OpenSSL  1.0.1c
 All Classes Files Functions Variables Typedefs Enumerations Enumerator Macros
ocsp_srv.c
Go to the documentation of this file.
1 /* ocsp_srv.c */
2 /* Written by Dr Stephen N Henson ([email protected]) for the OpenSSL
3  * project 2001.
4  */
5 /* ====================================================================
6  * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  * notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  * notice, this list of conditions and the following disclaimer in
17  * the documentation and/or other materials provided with the
18  * distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  * software must display the following acknowledgment:
22  * "This product includes software developed by the OpenSSL Project
23  * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  * endorse or promote products derived from this software without
27  * prior written permission. For written permission, please contact
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  * nor may "OpenSSL" appear in their names without prior written
32  * permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  * acknowledgment:
36  * "This product includes software developed by the OpenSSL Project
37  * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * ([email protected]). This product includes software written by Tim
55  * Hudson ([email protected]).
56  *
57  */
58 
59 #include <stdio.h>
60 #include <cryptlib.h>
61 #include <openssl/objects.h>
62 #include <openssl/rand.h>
63 #include <openssl/x509.h>
64 #include <openssl/pem.h>
65 #include <openssl/x509v3.h>
66 #include <openssl/ocsp.h>
67 
68 /* Utility functions related to sending OCSP responses and extracting
69  * relevant information from the request.
70  */
71 
73  {
74  return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList);
75  }
76 
78  {
79  return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i);
80  }
81 
83  {
84  return one->reqCert;
85  }
86 
88  ASN1_OCTET_STRING **pikeyHash,
89  ASN1_INTEGER **pserial, OCSP_CERTID *cid)
90  {
91  if (!cid) return 0;
92  if (pmd) *pmd = cid->hashAlgorithm->algorithm;
93  if(piNameHash) *piNameHash = cid->issuerNameHash;
94  if (pikeyHash) *pikeyHash = cid->issuerKeyHash;
95  if (pserial) *pserial = cid->serialNumber;
96  return 1;
97  }
98 
100  {
101  if(req->optionalSignature) return 1;
102  return 0;
103  }
104 
105 /* Create an OCSP response and encode an optional basic response */
107  {
108  OCSP_RESPONSE *rsp = NULL;
109 
110  if (!(rsp = OCSP_RESPONSE_new())) goto err;
111  if (!(ASN1_ENUMERATED_set(rsp->responseStatus, status))) goto err;
112  if (!bs) return rsp;
113  if (!(rsp->responseBytes = OCSP_RESPBYTES_new())) goto err;
116  goto err;
117  return rsp;
118 err:
119  if (rsp) OCSP_RESPONSE_free(rsp);
120  return NULL;
121  }
122 
123 
125  OCSP_CERTID *cid,
126  int status, int reason,
127  ASN1_TIME *revtime,
128  ASN1_TIME *thisupd, ASN1_TIME *nextupd)
129  {
130  OCSP_SINGLERESP *single = NULL;
131  OCSP_CERTSTATUS *cs;
132  OCSP_REVOKEDINFO *ri;
133 
134  if(!rsp->tbsResponseData->responses &&
135  !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null()))
136  goto err;
137 
138  if (!(single = OCSP_SINGLERESP_new()))
139  goto err;
140 
141 
142 
143  if (!ASN1_TIME_to_generalizedtime(thisupd, &single->thisUpdate))
144  goto err;
145  if (nextupd &&
146  !ASN1_TIME_to_generalizedtime(nextupd, &single->nextUpdate))
147  goto err;
148 
149  OCSP_CERTID_free(single->certId);
150 
151  if(!(single->certId = OCSP_CERTID_dup(cid)))
152  goto err;
153 
154  cs = single->certStatus;
155  switch(cs->type = status)
156  {
158  if (!revtime)
159  {
161  goto err;
162  }
163  if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new())) goto err;
164  if (!ASN1_TIME_to_generalizedtime(revtime, &ri->revocationTime))
165  goto err;
166  if (reason != OCSP_REVOKED_STATUS_NOSTATUS)
167  {
168  if (!(ri->revocationReason = ASN1_ENUMERATED_new()))
169  goto err;
171  reason)))
172  goto err;
173  }
174  break;
175 
177  cs->value.good = ASN1_NULL_new();
178  break;
179 
181  cs->value.unknown = ASN1_NULL_new();
182  break;
183 
184  default:
185  goto err;
186 
187  }
188  if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
189  goto err;
190  return single;
191 err:
192  OCSP_SINGLERESP_free(single);
193  return NULL;
194  }
195 
196 /* Add a certificate to an OCSP request */
197 
199  {
200  if (!resp->certs && !(resp->certs = sk_X509_new_null()))
201  return 0;
202 
203  if(!sk_X509_push(resp->certs, cert)) return 0;
205  return 1;
206  }
207 
209  X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
210  STACK_OF(X509) *certs, unsigned long flags)
211  {
212  int i;
213  OCSP_RESPID *rid;
214 
215  if (!X509_check_private_key(signer, key))
216  {
218  goto err;
219  }
220 
221  if(!(flags & OCSP_NOCERTS))
222  {
223  if(!OCSP_basic_add1_cert(brsp, signer))
224  goto err;
225  for (i = 0; i < sk_X509_num(certs); i++)
226  {
227  X509 *tmpcert = sk_X509_value(certs, i);
228  if(!OCSP_basic_add1_cert(brsp, tmpcert))
229  goto err;
230  }
231  }
232 
233  rid = brsp->tbsResponseData->responderId;
234  if (flags & OCSP_RESPID_KEY)
235  {
236  unsigned char md[SHA_DIGEST_LENGTH];
237  X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
238  if (!(rid->value.byKey = ASN1_OCTET_STRING_new()))
239  goto err;
241  goto err;
242  rid->type = V_OCSP_RESPID_KEY;
243  }
244  else
245  {
246  if (!X509_NAME_set(&rid->value.byName,
247  X509_get_subject_name(signer)))
248  goto err;
249  rid->type = V_OCSP_RESPID_NAME;
250  }
251 
252  if (!(flags & OCSP_NOTIME) &&
254  goto err;
255 
256  /* Right now, I think that not doing double hashing is the right
257  thing. -- Richard Levitte */
258 
259  if (!OCSP_BASICRESP_sign(brsp, key, dgst, 0)) goto err;
260 
261  return 1;
262 err:
263  return 0;
264  }