summaryrefslogtreecommitdiffstats
path: root/libopkg/opkg_pathfinder.c
blob: 01912eb87bb15c8c10642bc1cdfd883d0a32b24e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/* vi: set noexpandtab sw=4 sts=4: */
/* opkg_download.c - the opkg package management system

   Carl D. Worth

   Copyright (C) 2001 University of Southern California
   Copyright (C) 2008 OpenMoko Inc

   This program is free software; you can redistribute it and/or
   modify it under the terms of the GNU General Public License as
   published by the Free Software Foundation; either version 2, or (at
   your option) any later version.

   This program is distributed in the hope that it will be useful, but
   WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   General Public License for more details.
*/
#include "config.h"

#include <openssl/ssl.h>
#include <libpathfinder.h>

#if defined(HAVE_SSLCURL)
#include <curl/curl.h>
#endif

#include "includes.h"
#include "opkg_message.h"

#if defined(HAVE_SSLCURL) || defined(HAVE_OPENSSL)
/*
 *      This callback is called instead of X509_verify_cert to perform path
 *      validation on a certificate using pathfinder.
 *
 */
static int pathfinder_verify_callback(X509_STORE_CTX *ctx, void *arg)
{
    char *errmsg;
    const char *hex = "0123456789ABCDEF";
    size_t size = i2d_X509(ctx->cert, NULL);
    unsigned char *keybuf, *iend;
    iend = keybuf = malloc(size);
    i2d_X509(ctx->cert, &iend);
    char *certdata_str = malloc(size * 2 + 1);
    unsigned char *cp = keybuf;
    char *certdata_str_i = certdata_str;
    while (cp < iend)
    {
        unsigned char ch = *cp++;
        *certdata_str_i++ = hex[(ch >> 4) & 0xf];
        *certdata_str_i++ = hex[ch & 0xf];
    }
    *certdata_str_i = 0;
    free(keybuf);

    const char *policy = "2.5.29.32.0"; // anyPolicy
    int validated = pathfinder_dbus_verify(certdata_str, policy, 0, 0, &errmsg);

    if (!validated)
        fprintf(stderr, "curlcb_pathfinder: Path verification failed: %s", errmsg);

    free(certdata_str);
    free(errmsg);

    return validated;
}
#endif

#if defined(HAVE_OPENSSL)
int pkcs7_pathfinder_verify_signers(PKCS7* p7)
{
    STACK_OF(X509) *signers;
    int i, ret = 1; /* signers are verified by default */

    signers = PKCS7_get0_signers(p7, NULL, 0);

    for(i = 0; i < sk_X509_num(signers); i++){
	X509_STORE_CTX ctx = {
	    .cert = sk_X509_value(signers, i),
	};

	if(!pathfinder_verify_callback(&ctx, NULL)){
	    /* Signer isn't verified ! goto jail; */
	    ret = 0;
	    break;
	}
    }

    sk_X509_free(signers);
    return ret;
}
#endif

#if defined(HAVE_SSLCURL)
CURLcode curl_ssl_ctx_function(CURL * curl, void * sslctx, void * parm) {

  SSL_CTX * ctx = (SSL_CTX *) sslctx;
  SSL_CTX_set_cert_verify_callback(ctx, pathfinder_verify_callback, parm);

  return CURLE_OK ;
}
#endif