/*
* Copyright (C) 2001-2012 Free Software Foundation, Inc.
*
* Author: Nikos Mavrogiannopoulos
*
* This file is part of GnuTLS.
*
* The GnuTLS is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see
*
*/
/* Some of the stuff needed for Certificate authentication is contained
* in this file.
*/
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include "x509/x509_int.h"
#ifdef ENABLE_OPENPGP
#include "openpgp/gnutls_openpgp.h"
#endif
#include "gettext.h"
#define _(String) dgettext (PACKAGE, String)
/**
* gnutls_certificate_free_keys:
* @sc: is a #gnutls_certificate_credentials_t structure.
*
* This function will delete all the keys and the certificates associated
* with the given credentials. This function must not be called when a
* TLS negotiation that uses the credentials is in progress.
*
**/
void gnutls_certificate_free_keys(gnutls_certificate_credentials_t sc)
{
unsigned i, j;
for (i = 0; i < sc->ncerts; i++) {
for (j = 0; j < sc->certs[i].cert_list_length; j++) {
gnutls_pcert_deinit(&sc->certs[i].cert_list[j]);
}
gnutls_free(sc->certs[i].cert_list);
_gnutls_str_array_clear(&sc->certs[i].names);
}
gnutls_free(sc->certs);
sc->certs = NULL;
for (i = 0; i < sc->ncerts; i++) {
gnutls_privkey_deinit(sc->pkey[i]);
}
gnutls_free(sc->pkey);
sc->pkey = NULL;
sc->ncerts = 0;
}
/**
* gnutls_certificate_free_cas:
* @sc: is a #gnutls_certificate_credentials_t structure.
*
* This function will delete all the CAs associated with the given
* credentials. Servers that do not use
* gnutls_certificate_verify_peers2() may call this to save some
* memory.
**/
void gnutls_certificate_free_cas(gnutls_certificate_credentials_t sc)
{
/* FIXME: do nothing for now */
return;
}
/**
* gnutls_certificate_get_issuer:
* @sc: is a #gnutls_certificate_credentials_t structure.
* @cert: is the certificate to find issuer for
* @issuer: Will hold the issuer if any. Should be treated as constant.
* @flags: Use zero.
*
* This function will return the issuer of a given certificate.
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
* negative error value.
*
* Since: 3.0
**/
int
gnutls_certificate_get_issuer(gnutls_certificate_credentials_t sc,
gnutls_x509_crt_t cert,
gnutls_x509_crt_t * issuer,
unsigned int flags)
{
return gnutls_x509_trust_list_get_issuer(sc->tlist, cert, issuer,
flags);
}
/**
* gnutls_certificate_get_crt_raw:
* @sc: is a #gnutls_certificate_credentials_t structure.
* @idx1: the index of the certificate if multiple are present
* @idx2: the index in the certificate list. Zero gives the server's certificate.
* @cert: Will hold the DER encoded certificate.
*
* This function will return the DER encoded certificate of the
* server or any other certificate on its certificate chain (based on @idx2).
* The returned data should be treated as constant and only accessible during the lifetime
* of @sc.
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
* negative error value. In case the indexes are out of bounds %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE
* is returned.
*
* Since: 3.2.5
**/
int
gnutls_certificate_get_crt_raw(gnutls_certificate_credentials_t sc,
unsigned idx1,
unsigned idx2, gnutls_datum_t * cert)
{
if (idx1 >= sc->ncerts)
return
gnutls_assert_val
(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE);
if (idx2 >= sc->certs[idx1].cert_list_length)
return
gnutls_assert_val
(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE);
cert->data = sc->certs[idx1].cert_list[idx2].cert.data;
cert->size = sc->certs[idx1].cert_list[idx2].cert.size;
return 0;
}
/**
* gnutls_certificate_free_ca_names:
* @sc: is a #gnutls_certificate_credentials_t structure.
*
* This function will delete all the CA name in the given
* credentials. Clients may call this to save some memory since in
* client side the CA names are not used. Servers might want to use
* this function if a large list of trusted CAs is present and
* sending the names of it would just consume bandwidth without providing
* information to client.
*
* CA names are used by servers to advertise the CAs they support to
* clients.
**/
void gnutls_certificate_free_ca_names(gnutls_certificate_credentials_t sc)
{
_gnutls_free_datum(&sc->tlist->x509_rdn_sequence);
}
/**
* gnutls_certificate_free_credentials:
* @sc: is a #gnutls_certificate_credentials_t structure.
*
* This structure is complex enough to manipulate directly thus this
* helper function is provided in order to free (deallocate) it.
*
* This function does not free any temporary parameters associated
* with this structure (ie RSA and DH parameters are not freed by this
* function).
**/
void
gnutls_certificate_free_credentials(gnutls_certificate_credentials_t sc)
{
gnutls_x509_trust_list_deinit(sc->tlist, 1);
gnutls_certificate_free_keys(sc);
gnutls_free(sc->ocsp_response_file);
memset(sc->pin_tmp, 0, sizeof(sc->pin_tmp));
#ifdef ENABLE_OPENPGP
gnutls_openpgp_keyring_deinit(sc->keyring);
#endif
gnutls_free(sc);
}
/**
* gnutls_certificate_allocate_credentials:
* @res: is a pointer to a #gnutls_certificate_credentials_t structure.
*
* This structure is complex enough to manipulate directly thus this
* helper function is provided in order to allocate it.
*
* Returns: %GNUTLS_E_SUCCESS on success, or an error code.
**/
int
gnutls_certificate_allocate_credentials(gnutls_certificate_credentials_t *
res)
{
int ret;
*res = gnutls_calloc(1, sizeof(certificate_credentials_st));
if (*res == NULL)
return GNUTLS_E_MEMORY_ERROR;
ret = gnutls_x509_trust_list_init(&(*res)->tlist, 0);
if (ret < 0) {
gnutls_assert();
gnutls_free(*res);
return GNUTLS_E_MEMORY_ERROR;
}
(*res)->verify_bits = DEFAULT_MAX_VERIFY_BITS;
(*res)->verify_depth = DEFAULT_MAX_VERIFY_DEPTH;
return 0;
}
/* returns the KX algorithms that are supported by a
* certificate. (Eg a certificate with RSA params, supports
* GNUTLS_KX_RSA algorithm).
* This function also uses the KeyUsage field of the certificate
* extensions in order to disable unneded algorithms.
*/
int
_gnutls_selected_cert_supported_kx(gnutls_session_t session,
gnutls_kx_algorithm_t * alg,
int *alg_size)
{
unsigned kx;
gnutls_pk_algorithm_t pk, cert_pk;
gnutls_pcert_st *cert;
int i;
if (session->internals.selected_cert_list_length == 0) {
*alg_size = 0;
return 0;
}
cert = &session->internals.selected_cert_list[0];
cert_pk = gnutls_pubkey_get_pk_algorithm(cert->pubkey, NULL);
i = 0;
for (kx = 0; kx < MAX_ALGOS; kx++) {
pk = _gnutls_map_pk_get_pk(kx);
if (pk == cert_pk) {
/* then check key usage */
if (_gnutls_check_key_usage(cert, kx) == 0) {
alg[i] = kx;
i++;
if (i > *alg_size)
return
gnutls_assert_val
(GNUTLS_E_INTERNAL_ERROR);
}
}
}
if (i == 0) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
}
*alg_size = i;
return 0;
}
/**
* gnutls_certificate_server_set_request:
* @session: is a #gnutls_session_t structure.
* @req: is one of GNUTLS_CERT_REQUEST, GNUTLS_CERT_REQUIRE
*
* This function specifies if we (in case of a server) are going to
* send a certificate request message to the client. If @req is
* GNUTLS_CERT_REQUIRE then the server will return an error if the
* peer does not provide a certificate. If you do not call this
* function then the client will not be asked to send a certificate.
**/
void
gnutls_certificate_server_set_request(gnutls_session_t session,
gnutls_certificate_request_t req)
{
session->internals.send_cert_req = req;
}
/**
* gnutls_certificate_client_set_retrieve_function:
* @cred: is a #gnutls_certificate_credentials_t structure.
* @func: is the callback function
*
* This function sets a callback to be called in order to retrieve the
* certificate to be used in the handshake.
* You are advised to use gnutls_certificate_set_retrieve_function2() because it
* is much more efficient in the processing it requires from gnutls.
*
* The callback's function prototype is:
* int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
* const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr_st* st);
*
* @req_ca_cert is only used in X.509 certificates.
* Contains a list with the CA names that the server considers trusted.
* Normally we should send a certificate that is signed
* by one of these CAs. These names are DER encoded. To get a more
* meaningful value use the function gnutls_x509_rdn_get().
*
* @pk_algos contains a list with server's acceptable signature algorithms.
* The certificate returned should support the server's given algorithms.
*
* @st should contain the certificates and private keys.
*
* If the callback function is provided then gnutls will call it, in the
* handshake, if a certificate is requested by the server (and after the
* certificate request message has been received).
*
* The callback function should set the certificate list to be sent,
* and return 0 on success. If no certificate was selected then the
* number of certificates should be set to zero. The value (-1)
* indicates error and the handshake will be terminated.
**/
void gnutls_certificate_client_set_retrieve_function
(gnutls_certificate_credentials_t cred,
gnutls_certificate_client_retrieve_function * func) {
cred->client_get_cert_callback = func;
}
/**
* gnutls_certificate_server_set_retrieve_function:
* @cred: is a #gnutls_certificate_credentials_t structure.
* @func: is the callback function
*
* This function sets a callback to be called in order to retrieve the
* certificate to be used in the handshake.
* You are advised to use gnutls_certificate_set_retrieve_function2() because it
* is much more efficient in the processing it requires from gnutls.
*
* The callback's function prototype is:
* int (*callback)(gnutls_session_t, gnutls_retr_st* st);
*
* @st should contain the certificates and private keys.
*
* If the callback function is provided then gnutls will call it, in the
* handshake, after the certificate request message has been received.
*
* The callback function should set the certificate list to be sent, and
* return 0 on success. The value (-1) indicates error and the handshake
* will be terminated.
**/
void gnutls_certificate_server_set_retrieve_function
(gnutls_certificate_credentials_t cred,
gnutls_certificate_server_retrieve_function * func) {
cred->server_get_cert_callback = func;
}
/**
* gnutls_certificate_set_retrieve_function:
* @cred: is a #gnutls_certificate_credentials_t structure.
* @func: is the callback function
*
* This function sets a callback to be called in order to retrieve the
* certificate to be used in the handshake. You are advised
* to use gnutls_certificate_set_retrieve_function2() because it
* is much more efficient in the processing it requires from gnutls.
*
* The callback's function prototype is:
* int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
* const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr2_st* st);
*
* @req_ca_cert is only used in X.509 certificates.
* Contains a list with the CA names that the server considers trusted.
* Normally we should send a certificate that is signed
* by one of these CAs. These names are DER encoded. To get a more
* meaningful value use the function gnutls_x509_rdn_get().
*
* @pk_algos contains a list with server's acceptable signature algorithms.
* The certificate returned should support the server's given algorithms.
*
* @st should contain the certificates and private keys.
*
* If the callback function is provided then gnutls will call it, in the
* handshake, after the certificate request message has been received.
*
* In server side pk_algos and req_ca_dn are NULL.
*
* The callback function should set the certificate list to be sent,
* and return 0 on success. If no certificate was selected then the
* number of certificates should be set to zero. The value (-1)
* indicates error and the handshake will be terminated.
*
* Since: 3.0
**/
void gnutls_certificate_set_retrieve_function
(gnutls_certificate_credentials_t cred,
gnutls_certificate_retrieve_function * func) {
cred->get_cert_callback = func;
}
/**
* gnutls_certificate_set_retrieve_function2:
* @cred: is a #gnutls_certificate_credentials_t structure.
* @func: is the callback function
*
* This function sets a callback to be called in order to retrieve the
* certificate to be used in the handshake.
*
* The callback's function prototype is:
* int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
* const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_pcert_st** pcert,
* unsigned int *pcert_length, gnutls_privkey_t * pkey);
*
* @req_ca_cert is only used in X.509 certificates.
* Contains a list with the CA names that the server considers trusted.
* Normally we should send a certificate that is signed
* by one of these CAs. These names are DER encoded. To get a more
* meaningful value use the function gnutls_x509_rdn_get().
*
* @pk_algos contains a list with server's acceptable signature algorithms.
* The certificate returned should support the server's given algorithms.
*
* @pcert should contain a single certificate and public or a list of them.
*
* @pcert_length is the size of the previous list.
*
* @pkey is the private key.
*
* If the callback function is provided then gnutls will call it, in the
* handshake, after the certificate request message has been received.
*
* In server side pk_algos and req_ca_dn are NULL.
*
* The callback function should set the certificate list to be sent,
* and return 0 on success. If no certificate was selected then the
* number of certificates should be set to zero. The value (-1)
* indicates error and the handshake will be terminated.
*
* Since: 3.0
**/
void gnutls_certificate_set_retrieve_function2
(gnutls_certificate_credentials_t cred,
gnutls_certificate_retrieve_function2 * func) {
cred->get_cert_callback2 = func;
}
/**
* gnutls_certificate_set_verify_function:
* @cred: is a #gnutls_certificate_credentials_t structure.
* @func: is the callback function
*
* This function sets a callback to be called when peer's certificate
* has been received in order to verify it on receipt rather than
* doing after the handshake is completed.
*
* The callback's function prototype is:
* int (*callback)(gnutls_session_t);
*
* If the callback function is provided then gnutls will call it, in the
* handshake, just after the certificate message has been received.
* To verify or obtain the certificate the gnutls_certificate_verify_peers2(),
* gnutls_certificate_type_get(), gnutls_certificate_get_peers() functions
* can be used.
*
* The callback function should return 0 for the handshake to continue
* or non-zero to terminate.
*
* Since: 2.10.0
**/
void
gnutls_certificate_set_verify_function
(gnutls_certificate_credentials_t cred,
gnutls_certificate_verify_function * func) {
cred->verify_callback = func;
}
/*-
* _gnutls_x509_extract_certificate_activation_time - return the peer's certificate activation time
* @cert: should contain an X.509 DER encoded certificate
*
* This function will return the certificate's activation time in UNIX time
* (ie seconds since 00:00:00 UTC January 1, 1970).
*
* Returns a (time_t) -1 in case of an error.
*
-*/
static time_t
_gnutls_x509_get_raw_crt_activation_time(const gnutls_datum_t * cert)
{
gnutls_x509_crt_t xcert;
time_t result;
result = gnutls_x509_crt_init(&xcert);
if (result < 0)
return (time_t) - 1;
result = gnutls_x509_crt_import(xcert, cert, GNUTLS_X509_FMT_DER);
if (result < 0) {
gnutls_x509_crt_deinit(xcert);
return (time_t) - 1;
}
result = gnutls_x509_crt_get_activation_time(xcert);
gnutls_x509_crt_deinit(xcert);
return result;
}
/*-
* gnutls_x509_extract_certificate_expiration_time:
* @cert: should contain an X.509 DER encoded certificate
*
* This function will return the certificate's expiration time in UNIX
* time (ie seconds since 00:00:00 UTC January 1, 1970). Returns a
*
* (time_t) -1 in case of an error.
*
-*/
static time_t
_gnutls_x509_get_raw_crt_expiration_time(const gnutls_datum_t * cert)
{
gnutls_x509_crt_t xcert;
time_t result;
result = gnutls_x509_crt_init(&xcert);
if (result < 0)
return (time_t) - 1;
result = gnutls_x509_crt_import(xcert, cert, GNUTLS_X509_FMT_DER);
if (result < 0) {
gnutls_x509_crt_deinit(xcert);
return (time_t) - 1;
}
result = gnutls_x509_crt_get_expiration_time(xcert);
gnutls_x509_crt_deinit(xcert);
return result;
}
#ifdef ENABLE_OPENPGP
/*-
* _gnutls_openpgp_crt_verify_peers - return the peer's certificate status
* @session: is a gnutls session
*
* This function will try to verify the peer's certificate and return its status (TRUSTED, INVALID etc.).
* Returns a negative error code in case of an error, or GNUTLS_E_NO_CERTIFICATE_FOUND if no certificate was sent.
-*/
static int
_gnutls_openpgp_crt_verify_peers(gnutls_session_t session,
const char *hostname,
unsigned int *status)
{
cert_auth_info_t info;
gnutls_certificate_credentials_t cred;
int peer_certificate_list_size, ret;
unsigned int verify_flags;
CHECK_AUTH(GNUTLS_CRD_CERTIFICATE, GNUTLS_E_INVALID_REQUEST);
info = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
if (info == NULL)
return GNUTLS_E_INVALID_REQUEST;
cred = (gnutls_certificate_credentials_t)
_gnutls_get_cred(session, GNUTLS_CRD_CERTIFICATE);
if (cred == NULL) {
gnutls_assert();
return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
}
if (info->raw_certificate_list == NULL || info->ncerts == 0) {
gnutls_assert();
return GNUTLS_E_NO_CERTIFICATE_FOUND;
}
verify_flags = cred->verify_flags | session->internals.priorities.additional_verify_flags;
/* generate a list of gnutls_certs based on the auth info
* raw certs.
*/
peer_certificate_list_size = info->ncerts;
if (peer_certificate_list_size != 1) {
gnutls_assert();
return GNUTLS_E_INTERNAL_ERROR;
}
/* Verify certificate
*/
ret =
_gnutls_openpgp_verify_key(cred, hostname,
&info->raw_certificate_list[0],
peer_certificate_list_size,
verify_flags,
status);
if (ret < 0) {
gnutls_assert();
return ret;
}
return 0;
}
#endif
/**
* gnutls_certificate_verify_peers2:
* @session: is a gnutls session
* @status: is the output of the verification
*
* This function will verify the peer's certificate and store
* the status in the @status variable as a bitwise or'd gnutls_certificate_status_t
* values or zero if the certificate is trusted. Note that value in @status
* is set only when the return value of this function is success (i.e, failure
* to trust a certificate does not imply a negative return value).
* The default verification flags used by this function can be overridden
* using gnutls_certificate_set_verify_flags().
*
* This function will take into account the OCSP Certificate Status TLS extension,
* as well as the following X.509 certificate extensions: Name Constraints,
* Key Usage, and Basic Constraints (pathlen).
*
* To avoid denial of service attacks some
* default upper limits regarding the certificate key size and chain
* size are set. To override them use gnutls_certificate_set_verify_limits().
*
* Note that you must also check the peer's name in order to check if
* the verified certificate belongs to the actual peer, see gnutls_x509_crt_check_hostname(),
* or use gnutls_certificate_verify_peers3().
*
* Returns: a negative error code on error and %GNUTLS_E_SUCCESS (0) on success.
**/
int
gnutls_certificate_verify_peers2(gnutls_session_t session,
unsigned int *status)
{
return gnutls_certificate_verify_peers(session, NULL, 0, status);
}
/**
* gnutls_certificate_verify_peers3:
* @session: is a gnutls session
* @hostname: is the expected name of the peer; may be %NULL
* @status: is the output of the verification
*
* This function will verify the peer's certificate and store the
* status in the @status variable as a bitwise or'd gnutls_certificate_status_t
* values or zero if the certificate is trusted. Note that value in @status
* is set only when the return value of this function is success (i.e, failure
* to trust a certificate does not imply a negative return value).
* The default verification flags used by this function can be overridden
* using gnutls_certificate_set_verify_flags(). See the documentation
* of gnutls_certificate_verify_peers2() for details in the verification process.
*
* If the @hostname provided is non-NULL then this function will compare
* the hostname in the certificate against the given. The comparison will
* be accurate for ascii names; non-ascii names are compared byte-by-byte.
* If names do not match the %GNUTLS_CERT_UNEXPECTED_OWNER status flag will be set.
*
* In order to verify the purpose of the end-certificate (by checking the extended
* key usage), use gnutls_certificate_verify_peers().
*
* Returns: a negative error code on error and %GNUTLS_E_SUCCESS (0) on success.
*
* Since: 3.1.4
**/
int
gnutls_certificate_verify_peers3(gnutls_session_t session,
const char *hostname,
unsigned int *status)
{
gnutls_typed_vdata_st data;
data.type = GNUTLS_DT_DNS_HOSTNAME;
data.size = 0;
data.data = (void*)hostname;
return gnutls_certificate_verify_peers(session, &data, 1, status);
}
/**
* gnutls_certificate_verify_peers:
* @session: is a gnutls session
* @data: an array of typed data
* @elements: the number of data elements
* @status: is the output of the verification
*
* This function will verify the peer's certificate and store the
* status in the @status variable as a bitwise or'd gnutls_certificate_status_t
* values or zero if the certificate is trusted. Note that value in @status
* is set only when the return value of this function is success (i.e, failure
* to trust a certificate does not imply a negative return value).
* The default verification flags used by this function can be overridden
* using gnutls_certificate_set_verify_flags(). See the documentation
* of gnutls_certificate_verify_peers2() for details in the verification process.
*
* The acceptable data types are %GNUTLS_DT_DNS_HOSTNAME and %GNUTLS_DT_KEY_PURPOSE_OID.
* If a DNS hostname is provided then this function will compare
* the hostname in the certificate against the given. The comparison will
* be accurate for ascii names; non-ascii names are compared byte-by-byte.
* If names do not match the %GNUTLS_CERT_UNEXPECTED_OWNER status flag will be set.
*
* If a key purpose OID is provided and the end-certificate contains the extended key
* usage PKIX extension, it will be required to be have the provided key purpose
* (e.g., %GNUTLS_KP_TLS_WWW_SERVER), or be marked for any purpose, otherwise
* verification will fail with %GNUTLS_CERT_SIGNER_CONSTRAINTS_FAILURE status.
*
* Returns: a negative error code on error and %GNUTLS_E_SUCCESS (0) on success.
*
* Since: 3.3.0
**/
int
gnutls_certificate_verify_peers(gnutls_session_t session,
gnutls_typed_vdata_st * data,
unsigned int elements,
unsigned int *status)
{
cert_auth_info_t info;
const char *hostname = NULL;
const char *purpose = NULL;
unsigned i;
CHECK_AUTH(GNUTLS_CRD_CERTIFICATE, GNUTLS_E_INVALID_REQUEST);
info = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
if (info == NULL) {
return GNUTLS_E_NO_CERTIFICATE_FOUND;
}
if (info->raw_certificate_list == NULL || info->ncerts == 0)
return GNUTLS_E_NO_CERTIFICATE_FOUND;
for (i=0;iraw_certificate_list == NULL || info->ncerts == 0) {
gnutls_assert();
return (time_t) - 1;
}
switch (gnutls_certificate_type_get(session)) {
case GNUTLS_CRT_X509:
return
_gnutls_x509_get_raw_crt_expiration_time(&info->
raw_certificate_list
[0]);
#ifdef ENABLE_OPENPGP
case GNUTLS_CRT_OPENPGP:
return
_gnutls_openpgp_get_raw_key_expiration_time
(&info->raw_certificate_list[0]);
#endif
default:
return (time_t) - 1;
}
}
/**
* gnutls_certificate_activation_time_peers:
* @session: is a gnutls session
*
* This function will return the peer's certificate activation time.
* This is the creation time for openpgp keys.
*
* Returns: (time_t)-1 on error.
*
* Deprecated: gnutls_certificate_verify_peers2() now verifies activation times.
**/
time_t gnutls_certificate_activation_time_peers(gnutls_session_t session)
{
cert_auth_info_t info;
CHECK_AUTH(GNUTLS_CRD_CERTIFICATE, GNUTLS_E_INVALID_REQUEST);
info = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
if (info == NULL) {
return (time_t) - 1;
}
if (info->raw_certificate_list == NULL || info->ncerts == 0) {
gnutls_assert();
return (time_t) - 1;
}
switch (gnutls_certificate_type_get(session)) {
case GNUTLS_CRT_X509:
return
_gnutls_x509_get_raw_crt_activation_time(&info->
raw_certificate_list
[0]);
#ifdef ENABLE_OPENPGP
case GNUTLS_CRT_OPENPGP:
return
_gnutls_openpgp_get_raw_key_creation_time(&info->
raw_certificate_list
[0]);
#endif
default:
return (time_t) - 1;
}
}
/**
* gnutls_sign_callback_set:
* @session: is a gnutls session
* @sign_func: function pointer to application's sign callback.
* @userdata: void pointer that will be passed to sign callback.
*
* Set the callback function. The function must have this prototype:
*
* typedef int (*gnutls_sign_func) (gnutls_session_t session,
* void *userdata,
* gnutls_certificate_type_t cert_type,
* const gnutls_datum_t * cert,
* const gnutls_datum_t * hash,
* gnutls_datum_t * signature);
*
* The @userdata parameter is passed to the @sign_func verbatim, and
* can be used to store application-specific data needed in the
* callback function. See also gnutls_sign_callback_get().
*
* Deprecated: Use the PKCS 11 or #gnutls_privkey_t interfacess like gnutls_privkey_import_ext() instead.
**/
void
gnutls_sign_callback_set(gnutls_session_t session,
gnutls_sign_func sign_func, void *userdata)
{
session->internals.sign_func = sign_func;
session->internals.sign_func_userdata = userdata;
}
/**
* gnutls_sign_callback_get:
* @session: is a gnutls session
* @userdata: if non-%NULL, will be set to abstract callback pointer.
*
* Retrieve the callback function, and its userdata pointer.
*
* Returns: The function pointer set by gnutls_sign_callback_set(), or
* if not set, %NULL.
*
* Deprecated: Use the PKCS 11 interfaces instead.
**/
gnutls_sign_func
gnutls_sign_callback_get(gnutls_session_t session, void **userdata)
{
if (userdata)
*userdata = session->internals.sign_func_userdata;
return session->internals.sign_func;
}
#define TEST_TEXT "test text"
/* returns error if the certificate has different algorithm than
* the given key parameters.
*/
int _gnutls_check_key_cert_match(gnutls_certificate_credentials_t res)
{
gnutls_datum_t test = {(void*)TEST_TEXT, sizeof(TEST_TEXT)-1};
gnutls_datum_t sig = {NULL, 0};
int pk, pk2, ret;
pk =
gnutls_pubkey_get_pk_algorithm(res->certs[res->ncerts - 1].
cert_list[0].pubkey, NULL);
pk2 =
gnutls_privkey_get_pk_algorithm(res->pkey[res->ncerts - 1],
NULL);
if (pk2 != pk) {
gnutls_assert();
return GNUTLS_E_CERTIFICATE_KEY_MISMATCH;
}
/* now check if keys really match. We use the sign/verify approach
* because we cannot always obtain the parameters from the abstract
* keys (e.g. PKCS #11). */
ret = gnutls_privkey_sign_data(res->pkey[res->ncerts - 1],
GNUTLS_DIG_SHA256, 0, &test, &sig);
if (ret < 0) {
/* for some reason we couldn't sign that. That shouldn't have
* happened, but since it did, report the issue and do not
* try the key matching test */
_gnutls_debug_log("%s: failed signing\n", __func__);
goto finish;
}
ret = gnutls_pubkey_verify_data2(res->certs[res->ncerts - 1].cert_list[0].pubkey,
gnutls_pk_to_sign(pk, GNUTLS_DIG_SHA256),
0, &test, &sig);
gnutls_free(sig.data);
if (ret < 0)
return gnutls_assert_val(GNUTLS_E_CERTIFICATE_KEY_MISMATCH);
finish:
return 0;
}
/**
* gnutls_certificate_verification_status_print:
* @status: The status flags to be printed
* @type: The certificate type
* @out: Newly allocated datum with (0) terminated string.
* @flags: should be zero
*
* This function will pretty print the status of a verification
* process -- eg. the one obtained by gnutls_certificate_verify_peers3().
*
* The output @out needs to be deallocated using gnutls_free().
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
* negative error value.
*
* Since: 3.1.4
**/
int
gnutls_certificate_verification_status_print(unsigned int status,
gnutls_certificate_type_t
type, gnutls_datum_t * out,
unsigned int flags)
{
gnutls_buffer_st str;
int ret;
_gnutls_buffer_init(&str);
if (status == 0)
_gnutls_buffer_append_str(&str,
_
("The certificate is trusted. "));
else
_gnutls_buffer_append_str(&str,
_
("The certificate is NOT trusted. "));
if (type == GNUTLS_CRT_X509) {
if (status & GNUTLS_CERT_REVOKED)
_gnutls_buffer_append_str(&str,
_
("The certificate chain is revoked. "));
if (status & GNUTLS_CERT_MISMATCH)
_gnutls_buffer_append_str(&str,
_
("The certificate doesn't match the local copy (TOFU). "));
if (status & GNUTLS_CERT_REVOCATION_DATA_SUPERSEDED)
_gnutls_buffer_append_str(&str,
_
("The revocation data are old and have been superseded. "));
if (status & GNUTLS_CERT_REVOCATION_DATA_ISSUED_IN_FUTURE)
_gnutls_buffer_append_str(&str,
_
("The revocation data are issued with a future date. "));
if (status & GNUTLS_CERT_SIGNER_NOT_FOUND)
_gnutls_buffer_append_str(&str,
_
("The certificate issuer is unknown. "));
if (status & GNUTLS_CERT_SIGNER_NOT_CA)
_gnutls_buffer_append_str(&str,
_
("The certificate issuer is not a CA. "));
} else if (type == GNUTLS_CRT_OPENPGP) {
if (status & GNUTLS_CERT_SIGNER_NOT_FOUND)
_gnutls_buffer_append_str(&str,
_
("Could not find a signer of the certificate. "));
if (status & GNUTLS_CERT_REVOKED)
_gnutls_buffer_append_str(&str,
_
("The certificate is revoked. "));
}
if (status & GNUTLS_CERT_INSECURE_ALGORITHM)
_gnutls_buffer_append_str(&str,
_
("The certificate chain uses insecure algorithm. "));
if (status & GNUTLS_CERT_SIGNER_CONSTRAINTS_FAILURE)
_gnutls_buffer_append_str(&str,
_
("The certificate chain violates the signer's constraints. "));
if (status & GNUTLS_CERT_NOT_ACTIVATED)
_gnutls_buffer_append_str(&str,
_
("The certificate chain uses not yet valid certificate. "));
if (status & GNUTLS_CERT_EXPIRED)
_gnutls_buffer_append_str(&str,
_
("The certificate chain uses expired certificate. "));
if (status & GNUTLS_CERT_SIGNATURE_FAILURE)
_gnutls_buffer_append_str(&str,
_
("The signature in the certificate is invalid. "));
if (status & GNUTLS_CERT_UNEXPECTED_OWNER)
_gnutls_buffer_append_str(&str,
_
("The name in the certificate does not match the expected. "));
ret = _gnutls_buffer_to_datum(&str, out);
if (out->size > 0)
out->size--;
return ret;
}