summaryrefslogtreecommitdiffstats
path: root/crypto/cmp
diff options
context:
space:
mode:
authorDr. David von Oheimb <David.von.Oheimb@siemens.com>2019-11-05 09:56:59 +0100
committerMatt Caswell <matt@openssl.org>2019-12-12 10:57:25 +0000
commit3dbc5156b0b2c7a57be160706e6ad38a14edae37 (patch)
treee86c4b137be850621acfd835398b4bc1cf699467 /crypto/cmp
parent0402c90ff9caac4c680e3cb6db7729e00d3fc20b (diff)
chunk 6 of CMP contribution to OpenSSL
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10297)
Diffstat (limited to 'crypto/cmp')
-rw-r--r--crypto/cmp/build.info2
-rw-r--r--crypto/cmp/cmp_ctx.c6
-rw-r--r--crypto/cmp/cmp_err.c61
-rw-r--r--crypto/cmp/cmp_local.h98
-rw-r--r--crypto/cmp/cmp_msg.c996
-rw-r--r--crypto/cmp/cmp_protect.c313
-rw-r--r--crypto/cmp/cmp_status.c3
7 files changed, 1468 insertions, 11 deletions
diff --git a/crypto/cmp/build.info b/crypto/cmp/build.info
index 154022762a..760c3423ad 100644
--- a/crypto/cmp/build.info
+++ b/crypto/cmp/build.info
@@ -1,3 +1,3 @@
LIBS=../../libcrypto
SOURCE[../../libcrypto]= cmp_asn.c cmp_ctx.c cmp_err.c cmp_util.c \
- cmp_status.c cmp_hdr.c
+ cmp_status.c cmp_hdr.c cmp_protect.c cmp_msg.c
diff --git a/crypto/cmp/cmp_ctx.c b/crypto/cmp/cmp_ctx.c
index 89ecab1413..0bd12f47ac 100644
--- a/crypto/cmp/cmp_ctx.c
+++ b/crypto/cmp/cmp_ctx.c
@@ -946,7 +946,8 @@ int OSSL_CMP_CTX_get_failInfoCode(const OSSL_CMP_CTX *ctx)
* Sets a Boolean or integer option of the context to the "val" arg.
* Returns 1 on success, 0 on error
*/
-int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val) {
+int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val)
+{
int min_val;
if (ctx == NULL) {
@@ -1049,7 +1050,8 @@ int OSSL_CMP_CTX_set_option(OSSL_CMP_CTX *ctx, int opt, int val) {
* Reads a Boolean or integer option value from the context.
* Returns -1 on error (which is the default OSSL_CMP_OPT_REVOCATION_REASON)
*/
-int OSSL_CMP_CTX_get_option(const OSSL_CMP_CTX *ctx, int opt) {
+int OSSL_CMP_CTX_get_option(const OSSL_CMP_CTX *ctx, int opt)
+{
if (ctx == NULL) {
CMPerr(0, CMP_R_NULL_ARGUMENT);
return -1;
diff --git a/crypto/cmp/cmp_err.c b/crypto/cmp/cmp_err.c
index 683b8472d7..8b4a6ca708 100644
--- a/crypto/cmp/cmp_err.c
+++ b/crypto/cmp/cmp_err.c
@@ -1,7 +1,6 @@
/*
- * Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
- * Copyright Nokia 2007-2019
- * Copyright Siemens AG 2015-2019
+ * Generated by util/mkerr.pl DO NOT EDIT
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -15,17 +14,69 @@
#ifndef OPENSSL_NO_ERR
static const ERR_STRING_DATA CMP_str_reasons[] = {
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_BAD_REQUEST_ID), "bad request id"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTID_NOT_FOUND), "certid not found"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTIFICATE_NOT_FOUND),
+ "certificate not found"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERTRESPONSE_NOT_FOUND),
+ "certresponse not found"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_CERT_AND_KEY_DO_NOT_MATCH),
+ "cert and key do not match"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CALCULATING_PROTECTION),
+ "error calculating protection"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_CERTCONF),
+ "error creating certconf"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_CERTREP),
+ "error creating certrep"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_ERROR),
+ "error creating error"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_GENM),
+ "error creating genm"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_GENP),
+ "error creating genp"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_P10CR),
+ "error creating p10cr"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_PKICONF),
+ "error creating pkiconf"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_POLLREP),
+ "error creating pollrep"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_POLLREQ),
+ "error creating pollreq"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_RP), "error creating rp"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_CREATING_RR), "error creating rr"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_PARSING_PKISTATUS),
"error parsing pkistatus"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_PROTECTING_MESSAGE),
+ "error protecting message"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_ERROR_SETTING_CERTHASH),
+ "error setting certhash"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_FAILURE_OBTAINING_RANDOM),
"failure obtaining random"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_FAIL_INFO_OUT_OF_RANGE),
+ "fail info out of range"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_INVALID_ARGS), "invalid args"},
- {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MULTIPLE_SAN_SOURCES),
- "multiple san sources"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_KEY_INPUT_FOR_CREATING_PROTECTION),
+ "missing key input for creating protection"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_PRIVATE_KEY),
+ "missing private key"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MISSING_SENDER_IDENTIFICATION),
"missing sender identification"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_MULTIPLE_SAN_SOURCES),
+ "multiple san sources"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NO_STDIO), "no stdio"},
{ERR_PACK(ERR_LIB_CMP, 0, CMP_R_NULL_ARGUMENT), "null argument"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_PKISTATUSINFO_NOT_FOUND),
+ "pkistatusinfo not found"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNEXPECTED_PKIBODY), "unexpected pkibody"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNKNOWN_ALGORITHM_ID),
+ "unknown algorithm id"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNKNOWN_CERT_TYPE), "unknown cert type"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNSUPPORTED_ALGORITHM),
+ "unsupported algorithm"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_UNSUPPORTED_KEY_TYPE),
+ "unsupported key type"},
+ {ERR_PACK(ERR_LIB_CMP, 0, CMP_R_WRONG_ALGORITHM_OID),
+ "wrong algorithm oid"},
{0, NULL}
};
diff --git a/crypto/cmp/cmp_local.h b/crypto/cmp/cmp_local.h
index b49ead62df..b7ab6454b5 100644
--- a/crypto/cmp/cmp_local.h
+++ b/crypto/cmp/cmp_local.h
@@ -42,7 +42,7 @@ struct ossl_cmp_ctx_st {
int proxyPort;
int msgtimeout; /* max seconds to wait for each CMP message round trip */
int totaltimeout; /* maximum number seconds an enrollment may take, incl. */
- /* attempts polling for a response if a 'waiting' PKIStatus is received */
+ /* attempts polling for a response if a 'waiting' PKIStatus is received */
time_t end_time; /* session start time + totaltimeout */
OSSL_cmp_http_cb_t http_cb;
void *http_cb_arg; /* allows to store optional argument to cb */
@@ -279,6 +279,7 @@ struct ossl_cmp_pkisi_st {
} /* OSSL_CMP_PKISI */;
DECLARE_ASN1_FUNCTIONS(OSSL_CMP_PKISI)
DECLARE_ASN1_DUP_FUNCTION(OSSL_CMP_PKISI)
+DECLARE_ASN1_DUP_FUNCTION(OSSL_CRMF_CERTID)
/*-
* RevReqContent ::= SEQUENCE OF RevDetails
@@ -526,6 +527,7 @@ DECLARE_ASN1_FUNCTIONS(OSSL_CMP_GENREPCONTENT)
* certConf [24] CertConfirmContent, --Certificate confirm
* pollReq [25] PollReqContent, --Polling request
* pollRep [26] PollRepContent --Polling response
+ * }
*/
typedef struct ossl_cmp_pkibody_st {
int type;
@@ -680,6 +682,13 @@ DECLARE_ASN1_FUNCTIONS(CMP_PROTECTEDPART)
*/
/*
+ * constants
+ */
+/* certReqId for the first - and so far only - certificate request */
+# define OSSL_CMP_CERTREQID 0
+/* sequence id for the first - and so far only - revocation request */
+# define OSSL_CMP_REVREQSID 0
+/*
* functions
*/
@@ -752,4 +761,91 @@ int ossl_cmp_hdr_check_implicitConfirm(const OSSL_CMP_PKIHEADER *hdr);
# define OSSL_CMP_SENDERNONCE_LENGTH 16
int ossl_cmp_hdr_init(OSSL_CMP_CTX *ctx, OSSL_CMP_PKIHEADER *hdr);
+/* from cmp_msg.c */
+/* OSSL_CMP_MSG bodytype ASN.1 choice IDs */
+# define OSSL_CMP_PKIBODY_IR 0
+# define OSSL_CMP_PKIBODY_IP 1
+# define OSSL_CMP_PKIBODY_CR 2
+# define OSSL_CMP_PKIBODY_CP 3
+# define OSSL_CMP_PKIBODY_P10CR 4
+# define OSSL_CMP_PKIBODY_POPDECC 5
+# define OSSL_CMP_PKIBODY_POPDECR 6
+# define OSSL_CMP_PKIBODY_KUR 7
+# define OSSL_CMP_PKIBODY_KUP 8
+# define OSSL_CMP_PKIBODY_KRR 9
+# define OSSL_CMP_PKIBODY_KRP 10
+# define OSSL_CMP_PKIBODY_RR 11
+# define OSSL_CMP_PKIBODY_RP 12
+# define OSSL_CMP_PKIBODY_CCR 13
+# define OSSL_CMP_PKIBODY_CCP 14
+# define OSSL_CMP_PKIBODY_CKUANN 15
+# define OSSL_CMP_PKIBODY_CANN 16
+# define OSSL_CMP_PKIBODY_RANN 17
+# define OSSL_CMP_PKIBODY_CRLANN 18
+# define OSSL_CMP_PKIBODY_PKICONF 19
+# define OSSL_CMP_PKIBODY_NESTED 20
+# define OSSL_CMP_PKIBODY_GENM 21
+# define OSSL_CMP_PKIBODY_GENP 22
+# define OSSL_CMP_PKIBODY_ERROR 23
+# define OSSL_CMP_PKIBODY_CERTCONF 24
+# define OSSL_CMP_PKIBODY_POLLREQ 25
+# define OSSL_CMP_PKIBODY_POLLREP 26
+# define OSSL_CMP_PKIBODY_TYPE_MAX OSSL_CMP_PKIBODY_POLLREP
+const char *ossl_cmp_bodytype_to_string(int type);
+int ossl_cmp_msg_set_bodytype(OSSL_CMP_MSG *msg, int type);
+int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg);
+OSSL_CMP_MSG *ossl_cmp_msg_create(OSSL_CMP_CTX *ctx, int bodytype);
+OSSL_CMP_MSG *ossl_cmp_certReq_new(OSSL_CMP_CTX *ctx, int bodytype,
+ int err_code);
+OSSL_CMP_MSG *ossl_cmp_certRep_new(OSSL_CMP_CTX *ctx, int bodytype,
+ int certReqId, OSSL_CMP_PKISI *si,
+ X509 *cert, STACK_OF(X509) *chain,
+ STACK_OF(X509) *caPubs, int encrypted,
+ int unprotectedErrors);
+OSSL_CMP_MSG *ossl_cmp_rr_new(OSSL_CMP_CTX *ctx);
+OSSL_CMP_MSG *ossl_cmp_rp_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
+ OSSL_CRMF_CERTID *certId, int unprot_err);
+OSSL_CMP_MSG *ossl_cmp_pkiconf_new(OSSL_CMP_CTX *ctx);
+int ossl_cmp_msg_gen_push0_ITAV(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav);
+int ossl_cmp_msg_gen_push1_ITAVs(OSSL_CMP_MSG *msg,
+ STACK_OF(OSSL_CMP_ITAV) *itavs);
+OSSL_CMP_MSG *ossl_cmp_genm_new(OSSL_CMP_CTX *ctx);
+OSSL_CMP_MSG *ossl_cmp_genp_new(OSSL_CMP_CTX *ctx);
+OSSL_CMP_MSG *ossl_cmp_error_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
+ int errorCode,
+ OSSL_CMP_PKIFREETEXT *errorDetails,
+ int unprotected);
+int ossl_cmp_certstatus_set_certHash(OSSL_CMP_CERTSTATUS *certStatus,
+ const X509 *cert);
+OSSL_CMP_MSG *ossl_cmp_certConf_new(OSSL_CMP_CTX *ctx, int fail_info,
+ const char *text);
+OSSL_CMP_MSG *ossl_cmp_pollReq_new(OSSL_CMP_CTX *ctx, int crid);
+OSSL_CMP_MSG *ossl_cmp_pollRep_new(OSSL_CMP_CTX *ctx, int crid,
+ int64_t poll_after);
+OSSL_CMP_PKISI *
+ossl_cmp_revrepcontent_get_pkistatusinfo(OSSL_CMP_REVREPCONTENT *rrep, int rsid);
+OSSL_CRMF_CERTID *ossl_cmp_revrepcontent_get_CertId(OSSL_CMP_REVREPCONTENT *rrep,
+ int rsid);
+OSSL_CMP_POLLREP *
+ossl_cmp_pollrepcontent_get0_pollrep(const OSSL_CMP_POLLREPCONTENT *prc,
+ int rid);
+OSSL_CMP_CERTRESPONSE *
+ossl_cmp_certrepmessage_get0_certresponse(const OSSL_CMP_CERTREPMESSAGE *crepmsg,
+ int rid);
+X509 *ossl_cmp_certresponse_get1_certificate(EVP_PKEY *privkey,
+ const OSSL_CMP_CERTRESPONSE *crep);
+OSSL_CMP_MSG *ossl_cmp_msg_load(const char *file);
+/* BIO definitions */
+# define OSSL_d2i_CMP_MSG_bio(bp, p) \
+ ASN1_d2i_bio_of(OSSL_CMP_MSG, OSSL_CMP_MSG_new, d2i_OSSL_CMP_MSG, bp, p)
+# define OSSL_i2d_CMP_MSG_bio(bp, o) \
+ ASN1_i2d_bio_of(OSSL_CMP_MSG, i2d_OSSL_CMP_MSG, bp, o)
+
+/* from cmp_protect.c */
+ASN1_BIT_STRING *ossl_cmp_calc_protection(const OSSL_CMP_MSG *msg,
+ const ASN1_OCTET_STRING *secret,
+ EVP_PKEY *pkey);
+int ossl_cmp_msg_add_extraCerts(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
+int ossl_cmp_msg_protect(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
+
#endif /* !defined OSSL_CRYPTO_CMP_LOCAL_H */
diff --git a/crypto/cmp/cmp_msg.c b/crypto/cmp/cmp_msg.c
new file mode 100644
index 0000000000..00381932f3
--- /dev/null
+++ b/crypto/cmp/cmp_msg.c
@@ -0,0 +1,996 @@
+/*
+ * Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright Nokia 2007-2019
+ * Copyright Siemens AG 2015-2019
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+/* CMP functions for PKIMessage construction */
+
+#include "cmp_local.h"
+
+/* explicit #includes not strictly needed since implied by the above: */
+#include <openssl/asn1t.h>
+#include <openssl/cmp.h>
+#include <openssl/crmf.h>
+#include <openssl/err.h>
+#include <openssl/x509.h>
+
+OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg)
+{
+ if (msg == NULL) {
+ CMPerr(0, CMP_R_NULL_ARGUMENT);
+ return NULL;
+ }
+ return msg->header;
+}
+
+const char *ossl_cmp_bodytype_to_string(int type)
+{
+ static const char *type_names[] = {
+ "IR", "IP", "CR", "CP", "P10CR",
+ "POPDECC", "POPDECR", "KUR", "KUP",
+ "KRR", "KRP", "RR", "RP", "CCR", "CCP",
+ "CKUANN", "CANN", "RANN", "CRLANN", "PKICONF", "NESTED",
+ "GENM", "GENP", "ERROR", "CERTCONF", "POLLREQ", "POLLREP",
+ };
+
+ if (type < 0 || type > OSSL_CMP_PKIBODY_TYPE_MAX)
+ return "illegal body type";
+ return type_names[type];
+}
+
+int ossl_cmp_msg_set_bodytype(OSSL_CMP_MSG *msg, int type)
+{
+ if (!ossl_assert(msg != NULL && msg->body != NULL))
+ return 0;
+
+ msg->body->type = type;
+ return 1;
+}
+
+int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg)
+{
+ if (!ossl_assert(msg != NULL && msg->body != NULL))
+ return -1;
+
+ return msg->body->type;
+}
+
+/* Add an extension to the referenced extension stack, which may be NULL */
+static int add1_extension(X509_EXTENSIONS **pexts, int nid, int crit, void *ex)
+{
+ X509_EXTENSION *ext;
+ int res;
+
+ if (!ossl_assert(pexts != NULL)) /* pointer to var must not be NULL */
+ return 0;
+
+ if ((ext = X509V3_EXT_i2d(nid, crit, ex)) == NULL)
+ return 0;
+
+ res = X509v3_add_ext(pexts, ext, 0) != NULL;
+ X509_EXTENSION_free(ext);
+ return res;
+}
+
+/* Add a CRL revocation reason code to extension stack, which may be NULL */
+static int add_crl_reason_extension(X509_EXTENSIONS **pexts, int reason_code)
+{
+ ASN1_ENUMERATED *val = ASN1_ENUMERATED_new();
+ int res = 0;
+
+ if (val != NULL && ASN1_ENUMERATED_set(val, reason_code))
+ res = add1_extension(pexts, NID_crl_reason, 0 /* non-critical */, val);
+ ASN1_ENUMERATED_free(val);
+ return res;
+}
+
+OSSL_CMP_MSG *ossl_cmp_msg_create(OSSL_CMP_CTX *ctx, int bodytype)
+{
+ OSSL_CMP_MSG *msg = NULL;
+
+ if (!ossl_assert(ctx != NULL))
+ return NULL;
+
+ if ((msg = OSSL_CMP_MSG_new()) == NULL)
+ return NULL;
+ if (!ossl_cmp_hdr_init(ctx, msg->header)
+ || !ossl_cmp_msg_set_bodytype(msg, bodytype))
+ goto err;
+ if (ctx->geninfo_ITAVs != NULL
+ && !ossl_cmp_hdr_generalInfo_push1_items(msg->header,
+ ctx->geninfo_ITAVs))
+ goto err;
+
+ switch (bodytype) {
+ case OSSL_CMP_PKIBODY_IR:
+ case OSSL_CMP_PKIBODY_CR:
+ case OSSL_CMP_PKIBODY_KUR:
+ if ((msg->body->value.ir = OSSL_CRMF_MSGS_new()) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_P10CR:
+ if (ctx->p10CSR == NULL) {
+ CMPerr(0, CMP_R_ERROR_CREATING_P10CR);
+ goto err;
+ }
+ if ((msg->body->value.p10cr = X509_REQ_dup(ctx->p10CSR)) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_IP:
+ case OSSL_CMP_PKIBODY_CP:
+ case OSSL_CMP_PKIBODY_KUP:
+ if ((msg->body->value.ip = OSSL_CMP_CERTREPMESSAGE_new()) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_RR:
+ if ((msg->body->value.rr = sk_OSSL_CMP_REVDETAILS_new_null()) == NULL)
+ goto err;
+ return msg;
+ case OSSL_CMP_PKIBODY_RP:
+ if ((msg->body->value.rp = OSSL_CMP_REVREPCONTENT_new()) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_CERTCONF:
+ if ((msg->body->value.certConf =
+ sk_OSSL_CMP_CERTSTATUS_new_null()) == NULL)
+ goto err;
+ return msg;
+ case OSSL_CMP_PKIBODY_PKICONF:
+ if ((msg->body->value.pkiconf = ASN1_TYPE_new()) == NULL)
+ goto err;
+ ASN1_TYPE_set(msg->body->value.pkiconf, V_ASN1_NULL, NULL);
+ return msg;
+
+ case OSSL_CMP_PKIBODY_POLLREQ:
+ if ((msg->body->value.pollReq = sk_OSSL_CMP_POLLREQ_new_null()) == NULL)
+ goto err;
+ return msg;
+ case OSSL_CMP_PKIBODY_POLLREP:
+ if ((msg->body->value.pollRep = sk_OSSL_CMP_POLLREP_new_null()) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_GENM:
+ case OSSL_CMP_PKIBODY_GENP:
+ if ((msg->body->value.genm = sk_OSSL_CMP_ITAV_new_null()) == NULL)
+ goto err;
+ return msg;
+
+ case OSSL_CMP_PKIBODY_ERROR:
+ if ((msg->body->value.error = OSSL_CMP_ERRORMSGCONTENT_new()) == NULL)
+ goto err;
+ return msg;
+
+ default:
+ CMPerr(0, CMP_R_UNEXPECTED_PKIBODY);
+ goto err;
+ }
+
+ err:
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+#define HAS_SAN(ctx) \
+ (sk_GENERAL_NAME_num((ctx)->subjectAltNames) > 0 \
+ || OSSL_CMP_CTX_reqExtensions_have_SAN(ctx) == 1)
+
+static X509_NAME *determine_subj(OSSL_CMP_CTX *ctx, X509 *refcert,
+ int bodytype)
+{
+ if (ctx->subjectName != NULL)
+ return ctx->subjectName;
+
+ if (refcert != NULL
+ && (bodytype == OSSL_CMP_PKIBODY_KUR || !HAS_SAN(ctx)))
+ /*
+ * For KUR, copy subjectName from reference certificate.
+ * For IR or CR, do the same only if there is no subjectAltName.
+ */
+ return X509_get_subject_name(refcert);
+ return NULL;
+}
+
+/*
+ * Create CRMF certificate request message for IR/CR/KUR
+ * returns a pointer to the OSSL_CRMF_MSG on success, NULL on error
+ */
+static OSSL_CRMF_MSG *crm_new(OSSL_CMP_CTX *ctx, int bodytype,
+ int rid, EVP_PKEY *rkey)
+{
+ OSSL_CRMF_MSG *crm = NULL;
+ X509 *refcert = ctx->oldCert != NULL ? ctx->oldCert : ctx->clCert;
+ /* refcert defaults to current client cert */
+ STACK_OF(GENERAL_NAME) *default_sans = NULL;
+ X509_NAME *subject = determine_subj(ctx, refcert, bodytype);
+ int crit = ctx->setSubjectAltNameCritical || subject == NULL;
+ /* RFC5280: subjectAltName MUST be critical if subject is null */
+ X509_EXTENSIONS *exts = NULL;
+
+ if (rkey == NULL
+ || (bodytype == OSSL_CMP_PKIBODY_KUR && refcert == NULL)) {
+ CMPerr(0, CMP_R_INVALID_ARGS);
+ return NULL;
+ }
+ if ((crm = OSSL_CRMF_MSG_new()) == NULL)
+ return NULL;
+ if (!OSSL_CRMF_MSG_set_certReqId(crm, rid)
+ /*
+ * fill certTemplate, corresponding to CertificationRequestInfo
+ * of PKCS#10. The rkey param cannot be NULL so far -
+ * it could be NULL if centralized key creation was supported
+ */
+ || !OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_MSG_get0_tmpl(crm), rkey,
+ subject, ctx->issuer,
+ NULL/* serial */))
+ goto err;
+ if (ctx->days != 0) {
+ time_t notBefore, notAfter;
+
+ notBefore = time(NULL);
+ notAfter = notBefore + 60 * 60 * 24 * ctx->days;
+ if (!OSSL_CRMF_MSG_set_validity(crm, notBefore, notAfter))
+ goto err;
+ }
+
+ /* extensions */
+ if (refcert != NULL && !ctx->SubjectAltName_nodefault)
+ default_sans = X509V3_get_d2i(X509_get0_extensions(refcert),
+ NID_subject_alt_name, NULL, NULL);
+ /* exts are copied from ctx to allow reuse */
+ if (ctx->reqExtensions != NULL) {
+ exts = sk_X509_EXTENSION_deep_copy(ctx->reqExtensions,
+ X509_EXTENSION_dup,
+ X509_EXTENSION_free);
+ if (exts == NULL)
+ goto err;
+ }
+ if (sk_GENERAL_NAME_num(ctx->subjectAltNames) > 0
+ && !add1_extension(&exts, NID_subject_alt_name,
+ crit, ctx->subjectAltNames))
+ goto err;
+ if (!HAS_SAN(ctx) && default_sans != NULL
+ && !add1_extension(&exts, NID_subject_alt_name, crit, default_sans))
+ goto err;
+ if (ctx->policies != NULL
+ && !add1_extension(&exts, NID_certificate_policies,
+ ctx->setPoliciesCritical, ctx->policies))
+ goto err;
+ if (!OSSL_CRMF_MSG_set0_extensions(crm, exts))
+ goto err;
+ exts = NULL;
+ /* end fill certTemplate, now set any controls */
+
+ /* for KUR, set OldCertId according to D.6 */
+ if (bodytype == OSSL_CMP_PKIBODY_KUR) {
+ OSSL_CRMF_CERTID *cid =
+ OSSL_CRMF_CERTID_gen(X509_get_issuer_name(refcert),
+ X509_get_serialNumber(refcert));
+ int ret;
+
+ if (cid == NULL)
+ goto err;
+ ret = OSSL_CRMF_MSG_set1_regCtrl_oldCertID(crm, cid);
+ OSSL_CRMF_CERTID_free(cid);
+ if (ret == 0)
+ goto err;
+ }
+
+ goto end;
+
+ err:
+ OSSL_CRMF_MSG_free(crm);
+ crm = NULL;
+
+ end:
+ sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
+ sk_GENERAL_NAME_pop_free(default_sans, GENERAL_NAME_free);
+ return crm;
+}
+
+OSSL_CMP_MSG *ossl_cmp_certReq_new(OSSL_CMP_CTX *ctx, int type, int err_code)
+{
+ EVP_PKEY *rkey;
+ EVP_PKEY *privkey;
+ OSSL_CMP_MSG *msg;
+ OSSL_CRMF_MSG *crm = NULL;
+
+ if (!ossl_assert(ctx != NULL))
+ return NULL;
+
+ rkey = OSSL_CMP_CTX_get0_newPkey(ctx, 0);
+ if (rkey == NULL)
+ return NULL;
+ privkey = OSSL_CMP_CTX_get0_newPkey(ctx, 1);
+
+ if (type != OSSL_CMP_PKIBODY_IR && type != OSSL_CMP_PKIBODY_CR
+ && type != OSSL_CMP_PKIBODY_KUR && type != OSSL_CMP_PKIBODY_P10CR) {
+ CMPerr(0, CMP_R_INVALID_ARGS);
+ return NULL;
+ }
+
+ if ((msg = ossl_cmp_msg_create(ctx, type)) == NULL)
+ goto err;
+
+ /* header */
+ if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header))
+ goto err;
+
+ /* body */
+ /* For P10CR the content has already been set in OSSL_CMP_MSG_create */
+ if (type != OSSL_CMP_PKIBODY_P10CR) {
+ if (ctx->popoMethod == OSSL_CRMF_POPO_SIGNATURE && privkey == NULL) {
+ CMPerr(0, CMP_R_MISSING_PRIVATE_KEY);
+ goto err;
+ }
+ if ((crm = crm_new(ctx, type, OSSL_CMP_CERTREQID, rkey)) == NULL
+ || !OSSL_CRMF_MSG_create_popo(crm, privkey, ctx->digest,
+ ctx->popoMethod)
+ /* value.ir is same for cr and kur */
+ || !sk_OSSL_CRMF_MSG_push(msg->body->value.ir, crm))
+ goto err;
+ crm = NULL;
+ /* TODO: here optional 2nd certreqmsg could be pushed to the stack */
+ }
+
+ if (!ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+
+ return msg;
+
+ err:
+ CMPerr(0, err_code);
+ OSSL_CRMF_MSG_free(crm);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+OSSL_CMP_MSG *ossl_cmp_certRep_new(OSSL_CMP_CTX *ctx, int bodytype,
+ int certReqId, OSSL_CMP_PKISI *si,
+ X509 *cert, STACK_OF(X509) *chain,
+ STACK_OF(X509) *caPubs, int encrypted,
+ int unprotectedErrors)
+{
+ OSSL_CMP_MSG *msg = NULL;
+ OSSL_CMP_CERTREPMESSAGE *repMsg = NULL;
+ OSSL_CMP_CERTRESPONSE *resp = NULL;
+ int status = -1;
+
+ if (!ossl_assert(ctx != NULL && si != NULL))
+ return NULL;
+
+ if ((msg = ossl_cmp_msg_create(ctx, bodytype)) == NULL)
+ goto err;
+ repMsg = msg->body->value.ip; /* value.ip is same for cp and kup */
+
+ /* header */
+ if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header))
+ goto err;
+
+ /* body */
+ if ((resp = OSSL_CMP_CERTRESPONSE_new()) == NULL)
+ goto err;
+ OSSL_CMP_PKISI_free(resp->status);
+ if ((resp->status = OSSL_CMP_PKISI_dup(si)) == NULL
+ || !ASN1_INTEGER_set(resp->certReqId, certReqId))
+ goto err;
+
+ status = ossl_cmp_pkisi_get_pkistatus(resp->status);
+ if (status != OSSL_CMP_PKISTATUS_rejection
+ && status != OSSL_CMP_PKISTATUS_waiting && cert != NULL) {
+ if (encrypted) {
+ CMPerr(0, CMP_R_INVALID_ARGS);
+ goto err;
+ }
+
+ if ((resp->certifiedKeyPair = OSSL_CMP_CERTIFIEDKEYPAIR_new())
+ == NULL)
+ goto err;
+ resp->certifiedKeyPair->certOrEncCert->type =
+ OSSL_CMP_CERTORENCCERT_CERTIFICATE;
+ if (!X509_up_ref(cert))
+ goto err;
+ resp->certifiedKeyPair->certOrEncCert->value.certificate = cert;
+ }
+
+ if (!sk_OSSL_CMP_CERTRESPONSE_push(repMsg->response, resp))
+ goto err;
+ resp = NULL;
+ /* TODO: here optional 2nd certrep could be pushed to the stack */
+
+ if (bodytype == OSSL_CMP_PKIBODY_IP && caPubs != NULL
+ && (repMsg->caPubs = X509_chain_up_ref(caPubs)) == NULL)
+ goto err;
+ if (chain != NULL
+ && !ossl_cmp_sk_X509_add1_certs(msg->extraCerts, chain, 0, 1, 0))
+ goto err;
+
+ if (!unprotectedErrors
+ || ossl_cmp_pkisi_get_pkistatus(si) != OSSL_CMP_PKISTATUS_rejection)
+ if (!ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+
+ return msg;
+
+ err:
+ CMPerr(0, CMP_R_ERROR_CREATING_CERTREP);
+ OSSL_CMP_CERTRESPONSE_free(resp);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+OSSL_CMP_MSG *ossl_cmp_rr_new(OSSL_CMP_CTX *ctx)
+{
+ OSSL_CMP_MSG *msg = NULL;
+ OSSL_CMP_REVDETAILS *rd;
+
+ if (!ossl_assert(ctx != NULL && ctx->oldCert != NULL))
+ return NULL;
+
+ if ((rd = OSSL_CMP_REVDETAILS_new()) == NULL)
+ goto err;
+
+ /* Fill the template from the contents of the certificate to be revoked */
+ if (!OSSL_CRMF_CERTTEMPLATE_fill(rd->certDetails,
+ NULL/* pubkey would be redundant */,
+ NULL/* subject would be redundant */,
+ X509_get_issuer_name(ctx->oldCert),
+ X509_get_serialNumber(ctx->oldCert)))
+ goto err;
+
+ /* revocation reason code is optional */
+ if (ctx->revocationReason != CRL_REASON_NONE
+ && !add_crl_reason_extension(&rd->crlEntryDetails,
+ ctx->revocationReason))
+ goto err;
+
+ if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_RR)) == NULL)
+ goto err;
+
+ if (!sk_OSSL_CMP_REVDETAILS_push(msg->body->value.rr, rd))
+ goto err;
+ rd = NULL;
+
+ /*
+ * TODO: the Revocation Passphrase according to section 5.3.19.9 could be
+ * set here if set in ctx
+ */
+
+ if (!ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+
+ return msg;
+
+ err:
+ CMPerr(0, CMP_R_ERROR_CREATING_RR);
+ OSSL_CMP_MSG_free(msg);
+ OSSL_CMP_REVDETAILS_free(rd);
+ return NULL;
+}
+
+OSSL_CMP_MSG *ossl_cmp_rp_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
+ OSSL_CRMF_CERTID *cid, int unprot_err)
+{
+ OSSL_CMP_REVREPCONTENT *rep = NULL;
+ OSSL_CMP_PKISI *si1 = NULL;
+ OSSL_CRMF_CERTID *cid_copy = NULL;
+ OSSL_CMP_MSG *msg = NULL;
+
+ if (!ossl_assert(ctx != NULL && si != NULL && cid != NULL))
+ return NULL;
+
+ if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_RP)) == NULL)
+ goto err;
+ rep = msg->body->value.rp;
+
+ if ((si1 = OSSL_CMP_PKISI_dup(si)) == NULL)
+ goto err;
+
+ if (!sk_OSSL_CMP_PKISI_push(rep->status, si1)) {
+ OSSL_CMP_PKISI_free(si1);
+ goto err;
+ }
+
+ if ((rep->revCerts = sk_OSSL_CRMF_CERTID_new_null()) == NULL)
+ goto err;
+ if ((cid_copy = OSSL_CRMF_CERTID_dup(cid)) == NULL)
+ goto err;
+ if (!sk_OSSL_CRMF_CERTID_push(rep->revCerts, cid_copy)) {
+ OSSL_CRMF_CERTID_free(cid_copy);
+ goto err;
+ }
+
+ if (!unprot_err
+ || ossl_cmp_pkisi_get_pkistatus(si) != OSSL_CMP_PKISTATUS_rejection)
+ if (!ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+
+ return msg;
+
+ err:
+ CMPerr(0, CMP_R_ERROR_CREATING_RP);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+OSSL_CMP_MSG *ossl_cmp_pkiconf_new(OSSL_CMP_CTX *ctx)
+{
+ OSSL_CMP_MSG *msg;
+
+ if (!ossl_assert(ctx != NULL))
+ return NULL;
+
+ if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_PKICONF)) == NULL)
+ goto err;
+ if (ossl_cmp_msg_protect(ctx, msg))
+ return msg;
+
+ err:
+ CMPerr(0, CMP_R_ERROR_CREATING_PKICONF);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+int ossl_cmp_msg_gen_push0_ITAV(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav)
+{
+ int bodytype;
+
+ if (!ossl_assert(msg != NULL && itav != NULL))
+ return 0;
+
+ bodytype = ossl_cmp_msg_get_bodytype(msg);
+ if (bodytype != OSSL_CMP_PKIBODY_GENM
+ && bodytype != OSSL_CMP_PKIBODY_GENP) {
+ CMPerr(0, CMP_R_INVALID_ARGS);
+ return 0;
+ }
+
+ /* value.genp has the same structure, so this works for genp as well */
+ return OSSL_CMP_ITAV_push0_stack_item(&msg->body->value.genm, itav);
+}
+
+int ossl_cmp_msg_gen_push1_ITAVs(OSSL_CMP_MSG *msg,
+ STACK_OF(OSSL_CMP_ITAV) *itavs)
+{
+ int i;
+ OSSL_CMP_ITAV *itav = NULL;
+
+ if (!ossl_assert(msg != NULL))
+ return 0;
+
+ for (i = 0; i < sk_OSSL_CMP_ITAV_num(itavs); i++) {
+ if ((itav = OSSL_CMP_ITAV_dup(sk_OSSL_CMP_ITAV_value(itavs,i))) == NULL)
+ return 0;
+ if (!ossl_cmp_msg_gen_push0_ITAV(msg, itav)) {
+ OSSL_CMP_ITAV_free(itav);
+ return 0;
+ }
+ }
+ return 1;
+}
+
+/*
+ * Creates a new General Message/Response with an empty itav stack
+ * returns a pointer to the PKIMessage on success, NULL on error
+ */
+static OSSL_CMP_MSG *gen_new(OSSL_CMP_CTX *ctx, int body_type, int err_code)
+{
+ OSSL_CMP_MSG *msg = NULL;
+
+ if (!ossl_assert(ctx != NULL))
+ return NULL;
+
+ if ((msg = ossl_cmp_msg_create(ctx, body_type)) == NULL)
+ return NULL;
+
+ if (ctx->genm_ITAVs != NULL
+ && !ossl_cmp_msg_gen_push1_ITAVs(msg, ctx->genm_ITAVs))
+ goto err;
+
+ if (!ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+
+ return msg;
+
+ err:
+ CMPerr(0, err_code);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+OSSL_CMP_MSG *ossl_cmp_genm_new(OSSL_CMP_CTX *ctx)
+{
+ return gen_new(ctx, OSSL_CMP_PKIBODY_GENM, CMP_R_ERROR_CREATING_GENM);
+}
+
+OSSL_CMP_MSG *ossl_cmp_genp_new(OSSL_CMP_CTX *ctx)
+{
+ return gen_new(ctx, OSSL_CMP_PKIBODY_GENP, CMP_R_ERROR_CREATING_GENP);
+}
+
+OSSL_CMP_MSG *ossl_cmp_error_new(OSSL_CMP_CTX *ctx, OSSL_CMP_PKISI *si,
+ int errorCode,
+ OSSL_CMP_PKIFREETEXT *errorDetails,
+ int unprotected)
+{
+ OSSL_CMP_MSG *msg = NULL;
+
+ if (!ossl_assert(ctx != NULL && si != NULL))
+ return NULL;
+
+ if ((msg = ossl_cmp_msg_create(ctx, OSSL_CMP_PKIBODY_ERROR)) == NULL)
+ goto err;
+
+ OSSL_CMP_PKISI_free(msg->body->value.error->pKIStatusInfo);
+ if ((msg->body->value.error->pKIStatusInfo = OSSL_CMP_PKISI_dup(si))
+ == NULL)
+ goto err;
+ if (errorCode >= 0) {
+ if ((msg->body->value.error->errorCode = ASN1_INTEGER_new()) == NULL)
+ goto err;
+ if (!ASN1_INTEGER_set(msg->body->value.error->errorCode, errorCode))
+ goto err;
+ }
+ if (errorDetails != NULL)
+ if ((msg->body->value.error->errorDetails =
+ sk_ASN1_UTF8STRING_deep_copy(errorDetails, ASN1_STRING_dup,
+ ASN1_STRING_free)) == NULL)
+ goto err;
+
+ if (!unprotected && !ossl_cmp_msg_protect(ctx, msg))
+ goto err;
+ return msg;
+
+ err:
+ CMPerr(0, CMP_R_ERROR_CREATING_ERROR);
+ OSSL_CMP_MSG_free(msg);
+ return NULL;
+}
+
+/*
+ * OSSL_CMP_CERTSTATUS_set_certHash() calculates a hash of the certificate,
+ * using the same hash algorithm as is used to create and verify the
+ * certificate signature, and places the hash into the certHash field of a
+ * OSSL_CMP_CERTSTATUS structure. This is used in the certConf message,
+ * for example, to confirm that the certificate was received successfully.
+ */
+int ossl_cmp_certstatus_set_certHash(OSSL_CMP_CERTSTATUS *certStatus,
+ const X509 *cert)
+{
+ unsigned int len;
+ unsigned char hash[EVP_MAX_MD_SIZE];
+ int md_NID;
+ const EVP_MD *md = NULL