27#define X509_cert_digest X509_digest
33 if (SSL_CTX_use_certificate_chain_file(
ctx,cert) != 1)
38 if (ppwd) SSL_CTX_set_default_passwd_cb_userdata(
ctx,ppwd);
40 if (SSL_CTX_use_PrivateKey_file(
ctx,
key,SSL_FILETYPE_PEM) != 1)
43 if (SSL_CTX_check_private_key(
ctx) != 1)
51 SSL_set_options(
ssl,SSL_OP_NO_SSLv2);
52 SSL_set_options(
ssl,SSL_OP_NO_SSLv3);
68 if (flag > 20) fflag = flag - 20;
69 if (flag > 10) fflag = flag - 10;
73 if (
host.len && fflag > 4) {
74 GENERAL_NAMES *extensions = X509_get_ext_d2i(cert,NID_subject_alt_name,0,0);
75 num = sk_GENERAL_NAME_num(extensions);
77 for (i = 0; i <
num; ++i) {
78 const GENERAL_NAME *
ext = sk_GENERAL_NAME_value(extensions,i);
79 if (
ext->type == GEN_DNS) {
80 if (OBJ_sn2nid((
const char*)
ext->d.ia5) != V_ASN1_IA5STRING)
continue;
81 dnsname = (
char *)ASN1_STRING_get0_data(
ext->d.ia5);
88 X509_NAME_get_text_by_NID(X509_get_subject_name(cert),NID_commonName,
buf,
sizeof(
buf));
106 if (fflag > 3 && verify > -2) {
107 if (SSL_get_verify_result(
ssl) != X509_V_OK)
return -2;
120int dig_ascii(
char *digascii,
const char *digest,
const int len)
122 static const char hextab[] =
"0123456789abcdef";
125 for (
j = 0;
j < len;
j++) {
126 digascii[2 *
j] = hextab[(
unsigned char) digest[
j] >> 4];
127 digascii[2 *
j + 1] = hextab[(
unsigned char) digest[
j] & 0x0f];
129 digascii[2 * len] =
'\0';
141 unsigned int len = 0;
142 unsigned int size = 2048;
145 unsigned char buffer[
size];
149 if (!X509_get0_pubkey_bitstr(cert))
return 0;
151 len = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert),0);
152 if (len >
size)
return 0;
154 i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert),(
unsigned char **) &
buf2);
155 if (
buf2 -
buf != len)
return 0;
157 if (!EVP_Digest(
buf,len,md,
dlen,type,0))
return 0;
170 const EVP_MD *methodsha256 = EVP_sha256();
171 const EVP_MD *methodsha512 = EVP_sha512();
175 unsigned char digest[EVP_MAX_MD_SIZE];
176 unsigned int dlen = 0;
179 char port[FMT_ULONG];
186 if (
host.len < 2)
return 0;
193 if (dns_cname(&cn,&
sa) > 0)
197 if (
out.len < 5)
return -1;
204 if (!byte_diff(
tlsa0,
out.len - i - 3,
out.s + i + 3))
return -5;
205 usage = (
unsigned char)
out.s[i];
207 type = (
unsigned char)
out.s[i + 2];
209 unsigned len = sk_X509_num(certs);
210 for (n = 0; n < len; n++) {
211 X509 *cert = sk_X509_value(certs,n);
215 }
else if (type == 2) {
221 if (!byte_diff((
char *)digest,
dlen,
out.s + i + 3))
return ++usage;
225 }
while (i <
out.len - 4);
232 const EVP_MD *methodsha1 = EVP_sha1();
233 const EVP_MD *methodsha224 = EVP_sha224();
234 const EVP_MD *methodsha256 = EVP_sha256();
235 const EVP_MD *methodsha512 = EVP_sha512();
236 unsigned char digest[EVP_MAX_MD_SIZE];
237 unsigned char digascii[257];
241 case 40:
if (!X509_digest(cert,methodsha1,digest,&len))
return -2;
242 case 56:
if (!X509_digest(cert,methodsha224,digest,&len))
return -2;
243 case 64:
if (!X509_digest(cert,methodsha256,digest,&len))
return -2;
244 case 128:
if (!X509_digest(cert,methodsha512,digest,&len))
return -2;
248 len =
dig_ascii((
char *)digascii,(
char *)digest,len);
249 if (!str_diffn((
char *)digascii,fingerprint,len))
return 1;
256 if (SSL_shutdown(
ssl) == 0)
278 stralloc tlshost = {0};
312 for (i = 0; i < tlshost.len; ++i)
313 if ((i == 0) || (tlshost.s[i] ==
'.')) {
319 for (i = 0; i < tlshost.len; ++i)
320 if ((i == 0) || (tlshost.s[i] ==
'.')) {
326 for (i = 0; i < tlshost.len; ++i)
327 if ((i == 0) || (tlshost.s[i] ==
'.')) {
333 for (i = 0; i < tlshost.len; ++i)
334 if ((i == 0) || (tlshost.s[i] ==
'.')) {
340 for (i = 0; i < tlshost.len; ++i)
341 if ((i == 0) || (tlshost.s[i] ==
'.')) {
373 for (i = 0; i < domainname.len; ++i)
374 if ((i == 0) || (domainname.s[i] ==
'.'))
char * constmap(struct constmap *cm, char *s, int len)
int stralloc_copys(stralloc *, char const *)
int dns_tlsa(stralloc *out, const stralloc *fqdn)
void p(char *, char *, int, int, int)
int tls_fingerprint(X509 *cert, const char *fingerprint, int dlen)
int tls_checkcrl(SSL *ssl)
int X509_pkey_digest(const X509 *cert, const EVP_MD *type, unsigned char *md, unsigned int *dlen)
int tls_conn(SSL *ssl, int smtpfd)
int tls_domaincerts(stralloc domainname)
int tlsa_check(const STACK_OF(X509) *certs, const stralloc host, const unsigned long p)
int dig_ascii(char *digascii, const char *digest, const int len)
int tls_certkey(SSL_CTX *ctx, const char *cert, const char *key, char *ppwd)
int tls_destination(stralloc hostname)
tls_destination
int tls_checkpeer(SSL *ssl, X509 *cert, const stralloc host, const int flag, const int verify)
struct constmap maptlsdestinations
struct constmap mapdomaincerts