x509_req.c revision 296465
11832Swollman/* crypto/x509/x509_req.c */
21832Swollman/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
31832Swollman * All rights reserved.
41832Swollman *
51832Swollman * This package is an SSL implementation written
61832Swollman * by Eric Young (eay@cryptsoft.com).
71832Swollman * The implementation was written so as to conform with Netscapes SSL.
81832Swollman *
91832Swollman * This library is free for commercial and non-commercial use as long as
101832Swollman * the following conditions are aheared to.  The following conditions
111832Swollman * apply to all code found in this distribution, be it the RC4, RSA,
121832Swollman * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
131832Swollman * included with this distribution is covered by the same copyright terms
141832Swollman * except that the holder is Tim Hudson (tjh@cryptsoft.com).
151832Swollman *
161832Swollman * Copyright remains Eric Young's, and as such any Copyright notices in
171832Swollman * the code are not to be removed.
181832Swollman * If this package is used in a product, Eric Young should be given attribution
191832Swollman * as the author of the parts of the library used.
201832Swollman * This can be in the form of a textual message at program startup or
211832Swollman * in documentation (online or textual) provided with the package.
221832Swollman *
231832Swollman * Redistribution and use in source and binary forms, with or without
241832Swollman * modification, are permitted provided that the following conditions
251832Swollman * are met:
261832Swollman * 1. Redistributions of source code must retain the copyright
271832Swollman *    notice, this list of conditions and the following disclaimer.
281832Swollman * 2. Redistributions in binary form must reproduce the above copyright
291832Swollman *    notice, this list of conditions and the following disclaimer in the
301832Swollman *    documentation and/or other materials provided with the distribution.
311832Swollman * 3. All advertising materials mentioning features or use of this software
321832Swollman *    must display the following acknowledgement:
331832Swollman *    "This product includes cryptographic software written by
341832Swollman *     Eric Young (eay@cryptsoft.com)"
351832Swollman *    The word 'cryptographic' can be left out if the rouines from the library
361832Swollman *    being used are not cryptographic related :-).
371832Swollman * 4. If you include any Windows specific code (or a derivative thereof) from
3830870Scharnier *    the apps directory (application code) you must include an acknowledgement:
3930870Scharnier *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
4030870Scharnier *
4130870Scharnier * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
4230870Scharnier * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4330870Scharnier * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
441832Swollman * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
451832Swollman * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
461832Swollman * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
471832Swollman * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
481832Swollman * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
491832Swollman * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
501832Swollman * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
511832Swollman * SUCH DAMAGE.
521832Swollman *
531832Swollman * The licence and distribution terms for any publically available version or
541832Swollman * derivative of this code cannot be changed.  i.e. this code cannot simply be
551832Swollman * copied and put under another distribution licence
561832Swollman * [including the GNU Public Licence.]
571832Swollman */
581832Swollman
591832Swollman#include <stdio.h>
601832Swollman#include "cryptlib.h"
611832Swollman#include <openssl/bn.h>
621832Swollman#include <openssl/evp.h>
631832Swollman#include <openssl/asn1.h>
641832Swollman#include <openssl/x509.h>
651832Swollman#include <openssl/objects.h>
661832Swollman#include <openssl/buffer.h>
671832Swollman#include <openssl/pem.h>
681832Swollman
691832SwollmanX509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
701832Swollman{
711832Swollman    X509_REQ *ret;
721832Swollman    X509_REQ_INFO *ri;
731832Swollman    int i;
741832Swollman    EVP_PKEY *pktmp;
751832Swollman
761832Swollman    ret = X509_REQ_new();
771832Swollman    if (ret == NULL) {
781832Swollman        X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE);
791832Swollman        goto err;
801832Swollman    }
811832Swollman
821832Swollman    ri = ret->req_info;
831832Swollman
841832Swollman    ri->version->length = 1;
851832Swollman    ri->version->data = (unsigned char *)OPENSSL_malloc(1);
861832Swollman    if (ri->version->data == NULL)
871832Swollman        goto err;
881832Swollman    ri->version->data[0] = 0;   /* version == 0 */
891832Swollman
901832Swollman    if (!X509_REQ_set_subject_name(ret, X509_get_subject_name(x)))
911832Swollman        goto err;
921832Swollman
931832Swollman    pktmp = X509_get_pubkey(x);
941832Swollman    if (pktmp == NULL)
951832Swollman        goto err;
961832Swollman    i = X509_REQ_set_pubkey(ret, pktmp);
971832Swollman    EVP_PKEY_free(pktmp);
981832Swollman    if (!i)
991832Swollman        goto err;
1001832Swollman
1011832Swollman    if (pkey != NULL) {
1021832Swollman        if (!X509_REQ_sign(ret, pkey, md))
1031832Swollman            goto err;
1041832Swollman    }
1051832Swollman    return (ret);
1061832Swollman err:
1071832Swollman    X509_REQ_free(ret);
1081832Swollman    return (NULL);
1091832Swollman}
1101832Swollman
1111832SwollmanEVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req)
1121832Swollman{
1131832Swollman    if ((req == NULL) || (req->req_info == NULL))
1141832Swollman        return (NULL);
1151832Swollman    return (X509_PUBKEY_get(req->req_info->pubkey));
1161832Swollman}
1171832Swollman
1181832Swollmanint X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k)
1191832Swollman{
1201832Swollman    EVP_PKEY *xk = NULL;
1211832Swollman    int ok = 0;
1221832Swollman
1231832Swollman    xk = X509_REQ_get_pubkey(x);
124    switch (EVP_PKEY_cmp(xk, k)) {
125    case 1:
126        ok = 1;
127        break;
128    case 0:
129        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
130                X509_R_KEY_VALUES_MISMATCH);
131        break;
132    case -1:
133        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_KEY_TYPE_MISMATCH);
134        break;
135    case -2:
136#ifndef OPENSSL_NO_EC
137        if (k->type == EVP_PKEY_EC) {
138            X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, ERR_R_EC_LIB);
139            break;
140        }
141#endif
142#ifndef OPENSSL_NO_DH
143        if (k->type == EVP_PKEY_DH) {
144            /* No idea */
145            X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
146                    X509_R_CANT_CHECK_DH_KEY);
147            break;
148        }
149#endif
150        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_UNKNOWN_KEY_TYPE);
151    }
152
153    EVP_PKEY_free(xk);
154    return (ok);
155}
156
157/*
158 * It seems several organisations had the same idea of including a list of
159 * extensions in a certificate request. There are at least two OIDs that are
160 * used and there may be more: so the list is configurable.
161 */
162
163static int ext_nid_list[] = { NID_ext_req, NID_ms_ext_req, NID_undef };
164
165static int *ext_nids = ext_nid_list;
166
167int X509_REQ_extension_nid(int req_nid)
168{
169    int i, nid;
170    for (i = 0;; i++) {
171        nid = ext_nids[i];
172        if (nid == NID_undef)
173            return 0;
174        else if (req_nid == nid)
175            return 1;
176    }
177}
178
179int *X509_REQ_get_extension_nids(void)
180{
181    return ext_nids;
182}
183
184void X509_REQ_set_extension_nids(int *nids)
185{
186    ext_nids = nids;
187}
188
189STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req)
190{
191    X509_ATTRIBUTE *attr;
192    ASN1_TYPE *ext = NULL;
193    int idx, *pnid;
194    const unsigned char *p;
195
196    if ((req == NULL) || (req->req_info == NULL) || !ext_nids)
197        return (NULL);
198    for (pnid = ext_nids; *pnid != NID_undef; pnid++) {
199        idx = X509_REQ_get_attr_by_NID(req, *pnid, -1);
200        if (idx == -1)
201            continue;
202        attr = X509_REQ_get_attr(req, idx);
203        if (attr->single)
204            ext = attr->value.single;
205        else if (sk_ASN1_TYPE_num(attr->value.set))
206            ext = sk_ASN1_TYPE_value(attr->value.set, 0);
207        break;
208    }
209    if (!ext || (ext->type != V_ASN1_SEQUENCE))
210        return NULL;
211    p = ext->value.sequence->data;
212    return d2i_ASN1_SET_OF_X509_EXTENSION(NULL, &p,
213                                          ext->value.sequence->length,
214                                          d2i_X509_EXTENSION,
215                                          X509_EXTENSION_free,
216                                          V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL);
217}
218
219/*
220 * Add a STACK_OF extensions to a certificate request: allow alternative OIDs
221 * in case we want to create a non standard one.
222 */
223
224int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts,
225                                int nid)
226{
227    unsigned char *p = NULL, *q;
228    long len;
229    ASN1_TYPE *at = NULL;
230    X509_ATTRIBUTE *attr = NULL;
231    if (!(at = ASN1_TYPE_new()) || !(at->value.sequence = ASN1_STRING_new()))
232        goto err;
233
234    at->type = V_ASN1_SEQUENCE;
235    /* Generate encoding of extensions */
236    len = i2d_ASN1_SET_OF_X509_EXTENSION(exts, NULL, i2d_X509_EXTENSION,
237                                         V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL,
238                                         IS_SEQUENCE);
239    if (!(p = OPENSSL_malloc(len)))
240        goto err;
241    q = p;
242    i2d_ASN1_SET_OF_X509_EXTENSION(exts, &q, i2d_X509_EXTENSION,
243                                   V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL,
244                                   IS_SEQUENCE);
245    at->value.sequence->data = p;
246    p = NULL;
247    at->value.sequence->length = len;
248    if (!(attr = X509_ATTRIBUTE_new()))
249        goto err;
250    if (!(attr->value.set = sk_ASN1_TYPE_new_null()))
251        goto err;
252    if (!sk_ASN1_TYPE_push(attr->value.set, at))
253        goto err;
254    at = NULL;
255    attr->single = 0;
256    attr->object = OBJ_nid2obj(nid);
257    if (!req->req_info->attributes) {
258        if (!(req->req_info->attributes = sk_X509_ATTRIBUTE_new_null()))
259            goto err;
260    }
261    if (!sk_X509_ATTRIBUTE_push(req->req_info->attributes, attr))
262        goto err;
263    return 1;
264 err:
265    if (p)
266        OPENSSL_free(p);
267    X509_ATTRIBUTE_free(attr);
268    ASN1_TYPE_free(at);
269    return 0;
270}
271
272/* This is the normal usage: use the "official" OID */
273int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts)
274{
275    return X509_REQ_add_extensions_nid(req, exts, NID_ext_req);
276}
277
278/* Request attribute functions */
279
280int X509_REQ_get_attr_count(const X509_REQ *req)
281{
282    return X509at_get_attr_count(req->req_info->attributes);
283}
284
285int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos)
286{
287    return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos);
288}
289
290int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj,
291                             int lastpos)
292{
293    return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos);
294}
295
296X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc)
297{
298    return X509at_get_attr(req->req_info->attributes, loc);
299}
300
301X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc)
302{
303    return X509at_delete_attr(req->req_info->attributes, loc);
304}
305
306int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr)
307{
308    if (X509at_add1_attr(&req->req_info->attributes, attr))
309        return 1;
310    return 0;
311}
312
313int X509_REQ_add1_attr_by_OBJ(X509_REQ *req,
314                              const ASN1_OBJECT *obj, int type,
315                              const unsigned char *bytes, int len)
316{
317    if (X509at_add1_attr_by_OBJ(&req->req_info->attributes, obj,
318                                type, bytes, len))
319        return 1;
320    return 0;
321}
322
323int X509_REQ_add1_attr_by_NID(X509_REQ *req,
324                              int nid, int type,
325                              const unsigned char *bytes, int len)
326{
327    if (X509at_add1_attr_by_NID(&req->req_info->attributes, nid,
328                                type, bytes, len))
329        return 1;
330    return 0;
331}
332
333int X509_REQ_add1_attr_by_txt(X509_REQ *req,
334                              const char *attrname, int type,
335                              const unsigned char *bytes, int len)
336{
337    if (X509at_add1_attr_by_txt(&req->req_info->attributes, attrname,
338                                type, bytes, len))
339        return 1;
340    return 0;
341}
342