Coverage Report

Created: 2022-11-30 06:20

/src/openssl/crypto/x509v3/v3_akey.c
Line
Count
Source (jump to first uncovered line)
1
/* v3_akey.c */
2
/*
3
 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4
 * 1999.
5
 */
6
/* ====================================================================
7
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
8
 *
9
 * Redistribution and use in source and binary forms, with or without
10
 * modification, are permitted provided that the following conditions
11
 * are met:
12
 *
13
 * 1. Redistributions of source code must retain the above copyright
14
 *    notice, this list of conditions and the following disclaimer.
15
 *
16
 * 2. Redistributions in binary form must reproduce the above copyright
17
 *    notice, this list of conditions and the following disclaimer in
18
 *    the documentation and/or other materials provided with the
19
 *    distribution.
20
 *
21
 * 3. All advertising materials mentioning features or use of this
22
 *    software must display the following acknowledgment:
23
 *    "This product includes software developed by the OpenSSL Project
24
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25
 *
26
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27
 *    endorse or promote products derived from this software without
28
 *    prior written permission. For written permission, please contact
29
 *    licensing@OpenSSL.org.
30
 *
31
 * 5. Products derived from this software may not be called "OpenSSL"
32
 *    nor may "OpenSSL" appear in their names without prior written
33
 *    permission of the OpenSSL Project.
34
 *
35
 * 6. Redistributions of any form whatsoever must retain the following
36
 *    acknowledgment:
37
 *    "This product includes software developed by the OpenSSL Project
38
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39
 *
40
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51
 * OF THE POSSIBILITY OF SUCH DAMAGE.
52
 * ====================================================================
53
 *
54
 * This product includes cryptographic software written by Eric Young
55
 * (eay@cryptsoft.com).  This product includes software written by Tim
56
 * Hudson (tjh@cryptsoft.com).
57
 *
58
 */
59
60
#include <stdio.h>
61
#include "cryptlib.h"
62
#include <openssl/conf.h>
63
#include <openssl/asn1.h>
64
#include <openssl/asn1t.h>
65
#include <openssl/x509v3.h>
66
67
static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
68
                                                 AUTHORITY_KEYID *akeyid,
69
                                                 STACK_OF(CONF_VALUE)
70
                                                 *extlist);
71
static AUTHORITY_KEYID *v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
72
                                            X509V3_CTX *ctx,
73
                                            STACK_OF(CONF_VALUE) *values);
74
75
const X509V3_EXT_METHOD v3_akey_id = {
76
    NID_authority_key_identifier,
77
    X509V3_EXT_MULTILINE, ASN1_ITEM_ref(AUTHORITY_KEYID),
78
    0, 0, 0, 0,
79
    0, 0,
80
    (X509V3_EXT_I2V) i2v_AUTHORITY_KEYID,
81
    (X509V3_EXT_V2I)v2i_AUTHORITY_KEYID,
82
    0, 0,
83
    NULL
84
};
85
86
static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
87
                                                 AUTHORITY_KEYID *akeyid,
88
                                                 STACK_OF(CONF_VALUE)
89
                                                 *extlist)
90
0
{
91
0
    char *tmp;
92
0
    if (akeyid->keyid) {
93
0
        tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
94
0
        X509V3_add_value("keyid", tmp, &extlist);
95
0
        OPENSSL_free(tmp);
96
0
    }
97
0
    if (akeyid->issuer)
98
0
        extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
99
0
    if (akeyid->serial) {
100
0
        tmp = hex_to_string(akeyid->serial->data, akeyid->serial->length);
101
0
        X509V3_add_value("serial", tmp, &extlist);
102
0
        OPENSSL_free(tmp);
103
0
    }
104
0
    return extlist;
105
0
}
106
107
/*-
108
 * Currently two options:
109
 * keyid: use the issuers subject keyid, the value 'always' means its is
110
 * an error if the issuer certificate doesn't have a key id.
111
 * issuer: use the issuers cert issuer and serial number. The default is
112
 * to only use this if keyid is not present. With the option 'always'
113
 * this is always included.
114
 */
115
116
static AUTHORITY_KEYID *v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method,
117
                                            X509V3_CTX *ctx,
118
                                            STACK_OF(CONF_VALUE) *values)
119
0
{
120
0
    char keyid = 0, issuer = 0;
121
0
    int i;
122
0
    CONF_VALUE *cnf;
123
0
    ASN1_OCTET_STRING *ikeyid = NULL;
124
0
    X509_NAME *isname = NULL;
125
0
    GENERAL_NAMES *gens = NULL;
126
0
    GENERAL_NAME *gen = NULL;
127
0
    ASN1_INTEGER *serial = NULL;
128
0
    X509_EXTENSION *ext;
129
0
    X509 *cert;
130
0
    AUTHORITY_KEYID *akeyid;
131
132
0
    for (i = 0; i < sk_CONF_VALUE_num(values); i++) {
133
0
        cnf = sk_CONF_VALUE_value(values, i);
134
0
        if (!strcmp(cnf->name, "keyid")) {
135
0
            keyid = 1;
136
0
            if (cnf->value && !strcmp(cnf->value, "always"))
137
0
                keyid = 2;
138
0
        } else if (!strcmp(cnf->name, "issuer")) {
139
0
            issuer = 1;
140
0
            if (cnf->value && !strcmp(cnf->value, "always"))
141
0
                issuer = 2;
142
0
        } else {
143
0
            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, X509V3_R_UNKNOWN_OPTION);
144
0
            ERR_add_error_data(2, "name=", cnf->name);
145
0
            return NULL;
146
0
        }
147
0
    }
148
149
0
    if (!ctx || !ctx->issuer_cert) {
150
0
        if (ctx && (ctx->flags == CTX_TEST))
151
0
            return AUTHORITY_KEYID_new();
152
0
        X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
153
0
                  X509V3_R_NO_ISSUER_CERTIFICATE);
154
0
        return NULL;
155
0
    }
156
157
0
    cert = ctx->issuer_cert;
158
159
0
    if (keyid) {
160
0
        i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
161
0
        if ((i >= 0) && (ext = X509_get_ext(cert, i)))
162
0
            ikeyid = X509V3_EXT_d2i(ext);
163
0
        if (keyid == 2 && !ikeyid) {
164
0
            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
165
0
                      X509V3_R_UNABLE_TO_GET_ISSUER_KEYID);
166
0
            return NULL;
167
0
        }
168
0
    }
169
170
0
    if ((issuer && !ikeyid) || (issuer == 2)) {
171
0
        isname = X509_NAME_dup(X509_get_issuer_name(cert));
172
0
        serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
173
0
        if (!isname || !serial) {
174
0
            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID,
175
0
                      X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS);
176
0
            goto err;
177
0
        }
178
0
    }
179
180
0
    if (!(akeyid = AUTHORITY_KEYID_new()))
181
0
        goto err;
182
183
0
    if (isname) {
184
0
        if (!(gens = sk_GENERAL_NAME_new_null())
185
0
            || !(gen = GENERAL_NAME_new())
186
0
            || !sk_GENERAL_NAME_push(gens, gen)) {
187
0
            X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, ERR_R_MALLOC_FAILURE);
188
0
            goto err;
189
0
        }
190
0
        gen->type = GEN_DIRNAME;
191
0
        gen->d.dirn = isname;
192
0
    }
193
194
0
    akeyid->issuer = gens;
195
0
    akeyid->serial = serial;
196
0
    akeyid->keyid = ikeyid;
197
198
0
    return akeyid;
199
200
0
 err:
201
0
    X509_NAME_free(isname);
202
0
    M_ASN1_INTEGER_free(serial);
203
0
    M_ASN1_OCTET_STRING_free(ikeyid);
204
0
    return NULL;
205
0
}