Home | History | Annotate | Download | only in apps
      1 /* apps/verify.c */
      2 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com)
      3  * All rights reserved.
      4  *
      5  * This package is an SSL implementation written
      6  * by Eric Young (eay (at) cryptsoft.com).
      7  * The implementation was written so as to conform with Netscapes SSL.
      8  *
      9  * This library is free for commercial and non-commercial use as long as
     10  * the following conditions are aheared to.  The following conditions
     11  * apply to all code found in this distribution, be it the RC4, RSA,
     12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     13  * included with this distribution is covered by the same copyright terms
     14  * except that the holder is Tim Hudson (tjh (at) cryptsoft.com).
     15  *
     16  * Copyright remains Eric Young's, and as such any Copyright notices in
     17  * the code are not to be removed.
     18  * If this package is used in a product, Eric Young should be given attribution
     19  * as the author of the parts of the library used.
     20  * This can be in the form of a textual message at program startup or
     21  * in documentation (online or textual) provided with the package.
     22  *
     23  * Redistribution and use in source and binary forms, with or without
     24  * modification, are permitted provided that the following conditions
     25  * are met:
     26  * 1. Redistributions of source code must retain the copyright
     27  *    notice, this list of conditions and the following disclaimer.
     28  * 2. Redistributions in binary form must reproduce the above copyright
     29  *    notice, this list of conditions and the following disclaimer in the
     30  *    documentation and/or other materials provided with the distribution.
     31  * 3. All advertising materials mentioning features or use of this software
     32  *    must display the following acknowledgement:
     33  *    "This product includes cryptographic software written by
     34  *     Eric Young (eay (at) cryptsoft.com)"
     35  *    The word 'cryptographic' can be left out if the rouines from the library
     36  *    being used are not cryptographic related :-).
     37  * 4. If you include any Windows specific code (or a derivative thereof) from
     38  *    the apps directory (application code) you must include an acknowledgement:
     39  *    "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)"
     40  *
     41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     51  * SUCH DAMAGE.
     52  *
     53  * The licence and distribution terms for any publically available version or
     54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
     55  * copied and put under another distribution licence
     56  * [including the GNU Public Licence.]
     57  */
     58 
     59 #include <stdio.h>
     60 #include <stdlib.h>
     61 #include <string.h>
     62 #include "apps.h"
     63 #include <openssl/bio.h>
     64 #include <openssl/err.h>
     65 #include <openssl/x509.h>
     66 #include <openssl/x509v3.h>
     67 #include <openssl/pem.h>
     68 
     69 #undef PROG
     70 #define PROG	verify_main
     71 
     72 static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
     73 static int check(X509_STORE *ctx, char *file,
     74 		STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
     75 		STACK_OF(X509_CRL) *crls, ENGINE *e);
     76 static int v_verbose=0, vflags = 0;
     77 
     78 int MAIN(int, char **);
     79 
     80 int MAIN(int argc, char **argv)
     81 	{
     82 	ENGINE *e = NULL;
     83 	int i,ret=1, badarg = 0;
     84 	char *CApath=NULL,*CAfile=NULL;
     85 	char *untfile = NULL, *trustfile = NULL, *crlfile = NULL;
     86 	STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
     87 	STACK_OF(X509_CRL) *crls = NULL;
     88 	X509_STORE *cert_ctx=NULL;
     89 	X509_LOOKUP *lookup=NULL;
     90 	X509_VERIFY_PARAM *vpm = NULL;
     91 #ifndef OPENSSL_NO_ENGINE
     92 	char *engine=NULL;
     93 #endif
     94 
     95 	cert_ctx=X509_STORE_new();
     96 	if (cert_ctx == NULL) goto end;
     97 	X509_STORE_set_verify_cb(cert_ctx,cb);
     98 
     99 	ERR_load_crypto_strings();
    100 
    101 	apps_startup();
    102 
    103 	if (bio_err == NULL)
    104 		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
    105 			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
    106 
    107 	if (!load_config(bio_err, NULL))
    108 		goto end;
    109 
    110 	argc--;
    111 	argv++;
    112 	for (;;)
    113 		{
    114 		if (argc >= 1)
    115 			{
    116 			if (strcmp(*argv,"-CApath") == 0)
    117 				{
    118 				if (argc-- < 1) goto end;
    119 				CApath= *(++argv);
    120 				}
    121 			else if (strcmp(*argv,"-CAfile") == 0)
    122 				{
    123 				if (argc-- < 1) goto end;
    124 				CAfile= *(++argv);
    125 				}
    126 			else if (args_verify(&argv, &argc, &badarg, bio_err,
    127 									&vpm))
    128 				{
    129 				if (badarg)
    130 					goto end;
    131 				continue;
    132 				}
    133 			else if (strcmp(*argv,"-untrusted") == 0)
    134 				{
    135 				if (argc-- < 1) goto end;
    136 				untfile= *(++argv);
    137 				}
    138 			else if (strcmp(*argv,"-trusted") == 0)
    139 				{
    140 				if (argc-- < 1) goto end;
    141 				trustfile= *(++argv);
    142 				}
    143 			else if (strcmp(*argv,"-CRLfile") == 0)
    144 				{
    145 				if (argc-- < 1) goto end;
    146 				crlfile= *(++argv);
    147 				}
    148 #ifndef OPENSSL_NO_ENGINE
    149 			else if (strcmp(*argv,"-engine") == 0)
    150 				{
    151 				if (--argc < 1) goto end;
    152 				engine= *(++argv);
    153 				}
    154 #endif
    155 			else if (strcmp(*argv,"-help") == 0)
    156 				goto end;
    157 			else if (strcmp(*argv,"-verbose") == 0)
    158 				v_verbose=1;
    159 			else if (argv[0][0] == '-')
    160 				goto end;
    161 			else
    162 				break;
    163 			argc--;
    164 			argv++;
    165 			}
    166 		else
    167 			break;
    168 		}
    169 
    170 #ifndef OPENSSL_NO_ENGINE
    171         e = setup_engine(bio_err, engine, 0);
    172 #endif
    173 
    174 	if (vpm)
    175 		X509_STORE_set1_param(cert_ctx, vpm);
    176 
    177 	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
    178 	if (lookup == NULL) abort();
    179 	if (CAfile) {
    180 		i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM);
    181 		if(!i) {
    182 			BIO_printf(bio_err, "Error loading file %s\n", CAfile);
    183 			ERR_print_errors(bio_err);
    184 			goto end;
    185 		}
    186 	} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
    187 
    188 	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_hash_dir());
    189 	if (lookup == NULL) abort();
    190 	if (CApath) {
    191 		i=X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM);
    192 		if(!i) {
    193 			BIO_printf(bio_err, "Error loading directory %s\n", CApath);
    194 			ERR_print_errors(bio_err);
    195 			goto end;
    196 		}
    197 	} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
    198 
    199 	ERR_clear_error();
    200 
    201 	if(untfile)
    202 		{
    203 		untrusted = load_certs(bio_err, untfile, FORMAT_PEM,
    204 					NULL, e, "untrusted certificates");
    205 		if(!untrusted)
    206 			goto end;
    207 		}
    208 
    209 	if(trustfile)
    210 		{
    211 		trusted = load_certs(bio_err, trustfile, FORMAT_PEM,
    212 					NULL, e, "trusted certificates");
    213 		if(!trusted)
    214 			goto end;
    215 		}
    216 
    217 	if(crlfile)
    218 		{
    219 		crls = load_crls(bio_err, crlfile, FORMAT_PEM,
    220 					NULL, e, "other CRLs");
    221 		if(!crls)
    222 			goto end;
    223 		}
    224 
    225 	ret = 0;
    226 	if (argc < 1)
    227 		{
    228 		if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e))
    229 			ret = -1;
    230 		}
    231 	else
    232 		{
    233 		for (i=0; i<argc; i++)
    234 			if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e))
    235 				ret = -1;
    236 		}
    237 
    238 end:
    239 	if (ret == 1) {
    240 		BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
    241 		BIO_printf(bio_err," [-attime timestamp]");
    242 #ifndef OPENSSL_NO_ENGINE
    243 		BIO_printf(bio_err," [-engine e]");
    244 #endif
    245 		BIO_printf(bio_err," cert1 cert2 ...\n");
    246 
    247 		BIO_printf(bio_err,"recognized usages:\n");
    248 		for(i = 0; i < X509_PURPOSE_get_count(); i++)
    249 			{
    250 			X509_PURPOSE *ptmp;
    251 			ptmp = X509_PURPOSE_get0(i);
    252 			BIO_printf(bio_err, "\t%-10s\t%s\n",
    253 				   X509_PURPOSE_get0_sname(ptmp),
    254 				   X509_PURPOSE_get0_name(ptmp));
    255 			}
    256 	}
    257 	if (vpm) X509_VERIFY_PARAM_free(vpm);
    258 	if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
    259 	sk_X509_pop_free(untrusted, X509_free);
    260 	sk_X509_pop_free(trusted, X509_free);
    261 	sk_X509_CRL_pop_free(crls, X509_CRL_free);
    262 	apps_shutdown();
    263 	OPENSSL_EXIT(ret < 0 ? 2 : ret);
    264 	}
    265 
    266 static int check(X509_STORE *ctx, char *file,
    267 		STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
    268 		STACK_OF(X509_CRL) *crls, ENGINE *e)
    269 	{
    270 	X509 *x=NULL;
    271 	int i=0,ret=0;
    272 	X509_STORE_CTX *csc;
    273 
    274 	x = load_cert(bio_err, file, FORMAT_PEM, NULL, e, "certificate file");
    275 	if (x == NULL)
    276 		goto end;
    277 	fprintf(stdout,"%s: ",(file == NULL)?"stdin":file);
    278 
    279 	csc = X509_STORE_CTX_new();
    280 	if (csc == NULL)
    281 		{
    282 		ERR_print_errors(bio_err);
    283 		goto end;
    284 		}
    285 	X509_STORE_set_flags(ctx, vflags);
    286 	if(!X509_STORE_CTX_init(csc,ctx,x,uchain))
    287 		{
    288 		ERR_print_errors(bio_err);
    289 		goto end;
    290 		}
    291 	if(tchain) X509_STORE_CTX_trusted_stack(csc, tchain);
    292 	if (crls)
    293 		X509_STORE_CTX_set0_crls(csc, crls);
    294 	i=X509_verify_cert(csc);
    295 	X509_STORE_CTX_free(csc);
    296 
    297 	ret=0;
    298 end:
    299 	if (i > 0)
    300 		{
    301 		fprintf(stdout,"OK\n");
    302 		ret=1;
    303 		}
    304 	else
    305 		ERR_print_errors(bio_err);
    306 	if (x != NULL) X509_free(x);
    307 
    308 	return(ret);
    309 	}
    310 
    311 static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
    312 	{
    313 	int cert_error = X509_STORE_CTX_get_error(ctx);
    314 	X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
    315 
    316 	if (!ok)
    317 		{
    318 		if (current_cert)
    319 			{
    320 			X509_NAME_print_ex_fp(stdout,
    321 				X509_get_subject_name(current_cert),
    322 				0, XN_FLAG_ONELINE);
    323 			printf("\n");
    324 			}
    325 		printf("%serror %d at %d depth lookup:%s\n",
    326 			X509_STORE_CTX_get0_parent_ctx(ctx) ? "[CRL path]" : "",
    327 			cert_error,
    328 			X509_STORE_CTX_get_error_depth(ctx),
    329 			X509_verify_cert_error_string(cert_error));
    330 		switch(cert_error)
    331 			{
    332 			case X509_V_ERR_NO_EXPLICIT_POLICY:
    333 				policies_print(NULL, ctx);
    334 			case X509_V_ERR_CERT_HAS_EXPIRED:
    335 
    336 			/* since we are just checking the certificates, it is
    337 			 * ok if they are self signed. But we should still warn
    338 			 * the user.
    339 			 */
    340 
    341 			case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
    342 			/* Continue after extension errors too */
    343 			case X509_V_ERR_INVALID_CA:
    344 			case X509_V_ERR_INVALID_NON_CA:
    345 			case X509_V_ERR_PATH_LENGTH_EXCEEDED:
    346 			case X509_V_ERR_INVALID_PURPOSE:
    347 			case X509_V_ERR_CRL_HAS_EXPIRED:
    348 			case X509_V_ERR_CRL_NOT_YET_VALID:
    349 			case X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION:
    350 			ok = 1;
    351 
    352 			}
    353 
    354 		return ok;
    355 
    356 		}
    357 	if (cert_error == X509_V_OK && ok == 2)
    358 		policies_print(NULL, ctx);
    359 	if (!v_verbose)
    360 		ERR_clear_error();
    361 	return(ok);
    362 	}
    363