]>
Commit | Line | Data |
---|---|---|
846e33c7 | 1 | /* |
6738bf14 | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. |
d02b48c6 | 3 | * |
dffa7520 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
846e33c7 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
d02b48c6 RE |
8 | */ |
9 | ||
10 | #include <stdio.h> | |
11 | #include <stdlib.h> | |
12 | #include <string.h> | |
13 | #include "apps.h" | |
dab2cd68 | 14 | #include "progs.h" |
ec577822 BM |
15 | #include <openssl/bio.h> |
16 | #include <openssl/err.h> | |
17 | #include <openssl/x509.h> | |
18 | #include <openssl/x509v3.h> | |
19 | #include <openssl/pem.h> | |
d02b48c6 | 20 | |
7e1b7485 RS |
21 | typedef enum OPTION_choice { |
22 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | |
23 | OPT_INFORM, OPT_IN, OPT_OUTFORM, OPT_OUT, OPT_KEYFORM, OPT_KEY, | |
24 | OPT_ISSUER, OPT_LASTUPDATE, OPT_NEXTUPDATE, OPT_FINGERPRINT, | |
fd3397fc RL |
25 | OPT_CRLNUMBER, OPT_BADSIG, OPT_GENDELTA, OPT_CAPATH, OPT_CAFILE, OPT_CASTORE, |
26 | OPT_NOCAPATH, OPT_NOCAFILE, OPT_NOCASTORE, OPT_VERIFY, OPT_TEXT, OPT_HASH, | |
27 | OPT_HASH_OLD, OPT_NOOUT, OPT_NAMEOPT, OPT_MD | |
7e1b7485 | 28 | } OPTION_CHOICE; |
d02b48c6 | 29 | |
44c83ebd | 30 | const OPTIONS crl_options[] = { |
5388f986 | 31 | OPT_SECTION("General"), |
7e1b7485 | 32 | {"help", OPT_HELP, '-', "Display this summary"}, |
5388f986 RS |
33 | {"verify", OPT_VERIFY, '-', "Verify CRL signature"}, |
34 | ||
35 | OPT_SECTION("Input"), | |
7e1b7485 | 36 | {"in", OPT_IN, '<', "Input file - default stdin"}, |
5388f986 | 37 | {"inform", OPT_INFORM, 'F', "Input format; default PEM"}, |
16e1b281 | 38 | {"key", OPT_KEY, '<', "CRL signing Private key to use"}, |
5388f986 RS |
39 | {"keyform", OPT_KEYFORM, 'F', "Private key file format (PEM or ENGINE)"}, |
40 | ||
41 | OPT_SECTION("Output"), | |
42 | {"out", OPT_OUT, '>', "output file - default stdout"}, | |
43 | {"outform", OPT_OUTFORM, 'F', "Output format - default PEM"}, | |
44 | {"text", OPT_TEXT, '-', "Print out a text format version"}, | |
45 | {"hash", OPT_HASH, '-', "Print hash value"}, | |
46 | #ifndef OPENSSL_NO_MD5 | |
47 | {"hash_old", OPT_HASH_OLD, '-', "Print old-style (MD5) hash value"}, | |
48 | #endif | |
49 | {"nameopt", OPT_NAMEOPT, 's', "Various certificate name options"}, | |
50 | {"", OPT_MD, '-', "Any supported digest"}, | |
51 | ||
52 | OPT_SECTION("CRL"), | |
7e1b7485 RS |
53 | {"issuer", OPT_ISSUER, '-', "Print issuer DN"}, |
54 | {"lastupdate", OPT_LASTUPDATE, '-', "Set lastUpdate field"}, | |
55 | {"nextupdate", OPT_NEXTUPDATE, '-', "Set nextUpdate field"}, | |
56 | {"noout", OPT_NOOUT, '-', "No CRL output"}, | |
57 | {"fingerprint", OPT_FINGERPRINT, '-', "Print the crl fingerprint"}, | |
58 | {"crlnumber", OPT_CRLNUMBER, '-', "Print CRL number"}, | |
16e1b281 | 59 | {"badsig", OPT_BADSIG, '-', "Corrupt last byte of loaded CRL signature (for test)" }, |
12d56b29 | 60 | {"gendelta", OPT_GENDELTA, '<', "Other CRL to compare/diff to the Input one"}, |
5388f986 RS |
61 | |
62 | OPT_SECTION("Certificate"), | |
7e1b7485 RS |
63 | {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"}, |
64 | {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"}, | |
fd3397fc | 65 | {"CAstore", OPT_CASTORE, ':', "Verify CRL using certificates in store URI"}, |
2b6bcb70 MC |
66 | {"no-CAfile", OPT_NOCAFILE, '-', |
67 | "Do not load the default certificates file"}, | |
68 | {"no-CApath", OPT_NOCAPATH, '-', | |
69 | "Do not load certificates from the default certificates directory"}, | |
fd3397fc RL |
70 | {"no-CAstore", OPT_NOCASTORE, '-', |
71 | "Do not load certificates from the default certificates store"}, | |
7e1b7485 | 72 | {NULL} |
d02b48c6 RE |
73 | }; |
74 | ||
7e1b7485 | 75 | int crl_main(int argc, char **argv) |
0f113f3e | 76 | { |
0f113f3e | 77 | X509_CRL *x = NULL; |
0f113f3e | 78 | BIO *out = NULL; |
0f113f3e | 79 | X509_STORE *store = NULL; |
f0e0fd51 | 80 | X509_STORE_CTX *ctx = NULL; |
0f113f3e | 81 | X509_LOOKUP *lookup = NULL; |
f0e0fd51 | 82 | X509_OBJECT *xobj = NULL; |
0f113f3e | 83 | EVP_PKEY *pkey; |
7e1b7485 | 84 | const EVP_MD *digest = EVP_sha1(); |
7e1b7485 | 85 | char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; |
fd3397fc | 86 | const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; |
7e1b7485 | 87 | OPTION_CHOICE o; |
9c3bcfa0 | 88 | int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout = 0; |
7e1b7485 | 89 | int informat = FORMAT_PEM, outformat = FORMAT_PEM, keyformat = FORMAT_PEM; |
9c3bcfa0 | 90 | int ret = 1, num = 0, badsig = 0, fingerprint = 0, crlnumber = 0; |
fd3397fc | 91 | int text = 0, do_ver = 0, noCAfile = 0, noCApath = 0, noCAstore = 0; |
9c3bcfa0 | 92 | int i; |
7e1b7485 RS |
93 | #ifndef OPENSSL_NO_MD5 |
94 | int hash_old = 0; | |
645749ef | 95 | #endif |
d02b48c6 | 96 | |
7e1b7485 RS |
97 | prog = opt_init(argc, argv, crl_options); |
98 | while ((o = opt_next()) != OPT_EOF) { | |
99 | switch (o) { | |
100 | case OPT_EOF: | |
101 | case OPT_ERR: | |
102 | opthelp: | |
103 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | |
104 | goto end; | |
105 | case OPT_HELP: | |
106 | opt_help(crl_options); | |
107 | ret = 0; | |
108 | goto end; | |
109 | case OPT_INFORM: | |
110 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) | |
111 | goto opthelp; | |
112 | break; | |
113 | case OPT_IN: | |
114 | infile = opt_arg(); | |
115 | break; | |
116 | case OPT_OUTFORM: | |
117 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &outformat)) | |
118 | goto opthelp; | |
119 | break; | |
120 | case OPT_OUT: | |
121 | outfile = opt_arg(); | |
122 | break; | |
123 | case OPT_KEYFORM: | |
124 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &keyformat)) | |
125 | goto opthelp; | |
126 | break; | |
127 | case OPT_KEY: | |
128 | keyfile = opt_arg(); | |
129 | break; | |
130 | case OPT_GENDELTA: | |
131 | crldiff = opt_arg(); | |
132 | break; | |
133 | case OPT_CAPATH: | |
134 | CApath = opt_arg(); | |
0f113f3e | 135 | do_ver = 1; |
7e1b7485 RS |
136 | break; |
137 | case OPT_CAFILE: | |
138 | CAfile = opt_arg(); | |
0f113f3e | 139 | do_ver = 1; |
7e1b7485 | 140 | break; |
fd3397fc RL |
141 | case OPT_CASTORE: |
142 | CAstore = opt_arg(); | |
143 | do_ver = 1; | |
144 | break; | |
2b6bcb70 MC |
145 | case OPT_NOCAPATH: |
146 | noCApath = 1; | |
147 | break; | |
148 | case OPT_NOCAFILE: | |
149 | noCAfile = 1; | |
150 | break; | |
fd3397fc RL |
151 | case OPT_NOCASTORE: |
152 | noCAstore = 1; | |
153 | break; | |
7e1b7485 | 154 | case OPT_HASH_OLD: |
9c3bcfa0 | 155 | #ifndef OPENSSL_NO_MD5 |
0f113f3e | 156 | hash_old = ++num; |
de2d97cd | 157 | #endif |
9c3bcfa0 | 158 | break; |
7e1b7485 RS |
159 | case OPT_VERIFY: |
160 | do_ver = 1; | |
161 | break; | |
162 | case OPT_TEXT: | |
163 | text = 1; | |
164 | break; | |
165 | case OPT_HASH: | |
166 | hash = ++num; | |
167 | break; | |
168 | case OPT_ISSUER: | |
0f113f3e | 169 | issuer = ++num; |
7e1b7485 RS |
170 | break; |
171 | case OPT_LASTUPDATE: | |
0f113f3e | 172 | lastupdate = ++num; |
7e1b7485 RS |
173 | break; |
174 | case OPT_NEXTUPDATE: | |
0f113f3e | 175 | nextupdate = ++num; |
7e1b7485 RS |
176 | break; |
177 | case OPT_NOOUT: | |
0f113f3e | 178 | noout = ++num; |
7e1b7485 RS |
179 | break; |
180 | case OPT_FINGERPRINT: | |
0f113f3e | 181 | fingerprint = ++num; |
7e1b7485 RS |
182 | break; |
183 | case OPT_CRLNUMBER: | |
0f113f3e | 184 | crlnumber = ++num; |
7e1b7485 RS |
185 | break; |
186 | case OPT_BADSIG: | |
0f113f3e | 187 | badsig = 1; |
0f113f3e | 188 | break; |
7e1b7485 | 189 | case OPT_NAMEOPT: |
b5c4209b | 190 | if (!set_nameopt(opt_arg())) |
7e1b7485 RS |
191 | goto opthelp; |
192 | break; | |
193 | case OPT_MD: | |
194 | if (!opt_md(opt_unknown(), &digest)) | |
195 | goto opthelp; | |
0f113f3e | 196 | } |
0f113f3e | 197 | } |
7e1b7485 | 198 | argc = opt_num_rest(); |
03358517 KR |
199 | if (argc != 0) |
200 | goto opthelp; | |
d02b48c6 | 201 | |
0f113f3e | 202 | x = load_crl(infile, informat); |
7e1b7485 | 203 | if (x == NULL) |
0f113f3e | 204 | goto end; |
d02b48c6 | 205 | |
0f113f3e | 206 | if (do_ver) { |
fd3397fc RL |
207 | if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, |
208 | CAstore, noCAstore)) == NULL) | |
0f113f3e | 209 | goto end; |
7e1b7485 | 210 | lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file()); |
0f113f3e MC |
211 | if (lookup == NULL) |
212 | goto end; | |
f0e0fd51 | 213 | ctx = X509_STORE_CTX_new(); |
70015713 | 214 | if (ctx == NULL || !X509_STORE_CTX_init(ctx, store, NULL, NULL)) { |
0f113f3e MC |
215 | BIO_printf(bio_err, "Error initialising X509 store\n"); |
216 | goto end; | |
217 | } | |
090d848e | 218 | |
6ddbb4cd RS |
219 | xobj = X509_STORE_CTX_get_obj_by_subject(ctx, X509_LU_X509, |
220 | X509_CRL_get_issuer(x)); | |
f0e0fd51 | 221 | if (xobj == NULL) { |
0f113f3e MC |
222 | BIO_printf(bio_err, "Error getting CRL issuer certificate\n"); |
223 | goto end; | |
224 | } | |
f0e0fd51 RS |
225 | pkey = X509_get_pubkey(X509_OBJECT_get0_X509(xobj)); |
226 | X509_OBJECT_free(xobj); | |
12a765a5 | 227 | if (pkey == NULL) { |
0f113f3e MC |
228 | BIO_printf(bio_err, "Error getting CRL issuer public key\n"); |
229 | goto end; | |
230 | } | |
231 | i = X509_CRL_verify(x, pkey); | |
f0e0fd51 | 232 | EVP_PKEY_free(pkey); |
0f113f3e MC |
233 | if (i < 0) |
234 | goto end; | |
235 | if (i == 0) | |
236 | BIO_printf(bio_err, "verify failure\n"); | |
237 | else | |
238 | BIO_printf(bio_err, "verify OK\n"); | |
239 | } | |
090d848e | 240 | |
0f113f3e MC |
241 | if (crldiff) { |
242 | X509_CRL *newcrl, *delta; | |
243 | if (!keyfile) { | |
244 | BIO_puts(bio_err, "Missing CRL signing key\n"); | |
245 | goto end; | |
246 | } | |
247 | newcrl = load_crl(crldiff, informat); | |
248 | if (!newcrl) | |
249 | goto end; | |
7e1b7485 | 250 | pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); |
12a765a5 | 251 | if (pkey == NULL) { |
0f113f3e MC |
252 | X509_CRL_free(newcrl); |
253 | goto end; | |
254 | } | |
255 | delta = X509_CRL_diff(x, newcrl, pkey, digest, 0); | |
256 | X509_CRL_free(newcrl); | |
257 | EVP_PKEY_free(pkey); | |
258 | if (delta) { | |
259 | X509_CRL_free(x); | |
260 | x = delta; | |
261 | } else { | |
262 | BIO_puts(bio_err, "Error creating delta CRL\n"); | |
263 | goto end; | |
264 | } | |
265 | } | |
2e8cb108 | 266 | |
0f022f5a | 267 | if (badsig) { |
5e6089f0 | 268 | const ASN1_BIT_STRING *sig; |
0f022f5a | 269 | |
5e6089f0 | 270 | X509_CRL_get0_signature(x, &sig, NULL); |
a0754084 | 271 | corrupt_signature(sig); |
0f022f5a DSH |
272 | } |
273 | ||
0f113f3e MC |
274 | if (num) { |
275 | for (i = 1; i <= num; i++) { | |
276 | if (issuer == i) { | |
277 | print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), | |
b5c4209b | 278 | get_nameopt()); |
0f113f3e MC |
279 | } |
280 | if (crlnumber == i) { | |
281 | ASN1_INTEGER *crlnum; | |
282 | crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number, NULL, NULL); | |
283 | BIO_printf(bio_out, "crlNumber="); | |
284 | if (crlnum) { | |
285 | i2a_ASN1_INTEGER(bio_out, crlnum); | |
286 | ASN1_INTEGER_free(crlnum); | |
287 | } else | |
288 | BIO_puts(bio_out, "<NONE>"); | |
289 | BIO_printf(bio_out, "\n"); | |
290 | } | |
291 | if (hash == i) { | |
292 | BIO_printf(bio_out, "%08lx\n", | |
293 | X509_NAME_hash(X509_CRL_get_issuer(x))); | |
294 | } | |
de2d97cd | 295 | #ifndef OPENSSL_NO_MD5 |
0f113f3e MC |
296 | if (hash_old == i) { |
297 | BIO_printf(bio_out, "%08lx\n", | |
298 | X509_NAME_hash_old(X509_CRL_get_issuer(x))); | |
299 | } | |
de2d97cd | 300 | #endif |
0f113f3e MC |
301 | if (lastupdate == i) { |
302 | BIO_printf(bio_out, "lastUpdate="); | |
568ce3a5 | 303 | ASN1_TIME_print(bio_out, X509_CRL_get0_lastUpdate(x)); |
0f113f3e MC |
304 | BIO_printf(bio_out, "\n"); |
305 | } | |
306 | if (nextupdate == i) { | |
307 | BIO_printf(bio_out, "nextUpdate="); | |
568ce3a5 DSH |
308 | if (X509_CRL_get0_nextUpdate(x)) |
309 | ASN1_TIME_print(bio_out, X509_CRL_get0_nextUpdate(x)); | |
0f113f3e MC |
310 | else |
311 | BIO_printf(bio_out, "NONE"); | |
312 | BIO_printf(bio_out, "\n"); | |
313 | } | |
314 | if (fingerprint == i) { | |
315 | int j; | |
316 | unsigned int n; | |
317 | unsigned char md[EVP_MAX_MD_SIZE]; | |
439df508 | 318 | |
0f113f3e MC |
319 | if (!X509_CRL_digest(x, digest, md, &n)) { |
320 | BIO_printf(bio_err, "out of memory\n"); | |
321 | goto end; | |
322 | } | |
323 | BIO_printf(bio_out, "%s Fingerprint=", | |
324 | OBJ_nid2sn(EVP_MD_type(digest))); | |
325 | for (j = 0; j < (int)n; j++) { | |
326 | BIO_printf(bio_out, "%02X%c", md[j], (j + 1 == (int)n) | |
327 | ? '\n' : ':'); | |
328 | } | |
329 | } | |
330 | } | |
331 | } | |
bdd58d98 | 332 | out = bio_open_default(outfile, 'w', outformat); |
7e1b7485 | 333 | if (out == NULL) |
0f113f3e | 334 | goto end; |
d02b48c6 | 335 | |
0f113f3e | 336 | if (text) |
b5c4209b | 337 | X509_CRL_print_ex(out, x, get_nameopt()); |
2f0cd195 | 338 | |
0f113f3e MC |
339 | if (noout) { |
340 | ret = 0; | |
341 | goto end; | |
342 | } | |
2f0cd195 | 343 | |
0f113f3e MC |
344 | if (outformat == FORMAT_ASN1) |
345 | i = (int)i2d_X509_CRL_bio(out, x); | |
7e1b7485 | 346 | else |
0f113f3e | 347 | i = PEM_write_bio_X509_CRL(out, x); |
0f113f3e MC |
348 | if (!i) { |
349 | BIO_printf(bio_err, "unable to write CRL\n"); | |
350 | goto end; | |
351 | } | |
352 | ret = 0; | |
7e1b7485 | 353 | |
0f113f3e MC |
354 | end: |
355 | if (ret != 0) | |
356 | ERR_print_errors(bio_err); | |
357 | BIO_free_all(out); | |
0f113f3e | 358 | X509_CRL_free(x); |
f0e0fd51 RS |
359 | X509_STORE_CTX_free(ctx); |
360 | X509_STORE_free(store); | |
26a7d938 | 361 | return ret; |
0f113f3e | 362 | } |