xref: /freebsd/crypto/heimdal/lib/hx509/revoke.c (revision 0957b409)
1 /*
2  * Copyright (c) 2006 - 2007 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 /**
35  * @page page_revoke Revocation methods
36  *
37  * There are two revocation method for PKIX/X.509: CRL and OCSP.
38  * Revocation is needed if the private key is lost and
39  * stolen. Depending on how picky you are, you might want to make
40  * revocation for destroyed private keys too (smartcard broken), but
41  * that should not be a problem.
42  *
43  * CRL is a list of certifiates that have expired.
44  *
45  * OCSP is an online checking method where the requestor sends a list
46  * of certificates to the OCSP server to return a signed reply if they
47  * are valid or not. Some services sends a OCSP reply as part of the
48  * hand-shake to make the revoktion decision simpler/faster for the
49  * client.
50  */
51 
52 #include "hx_locl.h"
53 
54 struct revoke_crl {
55     char *path;
56     time_t last_modfied;
57     CRLCertificateList crl;
58     int verified;
59     int failed_verify;
60 };
61 
62 struct revoke_ocsp {
63     char *path;
64     time_t last_modfied;
65     OCSPBasicOCSPResponse ocsp;
66     hx509_certs certs;
67     hx509_cert signer;
68 };
69 
70 
71 struct hx509_revoke_ctx_data {
72     unsigned int ref;
73     struct {
74 	struct revoke_crl *val;
75 	size_t len;
76     } crls;
77     struct {
78 	struct revoke_ocsp *val;
79 	size_t len;
80     } ocsps;
81 };
82 
83 /**
84  * Allocate a revokation context. Free with hx509_revoke_free().
85  *
86  * @param context A hx509 context.
87  * @param ctx returns a newly allocated revokation context.
88  *
89  * @return An hx509 error code, see hx509_get_error_string().
90  *
91  * @ingroup hx509_revoke
92  */
93 
94 int
95 hx509_revoke_init(hx509_context context, hx509_revoke_ctx *ctx)
96 {
97     *ctx = calloc(1, sizeof(**ctx));
98     if (*ctx == NULL)
99 	return ENOMEM;
100 
101     (*ctx)->ref = 1;
102     (*ctx)->crls.len = 0;
103     (*ctx)->crls.val = NULL;
104     (*ctx)->ocsps.len = 0;
105     (*ctx)->ocsps.val = NULL;
106 
107     return 0;
108 }
109 
110 hx509_revoke_ctx
111 _hx509_revoke_ref(hx509_revoke_ctx ctx)
112 {
113     if (ctx == NULL)
114 	return NULL;
115     if (ctx->ref == 0)
116 	_hx509_abort("revoke ctx refcount == 0 on ref");
117     ctx->ref++;
118     if (ctx->ref == UINT_MAX)
119 	_hx509_abort("revoke ctx refcount == UINT_MAX on ref");
120     return ctx;
121 }
122 
123 static void
124 free_ocsp(struct revoke_ocsp *ocsp)
125 {
126     free(ocsp->path);
127     free_OCSPBasicOCSPResponse(&ocsp->ocsp);
128     hx509_certs_free(&ocsp->certs);
129     hx509_cert_free(ocsp->signer);
130 }
131 
132 /**
133  * Free a hx509 revokation context.
134  *
135  * @param ctx context to be freed
136  *
137  * @ingroup hx509_revoke
138  */
139 
140 void
141 hx509_revoke_free(hx509_revoke_ctx *ctx)
142 {
143     size_t i ;
144 
145     if (ctx == NULL || *ctx == NULL)
146 	return;
147 
148     if ((*ctx)->ref == 0)
149 	_hx509_abort("revoke ctx refcount == 0 on free");
150     if (--(*ctx)->ref > 0)
151 	return;
152 
153     for (i = 0; i < (*ctx)->crls.len; i++) {
154 	free((*ctx)->crls.val[i].path);
155 	free_CRLCertificateList(&(*ctx)->crls.val[i].crl);
156     }
157 
158     for (i = 0; i < (*ctx)->ocsps.len; i++)
159 	free_ocsp(&(*ctx)->ocsps.val[i]);
160     free((*ctx)->ocsps.val);
161 
162     free((*ctx)->crls.val);
163 
164     memset(*ctx, 0, sizeof(**ctx));
165     free(*ctx);
166     *ctx = NULL;
167 }
168 
169 static int
170 verify_ocsp(hx509_context context,
171 	    struct revoke_ocsp *ocsp,
172 	    time_t time_now,
173 	    hx509_certs certs,
174 	    hx509_cert parent)
175 {
176     hx509_cert signer = NULL;
177     hx509_query q;
178     int ret;
179 
180     _hx509_query_clear(&q);
181 
182     /*
183      * Need to match on issuer too in case there are two CA that have
184      * issued the same name to a certificate. One example of this is
185      * the www.openvalidation.org test's ocsp validator.
186      */
187 
188     q.match = HX509_QUERY_MATCH_ISSUER_NAME;
189     q.issuer_name = &_hx509_get_cert(parent)->tbsCertificate.issuer;
190 
191     switch(ocsp->ocsp.tbsResponseData.responderID.element) {
192     case choice_OCSPResponderID_byName:
193 	q.match |= HX509_QUERY_MATCH_SUBJECT_NAME;
194 	q.subject_name = &ocsp->ocsp.tbsResponseData.responderID.u.byName;
195 	break;
196     case choice_OCSPResponderID_byKey:
197 	q.match |= HX509_QUERY_MATCH_KEY_HASH_SHA1;
198 	q.keyhash_sha1 = &ocsp->ocsp.tbsResponseData.responderID.u.byKey;
199 	break;
200     }
201 
202     ret = hx509_certs_find(context, certs, &q, &signer);
203     if (ret && ocsp->certs)
204 	ret = hx509_certs_find(context, ocsp->certs, &q, &signer);
205     if (ret)
206 	goto out;
207 
208     /*
209      * If signer certificate isn't the CA certificate, lets check the
210      * it is the CA that signed the signer certificate and the OCSP EKU
211      * is set.
212      */
213     if (hx509_cert_cmp(signer, parent) != 0) {
214 	Certificate *p = _hx509_get_cert(parent);
215 	Certificate *s = _hx509_get_cert(signer);
216 
217 	ret = _hx509_cert_is_parent_cmp(s, p, 0);
218 	if (ret != 0) {
219 	    ret = HX509_PARENT_NOT_CA;
220 	    hx509_set_error_string(context, 0, ret, "Revoke OCSP signer is "
221 				   "doesn't have CA as signer certificate");
222 	    goto out;
223 	}
224 
225 	ret = _hx509_verify_signature_bitstring(context,
226 						parent,
227 						&s->signatureAlgorithm,
228 						&s->tbsCertificate._save,
229 						&s->signatureValue);
230 	if (ret) {
231 	    hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
232 				   "OCSP signer signature invalid");
233 	    goto out;
234 	}
235 
236 	ret = hx509_cert_check_eku(context, signer,
237 				   &asn1_oid_id_pkix_kp_OCSPSigning, 0);
238 	if (ret)
239 	    goto out;
240     }
241 
242     ret = _hx509_verify_signature_bitstring(context,
243 					    signer,
244 					    &ocsp->ocsp.signatureAlgorithm,
245 					    &ocsp->ocsp.tbsResponseData._save,
246 					    &ocsp->ocsp.signature);
247     if (ret) {
248 	hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
249 			       "OCSP signature invalid");
250 	goto out;
251     }
252 
253     ocsp->signer = signer;
254     signer = NULL;
255 out:
256     if (signer)
257 	hx509_cert_free(signer);
258 
259     return ret;
260 }
261 
262 /*
263  *
264  */
265 
266 static int
267 parse_ocsp_basic(const void *data, size_t length, OCSPBasicOCSPResponse *basic)
268 {
269     OCSPResponse resp;
270     size_t size;
271     int ret;
272 
273     memset(basic, 0, sizeof(*basic));
274 
275     ret = decode_OCSPResponse(data, length, &resp, &size);
276     if (ret)
277 	return ret;
278     if (length != size) {
279 	free_OCSPResponse(&resp);
280 	return ASN1_EXTRA_DATA;
281     }
282 
283     switch (resp.responseStatus) {
284     case successful:
285 	break;
286     default:
287 	free_OCSPResponse(&resp);
288 	return HX509_REVOKE_WRONG_DATA;
289     }
290 
291     if (resp.responseBytes == NULL) {
292 	free_OCSPResponse(&resp);
293 	return EINVAL;
294     }
295 
296     ret = der_heim_oid_cmp(&resp.responseBytes->responseType,
297 			   &asn1_oid_id_pkix_ocsp_basic);
298     if (ret != 0) {
299 	free_OCSPResponse(&resp);
300 	return HX509_REVOKE_WRONG_DATA;
301     }
302 
303     ret = decode_OCSPBasicOCSPResponse(resp.responseBytes->response.data,
304 				       resp.responseBytes->response.length,
305 				       basic,
306 				       &size);
307     if (ret) {
308 	free_OCSPResponse(&resp);
309 	return ret;
310     }
311     if (size != resp.responseBytes->response.length) {
312 	free_OCSPResponse(&resp);
313 	free_OCSPBasicOCSPResponse(basic);
314 	return ASN1_EXTRA_DATA;
315     }
316     free_OCSPResponse(&resp);
317 
318     return 0;
319 }
320 
321 /*
322  *
323  */
324 
325 static int
326 load_ocsp(hx509_context context, struct revoke_ocsp *ocsp)
327 {
328     OCSPBasicOCSPResponse basic;
329     hx509_certs certs = NULL;
330     size_t length;
331     struct stat sb;
332     void *data;
333     int ret;
334 
335     ret = rk_undumpdata(ocsp->path, &data, &length);
336     if (ret)
337 	return ret;
338 
339     ret = stat(ocsp->path, &sb);
340     if (ret)
341 	return errno;
342 
343     ret = parse_ocsp_basic(data, length, &basic);
344     rk_xfree(data);
345     if (ret) {
346 	hx509_set_error_string(context, 0, ret,
347 			       "Failed to parse OCSP response");
348 	return ret;
349     }
350 
351     if (basic.certs) {
352 	size_t i;
353 
354 	ret = hx509_certs_init(context, "MEMORY:ocsp-certs", 0,
355 			       NULL, &certs);
356 	if (ret) {
357 	    free_OCSPBasicOCSPResponse(&basic);
358 	    return ret;
359 	}
360 
361 	for (i = 0; i < basic.certs->len; i++) {
362 	    hx509_cert c;
363 
364 	    ret = hx509_cert_init(context, &basic.certs->val[i], &c);
365 	    if (ret)
366 		continue;
367 
368 	    ret = hx509_certs_add(context, certs, c);
369 	    hx509_cert_free(c);
370 	    if (ret)
371 		continue;
372 	}
373     }
374 
375     ocsp->last_modfied = sb.st_mtime;
376 
377     free_OCSPBasicOCSPResponse(&ocsp->ocsp);
378     hx509_certs_free(&ocsp->certs);
379     hx509_cert_free(ocsp->signer);
380 
381     ocsp->ocsp = basic;
382     ocsp->certs = certs;
383     ocsp->signer = NULL;
384 
385     return 0;
386 }
387 
388 /**
389  * Add a OCSP file to the revokation context.
390  *
391  * @param context hx509 context
392  * @param ctx hx509 revokation context
393  * @param path path to file that is going to be added to the context.
394  *
395  * @return An hx509 error code, see hx509_get_error_string().
396  *
397  * @ingroup hx509_revoke
398  */
399 
400 int
401 hx509_revoke_add_ocsp(hx509_context context,
402 		      hx509_revoke_ctx ctx,
403 		      const char *path)
404 {
405     void *data;
406     int ret;
407     size_t i;
408 
409     if (strncmp(path, "FILE:", 5) != 0) {
410 	hx509_set_error_string(context, 0, HX509_UNSUPPORTED_OPERATION,
411 			       "unsupport type in %s", path);
412 	return HX509_UNSUPPORTED_OPERATION;
413     }
414 
415     path += 5;
416 
417     for (i = 0; i < ctx->ocsps.len; i++) {
418 	if (strcmp(ctx->ocsps.val[0].path, path) == 0)
419 	    return 0;
420     }
421 
422     data = realloc(ctx->ocsps.val,
423 		   (ctx->ocsps.len + 1) * sizeof(ctx->ocsps.val[0]));
424     if (data == NULL) {
425 	hx509_clear_error_string(context);
426 	return ENOMEM;
427     }
428 
429     ctx->ocsps.val = data;
430 
431     memset(&ctx->ocsps.val[ctx->ocsps.len], 0,
432 	   sizeof(ctx->ocsps.val[0]));
433 
434     ctx->ocsps.val[ctx->ocsps.len].path = strdup(path);
435     if (ctx->ocsps.val[ctx->ocsps.len].path == NULL) {
436 	hx509_clear_error_string(context);
437 	return ENOMEM;
438     }
439 
440     ret = load_ocsp(context, &ctx->ocsps.val[ctx->ocsps.len]);
441     if (ret) {
442 	free(ctx->ocsps.val[ctx->ocsps.len].path);
443 	return ret;
444     }
445     ctx->ocsps.len++;
446 
447     return ret;
448 }
449 
450 /*
451  *
452  */
453 
454 static int
455 verify_crl(hx509_context context,
456 	   hx509_revoke_ctx ctx,
457 	   CRLCertificateList *crl,
458 	   time_t time_now,
459 	   hx509_certs certs,
460 	   hx509_cert parent)
461 {
462     hx509_cert signer;
463     hx509_query q;
464     time_t t;
465     int ret;
466 
467     t = _hx509_Time2time_t(&crl->tbsCertList.thisUpdate);
468     if (t > time_now) {
469 	hx509_set_error_string(context, 0, HX509_CRL_USED_BEFORE_TIME,
470 			       "CRL used before time");
471 	return HX509_CRL_USED_BEFORE_TIME;
472     }
473 
474     if (crl->tbsCertList.nextUpdate == NULL) {
475 	hx509_set_error_string(context, 0, HX509_CRL_INVALID_FORMAT,
476 			       "CRL missing nextUpdate");
477 	return HX509_CRL_INVALID_FORMAT;
478     }
479 
480     t = _hx509_Time2time_t(crl->tbsCertList.nextUpdate);
481     if (t < time_now) {
482 	hx509_set_error_string(context, 0, HX509_CRL_USED_AFTER_TIME,
483 			       "CRL used after time");
484 	return HX509_CRL_USED_AFTER_TIME;
485     }
486 
487     _hx509_query_clear(&q);
488 
489     /*
490      * If it's the signer have CRLSIGN bit set, use that as the signer
491      * cert for the certificate, otherwise, search for a certificate.
492      */
493     if (_hx509_check_key_usage(context, parent, 1 << 6, FALSE) == 0) {
494 	signer = hx509_cert_ref(parent);
495     } else {
496 	q.match = HX509_QUERY_MATCH_SUBJECT_NAME;
497 	q.match |= HX509_QUERY_KU_CRLSIGN;
498 	q.subject_name = &crl->tbsCertList.issuer;
499 
500 	ret = hx509_certs_find(context, certs, &q, &signer);
501 	if (ret) {
502 	    hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
503 				   "Failed to find certificate for CRL");
504 	    return ret;
505 	}
506     }
507 
508     ret = _hx509_verify_signature_bitstring(context,
509 					    signer,
510 					    &crl->signatureAlgorithm,
511 					    &crl->tbsCertList._save,
512 					    &crl->signatureValue);
513     if (ret) {
514 	hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
515 			       "CRL signature invalid");
516 	goto out;
517     }
518 
519     /*
520      * If signer is not CA cert, need to check revoke status of this
521      * CRL signing cert too, this include all parent CRL signer cert
522      * up to the root *sigh*, assume root at least hve CERTSIGN flag
523      * set.
524      */
525     while (_hx509_check_key_usage(context, signer, 1 << 5, TRUE)) {
526 	hx509_cert crl_parent;
527 
528 	_hx509_query_clear(&q);
529 
530 	q.match = HX509_QUERY_MATCH_SUBJECT_NAME;
531 	q.match |= HX509_QUERY_KU_CRLSIGN;
532 	q.subject_name = &_hx509_get_cert(signer)->tbsCertificate.issuer;
533 
534 	ret = hx509_certs_find(context, certs, &q, &crl_parent);
535 	if (ret) {
536 	    hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
537 				   "Failed to find parent of CRL signer");
538 	    goto out;
539 	}
540 
541 	ret = hx509_revoke_verify(context,
542 				  ctx,
543 				  certs,
544 				  time_now,
545 				  signer,
546 				  crl_parent);
547 	hx509_cert_free(signer);
548 	signer = crl_parent;
549 	if (ret) {
550 	    hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
551 				   "Failed to verify revoke "
552 				   "status of CRL signer");
553 	    goto out;
554 	}
555     }
556 
557 out:
558     hx509_cert_free(signer);
559 
560     return ret;
561 }
562 
563 static int
564 load_crl(const char *path, time_t *t, CRLCertificateList *crl)
565 {
566     size_t length, size;
567     struct stat sb;
568     void *data;
569     int ret;
570 
571     memset(crl, 0, sizeof(*crl));
572 
573     ret = rk_undumpdata(path, &data, &length);
574     if (ret)
575 	return ret;
576 
577     ret = stat(path, &sb);
578     if (ret)
579 	return errno;
580 
581     *t = sb.st_mtime;
582 
583     ret = decode_CRLCertificateList(data, length, crl, &size);
584     rk_xfree(data);
585     if (ret)
586 	return ret;
587 
588     /* check signature is aligned */
589     if (crl->signatureValue.length & 7) {
590 	free_CRLCertificateList(crl);
591 	return HX509_CRYPTO_SIG_INVALID_FORMAT;
592     }
593     return 0;
594 }
595 
596 /**
597  * Add a CRL file to the revokation context.
598  *
599  * @param context hx509 context
600  * @param ctx hx509 revokation context
601  * @param path path to file that is going to be added to the context.
602  *
603  * @return An hx509 error code, see hx509_get_error_string().
604  *
605  * @ingroup hx509_revoke
606  */
607 
608 int
609 hx509_revoke_add_crl(hx509_context context,
610 		     hx509_revoke_ctx ctx,
611 		     const char *path)
612 {
613     void *data;
614     size_t i;
615     int ret;
616 
617     if (strncmp(path, "FILE:", 5) != 0) {
618 	hx509_set_error_string(context, 0, HX509_UNSUPPORTED_OPERATION,
619 			       "unsupport type in %s", path);
620 	return HX509_UNSUPPORTED_OPERATION;
621     }
622 
623 
624     path += 5;
625 
626     for (i = 0; i < ctx->crls.len; i++) {
627 	if (strcmp(ctx->crls.val[0].path, path) == 0)
628 	    return 0;
629     }
630 
631     data = realloc(ctx->crls.val,
632 		   (ctx->crls.len + 1) * sizeof(ctx->crls.val[0]));
633     if (data == NULL) {
634 	hx509_clear_error_string(context);
635 	return ENOMEM;
636     }
637     ctx->crls.val = data;
638 
639     memset(&ctx->crls.val[ctx->crls.len], 0, sizeof(ctx->crls.val[0]));
640 
641     ctx->crls.val[ctx->crls.len].path = strdup(path);
642     if (ctx->crls.val[ctx->crls.len].path == NULL) {
643 	hx509_clear_error_string(context);
644 	return ENOMEM;
645     }
646 
647     ret = load_crl(path,
648 		   &ctx->crls.val[ctx->crls.len].last_modfied,
649 		   &ctx->crls.val[ctx->crls.len].crl);
650     if (ret) {
651 	free(ctx->crls.val[ctx->crls.len].path);
652 	return ret;
653     }
654 
655     ctx->crls.len++;
656 
657     return ret;
658 }
659 
660 /**
661  * Check that a certificate is not expired according to a revokation
662  * context. Also need the parent certificte to the check OCSP
663  * parent identifier.
664  *
665  * @param context hx509 context
666  * @param ctx hx509 revokation context
667  * @param certs
668  * @param now
669  * @param cert
670  * @param parent_cert
671  *
672  * @return An hx509 error code, see hx509_get_error_string().
673  *
674  * @ingroup hx509_revoke
675  */
676 
677 
678 int
679 hx509_revoke_verify(hx509_context context,
680 		    hx509_revoke_ctx ctx,
681 		    hx509_certs certs,
682 		    time_t now,
683 		    hx509_cert cert,
684 		    hx509_cert parent_cert)
685 {
686     const Certificate *c = _hx509_get_cert(cert);
687     const Certificate *p = _hx509_get_cert(parent_cert);
688     unsigned long i, j, k;
689     int ret;
690 
691     hx509_clear_error_string(context);
692 
693     for (i = 0; i < ctx->ocsps.len; i++) {
694 	struct revoke_ocsp *ocsp = &ctx->ocsps.val[i];
695 	struct stat sb;
696 
697 	/* check this ocsp apply to this cert */
698 
699 	/* check if there is a newer version of the file */
700 	ret = stat(ocsp->path, &sb);
701 	if (ret == 0 && ocsp->last_modfied != sb.st_mtime) {
702 	    ret = load_ocsp(context, ocsp);
703 	    if (ret)
704 		continue;
705 	}
706 
707 	/* verify signature in ocsp if not already done */
708 	if (ocsp->signer == NULL) {
709 	    ret = verify_ocsp(context, ocsp, now, certs, parent_cert);
710 	    if (ret)
711 		continue;
712 	}
713 
714 	for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) {
715 	    heim_octet_string os;
716 
717 	    ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber,
718 				   &c->tbsCertificate.serialNumber);
719 	    if (ret != 0)
720 		continue;
721 
722 	    /* verify issuer hashes hash */
723 	    ret = _hx509_verify_signature(context,
724 					  NULL,
725 					  &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm,
726 					  &c->tbsCertificate.issuer._save,
727 					  &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash);
728 	    if (ret != 0)
729 		continue;
730 
731 	    os.data = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data;
732 	    os.length = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8;
733 
734 	    ret = _hx509_verify_signature(context,
735 					  NULL,
736 					  &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm,
737 					  &os,
738 					  &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash);
739 	    if (ret != 0)
740 		continue;
741 
742 	    switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) {
743 	    case choice_OCSPCertStatus_good:
744 		break;
745 	    case choice_OCSPCertStatus_revoked:
746 		hx509_set_error_string(context, 0,
747 				       HX509_CERT_REVOKED,
748 				       "Certificate revoked by issuer in OCSP");
749 		return HX509_CERT_REVOKED;
750 	    case choice_OCSPCertStatus_unknown:
751 		continue;
752 	    }
753 
754 	    /* don't allow the update to be in the future */
755 	    if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate >
756 		now + context->ocsp_time_diff)
757 		continue;
758 
759 	    /* don't allow the next update to be in the past */
760 	    if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) {
761 		if (*ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate < now)
762 		    continue;
763 	    } /* else should force a refetch, but can we ? */
764 
765 	    return 0;
766 	}
767     }
768 
769     for (i = 0; i < ctx->crls.len; i++) {
770 	struct revoke_crl *crl = &ctx->crls.val[i];
771 	struct stat sb;
772 	int diff;
773 
774 	/* check if cert.issuer == crls.val[i].crl.issuer */
775 	ret = _hx509_name_cmp(&c->tbsCertificate.issuer,
776 			      &crl->crl.tbsCertList.issuer, &diff);
777 	if (ret || diff)
778 	    continue;
779 
780 	ret = stat(crl->path, &sb);
781 	if (ret == 0 && crl->last_modfied != sb.st_mtime) {
782 	    CRLCertificateList cl;
783 
784 	    ret = load_crl(crl->path, &crl->last_modfied, &cl);
785 	    if (ret == 0) {
786 		free_CRLCertificateList(&crl->crl);
787 		crl->crl = cl;
788 		crl->verified = 0;
789 		crl->failed_verify = 0;
790 	    }
791 	}
792 	if (crl->failed_verify)
793 	    continue;
794 
795 	/* verify signature in crl if not already done */
796 	if (crl->verified == 0) {
797 	    ret = verify_crl(context, ctx, &crl->crl, now, certs, parent_cert);
798 	    if (ret) {
799 		crl->failed_verify = 1;
800 		continue;
801 	    }
802 	    crl->verified = 1;
803 	}
804 
805 	if (crl->crl.tbsCertList.crlExtensions) {
806 	    for (j = 0; j < crl->crl.tbsCertList.crlExtensions->len; j++) {
807 		if (crl->crl.tbsCertList.crlExtensions->val[j].critical) {
808 		    hx509_set_error_string(context, 0,
809 					   HX509_CRL_UNKNOWN_EXTENSION,
810 					   "Unknown CRL extension");
811 		    return HX509_CRL_UNKNOWN_EXTENSION;
812 		}
813 	    }
814 	}
815 
816 	if (crl->crl.tbsCertList.revokedCertificates == NULL)
817 	    return 0;
818 
819 	/* check if cert is in crl */
820 	for (j = 0; j < crl->crl.tbsCertList.revokedCertificates->len; j++) {
821 	    time_t t;
822 
823 	    ret = der_heim_integer_cmp(&crl->crl.tbsCertList.revokedCertificates->val[j].userCertificate,
824 				       &c->tbsCertificate.serialNumber);
825 	    if (ret != 0)
826 		continue;
827 
828 	    t = _hx509_Time2time_t(&crl->crl.tbsCertList.revokedCertificates->val[j].revocationDate);
829 	    if (t > now)
830 		continue;
831 
832 	    if (crl->crl.tbsCertList.revokedCertificates->val[j].crlEntryExtensions)
833 		for (k = 0; k < crl->crl.tbsCertList.revokedCertificates->val[j].crlEntryExtensions->len; k++)
834 		    if (crl->crl.tbsCertList.revokedCertificates->val[j].crlEntryExtensions->val[k].critical)
835 			return HX509_CRL_UNKNOWN_EXTENSION;
836 
837 	    hx509_set_error_string(context, 0,
838 				   HX509_CERT_REVOKED,
839 				   "Certificate revoked by issuer in CRL");
840 	    return HX509_CERT_REVOKED;
841 	}
842 
843 	return 0;
844     }
845 
846 
847     if (context->flags & HX509_CTX_VERIFY_MISSING_OK)
848 	return 0;
849     hx509_set_error_string(context, HX509_ERROR_APPEND,
850 			   HX509_REVOKE_STATUS_MISSING,
851 			   "No revoke status found for "
852 			   "certificates");
853     return HX509_REVOKE_STATUS_MISSING;
854 }
855 
856 struct ocsp_add_ctx {
857     OCSPTBSRequest *req;
858     hx509_certs certs;
859     const AlgorithmIdentifier *digest;
860     hx509_cert parent;
861 };
862 
863 static int
864 add_to_req(hx509_context context, void *ptr, hx509_cert cert)
865 {
866     struct ocsp_add_ctx *ctx = ptr;
867     OCSPInnerRequest *one;
868     hx509_cert parent = NULL;
869     Certificate *p, *c = _hx509_get_cert(cert);
870     heim_octet_string os;
871     int ret;
872     hx509_query q;
873     void *d;
874 
875     d = realloc(ctx->req->requestList.val,
876 		sizeof(ctx->req->requestList.val[0]) *
877 		(ctx->req->requestList.len + 1));
878     if (d == NULL)
879 	return ENOMEM;
880     ctx->req->requestList.val = d;
881 
882     one = &ctx->req->requestList.val[ctx->req->requestList.len];
883     memset(one, 0, sizeof(*one));
884 
885     _hx509_query_clear(&q);
886 
887     q.match |= HX509_QUERY_FIND_ISSUER_CERT;
888     q.subject = c;
889 
890     ret = hx509_certs_find(context, ctx->certs, &q, &parent);
891     if (ret)
892 	goto out;
893 
894     if (ctx->parent) {
895 	if (hx509_cert_cmp(ctx->parent, parent) != 0) {
896 	    ret = HX509_REVOKE_NOT_SAME_PARENT;
897 	    hx509_set_error_string(context, 0, ret,
898 				   "Not same parent certifate as "
899 				   "last certificate in request");
900 	    goto out;
901 	}
902     } else
903 	ctx->parent = hx509_cert_ref(parent);
904 
905     p = _hx509_get_cert(parent);
906 
907     ret = copy_AlgorithmIdentifier(ctx->digest, &one->reqCert.hashAlgorithm);
908     if (ret)
909 	goto out;
910 
911     ret = _hx509_create_signature(context,
912 				  NULL,
913 				  &one->reqCert.hashAlgorithm,
914 				  &c->tbsCertificate.issuer._save,
915 				  NULL,
916 				  &one->reqCert.issuerNameHash);
917     if (ret)
918 	goto out;
919 
920     os.data = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data;
921     os.length =
922 	p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8;
923 
924     ret = _hx509_create_signature(context,
925 				  NULL,
926 				  &one->reqCert.hashAlgorithm,
927 				  &os,
928 				  NULL,
929 				  &one->reqCert.issuerKeyHash);
930     if (ret)
931 	goto out;
932 
933     ret = copy_CertificateSerialNumber(&c->tbsCertificate.serialNumber,
934 				       &one->reqCert.serialNumber);
935     if (ret)
936 	goto out;
937 
938     ctx->req->requestList.len++;
939 out:
940     hx509_cert_free(parent);
941     if (ret) {
942 	free_OCSPInnerRequest(one);
943 	memset(one, 0, sizeof(*one));
944     }
945 
946     return ret;
947 }
948 
949 /**
950  * Create an OCSP request for a set of certificates.
951  *
952  * @param context a hx509 context
953  * @param reqcerts list of certificates to request ocsp data for
954  * @param pool certificate pool to use when signing
955  * @param signer certificate to use to sign the request
956  * @param digest the signing algorithm in the request, if NULL use the
957  * default signature algorithm,
958  * @param request the encoded request, free with free_heim_octet_string().
959  * @param nonce nonce in the request, free with free_heim_octet_string().
960  *
961  * @return An hx509 error code, see hx509_get_error_string().
962  *
963  * @ingroup hx509_revoke
964  */
965 
966 int
967 hx509_ocsp_request(hx509_context context,
968 		   hx509_certs reqcerts,
969 		   hx509_certs pool,
970 		   hx509_cert signer,
971 		   const AlgorithmIdentifier *digest,
972 		   heim_octet_string *request,
973 		   heim_octet_string *nonce)
974 {
975     OCSPRequest req;
976     size_t size;
977     int ret;
978     struct ocsp_add_ctx ctx;
979     Extensions *es;
980 
981     memset(&req, 0, sizeof(req));
982 
983     if (digest == NULL)
984 	digest = _hx509_crypto_default_digest_alg;
985 
986     ctx.req = &req.tbsRequest;
987     ctx.certs = pool;
988     ctx.digest = digest;
989     ctx.parent = NULL;
990 
991     ret = hx509_certs_iter_f(context, reqcerts, add_to_req, &ctx);
992     hx509_cert_free(ctx.parent);
993     if (ret)
994 	goto out;
995 
996     if (nonce) {
997 	req.tbsRequest.requestExtensions =
998 	    calloc(1, sizeof(*req.tbsRequest.requestExtensions));
999 	if (req.tbsRequest.requestExtensions == NULL) {
1000 	    ret = ENOMEM;
1001 	    goto out;
1002 	}
1003 
1004 	es = req.tbsRequest.requestExtensions;
1005 
1006 	es->val = calloc(es->len, sizeof(es->val[0]));
1007 	if (es->val == NULL) {
1008 	    ret = ENOMEM;
1009 	    goto out;
1010 	}
1011 	es->len = 1;
1012 	ret = der_copy_oid(&asn1_oid_id_pkix_ocsp_nonce, &es->val[0].extnID);
1013 	if (ret) {
1014 	    free_OCSPRequest(&req);
1015 	    return ret;
1016 	}
1017 
1018 	es->val[0].extnValue.data = malloc(10);
1019 	if (es->val[0].extnValue.data == NULL) {
1020 	    ret = ENOMEM;
1021 	    goto out;
1022 	}
1023 	es->val[0].extnValue.length = 10;
1024 
1025 	ret = RAND_bytes(es->val[0].extnValue.data,
1026 			 es->val[0].extnValue.length);
1027 	if (ret != 1) {
1028 	    ret = HX509_CRYPTO_INTERNAL_ERROR;
1029 	    goto out;
1030 	}
1031 	ret = der_copy_octet_string(nonce, &es->val[0].extnValue);
1032 	if (ret) {
1033 	    ret = ENOMEM;
1034 	    goto out;
1035 	}
1036     }
1037 
1038     ASN1_MALLOC_ENCODE(OCSPRequest, request->data, request->length,
1039 		       &req, &size, ret);
1040     free_OCSPRequest(&req);
1041     if (ret)
1042 	goto out;
1043     if (size != request->length)
1044 	_hx509_abort("internal ASN.1 encoder error");
1045 
1046     return 0;
1047 
1048 out:
1049     free_OCSPRequest(&req);
1050     return ret;
1051 }
1052 
1053 static char *
1054 printable_time(time_t t)
1055 {
1056     static char s[128];
1057     char *p;
1058     if ((p = ctime(&t)) == NULL)
1059        strlcpy(s, "?", sizeof(s));
1060     else {
1061        strlcpy(s, p + 4, sizeof(s));
1062        s[20] = 0;
1063     }
1064     return s;
1065 }
1066 
1067 /**
1068  * Print the OCSP reply stored in a file.
1069  *
1070  * @param context a hx509 context
1071  * @param path path to a file with a OCSP reply
1072  * @param out the out FILE descriptor to print the reply on
1073  *
1074  * @return An hx509 error code, see hx509_get_error_string().
1075  *
1076  * @ingroup hx509_revoke
1077  */
1078 
1079 int
1080 hx509_revoke_ocsp_print(hx509_context context, const char *path, FILE *out)
1081 {
1082     struct revoke_ocsp ocsp;
1083     int ret;
1084     size_t i;
1085 
1086     if (out == NULL)
1087 	out = stdout;
1088 
1089     memset(&ocsp, 0, sizeof(ocsp));
1090 
1091     ocsp.path = strdup(path);
1092     if (ocsp.path == NULL)
1093 	return ENOMEM;
1094 
1095     ret = load_ocsp(context, &ocsp);
1096     if (ret) {
1097 	free_ocsp(&ocsp);
1098 	return ret;
1099     }
1100 
1101     fprintf(out, "signer: ");
1102 
1103     switch(ocsp.ocsp.tbsResponseData.responderID.element) {
1104     case choice_OCSPResponderID_byName: {
1105 	hx509_name n;
1106 	char *s;
1107 	_hx509_name_from_Name(&ocsp.ocsp.tbsResponseData.responderID.u.byName, &n);
1108 	hx509_name_to_string(n, &s);
1109 	hx509_name_free(&n);
1110 	fprintf(out, " byName: %s\n", s);
1111 	free(s);
1112 	break;
1113     }
1114     case choice_OCSPResponderID_byKey: {
1115 	char *s;
1116 	hex_encode(ocsp.ocsp.tbsResponseData.responderID.u.byKey.data,
1117 		   ocsp.ocsp.tbsResponseData.responderID.u.byKey.length,
1118 		   &s);
1119 	fprintf(out, " byKey: %s\n", s);
1120 	free(s);
1121 	break;
1122     }
1123     default:
1124 	_hx509_abort("choice_OCSPResponderID unknown");
1125 	break;
1126     }
1127 
1128     fprintf(out, "producedAt: %s\n",
1129 	    printable_time(ocsp.ocsp.tbsResponseData.producedAt));
1130 
1131     fprintf(out, "replies: %d\n", ocsp.ocsp.tbsResponseData.responses.len);
1132 
1133     for (i = 0; i < ocsp.ocsp.tbsResponseData.responses.len; i++) {
1134 	const char *status;
1135 	switch (ocsp.ocsp.tbsResponseData.responses.val[i].certStatus.element) {
1136 	case choice_OCSPCertStatus_good:
1137 	    status = "good";
1138 	    break;
1139 	case choice_OCSPCertStatus_revoked:
1140 	    status = "revoked";
1141 	    break;
1142 	case choice_OCSPCertStatus_unknown:
1143 	    status = "unknown";
1144 	    break;
1145 	default:
1146 	    status = "element unknown";
1147 	}
1148 
1149 	fprintf(out, "\t%zu. status: %s\n", i, status);
1150 
1151 	fprintf(out, "\tthisUpdate: %s\n",
1152 		printable_time(ocsp.ocsp.tbsResponseData.responses.val[i].thisUpdate));
1153 	if (ocsp.ocsp.tbsResponseData.responses.val[i].nextUpdate)
1154 	    fprintf(out, "\tproducedAt: %s\n",
1155 		    printable_time(ocsp.ocsp.tbsResponseData.responses.val[i].thisUpdate));
1156 
1157     }
1158 
1159     fprintf(out, "appended certs:\n");
1160     if (ocsp.certs)
1161 	ret = hx509_certs_iter_f(context, ocsp.certs, hx509_ci_print_names, out);
1162 
1163     free_ocsp(&ocsp);
1164     return ret;
1165 }
1166 
1167 /**
1168  * Verify that the certificate is part of the OCSP reply and it's not
1169  * expired. Doesn't verify signature the OCSP reply or it's done by a
1170  * authorized sender, that is assumed to be already done.
1171  *
1172  * @param context a hx509 context
1173  * @param now the time right now, if 0, use the current time.
1174  * @param cert the certificate to verify
1175  * @param flags flags control the behavior
1176  * @param data pointer to the encode ocsp reply
1177  * @param length the length of the encode ocsp reply
1178  * @param expiration return the time the OCSP will expire and need to
1179  * be rechecked.
1180  *
1181  * @return An hx509 error code, see hx509_get_error_string().
1182  *
1183  * @ingroup hx509_verify
1184  */
1185 
1186 int
1187 hx509_ocsp_verify(hx509_context context,
1188 		  time_t now,
1189 		  hx509_cert cert,
1190 		  int flags,
1191 		  const void *data, size_t length,
1192 		  time_t *expiration)
1193 {
1194     const Certificate *c = _hx509_get_cert(cert);
1195     OCSPBasicOCSPResponse basic;
1196     int ret;
1197     size_t i;
1198 
1199     if (now == 0)
1200 	now = time(NULL);
1201 
1202     *expiration = 0;
1203 
1204     ret = parse_ocsp_basic(data, length, &basic);
1205     if (ret) {
1206 	hx509_set_error_string(context, 0, ret,
1207 			       "Failed to parse OCSP response");
1208 	return ret;
1209     }
1210 
1211     for (i = 0; i < basic.tbsResponseData.responses.len; i++) {
1212 
1213 	ret = der_heim_integer_cmp(&basic.tbsResponseData.responses.val[i].certID.serialNumber,
1214 			       &c->tbsCertificate.serialNumber);
1215 	if (ret != 0)
1216 	    continue;
1217 
1218 	/* verify issuer hashes hash */
1219 	ret = _hx509_verify_signature(context,
1220 				      NULL,
1221 				      &basic.tbsResponseData.responses.val[i].certID.hashAlgorithm,
1222 				      &c->tbsCertificate.issuer._save,
1223 				      &basic.tbsResponseData.responses.val[i].certID.issuerNameHash);
1224 	if (ret != 0)
1225 	    continue;
1226 
1227 	switch (basic.tbsResponseData.responses.val[i].certStatus.element) {
1228 	case choice_OCSPCertStatus_good:
1229 	    break;
1230 	case choice_OCSPCertStatus_revoked:
1231 	case choice_OCSPCertStatus_unknown:
1232 	    continue;
1233 	}
1234 
1235 	/* don't allow the update to be in the future */
1236 	if (basic.tbsResponseData.responses.val[i].thisUpdate >
1237 	    now + context->ocsp_time_diff)
1238 	    continue;
1239 
1240 	/* don't allow the next update to be in the past */
1241 	if (basic.tbsResponseData.responses.val[i].nextUpdate) {
1242 	    if (*basic.tbsResponseData.responses.val[i].nextUpdate < now)
1243 		continue;
1244 	    *expiration = *basic.tbsResponseData.responses.val[i].nextUpdate;
1245 	} else
1246 	    *expiration = now;
1247 
1248 	free_OCSPBasicOCSPResponse(&basic);
1249 	return 0;
1250     }
1251 
1252     free_OCSPBasicOCSPResponse(&basic);
1253 
1254     {
1255 	hx509_name name;
1256 	char *subject;
1257 
1258 	ret = hx509_cert_get_subject(cert, &name);
1259 	if (ret) {
1260 	    hx509_clear_error_string(context);
1261 	    goto out;
1262 	}
1263 	ret = hx509_name_to_string(name, &subject);
1264 	hx509_name_free(&name);
1265 	if (ret) {
1266 	    hx509_clear_error_string(context);
1267 	    goto out;
1268 	}
1269 	hx509_set_error_string(context, 0, HX509_CERT_NOT_IN_OCSP,
1270 			       "Certificate %s not in OCSP response "
1271 			       "or not good",
1272 			       subject);
1273 	free(subject);
1274     }
1275 out:
1276     return HX509_CERT_NOT_IN_OCSP;
1277 }
1278 
1279 struct hx509_crl {
1280     hx509_certs revoked;
1281     time_t expire;
1282 };
1283 
1284 /**
1285  * Create a CRL context. Use hx509_crl_free() to free the CRL context.
1286  *
1287  * @param context a hx509 context.
1288  * @param crl return pointer to a newly allocated CRL context.
1289  *
1290  * @return An hx509 error code, see hx509_get_error_string().
1291  *
1292  * @ingroup hx509_verify
1293  */
1294 
1295 int
1296 hx509_crl_alloc(hx509_context context, hx509_crl *crl)
1297 {
1298     int ret;
1299 
1300     *crl = calloc(1, sizeof(**crl));
1301     if (*crl == NULL) {
1302 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1303 	return ENOMEM;
1304     }
1305 
1306     ret = hx509_certs_init(context, "MEMORY:crl", 0, NULL, &(*crl)->revoked);
1307     if (ret) {
1308 	free(*crl);
1309 	*crl = NULL;
1310 	return ret;
1311     }
1312     (*crl)->expire = 0;
1313     return ret;
1314 }
1315 
1316 /**
1317  * Add revoked certificate to an CRL context.
1318  *
1319  * @param context a hx509 context.
1320  * @param crl the CRL to add the revoked certificate to.
1321  * @param certs keyset of certificate to revoke.
1322  *
1323  * @return An hx509 error code, see hx509_get_error_string().
1324  *
1325  * @ingroup hx509_verify
1326  */
1327 
1328 int
1329 hx509_crl_add_revoked_certs(hx509_context context,
1330 			    hx509_crl crl,
1331 			    hx509_certs certs)
1332 {
1333     return hx509_certs_merge(context, crl->revoked, certs);
1334 }
1335 
1336 /**
1337  * Set the lifetime of a CRL context.
1338  *
1339  * @param context a hx509 context.
1340  * @param crl a CRL context
1341  * @param delta delta time the certificate is valid, library adds the
1342  * current time to this.
1343  *
1344  * @return An hx509 error code, see hx509_get_error_string().
1345  *
1346  * @ingroup hx509_verify
1347  */
1348 
1349 int
1350 hx509_crl_lifetime(hx509_context context, hx509_crl crl, int delta)
1351 {
1352     crl->expire = time(NULL) + delta;
1353     return 0;
1354 }
1355 
1356 /**
1357  * Free a CRL context.
1358  *
1359  * @param context a hx509 context.
1360  * @param crl a CRL context to free.
1361  *
1362  * @ingroup hx509_verify
1363  */
1364 
1365 void
1366 hx509_crl_free(hx509_context context, hx509_crl *crl)
1367 {
1368     if (*crl == NULL)
1369 	return;
1370     hx509_certs_free(&(*crl)->revoked);
1371     memset(*crl, 0, sizeof(**crl));
1372     free(*crl);
1373     *crl = NULL;
1374 }
1375 
1376 static int
1377 add_revoked(hx509_context context, void *ctx, hx509_cert cert)
1378 {
1379     TBSCRLCertList *c = ctx;
1380     unsigned int num;
1381     void *ptr;
1382     int ret;
1383 
1384     num = c->revokedCertificates->len;
1385     ptr = realloc(c->revokedCertificates->val,
1386 		  (num + 1) * sizeof(c->revokedCertificates->val[0]));
1387     if (ptr == NULL) {
1388 	hx509_clear_error_string(context);
1389 	return ENOMEM;
1390     }
1391     c->revokedCertificates->val = ptr;
1392 
1393     ret = hx509_cert_get_serialnumber(cert,
1394 				      &c->revokedCertificates->val[num].userCertificate);
1395     if (ret) {
1396 	hx509_clear_error_string(context);
1397 	return ret;
1398     }
1399     c->revokedCertificates->val[num].revocationDate.element =
1400 	choice_Time_generalTime;
1401     c->revokedCertificates->val[num].revocationDate.u.generalTime =
1402 	time(NULL) - 3600 * 24;
1403     c->revokedCertificates->val[num].crlEntryExtensions = NULL;
1404 
1405     c->revokedCertificates->len++;
1406 
1407     return 0;
1408 }
1409 
1410 /**
1411  * Sign a CRL and return an encode certificate.
1412  *
1413  * @param context a hx509 context.
1414  * @param signer certificate to sign the CRL with
1415  * @param crl the CRL to sign
1416  * @param os return the signed and encoded CRL, free with
1417  * free_heim_octet_string()
1418  *
1419  * @return An hx509 error code, see hx509_get_error_string().
1420  *
1421  * @ingroup hx509_verify
1422  */
1423 
1424 int
1425 hx509_crl_sign(hx509_context context,
1426 	       hx509_cert signer,
1427 	       hx509_crl crl,
1428 	       heim_octet_string *os)
1429 {
1430     const AlgorithmIdentifier *sigalg = _hx509_crypto_default_sig_alg;
1431     CRLCertificateList c;
1432     size_t size;
1433     int ret;
1434     hx509_private_key signerkey;
1435 
1436     memset(&c, 0, sizeof(c));
1437 
1438     signerkey = _hx509_cert_private_key(signer);
1439     if (signerkey == NULL) {
1440 	ret = HX509_PRIVATE_KEY_MISSING;
1441 	hx509_set_error_string(context, 0, ret,
1442 			       "Private key missing for CRL signing");
1443 	return ret;
1444     }
1445 
1446     c.tbsCertList.version = malloc(sizeof(*c.tbsCertList.version));
1447     if (c.tbsCertList.version == NULL) {
1448 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1449 	return ENOMEM;
1450     }
1451 
1452     *c.tbsCertList.version = 1;
1453 
1454     ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
1455     if (ret) {
1456 	hx509_clear_error_string(context);
1457 	goto out;
1458     }
1459 
1460     ret = copy_Name(&_hx509_get_cert(signer)->tbsCertificate.issuer,
1461 		    &c.tbsCertList.issuer);
1462     if (ret) {
1463 	hx509_clear_error_string(context);
1464 	goto out;
1465     }
1466 
1467     c.tbsCertList.thisUpdate.element = choice_Time_generalTime;
1468     c.tbsCertList.thisUpdate.u.generalTime = time(NULL) - 24 * 3600;
1469 
1470     c.tbsCertList.nextUpdate = malloc(sizeof(*c.tbsCertList.nextUpdate));
1471     if (c.tbsCertList.nextUpdate == NULL) {
1472 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1473 	ret = ENOMEM;
1474 	goto out;
1475     }
1476 
1477     {
1478 	time_t next = crl->expire;
1479 	if (next == 0)
1480 	    next = time(NULL) + 24 * 3600 * 365;
1481 
1482 	c.tbsCertList.nextUpdate->element = choice_Time_generalTime;
1483 	c.tbsCertList.nextUpdate->u.generalTime = next;
1484     }
1485 
1486     c.tbsCertList.revokedCertificates =
1487 	calloc(1, sizeof(*c.tbsCertList.revokedCertificates));
1488     if (c.tbsCertList.revokedCertificates == NULL) {
1489 	hx509_set_error_string(context, 0, ENOMEM, "out of memory");
1490 	ret = ENOMEM;
1491 	goto out;
1492     }
1493     c.tbsCertList.crlExtensions = NULL;
1494 
1495     ret = hx509_certs_iter_f(context, crl->revoked, add_revoked, &c.tbsCertList);
1496     if (ret)
1497 	goto out;
1498 
1499     /* if not revoked certs, remove OPTIONAL entry */
1500     if (c.tbsCertList.revokedCertificates->len == 0) {
1501 	free(c.tbsCertList.revokedCertificates);
1502 	c.tbsCertList.revokedCertificates = NULL;
1503     }
1504 
1505     ASN1_MALLOC_ENCODE(TBSCRLCertList, os->data, os->length,
1506 		       &c.tbsCertList, &size, ret);
1507     if (ret) {
1508 	hx509_set_error_string(context, 0, ret, "failed to encode tbsCRL");
1509 	goto out;
1510     }
1511     if (size != os->length)
1512 	_hx509_abort("internal ASN.1 encoder error");
1513 
1514 
1515     ret = _hx509_create_signature_bitstring(context,
1516 					    signerkey,
1517 					    sigalg,
1518 					    os,
1519 					    &c.signatureAlgorithm,
1520 					    &c.signatureValue);
1521     free(os->data);
1522     if (ret) {
1523 	hx509_set_error_string(context, 0, ret, "Failed to sign CRL");
1524 	goto out;
1525     }
1526 
1527     ASN1_MALLOC_ENCODE(CRLCertificateList, os->data, os->length,
1528 		       &c, &size, ret);
1529     if (ret) {
1530 	hx509_set_error_string(context, 0, ret, "failed to encode CRL");
1531 	goto out;
1532     }
1533     if (size != os->length)
1534 	_hx509_abort("internal ASN.1 encoder error");
1535 
1536     free_CRLCertificateList(&c);
1537 
1538     return 0;
1539 
1540 out:
1541     free_CRLCertificateList(&c);
1542     return ret;
1543 }
1544