123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222 |
- /*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the OpenSSL license (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include <stdio.h>
- #include "internal/cryptlib.h"
- #include <openssl/objects.h>
- #include <openssl/x509.h>
- #include <openssl/pem.h>
- #include <openssl/x509v3.h>
- #include <openssl/ocsp.h>
- #include "ocsp_local.h"
- #include <openssl/asn1t.h>
- /* Convert a certificate and its issuer to an OCSP_CERTID */
- OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject,
- const X509 *issuer)
- {
- X509_NAME *iname;
- const ASN1_INTEGER *serial;
- ASN1_BIT_STRING *ikey;
- if (!dgst)
- dgst = EVP_sha1();
- if (subject) {
- iname = X509_get_issuer_name(subject);
- serial = X509_get0_serialNumber(subject);
- } else {
- iname = X509_get_subject_name(issuer);
- serial = NULL;
- }
- ikey = X509_get0_pubkey_bitstr(issuer);
- return OCSP_cert_id_new(dgst, iname, ikey, serial);
- }
- OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
- const X509_NAME *issuerName,
- const ASN1_BIT_STRING *issuerKey,
- const ASN1_INTEGER *serialNumber)
- {
- int nid;
- unsigned int i;
- X509_ALGOR *alg;
- OCSP_CERTID *cid = NULL;
- unsigned char md[EVP_MAX_MD_SIZE];
- if ((cid = OCSP_CERTID_new()) == NULL)
- goto err;
- alg = &cid->hashAlgorithm;
- ASN1_OBJECT_free(alg->algorithm);
- if ((nid = EVP_MD_type(dgst)) == NID_undef) {
- OCSPerr(OCSP_F_OCSP_CERT_ID_NEW, OCSP_R_UNKNOWN_NID);
- goto err;
- }
- if ((alg->algorithm = OBJ_nid2obj(nid)) == NULL)
- goto err;
- if ((alg->parameter = ASN1_TYPE_new()) == NULL)
- goto err;
- alg->parameter->type = V_ASN1_NULL;
- if (!X509_NAME_digest(issuerName, dgst, md, &i))
- goto digerr;
- if (!(ASN1_OCTET_STRING_set(&cid->issuerNameHash, md, i)))
- goto err;
- /* Calculate the issuerKey hash, excluding tag and length */
- if (!EVP_Digest(issuerKey->data, issuerKey->length, md, &i, dgst, NULL))
- goto err;
- if (!(ASN1_OCTET_STRING_set(&cid->issuerKeyHash, md, i)))
- goto err;
- if (serialNumber) {
- if (ASN1_STRING_copy(&cid->serialNumber, serialNumber) == 0)
- goto err;
- }
- return cid;
- digerr:
- OCSPerr(OCSP_F_OCSP_CERT_ID_NEW, OCSP_R_DIGEST_ERR);
- err:
- OCSP_CERTID_free(cid);
- return NULL;
- }
- int OCSP_id_issuer_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
- {
- int ret;
- ret = OBJ_cmp(a->hashAlgorithm.algorithm, b->hashAlgorithm.algorithm);
- if (ret)
- return ret;
- ret = ASN1_OCTET_STRING_cmp(&a->issuerNameHash, &b->issuerNameHash);
- if (ret)
- return ret;
- return ASN1_OCTET_STRING_cmp(&a->issuerKeyHash, &b->issuerKeyHash);
- }
- int OCSP_id_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
- {
- int ret;
- ret = OCSP_id_issuer_cmp(a, b);
- if (ret)
- return ret;
- return ASN1_INTEGER_cmp(&a->serialNumber, &b->serialNumber);
- }
- /*
- * Parse a URL and split it up into host, port and path components and
- * whether it is SSL.
- */
- int OCSP_parse_url(const char *url, char **phost, char **pport, char **ppath,
- int *pssl)
- {
- char *p, *buf;
- char *host, *port;
- *phost = NULL;
- *pport = NULL;
- *ppath = NULL;
- /* dup the buffer since we are going to mess with it */
- buf = OPENSSL_strdup(url);
- if (!buf)
- goto mem_err;
- /* Check for initial colon */
- p = strchr(buf, ':');
- if (!p)
- goto parse_err;
- *(p++) = '\0';
- if (strcmp(buf, "http") == 0) {
- *pssl = 0;
- port = "80";
- } else if (strcmp(buf, "https") == 0) {
- *pssl = 1;
- port = "443";
- } else
- goto parse_err;
- /* Check for double slash */
- if ((p[0] != '/') || (p[1] != '/'))
- goto parse_err;
- p += 2;
- host = p;
- /* Check for trailing part of path */
- p = strchr(p, '/');
- if (!p)
- *ppath = OPENSSL_strdup("/");
- else {
- *ppath = OPENSSL_strdup(p);
- /* Set start of path to 0 so hostname is valid */
- *p = '\0';
- }
- if (!*ppath)
- goto mem_err;
- p = host;
- if (host[0] == '[') {
- /* ipv6 literal */
- host++;
- p = strchr(host, ']');
- if (!p)
- goto parse_err;
- *p = '\0';
- p++;
- }
- /* Look for optional ':' for port number */
- if ((p = strchr(p, ':'))) {
- *p = 0;
- port = p + 1;
- }
- *pport = OPENSSL_strdup(port);
- if (!*pport)
- goto mem_err;
- *phost = OPENSSL_strdup(host);
- if (!*phost)
- goto mem_err;
- OPENSSL_free(buf);
- return 1;
- mem_err:
- OCSPerr(OCSP_F_OCSP_PARSE_URL, ERR_R_MALLOC_FAILURE);
- goto err;
- parse_err:
- OCSPerr(OCSP_F_OCSP_PARSE_URL, OCSP_R_ERROR_PARSING_URL);
- err:
- OPENSSL_free(buf);
- OPENSSL_free(*ppath);
- *ppath = NULL;
- OPENSSL_free(*pport);
- *pport = NULL;
- OPENSSL_free(*phost);
- *phost = NULL;
- return 0;
- }
- IMPLEMENT_ASN1_DUP_FUNCTION(OCSP_CERTID)
|