1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay (at) cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay (at) cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57 #include <openssl/asn1.h> 58 #include <openssl/buf.h> 59 #include <openssl/digest.h> 60 #include <openssl/dsa.h> 61 #include <openssl/evp.h> 62 #include <openssl/rsa.h> 63 #include <openssl/stack.h> 64 #include <openssl/x509.h> 65 66 67 int X509_verify(X509 *a, EVP_PKEY *r) 68 { 69 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 70 return 0; 71 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg, 72 a->signature,a->cert_info,r)); 73 } 74 75 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) 76 { 77 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO), 78 a->sig_alg,a->signature,a->req_info,r)); 79 } 80 81 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 82 { 83 x->cert_info->enc.modified = 1; 84 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 85 x->sig_alg, x->signature, x->cert_info,pkey,md)); 86 } 87 88 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) 89 { 90 x->cert_info->enc.modified = 1; 91 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF), 92 x->cert_info->signature, 93 x->sig_alg, x->signature, x->cert_info, ctx); 94 } 95 96 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 97 { 98 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL, 99 x->signature, x->req_info,pkey,md)); 100 } 101 102 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) 103 { 104 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO), 105 x->sig_alg, NULL, x->signature, x->req_info, ctx); 106 } 107 108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 109 { 110 x->crl->enc.modified = 1; 111 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 112 x->sig_alg, x->signature, x->crl,pkey,md)); 113 } 114 115 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) 116 { 117 x->crl->enc.modified = 1; 118 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO), 119 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); 120 } 121 122 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 123 { 124 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL, 125 x->signature, x->spkac,pkey,md)); 126 } 127 128 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *x, EVP_PKEY *pkey) 129 { 130 return (ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor, 131 x->signature, x->spkac, pkey)); 132 } 133 134 #ifndef OPENSSL_NO_FP_API 135 X509 *d2i_X509_fp(FILE *fp, X509 **x509) 136 { 137 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); 138 } 139 140 int i2d_X509_fp(FILE *fp, X509 *x509) 141 { 142 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509); 143 } 144 #endif 145 146 X509 *d2i_X509_bio(BIO *bp, X509 **x509) 147 { 148 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509); 149 } 150 151 int i2d_X509_bio(BIO *bp, X509 *x509) 152 { 153 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); 154 } 155 156 #ifndef OPENSSL_NO_FP_API 157 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) 158 { 159 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 160 } 161 162 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) 163 { 164 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 165 } 166 #endif 167 168 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) 169 { 170 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 171 } 172 173 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) 174 { 175 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 176 } 177 178 #ifndef OPENSSL_NO_FP_API 179 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) 180 { 181 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 182 } 183 184 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) 185 { 186 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 187 } 188 #endif 189 190 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) 191 { 192 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 193 } 194 195 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) 196 { 197 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 198 } 199 200 201 #ifndef OPENSSL_NO_FP_API 202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 203 { 204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); 205 } 206 207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 208 { 209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); 210 } 211 212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 213 { 214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); 215 } 216 217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) 218 { 219 return ASN1_d2i_fp((void *(*)(void)) 220 RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp, 221 (void **)rsa); 222 } 223 224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) 225 { 226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa); 227 } 228 229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) 230 { 231 return ASN1_i2d_fp((I2D_OF_const(void))i2d_RSA_PUBKEY,fp,rsa); 232 } 233 #endif 234 235 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) 236 { 237 return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPrivateKey, bp, rsa); 238 } 239 240 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) 241 { 242 return ASN1_i2d_bio_of_const(RSA, i2d_RSAPrivateKey, bp, rsa); 243 } 244 245 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) 246 { 247 return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPublicKey, bp, rsa); 248 } 249 250 251 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) 252 { 253 return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa); 254 } 255 256 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) 257 { 258 return ASN1_i2d_bio_of_const(RSA, i2d_RSAPublicKey, bp, rsa); 259 } 260 261 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) 262 { 263 return ASN1_i2d_bio_of_const(RSA,i2d_RSA_PUBKEY,bp,rsa); 264 } 265 266 #ifndef OPENSSL_NO_DSA 267 #ifndef OPENSSL_NO_FP_API 268 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 269 { 270 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 271 } 272 273 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 274 { 275 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); 276 } 277 278 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) 279 { 280 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa); 281 } 282 283 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) 284 { 285 return ASN1_i2d_fp_of_const(DSA,i2d_DSA_PUBKEY,fp,dsa); 286 } 287 #endif 288 289 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) 290 { 291 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa 292 ); 293 } 294 295 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) 296 { 297 return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa); 298 } 299 300 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) 301 { 302 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa); 303 } 304 305 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) 306 { 307 return ASN1_i2d_bio_of_const(DSA,i2d_DSA_PUBKEY,bp,dsa); 308 } 309 310 #endif 311 312 #ifndef OPENSSL_NO_FP_API 313 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey) 314 { 315 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey); 316 } 317 318 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey) 319 { 320 return ASN1_i2d_fp_of_const(EC_KEY,i2d_EC_PUBKEY,fp,eckey); 321 } 322 323 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) 324 { 325 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey); 326 } 327 328 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) 329 { 330 return ASN1_i2d_fp_of_const(EC_KEY,i2d_ECPrivateKey,fp,eckey); 331 } 332 #endif 333 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey) 334 { 335 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey); 336 } 337 338 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa) 339 { 340 return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa); 341 } 342 343 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey) 344 { 345 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey); 346 } 347 348 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) 349 { 350 return ASN1_i2d_bio_of_const(EC_KEY,i2d_ECPrivateKey,bp,eckey); 351 } 352 353 354 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 355 unsigned int *len) 356 { 357 ASN1_BIT_STRING *key; 358 key = X509_get0_pubkey_bitstr(data); 359 if(!key) return 0; 360 return EVP_Digest(key->data, key->length, md, len, type, NULL); 361 } 362 363 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 364 unsigned int *len) 365 { 366 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len)); 367 } 368 369 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, 370 unsigned int *len) 371 { 372 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len)); 373 } 374 375 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, 376 unsigned int *len) 377 { 378 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len)); 379 } 380 381 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, 382 unsigned int *len) 383 { 384 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len)); 385 } 386 387 #ifndef OPENSSL_NO_FP_API 388 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) 389 { 390 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8); 391 } 392 393 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) 394 { 395 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8); 396 } 397 #endif 398 399 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) 400 { 401 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8); 402 } 403 404 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) 405 { 406 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8); 407 } 408 409 #ifndef OPENSSL_NO_FP_API 410 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, 411 PKCS8_PRIV_KEY_INFO **p8inf) 412 { 413 return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 414 d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf); 415 } 416 417 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) 418 { 419 return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp, 420 p8inf); 421 } 422 423 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) 424 { 425 PKCS8_PRIV_KEY_INFO *p8inf; 426 int ret; 427 p8inf = EVP_PKEY2PKCS8(key); 428 if(!p8inf) return 0; 429 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf); 430 PKCS8_PRIV_KEY_INFO_free(p8inf); 431 return ret; 432 } 433 434 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) 435 { 436 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PrivateKey,fp,pkey); 437 } 438 439 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) 440 { 441 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a); 442 } 443 444 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) 445 { 446 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PUBKEY,fp,pkey); 447 } 448 449 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a) 450 { 451 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a); 452 } 453 454 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, 455 PKCS8_PRIV_KEY_INFO **p8inf) 456 { 457 return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 458 d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf); 459 } 460 461 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) 462 { 463 return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp, 464 p8inf); 465 } 466 467 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) 468 { 469 PKCS8_PRIV_KEY_INFO *p8inf; 470 int ret; 471 p8inf = EVP_PKEY2PKCS8(key); 472 if(!p8inf) return 0; 473 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf); 474 PKCS8_PRIV_KEY_INFO_free(p8inf); 475 return ret; 476 } 477 #endif 478 479 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) 480 { 481 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PrivateKey,bp,pkey); 482 } 483 484 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) 485 { 486 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a); 487 } 488 489 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) 490 { 491 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PUBKEY,bp,pkey); 492 } 493 494 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a) 495 { 496 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a); 497 } 498