1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
/* vi: set noexpandtab sw=4 sts=4: */
/* opkg_download.c - the opkg package management system
Carl D. Worth
Copyright (C) 2001 University of Southern California
Copyright (C) 2008 OpenMoko Inc
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 2, or (at
your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
*/
#include "config.h"
#include <openssl/ssl.h>
#include <libpathfinder.h>
#if defined(HAVE_SSLCURL)
#include <curl/curl.h>
#endif
#include "includes.h"
#include "opkg_message.h"
#if defined(HAVE_SSLCURL) || defined(HAVE_OPENSSL)
/*
* This callback is called instead of X509_verify_cert to perform path
* validation on a certificate using pathfinder.
*
*/
static int pathfinder_verify_callback(X509_STORE_CTX *ctx, void *arg)
{
char *errmsg;
const char *hex = "0123456789ABCDEF";
size_t size = i2d_X509(ctx->cert, NULL);
unsigned char *keybuf, *iend;
iend = keybuf = malloc(size);
i2d_X509(ctx->cert, &iend);
char *certdata_str = malloc(size * 2 + 1);
unsigned char *cp = keybuf;
char *certdata_str_i = certdata_str;
while (cp < iend)
{
unsigned char ch = *cp++;
*certdata_str_i++ = hex[(ch >> 4) & 0xf];
*certdata_str_i++ = hex[ch & 0xf];
}
*certdata_str_i = 0;
free(keybuf);
const char *policy = "2.5.29.32.0"; // anyPolicy
int validated = pathfinder_dbus_verify(certdata_str, policy, 0, 0, &errmsg);
if (!validated)
fprintf(stderr, "curlcb_pathfinder: Path verification failed: %s", errmsg);
free(certdata_str);
free(errmsg);
return validated;
}
#endif
#if defined(HAVE_OPENSSL)
int pkcs7_pathfinder_verify_signers(PKCS7* p7)
{
STACK_OF(X509) *signers;
int i, ret = 1; /* signers are verified by default */
signers = PKCS7_get0_signers(p7, NULL, 0);
for(i = 0; i < sk_X509_num(signers); i++){
X509_STORE_CTX ctx = {
.cert = sk_X509_value(signers, i),
};
if(!pathfinder_verify_callback(&ctx, NULL)){
/* Signer isn't verified ! goto jail; */
ret = 0;
break;
}
}
sk_X509_free(signers);
return ret;
}
#endif
#if defined(HAVE_SSLCURL)
CURLcode curl_ssl_ctx_function(CURL * curl, void * sslctx, void * parm) {
SSL_CTX * ctx = (SSL_CTX *) sslctx;
SSL_CTX_set_cert_verify_callback(ctx, pathfinder_verify_callback, parm);
return CURLE_OK ;
}
#endif
|