mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-05 00:00:45 -04:00
Add a pki command to sign, verify, encrypt and decrypt PKCS#7 containers
This commit is contained in:
parent
5d932e4f01
commit
47120d4977
@ -9,6 +9,7 @@ pki_SOURCES = pki.c pki.h command.c command.h \
|
||||
commands/self.c \
|
||||
commands/print.c \
|
||||
commands/signcrl.c \
|
||||
commands/pkcs7.c \
|
||||
commands/verify.c
|
||||
|
||||
pki_LDADD = $(top_builddir)/src/libstrongswan/libstrongswan.la
|
||||
|
391
src/pki/commands/pkcs7.c
Normal file
391
src/pki/commands/pkcs7.c
Normal file
@ -0,0 +1,391 @@
|
||||
/*
|
||||
* Copyright (C) 2012 Martin Willi
|
||||
* Copyright (C) 2012 revosec AG
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#include "pki.h"
|
||||
|
||||
#include <credentials/containers/pkcs7.h>
|
||||
#include <credentials/sets/mem_cred.h>
|
||||
|
||||
/**
|
||||
* Read input data as chunk
|
||||
*/
|
||||
static chunk_t read_from_stream(FILE *stream)
|
||||
{
|
||||
char buf[8096];
|
||||
size_t len, total = 0;
|
||||
|
||||
while (TRUE)
|
||||
{
|
||||
len = fread(buf + total, 1, sizeof(buf) - total, stream);
|
||||
if (len < 0)
|
||||
{
|
||||
return chunk_empty;
|
||||
}
|
||||
if (len == 0)
|
||||
{
|
||||
return chunk_clone(chunk_create(buf, total));
|
||||
}
|
||||
total += len;
|
||||
if (total == sizeof(buf))
|
||||
{
|
||||
fprintf(stderr, "buffer too small to read input!\n");
|
||||
return chunk_empty;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Write output data from chunk to stream
|
||||
*/
|
||||
static bool write_to_stream(FILE *stream, chunk_t data)
|
||||
{
|
||||
size_t len, total = 0;
|
||||
|
||||
while (total < data.len)
|
||||
{
|
||||
len = fwrite(data.ptr + total, 1, data.len - total, stream);
|
||||
if (len <= 0)
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
total += len;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/**
|
||||
* Verify PKCS#7 signed-data
|
||||
*/
|
||||
static int verify(chunk_t chunk)
|
||||
{
|
||||
container_t *container;
|
||||
enumerator_t *enumerator;
|
||||
certificate_t *cert;
|
||||
auth_cfg_t *auth;
|
||||
chunk_t data;
|
||||
bool verified = FALSE;
|
||||
|
||||
container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
|
||||
BUILD_BLOB_ASN1_DER, chunk, BUILD_END);
|
||||
if (!container)
|
||||
{
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (container->get_type(container) != CONTAINER_PKCS7_SIGNED_DATA)
|
||||
{
|
||||
fprintf(stderr, "verification failed, container is %N\n",
|
||||
container_type_names, container->get_type(container));
|
||||
container->destroy(container);
|
||||
return 1;
|
||||
}
|
||||
|
||||
enumerator = container->create_signature_enumerator(container);
|
||||
while (enumerator->enumerate(enumerator, &auth))
|
||||
{
|
||||
verified = TRUE;
|
||||
cert = auth->get(auth, AUTH_RULE_SUBJECT_CERT);
|
||||
if (cert)
|
||||
{
|
||||
fprintf(stderr, "signed by '%Y'\n", cert->get_subject(cert));
|
||||
}
|
||||
}
|
||||
enumerator->destroy(enumerator);
|
||||
|
||||
if (!verified)
|
||||
{
|
||||
fprintf(stderr, "no trusted signature found\n");
|
||||
}
|
||||
|
||||
if (verified)
|
||||
{
|
||||
if (container->get_data(container, &data))
|
||||
{
|
||||
write_to_stream(stdout, data);
|
||||
free(data.ptr);
|
||||
}
|
||||
else
|
||||
{
|
||||
verified = FALSE;
|
||||
}
|
||||
}
|
||||
container->destroy(container);
|
||||
|
||||
return verified ? 0 : 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* Sign data into PKCS#7 signed-data
|
||||
*/
|
||||
static int sign(chunk_t chunk, certificate_t *cert, private_key_t *key)
|
||||
{
|
||||
container_t *container;
|
||||
chunk_t encoding;
|
||||
int res = 1;
|
||||
|
||||
container = lib->creds->create(lib->creds,
|
||||
CRED_CONTAINER, CONTAINER_PKCS7_SIGNED_DATA,
|
||||
BUILD_BLOB, chunk,
|
||||
BUILD_SIGNING_CERT, cert,
|
||||
BUILD_SIGNING_KEY, key,
|
||||
BUILD_END);
|
||||
if (container)
|
||||
{
|
||||
if (container->get_encoding(container, &encoding))
|
||||
{
|
||||
write_to_stream(stdout, encoding);
|
||||
free(encoding.ptr);
|
||||
}
|
||||
container->destroy(container);
|
||||
}
|
||||
return res;
|
||||
}
|
||||
|
||||
/**
|
||||
* Encrypt data to a PKCS#7 enveloped-data
|
||||
*/
|
||||
static int encrypt(chunk_t chunk, certificate_t *cert)
|
||||
{
|
||||
container_t *container;
|
||||
chunk_t encoding;
|
||||
int res = 1;
|
||||
|
||||
container = lib->creds->create(lib->creds,
|
||||
CRED_CONTAINER, CONTAINER_PKCS7_ENVELOPED_DATA,
|
||||
BUILD_BLOB, chunk, BUILD_CERT, cert,
|
||||
BUILD_END);
|
||||
if (container)
|
||||
{
|
||||
if (container->get_encoding(container, &encoding))
|
||||
{
|
||||
write_to_stream(stdout, encoding);
|
||||
free(encoding.ptr);
|
||||
}
|
||||
container->destroy(container);
|
||||
}
|
||||
return res;
|
||||
}
|
||||
|
||||
/**
|
||||
* Decrypt PKCS#7 enveloped-data
|
||||
*/
|
||||
static int decrypt(chunk_t chunk)
|
||||
{
|
||||
container_t *container;
|
||||
chunk_t data;
|
||||
|
||||
container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
|
||||
BUILD_BLOB_ASN1_DER, chunk, BUILD_END);
|
||||
if (!container)
|
||||
{
|
||||
return 1;
|
||||
}
|
||||
if (container->get_type(container) != CONTAINER_PKCS7_ENVELOPED_DATA)
|
||||
{
|
||||
fprintf(stderr, "decryption failed, container is %N\n",
|
||||
container_type_names, container->get_type(container));
|
||||
container->destroy(container);
|
||||
return 1;
|
||||
}
|
||||
if (!container->get_data(container, &data))
|
||||
{
|
||||
fprintf(stderr, "PKCS#7 decryption failed\n");
|
||||
container->destroy(container);
|
||||
return 1;
|
||||
}
|
||||
|
||||
write_to_stream(stdout, data);
|
||||
free(data.ptr);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Wrap/Unwrap PKCs#7 containers
|
||||
*/
|
||||
static int pkcs7()
|
||||
{
|
||||
char *arg, *file = NULL;
|
||||
private_key_t *key = NULL;
|
||||
certificate_t *cert = NULL;
|
||||
chunk_t data = chunk_empty;
|
||||
mem_cred_t *creds;
|
||||
int res = 1;
|
||||
FILE *in;
|
||||
enum {
|
||||
OP_NONE,
|
||||
OP_SIGN,
|
||||
OP_VERIFY,
|
||||
OP_ENCRYPT,
|
||||
OP_DECRYPT,
|
||||
} op = OP_NONE;
|
||||
|
||||
creds = mem_cred_create();
|
||||
|
||||
while (TRUE)
|
||||
{
|
||||
switch (command_getopt(&arg))
|
||||
{
|
||||
case 'h':
|
||||
return command_usage(NULL);
|
||||
case 'i':
|
||||
file = arg;
|
||||
continue;
|
||||
case 's':
|
||||
if (op != OP_NONE)
|
||||
{
|
||||
goto invalid;
|
||||
}
|
||||
op = OP_SIGN;
|
||||
continue;
|
||||
case 'u':
|
||||
if (op != OP_NONE)
|
||||
{
|
||||
goto invalid;
|
||||
}
|
||||
op = OP_VERIFY;
|
||||
continue;
|
||||
case 'e':
|
||||
if (op != OP_NONE)
|
||||
{
|
||||
goto invalid;
|
||||
}
|
||||
op = OP_ENCRYPT;
|
||||
continue;
|
||||
case 'd':
|
||||
if (op != OP_NONE)
|
||||
{
|
||||
goto invalid;
|
||||
}
|
||||
op = OP_DECRYPT;
|
||||
continue;
|
||||
case 'k':
|
||||
key = lib->creds->create(lib->creds,
|
||||
CRED_PRIVATE_KEY, KEY_RSA,
|
||||
BUILD_FROM_FILE, arg, BUILD_END);
|
||||
if (!key)
|
||||
{
|
||||
fprintf(stderr, "parsing private key failed\n");
|
||||
goto end;
|
||||
}
|
||||
creds->add_key(creds, key);
|
||||
continue;
|
||||
case 'c':
|
||||
cert = lib->creds->create(lib->creds,
|
||||
CRED_CERTIFICATE, CERT_X509,
|
||||
BUILD_FROM_FILE, arg, BUILD_END);
|
||||
if (!cert)
|
||||
{
|
||||
fprintf(stderr, "parsing certificate failed\n");
|
||||
goto end;
|
||||
}
|
||||
creds->add_cert(creds, TRUE, cert);
|
||||
continue;
|
||||
case EOF:
|
||||
break;
|
||||
default:
|
||||
invalid:
|
||||
creds->destroy(creds);
|
||||
return command_usage("invalid --pkcs7 option");
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
if (file)
|
||||
{
|
||||
in = fopen(file, "r");
|
||||
if (in)
|
||||
{
|
||||
data = read_from_stream(in);
|
||||
fclose(in);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
data = read_from_stream(stdin);
|
||||
}
|
||||
|
||||
if (!data.len)
|
||||
{
|
||||
fprintf(stderr, "reading input failed!\n");
|
||||
goto end;
|
||||
}
|
||||
if (!cert)
|
||||
{
|
||||
fprintf(stderr, "requiring a certificate!\n");
|
||||
goto end;
|
||||
}
|
||||
|
||||
lib->credmgr->add_local_set(lib->credmgr, &creds->set, FALSE);
|
||||
|
||||
switch (op)
|
||||
{
|
||||
case OP_SIGN:
|
||||
if (!key)
|
||||
{
|
||||
fprintf(stderr, "signing requires a private key\n");
|
||||
res = 1;
|
||||
break;
|
||||
}
|
||||
res = sign(data, cert, key);
|
||||
break;
|
||||
case OP_VERIFY:
|
||||
res = verify(data);
|
||||
break;
|
||||
case OP_ENCRYPT:
|
||||
res = encrypt(data, cert);
|
||||
break;
|
||||
case OP_DECRYPT:
|
||||
if (!key)
|
||||
{
|
||||
fprintf(stderr, "decryption requires a private key\n");
|
||||
res = 1;
|
||||
break;
|
||||
}
|
||||
res = decrypt(data);
|
||||
break;
|
||||
default:
|
||||
res = 1;
|
||||
break;
|
||||
}
|
||||
lib->credmgr->remove_local_set(lib->credmgr, &creds->set);
|
||||
|
||||
end:
|
||||
creds->destroy(creds);
|
||||
free(data.ptr);
|
||||
return res;
|
||||
}
|
||||
|
||||
/**
|
||||
* Register the command.
|
||||
*/
|
||||
static void __attribute__ ((constructor))reg()
|
||||
{
|
||||
command_register((command_t) {
|
||||
pkcs7, '7', "pkcs7", "PKCS#7 wrap/unwrap functions",
|
||||
{"--sign | --verify | --encrypt | --decrypt",
|
||||
"--certificate+ [--key]"},
|
||||
{
|
||||
{"help", 'h', 0, "show usage information"},
|
||||
{"sign", 's', 0, "create PKCS#7 signed-data"},
|
||||
{"verify", 'u', 0, "verify PKCS#7 signed-data"},
|
||||
{"encrypt", 'e', 0, "create PKCS#7 enveloped-data"},
|
||||
{"decrypt", 'd', 0, "decrypt PKCS#7 enveloped-data"},
|
||||
{"in", 'i', 1, "input file, default: stdin"},
|
||||
{"key", 'k', 1, "path to private key for sign/decryp"},
|
||||
{"cert", 'c', 1, "path to certificate for sign/verify/encryp"},
|
||||
}
|
||||
});
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user