| OLD | NEW |
| (Empty) |
| 1 /* ocsp_srv.c */ | |
| 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | |
| 3 * project 2001. | |
| 4 */ | |
| 5 /* ==================================================================== | |
| 6 * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | |
| 7 * | |
| 8 * Redistribution and use in source and binary forms, with or without | |
| 9 * modification, are permitted provided that the following conditions | |
| 10 * are met: | |
| 11 * | |
| 12 * 1. Redistributions of source code must retain the above copyright | |
| 13 * notice, this list of conditions and the following disclaimer. | |
| 14 * | |
| 15 * 2. Redistributions in binary form must reproduce the above copyright | |
| 16 * notice, this list of conditions and the following disclaimer in | |
| 17 * the documentation and/or other materials provided with the | |
| 18 * distribution. | |
| 19 * | |
| 20 * 3. All advertising materials mentioning features or use of this | |
| 21 * software must display the following acknowledgment: | |
| 22 * "This product includes software developed by the OpenSSL Project | |
| 23 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
| 24 * | |
| 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
| 26 * endorse or promote products derived from this software without | |
| 27 * prior written permission. For written permission, please contact | |
| 28 * openssl-core@openssl.org. | |
| 29 * | |
| 30 * 5. Products derived from this software may not be called "OpenSSL" | |
| 31 * nor may "OpenSSL" appear in their names without prior written | |
| 32 * permission of the OpenSSL Project. | |
| 33 * | |
| 34 * 6. Redistributions of any form whatsoever must retain the following | |
| 35 * acknowledgment: | |
| 36 * "This product includes software developed by the OpenSSL Project | |
| 37 * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
| 38 * | |
| 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
| 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
| 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
| 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
| 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
| 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
| 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
| 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
| 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
| 50 * OF THE POSSIBILITY OF SUCH DAMAGE. | |
| 51 * ==================================================================== | |
| 52 * | |
| 53 * This product includes cryptographic software written by Eric Young | |
| 54 * (eay@cryptsoft.com). This product includes software written by Tim | |
| 55 * Hudson (tjh@cryptsoft.com). | |
| 56 * | |
| 57 */ | |
| 58 | |
| 59 #include <stdio.h> | |
| 60 #include <cryptlib.h> | |
| 61 #include <openssl/objects.h> | |
| 62 #include <openssl/rand.h> | |
| 63 #include <openssl/x509.h> | |
| 64 #include <openssl/pem.h> | |
| 65 #include <openssl/x509v3.h> | |
| 66 #include <openssl/ocsp.h> | |
| 67 | |
| 68 /* Utility functions related to sending OCSP responses and extracting | |
| 69 * relevant information from the request. | |
| 70 */ | |
| 71 | |
| 72 int OCSP_request_onereq_count(OCSP_REQUEST *req) | |
| 73 { | |
| 74 return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList); | |
| 75 } | |
| 76 | |
| 77 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) | |
| 78 { | |
| 79 return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i); | |
| 80 } | |
| 81 | |
| 82 OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one) | |
| 83 { | |
| 84 return one->reqCert; | |
| 85 } | |
| 86 | |
| 87 int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd, | |
| 88 ASN1_OCTET_STRING **pikeyHash, | |
| 89 ASN1_INTEGER **pserial, OCSP_CERTID *cid) | |
| 90 { | |
| 91 if (!cid) return 0; | |
| 92 if (pmd) *pmd = cid->hashAlgorithm->algorithm; | |
| 93 if(piNameHash) *piNameHash = cid->issuerNameHash; | |
| 94 if (pikeyHash) *pikeyHash = cid->issuerKeyHash; | |
| 95 if (pserial) *pserial = cid->serialNumber; | |
| 96 return 1; | |
| 97 } | |
| 98 | |
| 99 int OCSP_request_is_signed(OCSP_REQUEST *req) | |
| 100 { | |
| 101 if(req->optionalSignature) return 1; | |
| 102 return 0; | |
| 103 } | |
| 104 | |
| 105 /* Create an OCSP response and encode an optional basic response */ | |
| 106 OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs) | |
| 107 { | |
| 108 OCSP_RESPONSE *rsp = NULL; | |
| 109 | |
| 110 if (!(rsp = OCSP_RESPONSE_new())) goto err; | |
| 111 if (!(ASN1_ENUMERATED_set(rsp->responseStatus, status))) goto err; | |
| 112 if (!bs) return rsp; | |
| 113 if (!(rsp->responseBytes = OCSP_RESPBYTES_new())) goto err; | |
| 114 rsp->responseBytes->responseType = OBJ_nid2obj(NID_id_pkix_OCSP_basic); | |
| 115 if (!ASN1_item_pack(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBy
tes->response)) | |
| 116 goto err; | |
| 117 return rsp; | |
| 118 err: | |
| 119 if (rsp) OCSP_RESPONSE_free(rsp); | |
| 120 return NULL; | |
| 121 } | |
| 122 | |
| 123 | |
| 124 OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp, | |
| 125 OCSP_CERTID *cid, | |
| 126 int status, int reason, | |
| 127 ASN1_TIME *revtime, | |
| 128 ASN1_TIME *thisupd, ASN1_TIME *nextupd) | |
| 129 { | |
| 130 OCSP_SINGLERESP *single = NULL; | |
| 131 OCSP_CERTSTATUS *cs; | |
| 132 OCSP_REVOKEDINFO *ri; | |
| 133 | |
| 134 if(!rsp->tbsResponseData->responses && | |
| 135 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null())) | |
| 136 goto err; | |
| 137 | |
| 138 if (!(single = OCSP_SINGLERESP_new())) | |
| 139 goto err; | |
| 140 | |
| 141 | |
| 142 | |
| 143 if (!ASN1_TIME_to_generalizedtime(thisupd, &single->thisUpdate)) | |
| 144 goto err; | |
| 145 if (nextupd && | |
| 146 !ASN1_TIME_to_generalizedtime(nextupd, &single->nextUpdate)) | |
| 147 goto err; | |
| 148 | |
| 149 OCSP_CERTID_free(single->certId); | |
| 150 | |
| 151 if(!(single->certId = OCSP_CERTID_dup(cid))) | |
| 152 goto err; | |
| 153 | |
| 154 cs = single->certStatus; | |
| 155 switch(cs->type = status) | |
| 156 { | |
| 157 case V_OCSP_CERTSTATUS_REVOKED: | |
| 158 if (!revtime) | |
| 159 { | |
| 160 OCSPerr(OCSP_F_OCSP_BASIC_ADD1_STATUS,OCSP_R_NO_REVOKED_
TIME); | |
| 161 goto err; | |
| 162 } | |
| 163 if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new())) goto err
; | |
| 164 if (!ASN1_TIME_to_generalizedtime(revtime, &ri->revocationTime)) | |
| 165 goto err; | |
| 166 if (reason != OCSP_REVOKED_STATUS_NOSTATUS) | |
| 167 { | |
| 168 if (!(ri->revocationReason = ASN1_ENUMERATED_new())) | |
| 169 goto err; | |
| 170 if (!(ASN1_ENUMERATED_set(ri->revocationReason, | |
| 171 reason))) | |
| 172 goto err; | |
| 173 } | |
| 174 break; | |
| 175 | |
| 176 case V_OCSP_CERTSTATUS_GOOD: | |
| 177 cs->value.good = ASN1_NULL_new(); | |
| 178 break; | |
| 179 | |
| 180 case V_OCSP_CERTSTATUS_UNKNOWN: | |
| 181 cs->value.unknown = ASN1_NULL_new(); | |
| 182 break; | |
| 183 | |
| 184 default: | |
| 185 goto err; | |
| 186 | |
| 187 } | |
| 188 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single))) | |
| 189 goto err; | |
| 190 return single; | |
| 191 err: | |
| 192 OCSP_SINGLERESP_free(single); | |
| 193 return NULL; | |
| 194 } | |
| 195 | |
| 196 /* Add a certificate to an OCSP request */ | |
| 197 | |
| 198 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) | |
| 199 { | |
| 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) | |
| 201 return 0; | |
| 202 | |
| 203 if(!sk_X509_push(resp->certs, cert)) return 0; | |
| 204 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509); | |
| 205 return 1; | |
| 206 } | |
| 207 | |
| 208 int OCSP_basic_sign(OCSP_BASICRESP *brsp, | |
| 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, | |
| 210 STACK_OF(X509) *certs, unsigned long flags) | |
| 211 { | |
| 212 int i; | |
| 213 OCSP_RESPID *rid; | |
| 214 | |
| 215 if (!X509_check_private_key(signer, key)) | |
| 216 { | |
| 217 OCSPerr(OCSP_F_OCSP_BASIC_SIGN, OCSP_R_PRIVATE_KEY_DOES_NOT_MATC
H_CERTIFICATE); | |
| 218 goto err; | |
| 219 } | |
| 220 | |
| 221 if(!(flags & OCSP_NOCERTS)) | |
| 222 { | |
| 223 if(!OCSP_basic_add1_cert(brsp, signer)) | |
| 224 goto err; | |
| 225 for (i = 0; i < sk_X509_num(certs); i++) | |
| 226 { | |
| 227 X509 *tmpcert = sk_X509_value(certs, i); | |
| 228 if(!OCSP_basic_add1_cert(brsp, tmpcert)) | |
| 229 goto err; | |
| 230 } | |
| 231 } | |
| 232 | |
| 233 rid = brsp->tbsResponseData->responderId; | |
| 234 if (flags & OCSP_RESPID_KEY) | |
| 235 { | |
| 236 unsigned char md[SHA_DIGEST_LENGTH]; | |
| 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); | |
| 238 if (!(rid->value.byKey = ASN1_OCTET_STRING_new())) | |
| 239 goto err; | |
| 240 if (!(ASN1_OCTET_STRING_set(rid->value.byKey, md, SHA_DIGEST_LEN
GTH))) | |
| 241 goto err; | |
| 242 rid->type = V_OCSP_RESPID_KEY; | |
| 243 } | |
| 244 else | |
| 245 { | |
| 246 if (!X509_NAME_set(&rid->value.byName, | |
| 247 X509_get_subject_name(signer))) | |
| 248 goto err; | |
| 249 rid->type = V_OCSP_RESPID_NAME; | |
| 250 } | |
| 251 | |
| 252 if (!(flags & OCSP_NOTIME) && | |
| 253 !X509_gmtime_adj(brsp->tbsResponseData->producedAt, 0)) | |
| 254 goto err; | |
| 255 | |
| 256 /* Right now, I think that not doing double hashing is the right | |
| 257 thing. -- Richard Levitte */ | |
| 258 | |
| 259 if (!OCSP_BASICRESP_sign(brsp, key, dgst, 0)) goto err; | |
| 260 | |
| 261 return 1; | |
| 262 err: | |
| 263 return 0; | |
| 264 } | |
| OLD | NEW |