]>
Commit | Line | Data |
---|---|---|
0f113f3e | 1 | /* |
3c2bdd7d | 2 | * Copyright 1999-2021 The OpenSSL Project Authors. All Rights Reserved. |
2f0eae31 | 3 | * |
4286ca47 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
d2e9e320 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
2f0eae31 DSH |
8 | */ |
9 | ||
10 | #include <stdio.h> | |
b39fc560 | 11 | #include "internal/cryptlib.h" |
ec577822 BM |
12 | #include <openssl/conf.h> |
13 | #include <openssl/asn1.h> | |
9d6b1ce6 | 14 | #include <openssl/asn1t.h> |
ec577822 | 15 | #include <openssl/x509v3.h> |
df2ee0e2 | 16 | #include "ext_dat.h" |
2f0eae31 DSH |
17 | |
18 | /* Support for Thawte strong extranet extension */ | |
19 | ||
28a98809 DSH |
20 | #define SXNET_TEST |
21 | ||
0f113f3e MC |
22 | static int sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, |
23 | int indent); | |
28a98809 | 24 | #ifdef SXNET_TEST |
0f113f3e MC |
25 | static SXNET *sxnet_v2i(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
26 | STACK_OF(CONF_VALUE) *nval); | |
28a98809 | 27 | #endif |
47864aea | 28 | const X509V3_EXT_METHOD ossl_v3_sxnet = { |
0f113f3e MC |
29 | NID_sxnet, X509V3_EXT_MULTILINE, ASN1_ITEM_ref(SXNET), |
30 | 0, 0, 0, 0, | |
31 | 0, 0, | |
32 | 0, | |
28a98809 | 33 | #ifdef SXNET_TEST |
0f113f3e | 34 | (X509V3_EXT_V2I)sxnet_v2i, |
28a98809 | 35 | #else |
0f113f3e | 36 | 0, |
28a98809 | 37 | #endif |
0f113f3e MC |
38 | (X509V3_EXT_I2R)sxnet_i2r, |
39 | 0, | |
40 | NULL | |
2f0eae31 DSH |
41 | }; |
42 | ||
9d6b1ce6 | 43 | ASN1_SEQUENCE(SXNETID) = { |
0f113f3e MC |
44 | ASN1_SIMPLE(SXNETID, zone, ASN1_INTEGER), |
45 | ASN1_SIMPLE(SXNETID, user, ASN1_OCTET_STRING) | |
d339187b | 46 | } ASN1_SEQUENCE_END(SXNETID) |
2f0eae31 | 47 | |
9d6b1ce6 | 48 | IMPLEMENT_ASN1_FUNCTIONS(SXNETID) |
2f0eae31 | 49 | |
9d6b1ce6 | 50 | ASN1_SEQUENCE(SXNET) = { |
0f113f3e MC |
51 | ASN1_SIMPLE(SXNET, version, ASN1_INTEGER), |
52 | ASN1_SEQUENCE_OF(SXNET, ids, SXNETID) | |
d339187b | 53 | } ASN1_SEQUENCE_END(SXNET) |
2f0eae31 | 54 | |
9d6b1ce6 | 55 | IMPLEMENT_ASN1_FUNCTIONS(SXNET) |
2f0eae31 | 56 | |
6b691a5c | 57 | static int sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, |
0f113f3e | 58 | int indent) |
2f0eae31 | 59 | { |
61b0fead | 60 | int64_t v; |
0f113f3e MC |
61 | char *tmp; |
62 | SXNETID *id; | |
63 | int i; | |
61b0fead MC |
64 | |
65 | /* | |
66 | * Since we add 1 to the version number to display it, we don't support | |
67 | * LONG_MAX since that would cause on overflow. | |
68 | */ | |
69 | if (!ASN1_INTEGER_get_int64(&v, sx->version) | |
70 | || v >= LONG_MAX | |
71 | || v < LONG_MIN) { | |
72 | BIO_printf(out, "%*sVersion: <unsupported>", indent, ""); | |
73 | } else { | |
74 | long vl = (long)v; | |
75 | ||
76 | BIO_printf(out, "%*sVersion: %ld (0x%lX)", indent, "", vl + 1, vl); | |
77 | } | |
0f113f3e MC |
78 | for (i = 0; i < sk_SXNETID_num(sx->ids); i++) { |
79 | id = sk_SXNETID_value(sx->ids, i); | |
80 | tmp = i2s_ASN1_INTEGER(NULL, id->zone); | |
81 | BIO_printf(out, "\n%*sZone: %s, User: ", indent, "", tmp); | |
82 | OPENSSL_free(tmp); | |
f422a514 | 83 | ASN1_STRING_print(out, id->user); |
0f113f3e MC |
84 | } |
85 | return 1; | |
2f0eae31 | 86 | } |
28a98809 DSH |
87 | |
88 | #ifdef SXNET_TEST | |
89 | ||
0f113f3e MC |
90 | /* |
91 | * NBB: this is used for testing only. It should *not* be used for anything | |
28a98809 DSH |
92 | * else because it will just take static IDs from the configuration file and |
93 | * they should really be separate values for each user. | |
94 | */ | |
95 | ||
0f113f3e MC |
96 | static SXNET *sxnet_v2i(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
97 | STACK_OF(CONF_VALUE) *nval) | |
28a98809 | 98 | { |
0f113f3e MC |
99 | CONF_VALUE *cnf; |
100 | SXNET *sx = NULL; | |
101 | int i; | |
102 | for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { | |
103 | cnf = sk_CONF_VALUE_value(nval, i); | |
104 | if (!SXNET_add_id_asc(&sx, cnf->name, cnf->value, -1)) | |
105 | return NULL; | |
106 | } | |
107 | return sx; | |
28a98809 | 108 | } |
0f113f3e | 109 | |
28a98809 DSH |
110 | #endif |
111 | ||
112 | /* Strong Extranet utility functions */ | |
113 | ||
114 | /* Add an id given the zone as an ASCII number */ | |
115 | ||
0aa25a68 | 116 | int SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen) |
28a98809 | 117 | { |
75ebbd9a RS |
118 | ASN1_INTEGER *izone; |
119 | ||
120 | if ((izone = s2i_ASN1_INTEGER(NULL, zone)) == NULL) { | |
9311d0c4 | 121 | ERR_raise(ERR_LIB_X509V3, X509V3_R_ERROR_CONVERTING_ZONE); |
0f113f3e MC |
122 | return 0; |
123 | } | |
124 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | |
28a98809 DSH |
125 | } |
126 | ||
127 | /* Add an id given the zone as an unsigned long */ | |
128 | ||
0aa25a68 | 129 | int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user, |
0f113f3e | 130 | int userlen) |
28a98809 | 131 | { |
75ebbd9a RS |
132 | ASN1_INTEGER *izone; |
133 | ||
134 | if ((izone = ASN1_INTEGER_new()) == NULL | |
135 | || !ASN1_INTEGER_set(izone, lzone)) { | |
9311d0c4 | 136 | ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); |
f422a514 | 137 | ASN1_INTEGER_free(izone); |
0f113f3e MC |
138 | return 0; |
139 | } | |
140 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | |
141 | ||
28a98809 DSH |
142 | } |
143 | ||
0f113f3e MC |
144 | /* |
145 | * Add an id given the zone as an ASN1_INTEGER. Note this version uses the | |
146 | * passed integer and doesn't make a copy so don't free it up afterwards. | |
28a98809 DSH |
147 | */ |
148 | ||
0aa25a68 | 149 | int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *zone, const char *user, |
0f113f3e | 150 | int userlen) |
28a98809 | 151 | { |
0f113f3e MC |
152 | SXNET *sx = NULL; |
153 | SXNETID *id = NULL; | |
12a765a5 RS |
154 | |
155 | if (psx == NULL || zone == NULL || user == NULL) { | |
9311d0c4 | 156 | ERR_raise(ERR_LIB_X509V3, X509V3_R_INVALID_NULL_ARGUMENT); |
0f113f3e MC |
157 | return 0; |
158 | } | |
159 | if (userlen == -1) | |
160 | userlen = strlen(user); | |
161 | if (userlen > 64) { | |
9311d0c4 | 162 | ERR_raise(ERR_LIB_X509V3, X509V3_R_USER_TOO_LONG); |
0f113f3e MC |
163 | return 0; |
164 | } | |
75ebbd9a RS |
165 | if (*psx == NULL) { |
166 | if ((sx = SXNET_new()) == NULL) | |
0f113f3e MC |
167 | goto err; |
168 | if (!ASN1_INTEGER_set(sx->version, 0)) | |
169 | goto err; | |
170 | *psx = sx; | |
171 | } else | |
172 | sx = *psx; | |
173 | if (SXNET_get_id_INTEGER(sx, zone)) { | |
9311d0c4 | 174 | ERR_raise(ERR_LIB_X509V3, X509V3_R_DUPLICATE_ZONE_ID); |
0f113f3e MC |
175 | return 0; |
176 | } | |
28a98809 | 177 | |
75ebbd9a | 178 | if ((id = SXNETID_new()) == NULL) |
0f113f3e MC |
179 | goto err; |
180 | if (userlen == -1) | |
181 | userlen = strlen(user); | |
182 | ||
0aa25a68 | 183 | if (!ASN1_OCTET_STRING_set(id->user, (const unsigned char *)user, userlen)) |
0f113f3e MC |
184 | goto err; |
185 | if (!sk_SXNETID_push(sx->ids, id)) | |
186 | goto err; | |
187 | id->zone = zone; | |
188 | return 1; | |
189 | ||
190 | err: | |
9311d0c4 | 191 | ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); |
0f113f3e MC |
192 | SXNETID_free(id); |
193 | SXNET_free(sx); | |
194 | *psx = NULL; | |
195 | return 0; | |
28a98809 DSH |
196 | } |
197 | ||
0aa25a68 | 198 | ASN1_OCTET_STRING *SXNET_get_id_asc(SXNET *sx, const char *zone) |
28a98809 | 199 | { |
75ebbd9a | 200 | ASN1_INTEGER *izone; |
0f113f3e | 201 | ASN1_OCTET_STRING *oct; |
75ebbd9a RS |
202 | |
203 | if ((izone = s2i_ASN1_INTEGER(NULL, zone)) == NULL) { | |
9311d0c4 | 204 | ERR_raise(ERR_LIB_X509V3, X509V3_R_ERROR_CONVERTING_ZONE); |
0f113f3e MC |
205 | return NULL; |
206 | } | |
207 | oct = SXNET_get_id_INTEGER(sx, izone); | |
f422a514 | 208 | ASN1_INTEGER_free(izone); |
0f113f3e | 209 | return oct; |
28a98809 DSH |
210 | } |
211 | ||
6b691a5c | 212 | ASN1_OCTET_STRING *SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) |
28a98809 | 213 | { |
75ebbd9a | 214 | ASN1_INTEGER *izone; |
0f113f3e | 215 | ASN1_OCTET_STRING *oct; |
75ebbd9a RS |
216 | |
217 | if ((izone = ASN1_INTEGER_new()) == NULL | |
218 | || !ASN1_INTEGER_set(izone, lzone)) { | |
9311d0c4 | 219 | ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); |
f422a514 | 220 | ASN1_INTEGER_free(izone); |
0f113f3e MC |
221 | return NULL; |
222 | } | |
223 | oct = SXNET_get_id_INTEGER(sx, izone); | |
f422a514 | 224 | ASN1_INTEGER_free(izone); |
0f113f3e | 225 | return oct; |
28a98809 DSH |
226 | } |
227 | ||
6b691a5c | 228 | ASN1_OCTET_STRING *SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) |
28a98809 | 229 | { |
0f113f3e MC |
230 | SXNETID *id; |
231 | int i; | |
232 | for (i = 0; i < sk_SXNETID_num(sx->ids); i++) { | |
233 | id = sk_SXNETID_value(sx->ids, i); | |
f422a514 | 234 | if (!ASN1_INTEGER_cmp(id->zone, zone)) |
0f113f3e MC |
235 | return id->user; |
236 | } | |
237 | return NULL; | |
28a98809 | 238 | } |