Blame SOURCES/0008-Use-extensions-template-from-NSS.patch

77e006
From 9312d1892c611d9f0e814cb915488182da2b76cc Mon Sep 17 00:00:00 2001
77e006
From: Christian Heimes <cheimes@redhat.com>
77e006
Date: Mon, 4 Oct 2021 15:55:44 +0200
77e006
Subject: [PATCH] Use extensions template from NSS
77e006
77e006
Drop certmonger's custom extension template and use the sequence of X509v3
77e006
extensions template from NSS.
77e006
77e006
The certmonger template had a bug that caused certmonger to create CSRs
77e006
with invalid DER. It was encoding extension's critical element even for
77e006
default value FALSE.
77e006
77e006
Fixes: https://pagure.io/certmonger/issue/223
77e006
Signed-off-by: Christian Heimes <cheimes@redhat.com>
77e006
---
77e006
 src/certext.c | 41 +----------------------------------------
77e006
 1 file changed, 1 insertion(+), 40 deletions(-)
77e006
77e006
diff --git a/src/certext.c b/src/certext.c
77e006
index be536987..0d66971e 100644
77e006
--- a/src/certext.c
77e006
+++ b/src/certext.c
77e006
@@ -203,45 +203,6 @@ cm_ms_template_template[] = {
77e006
 	{0, 0, NULL, 0},
77e006
 };
77e006
 
77e006
-/* RFC 5280, 4.1 */
77e006
-const SEC_ASN1Template
77e006
-cm_certext_cert_extension_template[] = {
77e006
-	{
77e006
-	.kind = SEC_ASN1_SEQUENCE,
77e006
-	.offset = 0,
77e006
-	.sub = NULL,
77e006
-	.size = sizeof(CERTCertExtension),
77e006
-	},
77e006
-	{
77e006
-	.kind = SEC_ASN1_OBJECT_ID,
77e006
-	.offset = offsetof(CERTCertExtension, id),
77e006
-	.sub = NULL,
77e006
-	.size = sizeof(SECItem),
77e006
-	},
77e006
-	{
77e006
-	.kind = SEC_ASN1_BOOLEAN,
77e006
-	.offset = offsetof(CERTCertExtension, critical),
77e006
-	.sub = NULL,
77e006
-	.size = sizeof(SECItem),
77e006
-	},
77e006
-	{
77e006
-	.kind = SEC_ASN1_OCTET_STRING,
77e006
-	.offset = offsetof(CERTCertExtension, value),
77e006
-	.sub = NULL,
77e006
-	.size = sizeof(SECItem),
77e006
-	},
77e006
-	{0, 0, NULL, 0},
77e006
-};
77e006
-const SEC_ASN1Template
77e006
-cm_certext_sequence_of_cert_extension_template[] = {
77e006
-	{
77e006
-	.kind = SEC_ASN1_SEQUENCE_OF,
77e006
-	.offset = 0,
77e006
-	.sub = cm_certext_cert_extension_template,
77e006
-	.size = sizeof(CERTCertExtension **),
77e006
-	},
77e006
-};
77e006
-
77e006
 /* Windows 2000-style UPN */
77e006
 static unsigned char oid_ms_upn_name_bytes[] = {0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03};
77e006
 static const SECOidData oid_ms_upn_name = {
77e006
@@ -1960,7 +1921,7 @@ cm_certext_build_csr_extensions(struct cm_store_entry *entry,
77e006
 	/* Encode the sequence. */
77e006
 	memset(&encoded, 0, sizeof(encoded));
77e006
 	if (i > 1) {
77e006
-		template = cm_certext_sequence_of_cert_extension_template;
77e006
+		template = CERT_SequenceOfCertExtensionTemplate;
77e006
 		if (SEC_ASN1EncodeItem(arena, &encoded, &exts_ptr,
77e006
 				       template) == &encoded) {
77e006
 			*extensions = talloc_memdup(entry, encoded.data,
77e006
-- 
77e006
2.31.1
77e006