v3_extku.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. /* v3_extku.c */
  2. /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
  3. * project 1999.
  4. */
  5. /* ====================================================================
  6. * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
  7. *
  8. * Redistribution and use in source and binary forms, with or without
  9. * modification, are permitted provided that the following conditions
  10. * are met:
  11. *
  12. * 1. Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. *
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in
  17. * the documentation and/or other materials provided with the
  18. * distribution.
  19. *
  20. * 3. All advertising materials mentioning features or use of this
  21. * software must display the following acknowledgment:
  22. * "This product includes software developed by the OpenSSL Project
  23. * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
  24. *
  25. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  26. * endorse or promote products derived from this software without
  27. * prior written permission. For written permission, please contact
  28. * licensing@OpenSSL.org.
  29. *
  30. * 5. Products derived from this software may not be called "OpenSSL"
  31. * nor may "OpenSSL" appear in their names without prior written
  32. * permission of the OpenSSL Project.
  33. *
  34. * 6. Redistributions of any form whatsoever must retain the following
  35. * acknowledgment:
  36. * "This product includes software developed by the OpenSSL Project
  37. * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
  38. *
  39. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  40. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  41. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  42. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  43. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  44. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  45. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  46. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  48. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  49. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  50. * OF THE POSSIBILITY OF SUCH DAMAGE.
  51. * ====================================================================
  52. *
  53. * This product includes cryptographic software written by Eric Young
  54. * (eay@cryptsoft.com). This product includes software written by Tim
  55. * Hudson (tjh@cryptsoft.com).
  56. *
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #include <openssl/asn1t.h>
  61. #include <openssl/conf.h>
  62. #include <openssl/x509v3.h>
  63. static void *v2i_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
  64. X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval);
  65. static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
  66. void *eku, STACK_OF(CONF_VALUE) *extlist);
  67. const X509V3_EXT_METHOD v3_ext_ku = {
  68. NID_ext_key_usage, 0,
  69. ASN1_ITEM_ref(EXTENDED_KEY_USAGE),
  70. 0,0,0,0,
  71. 0,0,
  72. i2v_EXTENDED_KEY_USAGE,
  73. v2i_EXTENDED_KEY_USAGE,
  74. 0,0,
  75. NULL
  76. };
  77. /* NB OCSP acceptable responses also is a SEQUENCE OF OBJECT */
  78. const X509V3_EXT_METHOD v3_ocsp_accresp = {
  79. NID_id_pkix_OCSP_acceptableResponses, 0,
  80. ASN1_ITEM_ref(EXTENDED_KEY_USAGE),
  81. 0,0,0,0,
  82. 0,0,
  83. i2v_EXTENDED_KEY_USAGE,
  84. v2i_EXTENDED_KEY_USAGE,
  85. 0,0,
  86. NULL
  87. };
  88. ASN1_ITEM_TEMPLATE(EXTENDED_KEY_USAGE) =
  89. ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, EXTENDED_KEY_USAGE, ASN1_OBJECT)
  90. ASN1_ITEM_TEMPLATE_END(EXTENDED_KEY_USAGE)
  91. IMPLEMENT_ASN1_FUNCTIONS(EXTENDED_KEY_USAGE)
  92. static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
  93. void *a, STACK_OF(CONF_VALUE) *ext_list)
  94. {
  95. EXTENDED_KEY_USAGE *eku = a;
  96. int i;
  97. ASN1_OBJECT *obj;
  98. char obj_tmp[80];
  99. for(i = 0; i < sk_ASN1_OBJECT_num(eku); i++) {
  100. obj = sk_ASN1_OBJECT_value(eku, i);
  101. i2t_ASN1_OBJECT(obj_tmp, 80, obj);
  102. X509V3_add_value(NULL, obj_tmp, &ext_list);
  103. }
  104. return ext_list;
  105. }
  106. static void *v2i_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
  107. X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
  108. {
  109. EXTENDED_KEY_USAGE *extku;
  110. char *extval;
  111. ASN1_OBJECT *objtmp;
  112. CONF_VALUE *val;
  113. int i;
  114. if(!(extku = sk_ASN1_OBJECT_new_null())) {
  115. X509V3err(X509V3_F_V2I_EXTENDED_KEY_USAGE,ERR_R_MALLOC_FAILURE);
  116. return NULL;
  117. }
  118. for(i = 0; i < sk_CONF_VALUE_num(nval); i++) {
  119. val = sk_CONF_VALUE_value(nval, i);
  120. if(val->value) extval = val->value;
  121. else extval = val->name;
  122. if(!(objtmp = OBJ_txt2obj(extval, 0))) {
  123. sk_ASN1_OBJECT_pop_free(extku, ASN1_OBJECT_free);
  124. X509V3err(X509V3_F_V2I_EXTENDED_KEY_USAGE,X509V3_R_INVALID_OBJECT_IDENTIFIER);
  125. X509V3_conf_err(val);
  126. return NULL;
  127. }
  128. sk_ASN1_OBJECT_push(extku, objtmp);
  129. }
  130. return extku;
  131. }