Fixed #3020 -- set entry type on SCTs from X.509 and OCSP extensions
[openssl.git] / crypto / ct / ct_x509v3.c
1 /*
2  * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the OpenSSL license (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9
10 #ifdef OPENSSL_NO_CT
11 # error "CT is disabled"
12 #endif
13
14 #include "ct_locl.h"
15
16 static char *i2s_poison(const X509V3_EXT_METHOD *method, void *val)
17 {
18     return OPENSSL_strdup("NULL");
19 }
20
21 static void *s2i_poison(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, const char *str)
22 {
23    return ASN1_NULL_new();
24 }
25
26 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list,
27                  BIO *out, int indent)
28 {
29     SCT_LIST_print(sct_list, out, indent, "\n", NULL);
30     return 1;
31 }
32
33 static int set_sct_list_source(STACK_OF(SCT) *s, sct_source_t source) {
34     if (s != NULL) {
35         for (size_t i = 0; i < sk_SCT_num(s); i++) {
36             int res = SCT_set_source(
37                 sk_SCT_value(s, i), SCT_SOURCE_X509V3_EXTENSION);
38             if (res != 1) {
39                 return 0;
40             }
41         }
42     }
43     return 1;
44 }
45
46 static STACK_OF(SCT) *x509_ext_d2i_SCT_LIST(STACK_OF(SCT) **a,
47                                             const unsigned char **pp,
48                                             long len) {
49      STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len);
50      if (set_sct_list_source(s, SCT_SOURCE_X509V3_EXTENSION) != 1) {
51          SCT_LIST_free(s);
52          *a = NULL;
53          return NULL;
54      }
55      return s;
56 }
57
58 static STACK_OF(SCT) *ocsp_ext_d2i_SCT_LIST(STACK_OF(SCT) **a,
59                                             const unsigned char **pp,
60                                             long len) {
61     STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len);
62     if (set_sct_list_source(s, SCT_SOURCE_OCSP_STAPLED_RESPONSE) != 1) {
63         SCT_LIST_free(s);
64         *a = NULL;
65         return NULL;
66     }
67     return s;
68 }
69
70 /* Handlers for X509v3/OCSP Certificate Transparency extensions */
71 const X509V3_EXT_METHOD v3_ct_scts[3] = {
72     /* X509v3 extension in certificates that contains SCTs */
73     { NID_ct_precert_scts, 0, NULL,
74     NULL, (X509V3_EXT_FREE)SCT_LIST_free,
75     (X509V3_EXT_D2I)x509_ext_d2i_SCT_LIST, (X509V3_EXT_I2D)i2d_SCT_LIST,
76     NULL, NULL,
77     NULL, NULL,
78     (X509V3_EXT_I2R)i2r_SCT_LIST, NULL,
79     NULL },
80
81     /* X509v3 extension to mark a certificate as a pre-certificate */
82     { NID_ct_precert_poison, 0, ASN1_ITEM_ref(ASN1_NULL),
83     NULL, NULL, NULL, NULL,
84     i2s_poison, s2i_poison,
85     NULL, NULL,
86     NULL, NULL,
87     NULL },
88
89     /* OCSP extension that contains SCTs */
90     { NID_ct_cert_scts, 0, NULL,
91     0, (X509V3_EXT_FREE)SCT_LIST_free,
92     (X509V3_EXT_D2I)ocsp_ext_d2i_SCT_LIST, (X509V3_EXT_I2D)i2d_SCT_LIST,
93     NULL, NULL,
94     NULL, NULL,
95     (X509V3_EXT_I2R)i2r_SCT_LIST, NULL,
96     NULL },
97 };