Annotation of embedaddon/strongswan/src/pki/commands/pkcs7.c, revision 1.1.1.1
1.1 misho 1: /*
2: * Copyright (C) 2012 Martin Willi
3: * Copyright (C) 2012 revosec AG
4: *
5: * This program is free software; you can redistribute it and/or modify it
6: * under the terms of the GNU General Public License as published by the
7: * Free Software Foundation; either version 2 of the License, or (at your
8: * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9: *
10: * This program is distributed in the hope that it will be useful, but
11: * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12: * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13: * for more details.
14: */
15:
16: #include "pki.h"
17:
18: #include <asn1/oid.h>
19: #include <asn1/asn1.h>
20: #include <credentials/containers/pkcs7.h>
21: #include <credentials/sets/mem_cred.h>
22:
23: /**
24: * Read input data as chunk
25: */
26: static chunk_t read_from_stream(FILE *stream)
27: {
28: char buf[8096];
29: size_t len, total = 0;
30:
31: while (TRUE)
32: {
33: len = fread(buf + total, 1, sizeof(buf) - total, stream);
34: if (len < (sizeof(buf) - total))
35: {
36: if (ferror(stream))
37: {
38: return chunk_empty;
39: }
40: if (feof(stream))
41: {
42: return chunk_clone(chunk_create(buf, total + len));
43: }
44: }
45: total += len;
46: if (total == sizeof(buf))
47: {
48: fprintf(stderr, "buffer too small to read input!\n");
49: return chunk_empty;
50: }
51: }
52: }
53:
54: /**
55: * Write output data from chunk to stream
56: */
57: static bool write_to_stream(FILE *stream, chunk_t data)
58: {
59: size_t len, total = 0;
60:
61: set_file_mode(stream, CERT_ASN1_DER);
62: while (total < data.len)
63: {
64: len = fwrite(data.ptr + total, 1, data.len - total, stream);
65: if (len <= 0)
66: {
67: return FALSE;
68: }
69: total += len;
70: }
71: return TRUE;
72: }
73:
74: /**
75: * Verify PKCS#7 signed-data
76: */
77: static int verify(chunk_t chunk)
78: {
79: container_t *container;
80: pkcs7_t *pkcs7;
81: enumerator_t *enumerator;
82: certificate_t *cert;
83: auth_cfg_t *auth;
84: chunk_t data;
85: time_t t;
86: bool verified = FALSE;
87:
88: container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
89: BUILD_BLOB_ASN1_DER, chunk, BUILD_END);
90: if (!container)
91: {
92: return 1;
93: }
94:
95: if (container->get_type(container) != CONTAINER_PKCS7_SIGNED_DATA)
96: {
97: fprintf(stderr, "verification failed, container is %N\n",
98: container_type_names, container->get_type(container));
99: container->destroy(container);
100: return 1;
101: }
102:
103: pkcs7 = (pkcs7_t*)container;
104: enumerator = container->create_signature_enumerator(container);
105: while (enumerator->enumerate(enumerator, &auth))
106: {
107: verified = TRUE;
108: cert = auth->get(auth, AUTH_RULE_SUBJECT_CERT);
109: if (cert)
110: {
111: fprintf(stderr, "signed by '%Y'", cert->get_subject(cert));
112:
113: if (pkcs7->get_attribute(pkcs7, OID_PKCS9_SIGNING_TIME,
114: enumerator, &data))
115: {
116: t = asn1_to_time(&data, ASN1_UTCTIME);
117: if (t != UNDEFINED_TIME)
118: {
119: fprintf(stderr, " at %T", &t, FALSE);
120: }
121: free(data.ptr);
122: }
123: fprintf(stderr, "\n");
124: }
125: }
126: enumerator->destroy(enumerator);
127:
128: if (!verified)
129: {
130: fprintf(stderr, "no trusted signature found\n");
131: }
132:
133: if (verified)
134: {
135: if (container->get_data(container, &data))
136: {
137: write_to_stream(stdout, data);
138: free(data.ptr);
139: }
140: else
141: {
142: verified = FALSE;
143: }
144: }
145: container->destroy(container);
146:
147: return verified ? 0 : 1;
148: }
149:
150: /**
151: * Sign data into PKCS#7 signed-data
152: */
153: static int sign(chunk_t chunk, certificate_t *cert, private_key_t *key)
154: {
155: container_t *container;
156: chunk_t encoding;
157: int res = 1;
158:
159: container = lib->creds->create(lib->creds,
160: CRED_CONTAINER, CONTAINER_PKCS7_SIGNED_DATA,
161: BUILD_BLOB, chunk,
162: BUILD_SIGNING_CERT, cert,
163: BUILD_SIGNING_KEY, key,
164: BUILD_END);
165: if (container)
166: {
167: if (container->get_encoding(container, &encoding))
168: {
169: write_to_stream(stdout, encoding);
170: free(encoding.ptr);
171: }
172: container->destroy(container);
173: }
174: return res;
175: }
176:
177: /**
178: * Encrypt data to a PKCS#7 enveloped-data
179: */
180: static int encrypt(chunk_t chunk, certificate_t *cert)
181: {
182: container_t *container;
183: chunk_t encoding;
184: int res = 1;
185:
186: container = lib->creds->create(lib->creds,
187: CRED_CONTAINER, CONTAINER_PKCS7_ENVELOPED_DATA,
188: BUILD_BLOB, chunk, BUILD_CERT, cert,
189: BUILD_END);
190: if (container)
191: {
192: if (container->get_encoding(container, &encoding))
193: {
194: write_to_stream(stdout, encoding);
195: free(encoding.ptr);
196: }
197: container->destroy(container);
198: }
199: return res;
200: }
201:
202: /**
203: * Decrypt PKCS#7 enveloped-data
204: */
205: static int decrypt(chunk_t chunk)
206: {
207: container_t *container;
208: chunk_t data;
209:
210: container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
211: BUILD_BLOB_ASN1_DER, chunk, BUILD_END);
212: if (!container)
213: {
214: return 1;
215: }
216: if (container->get_type(container) != CONTAINER_PKCS7_ENVELOPED_DATA)
217: {
218: fprintf(stderr, "decryption failed, container is %N\n",
219: container_type_names, container->get_type(container));
220: container->destroy(container);
221: return 1;
222: }
223: if (!container->get_data(container, &data))
224: {
225: fprintf(stderr, "PKCS#7 decryption failed\n");
226: container->destroy(container);
227: return 1;
228: }
229: container->destroy(container);
230:
231: write_to_stream(stdout, data);
232: free(data.ptr);
233:
234: return 0;
235: }
236:
237: /**
238: * Show info about PKCS#7 container
239: */
240: static int show(chunk_t chunk)
241: {
242: container_t *container;
243: pkcs7_t *pkcs7;
244: enumerator_t *enumerator;
245: certificate_t *cert;
246: chunk_t data;
247:
248: container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
249: BUILD_BLOB_ASN1_DER, chunk, BUILD_END);
250: if (!container)
251: {
252: return 1;
253: }
254: fprintf(stderr, "%N\n", container_type_names, container->get_type(container));
255:
256: if (container->get_type(container) == CONTAINER_PKCS7_SIGNED_DATA)
257: {
258: pkcs7 = (pkcs7_t*)container;
259: enumerator = pkcs7->create_cert_enumerator(pkcs7);
260: while (enumerator->enumerate(enumerator, &cert))
261: {
262: if (cert->get_encoding(cert, CERT_PEM, &data))
263: {
264: printf("%.*s", (int)data.len, data.ptr);
265: free(data.ptr);
266: }
267: }
268: enumerator->destroy(enumerator);
269: }
270: container->destroy(container);
271: return 0;
272: }
273:
274: /**
275: * Wrap/Unwrap PKCs#7 containers
276: */
277: static int pkcs7()
278: {
279: char *arg, *file = NULL;
280: private_key_t *key = NULL;
281: certificate_t *cert = NULL;
282: chunk_t data = chunk_empty;
283: mem_cred_t *creds;
284: int res = 1;
285: FILE *in;
286: enum {
287: OP_NONE,
288: OP_SIGN,
289: OP_VERIFY,
290: OP_ENCRYPT,
291: OP_DECRYPT,
292: OP_SHOW,
293: } op = OP_NONE;
294:
295: creds = mem_cred_create();
296:
297: while (TRUE)
298: {
299: switch (command_getopt(&arg))
300: {
301: case 'h':
302: creds->destroy(creds);
303: return command_usage(NULL);
304: case 'i':
305: file = arg;
306: continue;
307: case 's':
308: if (op != OP_NONE)
309: {
310: goto invalid;
311: }
312: op = OP_SIGN;
313: continue;
314: case 'u':
315: if (op != OP_NONE)
316: {
317: goto invalid;
318: }
319: op = OP_VERIFY;
320: continue;
321: case 'e':
322: if (op != OP_NONE)
323: {
324: goto invalid;
325: }
326: op = OP_ENCRYPT;
327: continue;
328: case 'd':
329: if (op != OP_NONE)
330: {
331: goto invalid;
332: }
333: op = OP_DECRYPT;
334: continue;
335: case 'p':
336: if (op != OP_NONE)
337: {
338: goto invalid;
339: }
340: op = OP_SHOW;
341: continue;
342: case 'k':
343: key = lib->creds->create(lib->creds,
344: CRED_PRIVATE_KEY, KEY_RSA,
345: BUILD_FROM_FILE, arg, BUILD_END);
346: if (!key)
347: {
348: fprintf(stderr, "parsing private key failed\n");
349: goto end;
350: }
351: creds->add_key(creds, key);
352: continue;
353: case 'c':
354: cert = lib->creds->create(lib->creds,
355: CRED_CERTIFICATE, CERT_X509,
356: BUILD_FROM_FILE, arg, BUILD_END);
357: if (!cert)
358: {
359: fprintf(stderr, "parsing certificate failed\n");
360: goto end;
361: }
362: creds->add_cert(creds, TRUE, cert);
363: continue;
364: case EOF:
365: break;
366: default:
367: invalid:
368: creds->destroy(creds);
369: return command_usage("invalid --pkcs7 option");
370: }
371: break;
372: }
373:
374: if (file)
375: {
376: in = fopen(file, "r");
377: if (in)
378: {
379: data = read_from_stream(in);
380: fclose(in);
381: }
382: }
383: else
384: {
385: data = read_from_stream(stdin);
386: }
387:
388: if (!data.len)
389: {
390: fprintf(stderr, "reading input failed!\n");
391: goto end;
392: }
393: if (op != OP_SHOW && !cert)
394: {
395: fprintf(stderr, "requiring a certificate!\n");
396: goto end;
397: }
398:
399: lib->credmgr->add_local_set(lib->credmgr, &creds->set, FALSE);
400:
401: switch (op)
402: {
403: case OP_SIGN:
404: if (!key)
405: {
406: fprintf(stderr, "signing requires a private key\n");
407: res = 1;
408: break;
409: }
410: res = sign(data, cert, key);
411: break;
412: case OP_VERIFY:
413: res = verify(data);
414: break;
415: case OP_ENCRYPT:
416: res = encrypt(data, cert);
417: break;
418: case OP_DECRYPT:
419: if (!key)
420: {
421: fprintf(stderr, "decryption requires a private key\n");
422: res = 1;
423: break;
424: }
425: res = decrypt(data);
426: break;
427: case OP_SHOW:
428: res = show(data);
429: break;
430: default:
431: res = 1;
432: break;
433: }
434: lib->credmgr->remove_local_set(lib->credmgr, &creds->set);
435:
436: end:
437: creds->destroy(creds);
438: free(data.ptr);
439: return res;
440: }
441:
442: /**
443: * Register the command.
444: */
445: static void __attribute__ ((constructor))reg()
446: {
447: command_register((command_t) {
448: pkcs7, '7', "pkcs7", "PKCS#7 wrap/unwrap functions",
449: {"--sign|--verify|--encrypt|--decrypt|--show",
450: "[--in file] [--cert file]+ [--key file]"},
451: {
452: {"help", 'h', 0, "show usage information"},
453: {"sign", 's', 0, "create PKCS#7 signed-data"},
454: {"verify", 'u', 0, "verify PKCS#7 signed-data"},
455: {"encrypt", 'e', 0, "create PKCS#7 enveloped-data"},
456: {"decrypt", 'd', 0, "decrypt PKCS#7 enveloped-data"},
457: {"show", 'p', 0, "show info about PKCS#7, print certificates"},
458: {"in", 'i', 1, "input file, default: stdin"},
459: {"key", 'k', 1, "path to private key for sign/decrypt"},
460: {"cert", 'c', 1, "path to certificate for sign/verify/encrypt"},
461: }
462: });
463: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>