/* * Copyright (C) 2003-2016 Free Software Foundation, Inc. * Copyright (C) 2012-2016 Nikos Mavrogiannopoulos * Copyright (C) 2016-2017 Red Hat, Inc. * * Author: Nikos Mavrogiannopoulos * * This file is part of GnuTLS. * * The GnuTLS is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * as published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program. If not, see * */ /* This file contains functions to handle PKCS #10 certificate requests, see RFC 2986. */ #include "gnutls_int.h" #include #include #include "errors.h" #include #include #include #include #include "x509_int.h" #include #include #include "attributes.h" /** * gnutls_x509_crq_init: * @crq: A pointer to the type to be initialized * * This function will initialize a PKCS#10 certificate request * structure. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_init(gnutls_x509_crq_t * crq) { int result; FAIL_IF_LIB_ERROR; *crq = gnutls_calloc(1, sizeof(gnutls_x509_crq_int)); if (!*crq) return GNUTLS_E_MEMORY_ERROR; result = asn1_create_element(_gnutls_get_pkix(), "PKIX1.pkcs-10-CertificationRequest", &((*crq)->crq)); if (result != ASN1_SUCCESS) { gnutls_assert(); gnutls_free(*crq); return _gnutls_asn2err(result); } return 0; } /** * gnutls_x509_crq_deinit: * @crq: the type to be deinitialized * * This function will deinitialize a PKCS#10 certificate request * structure. **/ void gnutls_x509_crq_deinit(gnutls_x509_crq_t crq) { if (!crq) return; if (crq->crq) asn1_delete_structure(&crq->crq); gnutls_free(crq); } #define PEM_CRQ "NEW CERTIFICATE REQUEST" #define PEM_CRQ2 "CERTIFICATE REQUEST" /** * gnutls_x509_crq_import: * @crq: The data to store the parsed certificate request. * @data: The DER or PEM encoded certificate. * @format: One of DER or PEM * * This function will convert the given DER or PEM encoded certificate * request to a #gnutls_x509_crq_t type. The output will be * stored in @crq. * * If the Certificate is PEM encoded it should have a header of "NEW * CERTIFICATE REQUEST". * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_import(gnutls_x509_crq_t crq, const gnutls_datum_t * data, gnutls_x509_crt_fmt_t format) { int result = 0, need_free = 0; gnutls_datum_t _data; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } _data.data = data->data; _data.size = data->size; /* If the Certificate is in PEM format then decode it */ if (format == GNUTLS_X509_FMT_PEM) { /* Try the first header */ result = _gnutls_fbase64_decode(PEM_CRQ, data->data, data->size, &_data); if (result < 0) /* Go for the second header */ result = _gnutls_fbase64_decode(PEM_CRQ2, data->data, data->size, &_data); if (result < 0) { gnutls_assert(); return result; } need_free = 1; } result = _asn1_strict_der_decode(&crq->crq, _data.data, _data.size, NULL); if (result != ASN1_SUCCESS) { result = _gnutls_asn2err(result); gnutls_assert(); goto cleanup; } result = 0; cleanup: if (need_free) _gnutls_free_datum(&_data); return result; } /** * gnutls_x509_crq_get_signature_algorithm: * @crq: should contain a #gnutls_x509_cr_t type * * This function will return a value of the #gnutls_sign_algorithm_t * enumeration that is the signature algorithm that has been used to * sign this certificate request. * * Since 3.6.0 this function never returns a negative error code. * Error cases and unknown/unsupported signature algorithms are * mapped to %GNUTLS_SIGN_UNKNOWN. * * Returns: a #gnutls_sign_algorithm_t value * * Since: 3.4.0 **/ int gnutls_x509_crq_get_signature_algorithm(gnutls_x509_crq_t crq) { return map_errs_to_zero(_gnutls_x509_get_signature_algorithm(crq->crq, "signatureAlgorithm")); } /** * gnutls_x509_crq_get_private_key_usage_period: * @crq: should contain a #gnutls_x509_crq_t type * @activation: The activation time * @expiration: The expiration time * @critical: the extension status * * This function will return the expiration and activation * times of the private key of the certificate. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * if the extension is not present, otherwise a negative error value. **/ int gnutls_x509_crq_get_private_key_usage_period(gnutls_x509_crq_t crq, time_t * activation, time_t * expiration, unsigned int *critical) { int result, ret; asn1_node c2 = NULL; uint8_t buf[128]; size_t buf_size = sizeof(buf); if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.16", 0, buf, &buf_size, critical); if (ret < 0) return gnutls_assert_val(ret); result = asn1_create_element (_gnutls_get_pkix(), "PKIX1.PrivateKeyUsagePeriod", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); ret = _gnutls_asn2err(result); goto cleanup; } result = _asn1_strict_der_decode(&c2, buf, buf_size, NULL); if (result != ASN1_SUCCESS) { gnutls_assert(); ret = _gnutls_asn2err(result); goto cleanup; } if (activation) *activation = _gnutls_x509_get_time(c2, "notBefore", 1); if (expiration) *expiration = _gnutls_x509_get_time(c2, "notAfter", 1); ret = 0; cleanup: asn1_delete_structure(&c2); return ret; } /** * gnutls_x509_crq_get_dn: * @crq: should contain a #gnutls_x509_crq_t type * @buf: a pointer to a structure to hold the name (may be %NULL) * @buf_size: initially holds the size of @buf * * This function will copy the name of the Certificate request subject * to the provided buffer. The name will be in the form * "C=xxxx,O=yyyy,CN=zzzz" as described in RFC 2253. The output string * @buf will be ASCII or UTF-8 encoded, depending on the certificate * data. * * This function does not output a fully RFC4514 compliant string, if * that is required see gnutls_x509_crq_get_dn3(). * * Returns: %GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is not * long enough, and in that case the *@buf_size will be updated with * the required size. On success 0 is returned. **/ int gnutls_x509_crq_get_dn(gnutls_x509_crq_t crq, char *buf, size_t * buf_size) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_parse_dn(crq->crq, "certificationRequestInfo.subject.rdnSequence", buf, buf_size, GNUTLS_X509_DN_FLAG_COMPAT); } /** * gnutls_x509_crq_get_dn2: * @crq: should contain a #gnutls_x509_crq_t type * @dn: a pointer to a structure to hold the name; must be freed using gnutls_free() * * This function will allocate buffer and copy the name of the Certificate * request. The name will be in the form "C=xxxx,O=yyyy,CN=zzzz" as * described in RFC4514. The output string will be ASCII or UTF-8 * encoded, depending on the certificate data. * * This function does not output a fully RFC4514 compliant string, if * that is required see gnutls_x509_crq_get_dn3(). * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. and a negative error code on error. * * Since: 3.1.10 **/ int gnutls_x509_crq_get_dn2(gnutls_x509_crq_t crq, gnutls_datum_t * dn) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_get_dn(crq->crq, "certificationRequestInfo.subject.rdnSequence", dn, GNUTLS_X509_DN_FLAG_COMPAT); } /** * gnutls_x509_crq_get_dn3: * @crq: should contain a #gnutls_x509_crq_t type * @dn: a pointer to a structure to hold the name; must be freed using gnutls_free() * @flags: zero or %GNUTLS_X509_DN_FLAG_COMPAT * * This function will allocate buffer and copy the name of the Certificate * request. The name will be in the form "C=xxxx,O=yyyy,CN=zzzz" as * described in RFC4514. The output string will be ASCII or UTF-8 * encoded, depending on the certificate data. * * When the flag %GNUTLS_X509_DN_FLAG_COMPAT is specified, the output * format will match the format output by previous to 3.5.6 versions of GnuTLS * which was not not fully RFC4514-compliant. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. and a negative error code on error. * * Since: 3.5.7 **/ int gnutls_x509_crq_get_dn3(gnutls_x509_crq_t crq, gnutls_datum_t * dn, unsigned flags) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_get_dn(crq->crq, "certificationRequestInfo.subject.rdnSequence", dn, flags); } /** * gnutls_x509_crq_get_dn_by_oid: * @crq: should contain a gnutls_x509_crq_t type * @oid: holds an Object Identifier in a null terminated string * @indx: In case multiple same OIDs exist in the RDN, this specifies * which to get. Use (0) to get the first one. * @raw_flag: If non-zero returns the raw DER data of the DN part. * @buf: a pointer to a structure to hold the name (may be %NULL) * @buf_size: initially holds the size of @buf * * This function will extract the part of the name of the Certificate * request subject, specified by the given OID. The output will be * encoded as described in RFC2253. The output string will be ASCII * or UTF-8 encoded, depending on the certificate data. * * Some helper macros with popular OIDs can be found in gnutls/x509.h * If raw flag is (0), this function will only return known OIDs as * text. Other OIDs will be DER encoded, as described in RFC2253 -- * in hex format with a '\#' prefix. You can check about known OIDs * using gnutls_x509_dn_oid_known(). * * Returns: %GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is * not long enough, and in that case the *@buf_size will be * updated with the required size. On success 0 is returned. **/ int gnutls_x509_crq_get_dn_by_oid(gnutls_x509_crq_t crq, const char *oid, unsigned indx, unsigned int raw_flag, void *buf, size_t * buf_size) { gnutls_datum_t td; int ret; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _gnutls_x509_parse_dn_oid (crq->crq, "certificationRequestInfo.subject.rdnSequence", oid, indx, raw_flag, &td); if (ret < 0) return gnutls_assert_val(ret); return _gnutls_strdatum_to_buf(&td, buf, buf_size); } /** * gnutls_x509_crq_get_dn_oid: * @crq: should contain a gnutls_x509_crq_t type * @indx: Specifies which DN OID to get. Use (0) to get the first one. * @oid: a pointer to a structure to hold the name (may be %NULL) * @sizeof_oid: initially holds the size of @oid * * This function will extract the requested OID of the name of the * certificate request subject, specified by the given index. * * Returns: %GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is * not long enough, and in that case the *@sizeof_oid will be * updated with the required size. On success 0 is returned. **/ int gnutls_x509_crq_get_dn_oid(gnutls_x509_crq_t crq, unsigned indx, void *oid, size_t * sizeof_oid) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_get_dn_oid(crq->crq, "certificationRequestInfo.subject.rdnSequence", indx, oid, sizeof_oid); } /** * gnutls_x509_crq_get_challenge_password: * @crq: should contain a #gnutls_x509_crq_t type * @pass: will hold a (0)-terminated password string * @pass_size: Initially holds the size of @pass. * * This function will return the challenge password in the request. * The challenge password is intended to be used for requesting a * revocation of the certificate. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_get_challenge_password(gnutls_x509_crq_t crq, char *pass, size_t * pass_size) { gnutls_datum_t td; int ret; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _x509_parse_attribute(crq->crq, "certificationRequestInfo.attributes", "1.2.840.113549.1.9.7", 0, 0, &td); if (ret < 0) return gnutls_assert_val(ret); return _gnutls_strdatum_to_buf(&td, pass, pass_size); } /** * gnutls_x509_crq_set_attribute_by_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: holds an Object Identifier in a null-terminated string * @buf: a pointer to a structure that holds the attribute data * @buf_size: holds the size of @buf * * This function will set the attribute in the certificate request * specified by the given Object ID. The provided attribute must be be DER * encoded. * * Attributes in a certificate request is an optional set of data * appended to the request. Their interpretation depends on the CA policy. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_attribute_by_oid(gnutls_x509_crq_t crq, const char *oid, void *buf, size_t buf_size) { gnutls_datum_t data; data.data = buf; data.size = buf_size; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _x509_set_attribute(crq->crq, "certificationRequestInfo.attributes", oid, &data); } /** * gnutls_x509_crq_get_attribute_by_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: holds an Object Identifier in null-terminated string * @indx: In case multiple same OIDs exist in the attribute list, this * specifies which to get, use (0) to get the first one * @buf: a pointer to a structure to hold the attribute data (may be %NULL) * @buf_size: initially holds the size of @buf * * This function will return the attribute in the certificate request * specified by the given Object ID. The attribute will be DER * encoded. * * Attributes in a certificate request is an optional set of data * appended to the request. Their interpretation depends on the CA policy. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_get_attribute_by_oid(gnutls_x509_crq_t crq, const char *oid, unsigned indx, void *buf, size_t * buf_size) { int ret; gnutls_datum_t td; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _x509_parse_attribute(crq->crq, "certificationRequestInfo.attributes", oid, indx, 1, &td); if (ret < 0) return gnutls_assert_val(ret); return _gnutls_strdatum_to_buf(&td, buf, buf_size); } /** * gnutls_x509_crq_set_dn_by_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: holds an Object Identifier in a (0)-terminated string * @raw_flag: must be 0, or 1 if the data are DER encoded * @data: a pointer to the input data * @sizeof_data: holds the size of @data * * This function will set the part of the name of the Certificate * request subject, specified by the given OID. The input string * should be ASCII or UTF-8 encoded. * * Some helper macros with popular OIDs can be found in gnutls/x509.h * With this function you can only set the known OIDs. You can test * for known OIDs using gnutls_x509_dn_oid_known(). For OIDs that are * not known (by gnutls) you should properly DER encode your data, and * call this function with raw_flag set. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_dn_by_oid(gnutls_x509_crq_t crq, const char *oid, unsigned int raw_flag, const void *data, unsigned int sizeof_data) { if (sizeof_data == 0 || data == NULL || crq == NULL) { return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_set_dn_oid(crq->crq, "certificationRequestInfo.subject", oid, raw_flag, data, sizeof_data); } /** * gnutls_x509_crq_set_version: * @crq: should contain a #gnutls_x509_crq_t type * @version: holds the version number, for v1 Requests must be 1 * * This function will set the version of the certificate request. For * version 1 requests this must be one. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_version(gnutls_x509_crq_t crq, unsigned int version) { int result; unsigned char null = version; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } if (null > 0) null--; result = asn1_write_value(crq->crq, "certificationRequestInfo.version", &null, 1); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } return 0; } /** * gnutls_x509_crq_get_version: * @crq: should contain a #gnutls_x509_crq_t type * * This function will return the version of the specified Certificate * request. * * Returns: version of certificate request, or a negative error code on * error. **/ int gnutls_x509_crq_get_version(gnutls_x509_crq_t crq) { uint8_t version[8]; int len, result; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } len = sizeof(version); if ((result = asn1_read_value(crq->crq, "certificationRequestInfo.version", version, &len)) != ASN1_SUCCESS) { if (result == ASN1_ELEMENT_NOT_FOUND) return 1; /* the DEFAULT version */ gnutls_assert(); return _gnutls_asn2err(result); } return (int) version[0] + 1; } /** * gnutls_x509_crq_set_key: * @crq: should contain a #gnutls_x509_crq_t type * @key: holds a private key * * This function will set the public parameters from the given private * key to the request. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_key(gnutls_x509_crq_t crq, gnutls_x509_privkey_t key) { int result; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = _gnutls_x509_encode_and_copy_PKI_params (crq->crq, "certificationRequestInfo.subjectPKInfo", &key->params); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_get_key_rsa_raw: * @crq: Holds the certificate * @m: will hold the modulus * @e: will hold the public exponent * * This function will export the RSA public key's parameters found in * the given structure. The new parameters will be allocated using * gnutls_malloc() and will be stored in the appropriate datum. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_key_rsa_raw(gnutls_x509_crq_t crq, gnutls_datum_t * m, gnutls_datum_t * e) { int ret; gnutls_pk_params_st params; gnutls_pk_params_init(¶ms); if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = gnutls_x509_crq_get_pk_algorithm(crq, NULL); if (ret != GNUTLS_PK_RSA) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _gnutls_x509_crq_get_mpis(crq, ¶ms); if (ret < 0) { gnutls_assert(); return ret; } ret = _gnutls_mpi_dprint(params.params[0], m); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = _gnutls_mpi_dprint(params.params[1], e); if (ret < 0) { gnutls_assert(); _gnutls_free_datum(m); goto cleanup; } ret = 0; cleanup: gnutls_pk_params_release(¶ms); return ret; } /** * gnutls_x509_crq_set_key_rsa_raw: * @crq: should contain a #gnutls_x509_crq_t type * @m: holds the modulus * @e: holds the public exponent * * This function will set the public parameters from the given private * key to the request. Only RSA keys are currently supported. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.6.0 **/ int gnutls_x509_crq_set_key_rsa_raw(gnutls_x509_crq_t crq, const gnutls_datum_t * m, const gnutls_datum_t * e) { int result, ret; size_t siz = 0; gnutls_pk_params_st temp_params; gnutls_pk_params_init(&temp_params); if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } memset(&temp_params, 0, sizeof(temp_params)); siz = m->size; if (_gnutls_mpi_init_scan_nz(&temp_params.params[0], m->data, siz)) { gnutls_assert(); ret = GNUTLS_E_MPI_SCAN_FAILED; goto error; } siz = e->size; if (_gnutls_mpi_init_scan_nz(&temp_params.params[1], e->data, siz)) { gnutls_assert(); ret = GNUTLS_E_MPI_SCAN_FAILED; goto error; } temp_params.params_nr = RSA_PUBLIC_PARAMS; temp_params.algo = GNUTLS_PK_RSA; result = _gnutls_x509_encode_and_copy_PKI_params (crq->crq, "certificationRequestInfo.subjectPKInfo", &temp_params); if (result < 0) { gnutls_assert(); ret = result; goto error; } ret = 0; error: gnutls_pk_params_release(&temp_params); return ret; } /** * gnutls_x509_crq_set_challenge_password: * @crq: should contain a #gnutls_x509_crq_t type * @pass: holds a (0)-terminated password * * This function will set a challenge password to be used when * revoking the request. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_challenge_password(gnutls_x509_crq_t crq, const char *pass) { int result; char *password = NULL; if (crq == NULL || pass == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* Add the attribute. */ result = asn1_write_value(crq->crq, "certificationRequestInfo.attributes", "NEW", 1); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } if (pass) { gnutls_datum_t out; result = _gnutls_utf8_password_normalize(pass, strlen(pass), &out, 0); if (result < 0) return gnutls_assert_val(result); password = (char*)out.data; } assert(password != NULL); result = _gnutls_x509_encode_and_write_attribute ("1.2.840.113549.1.9.7", crq->crq, "certificationRequestInfo.attributes.?LAST", password, strlen(password), 1); if (result < 0) { gnutls_assert(); goto cleanup; } result = 0; cleanup: gnutls_free(password); return result; } /** * gnutls_x509_crq_sign2: * @crq: should contain a #gnutls_x509_crq_t type * @key: holds a private key * @dig: The message digest to use, i.e., %GNUTLS_DIG_SHA256 * @flags: must be 0 * * This function will sign the certificate request with a private key. * This must be the same key as the one used in * gnutls_x509_crt_set_key() since a certificate request is self * signed. * * This must be the last step in a certificate request generation * since all the previously set parameters are now signed. * * A known limitation of this function is, that a newly-signed request will not * be fully functional (e.g., for signature verification), until it * is exported an re-imported. * * After GnuTLS 3.6.1 the value of @dig may be %GNUTLS_DIG_UNKNOWN, * and in that case, a suitable but reasonable for the key algorithm will be selected. * * Returns: %GNUTLS_E_SUCCESS on success, otherwise a negative error code. * %GNUTLS_E_ASN1_VALUE_NOT_FOUND is returned if you didn't set all * information in the certificate request (e.g., the version using * gnutls_x509_crq_set_version()). * **/ int gnutls_x509_crq_sign2(gnutls_x509_crq_t crq, gnutls_x509_privkey_t key, gnutls_digest_algorithm_t dig, unsigned int flags) { int result; gnutls_privkey_t privkey; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = gnutls_privkey_init(&privkey); if (result < 0) { gnutls_assert(); return result; } result = gnutls_privkey_import_x509(privkey, key, 0); if (result < 0) { gnutls_assert(); goto fail; } result = gnutls_x509_crq_privkey_sign(crq, privkey, dig, flags); if (result < 0) { gnutls_assert(); goto fail; } result = 0; fail: gnutls_privkey_deinit(privkey); return result; } /** * gnutls_x509_crq_sign: * @crq: should contain a #gnutls_x509_crq_t type * @key: holds a private key * * This function is the same a gnutls_x509_crq_sign2() with no flags, * and an appropriate hash algorithm. The hash algorithm used may * vary between versions of GnuTLS, and it is tied to the security * level of the issuer's public key. * * A known limitation of this function is, that a newly-signed request will not * be fully functional (e.g., for signature verification), until it * is exported an re-imported. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. */ int gnutls_x509_crq_sign(gnutls_x509_crq_t crq, gnutls_x509_privkey_t key) { return gnutls_x509_crq_sign2(crq, key, 0, 0); } /** * gnutls_x509_crq_export: * @crq: should contain a #gnutls_x509_crq_t type * @format: the format of output params. One of PEM or DER. * @output_data: will contain a certificate request PEM or DER encoded * @output_data_size: holds the size of output_data (and will be * replaced by the actual size of parameters) * * This function will export the certificate request to a PEM or DER * encoded PKCS10 structure. * * If the buffer provided is not long enough to hold the output, then * %GNUTLS_E_SHORT_MEMORY_BUFFER will be returned and * *@output_data_size will be updated. * * If the structure is PEM encoded, it will have a header of "BEGIN * NEW CERTIFICATE REQUEST". * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_export(gnutls_x509_crq_t crq, gnutls_x509_crt_fmt_t format, void *output_data, size_t * output_data_size) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_export_int(crq->crq, format, PEM_CRQ, output_data, output_data_size); } /** * gnutls_x509_crq_export2: * @crq: should contain a #gnutls_x509_crq_t type * @format: the format of output params. One of PEM or DER. * @out: will contain a certificate request PEM or DER encoded * * This function will export the certificate request to a PEM or DER * encoded PKCS10 structure. * * The output buffer is allocated using gnutls_malloc(). * * If the structure is PEM encoded, it will have a header of "BEGIN * NEW CERTIFICATE REQUEST". * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since 3.1.3 **/ int gnutls_x509_crq_export2(gnutls_x509_crq_t crq, gnutls_x509_crt_fmt_t format, gnutls_datum_t * out) { if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } return _gnutls_x509_export_int2(crq->crq, format, PEM_CRQ, out); } /** * gnutls_x509_crq_get_pk_algorithm: * @crq: should contain a #gnutls_x509_crq_t type * @bits: if bits is non-%NULL it will hold the size of the parameters' in bits * * This function will return the public key algorithm of a PKCS#10 * certificate request. * * If bits is non-%NULL, it should have enough size to hold the * parameters size in bits. For RSA the bits returned is the modulus. * For DSA the bits returned are of the public exponent. * * Returns: a member of the #gnutls_pk_algorithm_t enumeration on * success, or a negative error code on error. **/ int gnutls_x509_crq_get_pk_algorithm(gnutls_x509_crq_t crq, unsigned int *bits) { int result; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = _gnutls_x509_get_pk_algorithm (crq->crq, "certificationRequestInfo.subjectPKInfo", NULL, bits); if (result < 0) { gnutls_assert(); return result; } return result; } /** * gnutls_x509_crq_get_spki; * @crq: should contain a #gnutls_x509_crq_t type * @spki: a SubjectPublicKeyInfo structure of type #gnutls_x509_spki_t * @flags: must be zero * * This function will return the public key information of a PKCS#10 * certificate request. The provided @spki must be initialized. * * Returns: Zero on success, or a negative error code on error. **/ int gnutls_x509_crq_get_spki(gnutls_x509_crq_t crq, gnutls_x509_spki_t spki, unsigned int flags) { int result; gnutls_x509_spki_st params; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } memset(¶ms, 0, sizeof(params)); spki->pk = gnutls_x509_crq_get_pk_algorithm(crq, NULL); result = _gnutls_x509_crq_read_spki_params(crq, ¶ms); if (result < 0) { gnutls_assert(); return result; } if (params.pk == GNUTLS_PK_UNKNOWN) return gnutls_assert_val(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE); spki->rsa_pss_dig = params.rsa_pss_dig; spki->salt_size = params.salt_size; return 0; } /** * gnutls_x509_crq_get_signature_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: a pointer to a buffer to hold the OID (may be null) * @oid_size: initially holds the size of @oid * * This function will return the OID of the signature algorithm * that has been used to sign this certificate request. This function * is useful in the case gnutls_x509_crq_get_signature_algorithm() * returned %GNUTLS_SIGN_UNKNOWN. * * Returns: zero or a negative error code on error. * * Since: 3.5.0 **/ int gnutls_x509_crq_get_signature_oid(gnutls_x509_crq_t crq, char *oid, size_t *oid_size) { char str[MAX_OID_SIZE]; int len, result, ret; gnutls_datum_t out; len = sizeof(str); result = asn1_read_value(crq->crq, "signatureAlgorithm.algorithm", str, &len); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } out.data = (void*)str; out.size = len; ret = _gnutls_copy_string(&out, (void*)oid, oid_size); if (ret < 0) { gnutls_assert(); return ret; } return 0; } /** * gnutls_x509_crq_get_pk_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: a pointer to a buffer to hold the OID (may be null) * @oid_size: initially holds the size of @oid * * This function will return the OID of the public key algorithm * on that certificate request. This function * is useful in the case gnutls_x509_crq_get_pk_algorithm() * returned %GNUTLS_PK_UNKNOWN. * * Returns: zero or a negative error code on error. * * Since: 3.5.0 **/ int gnutls_x509_crq_get_pk_oid(gnutls_x509_crq_t crq, char *oid, size_t *oid_size) { char str[MAX_OID_SIZE]; int len, result, ret; gnutls_datum_t out; len = sizeof(str); result = asn1_read_value(crq->crq, "certificationRequestInfo.subjectPKInfo.algorithm.algorithm", str, &len); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } out.data = (void*)str; out.size = len; ret = _gnutls_copy_string(&out, (void*)oid, oid_size); if (ret < 0) { gnutls_assert(); return ret; } return 0; } /** * gnutls_x509_crq_get_attribute_info: * @crq: should contain a #gnutls_x509_crq_t type * @indx: Specifies which attribute number to get. Use (0) to get the first one. * @oid: a pointer to a structure to hold the OID * @sizeof_oid: initially holds the maximum size of @oid, on return * holds actual size of @oid. * * This function will return the requested attribute OID in the * certificate, and the critical flag for it. The attribute OID will * be stored as a string in the provided buffer. Use * gnutls_x509_crq_get_attribute_data() to extract the data. * * If the buffer provided is not long enough to hold the output, then * *@sizeof_oid is updated and %GNUTLS_E_SHORT_MEMORY_BUFFER will be * returned. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If your have reached the * last extension available %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_attribute_info(gnutls_x509_crq_t crq, unsigned indx, void *oid, size_t * sizeof_oid) { int result; char name[MAX_NAME_SIZE]; int len; if (!crq) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } snprintf(name, sizeof(name), "certificationRequestInfo.attributes.?%u.type", indx + 1); len = *sizeof_oid; result = asn1_read_value(crq->crq, name, oid, &len); *sizeof_oid = len; if (result == ASN1_ELEMENT_NOT_FOUND) return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; else if (result < 0) { gnutls_assert(); return _gnutls_asn2err(result); } return 0; } /** * gnutls_x509_crq_get_attribute_data: * @crq: should contain a #gnutls_x509_crq_t type * @indx: Specifies which attribute number to get. Use (0) to get the first one. * @data: a pointer to a structure to hold the data (may be null) * @sizeof_data: initially holds the size of @oid * * This function will return the requested attribute data in the * certificate request. The attribute data will be stored as a string in the * provided buffer. * * Use gnutls_x509_crq_get_attribute_info() to extract the OID. * Use gnutls_x509_crq_get_attribute_by_oid() instead, * if you want to get data indexed by the attribute OID rather than * sequence. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If your have reached the * last extension available %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_attribute_data(gnutls_x509_crq_t crq, unsigned indx, void *data, size_t * sizeof_data) { int result, len; char name[MAX_NAME_SIZE]; if (!crq) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } snprintf(name, sizeof(name), "certificationRequestInfo.attributes.?%u.values.?1", indx + 1); len = *sizeof_data; result = asn1_read_value(crq->crq, name, data, &len); *sizeof_data = len; if (result == ASN1_ELEMENT_NOT_FOUND) return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; else if (result < 0) { gnutls_assert(); return _gnutls_asn2err(result); } return 0; } /** * gnutls_x509_crq_get_extension_info: * @crq: should contain a #gnutls_x509_crq_t type * @indx: Specifies which extension number to get. Use (0) to get the first one. * @oid: a pointer to store the OID * @sizeof_oid: initially holds the maximum size of @oid, on return * holds actual size of @oid. * @critical: output variable with critical flag, may be NULL. * * This function will return the requested extension OID in the * certificate, and the critical flag for it. The extension OID will * be stored as a string in the provided buffer. Use * gnutls_x509_crq_get_extension_data() to extract the data. * * If the buffer provided is not long enough to hold the output, then * *@sizeof_oid is updated and %GNUTLS_E_SHORT_MEMORY_BUFFER will be * returned. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If your have reached the * last extension available %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_extension_info(gnutls_x509_crq_t crq, unsigned indx, void *oid, size_t * sizeof_oid, unsigned int *critical) { int result; char str_critical[10]; char name[MAX_NAME_SIZE]; char *extensions = NULL; size_t extensions_size = 0; asn1_node c2; int len; if (!crq) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* read extensionRequest */ result = gnutls_x509_crq_get_attribute_by_oid(crq, "1.2.840.113549.1.9.14", 0, NULL, &extensions_size); if (result == GNUTLS_E_SHORT_MEMORY_BUFFER) { extensions = gnutls_malloc(extensions_size); if (extensions == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_attribute_by_oid(crq, "1.2.840.113549.1.9.14", 0, extensions, &extensions_size); } if (result < 0) { gnutls_assert(); goto out; } result = asn1_create_element(_gnutls_get_pkix(), "PKIX1.Extensions", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); result = _gnutls_asn2err(result); goto out; } result = _asn1_strict_der_decode(&c2, extensions, extensions_size, NULL); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); result = _gnutls_asn2err(result); goto out; } snprintf(name, sizeof(name), "?%u.extnID", indx + 1); len = *sizeof_oid; result = asn1_read_value(c2, name, oid, &len); *sizeof_oid = len; if (result == ASN1_ELEMENT_NOT_FOUND) { asn1_delete_structure(&c2); result = GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; goto out; } else if (result < 0) { gnutls_assert(); asn1_delete_structure(&c2); result = _gnutls_asn2err(result); goto out; } snprintf(name, sizeof(name), "?%u.critical", indx + 1); len = sizeof(str_critical); result = asn1_read_value(c2, name, str_critical, &len); asn1_delete_structure(&c2); if (result < 0) { gnutls_assert(); result = _gnutls_asn2err(result); goto out; } if (critical) { if (str_critical[0] == 'T') *critical = 1; else *critical = 0; } result = 0; out: gnutls_free(extensions); return result; } /** * gnutls_x509_crq_get_extension_data: * @crq: should contain a #gnutls_x509_crq_t type * @indx: Specifies which extension number to get. Use (0) to get the first one. * @data: a pointer to a structure to hold the data (may be null) * @sizeof_data: initially holds the size of @oid * * This function will return the requested extension data in the * certificate. The extension data will be stored as a string in the * provided buffer. * * Use gnutls_x509_crq_get_extension_info() to extract the OID and * critical flag. Use gnutls_x509_crq_get_extension_by_oid() instead, * if you want to get data indexed by the extension OID rather than * sequence. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If your have reached the * last extension available %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_extension_data(gnutls_x509_crq_t crq, unsigned indx, void *data, size_t * sizeof_data) { int ret; gnutls_datum_t raw; ret = gnutls_x509_crq_get_extension_data2(crq, indx, &raw); if (ret < 0) return gnutls_assert_val(ret); ret = _gnutls_copy_data(&raw, data, sizeof_data); if (ret == GNUTLS_E_SHORT_MEMORY_BUFFER && data == NULL) ret = 0; gnutls_free(raw.data); return ret; } /** * gnutls_x509_crq_get_extension_data2: * @crq: should contain a #gnutls_x509_crq_t type * @extension_id: An X.509 extension OID. * @indx: Specifies which extension OID to read. Use (0) to get the first one. * @data: will contain the extension DER-encoded data * * This function will return the requested extension data in the * certificate request. The extension data will be allocated using * gnutls_malloc(). * * Use gnutls_x509_crq_get_extension_info() to extract the OID. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, * otherwise a negative error code is returned. If you have reached the * last extension available %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE * will be returned. * * Since: 3.3.0 **/ int gnutls_x509_crq_get_extension_data2(gnutls_x509_crq_t crq, unsigned indx, gnutls_datum_t * data) { int ret, result; char name[MAX_NAME_SIZE]; unsigned char *extensions = NULL; size_t extensions_size = 0; asn1_node c2 = NULL; if (!crq) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* read extensionRequest */ ret = gnutls_x509_crq_get_attribute_by_oid(crq, "1.2.840.113549.1.9.14", 0, NULL, &extensions_size); if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER) { gnutls_assert(); if (ret == 0) return GNUTLS_E_INTERNAL_ERROR; return ret; } extensions = gnutls_malloc(extensions_size); if (extensions == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } ret = gnutls_x509_crq_get_attribute_by_oid(crq, "1.2.840.113549.1.9.14", 0, extensions, &extensions_size); if (ret < 0) { gnutls_assert(); goto cleanup; } result = asn1_create_element(_gnutls_get_pkix(), "PKIX1.Extensions", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); ret = _gnutls_asn2err(result); goto cleanup; } result = _asn1_strict_der_decode(&c2, extensions, extensions_size, NULL); if (result != ASN1_SUCCESS) { gnutls_assert(); ret = _gnutls_asn2err(result); goto cleanup; } snprintf(name, sizeof(name), "?%u.extnValue", indx + 1); ret = _gnutls_x509_read_value(c2, name, data); if (ret == GNUTLS_E_ASN1_ELEMENT_NOT_FOUND) { ret = GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; goto cleanup; } else if (ret < 0) { gnutls_assert(); goto cleanup; } ret = 0; cleanup: asn1_delete_structure(&c2); gnutls_free(extensions); return ret; } /** * gnutls_x509_crq_get_key_usage: * @crq: should contain a #gnutls_x509_crq_t type * @key_usage: where the key usage bits will be stored * @critical: will be non-zero if the extension is marked as critical * * This function will return certificate's key usage, by reading the * keyUsage X.509 extension (2.5.29.15). The key usage value will * ORed values of the: %GNUTLS_KEY_DIGITAL_SIGNATURE, * %GNUTLS_KEY_NON_REPUDIATION, %GNUTLS_KEY_KEY_ENCIPHERMENT, * %GNUTLS_KEY_DATA_ENCIPHERMENT, %GNUTLS_KEY_KEY_AGREEMENT, * %GNUTLS_KEY_KEY_CERT_SIGN, %GNUTLS_KEY_CRL_SIGN, * %GNUTLS_KEY_ENCIPHER_ONLY, %GNUTLS_KEY_DECIPHER_ONLY. * * Returns: the certificate key usage, or a negative error code in case of * parsing error. If the certificate does not contain the keyUsage * extension %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE will be * returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_key_usage(gnutls_x509_crq_t crq, unsigned int *key_usage, unsigned int *critical) { int result; uint8_t buf[128]; size_t buf_size = sizeof(buf); gnutls_datum_t bd; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.15", 0, buf, &buf_size, critical); if (result < 0) { gnutls_assert(); return result; } bd.data = buf; bd.size = buf_size; result = gnutls_x509_ext_import_key_usage(&bd, key_usage); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_get_basic_constraints: * @crq: should contain a #gnutls_x509_crq_t type * @critical: will be non-zero if the extension is marked as critical * @ca: pointer to output integer indicating CA status, may be NULL, * value is 1 if the certificate CA flag is set, 0 otherwise. * @pathlen: pointer to output integer indicating path length (may be * NULL), non-negative error codes indicate a present pathLenConstraint * field and the actual value, -1 indicate that the field is absent. * * This function will read the certificate's basic constraints, and * return the certificates CA status. It reads the basicConstraints * X.509 extension (2.5.29.19). * * Returns: If the certificate is a CA a positive value will be * returned, or (0) if the certificate does not have CA flag set. * A negative error code may be returned in case of errors. If the * certificate does not contain the basicConstraints extension * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_basic_constraints(gnutls_x509_crq_t crq, unsigned int *critical, unsigned int *ca, int *pathlen) { int result; unsigned int tmp_ca; uint8_t buf[256]; size_t buf_size = sizeof(buf); gnutls_datum_t bd; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.19", 0, buf, &buf_size, critical); if (result < 0) { gnutls_assert(); return result; } bd.data = buf; bd.size = buf_size; result = gnutls_x509_ext_import_basic_constraints(&bd, &tmp_ca, pathlen); if (ca) *ca = tmp_ca; if (result < 0) { gnutls_assert(); return result; } return tmp_ca; } static int get_subject_alt_name(gnutls_x509_crq_t crq, unsigned int seq, void *ret, size_t * ret_size, unsigned int *ret_type, unsigned int *critical, int othername_oid) { int result; asn1_node c2 = NULL; gnutls_x509_subject_alt_name_t type; gnutls_datum_t dnsname = { NULL, 0 }; size_t dns_size = 0; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } if (ret) memset(ret, 0, *ret_size); else *ret_size = 0; /* Extract extension. */ result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, NULL, &dns_size, critical); if (result < 0) { gnutls_assert(); return result; } dnsname.size = dns_size; dnsname.data = gnutls_malloc(dnsname.size); if (dnsname.data == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, dnsname.data, &dns_size, critical); if (result < 0) { gnutls_assert(); gnutls_free(dnsname.data); return result; } result = asn1_create_element (_gnutls_get_pkix(), "PKIX1.SubjectAltName", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); gnutls_free(dnsname.data); return _gnutls_asn2err(result); } result = _asn1_strict_der_decode(&c2, dnsname.data, dnsname.size, NULL); gnutls_free(dnsname.data); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); return _gnutls_asn2err(result); } result = _gnutls_parse_general_name(c2, "", seq, ret, ret_size, ret_type, othername_oid); asn1_delete_structure(&c2); if (result < 0) { return result; } type = result; return type; } /** * gnutls_x509_crq_get_subject_alt_name: * @crq: should contain a #gnutls_x509_crq_t type * @seq: specifies the sequence number of the alt name, 0 for the * first one, 1 for the second etc. * @ret: is the place where the alternative name will be copied to * @ret_size: holds the size of ret. * @ret_type: holds the #gnutls_x509_subject_alt_name_t name type * @critical: will be non-zero if the extension is marked as critical * (may be null) * * This function will return the alternative names, contained in the * given certificate. It is the same as * gnutls_x509_crq_get_subject_alt_name() except for the fact that it * will return the type of the alternative name in @ret_type even if * the function fails for some reason (i.e. the buffer provided is * not enough). * * Returns: the alternative subject name type on success, one of the * enumerated #gnutls_x509_subject_alt_name_t. It will return * %GNUTLS_E_SHORT_MEMORY_BUFFER if @ret_size is not large enough to * hold the value. In that case @ret_size will be updated with the * required size. If the certificate request does not have an * Alternative name with the specified sequence number then * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE is returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_subject_alt_name(gnutls_x509_crq_t crq, unsigned int seq, void *ret, size_t * ret_size, unsigned int *ret_type, unsigned int *critical) { return get_subject_alt_name(crq, seq, ret, ret_size, ret_type, critical, 0); } /** * gnutls_x509_crq_get_subject_alt_othername_oid: * @crq: should contain a #gnutls_x509_crq_t type * @seq: specifies the sequence number of the alt name (0 for the first one, 1 for the second etc.) * @ret: is the place where the otherName OID will be copied to * @ret_size: holds the size of ret. * * This function will extract the type OID of an otherName Subject * Alternative Name, contained in the given certificate, and return * the type as an enumerated element. * * This function is only useful if * gnutls_x509_crq_get_subject_alt_name() returned * %GNUTLS_SAN_OTHERNAME. * * Returns: the alternative subject name type on success, one of the * enumerated gnutls_x509_subject_alt_name_t. For supported OIDs, * it will return one of the virtual (GNUTLS_SAN_OTHERNAME_*) types, * e.g. %GNUTLS_SAN_OTHERNAME_XMPP, and %GNUTLS_SAN_OTHERNAME for * unknown OIDs. It will return %GNUTLS_E_SHORT_MEMORY_BUFFER if * @ret_size is not large enough to hold the value. In that case * @ret_size will be updated with the required size. If the * certificate does not have an Alternative name with the specified * sequence number and with the otherName type then * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE is returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_subject_alt_othername_oid(gnutls_x509_crq_t crq, unsigned int seq, void *ret, size_t * ret_size) { return get_subject_alt_name(crq, seq, ret, ret_size, NULL, NULL, 1); } /** * gnutls_x509_crq_get_extension_by_oid: * @crq: should contain a #gnutls_x509_crq_t type * @oid: holds an Object Identifier in a null terminated string * @indx: In case multiple same OIDs exist in the extensions, this * specifies which to get. Use (0) to get the first one. * @buf: a pointer to a structure to hold the name (may be null) * @buf_size: initially holds the size of @buf * @critical: will be non-zero if the extension is marked as critical * * This function will return the extension specified by the OID in * the certificate. The extensions will be returned as binary data * DER encoded, in the provided buffer. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If the certificate does not * contain the specified extension * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE will be returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_extension_by_oid(gnutls_x509_crq_t crq, const char *oid, unsigned indx, void *buf, size_t * buf_size, unsigned int *critical) { int result; unsigned int i; char _oid[MAX_OID_SIZE]; size_t oid_size; for (i = 0;; i++) { oid_size = sizeof(_oid); result = gnutls_x509_crq_get_extension_info(crq, i, _oid, &oid_size, critical); if (result < 0) { gnutls_assert(); return result; } if (strcmp(oid, _oid) == 0) { /* found */ if (indx == 0) return gnutls_x509_crq_get_extension_data(crq, i, buf, buf_size); else indx--; } } return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; } /** * gnutls_x509_crq_get_extension_by_oid2: * @crq: should contain a #gnutls_x509_crq_t type * @oid: holds an Object Identifier in a null terminated string * @indx: In case multiple same OIDs exist in the extensions, this * specifies which to get. Use (0) to get the first one. * @output: will hold the allocated extension data * @critical: will be non-zero if the extension is marked as critical * * This function will return the extension specified by the OID in * the certificate. The extensions will be returned as binary data * DER encoded, in the provided buffer. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error code in case of an error. If the certificate does not * contain the specified extension * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE will be returned. * * Since: 3.3.8 **/ int gnutls_x509_crq_get_extension_by_oid2(gnutls_x509_crq_t crq, const char *oid, unsigned indx, gnutls_datum_t *output, unsigned int *critical) { int result; unsigned int i; char _oid[MAX_OID_SIZE]; size_t oid_size; for (i = 0;; i++) { oid_size = sizeof(_oid); result = gnutls_x509_crq_get_extension_info(crq, i, _oid, &oid_size, critical); if (result < 0) { gnutls_assert(); return result; } if (strcmp(oid, _oid) == 0) { /* found */ if (indx == 0) return gnutls_x509_crq_get_extension_data2(crq, i, output); else indx--; } } return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; } /** * gnutls_x509_crq_set_subject_alt_name: * @crq: a certificate request of type #gnutls_x509_crq_t * @nt: is one of the #gnutls_x509_subject_alt_name_t enumerations * @data: The data to be set * @data_size: The size of data to be set * @flags: %GNUTLS_FSAN_SET to clear previous data or * %GNUTLS_FSAN_APPEND to append. * * This function will set the subject alternative name certificate * extension. It can set the following types: * * %GNUTLS_SAN_DNSNAME: as a text string * * %GNUTLS_SAN_RFC822NAME: as a text string * * %GNUTLS_SAN_URI: as a text string * * %GNUTLS_SAN_IPADDRESS: as a binary IP address (4 or 16 bytes) * * %GNUTLS_SAN_OTHERNAME_XMPP: as a UTF8 string * * Since version 3.5.7 the %GNUTLS_SAN_RFC822NAME, %GNUTLS_SAN_DNSNAME, and * %GNUTLS_SAN_OTHERNAME_XMPP are converted to ACE format when necessary. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.8.0 **/ int gnutls_x509_crq_set_subject_alt_name(gnutls_x509_crq_t crq, gnutls_x509_subject_alt_name_t nt, const void *data, unsigned int data_size, unsigned int flags) { int result = 0; gnutls_datum_t der_data = { NULL, 0 }; gnutls_datum_t prev_der_data = { NULL, 0 }; unsigned int critical = 0; size_t prev_data_size = 0; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* Check if the extension already exists. */ if (flags & GNUTLS_FSAN_APPEND) { result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, NULL, &prev_data_size, &critical); prev_der_data.size = prev_data_size; switch (result) { case GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE: /* Replacing non-existing data means the same as set data. */ break; case GNUTLS_E_SUCCESS: prev_der_data.data = gnutls_malloc(prev_der_data.size); if (prev_der_data.data == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, prev_der_data. data, &prev_data_size, &critical); if (result < 0) { gnutls_assert(); gnutls_free(prev_der_data.data); return result; } break; default: gnutls_assert(); return result; } } /* generate the extension. */ result = _gnutls_x509_ext_gen_subject_alt_name(nt, NULL, data, data_size, &prev_der_data, &der_data); gnutls_free(prev_der_data.data); if (result < 0) { gnutls_assert(); goto finish; } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.17", &der_data, critical); _gnutls_free_datum(&der_data); if (result < 0) { gnutls_assert(); return result; } return 0; finish: return result; } /** * gnutls_x509_crq_set_subject_alt_othername: * @crq: a certificate request of type #gnutls_x509_crq_t * @oid: is the othername OID * @data: The data to be set * @data_size: The size of data to be set * @flags: %GNUTLS_FSAN_SET to clear previous data or * %GNUTLS_FSAN_APPEND to append. * * This function will set the subject alternative name certificate * extension. It can set the following types: * * The values set must be binary values and must be properly DER encoded. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 3.5.0 **/ int gnutls_x509_crq_set_subject_alt_othername(gnutls_x509_crq_t crq, const char *oid, const void *data, unsigned int data_size, unsigned int flags) { int result = 0; gnutls_datum_t der_data = { NULL, 0 }; gnutls_datum_t encoded_data = { NULL, 0 }; gnutls_datum_t prev_der_data = { NULL, 0 }; unsigned int critical = 0; size_t prev_data_size = 0; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* Check if the extension already exists. */ if (flags & GNUTLS_FSAN_APPEND) { result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, NULL, &prev_data_size, &critical); prev_der_data.size = prev_data_size; switch (result) { case GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE: /* Replacing non-existing data means the same as set data. */ break; case GNUTLS_E_SUCCESS: prev_der_data.data = gnutls_malloc(prev_der_data.size); if (prev_der_data.data == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.17", 0, prev_der_data. data, &prev_data_size, &critical); if (result < 0) { gnutls_assert(); goto finish; } break; default: gnutls_assert(); return result; } } result = _gnutls_encode_othername_data(flags, data, data_size, &encoded_data); if (result < 0) { gnutls_assert(); goto finish; } /* generate the extension. */ result = _gnutls_x509_ext_gen_subject_alt_name(GNUTLS_SAN_OTHERNAME, oid, encoded_data.data, encoded_data.size, &prev_der_data, &der_data); if (result < 0) { gnutls_assert(); goto finish; } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.17", &der_data, critical); if (result < 0) { gnutls_assert(); goto finish; } result = 0; finish: _gnutls_free_datum(&prev_der_data); _gnutls_free_datum(&der_data); _gnutls_free_datum(&encoded_data); return result; } /** * gnutls_x509_crq_set_basic_constraints: * @crq: a certificate request of type #gnutls_x509_crq_t * @ca: true(1) or false(0) depending on the Certificate authority status. * @pathLenConstraint: non-negative error codes indicate maximum length of path, * and negative error codes indicate that the pathLenConstraints field should * not be present. * * This function will set the basicConstraints certificate extension. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.8.0 **/ int gnutls_x509_crq_set_basic_constraints(gnutls_x509_crq_t crq, unsigned int ca, int pathLenConstraint) { int result; gnutls_datum_t der_data; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* generate the extension. */ result = gnutls_x509_ext_export_basic_constraints(ca, pathLenConstraint, &der_data); if (result < 0) { gnutls_assert(); return result; } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.19", &der_data, 1); _gnutls_free_datum(&der_data); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_set_key_usage: * @crq: a certificate request of type #gnutls_x509_crq_t * @usage: an ORed sequence of the GNUTLS_KEY_* elements. * * This function will set the keyUsage certificate extension. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.8.0 **/ int gnutls_x509_crq_set_key_usage(gnutls_x509_crq_t crq, unsigned int usage) { int result; gnutls_datum_t der_data; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* generate the extension. */ result = gnutls_x509_ext_export_key_usage(usage, &der_data); if (result < 0) { gnutls_assert(); return result; } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.15", &der_data, 1); _gnutls_free_datum(&der_data); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_get_key_purpose_oid: * @crq: should contain a #gnutls_x509_crq_t type * @indx: This specifies which OID to return, use (0) to get the first one * @oid: a pointer to store the OID (may be %NULL) * @sizeof_oid: initially holds the size of @oid * @critical: output variable with critical flag, may be %NULL. * * This function will extract the key purpose OIDs of the Certificate * specified by the given index. These are stored in the Extended Key * Usage extension (2.5.29.37). See the GNUTLS_KP_* definitions for * human readable names. * * Returns: %GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is * not long enough, and in that case the *@sizeof_oid will be * updated with the required size. On success 0 is returned. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_key_purpose_oid(gnutls_x509_crq_t crq, unsigned indx, void *oid, size_t * sizeof_oid, unsigned int *critical) { char tmpstr[MAX_NAME_SIZE]; int result, len; gnutls_datum_t prev = { NULL, 0 }; asn1_node c2 = NULL; size_t prev_size = 0; if (oid) memset(oid, 0, *sizeof_oid); else *sizeof_oid = 0; /* Extract extension. */ result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.37", 0, NULL, &prev_size, critical); prev.size = prev_size; if (result < 0) { gnutls_assert(); return result; } prev.data = gnutls_malloc(prev.size); if (prev.data == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.37", 0, prev.data, &prev_size, critical); if (result < 0) { gnutls_assert(); gnutls_free(prev.data); return result; } result = asn1_create_element (_gnutls_get_pkix(), "PKIX1.ExtKeyUsageSyntax", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); gnutls_free(prev.data); return _gnutls_asn2err(result); } result = _asn1_strict_der_decode(&c2, prev.data, prev.size, NULL); gnutls_free(prev.data); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); return _gnutls_asn2err(result); } indx++; /* create a string like "?1" */ snprintf(tmpstr, sizeof(tmpstr), "?%u", indx); len = *sizeof_oid; result = asn1_read_value(c2, tmpstr, oid, &len); *sizeof_oid = len; asn1_delete_structure(&c2); if (result == ASN1_VALUE_NOT_FOUND || result == ASN1_ELEMENT_NOT_FOUND) { return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; } if (result != ASN1_SUCCESS) { if (result != ASN1_MEM_ERROR) gnutls_assert(); return _gnutls_asn2err(result); } return 0; } /** * gnutls_x509_crq_set_key_purpose_oid: * @crq: a certificate of type #gnutls_x509_crq_t * @oid: a pointer to a null-terminated string that holds the OID * @critical: Whether this extension will be critical or not * * This function will set the key purpose OIDs of the Certificate. * These are stored in the Extended Key Usage extension (2.5.29.37) * See the GNUTLS_KP_* definitions for human readable names. * * Subsequent calls to this function will append OIDs to the OID list. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 2.8.0 **/ int gnutls_x509_crq_set_key_purpose_oid(gnutls_x509_crq_t crq, const void *oid, unsigned int critical) { int result; gnutls_datum_t prev = { NULL, 0 }, der_data; asn1_node c2 = NULL; size_t prev_size = 0; /* Read existing extension, if there is one. */ result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.37", 0, NULL, &prev_size, &critical); prev.size = prev_size; switch (result) { case GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE: /* No existing extension, that's fine. */ break; case GNUTLS_E_SUCCESS: prev.data = gnutls_malloc(prev.size); if (prev.data == NULL) { gnutls_assert(); return GNUTLS_E_MEMORY_ERROR; } result = gnutls_x509_crq_get_extension_by_oid(crq, "2.5.29.37", 0, prev.data, &prev_size, &critical); if (result < 0) { gnutls_assert(); gnutls_free(prev.data); return result; } break; default: gnutls_assert(); return result; } result = asn1_create_element(_gnutls_get_pkix(), "PKIX1.ExtKeyUsageSyntax", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); gnutls_free(prev.data); return _gnutls_asn2err(result); } if (prev.data) { /* decode it. */ result = _asn1_strict_der_decode(&c2, prev.data, prev.size, NULL); gnutls_free(prev.data); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); return _gnutls_asn2err(result); } } /* generate the extension. */ /* 1. create a new element. */ result = asn1_write_value(c2, "", "NEW", 1); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); return _gnutls_asn2err(result); } /* 2. Add the OID. */ result = asn1_write_value(c2, "?LAST", oid, 1); if (result != ASN1_SUCCESS) { gnutls_assert(); asn1_delete_structure(&c2); return _gnutls_asn2err(result); } result = _gnutls_x509_der_encode(c2, "", &der_data, 0); asn1_delete_structure(&c2); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.37", &der_data, critical); _gnutls_free_datum(&der_data); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_get_key_id: * @crq: a certificate of type #gnutls_x509_crq_t * @flags: should be one of the flags from %gnutls_keyid_flags_t * @output_data: will contain the key ID * @output_data_size: holds the size of output_data (and will be * replaced by the actual size of parameters) * * This function will return a unique ID that depends on the public key * parameters. This ID can be used in checking whether a certificate * corresponds to the given private key. * * If the buffer provided is not long enough to hold the output, then * *@output_data_size is updated and GNUTLS_E_SHORT_MEMORY_BUFFER will * be returned. The output will normally be a SHA-1 hash output, * which is 20 bytes. * * Returns: In case of failure a negative error code will be * returned, and 0 on success. * * Since: 2.8.0 **/ int gnutls_x509_crq_get_key_id(gnutls_x509_crq_t crq, unsigned int flags, unsigned char *output_data, size_t * output_data_size) { int ret = 0; gnutls_pk_params_st params; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _gnutls_x509_crq_get_mpis(crq, ¶ms); if (ret < 0) { gnutls_assert(); return ret; } ret = _gnutls_get_key_id(¶ms, output_data, output_data_size, flags); gnutls_pk_params_release(¶ms); return ret; } /** * gnutls_x509_crq_privkey_sign: * @crq: should contain a #gnutls_x509_crq_t type * @key: holds a private key * @dig: The message digest to use, i.e., %GNUTLS_DIG_SHA1 * @flags: must be 0 * * This function will sign the certificate request with a private key. * This must be the same key as the one used in * gnutls_x509_crt_set_key() since a certificate request is self * signed. * * This must be the last step in a certificate request generation * since all the previously set parameters are now signed. * * A known limitation of this function is, that a newly-signed request will not * be fully functional (e.g., for signature verification), until it * is exported an re-imported. * * After GnuTLS 3.6.1 the value of @dig may be %GNUTLS_DIG_UNKNOWN, * and in that case, a suitable but reasonable for the key algorithm will be selected. * * Returns: %GNUTLS_E_SUCCESS on success, otherwise a negative error code. * %GNUTLS_E_ASN1_VALUE_NOT_FOUND is returned if you didn't set all * information in the certificate request (e.g., the version using * gnutls_x509_crq_set_version()). * * Since: 2.12.0 **/ int gnutls_x509_crq_privkey_sign(gnutls_x509_crq_t crq, gnutls_privkey_t key, gnutls_digest_algorithm_t dig, unsigned int flags) { int result; gnutls_datum_t signature; gnutls_datum_t tbs; gnutls_pk_algorithm_t pk; gnutls_x509_spki_st params; const gnutls_sign_entry_st *se; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } /* Make sure version field is set. */ if (gnutls_x509_crq_get_version(crq) == GNUTLS_E_ASN1_VALUE_NOT_FOUND) { result = gnutls_x509_crq_set_version(crq, 1); if (result < 0) { gnutls_assert(); return result; } } if (dig == 0) { /* attempt to find a reasonable choice */ gnutls_pubkey_t pubkey; int ret; ret = gnutls_pubkey_init(&pubkey); if (ret < 0) return gnutls_assert_val(ret); ret = gnutls_pubkey_import_privkey(pubkey, key, 0, 0); if (ret < 0) { gnutls_pubkey_deinit(pubkey); return gnutls_assert_val(ret); } ret = gnutls_pubkey_get_preferred_hash_algorithm(pubkey, &dig, NULL); gnutls_pubkey_deinit(pubkey); if (ret < 0) return gnutls_assert_val(ret); } result = _gnutls_privkey_get_spki_params(key, ¶ms); if (result < 0) { gnutls_assert(); return result; } pk = gnutls_privkey_get_pk_algorithm(key, NULL); result = _gnutls_privkey_update_spki_params(key, pk, dig, 0, ¶ms); if (result < 0) { gnutls_assert(); return result; } /* Step 1. Self sign the request. */ result = _gnutls_x509_get_tbs(crq->crq, "certificationRequestInfo", &tbs); if (result < 0) { gnutls_assert(); return result; } se = _gnutls_pk_to_sign_entry(params.pk, dig); if (se == NULL) return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST); FIX_SIGN_PARAMS(params, flags, dig); result = privkey_sign_and_hash_data(key, se, &tbs, &signature, ¶ms); gnutls_free(tbs.data); if (result < 0) { gnutls_assert(); return result; } /* Step 2. write the signature (bits) */ result = asn1_write_value(crq->crq, "signature", signature.data, signature.size * 8); _gnutls_free_datum(&signature); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } /* Step 3. Write the signatureAlgorithm field. */ result = _gnutls_x509_write_sign_params(crq->crq, "signatureAlgorithm", se, ¶ms); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_verify: * @crq: is the crq to be verified * @flags: Flags that may be used to change the verification algorithm. Use OR of the gnutls_certificate_verify_flags enumerations. * * This function will verify self signature in the certificate * request and return its status. * * Returns: In case of a verification failure %GNUTLS_E_PK_SIG_VERIFY_FAILED * is returned, and zero or positive code on success. * * Since 2.12.0 **/ int gnutls_x509_crq_verify(gnutls_x509_crq_t crq, unsigned int flags) { gnutls_datum_t data = { NULL, 0 }; gnutls_datum_t signature = { NULL, 0 }; gnutls_pk_params_st params; gnutls_x509_spki_st sign_params; const gnutls_sign_entry_st *se; int ret; gnutls_pk_params_init(¶ms); ret = _gnutls_x509_get_signed_data(crq->crq, NULL, "certificationRequestInfo", &data); if (ret < 0) { gnutls_assert(); return ret; } ret = _gnutls_x509_get_signature_algorithm(crq->crq, "signatureAlgorithm"); if (ret < 0) { gnutls_assert(); goto cleanup; } se = _gnutls_sign_to_entry(ret); if (se == NULL) { gnutls_assert(); ret = GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM; goto cleanup; } ret = _gnutls_x509_get_signature(crq->crq, "signature", &signature); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = _gnutls_x509_crq_get_mpis(crq, ¶ms); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = _gnutls_x509_read_sign_params(crq->crq, "signatureAlgorithm", &sign_params); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = pubkey_verify_data(se, hash_to_entry(se->hash), &data, &signature, ¶ms, &sign_params, flags); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = 0; cleanup: _gnutls_free_datum(&data); _gnutls_free_datum(&signature); gnutls_pk_params_release(¶ms); return ret; } /** * gnutls_x509_crq_set_private_key_usage_period: * @crq: a certificate of type #gnutls_x509_crq_t * @activation: The activation time * @expiration: The expiration time * * This function will set the private key usage period extension (2.5.29.16). * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_private_key_usage_period(gnutls_x509_crq_t crq, time_t activation, time_t expiration) { int result; gnutls_datum_t der_data; asn1_node c2 = NULL; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = asn1_create_element(_gnutls_get_pkix(), "PKIX1.PrivateKeyUsagePeriod", &c2); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); } result = _gnutls_x509_set_time(c2, "notBefore", activation, 1); if (result < 0) { gnutls_assert(); goto cleanup; } result = _gnutls_x509_set_time(c2, "notAfter", expiration, 1); if (result < 0) { gnutls_assert(); goto cleanup; } result = _gnutls_x509_der_encode(c2, "", &der_data, 0); if (result < 0) { gnutls_assert(); goto cleanup; } result = _gnutls_x509_crq_set_extension(crq, "2.5.29.16", &der_data, 0); _gnutls_free_datum(&der_data); cleanup: asn1_delete_structure(&c2); return result; } /** * gnutls_x509_crq_get_tlsfeatures: * @crq: An X.509 certificate request * @features: If the function succeeds, the * features will be stored in this variable. * @flags: zero or %GNUTLS_EXT_FLAG_APPEND * @critical: the extension status * * This function will get the X.509 TLS features * extension structure from the certificate request. * The returned structure needs to be freed using * gnutls_x509_tlsfeatures_deinit(). * * When the @flags is set to %GNUTLS_EXT_FLAG_APPEND, * then if the @features structure is empty this function will behave * identically as if the flag was not set. Otherwise if there are elements * in the @features structure then they will be merged with. * * Note that @features must be initialized prior to calling this function. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, * otherwise a negative error value. * * Since: 3.5.1 **/ int gnutls_x509_crq_get_tlsfeatures(gnutls_x509_crq_t crq, gnutls_x509_tlsfeatures_t features, unsigned int flags, unsigned int *critical) { int ret; gnutls_datum_t der = {NULL, 0}; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } if ((ret = gnutls_x509_crq_get_extension_by_oid2(crq, GNUTLS_X509EXT_OID_TLSFEATURES, 0, &der, critical)) < 0) { return ret; } if (der.size == 0 || der.data == NULL) { gnutls_assert(); return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; } ret = gnutls_x509_ext_import_tlsfeatures(&der, features, flags); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = 0; cleanup: gnutls_free(der.data); return ret; } /** * gnutls_x509_crq_set_tlsfeatures: * @crq: An X.509 certificate request * @features: If the function succeeds, the * features will be added to the certificate * request. * * This function will set the certificate request's * X.509 TLS extension from the given structure. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, * otherwise a negative error value. * * Since: 3.5.1 **/ int gnutls_x509_crq_set_tlsfeatures(gnutls_x509_crq_t crq, gnutls_x509_tlsfeatures_t features) { int ret; gnutls_datum_t der; if (crq == NULL || features == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = gnutls_x509_ext_export_tlsfeatures(features, &der); if (ret < 0) { gnutls_assert(); return ret; } ret = _gnutls_x509_crq_set_extension(crq, GNUTLS_X509EXT_OID_TLSFEATURES, &der, 0); _gnutls_free_datum(&der); if (ret < 0) { gnutls_assert(); } return ret; } /** * gnutls_x509_crq_set_extension_by_oid: * @crq: a certificate of type #gnutls_x509_crq_t * @oid: holds an Object Identifier in null terminated string * @buf: a pointer to a DER encoded data * @sizeof_buf: holds the size of @buf * @critical: should be non-zero if the extension is to be marked as critical * * This function will set an the extension, by the specified OID, in * the certificate request. The extension data should be binary data DER * encoded. * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ int gnutls_x509_crq_set_extension_by_oid(gnutls_x509_crq_t crq, const char *oid, const void *buf, size_t sizeof_buf, unsigned int critical) { int result; gnutls_datum_t der_data; der_data.data = (void *) buf; der_data.size = sizeof_buf; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } result = _gnutls_x509_crq_set_extension(crq, oid, &der_data, critical); if (result < 0) { gnutls_assert(); return result; } return 0; } /** * gnutls_x509_crq_set_spki: * @crq: a certificate request of type #gnutls_x509_crq_t * @spki: a SubjectPublicKeyInfo structure of type #gnutls_x509_spki_t * @flags: must be zero * * This function will set the certificate request's subject public key * information explicitly. This is intended to be used in the cases * where a single public key (e.g., RSA) can be used for multiple * signature algorithms (RSA PKCS1-1.5, and RSA-PSS). * * To export the public key (i.e., the SubjectPublicKeyInfo part), check * gnutls_pubkey_import_x509(). * * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. * * Since: 3.6.0 **/ int gnutls_x509_crq_set_spki(gnutls_x509_crq_t crq, const gnutls_x509_spki_t spki, unsigned int flags) { int ret; gnutls_pk_algorithm_t crq_pk; gnutls_x509_spki_st tpki; gnutls_pk_params_st params; unsigned bits; if (crq == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _gnutls_x509_crq_get_mpis(crq, ¶ms); if (ret < 0) { gnutls_assert(); return ret; } bits = pubkey_to_bits(¶ms); crq_pk = params.algo; if (!_gnutls_pk_are_compat(crq_pk, spki->pk)) { ret = gnutls_assert_val(GNUTLS_E_INVALID_REQUEST); goto cleanup; } if (spki->pk != GNUTLS_PK_RSA_PSS) { if (crq_pk == spki->pk) { ret = 0; goto cleanup; } gnutls_assert(); ret = GNUTLS_E_INVALID_REQUEST; goto cleanup; } memset(&tpki, 0, sizeof(gnutls_x509_spki_st)); if (crq_pk == GNUTLS_PK_RSA) { const mac_entry_st *me; me = hash_to_entry(spki->rsa_pss_dig); if (unlikely(me == NULL)) { gnutls_assert(); ret = GNUTLS_E_INVALID_REQUEST; goto cleanup; } tpki.pk = spki->pk; tpki.rsa_pss_dig = spki->rsa_pss_dig; /* If salt size is zero, find the optimal salt size. */ if (spki->salt_size == 0) { ret = _gnutls_find_rsa_pss_salt_size(bits, me, spki->salt_size); if (ret < 0) { gnutls_assert(); goto cleanup; } tpki.salt_size = ret; } else tpki.salt_size = spki->salt_size; } else if (crq_pk == GNUTLS_PK_RSA_PSS) { ret = _gnutls_x509_crq_read_spki_params(crq, &tpki); if (ret < 0) { gnutls_assert(); goto cleanup; } tpki.salt_size = spki->salt_size; tpki.rsa_pss_dig = spki->rsa_pss_dig; } memcpy(¶ms.spki, &tpki, sizeof(tpki)); ret = _gnutls_x509_check_pubkey_params(¶ms); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = _gnutls_x509_write_spki_params(crq->crq, "certificationRequestInfo." "subjectPKInfo." "algorithm", &tpki); if (ret < 0) { gnutls_assert(); goto cleanup; } ret = 0; cleanup: gnutls_pk_params_release(¶ms); return ret; }