Add support for the noCheck OCSP extension. This is
[openssl.git] / crypto / x509v3 / v3_extku.c
index e039d21cbfc91154b6c6a1475c1dd90761dccbd7..a02644ae79424f325146ed219736e1a4ea1c55e6 100644 (file)
 
 #include <stdio.h>
 #include "cryptlib.h"
-#include <openssl/asn1.h>
+#include <openssl/asn1t.h>
 #include <openssl/conf.h>
 #include <openssl/x509v3.h>
 
-static STACK_OF(ASN1_OBJECT) *v2i_ext_ku(X509V3_EXT_METHOD *method,
+static void *v2i_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
                                X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval);
-static STACK_OF(CONF_VALUE) *i2v_ext_ku(X509V3_EXT_METHOD *method,
-               STACK_OF(ASN1_OBJECT) *eku, STACK_OF(CONF_VALUE) *extlist);
+static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
+               void *eku, STACK_OF(CONF_VALUE) *extlist);
+
 X509V3_EXT_METHOD v3_ext_ku = {
-NID_ext_key_usage, 0,
-(X509V3_EXT_NEW)ext_ku_new,
-(X509V3_EXT_FREE)ext_ku_free,
-(X509V3_EXT_D2I)d2i_ext_ku,
-(X509V3_EXT_I2D)i2d_ext_ku,
-NULL, NULL,
-(X509V3_EXT_I2V)i2v_ext_ku,
-(X509V3_EXT_V2I)v2i_ext_ku,
-NULL,NULL,
-NULL
+       NID_ext_key_usage, 0,
+       &EXTENDED_KEY_USAGE_it,
+       0,0,0,0,
+       0,0,
+       i2v_EXTENDED_KEY_USAGE,
+       v2i_EXTENDED_KEY_USAGE,
+       0,0,
+       NULL
 };
 
-STACK_OF(ASN1_OBJECT) *ext_ku_new(void)
-{
-       return sk_ASN1_OBJECT_new_null();
-}
-
-void ext_ku_free(STACK_OF(ASN1_OBJECT) *eku)
-{
-       sk_ASN1_OBJECT_pop_free(eku, ASN1_OBJECT_free);
-       return;
-}
-
-int i2d_ext_ku(STACK_OF(ASN1_OBJECT) *a, unsigned char **pp)
-{
-       return i2d_ASN1_SET_OF_ASN1_OBJECT(a, pp, i2d_ASN1_OBJECT,
-                               V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, IS_SEQUENCE);
-}
-
-STACK_OF(ASN1_OBJECT) *d2i_ext_ku(STACK_OF(ASN1_OBJECT) **a,
-                                       unsigned char **pp, long length)
-{
-       return d2i_ASN1_SET_OF_ASN1_OBJECT(a, pp, length, d2i_ASN1_OBJECT,
-                        ASN1_OBJECT_free, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL);
-}
+/* NB OCSP acceptable responses also is a SEQUENCE OF OBJECT */
+X509V3_EXT_METHOD v3_ocsp_accresp = {
+       NID_id_pkix_OCSP_acceptableResponses, 0,
+       &EXTENDED_KEY_USAGE_it,
+       0,0,0,0,
+       0,0,
+       i2v_EXTENDED_KEY_USAGE,
+       v2i_EXTENDED_KEY_USAGE,
+       0,0,
+       NULL
+};
 
+ASN1_ITEM_TEMPLATE(EXTENDED_KEY_USAGE) = 
+       ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, EXTENDED_KEY_USAGE, ASN1_OBJECT)
+ASN1_ITEM_TEMPLATE_END(EXTENDED_KEY_USAGE);
 
+IMPLEMENT_ASN1_FUNCTIONS(EXTENDED_KEY_USAGE)
 
-static STACK_OF(CONF_VALUE) *i2v_ext_ku(X509V3_EXT_METHOD *method,
-               STACK_OF(ASN1_OBJECT) *eku, STACK_OF(CONF_VALUE) *ext_list)
+static STACK_OF(CONF_VALUE) *i2v_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
+               void *a, STACK_OF(CONF_VALUE) *ext_list)
 {
-int i;
-ASN1_OBJECT *obj;
-char obj_tmp[80];
-for(i = 0; i < sk_ASN1_OBJECT_num(eku); i++) {
-       obj = sk_ASN1_OBJECT_value(eku, i);
-       i2t_ASN1_OBJECT(obj_tmp, 80, obj);
-       X509V3_add_value(NULL, obj_tmp, &ext_list);
-}
-return ext_list;
+       EXTENDED_KEY_USAGE *eku = a;
+       int i;
+       ASN1_OBJECT *obj;
+       char obj_tmp[80];
+       for(i = 0; i < sk_ASN1_OBJECT_num(eku); i++) {
+               obj = sk_ASN1_OBJECT_value(eku, i);
+               i2t_ASN1_OBJECT(obj_tmp, 80, obj);
+               X509V3_add_value(NULL, obj_tmp, &ext_list);
+       }
+       return ext_list;
 }
 
-static STACK_OF(ASN1_OBJECT) *v2i_ext_ku(X509V3_EXT_METHOD *method,
+static void *v2i_EXTENDED_KEY_USAGE(X509V3_EXT_METHOD *method,
                                X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
 {
-STACK_OF(ASN1_OBJECT) *extku;
-char *extval;
-ASN1_OBJECT *objtmp;
-CONF_VALUE *val;
-int i;
+       EXTENDED_KEY_USAGE *extku;
+       char *extval;
+       ASN1_OBJECT *objtmp;
+       CONF_VALUE *val;
+       int i;
 
-if(!(extku = sk_ASN1_OBJECT_new(NULL))) {
-       X509V3err(X509V3_F_V2I_EXT_KU,ERR_R_MALLOC_FAILURE);
-       return NULL;
-}
-
-for(i = 0; i < sk_CONF_VALUE_num(nval); i++) {
-       val = sk_CONF_VALUE_value(nval, i);
-       if(val->value) extval = val->value;
-       else extval = val->name;
-       if(!(objtmp = OBJ_txt2obj(extval, 0))) {
-               sk_ASN1_OBJECT_pop_free(extku, ASN1_OBJECT_free);
-               X509V3err(X509V3_F_V2I_EXT_KU,X509V3_R_INVALID_OBJECT_IDENTIFIER);
-               X509V3_conf_err(val);
+       if(!(extku = sk_ASN1_OBJECT_new_null())) {
+               X509V3err(X509V3_F_V2I_EXT_KU,ERR_R_MALLOC_FAILURE);
                return NULL;
        }
-       sk_ASN1_OBJECT_push(extku, objtmp);
-}
-return extku;
+
+       for(i = 0; i < sk_CONF_VALUE_num(nval); i++) {
+               val = sk_CONF_VALUE_value(nval, i);
+               if(val->value) extval = val->value;
+               else extval = val->name;
+               if(!(objtmp = OBJ_txt2obj(extval, 0))) {
+                       sk_ASN1_OBJECT_pop_free(extku, ASN1_OBJECT_free);
+                       X509V3err(X509V3_F_V2I_EXT_KU,X509V3_R_INVALID_OBJECT_IDENTIFIER);
+                       X509V3_conf_err(val);
+                       return NULL;
+               }
+               sk_ASN1_OBJECT_push(extku, objtmp);
+       }
+       return extku;
 }