2 * @file sipe-cert-crypto-openssl.c
6 * Copyright (C) 2013 SIPE Project <http://sipe.sourceforge.net/>
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 * Certificate routines implementation based on OpenSSL.
27 #include <openssl/evp.h>
28 #include <openssl/rsa.h>
29 #include <openssl/x509.h>
35 #include "sipe-backend.h"
36 #include "sipe-cert-crypto.h"
38 struct sipe_cert_crypto
{
43 * This data structure is used in two different modes
45 * a) certificate generated by the server from our Certificate Request
47 * key - reference to client RSA key, don't free!
48 * decoded - certificate as OpenSSL data structure, must be freed
49 * raw - certificate as DER encoded binary, must be freed
50 * length - length of DER binary
52 * b) server certificate
54 * key - reference to server public key, must be freed
55 * decoded - certificate as OpenSSL data structure, must be freed
57 * length - modulus length of server public key
59 struct certificate_openssl
{
67 struct sipe_cert_crypto
*sipe_cert_crypto_init(void)
69 struct sipe_cert_crypto
*scc
= g_new0(struct sipe_cert_crypto
, 1);
71 /* RSA parameters - should those be configurable? */
72 SIPE_DEBUG_INFO_NOFORMAT("sipe_cert_crypto_init: generate key pair, this might take a while...");
73 scc
->key
= RSA_generate_key(2048, 65537, NULL
, NULL
);
76 SIPE_DEBUG_INFO_NOFORMAT("sipe_cert_crypto_init: key pair generated");
80 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_init: key generation failed");
85 void sipe_cert_crypto_free(struct sipe_cert_crypto
*scc
)
95 gchar
*sipe_cert_crypto_request(struct sipe_cert_crypto
*scc
,
101 if (!scc
|| !subject
)
104 if ((pkey
= EVP_PKEY_new()) != NULL
) {
107 if ((x509_req
= X509_REQ_new()) != NULL
) {
110 EVP_PKEY_set1_RSA(pkey
, scc
->key
);
112 X509_REQ_set_version(x509_req
, 2);
113 X509_REQ_set_pubkey(x509_req
, pkey
);
115 name
= X509_REQ_get_subject_name(x509_req
);
116 X509_NAME_add_entry_by_txt(name
,
122 if (X509_REQ_sign(x509_req
, pkey
, EVP_sha1())) {
127 * Encode into DER format
129 * NOTE: i2d_X509(a, b) autoincrements b!
131 length
= i2d_X509_REQ(x509_req
, NULL
);
132 tmp
= buf
= g_malloc(length
);
133 i2d_X509_REQ(x509_req
, &tmp
);
135 base64
= g_base64_encode(buf
, length
);
139 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't sign certificate request");
142 X509_REQ_free(x509_req
);
144 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't create x509 request data structure");
149 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_request: can't create private key data structure");
155 void sipe_cert_crypto_destroy(gpointer certificate
)
157 struct certificate_openssl
*co
= certificate
;
160 /* imported server certificate - mode (b) */
161 if (!co
->raw
&& co
->key
)
164 X509_free(co
->decoded
);
170 /* generates certificate_openssl in mode (a) */
171 gpointer
sipe_cert_crypto_decode(struct sipe_cert_crypto
*scc
,
174 struct certificate_openssl
*co
= g_new0(struct certificate_openssl
, 1);
177 /* NOTE: d2i_X509(NULL, &in, len) autoincrements "in" */
178 tmp
= co
->raw
= g_base64_decode(base64
, &co
->length
);
179 co
->decoded
= d2i_X509(NULL
, &tmp
, co
->length
);
182 sipe_cert_crypto_destroy(co
);
191 /* generates certificate_openssl in mode (b) */
192 gpointer
sipe_cert_crypto_import(const guchar
*raw
,
195 struct certificate_openssl
*co
= g_new0(struct certificate_openssl
, 1);
198 /* co->raw not needed as this is a server certificate */
199 /* NOTE: d2i_X509(NULL, in, len) autoincrements "in" */
200 co
->decoded
= d2i_X509(NULL
, &raw
, length
);
203 sipe_cert_crypto_destroy(co
);
207 pkey
= X509_get_pubkey(co
->decoded
);
210 sipe_cert_crypto_destroy(co
);
214 co
->key
= EVP_PKEY_get1_RSA(pkey
);
215 co
->length
= EVP_PKEY_size(pkey
);
219 sipe_cert_crypto_destroy(co
);
226 gboolean
sipe_cert_crypto_valid(gpointer certificate
,
229 struct certificate_openssl
*co
= certificate
;
230 time_t compare
= time(NULL
) + offset
;
233 (X509_cmp_time(X509_get_notAfter(co
->decoded
),
237 guint
sipe_cert_crypto_expires(gpointer certificate
)
239 struct certificate_openssl
*co
= certificate
;
243 /* make sure certificate hasn't expired already */
244 if (!sipe_cert_crypto_valid(co
, 0))
248 * I can't believe this, but it's true...
250 * OpenSSL doesn't have a public API to convert an ASN1_TIME
251 * to seconds since epoch :-(
253 * @TODO: latest OpenSSL API has ASN1_TIME_diff()
255 * <30000 seconds (~8 hours) seems to be the most common expiration
256 * value. Run a bisect to determine the real expiration value.
261 guint offset
= (max
- min
) / 2 + min
;
265 } else if (sipe_cert_crypto_valid(co
, offset
)) {
275 gsize
sipe_cert_crypto_raw_length(gpointer certificate
)
277 return(((struct certificate_openssl
*) certificate
)->length
);
280 const guchar
*sipe_cert_crypto_raw(gpointer certificate
)
282 return(((struct certificate_openssl
*) certificate
)->raw
);
285 gpointer
sipe_cert_crypto_public_key(gpointer certificate
)
287 return(((struct certificate_openssl
*) certificate
)->key
);
290 gsize
sipe_cert_crypto_modulus_length(gpointer certificate
)
292 return(((struct certificate_openssl
*) certificate
)->length
);
295 gpointer
sipe_cert_crypto_private_key(gpointer certificate
)
297 return(((struct certificate_openssl
*) certificate
)->key
);
300 /* Create test certificate for internal key pair (ONLY USE FOR TEST CODE!!!) */
301 gpointer
sipe_cert_crypto_test_certificate(struct sipe_cert_crypto
*scc
)
303 struct certificate_openssl
*co
= NULL
;
306 if ((pkey
= EVP_PKEY_new()) != NULL
) {
309 if ((x509
= X509_new()) != NULL
) {
312 EVP_PKEY_set1_RSA(pkey
, scc
->key
);
314 X509_set_version(x509
, 2);
315 ASN1_INTEGER_set(X509_get_serialNumber(x509
), 0);
316 X509_gmtime_adj(X509_get_notBefore(x509
), 0);
317 X509_gmtime_adj(X509_get_notAfter(x509
), (long) 60*60*24);
318 X509_set_pubkey(x509
, pkey
);
320 name
= X509_get_subject_name(x509
);
321 X509_NAME_add_entry_by_txt(name
,
324 (guchar
*) "test@test.com",
326 X509_set_issuer_name(x509
, name
);
328 if (X509_sign(x509
, pkey
, EVP_sha1())) {
331 co
= g_new0(struct certificate_openssl
, 1);
336 * Encode into DER format
338 * NOTE: i2d_X509(a, b) autoincrements b!
340 co
->length
= i2d_X509(x509
, NULL
);
341 co
->raw
= buf
= g_malloc(co
->length
);
342 i2d_X509(x509
, &buf
);
345 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't sign certificate");
349 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't create x509 data structure");
354 SIPE_DEBUG_ERROR_NOFORMAT("sipe_cert_crypto_test_certificate: can't create private key data structure");