/src/openssl/crypto/x509/v3_ist.c
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <stdio.h> |
11 | | #include "internal/cryptlib.h" |
12 | | #include <openssl/conf.h> |
13 | | #include <openssl/asn1.h> |
14 | | #include <openssl/asn1t.h> |
15 | | #include <openssl/x509v3.h> |
16 | | #include "ext_dat.h" |
17 | | |
18 | | /* |
19 | | * Issuer Sign Tool (1.2.643.100.112) The name of the tool used to signs the subject (ASN1_SEQUENCE) |
20 | | * This extension is required to obtain the status of a qualified certificate at Russian Federation. |
21 | | * RFC-style description is available here: https://tools.ietf.org/html/draft-deremin-rfc4491-bis-04#section-5 |
22 | | * Russian Federal Law 63 "Digital Sign" is available here: http://www.consultant.ru/document/cons_doc_LAW_112701/ |
23 | | */ |
24 | | |
25 | | ASN1_SEQUENCE(ISSUER_SIGN_TOOL) = { |
26 | | ASN1_SIMPLE(ISSUER_SIGN_TOOL, signTool, ASN1_UTF8STRING), |
27 | | ASN1_SIMPLE(ISSUER_SIGN_TOOL, cATool, ASN1_UTF8STRING), |
28 | | ASN1_SIMPLE(ISSUER_SIGN_TOOL, signToolCert, ASN1_UTF8STRING), |
29 | | ASN1_SIMPLE(ISSUER_SIGN_TOOL, cAToolCert, ASN1_UTF8STRING) |
30 | 0 | } ASN1_SEQUENCE_END(ISSUER_SIGN_TOOL) |
31 | 0 |
|
32 | 0 | IMPLEMENT_ASN1_FUNCTIONS(ISSUER_SIGN_TOOL) |
33 | 0 |
|
34 | 0 | static ISSUER_SIGN_TOOL *v2i_issuer_sign_tool(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
35 | 0 | STACK_OF(CONF_VALUE) *nval) |
36 | 0 | { |
37 | 0 | ISSUER_SIGN_TOOL *ist = ISSUER_SIGN_TOOL_new(); |
38 | 0 | int i; |
39 | |
|
40 | 0 | if (ist == NULL) { |
41 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
42 | 0 | return NULL; |
43 | 0 | } |
44 | 0 | for (i = 0; i < sk_CONF_VALUE_num(nval); ++i) { |
45 | 0 | CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i); |
46 | |
|
47 | 0 | if (cnf == NULL) { |
48 | 0 | continue; |
49 | 0 | } |
50 | 0 | if (strcmp(cnf->name, "signTool") == 0) { |
51 | 0 | ist->signTool = ASN1_UTF8STRING_new(); |
52 | 0 | if (ist->signTool == NULL |
53 | 0 | || cnf->value == NULL |
54 | 0 | || !ASN1_STRING_set(ist->signTool, cnf->value, (int)strlen(cnf->value))) { |
55 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
56 | 0 | goto err; |
57 | 0 | } |
58 | 0 | } else if (strcmp(cnf->name, "cATool") == 0) { |
59 | 0 | ist->cATool = ASN1_UTF8STRING_new(); |
60 | 0 | if (ist->cATool == NULL |
61 | 0 | || cnf->value == NULL |
62 | 0 | || !ASN1_STRING_set(ist->cATool, cnf->value, (int)strlen(cnf->value))) { |
63 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
64 | 0 | goto err; |
65 | 0 | } |
66 | 0 | } else if (strcmp(cnf->name, "signToolCert") == 0) { |
67 | 0 | ist->signToolCert = ASN1_UTF8STRING_new(); |
68 | 0 | if (ist->signToolCert == NULL |
69 | 0 | || cnf->value == NULL |
70 | 0 | || !ASN1_STRING_set(ist->signToolCert, cnf->value, (int)strlen(cnf->value))) { |
71 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
72 | 0 | goto err; |
73 | 0 | } |
74 | 0 | } else if (strcmp(cnf->name, "cAToolCert") == 0) { |
75 | 0 | ist->cAToolCert = ASN1_UTF8STRING_new(); |
76 | 0 | if (ist->cAToolCert == NULL |
77 | 0 | || cnf->value == NULL |
78 | 0 | || !ASN1_STRING_set(ist->cAToolCert, cnf->value, (int)strlen(cnf->value))) { |
79 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
80 | 0 | goto err; |
81 | 0 | } |
82 | 0 | } else { |
83 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_PASSED_INVALID_ARGUMENT); |
84 | 0 | goto err; |
85 | 0 | } |
86 | 0 | } |
87 | 0 | return ist; |
88 | | |
89 | 0 | err: |
90 | 0 | ISSUER_SIGN_TOOL_free(ist); |
91 | 0 | return NULL; |
92 | 0 | } |
93 | | |
94 | | static int i2r_issuer_sign_tool(X509V3_EXT_METHOD *method, |
95 | | ISSUER_SIGN_TOOL *ist, BIO *out, |
96 | | int indent) |
97 | 0 | { |
98 | 0 | int new_line = 0; |
99 | |
|
100 | 0 | if (ist == NULL) { |
101 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_PASSED_INVALID_ARGUMENT); |
102 | 0 | return 0; |
103 | 0 | } |
104 | 0 | if (ist->signTool != NULL) { |
105 | 0 | BIO_printf(out, "%*ssignTool : ", indent, ""); |
106 | 0 | BIO_write(out, ist->signTool->data, ist->signTool->length); |
107 | 0 | new_line = 1; |
108 | 0 | } |
109 | 0 | if (ist->cATool != NULL) { |
110 | 0 | if (new_line == 1) { |
111 | 0 | BIO_write(out, "\n", 1); |
112 | 0 | } |
113 | 0 | BIO_printf(out, "%*scATool : ", indent, ""); |
114 | 0 | BIO_write(out, ist->cATool->data, ist->cATool->length); |
115 | 0 | new_line = 1; |
116 | 0 | } |
117 | 0 | if (ist->signToolCert != NULL) { |
118 | 0 | if (new_line == 1) { |
119 | 0 | BIO_write(out, "\n", 1); |
120 | 0 | } |
121 | 0 | BIO_printf(out, "%*ssignToolCert: ", indent, ""); |
122 | 0 | BIO_write(out, ist->signToolCert->data, ist->signToolCert->length); |
123 | 0 | new_line = 1; |
124 | 0 | } |
125 | 0 | if (ist->cAToolCert != NULL) { |
126 | 0 | if (new_line == 1) { |
127 | 0 | BIO_write(out, "\n", 1); |
128 | 0 | } |
129 | 0 | BIO_printf(out, "%*scAToolCert : ", indent, ""); |
130 | 0 | BIO_write(out, ist->cAToolCert->data, ist->cAToolCert->length); |
131 | 0 | new_line = 1; |
132 | 0 | } |
133 | 0 | return 1; |
134 | 0 | } |
135 | | |
136 | | const X509V3_EXT_METHOD ossl_v3_issuer_sign_tool = { |
137 | | NID_issuerSignTool, /* nid */ |
138 | | X509V3_EXT_MULTILINE, /* flags */ |
139 | | ASN1_ITEM_ref(ISSUER_SIGN_TOOL), /* template */ |
140 | | 0, 0, 0, 0, /* old functions, ignored */ |
141 | | 0, /* i2s */ |
142 | | 0, /* s2i */ |
143 | | 0, /* i2v */ |
144 | | (X509V3_EXT_V2I)v2i_issuer_sign_tool, /* v2i */ |
145 | | (X509V3_EXT_I2R)i2r_issuer_sign_tool, /* i2r */ |
146 | | 0, /* r2i */ |
147 | | NULL /* extension-specific data */ |
148 | | }; |