xref: /freebsd/crypto/openssl/apps/storeutl.c (revision 19261079b74319502c6ffa1249920079f0f69a72)
1 /*
2  * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the OpenSSL license (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 #include <openssl/opensslconf.h>
11 
12 #include "apps.h"
13 #include "progs.h"
14 #include <openssl/err.h>
15 #include <openssl/pem.h>
16 #include <openssl/store.h>
17 #include <openssl/x509v3.h>      /* s2i_ASN1_INTEGER */
18 
19 static int process(const char *uri, const UI_METHOD *uimeth, PW_CB_DATA *uidata,
20                    int expected, int criterion, OSSL_STORE_SEARCH *search,
21                    int text, int noout, int recursive, int indent, BIO *out,
22                    const char *prog);
23 
24 typedef enum OPTION_choice {
25     OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, OPT_ENGINE, OPT_OUT, OPT_PASSIN,
26     OPT_NOOUT, OPT_TEXT, OPT_RECURSIVE,
27     OPT_SEARCHFOR_CERTS, OPT_SEARCHFOR_KEYS, OPT_SEARCHFOR_CRLS,
28     OPT_CRITERION_SUBJECT, OPT_CRITERION_ISSUER, OPT_CRITERION_SERIAL,
29     OPT_CRITERION_FINGERPRINT, OPT_CRITERION_ALIAS,
30     OPT_MD
31 } OPTION_CHOICE;
32 
33 const OPTIONS storeutl_options[] = {
34     {OPT_HELP_STR, 1, '-', "Usage: %s [options] uri\nValid options are:\n"},
35     {"help", OPT_HELP, '-', "Display this summary"},
36     {"out", OPT_OUT, '>', "Output file - default stdout"},
37     {"passin", OPT_PASSIN, 's', "Input file pass phrase source"},
38     {"text", OPT_TEXT, '-', "Print a text form of the objects"},
39     {"noout", OPT_NOOUT, '-', "No PEM output, just status"},
40     {"certs", OPT_SEARCHFOR_CERTS, '-', "Search for certificates only"},
41     {"keys", OPT_SEARCHFOR_KEYS, '-', "Search for keys only"},
42     {"crls", OPT_SEARCHFOR_CRLS, '-', "Search for CRLs only"},
43     {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"},
44     {"issuer", OPT_CRITERION_ISSUER, 's', "Search by issuer and serial, issuer name"},
45     {"serial", OPT_CRITERION_SERIAL, 's', "Search by issuer and serial, serial number"},
46     {"fingerprint", OPT_CRITERION_FINGERPRINT, 's', "Search by public key fingerprint, given in hex"},
47     {"alias", OPT_CRITERION_ALIAS, 's', "Search by alias"},
48     {"", OPT_MD, '-', "Any supported digest"},
49 #ifndef OPENSSL_NO_ENGINE
50     {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
51 #endif
52     {"r", OPT_RECURSIVE, '-', "Recurse through names"},
53     {NULL}
54 };
55 
56 int storeutl_main(int argc, char *argv[])
57 {
58     int ret = 1, noout = 0, text = 0, recursive = 0;
59     char *outfile = NULL, *passin = NULL, *passinarg = NULL;
60     BIO *out = NULL;
61     ENGINE *e = NULL;
62     OPTION_CHOICE o;
63     char *prog = opt_init(argc, argv, storeutl_options);
64     PW_CB_DATA pw_cb_data;
65     int expected = 0;
66     int criterion = 0;
67     X509_NAME *subject = NULL, *issuer = NULL;
68     ASN1_INTEGER *serial = NULL;
69     unsigned char *fingerprint = NULL;
70     size_t fingerprintlen = 0;
71     char *alias = NULL;
72     OSSL_STORE_SEARCH *search = NULL;
73     const EVP_MD *digest = NULL;
74 
75     while ((o = opt_next()) != OPT_EOF) {
76         switch (o) {
77         case OPT_EOF:
78         case OPT_ERR:
79  opthelp:
80             BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
81             goto end;
82         case OPT_HELP:
83             opt_help(storeutl_options);
84             ret = 0;
85             goto end;
86         case OPT_OUT:
87             outfile = opt_arg();
88             break;
89         case OPT_PASSIN:
90             passinarg = opt_arg();
91             break;
92         case OPT_NOOUT:
93             noout = 1;
94             break;
95         case OPT_TEXT:
96             text = 1;
97             break;
98         case OPT_RECURSIVE:
99             recursive = 1;
100             break;
101         case OPT_SEARCHFOR_CERTS:
102         case OPT_SEARCHFOR_KEYS:
103         case OPT_SEARCHFOR_CRLS:
104             if (expected != 0) {
105                 BIO_printf(bio_err, "%s: only one search type can be given.\n",
106                            prog);
107                 goto end;
108             }
109             {
110                 static const struct {
111                     enum OPTION_choice choice;
112                     int type;
113                 } map[] = {
114                     {OPT_SEARCHFOR_CERTS, OSSL_STORE_INFO_CERT},
115                     {OPT_SEARCHFOR_KEYS, OSSL_STORE_INFO_PKEY},
116                     {OPT_SEARCHFOR_CRLS, OSSL_STORE_INFO_CRL},
117                 };
118                 size_t i;
119 
120                 for (i = 0; i < OSSL_NELEM(map); i++) {
121                     if (o == map[i].choice) {
122                         expected = map[i].type;
123                         break;
124                     }
125                 }
126                 /*
127                  * If expected wasn't set at this point, it means the map
128                  * isn't synchronised with the possible options leading here.
129                  */
130                 OPENSSL_assert(expected != 0);
131             }
132             break;
133         case OPT_CRITERION_SUBJECT:
134             if (criterion != 0) {
135                 BIO_printf(bio_err, "%s: criterion already given.\n",
136                            prog);
137                 goto end;
138             }
139             criterion = OSSL_STORE_SEARCH_BY_NAME;
140             if (subject != NULL) {
141                 BIO_printf(bio_err, "%s: subject already given.\n",
142                            prog);
143                 goto end;
144             }
145             if ((subject = parse_name(opt_arg(), MBSTRING_UTF8, 1)) == NULL) {
146                 BIO_printf(bio_err, "%s: can't parse subject argument.\n",
147                            prog);
148                 goto end;
149             }
150             break;
151         case OPT_CRITERION_ISSUER:
152             if (criterion != 0
153                 || (criterion == OSSL_STORE_SEARCH_BY_ISSUER_SERIAL
154                     && issuer != NULL)) {
155                 BIO_printf(bio_err, "%s: criterion already given.\n",
156                            prog);
157                 goto end;
158             }
159             criterion = OSSL_STORE_SEARCH_BY_ISSUER_SERIAL;
160             if (issuer != NULL) {
161                 BIO_printf(bio_err, "%s: issuer already given.\n",
162                            prog);
163                 goto end;
164             }
165             if ((issuer = parse_name(opt_arg(), MBSTRING_UTF8, 1)) == NULL) {
166                 BIO_printf(bio_err, "%s: can't parse issuer argument.\n",
167                            prog);
168                 goto end;
169             }
170             break;
171         case OPT_CRITERION_SERIAL:
172             if (criterion != 0
173                 || (criterion == OSSL_STORE_SEARCH_BY_ISSUER_SERIAL
174                     && serial != NULL)) {
175                 BIO_printf(bio_err, "%s: criterion already given.\n",
176                            prog);
177                 goto end;
178             }
179             criterion = OSSL_STORE_SEARCH_BY_ISSUER_SERIAL;
180             if (serial != NULL) {
181                 BIO_printf(bio_err, "%s: serial number already given.\n",
182                            prog);
183                 goto end;
184             }
185             if ((serial = s2i_ASN1_INTEGER(NULL, opt_arg())) == NULL) {
186                 BIO_printf(bio_err, "%s: can't parse serial number argument.\n",
187                            prog);
188                 goto end;
189             }
190             break;
191         case OPT_CRITERION_FINGERPRINT:
192             if (criterion != 0
193                 || (criterion == OSSL_STORE_SEARCH_BY_KEY_FINGERPRINT
194                     && fingerprint != NULL)) {
195                 BIO_printf(bio_err, "%s: criterion already given.\n",
196                            prog);
197                 goto end;
198             }
199             criterion = OSSL_STORE_SEARCH_BY_KEY_FINGERPRINT;
200             if (fingerprint != NULL) {
201                 BIO_printf(bio_err, "%s: fingerprint already given.\n",
202                            prog);
203                 goto end;
204             }
205             {
206                 long tmplen = 0;
207 
208                 if ((fingerprint = OPENSSL_hexstr2buf(opt_arg(), &tmplen))
209                     == NULL) {
210                     BIO_printf(bio_err,
211                                "%s: can't parse fingerprint argument.\n",
212                                prog);
213                     goto end;
214                 }
215                 fingerprintlen = (size_t)tmplen;
216             }
217             break;
218         case OPT_CRITERION_ALIAS:
219             if (criterion != 0) {
220                 BIO_printf(bio_err, "%s: criterion already given.\n",
221                            prog);
222                 goto end;
223             }
224             criterion = OSSL_STORE_SEARCH_BY_ALIAS;
225             if (alias != NULL) {
226                 BIO_printf(bio_err, "%s: alias already given.\n",
227                            prog);
228                 goto end;
229             }
230             if ((alias = OPENSSL_strdup(opt_arg())) == NULL) {
231                 BIO_printf(bio_err, "%s: can't parse alias argument.\n",
232                            prog);
233                 goto end;
234             }
235             break;
236         case OPT_ENGINE:
237             e = setup_engine(opt_arg(), 0);
238             break;
239         case OPT_MD:
240             if (!opt_md(opt_unknown(), &digest))
241                 goto opthelp;
242         }
243     }
244     argc = opt_num_rest();
245     argv = opt_rest();
246 
247     if (argc == 0) {
248         BIO_printf(bio_err, "%s: No URI given, nothing to do...\n", prog);
249         goto opthelp;
250     }
251     if (argc > 1) {
252         BIO_printf(bio_err, "%s: Unknown extra parameters after URI\n", prog);
253         goto opthelp;
254     }
255 
256     if (criterion != 0) {
257         switch (criterion) {
258         case OSSL_STORE_SEARCH_BY_NAME:
259             if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) {
260                 ERR_print_errors(bio_err);
261                 goto end;
262             }
263             break;
264         case OSSL_STORE_SEARCH_BY_ISSUER_SERIAL:
265             if (issuer == NULL || serial == NULL) {
266                 BIO_printf(bio_err,
267                            "%s: both -issuer and -serial must be given.\n",
268                            prog);
269                 goto end;
270             }
271             if ((search = OSSL_STORE_SEARCH_by_issuer_serial(issuer, serial))
272                 == NULL) {
273                 ERR_print_errors(bio_err);
274                 goto end;
275             }
276             break;
277         case OSSL_STORE_SEARCH_BY_KEY_FINGERPRINT:
278             if ((search = OSSL_STORE_SEARCH_by_key_fingerprint(digest,
279                                                                fingerprint,
280                                                                fingerprintlen))
281                 == NULL) {
282                 ERR_print_errors(bio_err);
283                 goto end;
284             }
285             break;
286         case OSSL_STORE_SEARCH_BY_ALIAS:
287             if ((search = OSSL_STORE_SEARCH_by_alias(alias)) == NULL) {
288                 ERR_print_errors(bio_err);
289                 goto end;
290             }
291             break;
292         }
293     }
294 
295     if (!app_passwd(passinarg, NULL, &passin, NULL)) {
296         BIO_printf(bio_err, "Error getting passwords\n");
297         goto end;
298     }
299     pw_cb_data.password = passin;
300     pw_cb_data.prompt_info = argv[0];
301 
302     out = bio_open_default(outfile, 'w', FORMAT_TEXT);
303     if (out == NULL)
304         goto end;
305 
306     ret = process(argv[0], get_ui_method(), &pw_cb_data,
307                   expected, criterion, search,
308                   text, noout, recursive, 0, out, prog);
309 
310  end:
311     OPENSSL_free(fingerprint);
312     OPENSSL_free(alias);
313     ASN1_INTEGER_free(serial);
314     X509_NAME_free(subject);
315     X509_NAME_free(issuer);
316     OSSL_STORE_SEARCH_free(search);
317     BIO_free_all(out);
318     OPENSSL_free(passin);
319     release_engine(e);
320     return ret;
321 }
322 
323 static int indent_printf(int indent, BIO *bio, const char *format, ...)
324 {
325     va_list args;
326     int ret;
327 
328     va_start(args, format);
329 
330     ret = BIO_printf(bio, "%*s", indent, "") + BIO_vprintf(bio, format, args);
331 
332     va_end(args);
333     return ret;
334 }
335 
336 static int process(const char *uri, const UI_METHOD *uimeth, PW_CB_DATA *uidata,
337                    int expected, int criterion, OSSL_STORE_SEARCH *search,
338                    int text, int noout, int recursive, int indent, BIO *out,
339                    const char *prog)
340 {
341     OSSL_STORE_CTX *store_ctx = NULL;
342     int ret = 1, items = 0;
343 
344     if ((store_ctx = OSSL_STORE_open(uri, uimeth, uidata, NULL, NULL))
345         == NULL) {
346         BIO_printf(bio_err, "Couldn't open file or uri %s\n", uri);
347         ERR_print_errors(bio_err);
348         return ret;
349     }
350 
351     if (expected != 0) {
352         if (!OSSL_STORE_expect(store_ctx, expected)) {
353             ERR_print_errors(bio_err);
354             goto end2;
355         }
356     }
357 
358     if (criterion != 0) {
359         if (!OSSL_STORE_supports_search(store_ctx, criterion)) {
360             BIO_printf(bio_err,
361                        "%s: the store scheme doesn't support the given search criteria.\n",
362                        prog);
363             goto end2;
364         }
365 
366         if (!OSSL_STORE_find(store_ctx, search)) {
367             ERR_print_errors(bio_err);
368             goto end2;
369         }
370     }
371 
372     /* From here on, we count errors, and we'll return the count at the end */
373     ret = 0;
374 
375     for (;;) {
376         OSSL_STORE_INFO *info = OSSL_STORE_load(store_ctx);
377         int type = info == NULL ? 0 : OSSL_STORE_INFO_get_type(info);
378         const char *infostr =
379             info == NULL ? NULL : OSSL_STORE_INFO_type_string(type);
380 
381         if (info == NULL) {
382             if (OSSL_STORE_eof(store_ctx))
383                 break;
384 
385             if (OSSL_STORE_error(store_ctx)) {
386                 if (recursive)
387                     ERR_clear_error();
388                 else
389                     ERR_print_errors(bio_err);
390                 ret++;
391                 continue;
392             }
393 
394             BIO_printf(bio_err,
395                        "ERROR: OSSL_STORE_load() returned NULL without "
396                        "eof or error indications\n");
397             BIO_printf(bio_err, "       This is an error in the loader\n");
398             ERR_print_errors(bio_err);
399             ret++;
400             break;
401         }
402 
403         if (type == OSSL_STORE_INFO_NAME) {
404             const char *name = OSSL_STORE_INFO_get0_NAME(info);
405             const char *desc = OSSL_STORE_INFO_get0_NAME_description(info);
406             indent_printf(indent, bio_out, "%d: %s: %s\n", items, infostr,
407                           name);
408             if (desc != NULL)
409                 indent_printf(indent, bio_out, "%s\n", desc);
410         } else {
411             indent_printf(indent, bio_out, "%d: %s\n", items, infostr);
412         }
413 
414         /*
415          * Unfortunately, PEM_X509_INFO_write_bio() is sorely lacking in
416          * functionality, so we must figure out how exactly to write things
417          * ourselves...
418          */
419         switch (type) {
420         case OSSL_STORE_INFO_NAME:
421             if (recursive) {
422                 const char *suburi = OSSL_STORE_INFO_get0_NAME(info);
423                 ret += process(suburi, uimeth, uidata,
424                                expected, criterion, search,
425                                text, noout, recursive, indent + 2, out, prog);
426             }
427             break;
428         case OSSL_STORE_INFO_PARAMS:
429             if (text)
430                 EVP_PKEY_print_params(out, OSSL_STORE_INFO_get0_PARAMS(info),
431                                       0, NULL);
432             if (!noout)
433                 PEM_write_bio_Parameters(out,
434                                          OSSL_STORE_INFO_get0_PARAMS(info));
435             break;
436         case OSSL_STORE_INFO_PKEY:
437             if (text)
438                 EVP_PKEY_print_private(out, OSSL_STORE_INFO_get0_PKEY(info),
439                                        0, NULL);
440             if (!noout)
441                 PEM_write_bio_PrivateKey(out, OSSL_STORE_INFO_get0_PKEY(info),
442                                          NULL, NULL, 0, NULL, NULL);
443             break;
444         case OSSL_STORE_INFO_CERT:
445             if (text)
446                 X509_print(out, OSSL_STORE_INFO_get0_CERT(info));
447             if (!noout)
448                 PEM_write_bio_X509(out, OSSL_STORE_INFO_get0_CERT(info));
449             break;
450         case OSSL_STORE_INFO_CRL:
451             if (text)
452                 X509_CRL_print(out, OSSL_STORE_INFO_get0_CRL(info));
453             if (!noout)
454                 PEM_write_bio_X509_CRL(out, OSSL_STORE_INFO_get0_CRL(info));
455             break;
456         default:
457             BIO_printf(bio_err, "!!! Unknown code\n");
458             ret++;
459             break;
460         }
461         items++;
462         OSSL_STORE_INFO_free(info);
463     }
464     indent_printf(indent, out, "Total found: %d\n", items);
465 
466  end2:
467     if (!OSSL_STORE_close(store_ctx)) {
468         ERR_print_errors(bio_err);
469         ret++;
470     }
471 
472     return ret;
473 }
474