1e1051a39Sopenharmony_ci/*
2e1051a39Sopenharmony_ci * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
3e1051a39Sopenharmony_ci *
4e1051a39Sopenharmony_ci * Licensed under the Apache License 2.0 (the "License").  You may not use
5e1051a39Sopenharmony_ci * this file except in compliance with the License.  You can obtain a copy
6e1051a39Sopenharmony_ci * in the file LICENSE in the source distribution or at
7e1051a39Sopenharmony_ci * https://www.openssl.org/source/license.html
8e1051a39Sopenharmony_ci */
9e1051a39Sopenharmony_ci
10e1051a39Sopenharmony_ci#include <stdio.h>
11e1051a39Sopenharmony_ci#include "internal/cryptlib.h"
12e1051a39Sopenharmony_ci#include "internal/refcount.h"
13e1051a39Sopenharmony_ci#include <openssl/asn1.h>
14e1051a39Sopenharmony_ci#include <openssl/objects.h>
15e1051a39Sopenharmony_ci#include <openssl/evp.h>
16e1051a39Sopenharmony_ci#include <openssl/x509.h>
17e1051a39Sopenharmony_ci#include <openssl/x509v3.h>
18e1051a39Sopenharmony_ci#include "crypto/asn1.h"
19e1051a39Sopenharmony_ci#include "crypto/x509.h"
20e1051a39Sopenharmony_ci#include "x509_local.h"
21e1051a39Sopenharmony_ci
22e1051a39Sopenharmony_ciint X509_set_version(X509 *x, long version)
23e1051a39Sopenharmony_ci{
24e1051a39Sopenharmony_ci    if (x == NULL)
25e1051a39Sopenharmony_ci        return 0;
26e1051a39Sopenharmony_ci    if (version == 0) {
27e1051a39Sopenharmony_ci        ASN1_INTEGER_free(x->cert_info.version);
28e1051a39Sopenharmony_ci        x->cert_info.version = NULL;
29e1051a39Sopenharmony_ci        return 1;
30e1051a39Sopenharmony_ci    }
31e1051a39Sopenharmony_ci    if (x->cert_info.version == NULL) {
32e1051a39Sopenharmony_ci        if ((x->cert_info.version = ASN1_INTEGER_new()) == NULL)
33e1051a39Sopenharmony_ci            return 0;
34e1051a39Sopenharmony_ci    }
35e1051a39Sopenharmony_ci    return ASN1_INTEGER_set(x->cert_info.version, version);
36e1051a39Sopenharmony_ci}
37e1051a39Sopenharmony_ci
38e1051a39Sopenharmony_ciint X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial)
39e1051a39Sopenharmony_ci{
40e1051a39Sopenharmony_ci    ASN1_INTEGER *in;
41e1051a39Sopenharmony_ci
42e1051a39Sopenharmony_ci    if (x == NULL)
43e1051a39Sopenharmony_ci        return 0;
44e1051a39Sopenharmony_ci    in = &x->cert_info.serialNumber;
45e1051a39Sopenharmony_ci    if (in != serial)
46e1051a39Sopenharmony_ci        return ASN1_STRING_copy(in, serial);
47e1051a39Sopenharmony_ci    return 1;
48e1051a39Sopenharmony_ci}
49e1051a39Sopenharmony_ci
50e1051a39Sopenharmony_ciint X509_set_issuer_name(X509 *x, const X509_NAME *name)
51e1051a39Sopenharmony_ci{
52e1051a39Sopenharmony_ci    if (x == NULL)
53e1051a39Sopenharmony_ci        return 0;
54e1051a39Sopenharmony_ci    return X509_NAME_set(&x->cert_info.issuer, name);
55e1051a39Sopenharmony_ci}
56e1051a39Sopenharmony_ci
57e1051a39Sopenharmony_ciint X509_set_subject_name(X509 *x, const X509_NAME *name)
58e1051a39Sopenharmony_ci{
59e1051a39Sopenharmony_ci    if (x == NULL)
60e1051a39Sopenharmony_ci        return 0;
61e1051a39Sopenharmony_ci    return X509_NAME_set(&x->cert_info.subject, name);
62e1051a39Sopenharmony_ci}
63e1051a39Sopenharmony_ci
64e1051a39Sopenharmony_ciint ossl_x509_set1_time(ASN1_TIME **ptm, const ASN1_TIME *tm)
65e1051a39Sopenharmony_ci{
66e1051a39Sopenharmony_ci    ASN1_TIME *in;
67e1051a39Sopenharmony_ci    in = *ptm;
68e1051a39Sopenharmony_ci    if (in != tm) {
69e1051a39Sopenharmony_ci        in = ASN1_STRING_dup(tm);
70e1051a39Sopenharmony_ci        if (in != NULL) {
71e1051a39Sopenharmony_ci            ASN1_TIME_free(*ptm);
72e1051a39Sopenharmony_ci            *ptm = in;
73e1051a39Sopenharmony_ci        }
74e1051a39Sopenharmony_ci    }
75e1051a39Sopenharmony_ci    return (in != NULL);
76e1051a39Sopenharmony_ci}
77e1051a39Sopenharmony_ci
78e1051a39Sopenharmony_ciint X509_set1_notBefore(X509 *x, const ASN1_TIME *tm)
79e1051a39Sopenharmony_ci{
80e1051a39Sopenharmony_ci    if (x == NULL)
81e1051a39Sopenharmony_ci        return 0;
82e1051a39Sopenharmony_ci    return ossl_x509_set1_time(&x->cert_info.validity.notBefore, tm);
83e1051a39Sopenharmony_ci}
84e1051a39Sopenharmony_ci
85e1051a39Sopenharmony_ciint X509_set1_notAfter(X509 *x, const ASN1_TIME *tm)
86e1051a39Sopenharmony_ci{
87e1051a39Sopenharmony_ci    if (x == NULL)
88e1051a39Sopenharmony_ci        return 0;
89e1051a39Sopenharmony_ci    return ossl_x509_set1_time(&x->cert_info.validity.notAfter, tm);
90e1051a39Sopenharmony_ci}
91e1051a39Sopenharmony_ci
92e1051a39Sopenharmony_ciint X509_set_pubkey(X509 *x, EVP_PKEY *pkey)
93e1051a39Sopenharmony_ci{
94e1051a39Sopenharmony_ci    if (x == NULL)
95e1051a39Sopenharmony_ci        return 0;
96e1051a39Sopenharmony_ci    return X509_PUBKEY_set(&(x->cert_info.key), pkey);
97e1051a39Sopenharmony_ci}
98e1051a39Sopenharmony_ci
99e1051a39Sopenharmony_ciint X509_up_ref(X509 *x)
100e1051a39Sopenharmony_ci{
101e1051a39Sopenharmony_ci    int i;
102e1051a39Sopenharmony_ci
103e1051a39Sopenharmony_ci    if (CRYPTO_UP_REF(&x->references, &i, x->lock) <= 0)
104e1051a39Sopenharmony_ci        return 0;
105e1051a39Sopenharmony_ci
106e1051a39Sopenharmony_ci    REF_PRINT_COUNT("X509", x);
107e1051a39Sopenharmony_ci    REF_ASSERT_ISNT(i < 2);
108e1051a39Sopenharmony_ci    return ((i > 1) ? 1 : 0);
109e1051a39Sopenharmony_ci}
110e1051a39Sopenharmony_ci
111e1051a39Sopenharmony_cilong X509_get_version(const X509 *x)
112e1051a39Sopenharmony_ci{
113e1051a39Sopenharmony_ci    return ASN1_INTEGER_get(x->cert_info.version);
114e1051a39Sopenharmony_ci}
115e1051a39Sopenharmony_ci
116e1051a39Sopenharmony_ciconst ASN1_TIME *X509_get0_notBefore(const X509 *x)
117e1051a39Sopenharmony_ci{
118e1051a39Sopenharmony_ci    return x->cert_info.validity.notBefore;
119e1051a39Sopenharmony_ci}
120e1051a39Sopenharmony_ci
121e1051a39Sopenharmony_ciconst ASN1_TIME *X509_get0_notAfter(const X509 *x)
122e1051a39Sopenharmony_ci{
123e1051a39Sopenharmony_ci    return x->cert_info.validity.notAfter;
124e1051a39Sopenharmony_ci}
125e1051a39Sopenharmony_ci
126e1051a39Sopenharmony_ciASN1_TIME *X509_getm_notBefore(const X509 *x)
127e1051a39Sopenharmony_ci{
128e1051a39Sopenharmony_ci    return x->cert_info.validity.notBefore;
129e1051a39Sopenharmony_ci}
130e1051a39Sopenharmony_ci
131e1051a39Sopenharmony_ciASN1_TIME *X509_getm_notAfter(const X509 *x)
132e1051a39Sopenharmony_ci{
133e1051a39Sopenharmony_ci    return x->cert_info.validity.notAfter;
134e1051a39Sopenharmony_ci}
135e1051a39Sopenharmony_ci
136e1051a39Sopenharmony_ciint X509_get_signature_type(const X509 *x)
137e1051a39Sopenharmony_ci{
138e1051a39Sopenharmony_ci    return EVP_PKEY_type(OBJ_obj2nid(x->sig_alg.algorithm));
139e1051a39Sopenharmony_ci}
140e1051a39Sopenharmony_ci
141e1051a39Sopenharmony_ciX509_PUBKEY *X509_get_X509_PUBKEY(const X509 *x)
142e1051a39Sopenharmony_ci{
143e1051a39Sopenharmony_ci    return x->cert_info.key;
144e1051a39Sopenharmony_ci}
145e1051a39Sopenharmony_ci
146e1051a39Sopenharmony_ciconst STACK_OF(X509_EXTENSION) *X509_get0_extensions(const X509 *x)
147e1051a39Sopenharmony_ci{
148e1051a39Sopenharmony_ci    return x->cert_info.extensions;
149e1051a39Sopenharmony_ci}
150e1051a39Sopenharmony_ci
151e1051a39Sopenharmony_civoid X509_get0_uids(const X509 *x, const ASN1_BIT_STRING **piuid,
152e1051a39Sopenharmony_ci                    const ASN1_BIT_STRING **psuid)
153e1051a39Sopenharmony_ci{
154e1051a39Sopenharmony_ci    if (piuid != NULL)
155e1051a39Sopenharmony_ci        *piuid = x->cert_info.issuerUID;
156e1051a39Sopenharmony_ci    if (psuid != NULL)
157e1051a39Sopenharmony_ci        *psuid = x->cert_info.subjectUID;
158e1051a39Sopenharmony_ci}
159e1051a39Sopenharmony_ci
160e1051a39Sopenharmony_ciconst X509_ALGOR *X509_get0_tbs_sigalg(const X509 *x)
161e1051a39Sopenharmony_ci{
162e1051a39Sopenharmony_ci    return &x->cert_info.signature;
163e1051a39Sopenharmony_ci}
164e1051a39Sopenharmony_ci
165e1051a39Sopenharmony_ciint X509_SIG_INFO_get(const X509_SIG_INFO *siginf, int *mdnid, int *pknid,
166e1051a39Sopenharmony_ci                      int *secbits, uint32_t *flags)
167e1051a39Sopenharmony_ci{
168e1051a39Sopenharmony_ci    if (mdnid != NULL)
169e1051a39Sopenharmony_ci        *mdnid = siginf->mdnid;
170e1051a39Sopenharmony_ci    if (pknid != NULL)
171e1051a39Sopenharmony_ci        *pknid = siginf->pknid;
172e1051a39Sopenharmony_ci    if (secbits != NULL)
173e1051a39Sopenharmony_ci        *secbits = siginf->secbits;
174e1051a39Sopenharmony_ci    if (flags != NULL)
175e1051a39Sopenharmony_ci        *flags = siginf->flags;
176e1051a39Sopenharmony_ci    return (siginf->flags & X509_SIG_INFO_VALID) != 0;
177e1051a39Sopenharmony_ci}
178e1051a39Sopenharmony_ci
179e1051a39Sopenharmony_civoid X509_SIG_INFO_set(X509_SIG_INFO *siginf, int mdnid, int pknid,
180e1051a39Sopenharmony_ci                       int secbits, uint32_t flags)
181e1051a39Sopenharmony_ci{
182e1051a39Sopenharmony_ci    siginf->mdnid = mdnid;
183e1051a39Sopenharmony_ci    siginf->pknid = pknid;
184e1051a39Sopenharmony_ci    siginf->secbits = secbits;
185e1051a39Sopenharmony_ci    siginf->flags = flags;
186e1051a39Sopenharmony_ci}
187e1051a39Sopenharmony_ci
188e1051a39Sopenharmony_ciint X509_get_signature_info(X509 *x, int *mdnid, int *pknid, int *secbits,
189e1051a39Sopenharmony_ci                            uint32_t *flags)
190e1051a39Sopenharmony_ci{
191e1051a39Sopenharmony_ci    X509_check_purpose(x, -1, -1);
192e1051a39Sopenharmony_ci    return X509_SIG_INFO_get(&x->siginf, mdnid, pknid, secbits, flags);
193e1051a39Sopenharmony_ci}
194e1051a39Sopenharmony_ci
195e1051a39Sopenharmony_ci/* Modify *siginf according to alg and sig. Return 1 on success, else 0. */
196e1051a39Sopenharmony_cistatic int x509_sig_info_init(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
197e1051a39Sopenharmony_ci                              const ASN1_STRING *sig)
198e1051a39Sopenharmony_ci{
199e1051a39Sopenharmony_ci    int pknid, mdnid;
200e1051a39Sopenharmony_ci    const EVP_MD *md;
201e1051a39Sopenharmony_ci    const EVP_PKEY_ASN1_METHOD *ameth;
202e1051a39Sopenharmony_ci
203e1051a39Sopenharmony_ci    siginf->mdnid = NID_undef;
204e1051a39Sopenharmony_ci    siginf->pknid = NID_undef;
205e1051a39Sopenharmony_ci    siginf->secbits = -1;
206e1051a39Sopenharmony_ci    siginf->flags = 0;
207e1051a39Sopenharmony_ci    if (!OBJ_find_sigid_algs(OBJ_obj2nid(alg->algorithm), &mdnid, &pknid)
208e1051a39Sopenharmony_ci            || pknid == NID_undef) {
209e1051a39Sopenharmony_ci        ERR_raise(ERR_LIB_X509, X509_R_UNKNOWN_SIGID_ALGS);
210e1051a39Sopenharmony_ci        return 0;
211e1051a39Sopenharmony_ci    }
212e1051a39Sopenharmony_ci    siginf->mdnid = mdnid;
213e1051a39Sopenharmony_ci    siginf->pknid = pknid;
214e1051a39Sopenharmony_ci
215e1051a39Sopenharmony_ci    switch (mdnid) {
216e1051a39Sopenharmony_ci    case NID_undef:
217e1051a39Sopenharmony_ci        /* If we have one, use a custom handler for this algorithm */
218e1051a39Sopenharmony_ci        ameth = EVP_PKEY_asn1_find(NULL, pknid);
219e1051a39Sopenharmony_ci        if (ameth == NULL || ameth->siginf_set == NULL
220e1051a39Sopenharmony_ci                || !ameth->siginf_set(siginf, alg, sig)) {
221e1051a39Sopenharmony_ci            ERR_raise(ERR_LIB_X509, X509_R_ERROR_USING_SIGINF_SET);
222e1051a39Sopenharmony_ci            return 0;
223e1051a39Sopenharmony_ci        }
224e1051a39Sopenharmony_ci        break;
225e1051a39Sopenharmony_ci        /*
226e1051a39Sopenharmony_ci         * SHA1 and MD5 are known to be broken. Reduce security bits so that
227e1051a39Sopenharmony_ci         * they're no longer accepted at security level 1.
228e1051a39Sopenharmony_ci         * The real values don't really matter as long as they're lower than 80,
229e1051a39Sopenharmony_ci         * which is our security level 1.
230e1051a39Sopenharmony_ci         */
231e1051a39Sopenharmony_ci    case NID_sha1:
232e1051a39Sopenharmony_ci        /*
233e1051a39Sopenharmony_ci         * https://eprint.iacr.org/2020/014 puts a chosen-prefix attack
234e1051a39Sopenharmony_ci         * for SHA1 at2^63.4
235e1051a39Sopenharmony_ci         */
236e1051a39Sopenharmony_ci        siginf->secbits = 63;
237e1051a39Sopenharmony_ci        break;
238e1051a39Sopenharmony_ci    case NID_md5:
239e1051a39Sopenharmony_ci        /*
240e1051a39Sopenharmony_ci         * https://documents.epfl.ch/users/l/le/lenstra/public/papers/lat.pdf
241e1051a39Sopenharmony_ci         * puts a chosen-prefix attack for MD5 at 2^39.
242e1051a39Sopenharmony_ci         */
243e1051a39Sopenharmony_ci        siginf->secbits = 39;
244e1051a39Sopenharmony_ci        break;
245e1051a39Sopenharmony_ci    case NID_id_GostR3411_94:
246e1051a39Sopenharmony_ci        /*
247e1051a39Sopenharmony_ci         * There is a collision attack on GOST R 34.11-94 at 2^105, see
248e1051a39Sopenharmony_ci         * https://link.springer.com/chapter/10.1007%2F978-3-540-85174-5_10
249e1051a39Sopenharmony_ci         */
250e1051a39Sopenharmony_ci        siginf->secbits = 105;
251e1051a39Sopenharmony_ci        break;
252e1051a39Sopenharmony_ci    default:
253e1051a39Sopenharmony_ci        /* Security bits: half number of bits in digest */
254e1051a39Sopenharmony_ci        if ((md = EVP_get_digestbynid(mdnid)) == NULL) {
255e1051a39Sopenharmony_ci            ERR_raise(ERR_LIB_X509, X509_R_ERROR_GETTING_MD_BY_NID);
256e1051a39Sopenharmony_ci            return 0;
257e1051a39Sopenharmony_ci        }
258e1051a39Sopenharmony_ci        siginf->secbits = EVP_MD_get_size(md) * 4;
259e1051a39Sopenharmony_ci        break;
260e1051a39Sopenharmony_ci    }
261e1051a39Sopenharmony_ci    switch (mdnid) {
262e1051a39Sopenharmony_ci    case NID_sha1:
263e1051a39Sopenharmony_ci    case NID_sha256:
264e1051a39Sopenharmony_ci    case NID_sha384:
265e1051a39Sopenharmony_ci    case NID_sha512:
266e1051a39Sopenharmony_ci        siginf->flags |= X509_SIG_INFO_TLS;
267e1051a39Sopenharmony_ci    }
268e1051a39Sopenharmony_ci    siginf->flags |= X509_SIG_INFO_VALID;
269e1051a39Sopenharmony_ci    return 1;
270e1051a39Sopenharmony_ci}
271e1051a39Sopenharmony_ci
272e1051a39Sopenharmony_ci/* Returns 1 on success, 0 on failure */
273e1051a39Sopenharmony_ciint ossl_x509_init_sig_info(X509 *x)
274e1051a39Sopenharmony_ci{
275e1051a39Sopenharmony_ci    return x509_sig_info_init(&x->siginf, &x->sig_alg, &x->signature);
276e1051a39Sopenharmony_ci}
277