1*7c478bd9Sstevel@tonic-gate /*
2*7c478bd9Sstevel@tonic-gate * CDDL HEADER START
3*7c478bd9Sstevel@tonic-gate *
4*7c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
5*7c478bd9Sstevel@tonic-gate * Common Development and Distribution License, Version 1.0 only
6*7c478bd9Sstevel@tonic-gate * (the "License"). You may not use this file except in compliance
7*7c478bd9Sstevel@tonic-gate * with the License.
8*7c478bd9Sstevel@tonic-gate *
9*7c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10*7c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
11*7c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
12*7c478bd9Sstevel@tonic-gate * and limitations under the License.
13*7c478bd9Sstevel@tonic-gate *
14*7c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
15*7c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16*7c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
17*7c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
18*7c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
19*7c478bd9Sstevel@tonic-gate *
20*7c478bd9Sstevel@tonic-gate * CDDL HEADER END
21*7c478bd9Sstevel@tonic-gate */
22*7c478bd9Sstevel@tonic-gate /*
23*7c478bd9Sstevel@tonic-gate * This file includes interfaces to be used together with SSL to get PKCS#12
24*7c478bd9Sstevel@tonic-gate * certs and pass them to SSL. They replace similar functions for PEM,
25*7c478bd9Sstevel@tonic-gate * already provided for within SSL.
26*7c478bd9Sstevel@tonic-gate *
27*7c478bd9Sstevel@tonic-gate * The interfaces included here are:
28*7c478bd9Sstevel@tonic-gate * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass
29*7c478bd9Sstevel@tonic-gate * it to SSL.
30*7c478bd9Sstevel@tonic-gate * sunw_p12_use_keyfile - gets the RSA private key from a pkcs12 file and
31*7c478bd9Sstevel@tonic-gate * pass it to SSL
32*7c478bd9Sstevel@tonic-gate * sunw_p12_use_trustfile - read the pkcs12 trust anchor (aka certificate
33*7c478bd9Sstevel@tonic-gate * authority certs) file into memory and hand them off to SSL.
34*7c478bd9Sstevel@tonic-gate *
35*7c478bd9Sstevel@tonic-gate * These functions use the sunw_PKCS12_parse to read the certs.
36*7c478bd9Sstevel@tonic-gate *
37*7c478bd9Sstevel@tonic-gate * Copyright 2002-2003 Sun Microsystems, Inc. All rights reserved.
38*7c478bd9Sstevel@tonic-gate * Use is subject to license terms.
39*7c478bd9Sstevel@tonic-gate */
40*7c478bd9Sstevel@tonic-gate
41*7c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI"
42*7c478bd9Sstevel@tonic-gate
43*7c478bd9Sstevel@tonic-gate #include <stdio.h>
44*7c478bd9Sstevel@tonic-gate #include <strings.h>
45*7c478bd9Sstevel@tonic-gate #include <stdlib.h>
46*7c478bd9Sstevel@tonic-gate #include <sys/stat.h>
47*7c478bd9Sstevel@tonic-gate #include <unistd.h>
48*7c478bd9Sstevel@tonic-gate
49*7c478bd9Sstevel@tonic-gate #include <openssl/crypto.h>
50*7c478bd9Sstevel@tonic-gate #include <openssl/err.h>
51*7c478bd9Sstevel@tonic-gate #include <openssl/x509.h>
52*7c478bd9Sstevel@tonic-gate #include <openssl/ssl.h>
53*7c478bd9Sstevel@tonic-gate
54*7c478bd9Sstevel@tonic-gate #include <openssl/pkcs12.h>
55*7c478bd9Sstevel@tonic-gate #include <p12access.h>
56*7c478bd9Sstevel@tonic-gate #include <p12err.h>
57*7c478bd9Sstevel@tonic-gate
58*7c478bd9Sstevel@tonic-gate static PKCS12 *p12_read_file(char *);
59*7c478bd9Sstevel@tonic-gate static int p12_doparse(PKCS12 *, char *, int, EVP_PKEY **,
60*7c478bd9Sstevel@tonic-gate X509 **, STACK_OF(X509) **);
61*7c478bd9Sstevel@tonic-gate static int checkfile(char *);
62*7c478bd9Sstevel@tonic-gate static int check_password(PKCS12 *, char *);
63*7c478bd9Sstevel@tonic-gate
64*7c478bd9Sstevel@tonic-gate /*
65*7c478bd9Sstevel@tonic-gate * sunw_use_x509cert - pass an x509 client certificate to ssl
66*7c478bd9Sstevel@tonic-gate *
67*7c478bd9Sstevel@tonic-gate * Arguments:
68*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
69*7c478bd9Sstevel@tonic-gate * cert - Certificate to pass in x509 format
70*7c478bd9Sstevel@tonic-gate *
71*7c478bd9Sstevel@tonic-gate * Returns:
72*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
73*7c478bd9Sstevel@tonic-gate * >0 - Success. Cert was successfully added.
74*7c478bd9Sstevel@tonic-gate */
75*7c478bd9Sstevel@tonic-gate static int
sunw_use_x509cert(SSL_CTX * ctx,X509 * cert)76*7c478bd9Sstevel@tonic-gate sunw_use_x509cert(SSL_CTX *ctx, X509 *cert)
77*7c478bd9Sstevel@tonic-gate {
78*7c478bd9Sstevel@tonic-gate ERR_clear_error();
79*7c478bd9Sstevel@tonic-gate
80*7c478bd9Sstevel@tonic-gate if (ctx == NULL || cert == NULL) {
81*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_X509CERT, SUNW_R_INVALID_ARG);
82*7c478bd9Sstevel@tonic-gate return (-1);
83*7c478bd9Sstevel@tonic-gate }
84*7c478bd9Sstevel@tonic-gate
85*7c478bd9Sstevel@tonic-gate if (SSL_CTX_use_certificate(ctx, cert) != 1) {
86*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_X509CERT, SUNW_R_CERT_ERR);
87*7c478bd9Sstevel@tonic-gate return (-1);
88*7c478bd9Sstevel@tonic-gate }
89*7c478bd9Sstevel@tonic-gate return (1);
90*7c478bd9Sstevel@tonic-gate }
91*7c478bd9Sstevel@tonic-gate
92*7c478bd9Sstevel@tonic-gate /*
93*7c478bd9Sstevel@tonic-gate * sunw_use_pkey - pass an EVP_PKEY private key to ssl
94*7c478bd9Sstevel@tonic-gate *
95*7c478bd9Sstevel@tonic-gate * Arguments:
96*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
97*7c478bd9Sstevel@tonic-gate * pkey - EVP_PKEY formatted private key
98*7c478bd9Sstevel@tonic-gate *
99*7c478bd9Sstevel@tonic-gate * Returns:
100*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
101*7c478bd9Sstevel@tonic-gate * >0 - Success.
102*7c478bd9Sstevel@tonic-gate */
103*7c478bd9Sstevel@tonic-gate static int
sunw_use_pkey(SSL_CTX * ctx,EVP_PKEY * pkey)104*7c478bd9Sstevel@tonic-gate sunw_use_pkey(SSL_CTX *ctx, EVP_PKEY *pkey)
105*7c478bd9Sstevel@tonic-gate {
106*7c478bd9Sstevel@tonic-gate ERR_clear_error();
107*7c478bd9Sstevel@tonic-gate if (ctx == NULL || pkey == NULL) {
108*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_PKEY, SUNW_R_INVALID_ARG);
109*7c478bd9Sstevel@tonic-gate return (-1);
110*7c478bd9Sstevel@tonic-gate }
111*7c478bd9Sstevel@tonic-gate
112*7c478bd9Sstevel@tonic-gate if (SSL_CTX_use_PrivateKey(ctx, pkey) != 1) {
113*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_PKEY, SUNW_R_PKEY_ERR);
114*7c478bd9Sstevel@tonic-gate return (-1);
115*7c478bd9Sstevel@tonic-gate }
116*7c478bd9Sstevel@tonic-gate
117*7c478bd9Sstevel@tonic-gate return (1);
118*7c478bd9Sstevel@tonic-gate }
119*7c478bd9Sstevel@tonic-gate
120*7c478bd9Sstevel@tonic-gate /*
121*7c478bd9Sstevel@tonic-gate * sunw_use_tastore - take a stack of X509 certs and add them to the
122*7c478bd9Sstevel@tonic-gate * SSL store of trust anchors (aka CA certs).
123*7c478bd9Sstevel@tonic-gate *
124*7c478bd9Sstevel@tonic-gate * This function takes the certs in the stack and passes them into
125*7c478bd9Sstevel@tonic-gate * SSL for addition to the cache of TA certs.
126*7c478bd9Sstevel@tonic-gate *
127*7c478bd9Sstevel@tonic-gate * Arguments:
128*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
129*7c478bd9Sstevel@tonic-gate * ta_certs - Stack of certs to add to the list of SSL trust anchors.
130*7c478bd9Sstevel@tonic-gate *
131*7c478bd9Sstevel@tonic-gate * Returns:
132*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
133*7c478bd9Sstevel@tonic-gate * >0 - Success. Certs were successfully added.
134*7c478bd9Sstevel@tonic-gate */
135*7c478bd9Sstevel@tonic-gate static int
sunw_use_tastore(SSL_CTX * ctx,STACK_OF (X509)* ta_certs)136*7c478bd9Sstevel@tonic-gate sunw_use_tastore(SSL_CTX *ctx, STACK_OF(X509) *ta_certs)
137*7c478bd9Sstevel@tonic-gate {
138*7c478bd9Sstevel@tonic-gate X509 *tmp;
139*7c478bd9Sstevel@tonic-gate int ret = -1;
140*7c478bd9Sstevel@tonic-gate int i;
141*7c478bd9Sstevel@tonic-gate
142*7c478bd9Sstevel@tonic-gate ERR_clear_error();
143*7c478bd9Sstevel@tonic-gate if (ctx == NULL || ctx->cert_store == NULL || ta_certs == NULL) {
144*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TASTORE, SUNW_R_INVALID_ARG);
145*7c478bd9Sstevel@tonic-gate return (-1);
146*7c478bd9Sstevel@tonic-gate }
147*7c478bd9Sstevel@tonic-gate
148*7c478bd9Sstevel@tonic-gate if (sk_X509_num(ta_certs) == 0) {
149*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TASTORE, SUNW_R_NO_TRUST_ANCHOR);
150*7c478bd9Sstevel@tonic-gate return (-1);
151*7c478bd9Sstevel@tonic-gate }
152*7c478bd9Sstevel@tonic-gate
153*7c478bd9Sstevel@tonic-gate for (i = 0; i < sk_X509_num(ta_certs); i++) {
154*7c478bd9Sstevel@tonic-gate tmp = sk_X509_value(ta_certs, i);
155*7c478bd9Sstevel@tonic-gate
156*7c478bd9Sstevel@tonic-gate ret = X509_STORE_add_cert(ctx->cert_store, tmp);
157*7c478bd9Sstevel@tonic-gate if (ret == 0) {
158*7c478bd9Sstevel@tonic-gate if (ERR_GET_REASON(ERR_peek_error()) ==
159*7c478bd9Sstevel@tonic-gate X509_R_CERT_ALREADY_IN_HASH_TABLE) {
160*7c478bd9Sstevel@tonic-gate ERR_clear_error();
161*7c478bd9Sstevel@tonic-gate continue;
162*7c478bd9Sstevel@tonic-gate }
163*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TASTORE, SUNW_R_ADD_TRUST_ERR);
164*7c478bd9Sstevel@tonic-gate return (-1);
165*7c478bd9Sstevel@tonic-gate } else if (ret < 0) {
166*7c478bd9Sstevel@tonic-gate break;
167*7c478bd9Sstevel@tonic-gate }
168*7c478bd9Sstevel@tonic-gate }
169*7c478bd9Sstevel@tonic-gate
170*7c478bd9Sstevel@tonic-gate if (ret < 0) {
171*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TASTORE, SUNW_R_ADD_TRUST_ERR);
172*7c478bd9Sstevel@tonic-gate }
173*7c478bd9Sstevel@tonic-gate
174*7c478bd9Sstevel@tonic-gate return (ret);
175*7c478bd9Sstevel@tonic-gate }
176*7c478bd9Sstevel@tonic-gate
177*7c478bd9Sstevel@tonic-gate /*
178*7c478bd9Sstevel@tonic-gate * sunw_p12_use_certfile - read a client certificate from a pkcs12 file and
179*7c478bd9Sstevel@tonic-gate * pass it in to SSL.
180*7c478bd9Sstevel@tonic-gate *
181*7c478bd9Sstevel@tonic-gate * Read in the certificate in pkcs12-formated file. Use the provided
182*7c478bd9Sstevel@tonic-gate * passphrase to decrypt it. Pass the cert to SSL.
183*7c478bd9Sstevel@tonic-gate *
184*7c478bd9Sstevel@tonic-gate * Arguments:
185*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
186*7c478bd9Sstevel@tonic-gate * filename - Name of file with the client certificate.
187*7c478bd9Sstevel@tonic-gate * passwd - Passphrase for pkcs12 data.
188*7c478bd9Sstevel@tonic-gate *
189*7c478bd9Sstevel@tonic-gate * Returns:
190*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
191*7c478bd9Sstevel@tonic-gate * >0 - Success. Cert was successfully added.
192*7c478bd9Sstevel@tonic-gate */
193*7c478bd9Sstevel@tonic-gate int
sunw_p12_use_certfile(SSL_CTX * ctx,char * filename,char * passwd)194*7c478bd9Sstevel@tonic-gate sunw_p12_use_certfile(SSL_CTX *ctx, char *filename, char *passwd)
195*7c478bd9Sstevel@tonic-gate {
196*7c478bd9Sstevel@tonic-gate PKCS12 *p12 = NULL;
197*7c478bd9Sstevel@tonic-gate X509 *cert = NULL;
198*7c478bd9Sstevel@tonic-gate int ret = -1;
199*7c478bd9Sstevel@tonic-gate
200*7c478bd9Sstevel@tonic-gate ERR_clear_error();
201*7c478bd9Sstevel@tonic-gate if (ctx == NULL || filename == NULL) {
202*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_CERTFILE, SUNW_R_INVALID_ARG);
203*7c478bd9Sstevel@tonic-gate return (-1);
204*7c478bd9Sstevel@tonic-gate }
205*7c478bd9Sstevel@tonic-gate
206*7c478bd9Sstevel@tonic-gate p12 = p12_read_file(filename);
207*7c478bd9Sstevel@tonic-gate if (p12 != NULL) {
208*7c478bd9Sstevel@tonic-gate ret = p12_doparse(p12, passwd, DO_UNMATCHING, NULL,
209*7c478bd9Sstevel@tonic-gate &cert, NULL);
210*7c478bd9Sstevel@tonic-gate if (ret > 0 && cert != NULL) {
211*7c478bd9Sstevel@tonic-gate if (sunw_use_x509cert(ctx, cert) == -1) {
212*7c478bd9Sstevel@tonic-gate /*
213*7c478bd9Sstevel@tonic-gate * Error already on stack
214*7c478bd9Sstevel@tonic-gate */
215*7c478bd9Sstevel@tonic-gate ret = -1;
216*7c478bd9Sstevel@tonic-gate }
217*7c478bd9Sstevel@tonic-gate }
218*7c478bd9Sstevel@tonic-gate }
219*7c478bd9Sstevel@tonic-gate
220*7c478bd9Sstevel@tonic-gate if (p12 != NULL)
221*7c478bd9Sstevel@tonic-gate PKCS12_free(p12);
222*7c478bd9Sstevel@tonic-gate
223*7c478bd9Sstevel@tonic-gate if (ret == -1 && cert != NULL) {
224*7c478bd9Sstevel@tonic-gate X509_free(cert);
225*7c478bd9Sstevel@tonic-gate cert = NULL;
226*7c478bd9Sstevel@tonic-gate }
227*7c478bd9Sstevel@tonic-gate
228*7c478bd9Sstevel@tonic-gate return (ret);
229*7c478bd9Sstevel@tonic-gate }
230*7c478bd9Sstevel@tonic-gate
231*7c478bd9Sstevel@tonic-gate /*
232*7c478bd9Sstevel@tonic-gate * sunw_p12_use_keyfile - read a RSA private key from a pkcs12 file and pass
233*7c478bd9Sstevel@tonic-gate * it in to SSL.
234*7c478bd9Sstevel@tonic-gate *
235*7c478bd9Sstevel@tonic-gate * Read in the RSA private key in pkcs12 format. Use the provided
236*7c478bd9Sstevel@tonic-gate * passphrase to decrypt it. Pass the cert to SSL.
237*7c478bd9Sstevel@tonic-gate *
238*7c478bd9Sstevel@tonic-gate * Arguments:
239*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
240*7c478bd9Sstevel@tonic-gate * filename - Name of file with private key.
241*7c478bd9Sstevel@tonic-gate * passwd - Passphrase for pkcs12 data.
242*7c478bd9Sstevel@tonic-gate *
243*7c478bd9Sstevel@tonic-gate * Returns:
244*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
245*7c478bd9Sstevel@tonic-gate * >0 - Success. Key was successfully added.
246*7c478bd9Sstevel@tonic-gate */
247*7c478bd9Sstevel@tonic-gate int
sunw_p12_use_keyfile(SSL_CTX * ctx,char * filename,char * passwd)248*7c478bd9Sstevel@tonic-gate sunw_p12_use_keyfile(SSL_CTX *ctx, char *filename, char *passwd)
249*7c478bd9Sstevel@tonic-gate {
250*7c478bd9Sstevel@tonic-gate EVP_PKEY *pkey = NULL;
251*7c478bd9Sstevel@tonic-gate PKCS12 *p12 = NULL;
252*7c478bd9Sstevel@tonic-gate int ret = -1;
253*7c478bd9Sstevel@tonic-gate
254*7c478bd9Sstevel@tonic-gate ERR_clear_error();
255*7c478bd9Sstevel@tonic-gate if (ctx == NULL || filename == NULL) {
256*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_KEYFILE, SUNW_R_INVALID_ARG);
257*7c478bd9Sstevel@tonic-gate return (-1);
258*7c478bd9Sstevel@tonic-gate }
259*7c478bd9Sstevel@tonic-gate
260*7c478bd9Sstevel@tonic-gate p12 = p12_read_file(filename);
261*7c478bd9Sstevel@tonic-gate if (p12 != NULL) {
262*7c478bd9Sstevel@tonic-gate ret = p12_doparse(p12, passwd, DO_UNMATCHING, &pkey, NULL,
263*7c478bd9Sstevel@tonic-gate NULL);
264*7c478bd9Sstevel@tonic-gate if (ret > 0 && pkey != NULL) {
265*7c478bd9Sstevel@tonic-gate if (sunw_use_pkey(ctx, pkey) != 1) {
266*7c478bd9Sstevel@tonic-gate /*
267*7c478bd9Sstevel@tonic-gate * Error already on stack
268*7c478bd9Sstevel@tonic-gate */
269*7c478bd9Sstevel@tonic-gate ret = -1;
270*7c478bd9Sstevel@tonic-gate }
271*7c478bd9Sstevel@tonic-gate } else {
272*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_KEYFILE, SUNW_R_BAD_PKEY);
273*7c478bd9Sstevel@tonic-gate }
274*7c478bd9Sstevel@tonic-gate } else {
275*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_KEYFILE, SUNW_R_PKEY_READ_ERR);
276*7c478bd9Sstevel@tonic-gate }
277*7c478bd9Sstevel@tonic-gate
278*7c478bd9Sstevel@tonic-gate if (p12 != NULL)
279*7c478bd9Sstevel@tonic-gate PKCS12_free(p12);
280*7c478bd9Sstevel@tonic-gate
281*7c478bd9Sstevel@tonic-gate if (ret == -1 && pkey != NULL) {
282*7c478bd9Sstevel@tonic-gate sunw_evp_pkey_free(pkey);
283*7c478bd9Sstevel@tonic-gate pkey = NULL;
284*7c478bd9Sstevel@tonic-gate }
285*7c478bd9Sstevel@tonic-gate
286*7c478bd9Sstevel@tonic-gate return (ret);
287*7c478bd9Sstevel@tonic-gate }
288*7c478bd9Sstevel@tonic-gate
289*7c478bd9Sstevel@tonic-gate /*
290*7c478bd9Sstevel@tonic-gate * sunw_p12_use_trustfile - read a list of trustanchors from a pkcs12 file and
291*7c478bd9Sstevel@tonic-gate * pass the stack in to SSL.
292*7c478bd9Sstevel@tonic-gate *
293*7c478bd9Sstevel@tonic-gate * Read in the trust anchors from pkcs12-formated file. Use the provided
294*7c478bd9Sstevel@tonic-gate * passphrase to decrypt it. Pass the cert to SSL.
295*7c478bd9Sstevel@tonic-gate *
296*7c478bd9Sstevel@tonic-gate * Arguments:
297*7c478bd9Sstevel@tonic-gate * ctx - SSL's context structure
298*7c478bd9Sstevel@tonic-gate * filename - Name of file with the certificates.
299*7c478bd9Sstevel@tonic-gate * passwd - Passphrase for pkcs12 data.
300*7c478bd9Sstevel@tonic-gate *
301*7c478bd9Sstevel@tonic-gate * Returns:
302*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
303*7c478bd9Sstevel@tonic-gate * >0 - Success. Trust anchors were successfully added.
304*7c478bd9Sstevel@tonic-gate */
305*7c478bd9Sstevel@tonic-gate int
sunw_p12_use_trustfile(SSL_CTX * ctx,char * filename,char * passwd)306*7c478bd9Sstevel@tonic-gate sunw_p12_use_trustfile(SSL_CTX *ctx, char *filename, char *passwd)
307*7c478bd9Sstevel@tonic-gate {
308*7c478bd9Sstevel@tonic-gate PKCS12 *p12 = NULL;
309*7c478bd9Sstevel@tonic-gate STACK_OF(X509) *ta_sk = NULL;
310*7c478bd9Sstevel@tonic-gate int ret = -1;
311*7c478bd9Sstevel@tonic-gate
312*7c478bd9Sstevel@tonic-gate ERR_clear_error();
313*7c478bd9Sstevel@tonic-gate if (ctx == NULL || filename == NULL) {
314*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TRUSTFILE, SUNW_R_INVALID_ARG);
315*7c478bd9Sstevel@tonic-gate return (-1);
316*7c478bd9Sstevel@tonic-gate }
317*7c478bd9Sstevel@tonic-gate
318*7c478bd9Sstevel@tonic-gate p12 = p12_read_file(filename);
319*7c478bd9Sstevel@tonic-gate if (p12 != NULL) {
320*7c478bd9Sstevel@tonic-gate ret = p12_doparse(p12, passwd, DO_NONE, NULL, NULL,
321*7c478bd9Sstevel@tonic-gate &ta_sk);
322*7c478bd9Sstevel@tonic-gate if (ret > 0 && ta_sk != NULL)
323*7c478bd9Sstevel@tonic-gate ret = sunw_use_tastore(ctx, ta_sk);
324*7c478bd9Sstevel@tonic-gate else {
325*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TRUSTFILE, SUNW_R_BAD_TRUST);
326*7c478bd9Sstevel@tonic-gate ret = -1;
327*7c478bd9Sstevel@tonic-gate }
328*7c478bd9Sstevel@tonic-gate } else {
329*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_USE_TRUSTFILE, SUNW_R_READ_TRUST_ERR);
330*7c478bd9Sstevel@tonic-gate }
331*7c478bd9Sstevel@tonic-gate
332*7c478bd9Sstevel@tonic-gate if (p12 != NULL)
333*7c478bd9Sstevel@tonic-gate PKCS12_free(p12);
334*7c478bd9Sstevel@tonic-gate
335*7c478bd9Sstevel@tonic-gate if (ta_sk != NULL)
336*7c478bd9Sstevel@tonic-gate sk_X509_pop_free(ta_sk, X509_free);
337*7c478bd9Sstevel@tonic-gate
338*7c478bd9Sstevel@tonic-gate return (ret);
339*7c478bd9Sstevel@tonic-gate }
340*7c478bd9Sstevel@tonic-gate
341*7c478bd9Sstevel@tonic-gate /*
342*7c478bd9Sstevel@tonic-gate * p12_read_file - read a pkcs12 file and get its contents. Return the
343*7c478bd9Sstevel@tonic-gate * pkcs12 structures.
344*7c478bd9Sstevel@tonic-gate *
345*7c478bd9Sstevel@tonic-gate * Arguments:
346*7c478bd9Sstevel@tonic-gate * filename - Name of file with the client certificate.
347*7c478bd9Sstevel@tonic-gate *
348*7c478bd9Sstevel@tonic-gate *
349*7c478bd9Sstevel@tonic-gate * Returns:
350*7c478bd9Sstevel@tonic-gate * NULL - Error occurred. Check the error stack for specifics.
351*7c478bd9Sstevel@tonic-gate * != NULL - Success. The return value is the address of a pkcs12
352*7c478bd9Sstevel@tonic-gate * structure.
353*7c478bd9Sstevel@tonic-gate */
354*7c478bd9Sstevel@tonic-gate static PKCS12 *
p12_read_file(char * filename)355*7c478bd9Sstevel@tonic-gate p12_read_file(char *filename)
356*7c478bd9Sstevel@tonic-gate {
357*7c478bd9Sstevel@tonic-gate PKCS12 *p12 = NULL;
358*7c478bd9Sstevel@tonic-gate FILE *fp = NULL;
359*7c478bd9Sstevel@tonic-gate int ret = 0;
360*7c478bd9Sstevel@tonic-gate
361*7c478bd9Sstevel@tonic-gate ERR_clear_error();
362*7c478bd9Sstevel@tonic-gate if (checkfile(filename) == -1) {
363*7c478bd9Sstevel@tonic-gate /*
364*7c478bd9Sstevel@tonic-gate * Error already on stack
365*7c478bd9Sstevel@tonic-gate */
366*7c478bd9Sstevel@tonic-gate return (NULL);
367*7c478bd9Sstevel@tonic-gate }
368*7c478bd9Sstevel@tonic-gate
369*7c478bd9Sstevel@tonic-gate if ((fp = fopen(filename, "r")) == 0) {
370*7c478bd9Sstevel@tonic-gate SYSerr(SYS_F_FOPEN, errno);
371*7c478bd9Sstevel@tonic-gate return (NULL);
372*7c478bd9Sstevel@tonic-gate }
373*7c478bd9Sstevel@tonic-gate
374*7c478bd9Sstevel@tonic-gate p12 = d2i_PKCS12_fp(fp, NULL);
375*7c478bd9Sstevel@tonic-gate if (p12 == NULL) {
376*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_READ_FILE, SUNW_R_READ_ERR);
377*7c478bd9Sstevel@tonic-gate ret = -1;
378*7c478bd9Sstevel@tonic-gate }
379*7c478bd9Sstevel@tonic-gate
380*7c478bd9Sstevel@tonic-gate if (fp != NULL)
381*7c478bd9Sstevel@tonic-gate (void) fclose(fp);
382*7c478bd9Sstevel@tonic-gate
383*7c478bd9Sstevel@tonic-gate if (ret == -1 && p12 != NULL) {
384*7c478bd9Sstevel@tonic-gate PKCS12_free(p12);
385*7c478bd9Sstevel@tonic-gate p12 = NULL;
386*7c478bd9Sstevel@tonic-gate }
387*7c478bd9Sstevel@tonic-gate
388*7c478bd9Sstevel@tonic-gate return (p12);
389*7c478bd9Sstevel@tonic-gate }
390*7c478bd9Sstevel@tonic-gate
391*7c478bd9Sstevel@tonic-gate /*
392*7c478bd9Sstevel@tonic-gate * p12_doparse - Given a pkcs12 structure, check the passphrase and then
393*7c478bd9Sstevel@tonic-gate * parse it.
394*7c478bd9Sstevel@tonic-gate *
395*7c478bd9Sstevel@tonic-gate * Arguments:
396*7c478bd9Sstevel@tonic-gate * p12 - Structure with pkcs12 data which has been read in
397*7c478bd9Sstevel@tonic-gate * passwd - Passphrase for pkcs12 data & key.
398*7c478bd9Sstevel@tonic-gate * matchty - How to decide which matching entry to take... See the
399*7c478bd9Sstevel@tonic-gate * DO_* definitions for valid values.
400*7c478bd9Sstevel@tonic-gate * pkey - Points at pointer to private key structure.
401*7c478bd9Sstevel@tonic-gate * cert - Points at pointer to client certificate structure
402*7c478bd9Sstevel@tonic-gate * ca - Points at pointer to list of CA certs
403*7c478bd9Sstevel@tonic-gate *
404*7c478bd9Sstevel@tonic-gate * Returns:
405*7c478bd9Sstevel@tonic-gate * <=0 - Error occurred. Check the error stack for specifics.
406*7c478bd9Sstevel@tonic-gate * >0 - Success. Bits set reflect the kind of information
407*7c478bd9Sstevel@tonic-gate * returned. (See the FOUND_* definitions.)
408*7c478bd9Sstevel@tonic-gate */
409*7c478bd9Sstevel@tonic-gate static int
p12_doparse(PKCS12 * p12,char * passwd,int matchty,EVP_PKEY ** pkey,X509 ** cert,STACK_OF (X509)** ca)410*7c478bd9Sstevel@tonic-gate p12_doparse(PKCS12 *p12, char *passwd, int matchty,
411*7c478bd9Sstevel@tonic-gate EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
412*7c478bd9Sstevel@tonic-gate {
413*7c478bd9Sstevel@tonic-gate int ret = 0;
414*7c478bd9Sstevel@tonic-gate
415*7c478bd9Sstevel@tonic-gate ERR_clear_error();
416*7c478bd9Sstevel@tonic-gate
417*7c478bd9Sstevel@tonic-gate /*
418*7c478bd9Sstevel@tonic-gate * Check passphrase (including null one).
419*7c478bd9Sstevel@tonic-gate */
420*7c478bd9Sstevel@tonic-gate if (check_password(p12, passwd) == 0) {
421*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_DOPARSE, SUNW_R_MAC_VERIFY_FAILURE);
422*7c478bd9Sstevel@tonic-gate return (-1);
423*7c478bd9Sstevel@tonic-gate }
424*7c478bd9Sstevel@tonic-gate
425*7c478bd9Sstevel@tonic-gate ret = sunw_PKCS12_parse(p12, passwd, matchty, NULL, 0, NULL,
426*7c478bd9Sstevel@tonic-gate pkey, cert, ca);
427*7c478bd9Sstevel@tonic-gate if (ret <= 0) {
428*7c478bd9Sstevel@tonic-gate /*
429*7c478bd9Sstevel@tonic-gate * Error already on stack
430*7c478bd9Sstevel@tonic-gate */
431*7c478bd9Sstevel@tonic-gate return (-1);
432*7c478bd9Sstevel@tonic-gate }
433*7c478bd9Sstevel@tonic-gate
434*7c478bd9Sstevel@tonic-gate return (ret);
435*7c478bd9Sstevel@tonic-gate }
436*7c478bd9Sstevel@tonic-gate
437*7c478bd9Sstevel@tonic-gate /*
438*7c478bd9Sstevel@tonic-gate * checkfile - given a file name, verify that the file exists and is
439*7c478bd9Sstevel@tonic-gate * readable.
440*7c478bd9Sstevel@tonic-gate */
441*7c478bd9Sstevel@tonic-gate /* ARGSUSED */
442*7c478bd9Sstevel@tonic-gate static int
checkfile(char * filename)443*7c478bd9Sstevel@tonic-gate checkfile(char *filename)
444*7c478bd9Sstevel@tonic-gate {
445*7c478bd9Sstevel@tonic-gate #ifndef _BOOT
446*7c478bd9Sstevel@tonic-gate struct stat sbuf;
447*7c478bd9Sstevel@tonic-gate
448*7c478bd9Sstevel@tonic-gate if (access(filename, R_OK) == -1 || stat(filename, &sbuf) == -1) {
449*7c478bd9Sstevel@tonic-gate SYSerr(SYS_F_FOPEN, errno);
450*7c478bd9Sstevel@tonic-gate return (-1);
451*7c478bd9Sstevel@tonic-gate }
452*7c478bd9Sstevel@tonic-gate
453*7c478bd9Sstevel@tonic-gate if (!S_ISREG(sbuf.st_mode)) {
454*7c478bd9Sstevel@tonic-gate SUNWerr(SUNW_F_CHECKFILE, SUNW_R_BAD_FILETYPE);
455*7c478bd9Sstevel@tonic-gate return (-1);
456*7c478bd9Sstevel@tonic-gate }
457*7c478bd9Sstevel@tonic-gate #endif
458*7c478bd9Sstevel@tonic-gate return (0);
459*7c478bd9Sstevel@tonic-gate }
460*7c478bd9Sstevel@tonic-gate
461*7c478bd9Sstevel@tonic-gate /*
462*7c478bd9Sstevel@tonic-gate * check_password - do various password checks to see if the current password
463*7c478bd9Sstevel@tonic-gate * will work or we need to prompt for a new one.
464*7c478bd9Sstevel@tonic-gate *
465*7c478bd9Sstevel@tonic-gate * Arguments:
466*7c478bd9Sstevel@tonic-gate * pass - password to check
467*7c478bd9Sstevel@tonic-gate *
468*7c478bd9Sstevel@tonic-gate * Returns:
469*7c478bd9Sstevel@tonic-gate * 1 - Password is OK.
470*7c478bd9Sstevel@tonic-gate * 0 - Password not valid. Error stack was set - use ERR_get_error() to
471*7c478bd9Sstevel@tonic-gate * to get the error.
472*7c478bd9Sstevel@tonic-gate */
473*7c478bd9Sstevel@tonic-gate static int
check_password(PKCS12 * p12,char * pass)474*7c478bd9Sstevel@tonic-gate check_password(PKCS12 *p12, char *pass)
475*7c478bd9Sstevel@tonic-gate {
476*7c478bd9Sstevel@tonic-gate int ret = 1;
477*7c478bd9Sstevel@tonic-gate
478*7c478bd9Sstevel@tonic-gate /*
479*7c478bd9Sstevel@tonic-gate * If password is zero length or NULL then try verifying both cases
480*7c478bd9Sstevel@tonic-gate * to determine which password is correct. The reason for this is that
481*7c478bd9Sstevel@tonic-gate * under PKCS#12 password based encryption no password and a zero
482*7c478bd9Sstevel@tonic-gate * length password are two different things. Otherwise, calling
483*7c478bd9Sstevel@tonic-gate * PKCS12_verify_mac() with a length of -1 means that the length
484*7c478bd9Sstevel@tonic-gate * can be determined via strlen().
485*7c478bd9Sstevel@tonic-gate */
486*7c478bd9Sstevel@tonic-gate /* Check the mac */
487*7c478bd9Sstevel@tonic-gate if (pass == NULL || *pass == '\0') {
488*7c478bd9Sstevel@tonic-gate if (PKCS12_verify_mac(p12, NULL, 0) == 0 &&
489*7c478bd9Sstevel@tonic-gate PKCS12_verify_mac(p12, "", 0) == 0)
490*7c478bd9Sstevel@tonic-gate ret = 0;
491*7c478bd9Sstevel@tonic-gate } else if (PKCS12_verify_mac(p12, pass, -1) == 0) {
492*7c478bd9Sstevel@tonic-gate ret = 0;
493*7c478bd9Sstevel@tonic-gate }
494*7c478bd9Sstevel@tonic-gate
495*7c478bd9Sstevel@tonic-gate return (ret);
496*7c478bd9Sstevel@tonic-gate }
497