1 /* $OpenBSD: x509_akey.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project 1999. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 #include <stdio.h> 60 #include <string.h> 61 62 #include <openssl/asn1.h> 63 #include <openssl/asn1t.h> 64 #include <openssl/conf.h> 65 #include <openssl/err.h> 66 #include <openssl/x509v3.h> 67 68 static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, 69 AUTHORITY_KEYID *akeyid, STACK_OF(CONF_VALUE) *extlist); 70 static AUTHORITY_KEYID *v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, 71 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *values); 72 73 const X509V3_EXT_METHOD v3_akey_id = { 74 .ext_nid = NID_authority_key_identifier, 75 .ext_flags = X509V3_EXT_MULTILINE, 76 .it = &AUTHORITY_KEYID_it, 77 .ext_new = NULL, 78 .ext_free = NULL, 79 .d2i = NULL, 80 .i2d = NULL, 81 .i2s = NULL, 82 .s2i = NULL, 83 .i2v = (X509V3_EXT_I2V)i2v_AUTHORITY_KEYID, 84 .v2i = (X509V3_EXT_V2I)v2i_AUTHORITY_KEYID, 85 .i2r = NULL, 86 .r2i = NULL, 87 .usr_data = NULL, 88 }; 89 90 static STACK_OF(CONF_VALUE) * 91 i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, AUTHORITY_KEYID *akeyid, 92 STACK_OF(CONF_VALUE) *extlist) 93 { 94 STACK_OF(CONF_VALUE) *free_extlist = NULL; 95 char *tmpstr = NULL; 96 97 if (extlist == NULL) { 98 if ((free_extlist = extlist = sk_CONF_VALUE_new_null()) == NULL) 99 return NULL; 100 } 101 102 if (akeyid->keyid != NULL) { 103 if ((tmpstr = hex_to_string(akeyid->keyid->data, 104 akeyid->keyid->length)) == NULL) 105 goto err; 106 if (!X509V3_add_value("keyid", tmpstr, &extlist)) 107 goto err; 108 free(tmpstr); 109 tmpstr = NULL; 110 } 111 112 if (akeyid->issuer != NULL) { 113 if ((extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, 114 extlist)) == NULL) 115 goto err; 116 } 117 118 if (akeyid->serial != NULL) { 119 if ((tmpstr = hex_to_string(akeyid->serial->data, 120 akeyid->serial->length)) == NULL) 121 goto err; 122 if (!X509V3_add_value("serial", tmpstr, &extlist)) 123 goto err; 124 free(tmpstr); 125 tmpstr = NULL; 126 } 127 128 if (sk_CONF_VALUE_num(extlist) <= 0) 129 goto err; 130 131 return extlist; 132 133 err: 134 free(tmpstr); 135 sk_CONF_VALUE_pop_free(free_extlist, X509V3_conf_free); 136 137 return NULL; 138 } 139 140 /* 141 * Currently two options: 142 * keyid: use the issuers subject keyid, the value 'always' means its is 143 * an error if the issuer certificate doesn't have a key id. 144 * issuer: use the issuers cert issuer and serial number. The default is 145 * to only use this if keyid is not present. With the option 'always' 146 * this is always included. 147 */ 148 static AUTHORITY_KEYID * 149 v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, 150 STACK_OF(CONF_VALUE) *values) 151 { 152 char keyid = 0, issuer = 0; 153 int i; 154 CONF_VALUE *cnf; 155 ASN1_OCTET_STRING *ikeyid = NULL; 156 X509_NAME *isname = NULL; 157 STACK_OF(GENERAL_NAME) *gens = NULL; 158 GENERAL_NAME *gen = NULL; 159 ASN1_INTEGER *serial = NULL; 160 X509_EXTENSION *ext; 161 X509 *cert; 162 AUTHORITY_KEYID *akeyid = NULL; 163 164 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { 165 cnf = sk_CONF_VALUE_value(values, i); 166 if (!strcmp(cnf->name, "keyid")) { 167 keyid = 1; 168 if (cnf->value && !strcmp(cnf->value, "always")) 169 keyid = 2; 170 } else if (!strcmp(cnf->name, "issuer")) { 171 issuer = 1; 172 if (cnf->value && !strcmp(cnf->value, "always")) 173 issuer = 2; 174 } else { 175 X509V3error(X509V3_R_UNKNOWN_OPTION); 176 ERR_asprintf_error_data("name=%s", cnf->name); 177 return NULL; 178 } 179 } 180 181 if (!ctx || !ctx->issuer_cert) { 182 if (ctx && (ctx->flags == CTX_TEST)) 183 return AUTHORITY_KEYID_new(); 184 X509V3error(X509V3_R_NO_ISSUER_CERTIFICATE); 185 return NULL; 186 } 187 188 cert = ctx->issuer_cert; 189 190 if (keyid) { 191 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1); 192 if ((i >= 0) && (ext = X509_get_ext(cert, i))) 193 ikeyid = X509V3_EXT_d2i(ext); 194 if (keyid == 2 && !ikeyid) { 195 X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_KEYID); 196 return NULL; 197 } 198 } 199 200 if ((issuer && !ikeyid) || (issuer == 2)) { 201 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 202 serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); 203 if (!isname || !serial) { 204 X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS); 205 goto err; 206 } 207 } 208 209 if (!(akeyid = AUTHORITY_KEYID_new())) 210 goto err; 211 212 if (isname) { 213 if (!(gens = sk_GENERAL_NAME_new_null()) || 214 !(gen = GENERAL_NAME_new()) || 215 !sk_GENERAL_NAME_push(gens, gen)) { 216 X509V3error(ERR_R_MALLOC_FAILURE); 217 goto err; 218 } 219 gen->type = GEN_DIRNAME; 220 gen->d.dirn = isname; 221 } 222 223 akeyid->issuer = gens; 224 akeyid->serial = serial; 225 akeyid->keyid = ikeyid; 226 227 return akeyid; 228 229 err: 230 AUTHORITY_KEYID_free(akeyid); 231 GENERAL_NAME_free(gen); 232 sk_GENERAL_NAME_free(gens); 233 X509_NAME_free(isname); 234 ASN1_INTEGER_free(serial); 235 ASN1_OCTET_STRING_free(ikeyid); 236 return NULL; 237 } 238