v3_akey.c revision 296465
1/* v3_akey.c */
2/*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 1999.
5 */
6/* ====================================================================
7 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 *    notice, this list of conditions and the following disclaimer in
18 *    the documentation and/or other materials provided with the
19 *    distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 *    software must display the following acknowledgment:
23 *    "This product includes software developed by the OpenSSL Project
24 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 *    endorse or promote products derived from this software without
28 *    prior written permission. For written permission, please contact
29 *    licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 *    nor may "OpenSSL" appear in their names without prior written
33 *    permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 *    acknowledgment:
37 *    "This product includes software developed by the OpenSSL Project
38 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com).  This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
57 *
58 */
59
60#include <stdio.h>
61#include "cryptlib.h"
62#include <openssl/conf.h>
63#include <openssl/asn1.h>
64#include <openssl/asn1t.h>
65#include <openssl/x509v3.h>
66
67static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
68                                                 AUTHORITY_KEYID *akeyid,
69                                                 STACK_OF(CONF_VALUE)
70                                                 *extlist);
71static AUTHORITY_KEYID *v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
72                                            X509V3_CTX *ctx,
73                                            STACK_OF(CONF_VALUE) *values);
74
75const X509V3_EXT_METHOD v3_akey_id = {
76    NID_authority_key_identifier,
77    X509V3_EXT_MULTILINE, ASN1_ITEM_ref(AUTHORITY_KEYID),
78    0, 0, 0, 0,
79    0, 0,
80    (X509V3_EXT_I2V) i2v_AUTHORITY_KEYID,
81    (X509V3_EXT_V2I)v2i_AUTHORITY_KEYID,
82    0, 0,
83    NULL
84};
85
86static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
87                                                 AUTHORITY_KEYID *akeyid,
88                                                 STACK_OF(CONF_VALUE)
89                                                 *extlist)
90{
91    char *tmp;
92    if (akeyid->keyid) {
93        tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
94        X509V3_add_value("keyid", tmp, &extlist);
95        OPENSSL_free(tmp);
96    }
97    if (akeyid->issuer)
98        extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
99    if (akeyid->serial) {
100        tmp = hex_to_string(akeyid->serial->data, akeyid->serial->length);
101        X509V3_add_value("serial", tmp, &extlist);
102        OPENSSL_free(tmp);
103    }
104    return extlist;
105}
106
107/*-
108 * Currently two options:
109 * keyid: use the issuers subject keyid, the value 'always' means its is
110 * an error if the issuer certificate doesn't have a key id.
111 * issuer: use the issuers cert issuer and serial number. The default is
112 * to only use this if keyid is not present. With the option 'always'
113 * this is always included.
114 */
115
116static AUTHORITY_KEYID *v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
117                                            X509V3_CTX *ctx,
118                                            STACK_OF(CONF_VALUE) *values)
119{
120    char keyid = 0, issuer = 0;
121    int i;
122    CONF_VALUE *cnf;
123    ASN1_OCTET_STRING *ikeyid = NULL;
124    X509_NAME *isname = NULL;
125    GENERAL_NAMES *gens = NULL;
126    GENERAL_NAME *gen = NULL;
127    ASN1_INTEGER *serial = NULL;
128    X509_EXTENSION *ext;
129    X509 *cert;
130    AUTHORITY_KEYID *akeyid;
131
132    for (i = 0; i < sk_CONF_VALUE_num(values); i++) {
133        cnf = sk_CONF_VALUE_value(values, i);
134        if (!strcmp(cnf->name, "keyid")) {
135            keyid = 1;
136            if (cnf->value && !strcmp(cnf->value, "always"))
137                keyid = 2;
138        } else if (!strcmp(cnf->name, "issuer")) {
139            issuer = 1;
140            if (cnf->value && !strcmp(cnf->value, "always"))
141                issuer = 2;
142        } else {
143            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, X509V3_R_UNKNOWN_OPTION);
144            ERR_add_error_data(2, "name=", cnf->name);
145            return NULL;
146        }
147    }
148
149    if (!ctx || !ctx->issuer_cert) {
150        if (ctx && (ctx->flags == CTX_TEST))
151            return AUTHORITY_KEYID_new();
152        X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
153                  X509V3_R_NO_ISSUER_CERTIFICATE);
154        return NULL;
155    }
156
157    cert = ctx->issuer_cert;
158
159    if (keyid) {
160        i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
161        if ((i >= 0) && (ext = X509_get_ext(cert, i)))
162            ikeyid = X509V3_EXT_d2i(ext);
163        if (keyid == 2 && !ikeyid) {
164            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
165                      X509V3_R_UNABLE_TO_GET_ISSUER_KEYID);
166            return NULL;
167        }
168    }
169
170    if ((issuer && !ikeyid) || (issuer == 2)) {
171        isname = X509_NAME_dup(X509_get_issuer_name(cert));
172        serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
173        if (!isname || !serial) {
174            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
175                      X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS);
176            goto err;
177        }
178    }
179
180    if (!(akeyid = AUTHORITY_KEYID_new()))
181        goto err;
182
183    if (isname) {
184        if (!(gens = sk_GENERAL_NAME_new_null())
185            || !(gen = GENERAL_NAME_new())
186            || !sk_GENERAL_NAME_push(gens, gen)) {
187            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, ERR_R_MALLOC_FAILURE);
188            goto err;
189        }
190        gen->type = GEN_DIRNAME;
191        gen->d.dirn = isname;
192    }
193
194    akeyid->issuer = gens;
195    akeyid->serial = serial;
196    akeyid->keyid = ikeyid;
197
198    return akeyid;
199
200 err:
201    X509_NAME_free(isname);
202    M_ASN1_INTEGER_free(serial);
203    M_ASN1_OCTET_STRING_free(ikeyid);
204    return NULL;
205}
206