2 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
5 /* ====================================================================
6 * Copyright (c) 1999-2002 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
58 /* extension creation utilities */
62 #include "internal/cryptlib.h"
63 #include <openssl/conf.h>
64 #include <openssl/x509.h>
65 #include "internal/x509_int.h"
66 #include <openssl/x509v3.h>
68 static int v3_check_critical(char **value
);
69 static int v3_check_generic(char **value
);
70 static X509_EXTENSION
*do_ext_nconf(CONF
*conf
, X509V3_CTX
*ctx
, int ext_nid
,
71 int crit
, char *value
);
72 static X509_EXTENSION
*v3_generic_extension(const char *ext
, char *value
,
75 static char *conf_lhash_get_string(void *db
, char *section
, char *value
);
76 static STACK_OF(CONF_VALUE
) *conf_lhash_get_section(void *db
, char *section
);
77 static X509_EXTENSION
*do_ext_i2d(const X509V3_EXT_METHOD
*method
,
78 int ext_nid
, int crit
, void *ext_struc
);
79 static unsigned char *generic_asn1(char *value
, X509V3_CTX
*ctx
,
81 /* CONF *conf: Config file */
82 /* char *name: Name */
83 /* char *value: Value */
84 X509_EXTENSION
*X509V3_EXT_nconf(CONF
*conf
, X509V3_CTX
*ctx
, char *name
,
90 crit
= v3_check_critical(&value
);
91 if ((ext_type
= v3_check_generic(&value
)))
92 return v3_generic_extension(name
, value
, crit
, ext_type
, ctx
);
93 ret
= do_ext_nconf(conf
, ctx
, OBJ_sn2nid(name
), crit
, value
);
95 X509V3err(X509V3_F_X509V3_EXT_NCONF
, X509V3_R_ERROR_IN_EXTENSION
);
96 ERR_add_error_data(4, "name=", name
, ", value=", value
);
101 /* CONF *conf: Config file */
102 /* char *value: Value */
103 X509_EXTENSION
*X509V3_EXT_nconf_nid(CONF
*conf
, X509V3_CTX
*ctx
, int ext_nid
,
108 crit
= v3_check_critical(&value
);
109 if ((ext_type
= v3_check_generic(&value
)))
110 return v3_generic_extension(OBJ_nid2sn(ext_nid
),
111 value
, crit
, ext_type
, ctx
);
112 return do_ext_nconf(conf
, ctx
, ext_nid
, crit
, value
);
115 /* CONF *conf: Config file */
116 /* char *value: Value */
117 static X509_EXTENSION
*do_ext_nconf(CONF
*conf
, X509V3_CTX
*ctx
, int ext_nid
,
118 int crit
, char *value
)
120 const X509V3_EXT_METHOD
*method
;
122 STACK_OF(CONF_VALUE
) *nval
;
125 if (ext_nid
== NID_undef
) {
126 X509V3err(X509V3_F_DO_EXT_NCONF
, X509V3_R_UNKNOWN_EXTENSION_NAME
);
129 if ((method
= X509V3_EXT_get_nid(ext_nid
)) == NULL
) {
130 X509V3err(X509V3_F_DO_EXT_NCONF
, X509V3_R_UNKNOWN_EXTENSION
);
133 /* Now get internal extension representation based on type */
136 nval
= NCONF_get_section(conf
, value
+ 1);
138 nval
= X509V3_parse_list(value
);
139 if (sk_CONF_VALUE_num(nval
) <= 0) {
140 X509V3err(X509V3_F_DO_EXT_NCONF
,
141 X509V3_R_INVALID_EXTENSION_STRING
);
142 ERR_add_error_data(4, "name=", OBJ_nid2sn(ext_nid
), ",section=",
146 ext_struc
= method
->v2i(method
, ctx
, nval
);
148 sk_CONF_VALUE_pop_free(nval
, X509V3_conf_free
);
151 } else if (method
->s2i
) {
152 if ((ext_struc
= method
->s2i(method
, ctx
, value
)) == NULL
)
154 } else if (method
->r2i
) {
155 if (!ctx
->db
|| !ctx
->db_meth
) {
156 X509V3err(X509V3_F_DO_EXT_NCONF
, X509V3_R_NO_CONFIG_DATABASE
);
159 if ((ext_struc
= method
->r2i(method
, ctx
, value
)) == NULL
)
162 X509V3err(X509V3_F_DO_EXT_NCONF
,
163 X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED
);
164 ERR_add_error_data(2, "name=", OBJ_nid2sn(ext_nid
));
168 ext
= do_ext_i2d(method
, ext_nid
, crit
, ext_struc
);
170 ASN1_item_free(ext_struc
, ASN1_ITEM_ptr(method
->it
));
172 method
->ext_free(ext_struc
);
177 static X509_EXTENSION
*do_ext_i2d(const X509V3_EXT_METHOD
*method
,
178 int ext_nid
, int crit
, void *ext_struc
)
180 unsigned char *ext_der
= NULL
;
182 ASN1_OCTET_STRING
*ext_oct
= NULL
;
184 /* Convert internal representation to DER */
188 ASN1_item_i2d(ext_struc
, &ext_der
, ASN1_ITEM_ptr(method
->it
));
194 ext_len
= method
->i2d(ext_struc
, NULL
);
195 if ((ext_der
= OPENSSL_malloc(ext_len
)) == NULL
)
198 method
->i2d(ext_struc
, &p
);
200 if ((ext_oct
= ASN1_OCTET_STRING_new()) == NULL
)
202 ext_oct
->data
= ext_der
;
204 ext_oct
->length
= ext_len
;
206 ext
= X509_EXTENSION_create_by_NID(NULL
, ext_nid
, crit
, ext_oct
);
209 ASN1_OCTET_STRING_free(ext_oct
);
214 X509V3err(X509V3_F_DO_EXT_I2D
, ERR_R_MALLOC_FAILURE
);
215 OPENSSL_free(ext_der
);
216 ASN1_OCTET_STRING_free(ext_oct
);
221 /* Given an internal structure, nid and critical flag create an extension */
223 X509_EXTENSION
*X509V3_EXT_i2d(int ext_nid
, int crit
, void *ext_struc
)
225 const X509V3_EXT_METHOD
*method
;
227 if ((method
= X509V3_EXT_get_nid(ext_nid
)) == NULL
) {
228 X509V3err(X509V3_F_X509V3_EXT_I2D
, X509V3_R_UNKNOWN_EXTENSION
);
231 return do_ext_i2d(method
, ext_nid
, crit
, ext_struc
);
234 /* Check the extension string for critical flag */
235 static int v3_check_critical(char **value
)
238 if ((strlen(p
) < 9) || strncmp(p
, "critical,", 9))
241 while (isspace((unsigned char)*p
))
247 /* Check extension string for generic extension and return the type */
248 static int v3_check_generic(char **value
)
252 if ((strlen(p
) >= 4) && strncmp(p
, "DER:", 4) == 0) {
255 } else if ((strlen(p
) >= 5) && strncmp(p
, "ASN1:", 5) == 0) {
261 while (isspace((unsigned char)*p
))
267 /* Create a generic extension: for now just handle DER type */
268 static X509_EXTENSION
*v3_generic_extension(const char *ext
, char *value
,
269 int crit
, int gen_type
,
272 unsigned char *ext_der
= NULL
;
274 ASN1_OBJECT
*obj
= NULL
;
275 ASN1_OCTET_STRING
*oct
= NULL
;
276 X509_EXTENSION
*extension
= NULL
;
278 if ((obj
= OBJ_txt2obj(ext
, 0)) == NULL
) {
279 X509V3err(X509V3_F_V3_GENERIC_EXTENSION
,
280 X509V3_R_EXTENSION_NAME_ERROR
);
281 ERR_add_error_data(2, "name=", ext
);
286 ext_der
= OPENSSL_hexstr2buf(value
, &ext_len
);
287 else if (gen_type
== 2)
288 ext_der
= generic_asn1(value
, ctx
, &ext_len
);
290 if (ext_der
== NULL
) {
291 X509V3err(X509V3_F_V3_GENERIC_EXTENSION
,
292 X509V3_R_EXTENSION_VALUE_ERROR
);
293 ERR_add_error_data(2, "value=", value
);
297 if ((oct
= ASN1_OCTET_STRING_new()) == NULL
) {
298 X509V3err(X509V3_F_V3_GENERIC_EXTENSION
, ERR_R_MALLOC_FAILURE
);
303 oct
->length
= ext_len
;
306 extension
= X509_EXTENSION_create_by_OBJ(NULL
, obj
, crit
, oct
);
309 ASN1_OBJECT_free(obj
);
310 ASN1_OCTET_STRING_free(oct
);
311 OPENSSL_free(ext_der
);
316 static unsigned char *generic_asn1(char *value
, X509V3_CTX
*ctx
,
320 unsigned char *ext_der
= NULL
;
321 typ
= ASN1_generate_v3(value
, ctx
);
324 *ext_len
= i2d_ASN1_TYPE(typ
, &ext_der
);
329 static void delete_ext(STACK_OF(X509_EXTENSION
) *sk
, X509_EXTENSION
*dext
)
333 obj
= X509_EXTENSION_get_object(dext
);
334 while ((idx
= X509v3_get_ext_by_OBJ(sk
, obj
, -1)) >= 0) {
335 X509_EXTENSION
*tmpext
= X509v3_get_ext(sk
, idx
);
336 X509v3_delete_ext(sk
, idx
);
337 X509_EXTENSION_free(tmpext
);
342 * This is the main function: add a bunch of extensions based on a config
343 * file section to an extension STACK.
346 int X509V3_EXT_add_nconf_sk(CONF
*conf
, X509V3_CTX
*ctx
, char *section
,
347 STACK_OF(X509_EXTENSION
) **sk
)
350 STACK_OF(CONF_VALUE
) *nval
;
354 if ((nval
= NCONF_get_section(conf
, section
)) == NULL
)
356 for (i
= 0; i
< sk_CONF_VALUE_num(nval
); i
++) {
357 val
= sk_CONF_VALUE_value(nval
, i
);
358 if ((ext
= X509V3_EXT_nconf(conf
, ctx
, val
->name
, val
->value
)) == NULL
)
360 if (ctx
->flags
== X509V3_CTX_REPLACE
)
361 delete_ext(*sk
, ext
);
363 X509v3_add_ext(sk
, ext
, -1);
364 X509_EXTENSION_free(ext
);
370 * Convenience functions to add extensions to a certificate, CRL and request
373 int X509V3_EXT_add_nconf(CONF
*conf
, X509V3_CTX
*ctx
, char *section
,
376 STACK_OF(X509_EXTENSION
) **sk
= NULL
;
378 sk
= &cert
->cert_info
.extensions
;
379 return X509V3_EXT_add_nconf_sk(conf
, ctx
, section
, sk
);
382 /* Same as above but for a CRL */
384 int X509V3_EXT_CRL_add_nconf(CONF
*conf
, X509V3_CTX
*ctx
, char *section
,
387 STACK_OF(X509_EXTENSION
) **sk
= NULL
;
389 sk
= &crl
->crl
.extensions
;
390 return X509V3_EXT_add_nconf_sk(conf
, ctx
, section
, sk
);
393 /* Add extensions to certificate request */
395 int X509V3_EXT_REQ_add_nconf(CONF
*conf
, X509V3_CTX
*ctx
, char *section
,
398 STACK_OF(X509_EXTENSION
) *extlist
= NULL
, **sk
= NULL
;
402 i
= X509V3_EXT_add_nconf_sk(conf
, ctx
, section
, sk
);
405 i
= X509_REQ_add_extensions(req
, extlist
);
406 sk_X509_EXTENSION_pop_free(extlist
, X509_EXTENSION_free
);
410 /* Config database functions */
412 char *X509V3_get_string(X509V3_CTX
*ctx
, char *name
, char *section
)
414 if (!ctx
->db
|| !ctx
->db_meth
|| !ctx
->db_meth
->get_string
) {
415 X509V3err(X509V3_F_X509V3_GET_STRING
, X509V3_R_OPERATION_NOT_DEFINED
);
418 if (ctx
->db_meth
->get_string
)
419 return ctx
->db_meth
->get_string(ctx
->db
, name
, section
);
423 STACK_OF(CONF_VALUE
) *X509V3_get_section(X509V3_CTX
*ctx
, char *section
)
425 if (!ctx
->db
|| !ctx
->db_meth
|| !ctx
->db_meth
->get_section
) {
426 X509V3err(X509V3_F_X509V3_GET_SECTION
,
427 X509V3_R_OPERATION_NOT_DEFINED
);
430 if (ctx
->db_meth
->get_section
)
431 return ctx
->db_meth
->get_section(ctx
->db
, section
);
435 void X509V3_string_free(X509V3_CTX
*ctx
, char *str
)
439 if (ctx
->db_meth
->free_string
)
440 ctx
->db_meth
->free_string(ctx
->db
, str
);
443 void X509V3_section_free(X509V3_CTX
*ctx
, STACK_OF(CONF_VALUE
) *section
)
447 if (ctx
->db_meth
->free_section
)
448 ctx
->db_meth
->free_section(ctx
->db
, section
);
451 static char *nconf_get_string(void *db
, char *section
, char *value
)
453 return NCONF_get_string(db
, section
, value
);
456 static STACK_OF(CONF_VALUE
) *nconf_get_section(void *db
, char *section
)
458 return NCONF_get_section(db
, section
);
461 static X509V3_CONF_METHOD nconf_method
= {
468 void X509V3_set_nconf(X509V3_CTX
*ctx
, CONF
*conf
)
470 ctx
->db_meth
= &nconf_method
;
474 void X509V3_set_ctx(X509V3_CTX
*ctx
, X509
*issuer
, X509
*subj
, X509_REQ
*req
,
475 X509_CRL
*crl
, int flags
)
477 ctx
->issuer_cert
= issuer
;
478 ctx
->subject_cert
= subj
;
480 ctx
->subject_req
= req
;
484 /* Old conf compatibility functions */
486 X509_EXTENSION
*X509V3_EXT_conf(LHASH_OF(CONF_VALUE
) *conf
, X509V3_CTX
*ctx
,
487 char *name
, char *value
)
490 CONF_set_nconf(&ctmp
, conf
);
491 return X509V3_EXT_nconf(&ctmp
, ctx
, name
, value
);
494 /* LHASH *conf: Config file */
495 /* char *value: Value */
496 X509_EXTENSION
*X509V3_EXT_conf_nid(LHASH_OF(CONF_VALUE
) *conf
,
497 X509V3_CTX
*ctx
, int ext_nid
, char *value
)
500 CONF_set_nconf(&ctmp
, conf
);
501 return X509V3_EXT_nconf_nid(&ctmp
, ctx
, ext_nid
, value
);
504 static char *conf_lhash_get_string(void *db
, char *section
, char *value
)
506 return CONF_get_string(db
, section
, value
);
509 static STACK_OF(CONF_VALUE
) *conf_lhash_get_section(void *db
, char *section
)
511 return CONF_get_section(db
, section
);
514 static X509V3_CONF_METHOD conf_lhash_method
= {
515 conf_lhash_get_string
,
516 conf_lhash_get_section
,
521 void X509V3_set_conf_lhash(X509V3_CTX
*ctx
, LHASH_OF(CONF_VALUE
) *lhash
)
523 ctx
->db_meth
= &conf_lhash_method
;
527 int X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE
) *conf
, X509V3_CTX
*ctx
,
528 char *section
, X509
*cert
)
531 CONF_set_nconf(&ctmp
, conf
);
532 return X509V3_EXT_add_nconf(&ctmp
, ctx
, section
, cert
);
535 /* Same as above but for a CRL */
537 int X509V3_EXT_CRL_add_conf(LHASH_OF(CONF_VALUE
) *conf
, X509V3_CTX
*ctx
,
538 char *section
, X509_CRL
*crl
)
541 CONF_set_nconf(&ctmp
, conf
);
542 return X509V3_EXT_CRL_add_nconf(&ctmp
, ctx
, section
, crl
);
545 /* Add extensions to certificate request */
547 int X509V3_EXT_REQ_add_conf(LHASH_OF(CONF_VALUE
) *conf
, X509V3_CTX
*ctx
,
548 char *section
, X509_REQ
*req
)
551 CONF_set_nconf(&ctmp
, conf
);
552 return X509V3_EXT_REQ_add_nconf(&ctmp
, ctx
, section
, req
);