• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
3  * 1999.
4  */
5 /* ====================================================================
6  * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com). */
56 
57 #include <stdio.h>
58 
59 #include <openssl/asn1t.h>
60 #include <openssl/conf.h>
61 #include <openssl/err.h>
62 #include <openssl/obj.h>
63 #include <openssl/x509v3.h>
64 
65 #include "internal.h"
66 
67 
68 static void *v2i_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method,
69                                     const X509V3_CTX *ctx,
70                                     const STACK_OF(CONF_VALUE) *nval);
71 static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(
72     const X509V3_EXT_METHOD *method, void *eku, STACK_OF(CONF_VALUE) *extlist);
73 
74 const X509V3_EXT_METHOD v3_ext_ku = {
75     NID_ext_key_usage,
76     0,
77     ASN1_ITEM_ref(EXTENDED_KEY_USAGE),
78     0,
79     0,
80     0,
81     0,
82     0,
83     0,
84     i2v_EXTENDED_KEY_USAGE,
85     v2i_EXTENDED_KEY_USAGE,
86     0,
87     0,
88     NULL,
89 };
90 
91 // NB OCSP acceptable responses also is a SEQUENCE OF OBJECT
92 const X509V3_EXT_METHOD v3_ocsp_accresp = {
93     NID_id_pkix_OCSP_acceptableResponses,
94     0,
95     ASN1_ITEM_ref(EXTENDED_KEY_USAGE),
96     0,
97     0,
98     0,
99     0,
100     0,
101     0,
102     i2v_EXTENDED_KEY_USAGE,
103     v2i_EXTENDED_KEY_USAGE,
104     0,
105     0,
106     NULL,
107 };
108 
ASN1_ITEM_TEMPLATE(EXTENDED_KEY_USAGE)109 ASN1_ITEM_TEMPLATE(EXTENDED_KEY_USAGE) = ASN1_EX_TEMPLATE_TYPE(
110     ASN1_TFLG_SEQUENCE_OF, 0, EXTENDED_KEY_USAGE, ASN1_OBJECT)
111 ASN1_ITEM_TEMPLATE_END(EXTENDED_KEY_USAGE)
112 
113 IMPLEMENT_ASN1_FUNCTIONS_const(EXTENDED_KEY_USAGE)
114 
115 static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(
116     const X509V3_EXT_METHOD *method, void *a, STACK_OF(CONF_VALUE) *ext_list) {
117   const EXTENDED_KEY_USAGE *eku = a;
118   for (size_t i = 0; i < sk_ASN1_OBJECT_num(eku); i++) {
119     const ASN1_OBJECT *obj = sk_ASN1_OBJECT_value(eku, i);
120     char obj_tmp[80];
121     i2t_ASN1_OBJECT(obj_tmp, 80, obj);
122     X509V3_add_value(NULL, obj_tmp, &ext_list);
123   }
124   return ext_list;
125 }
126 
v2i_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD * method,const X509V3_CTX * ctx,const STACK_OF (CONF_VALUE)* nval)127 static void *v2i_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method,
128                                     const X509V3_CTX *ctx,
129                                     const STACK_OF(CONF_VALUE) *nval) {
130   EXTENDED_KEY_USAGE *extku = sk_ASN1_OBJECT_new_null();
131   if (extku == NULL) {
132     return NULL;
133   }
134 
135   for (size_t i = 0; i < sk_CONF_VALUE_num(nval); i++) {
136     const CONF_VALUE *val = sk_CONF_VALUE_value(nval, i);
137     const char *extval;
138     if (val->value) {
139       extval = val->value;
140     } else {
141       extval = val->name;
142     }
143     ASN1_OBJECT *obj = OBJ_txt2obj(extval, 0);
144     if (obj == NULL || !sk_ASN1_OBJECT_push(extku, obj)) {
145       ASN1_OBJECT_free(obj);
146       sk_ASN1_OBJECT_pop_free(extku, ASN1_OBJECT_free);
147       OPENSSL_PUT_ERROR(X509V3, X509V3_R_INVALID_OBJECT_IDENTIFIER);
148       X509V3_conf_err(val);
149       return NULL;
150     }
151   }
152 
153   return extku;
154 }
155