Coverage Report

Created: 2022-11-30 06:20

/src/openssl/crypto/x509/x509_req.c
Line
Count
Source (jump to first uncovered line)
1
/* crypto/x509/x509_req.c */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3
 * All rights reserved.
4
 *
5
 * This package is an SSL implementation written
6
 * by Eric Young (eay@cryptsoft.com).
7
 * The implementation was written so as to conform with Netscapes SSL.
8
 *
9
 * This library is free for commercial and non-commercial use as long as
10
 * the following conditions are aheared to.  The following conditions
11
 * apply to all code found in this distribution, be it the RC4, RSA,
12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13
 * included with this distribution is covered by the same copyright terms
14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15
 *
16
 * Copyright remains Eric Young's, and as such any Copyright notices in
17
 * the code are not to be removed.
18
 * If this package is used in a product, Eric Young should be given attribution
19
 * as the author of the parts of the library used.
20
 * This can be in the form of a textual message at program startup or
21
 * in documentation (online or textual) provided with the package.
22
 *
23
 * Redistribution and use in source and binary forms, with or without
24
 * modification, are permitted provided that the following conditions
25
 * are met:
26
 * 1. Redistributions of source code must retain the copyright
27
 *    notice, this list of conditions and the following disclaimer.
28
 * 2. Redistributions in binary form must reproduce the above copyright
29
 *    notice, this list of conditions and the following disclaimer in the
30
 *    documentation and/or other materials provided with the distribution.
31
 * 3. All advertising materials mentioning features or use of this software
32
 *    must display the following acknowledgement:
33
 *    "This product includes cryptographic software written by
34
 *     Eric Young (eay@cryptsoft.com)"
35
 *    The word 'cryptographic' can be left out if the rouines from the library
36
 *    being used are not cryptographic related :-).
37
 * 4. If you include any Windows specific code (or a derivative thereof) from
38
 *    the apps directory (application code) you must include an acknowledgement:
39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40
 *
41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
 * SUCH DAMAGE.
52
 *
53
 * The licence and distribution terms for any publically available version or
54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55
 * copied and put under another distribution licence
56
 * [including the GNU Public Licence.]
57
 */
58
59
#include <stdio.h>
60
#include "cryptlib.h"
61
#include <openssl/bn.h>
62
#include <openssl/evp.h>
63
#include <openssl/asn1.h>
64
#include <openssl/asn1t.h>
65
#include <openssl/x509.h>
66
#include <openssl/objects.h>
67
#include <openssl/buffer.h>
68
#include <openssl/pem.h>
69
70
X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
71
0
{
72
0
    X509_REQ *ret;
73
0
    X509_REQ_INFO *ri;
74
0
    int i;
75
0
    EVP_PKEY *pktmp;
76
77
0
    ret = X509_REQ_new();
78
0
    if (ret == NULL) {
79
0
        X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE);
80
0
        goto err;
81
0
    }
82
83
0
    ri = ret->req_info;
84
85
0
    ri->version->length = 1;
86
0
    ri->version->data = (unsigned char *)OPENSSL_malloc(1);
87
0
    if (ri->version->data == NULL)
88
0
        goto err;
89
0
    ri->version->data[0] = 0;   /* version == 0 */
90
91
0
    if (!X509_REQ_set_subject_name(ret, X509_get_subject_name(x)))
92
0
        goto err;
93
94
0
    pktmp = X509_get_pubkey(x);
95
0
    if (pktmp == NULL)
96
0
        goto err;
97
0
    i = X509_REQ_set_pubkey(ret, pktmp);
98
0
    EVP_PKEY_free(pktmp);
99
0
    if (!i)
100
0
        goto err;
101
102
0
    if (pkey != NULL) {
103
0
        if (!X509_REQ_sign(ret, pkey, md))
104
0
            goto err;
105
0
    }
106
0
    return (ret);
107
0
 err:
108
0
    X509_REQ_free(ret);
109
0
    return (NULL);
110
0
}
111
112
EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req)
113
0
{
114
0
    if ((req == NULL) || (req->req_info == NULL))
115
0
        return (NULL);
116
0
    return (X509_PUBKEY_get(req->req_info->pubkey));
117
0
}
118
119
int X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k)
120
0
{
121
0
    EVP_PKEY *xk = NULL;
122
0
    int ok = 0;
123
124
0
    xk = X509_REQ_get_pubkey(x);
125
0
    switch (EVP_PKEY_cmp(xk, k)) {
126
0
    case 1:
127
0
        ok = 1;
128
0
        break;
129
0
    case 0:
130
0
        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
131
0
                X509_R_KEY_VALUES_MISMATCH);
132
0
        break;
133
0
    case -1:
134
0
        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_KEY_TYPE_MISMATCH);
135
0
        break;
136
0
    case -2:
137
0
#ifndef OPENSSL_NO_EC
138
0
        if (k->type == EVP_PKEY_EC) {
139
0
            X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, ERR_R_EC_LIB);
140
0
            break;
141
0
        }
142
0
#endif
143
0
#ifndef OPENSSL_NO_DH
144
0
        if (k->type == EVP_PKEY_DH) {
145
            /* No idea */
146
0
            X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
147
0
                    X509_R_CANT_CHECK_DH_KEY);
148
0
            break;
149
0
        }
150
0
#endif
151
0
        X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_UNKNOWN_KEY_TYPE);
152
0
    }
153
154
0
    EVP_PKEY_free(xk);
155
0
    return (ok);
156
0
}
157
158
/*
159
 * It seems several organisations had the same idea of including a list of
160
 * extensions in a certificate request. There are at least two OIDs that are
161
 * used and there may be more: so the list is configurable.
162
 */
163
164
static int ext_nid_list[] = { NID_ext_req, NID_ms_ext_req, NID_undef };
165
166
static int *ext_nids = ext_nid_list;
167
168
int X509_REQ_extension_nid(int req_nid)
169
0
{
170
0
    int i, nid;
171
0
    for (i = 0;; i++) {
172
0
        nid = ext_nids[i];
173
0
        if (nid == NID_undef)
174
0
            return 0;
175
0
        else if (req_nid == nid)
176
0
            return 1;
177
0
    }
178
0
}
179
180
int *X509_REQ_get_extension_nids(void)
181
0
{
182
0
    return ext_nids;
183
0
}
184
185
void X509_REQ_set_extension_nids(int *nids)
186
0
{
187
0
    ext_nids = nids;
188
0
}
189
190
STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req)
191
0
{
192
0
    X509_ATTRIBUTE *attr;
193
0
    ASN1_TYPE *ext = NULL;
194
0
    int idx, *pnid;
195
0
    const unsigned char *p;
196
197
0
    if ((req == NULL) || (req->req_info == NULL) || !ext_nids)
198
0
        return (NULL);
199
0
    for (pnid = ext_nids; *pnid != NID_undef; pnid++) {
200
0
        idx = X509_REQ_get_attr_by_NID(req, *pnid, -1);
201
0
        if (idx == -1)
202
0
            continue;
203
0
        attr = X509_REQ_get_attr(req, idx);
204
0
        if (attr->single)
205
0
            ext = attr->value.single;
206
0
        else if (sk_ASN1_TYPE_num(attr->value.set))
207
0
            ext = sk_ASN1_TYPE_value(attr->value.set, 0);
208
0
        break;
209
0
    }
210
0
    if (!ext || (ext->type != V_ASN1_SEQUENCE))
211
0
        return NULL;
212
0
    p = ext->value.sequence->data;
213
0
    return (STACK_OF(X509_EXTENSION) *)
214
0
        ASN1_item_d2i(NULL, &p, ext->value.sequence->length,
215
0
                      ASN1_ITEM_rptr(X509_EXTENSIONS));
216
0
}
217
218
/*
219
 * Add a STACK_OF extensions to a certificate request: allow alternative OIDs
220
 * in case we want to create a non standard one.
221
 */
222
223
int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts,
224
                                int nid)
225
0
{
226
0
    ASN1_TYPE *at = NULL;
227
0
    X509_ATTRIBUTE *attr = NULL;
228
0
    if (!(at = ASN1_TYPE_new()) || !(at->value.sequence = ASN1_STRING_new()))
229
0
        goto err;
230
231
0
    at->type = V_ASN1_SEQUENCE;
232
    /* Generate encoding of extensions */
233
0
    at->value.sequence->length =
234
0
        ASN1_item_i2d((ASN1_VALUE *)exts,
235
0
                      &at->value.sequence->data,
236
0
                      ASN1_ITEM_rptr(X509_EXTENSIONS));
237
0
    if (!(attr = X509_ATTRIBUTE_new()))
238
0
        goto err;
239
0
    if (!(attr->value.set = sk_ASN1_TYPE_new_null()))
240
0
        goto err;
241
0
    if (!sk_ASN1_TYPE_push(attr->value.set, at))
242
0
        goto err;
243
0
    at = NULL;
244
0
    attr->single = 0;
245
0
    attr->object = OBJ_nid2obj(nid);
246
0
    if (!req->req_info->attributes) {
247
0
        if (!(req->req_info->attributes = sk_X509_ATTRIBUTE_new_null()))
248
0
            goto err;
249
0
    }
250
0
    if (!sk_X509_ATTRIBUTE_push(req->req_info->attributes, attr))
251
0
        goto err;
252
0
    return 1;
253
0
 err:
254
0
    X509_ATTRIBUTE_free(attr);
255
0
    ASN1_TYPE_free(at);
256
0
    return 0;
257
0
}
258
259
/* This is the normal usage: use the "official" OID */
260
int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts)
261
0
{
262
0
    return X509_REQ_add_extensions_nid(req, exts, NID_ext_req);
263
0
}
264
265
/* Request attribute functions */
266
267
int X509_REQ_get_attr_count(const X509_REQ *req)
268
0
{
269
0
    return X509at_get_attr_count(req->req_info->attributes);
270
0
}
271
272
int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos)
273
0
{
274
0
    return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos);
275
0
}
276
277
int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj,
278
                             int lastpos)
279
0
{
280
0
    return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos);
281
0
}
282
283
X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc)
284
0
{
285
0
    return X509at_get_attr(req->req_info->attributes, loc);
286
0
}
287
288
X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc)
289
0
{
290
0
    return X509at_delete_attr(req->req_info->attributes, loc);
291
0
}
292
293
int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr)
294
0
{
295
0
    if (X509at_add1_attr(&req->req_info->attributes, attr))
296
0
        return 1;
297
0
    return 0;
298
0
}
299
300
int X509_REQ_add1_attr_by_OBJ(X509_REQ *req,
301
                              const ASN1_OBJECT *obj, int type,
302
                              const unsigned char *bytes, int len)
303
0
{
304
0
    if (X509at_add1_attr_by_OBJ(&req->req_info->attributes, obj,
305
0
                                type, bytes, len))
306
0
        return 1;
307
0
    return 0;
308
0
}
309
310
int X509_REQ_add1_attr_by_NID(X509_REQ *req,
311
                              int nid, int type,
312
                              const unsigned char *bytes, int len)
313
0
{
314
0
    if (X509at_add1_attr_by_NID(&req->req_info->attributes, nid,
315
0
                                type, bytes, len))
316
0
        return 1;
317
0
    return 0;
318
0
}
319
320
int X509_REQ_add1_attr_by_txt(X509_REQ *req,
321
                              const char *attrname, int type,
322
                              const unsigned char *bytes, int len)
323
0
{
324
0
    if (X509at_add1_attr_by_txt(&req->req_info->attributes, attrname,
325
0
                                type, bytes, len))
326
0
        return 1;
327
0
    return 0;
328
0
}