]>
Commit | Line | Data |
---|---|---|
846e33c7 | 1 | /* |
0c679f55 | 2 | * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved. |
a661b653 | 3 | * |
dffa7520 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
846e33c7 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
a661b653 | 8 | */ |
d02b48c6 | 9 | |
ae4186b0 DMSP |
10 | #ifndef OSSL_APPS_H |
11 | # define OSSL_APPS_H | |
0f113f3e | 12 | |
af16097f | 13 | # include "internal/common.h" /* for HAS_PREFIX */ |
07016a8a | 14 | # include "internal/nelem.h" |
3b061a00 | 15 | # include <assert.h> |
0f113f3e | 16 | |
e306f83c | 17 | # include <stdarg.h> |
3e3c7c36 | 18 | # include <sys/types.h> |
c7d5ea26 VD |
19 | # ifndef OPENSSL_NO_POSIX_IO |
20 | # include <sys/stat.h> | |
21 | # include <fcntl.h> | |
22 | # endif | |
23 | ||
568b8020 | 24 | # include <openssl/e_os2.h> |
50cd4768 | 25 | # include <openssl/types.h> |
0f113f3e MC |
26 | # include <openssl/bio.h> |
27 | # include <openssl/x509.h> | |
0f113f3e MC |
28 | # include <openssl/conf.h> |
29 | # include <openssl/txt_db.h> | |
3c27208f RS |
30 | # include <openssl/engine.h> |
31 | # include <openssl/ocsp.h> | |
29f178bd | 32 | # include <openssl/http.h> |
1fbab1dc | 33 | # include <signal.h> |
a43ce58f SL |
34 | # include "apps_ui.h" |
35 | # include "opt.h" | |
36 | # include "fmt.h" | |
ce506d27 | 37 | # include "platform.h" |
0b27381f | 38 | # include "engine_loader.h" |
3334e039 | 39 | # include "app_libctx.h" |
d02b48c6 | 40 | |
18295f0c RL |
41 | /* |
42 | * quick macro when you need to pass an unsigned char instead of a char. | |
43 | * this is true for some implementations of the is*() functions, for | |
44 | * example. | |
45 | */ | |
538404d2 | 46 | # define _UC(c) ((unsigned char)(c)) |
18295f0c | 47 | |
3ee1eac2 | 48 | void app_RAND_load_conf(CONF *c, const char *section); |
3ad60309 | 49 | int app_RAND_write(void); |
51e5df0e | 50 | int app_RAND_load(void); |
a31011e8 | 51 | |
15795943 | 52 | extern char *default_config_file; /* may be "" */ |
7e1b7485 RS |
53 | extern BIO *bio_in; |
54 | extern BIO *bio_out; | |
d02b48c6 | 55 | extern BIO *bio_err; |
adfc3786 MC |
56 | extern const unsigned char tls13_aes128gcmsha256_id[]; |
57 | extern const unsigned char tls13_aes256gcmsha384_id[]; | |
10ee7246 MC |
58 | extern BIO_ADDR *ourpeer; |
59 | ||
a60994df RL |
60 | BIO *dup_bio_in(int format); |
61 | BIO *dup_bio_out(int format); | |
149bd5d6 | 62 | BIO *dup_bio_err(int format); |
bdd58d98 RL |
63 | BIO *bio_open_owner(const char *filename, int format, int private); |
64 | BIO *bio_open_default(const char *filename, char mode, int format); | |
65 | BIO *bio_open_default_quiet(const char *filename, char mode, int format); | |
21f72fa4 | 66 | int mem_bio_to_file(BIO *in, const char *filename, int format, int private); |
da7f81d3 | 67 | char *app_conf_try_string(const CONF *cnf, const char *group, const char *name); |
b7782687 DDO |
68 | int app_conf_try_number(const CONF *conf, const char *group, const char *name, |
69 | long *result); | |
bfa470a4 | 70 | CONF *app_load_config_bio(BIO *in, const char *filename); |
0e89b396 DDO |
71 | # define app_load_config(filename) app_load_config_internal(filename, 0) |
72 | # define app_load_config_quiet(filename) app_load_config_internal(filename, 1) | |
15795943 DDO |
73 | CONF *app_load_config_internal(const char *filename, int quiet); |
74 | CONF *app_load_config_verbose(const char *filename, int verbose); | |
296f54ee | 75 | int app_load_modules(const CONF *config); |
ae89578b | 76 | CONF *app_load_config_modules(const char *configfile); |
7e1b7485 | 77 | void unbuffer(FILE *fp); |
e1b9840e | 78 | void wait_for_async(SSL *s); |
75dd6c1a MC |
79 | # if defined(OPENSSL_SYS_MSDOS) |
80 | int has_stdin_waiting(void); | |
81 | # endif | |
d02b48c6 | 82 | |
a0754084 | 83 | void corrupt_signature(const ASN1_STRING *signature); |
81202237 SW |
84 | |
85 | /* Helpers for setting X509v3 certificate fields notBefore and notAfter */ | |
86 | int check_cert_time_string(const char *time, const char *desc); | |
dc047d31 | 87 | int set_cert_times(X509 *x, const char *startdate, const char *enddate, |
81202237 SW |
88 | int days, int strict_compare_times); |
89 | ||
64713cb1 CN |
90 | int set_crl_lastupdate(X509_CRL *crl, const char *lastupdate); |
91 | int set_crl_nextupdate(X509_CRL *crl, const char *nextupdate, | |
92 | long days, long hours, long secs); | |
17ebf85a | 93 | |
0f113f3e | 94 | typedef struct args_st { |
7e1b7485 RS |
95 | int size; |
96 | int argc; | |
97 | char **argv; | |
0f113f3e | 98 | } ARGS; |
7bf7333d | 99 | |
229446df RS |
100 | /* We need both wrap and the "real" function because libcrypto uses both. */ |
101 | int wrap_password_callback(char *buf, int bufsiz, int verify, void *cb_data); | |
2fe5adc3 | 102 | |
e1cd94f2 PP |
103 | /* progress callback for dsaparam, dhparam, req, genpkey, etc. */ |
104 | int progress_cb(EVP_PKEY_CTX *ctx); | |
105 | ||
7e1b7485 | 106 | int chopup_args(ARGS *arg, char *buf); |
32f7be2a | 107 | void dump_cert_text(BIO *out, X509 *x); |
46a11faf | 108 | void print_name(BIO *out, const char *title, const X509_NAME *nm); |
0e89b396 | 109 | void print_bignum_var(BIO *, const BIGNUM *, const char *, |
2ac6115d | 110 | int, unsigned char *); |
7e1b7485 | 111 | void print_array(BIO *, const char *, int, const unsigned char *); |
b5c4209b DB |
112 | int set_nameopt(const char *arg); |
113 | unsigned long get_nameopt(void); | |
8c5bff22 | 114 | int set_dateopt(unsigned long *dateopt, const char *arg); |
8ca533e3 | 115 | int set_cert_ex(unsigned long *flags, const char *arg); |
a657546f | 116 | int set_name_ex(unsigned long *flags, const char *arg); |
791bd0cd DSH |
117 | int set_ext_copy(int *copy_type, const char *arg); |
118 | int copy_extensions(X509 *x, X509_REQ *req, int copy_type); | |
6d382c74 | 119 | char *get_passwd(const char *pass, const char *desc); |
cc696296 | 120 | int app_passwd(const char *arg1, const char *arg2, char **pass1, char **pass2); |
7e1b7485 | 121 | int add_oid_section(CONF *conf); |
9d5aca65 | 122 | X509_REQ *load_csr(const char *file, int format, const char *desc); |
a75f707f TZ |
123 | X509_REQ *load_csr_autofmt(const char *infile, int format, |
124 | STACK_OF(OPENSSL_STRING) *vfyopts, const char *desc); | |
d382e796 | 125 | X509 *load_cert_pass(const char *uri, int format, int maybe_stdin, |
6d382c74 | 126 | const char *pass, const char *desc); |
0e89b396 | 127 | # define load_cert(uri, format, desc) load_cert_pass(uri, format, 1, NULL, desc) |
d382e796 TM |
128 | X509_CRL *load_crl(const char *uri, int format, int maybe_stdin, |
129 | const char *desc); | |
6d382c74 DDO |
130 | void cleanse(char *str); |
131 | void clear_free(char *str); | |
132 | EVP_PKEY *load_key(const char *uri, int format, int maybe_stdin, | |
9d5aca65 | 133 | const char *pass, ENGINE *e, const char *desc); |
0e89b396 | 134 | /* first try reading public key, on failure resort to loading private key */ |
6d382c74 | 135 | EVP_PKEY *load_pubkey(const char *uri, int format, int maybe_stdin, |
9d5aca65 | 136 | const char *pass, ENGINE *e, const char *desc); |
d382e796 TM |
137 | EVP_PKEY *load_keyparams(const char *uri, int format, int maybe_stdin, |
138 | const char *keytype, const char *desc); | |
ef044913 SL |
139 | EVP_PKEY *load_keyparams_suppress(const char *uri, int format, int maybe_stdin, |
140 | const char *keytype, const char *desc, | |
141 | int suppress_decode_errors); | |
f62846b7 DDO |
142 | char *next_item(char *opt); /* in list separated by comma and/or space */ |
143 | int load_cert_certs(const char *uri, | |
144 | X509 **pcert, STACK_OF(X509) **pcerts, | |
145 | int exclude_http, const char *pass, const char *desc, | |
146 | X509_VERIFY_PARAM *vpm); | |
147 | STACK_OF(X509) *load_certs_multifile(char *files, const char *pass, | |
148 | const char *desc, X509_VERIFY_PARAM *vpm); | |
149 | X509_STORE *load_certstore(char *input, const char *pass, const char *desc, | |
150 | X509_VERIFY_PARAM *vpm); | |
ea51096e | 151 | int load_certs(const char *uri, int maybe_stdin, STACK_OF(X509) **certs, |
9d5aca65 | 152 | const char *pass, const char *desc); |
b3c5aadf | 153 | int load_crls(const char *uri, STACK_OF(X509_CRL) **crls, |
9d5aca65 | 154 | const char *pass, const char *desc); |
d382e796 | 155 | int load_key_certs_crls(const char *uri, int format, int maybe_stdin, |
0e89b396 | 156 | const char *pass, const char *desc, int quiet, |
b3c5aadf | 157 | EVP_PKEY **ppkey, EVP_PKEY **ppubkey, |
b78c777e | 158 | EVP_PKEY **pparams, |
b3c5aadf DDO |
159 | X509 **pcert, STACK_OF(X509) **pcerts, |
160 | X509_CRL **pcrl, STACK_OF(X509_CRL) **pcrls); | |
fd3397fc RL |
161 | X509_STORE *setup_verify(const char *CAfile, int noCAfile, |
162 | const char *CApath, int noCApath, | |
163 | const char *CAstore, int noCAstore); | |
164 | __owur int ctx_set_verify_locations(SSL_CTX *ctx, | |
165 | const char *CAfile, int noCAfile, | |
166 | const char *CApath, int noCApath, | |
167 | const char *CAstore, int noCAstore); | |
ca74c38d | 168 | |
538404d2 | 169 | # ifndef OPENSSL_NO_CT |
b5369582 | 170 | |
ca74c38d RP |
171 | /* |
172 | * Sets the file to load the Certificate Transparency log list from. | |
173 | * If path is NULL, loads from the default file path. | |
174 | * Returns 1 on success, 0 otherwise. | |
175 | */ | |
5da65ef2 | 176 | __owur int ctx_set_ctlog_list_file(SSL_CTX *ctx, const char *path); |
dd696a55 | 177 | |
538404d2 | 178 | # endif |
b5369582 | 179 | |
538404d2 DO |
180 | ENGINE *setup_engine_methods(const char *id, unsigned int methods, int debug); |
181 | # define setup_engine(e, debug) setup_engine_methods(e, (unsigned int)-1, debug) | |
dd1abd44 | 182 | void release_engine(ENGINE *e); |
6514dee7 RL |
183 | int init_engine(ENGINE *e); |
184 | int finish_engine(ENGINE *e); | |
f91d003a | 185 | char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc); |
907c6c86 | 186 | |
0f386f2e | 187 | int get_legacy_pkey_id(OSSL_LIB_CTX *libctx, const char *algname, ENGINE *e); |
a61fba5d DB |
188 | const EVP_MD *get_digest_from_engine(const char *name); |
189 | const EVP_CIPHER *get_cipher_from_engine(const char *name); | |
0f386f2e | 190 | |
0f113f3e | 191 | # ifndef OPENSSL_NO_OCSP |
88d96983 DDO |
192 | OCSP_RESPONSE *process_responder(OCSP_REQUEST *req, const char *host, |
193 | const char *port, const char *path, | |
194 | const char *proxy, const char *no_proxy, | |
195 | int use_ssl, STACK_OF(CONF_VALUE) *headers, | |
0f113f3e MC |
196 | int req_timeout); |
197 | # endif | |
67c8e7f4 | 198 | |
ee306a13 DSH |
199 | /* Functions defined in ca.c and also used in ocsp.c */ |
200 | int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold, | |
0f113f3e MC |
201 | ASN1_GENERALIZEDTIME **pinvtm, const char *str); |
202 | ||
203 | # define DB_type 0 | |
204 | # define DB_exp_date 1 | |
205 | # define DB_rev_date 2 | |
0e89b396 | 206 | # define DB_serial 3 /* index - unique */ |
0f113f3e | 207 | # define DB_file 4 |
0e89b396 | 208 | # define DB_name 5 /* index - unique when active and not disabled */ |
0f113f3e MC |
209 | # define DB_NUMBER 6 |
210 | ||
06a79af2 F |
211 | # define DB_TYPE_REV 'R' /* Revoked */ |
212 | # define DB_TYPE_EXP 'E' /* Expired */ | |
213 | # define DB_TYPE_VAL 'V' /* Valid ; inserted with: ca ... -valid */ | |
214 | # define DB_TYPE_SUSP 'S' /* Suspended */ | |
0f113f3e MC |
215 | |
216 | typedef struct db_attr_st { | |
217 | int unique_subject; | |
218 | } DB_ATTR; | |
219 | typedef struct ca_db_st { | |
220 | DB_ATTR attributes; | |
221 | TXT_DB *db; | |
c7d5ea26 VD |
222 | char *dbfname; |
223 | # ifndef OPENSSL_NO_POSIX_IO | |
224 | struct stat dbst; | |
225 | # endif | |
0f113f3e | 226 | } CA_DB; |
f85b68cd | 227 | |
065121ff AF |
228 | extern int do_updatedb(CA_DB *db, time_t *now); |
229 | ||
e306f83c | 230 | void app_bail_out(char *fmt, ...); |
b1c908f4 | 231 | void *app_malloc(size_t sz, const char *what); |
ec8a3409 DDO |
232 | |
233 | /* load_serial, save_serial, and rotate_serial are also used for CRL numbers */ | |
234 | BIGNUM *load_serial(const char *serialfile, int *exists, int create, | |
235 | ASN1_INTEGER **retai); | |
236 | int save_serial(const char *serialfile, const char *suffix, | |
237 | const BIGNUM *serial, ASN1_INTEGER **retai); | |
cc696296 F |
238 | int rotate_serial(const char *serialfile, const char *new_suffix, |
239 | const char *old_suffix); | |
64674bcc | 240 | int rand_serial(BIGNUM *b, ASN1_INTEGER *ai); |
ec8a3409 | 241 | |
cc696296 | 242 | CA_DB *load_index(const char *dbfile, DB_ATTR *dbattr); |
f85b68cd | 243 | int index_index(CA_DB *db); |
7d727231 | 244 | int save_index(const char *dbfile, const char *suffix, CA_DB *db); |
0f113f3e MC |
245 | int rotate_index(const char *dbfile, const char *new_suffix, |
246 | const char *old_suffix); | |
f85b68cd | 247 | void free_index(CA_DB *db); |
0f113f3e | 248 | # define index_name_cmp_noconst(a, b) \ |
0e89b396 DDO |
249 | index_name_cmp((const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, a), \ |
250 | (const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, b)) | |
c869da88 | 251 | int index_name_cmp(const OPENSSL_CSTRING *a, const OPENSSL_CSTRING *b); |
ff990440 | 252 | int parse_yesno(const char *str, int def); |
ee306a13 | 253 | |
57c05c57 DDO |
254 | X509_NAME *parse_name(const char *str, int chtype, int multirdn, |
255 | const char *desc); | |
ecf3a1fb | 256 | void policies_print(X509_STORE_CTX *ctx); |
a9164153 | 257 | int bio_to_mem(unsigned char **out, int maxlen, BIO *in); |
0c20802c | 258 | int pkey_ctrl_string(EVP_PKEY_CTX *ctx, const char *value); |
aba9bca3 RL |
259 | int x509_ctrl_string(X509 *x, const char *value); |
260 | int x509_req_ctrl_string(X509_REQ *x, const char *value); | |
7e1b7485 | 261 | int init_gen_str(EVP_PKEY_CTX **pctx, |
7c9a7cf1 | 262 | const char *algname, ENGINE *e, int do_param, |
b4250010 | 263 | OSSL_LIB_CTX *libctx, const char *propq); |
adbd77f6 | 264 | int cert_matches_key(const X509 *cert, const EVP_PKEY *pkey); |
342e3652 | 265 | int do_X509_sign(X509 *x, int force_v1, EVP_PKEY *pkey, const char *md, |
ec2bfb7d | 266 | STACK_OF(OPENSSL_STRING) *sigopts, X509V3_CTX *ext_ctx); |
2292c8e1 | 267 | int do_X509_verify(X509 *x, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *vfyopts); |
91034b68 | 268 | int do_X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const char *md, |
0f113f3e | 269 | STACK_OF(OPENSSL_STRING) *sigopts); |
aba9bca3 RL |
270 | int do_X509_REQ_verify(X509_REQ *x, EVP_PKEY *pkey, |
271 | STACK_OF(OPENSSL_STRING) *vfyopts); | |
91034b68 | 272 | int do_X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const char *md, |
0f113f3e | 273 | STACK_OF(OPENSSL_STRING) *sigopts); |
14e35350 | 274 | |
f3b7bdad | 275 | extern char *psk_key; |
14e35350 | 276 | |
817cd0d5 | 277 | unsigned char *next_protos_parse(size_t *outlen, const char *in); |
71fa4513 | 278 | |
9567fd38 | 279 | int check_cert_attributes(BIO *bio, X509 *x, |
0e89b396 DDO |
280 | const char *checkhost, const char *checkemail, |
281 | const char *checkip, int print); | |
a70da5b3 | 282 | |
0090a686 DSH |
283 | void store_setup_crl_download(X509_STORE *st); |
284 | ||
29f178bd DDO |
285 | typedef struct app_http_tls_info_st { |
286 | const char *server; | |
287 | const char *port; | |
288 | int use_proxy; | |
289 | long timeout; | |
290 | SSL_CTX *ssl_ctx; | |
291 | } APP_HTTP_TLS_INFO; | |
292 | BIO *app_http_tls_cb(BIO *hbio, /* APP_HTTP_TLS_INFO */ void *arg, | |
293 | int connect, int detail); | |
ef203432 | 294 | void APP_HTTP_TLS_INFO_free(APP_HTTP_TLS_INFO *info); |
29f178bd DDO |
295 | # ifndef OPENSSL_NO_SOCK |
296 | ASN1_VALUE *app_http_get_asn1(const char *url, const char *proxy, | |
afe554c2 | 297 | const char *no_proxy, SSL_CTX *ssl_ctx, |
29f178bd DDO |
298 | const STACK_OF(CONF_VALUE) *headers, |
299 | long timeout, const char *expected_content_type, | |
300 | const ASN1_ITEM *it); | |
301 | ASN1_VALUE *app_http_post_asn1(const char *host, const char *port, | |
302 | const char *path, const char *proxy, | |
afe554c2 | 303 | const char *no_proxy, SSL_CTX *ctx, |
29f178bd DDO |
304 | const STACK_OF(CONF_VALUE) *headers, |
305 | const char *content_type, | |
306 | ASN1_VALUE *req, const ASN1_ITEM *req_it, | |
82990287 | 307 | const char *expected_content_type, |
29f178bd DDO |
308 | long timeout, const ASN1_ITEM *rsp_it); |
309 | # endif | |
310 | ||
0f113f3e MC |
311 | # define EXT_COPY_NONE 0 |
312 | # define EXT_COPY_ADD 1 | |
313 | # define EXT_COPY_ALL 2 | |
314 | ||
0e89b396 | 315 | # define NETSCAPE_CERT_HDR "certificate" |
0f113f3e | 316 | |
0e89b396 | 317 | # define APP_PASS_LEN 1024 |
0f113f3e | 318 | |
ffb46830 RS |
319 | /* |
320 | * IETF RFC 5280 says serial number must be <= 20 bytes. Use 159 bits | |
321 | * so that the first bit will never be one, so that the DER encoding | |
322 | * rules won't force a leading octet. | |
323 | */ | |
0e89b396 | 324 | # define SERIAL_RAND_BITS 159 |
64674bcc | 325 | |
ffa10187 | 326 | int app_isdir(const char *); |
7e1b7485 | 327 | int app_access(const char *, int flag); |
51e5133d RL |
328 | int fileno_stdin(void); |
329 | int fileno_stdout(void); | |
0f113f3e MC |
330 | int raw_read_stdin(void *, int); |
331 | int raw_write_stdout(const void *, int); | |
0a39d8f2 | 332 | |
0f113f3e MC |
333 | # define TM_START 0 |
334 | # define TM_STOP 1 | |
335 | double app_tminterval(int stop, int usertime); | |
ee2ffc27 | 336 | |
20967afb RS |
337 | void make_uppercase(char *string); |
338 | ||
acc00492 F |
339 | typedef struct verify_options_st { |
340 | int depth; | |
341 | int quiet; | |
342 | int error; | |
343 | int return_error; | |
344 | } VERIFY_CB_ARGS; | |
345 | ||
346 | extern VERIFY_CB_ARGS verify_args; | |
df2ee0e2 | 347 | |
95214b43 SL |
348 | OSSL_PARAM *app_params_new_from_opts(STACK_OF(OPENSSL_STRING) *opts, |
349 | const OSSL_PARAM *paramdefs); | |
350 | void app_params_free(OSSL_PARAM *params); | |
b4250010 | 351 | int app_provider_load(OSSL_LIB_CTX *libctx, const char *provider_name); |
f5056577 | 352 | void app_providers_cleanup(void); |
95214b43 | 353 | |
a7e4ca5b DDO |
354 | EVP_PKEY *app_keygen(EVP_PKEY_CTX *ctx, const char *alg, int bits, int verbose); |
355 | EVP_PKEY *app_paramgen(EVP_PKEY_CTX *ctx, const char *alg); | |
356 | ||
ee2ffc27 | 357 | #endif |