aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/openssl/crypto/ct/ct_x509v3.c
blob: a496dd6c5bafa2f1edcc3a4bff9ad00f46661f27 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
/* 
 * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. 
 * 
 * Licensed under the OpenSSL license (the "License").  You may not use 
 * this file except in compliance with the License.  You can obtain a copy 
 * in the file LICENSE in the source distribution or at 
 * https://www.openssl.org/source/license.html 
 */ 
 
#ifdef OPENSSL_NO_CT 
# error "CT is disabled" 
#endif 
 
#include "ct_local.h"
 
static char *i2s_poison(const X509V3_EXT_METHOD *method, void *val) 
{ 
    return OPENSSL_strdup("NULL"); 
} 
 
static void *s2i_poison(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, const char *str) 
{ 
   return ASN1_NULL_new(); 
} 
 
static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list, 
                 BIO *out, int indent) 
{ 
    SCT_LIST_print(sct_list, out, indent, "\n", NULL); 
    return 1; 
} 
 
static int set_sct_list_source(STACK_OF(SCT) *s, sct_source_t source) 
{ 
    if (s != NULL) { 
        int i; 
 
        for (i = 0; i < sk_SCT_num(s); i++) { 
            int res = SCT_set_source(sk_SCT_value(s, i), source); 
 
            if (res != 1) { 
                return 0; 
            } 
        } 
    } 
    return 1; 
} 
 
static STACK_OF(SCT) *x509_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, 
                                            const unsigned char **pp, 
                                            long len) 
{ 
     STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); 
 
     if (set_sct_list_source(s, SCT_SOURCE_X509V3_EXTENSION) != 1) { 
         SCT_LIST_free(s); 
         *a = NULL; 
         return NULL; 
     } 
     return s; 
} 
 
static STACK_OF(SCT) *ocsp_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, 
                                            const unsigned char **pp, 
                                            long len) 
{ 
    STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); 
 
    if (set_sct_list_source(s, SCT_SOURCE_OCSP_STAPLED_RESPONSE) != 1) { 
        SCT_LIST_free(s); 
        *a = NULL; 
        return NULL; 
    } 
    return s; 
} 
 
/* Handlers for X509v3/OCSP Certificate Transparency extensions */ 
const X509V3_EXT_METHOD v3_ct_scts[3] = { 
    /* X509v3 extension in certificates that contains SCTs */ 
    { NID_ct_precert_scts, 0, NULL, 
    NULL, (X509V3_EXT_FREE)SCT_LIST_free, 
    (X509V3_EXT_D2I)x509_ext_d2i_SCT_LIST, (X509V3_EXT_I2D)i2d_SCT_LIST, 
    NULL, NULL, 
    NULL, NULL, 
    (X509V3_EXT_I2R)i2r_SCT_LIST, NULL, 
    NULL }, 
 
    /* X509v3 extension to mark a certificate as a pre-certificate */ 
    { NID_ct_precert_poison, 0, ASN1_ITEM_ref(ASN1_NULL), 
    NULL, NULL, NULL, NULL, 
    i2s_poison, s2i_poison, 
    NULL, NULL, 
    NULL, NULL, 
    NULL }, 
 
    /* OCSP extension that contains SCTs */ 
    { NID_ct_cert_scts, 0, NULL, 
    0, (X509V3_EXT_FREE)SCT_LIST_free, 
    (X509V3_EXT_D2I)ocsp_ext_d2i_SCT_LIST, (X509V3_EXT_I2D)i2d_SCT_LIST, 
    NULL, NULL, 
    NULL, NULL, 
    (X509V3_EXT_I2R)i2r_SCT_LIST, NULL, 
    NULL }, 
};