1 /* Copyright (c) 2003, Roger Dingledine.
2 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
3 * Copyright (c) 2007-2021, The Tor Project, Inc. */
4 /* See LICENSE for licensing information */
8 * \brief Wrapper functions to present a consistent interface to
9 * X.509 functions from OpenSSL.
12 #define TOR_X509_PRIVATE
13 #include "lib/tls/x509.h"
14 #include "lib/tls/x509_internal.h"
15 #include "lib/tls/tortls.h"
16 #include "lib/crypt_ops/crypto_rand.h"
17 #include "lib/crypt_ops/crypto_util.h"
18 #include "lib/crypt_ops/compat_openssl.h"
20 /* Some versions of OpenSSL declare SSL_get_selected_srtp_profile twice in
21 * srtp.h. Suppress the GCC warning so we can build with -Wredundant-decl. */
22 DISABLE_GCC_WARNING("-Wredundant-decls")
24 #include <openssl/opensslv.h>
27 #error "We require OpenSSL with ECC support"
30 #include <openssl/err.h>
31 #include <openssl/asn1.h>
32 #include <openssl/bio.h>
33 #include <openssl/bn.h>
34 #include <openssl/evp.h>
35 #include <openssl/objects.h>
36 #include <openssl/rsa.h>
37 #include <openssl/x509.h>
39 ENABLE_GCC_WARNING("-Wredundant-decls")
41 #include "lib/log/log.h"
42 #include "lib/log/util_bug.h"
43 #include "lib/ctime/di_ops.h"
44 #include "lib/encoding/time_fmt.h"
49 #ifdef OPENSSL_1_1_API
50 #define X509_get_notBefore_const(cert) \
51 X509_get0_notBefore(cert)
52 #define X509_get_notAfter_const(cert) \
53 X509_get0_notAfter(cert)
54 #ifndef X509_get_notBefore
55 #define X509_get_notBefore(cert) \
56 X509_getm_notBefore(cert)
58 #ifndef X509_get_notAfter
59 #define X509_get_notAfter(cert) \
60 X509_getm_notAfter(cert)
62 #else /* !defined(OPENSSL_1_1_API) */
63 #define X509_get_notBefore_const(cert) \
64 ((const ASN1_TIME*) X509_get_notBefore((X509 *)cert))
65 #define X509_get_notAfter_const(cert) \
66 ((const ASN1_TIME*) X509_get_notAfter((X509 *)cert))
67 #endif /* defined(OPENSSL_1_1_API) */
69 /** Return a newly allocated X509 name with commonName <b>cname</b>. */
71 tor_x509_name_new(const char *cname
)
75 /* LCOV_EXCL_BR_START : these branches will only fail on OOM errors */
76 if (!(name
= X509_NAME_new()))
78 if ((nid
= OBJ_txt2nid("commonName")) == NID_undef
) goto error
;
79 if (!(X509_NAME_add_entry_by_NID(name
, nid
, MBSTRING_ASC
,
80 (unsigned char*)cname
, -1, -1, 0)))
82 /* LCOV_EXCL_BR_STOP */
85 /* LCOV_EXCL_START : these lines will only execute on out of memory errors*/
92 /** Generate and sign an X509 certificate with the public key <b>rsa</b>,
93 * signed by the private key <b>rsa_sign</b>. The commonName of the
94 * certificate will be <b>cname</b>; the commonName of the issuer will be
95 * <b>cname_sign</b>. The cert will be valid for <b>cert_lifetime</b>
96 * seconds, starting from some time in the past.
98 * Return a certificate on success, NULL on failure.
101 tor_tls_create_certificate
,(crypto_pk_t
*rsa
,
102 crypto_pk_t
*rsa_sign
,
104 const char *cname_sign
,
105 unsigned int cert_lifetime
))
107 /* OpenSSL generates self-signed certificates with random 64-bit serial
108 * numbers, so let's do that too. */
109 #define SERIAL_NUMBER_SIZE 8
111 time_t start_time
, end_time
;
112 BIGNUM
*serial_number
= NULL
;
113 unsigned char serial_tmp
[SERIAL_NUMBER_SIZE
];
114 EVP_PKEY
*sign_pkey
= NULL
, *pkey
=NULL
;
116 X509_NAME
*name
= NULL
, *name_issuer
=NULL
;
120 time_t now
= time(NULL
);
122 tor_tls_pick_certificate_lifetime(now
, cert_lifetime
,
123 &start_time
, &end_time
);
127 tor_assert(rsa_sign
);
128 tor_assert(cname_sign
);
129 if (!(sign_pkey
= crypto_pk_get_openssl_evp_pkey_(rsa_sign
,1)))
131 if (!(pkey
= crypto_pk_get_openssl_evp_pkey_(rsa
,0)))
133 if (!(x509
= X509_new()))
135 if (!(X509_set_version(x509
, 2)))
138 { /* our serial number is 8 random bytes. */
139 crypto_rand((char *)serial_tmp
, sizeof(serial_tmp
));
140 if (!(serial_number
= BN_bin2bn(serial_tmp
, sizeof(serial_tmp
), NULL
)))
142 if (!(BN_to_ASN1_INTEGER(serial_number
, X509_get_serialNumber(x509
))))
146 if (!(name
= tor_x509_name_new(cname
)))
148 if (!(X509_set_subject_name(x509
, name
)))
150 if (!(name_issuer
= tor_x509_name_new(cname_sign
)))
152 if (!(X509_set_issuer_name(x509
, name_issuer
)))
155 if (!X509_time_adj(X509_get_notBefore(x509
),0,&start_time
))
157 if (!X509_time_adj(X509_get_notAfter(x509
),0,&end_time
))
159 if (!X509_set_pubkey(x509
, pkey
))
162 if (!X509_sign(x509
, sign_pkey
, EVP_sha256()))
172 tls_log_errors(NULL
, LOG_WARN
, LD_NET
, "generating certificate");
174 EVP_PKEY_free(sign_pkey
);
178 BN_clear_free(serial_number
);
180 X509_NAME_free(name
);
182 X509_NAME_free(name_issuer
);
185 #undef SERIAL_NUMBER_SIZE
188 /** Set the 'encoded' and 'encoded_len' fields of "cert" from cert->cert. */
190 tor_x509_cert_set_cached_der_encoding(tor_x509_cert_t
*cert
)
192 unsigned char *buf
= NULL
;
193 int length
= i2d_X509(cert
->cert
, &buf
);
195 if (length
<= 0 || buf
== NULL
) {
198 cert
->encoded_len
= (size_t) length
;
199 cert
->encoded
= tor_malloc(length
);
200 memcpy(cert
->encoded
, buf
, length
);
206 tor_x509_cert_impl_free_(tor_x509_cert_impl_t
*cert
)
212 tor_x509_cert_impl_t
*
213 tor_x509_cert_impl_dup_(tor_x509_cert_impl_t
*cert
)
216 return X509_dup(cert
);
221 /** Set *<b>encoded_out</b> and *<b>size_out</b> to <b>cert</b>'s encoded DER
222 * representation and length, respectively. */
224 tor_x509_cert_get_der(const tor_x509_cert_t
*cert
,
225 const uint8_t **encoded_out
, size_t *size_out
)
228 tor_assert(encoded_out
);
229 tor_assert(size_out
);
230 *encoded_out
= cert
->encoded
;
231 *size_out
= cert
->encoded_len
;
234 /** Read a DER-encoded X509 cert, of length exactly <b>certificate_len</b>,
235 * from a <b>certificate</b>. Return a newly allocated tor_x509_cert_t on
236 * success and NULL on failure. */
238 tor_x509_cert_decode(const uint8_t *certificate
, size_t certificate_len
)
241 const unsigned char *cp
= (const unsigned char *)certificate
;
242 tor_x509_cert_t
*newcert
;
243 tor_assert(certificate
);
244 check_no_tls_errors();
246 if (certificate_len
> INT_MAX
)
249 x509
= d2i_X509(NULL
, &cp
, (int)certificate_len
);
252 goto err
; /* Couldn't decode */
253 if (cp
- certificate
!= (int)certificate_len
) {
255 goto err
; /* Didn't use all the bytes */
257 newcert
= tor_x509_cert_new(x509
);
261 if (newcert
->encoded_len
!= certificate_len
||
262 fast_memneq(newcert
->encoded
, certificate
, certificate_len
)) {
263 /* Cert wasn't in DER */
264 tor_x509_cert_free(newcert
);
269 tls_log_errors(NULL
, LOG_INFO
, LD_CRYPTO
, "decoding a certificate");
274 * Return a newly allocated copy of the public key that a certificate
275 * certifies. Watch out! This returns NULL if the cert's key is not RSA.
278 tor_tls_cert_get_key(tor_x509_cert_t
*cert
)
280 crypto_pk_t
*result
= NULL
;
281 EVP_PKEY
*pkey
= X509_get_pubkey(cert
->cert
);
285 rsa
= EVP_PKEY_get1_RSA(pkey
);
290 result
= crypto_new_pk_from_openssl_rsa_(rsa
);
295 /** Check whether <b>cert</b> is well-formed, currently live, and correctly
296 * signed by the public key in <b>signing_cert</b>. If <b>check_rsa_1024</b>,
297 * make sure that it has an RSA key with 1024 bits; otherwise, just check that
298 * the key is long enough. Return 1 if the cert is good, and 0 if it's bad or
299 * we couldn't check it. */
301 tor_tls_cert_is_valid(int severity
,
302 const tor_x509_cert_t
*cert
,
303 const tor_x509_cert_t
*signing_cert
,
307 check_no_tls_errors();
311 if (!signing_cert
|| !cert
)
314 EVP_PKEY
*signing_key
= X509_get_pubkey(signing_cert
->cert
);
317 r
= X509_verify(cert
->cert
, signing_key
);
318 EVP_PKEY_free(signing_key
);
322 /* okay, the signature checked out right. Now let's check the check the
324 if (tor_x509_check_cert_lifetime_internal(severity
, cert
->cert
, now
,
326 TOR_X509_FUTURE_SLOP
) < 0)
329 cert_key
= X509_get_pubkey(cert
->cert
);
330 if (check_rsa_1024
&& cert_key
) {
331 RSA
*rsa
= EVP_PKEY_get1_RSA(cert_key
);
332 #ifdef OPENSSL_1_1_API
333 if (rsa
&& RSA_bits(rsa
) == 1024) {
335 if (rsa
&& BN_num_bits(rsa
->n
) == 1024) {
339 log_fn(severity
, LD_CRYPTO
, "Invalid certificate: Key is not RSA1024.");
344 } else if (cert_key
) {
347 if (EVP_PKEY_base_id(cert_key
) == EVP_PKEY_EC
)
350 if (EVP_PKEY_bits(cert_key
) >= min_bits
)
353 EVP_PKEY_free(cert_key
);
357 /* XXXX compare DNs or anything? */
361 tls_log_errors(NULL
, LOG_INFO
, LD_CRYPTO
, "checking a certificate");
365 /** Warn that a certificate lifetime extends through a certain range. */
367 log_cert_lifetime(int severity
, const X509
*cert
, const char *problem
,
372 char *s1
=NULL
, *s2
=NULL
;
378 tor_log(severity
, LD_GENERAL
,
379 "Certificate %s. Either their clock is set wrong, or your clock "
383 if (!(bio
= BIO_new(BIO_s_mem()))) {
384 log_warn(LD_GENERAL
, "Couldn't allocate BIO!"); goto end
;
386 if (!(ASN1_TIME_print(bio
, X509_get_notBefore_const(cert
)))) {
387 tls_log_errors(NULL
, LOG_WARN
, LD_NET
, "printing certificate lifetime");
390 BIO_get_mem_ptr(bio
, &buf
);
391 s1
= tor_strndup(buf
->data
, buf
->length
);
393 (void)BIO_reset(bio
);
394 if (!(ASN1_TIME_print(bio
, X509_get_notAfter_const(cert
)))) {
395 tls_log_errors(NULL
, LOG_WARN
, LD_NET
, "printing certificate lifetime");
398 BIO_get_mem_ptr(bio
, &buf
);
399 s2
= tor_strndup(buf
->data
, buf
->length
);
401 n
= strftime(mytime
, 32, "%b %d %H:%M:%S %Y UTC", tor_gmtime_r(&now
, &tm
));
403 tor_log(severity
, LD_GENERAL
,
404 "(certificate lifetime runs from %s through %s. Your time is %s.)",
407 tor_log(severity
, LD_GENERAL
,
408 "(certificate lifetime runs from %s through %s. "
409 "Couldn't get your time.)",
414 /* Not expected to get invoked */
415 tls_log_errors(NULL
, LOG_WARN
, LD_NET
, "getting certificate lifetime");
422 /** Helper: check whether <b>cert</b> is expired give or take
423 * <b>past_tolerance</b> seconds, or not-yet-valid give or take
424 * <b>future_tolerance</b> seconds. (Relative to the current time
425 * <b>now</b>.) If it is live, return 0. If it is not live, log a message
428 tor_x509_check_cert_lifetime_internal(int severity
, const X509
*cert
,
430 int past_tolerance
, int future_tolerance
)
434 t
= now
+ future_tolerance
;
435 if (X509_cmp_time(X509_get_notBefore_const(cert
), &t
) > 0) {
436 log_cert_lifetime(severity
, cert
, "not yet valid", now
);
439 t
= now
- past_tolerance
;
440 if (X509_cmp_time(X509_get_notAfter_const(cert
), &t
) < 0) {
441 log_cert_lifetime(severity
, cert
, "already expired", now
);
448 #ifdef TOR_UNIT_TESTS
449 /* Testing only: return a new x509 cert with the same contents as <b>inp</b>,
450 but with the expiration time <b>new_expiration_time</b>, signed with
451 <b>signing_key</b>. */
452 STATIC tor_x509_cert_t
*
453 tor_x509_cert_replace_expiration(const tor_x509_cert_t
*inp
,
454 time_t new_expiration_time
,
455 crypto_pk_t
*signing_key
)
457 X509
*newc
= X509_dup(inp
->cert
);
458 X509_time_adj(X509_get_notAfter(newc
), 0, &new_expiration_time
);
459 EVP_PKEY
*pk
= crypto_pk_get_openssl_evp_pkey_(signing_key
, 1);
460 tor_assert(X509_sign(newc
, pk
, EVP_sha256()));
462 return tor_x509_cert_new(newc
);
464 #endif /* defined(TOR_UNIT_TESTS) */