1/* crypto/x509/x_all.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#undef SSLEAY_MACROS 61#include <openssl/stack.h> 62#include "cryptlib.h" 63#include <openssl/buffer.h> 64#include <openssl/asn1.h> 65#include <openssl/evp.h> 66#include <openssl/x509.h> 67 68int X509_verify(X509 *a, EVP_PKEY *r) 69 { 70 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg, 71 a->signature,a->cert_info,r)); 72 } 73 74int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) 75 { 76 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO), 77 a->sig_alg,a->signature,a->req_info,r)); 78 } 79 80int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r) 81 { 82 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CRL_INFO), 83 a->sig_alg, a->signature,a->crl,r)); 84 } 85 86int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) 87 { 88 return(ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), 89 a->sig_algor,a->signature,a->spkac,r)); 90 } 91 92int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 93 { 94 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 95 x->sig_alg, x->signature, x->cert_info,pkey,md)); 96 } 97 98int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 99 { 100 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL, 101 x->signature, x->req_info,pkey,md)); 102 } 103 104int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 105 { 106 x->crl->enc.modified = 1; 107 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 108 x->sig_alg, x->signature, x->crl,pkey,md)); 109 } 110 111int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 112 { 113 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL, 114 x->signature, x->spkac,pkey,md)); 115 } 116 117#ifndef OPENSSL_NO_FP_API 118X509 *d2i_X509_fp(FILE *fp, X509 **x509) 119 { 120 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); 121 } 122 123int i2d_X509_fp(FILE *fp, X509 *x509) 124 { 125 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509); 126 } 127#endif 128 129X509 *d2i_X509_bio(BIO *bp, X509 **x509) 130 { 131 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509); 132 } 133 134int i2d_X509_bio(BIO *bp, X509 *x509) 135 { 136 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); 137 } 138 139#ifndef OPENSSL_NO_FP_API 140X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) 141 { 142 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 143 } 144 145int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) 146 { 147 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 148 } 149#endif 150 151X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) 152 { 153 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 154 } 155 156int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) 157 { 158 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 159 } 160 161#ifndef OPENSSL_NO_FP_API 162PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) 163 { 164 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 165 } 166 167int i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) 168 { 169 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 170 } 171#endif 172 173PKCS7 *d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) 174 { 175 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 176 } 177 178int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) 179 { 180 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 181 } 182 183#ifndef OPENSSL_NO_FP_API 184X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) 185 { 186 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 187 } 188 189int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) 190 { 191 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 192 } 193#endif 194 195X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) 196 { 197 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 198 } 199 200int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) 201 { 202 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 203 } 204 205#ifndef OPENSSL_NO_RSA 206 207#ifndef OPENSSL_NO_FP_API 208RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 209 { 210 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 211 } 212 213int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 214 { 215 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 216 } 217 218RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 219 { 220 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 221 } 222 223 224RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) 225 { 226 return((RSA *)ASN1_d2i_fp((char *(*)()) 227 RSA_new,(char *(*)())d2i_RSA_PUBKEY, (fp), 228 (unsigned char **)(rsa))); 229 } 230 231int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) 232 { 233 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 234 } 235 236int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) 237 { 238 return(ASN1_i2d_fp(i2d_RSA_PUBKEY,fp,(unsigned char *)rsa)); 239 } 240#endif 241 242RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) 243 { 244 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 245 } 246 247int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) 248 { 249 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 250 } 251 252RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) 253 { 254 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 255 } 256 257 258RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) 259 { 260 return((RSA *)ASN1_d2i_bio((char *(*)()) 261 RSA_new,(char *(*)())d2i_RSA_PUBKEY, (bp), 262 (unsigned char **)(rsa))); 263 } 264 265int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) 266 { 267 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 268 } 269 270int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) 271 { 272 return(ASN1_i2d_bio(i2d_RSA_PUBKEY,bp,(unsigned char *)rsa)); 273 } 274#endif 275 276#ifndef OPENSSL_NO_DSA 277#ifndef OPENSSL_NO_FP_API 278DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 279 { 280 return((DSA *)ASN1_d2i_fp((char *(*)()) 281 DSA_new,(char *(*)())d2i_DSAPrivateKey, (fp), 282 (unsigned char **)(dsa))); 283 } 284 285int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 286 { 287 return(ASN1_i2d_fp(i2d_DSAPrivateKey,fp,(unsigned char *)dsa)); 288 } 289 290DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) 291 { 292 return((DSA *)ASN1_d2i_fp((char *(*)()) 293 DSA_new,(char *(*)())d2i_DSA_PUBKEY, (fp), 294 (unsigned char **)(dsa))); 295 } 296 297int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) 298 { 299 return(ASN1_i2d_fp(i2d_DSA_PUBKEY,fp,(unsigned char *)dsa)); 300 } 301#endif 302 303DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) 304 { 305 return((DSA *)ASN1_d2i_bio((char *(*)()) 306 DSA_new,(char *(*)())d2i_DSAPrivateKey, (bp), 307 (unsigned char **)(dsa))); 308 } 309 310int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) 311 { 312 return(ASN1_i2d_bio(i2d_DSAPrivateKey,bp,(unsigned char *)dsa)); 313 } 314 315DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) 316 { 317 return((DSA *)ASN1_d2i_bio((char *(*)()) 318 DSA_new,(char *(*)())d2i_DSA_PUBKEY, (bp), 319 (unsigned char **)(dsa))); 320 } 321 322int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) 323 { 324 return(ASN1_i2d_bio(i2d_DSA_PUBKEY,bp,(unsigned char *)dsa)); 325 } 326 327#endif 328 329int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 330 unsigned int *len) 331 { 332 ASN1_BIT_STRING *key; 333 key = X509_get0_pubkey_bitstr(data); 334 if(!key) return 0; 335 return EVP_Digest(key->data, key->length, md, len, type, NULL); 336 } 337 338int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 339 unsigned int *len) 340 { 341 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len)); 342 } 343 344int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, 345 unsigned int *len) 346 { 347 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len)); 348 } 349 350int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, 351 unsigned int *len) 352 { 353 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len)); 354 } 355 356int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, 357 unsigned int *len) 358 { 359 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len)); 360 } 361 362int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD *type, 363 unsigned char *md, unsigned int *len) 364 { 365 return(ASN1_item_digest(ASN1_ITEM_rptr(PKCS7_ISSUER_AND_SERIAL),type, 366 (char *)data,md,len)); 367 } 368 369 370#ifndef OPENSSL_NO_FP_API 371X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) 372 { 373 return((X509_SIG *)ASN1_d2i_fp((char *(*)())X509_SIG_new, 374 (char *(*)())d2i_X509_SIG, (fp),(unsigned char **)(p8))); 375 } 376 377int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) 378 { 379 return(ASN1_i2d_fp(i2d_X509_SIG,fp,(unsigned char *)p8)); 380 } 381#endif 382 383X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) 384 { 385 return((X509_SIG *)ASN1_d2i_bio((char *(*)())X509_SIG_new, 386 (char *(*)())d2i_X509_SIG, (bp),(unsigned char **)(p8))); 387 } 388 389int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) 390 { 391 return(ASN1_i2d_bio(i2d_X509_SIG,bp,(unsigned char *)p8)); 392 } 393 394#ifndef OPENSSL_NO_FP_API 395PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, 396 PKCS8_PRIV_KEY_INFO **p8inf) 397 { 398 return((PKCS8_PRIV_KEY_INFO *)ASN1_d2i_fp( 399 (char *(*)())PKCS8_PRIV_KEY_INFO_new, 400 (char *(*)())d2i_PKCS8_PRIV_KEY_INFO, (fp), 401 (unsigned char **)(p8inf))); 402 } 403 404int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) 405 { 406 return(ASN1_i2d_fp(i2d_PKCS8_PRIV_KEY_INFO,fp,(unsigned char *)p8inf)); 407 } 408 409int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) 410 { 411 PKCS8_PRIV_KEY_INFO *p8inf; 412 int ret; 413 p8inf = EVP_PKEY2PKCS8(key); 414 if(!p8inf) return 0; 415 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf); 416 PKCS8_PRIV_KEY_INFO_free(p8inf); 417 return ret; 418 } 419 420int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) 421 { 422 return(ASN1_i2d_fp(i2d_PrivateKey,fp,(unsigned char *)pkey)); 423 } 424 425EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) 426{ 427 return((EVP_PKEY *)ASN1_d2i_fp((char *(*)())EVP_PKEY_new, 428 (char *(*)())d2i_AutoPrivateKey, (fp),(unsigned char **)(a))); 429} 430 431int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) 432 { 433 return(ASN1_i2d_fp(i2d_PUBKEY,fp,(unsigned char *)pkey)); 434 } 435 436EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a) 437{ 438 return((EVP_PKEY *)ASN1_d2i_fp((char *(*)())EVP_PKEY_new, 439 (char *(*)())d2i_PUBKEY, (fp),(unsigned char **)(a))); 440} 441 442#endif 443 444PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, 445 PKCS8_PRIV_KEY_INFO **p8inf) 446 { 447 return((PKCS8_PRIV_KEY_INFO *)ASN1_d2i_bio( 448 (char *(*)())PKCS8_PRIV_KEY_INFO_new, 449 (char *(*)())d2i_PKCS8_PRIV_KEY_INFO, (bp), 450 (unsigned char **)(p8inf))); 451 } 452 453int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) 454 { 455 return(ASN1_i2d_bio(i2d_PKCS8_PRIV_KEY_INFO,bp,(unsigned char *)p8inf)); 456 } 457 458int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) 459 { 460 PKCS8_PRIV_KEY_INFO *p8inf; 461 int ret; 462 p8inf = EVP_PKEY2PKCS8(key); 463 if(!p8inf) return 0; 464 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf); 465 PKCS8_PRIV_KEY_INFO_free(p8inf); 466 return ret; 467 } 468 469int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) 470 { 471 return(ASN1_i2d_bio(i2d_PrivateKey,bp,(unsigned char *)pkey)); 472 } 473 474EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) 475 { 476 return((EVP_PKEY *)ASN1_d2i_bio((char *(*)())EVP_PKEY_new, 477 (char *(*)())d2i_AutoPrivateKey, (bp),(unsigned char **)(a))); 478 } 479 480int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) 481 { 482 return(ASN1_i2d_bio(i2d_PUBKEY,bp,(unsigned char *)pkey)); 483 } 484 485EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a) 486 { 487 return((EVP_PKEY *)ASN1_d2i_bio((char *(*)())EVP_PKEY_new, 488 (char *(*)())d2i_PUBKEY, (bp),(unsigned char **)(a))); 489 } 490