os/ossrv/ssl/libcrypto/src/crypto/ocsp/ocsp_srv.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* ocsp_srv.c */
sl@0
     2
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
sl@0
     3
 * project 2001.
sl@0
     4
 */
sl@0
     5
/* ====================================================================
sl@0
     6
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
sl@0
     7
 *
sl@0
     8
 * Redistribution and use in source and binary forms, with or without
sl@0
     9
 * modification, are permitted provided that the following conditions
sl@0
    10
 * are met:
sl@0
    11
 *
sl@0
    12
 * 1. Redistributions of source code must retain the above copyright
sl@0
    13
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    14
 *
sl@0
    15
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    16
 *    notice, this list of conditions and the following disclaimer in
sl@0
    17
 *    the documentation and/or other materials provided with the
sl@0
    18
 *    distribution.
sl@0
    19
 *
sl@0
    20
 * 3. All advertising materials mentioning features or use of this
sl@0
    21
 *    software must display the following acknowledgment:
sl@0
    22
 *    "This product includes software developed by the OpenSSL Project
sl@0
    23
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
    24
 *
sl@0
    25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    26
 *    endorse or promote products derived from this software without
sl@0
    27
 *    prior written permission. For written permission, please contact
sl@0
    28
 *    openssl-core@openssl.org.
sl@0
    29
 *
sl@0
    30
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    31
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    32
 *    permission of the OpenSSL Project.
sl@0
    33
 *
sl@0
    34
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    35
 *    acknowledgment:
sl@0
    36
 *    "This product includes software developed by the OpenSSL Project
sl@0
    37
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
    38
 *
sl@0
    39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
    48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
    49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
    50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
    51
 * ====================================================================
sl@0
    52
 *
sl@0
    53
 * This product includes cryptographic software written by Eric Young
sl@0
    54
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
    55
 * Hudson (tjh@cryptsoft.com).
sl@0
    56
 *
sl@0
    57
 */
sl@0
    58
sl@0
    59
#include <stdio.h>
sl@0
    60
#include <cryptlib.h>
sl@0
    61
#include <openssl/objects.h>
sl@0
    62
#include <openssl/rand.h>
sl@0
    63
#include <openssl/x509.h>
sl@0
    64
#include <openssl/pem.h>
sl@0
    65
#include <openssl/x509v3.h>
sl@0
    66
#include <openssl/ocsp.h>
sl@0
    67
sl@0
    68
/* Utility functions related to sending OCSP responses and extracting
sl@0
    69
 * relevant information from the request.
sl@0
    70
 */
sl@0
    71
sl@0
    72
EXPORT_C int OCSP_request_onereq_count(OCSP_REQUEST *req)
sl@0
    73
	{
sl@0
    74
	return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList);
sl@0
    75
	}
sl@0
    76
sl@0
    77
EXPORT_C OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i)
sl@0
    78
	{
sl@0
    79
	return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i);
sl@0
    80
	}
sl@0
    81
sl@0
    82
EXPORT_C OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one)
sl@0
    83
	{
sl@0
    84
	return one->reqCert;
sl@0
    85
	}
sl@0
    86
sl@0
    87
EXPORT_C int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
sl@0
    88
			ASN1_OCTET_STRING **pikeyHash,
sl@0
    89
			ASN1_INTEGER **pserial, OCSP_CERTID *cid)
sl@0
    90
	{
sl@0
    91
	if (!cid) return 0;
sl@0
    92
	if (pmd) *pmd = cid->hashAlgorithm->algorithm;
sl@0
    93
	if(piNameHash) *piNameHash = cid->issuerNameHash;
sl@0
    94
	if (pikeyHash) *pikeyHash = cid->issuerKeyHash;
sl@0
    95
	if (pserial) *pserial = cid->serialNumber;
sl@0
    96
	return 1;
sl@0
    97
	}
sl@0
    98
sl@0
    99
EXPORT_C int OCSP_request_is_signed(OCSP_REQUEST *req)
sl@0
   100
	{
sl@0
   101
	if(req->optionalSignature) return 1;
sl@0
   102
	return 0;
sl@0
   103
	}
sl@0
   104
sl@0
   105
/* Create an OCSP response and encode an optional basic response */
sl@0
   106
EXPORT_C OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs)
sl@0
   107
        {
sl@0
   108
        OCSP_RESPONSE *rsp = NULL;
sl@0
   109
sl@0
   110
	if (!(rsp = OCSP_RESPONSE_new())) goto err;
sl@0
   111
	if (!(ASN1_ENUMERATED_set(rsp->responseStatus, status))) goto err;
sl@0
   112
	if (!bs) return rsp;
sl@0
   113
	if (!(rsp->responseBytes = OCSP_RESPBYTES_new())) goto err;
sl@0
   114
	rsp->responseBytes->responseType = OBJ_nid2obj(NID_id_pkix_OCSP_basic);
sl@0
   115
	if (!ASN1_item_pack(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBytes->response))
sl@0
   116
				goto err;
sl@0
   117
	return rsp;
sl@0
   118
err:
sl@0
   119
	if (rsp) OCSP_RESPONSE_free(rsp);
sl@0
   120
	return NULL;
sl@0
   121
	}
sl@0
   122
sl@0
   123
sl@0
   124
EXPORT_C OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp,
sl@0
   125
						OCSP_CERTID *cid,
sl@0
   126
						int status, int reason,
sl@0
   127
						ASN1_TIME *revtime,
sl@0
   128
					ASN1_TIME *thisupd, ASN1_TIME *nextupd)
sl@0
   129
	{
sl@0
   130
	OCSP_SINGLERESP *single = NULL;
sl@0
   131
	OCSP_CERTSTATUS *cs;
sl@0
   132
	OCSP_REVOKEDINFO *ri;
sl@0
   133
sl@0
   134
	if(!rsp->tbsResponseData->responses &&
sl@0
   135
	    !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null()))
sl@0
   136
		goto err;
sl@0
   137
sl@0
   138
	if (!(single = OCSP_SINGLERESP_new()))
sl@0
   139
		goto err;
sl@0
   140
sl@0
   141
sl@0
   142
sl@0
   143
	if (!ASN1_TIME_to_generalizedtime(thisupd, &single->thisUpdate))
sl@0
   144
		goto err;
sl@0
   145
	if (nextupd &&
sl@0
   146
		!ASN1_TIME_to_generalizedtime(nextupd, &single->nextUpdate))
sl@0
   147
		goto err;
sl@0
   148
sl@0
   149
	OCSP_CERTID_free(single->certId);
sl@0
   150
sl@0
   151
	if(!(single->certId = OCSP_CERTID_dup(cid)))
sl@0
   152
		goto err;
sl@0
   153
sl@0
   154
	cs = single->certStatus;
sl@0
   155
	switch(cs->type = status)
sl@0
   156
		{
sl@0
   157
	case V_OCSP_CERTSTATUS_REVOKED:
sl@0
   158
		if (!revtime)
sl@0
   159
		        {
sl@0
   160
		        OCSPerr(OCSP_F_OCSP_BASIC_ADD1_STATUS,OCSP_R_NO_REVOKED_TIME);
sl@0
   161
			goto err;
sl@0
   162
		        }
sl@0
   163
		if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new())) goto err;
sl@0
   164
		if (!ASN1_TIME_to_generalizedtime(revtime, &ri->revocationTime))
sl@0
   165
			goto err;	
sl@0
   166
		if (reason != OCSP_REVOKED_STATUS_NOSTATUS)
sl@0
   167
		        {
sl@0
   168
			if (!(ri->revocationReason = ASN1_ENUMERATED_new())) 
sl@0
   169
			        goto err;
sl@0
   170
			if (!(ASN1_ENUMERATED_set(ri->revocationReason, 
sl@0
   171
						  reason)))
sl@0
   172
			        goto err;	
sl@0
   173
			}
sl@0
   174
		break;
sl@0
   175
sl@0
   176
	case V_OCSP_CERTSTATUS_GOOD:
sl@0
   177
		cs->value.good = ASN1_NULL_new();
sl@0
   178
		break;
sl@0
   179
sl@0
   180
	case V_OCSP_CERTSTATUS_UNKNOWN:
sl@0
   181
		cs->value.unknown = ASN1_NULL_new();
sl@0
   182
		break;
sl@0
   183
sl@0
   184
	default:
sl@0
   185
		goto err;
sl@0
   186
sl@0
   187
		}
sl@0
   188
	if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
sl@0
   189
		goto err;
sl@0
   190
	return single;
sl@0
   191
err:
sl@0
   192
	OCSP_SINGLERESP_free(single);
sl@0
   193
	return NULL;
sl@0
   194
	}
sl@0
   195
sl@0
   196
/* Add a certificate to an OCSP request */
sl@0
   197
sl@0
   198
EXPORT_C int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert)
sl@0
   199
	{
sl@0
   200
	if (!resp->certs && !(resp->certs = sk_X509_new_null()))
sl@0
   201
		return 0;
sl@0
   202
sl@0
   203
	if(!sk_X509_push(resp->certs, cert)) return 0;
sl@0
   204
	CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
sl@0
   205
	return 1;
sl@0
   206
	}
sl@0
   207
sl@0
   208
EXPORT_C int OCSP_basic_sign(OCSP_BASICRESP *brsp, 
sl@0
   209
			X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
sl@0
   210
			STACK_OF(X509) *certs, unsigned long flags)
sl@0
   211
        {
sl@0
   212
	int i;
sl@0
   213
	OCSP_RESPID *rid;
sl@0
   214
sl@0
   215
	if (!X509_check_private_key(signer, key))
sl@0
   216
		{
sl@0
   217
		OCSPerr(OCSP_F_OCSP_BASIC_SIGN, OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE);
sl@0
   218
		goto err;
sl@0
   219
		}
sl@0
   220
sl@0
   221
	if(!(flags & OCSP_NOCERTS))
sl@0
   222
		{
sl@0
   223
		if(!OCSP_basic_add1_cert(brsp, signer))
sl@0
   224
			goto err;
sl@0
   225
		for (i = 0; i < sk_X509_num(certs); i++)
sl@0
   226
			{
sl@0
   227
			X509 *tmpcert = sk_X509_value(certs, i);
sl@0
   228
			if(!OCSP_basic_add1_cert(brsp, tmpcert))
sl@0
   229
				goto err;
sl@0
   230
			}
sl@0
   231
		}
sl@0
   232
sl@0
   233
	rid = brsp->tbsResponseData->responderId;
sl@0
   234
	if (flags & OCSP_RESPID_KEY)
sl@0
   235
		{
sl@0
   236
		unsigned char md[SHA_DIGEST_LENGTH];
sl@0
   237
		X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
sl@0
   238
		if (!(rid->value.byKey = ASN1_OCTET_STRING_new()))
sl@0
   239
			goto err;
sl@0
   240
		if (!(ASN1_OCTET_STRING_set(rid->value.byKey, md, SHA_DIGEST_LENGTH)))
sl@0
   241
				goto err;
sl@0
   242
		rid->type = V_OCSP_RESPID_KEY;
sl@0
   243
		}
sl@0
   244
	else
sl@0
   245
		{
sl@0
   246
		if (!X509_NAME_set(&rid->value.byName,
sl@0
   247
					X509_get_subject_name(signer)))
sl@0
   248
				goto err;
sl@0
   249
		rid->type = V_OCSP_RESPID_NAME;
sl@0
   250
		}
sl@0
   251
sl@0
   252
	if (!(flags & OCSP_NOTIME) &&
sl@0
   253
		!X509_gmtime_adj(brsp->tbsResponseData->producedAt, 0))
sl@0
   254
		goto err;
sl@0
   255
sl@0
   256
	/* Right now, I think that not doing double hashing is the right
sl@0
   257
	   thing.	-- Richard Levitte */
sl@0
   258
sl@0
   259
	if (!OCSP_BASICRESP_sign(brsp, key, dgst, 0)) goto err;
sl@0
   260
sl@0
   261
	return 1;
sl@0
   262
err:
sl@0
   263
	return 0;
sl@0
   264
	}