/* * Copyright (C) 2005 Jan Hutter, Martin Willi * Copyright (C) 2009 Andreas Steffen * * HSR Hochschule fuer Technik Rapperswil * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "x509_pkcs10.h" #include #include #include #include #include #include #include #include typedef struct private_x509_pkcs10_t private_x509_pkcs10_t; /** * Private data of a x509_pkcs10_t object. */ struct private_x509_pkcs10_t { /** * Public interface for this certificate. */ x509_pkcs10_t public; /** * PKCS#10 certificate request encoding in ASN.1 DER format */ chunk_t encoding; /** * PKCS#10 request body over which signature is computed */ chunk_t certificationRequestInfo; /** * Version of the PKCS#10 certificate request */ u_int version; /** * ID representing the certificate subject */ identification_t *subject; /** * List of subjectAltNames as identification_t */ linked_list_t *subjectAltNames; /** * certificate's embedded public key */ public_key_t *public_key; /** * challenge password */ chunk_t challengePassword; /** * Signature algorithm */ int algorithm; /** * Signature */ chunk_t signature; /** * Is the certificate request self-signed? */ bool self_signed; /** * Certificate request parsed from blob/file? */ bool parsed; /** * reference count */ refcount_t ref; }; /** * Imported from x509_cert.c */ extern void x509_parse_generalNames(chunk_t blob, int level0, bool implicit, linked_list_t *list); extern chunk_t x509_build_subjectAltNames(linked_list_t *list); /** * Implementation of certificate_t.get_type. */ static certificate_type_t get_type(private_x509_pkcs10_t *this) { return CERT_PKCS10_REQUEST; } /** * Implementation of certificate_t.get_subject and get_issuer. */ static identification_t* get_subject(private_x509_pkcs10_t *this) { return this->subject; } /** * Implementation of certificate_t.has_subject and has_issuer. */ static id_match_t has_subject(private_x509_pkcs10_t *this, identification_t *subject) { return this->subject->matches(this->subject, subject); } /** * Implementation of certificate_t.issued_by. */ static bool issued_by(private_x509_pkcs10_t *this, certificate_t *issuer) { public_key_t *key; signature_scheme_t scheme; if (&this->public.interface.interface != issuer) { return FALSE; } if (this->self_signed) { return TRUE; } /* determine signature scheme */ scheme = signature_scheme_from_oid(this->algorithm); if (scheme == SIGN_UNKNOWN) { return FALSE; } /* get the public key contained in the certificate request */ key = this->public_key; if (!key) { return FALSE; } return key->verify(key, scheme, this->certificationRequestInfo, this->signature); } /** * Implementation of certificate_t.get_public_key. */ static public_key_t* get_public_key(private_x509_pkcs10_t *this) { this->public_key->get_ref(this->public_key); return this->public_key; } /** * Implementation of certificate_t.get_validity. */ static bool get_validity(private_x509_pkcs10_t *this, time_t *when, time_t *not_before, time_t *not_after) { if (not_before) { *not_before = 0; } if (not_after) { *not_after = ~0; } return TRUE; } /** * Implementation of certificate_t.get_encoding. */ static bool get_encoding(private_x509_pkcs10_t *this, cred_encoding_type_t type, chunk_t *encoding) { if (type == CERT_ASN1_DER) { *encoding = chunk_clone(this->encoding); return TRUE; } return lib->encoding->encode(lib->encoding, type, NULL, encoding, CRED_PART_PKCS10_ASN1_DER, this->encoding, CRED_PART_END); } /** * Implementation of certificate_t.equals. */ static bool equals(private_x509_pkcs10_t *this, certificate_t *other) { chunk_t encoding; bool equal; if (this == (private_x509_pkcs10_t*)other) { return TRUE; } if (other->get_type(other) != CERT_PKCS10_REQUEST) { return FALSE; } if (other->equals == (void*)equals) { /* skip allocation if we have the same implementation */ return chunk_equals(this->encoding, ((private_x509_pkcs10_t*)other)->encoding); } if (!other->get_encoding(other, CERT_ASN1_DER, &encoding)) { return FALSE; } equal = chunk_equals(this->encoding, encoding); free(encoding.ptr); return equal; } /** * Implementation of certificate_t.get_ref */ static private_x509_pkcs10_t* get_ref(private_x509_pkcs10_t *this) { ref_get(&this->ref); return this; } /** * Implementation of certificate_t.get_challengePassword. */ static chunk_t get_challengePassword(private_x509_pkcs10_t *this) { return this->challengePassword; } /** * Implementation of pkcs10_t.create_subjectAltName_enumerator. */ static enumerator_t* create_subjectAltName_enumerator(private_x509_pkcs10_t *this) { return this->subjectAltNames->create_enumerator(this->subjectAltNames); } /** * ASN.1 definition of a PKCS#10 extension request */ static const asn1Object_t extensionRequestObjects[] = { { 0, "extensions", ASN1_SEQUENCE, ASN1_LOOP }, /* 0 */ { 1, "extension", ASN1_SEQUENCE, ASN1_NONE }, /* 1 */ { 2, "extnID", ASN1_OID, ASN1_BODY }, /* 2 */ { 2, "critical", ASN1_BOOLEAN, ASN1_DEF|ASN1_BODY }, /* 3 */ { 2, "extnValue", ASN1_OCTET_STRING, ASN1_BODY }, /* 4 */ { 1, "end loop", ASN1_EOC, ASN1_END }, /* 5 */ { 0, "exit", ASN1_EOC, ASN1_EXIT } }; #define PKCS10_EXTN_ID 2 #define PKCS10_EXTN_CRITICAL 3 #define PKCS10_EXTN_VALUE 4 /** * Parses a PKCS#10 extension request */ static bool parse_extension_request(private_x509_pkcs10_t *this, chunk_t blob, int level0) { asn1_parser_t *parser; chunk_t object; int objectID; int extn_oid = OID_UNKNOWN; bool success = FALSE; bool critical; parser = asn1_parser_create(extensionRequestObjects, blob); parser->set_top_level(parser, level0); while (parser->iterate(parser, &objectID, &object)) { u_int level = parser->get_level(parser)+1; switch (objectID) { case PKCS10_EXTN_ID: extn_oid = asn1_known_oid(object); break; case PKCS10_EXTN_CRITICAL: critical = object.len && *object.ptr; DBG2(DBG_LIB, " %s", critical ? "TRUE" : "FALSE"); break; case PKCS10_EXTN_VALUE: { switch (extn_oid) { case OID_SUBJECT_ALT_NAME: x509_parse_generalNames(object, level, FALSE, this->subjectAltNames); break; default: break; } break; } default: break; } } success = parser->success(parser); parser->destroy(parser); return success; } /** * Parses a PKCS#10 challenge password */ static bool parse_challengePassword(private_x509_pkcs10_t *this, chunk_t blob, int level) { char tag; if (blob.len < 2) { DBG1(DBG_LIB, "L%d - challengePassword: ASN.1 object smaller " "than 2 octets", level); return FALSE; } tag = *blob.ptr; if (tag < ASN1_UTF8STRING || tag > ASN1_IA5STRING) { DBG1(DBG_LIB, "L%d - challengePassword: ASN.1 object is not " "a character string", level); return FALSE; } if (asn1_length(&blob) == ASN1_INVALID_LENGTH) { DBG1(DBG_LIB, "L%d - challengePassword: ASN.1 object has an " "invalid length", level); return FALSE; } DBG2(DBG_LIB, "L%d - challengePassword:", level); DBG4(DBG_LIB, " '%.*s'", blob.len, blob.ptr); return TRUE; } /** * ASN.1 definition of a PKCS#10 certificate request */ static const asn1Object_t certificationRequestObjects[] = { { 0, "certificationRequest", ASN1_SEQUENCE, ASN1_OBJ }, /* 0 */ { 1, "certificationRequestInfo", ASN1_SEQUENCE, ASN1_OBJ }, /* 1 */ { 2, "version", ASN1_INTEGER, ASN1_BODY }, /* 2 */ { 2, "subject", ASN1_SEQUENCE, ASN1_OBJ }, /* 3 */ { 2, "subjectPublicKeyInfo", ASN1_SEQUENCE, ASN1_RAW }, /* 4 */ { 2, "attributes", ASN1_CONTEXT_C_0, ASN1_LOOP }, /* 5 */ { 3, "attribute", ASN1_SEQUENCE, ASN1_NONE }, /* 6 */ { 4, "type", ASN1_OID, ASN1_BODY }, /* 7 */ { 4, "values", ASN1_SET, ASN1_LOOP }, /* 8 */ { 5, "value", ASN1_EOC, ASN1_RAW }, /* 9 */ { 4, "end loop", ASN1_EOC, ASN1_END }, /* 10 */ { 2, "end loop", ASN1_EOC, ASN1_END }, /* 11 */ { 1, "signatureAlgorithm", ASN1_EOC, ASN1_RAW }, /* 12 */ { 1, "signature", ASN1_BIT_STRING, ASN1_BODY }, /* 13 */ { 0, "exit", ASN1_EOC, ASN1_EXIT } }; #define PKCS10_CERT_REQUEST_INFO 1 #define PKCS10_VERSION 2 #define PKCS10_SUBJECT 3 #define PKCS10_SUBJECT_PUBLIC_KEY_INFO 4 #define PKCS10_ATTR_TYPE 7 #define PKCS10_ATTR_VALUE 9 #define PKCS10_ALGORITHM 12 #define PKCS10_SIGNATURE 13 /** * Parses a PKCS#10 certificate request */ static bool parse_certificate_request(private_x509_pkcs10_t *this) { asn1_parser_t *parser; chunk_t object; int objectID; int attr_oid = OID_UNKNOWN; bool success = FALSE; parser = asn1_parser_create(certificationRequestObjects, this->encoding); while (parser->iterate(parser, &objectID, &object)) { u_int level = parser->get_level(parser)+1; switch (objectID) { case PKCS10_CERT_REQUEST_INFO: this->certificationRequestInfo = object; break; case PKCS10_VERSION: if (object.len > 0 && *object.ptr != 0) { DBG1(DBG_LIB, "PKCS#10 certificate request format is " "not version 1"); goto end; } break; case PKCS10_SUBJECT: this->subject = identification_create_from_encoding(ID_DER_ASN1_DN, object); DBG2(DBG_LIB, " '%Y'", this->subject); break; case PKCS10_SUBJECT_PUBLIC_KEY_INFO: this->public_key = lib->creds->create(lib->creds, CRED_PUBLIC_KEY, KEY_ANY, BUILD_BLOB_ASN1_DER, object, BUILD_END); if (this->public_key == NULL) { goto end; } break; case PKCS10_ATTR_TYPE: attr_oid = asn1_known_oid(object); break; case PKCS10_ATTR_VALUE: switch (attr_oid) { case OID_EXTENSION_REQUEST: if (!parse_extension_request(this, object, level)) { goto end; } break; case OID_CHALLENGE_PASSWORD: if (!parse_challengePassword(this, object, level)) { goto end; } break; default: break; } break; case PKCS10_ALGORITHM: this->algorithm = asn1_parse_algorithmIdentifier(object, level, NULL); break; case PKCS10_SIGNATURE: this->signature = object; break; default: break; } } success = parser->success(parser); end: parser->destroy(parser); if (success) { /* check if the certificate request is self-signed */ if (issued_by(this, &this->public.interface.interface)) { this->self_signed = TRUE; } else { DBG1(DBG_LIB, "certificate request is not self-signed"); success = FALSE; } } return success; } /** * Implementation of certificate_t.destroy */ static void destroy(private_x509_pkcs10_t *this) { if (ref_put(&this->ref)) { this->subjectAltNames->destroy_offset(this->subjectAltNames, offsetof(identification_t, destroy)); DESTROY_IF(this->subject); DESTROY_IF(this->public_key); chunk_free(&this->encoding); if (!this->parsed) { /* only parsed certificate requests point these fields to "encoded" */ chunk_free(&this->certificationRequestInfo); chunk_free(&this->challengePassword); chunk_free(&this->signature); } free(this); } } /** * create an empty but initialized PKCS#10 certificate request */ static private_x509_pkcs10_t* create_empty(void) { private_x509_pkcs10_t *this = malloc_thing(private_x509_pkcs10_t); this->public.interface.interface.get_type = (certificate_type_t (*) (certificate_t*))get_type; this->public.interface.interface.get_subject = (identification_t* (*) (certificate_t*))get_subject; this->public.interface.interface.get_issuer = (identification_t* (*) (certificate_t*))get_subject; this->public.interface.interface.has_subject = (id_match_t (*) (certificate_t*, identification_t*))has_subject; this->public.interface.interface.has_issuer = (id_match_t (*) (certificate_t*, identification_t*))has_subject; this->public.interface.interface.issued_by = (bool (*) (certificate_t*, certificate_t*))issued_by; this->public.interface.interface.get_public_key = (public_key_t* (*) (certificate_t*))get_public_key; this->public.interface.interface.get_validity = (bool (*) (certificate_t*, time_t*, time_t*, time_t*))get_validity; this->public.interface.interface.get_encoding = (bool (*) (certificate_t*,cred_encoding_type_t,chunk_t*))get_encoding; this->public.interface.interface.equals = (bool (*)(certificate_t*, certificate_t*))equals; this->public.interface.interface.get_ref = (certificate_t* (*)(certificate_t*))get_ref; this->public.interface.interface.destroy = (void (*)(certificate_t*))destroy; this->public.interface.get_challengePassword = (chunk_t (*)(pkcs10_t*))get_challengePassword; this->public.interface.create_subjectAltName_enumerator = (enumerator_t* (*)(pkcs10_t*))create_subjectAltName_enumerator; this->encoding = chunk_empty; this->certificationRequestInfo = chunk_empty; this->subject = NULL; this->public_key = NULL; this->subjectAltNames = linked_list_create(); this->challengePassword = chunk_empty; this->signature = chunk_empty; this->ref = 1; this->self_signed = FALSE; this->parsed = FALSE; return this; } /** * Generate and sign a new certificate request */ static bool generate(private_x509_pkcs10_t *cert, private_key_t *sign_key, int digest_alg) { chunk_t key_info, subjectAltNames, attributes; chunk_t extensionRequest = chunk_empty; chunk_t challengePassword = chunk_empty; signature_scheme_t scheme; identification_t *subject; subject = cert->subject; cert->public_key = sign_key->get_public_key(sign_key); /* select signature scheme */ cert->algorithm = hasher_signature_algorithm_to_oid(digest_alg, sign_key->get_type(sign_key)); if (cert->algorithm == OID_UNKNOWN) { return FALSE; } scheme = signature_scheme_from_oid(cert->algorithm); if (!cert->public_key->get_encoding(cert->public_key, PUBKEY_SPKI_ASN1_DER, &key_info)) { return FALSE; } /* encode subjectAltNames */ subjectAltNames = x509_build_subjectAltNames(cert->subjectAltNames); if (subjectAltNames.ptr) { extensionRequest = asn1_wrap(ASN1_SEQUENCE, "mm", asn1_build_known_oid(OID_EXTENSION_REQUEST), asn1_wrap(ASN1_SET, "m", asn1_wrap(ASN1_SEQUENCE, "m", subjectAltNames) )); } if (cert->challengePassword.len > 0) { asn1_t type = asn1_is_printablestring(cert->challengePassword) ? ASN1_PRINTABLESTRING : ASN1_T61STRING; challengePassword = asn1_wrap(ASN1_SEQUENCE, "mm", asn1_build_known_oid(OID_CHALLENGE_PASSWORD), asn1_wrap(ASN1_SET, "m", asn1_simple_object(type, cert->challengePassword) ) ); } attributes = asn1_wrap(ASN1_CONTEXT_C_0, "mm", extensionRequest, challengePassword); cert->certificationRequestInfo = asn1_wrap(ASN1_SEQUENCE, "ccmm", ASN1_INTEGER_0, subject->get_encoding(subject), key_info, attributes); if (!sign_key->sign(sign_key, scheme, cert->certificationRequestInfo, &cert->signature)) { return FALSE; } cert->encoding = asn1_wrap(ASN1_SEQUENCE, "cmm", cert->certificationRequestInfo, asn1_algorithmIdentifier(cert->algorithm), asn1_bitstring("c", cert->signature)); return TRUE; } /** * See header. */ x509_pkcs10_t *x509_pkcs10_load(certificate_type_t type, va_list args) { chunk_t blob = chunk_empty; while (TRUE) { switch (va_arg(args, builder_part_t)) { case BUILD_BLOB_ASN1_DER: blob = va_arg(args, chunk_t); continue; case BUILD_END: break; default: return NULL; } break; } if (blob.ptr) { private_x509_pkcs10_t *cert = create_empty(); cert->encoding = chunk_clone(blob); cert->parsed = TRUE; if (parse_certificate_request(cert)) { return &cert->public; } destroy(cert); } return NULL; } /** * See header. */ x509_pkcs10_t *x509_pkcs10_gen(certificate_type_t type, va_list args) { private_x509_pkcs10_t *cert; private_key_t *sign_key = NULL; hash_algorithm_t digest_alg = HASH_SHA1; cert = create_empty(); while (TRUE) { switch (va_arg(args, builder_part_t)) { case BUILD_SIGNING_KEY: sign_key = va_arg(args, private_key_t*); continue; case BUILD_SUBJECT: cert->subject = va_arg(args, identification_t*); cert->subject = cert->subject->clone(cert->subject); continue; case BUILD_SUBJECT_ALTNAMES: { enumerator_t *enumerator; identification_t *id; linked_list_t *list; list = va_arg(args, linked_list_t*); enumerator = list->create_enumerator(list); while (enumerator->enumerate(enumerator, &id)) { cert->subjectAltNames->insert_last(cert->subjectAltNames, id->clone(id)); } enumerator->destroy(enumerator); continue; } case BUILD_PASSPHRASE: cert->challengePassword = chunk_clone(va_arg(args, chunk_t)); continue; case BUILD_DIGEST_ALG: digest_alg = va_arg(args, int); continue; case BUILD_END: break; default: destroy(cert); return NULL; } break; } if (sign_key && generate(cert, sign_key, digest_alg)) { return &cert->public; } destroy(cert); return NULL; }