LCOV - code coverage report
Current view: top level - third_party/openssl/crypto/x509 - x509_req.c (source / functions) Hit Total Coverage
Test: tmp.zDYK9MVh93 Lines: 0 105 0.0 %
Date: 2015-10-10 Functions: 0 18 0.0 %

          Line data    Source code
       1             : /* crypto/x509/x509_req.c */
       2             : /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
       3             :  * All rights reserved.
       4             :  *
       5             :  * This package is an SSL implementation written
       6             :  * by Eric Young (eay@cryptsoft.com).
       7             :  * The implementation was written so as to conform with Netscapes SSL.
       8             :  *
       9             :  * This library is free for commercial and non-commercial use as long as
      10             :  * the following conditions are aheared to.  The following conditions
      11             :  * apply to all code found in this distribution, be it the RC4, RSA,
      12             :  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
      13             :  * included with this distribution is covered by the same copyright terms
      14             :  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
      15             :  *
      16             :  * Copyright remains Eric Young's, and as such any Copyright notices in
      17             :  * the code are not to be removed.
      18             :  * If this package is used in a product, Eric Young should be given attribution
      19             :  * as the author of the parts of the library used.
      20             :  * This can be in the form of a textual message at program startup or
      21             :  * in documentation (online or textual) provided with the package.
      22             :  *
      23             :  * Redistribution and use in source and binary forms, with or without
      24             :  * modification, are permitted provided that the following conditions
      25             :  * are met:
      26             :  * 1. Redistributions of source code must retain the copyright
      27             :  *    notice, this list of conditions and the following disclaimer.
      28             :  * 2. Redistributions in binary form must reproduce the above copyright
      29             :  *    notice, this list of conditions and the following disclaimer in the
      30             :  *    documentation and/or other materials provided with the distribution.
      31             :  * 3. All advertising materials mentioning features or use of this software
      32             :  *    must display the following acknowledgement:
      33             :  *    "This product includes cryptographic software written by
      34             :  *     Eric Young (eay@cryptsoft.com)"
      35             :  *    The word 'cryptographic' can be left out if the rouines from the library
      36             :  *    being used are not cryptographic related :-).
      37             :  * 4. If you include any Windows specific code (or a derivative thereof) from
      38             :  *    the apps directory (application code) you must include an acknowledgement:
      39             :  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
      40             :  *
      41             :  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
      42             :  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
      43             :  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
      44             :  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
      45             :  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
      46             :  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
      47             :  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
      48             :  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
      49             :  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
      50             :  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
      51             :  * SUCH DAMAGE.
      52             :  *
      53             :  * The licence and distribution terms for any publically available version or
      54             :  * derivative of this code cannot be changed.  i.e. this code cannot simply be
      55             :  * copied and put under another distribution licence
      56             :  * [including the GNU Public Licence.]
      57             :  */
      58             : 
      59             : #include <stdio.h>
      60             : #include "cryptlib.h"
      61             : #include <openssl/bn.h>
      62             : #include <openssl/evp.h>
      63             : #include <openssl/asn1.h>
      64             : #include <openssl/asn1t.h>
      65             : #include <openssl/x509.h>
      66             : #include <openssl/objects.h>
      67             : #include <openssl/buffer.h>
      68             : #include <openssl/pem.h>
      69             : 
      70           0 : X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
      71             : {
      72             :     X509_REQ *ret;
      73             :     X509_REQ_INFO *ri;
      74             :     int i;
      75             :     EVP_PKEY *pktmp;
      76             : 
      77           0 :     ret = X509_REQ_new();
      78           0 :     if (ret == NULL) {
      79           0 :         X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE);
      80           0 :         goto err;
      81             :     }
      82             : 
      83           0 :     ri = ret->req_info;
      84             : 
      85           0 :     ri->version->length = 1;
      86           0 :     ri->version->data = (unsigned char *)OPENSSL_malloc(1);
      87           0 :     if (ri->version->data == NULL)
      88             :         goto err;
      89           0 :     ri->version->data[0] = 0;   /* version == 0 */
      90             : 
      91           0 :     if (!X509_REQ_set_subject_name(ret, X509_get_subject_name(x)))
      92             :         goto err;
      93             : 
      94           0 :     pktmp = X509_get_pubkey(x);
      95           0 :     if (pktmp == NULL)
      96             :         goto err;
      97           0 :     i = X509_REQ_set_pubkey(ret, pktmp);
      98           0 :     EVP_PKEY_free(pktmp);
      99           0 :     if (!i)
     100             :         goto err;
     101             : 
     102           0 :     if (pkey != NULL) {
     103           0 :         if (!X509_REQ_sign(ret, pkey, md))
     104             :             goto err;
     105             :     }
     106           0 :     return (ret);
     107             :  err:
     108           0 :     X509_REQ_free(ret);
     109           0 :     return (NULL);
     110             : }
     111             : 
     112           0 : EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req)
     113             : {
     114           0 :     if ((req == NULL) || (req->req_info == NULL))
     115             :         return (NULL);
     116           0 :     return (X509_PUBKEY_get(req->req_info->pubkey));
     117             : }
     118             : 
     119           0 : int X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k)
     120             : {
     121             :     EVP_PKEY *xk = NULL;
     122             :     int ok = 0;
     123             : 
     124           0 :     xk = X509_REQ_get_pubkey(x);
     125           0 :     switch (EVP_PKEY_cmp(xk, k)) {
     126             :     case 1:
     127             :         ok = 1;
     128           0 :         break;
     129             :     case 0:
     130           0 :         X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
     131             :                 X509_R_KEY_VALUES_MISMATCH);
     132           0 :         break;
     133             :     case -1:
     134           0 :         X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_KEY_TYPE_MISMATCH);
     135           0 :         break;
     136             :     case -2:
     137             : #ifndef OPENSSL_NO_EC
     138           0 :         if (k->type == EVP_PKEY_EC) {
     139           0 :             X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, ERR_R_EC_LIB);
     140           0 :             break;
     141             :         }
     142             : #endif
     143             : #ifndef OPENSSL_NO_DH
     144           0 :         if (k->type == EVP_PKEY_DH) {
     145             :             /* No idea */
     146           0 :             X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY,
     147             :                     X509_R_CANT_CHECK_DH_KEY);
     148           0 :             break;
     149             :         }
     150             : #endif
     151           0 :         X509err(X509_F_X509_REQ_CHECK_PRIVATE_KEY, X509_R_UNKNOWN_KEY_TYPE);
     152             :     }
     153             : 
     154           0 :     EVP_PKEY_free(xk);
     155           0 :     return (ok);
     156             : }
     157             : 
     158             : /*
     159             :  * It seems several organisations had the same idea of including a list of
     160             :  * extensions in a certificate request. There are at least two OIDs that are
     161             :  * used and there may be more: so the list is configurable.
     162             :  */
     163             : 
     164             : static int ext_nid_list[] = { NID_ext_req, NID_ms_ext_req, NID_undef };
     165             : 
     166             : static int *ext_nids = ext_nid_list;
     167             : 
     168           0 : int X509_REQ_extension_nid(int req_nid)
     169             : {
     170             :     int i, nid;
     171           0 :     for (i = 0;; i++) {
     172           0 :         nid = ext_nids[i];
     173           0 :         if (nid == NID_undef)
     174             :             return 0;
     175           0 :         else if (req_nid == nid)
     176             :             return 1;
     177           0 :     }
     178             : }
     179             : 
     180           0 : int *X509_REQ_get_extension_nids(void)
     181             : {
     182           0 :     return ext_nids;
     183             : }
     184             : 
     185           0 : void X509_REQ_set_extension_nids(int *nids)
     186             : {
     187           0 :     ext_nids = nids;
     188           0 : }
     189             : 
     190           0 : STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req)
     191             : {
     192             :     X509_ATTRIBUTE *attr;
     193             :     ASN1_TYPE *ext = NULL;
     194             :     int idx, *pnid;
     195             :     const unsigned char *p;
     196             : 
     197           0 :     if ((req == NULL) || (req->req_info == NULL) || !ext_nids)
     198             :         return (NULL);
     199           0 :     for (pnid = ext_nids; *pnid != NID_undef; pnid++) {
     200             :         idx = X509_REQ_get_attr_by_NID(req, *pnid, -1);
     201           0 :         if (idx == -1)
     202           0 :             continue;
     203             :         attr = X509_REQ_get_attr(req, idx);
     204           0 :         if (attr->single)
     205           0 :             ext = attr->value.single;
     206           0 :         else if (sk_ASN1_TYPE_num(attr->value.set))
     207           0 :             ext = sk_ASN1_TYPE_value(attr->value.set, 0);
     208             :         break;
     209             :     }
     210           0 :     if (!ext || (ext->type != V_ASN1_SEQUENCE))
     211             :         return NULL;
     212           0 :     p = ext->value.sequence->data;
     213           0 :     return (STACK_OF(X509_EXTENSION) *)
     214           0 :         ASN1_item_d2i(NULL, &p, ext->value.sequence->length,
     215             :                       ASN1_ITEM_rptr(X509_EXTENSIONS));
     216             : }
     217             : 
     218             : /*
     219             :  * Add a STACK_OF extensions to a certificate request: allow alternative OIDs
     220             :  * in case we want to create a non standard one.
     221             :  */
     222             : 
     223           0 : int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts,
     224             :                                 int nid)
     225             : {
     226             :     ASN1_TYPE *at = NULL;
     227             :     X509_ATTRIBUTE *attr = NULL;
     228           0 :     if (!(at = ASN1_TYPE_new()) || !(at->value.sequence = ASN1_STRING_new()))
     229             :         goto err;
     230             : 
     231           0 :     at->type = V_ASN1_SEQUENCE;
     232             :     /* Generate encoding of extensions */
     233           0 :     at->value.sequence->length =
     234           0 :         ASN1_item_i2d((ASN1_VALUE *)exts,
     235             :                       &at->value.sequence->data,
     236             :                       ASN1_ITEM_rptr(X509_EXTENSIONS));
     237           0 :     if (!(attr = X509_ATTRIBUTE_new()))
     238             :         goto err;
     239           0 :     if (!(attr->value.set = sk_ASN1_TYPE_new_null()))
     240             :         goto err;
     241           0 :     if (!sk_ASN1_TYPE_push(attr->value.set, at))
     242             :         goto err;
     243             :     at = NULL;
     244           0 :     attr->single = 0;
     245           0 :     attr->object = OBJ_nid2obj(nid);
     246           0 :     if (!req->req_info->attributes) {
     247           0 :         if (!(req->req_info->attributes = sk_X509_ATTRIBUTE_new_null()))
     248             :             goto err;
     249             :     }
     250           0 :     if (!sk_X509_ATTRIBUTE_push(req->req_info->attributes, attr))
     251             :         goto err;
     252             :     return 1;
     253             :  err:
     254           0 :     X509_ATTRIBUTE_free(attr);
     255           0 :     ASN1_TYPE_free(at);
     256           0 :     return 0;
     257             : }
     258             : 
     259             : /* This is the normal usage: use the "official" OID */
     260           0 : int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts)
     261             : {
     262           0 :     return X509_REQ_add_extensions_nid(req, exts, NID_ext_req);
     263             : }
     264             : 
     265             : /* Request attribute functions */
     266             : 
     267           0 : int X509_REQ_get_attr_count(const X509_REQ *req)
     268             : {
     269           0 :     return X509at_get_attr_count(req->req_info->attributes);
     270             : }
     271             : 
     272           0 : int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos)
     273             : {
     274           0 :     return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos);
     275             : }
     276             : 
     277           0 : int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj,
     278             :                              int lastpos)
     279             : {
     280           0 :     return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos);
     281             : }
     282             : 
     283           0 : X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc)
     284             : {
     285           0 :     return X509at_get_attr(req->req_info->attributes, loc);
     286             : }
     287             : 
     288           0 : X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc)
     289             : {
     290           0 :     return X509at_delete_attr(req->req_info->attributes, loc);
     291             : }
     292             : 
     293           0 : int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr)
     294             : {
     295           0 :     if (X509at_add1_attr(&req->req_info->attributes, attr))
     296             :         return 1;
     297           0 :     return 0;
     298             : }
     299             : 
     300           0 : int X509_REQ_add1_attr_by_OBJ(X509_REQ *req,
     301             :                               const ASN1_OBJECT *obj, int type,
     302             :                               const unsigned char *bytes, int len)
     303             : {
     304           0 :     if (X509at_add1_attr_by_OBJ(&req->req_info->attributes, obj,
     305             :                                 type, bytes, len))
     306             :         return 1;
     307           0 :     return 0;
     308             : }
     309             : 
     310           0 : int X509_REQ_add1_attr_by_NID(X509_REQ *req,
     311             :                               int nid, int type,
     312             :                               const unsigned char *bytes, int len)
     313             : {
     314           0 :     if (X509at_add1_attr_by_NID(&req->req_info->attributes, nid,
     315             :                                 type, bytes, len))
     316             :         return 1;
     317           0 :     return 0;
     318             : }
     319             : 
     320           0 : int X509_REQ_add1_attr_by_txt(X509_REQ *req,
     321             :                               const char *attrname, int type,
     322             :                               const unsigned char *bytes, int len)
     323             : {
     324           0 :     if (X509at_add1_attr_by_txt(&req->req_info->attributes, attrname,
     325             :                                 type, bytes, len))
     326             :         return 1;
     327           0 :     return 0;
     328             : }

Generated by: LCOV version 1.10