ocsp_ext.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521
  1. /* ocsp_ext.c */
  2. /*
  3. * Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL
  4. * project.
  5. */
  6. /*
  7. * History: This file was transfered to Richard Levitte from CertCo by Kathy
  8. * Weinhold in mid-spring 2000 to be included in OpenSSL or released as a
  9. * patch kit.
  10. */
  11. /* ====================================================================
  12. * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
  13. *
  14. * Redistribution and use in source and binary forms, with or without
  15. * modification, are permitted provided that the following conditions
  16. * are met:
  17. *
  18. * 1. Redistributions of source code must retain the above copyright
  19. * notice, this list of conditions and the following disclaimer.
  20. *
  21. * 2. Redistributions in binary form must reproduce the above copyright
  22. * notice, this list of conditions and the following disclaimer in
  23. * the documentation and/or other materials provided with the
  24. * distribution.
  25. *
  26. * 3. All advertising materials mentioning features or use of this
  27. * software must display the following acknowledgment:
  28. * "This product includes software developed by the OpenSSL Project
  29. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  30. *
  31. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  32. * endorse or promote products derived from this software without
  33. * prior written permission. For written permission, please contact
  34. * openssl-core@openssl.org.
  35. *
  36. * 5. Products derived from this software may not be called "OpenSSL"
  37. * nor may "OpenSSL" appear in their names without prior written
  38. * permission of the OpenSSL Project.
  39. *
  40. * 6. Redistributions of any form whatsoever must retain the following
  41. * acknowledgment:
  42. * "This product includes software developed by the OpenSSL Project
  43. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  44. *
  45. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  46. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  47. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  48. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  49. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  50. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  51. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  52. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  53. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  54. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  55. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  56. * OF THE POSSIBILITY OF SUCH DAMAGE.
  57. * ====================================================================
  58. *
  59. * This product includes cryptographic software written by Eric Young
  60. * (eay@cryptsoft.com). This product includes software written by Tim
  61. * Hudson (tjh@cryptsoft.com).
  62. *
  63. */
  64. #include <stdio.h>
  65. #include "internal/cryptlib.h"
  66. #include <openssl/objects.h>
  67. #include <openssl/x509.h>
  68. #include <openssl/ocsp.h>
  69. #include "ocsp_lcl.h"
  70. #include <openssl/rand.h>
  71. #include <openssl/x509v3.h>
  72. /* Standard wrapper functions for extensions */
  73. /* OCSP request extensions */
  74. int OCSP_REQUEST_get_ext_count(OCSP_REQUEST *x)
  75. {
  76. return (X509v3_get_ext_count(x->tbsRequest.requestExtensions));
  77. }
  78. int OCSP_REQUEST_get_ext_by_NID(OCSP_REQUEST *x, int nid, int lastpos)
  79. {
  80. return (X509v3_get_ext_by_NID
  81. (x->tbsRequest.requestExtensions, nid, lastpos));
  82. }
  83. int OCSP_REQUEST_get_ext_by_OBJ(OCSP_REQUEST *x, ASN1_OBJECT *obj,
  84. int lastpos)
  85. {
  86. return (X509v3_get_ext_by_OBJ
  87. (x->tbsRequest.requestExtensions, obj, lastpos));
  88. }
  89. int OCSP_REQUEST_get_ext_by_critical(OCSP_REQUEST *x, int crit, int lastpos)
  90. {
  91. return (X509v3_get_ext_by_critical
  92. (x->tbsRequest.requestExtensions, crit, lastpos));
  93. }
  94. X509_EXTENSION *OCSP_REQUEST_get_ext(OCSP_REQUEST *x, int loc)
  95. {
  96. return (X509v3_get_ext(x->tbsRequest.requestExtensions, loc));
  97. }
  98. X509_EXTENSION *OCSP_REQUEST_delete_ext(OCSP_REQUEST *x, int loc)
  99. {
  100. return (X509v3_delete_ext(x->tbsRequest.requestExtensions, loc));
  101. }
  102. void *OCSP_REQUEST_get1_ext_d2i(OCSP_REQUEST *x, int nid, int *crit, int *idx)
  103. {
  104. return X509V3_get_d2i(x->tbsRequest.requestExtensions, nid, crit, idx);
  105. }
  106. int OCSP_REQUEST_add1_ext_i2d(OCSP_REQUEST *x, int nid, void *value, int crit,
  107. unsigned long flags)
  108. {
  109. return X509V3_add1_i2d(&x->tbsRequest.requestExtensions, nid, value,
  110. crit, flags);
  111. }
  112. int OCSP_REQUEST_add_ext(OCSP_REQUEST *x, X509_EXTENSION *ex, int loc)
  113. {
  114. return (X509v3_add_ext(&(x->tbsRequest.requestExtensions), ex, loc) !=
  115. NULL);
  116. }
  117. /* Single extensions */
  118. int OCSP_ONEREQ_get_ext_count(OCSP_ONEREQ *x)
  119. {
  120. return (X509v3_get_ext_count(x->singleRequestExtensions));
  121. }
  122. int OCSP_ONEREQ_get_ext_by_NID(OCSP_ONEREQ *x, int nid, int lastpos)
  123. {
  124. return (X509v3_get_ext_by_NID(x->singleRequestExtensions, nid, lastpos));
  125. }
  126. int OCSP_ONEREQ_get_ext_by_OBJ(OCSP_ONEREQ *x, ASN1_OBJECT *obj, int lastpos)
  127. {
  128. return (X509v3_get_ext_by_OBJ(x->singleRequestExtensions, obj, lastpos));
  129. }
  130. int OCSP_ONEREQ_get_ext_by_critical(OCSP_ONEREQ *x, int crit, int lastpos)
  131. {
  132. return (X509v3_get_ext_by_critical
  133. (x->singleRequestExtensions, crit, lastpos));
  134. }
  135. X509_EXTENSION *OCSP_ONEREQ_get_ext(OCSP_ONEREQ *x, int loc)
  136. {
  137. return (X509v3_get_ext(x->singleRequestExtensions, loc));
  138. }
  139. X509_EXTENSION *OCSP_ONEREQ_delete_ext(OCSP_ONEREQ *x, int loc)
  140. {
  141. return (X509v3_delete_ext(x->singleRequestExtensions, loc));
  142. }
  143. void *OCSP_ONEREQ_get1_ext_d2i(OCSP_ONEREQ *x, int nid, int *crit, int *idx)
  144. {
  145. return X509V3_get_d2i(x->singleRequestExtensions, nid, crit, idx);
  146. }
  147. int OCSP_ONEREQ_add1_ext_i2d(OCSP_ONEREQ *x, int nid, void *value, int crit,
  148. unsigned long flags)
  149. {
  150. return X509V3_add1_i2d(&x->singleRequestExtensions, nid, value, crit,
  151. flags);
  152. }
  153. int OCSP_ONEREQ_add_ext(OCSP_ONEREQ *x, X509_EXTENSION *ex, int loc)
  154. {
  155. return (X509v3_add_ext(&(x->singleRequestExtensions), ex, loc) != NULL);
  156. }
  157. /* OCSP Basic response */
  158. int OCSP_BASICRESP_get_ext_count(OCSP_BASICRESP *x)
  159. {
  160. return (X509v3_get_ext_count(x->tbsResponseData.responseExtensions));
  161. }
  162. int OCSP_BASICRESP_get_ext_by_NID(OCSP_BASICRESP *x, int nid, int lastpos)
  163. {
  164. return (X509v3_get_ext_by_NID
  165. (x->tbsResponseData.responseExtensions, nid, lastpos));
  166. }
  167. int OCSP_BASICRESP_get_ext_by_OBJ(OCSP_BASICRESP *x, ASN1_OBJECT *obj,
  168. int lastpos)
  169. {
  170. return (X509v3_get_ext_by_OBJ
  171. (x->tbsResponseData.responseExtensions, obj, lastpos));
  172. }
  173. int OCSP_BASICRESP_get_ext_by_critical(OCSP_BASICRESP *x, int crit,
  174. int lastpos)
  175. {
  176. return (X509v3_get_ext_by_critical
  177. (x->tbsResponseData.responseExtensions, crit, lastpos));
  178. }
  179. X509_EXTENSION *OCSP_BASICRESP_get_ext(OCSP_BASICRESP *x, int loc)
  180. {
  181. return (X509v3_get_ext(x->tbsResponseData.responseExtensions, loc));
  182. }
  183. X509_EXTENSION *OCSP_BASICRESP_delete_ext(OCSP_BASICRESP *x, int loc)
  184. {
  185. return (X509v3_delete_ext(x->tbsResponseData.responseExtensions, loc));
  186. }
  187. void *OCSP_BASICRESP_get1_ext_d2i(OCSP_BASICRESP *x, int nid, int *crit,
  188. int *idx)
  189. {
  190. return X509V3_get_d2i(x->tbsResponseData.responseExtensions, nid, crit,
  191. idx);
  192. }
  193. int OCSP_BASICRESP_add1_ext_i2d(OCSP_BASICRESP *x, int nid, void *value,
  194. int crit, unsigned long flags)
  195. {
  196. return X509V3_add1_i2d(&x->tbsResponseData.responseExtensions, nid,
  197. value, crit, flags);
  198. }
  199. int OCSP_BASICRESP_add_ext(OCSP_BASICRESP *x, X509_EXTENSION *ex, int loc)
  200. {
  201. return (X509v3_add_ext(&(x->tbsResponseData.responseExtensions), ex, loc)
  202. != NULL);
  203. }
  204. /* OCSP single response extensions */
  205. int OCSP_SINGLERESP_get_ext_count(OCSP_SINGLERESP *x)
  206. {
  207. return (X509v3_get_ext_count(x->singleExtensions));
  208. }
  209. int OCSP_SINGLERESP_get_ext_by_NID(OCSP_SINGLERESP *x, int nid, int lastpos)
  210. {
  211. return (X509v3_get_ext_by_NID(x->singleExtensions, nid, lastpos));
  212. }
  213. int OCSP_SINGLERESP_get_ext_by_OBJ(OCSP_SINGLERESP *x, ASN1_OBJECT *obj,
  214. int lastpos)
  215. {
  216. return (X509v3_get_ext_by_OBJ(x->singleExtensions, obj, lastpos));
  217. }
  218. int OCSP_SINGLERESP_get_ext_by_critical(OCSP_SINGLERESP *x, int crit,
  219. int lastpos)
  220. {
  221. return (X509v3_get_ext_by_critical(x->singleExtensions, crit, lastpos));
  222. }
  223. X509_EXTENSION *OCSP_SINGLERESP_get_ext(OCSP_SINGLERESP *x, int loc)
  224. {
  225. return (X509v3_get_ext(x->singleExtensions, loc));
  226. }
  227. X509_EXTENSION *OCSP_SINGLERESP_delete_ext(OCSP_SINGLERESP *x, int loc)
  228. {
  229. return (X509v3_delete_ext(x->singleExtensions, loc));
  230. }
  231. void *OCSP_SINGLERESP_get1_ext_d2i(OCSP_SINGLERESP *x, int nid, int *crit,
  232. int *idx)
  233. {
  234. return X509V3_get_d2i(x->singleExtensions, nid, crit, idx);
  235. }
  236. int OCSP_SINGLERESP_add1_ext_i2d(OCSP_SINGLERESP *x, int nid, void *value,
  237. int crit, unsigned long flags)
  238. {
  239. return X509V3_add1_i2d(&x->singleExtensions, nid, value, crit, flags);
  240. }
  241. int OCSP_SINGLERESP_add_ext(OCSP_SINGLERESP *x, X509_EXTENSION *ex, int loc)
  242. {
  243. return (X509v3_add_ext(&(x->singleExtensions), ex, loc) != NULL);
  244. }
  245. /* also CRL Entry Extensions */
  246. /* Nonce handling functions */
  247. /*
  248. * Add a nonce to an extension stack. A nonce can be specificed or if NULL a
  249. * random nonce will be generated. Note: OpenSSL 0.9.7d and later create an
  250. * OCTET STRING containing the nonce, previous versions used the raw nonce.
  251. */
  252. static int ocsp_add1_nonce(STACK_OF(X509_EXTENSION) **exts,
  253. unsigned char *val, int len)
  254. {
  255. unsigned char *tmpval;
  256. ASN1_OCTET_STRING os;
  257. int ret = 0;
  258. if (len <= 0)
  259. len = OCSP_DEFAULT_NONCE_LENGTH;
  260. /*
  261. * Create the OCTET STRING manually by writing out the header and
  262. * appending the content octets. This avoids an extra memory allocation
  263. * operation in some cases. Applications should *NOT* do this because it
  264. * relies on library internals.
  265. */
  266. os.length = ASN1_object_size(0, len, V_ASN1_OCTET_STRING);
  267. os.data = OPENSSL_malloc(os.length);
  268. if (os.data == NULL)
  269. goto err;
  270. tmpval = os.data;
  271. ASN1_put_object(&tmpval, 0, len, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL);
  272. if (val)
  273. memcpy(tmpval, val, len);
  274. else if (RAND_bytes(tmpval, len) <= 0)
  275. goto err;
  276. if (!X509V3_add1_i2d(exts, NID_id_pkix_OCSP_Nonce,
  277. &os, 0, X509V3_ADD_REPLACE))
  278. goto err;
  279. ret = 1;
  280. err:
  281. OPENSSL_free(os.data);
  282. return ret;
  283. }
  284. /* Add nonce to an OCSP request */
  285. int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len)
  286. {
  287. return ocsp_add1_nonce(&req->tbsRequest.requestExtensions, val, len);
  288. }
  289. /* Same as above but for a response */
  290. int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len)
  291. {
  292. return ocsp_add1_nonce(&resp->tbsResponseData.responseExtensions, val,
  293. len);
  294. }
  295. /*-
  296. * Check nonce validity in a request and response.
  297. * Return value reflects result:
  298. * 1: nonces present and equal.
  299. * 2: nonces both absent.
  300. * 3: nonce present in response only.
  301. * 0: nonces both present and not equal.
  302. * -1: nonce in request only.
  303. *
  304. * For most responders clients can check return > 0.
  305. * If responder doesn't handle nonces return != 0 may be
  306. * necessary. return == 0 is always an error.
  307. */
  308. int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs)
  309. {
  310. /*
  311. * Since we are only interested in the presence or absence of
  312. * the nonce and comparing its value there is no need to use
  313. * the X509V3 routines: this way we can avoid them allocating an
  314. * ASN1_OCTET_STRING structure for the value which would be
  315. * freed immediately anyway.
  316. */
  317. int req_idx, resp_idx;
  318. X509_EXTENSION *req_ext, *resp_ext;
  319. req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1);
  320. resp_idx = OCSP_BASICRESP_get_ext_by_NID(bs, NID_id_pkix_OCSP_Nonce, -1);
  321. /* Check both absent */
  322. if ((req_idx < 0) && (resp_idx < 0))
  323. return 2;
  324. /* Check in request only */
  325. if ((req_idx >= 0) && (resp_idx < 0))
  326. return -1;
  327. /* Check in response but not request */
  328. if ((req_idx < 0) && (resp_idx >= 0))
  329. return 3;
  330. /*
  331. * Otherwise nonce in request and response so retrieve the extensions
  332. */
  333. req_ext = OCSP_REQUEST_get_ext(req, req_idx);
  334. resp_ext = OCSP_BASICRESP_get_ext(bs, resp_idx);
  335. if (ASN1_OCTET_STRING_cmp(X509_EXTENSION_get_data(req_ext),
  336. X509_EXTENSION_get_data(resp_ext)))
  337. return 0;
  338. return 1;
  339. }
  340. /*
  341. * Copy the nonce value (if any) from an OCSP request to a response.
  342. */
  343. int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req)
  344. {
  345. X509_EXTENSION *req_ext;
  346. int req_idx;
  347. /* Check for nonce in request */
  348. req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1);
  349. /* If no nonce that's OK */
  350. if (req_idx < 0)
  351. return 2;
  352. req_ext = OCSP_REQUEST_get_ext(req, req_idx);
  353. return OCSP_BASICRESP_add_ext(resp, req_ext, -1);
  354. }
  355. X509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim)
  356. {
  357. X509_EXTENSION *x = NULL;
  358. OCSP_CRLID *cid = NULL;
  359. if ((cid = OCSP_CRLID_new()) == NULL)
  360. goto err;
  361. if (url) {
  362. if ((cid->crlUrl = ASN1_IA5STRING_new()) == NULL)
  363. goto err;
  364. if (!(ASN1_STRING_set(cid->crlUrl, url, -1)))
  365. goto err;
  366. }
  367. if (n) {
  368. if ((cid->crlNum = ASN1_INTEGER_new()) == NULL)
  369. goto err;
  370. if (!(ASN1_INTEGER_set(cid->crlNum, *n)))
  371. goto err;
  372. }
  373. if (tim) {
  374. if ((cid->crlTime = ASN1_GENERALIZEDTIME_new()) == NULL)
  375. goto err;
  376. if (!(ASN1_GENERALIZEDTIME_set_string(cid->crlTime, tim)))
  377. goto err;
  378. }
  379. x = X509V3_EXT_i2d(NID_id_pkix_OCSP_CrlID, 0, cid);
  380. err:
  381. OCSP_CRLID_free(cid);
  382. return x;
  383. }
  384. /* AcceptableResponses ::= SEQUENCE OF OBJECT IDENTIFIER */
  385. X509_EXTENSION *OCSP_accept_responses_new(char **oids)
  386. {
  387. int nid;
  388. STACK_OF(ASN1_OBJECT) *sk = NULL;
  389. ASN1_OBJECT *o = NULL;
  390. X509_EXTENSION *x = NULL;
  391. if ((sk = sk_ASN1_OBJECT_new_null()) == NULL)
  392. goto err;
  393. while (oids && *oids) {
  394. if ((nid = OBJ_txt2nid(*oids)) != NID_undef && (o = OBJ_nid2obj(nid)))
  395. sk_ASN1_OBJECT_push(sk, o);
  396. oids++;
  397. }
  398. x = X509V3_EXT_i2d(NID_id_pkix_OCSP_acceptableResponses, 0, sk);
  399. err:
  400. sk_ASN1_OBJECT_pop_free(sk, ASN1_OBJECT_free);
  401. return x;
  402. }
  403. /* ArchiveCutoff ::= GeneralizedTime */
  404. X509_EXTENSION *OCSP_archive_cutoff_new(char *tim)
  405. {
  406. X509_EXTENSION *x = NULL;
  407. ASN1_GENERALIZEDTIME *gt = NULL;
  408. if ((gt = ASN1_GENERALIZEDTIME_new()) == NULL)
  409. goto err;
  410. if (!(ASN1_GENERALIZEDTIME_set_string(gt, tim)))
  411. goto err;
  412. x = X509V3_EXT_i2d(NID_id_pkix_OCSP_archiveCutoff, 0, gt);
  413. err:
  414. ASN1_GENERALIZEDTIME_free(gt);
  415. return x;
  416. }
  417. /*
  418. * per ACCESS_DESCRIPTION parameter are oids, of which there are currently
  419. * two--NID_ad_ocsp, NID_id_ad_caIssuers--and GeneralName value. This method
  420. * forces NID_ad_ocsp and uniformResourceLocator [6] IA5String.
  421. */
  422. X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME *issuer, char **urls)
  423. {
  424. X509_EXTENSION *x = NULL;
  425. ASN1_IA5STRING *ia5 = NULL;
  426. OCSP_SERVICELOC *sloc = NULL;
  427. ACCESS_DESCRIPTION *ad = NULL;
  428. if ((sloc = OCSP_SERVICELOC_new()) == NULL)
  429. goto err;
  430. if ((sloc->issuer = X509_NAME_dup(issuer)) == NULL)
  431. goto err;
  432. if (urls && *urls
  433. && (sloc->locator = sk_ACCESS_DESCRIPTION_new_null()) == NULL)
  434. goto err;
  435. while (urls && *urls) {
  436. if ((ad = ACCESS_DESCRIPTION_new()) == NULL)
  437. goto err;
  438. if ((ad->method = OBJ_nid2obj(NID_ad_OCSP)) == NULL)
  439. goto err;
  440. if ((ad->location = GENERAL_NAME_new()) == NULL)
  441. goto err;
  442. if ((ia5 = ASN1_IA5STRING_new()) == NULL)
  443. goto err;
  444. if (!ASN1_STRING_set((ASN1_STRING *)ia5, *urls, -1))
  445. goto err;
  446. ad->location->type = GEN_URI;
  447. ad->location->d.ia5 = ia5;
  448. if (!sk_ACCESS_DESCRIPTION_push(sloc->locator, ad))
  449. goto err;
  450. urls++;
  451. }
  452. x = X509V3_EXT_i2d(NID_id_pkix_OCSP_serviceLocator, 0, sloc);
  453. err:
  454. OCSP_SERVICELOC_free(sloc);
  455. return x;
  456. }