2 * @file sipe-cert-crypto-openssl.c
6 * Copyright (C) 2013-2017 SIPE Project <http://sipe.sourceforge.net/>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 * Certificate routines implementation based on OpenSSL.
27 #include <openssl/bn.h>
28 #include <openssl/evp.h>
29 #include <openssl/rsa.h>
30 #include <openssl/x509.h>
36 #include "sipe-backend.h"
37 #include "sipe-cert-crypto.h"
39 struct sipe_cert_crypto
{
44 * This data structure is used in two different modes
46 * a) certificate generated by the server from our Certificate Request
48 * key - reference to client RSA key, don't free!
49 * decoded - certificate as OpenSSL data structure, must be freed
50 * raw - certificate as DER encoded binary, must be freed
51 * length - length of DER binary
53 * b) server certificate
55 * key - reference to server public key, must be freed
56 * decoded - certificate as OpenSSL data structure, must be freed
58 * length - modulus length of server public key
60 struct certificate_openssl
{
68 struct sipe_cert_crypto
*sipe_cert_crypto_init(void)
70 struct sipe_cert_crypto
*scc
= g_new0(struct sipe_cert_crypto
, 1);
72 /* allocate memory for RSA key */
78 /* RSA parameters - should those be configurable? */
79 if (BN_set_word(e
, RSA_F4
)) {
80 SIPE_DEBUG_INFO_NOFORMAT("sipe_cert_crypto_init: generate key pair, this might take a while...");
81 if (RSA_generate_key_ex(scc
->key
, 2048, e
, NULL
)) {
82 SIPE_DEBUG_INFO_NOFORMAT("sipe_cert_crypto_init: key pair generated");
87 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_init: key generation failed");
90 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_init: big number initialization failed");
94 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_init: memory allocation for big number failed");
97 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_init: memory allocation for RSA key failed");
99 sipe_cert_crypto_free(scc
);
103 void sipe_cert_crypto_free(struct sipe_cert_crypto
*scc
)
113 gchar
*sipe_cert_crypto_request(struct sipe_cert_crypto
*scc
,
114 const gchar
*subject
)
116 gchar
*base64
= NULL
;
119 if (!scc
|| !subject
)
122 if ((pkey
= EVP_PKEY_new()) != NULL
) {
125 if ((x509_req
= X509_REQ_new()) != NULL
) {
128 EVP_PKEY_set1_RSA(pkey
, scc
->key
);
130 X509_REQ_set_version(x509_req
, 2);
131 X509_REQ_set_pubkey(x509_req
, pkey
);
133 name
= X509_REQ_get_subject_name(x509_req
);
134 X509_NAME_add_entry_by_txt(name
,
140 if (X509_REQ_sign(x509_req
, pkey
, EVP_sha1())) {
145 * Encode into DER format
147 * NOTE: i2d_X509(a, b) autoincrements b!
149 length
= i2d_X509_REQ(x509_req
, NULL
);
150 tmp
= buf
= g_malloc(length
);
151 i2d_X509_REQ(x509_req
, &tmp
);
153 base64
= g_base64_encode(buf
, length
);
157 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't sign certificate request");
160 X509_REQ_free(x509_req
);
162 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't create x509 request data structure");
167 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't create private key data structure");
173 void sipe_cert_crypto_destroy(gpointer certificate
)
175 struct certificate_openssl
*co
= certificate
;
178 /* imported server certificate - mode (b) */
179 if (!co
->raw
&& co
->key
)
182 X509_free(co
->decoded
);
188 /* generates certificate_openssl in mode (a) */
189 gpointer
sipe_cert_crypto_decode(struct sipe_cert_crypto
*scc
,
192 struct certificate_openssl
*co
= g_new0(struct certificate_openssl
, 1);
195 /* NOTE: d2i_X509(NULL, &in, len) autoincrements "in" */
196 tmp
= co
->raw
= g_base64_decode(base64
, &co
->length
);
197 co
->decoded
= d2i_X509(NULL
, &tmp
, co
->length
);
200 sipe_cert_crypto_destroy(co
);
209 /* generates certificate_openssl in mode (b) */
210 gpointer
sipe_cert_crypto_import(const guchar
*raw
,
213 struct certificate_openssl
*co
= g_new0(struct certificate_openssl
, 1);
216 /* co->raw not needed as this is a server certificate */
217 /* NOTE: d2i_X509(NULL, in, len) autoincrements "in" */
218 co
->decoded
= d2i_X509(NULL
, &raw
, length
);
221 sipe_cert_crypto_destroy(co
);
225 pkey
= X509_get_pubkey(co
->decoded
);
228 sipe_cert_crypto_destroy(co
);
232 co
->key
= EVP_PKEY_get1_RSA(pkey
);
233 co
->length
= EVP_PKEY_size(pkey
);
237 sipe_cert_crypto_destroy(co
);
244 gboolean
sipe_cert_crypto_valid(gpointer certificate
,
247 struct certificate_openssl
*co
= certificate
;
248 time_t compare
= time(NULL
) + offset
;
251 (X509_cmp_time(X509_get_notAfter(co
->decoded
),
255 guint
sipe_cert_crypto_expires(gpointer certificate
)
257 struct certificate_openssl
*co
= certificate
;
261 /* make sure certificate hasn't expired already */
262 if (!sipe_cert_crypto_valid(co
, 0))
266 * I can't believe this, but it's true...
268 * OpenSSL doesn't have a public API to convert an ASN1_TIME
269 * to seconds since epoch :-(
271 * @TODO: latest OpenSSL API has ASN1_TIME_diff()
273 * <30000 seconds (~8 hours) seems to be the most common expiration
274 * value. Run a bisect to determine the real expiration value.
279 guint offset
= (max
- min
) / 2 + min
;
283 } else if (sipe_cert_crypto_valid(co
, offset
)) {
293 gsize
sipe_cert_crypto_raw_length(gpointer certificate
)
295 return(((struct certificate_openssl
*) certificate
)->length
);
298 const guchar
*sipe_cert_crypto_raw(gpointer certificate
)
300 return(((struct certificate_openssl
*) certificate
)->raw
);
303 gpointer
sipe_cert_crypto_public_key(gpointer certificate
)
305 return(((struct certificate_openssl
*) certificate
)->key
);
308 gsize
sipe_cert_crypto_modulus_length(gpointer certificate
)
310 return(((struct certificate_openssl
*) certificate
)->length
);
313 gpointer
sipe_cert_crypto_private_key(gpointer certificate
)
315 return(((struct certificate_openssl
*) certificate
)->key
);
318 /* Create test certificate for internal key pair (ONLY USE FOR TEST CODE!!!) */
319 gpointer
sipe_cert_crypto_test_certificate(struct sipe_cert_crypto
*scc
)
321 struct certificate_openssl
*co
= NULL
;
324 if ((pkey
= EVP_PKEY_new()) != NULL
) {
327 if ((x509
= X509_new()) != NULL
) {
330 EVP_PKEY_set1_RSA(pkey
, scc
->key
);
332 X509_set_version(x509
, 2);
333 ASN1_INTEGER_set(X509_get_serialNumber(x509
), 0);
334 X509_gmtime_adj(X509_get_notBefore(x509
), 0);
335 X509_gmtime_adj(X509_get_notAfter(x509
), (long) 60*60*24);
336 X509_set_pubkey(x509
, pkey
);
338 name
= X509_get_subject_name(x509
);
339 X509_NAME_add_entry_by_txt(name
,
342 (guchar
*) "test@test.com",
344 X509_set_issuer_name(x509
, name
);
346 if (X509_sign(x509
, pkey
, EVP_sha1())) {
349 co
= g_new0(struct certificate_openssl
, 1);
354 * Encode into DER format
356 * NOTE: i2d_X509(a, b) autoincrements b!
358 co
->length
= i2d_X509(x509
, NULL
);
359 co
->raw
= buf
= g_malloc(co
->length
);
360 i2d_X509(x509
, &buf
);
363 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't sign certificate");
367 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't create x509 data structure");
372 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't create private key data structure");