Paul Bakker40e46942009-01-03 21:51:57 +00001653 else return( POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001654#else
Paul Bakker40e46942009-01-03 21:51:57 +00001655 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
Paul Bakker5121ce52009-01-03 21:22:43 +00001656#endif
1657 }
1658
1659 len = 0;
1660 ret = base64_decode( NULL, &len, s1, s2 - s1 );
1661
Paul Bakker40e46942009-01-03 21:51:57 +00001662 if( ret == POLARSSL_ERR_BASE64_INVALID_CHARACTER )
1663 return( ret | POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001664
1665 if( ( buf = (unsigned char *) malloc( len ) ) == NULL )
1666 return( 1 );
1667
1668 if( ( ret = base64_decode( buf, &len, s1, s2 - s1 ) ) != 0 )
1669 {
1670 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001671 return( ret | POLARSSL_ERR_X509_KEY_INVALID_PEM );
Paul Bakker5121ce52009-01-03 21:22:43 +00001672 }
1673
Paul Bakkerff60ee62010-03-16 21:09:09 +00001674 keylen = len;
Paul Bakker5121ce52009-01-03 21:22:43 +00001675
1676 if( enc != 0 )
1677 {
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00001678#if defined(POLARSSL_DES_C) && defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00001679 if( pwd == NULL )
1680 {
1681 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001682 return( POLARSSL_ERR_X509_KEY_PASSWORD_REQUIRED );
Paul Bakker5121ce52009-01-03 21:22:43 +00001683 }
1684
Paul Bakkerff60ee62010-03-16 21:09:09 +00001685 x509_des3_decrypt( des3_iv, buf, keylen, pwd, pwdlen );
Paul Bakker5121ce52009-01-03 21:22:43 +00001686
1687 if( buf[0] != 0x30 || buf[1] != 0x82 ||
1688 buf[4] != 0x02 || buf[5] != 0x01 )
1689 {
1690 free( buf );
Paul Bakker40e46942009-01-03 21:51:57 +00001691 return( POLARSSL_ERR_X509_KEY_PASSWORD_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001692 }
1693#else
Paul Bakker40e46942009-01-03 21:51:57 +00001694 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
Paul Bakker5121ce52009-01-03 21:22:43 +00001695#endif
1696 }
1697 }
Paul Bakkerff60ee62010-03-16 21:09:09 +00001698 else
1699 {
1700 buf = NULL;
1701 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001702
1703 memset( rsa, 0, sizeof( rsa_context ) );
1704
Paul Bakkerff60ee62010-03-16 21:09:09 +00001705 p = ( s1 != NULL ) ? buf : (unsigned char *) key;
1706 end = p + keylen;
Paul Bakker5121ce52009-01-03 21:22:43 +00001707
1708 /*
1709 * RSAPrivateKey ::= SEQUENCE {
1710 * version Version,
1711 * modulus INTEGER, -- n
1712 * publicExponent INTEGER, -- e
1713 * privateExponent INTEGER, -- d
1714 * prime1 INTEGER, -- p
1715 * prime2 INTEGER, -- q
1716 * exponent1 INTEGER, -- d mod (p-1)
1717 * exponent2 INTEGER, -- d mod (q-1)
1718 * coefficient INTEGER, -- (inverse of q) mod p
1719 * otherPrimeInfos OtherPrimeInfos OPTIONAL
1720 * }
1721 */
1722 if( ( ret = asn1_get_tag( &p, end, &len,
1723 ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 )
1724 {
1725 if( s1 != NULL )
1726 free( buf );
1727
1728 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001729 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001730 }
1731
1732 end = p + len;
1733
1734 if( ( ret = asn1_get_int( &p, end, &rsa->ver ) ) != 0 )
1735 {
1736 if( s1 != NULL )
1737 free( buf );
1738
1739 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001740 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT | ret );
Paul Bakker5121ce52009-01-03 21:22:43 +00001741 }
1742
1743 if( rsa->ver != 0 )
1744 {
1745 if( s1 != NULL )
1746 free( buf );
1747
1748 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001749 return( ret | POLARSSL_ERR_X509_KEY_INVALID_VERSION );
Paul Bakker5121ce52009-01-03 21:22:43 +00001750 }
1751
1752 if( ( ret = asn1_get_mpi( &p, end, &rsa->N ) ) != 0 ||
1753 ( ret = asn1_get_mpi( &p, end, &rsa->E ) ) != 0 ||
1754 ( ret = asn1_get_mpi( &p, end, &rsa->D ) ) != 0 ||
1755 ( ret = asn1_get_mpi( &p, end, &rsa->P ) ) != 0 ||
1756 ( ret = asn1_get_mpi( &p, end, &rsa->Q ) ) != 0 ||
1757 ( ret = asn1_get_mpi( &p, end, &rsa->DP ) ) != 0 ||
1758 ( ret = asn1_get_mpi( &p, end, &rsa->DQ ) ) != 0 ||
1759 ( ret = asn1_get_mpi( &p, end, &rsa->QP ) ) != 0 )
1760 {
1761 if( s1 != NULL )
1762 free( buf );
1763
1764 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001765 return( ret | POLARSSL_ERR_X509_KEY_INVALID_FORMAT );
Paul Bakker5121ce52009-01-03 21:22:43 +00001766 }
1767
1768 rsa->len = mpi_size( &rsa->N );
1769
1770 if( p != end )
1771 {
1772 if( s1 != NULL )
1773 free( buf );
1774
1775 rsa_free( rsa );
Paul Bakker40e46942009-01-03 21:51:57 +00001776 return( POLARSSL_ERR_X509_KEY_INVALID_FORMAT |
1777 POLARSSL_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakker5121ce52009-01-03 21:22:43 +00001778 }
1779
1780 if( ( ret = rsa_check_privkey( rsa ) ) != 0 )
1781 {
1782 if( s1 != NULL )
1783 free( buf );
1784
1785 rsa_free( rsa );
1786 return( ret );
1787 }
1788
1789 if( s1 != NULL )
1790 free( buf );
1791
1792 return( 0 );
1793}
1794
1795/*
1796 * Load and parse a private RSA key
1797 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001798int x509parse_keyfile( rsa_context *rsa, const char *path, const char *pwd )
Paul Bakker5121ce52009-01-03 21:22:43 +00001799{
1800 int ret;
Paul Bakker5121ce52009-01-03 21:22:43 +00001801 size_t n;
1802 unsigned char *buf;
1803
Paul Bakker2b245eb2009-04-19 18:44:26 +00001804 if ( load_file( path, &buf, &n ) )
Paul Bakker5121ce52009-01-03 21:22:43 +00001805 return( 1 );
1806
Paul Bakker5121ce52009-01-03 21:22:43 +00001807 if( pwd == NULL )
1808 ret = x509parse_key( rsa, buf, (int) n, NULL, 0 );
1809 else
1810 ret = x509parse_key( rsa, buf, (int) n,
1811 (unsigned char *) pwd, strlen( pwd ) );
1812
1813 memset( buf, 0, n + 1 );
1814 free( buf );
Paul Bakker5121ce52009-01-03 21:22:43 +00001815
1816 return( ret );
1817}
1818
1819#if defined _MSC_VER && !defined snprintf
Paul Bakkerd98030e2009-05-02 15:13:40 +00001820#include <stdarg.h>
1821
1822#if !defined vsnprintf
1823#define vsnprintf _vsnprintf
1824#endif // vsnprintf
1825
1826/*
1827 * Windows _snprintf and _vsnprintf are not compatible to linux versions.
1828 * Result value is not size of buffer needed, but -1 if no fit is possible.
1829 *
1830 * This fuction tries to 'fix' this by at least suggesting enlarging the
1831 * size by 20.
1832 */
1833int compat_snprintf(char *str, size_t size, const char *format, ...)
1834{
1835 va_list ap;
1836 int res = -1;
1837
1838 va_start( ap, format );
1839
1840 res = vsnprintf( str, size, format, ap );
1841
1842 va_end( ap );
1843
1844 // No quick fix possible
1845 if ( res < 0 )
1846 return( size + 20 );
1847
1848 return res;
1849}
1850
1851#define snprintf compat_snprintf
Paul Bakker5121ce52009-01-03 21:22:43 +00001852#endif
1853
Paul Bakkerd98030e2009-05-02 15:13:40 +00001854#define POLARSSL_ERR_DEBUG_BUF_TOO_SMALL -2
1855
1856#define SAFE_SNPRINTF() \
1857{ \
1858 if( ret == -1 ) \
1859 return( -1 ); \
1860 \
1861 if ( ret > n ) { \
1862 p[n - 1] = '\0'; \
1863 return POLARSSL_ERR_DEBUG_BUF_TOO_SMALL;\
1864 } \
1865 \
1866 n -= ret; \
1867 p += ret; \
1868}
1869
Paul Bakker5121ce52009-01-03 21:22:43 +00001870/*
1871 * Store the name in printable form into buf; no more
Paul Bakkerd98030e2009-05-02 15:13:40 +00001872 * than size characters will be written
Paul Bakker5121ce52009-01-03 21:22:43 +00001873 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001874int x509parse_dn_gets( char *buf, size_t size, const x509_name *dn )
Paul Bakker5121ce52009-01-03 21:22:43 +00001875{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001876 int i, ret, n;
Paul Bakker5121ce52009-01-03 21:22:43 +00001877 unsigned char c;
Paul Bakkerff60ee62010-03-16 21:09:09 +00001878 const x509_name *name;
Paul Bakker5121ce52009-01-03 21:22:43 +00001879 char s[128], *p;
1880
1881 memset( s, 0, sizeof( s ) );
1882
1883 name = dn;
1884 p = buf;
Paul Bakkerd98030e2009-05-02 15:13:40 +00001885 n = size;
Paul Bakker5121ce52009-01-03 21:22:43 +00001886
1887 while( name != NULL )
1888 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00001889 if( name != dn ) {
1890 ret = snprintf( p, n, ", " );
1891 SAFE_SNPRINTF();
1892 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001893
1894 if( memcmp( name->oid.p, OID_X520, 2 ) == 0 )
1895 {
1896 switch( name->oid.p[2] )
1897 {
1898 case X520_COMMON_NAME:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001899 ret = snprintf( p, n, "CN=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001900
1901 case X520_COUNTRY:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001902 ret = snprintf( p, n, "C=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001903
1904 case X520_LOCALITY:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001905 ret = snprintf( p, n, "L=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001906
1907 case X520_STATE:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001908 ret = snprintf( p, n, "ST=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001909
1910 case X520_ORGANIZATION:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001911 ret = snprintf( p, n, "O=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001912
1913 case X520_ORG_UNIT:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001914 ret = snprintf( p, n, "OU=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001915
1916 default:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001917 ret = snprintf( p, n, "0x%02X=",
Paul Bakker5121ce52009-01-03 21:22:43 +00001918 name->oid.p[2] );
1919 break;
1920 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001921 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001922 }
1923 else if( memcmp( name->oid.p, OID_PKCS9, 8 ) == 0 )
1924 {
1925 switch( name->oid.p[8] )
1926 {
1927 case PKCS9_EMAIL:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001928 ret = snprintf( p, n, "emailAddress=" ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00001929
1930 default:
Paul Bakkerd98030e2009-05-02 15:13:40 +00001931 ret = snprintf( p, n, "0x%02X=",
Paul Bakker5121ce52009-01-03 21:22:43 +00001932 name->oid.p[8] );
1933 break;
1934 }
Paul Bakkerd98030e2009-05-02 15:13:40 +00001935 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001936 }
1937 else
Paul Bakkerd98030e2009-05-02 15:13:40 +00001938 {
1939 ret = snprintf( p, n, "\?\?=" );
1940 SAFE_SNPRINTF();
1941 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001942
1943 for( i = 0; i < name->val.len; i++ )
1944 {
1945 if( i >= (int) sizeof( s ) - 1 )
1946 break;
1947
1948 c = name->val.p[i];
1949 if( c < 32 || c == 127 || ( c > 128 && c < 160 ) )
1950 s[i] = '?';
1951 else s[i] = c;
1952 }
1953 s[i] = '\0';
Paul Bakkerd98030e2009-05-02 15:13:40 +00001954 ret = snprintf( p, n, "%s", s );
1955 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001956 name = name->next;
1957 }
1958
Paul Bakkerd98030e2009-05-02 15:13:40 +00001959 return( size - n );
Paul Bakker5121ce52009-01-03 21:22:43 +00001960}
1961
1962/*
Paul Bakkerd98030e2009-05-02 15:13:40 +00001963 * Return an informational string about the certificate.
Paul Bakker5121ce52009-01-03 21:22:43 +00001964 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00001965int x509parse_cert_info( char *buf, size_t size, const char *prefix,
1966 const x509_cert *crt )
Paul Bakker5121ce52009-01-03 21:22:43 +00001967{
Paul Bakkerd98030e2009-05-02 15:13:40 +00001968 int i, n, nr, ret;
1969 char *p;
Paul Bakker5121ce52009-01-03 21:22:43 +00001970
1971 p = buf;
Paul Bakkerd98030e2009-05-02 15:13:40 +00001972 n = size;
Paul Bakker5121ce52009-01-03 21:22:43 +00001973
Paul Bakkerd98030e2009-05-02 15:13:40 +00001974 ret = snprintf( p, n, "%scert. version : %d\n",
Paul Bakker5121ce52009-01-03 21:22:43 +00001975 prefix, crt->version );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001976 SAFE_SNPRINTF();
1977 ret = snprintf( p, n, "%sserial number : ",
Paul Bakker5121ce52009-01-03 21:22:43 +00001978 prefix );
Paul Bakkerd98030e2009-05-02 15:13:40 +00001979 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001980
Paul Bakkerd98030e2009-05-02 15:13:40 +00001981 nr = ( crt->serial.len <= 32 )
Paul Bakker5121ce52009-01-03 21:22:43 +00001982 ? crt->serial.len : 32;
1983
Paul Bakkerd98030e2009-05-02 15:13:40 +00001984 for( i = 0; i < nr; i++ )
1985 {
1986 ret = snprintf( p, n, "%02X%s",
1987 crt->serial.p[i], ( i < nr - 1 ) ? ":" : "" );
1988 SAFE_SNPRINTF();
1989 }
Paul Bakker5121ce52009-01-03 21:22:43 +00001990
Paul Bakkerd98030e2009-05-02 15:13:40 +00001991 ret = snprintf( p, n, "\n%sissuer name : ", prefix );
1992 SAFE_SNPRINTF();
1993 ret = x509parse_dn_gets( p, n, &crt->issuer );
1994 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00001995
Paul Bakkerd98030e2009-05-02 15:13:40 +00001996 ret = snprintf( p, n, "\n%ssubject name : ", prefix );
1997 SAFE_SNPRINTF();
1998 ret = x509parse_dn_gets( p, n, &crt->subject );
1999 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002000
Paul Bakkerd98030e2009-05-02 15:13:40 +00002001 ret = snprintf( p, n, "\n%sissued on : " \
Paul Bakker5121ce52009-01-03 21:22:43 +00002002 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2003 crt->valid_from.year, crt->valid_from.mon,
2004 crt->valid_from.day, crt->valid_from.hour,
2005 crt->valid_from.min, crt->valid_from.sec );
Paul Bakkerd98030e2009-05-02 15:13:40 +00002006 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002007
Paul Bakkerd98030e2009-05-02 15:13:40 +00002008 ret = snprintf( p, n, "\n%sexpires on : " \
Paul Bakker5121ce52009-01-03 21:22:43 +00002009 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2010 crt->valid_to.year, crt->valid_to.mon,
2011 crt->valid_to.day, crt->valid_to.hour,
2012 crt->valid_to.min, crt->valid_to.sec );
Paul Bakkerd98030e2009-05-02 15:13:40 +00002013 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002014
Paul Bakkerd98030e2009-05-02 15:13:40 +00002015 ret = snprintf( p, n, "\n%ssigned using : RSA+", prefix );
2016 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002017
Paul Bakker27d66162010-03-17 06:56:01 +00002018 switch( crt->sig_alg )
Paul Bakker5121ce52009-01-03 21:22:43 +00002019 {
Paul Bakkerd98030e2009-05-02 15:13:40 +00002020 case SIG_RSA_MD2 : ret = snprintf( p, n, "MD2" ); break;
2021 case SIG_RSA_MD4 : ret = snprintf( p, n, "MD4" ); break;
2022 case SIG_RSA_MD5 : ret = snprintf( p, n, "MD5" ); break;
2023 case SIG_RSA_SHA1 : ret = snprintf( p, n, "SHA1" ); break;
2024 case SIG_RSA_SHA224 : ret = snprintf( p, n, "SHA224" ); break;
2025 case SIG_RSA_SHA256 : ret = snprintf( p, n, "SHA256" ); break;
2026 case SIG_RSA_SHA384 : ret = snprintf( p, n, "SHA384" ); break;
2027 case SIG_RSA_SHA512 : ret = snprintf( p, n, "SHA512" ); break;
2028 default: ret = snprintf( p, n, "???" ); break;
2029 }
2030 SAFE_SNPRINTF();
2031
2032 ret = snprintf( p, n, "\n%sRSA key size : %d bits\n", prefix,
2033 crt->rsa.N.n * (int) sizeof( unsigned long ) * 8 );
2034 SAFE_SNPRINTF();
2035
2036 return( size - n );
2037}
2038
2039/*
2040 * Return an informational string about the CRL.
2041 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002042int x509parse_crl_info( char *buf, size_t size, const char *prefix,
2043 const x509_crl *crl )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002044{
2045 int i, n, nr, ret;
2046 char *p;
Paul Bakkerff60ee62010-03-16 21:09:09 +00002047 const x509_crl_entry *entry;
Paul Bakkerd98030e2009-05-02 15:13:40 +00002048
2049 p = buf;
2050 n = size;
2051
2052 ret = snprintf( p, n, "%sCRL version : %d",
2053 prefix, crl->version );
2054 SAFE_SNPRINTF();
2055
2056 ret = snprintf( p, n, "\n%sissuer name : ", prefix );
2057 SAFE_SNPRINTF();
2058 ret = x509parse_dn_gets( p, n, &crl->issuer );
2059 SAFE_SNPRINTF();
2060
2061 ret = snprintf( p, n, "\n%sthis update : " \
2062 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2063 crl->this_update.year, crl->this_update.mon,
2064 crl->this_update.day, crl->this_update.hour,
2065 crl->this_update.min, crl->this_update.sec );
2066 SAFE_SNPRINTF();
2067
2068 ret = snprintf( p, n, "\n%snext update : " \
2069 "%04d-%02d-%02d %02d:%02d:%02d", prefix,
2070 crl->next_update.year, crl->next_update.mon,
2071 crl->next_update.day, crl->next_update.hour,
2072 crl->next_update.min, crl->next_update.sec );
2073 SAFE_SNPRINTF();
2074
2075 entry = &crl->entry;
2076
2077 ret = snprintf( p, n, "\n%sRevoked certificates:",
2078 prefix );
2079 SAFE_SNPRINTF();
2080
Paul Bakker9be19372009-07-27 20:21:53 +00002081 while( entry != NULL && entry->raw.len != 0 )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002082 {
2083 ret = snprintf( p, n, "\n%sserial number: ",
2084 prefix );
2085 SAFE_SNPRINTF();
2086
2087 nr = ( entry->serial.len <= 32 )
2088 ? entry->serial.len : 32;
2089
2090 for( i = 0; i < nr; i++ ) {
2091 ret = snprintf( p, n, "%02X%s",
2092 entry->serial.p[i], ( i < nr - 1 ) ? ":" : "" );
2093 SAFE_SNPRINTF();
2094 }
2095
2096 ret = snprintf( p, n, " revocation date: " \
2097 "%04d-%02d-%02d %02d:%02d:%02d",
2098 entry->revocation_date.year, entry->revocation_date.mon,
2099 entry->revocation_date.day, entry->revocation_date.hour,
2100 entry->revocation_date.min, entry->revocation_date.sec );
2101 SAFE_SNPRINTF();
2102
2103 entry = entry->next;
Paul Bakker5121ce52009-01-03 21:22:43 +00002104 }
2105
Paul Bakkerd98030e2009-05-02 15:13:40 +00002106 ret = snprintf( p, n, "\n%ssigned using : RSA+", prefix );
2107 SAFE_SNPRINTF();
Paul Bakker5121ce52009-01-03 21:22:43 +00002108
Paul Bakker27d66162010-03-17 06:56:01 +00002109 switch( crl->sig_alg )
Paul Bakkerd98030e2009-05-02 15:13:40 +00002110 {
2111 case SIG_RSA_MD2 : ret = snprintf( p, n, "MD2" ); break;
2112 case SIG_RSA_MD4 : ret = snprintf( p, n, "MD4" ); break;
2113 case SIG_RSA_MD5 : ret = snprintf( p, n, "MD5" ); break;
2114 case SIG_RSA_SHA1 : ret = snprintf( p, n, "SHA1" ); break;
2115 case SIG_RSA_SHA224 : ret = snprintf( p, n, "SHA224" ); break;
2116 case SIG_RSA_SHA256 : ret = snprintf( p, n, "SHA256" ); break;
2117 case SIG_RSA_SHA384 : ret = snprintf( p, n, "SHA384" ); break;
2118 case SIG_RSA_SHA512 : ret = snprintf( p, n, "SHA512" ); break;
2119 default: ret = snprintf( p, n, "???" ); break;
2120 }
2121 SAFE_SNPRINTF();
2122
Paul Bakker1e27bb22009-07-19 20:25:25 +00002123 ret = snprintf( p, n, "\n" );
2124 SAFE_SNPRINTF();
2125
Paul Bakkerd98030e2009-05-02 15:13:40 +00002126 return( size - n );
Paul Bakker5121ce52009-01-03 21:22:43 +00002127}
2128
2129/*
Paul Bakker40ea7de2009-05-03 10:18:48 +00002130 * Return 0 if the x509_time is still valid, or 1 otherwise.
Paul Bakker5121ce52009-01-03 21:22:43 +00002131 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002132int x509parse_time_expired( const x509_time *to )
Paul Bakker5121ce52009-01-03 21:22:43 +00002133{
2134 struct tm *lt;
2135 time_t tt;
2136
2137 tt = time( NULL );
2138 lt = localtime( &tt );
2139
Paul Bakker40ea7de2009-05-03 10:18:48 +00002140 if( lt->tm_year > to->year - 1900 )
2141 return( 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002142
Paul Bakker40ea7de2009-05-03 10:18:48 +00002143 if( lt->tm_year == to->year - 1900 &&
2144 lt->tm_mon > to->mon - 1 )
2145 return( 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002146
Paul Bakker40ea7de2009-05-03 10:18:48 +00002147 if( lt->tm_year == to->year - 1900 &&
2148 lt->tm_mon == to->mon - 1 &&
2149 lt->tm_mday > to->day )
2150 return( 1 );
2151
2152 return( 0 );
2153}
2154
2155/*
2156 * Return 1 if the certificate is revoked, or 0 otherwise.
2157 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002158int x509parse_revoked( const x509_cert *crt, const x509_crl *crl )
Paul Bakker40ea7de2009-05-03 10:18:48 +00002159{
Paul Bakkerff60ee62010-03-16 21:09:09 +00002160 const x509_crl_entry *cur = &crl->entry;
Paul Bakker40ea7de2009-05-03 10:18:48 +00002161
2162 while( cur != NULL && cur->serial.len != 0 )
2163 {
2164 if( memcmp( crt->serial.p, cur->serial.p, crt->serial.len ) == 0 )
2165 {
2166 if( x509parse_time_expired( &cur->revocation_date ) )
2167 return( 1 );
2168 }
2169
2170 cur = cur->next;
2171 }
Paul Bakker5121ce52009-01-03 21:22:43 +00002172
2173 return( 0 );
2174}
2175
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002176/*
2177 * Wrapper for x509 hashes.
2178 *
2179 * @param out Buffer to receive the hash (Should be at least 64 bytes)
2180 */
Paul Bakkerff60ee62010-03-16 21:09:09 +00002181static void x509_hash( const unsigned char *in, int len, int alg,
Paul Bakker5121ce52009-01-03 21:22:43 +00002182 unsigned char *out )
2183{
2184 switch( alg )
2185 {
Paul Bakker40e46942009-01-03 21:51:57 +00002186#if defined(POLARSSL_MD2_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002187 case SIG_RSA_MD2 : md2( in, len, out ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00002188#endif
Paul Bakker40e46942009-01-03 21:51:57 +00002189#if defined(POLARSSL_MD4_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002190 case SIG_RSA_MD4 : md4( in, len, out ); break;
Paul Bakker5121ce52009-01-03 21:22:43 +00002191#endif
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002192#if defined(POLARSSL_MD5_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002193 case SIG_RSA_MD5 : md5( in, len, out ); break;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002194#endif
2195#if defined(POLARSSL_SHA1_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002196 case SIG_RSA_SHA1 : sha1( in, len, out ); break;
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002197#endif
Paul Bakker4593aea2009-02-09 22:32:35 +00002198#if defined(POLARSSL_SHA2_C)
2199 case SIG_RSA_SHA224 : sha2( in, len, out, 1 ); break;
2200 case SIG_RSA_SHA256 : sha2( in, len, out, 0 ); break;
2201#endif
Paul Bakkerfe1aea72009-10-03 20:09:14 +00002202#if defined(POLARSSL_SHA4_C)
Paul Bakker4593aea2009-02-09 22:32:35 +00002203 case SIG_RSA_SHA384 : sha4( in, len, out, 1 ); break;
2204 case SIG_RSA_SHA512 : sha4( in, len, out, 0 ); break;
2205#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00002206 default:
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002207 memset( out, '\xFF', 64 );
Paul Bakker5121ce52009-01-03 21:22:43 +00002208 break;
2209 }
2210}
2211
2212/*
2213 * Verify the certificate validity
2214 */
2215int x509parse_verify( x509_cert *crt,
2216 x509_cert *trust_ca,
Paul Bakker40ea7de2009-05-03 10:18:48 +00002217 x509_crl *ca_crl,
Paul Bakkerff60ee62010-03-16 21:09:09 +00002218 const char *cn, int *flags )
Paul Bakker5121ce52009-01-03 21:22:43 +00002219{
2220 int cn_len;
2221 int hash_id;
2222 int pathlen;
2223 x509_cert *cur;
2224 x509_name *name;
Paul Bakker4593aea2009-02-09 22:32:35 +00002225 unsigned char hash[64];
Paul Bakker5121ce52009-01-03 21:22:43 +00002226
Paul Bakker40ea7de2009-05-03 10:18:48 +00002227 *flags = 0;
2228
2229 if( x509parse_time_expired( &crt->valid_to ) )
2230 *flags = BADCERT_EXPIRED;
Paul Bakker5121ce52009-01-03 21:22:43 +00002231
2232 if( cn != NULL )
2233 {
2234 name = &crt->subject;
2235 cn_len = strlen( cn );
2236
2237 while( name != NULL )
2238 {
2239 if( memcmp( name->oid.p, OID_CN, 3 ) == 0 &&
2240 memcmp( name->val.p, cn, cn_len ) == 0 &&
2241 name->val.len == cn_len )
2242 break;
2243
2244 name = name->next;
2245 }
2246
2247 if( name == NULL )
2248 *flags |= BADCERT_CN_MISMATCH;
2249 }
2250
2251 *flags |= BADCERT_NOT_TRUSTED;
2252
2253 /*
2254 * Iterate upwards in the given cert chain,
2255 * ignoring any upper cert with CA != TRUE.
2256 */
2257 cur = crt->next;
2258
2259 pathlen = 1;
2260
Paul Bakker7c6d4a42009-03-28 20:35:47 +00002261 while( cur != NULL && cur->version != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00002262 {
2263 if( cur->ca_istrue == 0 ||
2264 crt->issuer_raw.len != cur->subject_raw.len ||
2265 memcmp( crt->issuer_raw.p, cur->subject_raw.p,
2266 crt->issuer_raw.len ) != 0 )
2267 {
2268 cur = cur->next;
2269 continue;
2270 }
2271
Paul Bakker27d66162010-03-17 06:56:01 +00002272 hash_id = crt->sig_alg;
Paul Bakker5121ce52009-01-03 21:22:43 +00002273
2274 x509_hash( crt->tbs.p, crt->tbs.len, hash_id, hash );
2275
2276 if( rsa_pkcs1_verify( &cur->rsa, RSA_PUBLIC, hash_id,
2277 0, hash, crt->sig.p ) != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00002278 return( POLARSSL_ERR_X509_CERT_VERIFY_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +00002279
2280 pathlen++;
2281
2282 crt = cur;
2283 cur = crt->next;
2284 }
2285
2286 /*
2287 * Atempt to validate topmost cert with our CA chain.
2288 */
Paul Bakker7c6d4a42009-03-28 20:35:47 +00002289 while( trust_ca != NULL && trust_ca->version != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +00002290 {
2291 if( crt->issuer_raw.len != trust_ca->subject_raw.len ||
2292 memcmp( crt->issuer_raw.p, trust_ca->subject_raw.p,
2293 crt->issuer_raw.len ) != 0 )
2294 {
2295 trust_ca = trust_ca->next;
2296 continue;
2297 }
2298
2299 if( trust_ca->max_pathlen > 0 &&
2300 trust_ca->max_pathlen < pathlen )
2301 break;
2302
Paul Bakker27d66162010-03-17 06:56:01 +00002303 hash_id = crt->sig_alg;
Paul Bakker5121ce52009-01-03 21:22:43 +00002304
2305 x509_hash( crt->tbs.p, crt->tbs.len, hash_id, hash );
2306
2307 if( rsa_pkcs1_verify( &trust_ca->rsa, RSA_PUBLIC, hash_id,
2308 0, hash, crt->sig.p ) == 0 )
2309 {
2310 /*
2311 * cert. is signed by a trusted CA
2312 */
2313 *flags &= ~BADCERT_NOT_TRUSTED;
2314 break;
2315 }
2316
2317 trust_ca = trust_ca->next;
2318 }
2319
Paul Bakker40ea7de2009-05-03 10:18:48 +00002320 /*
2321 * TODO: What happens if no CRL is present?
2322 * Suggestion: Revocation state should be unknown if no CRL is present.
2323 * For backwards compatibility this is not yet implemented.
2324 */
2325
2326 /*
2327 * Check if the topmost certificate is revoked if the trusted CA is
2328 * determined.
2329 */
2330 while( trust_ca != NULL && ca_crl != NULL && ca_crl->version != 0 )
2331 {
2332 if( ca_crl->issuer_raw.len != trust_ca->subject_raw.len ||
2333 memcmp( ca_crl->issuer_raw.p, trust_ca->subject_raw.p,
2334 ca_crl->issuer_raw.len ) != 0 )
2335 {
2336 ca_crl = ca_crl->next;
2337 continue;
2338 }
2339
2340 /*
2341 * Check if CRL is correctry signed by the trusted CA
2342 */
Paul Bakker27d66162010-03-17 06:56:01 +00002343 hash_id = ca_crl->sig_alg;
Paul Bakker40ea7de2009-05-03 10:18:48 +00002344
2345 x509_hash( ca_crl->tbs.p, ca_crl->tbs.len, hash_id, hash );
2346
2347 if( !rsa_pkcs1_verify( &trust_ca->rsa, RSA_PUBLIC, hash_id,
2348 0, hash, ca_crl->sig.p ) == 0 )
2349 {
2350 /*
2351 * CRL is not trusted
2352 */
2353 *flags |= BADCRL_NOT_TRUSTED;
2354 break;
2355 }
2356
2357 /*
2358 * Check for validity of CRL (Do not drop out)
2359 */
2360 if( x509parse_time_expired( &ca_crl->next_update ) )
2361 *flags |= BADCRL_EXPIRED;
2362
2363 /*
2364 * Check if certificate is revoked
2365 */
2366 if( x509parse_revoked(crt, ca_crl) )
2367 {
2368 *flags |= BADCERT_REVOKED;
2369 break;
2370 }
2371
2372 ca_crl = ca_crl->next;
2373 }
2374
Paul Bakker5121ce52009-01-03 21:22:43 +00002375 if( *flags != 0 )
Paul Bakker40e46942009-01-03 21:51:57 +00002376 return( POLARSSL_ERR_X509_CERT_VERIFY_FAILED );
Paul Bakker5121ce52009-01-03 21:22:43 +00002377
2378 return( 0 );
2379}
2380
2381/*
2382 * Unallocate all certificate data
2383 */
2384void x509_free( x509_cert *crt )
2385{
2386 x509_cert *cert_cur = crt;
2387 x509_cert *cert_prv;
2388 x509_name *name_cur;
2389 x509_name *name_prv;
2390
2391 if( crt == NULL )
2392 return;
2393
2394 do
2395 {
2396 rsa_free( &cert_cur->rsa );
2397
2398 name_cur = cert_cur->issuer.next;
2399 while( name_cur != NULL )
2400 {
2401 name_prv = name_cur;
2402 name_cur = name_cur->next;
2403 memset( name_prv, 0, sizeof( x509_name ) );
2404 free( name_prv );
2405 }
2406
2407 name_cur = cert_cur->subject.next;
2408 while( name_cur != NULL )
2409 {
2410 name_prv = name_cur;
2411 name_cur = name_cur->next;
2412 memset( name_prv, 0, sizeof( x509_name ) );
2413 free( name_prv );
2414 }
2415
2416 if( cert_cur->raw.p != NULL )
2417 {
2418 memset( cert_cur->raw.p, 0, cert_cur->raw.len );
2419 free( cert_cur->raw.p );
2420 }
2421
2422 cert_cur = cert_cur->next;
2423 }
2424 while( cert_cur != NULL );
2425
2426 cert_cur = crt;
2427 do
2428 {
2429 cert_prv = cert_cur;
2430 cert_cur = cert_cur->next;
2431
2432 memset( cert_prv, 0, sizeof( x509_cert ) );
2433 if( cert_prv != crt )
2434 free( cert_prv );
2435 }
2436 while( cert_cur != NULL );
2437}
2438
Paul Bakkerd98030e2009-05-02 15:13:40 +00002439/*
2440 * Unallocate all CRL data
2441 */
2442void x509_crl_free( x509_crl *crl )
2443{
2444 x509_crl *crl_cur = crl;
2445 x509_crl *crl_prv;
2446 x509_name *name_cur;
2447 x509_name *name_prv;
2448 x509_crl_entry *entry_cur;
2449 x509_crl_entry *entry_prv;
2450
2451 if( crl == NULL )
2452 return;
2453
2454 do
2455 {
2456 name_cur = crl_cur->issuer.next;
2457 while( name_cur != NULL )
2458 {
2459 name_prv = name_cur;
2460 name_cur = name_cur->next;
2461 memset( name_prv, 0, sizeof( x509_name ) );
2462 free( name_prv );
2463 }
2464
2465 entry_cur = crl_cur->entry.next;
2466 while( entry_cur != NULL )
2467 {
2468 entry_prv = entry_cur;
2469 entry_cur = entry_cur->next;
2470 memset( entry_prv, 0, sizeof( x509_crl_entry ) );
2471 free( entry_prv );
2472 }
2473
2474 if( crl_cur->raw.p != NULL )
2475 {
2476 memset( crl_cur->raw.p, 0, crl_cur->raw.len );
2477 free( crl_cur->raw.p );
2478 }
2479
2480 crl_cur = crl_cur->next;
2481 }
2482 while( crl_cur != NULL );
2483
2484 crl_cur = crl;
2485 do
2486 {
2487 crl_prv = crl_cur;
2488 crl_cur = crl_cur->next;
2489
2490 memset( crl_prv, 0, sizeof( x509_crl ) );
2491 if( crl_prv != crl )
2492 free( crl_prv );
2493 }
2494 while( crl_cur != NULL );
2495}
2496
Paul Bakker40e46942009-01-03 21:51:57 +00002497#if defined(POLARSSL_SELF_TEST)
Paul Bakker5121ce52009-01-03 21:22:43 +00002498
Paul Bakker40e46942009-01-03 21:51:57 +00002499#include "polarssl/certs.h"
Paul Bakker5121ce52009-01-03 21:22:43 +00002500
2501/*
2502 * Checkup routine
2503 */
2504int x509_self_test( int verbose )
2505{
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002506#if defined(POLARSSL_MD5_C)
Paul Bakker5121ce52009-01-03 21:22:43 +00002507 int ret, i, j;
2508 x509_cert cacert;
2509 x509_cert clicert;
2510 rsa_context rsa;
2511
2512 if( verbose != 0 )
2513 printf( " X.509 certificate load: " );
2514
2515 memset( &clicert, 0, sizeof( x509_cert ) );
2516
2517 ret = x509parse_crt( &clicert, (unsigned char *) test_cli_crt,
2518 strlen( test_cli_crt ) );
2519 if( ret != 0 )
2520 {
2521 if( verbose != 0 )
2522 printf( "failed\n" );
2523
2524 return( ret );
2525 }
2526
2527 memset( &cacert, 0, sizeof( x509_cert ) );
2528
2529 ret = x509parse_crt( &cacert, (unsigned char *) test_ca_crt,
2530 strlen( test_ca_crt ) );
2531 if( ret != 0 )
2532 {
2533 if( verbose != 0 )
2534 printf( "failed\n" );
2535
2536 return( ret );
2537 }
2538
2539 if( verbose != 0 )
2540 printf( "passed\n X.509 private key load: " );
2541
2542 i = strlen( test_ca_key );
2543 j = strlen( test_ca_pwd );
2544
2545 if( ( ret = x509parse_key( &rsa,
2546 (unsigned char *) test_ca_key, i,
2547 (unsigned char *) test_ca_pwd, j ) ) != 0 )
2548 {
2549 if( verbose != 0 )
2550 printf( "failed\n" );
2551
2552 return( ret );
2553 }
2554
2555 if( verbose != 0 )
2556 printf( "passed\n X.509 signature verify: ");
2557
Paul Bakker1973e4c2009-07-10 22:32:40 +00002558 ret = x509parse_verify( &clicert, &cacert, NULL, "PolarSSL Client 2", &i );
Paul Bakker5121ce52009-01-03 21:22:43 +00002559 if( ret != 0 )
2560 {
2561 if( verbose != 0 )
2562 printf( "failed\n" );
2563
2564 return( ret );
2565 }
2566
2567 if( verbose != 0 )
2568 printf( "passed\n\n" );
2569
2570 x509_free( &cacert );
2571 x509_free( &clicert );
2572 rsa_free( &rsa );
2573
2574 return( 0 );
Paul Bakkerde4d2ea2009-10-03 19:58:52 +00002575#else
2576 ((void) verbose);
2577 return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE );
2578#endif
Paul Bakker5121ce52009-01-03 21:22:43 +00002579}
2580
2581#endif
2582
2583#endif