/src/openssl/crypto/x509/v3_lib.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | /* X509 v3 extension utilities */ |
11 | | |
12 | | #include <stdio.h> |
13 | | #include "internal/cryptlib.h" |
14 | | #include <openssl/conf.h> |
15 | | #include <openssl/x509v3.h> |
16 | | |
17 | | #include "ext_dat.h" |
18 | | |
19 | | static STACK_OF(X509V3_EXT_METHOD) *ext_list = NULL; |
20 | | |
21 | | static int ext_cmp(const X509V3_EXT_METHOD *const *a, |
22 | | const X509V3_EXT_METHOD *const *b); |
23 | | static void ext_list_free(X509V3_EXT_METHOD *ext); |
24 | | |
25 | | int X509V3_EXT_add(X509V3_EXT_METHOD *ext) |
26 | 0 | { |
27 | 0 | if (ext_list == NULL |
28 | 0 | && (ext_list = sk_X509V3_EXT_METHOD_new(ext_cmp)) == NULL) { |
29 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_CRYPTO_LIB); |
30 | 0 | return 0; |
31 | 0 | } |
32 | 0 | if (!sk_X509V3_EXT_METHOD_push(ext_list, ext)) { |
33 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_CRYPTO_LIB); |
34 | 0 | return 0; |
35 | 0 | } |
36 | 0 | return 1; |
37 | 0 | } |
38 | | |
39 | | static int ext_cmp(const X509V3_EXT_METHOD *const *a, |
40 | | const X509V3_EXT_METHOD *const *b) |
41 | 657k | { |
42 | 657k | return ((*a)->ext_nid - (*b)->ext_nid); |
43 | 657k | } |
44 | | |
45 | | DECLARE_OBJ_BSEARCH_CMP_FN(const X509V3_EXT_METHOD *, |
46 | | const X509V3_EXT_METHOD *, ext); |
47 | | IMPLEMENT_OBJ_BSEARCH_CMP_FN(const X509V3_EXT_METHOD *, |
48 | | const X509V3_EXT_METHOD *, ext); |
49 | | |
50 | | #include "standard_exts.h" |
51 | | |
52 | | const X509V3_EXT_METHOD *X509V3_EXT_get_nid(int nid) |
53 | 112k | { |
54 | 112k | X509V3_EXT_METHOD tmp; |
55 | 112k | const X509V3_EXT_METHOD *t = &tmp, *const *ret; |
56 | 112k | int idx; |
57 | | |
58 | 112k | if (nid < 0) |
59 | 0 | return NULL; |
60 | 112k | tmp.ext_nid = nid; |
61 | 112k | ret = OBJ_bsearch_ext(&t, standard_exts, STANDARD_EXTENSION_COUNT); |
62 | 112k | if (ret) |
63 | 110k | return *ret; |
64 | 2.22k | if (!ext_list) |
65 | 2.22k | return NULL; |
66 | | /* Ideally, this would be done under a lock */ |
67 | 0 | sk_X509V3_EXT_METHOD_sort(ext_list); |
68 | 0 | idx = sk_X509V3_EXT_METHOD_find(ext_list, &tmp); |
69 | | /* A failure to locate the item is handled by the value method */ |
70 | 0 | return sk_X509V3_EXT_METHOD_value(ext_list, idx); |
71 | 2.22k | } |
72 | | |
73 | | const X509V3_EXT_METHOD *X509V3_EXT_get(X509_EXTENSION *ext) |
74 | 119k | { |
75 | 119k | int nid; |
76 | 119k | if ((nid = OBJ_obj2nid(X509_EXTENSION_get_object(ext))) == NID_undef) |
77 | 7.43k | return NULL; |
78 | 112k | return X509V3_EXT_get_nid(nid); |
79 | 119k | } |
80 | | |
81 | | int X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) |
82 | 0 | { |
83 | 0 | for (; extlist->ext_nid != -1; extlist++) |
84 | 0 | if (!X509V3_EXT_add(extlist)) |
85 | 0 | return 0; |
86 | 0 | return 1; |
87 | 0 | } |
88 | | |
89 | | int X509V3_EXT_add_alias(int nid_to, int nid_from) |
90 | 0 | { |
91 | 0 | const X509V3_EXT_METHOD *ext; |
92 | 0 | X509V3_EXT_METHOD *tmpext; |
93 | |
|
94 | 0 | if ((ext = X509V3_EXT_get_nid(nid_from)) == NULL) { |
95 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_EXTENSION_NOT_FOUND); |
96 | 0 | return 0; |
97 | 0 | } |
98 | 0 | if ((tmpext = OPENSSL_malloc(sizeof(*tmpext))) == NULL) |
99 | 0 | return 0; |
100 | 0 | *tmpext = *ext; |
101 | 0 | tmpext->ext_nid = nid_to; |
102 | 0 | tmpext->ext_flags |= X509V3_EXT_DYNAMIC; |
103 | 0 | if (!X509V3_EXT_add(tmpext)) { |
104 | 0 | OPENSSL_free(tmpext); |
105 | 0 | return 0; |
106 | 0 | } |
107 | 0 | return 1; |
108 | 0 | } |
109 | | |
110 | | void X509V3_EXT_cleanup(void) |
111 | 0 | { |
112 | 0 | sk_X509V3_EXT_METHOD_pop_free(ext_list, ext_list_free); |
113 | 0 | ext_list = NULL; |
114 | 0 | } |
115 | | |
116 | | static void ext_list_free(X509V3_EXT_METHOD *ext) |
117 | 0 | { |
118 | 0 | if (ext->ext_flags & X509V3_EXT_DYNAMIC) |
119 | 0 | OPENSSL_free(ext); |
120 | 0 | } |
121 | | |
122 | | /* |
123 | | * Legacy function: we don't need to add standard extensions any more because |
124 | | * they are now kept in ext_dat.h. |
125 | | */ |
126 | | |
127 | | int X509V3_add_standard_extensions(void) |
128 | 0 | { |
129 | 0 | return 1; |
130 | 0 | } |
131 | | |
132 | | /* Return an extension internal structure */ |
133 | | |
134 | | void *X509V3_EXT_d2i(X509_EXTENSION *ext) |
135 | 2.10k | { |
136 | 2.10k | const X509V3_EXT_METHOD *method; |
137 | 2.10k | const unsigned char *p; |
138 | 2.10k | ASN1_STRING *extvalue; |
139 | 2.10k | int extlen; |
140 | | |
141 | 2.10k | if ((method = X509V3_EXT_get(ext)) == NULL) |
142 | 0 | return NULL; |
143 | 2.10k | extvalue = X509_EXTENSION_get_data(ext); |
144 | 2.10k | p = ASN1_STRING_get0_data(extvalue); |
145 | 2.10k | extlen = ASN1_STRING_length(extvalue); |
146 | 2.10k | if (method->it) |
147 | 2.10k | return ASN1_item_d2i(NULL, &p, extlen, ASN1_ITEM_ptr(method->it)); |
148 | 0 | return method->d2i(NULL, &p, extlen); |
149 | 2.10k | } |
150 | | |
151 | | /*- |
152 | | * Get critical flag and decoded version of extension from a NID. |
153 | | * The "idx" variable returns the last found extension and can |
154 | | * be used to retrieve multiple extensions of the same NID. |
155 | | * However multiple extensions with the same NID is usually |
156 | | * due to a badly encoded certificate so if idx is NULL we |
157 | | * choke if multiple extensions exist. |
158 | | * The "crit" variable is set to the critical value. |
159 | | * The return value is the decoded extension or NULL on |
160 | | * error. The actual error can have several different causes, |
161 | | * the value of *crit reflects the cause: |
162 | | * >= 0, extension found but not decoded (reflects critical value). |
163 | | * -1 extension not found. |
164 | | * -2 extension occurs more than once. |
165 | | */ |
166 | | |
167 | | void *X509V3_get_d2i(const STACK_OF(X509_EXTENSION) *x, int nid, int *crit, |
168 | | int *idx) |
169 | 53.2k | { |
170 | 53.2k | int lastpos, i; |
171 | 53.2k | X509_EXTENSION *ex, *found_ex = NULL; |
172 | | |
173 | 53.2k | if (!x) { |
174 | 29.6k | if (idx) |
175 | 0 | *idx = -1; |
176 | 29.6k | if (crit) |
177 | 29.6k | *crit = -1; |
178 | 29.6k | return NULL; |
179 | 29.6k | } |
180 | 23.5k | if (idx) |
181 | 0 | lastpos = *idx + 1; |
182 | 23.5k | else |
183 | 23.5k | lastpos = 0; |
184 | 23.5k | if (lastpos < 0) |
185 | 0 | lastpos = 0; |
186 | 442k | for (i = lastpos; i < sk_X509_EXTENSION_num(x); i++) { |
187 | 419k | ex = sk_X509_EXTENSION_value(x, i); |
188 | 419k | if (OBJ_obj2nid(X509_EXTENSION_get_object(ex)) == nid) { |
189 | 2.80k | if (idx) { |
190 | 0 | *idx = i; |
191 | 0 | found_ex = ex; |
192 | 0 | break; |
193 | 2.80k | } else if (found_ex) { |
194 | | /* Found more than one */ |
195 | 349 | if (crit) |
196 | 349 | *crit = -2; |
197 | 349 | return NULL; |
198 | 349 | } |
199 | 2.45k | found_ex = ex; |
200 | 2.45k | } |
201 | 419k | } |
202 | 23.2k | if (found_ex) { |
203 | | /* Found it */ |
204 | 2.10k | if (crit) |
205 | 2.10k | *crit = X509_EXTENSION_get_critical(found_ex); |
206 | 2.10k | return X509V3_EXT_d2i(found_ex); |
207 | 2.10k | } |
208 | | |
209 | | /* Extension not found */ |
210 | 21.1k | if (idx) |
211 | 0 | *idx = -1; |
212 | 21.1k | if (crit) |
213 | 21.1k | *crit = -1; |
214 | 21.1k | return NULL; |
215 | 23.2k | } |
216 | | |
217 | | /* |
218 | | * This function is a general extension append, replace and delete utility. |
219 | | * The precise operation is governed by the 'flags' value. The 'crit' and |
220 | | * 'value' arguments (if relevant) are the extensions internal structure. |
221 | | */ |
222 | | |
223 | | int X509V3_add1_i2d(STACK_OF(X509_EXTENSION) **x, int nid, void *value, |
224 | | int crit, unsigned long flags) |
225 | 0 | { |
226 | 0 | int errcode, extidx = -1; |
227 | 0 | X509_EXTENSION *ext = NULL, *extmp; |
228 | 0 | STACK_OF(X509_EXTENSION) *ret = NULL; |
229 | 0 | unsigned long ext_op = flags & X509V3_ADD_OP_MASK; |
230 | | |
231 | | /* |
232 | | * If appending we don't care if it exists, otherwise look for existing |
233 | | * extension. |
234 | | */ |
235 | 0 | if (ext_op != X509V3_ADD_APPEND) |
236 | 0 | extidx = X509v3_get_ext_by_NID(*x, nid, -1); |
237 | | |
238 | | /* See if extension exists */ |
239 | 0 | if (extidx >= 0) { |
240 | | /* If keep existing, nothing to do */ |
241 | 0 | if (ext_op == X509V3_ADD_KEEP_EXISTING) |
242 | 0 | return 1; |
243 | | /* If default then its an error */ |
244 | 0 | if (ext_op == X509V3_ADD_DEFAULT) { |
245 | 0 | errcode = X509V3_R_EXTENSION_EXISTS; |
246 | 0 | goto err; |
247 | 0 | } |
248 | | /* If delete, just delete it */ |
249 | 0 | if (ext_op == X509V3_ADD_DELETE) { |
250 | 0 | extmp = sk_X509_EXTENSION_delete(*x, extidx); |
251 | 0 | if (extmp == NULL) |
252 | 0 | return -1; |
253 | 0 | X509_EXTENSION_free(extmp); |
254 | 0 | return 1; |
255 | 0 | } |
256 | 0 | } else { |
257 | | /* |
258 | | * If replace existing or delete, error since extension must exist |
259 | | */ |
260 | 0 | if ((ext_op == X509V3_ADD_REPLACE_EXISTING) || |
261 | 0 | (ext_op == X509V3_ADD_DELETE)) { |
262 | 0 | errcode = X509V3_R_EXTENSION_NOT_FOUND; |
263 | 0 | goto err; |
264 | 0 | } |
265 | 0 | } |
266 | | |
267 | | /* |
268 | | * If we get this far then we have to create an extension: could have |
269 | | * some flags for alternative encoding schemes... |
270 | | */ |
271 | | |
272 | 0 | ext = X509V3_EXT_i2d(nid, crit, value); |
273 | |
|
274 | 0 | if (!ext) { |
275 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_ERROR_CREATING_EXTENSION); |
276 | 0 | return 0; |
277 | 0 | } |
278 | | |
279 | | /* If extension exists replace it.. */ |
280 | 0 | if (extidx >= 0) { |
281 | 0 | extmp = sk_X509_EXTENSION_value(*x, extidx); |
282 | 0 | X509_EXTENSION_free(extmp); |
283 | 0 | if (!sk_X509_EXTENSION_set(*x, extidx, ext)) |
284 | 0 | return -1; |
285 | 0 | return 1; |
286 | 0 | } |
287 | | |
288 | 0 | ret = *x; |
289 | 0 | if (*x == NULL |
290 | 0 | && (ret = sk_X509_EXTENSION_new_null()) == NULL) |
291 | 0 | goto m_fail; |
292 | 0 | if (!sk_X509_EXTENSION_push(ret, ext)) |
293 | 0 | goto m_fail; |
294 | | |
295 | 0 | *x = ret; |
296 | 0 | return 1; |
297 | | |
298 | 0 | m_fail: |
299 | | /* ERR_raise(ERR_LIB_X509V3, ERR_R_CRYPTO_LIB); */ |
300 | 0 | if (ret != *x) |
301 | 0 | sk_X509_EXTENSION_free(ret); |
302 | 0 | X509_EXTENSION_free(ext); |
303 | 0 | return -1; |
304 | | |
305 | 0 | err: |
306 | 0 | if (!(flags & X509V3_ADD_SILENT)) |
307 | 0 | ERR_raise(ERR_LIB_X509V3, errcode); |
308 | 0 | return 0; |
309 | 0 | } |