1 /* $OpenBSD: ts_verify_ctx.c,v 1.13 2023/04/25 17:52:54 tb Exp $ */ 2 /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL 3 * project 2003. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2006 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 #include <string.h> 60 61 #include <openssl/err.h> 62 #include <openssl/objects.h> 63 #include <openssl/ts.h> 64 65 #include "ts_local.h" 66 67 TS_VERIFY_CTX * 68 TS_VERIFY_CTX_new(void) 69 { 70 TS_VERIFY_CTX *ctx = calloc(1, sizeof(TS_VERIFY_CTX)); 71 72 if (!ctx) 73 TSerror(ERR_R_MALLOC_FAILURE); 74 75 return ctx; 76 } 77 78 void 79 TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx) 80 { 81 if (!ctx) 82 return; 83 84 TS_VERIFY_CTX_cleanup(ctx); 85 free(ctx); 86 } 87 88 void 89 TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) 90 { 91 if (!ctx) 92 return; 93 94 X509_STORE_free(ctx->store); 95 sk_X509_pop_free(ctx->certs, X509_free); 96 97 ASN1_OBJECT_free(ctx->policy); 98 99 X509_ALGOR_free(ctx->md_alg); 100 free(ctx->imprint); 101 102 BIO_free_all(ctx->data); 103 104 ASN1_INTEGER_free(ctx->nonce); 105 106 GENERAL_NAME_free(ctx->tsa_name); 107 108 memset(ctx, 0, sizeof(*ctx)); 109 } 110 111 /* 112 * XXX: The following accessors demonstrate the amount of care and thought that 113 * went into OpenSSL 1.1 API design and the review thereof: for whatever reason 114 * these functions return what was passed in. Correct memory management is left 115 * as an exercise for the reader... Unfortunately, careful consumers like 116 * openssl-ruby assume this behavior, so we're stuck with this insanity. The 117 * cherry on top is the TS_VERIFY_CTS_set_certs() [sic!] function that made it 118 * into the public API. 119 * 120 * Outstanding job, R$ and tjh, A+. 121 */ 122 123 int 124 TS_VERIFY_CTX_add_flags(TS_VERIFY_CTX *ctx, int flags) 125 { 126 ctx->flags |= flags; 127 128 return ctx->flags; 129 } 130 131 int 132 TS_VERIFY_CTX_set_flags(TS_VERIFY_CTX *ctx, int flags) 133 { 134 ctx->flags = flags; 135 136 return ctx->flags; 137 } 138 139 BIO * 140 TS_VERIFY_CTX_set_data(TS_VERIFY_CTX *ctx, BIO *bio) 141 { 142 ctx->data = bio; 143 144 return ctx->data; 145 } 146 147 X509_STORE * 148 TS_VERIFY_CTX_set_store(TS_VERIFY_CTX *ctx, X509_STORE *store) 149 { 150 ctx->store = store; 151 152 return ctx->store; 153 } 154 155 STACK_OF(X509) * 156 TS_VERIFY_CTX_set_certs(TS_VERIFY_CTX *ctx, STACK_OF(X509) *certs) 157 { 158 ctx->certs = certs; 159 160 return ctx->certs; 161 } 162 163 unsigned char * 164 TS_VERIFY_CTX_set_imprint(TS_VERIFY_CTX *ctx, unsigned char *imprint, 165 long imprint_len) 166 { 167 free(ctx->imprint); 168 169 ctx->imprint = imprint; 170 ctx->imprint_len = imprint_len; 171 172 return ctx->imprint; 173 } 174 175 TS_VERIFY_CTX * 176 TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) 177 { 178 TS_VERIFY_CTX *ret = ctx; 179 ASN1_OBJECT *policy; 180 TS_MSG_IMPRINT *imprint; 181 X509_ALGOR *md_alg; 182 ASN1_OCTET_STRING *msg; 183 const ASN1_INTEGER *nonce; 184 185 if (ret) 186 TS_VERIFY_CTX_cleanup(ret); 187 else if (!(ret = TS_VERIFY_CTX_new())) 188 return NULL; 189 190 /* Setting flags. */ 191 ret->flags = TS_VFY_ALL_IMPRINT & ~(TS_VFY_TSA_NAME | TS_VFY_SIGNATURE); 192 193 /* Setting policy. */ 194 if ((policy = TS_REQ_get_policy_id(req)) != NULL) { 195 if (!(ret->policy = OBJ_dup(policy))) 196 goto err; 197 } else 198 ret->flags &= ~TS_VFY_POLICY; 199 200 /* Setting md_alg, imprint and imprint_len. */ 201 imprint = TS_REQ_get_msg_imprint(req); 202 md_alg = TS_MSG_IMPRINT_get_algo(imprint); 203 if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) 204 goto err; 205 msg = TS_MSG_IMPRINT_get_msg(imprint); 206 ret->imprint_len = ASN1_STRING_length(msg); 207 if (!(ret->imprint = malloc(ret->imprint_len))) 208 goto err; 209 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); 210 211 /* Setting nonce. */ 212 if ((nonce = TS_REQ_get_nonce(req)) != NULL) { 213 if (!(ret->nonce = ASN1_INTEGER_dup(nonce))) 214 goto err; 215 } else 216 ret->flags &= ~TS_VFY_NONCE; 217 218 return ret; 219 220 err: 221 if (ctx) 222 TS_VERIFY_CTX_cleanup(ctx); 223 else 224 TS_VERIFY_CTX_free(ret); 225 return NULL; 226 } 227