nbsvtool.c revision 1.3 1 1.3 christos /* $NetBSD: nbsvtool.c,v 1.3 2018/02/06 19:51:03 christos Exp $ */
2 1.1 joerg
3 1.1 joerg /*-
4 1.1 joerg * Copyright (c) 2004, 2008 The NetBSD Foundation, Inc.
5 1.1 joerg * All rights reserved.
6 1.1 joerg *
7 1.1 joerg * This code is derived from software contributed to The NetBSD Foundation
8 1.1 joerg * by Love Hrnquist strand <lha (at) it.su.se>
9 1.1 joerg *
10 1.1 joerg * Redistribution and use in source and binary forms, with or without
11 1.1 joerg * modification, are permitted provided that the following conditions
12 1.1 joerg * are met:
13 1.1 joerg * 1. Redistributions of source code must retain the above copyright
14 1.1 joerg * notice, this list of conditions and the following disclaimer.
15 1.1 joerg * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 joerg * notice, this list of conditions and the following disclaimer in the
17 1.1 joerg * documentation and/or other materials provided with the distribution.
18 1.1 joerg *
19 1.1 joerg * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 joerg * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 joerg * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 joerg * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 joerg * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 joerg * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 joerg * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 joerg * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 joerg * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 joerg * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 joerg * POSSIBILITY OF SUCH DAMAGE.
30 1.1 joerg */
31 1.1 joerg
32 1.1 joerg #include <err.h>
33 1.1 joerg #include <stdio.h>
34 1.1 joerg #include <stdlib.h>
35 1.1 joerg #include <string.h>
36 1.1 joerg #include <unistd.h>
37 1.1 joerg
38 1.1 joerg #include <openssl/pkcs7.h>
39 1.1 joerg #include <openssl/evp.h>
40 1.1 joerg #include <openssl/x509.h>
41 1.1 joerg #include <openssl/x509v3.h>
42 1.1 joerg #include <openssl/pem.h>
43 1.1 joerg #include <openssl/err.h>
44 1.1 joerg #include <openssl/ui.h>
45 1.1 joerg
46 1.1 joerg static int verbose_flag;
47 1.1 joerg static unsigned long key_usage = 0;
48 1.1 joerg
49 1.1 joerg /*
50 1.1 joerg * openssl command line equivalents
51 1.1 joerg *
52 1.1 joerg * openssl smime -verify \
53 1.1 joerg * -inform PEM -in nbsvtool.c.sig -content nbsvtool.c \
54 1.1 joerg * -CAfile /secure/lha/su/CA/swupki-pca.crt -out /dev/null
55 1.1 joerg * openssl smime -sign \
56 1.1 joerg * -noattr -binary -outform PEM -out nbsvtool.c.sig \
57 1.1 joerg * -in nbsvtool.c -signer /secure/lha/su/CA/lha.crt \
58 1.1 joerg * -certfile /secure/lha/su/CA/lha-chain \
59 1.1 joerg * -inkey /secure/lha/su/CA/lha.key
60 1.1 joerg */
61 1.1 joerg
62 1.1 joerg /*
63 1.1 joerg * Create a detach PEM signature of file `infile' and store it in
64 1.1 joerg * `outfile'. The signer certificate `cert' and private key
65 1.1 joerg * `private_key' must be given. An additional hint to the verifier how
66 1.1 joerg * to find the path from the `cert' to the x509 anchor can be passed
67 1.1 joerg * in `cert_chain'.
68 1.1 joerg */
69 1.1 joerg
70 1.1 joerg static void
71 1.1 joerg sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain,
72 1.1 joerg const char *infile, const char *outfile)
73 1.1 joerg {
74 1.1 joerg BIO *out, *in;
75 1.1 joerg PKCS7 *p7;
76 1.1 joerg
77 1.1 joerg out = BIO_new_file(outfile, "w");
78 1.1 joerg if (out == NULL)
79 1.1 joerg err(EXIT_FAILURE, "Failed to open signature output file: %s",
80 1.1 joerg outfile);
81 1.1 joerg
82 1.1 joerg in = BIO_new_file(infile, "r");
83 1.1 joerg if (in == NULL)
84 1.1 joerg err(EXIT_FAILURE, "Failed to input file: %s", infile);
85 1.1 joerg
86 1.1 joerg p7 = PKCS7_sign(cert, private_key, cert_chain, in,
87 1.1 joerg PKCS7_DETACHED|PKCS7_NOATTR|PKCS7_BINARY);
88 1.1 joerg if (p7 == NULL)
89 1.1 joerg errx(EXIT_FAILURE, "Failed to create signature structure");
90 1.1 joerg
91 1.1 joerg PEM_write_bio_PKCS7(out, p7);
92 1.1 joerg
93 1.1 joerg PKCS7_free(p7);
94 1.1 joerg BIO_free(in);
95 1.1 joerg BIO_free_all(out);
96 1.1 joerg }
97 1.1 joerg
98 1.1 joerg /*
99 1.1 joerg * Verifies a detached PEM signature in the file `sigfile' of file
100 1.1 joerg * `infile'. The trust anchor file `anchor' to the trust anchors must
101 1.1 joerg * be given. If its suspended that the sender didn't inlude the whole
102 1.1 joerg * path from the signing certificate to the given trust anchor, extra
103 1.1 joerg * certificates can be passed in `cert_chain'.
104 1.1 joerg */
105 1.1 joerg
106 1.1 joerg static void
107 1.1 joerg verify_file(STACK_OF(X509) *cert_chain, const char *anchor,
108 1.1 joerg const char *infile, const char *sigfile)
109 1.1 joerg {
110 1.1 joerg STACK_OF(X509) *signers;
111 1.1 joerg X509_STORE *store;
112 1.1 joerg BIO *sig, *in;
113 1.1 joerg PKCS7 *p7;
114 1.1 joerg int ret, i;
115 1.2 joerg X509_NAME *name;
116 1.2 joerg char *subject;
117 1.1 joerg
118 1.1 joerg store = X509_STORE_new();
119 1.1 joerg if (store == NULL)
120 1.1 joerg err(1, "Failed to create store");
121 1.1 joerg
122 1.1 joerg X509_STORE_load_locations(store, anchor, NULL);
123 1.1 joerg
124 1.1 joerg in = BIO_new_file(infile, "r");
125 1.1 joerg if (in == NULL)
126 1.1 joerg err(EXIT_FAILURE, "Failed to open input data file: %s", infile);
127 1.1 joerg
128 1.1 joerg sig = BIO_new_file(sigfile, "r");
129 1.1 joerg if (sig == NULL)
130 1.1 joerg err(EXIT_FAILURE, "Failed to open signature input file: %s",
131 1.1 joerg sigfile);
132 1.1 joerg
133 1.1 joerg p7 = PEM_read_bio_PKCS7(sig, NULL, NULL, NULL);
134 1.1 joerg if (p7 == NULL)
135 1.1 joerg errx(EXIT_FAILURE, "Failed to parse the signature file %s",
136 1.1 joerg sigfile);
137 1.1 joerg
138 1.1 joerg ret = PKCS7_verify(p7, cert_chain, store, in, NULL, 0);
139 1.1 joerg if (ret != 1)
140 1.1 joerg errx(EXIT_FAILURE, "Failed to verify signature");
141 1.1 joerg
142 1.1 joerg signers = PKCS7_get0_signers(p7, NULL, 0);
143 1.1 joerg if (signers == NULL)
144 1.1 joerg errx(EXIT_FAILURE, "Failed to get signers");
145 1.1 joerg
146 1.1 joerg if (sk_X509_num(signers) == 0)
147 1.1 joerg errx(EXIT_FAILURE, "No signers ?");
148 1.1 joerg
149 1.2 joerg if (key_usage != 0) {
150 1.2 joerg for (i = 0; i < sk_X509_num(signers); i++) {
151 1.3 christos X509 *x = sk_X509_value(signers, i);
152 1.3 christos if ((X509_get_extended_key_usage(x) & key_usage)
153 1.2 joerg == key_usage)
154 1.2 joerg continue;
155 1.3 christos name = X509_get_subject_name(x);
156 1.2 joerg subject = X509_NAME_oneline(name, NULL, 0);
157 1.2 joerg errx(EXIT_FAILURE,
158 1.2 joerg "Certificate doesn't match required key usage: %s",
159 1.2 joerg subject);
160 1.2 joerg }
161 1.2 joerg }
162 1.2 joerg
163 1.1 joerg if (verbose_flag)
164 1.1 joerg printf("Sigature ok, signed by:\n");
165 1.1 joerg
166 1.1 joerg for (i = 0; i < sk_X509_num(signers); i++) {
167 1.1 joerg name = X509_get_subject_name(sk_X509_value(signers, i));
168 1.1 joerg subject = X509_NAME_oneline(name, NULL, 0);
169 1.1 joerg
170 1.1 joerg if (verbose_flag)
171 1.1 joerg printf("\t%s\n", subject);
172 1.1 joerg
173 1.1 joerg OPENSSL_free(subject);
174 1.1 joerg }
175 1.1 joerg
176 1.1 joerg PKCS7_free(p7);
177 1.1 joerg BIO_free(in);
178 1.1 joerg BIO_free(sig);
179 1.1 joerg }
180 1.1 joerg
181 1.1 joerg /*
182 1.1 joerg * Parse and return a list PEM encoded certificates in the file
183 1.1 joerg * `file'. In case of error or an empty file, and error text will be
184 1.1 joerg * printed and the function will exit(3).
185 1.1 joerg */
186 1.1 joerg
187 1.1 joerg static STACK_OF(X509) *
188 1.1 joerg file_to_certs(const char *file)
189 1.1 joerg {
190 1.1 joerg STACK_OF(X509) *certs;
191 1.1 joerg FILE *f;
192 1.1 joerg
193 1.1 joerg f = fopen(file, "r");
194 1.1 joerg if (f == NULL)
195 1.1 joerg err(EXIT_FAILURE, "Cannot open certificate file %s", file);
196 1.1 joerg certs = sk_X509_new_null();
197 1.1 joerg while (1) {
198 1.1 joerg X509 *cert;
199 1.1 joerg
200 1.1 joerg cert = PEM_read_X509(f, NULL, NULL, NULL);
201 1.1 joerg if (cert == NULL) {
202 1.1 joerg unsigned long ret;
203 1.1 joerg
204 1.1 joerg ret = ERR_GET_REASON(ERR_peek_error());
205 1.1 joerg if (ret == PEM_R_NO_START_LINE) {
206 1.1 joerg /* End of file reached. no error */
207 1.1 joerg ERR_clear_error();
208 1.1 joerg break;
209 1.1 joerg }
210 1.1 joerg errx(EXIT_FAILURE, "Can't read certificate file %s",
211 1.1 joerg file);
212 1.1 joerg }
213 1.1 joerg sk_X509_insert(certs, cert, sk_X509_num(certs));
214 1.1 joerg }
215 1.1 joerg fclose(f);
216 1.1 joerg if (sk_X509_num(certs) == 0)
217 1.1 joerg errx(EXIT_FAILURE, "No certificate found file %s", file);
218 1.1 joerg
219 1.1 joerg return certs;
220 1.1 joerg }
221 1.1 joerg
222 1.1 joerg static int
223 1.1 joerg ssl_pass_cb(char *buf, int size, int rwflag, void *u)
224 1.1 joerg {
225 1.1 joerg
226 1.1 joerg if (UI_UTIL_read_pw_string(buf, size, "Passphrase: ", 0))
227 1.1 joerg return 0;
228 1.1 joerg return strlen(buf);
229 1.1 joerg }
230 1.1 joerg
231 1.1 joerg static struct {
232 1.1 joerg X509 *certificate;
233 1.1 joerg STACK_OF(X509) *cert_chain;
234 1.1 joerg EVP_PKEY *private_key;
235 1.1 joerg } crypto_state;
236 1.1 joerg
237 1.1 joerg /*
238 1.1 joerg * Load the certificate file `cert_file' with the associated private
239 1.1 joerg * key file `key_file'. The private key is checked to make sure it
240 1.1 joerg * matches the certificate. The optional hints for the path to the CA
241 1.1 joerg * is stored in `chain_file'.
242 1.1 joerg */
243 1.1 joerg
244 1.1 joerg static void
245 1.1 joerg load_keys(const char *cert_file, const char *chain_file, const char *key_file)
246 1.1 joerg {
247 1.1 joerg STACK_OF(X509) *c;
248 1.1 joerg FILE *f;
249 1.1 joerg int ret;
250 1.1 joerg
251 1.1 joerg if (cert_file == NULL)
252 1.1 joerg errx(EXIT_FAILURE, "No certificate file given");
253 1.1 joerg if (key_file == NULL)
254 1.1 joerg errx(EXIT_FAILURE, "No private key file given");
255 1.1 joerg
256 1.1 joerg c = file_to_certs(cert_file);
257 1.1 joerg
258 1.1 joerg if (sk_X509_num(c) != 1)
259 1.1 joerg errx(EXIT_FAILURE,
260 1.1 joerg "More then one certificate in the certificate file");
261 1.1 joerg crypto_state.certificate = sk_X509_value(c, 0);
262 1.1 joerg
263 1.1 joerg if (chain_file)
264 1.1 joerg crypto_state.cert_chain = file_to_certs(chain_file);
265 1.1 joerg
266 1.1 joerg /* load private key */
267 1.1 joerg f = fopen(key_file, "r");
268 1.1 joerg if (f == NULL)
269 1.1 joerg errx(1, "Failed to open private key file %s", key_file);
270 1.1 joerg
271 1.1 joerg crypto_state.private_key =
272 1.1 joerg PEM_read_PrivateKey(f, NULL, ssl_pass_cb, NULL);
273 1.1 joerg fclose(f);
274 1.1 joerg if (crypto_state.private_key == NULL)
275 1.1 joerg errx(EXIT_FAILURE, "Can't read private key %s", key_file);
276 1.1 joerg
277 1.1 joerg ret = X509_check_private_key(crypto_state.certificate,
278 1.1 joerg crypto_state.private_key);
279 1.1 joerg if (ret != 1)
280 1.1 joerg errx(EXIT_FAILURE,
281 1.1 joerg "The private key %s doesn't match the certificate %s",
282 1.1 joerg key_file, cert_file);
283 1.1 joerg }
284 1.1 joerg
285 1.1 joerg static void __dead
286 1.1 joerg usage(int exit_code)
287 1.1 joerg {
288 1.1 joerg
289 1.1 joerg printf("%s usage\n", getprogname());
290 1.1 joerg printf("%s -k keyfile -c cert-chain [-f cert-chain] sign file\n",
291 1.1 joerg getprogname());
292 1.1 joerg printf("%s [-u code|...] [-a x509-anchor-file] verify filename.sp7\n",
293 1.1 joerg getprogname());
294 1.1 joerg printf("%s [-u code|...] [-a x509-anchor-file] verify filename otherfilename.sp7\n",
295 1.1 joerg getprogname());
296 1.1 joerg printf("%s [-u code|...] [-a x509-anchor-file] verify-code file ...\n",
297 1.1 joerg getprogname());
298 1.1 joerg exit(exit_code);
299 1.1 joerg }
300 1.1 joerg
301 1.1 joerg int
302 1.1 joerg main(int argc, char **argv)
303 1.1 joerg {
304 1.1 joerg const char *anchors = NULL;
305 1.1 joerg const char *cert_file = NULL, *key_file = NULL, *chain_file = NULL;
306 1.1 joerg const char *file;
307 1.1 joerg char *sigfile;
308 1.1 joerg int ch;
309 1.1 joerg
310 1.1 joerg setprogname(argv[0]);
311 1.1 joerg
312 1.1 joerg OpenSSL_add_all_algorithms();
313 1.1 joerg ERR_load_crypto_strings();
314 1.1 joerg
315 1.1 joerg while ((ch = getopt(argc, argv, "a:c:f:hk:u:v")) != -1) {
316 1.1 joerg switch (ch) {
317 1.1 joerg case 'a':
318 1.1 joerg anchors = optarg;
319 1.1 joerg break;
320 1.1 joerg case 'f':
321 1.1 joerg chain_file = optarg;
322 1.1 joerg break;
323 1.1 joerg case 'k':
324 1.1 joerg key_file = optarg;
325 1.1 joerg break;
326 1.1 joerg case 'c':
327 1.1 joerg cert_file = optarg;
328 1.1 joerg break;
329 1.1 joerg case 'u':
330 1.1 joerg if (strcmp("ssl-server", optarg) == 0)
331 1.1 joerg key_usage |= XKU_SSL_SERVER;
332 1.1 joerg else if (strcmp("ssl-client", optarg) == 0)
333 1.1 joerg key_usage |= XKU_SSL_CLIENT;
334 1.1 joerg else if (strcmp("code", optarg) == 0)
335 1.1 joerg key_usage |= XKU_CODE_SIGN;
336 1.1 joerg else if (strcmp("smime", optarg) == 0)
337 1.1 joerg key_usage |= XKU_SMIME;
338 1.1 joerg else
339 1.1 joerg errx(1, "Unknown keyusage: %s", optarg);
340 1.1 joerg break;
341 1.1 joerg case 'v':
342 1.1 joerg verbose_flag = 1;
343 1.1 joerg break;
344 1.1 joerg case 'h':
345 1.1 joerg usage(EXIT_SUCCESS);
346 1.1 joerg default:
347 1.1 joerg usage(EXIT_FAILURE);
348 1.1 joerg }
349 1.1 joerg }
350 1.1 joerg
351 1.1 joerg argc -= optind;
352 1.1 joerg argv += optind;
353 1.1 joerg
354 1.1 joerg if (argc < 1) {
355 1.1 joerg fprintf(stderr, "Command missing [sign|verify]\n");
356 1.1 joerg usage(EXIT_FAILURE);
357 1.1 joerg }
358 1.1 joerg
359 1.1 joerg if (strcmp(argv[0], "sign") == 0) {
360 1.1 joerg
361 1.1 joerg if (argc < 2)
362 1.1 joerg usage(1);
363 1.1 joerg
364 1.1 joerg file = argv[1];
365 1.1 joerg
366 1.1 joerg asprintf(&sigfile, "%s.sp7", file);
367 1.1 joerg if (sigfile == NULL)
368 1.1 joerg err(EXIT_FAILURE, "asprintf failed");
369 1.1 joerg
370 1.1 joerg load_keys(cert_file, chain_file, key_file);
371 1.1 joerg
372 1.1 joerg sign_file(crypto_state.certificate,
373 1.1 joerg crypto_state.private_key,
374 1.1 joerg crypto_state.cert_chain,
375 1.1 joerg file,
376 1.1 joerg sigfile);
377 1.1 joerg
378 1.1 joerg } else if (strcmp(argv[0], "verify") == 0
379 1.1 joerg || strcmp(argv[0], "verify-code") == 0) {
380 1.1 joerg
381 1.1 joerg if (strcmp(argv[0], "verify-code") == 0)
382 1.1 joerg key_usage |= XKU_CODE_SIGN;
383 1.1 joerg
384 1.1 joerg if (argc < 2)
385 1.1 joerg usage(1);
386 1.1 joerg else if (argc < 3) {
387 1.1 joerg char *dot;
388 1.1 joerg
389 1.1 joerg sigfile = argv[1];
390 1.1 joerg
391 1.1 joerg file = strdup(sigfile);
392 1.1 joerg if (file == NULL)
393 1.1 joerg err(1, "strdup failed");
394 1.1 joerg
395 1.1 joerg dot = strrchr(file, '.');
396 1.1 joerg if (dot == NULL || strchr(dot, '/') != NULL)
397 1.1 joerg errx(EXIT_FAILURE,
398 1.1 joerg "File name missing suffix");
399 1.1 joerg if (strcmp(".sp7", dot) != 0)
400 1.1 joerg errx(EXIT_FAILURE,
401 1.1 joerg "File name bad suffix (%s)", dot);
402 1.1 joerg *dot = '\0';
403 1.1 joerg } else {
404 1.1 joerg file = argv[1];
405 1.1 joerg sigfile = argv[2];
406 1.1 joerg }
407 1.1 joerg verify_file(crypto_state.cert_chain, anchors, file, sigfile);
408 1.1 joerg } else {
409 1.1 joerg fprintf(stderr, "Unknown command: %s\n", argv[0]);
410 1.1 joerg usage(EXIT_FAILURE);
411 1.1 joerg }
412 1.1 joerg
413 1.1 joerg return 0;
414 1.1 joerg }
415