2 * Copyright (C) 2001-2012 Free Software Foundation, Inc.
4 * Author: Nikos Mavrogiannopoulos
6 * This file is part of GnuTLS.
8 * The GnuTLS is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public License
10 * as published by the Free Software Foundation; either version 3 of
11 * the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>
23 /* Some of the stuff needed for Certificate authentication is contained
27 #include <gnutls_int.h>
28 #include <gnutls_errors.h>
29 #include <auth/cert.h>
30 #include <gnutls_datum.h>
31 #include <gnutls_mpi.h>
32 #include <gnutls_global.h>
33 #include <algorithms.h>
34 #include <gnutls_dh.h>
35 #include <gnutls_str.h>
36 #include <gnutls_state.h>
37 #include <gnutls_auth.h>
38 #include <gnutls_x509.h>
39 #include <gnutls_str_array.h>
40 #include "x509/x509_int.h"
42 #include "openpgp/gnutls_openpgp.h"
46 * gnutls_certificate_free_keys:
47 * @sc: is a #gnutls_certificate_credentials_t structure.
49 * This function will delete all the keys and the certificates associated
50 * with the given credentials. This function must not be called when a
51 * TLS negotiation that uses the credentials is in progress.
55 gnutls_certificate_free_keys (gnutls_certificate_credentials_t sc
)
59 for (i
= 0; i
< sc
->ncerts
; i
++)
61 for (j
= 0; j
< sc
->certs
[i
].cert_list_length
; j
++)
63 gnutls_pcert_deinit (&sc
->certs
[i
].cert_list
[j
]);
65 gnutls_free (sc
->certs
[i
].cert_list
);
66 _gnutls_str_array_clear (&sc
->certs
[i
].names
);
69 gnutls_free (sc
->certs
);
72 for (i
= 0; i
< sc
->ncerts
; i
++)
74 gnutls_privkey_deinit (sc
->pkey
[i
]);
77 gnutls_free (sc
->pkey
);
84 * gnutls_certificate_free_cas:
85 * @sc: is a #gnutls_certificate_credentials_t structure.
87 * This function will delete all the CAs associated with the given
88 * credentials. Servers that do not use
89 * gnutls_certificate_verify_peers2() may call this to save some
93 gnutls_certificate_free_cas (gnutls_certificate_credentials_t sc
)
95 /* FIXME: do nothing for now */
100 * gnutls_certificate_get_issuer:
101 * @sc: is a #gnutls_certificate_credentials_t structure.
102 * @cert: is the certificate to find issuer for
103 * @issuer: Will hold the issuer if any. Should be treated as constant.
106 * This function will return the issuer of a given certificate.
108 * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
109 * negative error value.
114 gnutls_certificate_get_issuer (gnutls_certificate_credentials_t sc
,
115 gnutls_x509_crt_t cert
, gnutls_x509_crt_t
* issuer
, unsigned int flags
)
117 return gnutls_x509_trust_list_get_issuer(sc
->tlist
, cert
, issuer
, flags
);
121 * gnutls_certificate_free_ca_names:
122 * @sc: is a #gnutls_certificate_credentials_t structure.
124 * This function will delete all the CA name in the given
125 * credentials. Clients may call this to save some memory since in
126 * client side the CA names are not used. Servers might want to use
127 * this function if a large list of trusted CAs is present and
128 * sending the names of it would just consume bandwidth without providing
129 * information to client.
131 * CA names are used by servers to advertise the CAs they support to
135 gnutls_certificate_free_ca_names (gnutls_certificate_credentials_t sc
)
137 _gnutls_free_datum (&sc
->x509_rdn_sequence
);
141 * _gnutls_certificate_get_rsa_params - Returns the RSA parameters pointer
142 * @rsa_params: holds the RSA parameters or NULL.
143 * @func: function to retrieve the parameters or NULL.
144 * @session: The session.
146 * This function will return the rsa parameters pointer.
149 _gnutls_certificate_get_rsa_params (gnutls_rsa_params_t rsa_params
,
150 gnutls_params_function
* func
,
151 gnutls_session_t session
)
153 gnutls_params_st params
;
156 if (session
->internals
.params
.rsa_params
)
158 return session
->internals
.params
.rsa_params
;
163 session
->internals
.params
.rsa_params
= rsa_params
;
167 ret
= func (session
, GNUTLS_PARAMS_RSA_EXPORT
, ¶ms
);
168 if (ret
== 0 && params
.type
== GNUTLS_PARAMS_RSA_EXPORT
)
170 session
->internals
.params
.rsa_params
= params
.params
.rsa_export
;
171 session
->internals
.params
.free_rsa_params
= params
.deinit
;
175 return session
->internals
.params
.rsa_params
;
180 * gnutls_certificate_free_credentials:
181 * @sc: is a #gnutls_certificate_credentials_t structure.
183 * This structure is complex enough to manipulate directly thus this
184 * helper function is provided in order to free (deallocate) it.
186 * This function does not free any temporary parameters associated
187 * with this structure (ie RSA and DH parameters are not freed by this
191 gnutls_certificate_free_credentials (gnutls_certificate_credentials_t sc
)
193 gnutls_x509_trust_list_deinit(sc
->tlist
, 1);
194 gnutls_certificate_free_keys (sc
);
195 gnutls_certificate_free_ca_names (sc
);
197 #ifdef ENABLE_OPENPGP
198 gnutls_openpgp_keyring_deinit (sc
->keyring
);
206 * gnutls_certificate_allocate_credentials:
207 * @res: is a pointer to a #gnutls_certificate_credentials_t structure.
209 * This structure is complex enough to manipulate directly thus this
210 * helper function is provided in order to allocate it.
212 * Returns: %GNUTLS_E_SUCCESS on success, or an error code.
215 gnutls_certificate_allocate_credentials (gnutls_certificate_credentials_t
*
220 *res
= gnutls_calloc (1, sizeof (certificate_credentials_st
));
223 return GNUTLS_E_MEMORY_ERROR
;
225 ret
= gnutls_x509_trust_list_init( &(*res
)->tlist
, 0);
230 return GNUTLS_E_MEMORY_ERROR
;
232 (*res
)->verify_bits
= DEFAULT_VERIFY_BITS
;
233 (*res
)->verify_depth
= DEFAULT_VERIFY_DEPTH
;
239 /* returns the KX algorithms that are supported by a
240 * certificate. (Eg a certificate with RSA params, supports
241 * GNUTLS_KX_RSA algorithm).
242 * This function also uses the KeyUsage field of the certificate
243 * extensions in order to disable unneded algorithms.
246 _gnutls_selected_cert_supported_kx (gnutls_session_t session
,
247 gnutls_kx_algorithm_t
* alg
,
250 gnutls_kx_algorithm_t kx
;
251 gnutls_pk_algorithm_t pk
, cert_pk
;
252 gnutls_pcert_st
*cert
;
255 if (session
->internals
.selected_cert_list_length
== 0)
261 cert
= &session
->internals
.selected_cert_list
[0];
262 cert_pk
= gnutls_pubkey_get_pk_algorithm(cert
->pubkey
, NULL
);
265 for (kx
= 0; kx
< MAX_ALGOS
; kx
++)
267 pk
= _gnutls_map_pk_get_pk (kx
);
270 /* then check key usage */
271 if (_gnutls_check_key_usage (cert
, kx
) == 0)
277 return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR
);
285 return GNUTLS_E_INVALID_REQUEST
;
295 * gnutls_certificate_server_set_request:
296 * @session: is a #gnutls_session_t structure.
297 * @req: is one of GNUTLS_CERT_REQUEST, GNUTLS_CERT_REQUIRE
299 * This function specifies if we (in case of a server) are going to
300 * send a certificate request message to the client. If @req is
301 * GNUTLS_CERT_REQUIRE then the server will return an error if the
302 * peer does not provide a certificate. If you do not call this
303 * function then the client will not be asked to send a certificate.
306 gnutls_certificate_server_set_request (gnutls_session_t session
,
307 gnutls_certificate_request_t req
)
309 session
->internals
.send_cert_req
= req
;
313 * gnutls_certificate_client_set_retrieve_function:
314 * @cred: is a #gnutls_certificate_credentials_t structure.
315 * @func: is the callback function
317 * This function sets a callback to be called in order to retrieve the
318 * certificate to be used in the handshake.
319 * You are advised to use gnutls_certificate_set_retrieve_function2() because it
320 * is much more efficient in the processing it requires from gnutls.
322 * The callback's function prototype is:
323 * int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
324 * const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr_st* st);
326 * @req_ca_cert is only used in X.509 certificates.
327 * Contains a list with the CA names that the server considers trusted.
328 * Normally we should send a certificate that is signed
329 * by one of these CAs. These names are DER encoded. To get a more
330 * meaningful value use the function gnutls_x509_rdn_get().
332 * @pk_algos contains a list with server's acceptable signature algorithms.
333 * The certificate returned should support the server's given algorithms.
335 * @st should contain the certificates and private keys.
337 * If the callback function is provided then gnutls will call it, in the
338 * handshake, after the certificate request message has been received.
340 * The callback function should set the certificate list to be sent,
341 * and return 0 on success. If no certificate was selected then the
342 * number of certificates should be set to zero. The value (-1)
343 * indicates error and the handshake will be terminated.
345 void gnutls_certificate_client_set_retrieve_function
346 (gnutls_certificate_credentials_t cred
,
347 gnutls_certificate_client_retrieve_function
* func
)
349 cred
->client_get_cert_callback
= func
;
353 * gnutls_certificate_server_set_retrieve_function:
354 * @cred: is a #gnutls_certificate_credentials_t structure.
355 * @func: is the callback function
357 * This function sets a callback to be called in order to retrieve the
358 * certificate to be used in the handshake.
359 * You are advised to use gnutls_certificate_set_retrieve_function2() because it
360 * is much more efficient in the processing it requires from gnutls.
362 * The callback's function prototype is:
363 * int (*callback)(gnutls_session_t, gnutls_retr_st* st);
365 * @st should contain the certificates and private keys.
367 * If the callback function is provided then gnutls will call it, in the
368 * handshake, after the certificate request message has been received.
370 * The callback function should set the certificate list to be sent, and
371 * return 0 on success. The value (-1) indicates error and the handshake
372 * will be terminated.
374 void gnutls_certificate_server_set_retrieve_function
375 (gnutls_certificate_credentials_t cred
,
376 gnutls_certificate_server_retrieve_function
* func
)
378 cred
->server_get_cert_callback
= func
;
382 * gnutls_certificate_set_retrieve_function:
383 * @cred: is a #gnutls_certificate_credentials_t structure.
384 * @func: is the callback function
386 * This function sets a callback to be called in order to retrieve the
387 * certificate to be used in the handshake. You are advised
388 * to use gnutls_certificate_set_retrieve_function2() because it
389 * is much more efficient in the processing it requires from gnutls.
391 * The callback's function prototype is:
392 * int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
393 * const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr2_st* st);
395 * @req_ca_cert is only used in X.509 certificates.
396 * Contains a list with the CA names that the server considers trusted.
397 * Normally we should send a certificate that is signed
398 * by one of these CAs. These names are DER encoded. To get a more
399 * meaningful value use the function gnutls_x509_rdn_get().
401 * @pk_algos contains a list with server's acceptable signature algorithms.
402 * The certificate returned should support the server's given algorithms.
404 * @st should contain the certificates and private keys.
406 * If the callback function is provided then gnutls will call it, in the
407 * handshake, after the certificate request message has been received.
409 * In server side pk_algos and req_ca_dn are NULL.
411 * The callback function should set the certificate list to be sent,
412 * and return 0 on success. If no certificate was selected then the
413 * number of certificates should be set to zero. The value (-1)
414 * indicates error and the handshake will be terminated.
418 void gnutls_certificate_set_retrieve_function
419 (gnutls_certificate_credentials_t cred
,
420 gnutls_certificate_retrieve_function
* func
)
422 cred
->get_cert_callback
= func
;
426 * gnutls_certificate_set_retrieve_function2:
427 * @cred: is a #gnutls_certificate_credentials_t structure.
428 * @func: is the callback function
430 * This function sets a callback to be called in order to retrieve the
431 * certificate to be used in the handshake.
433 * The callback's function prototype is:
434 * int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs,
435 * const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_pcert_st** pcert,
436 * unsigned int *pcert_length, gnutls_privkey_t * pkey);
438 * @req_ca_cert is only used in X.509 certificates.
439 * Contains a list with the CA names that the server considers trusted.
440 * Normally we should send a certificate that is signed
441 * by one of these CAs. These names are DER encoded. To get a more
442 * meaningful value use the function gnutls_x509_rdn_get().
444 * @pk_algos contains a list with server's acceptable signature algorithms.
445 * The certificate returned should support the server's given algorithms.
447 * @pcert should contain a single certificate and public or a list of them.
449 * @pcert_length is the size of the previous list.
451 * @pkey is the private key.
453 * If the callback function is provided then gnutls will call it, in the
454 * handshake, after the certificate request message has been received.
456 * In server side pk_algos and req_ca_dn are NULL.
458 * The callback function should set the certificate list to be sent,
459 * and return 0 on success. If no certificate was selected then the
460 * number of certificates should be set to zero. The value (-1)
461 * indicates error and the handshake will be terminated.
465 void gnutls_certificate_set_retrieve_function2
466 (gnutls_certificate_credentials_t cred
,
467 gnutls_certificate_retrieve_function2
* func
)
469 cred
->get_cert_callback2
= func
;
473 * gnutls_certificate_set_verify_function:
474 * @cred: is a #gnutls_certificate_credentials_t structure.
475 * @func: is the callback function
477 * This function sets a callback to be called when peer's certificate
478 * has been received in order to verify it on receipt rather than
479 * doing after the handshake is completed.
481 * The callback's function prototype is:
482 * int (*callback)(gnutls_session_t);
484 * If the callback function is provided then gnutls will call it, in the
485 * handshake, just after the certificate message has been received.
486 * To verify or obtain the certificate the gnutls_certificate_verify_peers2(),
487 * gnutls_certificate_type_get(), gnutls_certificate_get_peers() functions
490 * The callback function should return 0 for the handshake to continue
491 * or non-zero to terminate.
496 gnutls_certificate_set_verify_function
497 (gnutls_certificate_credentials_t cred
,
498 gnutls_certificate_verify_function
* func
)
500 cred
->verify_callback
= func
;
504 * _gnutls_x509_extract_certificate_activation_time - return the peer's certificate activation time
505 * @cert: should contain an X.509 DER encoded certificate
507 * This function will return the certificate's activation time in UNIX time
508 * (ie seconds since 00:00:00 UTC January 1, 1970).
510 * Returns a (time_t) -1 in case of an error.
514 _gnutls_x509_get_raw_crt_activation_time (const gnutls_datum_t
* cert
)
516 gnutls_x509_crt_t xcert
;
519 result
= gnutls_x509_crt_init (&xcert
);
523 result
= gnutls_x509_crt_import (xcert
, cert
, GNUTLS_X509_FMT_DER
);
526 gnutls_x509_crt_deinit (xcert
);
530 result
= gnutls_x509_crt_get_activation_time (xcert
);
532 gnutls_x509_crt_deinit (xcert
);
538 * gnutls_x509_extract_certificate_expiration_time:
539 * @cert: should contain an X.509 DER encoded certificate
541 * This function will return the certificate's expiration time in UNIX
542 * time (ie seconds since 00:00:00 UTC January 1, 1970). Returns a
544 * (time_t) -1 in case of an error.
548 _gnutls_x509_get_raw_crt_expiration_time (const gnutls_datum_t
* cert
)
550 gnutls_x509_crt_t xcert
;
553 result
= gnutls_x509_crt_init (&xcert
);
557 result
= gnutls_x509_crt_import (xcert
, cert
, GNUTLS_X509_FMT_DER
);
560 gnutls_x509_crt_deinit (xcert
);
564 result
= gnutls_x509_crt_get_expiration_time (xcert
);
566 gnutls_x509_crt_deinit (xcert
);
571 #ifdef ENABLE_OPENPGP
573 * _gnutls_openpgp_crt_verify_peers - return the peer's certificate status
574 * @session: is a gnutls session
576 * This function will try to verify the peer's certificate and return its status (TRUSTED, INVALID etc.).
577 * Returns a negative error code in case of an error, or GNUTLS_E_NO_CERTIFICATE_FOUND if no certificate was sent.
580 _gnutls_openpgp_crt_verify_peers (gnutls_session_t session
,
581 unsigned int *status
)
583 cert_auth_info_t info
;
584 gnutls_certificate_credentials_t cred
;
585 int peer_certificate_list_size
, ret
;
587 CHECK_AUTH (GNUTLS_CRD_CERTIFICATE
, GNUTLS_E_INVALID_REQUEST
);
589 info
= _gnutls_get_auth_info (session
);
591 return GNUTLS_E_INVALID_REQUEST
;
593 cred
= (gnutls_certificate_credentials_t
)
594 _gnutls_get_cred (session
->key
, GNUTLS_CRD_CERTIFICATE
, NULL
);
598 return GNUTLS_E_INSUFFICIENT_CREDENTIALS
;
601 if (info
->raw_certificate_list
== NULL
|| info
->ncerts
== 0)
604 return GNUTLS_E_NO_CERTIFICATE_FOUND
;
607 /* generate a list of gnutls_certs based on the auth info
610 peer_certificate_list_size
= info
->ncerts
;
612 if (peer_certificate_list_size
!= 1)
615 return GNUTLS_E_INTERNAL_ERROR
;
618 /* Verify certificate
621 _gnutls_openpgp_verify_key (cred
, &info
->raw_certificate_list
[0],
622 peer_certificate_list_size
, status
);
635 * gnutls_certificate_verify_peers2:
636 * @session: is a gnutls session
637 * @status: is the output of the verification
639 * This function will try to verify the peer's certificate and return
640 * its status (trusted, invalid etc.). The value of @status should
641 * be one or more of the gnutls_certificate_status_t enumerated
642 * elements bitwise or'd. To avoid denial of service attacks some
643 * default upper limits regarding the certificate key size and chain
644 * size are set. To override them use
645 * gnutls_certificate_set_verify_limits().
647 * Note that you must also check the peer's name in order to check if
648 * the verified certificate belongs to the actual peer.
650 * This function uses gnutls_x509_crt_list_verify() with the CAs in
651 * the credentials as trusted CAs.
653 * Returns: a negative error code on error and %GNUTLS_E_SUCCESS (0) on success.
656 gnutls_certificate_verify_peers2 (gnutls_session_t session
,
657 unsigned int *status
)
659 cert_auth_info_t info
;
661 CHECK_AUTH (GNUTLS_CRD_CERTIFICATE
, GNUTLS_E_INVALID_REQUEST
);
663 info
= _gnutls_get_auth_info (session
);
666 return GNUTLS_E_NO_CERTIFICATE_FOUND
;
669 if (info
->raw_certificate_list
== NULL
|| info
->ncerts
== 0)
670 return GNUTLS_E_NO_CERTIFICATE_FOUND
;
672 switch (gnutls_certificate_type_get (session
))
674 case GNUTLS_CRT_X509
:
675 return _gnutls_x509_cert_verify_peers (session
, status
);
676 #ifdef ENABLE_OPENPGP
677 case GNUTLS_CRT_OPENPGP
:
678 return _gnutls_openpgp_crt_verify_peers (session
, status
);
681 return GNUTLS_E_INVALID_REQUEST
;
686 * gnutls_certificate_expiration_time_peers:
687 * @session: is a gnutls session
689 * This function will return the peer's certificate expiration time.
691 * Returns: (time_t)-1 on error.
693 * Deprecated: gnutls_certificate_verify_peers2() now verifies expiration times.
696 gnutls_certificate_expiration_time_peers (gnutls_session_t session
)
698 cert_auth_info_t info
;
700 CHECK_AUTH (GNUTLS_CRD_CERTIFICATE
, GNUTLS_E_INVALID_REQUEST
);
702 info
= _gnutls_get_auth_info (session
);
708 if (info
->raw_certificate_list
== NULL
|| info
->ncerts
== 0)
714 switch (gnutls_certificate_type_get (session
))
716 case GNUTLS_CRT_X509
:
718 _gnutls_x509_get_raw_crt_expiration_time (&info
->raw_certificate_list
720 #ifdef ENABLE_OPENPGP
721 case GNUTLS_CRT_OPENPGP
:
723 _gnutls_openpgp_get_raw_key_expiration_time
724 (&info
->raw_certificate_list
[0]);
732 * gnutls_certificate_activation_time_peers:
733 * @session: is a gnutls session
735 * This function will return the peer's certificate activation time.
736 * This is the creation time for openpgp keys.
738 * Returns: (time_t)-1 on error.
740 * Deprecated: gnutls_certificate_verify_peers2() now verifies activation times.
743 gnutls_certificate_activation_time_peers (gnutls_session_t session
)
745 cert_auth_info_t info
;
747 CHECK_AUTH (GNUTLS_CRD_CERTIFICATE
, GNUTLS_E_INVALID_REQUEST
);
749 info
= _gnutls_get_auth_info (session
);
755 if (info
->raw_certificate_list
== NULL
|| info
->ncerts
== 0)
761 switch (gnutls_certificate_type_get (session
))
763 case GNUTLS_CRT_X509
:
765 _gnutls_x509_get_raw_crt_activation_time (&info
->raw_certificate_list
767 #ifdef ENABLE_OPENPGP
768 case GNUTLS_CRT_OPENPGP
:
770 _gnutls_openpgp_get_raw_key_creation_time (&info
->raw_certificate_list
779 * gnutls_sign_callback_set:
780 * @session: is a gnutls session
781 * @sign_func: function pointer to application's sign callback.
782 * @userdata: void pointer that will be passed to sign callback.
784 * Set the callback function. The function must have this prototype:
786 * typedef int (*gnutls_sign_func) (gnutls_session_t session,
788 * gnutls_certificate_type_t cert_type,
789 * const gnutls_datum_t * cert,
790 * const gnutls_datum_t * hash,
791 * gnutls_datum_t * signature);
793 * The @userdata parameter is passed to the @sign_func verbatim, and
794 * can be used to store application-specific data needed in the
795 * callback function. See also gnutls_sign_callback_get().
797 * Deprecated: Use the PKCS 11 or #gnutls_privkey_t interfacess like gnutls_privkey_import_ext() instead.
800 gnutls_sign_callback_set (gnutls_session_t session
,
801 gnutls_sign_func sign_func
, void *userdata
)
803 session
->internals
.sign_func
= sign_func
;
804 session
->internals
.sign_func_userdata
= userdata
;
808 * gnutls_sign_callback_get:
809 * @session: is a gnutls session
810 * @userdata: if non-%NULL, will be set to abstract callback pointer.
812 * Retrieve the callback function, and its userdata pointer.
814 * Returns: The function pointer set by gnutls_sign_callback_set(), or
817 * Deprecated: Use the PKCS 11 interfaces instead.
820 gnutls_sign_callback_get (gnutls_session_t session
, void **userdata
)
823 *userdata
= session
->internals
.sign_func_userdata
;
824 return session
->internals
.sign_func
;