/proc/self/cwd/external/boringssl/src/crypto/x509v3/v3_crld.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* v3_crld.c */ |
2 | | /* |
3 | | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project |
4 | | * 1999. |
5 | | */ |
6 | | /* ==================================================================== |
7 | | * Copyright (c) 1999-2008 The OpenSSL Project. All rights reserved. |
8 | | * |
9 | | * Redistribution and use in source and binary forms, with or without |
10 | | * modification, are permitted provided that the following conditions |
11 | | * are met: |
12 | | * |
13 | | * 1. Redistributions of source code must retain the above copyright |
14 | | * notice, this list of conditions and the following disclaimer. |
15 | | * |
16 | | * 2. Redistributions in binary form must reproduce the above copyright |
17 | | * notice, this list of conditions and the following disclaimer in |
18 | | * the documentation and/or other materials provided with the |
19 | | * distribution. |
20 | | * |
21 | | * 3. All advertising materials mentioning features or use of this |
22 | | * software must display the following acknowledgment: |
23 | | * "This product includes software developed by the OpenSSL Project |
24 | | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
25 | | * |
26 | | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
27 | | * endorse or promote products derived from this software without |
28 | | * prior written permission. For written permission, please contact |
29 | | * licensing@OpenSSL.org. |
30 | | * |
31 | | * 5. Products derived from this software may not be called "OpenSSL" |
32 | | * nor may "OpenSSL" appear in their names without prior written |
33 | | * permission of the OpenSSL Project. |
34 | | * |
35 | | * 6. Redistributions of any form whatsoever must retain the following |
36 | | * acknowledgment: |
37 | | * "This product includes software developed by the OpenSSL Project |
38 | | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
39 | | * |
40 | | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
41 | | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
42 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
43 | | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
44 | | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
45 | | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
46 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
47 | | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
48 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
49 | | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
50 | | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | | * OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | | * ==================================================================== |
53 | | * |
54 | | * This product includes cryptographic software written by Eric Young |
55 | | * (eay@cryptsoft.com). This product includes software written by Tim |
56 | | * Hudson (tjh@cryptsoft.com). */ |
57 | | |
58 | | #include <stdio.h> |
59 | | #include <string.h> |
60 | | |
61 | | #include <openssl/asn1.h> |
62 | | #include <openssl/asn1t.h> |
63 | | #include <openssl/conf.h> |
64 | | #include <openssl/err.h> |
65 | | #include <openssl/mem.h> |
66 | | #include <openssl/obj.h> |
67 | | #include <openssl/x509v3.h> |
68 | | |
69 | | static void *v2i_crld(const X509V3_EXT_METHOD *method, |
70 | | X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); |
71 | | static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out, |
72 | | int indent); |
73 | | |
74 | | const X509V3_EXT_METHOD v3_crld = { |
75 | | NID_crl_distribution_points, 0, ASN1_ITEM_ref(CRL_DIST_POINTS), |
76 | | 0, 0, 0, 0, |
77 | | 0, 0, |
78 | | 0, |
79 | | v2i_crld, |
80 | | i2r_crldp, 0, |
81 | | NULL |
82 | | }; |
83 | | |
84 | | const X509V3_EXT_METHOD v3_freshest_crl = { |
85 | | NID_freshest_crl, 0, ASN1_ITEM_ref(CRL_DIST_POINTS), |
86 | | 0, 0, 0, 0, |
87 | | 0, 0, |
88 | | 0, |
89 | | v2i_crld, |
90 | | i2r_crldp, 0, |
91 | | NULL |
92 | | }; |
93 | | |
94 | | static STACK_OF(GENERAL_NAME) *gnames_from_sectname(X509V3_CTX *ctx, |
95 | | char *sect) |
96 | 0 | { |
97 | 0 | STACK_OF(CONF_VALUE) *gnsect; |
98 | 0 | STACK_OF(GENERAL_NAME) *gens; |
99 | 0 | if (*sect == '@') |
100 | 0 | gnsect = X509V3_get_section(ctx, sect + 1); |
101 | 0 | else |
102 | 0 | gnsect = X509V3_parse_list(sect); |
103 | 0 | if (!gnsect) { |
104 | 0 | OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND); |
105 | 0 | return NULL; |
106 | 0 | } |
107 | 0 | gens = v2i_GENERAL_NAMES(NULL, ctx, gnsect); |
108 | 0 | if (*sect == '@') |
109 | 0 | X509V3_section_free(ctx, gnsect); |
110 | 0 | else |
111 | 0 | sk_CONF_VALUE_pop_free(gnsect, X509V3_conf_free); |
112 | 0 | return gens; |
113 | 0 | } |
114 | | |
115 | | static int set_dist_point_name(DIST_POINT_NAME **pdp, X509V3_CTX *ctx, |
116 | | CONF_VALUE *cnf) |
117 | 0 | { |
118 | 0 | STACK_OF(GENERAL_NAME) *fnm = NULL; |
119 | 0 | STACK_OF(X509_NAME_ENTRY) *rnm = NULL; |
120 | 0 | if (!strncmp(cnf->name, "fullname", 9)) { |
121 | 0 | fnm = gnames_from_sectname(ctx, cnf->value); |
122 | 0 | if (!fnm) |
123 | 0 | goto err; |
124 | 0 | } else if (!strcmp(cnf->name, "relativename")) { |
125 | 0 | int ret; |
126 | 0 | STACK_OF(CONF_VALUE) *dnsect; |
127 | 0 | X509_NAME *nm; |
128 | 0 | nm = X509_NAME_new(); |
129 | 0 | if (!nm) |
130 | 0 | return -1; |
131 | 0 | dnsect = X509V3_get_section(ctx, cnf->value); |
132 | 0 | if (!dnsect) { |
133 | 0 | OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND); |
134 | 0 | return -1; |
135 | 0 | } |
136 | 0 | ret = X509V3_NAME_from_section(nm, dnsect, MBSTRING_ASC); |
137 | 0 | X509V3_section_free(ctx, dnsect); |
138 | 0 | rnm = nm->entries; |
139 | 0 | nm->entries = NULL; |
140 | 0 | X509_NAME_free(nm); |
141 | 0 | if (!ret || sk_X509_NAME_ENTRY_num(rnm) <= 0) |
142 | 0 | goto err; |
143 | | /* |
144 | | * Since its a name fragment can't have more than one RDNSequence |
145 | | */ |
146 | 0 | if (sk_X509_NAME_ENTRY_value(rnm, |
147 | 0 | sk_X509_NAME_ENTRY_num(rnm) - 1)->set) { |
148 | 0 | OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_MULTIPLE_RDNS); |
149 | 0 | goto err; |
150 | 0 | } |
151 | 0 | } else |
152 | 0 | return 0; |
153 | | |
154 | 0 | if (*pdp) { |
155 | 0 | OPENSSL_PUT_ERROR(X509V3, X509V3_R_DISTPOINT_ALREADY_SET); |
156 | 0 | goto err; |
157 | 0 | } |
158 | | |
159 | 0 | *pdp = DIST_POINT_NAME_new(); |
160 | 0 | if (!*pdp) |
161 | 0 | goto err; |
162 | 0 | if (fnm) { |
163 | 0 | (*pdp)->type = 0; |
164 | 0 | (*pdp)->name.fullname = fnm; |
165 | 0 | } else { |
166 | 0 | (*pdp)->type = 1; |
167 | 0 | (*pdp)->name.relativename = rnm; |
168 | 0 | } |
169 | |
|
170 | 0 | return 1; |
171 | | |
172 | 0 | err: |
173 | 0 | if (fnm) |
174 | 0 | sk_GENERAL_NAME_pop_free(fnm, GENERAL_NAME_free); |
175 | 0 | if (rnm) |
176 | 0 | sk_X509_NAME_ENTRY_pop_free(rnm, X509_NAME_ENTRY_free); |
177 | 0 | return -1; |
178 | 0 | } |
179 | | |
180 | | static const BIT_STRING_BITNAME reason_flags[] = { |
181 | | {0, "Unused", "unused"}, |
182 | | {1, "Key Compromise", "keyCompromise"}, |
183 | | {2, "CA Compromise", "CACompromise"}, |
184 | | {3, "Affiliation Changed", "affiliationChanged"}, |
185 | | {4, "Superseded", "superseded"}, |
186 | | {5, "Cessation Of Operation", "cessationOfOperation"}, |
187 | | {6, "Certificate Hold", "certificateHold"}, |
188 | | {7, "Privilege Withdrawn", "privilegeWithdrawn"}, |
189 | | {8, "AA Compromise", "AACompromise"}, |
190 | | {-1, NULL, NULL} |
191 | | }; |
192 | | |
193 | | static int set_reasons(ASN1_BIT_STRING **preas, char *value) |
194 | 0 | { |
195 | 0 | STACK_OF(CONF_VALUE) *rsk = NULL; |
196 | 0 | const BIT_STRING_BITNAME *pbn; |
197 | 0 | const char *bnam; |
198 | 0 | size_t i; |
199 | 0 | int ret = 0; |
200 | 0 | rsk = X509V3_parse_list(value); |
201 | 0 | if (!rsk) |
202 | 0 | return 0; |
203 | 0 | if (*preas) |
204 | 0 | return 0; |
205 | 0 | for (i = 0; i < sk_CONF_VALUE_num(rsk); i++) { |
206 | 0 | bnam = sk_CONF_VALUE_value(rsk, i)->name; |
207 | 0 | if (!*preas) { |
208 | 0 | *preas = ASN1_BIT_STRING_new(); |
209 | 0 | if (!*preas) |
210 | 0 | goto err; |
211 | 0 | } |
212 | 0 | for (pbn = reason_flags; pbn->lname; pbn++) { |
213 | 0 | if (!strcmp(pbn->sname, bnam)) { |
214 | 0 | if (!ASN1_BIT_STRING_set_bit(*preas, pbn->bitnum, 1)) |
215 | 0 | goto err; |
216 | 0 | break; |
217 | 0 | } |
218 | 0 | } |
219 | 0 | if (!pbn->lname) |
220 | 0 | goto err; |
221 | 0 | } |
222 | 0 | ret = 1; |
223 | |
|
224 | 0 | err: |
225 | 0 | sk_CONF_VALUE_pop_free(rsk, X509V3_conf_free); |
226 | 0 | return ret; |
227 | 0 | } |
228 | | |
229 | | static int print_reasons(BIO *out, const char *rname, |
230 | | ASN1_BIT_STRING *rflags, int indent) |
231 | 0 | { |
232 | 0 | int first = 1; |
233 | 0 | const BIT_STRING_BITNAME *pbn; |
234 | 0 | BIO_printf(out, "%*s%s:\n%*s", indent, "", rname, indent + 2, ""); |
235 | 0 | for (pbn = reason_flags; pbn->lname; pbn++) { |
236 | 0 | if (ASN1_BIT_STRING_get_bit(rflags, pbn->bitnum)) { |
237 | 0 | if (first) |
238 | 0 | first = 0; |
239 | 0 | else |
240 | 0 | BIO_puts(out, ", "); |
241 | 0 | BIO_puts(out, pbn->lname); |
242 | 0 | } |
243 | 0 | } |
244 | 0 | if (first) |
245 | 0 | BIO_puts(out, "<EMPTY>\n"); |
246 | 0 | else |
247 | 0 | BIO_puts(out, "\n"); |
248 | 0 | return 1; |
249 | 0 | } |
250 | | |
251 | | static DIST_POINT *crldp_from_section(X509V3_CTX *ctx, |
252 | | STACK_OF(CONF_VALUE) *nval) |
253 | 0 | { |
254 | 0 | size_t i; |
255 | 0 | CONF_VALUE *cnf; |
256 | 0 | DIST_POINT *point = NULL; |
257 | 0 | point = DIST_POINT_new(); |
258 | 0 | if (!point) |
259 | 0 | goto err; |
260 | 0 | for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { |
261 | 0 | int ret; |
262 | 0 | cnf = sk_CONF_VALUE_value(nval, i); |
263 | 0 | ret = set_dist_point_name(&point->distpoint, ctx, cnf); |
264 | 0 | if (ret > 0) |
265 | 0 | continue; |
266 | 0 | if (ret < 0) |
267 | 0 | goto err; |
268 | 0 | if (!strcmp(cnf->name, "reasons")) { |
269 | 0 | if (!set_reasons(&point->reasons, cnf->value)) |
270 | 0 | goto err; |
271 | 0 | } else if (!strcmp(cnf->name, "CRLissuer")) { |
272 | 0 | point->CRLissuer = gnames_from_sectname(ctx, cnf->value); |
273 | 0 | if (!point->CRLissuer) |
274 | 0 | goto err; |
275 | 0 | } |
276 | 0 | } |
277 | | |
278 | 0 | return point; |
279 | | |
280 | 0 | err: |
281 | 0 | if (point) |
282 | 0 | DIST_POINT_free(point); |
283 | 0 | return NULL; |
284 | 0 | } |
285 | | |
286 | | static void *v2i_crld(const X509V3_EXT_METHOD *method, |
287 | | X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval) |
288 | 0 | { |
289 | 0 | STACK_OF(DIST_POINT) *crld = NULL; |
290 | 0 | GENERAL_NAMES *gens = NULL; |
291 | 0 | GENERAL_NAME *gen = NULL; |
292 | 0 | CONF_VALUE *cnf; |
293 | 0 | size_t i; |
294 | 0 | if (!(crld = sk_DIST_POINT_new_null())) |
295 | 0 | goto merr; |
296 | 0 | for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { |
297 | 0 | DIST_POINT *point; |
298 | 0 | cnf = sk_CONF_VALUE_value(nval, i); |
299 | 0 | if (!cnf->value) { |
300 | 0 | STACK_OF(CONF_VALUE) *dpsect; |
301 | 0 | dpsect = X509V3_get_section(ctx, cnf->name); |
302 | 0 | if (!dpsect) |
303 | 0 | goto err; |
304 | 0 | point = crldp_from_section(ctx, dpsect); |
305 | 0 | X509V3_section_free(ctx, dpsect); |
306 | 0 | if (!point) |
307 | 0 | goto err; |
308 | 0 | if (!sk_DIST_POINT_push(crld, point)) { |
309 | 0 | DIST_POINT_free(point); |
310 | 0 | goto merr; |
311 | 0 | } |
312 | 0 | } else { |
313 | 0 | if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf))) |
314 | 0 | goto err; |
315 | 0 | if (!(gens = GENERAL_NAMES_new())) |
316 | 0 | goto merr; |
317 | 0 | if (!sk_GENERAL_NAME_push(gens, gen)) |
318 | 0 | goto merr; |
319 | 0 | gen = NULL; |
320 | 0 | if (!(point = DIST_POINT_new())) |
321 | 0 | goto merr; |
322 | 0 | if (!sk_DIST_POINT_push(crld, point)) { |
323 | 0 | DIST_POINT_free(point); |
324 | 0 | goto merr; |
325 | 0 | } |
326 | 0 | if (!(point->distpoint = DIST_POINT_NAME_new())) |
327 | 0 | goto merr; |
328 | 0 | point->distpoint->name.fullname = gens; |
329 | 0 | point->distpoint->type = 0; |
330 | 0 | gens = NULL; |
331 | 0 | } |
332 | 0 | } |
333 | 0 | return crld; |
334 | | |
335 | 0 | merr: |
336 | 0 | OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE); |
337 | 0 | err: |
338 | 0 | GENERAL_NAME_free(gen); |
339 | 0 | GENERAL_NAMES_free(gens); |
340 | 0 | sk_DIST_POINT_pop_free(crld, DIST_POINT_free); |
341 | 0 | return NULL; |
342 | 0 | } |
343 | | |
344 | | IMPLEMENT_ASN1_SET_OF(DIST_POINT) |
345 | | |
346 | | static int dpn_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, |
347 | | void *exarg) |
348 | 0 | { |
349 | 0 | DIST_POINT_NAME *dpn = (DIST_POINT_NAME *)*pval; |
350 | |
|
351 | 0 | switch (operation) { |
352 | 0 | case ASN1_OP_NEW_POST: |
353 | 0 | dpn->dpname = NULL; |
354 | 0 | break; |
355 | | |
356 | 0 | case ASN1_OP_FREE_POST: |
357 | 0 | if (dpn->dpname) |
358 | 0 | X509_NAME_free(dpn->dpname); |
359 | 0 | break; |
360 | 0 | } |
361 | 0 | return 1; |
362 | 0 | } |
363 | | |
364 | | |
365 | | ASN1_CHOICE_cb(DIST_POINT_NAME, dpn_cb) = { |
366 | | ASN1_IMP_SEQUENCE_OF(DIST_POINT_NAME, name.fullname, GENERAL_NAME, 0), |
367 | | ASN1_IMP_SET_OF(DIST_POINT_NAME, name.relativename, X509_NAME_ENTRY, 1) |
368 | | } ASN1_CHOICE_END_cb(DIST_POINT_NAME, DIST_POINT_NAME, type) |
369 | | |
370 | | |
371 | | IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT_NAME) |
372 | | |
373 | | ASN1_SEQUENCE(DIST_POINT) = { |
374 | | ASN1_EXP_OPT(DIST_POINT, distpoint, DIST_POINT_NAME, 0), |
375 | | ASN1_IMP_OPT(DIST_POINT, reasons, ASN1_BIT_STRING, 1), |
376 | | ASN1_IMP_SEQUENCE_OF_OPT(DIST_POINT, CRLissuer, GENERAL_NAME, 2) |
377 | | } ASN1_SEQUENCE_END(DIST_POINT) |
378 | | |
379 | | IMPLEMENT_ASN1_FUNCTIONS(DIST_POINT) |
380 | | |
381 | | ASN1_ITEM_TEMPLATE(CRL_DIST_POINTS) = |
382 | | ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, CRLDistributionPoints, DIST_POINT) |
383 | | ASN1_ITEM_TEMPLATE_END(CRL_DIST_POINTS) |
384 | | |
385 | | IMPLEMENT_ASN1_FUNCTIONS(CRL_DIST_POINTS) |
386 | | |
387 | | ASN1_SEQUENCE(ISSUING_DIST_POINT) = { |
388 | | ASN1_EXP_OPT(ISSUING_DIST_POINT, distpoint, DIST_POINT_NAME, 0), |
389 | | ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyuser, ASN1_FBOOLEAN, 1), |
390 | | ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyCA, ASN1_FBOOLEAN, 2), |
391 | | ASN1_IMP_OPT(ISSUING_DIST_POINT, onlysomereasons, ASN1_BIT_STRING, 3), |
392 | | ASN1_IMP_OPT(ISSUING_DIST_POINT, indirectCRL, ASN1_FBOOLEAN, 4), |
393 | | ASN1_IMP_OPT(ISSUING_DIST_POINT, onlyattr, ASN1_FBOOLEAN, 5) |
394 | | } ASN1_SEQUENCE_END(ISSUING_DIST_POINT) |
395 | | |
396 | | IMPLEMENT_ASN1_FUNCTIONS(ISSUING_DIST_POINT) |
397 | | |
398 | | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, |
399 | | int indent); |
400 | | static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
401 | | STACK_OF(CONF_VALUE) *nval); |
402 | | |
403 | | const X509V3_EXT_METHOD v3_idp = { |
404 | | NID_issuing_distribution_point, X509V3_EXT_MULTILINE, |
405 | | ASN1_ITEM_ref(ISSUING_DIST_POINT), |
406 | | 0, 0, 0, 0, |
407 | | 0, 0, |
408 | | 0, |
409 | | v2i_idp, |
410 | | i2r_idp, 0, |
411 | | NULL |
412 | | }; |
413 | | |
414 | | static void *v2i_idp(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
415 | | STACK_OF(CONF_VALUE) *nval) |
416 | 0 | { |
417 | 0 | ISSUING_DIST_POINT *idp = NULL; |
418 | 0 | CONF_VALUE *cnf; |
419 | 0 | char *name, *val; |
420 | 0 | size_t i; |
421 | 0 | int ret; |
422 | 0 | idp = ISSUING_DIST_POINT_new(); |
423 | 0 | if (!idp) |
424 | 0 | goto merr; |
425 | 0 | for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { |
426 | 0 | cnf = sk_CONF_VALUE_value(nval, i); |
427 | 0 | name = cnf->name; |
428 | 0 | val = cnf->value; |
429 | 0 | ret = set_dist_point_name(&idp->distpoint, ctx, cnf); |
430 | 0 | if (ret > 0) |
431 | 0 | continue; |
432 | 0 | if (ret < 0) |
433 | 0 | goto err; |
434 | 0 | if (!strcmp(name, "onlyuser")) { |
435 | 0 | if (!X509V3_get_value_bool(cnf, &idp->onlyuser)) |
436 | 0 | goto err; |
437 | 0 | } else if (!strcmp(name, "onlyCA")) { |
438 | 0 | if (!X509V3_get_value_bool(cnf, &idp->onlyCA)) |
439 | 0 | goto err; |
440 | 0 | } else if (!strcmp(name, "onlyAA")) { |
441 | 0 | if (!X509V3_get_value_bool(cnf, &idp->onlyattr)) |
442 | 0 | goto err; |
443 | 0 | } else if (!strcmp(name, "indirectCRL")) { |
444 | 0 | if (!X509V3_get_value_bool(cnf, &idp->indirectCRL)) |
445 | 0 | goto err; |
446 | 0 | } else if (!strcmp(name, "onlysomereasons")) { |
447 | 0 | if (!set_reasons(&idp->onlysomereasons, val)) |
448 | 0 | goto err; |
449 | 0 | } else { |
450 | 0 | OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_NAME); |
451 | 0 | X509V3_conf_err(cnf); |
452 | 0 | goto err; |
453 | 0 | } |
454 | 0 | } |
455 | 0 | return idp; |
456 | | |
457 | 0 | merr: |
458 | 0 | OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE); |
459 | 0 | err: |
460 | 0 | ISSUING_DIST_POINT_free(idp); |
461 | 0 | return NULL; |
462 | 0 | } |
463 | | |
464 | | static int print_gens(BIO *out, STACK_OF(GENERAL_NAME) *gens, int indent) |
465 | 0 | { |
466 | 0 | size_t i; |
467 | 0 | for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) { |
468 | 0 | BIO_printf(out, "%*s", indent + 2, ""); |
469 | 0 | GENERAL_NAME_print(out, sk_GENERAL_NAME_value(gens, i)); |
470 | 0 | BIO_puts(out, "\n"); |
471 | 0 | } |
472 | 0 | return 1; |
473 | 0 | } |
474 | | |
475 | | static int print_distpoint(BIO *out, DIST_POINT_NAME *dpn, int indent) |
476 | 0 | { |
477 | 0 | if (dpn->type == 0) { |
478 | 0 | BIO_printf(out, "%*sFull Name:\n", indent, ""); |
479 | 0 | print_gens(out, dpn->name.fullname, indent); |
480 | 0 | } else { |
481 | 0 | X509_NAME ntmp; |
482 | 0 | ntmp.entries = dpn->name.relativename; |
483 | 0 | BIO_printf(out, "%*sRelative Name:\n%*s", indent, "", indent + 2, ""); |
484 | 0 | X509_NAME_print_ex(out, &ntmp, 0, XN_FLAG_ONELINE); |
485 | 0 | BIO_puts(out, "\n"); |
486 | 0 | } |
487 | 0 | return 1; |
488 | 0 | } |
489 | | |
490 | | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, |
491 | | int indent) |
492 | 0 | { |
493 | 0 | ISSUING_DIST_POINT *idp = pidp; |
494 | 0 | if (idp->distpoint) |
495 | 0 | print_distpoint(out, idp->distpoint, indent); |
496 | 0 | if (idp->onlyuser > 0) |
497 | 0 | BIO_printf(out, "%*sOnly User Certificates\n", indent, ""); |
498 | 0 | if (idp->onlyCA > 0) |
499 | 0 | BIO_printf(out, "%*sOnly CA Certificates\n", indent, ""); |
500 | 0 | if (idp->indirectCRL > 0) |
501 | 0 | BIO_printf(out, "%*sIndirect CRL\n", indent, ""); |
502 | 0 | if (idp->onlysomereasons) |
503 | 0 | print_reasons(out, "Only Some Reasons", idp->onlysomereasons, indent); |
504 | 0 | if (idp->onlyattr > 0) |
505 | 0 | BIO_printf(out, "%*sOnly Attribute Certificates\n", indent, ""); |
506 | 0 | if (!idp->distpoint && (idp->onlyuser <= 0) && (idp->onlyCA <= 0) |
507 | 0 | && (idp->indirectCRL <= 0) && !idp->onlysomereasons |
508 | 0 | && (idp->onlyattr <= 0)) |
509 | 0 | BIO_printf(out, "%*s<EMPTY>\n", indent, ""); |
510 | |
|
511 | 0 | return 1; |
512 | 0 | } |
513 | | |
514 | | static int i2r_crldp(const X509V3_EXT_METHOD *method, void *pcrldp, BIO *out, |
515 | | int indent) |
516 | 0 | { |
517 | 0 | STACK_OF(DIST_POINT) *crld = pcrldp; |
518 | 0 | DIST_POINT *point; |
519 | 0 | size_t i; |
520 | 0 | for (i = 0; i < sk_DIST_POINT_num(crld); i++) { |
521 | 0 | BIO_puts(out, "\n"); |
522 | 0 | point = sk_DIST_POINT_value(crld, i); |
523 | 0 | if (point->distpoint) |
524 | 0 | print_distpoint(out, point->distpoint, indent); |
525 | 0 | if (point->reasons) |
526 | 0 | print_reasons(out, "Reasons", point->reasons, indent); |
527 | 0 | if (point->CRLissuer) { |
528 | 0 | BIO_printf(out, "%*sCRL Issuer:\n", indent, ""); |
529 | 0 | print_gens(out, point->CRLissuer, indent); |
530 | 0 | } |
531 | 0 | } |
532 | 0 | return 1; |
533 | 0 | } |
534 | | |
535 | | int DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname) |
536 | 0 | { |
537 | 0 | size_t i; |
538 | 0 | STACK_OF(X509_NAME_ENTRY) *frag; |
539 | 0 | X509_NAME_ENTRY *ne; |
540 | 0 | if (!dpn || (dpn->type != 1)) |
541 | 0 | return 1; |
542 | 0 | frag = dpn->name.relativename; |
543 | 0 | dpn->dpname = X509_NAME_dup(iname); |
544 | 0 | if (!dpn->dpname) |
545 | 0 | return 0; |
546 | 0 | for (i = 0; i < sk_X509_NAME_ENTRY_num(frag); i++) { |
547 | 0 | ne = sk_X509_NAME_ENTRY_value(frag, i); |
548 | 0 | if (!X509_NAME_add_entry(dpn->dpname, ne, -1, i ? 0 : 1)) { |
549 | 0 | X509_NAME_free(dpn->dpname); |
550 | 0 | dpn->dpname = NULL; |
551 | 0 | return 0; |
552 | 0 | } |
553 | 0 | } |
554 | | /* generate cached encoding of name */ |
555 | 0 | if (i2d_X509_NAME(dpn->dpname, NULL) < 0) { |
556 | 0 | X509_NAME_free(dpn->dpname); |
557 | 0 | dpn->dpname = NULL; |
558 | 0 | return 0; |
559 | 0 | } |
560 | 0 | return 1; |
561 | 0 | } |