1/* v3_crld.c */ 2/* 3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project 4 * 1999. 5 */ 6/* ==================================================================== 7 * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in 18 * the documentation and/or other materials provided with the 19 * distribution. 20 * 21 * 3. All advertising materials mentioning features or use of this 22 * software must display the following acknowledgment: 23 * "This product includes software developed by the OpenSSL Project 24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 25 * 26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 27 * endorse or promote products derived from this software without 28 * prior written permission. For written permission, please contact 29 * licensing@OpenSSL.org. 30 * 31 * 5. Products derived from this software may not be called "OpenSSL" 32 * nor may "OpenSSL" appear in their names without prior written 33 * permission of the OpenSSL Project. 34 * 35 * 6. Redistributions of any form whatsoever must retain the following 36 * acknowledgment: 37 * "This product includes software developed by the OpenSSL Project 38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 51 * OF THE POSSIBILITY OF SUCH DAMAGE. 52 * ==================================================================== 53 * 54 * This product includes cryptographic software written by Eric Young 55 * (eay@cryptsoft.com). This product includes software written by Tim 56 * Hudson (tjh@cryptsoft.com). */ 57 58#include <stdio.h> 59#include <string.h> 60 61#include <openssl/asn1.h> 62#include <openssl/asn1t.h> 63#include <openssl/conf.h> 64#include <openssl/err.h> 65#include <openssl/mem.h> 66#include <openssl/obj.h> 67#include <openssl/x509v3.h> 68 69static void *v2i_crld(const X509V3_EXT_METHOD *method, 70 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); 71static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out, 72 int indent); 73 74const X509V3_EXT_METHOD v3_crld = { 75 NID_crl_distribution_points, 0, ASN1_ITEM_ref(CRL_DIST_POINTS), 76 0, 0, 0, 0, 77 0, 0, 78 0, 79 v2i_crld, 80 i2r_crldp, 0, 81 NULL 82}; 83 84const X509V3_EXT_METHOD v3_freshest_crl = { 85 NID_freshest_crl, 0, ASN1_ITEM_ref(CRL_DIST_POINTS), 86 0, 0, 0, 0, 87 0, 0, 88 0, 89 v2i_crld, 90 i2r_crldp, 0, 91 NULL 92}; 93 94static STACK_OF(GENERAL_NAME) *gnames_from_sectname(X509V3_CTX *ctx, 95 char *sect) 96{ 97 STACK_OF(CONF_VALUE) *gnsect; 98 STACK_OF(GENERAL_NAME) *gens; 99 if (*sect == '@') 100 gnsect = X509V3_get_section(ctx, sect + 1); 101 else 102 gnsect = X509V3_parse_list(sect); 103 if (!gnsect) { 104 OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND); 105 return NULL; 106 } 107 gens = v2i_GENERAL_NAMES(NULL, ctx, gnsect); 108 if (*sect == '@') 109 X509V3_section_free(ctx, gnsect); 110 else 111 sk_CONF_VALUE_pop_free(gnsect, X509V3_conf_free); 112 return gens; 113} 114 115static int set_dist_point_name(DIST_POINT_NAME **pdp, X509V3_CTX *ctx, 116 CONF_VALUE *cnf) 117{ 118 STACK_OF(GENERAL_NAME) *fnm = NULL; 119 STACK_OF(X509_NAME_ENTRY) *rnm = NULL; 120 if (!strncmp(cnf->name, "fullname", 9)) { 121 fnm = gnames_from_sectname(ctx, cnf->value); 122 if (!fnm) 123 goto err; 124 } else if (!strcmp(cnf->name, "relativename")) { 125 int ret; 126 STACK_OF(CONF_VALUE) *dnsect; 127 X509_NAME *nm; 128 nm = X509_NAME_new(); 129 if (!nm) 130 return -1; 131 dnsect = X509V3_get_section(ctx, cnf->value); 132 if (!dnsect) { 133 OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND); 134 return -1; 135 } 136 ret = X509V3_NAME_from_section(nm, dnsect, MBSTRING_ASC); 137 X509V3_section_free(ctx, dnsect); 138 rnm = nm->entries; 139 nm->entries = NULL; 140 X509_NAME_free(nm); 141 if (!ret || sk_X509_NAME_ENTRY_num(rnm) <= 0) 142 goto err; 143 /* 144 * Since its a name fragment can't have more than one RDNSequence 145 */ 146 if (sk_X509_NAME_ENTRY_value(rnm, 147 sk_X509_NAME_ENTRY_num(rnm) - 1)->set) { 148 OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_MULTIPLE_RDNS); 149 goto err; 150 } 151 } else 152 return 0; 153 154 if (*pdp) { 155 OPENSSL_PUT_ERROR(X509V3, X509V3_R_DISTPOINT_ALREADY_SET); 156 goto err; 157 } 158 159 *pdp = DIST_POINT_NAME_new(); 160 if (!*pdp) 161 goto err; 162 if (fnm) { 163 (*pdp)->type = 0; 164 (*pdp)->name.fullname = fnm; 165 } else { 166 (*pdp)->type = 1; 167 (*pdp)->name.relativename = rnm; 168 } 169 170 return 1; 171 172 err: 173 if (fnm) 174 sk_GENERAL_NAME_pop_free(fnm, GENERAL_NAME_free); 175 if (rnm) 176 sk_X509_NAME_ENTRY_pop_free(rnm, X509_NAME_ENTRY_free); 177 return -1; 178} 179 180static const BIT_STRING_BITNAME reason_flags[] = { 181 {0, "Unused", "unused"}, 182 {1, "Key Compromise", "keyCompromise"}, 183 {2, "CA Compromise", "CACompromise"}, 184 {3, "Affiliation Changed", "affiliationChanged"}, 185 {4, "Superseded", "superseded"}, 186 {5, "Cessation Of Operation", "cessationOfOperation"}, 187 {6, "Certificate Hold", "certificateHold"}, 188 {7, "Privilege Withdrawn", "privilegeWithdrawn"}, 189 {8, "AA Compromise", "AACompromise"}, 190 {-1, NULL, NULL} 191}; 192 193static int set_reasons(ASN1_BIT_STRING **preas, char *value) 194{ 195 STACK_OF(CONF_VALUE) *rsk = NULL; 196 const BIT_STRING_BITNAME *pbn; 197 const char *bnam; 198 size_t i; 199 int ret = 0; 200 rsk = X509V3_parse_list(value); 201 if (!rsk) 202 return 0; 203 if (*preas) 204 return 0; 205 for (i = 0; i < sk_CONF_VALUE_num(rsk); i++) { 206 bnam = sk_CONF_VALUE_value(rsk, i)->name; 207 if (!*preas) { 208 *preas = ASN1_BIT_STRING_new(); 209 if (!*preas) 210 goto err; 211 } 212 for (pbn = reason_flags; pbn->lname; pbn++) { 213 if (!strcmp(pbn->sname, bnam)) { 214 if (!ASN1_BIT_STRING_set_bit(*preas, pbn->bitnum, 1)) 215 goto err; 216 break; 217 } 218 } 219 if (!pbn->lname) 220 goto err; 221 } 222 ret = 1; 223 224 err: 225 sk_CONF_VALUE_pop_free(rsk, X509V3_conf_free); 226 return ret; 227} 228 229static int print_reasons(BIO *out, const char *rname, 230 ASN1_BIT_STRING *rflags, int indent) 231{ 232 int first = 1; 233 const BIT_STRING_BITNAME *pbn; 234 BIO_printf(out, "%*s%s:\n%*s", indent, "", rname, indent + 2, ""); 235 for (pbn = reason_flags; pbn->lname; pbn++) { 236 if (ASN1_BIT_STRING_get_bit(rflags, pbn->bitnum)) { 237 if (first) 238 first = 0; 239 else 240 BIO_puts(out, ", "); 241 BIO_puts(out, pbn->lname); 242 } 243 } 244 if (first) 245 BIO_puts(out, "<EMPTY>\n"); 246 else 247 BIO_puts(out, "\n"); 248 return 1; 249} 250 251static DIST_POINT *crldp_from_section(X509V3_CTX *ctx, 252 STACK_OF(CONF_VALUE) *nval) 253{ 254 size_t i; 255 CONF_VALUE *cnf; 256 DIST_POINT *point = NULL; 257 point = DIST_POINT_new(); 258 if (!point) 259 goto err; 260 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { 261 int ret; 262 cnf = sk_CONF_VALUE_value(nval, i); 263 ret = set_dist_point_name(&point->distpoint, ctx, cnf); 264 if (ret > 0) 265 continue; 266 if (ret < 0) 267 goto err; 268 if (!strcmp(cnf->name, "reasons")) { 269 if (!set_reasons(&point->reasons, cnf->value)) 270 goto err; 271 } else if (!strcmp(cnf->name, "CRLissuer")) { 272 point->CRLissuer = gnames_from_sectname(ctx, cnf->value); 273 if (!point->CRLissuer) 274 goto err; 275 } 276 } 277 278 return point; 279 280 err: 281 if (point) 282 DIST_POINT_free(point); 283 return NULL; 284} 285 286static void *v2i_crld(const X509V3_EXT_METHOD *method, 287 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval) 288{ 289 STACK_OF(DIST_POINT) *crld = NULL; 290 GENERAL_NAMES *gens = NULL; 291 GENERAL_NAME *gen = NULL; 292 CONF_VALUE *cnf; 293 size_t i; 294 if (!(crld = sk_DIST_POINT_new_null())) 295 goto merr; 296 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { 297 DIST_POINT *point; 298 cnf = sk_CONF_VALUE_value(nval, i); 299 if (!cnf->value) { 300 STACK_OF(CONF_VALUE) *dpsect; 301 dpsect = X509V3_get_section(ctx, cnf->name); 302 if (!dpsect) 303 goto err; 304 point = crldp_from_section(ctx, dpsect); 305 X509V3_section_free(ctx, dpsect); 306 if (!point) 307 goto err; 308 if (!sk_DIST_POINT_push(crld, point)) { 309 DIST_POINT_free(point); 310 goto merr; 311 } 312 } else { 313 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf))) 314 goto err; 315 if (!(gens = GENERAL_NAMES_new())) 316 goto merr; 317 if (!sk_GENERAL_NAME_push(gens, gen)) 318 goto merr; 319 gen = NULL; 320 if (!(point = DIST_POINT_new())) 321 goto merr; 322 if (!sk_DIST_POINT_push(crld, point)) { 323 DIST_POINT_free(point); 324 goto merr; 325 } 326 if (!(point->distpoint = DIST_POINT_NAME_new())) 327 goto merr; 328 point->distpoint->name.fullname = gens; 329 point->distpoint->type = 0; 330 gens = NULL; 331 } 332 } 333 return crld; 334 335 merr: 336 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE); 337 err: 338 GENERAL_NAME_free(gen); 339 GENERAL_NAMES_free(gens); 340 sk_DIST_POINT_pop_free(crld, DIST_POINT_free); 341 return NULL; 342} 343 344IMPLEMENT_ASN1_SET_OF(DIST_POINT) 345 346static int dpn_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 347 void *exarg) 348{ 349 DIST_POINT_NAME *dpn = (DIST_POINT_NAME *)*pval; 350 351 switch (operation) { 352 case ASN1_OP_NEW_POST: 353 dpn->dpname = NULL; 354 break; 355 356 case ASN1_OP_FREE_POST: 357 if (dpn->dpname) 358 X509_NAME_free(dpn->dpname); 359 break; 360 } 361 return 1; 362} 363 364 365ASN1_CHOICE_cb(DIST_POINT_NAME, dpn_cb) = { 366 ASN1_IMP_SEQUENCE_OF(DIST_POINT_NAME, name.fullname, GENERAL_NAME, 0), 367 ASN1_IMP_SET_OF(DIST_POINT_NAME, name.relativename, X509_NAME_ENTRY, 1) 368} ASN1_CHOICE_END_cb(DIST_POINT_NAME, DIST_POINT_NAME, type) 369 370 371IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT_NAME) 372 373ASN1_SEQUENCE(DIST_POINT) = { 374 ASN1_EXP_OPT(DIST_POINT, distpoint, DIST_POINT_NAME, 0), 375 ASN1_IMP_OPT(DIST_POINT, reasons, ASN1_BIT_STRING, 1), 376 ASN1_IMP_SEQUENCE_OF_OPT(DIST_POINT, CRLissuer, GENERAL_NAME, 2) 377} ASN1_SEQUENCE_END(DIST_POINT) 378 379IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT) 380 381ASN1_ITEM_TEMPLATE(CRL_DIST_POINTS) = 382 ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, CRLDistributionPoints, DIST_POINT) 383ASN1_ITEM_TEMPLATE_END(CRL_DIST_POINTS) 384 385IMPLEMENT_ASN1_FUNCTIONS(CRL_DIST_POINTS) 386 387ASN1_SEQUENCE(ISSUING_DIST_POINT) = { 388 ASN1_EXP_OPT(ISSUING_DIST_POINT, distpoint, DIST_POINT_NAME, 0), 389 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyuser, ASN1_FBOOLEAN, 1), 390 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyCA, ASN1_FBOOLEAN, 2), 391 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlysomereasons, ASN1_BIT_STRING, 3), 392 ASN1_IMP_OPT(ISSUING_DIST_POINT, indirectCRL, ASN1_FBOOLEAN, 4), 393 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyattr, ASN1_FBOOLEAN, 5) 394} ASN1_SEQUENCE_END(ISSUING_DIST_POINT) 395 396IMPLEMENT_ASN1_FUNCTIONS(ISSUING_DIST_POINT) 397 398static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, 399 int indent); 400static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, 401 STACK_OF(CONF_VALUE) *nval); 402 403const X509V3_EXT_METHOD v3_idp = { 404 NID_issuing_distribution_point, X509V3_EXT_MULTILINE, 405 ASN1_ITEM_ref(ISSUING_DIST_POINT), 406 0, 0, 0, 0, 407 0, 0, 408 0, 409 v2i_idp, 410 i2r_idp, 0, 411 NULL 412}; 413 414static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, 415 STACK_OF(CONF_VALUE) *nval) 416{ 417 ISSUING_DIST_POINT *idp = NULL; 418 CONF_VALUE *cnf; 419 char *name, *val; 420 size_t i; 421 int ret; 422 idp = ISSUING_DIST_POINT_new(); 423 if (!idp) 424 goto merr; 425 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { 426 cnf = sk_CONF_VALUE_value(nval, i); 427 name = cnf->name; 428 val = cnf->value; 429 ret = set_dist_point_name(&idp->distpoint, ctx, cnf); 430 if (ret > 0) 431 continue; 432 if (ret < 0) 433 goto err; 434 if (!strcmp(name, "onlyuser")) { 435 if (!X509V3_get_value_bool(cnf, &idp->onlyuser)) 436 goto err; 437 } else if (!strcmp(name, "onlyCA")) { 438 if (!X509V3_get_value_bool(cnf, &idp->onlyCA)) 439 goto err; 440 } else if (!strcmp(name, "onlyAA")) { 441 if (!X509V3_get_value_bool(cnf, &idp->onlyattr)) 442 goto err; 443 } else if (!strcmp(name, "indirectCRL")) { 444 if (!X509V3_get_value_bool(cnf, &idp->indirectCRL)) 445 goto err; 446 } else if (!strcmp(name, "onlysomereasons")) { 447 if (!set_reasons(&idp->onlysomereasons, val)) 448 goto err; 449 } else { 450 OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_NAME); 451 X509V3_conf_err(cnf); 452 goto err; 453 } 454 } 455 return idp; 456 457 merr: 458 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE); 459 err: 460 ISSUING_DIST_POINT_free(idp); 461 return NULL; 462} 463 464static int print_gens(BIO *out, STACK_OF(GENERAL_NAME) *gens, int indent) 465{ 466 size_t i; 467 for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) { 468 BIO_printf(out, "%*s", indent + 2, ""); 469 GENERAL_NAME_print(out, sk_GENERAL_NAME_value(gens, i)); 470 BIO_puts(out, "\n"); 471 } 472 return 1; 473} 474 475static int print_distpoint(BIO *out, DIST_POINT_NAME *dpn, int indent) 476{ 477 if (dpn->type == 0) { 478 BIO_printf(out, "%*sFull Name:\n", indent, ""); 479 print_gens(out, dpn->name.fullname, indent); 480 } else { 481 X509_NAME ntmp; 482 ntmp.entries = dpn->name.relativename; 483 BIO_printf(out, "%*sRelative Name:\n%*s", indent, "", indent + 2, ""); 484 X509_NAME_print_ex(out, &ntmp, 0, XN_FLAG_ONELINE); 485 BIO_puts(out, "\n"); 486 } 487 return 1; 488} 489 490static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, 491 int indent) 492{ 493 ISSUING_DIST_POINT *idp = pidp; 494 if (idp->distpoint) 495 print_distpoint(out, idp->distpoint, indent); 496 if (idp->onlyuser > 0) 497 BIO_printf(out, "%*sOnly User Certificates\n", indent, ""); 498 if (idp->onlyCA > 0) 499 BIO_printf(out, "%*sOnly CA Certificates\n", indent, ""); 500 if (idp->indirectCRL > 0) 501 BIO_printf(out, "%*sIndirect CRL\n", indent, ""); 502 if (idp->onlysomereasons) 503 print_reasons(out, "Only Some Reasons", idp->onlysomereasons, indent); 504 if (idp->onlyattr > 0) 505 BIO_printf(out, "%*sOnly Attribute Certificates\n", indent, ""); 506 if (!idp->distpoint && (idp->onlyuser <= 0) && (idp->onlyCA <= 0) 507 && (idp->indirectCRL <= 0) && !idp->onlysomereasons 508 && (idp->onlyattr <= 0)) 509 BIO_printf(out, "%*s<EMPTY>\n", indent, ""); 510 511 return 1; 512} 513 514static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out, 515 int indent) 516{ 517 STACK_OF(DIST_POINT) *crld = pcrldp; 518 DIST_POINT *point; 519 size_t i; 520 for (i = 0; i < sk_DIST_POINT_num(crld); i++) { 521 BIO_puts(out, "\n"); 522 point = sk_DIST_POINT_value(crld, i); 523 if (point->distpoint) 524 print_distpoint(out, point->distpoint, indent); 525 if (point->reasons) 526 print_reasons(out, "Reasons", point->reasons, indent); 527 if (point->CRLissuer) { 528 BIO_printf(out, "%*sCRL Issuer:\n", indent, ""); 529 print_gens(out, point->CRLissuer, indent); 530 } 531 } 532 return 1; 533} 534 535int DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname) 536{ 537 size_t i; 538 STACK_OF(X509_NAME_ENTRY) *frag; 539 X509_NAME_ENTRY *ne; 540 if (!dpn || (dpn->type != 1)) 541 return 1; 542 frag = dpn->name.relativename; 543 dpn->dpname = X509_NAME_dup(iname); 544 if (!dpn->dpname) 545 return 0; 546 for (i = 0; i < sk_X509_NAME_ENTRY_num(frag); i++) { 547 ne = sk_X509_NAME_ENTRY_value(frag, i); 548 if (!X509_NAME_add_entry(dpn->dpname, ne, -1, i ? 0 : 1)) { 549 X509_NAME_free(dpn->dpname); 550 dpn->dpname = NULL; 551 return 0; 552 } 553 } 554 /* generate cached encoding of name */ 555 if (i2d_X509_NAME(dpn->dpname, NULL) < 0) { 556 X509_NAME_free(dpn->dpname); 557 dpn->dpname = NULL; 558 return 0; 559 } 560 return 1; 561} 562