ssl_cert.c 26.6 KB
Newer Older
1
/*! \file ssl/ssl_cert.c */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
 * 
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 * 
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 * 
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 * 
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 * 
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
 */
58
/* ====================================================================
59
 * Copyright (c) 1998-2007 The OpenSSL Project.  All rights reserved.
60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer. 
 *
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in
 *    the documentation and/or other materials provided with the
 *    distribution.
 *
 * 3. All advertising materials mentioning features or use of this
 *    software must display the following acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
B
Bodo Möller 已提交
76
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77 78 79 80
 *
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 *    endorse or promote products derived from this software without
 *    prior written permission. For written permission, please contact
B
Bodo Möller 已提交
81
 *    openssl-core@openssl.org.
82 83 84 85 86 87 88 89
 *
 * 5. Products derived from this software may not be called "OpenSSL"
 *    nor may "OpenSSL" appear in their names without prior written
 *    permission of the OpenSSL Project.
 *
 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
B
Bodo Möller 已提交
90
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91 92 93 94 95 96 97 98 99 100 101 102 103 104
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 * ====================================================================
B
Bodo Möller 已提交
105 106 107 108 109
 *
 * This product includes cryptographic software written by Eric Young
 * (eay@cryptsoft.com).  This product includes software written by Tim
 * Hudson (tjh@cryptsoft.com).
 *
110
 */
B
Bodo Möller 已提交
111 112 113 114 115
/* ====================================================================
 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
 * ECC cipher suite support in OpenSSL originally developed by 
 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
 */
116 117

#include <stdio.h>
A
Andy Polyakov 已提交
118

119
#include "e_os.h"
A
Andy Polyakov 已提交
120 121 122 123
#ifndef NO_SYS_TYPES_H
# include <sys/types.h>
#endif

124
#include "o_dir.h"
125 126 127
#include <openssl/objects.h>
#include <openssl/bio.h>
#include <openssl/pem.h>
128
#include <openssl/x509v3.h>
N
make  
Nils Larsch 已提交
129
#ifndef OPENSSL_NO_DH
130
#include <openssl/dh.h>
N
make  
Nils Larsch 已提交
131
#endif
132
#include <openssl/bn.h>
133 134
#include "ssl_locl.h"

U
Ulf Möller 已提交
135
int SSL_get_ex_data_X509_STORE_CTX_idx(void)
136
	{
B
Bodo Möller 已提交
137
	static volatile int ssl_x509_store_ctx_idx= -1;
B
Bodo Möller 已提交
138 139 140
	int got_write_lock = 0;

	CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX);
141 142 143

	if (ssl_x509_store_ctx_idx < 0)
		{
B
Bodo Möller 已提交
144
		CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX);
B
Bodo Möller 已提交
145
		CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX);
B
Bodo Möller 已提交
146
		got_write_lock = 1;
B
Bodo Möller 已提交
147 148 149 150 151 152
		
		if (ssl_x509_store_ctx_idx < 0)
			{
			ssl_x509_store_ctx_idx=X509_STORE_CTX_get_ex_new_index(
				0,"SSL for verify callback",NULL,NULL,NULL);
			}
153
		}
B
Bodo Möller 已提交
154 155 156 157 158 159

	if (got_write_lock)
		CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX);
	else
		CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX);
	
B
Bodo Möller 已提交
160
	return ssl_x509_store_ctx_idx;
161 162
	}

163
void ssl_cert_set_default_md(CERT *cert)
164 165 166
	{
	/* Set digest values to defaults */
#ifndef OPENSSL_NO_DSA
167
	cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
168 169 170 171 172 173
#endif
#ifndef OPENSSL_NO_RSA
	cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
	cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
#endif
#ifndef OPENSSL_NO_ECDSA
174
	cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
175 176 177
#endif
	}

U
Ulf Möller 已提交
178
CERT *ssl_cert_new(void)
179 180 181
	{
	CERT *ret;

182
	ret=(CERT *)OPENSSL_malloc(sizeof(CERT));
183 184 185 186 187 188 189 190 191
	if (ret == NULL)
		{
		SSLerr(SSL_F_SSL_CERT_NEW,ERR_R_MALLOC_FAILURE);
		return(NULL);
		}
	memset(ret,0,sizeof(CERT));

	ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]);
	ret->references=1;
192
	ssl_cert_set_default_md(ret);
193 194 195
	return(ret);
	}

196 197 198 199 200
CERT *ssl_cert_dup(CERT *cert)
	{
	CERT *ret;
	int i;

201
	ret = (CERT *)OPENSSL_malloc(sizeof(CERT));
202 203 204 205 206 207 208 209 210 211 212 213 214
	if (ret == NULL)
		{
		SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_MALLOC_FAILURE);
		return(NULL);
		}

	memset(ret, 0, sizeof(CERT));

	ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
	/* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
	 * if you find that more readable */

	ret->valid = cert->valid;
215 216 217 218
	ret->mask_k = cert->mask_k;
	ret->mask_a = cert->mask_a;
	ret->export_mask_k = cert->export_mask_k;
	ret->export_mask_a = cert->export_mask_a;
219

220
#ifndef OPENSSL_NO_RSA
221 222
	if (cert->rsa_tmp != NULL)
		{
223
		RSA_up_ref(cert->rsa_tmp);
224 225 226 227 228
		ret->rsa_tmp = cert->rsa_tmp;
		}
	ret->rsa_tmp_cb = cert->rsa_tmp_cb;
#endif

229
#ifndef OPENSSL_NO_DH
230 231 232 233 234
	if (cert->dh_tmp != NULL)
		{
		ret->dh_tmp = DHparams_dup(cert->dh_tmp);
		if (ret->dh_tmp == NULL)
			{
235
			SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_DH_LIB);
236 237
			goto err;
			}
238 239 240 241 242
		if (cert->dh_tmp->priv_key)
			{
			BIGNUM *b = BN_dup(cert->dh_tmp->priv_key);
			if (!b)
				{
243
				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB);
244 245 246 247 248 249 250 251 252
				goto err;
				}
			ret->dh_tmp->priv_key = b;
			}
		if (cert->dh_tmp->pub_key)
			{
			BIGNUM *b = BN_dup(cert->dh_tmp->pub_key);
			if (!b)
				{
253
				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB);
254 255 256 257
				goto err;
				}
			ret->dh_tmp->pub_key = b;
			}
258 259 260 261
		}
	ret->dh_tmp_cb = cert->dh_tmp_cb;
#endif

B
Bodo Möller 已提交
262 263 264
#ifndef OPENSSL_NO_ECDH
	if (cert->ecdh_tmp)
		{
265 266 267 268 269 270
		ret->ecdh_tmp = EC_KEY_dup(cert->ecdh_tmp);
		if (ret->ecdh_tmp == NULL)
			{
			SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_EC_LIB);
			goto err;
			}
B
Bodo Möller 已提交
271 272
		}
	ret->ecdh_tmp_cb = cert->ecdh_tmp_cb;
273
	ret->ecdh_tmp_auto = cert->ecdh_tmp_auto;
B
Bodo Möller 已提交
274 275
#endif

276 277
	for (i = 0; i < SSL_PKEY_NUM; i++)
		{
D
Dr. Stephen Henson 已提交
278 279 280
		CERT_PKEY *cpk = cert->pkeys + i;
		CERT_PKEY *rpk = ret->pkeys + i;
		if (cpk->x509 != NULL)
281
			{
D
Dr. Stephen Henson 已提交
282 283
			rpk->x509 = cpk->x509;
			CRYPTO_add(&rpk->x509->references, 1, CRYPTO_LOCK_X509);
284 285
			}
		
D
Dr. Stephen Henson 已提交
286
		if (cpk->privatekey != NULL)
287
			{
D
Dr. Stephen Henson 已提交
288 289
			rpk->privatekey = cpk->privatekey;
			CRYPTO_add(&cpk->privatekey->references, 1,
290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310
				CRYPTO_LOCK_EVP_PKEY);

			switch(i) 
				{
				/* If there was anything special to do for
				 * certain types of keys, we'd do it here.
				 * (Nothing at the moment, I think.) */

			case SSL_PKEY_RSA_ENC:
			case SSL_PKEY_RSA_SIGN:
				/* We have an RSA key. */
				break;
				
			case SSL_PKEY_DSA_SIGN:
				/* We have a DSA key. */
				break;
				
			case SSL_PKEY_DH_RSA:
			case SSL_PKEY_DH_DSA:
				/* We have a DH key. */
				break;
B
Bodo Möller 已提交
311 312 313 314 315

			case SSL_PKEY_ECC:
				/* We have an ECC key */
				break;

316 317 318 319 320
			default:
				/* Can't happen. */
				SSLerr(SSL_F_SSL_CERT_DUP, SSL_R_LIBRARY_BUG);
				}
			}
321 322 323

		if (cpk->chain)
			{
324
			int j;
325 326 327 328 329 330
			rpk->chain = sk_X509_dup(cpk->chain);
			if (!rpk->chain)
				{
				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_MALLOC_FAILURE);
				goto err;
				}
331
			for (j = 0; j < sk_X509_num(rpk->chain); j++)
332
				{
333
				X509 *x = sk_X509_value(rpk->chain, j);
334 335 336
				CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
				}
			}
337
		rpk->valid_flags = 0;
B
Ben Laurie 已提交
338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353
                if (cert->pkeys[i].authz != NULL)
			{
			/* Just copy everything. */
			ret->pkeys[i].authz_length =
				cert->pkeys[i].authz_length;
			ret->pkeys[i].authz =
				OPENSSL_malloc(ret->pkeys[i].authz_length);
			if (ret->pkeys[i].authz == NULL)
				{
				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_MALLOC_FAILURE);
				return(NULL);
				}
			memcpy(ret->pkeys[i].authz,
			       cert->pkeys[i].authz,
			       cert->pkeys[i].authz_length);
			}
354 355 356
		}
	
	ret->references=1;
357 358 359 360
	/* Set digests to defaults. NB: we don't copy existing values as they
	 * will be set during handshake.
	 */
	ssl_cert_set_default_md(ret);
361 362 363
	/* Peer sigalgs set to NULL as we get these from handshake too */
	ret->peer_sigalgs = NULL;
	ret->peer_sigalgslen = 0;
364 365
	/* Configured sigalgs however we copy across */

366 367
	if (cert->conf_sigalgs)
		{
368
		ret->conf_sigalgs = OPENSSL_malloc(cert->conf_sigalgslen);
369 370 371
		if (!ret->conf_sigalgs)
			goto err;
		memcpy(ret->conf_sigalgs, cert->conf_sigalgs,
372
						cert->conf_sigalgslen);
373 374 375 376
		ret->conf_sigalgslen = cert->conf_sigalgslen;
		}
	else
		ret->conf_sigalgs = NULL;
377 378 379 380 381 382 383 384 385 386 387 388

	if (cert->client_sigalgs)
		{
		ret->client_sigalgs = OPENSSL_malloc(cert->client_sigalgslen);
		if (!ret->client_sigalgs)
			goto err;
		memcpy(ret->client_sigalgs, cert->client_sigalgs,
						cert->client_sigalgslen);
		ret->client_sigalgslen = cert->client_sigalgslen;
		}
	else
		ret->client_sigalgs = NULL;
389 390
	/* Shared sigalgs also NULL */
	ret->shared_sigalgs = NULL;
391

392 393
	ret->cert_flags = cert->cert_flags;

394 395 396
	ret->cert_cb = cert->cert_cb;
	ret->cert_cb_arg = cert->cert_cb_arg;

397 398
	return(ret);
	
399
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ECDH)
400
err:
401
#endif
402
#ifndef OPENSSL_NO_RSA
403 404 405
	if (ret->rsa_tmp != NULL)
		RSA_free(ret->rsa_tmp);
#endif
406
#ifndef OPENSSL_NO_DH
407 408 409
	if (ret->dh_tmp != NULL)
		DH_free(ret->dh_tmp);
#endif
B
Bodo Möller 已提交
410 411 412 413
#ifndef OPENSSL_NO_ECDH
	if (ret->ecdh_tmp != NULL)
		EC_KEY_free(ret->ecdh_tmp);
#endif
414

415
	ssl_cert_clear_certs(ret);
D
Dr. Stephen Henson 已提交
416

417 418 419
	return NULL;
	}

420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448
/* Free up and clear all certificates and chains */

void ssl_cert_clear_certs(CERT *c)
	{
	int i;
	if (c == NULL)
		return;
	for (i = 0; i<SSL_PKEY_NUM; i++)
		{
		CERT_PKEY *cpk = c->pkeys + i;
		if (cpk->x509)
			{
			X509_free(cpk->x509);
			cpk->x509 = NULL;
			}
		if (cpk->privatekey)
			{
			EVP_PKEY_free(cpk->privatekey);
			cpk->privatekey = NULL;
			}
		if (cpk->chain)
			{
			sk_X509_pop_free(cpk->chain, X509_free);
			cpk->chain = NULL;
			}
#ifndef OPENSSL_NO_TLSEXT
                if (cpk->authz != NULL)
			OPENSSL_free(cpk->authz);
#endif
449
		cpk->valid_flags = 0;
450 451
		}
	}
452

453
void ssl_cert_free(CERT *c)
454 455 456
	{
	int i;

B
Ben Laurie 已提交
457 458 459
	if(c == NULL)
	    return;

460
	i=CRYPTO_add(&c->references,-1,CRYPTO_LOCK_SSL_CERT);
461 462 463
#ifdef REF_PRINT
	REF_PRINT("CERT",c);
#endif
464 465 466 467 468 469 470 471 472
	if (i > 0) return;
#ifdef REF_CHECK
	if (i < 0)
		{
		fprintf(stderr,"ssl_cert_free, bad reference count\n");
		abort(); /* ok */
		}
#endif

473
#ifndef OPENSSL_NO_RSA
474 475
	if (c->rsa_tmp) RSA_free(c->rsa_tmp);
#endif
476
#ifndef OPENSSL_NO_DH
477 478
	if (c->dh_tmp) DH_free(c->dh_tmp);
#endif
B
Bodo Möller 已提交
479 480 481
#ifndef OPENSSL_NO_ECDH
	if (c->ecdh_tmp) EC_KEY_free(c->ecdh_tmp);
#endif
482

483
	ssl_cert_clear_certs(c);
484 485 486 487
	if (c->peer_sigalgs)
		OPENSSL_free(c->peer_sigalgs);
	if (c->conf_sigalgs)
		OPENSSL_free(c->conf_sigalgs);
488 489
	if (c->client_sigalgs)
		OPENSSL_free(c->client_sigalgs);
490 491
	if (c->shared_sigalgs)
		OPENSSL_free(c->shared_sigalgs);
492
	OPENSSL_free(c);
493 494
	}

495 496 497 498 499 500
int ssl_cert_inst(CERT **o)
	{
	/* Create a CERT if there isn't already one
	 * (which cannot really happen, as it is initially created in
	 * SSL_CTX_new; but the earlier code usually allows for that one
	 * being non-existant, so we follow that behaviour, as it might
B
Bodo Möller 已提交
501 502 503 504 505 506
	 * turn out that there actually is a reason for it -- but I'm
	 * not sure that *all* of the existing code could cope with
	 * s->cert being NULL, otherwise we could do without the
	 * initialization in SSL_CTX_new).
	 */
	
507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522
	if (o == NULL) 
		{
		SSLerr(SSL_F_SSL_CERT_INST, ERR_R_PASSED_NULL_PARAMETER);
		return(0);
		}
	if (*o == NULL)
		{
		if ((*o = ssl_cert_new()) == NULL)
			{
			SSLerr(SSL_F_SSL_CERT_INST, ERR_R_MALLOC_FAILURE);
			return(0);
			}
		}
	return(1);
	}

523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575
int ssl_cert_set0_chain(CERT *c, STACK_OF(X509) *chain)
	{
	CERT_PKEY *cpk = c->key;
	if (!cpk)
		return 0;
	if (cpk->chain)
		sk_X509_pop_free(cpk->chain, X509_free);
	cpk->chain = chain;
	return 1;
	}

int ssl_cert_set1_chain(CERT *c, STACK_OF(X509) *chain)
	{
	STACK_OF(X509) *dchain;
	X509 *x;
	int i;
	if (!chain)
		return ssl_cert_set0_chain(c, NULL);
	dchain = sk_X509_dup(chain);
	if (!dchain)
		return 0;
	for (i = 0; i < sk_X509_num(dchain); i++)
		{
		x = sk_X509_value(dchain, i);
		CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
		}
	if (!ssl_cert_set0_chain(c, dchain))
		{
		sk_X509_pop_free(dchain, X509_free);
		return 0;
		}
	return 1;
	}

int ssl_cert_add0_chain_cert(CERT *c, X509 *x)
	{
	CERT_PKEY *cpk = c->key;
	if (!cpk)
		return 0;
	if (!cpk->chain)
		cpk->chain = sk_X509_new_null();
	if (!cpk->chain || !sk_X509_push(cpk->chain, x))
		return 0;
	return 1;
	}

int ssl_cert_add1_chain_cert(CERT *c, X509 *x)
	{
	if (!ssl_cert_add0_chain_cert(c, x))
		return 0;
	CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
	return 1;
	}
576

577 578 579 580 581 582
void ssl_cert_set_cert_cb(CERT *c, int (*cb)(SSL *ssl, void *arg), void *arg)
	{
	c->cert_cb = cb;
	c->cert_cb_arg = arg;
	}

583
SESS_CERT *ssl_sess_cert_new(void)
584
	{
585 586
	SESS_CERT *ret;

587
	ret = OPENSSL_malloc(sizeof *ret);
588
	if (ret == NULL)
589
		{
590 591
		SSLerr(SSL_F_SSL_SESS_CERT_NEW, ERR_R_MALLOC_FAILURE);
		return NULL;
592
		}
593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615

	memset(ret, 0 ,sizeof *ret);
	ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]);
	ret->references = 1;

	return ret;
	}

void ssl_sess_cert_free(SESS_CERT *sc)
	{
	int i;

	if (sc == NULL)
		return;

	i = CRYPTO_add(&sc->references, -1, CRYPTO_LOCK_SSL_SESS_CERT);
#ifdef REF_PRINT
	REF_PRINT("SESS_CERT", sc);
#endif
	if (i > 0)
		return;
#ifdef REF_CHECK
	if (i < 0)
616
		{
617 618
		fprintf(stderr,"ssl_sess_cert_free, bad reference count\n");
		abort(); /* ok */
619
		}
620
#endif
621

622 623 624 625 626 627 628 629 630 631 632 633 634 635 636
	/* i == 0 */
	if (sc->cert_chain != NULL)
		sk_X509_pop_free(sc->cert_chain, X509_free);
	for (i = 0; i < SSL_PKEY_NUM; i++)
		{
		if (sc->peer_pkeys[i].x509 != NULL)
			X509_free(sc->peer_pkeys[i].x509);
#if 0 /* We don't have the peer's private key.  These lines are just
	   * here as a reminder that we're still using a not-quite-appropriate
	   * data structure. */
		if (sc->peer_pkeys[i].privatekey != NULL)
			EVP_PKEY_free(sc->peer_pkeys[i].privatekey);
#endif
		}

637
#ifndef OPENSSL_NO_RSA
638 639 640
	if (sc->peer_rsa_tmp != NULL)
		RSA_free(sc->peer_rsa_tmp);
#endif
641
#ifndef OPENSSL_NO_DH
642 643 644
	if (sc->peer_dh_tmp != NULL)
		DH_free(sc->peer_dh_tmp);
#endif
B
Bodo Möller 已提交
645 646 647 648
#ifndef OPENSSL_NO_ECDH
	if (sc->peer_ecdh_tmp != NULL)
		EC_KEY_free(sc->peer_ecdh_tmp);
#endif
649

650
	OPENSSL_free(sc);
651 652 653
	}

int ssl_set_peer_cert_type(SESS_CERT *sc,int type)
654
	{
655
	sc->peer_cert_type = type;
656 657 658
	return(1);
	}

B
Ben Laurie 已提交
659
int ssl_verify_cert_chain(SSL *s,STACK_OF(X509) *sk)
660 661 662 663 664
	{
	X509 *x;
	int i;
	X509_STORE_CTX ctx;

B
Ben Laurie 已提交
665
	if ((sk == NULL) || (sk_X509_num(sk) == 0))
666 667
		return(0);

B
Ben Laurie 已提交
668
	x=sk_X509_value(sk,0);
669 670 671 672 673
	if(!X509_STORE_CTX_init(&ctx,s->ctx->cert_store,x,sk))
		{
		SSLerr(SSL_F_SSL_VERIFY_CERT_CHAIN,ERR_R_X509_LIB);
		return(0);
		}
674
#if 0
675 676
	if (SSL_get_verify_depth(s) >= 0)
		X509_STORE_CTX_set_depth(&ctx, SSL_get_verify_depth(s));
677
#endif
D
 
Dr. Stephen Henson 已提交
678
	X509_STORE_CTX_set_ex_data(&ctx,SSL_get_ex_data_X509_STORE_CTX_idx(),s);
B
Bodo Möller 已提交
679

680
	/* We need to inherit the verify parameters. These can be determined by
681 682
	 * the context: if its a server it will verify SSL client certificates
	 * or vice versa.
B
Bodo Möller 已提交
683
	 */
684

685 686
	X509_STORE_CTX_set_default(&ctx,
				s->server ? "ssl_client" : "ssl_server");
D
Dr. Stephen Henson 已提交
687 688 689
	/* Anything non-default in "param" should overwrite anything in the
	 * ctx.
	 */
D
Dr. Stephen Henson 已提交
690
	X509_VERIFY_PARAM_set1(X509_STORE_CTX_get0_param(&ctx), s->param);
691

L
Indent.  
Lutz Jänicke 已提交
692
	if (s->verify_callback)
693
		X509_STORE_CTX_set_verify_cb(&ctx, s->verify_callback);
694

695
	if (s->ctx->app_verify_callback != NULL)
696 697 698
#if 1 /* new with OpenSSL 0.9.7 */
		i=s->ctx->app_verify_callback(&ctx, s->ctx->app_verify_arg); 
#else
B
Bodo Möller 已提交
699
		i=s->ctx->app_verify_callback(&ctx); /* should pass app_verify_arg */
700
#endif
701
	else
702
		{
703
#ifndef OPENSSL_NO_X509_VERIFY
704
		i=X509_verify_cert(&ctx);
705 706 707 708 709 710
#else
		i=0;
		ctx.error=X509_V_ERR_APPLICATION_VERIFICATION;
		SSLerr(SSL_F_SSL_VERIFY_CERT_CHAIN,SSL_R_NO_VERIFY_CALLBACK);
#endif
		}
711 712

	s->verify_result=ctx.error;
713
	X509_STORE_CTX_cleanup(&ctx);
714 715 716 717

	return(i);
	}

718
static void set_client_CA_list(STACK_OF(X509_NAME) **ca_list,STACK_OF(X509_NAME) *name_list)
719 720
	{
	if (*ca_list != NULL)
B
Ben Laurie 已提交
721
		sk_X509_NAME_pop_free(*ca_list,X509_NAME_free);
722

723
	*ca_list=name_list;
724 725
	}

B
Ben Laurie 已提交
726
STACK_OF(X509_NAME) *SSL_dup_CA_list(STACK_OF(X509_NAME) *sk)
727 728
	{
	int i;
B
Ben Laurie 已提交
729
	STACK_OF(X509_NAME) *ret;
730 731
	X509_NAME *name;

B
Ben Laurie 已提交
732 733
	ret=sk_X509_NAME_new_null();
	for (i=0; i<sk_X509_NAME_num(sk); i++)
734
		{
B
Ben Laurie 已提交
735 736
		name=X509_NAME_dup(sk_X509_NAME_value(sk,i));
		if ((name == NULL) || !sk_X509_NAME_push(ret,name))
737
			{
B
Ben Laurie 已提交
738
			sk_X509_NAME_pop_free(ret,X509_NAME_free);
739 740 741 742 743 744
			return(NULL);
			}
		}
	return(ret);
	}

745
void SSL_set_client_CA_list(SSL *s,STACK_OF(X509_NAME) *name_list)
746
	{
747
	set_client_CA_list(&(s->client_CA),name_list);
748 749
	}

750
void SSL_CTX_set_client_CA_list(SSL_CTX *ctx,STACK_OF(X509_NAME) *name_list)
751
	{
752
	set_client_CA_list(&(ctx->client_CA),name_list);
753 754
	}

B
Ben Laurie 已提交
755
STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *ctx)
756 757 758 759
	{
	return(ctx->client_CA);
	}

B
Ben Laurie 已提交
760
STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s)
761 762 763
	{
	if (s->type == SSL_ST_CONNECT)
		{ /* we are in the client */
764 765
		if (((s->version>>8) == SSL3_VERSION_MAJOR) &&
			(s->s3 != NULL))
766 767 768 769 770 771 772 773 774 775 776 777 778
			return(s->s3->tmp.ca_names);
		else
			return(NULL);
		}
	else
		{
		if (s->client_CA != NULL)
			return(s->client_CA);
		else
			return(s->ctx->client_CA);
		}
	}

B
Ben Laurie 已提交
779
static int add_client_CA(STACK_OF(X509_NAME) **sk,X509 *x)
780 781 782 783
	{
	X509_NAME *name;

	if (x == NULL) return(0);
B
Ben Laurie 已提交
784
	if ((*sk == NULL) && ((*sk=sk_X509_NAME_new_null()) == NULL))
785 786 787 788 789
		return(0);
		
	if ((name=X509_NAME_dup(X509_get_subject_name(x))) == NULL)
		return(0);

B
Ben Laurie 已提交
790
	if (!sk_X509_NAME_push(*sk,name))
791 792 793 794 795 796 797
		{
		X509_NAME_free(name);
		return(0);
		}
	return(1);
	}

798
int SSL_add_client_CA(SSL *ssl,X509 *x)
799 800 801 802
	{
	return(add_client_CA(&(ssl->client_CA),x));
	}

803
int SSL_CTX_add_client_CA(SSL_CTX *ctx,X509 *x)
804 805 806 807
	{
	return(add_client_CA(&(ctx->client_CA),x));
	}

808
static int xname_cmp(const X509_NAME * const *a, const X509_NAME * const *b)
809 810 811 812
	{
	return(X509_NAME_cmp(*a,*b));
	}

813
#ifndef OPENSSL_NO_STDIO
814 815 816 817 818 819 820 821
/*!
 * Load CA certs from a file into a ::STACK. Note that it is somewhat misnamed;
 * it doesn't really have anything to do with clients (except that a common use
 * for a stack of CAs is to send it to the client). Actually, it doesn't have
 * much to do with CAs, either, since it will load any old cert.
 * \param file the file containing one or more certs.
 * \return a ::STACK containing the certs.
 */
B
Ben Laurie 已提交
822
STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file)
823 824 825 826
	{
	BIO *in;
	X509 *x=NULL;
	X509_NAME *xn=NULL;
827
	STACK_OF(X509_NAME) *ret = NULL,*sk;
828

829
	sk=sk_X509_NAME_new(xname_cmp);
830 831 832

	in=BIO_new(BIO_s_file_internal());

833
	if ((sk == NULL) || (in == NULL))
834 835 836 837 838 839 840 841 842 843
		{
		SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE,ERR_R_MALLOC_FAILURE);
		goto err;
		}
	
	if (!BIO_read_filename(in,file))
		goto err;

	for (;;)
		{
844
		if (PEM_read_bio_X509(in,&x,NULL,NULL) == NULL)
845
			break;
846 847 848 849 850 851 852 853 854
		if (ret == NULL)
			{
			ret = sk_X509_NAME_new_null();
			if (ret == NULL)
				{
				SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE,ERR_R_MALLOC_FAILURE);
				goto err;
				}
			}
855 856 857 858
		if ((xn=X509_get_subject_name(x)) == NULL) goto err;
		/* check for duplicates */
		xn=X509_NAME_dup(xn);
		if (xn == NULL) goto err;
B
Ben Laurie 已提交
859
		if (sk_X509_NAME_find(sk,xn) >= 0)
860 861 862
			X509_NAME_free(xn);
		else
			{
B
Ben Laurie 已提交
863 864
			sk_X509_NAME_push(sk,xn);
			sk_X509_NAME_push(ret,xn);
865 866 867 868 869 870
			}
		}

	if (0)
		{
err:
B
Ben Laurie 已提交
871
		if (ret != NULL) sk_X509_NAME_pop_free(ret,X509_NAME_free);
872 873
		ret=NULL;
		}
B
Ben Laurie 已提交
874
	if (sk != NULL) sk_X509_NAME_free(sk);
875 876
	if (in != NULL) BIO_free(in);
	if (x != NULL) X509_free(x);
877 878
	if (ret != NULL)
		ERR_clear_error();
879 880
	return(ret);
	}
881
#endif
882

883 884 885 886 887 888 889 890 891
/*!
 * Add a file of certs to a stack.
 * \param stack the stack to add to.
 * \param file the file to add from. All certs in this file that are not
 * already in the stack will be added.
 * \return 1 for success, 0 for failure. Note that in the case of failure some
 * certs may have been added to \c stack.
 */

B
Ben Laurie 已提交
892 893
int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack,
					const char *file)
894
	{
895 896 897 898
	BIO *in;
	X509 *x=NULL;
	X509_NAME *xn=NULL;
	int ret=1;
899
	int (*oldcmp)(const X509_NAME * const *a, const X509_NAME * const *b);
900
	
901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925
	oldcmp=sk_X509_NAME_set_cmp_func(stack,xname_cmp);
	
	in=BIO_new(BIO_s_file_internal());
	
	if (in == NULL)
		{
		SSLerr(SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK,ERR_R_MALLOC_FAILURE);
		goto err;
		}
	
	if (!BIO_read_filename(in,file))
		goto err;
	
	for (;;)
		{
		if (PEM_read_bio_X509(in,&x,NULL,NULL) == NULL)
			break;
		if ((xn=X509_get_subject_name(x)) == NULL) goto err;
		xn=X509_NAME_dup(xn);
		if (xn == NULL) goto err;
		if (sk_X509_NAME_find(stack,xn) >= 0)
			X509_NAME_free(xn);
		else
			sk_X509_NAME_push(stack,xn);
		}
926

D
Dr. Stephen Henson 已提交
927 928
	ERR_clear_error();

929 930
	if (0)
		{
931
err:
932 933 934 935 936 937 938
		ret=0;
		}
	if(in != NULL)
		BIO_free(in);
	if(x != NULL)
		X509_free(x);
	
939
	(void)sk_X509_NAME_set_cmp_func(stack,oldcmp);
940

941 942
	return ret;
	}
943 944 945 946 947 948

/*!
 * Add a directory of certs to a stack.
 * \param stack the stack to append to.
 * \param dir the directory to append from. All files in this directory will be
 * examined as potential certs. Any that are acceptable to
949
 * SSL_add_dir_cert_subjects_to_stack() that are not already in the stack will be
950 951 952 953 954
 * included.
 * \return 1 for success, 0 for failure. Note that in the case of failure some
 * certs may have been added to \c stack.
 */

B
Ben Laurie 已提交
955 956
int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack,
				       const char *dir)
957
	{
958 959
	OPENSSL_DIR_CTX *d = NULL;
	const char *filename;
960
	int ret = 0;
961

962
	CRYPTO_w_lock(CRYPTO_LOCK_READDIR);
963

964
	/* Note that a side effect is that the CAs will be sorted by name */
965 966

	while((filename = OPENSSL_DIR_read(&d, dir)))
967 968 969
		{
		char buf[1024];
		int r;
970 971

		if(strlen(dir)+strlen(filename)+2 > sizeof buf)
972 973 974 975
			{
			SSLerr(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK,SSL_R_PATH_TOO_LONG);
			goto err;
			}
976 977 978 979 980 981

#ifdef OPENSSL_SYS_VMS
		r = BIO_snprintf(buf,sizeof buf,"%s%s",dir,filename);
#else
		r = BIO_snprintf(buf,sizeof buf,"%s/%s",dir,filename);
#endif
982
		if (r <= 0 || r >= (int)sizeof(buf))
983 984 985 986
			goto err;
		if(!SSL_add_file_cert_subjects_to_stack(stack,buf))
			goto err;
		}
R
Richard Levitte 已提交
987

988
	if (errno)
989 990
		{
		SYSerr(SYS_F_OPENDIR, get_last_sys_error());
991
		ERR_add_error_data(3, "OPENSSL_DIR_read(&ctx, '", dir, "')");
992
		SSLerr(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK, ERR_R_SYS_LIB);
993
		goto err;
994
		}
995

996 997
	ret = 1;

998
err:
999
	if (d) OPENSSL_DIR_end(&d);
1000 1001 1002 1003
	CRYPTO_w_unlock(CRYPTO_LOCK_READDIR);
	return ret;
	}

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025
/* Add a certificate to a BUF_MEM structure */

static int ssl_add_cert_to_buf(BUF_MEM *buf, unsigned long *l, X509 *x)
	{
	int n;
	unsigned char *p;

	n=i2d_X509(x,NULL);
	if (!BUF_MEM_grow_clean(buf,(int)(n+(*l)+3)))
		{
		SSLerr(SSL_F_SSL_ADD_CERT_TO_BUF,ERR_R_BUF_LIB);
		return 0;
		}
	p=(unsigned char *)&(buf->data[*l]);
	l2n3(n,p);
	i2d_X509(x,&p);
	*l+=n+3;

	return 1;
	}

/* Add certificate chain to internal SSL BUF_MEM strcuture */
1026
int ssl_add_cert_chain(SSL *s, CERT_PKEY *cpk, unsigned long *l)
1027 1028 1029 1030 1031
	{
	BUF_MEM *buf = s->init_buf;
	int no_chain;
	int i;

1032
	X509 *x;
1033
	STACK_OF(X509) *extra_certs;
1034 1035 1036 1037 1038 1039

	if (cpk)
		x = cpk->x509;
	else
		x = NULL;

1040 1041 1042 1043 1044 1045 1046 1047 1048
	/* If we have a certificate specific chain use it, else use
	 * parent ctx.
	 */
	if (cpk && cpk->chain)
		extra_certs = cpk->chain;
	else
		extra_certs = s->ctx->extra_certs;

	if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || extra_certs)
1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081
		no_chain = 1;
	else
		no_chain = 0;

	/* TLSv1 sends a chain with nothing in it, instead of an alert */
	if (!BUF_MEM_grow_clean(buf,10))
		{
		SSLerr(SSL_F_SSL_ADD_CERT_CHAIN,ERR_R_BUF_LIB);
		return 0;
		}
	if (x != NULL)
		{
		if (no_chain)
			{
			if (!ssl_add_cert_to_buf(buf, l, x))
				return 0;
			}
		else
			{
			X509_STORE_CTX xs_ctx;

			if (!X509_STORE_CTX_init(&xs_ctx,s->ctx->cert_store,x,NULL))
				{
				SSLerr(SSL_F_SSL_ADD_CERT_CHAIN,ERR_R_X509_LIB);
				return(0);
				}
			X509_verify_cert(&xs_ctx);
			/* Don't leave errors in the queue */
			ERR_clear_error();
			for (i=0; i < sk_X509_num(xs_ctx.chain); i++)
				{
				x = sk_X509_value(xs_ctx.chain, i);

D
typo  
Dr. Stephen Henson 已提交
1082
				if (!ssl_add_cert_to_buf(buf, l, x))
1083 1084 1085 1086 1087 1088 1089 1090
					{
					X509_STORE_CTX_cleanup(&xs_ctx);
					return 0;
					}
				}
			X509_STORE_CTX_cleanup(&xs_ctx);
			}
		}
1091
	for (i=0; i<sk_X509_num(extra_certs); i++)
1092
		{
1093
		x=sk_X509_value(extra_certs,i);
1094 1095 1096 1097 1098 1099 1100
		if (!ssl_add_cert_to_buf(buf, l, x))
			return 0;
		}

	return 1;
	}