blob: c5a587540170ab4cfe8a6953e8bb9a3e42e4a537 [file] [log] [blame]
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001/*
2 * X.509 Certificate Signing Request writing
3 *
Manuel Pégourié-Gonnarda658a402015-01-23 09:45:19 +00004 * Copyright (C) 2006-2014, ARM Limited, All Rights Reserved
Paul Bakker7c6b2c32013-09-16 13:49:26 +02005 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +00006 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker7c6b2c32013-09-16 13:49:26 +02007 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02008 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License along
19 * with this program; if not, write to the Free Software Foundation, Inc.,
20 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22/*
23 * References:
24 * - CSRs: PKCS#10 v1.7 aka RFC 2986
25 * - attributes: PKCS#9 v2.0 aka RFC 2985
26 */
27
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020028#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker7c6b2c32013-09-16 13:49:26 +020029#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020030#else
31#include POLARSSL_CONFIG_FILE
32#endif
Paul Bakker7c6b2c32013-09-16 13:49:26 +020033
34#if defined(POLARSSL_X509_CSR_WRITE_C)
35
36#include "polarssl/x509_csr.h"
37#include "polarssl/oid.h"
38#include "polarssl/asn1write.h"
39
Rich Evans00ab4702015-02-06 13:43:58 +000040#include <string.h>
41#include <stdlib.h>
42
Paul Bakker7c6b2c32013-09-16 13:49:26 +020043#if defined(POLARSSL_PEM_WRITE_C)
44#include "polarssl/pem.h"
45#endif
46
Paul Bakker34617722014-06-13 17:20:13 +020047/* Implementation that should never be optimized out by the compiler */
48static void polarssl_zeroize( void *v, size_t n ) {
49 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
50}
51
Paul Bakker7c6b2c32013-09-16 13:49:26 +020052void x509write_csr_init( x509write_csr *ctx )
53{
54 memset( ctx, 0, sizeof(x509write_csr) );
55}
56
57void x509write_csr_free( x509write_csr *ctx )
58{
59 asn1_free_named_data_list( &ctx->subject );
60 asn1_free_named_data_list( &ctx->extensions );
61
Paul Bakker34617722014-06-13 17:20:13 +020062 polarssl_zeroize( ctx, sizeof(x509write_csr) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +020063}
64
65void x509write_csr_set_md_alg( x509write_csr *ctx, md_type_t md_alg )
66{
67 ctx->md_alg = md_alg;
68}
69
70void x509write_csr_set_key( x509write_csr *ctx, pk_context *key )
71{
72 ctx->key = key;
73}
74
Paul Bakker50dc8502013-10-28 21:19:10 +010075int x509write_csr_set_subject_name( x509write_csr *ctx,
76 const char *subject_name )
Paul Bakker7c6b2c32013-09-16 13:49:26 +020077{
Paul Bakker86d0c192013-09-18 11:11:02 +020078 return x509_string_to_names( &ctx->subject, subject_name );
Paul Bakker7c6b2c32013-09-16 13:49:26 +020079}
80
81int x509write_csr_set_extension( x509write_csr *ctx,
82 const char *oid, size_t oid_len,
83 const unsigned char *val, size_t val_len )
84{
85 return x509_set_extension( &ctx->extensions, oid, oid_len,
86 0, val, val_len );
87}
88
89int x509write_csr_set_key_usage( x509write_csr *ctx, unsigned char key_usage )
90{
91 unsigned char buf[4];
92 unsigned char *c;
93 int ret;
94
95 c = buf + 4;
96
97 if( ( ret = asn1_write_bitstring( &c, buf, &key_usage, 7 ) ) != 4 )
98 return( ret );
99
100 ret = x509write_csr_set_extension( ctx, OID_KEY_USAGE,
101 OID_SIZE( OID_KEY_USAGE ),
102 buf, 4 );
103 if( ret != 0 )
104 return( ret );
105
106 return( 0 );
107}
108
109int x509write_csr_set_ns_cert_type( x509write_csr *ctx,
110 unsigned char ns_cert_type )
111{
112 unsigned char buf[4];
113 unsigned char *c;
114 int ret;
115
116 c = buf + 4;
117
118 if( ( ret = asn1_write_bitstring( &c, buf, &ns_cert_type, 8 ) ) != 4 )
119 return( ret );
120
121 ret = x509write_csr_set_extension( ctx, OID_NS_CERT_TYPE,
122 OID_SIZE( OID_NS_CERT_TYPE ),
123 buf, 4 );
124 if( ret != 0 )
125 return( ret );
126
127 return( 0 );
128}
129
130int x509write_csr_der( x509write_csr *ctx, unsigned char *buf, size_t size,
131 int (*f_rng)(void *, unsigned char *, size_t),
132 void *p_rng )
133{
134 int ret;
135 const char *sig_oid;
136 size_t sig_oid_len = 0;
137 unsigned char *c, *c2;
138 unsigned char hash[64];
139 unsigned char sig[POLARSSL_MPI_MAX_SIZE];
140 unsigned char tmp_buf[2048];
141 size_t pub_len = 0, sig_and_oid_len = 0, sig_len;
142 size_t len = 0;
143 pk_type_t pk_alg;
144
145 /*
146 * Prepare data to be signed in tmp_buf
147 */
148 c = tmp_buf + sizeof( tmp_buf );
149
150 ASN1_CHK_ADD( len, x509_write_extensions( &c, tmp_buf, ctx->extensions ) );
151
152 if( len )
153 {
154 ASN1_CHK_ADD( len, asn1_write_len( &c, tmp_buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200155 ASN1_CHK_ADD( len, asn1_write_tag( &c, tmp_buf, ASN1_CONSTRUCTED |
156 ASN1_SEQUENCE ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200157
158 ASN1_CHK_ADD( len, asn1_write_len( &c, tmp_buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200159 ASN1_CHK_ADD( len, asn1_write_tag( &c, tmp_buf, ASN1_CONSTRUCTED |
160 ASN1_SET ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200161
162 ASN1_CHK_ADD( len, asn1_write_oid( &c, tmp_buf, OID_PKCS9_CSR_EXT_REQ,
163 OID_SIZE( OID_PKCS9_CSR_EXT_REQ ) ) );
164
165 ASN1_CHK_ADD( len, asn1_write_len( &c, tmp_buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200166 ASN1_CHK_ADD( len, asn1_write_tag( &c, tmp_buf, ASN1_CONSTRUCTED |
167 ASN1_SEQUENCE ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200168 }
169
170 ASN1_CHK_ADD( len, asn1_write_len( &c, tmp_buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200171 ASN1_CHK_ADD( len, asn1_write_tag( &c, tmp_buf, ASN1_CONSTRUCTED |
172 ASN1_CONTEXT_SPECIFIC ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200173
174 ASN1_CHK_ADD( pub_len, pk_write_pubkey_der( ctx->key,
175 tmp_buf, c - tmp_buf ) );
176 c -= pub_len;
177 len += pub_len;
178
179 /*
180 * Subject ::= Name
181 */
182 ASN1_CHK_ADD( len, x509_write_names( &c, tmp_buf, ctx->subject ) );
183
184 /*
185 * Version ::= INTEGER { v1(0), v2(1), v3(2) }
186 */
187 ASN1_CHK_ADD( len, asn1_write_int( &c, tmp_buf, 0 ) );
188
189 ASN1_CHK_ADD( len, asn1_write_len( &c, tmp_buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200190 ASN1_CHK_ADD( len, asn1_write_tag( &c, tmp_buf, ASN1_CONSTRUCTED |
191 ASN1_SEQUENCE ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200192
193 /*
194 * Prepare signature
195 */
196 md( md_info_from_type( ctx->md_alg ), c, len, hash );
197
198 pk_alg = pk_get_type( ctx->key );
199 if( pk_alg == POLARSSL_PK_ECKEY )
200 pk_alg = POLARSSL_PK_ECDSA;
201
202 if( ( ret = pk_sign( ctx->key, ctx->md_alg, hash, 0, sig, &sig_len,
203 f_rng, p_rng ) ) != 0 ||
204 ( ret = oid_get_oid_by_sig_alg( pk_alg, ctx->md_alg,
205 &sig_oid, &sig_oid_len ) ) != 0 )
206 {
207 return( ret );
208 }
209
210 /*
211 * Write data to output buffer
212 */
213 c2 = buf + size;
214 ASN1_CHK_ADD( sig_and_oid_len, x509_write_sig( &c2, buf,
215 sig_oid, sig_oid_len, sig, sig_len ) );
216
217 c2 -= len;
218 memcpy( c2, c, len );
219
220 len += sig_and_oid_len;
221 ASN1_CHK_ADD( len, asn1_write_len( &c2, buf, len ) );
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200222 ASN1_CHK_ADD( len, asn1_write_tag( &c2, buf, ASN1_CONSTRUCTED |
223 ASN1_SEQUENCE ) );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200224
Paul Bakkerb9cfaa02013-10-11 18:58:55 +0200225 return( (int) len );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200226}
227
228#define PEM_BEGIN_CSR "-----BEGIN CERTIFICATE REQUEST-----\n"
229#define PEM_END_CSR "-----END CERTIFICATE REQUEST-----\n"
230
231#if defined(POLARSSL_PEM_WRITE_C)
232int x509write_csr_pem( x509write_csr *ctx, unsigned char *buf, size_t size,
233 int (*f_rng)(void *, unsigned char *, size_t),
234 void *p_rng )
235{
236 int ret;
237 unsigned char output_buf[4096];
238 size_t olen = 0;
239
240 if( ( ret = x509write_csr_der( ctx, output_buf, sizeof(output_buf),
241 f_rng, p_rng ) ) < 0 )
242 {
243 return( ret );
244 }
245
246 if( ( ret = pem_write_buffer( PEM_BEGIN_CSR, PEM_END_CSR,
247 output_buf + sizeof(output_buf) - ret,
248 ret, buf, size, &olen ) ) != 0 )
249 {
250 return( ret );
251 }
252
253 return( 0 );
254}
255#endif /* POLARSSL_PEM_WRITE_C */
256
257#endif /* POLARSSL_X509_CSR_WRITE_C */