5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland/*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * CDDL HEADER START
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland *
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * The contents of this file are subject to the terms of the
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Common Development and Distribution License (the "License").
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * You may not use this file except in compliance with the License.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland *
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * or http://www.opensolaris.org/os/licensing.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * See the License for the specific language governing permissions
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * and limitations under the License.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland *
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * When distributing Covered Code, include this CDDL HEADER in each
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * If applicable, add the following below this CDDL HEADER, with the
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * fields enclosed by brackets "[]" replaced with your own identifying
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * information: Portions Copyright [yyyy] [name of copyright owner]
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland *
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * CDDL HEADER END
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland/*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Use is subject to license terms.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <stdio.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <stdarg.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <stdlib.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <string.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <sys/types.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <unistd.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <signal.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <locale.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <sys/param.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <openssl/bio.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <openssl/x509v3.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <openssl/ui.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <pkglib.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <libinst.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <pkgerr.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include <keystore.h>
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include "pkgadm.h"
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland#include "pkgadm_msgs.h"
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandtypedef enum {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland VerifyFailed,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland Accept,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland Reject
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland} VerifyStatus;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandstatic VerifyStatus verify_trust(X509 *);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandstatic boolean_t is_ca_cert(X509 *);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland/*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Name: addcert
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Desc: Imports a user certificate into the keystore, along with a
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * private key.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Returns: 0 on success, non-zero otherwise.
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandint
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandaddcert(int argc, char **argv)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland{
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland int i;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char keystore_file[MAXPATHLEN] = "";
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *keystore_base = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *homedir;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *passarg = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *import_passarg = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *altroot = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *prog = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *alias = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *infile = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *inkeyfile = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_encoding_format_t informat = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char *informat_str = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland int ret = 1;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland boolean_t trusted = B_FALSE;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland boolean_t implicit_trust = B_FALSE;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland FILE *certfile = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland FILE *keyfile = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland X509 *cert = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland STACK_OF(X509) *trustcerts = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland EVP_PKEY *key = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland PKG_ERR *err = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_handle_t keystore = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland while ((i = getopt(argc, argv, ":a:k:e:f:n:P:p:R:ty")) != EOF) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland switch (i) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'a':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland prog = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'k':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_base = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'e':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland inkeyfile = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'f':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland informat_str = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'n':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland alias = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'P':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland passarg = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'p':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland import_passarg = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'R':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland altroot = optarg;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 't':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland trusted = B_TRUE;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case 'y':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland implicit_trust = B_TRUE;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case ':':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MISSING_OPERAND, optopt);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* LINTED fallthrough intentional */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case '?':
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland default:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USAGE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (!trusted && alias == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* for untrusted (user) certs, we require a name */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USER_NAME);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USAGE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else if (trusted && alias != NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* for trusted certs, we cannot have a name */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TRUSTED_NAME);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USAGE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted && inkeyfile != NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* for trusted certs, we cannot have a private key */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TRUSTED_KEY);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USAGE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* last argument should be the path to the certificate */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((argc-optind) > 1) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_USAGE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else if ((argc-optind) < 1) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland infile = "stdin";
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland certfile = stdin;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG, "Loading stdin certificate");
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland infile = argv[optind];
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG, "Loading <%s> certificate",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland argv[optind]);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((certfile = fopen(infile, "r")) == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_OPEN, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * if specific key file supplied, open it, otherwise open
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * default (stdin)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (inkeyfile != NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((keyfile = fopen(inkeyfile, "r")) == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_OPEN, inkeyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland inkeyfile = "stdin";
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keyfile = stdin;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* set up proper keystore */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (altroot != NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcpy(keystore_file, altroot, MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG, altroot);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, "/", MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG, altroot);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (keystore_base == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (geteuid() == 0 || altroot != NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * If we have an alternate
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * root, then we have no choice but to use
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * root's keystore on that alternate root,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * since there is no way to resolve a
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * user's home dir given an alternate root
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, PKGSEC,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_file);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((homedir = getenv("HOME")) == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * not superuser, but no home dir, so
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * use superuser's keystore
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, PKGSEC,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_file);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, homedir,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland homedir);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, "/.pkg/security",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_file);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (strlcat(keystore_file, keystore_base,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MAXPATHLEN) >= MAXPATHLEN) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_TOO_LONG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland keystore_base);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* figure out input format */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (informat_str == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland informat = KEYSTORE_FORMAT_PEM;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (ci_streq(informat_str, "pem")) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland informat = KEYSTORE_FORMAT_PEM;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else if (ci_streq(informat_str, "der")) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland informat = KEYSTORE_FORMAT_DER;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_BAD_FORMAT, informat_str);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland err = pkgerr_new();
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* load all possible certs */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (load_all_certs(err, certfile, informat, import_passarg,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland &trustcerts) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* we must have gotten at least one cert, if not, fail */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (sk_X509_num(trustcerts) < 1) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_CERTS, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* first, try to load user certificate and key */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (load_cert_and_key(err, certfile, informat, import_passarg,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland &key, &cert) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* we must have gotten a cert, if not, fail */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (cert == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_CERTS, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (key == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * if we are importing a user cert, and did not get
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * a key, try to load it from the key file
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (keyfile == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NEED_KEY, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland "Loading private key <%s>", inkeyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (load_cert_and_key(err, keyfile, informat,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland import_passarg,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland &key, NULL) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MSG_NO_ADDKEY, inkeyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (key == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_PRIVKEY,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland inkeyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MSG_NO_ADDKEY, inkeyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* check validity date of all certificates */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland for (i = 0; i < sk_X509_num(trustcerts); i++) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* LINTED pointer cast may result in improper algnmnt */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland cert = sk_X509_value(trustcerts, i);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (check_cert(err, cert) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* check validity date of user certificate */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (check_cert_and_key(err, cert, key) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted && !implicit_trust) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * if importing more than one cert, must use implicit trust,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * because we can't ask the user to individually trust
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * each one, since there may be many
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (sk_X509_num(trustcerts) != 1) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MULTIPLE_TRUST, infile, "-y");
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* LINTED pointer cast may result in improper algnmnt */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland cert = sk_X509_value(trustcerts, 0);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* ask the user */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland switch (verify_trust(cert)) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case Accept:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* user accepted */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland break;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case Reject:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* user aborted operation */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_ADDCERT_ABORT);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland case VerifyFailed:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland default:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* now load the key store */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG, "Loading keystore <%s>", keystore_file);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland set_passphrase_prompt(MSG_KEYSTORE_PASSPROMPT);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland set_passphrase_passarg(passarg);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (open_keystore(err, keystore_file, prog, pkg_passphrase_cb,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland KEYSTORE_ACCESS_READWRITE | KEYSTORE_PATH_HARD, &keystore) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* now merge the new cert into the keystore */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG, "Merging certificate <%s>",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland get_subject_display_name(cert));
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* merge all trusted certs found */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland for (i = 0; i < sk_X509_num(trustcerts); i++) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* LINTED pointer cast may result in improper algnmnt */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland cert = sk_X509_value(trustcerts, i);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (merge_ca_cert(err, cert, keystore) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_INFO, MSG_TRUSTING,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland get_subject_display_name(cert));
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* merge user cert */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (merge_cert_and_key(err, cert, key, alias, keystore) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* now write it back out */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_DEBUG, "Closing keystore");
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland set_passphrase_prompt(MSG_KEYSTORE_PASSOUTPROMPT);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland set_passphrase_passarg(passarg);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (close_keystore(err, keystore, pkg_passphrase_cb) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_NO_ADDCERT, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (trusted) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_INFO, MSG_TRUSTED, infile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland } else {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_INFO, MSG_ADDED, infile, alias);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = 0;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* fallthrough intentional */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandcleanup:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (err != NULL)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland pkgerr_free(err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (certfile != NULL)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland (void) fclose(certfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (keyfile != NULL)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland (void) fclose(keyfile);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland return (ret);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland/* Asks user to verify certificate data before proceeding */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandstatic VerifyStatus verify_trust(X509 *cert)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland{
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland char vfy_trust = 'y';
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland VerifyStatus ret = Accept;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland PKG_ERR *err;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland UI *ui = NULL;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland err = pkgerr_new();
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* print cert data */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (print_cert(err, cert, KEYSTORE_FORMAT_TEXT,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland get_subject_display_name(cert), B_TRUE, stdout) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_pkgerr(LOG_MSG_ERR, err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((ui = UI_new()) == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MEM);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * The prompt is internationalized, but the valid
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * response values are fixed, to avoid any complex
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * multibyte processing that results in bugs
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (UI_add_input_boolean(ui, MSG_VERIFY_TRUST,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland "",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland "yY", "nN",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland UI_INPUT_FLAG_ECHO, &vfy_trust) <= 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MEM);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (UI_process(ui) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MEM);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (vfy_trust != 'y') {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = Reject;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * if the cert does not appear to be a CA cert
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * r is not self-signed, verify that as well
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (!is_ca_cert(cert)) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland UI_free(ui);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((ui = UI_new()) == NULL) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MEM);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (UI_add_input_boolean(ui,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland MSG_VERIFY_NOT_CA,
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland "",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland "yY", "nN",
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland UI_INPUT_FLAG_ECHO, &vfy_trust) <= 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (UI_process(ui) != 0) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland log_msg(LOG_MSG_ERR, MSG_MEM);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = VerifyFailed;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (vfy_trust != 'y') {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland ret = Reject;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland goto cleanup;
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandcleanup:
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (ui != NULL)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland UI_free(ui);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (err != NULL)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland pkgerr_free(err);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland return (ret);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland}
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland/*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Name: is_ca_cert
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Desc: Determines if a given certificate has the attributes
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * of a CA certificate
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * Returns: B_TRUE if certificate has attributes of a CA cert
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * B_FALSE otherwise
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandstatic boolean_t
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterlandis_ca_cert(X509 *x)
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland{
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /*
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * X509_check_purpose causes the extensions that we
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * care about to be decoded and stored in the X509
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * structure, so we must call it first
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * before checking for CA extensions in the X509
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland * structure
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland (void) X509_check_purpose(x, X509_PURPOSE_ANY, 0);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* keyUsage if present should allow cert signing */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if ((x->ex_flags & EXFLAG_KUSAGE) &&
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland !(x->ex_kusage & KU_KEY_CERT_SIGN)) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland return (B_FALSE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* If basicConstraints says not a CA then say so */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (x->ex_flags & EXFLAG_BCONS) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland if (!(x->ex_flags & EXFLAG_CA)) {
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland return (B_FALSE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland }
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland /* no explicit not-a-CA flags set, so assume that it is */
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland return (B_TRUE);
5c51f1241dbbdf2656d0e10011981411ed0c9673Moriah Waterland}