1/* apps/crl.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <stdlib.h>
61#include <string.h>
62#include "apps.h"
63#include <openssl/bio.h>
64#include <openssl/err.h>
65#include <openssl/x509.h>
66#include <openssl/x509v3.h>
67#include <openssl/pem.h>
68
69#undef PROG
70#define PROG    crl_main
71
72#undef POSTFIX
73#define POSTFIX ".rvk"
74
75static const char *crl_usage[] = {
76    "usage: crl args\n",
77    "\n",
78    " -inform arg     - input format - default PEM (DER or PEM)\n",
79    " -outform arg    - output format - default PEM\n",
80    " -text           - print out a text format version\n",
81    " -in arg         - input file - default stdin\n",
82    " -out arg        - output file - default stdout\n",
83    " -hash           - print hash value\n",
84#ifndef OPENSSL_NO_MD5
85    " -hash_old       - print old-style (MD5) hash value\n",
86#endif
87    " -fingerprint    - print the crl fingerprint\n",
88    " -issuer         - print issuer DN\n",
89    " -lastupdate     - lastUpdate field\n",
90    " -nextupdate     - nextUpdate field\n",
91    " -crlnumber      - print CRL number\n",
92    " -noout          - no CRL output\n",
93    " -CAfile  name   - verify CRL using certificates in file \"name\"\n",
94    " -CApath  dir    - verify CRL using certificates in \"dir\"\n",
95    " -nameopt arg    - various certificate name options\n",
96    NULL
97};
98
99static BIO *bio_out = NULL;
100
101int MAIN(int, char **);
102
103int MAIN(int argc, char **argv)
104{
105    unsigned long nmflag = 0;
106    X509_CRL *x = NULL;
107    char *CAfile = NULL, *CApath = NULL;
108    int ret = 1, i, num, badops = 0, badsig = 0;
109    BIO *out = NULL;
110    int informat, outformat, keyformat;
111    char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL;
112    int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout =
113        0, text = 0;
114#ifndef OPENSSL_NO_MD5
115    int hash_old = 0;
116#endif
117    int fingerprint = 0, crlnumber = 0;
118    const char **pp;
119    X509_STORE *store = NULL;
120    X509_STORE_CTX ctx;
121    X509_LOOKUP *lookup = NULL;
122    X509_OBJECT xobj;
123    EVP_PKEY *pkey;
124    int do_ver = 0;
125    const EVP_MD *md_alg, *digest = EVP_sha1();
126
127    apps_startup();
128
129    if (bio_err == NULL)
130        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
131            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
132
133    if (!load_config(bio_err, NULL))
134        goto end;
135
136    if (bio_out == NULL)
137        if ((bio_out = BIO_new(BIO_s_file())) != NULL) {
138            BIO_set_fp(bio_out, stdout, BIO_NOCLOSE);
139#ifdef OPENSSL_SYS_VMS
140            {
141                BIO *tmpbio = BIO_new(BIO_f_linebuffer());
142                bio_out = BIO_push(tmpbio, bio_out);
143            }
144#endif
145        }
146
147    informat = FORMAT_PEM;
148    outformat = FORMAT_PEM;
149    keyformat = FORMAT_PEM;
150
151    argc--;
152    argv++;
153    num = 0;
154    while (argc >= 1) {
155#ifdef undef
156        if (strcmp(*argv, "-p") == 0) {
157            if (--argc < 1)
158                goto bad;
159            if (!args_from_file(++argv, Nargc, Nargv)) {
160                goto end;
161            }
162        */}
163#endif
164        if (strcmp(*argv, "-inform") == 0) {
165            if (--argc < 1)
166                goto bad;
167            informat = str2fmt(*(++argv));
168        } else if (strcmp(*argv, "-outform") == 0) {
169            if (--argc < 1)
170                goto bad;
171            outformat = str2fmt(*(++argv));
172        } else if (strcmp(*argv, "-in") == 0) {
173            if (--argc < 1)
174                goto bad;
175            infile = *(++argv);
176        } else if (strcmp(*argv, "-gendelta") == 0) {
177            if (--argc < 1)
178                goto bad;
179            crldiff = *(++argv);
180        } else if (strcmp(*argv, "-key") == 0) {
181            if (--argc < 1)
182                goto bad;
183            keyfile = *(++argv);
184        } else if (strcmp(*argv, "-keyform") == 0) {
185            if (--argc < 1)
186                goto bad;
187            keyformat = str2fmt(*(++argv));
188        } else if (strcmp(*argv, "-out") == 0) {
189            if (--argc < 1)
190                goto bad;
191            outfile = *(++argv);
192        } else if (strcmp(*argv, "-CApath") == 0) {
193            if (--argc < 1)
194                goto bad;
195            CApath = *(++argv);
196            do_ver = 1;
197        } else if (strcmp(*argv, "-CAfile") == 0) {
198            if (--argc < 1)
199                goto bad;
200            CAfile = *(++argv);
201            do_ver = 1;
202        } else if (strcmp(*argv, "-verify") == 0)
203            do_ver = 1;
204        else if (strcmp(*argv, "-text") == 0)
205            text = 1;
206        else if (strcmp(*argv, "-hash") == 0)
207            hash = ++num;
208#ifndef OPENSSL_NO_MD5
209        else if (strcmp(*argv, "-hash_old") == 0)
210            hash_old = ++num;
211#endif
212        else if (strcmp(*argv, "-nameopt") == 0) {
213            if (--argc < 1)
214                goto bad;
215            if (!set_name_ex(&nmflag, *(++argv)))
216                goto bad;
217        } else if (strcmp(*argv, "-issuer") == 0)
218            issuer = ++num;
219        else if (strcmp(*argv, "-lastupdate") == 0)
220            lastupdate = ++num;
221        else if (strcmp(*argv, "-nextupdate") == 0)
222            nextupdate = ++num;
223        else if (strcmp(*argv, "-noout") == 0)
224            noout = ++num;
225        else if (strcmp(*argv, "-fingerprint") == 0)
226            fingerprint = ++num;
227        else if (strcmp(*argv, "-crlnumber") == 0)
228            crlnumber = ++num;
229        else if (strcmp(*argv, "-badsig") == 0)
230            badsig = 1;
231        else if ((md_alg = EVP_get_digestbyname(*argv + 1))) {
232            /* ok */
233            digest = md_alg;
234        } else {
235            BIO_printf(bio_err, "unknown option %s\n", *argv);
236            badops = 1;
237            break;
238        }
239        argc--;
240        argv++;
241    }
242
243    if (badops) {
244 bad:
245        for (pp = crl_usage; (*pp != NULL); pp++)
246            BIO_printf(bio_err, "%s", *pp);
247        goto end;
248    }
249
250    ERR_load_crypto_strings();
251    x = load_crl(infile, informat);
252    if (x == NULL) {
253        goto end;
254    }
255
256    if (do_ver) {
257        store = X509_STORE_new();
258        lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
259        if (lookup == NULL)
260            goto end;
261        if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
262            X509_LOOKUP_load_file(lookup, NULL, X509_FILETYPE_DEFAULT);
263
264        lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
265        if (lookup == NULL)
266            goto end;
267        if (!X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM))
268            X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT);
269        ERR_clear_error();
270
271        if (!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
272            BIO_printf(bio_err, "Error initialising X509 store\n");
273            goto end;
274        }
275
276        i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
277                                      X509_CRL_get_issuer(x), &xobj);
278        if (i <= 0) {
279            BIO_printf(bio_err, "Error getting CRL issuer certificate\n");
280            goto end;
281        }
282        pkey = X509_get_pubkey(xobj.data.x509);
283        X509_OBJECT_free_contents(&xobj);
284        if (!pkey) {
285            BIO_printf(bio_err, "Error getting CRL issuer public key\n");
286            goto end;
287        }
288        i = X509_CRL_verify(x, pkey);
289        EVP_PKEY_free(pkey);
290        if (i < 0)
291            goto end;
292        if (i == 0)
293            BIO_printf(bio_err, "verify failure\n");
294        else
295            BIO_printf(bio_err, "verify OK\n");
296    }
297
298    if (crldiff) {
299        X509_CRL *newcrl, *delta;
300        if (!keyfile) {
301            BIO_puts(bio_err, "Missing CRL signing key\n");
302            goto end;
303        }
304        newcrl = load_crl(crldiff, informat);
305        if (!newcrl)
306            goto end;
307        pkey = load_key(bio_err, keyfile, keyformat, 0, NULL, NULL,
308                        "CRL signing key");
309        if (!pkey) {
310            X509_CRL_free(newcrl);
311            goto end;
312        }
313        delta = X509_CRL_diff(x, newcrl, pkey, digest, 0);
314        X509_CRL_free(newcrl);
315        EVP_PKEY_free(pkey);
316        if (delta) {
317            X509_CRL_free(x);
318            x = delta;
319        } else {
320            BIO_puts(bio_err, "Error creating delta CRL\n");
321            goto end;
322        }
323    }
324
325    if (num) {
326        for (i = 1; i <= num; i++) {
327            if (issuer == i) {
328                print_name(bio_out, "issuer=", X509_CRL_get_issuer(x),
329                           nmflag);
330            }
331            if (crlnumber == i) {
332                ASN1_INTEGER *crlnum;
333                crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number, NULL, NULL);
334                BIO_printf(bio_out, "crlNumber=");
335                if (crlnum) {
336                    i2a_ASN1_INTEGER(bio_out, crlnum);
337                    ASN1_INTEGER_free(crlnum);
338                } else
339                    BIO_puts(bio_out, "<NONE>");
340                BIO_printf(bio_out, "\n");
341            }
342            if (hash == i) {
343                BIO_printf(bio_out, "%08lx\n",
344                           X509_NAME_hash(X509_CRL_get_issuer(x)));
345            }
346#ifndef OPENSSL_NO_MD5
347            if (hash_old == i) {
348                BIO_printf(bio_out, "%08lx\n",
349                           X509_NAME_hash_old(X509_CRL_get_issuer(x)));
350            }
351#endif
352            if (lastupdate == i) {
353                BIO_printf(bio_out, "lastUpdate=");
354                ASN1_TIME_print(bio_out, X509_CRL_get_lastUpdate(x));
355                BIO_printf(bio_out, "\n");
356            }
357            if (nextupdate == i) {
358                BIO_printf(bio_out, "nextUpdate=");
359                if (X509_CRL_get_nextUpdate(x))
360                    ASN1_TIME_print(bio_out, X509_CRL_get_nextUpdate(x));
361                else
362                    BIO_printf(bio_out, "NONE");
363                BIO_printf(bio_out, "\n");
364            }
365            if (fingerprint == i) {
366                int j;
367                unsigned int n;
368                unsigned char md[EVP_MAX_MD_SIZE];
369
370                if (!X509_CRL_digest(x, digest, md, &n)) {
371                    BIO_printf(bio_err, "out of memory\n");
372                    goto end;
373                }
374                BIO_printf(bio_out, "%s Fingerprint=",
375                           OBJ_nid2sn(EVP_MD_type(digest)));
376                for (j = 0; j < (int)n; j++) {
377                    BIO_printf(bio_out, "%02X%c", md[j], (j + 1 == (int)n)
378                               ? '\n' : ':');
379                }
380            }
381        }
382    }
383
384    out = BIO_new(BIO_s_file());
385    if (out == NULL) {
386        ERR_print_errors(bio_err);
387        goto end;
388    }
389
390    if (outfile == NULL) {
391        BIO_set_fp(out, stdout, BIO_NOCLOSE);
392#ifdef OPENSSL_SYS_VMS
393        {
394            BIO *tmpbio = BIO_new(BIO_f_linebuffer());
395            out = BIO_push(tmpbio, out);
396        }
397#endif
398    } else {
399        if (BIO_write_filename(out, outfile) <= 0) {
400            perror(outfile);
401            goto end;
402        }
403    }
404
405    if (text)
406        X509_CRL_print(out, x);
407
408    if (noout) {
409        ret = 0;
410        goto end;
411    }
412
413    if (badsig)
414        x->signature->data[x->signature->length - 1] ^= 0x1;
415
416    if (outformat == FORMAT_ASN1)
417        i = (int)i2d_X509_CRL_bio(out, x);
418    else if (outformat == FORMAT_PEM)
419        i = PEM_write_bio_X509_CRL(out, x);
420    else {
421        BIO_printf(bio_err, "bad output format specified for outfile\n");
422        goto end;
423    }
424    if (!i) {
425        BIO_printf(bio_err, "unable to write CRL\n");
426        goto end;
427    }
428    ret = 0;
429 end:
430    if (ret != 0)
431        ERR_print_errors(bio_err);
432    BIO_free_all(out);
433    BIO_free_all(bio_out);
434    bio_out = NULL;
435    X509_CRL_free(x);
436    if (store) {
437        X509_STORE_CTX_cleanup(&ctx);
438        X509_STORE_free(store);
439    }
440    apps_shutdown();
441    OPENSSL_EXIT(ret);
442}
443