ocsp.c 39.8 KB
Newer Older
1
/*
R
Rich Salz 已提交
2
 * Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved.
D
 
Dr. Stephen Henson 已提交
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
D
 
Dr. Stephen Henson 已提交
8 9
 */

M
Matt Caswell 已提交
10 11 12 13 14
#include <openssl/opensslconf.h>

#ifdef OPENSSL_NO_OCSP
NON_EMPTY_TRANSLATION_UNIT
#else
15 16 17 18 19 20 21 22 23 24 25
# ifdef OPENSSL_SYS_VMS
#  define _XOPEN_SOURCE_EXTENDED/* So fd_set and friends get properly defined
                                 * on OpenVMS */
# endif

# define USE_SOCKETS

# include <stdio.h>
# include <stdlib.h>
# include <string.h>
# include <time.h>
R
Rich Salz 已提交
26
# include <ctype.h>
M
Matt Caswell 已提交
27 28 29

/* Needs to be included before the openssl headers */
# include "apps.h"
30 31 32 33 34 35 36 37 38
# include <openssl/e_os2.h>
# include <openssl/crypto.h>
# include <openssl/err.h>
# include <openssl/ssl.h>
# include <openssl/evp.h>
# include <openssl/bn.h>
# include <openssl/x509v3.h>

# if defined(NETWARE_CLIB)
D
Dr. Stephen Henson 已提交
39
#  ifdef NETWARE_BSDSOCK
40 41
#   include <sys/socket.h>
#   include <sys/bsdskt.h>
D
Dr. Stephen Henson 已提交
42
#  else
43
#   include <novsock2.h>
D
Dr. Stephen Henson 已提交
44
#  endif
45
# elif defined(NETWARE_LIBC)
D
Dr. Stephen Henson 已提交
46
#  ifdef NETWARE_BSDSOCK
47
#   include <sys/select.h>
D
Dr. Stephen Henson 已提交
48
#  else
49
#   include <novsock2.h>
D
Dr. Stephen Henson 已提交
50
#  endif
51
# endif
52

53
/* Maximum leeway in validity period: default 5 minutes */
54
# define MAX_VALIDITY_PERIOD    (5 * 60)
55 56 57 58 59 60 61

static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
                         const EVP_MD *cert_id_md, X509 *issuer,
                         STACK_OF(OCSP_CERTID) *ids);
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
                           const EVP_MD *cert_id_md, X509 *issuer,
                           STACK_OF(OCSP_CERTID) *ids);
62
static void print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
63 64 65
                              STACK_OF(OPENSSL_STRING) *names,
                              STACK_OF(OCSP_CERTID) *ids, long nsec,
                              long maxage);
66
static void make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
67 68 69 70
                              CA_DB *db, X509 *ca, X509 *rcert,
                              EVP_PKEY *rkey, const EVP_MD *md,
                              STACK_OF(X509) *rother, unsigned long flags,
                              int nmin, int ndays, int badsig);
D
 
Dr. Stephen Henson 已提交
71

72
static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser);
B
Ben Laurie 已提交
73
static BIO *init_responder(const char *port);
74
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio);
D
 
Dr. Stephen Henson 已提交
75
static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
M
Matt Caswell 已提交
76 77

# ifndef OPENSSL_NO_SOCK
78 79
static OCSP_RESPONSE *query_responder(BIO *cbio, const char *host,
                                      const char *path,
80 81
                                      const STACK_OF(CONF_VALUE) *headers,
                                      OCSP_REQUEST *req, int req_timeout);
M
Matt Caswell 已提交
82
# endif
D
 
Dr. Stephen Henson 已提交
83

84 85 86 87 88 89 90 91 92
typedef enum OPTION_choice {
    OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
    OPT_OUTFILE, OPT_TIMEOUT, OPT_URL, OPT_HOST, OPT_PORT,
    OPT_IGNORE_ERR, OPT_NOVERIFY, OPT_NONCE, OPT_NO_NONCE,
    OPT_RESP_NO_CERTS, OPT_RESP_KEY_ID, OPT_NO_CERTS,
    OPT_NO_SIGNATURE_VERIFY, OPT_NO_CERT_VERIFY, OPT_NO_CHAIN,
    OPT_NO_CERT_CHECKS, OPT_NO_EXPLICIT, OPT_TRUST_OTHER,
    OPT_NO_INTERN, OPT_BADSIG, OPT_TEXT, OPT_REQ_TEXT, OPT_RESP_TEXT,
    OPT_REQIN, OPT_RESPIN, OPT_SIGNER, OPT_VAFILE, OPT_SIGN_OTHER,
93
    OPT_VERIFY_OTHER, OPT_CAFILE, OPT_CAPATH, OPT_NOCAFILE, OPT_NOCAPATH,
94
    OPT_VALIDITY_PERIOD, OPT_STATUS_AGE, OPT_SIGNKEY, OPT_REQOUT,
95
    OPT_RESPOUT, OPT_PATH, OPT_ISSUER, OPT_CERT, OPT_SERIAL,
96 97 98 99 100 101 102 103 104
    OPT_INDEX, OPT_CA, OPT_NMIN, OPT_REQUEST, OPT_NDAYS, OPT_RSIGNER,
    OPT_RKEY, OPT_ROTHER, OPT_RMD, OPT_HEADER,
    OPT_V_ENUM,
    OPT_MD
} OPTION_CHOICE;

OPTIONS ocsp_options[] = {
    {"help", OPT_HELP, '-', "Display this summary"},
    {"out", OPT_OUTFILE, '>', "Output filename"},
R
Rich Salz 已提交
105 106
    {"timeout", OPT_TIMEOUT, 'p',
     "Connection timeout (in seconds) to the OCSP responder"},
107
    {"url", OPT_URL, 's', "Responder URL"},
F
FdaSilvaYY 已提交
108
    {"host", OPT_HOST, 's', "TCP/IP hostname:port to connect to"},
109 110 111 112 113 114 115 116
    {"port", OPT_PORT, 'p', "Port to run responder on"},
    {"ignore_err", OPT_IGNORE_ERR, '-'},
    {"noverify", OPT_NOVERIFY, '-', "Don't verify response at all"},
    {"nonce", OPT_NONCE, '-', "Add OCSP nonce to request"},
    {"no_nonce", OPT_NO_NONCE, '-', "Don't add OCSP nonce to request"},
    {"resp_no_certs", OPT_RESP_NO_CERTS, '-',
     "Don't include any certificates in response"},
    {"resp_key_id", OPT_RESP_KEY_ID, '-',
F
FdaSilvaYY 已提交
117
     "Identify response by signing certificate key ID"},
118 119 120 121 122 123 124 125 126 127 128 129 130 131
    {"no_certs", OPT_NO_CERTS, '-',
     "Don't include any certificates in signed request"},
    {"no_signature_verify", OPT_NO_SIGNATURE_VERIFY, '-',
     "Don't check signature on response"},
    {"no_cert_verify", OPT_NO_CERT_VERIFY, '-',
     "Don't check signing certificate"},
    {"no_chain", OPT_NO_CHAIN, '-', "Don't chain verify response"},
    {"no_cert_checks", OPT_NO_CERT_CHECKS, '-',
     "Don't do additional checks on signing certificate"},
    {"no_explicit", OPT_NO_EXPLICIT, '-'},
    {"trust_other", OPT_TRUST_OTHER, '-',
     "Don't verify additional certificates"},
    {"no_intern", OPT_NO_INTERN, '-',
     "Don't search certificates contained in response for signer"},
132 133
    {"badsig", OPT_BADSIG, '-',
        "Corrupt last byte of loaded OSCP response signature (for test)"},
134 135 136 137 138 139 140 141 142 143 144 145 146
    {"text", OPT_TEXT, '-', "Print text form of request and response"},
    {"req_text", OPT_REQ_TEXT, '-', "Print text form of request"},
    {"resp_text", OPT_RESP_TEXT, '-', "Print text form of response"},
    {"reqin", OPT_REQIN, 's', "File with the DER-encoded request"},
    {"respin", OPT_RESPIN, 's', "File with the DER-encoded response"},
    {"signer", OPT_SIGNER, '<', "Certificate to sign OCSP request with"},
    {"VAfile", OPT_VAFILE, '<', "Validator certificates file"},
    {"sign_other", OPT_SIGN_OTHER, '<',
     "Additional certificates to include in signed request"},
    {"verify_other", OPT_VERIFY_OTHER, '<',
     "Additional certificates to search for signer"},
    {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
    {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"},
147 148 149 150
    {"no-CAfile", OPT_NOCAFILE, '-',
     "Do not load the default certificates file"},
    {"no-CApath", OPT_NOCAPATH, '-',
     "Do not load certificates from the default certificates directory"},
151 152 153 154 155 156 157
    {"validity_period", OPT_VALIDITY_PERIOD, 'u',
     "Maximum validity discrepancy in seconds"},
    {"status_age", OPT_STATUS_AGE, 'p', "Maximum status age in seconds"},
    {"signkey", OPT_SIGNKEY, 's', "Private key to sign OCSP request with"},
    {"reqout", OPT_REQOUT, 's', "Output file for the DER-encoded request"},
    {"respout", OPT_RESPOUT, 's', "Output file for the DER-encoded response"},
    {"path", OPT_PATH, 's', "Path to use in OCSP request"},
158
    {"issuer", OPT_ISSUER, '<', "Issuer certificate"},
159
    {"cert", OPT_CERT, '<', "Certificate to check"},
160
    {"serial", OPT_SERIAL, 's', "Serial number to check"},
161 162 163 164 165 166 167
    {"index", OPT_INDEX, '<', "Certificate status index file"},
    {"CA", OPT_CA, '<', "CA certificate"},
    {"nmin", OPT_NMIN, 'p', "Number of minutes before next update"},
    {"nrequest", OPT_REQUEST, 'p',
     "Number of requests to accept (default unlimited)"},
    {"ndays", OPT_NDAYS, 'p', "Number of days before next update"},
    {"rsigner", OPT_RSIGNER, '<',
F
FdaSilvaYY 已提交
168
     "Responder certificate to sign responses with"},
169 170
    {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"},
    {"rother", OPT_ROTHER, '<', "Other certificates to include in response"},
171
    {"rmd", OPT_RMD, 's', "Digest Algorithm to use in signature of OCSP response"},
172
    {"header", OPT_HEADER, 's', "key=value header to add"},
173
    {"", OPT_MD, '-', "Any supported digest algorithm (sha1,sha256, ... )"},
174 175 176 177 178
    OPT_V_OPTIONS,
    {NULL}
};

int ocsp_main(int argc, char **argv)
179
{
180 181
    BIO *acbio = NULL, *cbio = NULL, *derbio = NULL, *out = NULL;
    const EVP_MD *cert_id_md = NULL, *rsign_md = NULL;
182
    int trailing_md = 0;
183 184 185
    CA_DB *rdb = NULL;
    EVP_PKEY *key = NULL, *rkey = NULL;
    OCSP_BASICRESP *bs = NULL;
186 187
    OCSP_REQUEST *req = NULL;
    OCSP_RESPONSE *resp = NULL;
188 189 190 191
    STACK_OF(CONF_VALUE) *headers = NULL;
    STACK_OF(OCSP_CERTID) *ids = NULL;
    STACK_OF(OPENSSL_STRING) *reqnames = NULL;
    STACK_OF(X509) *sign_other = NULL, *verify_other = NULL, *rother = NULL;
R
Rich Salz 已提交
192
    STACK_OF(X509) *issuers = NULL;
193
    X509 *issuer = NULL, *cert = NULL, *rca_cert = NULL;
194 195 196
    X509 *signer = NULL, *rsigner = NULL;
    X509_STORE *store = NULL;
    X509_VERIFY_PARAM *vpm = NULL;
197 198 199 200 201
    char *CAfile = NULL, *CApath = NULL, *header, *value;
    char *host = NULL, *port = NULL, *path = "/", *outfile = NULL;
    char *rca_filename = NULL, *reqin = NULL, *respin = NULL;
    char *reqout = NULL, *respout = NULL, *ridx_filename = NULL;
    char *rsignfile = NULL, *rkeyfile = NULL;
202
    char *sign_certfile = NULL, *verify_certfile = NULL, *rcertfile = NULL;
203 204
    char *signfile = NULL, *keyfile = NULL;
    char *thost = NULL, *tport = NULL, *tpath = NULL;
205
    int noCAfile = 0, noCApath = 0;
206 207
    int accept_count = -1, add_nonce = 1, noverify = 0, use_ssl = -1;
    int vpmtouched = 0, badsig = 0, i, ignore_err = 0, nmin = 0, ndays = -1;
M
Matt Caswell 已提交
208 209 210 211
    int req_text = 0, resp_text = 0, ret = 1;
#ifndef OPENSSL_NO_SOCK
    int req_timeout = -1;
#endif
212
    long nsec = MAX_VALIDITY_PERIOD, maxage = -1;
213
    unsigned long sign_flags = 0, verify_flags = 0, rflags = 0;
214 215
    OPTION_CHOICE o;
    char *prog;
216 217

    reqnames = sk_OPENSSL_STRING_new_null();
218 219
    if (!reqnames)
        goto end;
220
    ids = sk_OCSP_CERTID_new_null();
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241
    if (!ids)
        goto end;
    if ((vpm = X509_VERIFY_PARAM_new()) == NULL)
        return 1;

    prog = opt_init(argc, argv, ocsp_options);
    while ((o = opt_next()) != OPT_EOF) {
        switch (o) {
        case OPT_EOF:
        case OPT_ERR:
 opthelp:
            BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
            goto end;
        case OPT_HELP:
            ret = 0;
            opt_help(ocsp_options);
            goto end;
        case OPT_OUTFILE:
            outfile = opt_arg();
            break;
        case OPT_TIMEOUT:
M
Matt Caswell 已提交
242
#ifndef OPENSSL_NO_SOCK
243
            req_timeout = atoi(opt_arg());
M
Matt Caswell 已提交
244
#endif
245 246
            break;
        case OPT_URL:
R
Rich Salz 已提交
247 248 249
            OPENSSL_free(thost);
            OPENSSL_free(tport);
            OPENSSL_free(tpath);
250
            thost = tport = tpath = NULL;
251 252 253 254 255 256 257 258 259 260 261 262 263 264 265
            if (!OCSP_parse_url(opt_arg(), &host, &port, &path, &use_ssl)) {
                BIO_printf(bio_err, "%s Error parsing URL\n", prog);
                goto end;
            }
            thost = host;
            tport = port;
            tpath = path;
            break;
        case OPT_HOST:
            host = opt_arg();
            break;
        case OPT_PORT:
            port = opt_arg();
            break;
        case OPT_IGNORE_ERR:
266
            ignore_err = 1;
267 268
            break;
        case OPT_NOVERIFY:
269
            noverify = 1;
270 271
            break;
        case OPT_NONCE:
272
            add_nonce = 2;
273 274
            break;
        case OPT_NO_NONCE:
275
            add_nonce = 0;
276 277
            break;
        case OPT_RESP_NO_CERTS:
278
            rflags |= OCSP_NOCERTS;
279 280
            break;
        case OPT_RESP_KEY_ID:
281
            rflags |= OCSP_RESPID_KEY;
282 283
            break;
        case OPT_NO_CERTS:
284
            sign_flags |= OCSP_NOCERTS;
285 286
            break;
        case OPT_NO_SIGNATURE_VERIFY:
287
            verify_flags |= OCSP_NOSIGS;
288 289
            break;
        case OPT_NO_CERT_VERIFY:
290
            verify_flags |= OCSP_NOVERIFY;
291 292
            break;
        case OPT_NO_CHAIN:
293
            verify_flags |= OCSP_NOCHAIN;
294 295
            break;
        case OPT_NO_CERT_CHECKS:
296
            verify_flags |= OCSP_NOCHECKS;
297 298
            break;
        case OPT_NO_EXPLICIT:
299
            verify_flags |= OCSP_NOEXPLICIT;
300 301
            break;
        case OPT_TRUST_OTHER:
302
            verify_flags |= OCSP_TRUSTOTHER;
303 304
            break;
        case OPT_NO_INTERN:
305
            verify_flags |= OCSP_NOINTERN;
306 307
            break;
        case OPT_BADSIG:
308
            badsig = 1;
309 310 311 312 313
            break;
        case OPT_TEXT:
            req_text = resp_text = 1;
            break;
        case OPT_REQ_TEXT:
314
            req_text = 1;
315 316
            break;
        case OPT_RESP_TEXT:
317
            resp_text = 1;
318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343
            break;
        case OPT_REQIN:
            reqin = opt_arg();
            break;
        case OPT_RESPIN:
            respin = opt_arg();
            break;
        case OPT_SIGNER:
            signfile = opt_arg();
            break;
        case OPT_VAFILE:
            verify_certfile = opt_arg();
            verify_flags |= OCSP_TRUSTOTHER;
            break;
        case OPT_SIGN_OTHER:
            sign_certfile = opt_arg();
            break;
        case OPT_VERIFY_OTHER:
            verify_certfile = opt_arg();
            break;
        case OPT_CAFILE:
            CAfile = opt_arg();
            break;
        case OPT_CAPATH:
            CApath = opt_arg();
            break;
344 345 346 347 348 349
        case OPT_NOCAFILE:
            noCAfile = 1;
            break;
        case OPT_NOCAPATH:
            noCApath = 1;
            break;
350 351
        case OPT_V_CASES:
            if (!opt_verify(o, vpm))
352
                goto end;
353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372
            vpmtouched++;
            break;
        case OPT_VALIDITY_PERIOD:
            opt_long(opt_arg(), &nsec);
            break;
        case OPT_STATUS_AGE:
            opt_long(opt_arg(), &maxage);
            break;
        case OPT_SIGNKEY:
            keyfile = opt_arg();
            break;
        case OPT_REQOUT:
            reqout = opt_arg();
            break;
        case OPT_RESPOUT:
            respout = opt_arg();
            break;
        case OPT_PATH:
            path = opt_arg();
            break;
373
        case OPT_ISSUER:
374
            issuer = load_cert(opt_arg(), FORMAT_PEM, "issuer certificate");
375 376
            if (issuer == NULL)
                goto end;
377 378 379 380
            if (issuers == NULL) {
                if ((issuers = sk_X509_new_null()) == NULL)
                    goto end;
            }
381 382
            sk_X509_push(issuers, issuer);
            break;
383 384
        case OPT_CERT:
            X509_free(cert);
385
            cert = load_cert(opt_arg(), FORMAT_PEM, "certificate");
386 387 388 389 390 391 392 393
            if (cert == NULL)
                goto end;
            if (cert_id_md == NULL)
                cert_id_md = EVP_sha1();
            if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
                goto end;
            if (!sk_OPENSSL_STRING_push(reqnames, opt_arg()))
                goto end;
394
            trailing_md = 0;
395 396 397 398 399 400 401 402
            break;
        case OPT_SERIAL:
            if (cert_id_md == NULL)
                cert_id_md = EVP_sha1();
            if (!add_ocsp_serial(&req, opt_arg(), cert_id_md, issuer, ids))
                goto end;
            if (!sk_OPENSSL_STRING_push(reqnames, opt_arg()))
                goto end;
403
            trailing_md = 0;
404 405 406 407 408 409 410 411 412
            break;
        case OPT_INDEX:
            ridx_filename = opt_arg();
            break;
        case OPT_CA:
            rca_filename = opt_arg();
            break;
        case OPT_NMIN:
            opt_int(opt_arg(), &nmin);
413 414
            if (ndays == -1)
                ndays = 0;
415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430
            break;
        case OPT_REQUEST:
            opt_int(opt_arg(), &accept_count);
            break;
        case OPT_NDAYS:
            ndays = atoi(opt_arg());
            break;
        case OPT_RSIGNER:
            rsignfile = opt_arg();
            break;
        case OPT_RKEY:
            rkeyfile = opt_arg();
            break;
        case OPT_ROTHER:
            rcertfile = opt_arg();
            break;
431
        case OPT_RMD:   /* Response MessageDigest */
432 433 434 435 436 437 438 439 440 441 442 443 444 445 446
            if (!opt_md(opt_arg(), &rsign_md))
                goto end;
            break;
        case OPT_HEADER:
            header = opt_arg();
            value = strchr(header, '=');
            if (value == NULL) {
                BIO_printf(bio_err, "Missing = in header key=value\n");
                goto opthelp;
            }
            *value++ = '\0';
            if (!X509V3_add_value(header, value, &headers))
                goto end;
            break;
        case OPT_MD:
447
            if (trailing_md) {
448 449 450 451 452 453 454
                BIO_printf(bio_err,
                           "%s: Digest must be before -cert or -serial\n",
                           prog);
                goto opthelp;
            }
            if (!opt_md(opt_unknown(), &cert_id_md))
                goto opthelp;
455
            trailing_md = 1;
456
            break;
457 458
        }
    }
459 460 461 462 463 464

    if (trailing_md) {
        BIO_printf(bio_err, "%s: Digest must be before -cert or -serial\n",
                   prog);
        goto opthelp;
    }
465
    argc = opt_num_rest();
K
Kurt Roeckx 已提交
466 467
    if (argc != 0)
        goto opthelp;
468 469 470

    /* Have we anything to do? */
    if (!req && !reqin && !respin && !(port && ridx_filename))
471
        goto opthelp;
472

473
    out = bio_open_default(outfile, 'w', FORMAT_TEXT);
474
    if (out == NULL)
475 476 477 478 479 480
        goto end;

    if (!req && (add_nonce != 2))
        add_nonce = 0;

    if (!req && reqin) {
481
        derbio = bio_open_default(reqin, 'r', FORMAT_ASN1);
482
        if (derbio == NULL)
483 484 485 486 487 488 489 490 491 492 493 494 495 496 497
            goto end;
        req = d2i_OCSP_REQUEST_bio(derbio, NULL);
        BIO_free(derbio);
        if (!req) {
            BIO_printf(bio_err, "Error reading OCSP request\n");
            goto end;
        }
    }

    if (!req && port) {
        acbio = init_responder(port);
        if (!acbio)
            goto end;
    }

498
    if (rsignfile) {
499 500
        if (!rkeyfile)
            rkeyfile = rsignfile;
501
        rsigner = load_cert(rsignfile, FORMAT_PEM, "responder certificate");
502 503 504 505
        if (!rsigner) {
            BIO_printf(bio_err, "Error loading responder certificate\n");
            goto end;
        }
506
        rca_cert = load_cert(rca_filename, FORMAT_PEM, "CA certificate");
507
        if (rcertfile) {
508
            if (!load_certs(rcertfile, &rother, FORMAT_PEM, NULL,
509
                            "responder other certificates"))
510 511
                goto end;
        }
512
        rkey = load_key(rkeyfile, FORMAT_PEM, 0, NULL, NULL,
513 514 515 516 517 518 519 520 521 522
                        "responder private key");
        if (!rkey)
            goto end;
    }
    if (acbio)
        BIO_printf(bio_err, "Waiting for OCSP client connections...\n");

 redo_accept:

    if (acbio) {
523
        if (!do_responder(&req, &cbio, acbio))
524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544
            goto end;
        if (!req) {
            resp =
                OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST,
                                     NULL);
            send_ocsp_response(cbio, resp);
            goto done_resp;
        }
    }

    if (!req && (signfile || reqout || host || add_nonce || ridx_filename)) {
        BIO_printf(bio_err, "Need an OCSP request for this operation!\n");
        goto end;
    }

    if (req && add_nonce)
        OCSP_request_add1_nonce(req, NULL, -1);

    if (signfile) {
        if (!keyfile)
            keyfile = signfile;
545
        signer = load_cert(signfile, FORMAT_PEM, "signer certificate");
546 547 548 549 550
        if (!signer) {
            BIO_printf(bio_err, "Error loading signer certificate\n");
            goto end;
        }
        if (sign_certfile) {
551
            if (!load_certs(sign_certfile, &sign_other, FORMAT_PEM, NULL,
552
                            "signer certificates"))
553 554
                goto end;
        }
555
        key = load_key(keyfile, FORMAT_PEM, 0, NULL, NULL,
556 557 558 559 560 561 562 563 564 565 566 567 568 569 570
                       "signer private key");
        if (!key)
            goto end;

        if (!OCSP_request_sign
            (req, signer, key, NULL, sign_other, sign_flags)) {
            BIO_printf(bio_err, "Error signing OCSP request\n");
            goto end;
        }
    }

    if (req_text && req)
        OCSP_REQUEST_print(out, req, 0);

    if (reqout) {
571
        derbio = bio_open_default(reqout, 'w', FORMAT_ASN1);
572
        if (derbio == NULL)
573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592
            goto end;
        i2d_OCSP_REQUEST_bio(derbio, req);
        BIO_free(derbio);
    }

    if (ridx_filename && (!rkey || !rsigner || !rca_cert)) {
        BIO_printf(bio_err,
                   "Need a responder certificate, key and CA for this operation!\n");
        goto end;
    }

    if (ridx_filename && !rdb) {
        rdb = load_index(ridx_filename, NULL);
        if (!rdb)
            goto end;
        if (!index_index(rdb))
            goto end;
    }

    if (rdb) {
593
        make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey,
594 595 596 597 598
                               rsign_md, rother, rflags, nmin, ndays, badsig);
        if (cbio)
            send_ocsp_response(cbio, resp);
    } else if (host) {
# ifndef OPENSSL_NO_SOCK
599
        resp = process_responder(req, host, path,
600 601 602 603 604 605 606 607 608
                                 port, use_ssl, headers, req_timeout);
        if (!resp)
            goto end;
# else
        BIO_printf(bio_err,
                   "Error creating connect BIO - sockets not supported.\n");
        goto end;
# endif
    } else if (respin) {
609
        derbio = bio_open_default(respin, 'r', FORMAT_ASN1);
610
        if (derbio == NULL)
611 612 613 614 615 616 617 618 619 620 621 622 623 624 625
            goto end;
        resp = d2i_OCSP_RESPONSE_bio(derbio, NULL);
        BIO_free(derbio);
        if (!resp) {
            BIO_printf(bio_err, "Error reading OCSP response\n");
            goto end;
        }
    } else {
        ret = 0;
        goto end;
    }

 done_resp:

    if (respout) {
626
        derbio = bio_open_default(respout, 'w', FORMAT_ASN1);
627
        if (derbio == NULL)
628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647
            goto end;
        i2d_OCSP_RESPONSE_bio(derbio, resp);
        BIO_free(derbio);
    }

    i = OCSP_response_status(resp);
    if (i != OCSP_RESPONSE_STATUS_SUCCESSFUL) {
        BIO_printf(out, "Responder Error: %s (%d)\n",
                   OCSP_response_status_str(i), i);
        if (ignore_err)
            goto redo_accept;
        ret = 0;
        goto end;
    }

    if (resp_text)
        OCSP_RESPONSE_print(out, resp, 0);

    /* If running as responder don't verify our own response */
    if (cbio) {
648 649
        /* If not unlimited, see if we took all we should. */
        if (accept_count != -1 && --accept_count <= 0) {
650 651
            ret = 0;
            goto end;
652
        }
653 654 655 656 657 658 659 660 661
        BIO_free_all(cbio);
        cbio = NULL;
        OCSP_REQUEST_free(req);
        req = NULL;
        OCSP_RESPONSE_free(resp);
        resp = NULL;
        goto redo_accept;
    }
    if (ridx_filename) {
662 663 664 665
        ret = 0;
        goto end;
    }

666
    if (!store) {
667
        store = setup_verify(CAfile, CApath, noCAfile, noCApath);
668 669 670 671
        if (!store)
            goto end;
    }
    if (vpmtouched)
672 673
        X509_STORE_set1_param(store, vpm);
    if (verify_certfile) {
674
        if (!load_certs(verify_certfile, &verify_other, FORMAT_PEM, NULL,
675
                        "validator certificate"))
676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698
            goto end;
    }

    bs = OCSP_response_get1_basic(resp);
    if (!bs) {
        BIO_printf(bio_err, "Error parsing response\n");
        goto end;
    }

    ret = 0;

    if (!noverify) {
        if (req && ((i = OCSP_check_nonce(req, bs)) <= 0)) {
            if (i == -1)
                BIO_printf(bio_err, "WARNING: no nonce in response\n");
            else {
                BIO_printf(bio_err, "Nonce Verify error\n");
                ret = 1;
                goto end;
            }
        }

        i = OCSP_basic_verify(bs, verify_other, store, verify_flags);
699 700 701 702 703
        if (i <= 0 && issuers) {
            i = OCSP_basic_verify(bs, issuers, store, OCSP_TRUSTOTHER);
            if (i > 0)
                ERR_clear_error();
        }
704 705 706 707 708 709 710 711 712
        if (i <= 0) {
            BIO_printf(bio_err, "Response Verify Failure\n");
            ERR_print_errors(bio_err);
            ret = 1;
        } else
            BIO_printf(bio_err, "Response verify OK\n");

    }

713
    print_ocsp_summary(out, bs, req, reqnames, ids, nsec, maxage);
714 715 716 717 718

 end:
    ERR_print_errors(bio_err);
    X509_free(signer);
    X509_STORE_free(store);
R
Rich Salz 已提交
719
    X509_VERIFY_PARAM_free(vpm);
720 721 722
    EVP_PKEY_free(key);
    EVP_PKEY_free(rkey);
    X509_free(cert);
723
    sk_X509_pop_free(issuers, X509_free);
724 725 726 727 728 729 730 731 732 733 734 735 736 737
    X509_free(rsigner);
    X509_free(rca_cert);
    free_index(rdb);
    BIO_free_all(cbio);
    BIO_free_all(acbio);
    BIO_free(out);
    OCSP_REQUEST_free(req);
    OCSP_RESPONSE_free(resp);
    OCSP_BASICRESP_free(bs);
    sk_OPENSSL_STRING_free(reqnames);
    sk_OCSP_CERTID_free(ids);
    sk_X509_pop_free(sign_other, X509_free);
    sk_X509_pop_free(verify_other, X509_free);
    sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
R
Rich Salz 已提交
738 739 740
    OPENSSL_free(thost);
    OPENSSL_free(tport);
    OPENSSL_free(tpath);
741

742
    return (ret);
D
 
Dr. Stephen Henson 已提交
743 744
}

745 746 747 748 749 750 751 752 753
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
                         const EVP_MD *cert_id_md, X509 *issuer,
                         STACK_OF(OCSP_CERTID) *ids)
{
    OCSP_CERTID *id;
    if (!issuer) {
        BIO_printf(bio_err, "No issuer certificate specified\n");
        return 0;
    }
754
    if (*req == NULL)
755
        *req = OCSP_REQUEST_new();
756
    if (*req == NULL)
757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781
        goto err;
    id = OCSP_cert_to_id(cert_id_md, cert, issuer);
    if (!id || !sk_OCSP_CERTID_push(ids, id))
        goto err;
    if (!OCSP_request_add0_id(*req, id))
        goto err;
    return 1;

 err:
    BIO_printf(bio_err, "Error Creating OCSP request\n");
    return 0;
}

static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,
                           const EVP_MD *cert_id_md, X509 *issuer,
                           STACK_OF(OCSP_CERTID) *ids)
{
    OCSP_CERTID *id;
    X509_NAME *iname;
    ASN1_BIT_STRING *ikey;
    ASN1_INTEGER *sno;
    if (!issuer) {
        BIO_printf(bio_err, "No issuer certificate specified\n");
        return 0;
    }
782
    if (*req == NULL)
783
        *req = OCSP_REQUEST_new();
784
    if (*req == NULL)
785 786 787 788 789 790 791 792 793 794
        goto err;
    iname = X509_get_subject_name(issuer);
    ikey = X509_get0_pubkey_bitstr(issuer);
    sno = s2i_ASN1_INTEGER(NULL, serial);
    if (!sno) {
        BIO_printf(bio_err, "Error converting serial number %s\n", serial);
        return 0;
    }
    id = OCSP_cert_id_new(cert_id_md, iname, ikey, sno);
    ASN1_INTEGER_free(sno);
795
    if (id == NULL || !sk_OCSP_CERTID_push(ids, id))
796 797 798 799 800 801 802 803 804
        goto err;
    if (!OCSP_request_add0_id(*req, id))
        goto err;
    return 1;

 err:
    BIO_printf(bio_err, "Error Creating OCSP request\n");
    return 0;
}
805

806
static void print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
807 808 809 810 811 812
                              STACK_OF(OPENSSL_STRING) *names,
                              STACK_OF(OCSP_CERTID) *ids, long nsec,
                              long maxage)
{
    OCSP_CERTID *id;
    char *name;
813
    int i, status, reason;
814 815 816 817
    ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;

    if (!bs || !req || !sk_OPENSSL_STRING_num(names)
        || !sk_OCSP_CERTID_num(ids))
818
        return;
819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862

    for (i = 0; i < sk_OCSP_CERTID_num(ids); i++) {
        id = sk_OCSP_CERTID_value(ids, i);
        name = sk_OPENSSL_STRING_value(names, i);
        BIO_printf(out, "%s: ", name);

        if (!OCSP_resp_find_status(bs, id, &status, &reason,
                                   &rev, &thisupd, &nextupd)) {
            BIO_puts(out, "ERROR: No Status found.\n");
            continue;
        }

        /*
         * Check validity: if invalid write to output BIO so we know which
         * response this refers to.
         */
        if (!OCSP_check_validity(thisupd, nextupd, nsec, maxage)) {
            BIO_puts(out, "WARNING: Status times invalid.\n");
            ERR_print_errors(out);
        }
        BIO_printf(out, "%s\n", OCSP_cert_status_str(status));

        BIO_puts(out, "\tThis Update: ");
        ASN1_GENERALIZEDTIME_print(out, thisupd);
        BIO_puts(out, "\n");

        if (nextupd) {
            BIO_puts(out, "\tNext Update: ");
            ASN1_GENERALIZEDTIME_print(out, nextupd);
            BIO_puts(out, "\n");
        }

        if (status != V_OCSP_CERTSTATUS_REVOKED)
            continue;

        if (reason != -1)
            BIO_printf(out, "\tReason: %s\n", OCSP_crl_reason_str(reason));

        BIO_puts(out, "\tRevocation Time: ");
        ASN1_GENERALIZEDTIME_print(out, rev);
        BIO_puts(out, "\n");
    }
}

863
static void make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req,
864 865 866 867 868 869 870 871
                              CA_DB *db, X509 *ca, X509 *rcert,
                              EVP_PKEY *rkey, const EVP_MD *rmd,
                              STACK_OF(X509) *rother, unsigned long flags,
                              int nmin, int ndays, int badsig)
{
    ASN1_TIME *thisupd = NULL, *nextupd = NULL;
    OCSP_CERTID *cid, *ca_id = NULL;
    OCSP_BASICRESP *bs = NULL;
872
    int i, id_count;
873 874 875 876 877 878 879 880 881 882 883 884

    id_count = OCSP_request_onereq_count(req);

    if (id_count <= 0) {
        *resp =
            OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL);
        goto end;
    }

    bs = OCSP_BASICRESP_new();
    thisupd = X509_gmtime_adj(NULL, 0);
    if (ndays != -1)
885
        nextupd = X509_time_adj_ex(NULL, ndays, nmin * 60, NULL);
886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904

    /* Examine each certificate id in the request */
    for (i = 0; i < id_count; i++) {
        OCSP_ONEREQ *one;
        ASN1_INTEGER *serial;
        char **inf;
        ASN1_OBJECT *cert_id_md_oid;
        const EVP_MD *cert_id_md;
        one = OCSP_request_onereq_get0(req, i);
        cid = OCSP_onereq_get0_id(one);

        OCSP_id_get0_info(NULL, &cert_id_md_oid, NULL, NULL, cid);

        cert_id_md = EVP_get_digestbyobj(cert_id_md_oid);
        if (!cert_id_md) {
            *resp = OCSP_response_create(OCSP_RESPONSE_STATUS_INTERNALERROR,
                                         NULL);
            goto end;
        }
R
Rich Salz 已提交
905
        OCSP_CERTID_free(ca_id);
906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951
        ca_id = OCSP_cert_to_id(cert_id_md, NULL, ca);

        /* Is this request about our CA? */
        if (OCSP_id_issuer_cmp(ca_id, cid)) {
            OCSP_basic_add1_status(bs, cid,
                                   V_OCSP_CERTSTATUS_UNKNOWN,
                                   0, NULL, thisupd, nextupd);
            continue;
        }
        OCSP_id_get0_info(NULL, NULL, NULL, &serial, cid);
        inf = lookup_serial(db, serial);
        if (!inf)
            OCSP_basic_add1_status(bs, cid,
                                   V_OCSP_CERTSTATUS_UNKNOWN,
                                   0, NULL, thisupd, nextupd);
        else if (inf[DB_type][0] == DB_TYPE_VAL)
            OCSP_basic_add1_status(bs, cid,
                                   V_OCSP_CERTSTATUS_GOOD,
                                   0, NULL, thisupd, nextupd);
        else if (inf[DB_type][0] == DB_TYPE_REV) {
            ASN1_OBJECT *inst = NULL;
            ASN1_TIME *revtm = NULL;
            ASN1_GENERALIZEDTIME *invtm = NULL;
            OCSP_SINGLERESP *single;
            int reason = -1;
            unpack_revinfo(&revtm, &reason, &inst, &invtm, inf[DB_rev_date]);
            single = OCSP_basic_add1_status(bs, cid,
                                            V_OCSP_CERTSTATUS_REVOKED,
                                            reason, revtm, thisupd, nextupd);
            if (invtm)
                OCSP_SINGLERESP_add1_ext_i2d(single, NID_invalidity_date,
                                             invtm, 0, 0);
            else if (inst)
                OCSP_SINGLERESP_add1_ext_i2d(single,
                                             NID_hold_instruction_code, inst,
                                             0, 0);
            ASN1_OBJECT_free(inst);
            ASN1_TIME_free(revtm);
            ASN1_GENERALIZEDTIME_free(invtm);
        }
    }

    OCSP_copy_nonce(bs, req);

    OCSP_basic_sign(bs, rcert, rkey, rmd, rother, flags);

952 953
    if (badsig) {
        ASN1_OCTET_STRING *sig = OCSP_resp_get0_signature(bs);
954
        unsigned char *sigptr = ASN1_STRING_data(sig);
955 956
        sigptr[ASN1_STRING_length(sig) - 1] ^= 0x1;
    }
957 958 959 960 961 962 963 964 965

    *resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);

 end:
    ASN1_TIME_free(thisupd);
    ASN1_TIME_free(nextupd);
    OCSP_CERTID_free(ca_id);
    OCSP_BASICRESP_free(bs);
}
D
 
Dr. Stephen Henson 已提交
966

967
static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser)
968 969 970 971 972 973 974 975 976 977
{
    int i;
    BIGNUM *bn = NULL;
    char *itmp, *row[DB_NUMBER], **rrow;
    for (i = 0; i < DB_NUMBER; i++)
        row[i] = NULL;
    bn = ASN1_INTEGER_to_BN(ser, NULL);
    OPENSSL_assert(bn);         /* FIXME: should report an error at this
                                 * point and abort */
    if (BN_is_zero(bn))
R
Rich Salz 已提交
978
        itmp = OPENSSL_strdup("00");
979 980 981 982 983 984 985 986
    else
        itmp = BN_bn2hex(bn);
    row[DB_serial] = itmp;
    BN_free(bn);
    rrow = TXT_DB_get_by_index(db->db, DB_serial, row);
    OPENSSL_free(itmp);
    return rrow;
}
D
 
Dr. Stephen Henson 已提交
987 988 989

/* Quick and dirty OCSP server: read in and parse input request */

B
Ben Laurie 已提交
990
static BIO *init_responder(const char *port)
991
{
992
# ifdef OPENSSL_NO_SOCK
993 994
    BIO_printf(bio_err,
               "Error setting up accept BIO - sockets not supported.\n");
995
    return NULL;
M
Matt Caswell 已提交
996 997 998
# else
    BIO *acbio = NULL, *bufbio = NULL;

999
    bufbio = BIO_new(BIO_f_buffer());
1000
    if (bufbio == NULL)
1001
        goto err;
1002 1003 1004 1005 1006 1007 1008 1009 1010
    acbio = BIO_new(BIO_s_accept());
    if (acbio == NULL
        || BIO_set_bind_mode(acbio, BIO_BIND_REUSEADDR) < 0
        || BIO_set_accept_port(acbio, port) < 0) {
        BIO_printf(bio_err, "Error setting up accept BIO\n");
        ERR_print_errors(bio_err);
        goto err;
    }

1011 1012 1013
    BIO_set_accept_bios(acbio, bufbio);
    bufbio = NULL;
    if (BIO_do_accept(acbio) <= 0) {
1014
        BIO_printf(bio_err, "Error starting accept\n");
1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
        ERR_print_errors(bio_err);
        goto err;
    }

    return acbio;

 err:
    BIO_free_all(acbio);
    BIO_free(bufbio);
    return NULL;
M
Matt Caswell 已提交
1025
# endif
1026
}
D
 
Dr. Stephen Henson 已提交
1027

M
Matt Caswell 已提交
1028
# ifndef OPENSSL_NO_SOCK
R
Rich Salz 已提交
1029 1030 1031 1032
/*
 * Decode %xx URL-decoding in-place. Ignores mal-formed sequences.
 */
static int urldecode(char *p)
R
Rich Salz 已提交
1033 1034
{
    unsigned char *out = (unsigned char *)p;
R
Rich Salz 已提交
1035
    unsigned char *save = out;
R
Rich Salz 已提交
1036 1037 1038 1039

    for (; *p; p++) {
        if (*p != '%')
            *out++ = *p;
1040
        else if (isxdigit(_UC(p[1])) && isxdigit(_UC(p[2]))) {
1041 1042 1043
            /* Don't check, can't fail because of ixdigit() call. */
            *out++ = (OPENSSL_hexchar2int(p[1]) << 4)
                   | OPENSSL_hexchar2int(p[2]);
R
Rich Salz 已提交
1044 1045
            p += 2;
        }
R
Rich Salz 已提交
1046 1047
        else
            return -1;
R
Rich Salz 已提交
1048
    }
R
Rich Salz 已提交
1049 1050
    *out = '\0';
    return (int)(out - save);
R
Rich Salz 已提交
1051
}
M
Matt Caswell 已提交
1052
# endif
R
Rich Salz 已提交
1053

1054
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio)
1055
{
M
Matt Caswell 已提交
1056 1057 1058
# ifdef OPENSSL_NO_SOCK
    return 0;
# else
1059
    int len;
1060
    OCSP_REQUEST *req = NULL;
R
Rich Salz 已提交
1061
    char inbuf[2048], reqbuf[2048];
R
Rich Salz 已提交
1062 1063
    char *p, *q;
    BIO *cbio = NULL, *getbio = NULL, *b64 = NULL;
1064 1065 1066 1067 1068 1069 1070 1071 1072 1073

    if (BIO_do_accept(acbio) <= 0) {
        BIO_printf(bio_err, "Error accepting connection\n");
        ERR_print_errors(bio_err);
        return 0;
    }

    cbio = BIO_pop(acbio);
    *pcbio = cbio;

1074
    /* Read the request line. */
R
Rich Salz 已提交
1075
    len = BIO_gets(cbio, reqbuf, sizeof reqbuf);
1076 1077
    if (len <= 0)
        return 1;
R
Rich Salz 已提交
1078
    if (strncmp(reqbuf, "GET ", 4) == 0) {
R
Rich Salz 已提交
1079
        /* Expecting GET {sp} /URL {sp} HTTP/1.x */
R
Rich Salz 已提交
1080
        for (p = reqbuf + 4; *p == ' '; ++p)
R
Rich Salz 已提交
1081
            continue;
R
Rich Salz 已提交
1082 1083 1084
        if (*p != '/') {
            BIO_printf(bio_err, "Invalid request -- bad URL\n");
            return 1;
R
Rich Salz 已提交
1085
        }
R
Rich Salz 已提交
1086 1087
        p++;

R
Rich Salz 已提交
1088 1089
        /* Splice off the HTTP version identifier. */
        for (q = p; *q; q++)
R
Rich Salz 已提交
1090
            if (*q == ' ')
R
Rich Salz 已提交
1091
                break;
R
Rich Salz 已提交
1092 1093
        if (strncmp(q, " HTTP/1.", 8) != 0) {
            BIO_printf(bio_err, "Invalid request -- bad HTTP vesion\n");
R
Rich Salz 已提交
1094 1095 1096
            return 1;
        }
        *q = '\0';
R
Rich Salz 已提交
1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107
        len = urldecode(p);
        if (len <= 0) {
            BIO_printf(bio_err, "Invalid request -- bad URL encoding\n");
            return 1;
        }
        if ((getbio = BIO_new_mem_buf(p, len)) == NULL
            || (b64 = BIO_new(BIO_f_base64())) == NULL) {
            BIO_printf(bio_err, "Could not allocate memory\n");
            ERR_print_errors(bio_err);
            return 1;
        }
R
Rich Salz 已提交
1108 1109
        BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
        getbio = BIO_push(b64, getbio);
R
Rich Salz 已提交
1110 1111
    } else if (strncmp(reqbuf, "POST ", 5) != 0) {
        BIO_printf(bio_err, "Invalid request -- bad HTTP verb\n");
1112 1113
        return 1;
    }
R
Rich Salz 已提交
1114 1115

    /* Read and skip past the headers. */
1116 1117 1118 1119 1120 1121 1122 1123 1124
    for (;;) {
        len = BIO_gets(cbio, inbuf, sizeof inbuf);
        if (len <= 0)
            return 1;
        if ((inbuf[0] == '\r') || (inbuf[0] == '\n'))
            break;
    }

    /* Try to read OCSP request */
R
Rich Salz 已提交
1125 1126 1127 1128 1129
    if (getbio) {
        req = d2i_OCSP_REQUEST_bio(getbio, NULL);
        BIO_free_all(getbio);
    } else
        req = d2i_OCSP_REQUEST_bio(cbio, NULL);
1130 1131 1132 1133 1134 1135 1136 1137 1138

    if (!req) {
        BIO_printf(bio_err, "Error parsing OCSP request\n");
        ERR_print_errors(bio_err);
    }

    *preq = req;

    return 1;
M
Matt Caswell 已提交
1139
# endif
1140
}
D
 
Dr. Stephen Henson 已提交
1141 1142

static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp)
1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153
{
    char http_resp[] =
        "HTTP/1.0 200 OK\r\nContent-type: application/ocsp-response\r\n"
        "Content-Length: %d\r\n\r\n";
    if (!cbio)
        return 0;
    BIO_printf(cbio, http_resp, i2d_OCSP_RESPONSE(resp, NULL));
    i2d_OCSP_RESPONSE_bio(cbio, resp);
    (void)BIO_flush(cbio);
    return 1;
}
D
 
Dr. Stephen Henson 已提交
1154

M
Matt Caswell 已提交
1155
# ifndef OPENSSL_NO_SOCK
1156 1157
static OCSP_RESPONSE *query_responder(BIO *cbio, const char *host,
                                      const char *path,
1158 1159 1160 1161 1162 1163
                                      const STACK_OF(CONF_VALUE) *headers,
                                      OCSP_REQUEST *req, int req_timeout)
{
    int fd;
    int rv;
    int i;
1164
    int add_host = 1;
1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175
    OCSP_REQ_CTX *ctx = NULL;
    OCSP_RESPONSE *rsp = NULL;
    fd_set confds;
    struct timeval tv;

    if (req_timeout != -1)
        BIO_set_nbio(cbio, 1);

    rv = BIO_do_connect(cbio);

    if ((rv <= 0) && ((req_timeout == -1) || !BIO_should_retry(cbio))) {
1176
        BIO_puts(bio_err, "Error connecting BIO\n");
1177 1178 1179
        return NULL;
    }

1180
    if (BIO_get_fd(cbio, &fd) < 0) {
1181
        BIO_puts(bio_err, "Can't get connection fd\n");
1182 1183 1184 1185 1186 1187 1188 1189 1190 1191
        goto err;
    }

    if (req_timeout != -1 && rv <= 0) {
        FD_ZERO(&confds);
        openssl_fdset(fd, &confds);
        tv.tv_usec = 0;
        tv.tv_sec = req_timeout;
        rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv);
        if (rv == 0) {
1192
            BIO_puts(bio_err, "Timeout on connect\n");
1193 1194 1195 1196 1197
            return NULL;
        }
    }

    ctx = OCSP_sendreq_new(cbio, path, NULL, -1);
1198
    if (ctx == NULL)
1199 1200 1201 1202
        return NULL;

    for (i = 0; i < sk_CONF_VALUE_num(headers); i++) {
        CONF_VALUE *hdr = sk_CONF_VALUE_value(headers, i);
1203 1204
        if (add_host == 1 && strcasecmp("host", hdr->name) == 0)
            add_host = 0;
1205 1206 1207 1208
        if (!OCSP_REQ_CTX_add1_header(ctx, hdr->name, hdr->value))
            goto err;
    }

1209 1210 1211
    if (add_host == 1 && OCSP_REQ_CTX_add1_header(ctx, "Host", host) == 0)
        goto err;

1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229
    if (!OCSP_REQ_CTX_set1_req(ctx, req))
        goto err;

    for (;;) {
        rv = OCSP_sendreq_nbio(&rsp, ctx);
        if (rv != -1)
            break;
        if (req_timeout == -1)
            continue;
        FD_ZERO(&confds);
        openssl_fdset(fd, &confds);
        tv.tv_usec = 0;
        tv.tv_sec = req_timeout;
        if (BIO_should_read(cbio))
            rv = select(fd + 1, (void *)&confds, NULL, NULL, &tv);
        else if (BIO_should_write(cbio))
            rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv);
        else {
1230
            BIO_puts(bio_err, "Unexpected retry condition\n");
1231 1232 1233
            goto err;
        }
        if (rv == 0) {
1234
            BIO_puts(bio_err, "Timeout on request\n");
1235 1236 1237
            break;
        }
        if (rv == -1) {
1238
            BIO_puts(bio_err, "Select error\n");
1239 1240 1241 1242 1243
            break;
        }

    }
 err:
R
Rich Salz 已提交
1244
    OCSP_REQ_CTX_free(ctx);
1245 1246 1247

    return rsp;
}
1248

1249
OCSP_RESPONSE *process_responder(OCSP_REQUEST *req,
1250 1251
                                 const char *host, const char *path,
                                 const char *port, int use_ssl,
R
Rich Salz 已提交
1252
                                 STACK_OF(CONF_VALUE) *headers,
1253 1254 1255 1256 1257
                                 int req_timeout)
{
    BIO *cbio = NULL;
    SSL_CTX *ctx = NULL;
    OCSP_RESPONSE *resp = NULL;
B
bluelineXY 已提交
1258

1259 1260
    cbio = BIO_new_connect(host);
    if (!cbio) {
1261
        BIO_printf(bio_err, "Error creating connect BIO\n");
1262 1263 1264 1265 1266 1267
        goto end;
    }
    if (port)
        BIO_set_conn_port(cbio, port);
    if (use_ssl == 1) {
        BIO *sbio;
1268
        ctx = SSL_CTX_new(TLS_client_method());
1269
        if (ctx == NULL) {
1270
            BIO_printf(bio_err, "Error creating SSL context.\n");
1271 1272 1273 1274 1275 1276
            goto end;
        }
        SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
        sbio = BIO_new_ssl(ctx, 1);
        cbio = BIO_push(sbio, cbio);
    }
B
bluelineXY 已提交
1277

1278
    resp = query_responder(cbio, host, path, headers, req, req_timeout);
1279 1280 1281
    if (!resp)
        BIO_printf(bio_err, "Error querying OCSP responder\n");
 end:
R
Rich Salz 已提交
1282
    BIO_free_all(cbio);
R
Rich Salz 已提交
1283
    SSL_CTX_free(ctx);
1284 1285
    return resp;
}
M
Matt Caswell 已提交
1286
# endif
1287

1288
#endif