• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *  Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
3  *
4  *  Licensed under the Apache License, Version 2.0 (the License); you may
5  *  not use this file except in compliance with the License.
6  *
7  *  http://www.apache.org/licenses/LICENSE-2.0
8  */
9 
10 
11 
12 #include <stdio.h>
13 #include <string.h>
14 #include <stdlib.h>
15 #include <stdint.h>
16 #include <assert.h>
17 #include <gmssl/sm2.h>
18 #include <gmssl/oid.h>
19 #include <gmssl/asn1.h>
20 #include <gmssl/error.h>
21 #include <gmssl/x509.h>
22 #include <gmssl/pem.h>
23 #include <gmssl/x509_req.h>
24 #include <gmssl/x509_ext.h>
25 #include <gmssl/x509_alg.h>
26 
27 
x509_request_info_to_der(int version,const uint8_t * subject,size_t subject_len,const SM2_KEY * subject_public_key,const uint8_t * attrs,size_t attrs_len,uint8_t ** out,size_t * outlen)28 int x509_request_info_to_der(
29 	int version,
30 	const uint8_t *subject, size_t subject_len,
31 	const SM2_KEY *subject_public_key,
32 	const uint8_t *attrs, size_t attrs_len,
33 	uint8_t **out, size_t *outlen)
34 {
35 	size_t len = 0;
36 	if (version != X509_version_v1) {
37 		error_print();
38 		return -1;
39 	}
40 	if (asn1_int_to_der(version, NULL, &len) != 1
41 		|| asn1_sequence_to_der(subject, subject_len, NULL, &len) != 1
42 		|| x509_public_key_info_to_der(subject_public_key, NULL, &len) != 1
43 		|| asn1_implicit_set_to_der(0, attrs, attrs_len, NULL, &len) < 0
44 		|| asn1_sequence_header_to_der(len, out, outlen) != 1
45 		|| asn1_int_to_der(version, out, outlen) != 1
46 		|| asn1_sequence_to_der(subject, subject_len, out, outlen) != 1
47 		|| x509_public_key_info_to_der(subject_public_key, out, outlen) != 1
48 		|| asn1_implicit_set_to_der(0, attrs, attrs_len, out, outlen) < 0) {
49 		error_print();
50 		return -1;
51 	}
52 	return 1;
53 }
54 
x509_request_info_from_der(int * version,const uint8_t ** subject,size_t * subject_len,SM2_KEY * subject_public_key,const uint8_t ** attrs,size_t * attrs_len,const uint8_t ** in,size_t * inlen)55 int x509_request_info_from_der(
56 	int *version,
57 	const uint8_t **subject, size_t *subject_len,
58 	SM2_KEY *subject_public_key,
59 	const uint8_t **attrs, size_t *attrs_len,
60 	const uint8_t **in, size_t *inlen)
61 {
62 	int ret;
63 	const uint8_t *d;
64 	size_t dlen;
65 
66 	if ((ret = asn1_sequence_from_der(&d, &dlen, in, inlen)) != 1) {
67 		if (ret < 0) error_print();
68 		return ret;
69 	}
70 	if (asn1_int_from_der(version, &d, &dlen) != 1
71 		|| asn1_sequence_from_der(subject, subject_len, &d, &dlen) != 1
72 		|| x509_public_key_info_from_der(subject_public_key, &d, &dlen) != 1
73 		|| asn1_implicit_set_from_der(0, attrs, attrs_len, &d, &dlen) < 0
74 		|| asn1_length_is_zero(dlen) != 1) {
75 		error_print();
76 		return -1;
77 	}
78 	if (*version != X509_version_v1) {
79 		error_print();
80 		return -1;
81 	}
82 	return 1;
83 }
84 
x509_request_info_print(FILE * fp,int fmt,int ind,const char * label,const uint8_t * d,size_t dlen)85 int x509_request_info_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen)
86 {
87 	int ret, ival;
88 	const uint8_t *p;
89 	size_t len;
90 
91 	format_print(fp, fmt, ind, "%s\n", label);
92 	ind += 4;
93 
94 	if (asn1_int_from_der(&ival, &d, &dlen) != 1) goto err;
95 	format_print(fp, fmt, ind, "version: %s (%d)\n", x509_version_name(ival), ival);
96 	if (asn1_sequence_from_der(&p, &len, &d, &dlen) != 1) goto err;
97 	x509_name_print(fp, fmt, ind, "subject", p, len);
98 	if (asn1_sequence_from_der(&p, &len, &d, &dlen) != 1) goto err;
99 	x509_public_key_info_print(fp, fmt, ind, "subjectPublicKeyInfo", p, len);
100 	if ((ret = asn1_implicit_set_from_der(0, &p, &len, &d, &dlen)) < 0) goto err;
101 	if (ret) x509_attributes_print(fp, fmt, ind, "attributes", p, len);
102 	if (asn1_length_is_zero(dlen) != 1) goto err;
103 	return 1;
104 err:
105 	error_print();
106 	return -1;
107 }
108 
x509_request_to_der(int version,const uint8_t * subject,size_t subject_len,const SM2_KEY * subject_public_key,const uint8_t * attrs,size_t attrs_len,int signature_algor,const uint8_t * sig,size_t siglen,uint8_t ** out,size_t * outlen)109 int x509_request_to_der(
110 	int version,
111 	const uint8_t *subject, size_t subject_len,
112 	const SM2_KEY *subject_public_key,
113 	const uint8_t *attrs, size_t attrs_len,
114 	int signature_algor,
115 	const uint8_t *sig, size_t siglen,
116 	uint8_t **out, size_t *outlen)
117 {
118 	size_t len = 0;
119 	if (x509_request_info_to_der(version, subject, subject_len, subject_public_key, attrs, attrs_len, NULL, &len) != 1
120 		|| x509_signature_algor_to_der(signature_algor, NULL, &len) != 1
121 		|| asn1_bit_octets_to_der(sig, siglen, NULL, &len) != 1
122 		|| asn1_sequence_header_to_der(len, out, outlen) != 1
123 		|| x509_request_info_to_der(version, subject, subject_len, subject_public_key, attrs, attrs_len, out, outlen) != 1
124 		|| x509_signature_algor_to_der(signature_algor, out, outlen) != 1
125 		|| asn1_bit_octets_to_der(sig, siglen, out, outlen) != 1) {
126 		error_print();
127 		return -1;
128 	}
129 	return 1;
130 }
131 
x509_request_from_der(int * version,const uint8_t ** subject,size_t * subject_len,SM2_KEY * subject_public_key,const uint8_t ** attrs,size_t * attrs_len,int * signature_algor,const uint8_t ** sig,size_t * siglen,const uint8_t ** in,size_t * inlen)132 int x509_request_from_der(
133 	int *version,
134 	const uint8_t **subject, size_t *subject_len,
135 	SM2_KEY *subject_public_key,
136 	const uint8_t **attrs, size_t *attrs_len,
137 	int *signature_algor,
138 	const uint8_t **sig, size_t *siglen,
139 	const uint8_t **in, size_t *inlen)
140 {
141 	int ret;
142 	const uint8_t *d;
143 	size_t dlen;
144 
145 	if ((ret = asn1_sequence_from_der(&d, &dlen, in, inlen)) != 1) {
146 		if (ret < 0) error_print();
147 		return ret;
148 	}
149 	if (x509_request_info_from_der(version, subject, subject_len, subject_public_key,
150 			attrs, attrs_len, &d, &dlen) != 1
151 		|| x509_signature_algor_from_der(signature_algor, &d, &dlen) != 1
152 		|| asn1_bit_octets_from_der(sig, siglen, &d, &dlen) != 1
153 		|| asn1_length_is_zero(dlen) != 1) {
154 		error_print();
155 		return -1;
156 	}
157 	return 1;
158 }
159 
x509_request_print(FILE * fp,int fmt,int ind,const char * label,const uint8_t * d,size_t dlen)160 int x509_request_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen)
161 {
162 	const uint8_t *p;
163 	size_t len;
164 
165 	format_print(fp, fmt, ind, "%s\n", label);
166 	ind += 4;
167 
168 	if (asn1_sequence_from_der(&p, &len, &d, &dlen) != 1) goto err;
169 	x509_request_info_print(fp, fmt, ind, "certificationRequestInfo", p, len);
170 	if (asn1_sequence_from_der(&p, &len, &d, &dlen) != 1) goto err;
171 	x509_signature_algor_print(fp, fmt, ind, "signatureAlgorithm", p, len);
172 	if (asn1_bit_octets_from_der(&p, &len, &d, &dlen) != 1) goto err;
173 	format_bytes(fp, fmt, ind, "signature: ", p, len);
174 	if (asn1_length_is_zero(dlen) != 1) goto err;
175 	return 1;
176 err:
177 	error_print();
178 	return -1;
179 }
180 
x509_req_sign(uint8_t * req,size_t * reqlen,size_t maxlen,int version,const uint8_t * subject,size_t subject_len,const SM2_KEY * subject_public_key,const uint8_t * attrs,size_t attrs_len,int signature_algor,const SM2_KEY * sign_key,const char * signer_id,size_t signer_id_len)181 int x509_req_sign(
182 	uint8_t *req, size_t *reqlen, size_t maxlen,
183 	int version,
184 	const uint8_t *subject, size_t subject_len,
185 	const SM2_KEY *subject_public_key,
186 	const uint8_t *attrs, size_t attrs_len,
187 	int signature_algor,
188 	const SM2_KEY *sign_key, const char *signer_id, size_t signer_id_len)
189 {
190 	uint8_t req_info[2048];
191 	size_t req_info_len = 0;
192 	uint8_t *p = req_info;
193 	size_t len = 0;
194 	SM2_SIGN_CTX sign_ctx;
195 	uint8_t sig[SM2_MAX_SIGNATURE_SIZE];
196 	size_t siglen;
197 
198 	if (x509_request_info_to_der(version, subject, subject_len, subject_public_key,
199 			attrs, attrs_len, NULL, &len) != 1
200 		|| asn1_length_le(len, sizeof(req_info)) != 1
201 		|| x509_request_info_to_der(version, subject, subject_len, subject_public_key,
202 			attrs, attrs_len, &p, &req_info_len) != 1) {
203 		error_print();
204 		return -1;
205 	}
206 
207 	if (signature_algor != OID_sm2sign_with_sm3) {
208 		error_print();
209 		return -1;
210 	}
211 	if (sm2_sign_init(&sign_ctx, sign_key, signer_id, signer_id_len) != 1
212 		|| sm2_sign_update(&sign_ctx, req_info, req_info_len) != 1
213 		|| sm2_sign_finish(&sign_ctx, sig, &siglen) != 1) {
214 		memset(&sign_ctx, 0, sizeof(sign_ctx));
215 		error_print();
216 		return -1;
217 	}
218 	memset(&sign_ctx, 0, sizeof(sign_ctx));
219 
220 	len = *reqlen = 0;
221 	if (x509_request_to_der(version, subject, subject_len, subject_public_key,
222 			attrs, attrs_len, signature_algor, sig, siglen, NULL, &len) != 1
223 		|| asn1_length_le(len, maxlen) != 1
224 		|| x509_request_to_der(version, subject, subject_len, subject_public_key,
225 			attrs, attrs_len, signature_algor, sig, siglen, &req, reqlen) != 1) {
226 		error_print();
227 		return -1;
228 	}
229 	return 1;
230 }
231 
x509_req_verify(const uint8_t * req,size_t reqlen,const SM2_KEY * sign_pubkey,const char * signer_id,size_t signer_id_len)232 int x509_req_verify(const uint8_t *req, size_t reqlen, const SM2_KEY *sign_pubkey, const char *signer_id, size_t signer_id_len)
233 {
234 	int ret;
235 	const uint8_t *d;
236 	size_t dlen;
237 	const uint8_t *p;
238 	size_t len;
239 	const uint8_t *req_info;
240 	size_t req_info_len;
241 	int signature_algor;
242 	const uint8_t *sig;
243 	size_t siglen;
244 	SM2_SIGN_CTX sign_ctx;
245 
246 	if (asn1_sequence_from_der(&d, &dlen, &req, &reqlen) != 1
247 		|| asn1_length_is_zero(reqlen) != 1) {
248 		error_print();
249 		return -1;
250 	}
251 
252 	req_info = d;
253 	req_info_len = dlen;
254 	if (asn1_sequence_from_der(&p, &len, &d, &dlen) != 1) {
255 		error_print();
256 		return -1;
257 	}
258 	req_info_len -= dlen;
259 
260 	if (x509_signature_algor_from_der(&signature_algor, &d, &dlen) != 1
261 		|| asn1_bit_octets_from_der(&sig, &siglen, &d, &dlen) != 1
262 		|| asn1_length_is_zero(dlen) != 1) {
263 		error_print();
264 		return -1;
265 	}
266 	if (signature_algor != OID_sm2sign_with_sm3) {
267 		error_print();
268 		return -1;
269 	}
270 	if (sm2_verify_init(&sign_ctx, sign_pubkey, signer_id, signer_id_len) != 1
271 		|| sm2_verify_update(&sign_ctx, req_info, req_info_len) != 1
272 		|| (ret = sm2_verify_finish(&sign_ctx, sig, siglen)) != 1) {
273 		error_print();
274 		return -1;
275 	}
276 	return ret;
277 }
278 
x509_req_get_details(const uint8_t * req,size_t reqlen,int * version,const uint8_t ** subject,size_t * subject_len,SM2_KEY * subject_public_key,const uint8_t ** attributes,size_t * attributes_len,int * signature_algor,const uint8_t ** signature,size_t * signature_len)279 int x509_req_get_details(const uint8_t *req, size_t reqlen,
280 	int *version,
281 	const uint8_t **subject, size_t *subject_len,
282 	SM2_KEY *subject_public_key,
283 	const uint8_t **attributes, size_t *attributes_len,
284 	int *signature_algor,
285 	const uint8_t **signature, size_t *signature_len)
286 {
287 	int ver;
288 	const uint8_t *subj;
289 	size_t subj_len;
290 	SM2_KEY pub_key;
291 	const uint8_t *attrs;
292 	size_t attrs_len;
293 	int sig_alg;
294 	const uint8_t *sig;
295 	size_t siglen;
296 
297 	if (x509_request_from_der(&ver, &subj, &subj_len, &pub_key, &attrs, &attrs_len,
298 			&sig_alg, &sig, &siglen, &req, &reqlen) != 1
299 		|| asn1_length_is_zero(reqlen) != 1) {
300 		error_print();
301 		return -1;
302 	}
303 	if (version) *version = ver;
304 	if (subject) *subject = subj;
305 	if (subject_len) *subject_len = subj_len;
306 	if (subject_public_key) *subject_public_key = pub_key;
307 	if (attributes) *attributes = attrs;
308 	if (attributes_len) *attributes_len = attrs_len;
309 	if (signature_algor) *signature_algor = sig_alg;
310 	if (signature) *signature = sig;
311 	if (signature_len) *signature_len = siglen;
312 	return 1;
313 }
314 
x509_req_print(FILE * fp,int fmt,int ind,const char * label,const uint8_t * req,size_t reqlen)315 int x509_req_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *req, size_t reqlen)
316 {
317 	const uint8_t *d;
318 	size_t dlen;
319 
320 	if (asn1_sequence_from_der(&d, &dlen, &req, &reqlen) != 1
321 		|| asn1_length_is_zero(reqlen) != 1) {
322 		error_print();
323 		return -1;
324 	}
325 	x509_request_print(fp, fmt, ind, label, d, dlen);
326 	return 1;
327 }
328 
x509_req_to_pem(const uint8_t * req,size_t reqlen,FILE * fp)329 int x509_req_to_pem(const uint8_t *req, size_t reqlen, FILE *fp)
330 {
331 	if (pem_write(fp, "CERTIFICATE REQUEST", req, reqlen) <= 0) {
332 		error_print();
333 		return -1;
334 	}
335 	return 1;
336 }
337 
x509_req_from_pem(uint8_t * req,size_t * reqlen,size_t maxlen,FILE * fp)338 int x509_req_from_pem(uint8_t *req, size_t *reqlen, size_t maxlen, FILE *fp)
339 {
340 	if (pem_read(fp, "CERTIFICATE REQUEST", req, reqlen, maxlen) != 1) {
341 		error_print();
342 		return -1;
343 	}
344 	return 1;
345 }
346