1/* v3_crld.c */
2/*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 1999.
5 */
6/* ====================================================================
7 * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in
18 * the documentation and/or other materials provided with the
19 * distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 * software must display the following acknowledgment:
23 * "This product includes software developed by the OpenSSL Project
24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 * endorse or promote products derived from this software without
28 * prior written permission. For written permission, please contact
29 * licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 * nor may "OpenSSL" appear in their names without prior written
33 * permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 * acknowledgment:
37 * "This product includes software developed by the OpenSSL Project
38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com). This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com). */
57
58#include <stdio.h>
59#include <string.h>
60
61#include <openssl/asn1.h>
62#include <openssl/asn1t.h>
63#include <openssl/conf.h>
64#include <openssl/err.h>
65#include <openssl/mem.h>
66#include <openssl/obj.h>
67#include <openssl/x509v3.h>
68
69static void *v2i_crld(const X509V3_EXT_METHOD *method,
70 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval);
71static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out,
72 int indent);
73
74const X509V3_EXT_METHOD v3_crld = {
75 NID_crl_distribution_points, 0, ASN1_ITEM_ref(CRL_DIST_POINTS),
76 0, 0, 0, 0,
77 0, 0,
78 0,
79 v2i_crld,
80 i2r_crldp, 0,
81 NULL
82};
83
84const X509V3_EXT_METHOD v3_freshest_crl = {
85 NID_freshest_crl, 0, ASN1_ITEM_ref(CRL_DIST_POINTS),
86 0, 0, 0, 0,
87 0, 0,
88 0,
89 v2i_crld,
90 i2r_crldp, 0,
91 NULL
92};
93
94static STACK_OF(GENERAL_NAME) *gnames_from_sectname(X509V3_CTX *ctx,
95 char *sect)
96{
97 STACK_OF(CONF_VALUE) *gnsect;
98 STACK_OF(GENERAL_NAME) *gens;
99 if (*sect == '@')
100 gnsect = X509V3_get_section(ctx, sect + 1);
101 else
102 gnsect = X509V3_parse_list(sect);
103 if (!gnsect) {
104 OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND);
105 return NULL;
106 }
107 gens = v2i_GENERAL_NAMES(NULL, ctx, gnsect);
108 if (*sect == '@')
109 X509V3_section_free(ctx, gnsect);
110 else
111 sk_CONF_VALUE_pop_free(gnsect, X509V3_conf_free);
112 return gens;
113}
114
115static int set_dist_point_name(DIST_POINT_NAME **pdp, X509V3_CTX *ctx,
116 CONF_VALUE *cnf)
117{
118 STACK_OF(GENERAL_NAME) *fnm = NULL;
119 STACK_OF(X509_NAME_ENTRY) *rnm = NULL;
120 if (!strncmp(cnf->name, "fullname", 9)) {
121 fnm = gnames_from_sectname(ctx, cnf->value);
122 if (!fnm)
123 goto err;
124 } else if (!strcmp(cnf->name, "relativename")) {
125 int ret;
126 STACK_OF(CONF_VALUE) *dnsect;
127 X509_NAME *nm;
128 nm = X509_NAME_new();
129 if (!nm)
130 return -1;
131 dnsect = X509V3_get_section(ctx, cnf->value);
132 if (!dnsect) {
133 OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND);
134 return -1;
135 }
136 ret = X509V3_NAME_from_section(nm, dnsect, MBSTRING_ASC);
137 X509V3_section_free(ctx, dnsect);
138 rnm = nm->entries;
139 nm->entries = NULL;
140 X509_NAME_free(nm);
141 if (!ret || sk_X509_NAME_ENTRY_num(rnm) <= 0)
142 goto err;
143 /*
144 * Since its a name fragment can't have more than one RDNSequence
145 */
146 if (sk_X509_NAME_ENTRY_value(rnm,
147 sk_X509_NAME_ENTRY_num(rnm) - 1)->set) {
148 OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_MULTIPLE_RDNS);
149 goto err;
150 }
151 } else
152 return 0;
153
154 if (*pdp) {
155 OPENSSL_PUT_ERROR(X509V3, X509V3_R_DISTPOINT_ALREADY_SET);
156 goto err;
157 }
158
159 *pdp = DIST_POINT_NAME_new();
160 if (!*pdp)
161 goto err;
162 if (fnm) {
163 (*pdp)->type = 0;
164 (*pdp)->name.fullname = fnm;
165 } else {
166 (*pdp)->type = 1;
167 (*pdp)->name.relativename = rnm;
168 }
169
170 return 1;
171
172 err:
173 if (fnm)
174 sk_GENERAL_NAME_pop_free(fnm, GENERAL_NAME_free);
175 if (rnm)
176 sk_X509_NAME_ENTRY_pop_free(rnm, X509_NAME_ENTRY_free);
177 return -1;
178}
179
180static const BIT_STRING_BITNAME reason_flags[] = {
181 {0, "Unused", "unused"},
182 {1, "Key Compromise", "keyCompromise"},
183 {2, "CA Compromise", "CACompromise"},
184 {3, "Affiliation Changed", "affiliationChanged"},
185 {4, "Superseded", "superseded"},
186 {5, "Cessation Of Operation", "cessationOfOperation"},
187 {6, "Certificate Hold", "certificateHold"},
188 {7, "Privilege Withdrawn", "privilegeWithdrawn"},
189 {8, "AA Compromise", "AACompromise"},
190 {-1, NULL, NULL}
191};
192
193static int set_reasons(ASN1_BIT_STRING **preas, char *value)
194{
195 STACK_OF(CONF_VALUE) *rsk = NULL;
196 const BIT_STRING_BITNAME *pbn;
197 const char *bnam;
198 size_t i;
199 int ret = 0;
200 rsk = X509V3_parse_list(value);
201 if (!rsk)
202 return 0;
203 if (*preas)
204 return 0;
205 for (i = 0; i < sk_CONF_VALUE_num(rsk); i++) {
206 bnam = sk_CONF_VALUE_value(rsk, i)->name;
207 if (!*preas) {
208 *preas = ASN1_BIT_STRING_new();
209 if (!*preas)
210 goto err;
211 }
212 for (pbn = reason_flags; pbn->lname; pbn++) {
213 if (!strcmp(pbn->sname, bnam)) {
214 if (!ASN1_BIT_STRING_set_bit(*preas, pbn->bitnum, 1))
215 goto err;
216 break;
217 }
218 }
219 if (!pbn->lname)
220 goto err;
221 }
222 ret = 1;
223
224 err:
225 sk_CONF_VALUE_pop_free(rsk, X509V3_conf_free);
226 return ret;
227}
228
229static int print_reasons(BIO *out, const char *rname,
230 ASN1_BIT_STRING *rflags, int indent)
231{
232 int first = 1;
233 const BIT_STRING_BITNAME *pbn;
234 BIO_printf(out, "%*s%s:\n%*s", indent, "", rname, indent + 2, "");
235 for (pbn = reason_flags; pbn->lname; pbn++) {
236 if (ASN1_BIT_STRING_get_bit(rflags, pbn->bitnum)) {
237 if (first)
238 first = 0;
239 else
240 BIO_puts(out, ", ");
241 BIO_puts(out, pbn->lname);
242 }
243 }
244 if (first)
245 BIO_puts(out, "<EMPTY>\n");
246 else
247 BIO_puts(out, "\n");
248 return 1;
249}
250
251static DIST_POINT *crldp_from_section(X509V3_CTX *ctx,
252 STACK_OF(CONF_VALUE) *nval)
253{
254 size_t i;
255 CONF_VALUE *cnf;
256 DIST_POINT *point = NULL;
257 point = DIST_POINT_new();
258 if (!point)
259 goto err;
260 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
261 int ret;
262 cnf = sk_CONF_VALUE_value(nval, i);
263 ret = set_dist_point_name(&point->distpoint, ctx, cnf);
264 if (ret > 0)
265 continue;
266 if (ret < 0)
267 goto err;
268 if (!strcmp(cnf->name, "reasons")) {
269 if (!set_reasons(&point->reasons, cnf->value))
270 goto err;
271 } else if (!strcmp(cnf->name, "CRLissuer")) {
272 point->CRLissuer = gnames_from_sectname(ctx, cnf->value);
273 if (!point->CRLissuer)
274 goto err;
275 }
276 }
277
278 return point;
279
280 err:
281 if (point)
282 DIST_POINT_free(point);
283 return NULL;
284}
285
286static void *v2i_crld(const X509V3_EXT_METHOD *method,
287 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
288{
289 STACK_OF(DIST_POINT) *crld = NULL;
290 GENERAL_NAMES *gens = NULL;
291 GENERAL_NAME *gen = NULL;
292 CONF_VALUE *cnf;
293 size_t i;
294 if (!(crld = sk_DIST_POINT_new_null()))
295 goto merr;
296 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
297 DIST_POINT *point;
298 cnf = sk_CONF_VALUE_value(nval, i);
299 if (!cnf->value) {
300 STACK_OF(CONF_VALUE) *dpsect;
301 dpsect = X509V3_get_section(ctx, cnf->name);
302 if (!dpsect)
303 goto err;
304 point = crldp_from_section(ctx, dpsect);
305 X509V3_section_free(ctx, dpsect);
306 if (!point)
307 goto err;
308 if (!sk_DIST_POINT_push(crld, point)) {
309 DIST_POINT_free(point);
310 goto merr;
311 }
312 } else {
313 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
314 goto err;
315 if (!(gens = GENERAL_NAMES_new()))
316 goto merr;
317 if (!sk_GENERAL_NAME_push(gens, gen))
318 goto merr;
319 gen = NULL;
320 if (!(point = DIST_POINT_new()))
321 goto merr;
322 if (!sk_DIST_POINT_push(crld, point)) {
323 DIST_POINT_free(point);
324 goto merr;
325 }
326 if (!(point->distpoint = DIST_POINT_NAME_new()))
327 goto merr;
328 point->distpoint->name.fullname = gens;
329 point->distpoint->type = 0;
330 gens = NULL;
331 }
332 }
333 return crld;
334
335 merr:
336 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
337 err:
338 GENERAL_NAME_free(gen);
339 GENERAL_NAMES_free(gens);
340 sk_DIST_POINT_pop_free(crld, DIST_POINT_free);
341 return NULL;
342}
343
344IMPLEMENT_ASN1_SET_OF(DIST_POINT)
345
346static int dpn_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it,
347 void *exarg)
348{
349 DIST_POINT_NAME *dpn = (DIST_POINT_NAME *)*pval;
350
351 switch (operation) {
352 case ASN1_OP_NEW_POST:
353 dpn->dpname = NULL;
354 break;
355
356 case ASN1_OP_FREE_POST:
357 if (dpn->dpname)
358 X509_NAME_free(dpn->dpname);
359 break;
360 }
361 return 1;
362}
363
364
365ASN1_CHOICE_cb(DIST_POINT_NAME, dpn_cb) = {
366 ASN1_IMP_SEQUENCE_OF(DIST_POINT_NAME, name.fullname, GENERAL_NAME, 0),
367 ASN1_IMP_SET_OF(DIST_POINT_NAME, name.relativename, X509_NAME_ENTRY, 1)
368} ASN1_CHOICE_END_cb(DIST_POINT_NAME, DIST_POINT_NAME, type)
369
370
371IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT_NAME)
372
373ASN1_SEQUENCE(DIST_POINT) = {
374 ASN1_EXP_OPT(DIST_POINT, distpoint, DIST_POINT_NAME, 0),
375 ASN1_IMP_OPT(DIST_POINT, reasons, ASN1_BIT_STRING, 1),
376 ASN1_IMP_SEQUENCE_OF_OPT(DIST_POINT, CRLissuer, GENERAL_NAME, 2)
377} ASN1_SEQUENCE_END(DIST_POINT)
378
379IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT)
380
381ASN1_ITEM_TEMPLATE(CRL_DIST_POINTS) =
382 ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, CRLDistributionPoints, DIST_POINT)
383ASN1_ITEM_TEMPLATE_END(CRL_DIST_POINTS)
384
385IMPLEMENT_ASN1_FUNCTIONS(CRL_DIST_POINTS)
386
387ASN1_SEQUENCE(ISSUING_DIST_POINT) = {
388 ASN1_EXP_OPT(ISSUING_DIST_POINT, distpoint, DIST_POINT_NAME, 0),
389 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyuser, ASN1_FBOOLEAN, 1),
390 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyCA, ASN1_FBOOLEAN, 2),
391 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlysomereasons, ASN1_BIT_STRING, 3),
392 ASN1_IMP_OPT(ISSUING_DIST_POINT, indirectCRL, ASN1_FBOOLEAN, 4),
393 ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyattr, ASN1_FBOOLEAN, 5)
394} ASN1_SEQUENCE_END(ISSUING_DIST_POINT)
395
396IMPLEMENT_ASN1_FUNCTIONS(ISSUING_DIST_POINT)
397
398static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out,
399 int indent);
400static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
401 STACK_OF(CONF_VALUE) *nval);
402
403const X509V3_EXT_METHOD v3_idp = {
404 NID_issuing_distribution_point, X509V3_EXT_MULTILINE,
405 ASN1_ITEM_ref(ISSUING_DIST_POINT),
406 0, 0, 0, 0,
407 0, 0,
408 0,
409 v2i_idp,
410 i2r_idp, 0,
411 NULL
412};
413
414static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
415 STACK_OF(CONF_VALUE) *nval)
416{
417 ISSUING_DIST_POINT *idp = NULL;
418 CONF_VALUE *cnf;
419 char *name, *val;
420 size_t i;
421 int ret;
422 idp = ISSUING_DIST_POINT_new();
423 if (!idp)
424 goto merr;
425 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
426 cnf = sk_CONF_VALUE_value(nval, i);
427 name = cnf->name;
428 val = cnf->value;
429 ret = set_dist_point_name(&idp->distpoint, ctx, cnf);
430 if (ret > 0)
431 continue;
432 if (ret < 0)
433 goto err;
434 if (!strcmp(name, "onlyuser")) {
435 if (!X509V3_get_value_bool(cnf, &idp->onlyuser))
436 goto err;
437 } else if (!strcmp(name, "onlyCA")) {
438 if (!X509V3_get_value_bool(cnf, &idp->onlyCA))
439 goto err;
440 } else if (!strcmp(name, "onlyAA")) {
441 if (!X509V3_get_value_bool(cnf, &idp->onlyattr))
442 goto err;
443 } else if (!strcmp(name, "indirectCRL")) {
444 if (!X509V3_get_value_bool(cnf, &idp->indirectCRL))
445 goto err;
446 } else if (!strcmp(name, "onlysomereasons")) {
447 if (!set_reasons(&idp->onlysomereasons, val))
448 goto err;
449 } else {
450 OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_NAME);
451 X509V3_conf_err(cnf);
452 goto err;
453 }
454 }
455 return idp;
456
457 merr:
458 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
459 err:
460 ISSUING_DIST_POINT_free(idp);
461 return NULL;
462}
463
464static int print_gens(BIO *out, STACK_OF(GENERAL_NAME) *gens, int indent)
465{
466 size_t i;
467 for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) {
468 BIO_printf(out, "%*s", indent + 2, "");
469 GENERAL_NAME_print(out, sk_GENERAL_NAME_value(gens, i));
470 BIO_puts(out, "\n");
471 }
472 return 1;
473}
474
475static int print_distpoint(BIO *out, DIST_POINT_NAME *dpn, int indent)
476{
477 if (dpn->type == 0) {
478 BIO_printf(out, "%*sFull Name:\n", indent, "");
479 print_gens(out, dpn->name.fullname, indent);
480 } else {
481 X509_NAME ntmp;
482 ntmp.entries = dpn->name.relativename;
483 BIO_printf(out, "%*sRelative Name:\n%*s", indent, "", indent + 2, "");
484 X509_NAME_print_ex(out, &ntmp, 0, XN_FLAG_ONELINE);
485 BIO_puts(out, "\n");
486 }
487 return 1;
488}
489
490static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out,
491 int indent)
492{
493 ISSUING_DIST_POINT *idp = pidp;
494 if (idp->distpoint)
495 print_distpoint(out, idp->distpoint, indent);
496 if (idp->onlyuser > 0)
497 BIO_printf(out, "%*sOnly User Certificates\n", indent, "");
498 if (idp->onlyCA > 0)
499 BIO_printf(out, "%*sOnly CA Certificates\n", indent, "");
500 if (idp->indirectCRL > 0)
501 BIO_printf(out, "%*sIndirect CRL\n", indent, "");
502 if (idp->onlysomereasons)
503 print_reasons(out, "Only Some Reasons", idp->onlysomereasons, indent);
504 if (idp->onlyattr > 0)
505 BIO_printf(out, "%*sOnly Attribute Certificates\n", indent, "");
506 if (!idp->distpoint && (idp->onlyuser <= 0) && (idp->onlyCA <= 0)
507 && (idp->indirectCRL <= 0) && !idp->onlysomereasons
508 && (idp->onlyattr <= 0))
509 BIO_printf(out, "%*s<EMPTY>\n", indent, "");
510
511 return 1;
512}
513
514static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out,
515 int indent)
516{
517 STACK_OF(DIST_POINT) *crld = pcrldp;
518 DIST_POINT *point;
519 size_t i;
520 for (i = 0; i < sk_DIST_POINT_num(crld); i++) {
521 BIO_puts(out, "\n");
522 point = sk_DIST_POINT_value(crld, i);
523 if (point->distpoint)
524 print_distpoint(out, point->distpoint, indent);
525 if (point->reasons)
526 print_reasons(out, "Reasons", point->reasons, indent);
527 if (point->CRLissuer) {
528 BIO_printf(out, "%*sCRL Issuer:\n", indent, "");
529 print_gens(out, point->CRLissuer, indent);
530 }
531 }
532 return 1;
533}
534
535int DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname)
536{
537 size_t i;
538 STACK_OF(X509_NAME_ENTRY) *frag;
539 X509_NAME_ENTRY *ne;
540 if (!dpn || (dpn->type != 1))
541 return 1;
542 frag = dpn->name.relativename;
543 dpn->dpname = X509_NAME_dup(iname);
544 if (!dpn->dpname)
545 return 0;
546 for (i = 0; i < sk_X509_NAME_ENTRY_num(frag); i++) {
547 ne = sk_X509_NAME_ENTRY_value(frag, i);
548 if (!X509_NAME_add_entry(dpn->dpname, ne, -1, i ? 0 : 1)) {
549 X509_NAME_free(dpn->dpname);
550 dpn->dpname = NULL;
551 return 0;
552 }
553 }
554 /* generate cached encoding of name */
555 if (i2d_X509_NAME(dpn->dpname, NULL) < 0) {
556 X509_NAME_free(dpn->dpname);
557 dpn->dpname = NULL;
558 return 0;
559 }
560 return 1;
561}
562