3 * Written by Rob Stradling (rob@comodo.com) for the OpenSSL project 2014.
5 /* ====================================================================
6 * Copyright (c) 2014 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
60 #include "internal/cryptlib.h"
61 #include <openssl/asn1.h>
62 #include <openssl/x509v3.h>
64 #include "internal/ct_int.h"
67 /* Signature and hash algorithms from RFC 5246 */
68 #define TLSEXT_hash_sha256 4
70 #define TLSEXT_signature_rsa 1
71 #define TLSEXT_signature_ecdsa 3
74 #define n2s(c,s) ((s=(((unsigned int)(c[0]))<< 8)| \
75 (((unsigned int)(c[1])) )),c+=2)
77 #define n2l8(c,l) (l =((uint64_t)(*((c)++)))<<56, \
78 l|=((uint64_t)(*((c)++)))<<48, \
79 l|=((uint64_t)(*((c)++)))<<40, \
80 l|=((uint64_t)(*((c)++)))<<32, \
81 l|=((uint64_t)(*((c)++)))<<24, \
82 l|=((uint64_t)(*((c)++)))<<16, \
83 l|=((uint64_t)(*((c)++)))<< 8, \
84 l|=((uint64_t)(*((c)++))))
87 static void SCT_LIST_free(STACK_OF(SCT) *a);
88 static STACK_OF(SCT) *d2i_SCT_LIST(STACK_OF(SCT) **a,
89 const unsigned char **pp, long length);
90 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list,
91 BIO *out, int indent);
93 const X509V3_EXT_METHOD v3_ct_scts[] = {
94 {NID_ct_precert_scts, 0, NULL,
95 0, (X509V3_EXT_FREE)SCT_LIST_free,
96 (X509V3_EXT_D2I)d2i_SCT_LIST, 0,
98 (X509V3_EXT_I2R)i2r_SCT_LIST, 0,
101 {NID_ct_cert_scts, 0, NULL,
102 0, (X509V3_EXT_FREE)SCT_LIST_free,
103 (X509V3_EXT_D2I)d2i_SCT_LIST, 0,
105 (X509V3_EXT_I2R)i2r_SCT_LIST, 0,
109 static void tls12_signature_print(BIO *out, const unsigned char hash_alg,
110 const unsigned char sig_alg)
113 /* RFC6962 only permits two signature algorithms */
114 if (hash_alg == TLSEXT_hash_sha256) {
115 if (sig_alg == TLSEXT_signature_rsa)
116 nid = NID_sha256WithRSAEncryption;
117 else if (sig_alg == TLSEXT_signature_ecdsa)
118 nid = NID_ecdsa_with_SHA256;
120 if (nid == NID_undef)
121 BIO_printf(out, "%02X%02X", hash_alg, sig_alg);
123 BIO_printf(out, "%s", OBJ_nid2ln(nid));
126 static void timestamp_print(BIO *out, uint64_t timestamp)
128 ASN1_GENERALIZEDTIME *gen;
130 gen = ASN1_GENERALIZEDTIME_new();
131 ASN1_GENERALIZEDTIME_adj(gen, (time_t)0,
132 (int)(timestamp / 86400000),
133 (timestamp % 86400000) / 1000);
135 * Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
136 * characters long with a final Z. Update it with fractional seconds.
138 BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
139 ASN1_STRING_data(gen), (unsigned int)(timestamp % 1000));
140 ASN1_GENERALIZEDTIME_set_string(gen, genstr);
141 ASN1_GENERALIZEDTIME_print(out, gen);
142 ASN1_GENERALIZEDTIME_free(gen);
145 static void SCT_LIST_free(STACK_OF(SCT) *a)
147 sk_SCT_pop_free(a, SCT_free);
150 static STACK_OF(SCT) *d2i_SCT_LIST(STACK_OF(SCT) **a,
151 const unsigned char **pp, long length)
153 ASN1_OCTET_STRING *oct = NULL;
154 STACK_OF(SCT) *sk = NULL;
156 unsigned char *p, *p2;
157 unsigned short listlen, sctlen = 0, fieldlen;
158 const unsigned char *q = *pp;
160 if (d2i_ASN1_OCTET_STRING(&oct, &q, length) == NULL)
166 if (listlen != oct->length - 2)
169 if ((sk = sk_SCT_new_null()) == NULL)
172 while (listlen > 0) {
178 if ((sctlen < 1) || (sctlen > listlen))
182 sct = OPENSSL_malloc(sizeof(*sct));
185 if (!sk_SCT_push(sk, sct)) {
190 sct->sct = OPENSSL_malloc(sctlen);
191 if (sct->sct == NULL)
193 memcpy(sct->sct, p, sctlen);
194 sct->sct_len = sctlen;
198 sct->version = *p2++;
199 if (sct->version == 0) { /* SCT v1 */
201 * Fixed-length header:
203 * (1 byte) Version sct_version;
204 * (32 bytes) LogID id;
205 * (8 bytes) uint64 timestamp;
206 * (2 bytes + ?) CtExtensions extensions;
213 sct->log_id_len = 32;
216 n2l8(p2, sct->timestamp);
219 if (sctlen < fieldlen)
222 sct->ext_len = fieldlen;
227 * digitally-signed struct header:
228 * (1 byte) Hash algorithm
229 * (1 byte) Signature algorithm
230 * (2 bytes + ?) Signature
236 sct->hash_alg = *p2++;
237 sct->sig_alg = *p2++;
239 if (sctlen != fieldlen)
242 sct->sig_len = fieldlen;
247 ASN1_OCTET_STRING_free(oct);
257 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list,
258 BIO *out, int indent)
263 for (i = 0; i < sk_SCT_num(sct_list);) {
264 sct = sk_SCT_value(sct_list, i);
266 BIO_printf(out, "%*sSigned Certificate Timestamp:", indent, "");
267 BIO_printf(out, "\n%*sVersion : ", indent + 4, "");
269 if (sct->version == 0) { /* SCT v1 */
270 BIO_printf(out, "v1(0)");
272 BIO_printf(out, "\n%*sLog ID : ", indent + 4, "");
273 BIO_hex_string(out, indent + 16, 16, sct->log_id, sct->log_id_len);
275 BIO_printf(out, "\n%*sTimestamp : ", indent + 4, "");
276 timestamp_print(out, sct->timestamp);
278 BIO_printf(out, "\n%*sExtensions: ", indent + 4, "");
279 if (sct->ext_len == 0)
280 BIO_printf(out, "none");
282 BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len);
284 BIO_printf(out, "\n%*sSignature : ", indent + 4, "");
285 tls12_signature_print(out, sct->hash_alg, sct->sig_alg);
286 BIO_printf(out, "\n%*s ", indent + 4, "");
287 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
288 } else { /* Unknown version */
290 BIO_printf(out, "unknown\n%*s", indent + 16, "");
291 BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len);
294 if (++i < sk_SCT_num(sct_list))
295 BIO_printf(out, "\n");