verify.c revision 337982
1/* apps/verify.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <stdlib.h>
61#include <string.h>
62#include "apps.h"
63#include <openssl/bio.h>
64#include <openssl/err.h>
65#include <openssl/x509.h>
66#include <openssl/x509v3.h>
67#include <openssl/pem.h>
68
69#undef PROG
70#define PROG    verify_main
71
72static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
73static int check(X509_STORE *ctx, char *file,
74                 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
75                 STACK_OF(X509_CRL) *crls, ENGINE *e);
76static int v_verbose = 0, vflags = 0;
77
78int MAIN(int, char **);
79
80int MAIN(int argc, char **argv)
81{
82    ENGINE *e = NULL;
83    int i, ret = 1, badarg = 0;
84    char *CApath = NULL, *CAfile = NULL;
85    char *untfile = NULL, *trustfile = NULL, *crlfile = NULL;
86    STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
87    STACK_OF(X509_CRL) *crls = NULL;
88    X509_STORE *cert_ctx = NULL;
89    X509_LOOKUP *lookup = NULL;
90    X509_VERIFY_PARAM *vpm = NULL;
91    int crl_download = 0;
92    char *engine = NULL;
93
94    cert_ctx = X509_STORE_new();
95    if (cert_ctx == NULL)
96        goto end;
97    X509_STORE_set_verify_cb(cert_ctx, cb);
98
99    ERR_load_crypto_strings();
100
101    apps_startup();
102
103    if (bio_err == NULL)
104        if ((bio_err = BIO_new(BIO_s_file())) != NULL)
105            BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
106
107    if (!load_config(bio_err, NULL))
108        goto end;
109
110    argc--;
111    argv++;
112    for (;;) {
113        if (argc >= 1) {
114            if (strcmp(*argv, "-CApath") == 0) {
115                if (argc-- < 1)
116                    goto usage;
117                CApath = *(++argv);
118            } else if (strcmp(*argv, "-CAfile") == 0) {
119                if (argc-- < 1)
120                    goto usage;
121                CAfile = *(++argv);
122            } else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm)) {
123                if (badarg)
124                    goto usage;
125                continue;
126            } else if (strcmp(*argv, "-untrusted") == 0) {
127                if (argc-- < 1)
128                    goto usage;
129                untfile = *(++argv);
130            } else if (strcmp(*argv, "-trusted") == 0) {
131                if (argc-- < 1)
132                    goto usage;
133                trustfile = *(++argv);
134            } else if (strcmp(*argv, "-CRLfile") == 0) {
135                if (argc-- < 1)
136                    goto usage;
137                crlfile = *(++argv);
138            } else if (strcmp(*argv, "-crl_download") == 0)
139                crl_download = 1;
140#ifndef OPENSSL_NO_ENGINE
141            else if (strcmp(*argv, "-engine") == 0) {
142                if (--argc < 1)
143                    goto usage;
144                engine = *(++argv);
145            }
146#endif
147            else if (strcmp(*argv, "-help") == 0)
148                goto usage;
149            else if (strcmp(*argv, "-verbose") == 0)
150                v_verbose = 1;
151            else if (argv[0][0] == '-')
152                goto usage;
153            else
154                break;
155            argc--;
156            argv++;
157        } else
158            break;
159    }
160
161    e = setup_engine(bio_err, engine, 0);
162
163    if (vpm)
164        X509_STORE_set1_param(cert_ctx, vpm);
165
166    lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_file());
167    if (lookup == NULL)
168        abort();
169    if (CAfile) {
170        i = X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM);
171        if (!i) {
172            BIO_printf(bio_err, "Error loading file %s\n", CAfile);
173            ERR_print_errors(bio_err);
174            goto end;
175        }
176    } else
177        X509_LOOKUP_load_file(lookup, NULL, X509_FILETYPE_DEFAULT);
178
179    lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_hash_dir());
180    if (lookup == NULL)
181        abort();
182    if (CApath) {
183        i = X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM);
184        if (!i) {
185            BIO_printf(bio_err, "Error loading directory %s\n", CApath);
186            ERR_print_errors(bio_err);
187            goto end;
188        }
189    } else
190        X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT);
191
192    ERR_clear_error();
193
194    if (untfile) {
195        untrusted = load_certs(bio_err, untfile, FORMAT_PEM,
196                               NULL, e, "untrusted certificates");
197        if (!untrusted)
198            goto end;
199    }
200
201    if (trustfile) {
202        trusted = load_certs(bio_err, trustfile, FORMAT_PEM,
203                             NULL, e, "trusted certificates");
204        if (!trusted)
205            goto end;
206    }
207
208    if (crlfile) {
209        crls = load_crls(bio_err, crlfile, FORMAT_PEM, NULL, e, "other CRLs");
210        if (!crls)
211            goto end;
212    }
213
214    ret = 0;
215
216    if (crl_download)
217        store_setup_crl_download(cert_ctx);
218    if (argc < 1) {
219        if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e))
220            ret = -1;
221    } else {
222        for (i = 0; i < argc; i++)
223            if (1 != check(cert_ctx, argv[i], untrusted, trusted, crls, e))
224                ret = -1;
225    }
226
227 usage:
228    if (ret == 1) {
229        BIO_printf(bio_err,
230                   "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
231        BIO_printf(bio_err, " [-no_alt_chains] [-attime timestamp]");
232#ifndef OPENSSL_NO_ENGINE
233        BIO_printf(bio_err, " [-engine e]");
234#endif
235        BIO_printf(bio_err, " cert1 cert2 ...\n");
236
237        BIO_printf(bio_err, "recognized usages:\n");
238        for (i = 0; i < X509_PURPOSE_get_count(); i++) {
239            X509_PURPOSE *ptmp;
240            ptmp = X509_PURPOSE_get0(i);
241            BIO_printf(bio_err, "\t%-10s\t%s\n",
242                       X509_PURPOSE_get0_sname(ptmp),
243                       X509_PURPOSE_get0_name(ptmp));
244        }
245    }
246 end:
247    if (vpm)
248        X509_VERIFY_PARAM_free(vpm);
249    if (cert_ctx != NULL)
250        X509_STORE_free(cert_ctx);
251    sk_X509_pop_free(untrusted, X509_free);
252    sk_X509_pop_free(trusted, X509_free);
253    sk_X509_CRL_pop_free(crls, X509_CRL_free);
254    release_engine(e);
255    apps_shutdown();
256    OPENSSL_EXIT(ret < 0 ? 2 : ret);
257}
258
259static int check(X509_STORE *ctx, char *file,
260                 STACK_OF(X509) *uchain, STACK_OF(X509) *tchain,
261                 STACK_OF(X509_CRL) *crls, ENGINE *e)
262{
263    X509 *x = NULL;
264    int i = 0, ret = 0;
265    X509_STORE_CTX *csc;
266
267    x = load_cert(bio_err, file, FORMAT_PEM, NULL, e, "certificate file");
268    if (x == NULL)
269        goto end;
270    fprintf(stdout, "%s: ", (file == NULL) ? "stdin" : file);
271
272    csc = X509_STORE_CTX_new();
273    if (csc == NULL) {
274        ERR_print_errors(bio_err);
275        goto end;
276    }
277    X509_STORE_set_flags(ctx, vflags);
278    if (!X509_STORE_CTX_init(csc, ctx, x, uchain)) {
279        ERR_print_errors(bio_err);
280        X509_STORE_CTX_free(csc);
281        goto end;
282    }
283    if (tchain)
284        X509_STORE_CTX_trusted_stack(csc, tchain);
285    if (crls)
286        X509_STORE_CTX_set0_crls(csc, crls);
287    i = X509_verify_cert(csc);
288    X509_STORE_CTX_free(csc);
289
290    ret = 0;
291 end:
292    if (i > 0) {
293        fprintf(stdout, "OK\n");
294        ret = 1;
295    } else
296        ERR_print_errors(bio_err);
297    if (x != NULL)
298        X509_free(x);
299
300    return (ret);
301}
302
303static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
304{
305    int cert_error = X509_STORE_CTX_get_error(ctx);
306    X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
307
308    if (!ok) {
309        if (current_cert) {
310            X509_NAME_print_ex_fp(stdout,
311                                  X509_get_subject_name(current_cert),
312                                  0, XN_FLAG_ONELINE);
313            printf("\n");
314        }
315        printf("%serror %d at %d depth lookup:%s\n",
316               X509_STORE_CTX_get0_parent_ctx(ctx) ? "[CRL path]" : "",
317               cert_error,
318               X509_STORE_CTX_get_error_depth(ctx),
319               X509_verify_cert_error_string(cert_error));
320        switch (cert_error) {
321        case X509_V_ERR_NO_EXPLICIT_POLICY:
322            policies_print(NULL, ctx);
323        case X509_V_ERR_CERT_HAS_EXPIRED:
324
325            /*
326             * since we are just checking the certificates, it is ok if they
327             * are self signed. But we should still warn the user.
328             */
329
330        case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
331            /* Continue after extension errors too */
332        case X509_V_ERR_INVALID_CA:
333        case X509_V_ERR_INVALID_NON_CA:
334        case X509_V_ERR_PATH_LENGTH_EXCEEDED:
335        case X509_V_ERR_INVALID_PURPOSE:
336        case X509_V_ERR_CRL_HAS_EXPIRED:
337        case X509_V_ERR_CRL_NOT_YET_VALID:
338        case X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION:
339            ok = 1;
340
341        }
342
343        return ok;
344
345    }
346    if (cert_error == X509_V_OK && ok == 2)
347        policies_print(NULL, ctx);
348    if (!v_verbose)
349        ERR_clear_error();
350    return (ok);
351}
352