1 /* 2 * Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the OpenSSL license (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 #include <string.h> 11 12 #include <openssl/crypto.h> 13 #include "internal/cryptlib.h" 14 #include <openssl/pem.h> 15 #include <openssl/engine.h> 16 #include <openssl/ts.h> 17 18 /* Macro definitions for the configuration file. */ 19 #define BASE_SECTION "tsa" 20 #define ENV_DEFAULT_TSA "default_tsa" 21 #define ENV_SERIAL "serial" 22 #define ENV_CRYPTO_DEVICE "crypto_device" 23 #define ENV_SIGNER_CERT "signer_cert" 24 #define ENV_CERTS "certs" 25 #define ENV_SIGNER_KEY "signer_key" 26 #define ENV_SIGNER_DIGEST "signer_digest" 27 #define ENV_DEFAULT_POLICY "default_policy" 28 #define ENV_OTHER_POLICIES "other_policies" 29 #define ENV_DIGESTS "digests" 30 #define ENV_ACCURACY "accuracy" 31 #define ENV_ORDERING "ordering" 32 #define ENV_TSA_NAME "tsa_name" 33 #define ENV_ESS_CERT_ID_CHAIN "ess_cert_id_chain" 34 #define ENV_VALUE_SECS "secs" 35 #define ENV_VALUE_MILLISECS "millisecs" 36 #define ENV_VALUE_MICROSECS "microsecs" 37 #define ENV_CLOCK_PRECISION_DIGITS "clock_precision_digits" 38 #define ENV_VALUE_YES "yes" 39 #define ENV_VALUE_NO "no" 40 #define ENV_ESS_CERT_ID_ALG "ess_cert_id_alg" 41 42 /* Function definitions for certificate and key loading. */ 43 44 X509 *TS_CONF_load_cert(const char *file) 45 { 46 BIO *cert = NULL; 47 X509 *x = NULL; 48 49 if ((cert = BIO_new_file(file, "r")) == NULL) 50 goto end; 51 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); 52 end: 53 if (x == NULL) 54 TSerr(TS_F_TS_CONF_LOAD_CERT, TS_R_CANNOT_LOAD_CERT); 55 BIO_free(cert); 56 return x; 57 } 58 59 STACK_OF(X509) *TS_CONF_load_certs(const char *file) 60 { 61 BIO *certs = NULL; 62 STACK_OF(X509) *othercerts = NULL; 63 STACK_OF(X509_INFO) *allcerts = NULL; 64 int i; 65 66 if ((certs = BIO_new_file(file, "r")) == NULL) 67 goto end; 68 if ((othercerts = sk_X509_new_null()) == NULL) 69 goto end; 70 71 allcerts = PEM_X509_INFO_read_bio(certs, NULL, NULL, NULL); 72 for (i = 0; i < sk_X509_INFO_num(allcerts); i++) { 73 X509_INFO *xi = sk_X509_INFO_value(allcerts, i); 74 if (xi->x509) { 75 sk_X509_push(othercerts, xi->x509); 76 xi->x509 = NULL; 77 } 78 } 79 end: 80 if (othercerts == NULL) 81 TSerr(TS_F_TS_CONF_LOAD_CERTS, TS_R_CANNOT_LOAD_CERT); 82 sk_X509_INFO_pop_free(allcerts, X509_INFO_free); 83 BIO_free(certs); 84 return othercerts; 85 } 86 87 EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass) 88 { 89 BIO *key = NULL; 90 EVP_PKEY *pkey = NULL; 91 92 if ((key = BIO_new_file(file, "r")) == NULL) 93 goto end; 94 pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, (char *)pass); 95 end: 96 if (pkey == NULL) 97 TSerr(TS_F_TS_CONF_LOAD_KEY, TS_R_CANNOT_LOAD_KEY); 98 BIO_free(key); 99 return pkey; 100 } 101 102 /* Function definitions for handling configuration options. */ 103 104 static void ts_CONF_lookup_fail(const char *name, const char *tag) 105 { 106 TSerr(TS_F_TS_CONF_LOOKUP_FAIL, TS_R_VAR_LOOKUP_FAILURE); 107 ERR_add_error_data(3, name, "::", tag); 108 } 109 110 static void ts_CONF_invalid(const char *name, const char *tag) 111 { 112 TSerr(TS_F_TS_CONF_INVALID, TS_R_VAR_BAD_VALUE); 113 ERR_add_error_data(3, name, "::", tag); 114 } 115 116 const char *TS_CONF_get_tsa_section(CONF *conf, const char *section) 117 { 118 if (!section) { 119 section = NCONF_get_string(conf, BASE_SECTION, ENV_DEFAULT_TSA); 120 if (!section) 121 ts_CONF_lookup_fail(BASE_SECTION, ENV_DEFAULT_TSA); 122 } 123 return section; 124 } 125 126 int TS_CONF_set_serial(CONF *conf, const char *section, TS_serial_cb cb, 127 TS_RESP_CTX *ctx) 128 { 129 int ret = 0; 130 char *serial = NCONF_get_string(conf, section, ENV_SERIAL); 131 if (!serial) { 132 ts_CONF_lookup_fail(section, ENV_SERIAL); 133 goto err; 134 } 135 TS_RESP_CTX_set_serial_cb(ctx, cb, serial); 136 137 ret = 1; 138 err: 139 return ret; 140 } 141 142 #ifndef OPENSSL_NO_ENGINE 143 144 int TS_CONF_set_crypto_device(CONF *conf, const char *section, 145 const char *device) 146 { 147 int ret = 0; 148 149 if (device == NULL) 150 device = NCONF_get_string(conf, section, ENV_CRYPTO_DEVICE); 151 152 if (device && !TS_CONF_set_default_engine(device)) { 153 ts_CONF_invalid(section, ENV_CRYPTO_DEVICE); 154 goto err; 155 } 156 ret = 1; 157 err: 158 return ret; 159 } 160 161 int TS_CONF_set_default_engine(const char *name) 162 { 163 ENGINE *e = NULL; 164 int ret = 0; 165 166 if (strcmp(name, "builtin") == 0) 167 return 1; 168 169 if ((e = ENGINE_by_id(name)) == NULL) 170 goto err; 171 if (strcmp(name, "chil") == 0) 172 ENGINE_ctrl(e, ENGINE_CTRL_CHIL_SET_FORKCHECK, 1, 0, 0); 173 if (!ENGINE_set_default(e, ENGINE_METHOD_ALL)) 174 goto err; 175 ret = 1; 176 177 err: 178 if (!ret) { 179 TSerr(TS_F_TS_CONF_SET_DEFAULT_ENGINE, TS_R_COULD_NOT_SET_ENGINE); 180 ERR_add_error_data(2, "engine:", name); 181 } 182 ENGINE_free(e); 183 return ret; 184 } 185 186 #endif 187 188 int TS_CONF_set_signer_cert(CONF *conf, const char *section, 189 const char *cert, TS_RESP_CTX *ctx) 190 { 191 int ret = 0; 192 X509 *cert_obj = NULL; 193 194 if (cert == NULL) { 195 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); 196 if (cert == NULL) { 197 ts_CONF_lookup_fail(section, ENV_SIGNER_CERT); 198 goto err; 199 } 200 } 201 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) 202 goto err; 203 if (!TS_RESP_CTX_set_signer_cert(ctx, cert_obj)) 204 goto err; 205 206 ret = 1; 207 err: 208 X509_free(cert_obj); 209 return ret; 210 } 211 212 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs, 213 TS_RESP_CTX *ctx) 214 { 215 int ret = 0; 216 STACK_OF(X509) *certs_obj = NULL; 217 218 if (certs == NULL) { 219 /* Certificate chain is optional. */ 220 if ((certs = NCONF_get_string(conf, section, ENV_CERTS)) == NULL) 221 goto end; 222 } 223 if ((certs_obj = TS_CONF_load_certs(certs)) == NULL) 224 goto err; 225 if (!TS_RESP_CTX_set_certs(ctx, certs_obj)) 226 goto err; 227 end: 228 ret = 1; 229 err: 230 sk_X509_pop_free(certs_obj, X509_free); 231 return ret; 232 } 233 234 int TS_CONF_set_signer_key(CONF *conf, const char *section, 235 const char *key, const char *pass, 236 TS_RESP_CTX *ctx) 237 { 238 int ret = 0; 239 EVP_PKEY *key_obj = NULL; 240 if (!key) 241 key = NCONF_get_string(conf, section, ENV_SIGNER_KEY); 242 if (!key) { 243 ts_CONF_lookup_fail(section, ENV_SIGNER_KEY); 244 goto err; 245 } 246 if ((key_obj = TS_CONF_load_key(key, pass)) == NULL) 247 goto err; 248 if (!TS_RESP_CTX_set_signer_key(ctx, key_obj)) 249 goto err; 250 251 ret = 1; 252 err: 253 EVP_PKEY_free(key_obj); 254 return ret; 255 } 256 257 int TS_CONF_set_signer_digest(CONF *conf, const char *section, 258 const char *md, TS_RESP_CTX *ctx) 259 { 260 int ret = 0; 261 const EVP_MD *sign_md = NULL; 262 if (md == NULL) 263 md = NCONF_get_string(conf, section, ENV_SIGNER_DIGEST); 264 if (md == NULL) { 265 ts_CONF_lookup_fail(section, ENV_SIGNER_DIGEST); 266 goto err; 267 } 268 sign_md = EVP_get_digestbyname(md); 269 if (sign_md == NULL) { 270 ts_CONF_invalid(section, ENV_SIGNER_DIGEST); 271 goto err; 272 } 273 if (!TS_RESP_CTX_set_signer_digest(ctx, sign_md)) 274 goto err; 275 276 ret = 1; 277 err: 278 return ret; 279 } 280 281 int TS_CONF_set_def_policy(CONF *conf, const char *section, 282 const char *policy, TS_RESP_CTX *ctx) 283 { 284 int ret = 0; 285 ASN1_OBJECT *policy_obj = NULL; 286 if (!policy) 287 policy = NCONF_get_string(conf, section, ENV_DEFAULT_POLICY); 288 if (!policy) { 289 ts_CONF_lookup_fail(section, ENV_DEFAULT_POLICY); 290 goto err; 291 } 292 if ((policy_obj = OBJ_txt2obj(policy, 0)) == NULL) { 293 ts_CONF_invalid(section, ENV_DEFAULT_POLICY); 294 goto err; 295 } 296 if (!TS_RESP_CTX_set_def_policy(ctx, policy_obj)) 297 goto err; 298 299 ret = 1; 300 err: 301 ASN1_OBJECT_free(policy_obj); 302 return ret; 303 } 304 305 int TS_CONF_set_policies(CONF *conf, const char *section, TS_RESP_CTX *ctx) 306 { 307 int ret = 0; 308 int i; 309 STACK_OF(CONF_VALUE) *list = NULL; 310 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); 311 312 /* If no other policy is specified, that's fine. */ 313 if (policies && (list = X509V3_parse_list(policies)) == NULL) { 314 ts_CONF_invalid(section, ENV_OTHER_POLICIES); 315 goto err; 316 } 317 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { 318 CONF_VALUE *val = sk_CONF_VALUE_value(list, i); 319 const char *extval = val->value ? val->value : val->name; 320 ASN1_OBJECT *objtmp; 321 322 if ((objtmp = OBJ_txt2obj(extval, 0)) == NULL) { 323 ts_CONF_invalid(section, ENV_OTHER_POLICIES); 324 goto err; 325 } 326 if (!TS_RESP_CTX_add_policy(ctx, objtmp)) 327 goto err; 328 ASN1_OBJECT_free(objtmp); 329 } 330 331 ret = 1; 332 err: 333 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); 334 return ret; 335 } 336 337 int TS_CONF_set_digests(CONF *conf, const char *section, TS_RESP_CTX *ctx) 338 { 339 int ret = 0; 340 int i; 341 STACK_OF(CONF_VALUE) *list = NULL; 342 char *digests = NCONF_get_string(conf, section, ENV_DIGESTS); 343 344 if (digests == NULL) { 345 ts_CONF_lookup_fail(section, ENV_DIGESTS); 346 goto err; 347 } 348 if ((list = X509V3_parse_list(digests)) == NULL) { 349 ts_CONF_invalid(section, ENV_DIGESTS); 350 goto err; 351 } 352 if (sk_CONF_VALUE_num(list) == 0) { 353 ts_CONF_invalid(section, ENV_DIGESTS); 354 goto err; 355 } 356 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { 357 CONF_VALUE *val = sk_CONF_VALUE_value(list, i); 358 const char *extval = val->value ? val->value : val->name; 359 const EVP_MD *md; 360 361 if ((md = EVP_get_digestbyname(extval)) == NULL) { 362 ts_CONF_invalid(section, ENV_DIGESTS); 363 goto err; 364 } 365 if (!TS_RESP_CTX_add_md(ctx, md)) 366 goto err; 367 } 368 369 ret = 1; 370 err: 371 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); 372 return ret; 373 } 374 375 int TS_CONF_set_accuracy(CONF *conf, const char *section, TS_RESP_CTX *ctx) 376 { 377 int ret = 0; 378 int i; 379 int secs = 0, millis = 0, micros = 0; 380 STACK_OF(CONF_VALUE) *list = NULL; 381 char *accuracy = NCONF_get_string(conf, section, ENV_ACCURACY); 382 383 if (accuracy && (list = X509V3_parse_list(accuracy)) == NULL) { 384 ts_CONF_invalid(section, ENV_ACCURACY); 385 goto err; 386 } 387 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { 388 CONF_VALUE *val = sk_CONF_VALUE_value(list, i); 389 if (strcmp(val->name, ENV_VALUE_SECS) == 0) { 390 if (val->value) 391 secs = atoi(val->value); 392 } else if (strcmp(val->name, ENV_VALUE_MILLISECS) == 0) { 393 if (val->value) 394 millis = atoi(val->value); 395 } else if (strcmp(val->name, ENV_VALUE_MICROSECS) == 0) { 396 if (val->value) 397 micros = atoi(val->value); 398 } else { 399 ts_CONF_invalid(section, ENV_ACCURACY); 400 goto err; 401 } 402 } 403 if (!TS_RESP_CTX_set_accuracy(ctx, secs, millis, micros)) 404 goto err; 405 406 ret = 1; 407 err: 408 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); 409 return ret; 410 } 411 412 int TS_CONF_set_clock_precision_digits(CONF *conf, const char *section, 413 TS_RESP_CTX *ctx) 414 { 415 int ret = 0; 416 long digits = 0; 417 418 /* 419 * If not specified, set the default value to 0, i.e. sec precision 420 */ 421 if (!NCONF_get_number_e(conf, section, ENV_CLOCK_PRECISION_DIGITS, 422 &digits)) 423 digits = 0; 424 if (digits < 0 || digits > TS_MAX_CLOCK_PRECISION_DIGITS) { 425 ts_CONF_invalid(section, ENV_CLOCK_PRECISION_DIGITS); 426 goto err; 427 } 428 429 if (!TS_RESP_CTX_set_clock_precision_digits(ctx, digits)) 430 goto err; 431 432 return 1; 433 err: 434 return ret; 435 } 436 437 static int ts_CONF_add_flag(CONF *conf, const char *section, 438 const char *field, int flag, TS_RESP_CTX *ctx) 439 { 440 const char *value = NCONF_get_string(conf, section, field); 441 442 if (value) { 443 if (strcmp(value, ENV_VALUE_YES) == 0) 444 TS_RESP_CTX_add_flags(ctx, flag); 445 else if (strcmp(value, ENV_VALUE_NO) != 0) { 446 ts_CONF_invalid(section, field); 447 return 0; 448 } 449 } 450 451 return 1; 452 } 453 454 int TS_CONF_set_ordering(CONF *conf, const char *section, TS_RESP_CTX *ctx) 455 { 456 return ts_CONF_add_flag(conf, section, ENV_ORDERING, TS_ORDERING, ctx); 457 } 458 459 int TS_CONF_set_tsa_name(CONF *conf, const char *section, TS_RESP_CTX *ctx) 460 { 461 return ts_CONF_add_flag(conf, section, ENV_TSA_NAME, TS_TSA_NAME, ctx); 462 } 463 464 int TS_CONF_set_ess_cert_id_chain(CONF *conf, const char *section, 465 TS_RESP_CTX *ctx) 466 { 467 return ts_CONF_add_flag(conf, section, ENV_ESS_CERT_ID_CHAIN, 468 TS_ESS_CERT_ID_CHAIN, ctx); 469 } 470 471 int TS_CONF_set_ess_cert_id_digest(CONF *conf, const char *section, 472 TS_RESP_CTX *ctx) 473 { 474 int ret = 0; 475 const EVP_MD *cert_md = NULL; 476 const char *md = NCONF_get_string(conf, section, ENV_ESS_CERT_ID_ALG); 477 478 if (md == NULL) 479 md = "sha1"; 480 481 cert_md = EVP_get_digestbyname(md); 482 if (cert_md == NULL) { 483 ts_CONF_invalid(section, ENV_ESS_CERT_ID_ALG); 484 goto err; 485 } 486 487 if (!TS_RESP_CTX_set_ess_cert_id_digest(ctx, cert_md)) 488 goto err; 489 490 ret = 1; 491 err: 492 return ret; 493 } 494